Linux API
[Prev Page][Next Page]
- Re: [Patch v2 3/3] net: Restrict receive packets queuing to housekeeping CPUs
- From: Nitesh Narayan Lal <nitesh@xxxxxxxxxx>
- Re: [PATCH 00/18] multiple preferred nodes
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [PATCH v2] fcntl: Add 32bit filesystem mode
- From: Peter Maydell <peter.maydell@xxxxxxxxxx>
- Re: [Patch v2 3/3] net: Restrict receive packets queuing to housekeeping CPUs
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [Patch v2 1/3] lib: Restrict cpumask_local_spread to houskeeping CPUs
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/1] eventfd: implementation of EFD_MASK flag
- From: Damian Hobson-Garcia <dhobsong@xxxxxxxxxx>
- Re: [PATCH v8 0/4] introduce memory hinting API for external process
- From: Oleksandr Natalenko <oleksandr@xxxxxxxxxx>
- Re: [PATCH v8 0/4] introduce memory hinting API for external process
- From: Oleksandr Natalenko <oleksandr@xxxxxxxxxx>
- Re: [PATCH v8] mm: Proactive compaction
- From: Nitin Gupta <ngupta@xxxxxxxxxxxxxx>
- Re: [PATCH v8] mm: Proactive compaction
- From: Nathan Chancellor <natechancellor@xxxxxxxxx>
- Re: [PATCH v8] mm: Proactive compaction
- From: Nitin Gupta <ngupta@xxxxxxxxxxxxxx>
- Re: [PATCH v8] mm: Proactive compaction
- From: maobibo <maobibo@xxxxxxxxxxx>
- Re: [PATCH v8] mm: Proactive compaction
- From: Nathan Chancellor <natechancellor@xxxxxxxxx>
- Re: [PATCH v2 0/3] Preventing job distribution to isolated CPUs
- From: Nitesh Narayan Lal <nitesh@xxxxxxxxxx>
- [Patch v2 3/3] net: Restrict receive packets queuing to housekeeping CPUs
- From: Nitesh Narayan Lal <nitesh@xxxxxxxxxx>
- [PATCH v2 0/3] Preventing job distribution to isolated CPUs
- From: Nitesh Narayan Lal <nitesh@xxxxxxxxxx>
- [Patch v2 2/3] PCI: Restrict probe functions to housekeeping CPUs
- From: Nitesh Narayan Lal <nitesh@xxxxxxxxxx>
- [Patch v2 1/3] lib: Restrict cpumask_local_spread to houskeeping CPUs
- From: Nitesh Narayan Lal <nitesh@xxxxxxxxxx>
- Re: [PATCH v8 0/4] introduce memory hinting API for external process
- From: Minchan Kim <minchan@xxxxxxxxxx>
- [PATCH v8 4/4] mm/madvise: check fatal signal pending of target process
- From: Minchan Kim <minchan@xxxxxxxxxx>
- [PATCH v8 3/4] mm/madvise: introduce process_madvise() syscall: an external memory hinting API
- From: Minchan Kim <minchan@xxxxxxxxxx>
- [PATCH v8 2/4] pid: move pidfd_get_pid() to pid.c
- From: Minchan Kim <minchan@xxxxxxxxxx>
- [PATCH v8 1/4] mm/madvise: pass task and mm to do_madvise
- From: Minchan Kim <minchan@xxxxxxxxxx>
- [PATCH v8 0/4] introduce memory hinting API for external process
- From: Minchan Kim <minchan@xxxxxxxxxx>
- [PATCH 1/3] glibc: Perform rseq registration at C startup and thread creation (v21)
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [PATCH 2/3] Linux: Use rseq in sched_getcpu if available (v9)
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH glibc 1/3] glibc: Perform rseq registration at C startup and thread creation (v20)
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH 00/18] multiple preferred nodes
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [PATCH ghak90 V8 07/16] audit: add contid support for signalling the audit daemon
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH] symlink.7: document magic-links more completely
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v3 1/1] eventfd: implementation of EFD_MASK flag
- From: Paul Elder <paul.elder@xxxxxxxxxxxxxxxx>
- RE: [PATCH v5 3/7] fs: Add fd_install_received() wrapper for __fd_install_received()
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH v4 00/11] Add seccomp notifier ioctl that enables adding fds
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [PATCH v5 3/7] fs: Add fd_install_received() wrapper for __fd_install_received()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 02/11] fs: Move __scm_install_fd() to __fd_install_received()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH glibc 1/3] glibc: Perform rseq registration at C startup and thread creation (v20)
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH glibc 1/3] glibc: Perform rseq registration at C startup and thread creation (v20)
- From: Szabolcs Nagy <szabolcs.nagy@xxxxxxx>
- Re: [PATCH v4 02/11] fs: Move __scm_install_fd() to __fd_install_received()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- RE: [PATCH v4 03/11] fs: Add fd_install_received() wrapper for __fd_install_received()
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH v3] seccomp: Add find_notification helper
- From: Nathan Chancellor <natechancellor@xxxxxxxxx>
- Re: [PATCH v5 3/7] fs: Add fd_install_received() wrapper for __fd_install_received()
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [PATCH v3] seccomp: Add find_notification helper
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- [PATCH v5 3/7] fs: Add fd_install_received() wrapper for __fd_install_received()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 1/7] net/scm: Regularize compat handling of scm_detach_fds()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 0/7] Add seccomp notifier ioctl that enables adding fds
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 2/7] fs: Move __scm_install_fd() to __fd_install_received()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 7/7] selftests/seccomp: Test SECCOMP_IOCTL_NOTIF_ADDFD
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 6/7] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 5/7] fs: Expand __fd_install_received() to accept fd
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 4/7] pidfd: Replace open-coded partial fd_install_received()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v8] mm: Proactive compaction
- From: Nitin Gupta <ngupta@xxxxxxxxxxxxxx>
- Re: [PATCH ghak90 V8 07/16] audit: add contid support for signalling the audit daemon
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3] seccomp: Add find_notification helper
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v8] mm: Proactive compaction
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] seccomp: Add find_notification helper
- From: Nathan Chancellor <natechancellor@xxxxxxxxx>
- Re: [PATCH v4 03/11] fs: Add fd_install_received() wrapper for __fd_install_received()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 02/11] fs: Move __scm_install_fd() to __fd_install_received()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- RE: [PATCH v4 03/11] fs: Add fd_install_received() wrapper for __fd_install_received()
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH 3/8] seccomp: Introduce SECCOMP_PIN_ARCHITECTURE
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH 3/8] seccomp: Introduce SECCOMP_PIN_ARCHITECTURE
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- RE: [PATCH v4 02/11] fs: Move __scm_install_fd() to __fd_install_received()
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH 3/8] seccomp: Introduce SECCOMP_PIN_ARCHITECTURE
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [Patch v1 2/3] PCI: prevent work_on_cpu's probe to execute on isolated CPUs
- From: Frederic Weisbecker <frederic@xxxxxxxxxx>
- Re: [Patch v1 2/3] PCI: prevent work_on_cpu's probe to execute on isolated CPUs
- From: Nitesh Narayan Lal <nitesh@xxxxxxxxxx>
- Re: [PATCH 4/8] seccomp: Implement constant action bitmaps
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- [PATCH v8] mm: Proactive compaction
- From: Nitin Gupta <nigupta@xxxxxxxxxx>
- Re: [Patch v1 2/3] PCI: prevent work_on_cpu's probe to execute on isolated CPUs
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: [PATCH 4/8] seccomp: Implement constant action bitmaps
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 6/8] x86: Provide API for local kernel TLB flushing
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 4/8] seccomp: Implement constant action bitmaps
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [RFC][PATCH 0/8] seccomp: Implement constant action bitmaps
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v1 0/3] Preventing job distribution to isolated CPUs
- From: Marcelo Tosatti <mtosatti@xxxxxxxxxx>
- Re: [RFC][PATCH 0/8] seccomp: Implement constant action bitmaps
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH 6/8] x86: Provide API for local kernel TLB flushing
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH 3/8] seccomp: Introduce SECCOMP_PIN_ARCHITECTURE
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v7] mm: Proactive compaction
- From: Nitin Gupta <ngupta@xxxxxxxxxxxxxx>
- Re: [PATCH v4 10/11] seccomp: Switch addfd to Extensible Argument ioctl
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH v4 10/11] seccomp: Switch addfd to Extensible Argument ioctl
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 4/8] seccomp: Implement constant action bitmaps
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 08/11] selftests/seccomp: Make kcmp() less required
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 4/8] seccomp: Implement constant action bitmaps
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 08/11] selftests/seccomp: Make kcmp() less required
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH v4 09/11] selftests/seccomp: Rename user_trap_syscall() to user_notif_syscall()
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH v4 10/11] seccomp: Switch addfd to Extensible Argument ioctl
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH 4/8] seccomp: Implement constant action bitmaps
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 4/8] seccomp: Implement constant action bitmaps
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v7] mm: Proactive compaction
- From: Oleksandr Natalenko <oleksandr@xxxxxxxxxx>
- [PATCH 2/8] seccomp: Use pr_fmt
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 4/8] seccomp: Implement constant action bitmaps
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 3/8] seccomp: Introduce SECCOMP_PIN_ARCHITECTURE
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 6/8] x86: Provide API for local kernel TLB flushing
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 8/8] [DEBUG] seccomp: Report bitmap coverage ranges
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 5/8] selftests/seccomp: Compare bitmap vs filter overhead
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 7/8] x86: Enable seccomp constant action bitmaps
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [RFC][PATCH 0/8] seccomp: Implement constant action bitmaps
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 1/8] selftests/seccomp: Improve calibration loop
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 02/11] fs: Move __scm_install_fd() to __fd_install_received()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 02/11] fs: Move __scm_install_fd() to __fd_install_received()
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [RFC PATCH] seccomp: Add extensibility mechanism to read notifications
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- [PATCH v4 00/11] Add seccomp notifier ioctl that enables adding fds
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 05/11] fs: Expand __fd_install_received() to accept fd
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 07/11] selftests/seccomp: Test SECCOMP_IOCTL_NOTIF_ADDFD
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 09/11] selftests/seccomp: Rename user_trap_syscall() to user_notif_syscall()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 08/11] selftests/seccomp: Make kcmp() less required
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 06/11] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 11/11] seccomp: Fix ioctl number for SECCOMP_IOCTL_NOTIF_ID_VALID
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 10/11] seccomp: Switch addfd to Extensible Argument ioctl
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 03/11] fs: Add fd_install_received() wrapper for __fd_install_received()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 01/11] net/scm: Regularize compat handling of scm_detach_fds()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 04/11] pidfd: Replace open-coded partial fd_install_received()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 02/11] fs: Move __scm_install_fd() to __fd_install_received()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC PATCH] seccomp: Add extensibility mechanism to read notifications
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 3/4] nsproxy: attach to namespaces via pidfds
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v7] mm: Proactive compaction
- From: Nitin Gupta <nigupta@xxxxxxxxxx>
- Re: [PATCH v6] mm: Proactive compaction
- From: Nitin Gupta <ngupta@xxxxxxxxxxxxxx>
- Re: [PATCH v6] mm: Proactive compaction
- From: Oleksandr Natalenko <oleksandr@xxxxxxxxxx>
- Re: [RFC PATCH] seccomp: Add extensibility mechanism to read notifications
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH v2 3/4] nsproxy: attach to namespaces via pidfds
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [RFC PATCH] seccomp: Add extensibility mechanism to read notifications
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH 13/17] watch_queue: Implement mount topology and attribute change notifications [ver #5]
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH v6] mm: Proactive compaction
- From: Oleksandr Natalenko <oleksandr@xxxxxxxxxx>
- Re: Linux powerpc new system call instruction and ABI
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- Re: [PATCH 13/17] watch_queue: Implement mount topology and attribute change notifications [ver #5]
- From: Ian Kent <raven@xxxxxxxxxx>
- Re: [RFC 0/4] futex2: Add new futex interface
- From: André Almeida <andrealmeid@xxxxxxxxxxxxx>
- [RFC PATCH] seccomp: Add extensibility mechanism to read notifications
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [RFC 0/4] futex2: Add new futex interface
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- [RFC 4/4] selftests: futex: Add futex2 wouldblock test
- From: André Almeida <andrealmeid@xxxxxxxxxxxxx>
- [RFC 3/4] selftests: futex: Add futex2 timeout test
- From: André Almeida <andrealmeid@xxxxxxxxxxxxx>
- [RFC 2/4] selftests: futex: Add futex2 wake/wait test
- From: André Almeida <andrealmeid@xxxxxxxxxxxxx>
- [RFC 1/4] futex2: Add new futex interface
- From: André Almeida <andrealmeid@xxxxxxxxxxxxx>
- [RFC 0/4] futex2: Add new futex interface
- From: André Almeida <andrealmeid@xxxxxxxxxxxxx>
- Re: [RFC] unexport linux/elfcore.h
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: Linux powerpc new system call instruction and ABI
- From: Segher Boessenkool <segher@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH glibc 1/3] glibc: Perform rseq registration at C startup and thread creation (v20)
- From: Joseph Myers <joseph@xxxxxxxxxxxxxxxx>
- Re: [PATCH v6] mm: Proactive compaction
- From: Nitin Gupta <ngupta@xxxxxxxxxxxxxx>
- Re: [RFC] unexport linux/elfcore.h
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH glibc 1/3] glibc: Perform rseq registration at C startup and thread creation (v20)
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [RFC] unexport linux/elfcore.h
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] powerpc/64s: system call support for scv/rfscv instructions
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [PATCH 1/2] powerpc/64s/exception: treat NIA below __end_interrupts as soft-masked
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- Linux powerpc new system call instruction and ABI
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- Re: [PATCH v7 7/7] mm/madvise: allow KSM hints for remote API
- From: Jann Horn <jannh@xxxxxxxxxx>
- [RFC] unexport linux/elfcore.h
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- [Patch v1 2/3] PCI: prevent work_on_cpu's probe to execute on isolated CPUs
- From: Nitesh Narayan Lal <nitesh@xxxxxxxxxx>
- [PATCH v1 0/3] Preventing job distribution to isolated CPUs
- From: Nitesh Narayan Lal <nitesh@xxxxxxxxxx>
- [Patch v1 1/3] lib: restricting cpumask_local_spread to only houskeeping CPUs
- From: Nitesh Narayan Lal <nitesh@xxxxxxxxxx>
- [Patch v1 3/3] net: restrict queuing of receive packets to housekeeping CPUs
- From: Nitesh Narayan Lal <nitesh@xxxxxxxxxx>
- [PATCH] symlink.7: document magic-links more completely
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- Re: [PATCH v6] mm: Proactive compaction
- From: Khalid Aziz <khalid.aziz@xxxxxxxxxx>
- Re: [PATCH v6] mm: Proactive compaction
- From: Nitin Gupta <ngupta@xxxxxxxxxxxxxx>
- Re: Add a new fchmodat4() syscall, v2
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH ghak90 V8 07/16] audit: add contid support for signalling the audit daemon
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- RE: [PATCH v5 1/3] open: add close_range()
- From: David Laight <David.Laight@xxxxxxxxxx>
- RE: [PATCH v5 0/3] close_range()
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH v5 1/3] open: add close_range()
- From: Kyle Evans <kevans@xxxxxxxxxxx>
- Re: [PATCH v5 1/3] open: add close_range()
- From: Szabolcs Nagy <nsz@xxxxxxxxxx>
- Re: [PATCH v5 1/3] open: add close_range()
- From: Kyle Evans <kevans@xxxxxxxxxxx>
- Re: [PATCH v5 1/3] open: add close_range()
- From: Kyle Evans <kevans@xxxxxxxxxxx>
- Re: [PATCH v5 1/3] open: add close_range()
- From: Szabolcs Nagy <nsz@xxxxxxxxxx>
- Re: [exec] 166d03c9ec: ltp.execveat02.fail
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [exec] 166d03c9ec: ltp.execveat02.fail
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH glibc 1/3] glibc: Perform rseq registration at C startup and thread creation (v20)
- From: Joseph Myers <joseph@xxxxxxxxxxxxxxxx>
- Re: [PATCH glibc 1/3] glibc: Perform rseq registration at C startup and thread creation (v20)
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH v5 0/3] close_range()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v5 0/3] close_range()
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 0/3] close_range()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: seccomp feature development
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH glibc 1/3] glibc: Perform rseq registration at C startup and thread creation (v20)
- From: Joseph Myers <joseph@xxxxxxxxxxxxxxxx>
- Re: [PATCH V11 11/11] fs/xfs: Update xfs_ioctl_setattr_dax_invalidate()
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- Re: [PATCH glibc 1/3] glibc: Perform rseq registration at C startup and thread creation (v20)
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH glibc 1/3] glibc: Perform rseq registration at C startup and thread creation (v20)
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH glibc 1/3] glibc: Perform rseq registration at C startup and thread creation (v20)
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH glibc 1/3] glibc: Perform rseq registration at C startup and thread creation (v20)
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: sys/sysinfo.h clash with linux/kernel.h
- From: Szabolcs Nagy <nsz@xxxxxxxxxx>
- Re: [PATCH v5 1/3] open: add close_range()
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH V11 11/11] fs/xfs: Update xfs_ioctl_setattr_dax_invalidate()
- From: Jan Kara <jack@xxxxxxx>
- [PATCH v3 3/4] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [PATCH v5 0/3] close_range()
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/3] open: add close_range()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v5 0/3] close_range()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v5 1/3] open: add close_range()
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [PATCH V11 11/11] fs/xfs: Update xfs_ioctl_setattr_dax_invalidate()
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH v5 0/3] close_range()
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [PATCH v5 2/3] arch: wire-up close_range()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 3/3] tests: add close_range() tests
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 1/3] open: add close_range()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 0/3] close_range()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH V11 11/11] fs/xfs: Update xfs_ioctl_setattr_dax_invalidate()
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- Re: robinhood, fanotify name info events and lustre changelog
- From: "Quentin.BOUGET@xxxxxx" <Quentin.BOUGET@xxxxxx>
- Re: robinhood, fanotify name info events and lustre changelog
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: robinhood, fanotify name info events and lustre changelog
- From: "Quentin.BOUGET@xxxxxx" <Quentin.BOUGET@xxxxxx>
- Re: [PATCH v2 2/3] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v6] mm: Proactive compaction
- From: Nitin Gupta <nigupta@xxxxxxxxxx>
- Re: [PATCH v2 2/3] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [PATCH v3] seccomp: Add find_notification helper
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3] seccomp: Add find_notification helper
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: robinhood, fanotify name info events and lustre changelog
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v2 2/3] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2 2/3] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 2/3] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 2/3] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 2/3] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2 2/3] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/3] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: robinhood, fanotify name info events and lustre changelog
- From: Dominique Martinet <asmadeus@xxxxxxxxxxxxx>
- Re: robinhood, fanotify name info events and lustre changelog
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v2 2/3] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 2/3] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 2/3] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [PATCH v2 2/3] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v2 2/3] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 2/3] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [PATCH v2 2/3] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [PATCH v2 1/3] seccomp: Add find_notification helper
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 3/3] selftests/seccomp: Test SECCOMP_IOCTL_NOTIF_ADDFD
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: robinhood, fanotify name info events and lustre changelog
- From: "Quentin.BOUGET@xxxxxx" <Quentin.BOUGET@xxxxxx>
- Re: [PATCH v2 3/3] selftests/seccomp: Test SECCOMP_IOCTL_NOTIF_ADDFD
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH v2 3/3] selftests/seccomp: Test SECCOMP_IOCTL_NOTIF_ADDFD
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [PATCH v2 1/3] seccomp: Add find_notification helper
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [PATCH v2 2/3] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2 0/3] Add seccomp notifier ioctl that enables adding fds
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH v2 3/3] selftests/seccomp: Test SECCOMP_IOCTL_NOTIF_ADDFD
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH v18 07/12] landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v2 2/3] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2 1/3] seccomp: Add find_notification helper
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2 2/3] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Giuseppe Scrivano <gscrivan@xxxxxxxxxx>
- Re: [PATCH v2 2/3] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 3/3] selftests/seccomp: Test SECCOMP_IOCTL_NOTIF_ADDFD
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 2/3] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2 2/3] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2] fcntl: Add 32bit filesystem mode
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- Re: [PATCH v2 1/3] seccomp: Add find_notification helper
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v10 01/26] Documentation/x86: Add CET description
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v5] mm: Proactive compaction
- From: Nitin Gupta <ngupta@xxxxxxxxxxxxxx>
- Re: [PATCH v5] mm: Proactive compaction
- From: Khalid Aziz <khalid.aziz@xxxxxxxxxx>
- Re: [PATCH v5] mm: Proactive compaction
- From: Nitin Gupta <ngupta@xxxxxxxxxxxxxx>
- Re: [PATCH v5] mm: Proactive compaction
- From: Nitin Gupta <ngupta@xxxxxxxxxxxxxx>
- Re: robinhood, fanotify name info events and lustre changelog
- From: Dominique Martinet <asmadeus@xxxxxxxxxxxxx>
- [PATCH AUTOSEL 5.6 33/47] selftests: mlxsw: qos_mc_aware: Specify arping timeout as an integer
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.4 17/26] selftests: mlxsw: qos_mc_aware: Specify arping timeout as an integer
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.6 23/47] wireguard: selftests: use newer iproute2 for gcc-10
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH v2 3/3] selftests/seccomp: Test SECCOMP_IOCTL_NOTIF_ADDFD
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- [PATCH v2 2/3] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- [PATCH v2 1/3] seccomp: Add find_notification helper
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- [PATCH v2 0/3] Add seccomp notifier ioctl that enables adding fds
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [PATCH v5] mm: Proactive compaction
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH v5] mm: Proactive compaction
- From: Holger Hoffstätte <holger@xxxxxxxxxxxxxxxxxxxxxx>
- [PATCH glibc 1/3] glibc: Perform rseq registration at C startup and thread creation (v20)
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [PATCH glibc 2/3] Linux: Use rseq in sched_getcpu if available (v9)
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH v5] mm: Proactive compaction
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH v18 07/12] landlock: Support filesystem access-control
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [net-next RFC PATCH 00/13] net: hsr: Add PRP driver
- From: Murali Karicheri <m-karicheri2@xxxxxx>
- Re: [net-next RFC PATCH 00/13] net: hsr: Add PRP driver
- From: Murali Karicheri <m-karicheri2@xxxxxx>
- [PATCH v18 01/12] landlock: Add object management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v18 05/12] LSM: Infrastructure management of the superblock
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v18 06/12] fs,security: Add sb_delete hook
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v18 09/12] arch: Wire up landlock() syscall
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v18 12/12] landlock: Add user and kernel documentation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v18 07/12] landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v18 10/12] selftests/landlock: Add initial tests
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v18 03/12] landlock: Set up the security framework and manage credentials
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v18 08/12] landlock: Add syscall implementation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v18 11/12] samples/landlock: Add a sandbox manager example
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v18 04/12] landlock: Add ptrace restrictions
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v18 02/12] landlock: Add ruleset and domain management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v18 00/12] Landlock LSM
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [net-next RFC PATCH 00/13] net: hsr: Add PRP driver
- From: Vinicius Costa Gomes <vinicius.gomes@xxxxxxxxx>
- Re: [net-next RFC PATCH 00/13] net: hsr: Add PRP driver
- From: Vladimir Oltean <olteanv@xxxxxxxxx>
- Re: [net-next RFC PATCH 00/13] net: hsr: Add PRP driver
- From: Vinicius Costa Gomes <vinicius.gomes@xxxxxxxxx>
- Re: [PATCH glibc 1/3] glibc: Perform rseq registration at C startup and thread creation (v19)
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH glibc 1/3] glibc: Perform rseq registration at C startup and thread creation (v19)
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH glibc 1/3] glibc: Perform rseq registration at C startup and thread creation (v19)
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH glibc 1/3] glibc: Perform rseq registration at C startup and thread creation (v19)
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH glibc 1/3] glibc: Perform rseq registration at C startup and thread creation (v19)
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [net-next RFC PATCH 00/13] net: hsr: Add PRP driver
- From: Murali Karicheri <m-karicheri2@xxxxxx>
- Re: [PATCH glibc 1/3] glibc: Perform rseq registration at C startup and thread creation (v19)
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH 2/5] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH 2/5] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [PATCH 4/5] seccomp: Add SECCOMP_ADDFD_FLAG_MOVE flag to add fd ioctl
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [net-next RFC PATCH 00/13] net: hsr: Add PRP driver
- From: Vladimir Oltean <olteanv@xxxxxxxxx>
- Re: [PATCH] proc.5: add "wf" to VmFlags in /proc/[pid]/smaps
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH glibc 1/3] glibc: Perform rseq registration at C startup and thread creation (v19)
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [net-next RFC PATCH 00/13] net: hsr: Add PRP driver
- From: Murali Karicheri <m-karicheri2@xxxxxx>
- Re: [PATCH glibc 1/3] glibc: Perform rseq registration at C startup and thread creation (v19)
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH] proc.5: add "wf" to VmFlags in /proc/[pid]/smaps
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH glibc 1/3] glibc: Perform rseq registration at C startup and thread creation (v19)
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH 4/5] seccomp: Add SECCOMP_ADDFD_FLAG_MOVE flag to add fd ioctl
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH] proc.5: add "wf" to VmFlags in /proc/[pid]/smaps
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH 2/5] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH] proc.5: add "wf" to VmFlags in /proc/[pid]/smaps
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH 1/5] seccomp: Add find_notification helper
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH 2/5] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/5] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [PATCH 2/5] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/5] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH 2/5] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH 1/5] seccomp: Add find_notification helper
- From: Tycho Andersen <tycho@xxxxxxxx>
- [PATCH 4/5] seccomp: Add SECCOMP_ADDFD_FLAG_MOVE flag to add fd ioctl
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- [PATCH 5/5] selftests/seccomp: Add test for addfd move semantics
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- [PATCH 3/5] selftests/seccomp: Test SECCOMP_IOCTL_NOTIF_ADDFD
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- [PATCH 2/5] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- [PATCH 1/5] seccomp: Add find_notification helper
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- [PATCH 0/5] Add seccomp notifier ioctl that enables adding fds
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: seccomp feature development
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [PATCH v10 26/26] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v10 01/26] Documentation/x86: Add CET description
- From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
- Re: [RFC PATCH 5/5] selftest/x86: Add CET quick test
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH] seccomp: Add group_leader pid to seccomp_notif
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [RFC PATCH 5/5] selftest/x86: Add CET quick test
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v10 26/26] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Eugene Syromiatnikov <esyr@xxxxxxxxxx>
- Re: [RFC PATCH 5/5] selftest/x86: Add CET quick test
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [RFC PATCH 5/5] selftest/x86: Add CET quick test
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v10 26/26] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v10 01/26] Documentation/x86: Add CET description
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [RFC PATCH 5/5] selftest/x86: Add CET quick test
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH AUTOSEL 5.6 13/41] kselftests: dmabuf-heaps: Fix confused return value on expected error testing
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [RFC PATCH 5/5] selftest/x86: Add CET quick test
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [RFC PATCH 5/5] selftest/x86: Add CET quick test
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH] proc.5: add "wf" to VmFlags in /proc/[pid]/smaps
- From: Ian Rogers <irogers@xxxxxxxxxx>
- Re: [RFC PATCH 5/5] selftest/x86: Add CET quick test
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC PATCH 4/5] selftest/x86: Fix sysret_rip with ENDBR
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [RFC PATCH 2/5] selftest/x86: Enable CET for selftests/x86
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [RFC PATCH 3/5] selftest/x86: Fix sigreturn_64 test.
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC PATCH 3/5] selftest/x86: Fix sigreturn_64 test.
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC PATCH 2/5] selftest/x86: Enable CET for selftests/x86
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC PATCH 1/5] x86/cet/shstk: Modify ARCH_X86_CET_ALLOC_SHSTK for 32-bit address range
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v10 26/26] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH] proc.5: add "wf" to VmFlags in /proc/[pid]/smaps
- From: Ian Rogers <irogers@xxxxxxxxxx>
- Re: [RFC PATCH 4/5] selftest/x86: Fix sysret_rip with ENDBR
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- [RFC PATCH 2/5] selftest/x86: Enable CET for selftests/x86
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [RFC PATCH 5/5] selftest/x86: Add CET quick test
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [RFC PATCH 4/5] selftest/x86: Fix sysret_rip with ENDBR
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [RFC PATCH 3/5] selftest/x86: Fix sigreturn_64 test.
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [RFC PATCH 1/5] x86/cet/shstk: Modify ARCH_X86_CET_ALLOC_SHSTK for 32-bit address range
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [RFC PATCH 0/5] Update selftests/x86 for CET
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v10 00/26] Control-flow Enforcement: Shadow Stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v10 00/26] Control-flow Enforcement: Shadow Stack
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [net-next RFC PATCH 00/13] net: hsr: Add PRP driver
- From: Vinicius Costa Gomes <vinicius.gomes@xxxxxxxxx>
- Re: [PATCH v10 00/26] Control-flow Enforcement: Shadow Stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v10 00/26] Control-flow Enforcement: Shadow Stack
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [net-next RFC PATCH 00/13] net: hsr: Add PRP driver
- From: Murali Karicheri <m-karicheri2@xxxxxx>
- Re: [PATCH glibc 1/3] glibc: Perform rseq registration at C startup and thread creation (v19)
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH glibc 2/3] glibc: sched_getcpu(): use rseq cpu_id TLS on Linux (v7)
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: seccomp feature development
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: seccomp feature development
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [PATCH] futex: send SIGBUS if argument is not aligned on a four-byte boundary
- From: Konstantin Khlebnikov <khlebnikov@xxxxxxxxxxxxxx>
- Re: seccomp feature development
- From: Aleksa Sarai <asarai@xxxxxxx>
- Re: seccomp feature development
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: seccomp feature development
- From: Aleksa Sarai <asarai@xxxxxxx>
- Re: [PATCH v10 01/26] Documentation/x86: Add CET description
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH 0/4] Relocate execve() sanity checks
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH] futex: send SIGBUS if argument is not aligned on a four-byte boundary
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: seccomp feature development
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 0/4] Relocate execve() sanity checks
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2] clone.2: Document CLONE_INTO_CGROUP
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH 0/4] Relocate execve() sanity checks
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] mm: use only pidfd for process_madvise syscall
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [PATCH 0/4] Relocate execve() sanity checks
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 0/4] Relocate execve() sanity checks
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] futex: send SIGBUS if argument is not aligned on a four-byte boundary
- From: "Carlos O'Donell" <carlos@xxxxxxxxxx>
- Re: [PATCH 0/4] Relocate execve() sanity checks
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] mm: use only pidfd for process_madvise syscall
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: seccomp feature development
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH 0/4] Relocate execve() sanity checks
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 1/4] exec: Change uselib(2) IS_SREG() failure to EACCES
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 1/4] exec: Change uselib(2) IS_SREG() failure to EACCES
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH 1/4] exec: Change uselib(2) IS_SREG() failure to EACCES
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: seccomp feature development
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: seccomp feature development
- From: Aleksa Sarai <asarai@xxxxxxx>
- Re: [PATCH v2] clone.2: Document CLONE_INTO_CGROUP
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: seccomp feature development
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- Re: [PATCH v2] clone.2: Document CLONE_INTO_CGROUP
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH 1/4] exec: Change uselib(2) IS_SREG() failure to EACCES
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH 1/4] exec: Change uselib(2) IS_SREG() failure to EACCES
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH 1/4] exec: Change uselib(2) IS_SREG() failure to EACCES
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 1/4] exec: Change uselib(2) IS_SREG() failure to EACCES
- From: Andreas Schwab <schwab@xxxxxxxxxxxxxx>
- Re: [PATCH 1/4] exec: Change uselib(2) IS_SREG() failure to EACCES
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: seccomp feature development
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: seccomp feature development
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: seccomp feature development
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: How about just O_EXEC? (was Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH 1/4] exec: Change uselib(2) IS_SREG() failure to EACCES
- From: Andreas Schwab <schwab@xxxxxxxxxxxxxx>
- Re: seccomp feature development
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH 1/4] exec: Change uselib(2) IS_SREG() failure to EACCES
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH] mm: use only pidfd for process_madvise syscall
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: seccomp feature development
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: seccomp feature development
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- Re: [PATCH] mm: use only pidfd for process_madvise syscall
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: seccomp feature development
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- Re: How about just O_EXEC? (was Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC)
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- Re: [PATCH v10 01/26] Documentation/x86: Add CET description
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v10 01/26] Documentation/x86: Add CET description
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 1/4] exec: Change uselib(2) IS_SREG() failure to EACCES
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v10 01/26] Documentation/x86: Add CET description
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH] seccomp: Add group_leader pid to seccomp_notif
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] mm: use only pidfd for process_madvise syscall
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: seccomp feature development
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: seccomp feature development
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH] seccomp: Add group_leader pid to seccomp_notif
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [PATCH] mm: use only pidfd for process_madvise syscall
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [PATCH] seccomp: Add group_leader pid to seccomp_notif
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- seccomp feature development
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] mm: use only pidfd for process_madvise syscall
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- [PATCH v5] mm: Proactive compaction
- From: Nitin Gupta <nigupta@xxxxxxxxxx>
- [PATCH v2] clone.2: Document CLONE_INTO_CGROUP
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH 1/4] exec: Change uselib(2) IS_SREG() failure to EACCES
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH 1/4] exec: Change uselib(2) IS_SREG() failure to EACCES
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v10 01/26] Documentation/x86: Add CET description
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v10 01/26] Documentation/x86: Add CET description
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v10 01/26] Documentation/x86: Add CET description
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- Re: [PATCH] seccomp: Add group_leader pid to seccomp_notif
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v10 01/26] Documentation/x86: Add CET description
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH] seccomp: Add group_leader pid to seccomp_notif
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH] seccomp: Add group_leader pid to seccomp_notif
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH 1/4] exec: Change uselib(2) IS_SREG() failure to EACCES
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH] seccomp: Add group_leader pid to seccomp_notif
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH] seccomp: Add group_leader pid to seccomp_notif
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH] seccomp: Add group_leader pid to seccomp_notif
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 0/7] fanotify events on child with name info
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH] seccomp: Add group_leader pid to seccomp_notif
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: How about just O_EXEC? (was Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC)
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- [PATCH 0/4] Relocate execve() sanity checks
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 2/4] exec: Relocate S_ISREG() check
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 4/4] fs: Include FMODE_EXEC when converting flags to f_mode
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 1/4] exec: Change uselib(2) IS_SREG() failure to EACCES
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 3/4] exec: Relocate path_noexec() check
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v10 01/26] Documentation/x86: Add CET description
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH] seccomp: Add group_leader pid to seccomp_notif
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v5 2/6] fs: Add a MAY_EXECMOUNT flag to infer the noexec mount property
- From: "Lev R. Oshvang ." <levonshe@xxxxxxxxx>
- Re: [PATCH] seccomp: Add group_leader pid to seccomp_notif
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH] seccomp: Add group_leader pid to seccomp_notif
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH] seccomp: Add group_leader pid to seccomp_notif
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH] seccomp: Add group_leader pid to seccomp_notif
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH] seccomp: Add group_leader pid to seccomp_notif
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH] seccomp: Add group_leader pid to seccomp_notif
- From: Aleksa Sarai <asarai@xxxxxxx>
- Re: [PATCH] seccomp: Add group_leader pid to seccomp_notif
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [PATCH] seccomp: Add group_leader pid to seccomp_notif
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH] seccomp: Add group_leader pid to seccomp_notif
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v10 01/26] Documentation/x86: Add CET description
- From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
- Re: [PATCH v10 01/26] Documentation/x86: Add CET description
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v10 01/26] Documentation/x86: Add CET description
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- Re: [PATCH v10 01/26] Documentation/x86: Add CET description
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- [PATCH] mm: use only pidfd for process_madvise syscall
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [PATCH v10 01/26] Documentation/x86: Add CET description
- From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
- Re: [PATCH v10 01/26] Documentation/x86: Add CET description
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH] seccomp: Add group_leader pid to seccomp_notif
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [PATCH v10 01/26] Documentation/x86: Add CET description
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v10 01/26] Documentation/x86: Add CET description
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v10 01/26] Documentation/x86: Add CET description
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v10 01/26] Documentation/x86: Add CET description
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: How about just O_EXEC? (was Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v4] mm: Proactive compaction
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH] futex: send SIGBUS if argument is not aligned on a four-byte boundary
- From: "Carlos O'Donell" <carlos@xxxxxxxxxx>
- Re: [PATCH] futex: send SIGBUS if argument is not aligned on a four-byte boundary
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3 5/5] lib/test_sysctl: support testing of sysctl. boot parameter
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: How about just O_EXEC? (was Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC)
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: How about just O_EXEC? (was Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC)
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH] futex: send SIGBUS if argument is not aligned on a four-byte boundary
- From: Konstantin Khlebnikov <khlebnikov@xxxxxxxxxxxxxx>
- Re: How about just O_EXEC? (was Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC)
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: How about just O_EXEC? (was Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC)
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] sched_getattr.2: update to include changed size semantics
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH] clone.2: Document CLONE_INTO_CGROUP
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH 3/4] seccomp: Add SECCOMP_USER_NOTIF_FLAG_PIDFD to get pidfd on listener trap
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH RFC 1/3] symlink.7: document magic-links more completely
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH] clone.2: Document CLONE_INTO_CGROUP
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: How about just O_EXEC? (was Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: How about just O_EXEC? (was Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC)
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- How about just O_EXEC? (was Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC)
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- [PATCH v17 22/23] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v17 05/10] fs,landlock: Support filesystem access-control
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v17 05/10] fs,landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v17 05/10] fs,landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v17 05/10] fs,landlock: Support filesystem access-control
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v17 05/10] fs,landlock: Support filesystem access-control
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v5 2/6] fs: Add a MAY_EXECMOUNT flag to infer the noexec mount property
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v17 05/10] fs,landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v17 02/10] landlock: Add ruleset and domain management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- RE: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH v5 2/6] fs: Add a MAY_EXECMOUNT flag to infer the noexec mount property
- From: "Lev R. Oshvang ." <levonshe@xxxxxxxxx>
- Re: [PATCH v17 05/10] fs,landlock: Support filesystem access-control
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v17 02/10] landlock: Add ruleset and domain management
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [ANNOUNCE] xfs-linux: vfs-for-next updated to 2c567af418e3
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v4 10/10] loop: Add LOOP_CONFIGURE ioctl
- From: Martijn Coenen <maco@xxxxxxxxxxx>
- [PATCH v5 11/11] loop: Add LOOP_CONFIGURE ioctl
- From: Martijn Coenen <maco@xxxxxxxxxxx>
- Re: [PATCH v3 5/5] lib/test_sysctl: support testing of sysctl. boot parameter
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH v3 5/5] lib/test_sysctl: support testing of sysctl. boot parameter
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [net-next RFC PATCH 00/13] net: hsr: Add PRP driver
- From: Murali Karicheri <m-karicheri2@xxxxxx>
- Re: [PATCH v5 5/6] doc: Add documentation for the fs.open_mayexec_enforce sysctl
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v5 4/6] selftest/openat2: Add tests for O_MAYEXEC enforcing
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v4 10/10] loop: Add LOOP_CONFIGURE ioctl
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v5 1/6] fs: Add support for an O_MAYEXEC flag on openat2(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v3 5/5] lib/test_sysctl: support testing of sysctl. boot parameter
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH v4 10/10] loop: Add LOOP_CONFIGURE ioctl
- From: Martijn Coenen <maco@xxxxxxxxxxx>
- Re: [PATCH v4 10/10] loop: Add LOOP_CONFIGURE ioctl
- From: Jens Axboe <axboe@xxxxxxxxx>
- Re: [PATCH v4 10/10] loop: Add LOOP_CONFIGURE ioctl
- From: Jens Axboe <axboe@xxxxxxxxx>
- Re: [PATCH v10 01/26] Documentation/x86: Add CET description
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v5 1/6] fs: Add support for an O_MAYEXEC flag on openat2(2)
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v5 5/6] doc: Add documentation for the fs.open_mayexec_enforce sysctl
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v5 4/6] selftest/openat2: Add tests for O_MAYEXEC enforcing
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v5 1/6] fs: Add support for an O_MAYEXEC flag on openat2(2)
- From: Christian Heimes <christian@xxxxxxxxxx>
- Re: [PATCH v5 2/6] fs: Add a MAY_EXECMOUNT flag to infer the noexec mount property
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v5 1/6] fs: Add support for an O_MAYEXEC flag on openat2(2)
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v7 5/7] mm: support both pid and pidfd for process_madvise
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v4 10/10] loop: Add LOOP_CONFIGURE ioctl
- From: Martijn Coenen <maco@xxxxxxxxxxx>
- Re: [PATCH v17 00/10] Landlock LSM
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v17 05/10] fs,landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v17 09/10] samples/landlock: Add a sandbox manager example
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v17 00/10] Landlock LSM
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v17 02/10] landlock: Add ruleset and domain management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v17 08/10] selftests/landlock: Add initial tests
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v17 06/10] landlock: Add syscall implementation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v17 10/10] landlock: Add user and kernel documentation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v17 07/10] arch: Wire up landlock() syscall
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v17 04/10] landlock: Add ptrace restrictions
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v17 03/10] landlock: Set up the security framework and manage credentials
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v17 01/10] landlock: Add object management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v3 5/5] lib/test_sysctl: support testing of sysctl. boot parameter
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH v3 5/5] lib/test_sysctl: support testing of sysctl. boot parameter
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH v7 5/7] mm: support both pid and pidfd for process_madvise
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [PATCH v7 5/7] mm: support both pid and pidfd for process_madvise
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v7 5/7] mm: support both pid and pidfd for process_madvise
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 5/7] mm: support both pid and pidfd for process_madvise
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [PATCH v7 2/7] mm: introduce external memory hinting API
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [PATCH v7 1/7] mm: pass task and mm to do_madvise
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [PATCH v5 0/6] Add support for O_MAYEXEC
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 0/6] Add support for O_MAYEXEC
- From: "Lev R. Oshvang ." <levonshe@xxxxxxxxx>
- Re: [PATCH v4 2/3] nsproxy: attach to namespaces via pidfds
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v4 1/3] nsproxy: add struct nsset
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v10 05/26] x86/cet/shstk: Add Kconfig option for user-mode Shadow Stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v10 05/26] x86/cet/shstk: Add Kconfig option for user-mode Shadow Stack
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v5 0/6] Add support for O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- RE: [PATCH v5 0/6] Add support for O_MAYEXEC
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH v5 0/6] Add support for O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- RE: [PATCH v5 0/6] Add support for O_MAYEXEC
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH v5 0/6] Add support for O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v5 0/6] Add support for O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- RE: [PATCH v5 0/6] Add support for O_MAYEXEC
- From: David Laight <David.Laight@xxxxxxxxxx>
- [net-next RFC PATCH 02/13] net: hsr: rename hsr directory to hsr-prp to introduce PRP
- From: Murali Karicheri <m-karicheri2@xxxxxx>
- [net-next RFC PATCH 01/13] net: hsr: Re-use Kconfig option to support PRP
- From: Murali Karicheri <m-karicheri2@xxxxxx>
- [net-next RFC PATCH 05/13] net: hsr: rename hsr_port_get_hsr() to hsr_prp_get_port()
- From: Murali Karicheri <m-karicheri2@xxxxxx>
- [net-next RFC PATCH 03/13] net: hsr: rename files to introduce PRP support
- From: Murali Karicheri <m-karicheri2@xxxxxx>
- [net-next RFC PATCH 07/13] net: hsr: introduce common uapi include/definitions for HSR and PRP
- From: Murali Karicheri <m-karicheri2@xxxxxx>
- [net-next RFC PATCH 10/13] net: hsr: add netlink socket interface for PRP
- From: Murali Karicheri <m-karicheri2@xxxxxx>
- [net-next RFC PATCH 08/13] net: hsr: migrate HSR netlink socket code to use new common API
- From: Murali Karicheri <m-karicheri2@xxxxxx>
- [net-next RFC PATCH 04/13] net: hsr: rename hsr variable inside struct hsr_port to priv
- From: Murali Karicheri <m-karicheri2@xxxxxx>
- [net-next RFC PATCH 13/13] net: prp: enhance debugfs to display PRP specific info in node table
- From: Murali Karicheri <m-karicheri2@xxxxxx>
- [net-next RFC PATCH 12/13] net: prp: add packet handling support
- From: Murali Karicheri <m-karicheri2@xxxxxx>
- [net-next RFC PATCH 11/13] net: prp: add supervision frame generation and handling support
- From: Murali Karicheri <m-karicheri2@xxxxxx>
- [net-next RFC PATCH 06/13] net: hsr: some renaming to introduce PRP driver support
- From: Murali Karicheri <m-karicheri2@xxxxxx>
- [net-next RFC PATCH 09/13] net: hsr: move re-usable code for PRP to hsr_prp_netlink.c
- From: Murali Karicheri <m-karicheri2@xxxxxx>
- [net-next RFC PATCH 00/13] net: hsr: Add PRP driver
- From: Murali Karicheri <m-karicheri2@xxxxxx>
- Re: [PATCH v5 0/6] Add support for O_MAYEXEC
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- Re: [PATCH v5 0/6] Add support for O_MAYEXEC
- From: "Lev R. Oshvang ." <levonshe@xxxxxxxxx>
- Re: [PATCH v4 10/10] loop: Add LOOP_CONFIGURE ioctl
- From: Martijn Coenen <maco@xxxxxxxxxxx>
- Re: [PATCH v4 10/10] loop: Add LOOP_CONFIGURE ioctl
- From: Martijn Coenen <maco@xxxxxxxxxxx>
- Re: [PATCH v4 10/10] loop: Add LOOP_CONFIGURE ioctl
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v4 10/10] loop: Add LOOP_CONFIGURE ioctl
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v3 7/7] fanotify: report events "on child" with name info to sb/mount marks
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [PATCH v3 5/7] fanotify: report parent fid + name for events on children
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [PATCH v3 0/7] fanotify events on child with name info
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v5 0/6] Add support for O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v5 5/6] doc: Add documentation for the fs.open_mayexec_enforce sysctl
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v5 6/6] ima: add policy support for the new file open MAY_OPENEXEC flag
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v5 0/6] Add support for O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v5 4/6] selftest/openat2: Add tests for O_MAYEXEC enforcing
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v5 1/6] fs: Add support for an O_MAYEXEC flag on openat2(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v5 2/6] fs: Add a MAY_EXECMOUNT flag to infer the noexec mount property
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v3 0/5] Add support for RESOLVE_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 3/3] selftests/pidfd: add pidfd setns tests
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 0/3] nsproxy: attach to multiple namespaces
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 2/3] nsproxy: attach to namespaces via pidfds
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 1/3] nsproxy: add struct nsset
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RFC] get_mempolicy(2) behaviour
- From: Andi Kleen <ak@xxxxxxxxxxxxxxx>
- [PATCH] man/statx: Add STATX_ATTR_DAX
- From: ira.weiny@xxxxxxxxx
- Re: [PATCH v3 2/3] nsproxy: attach to namespaces via pidfds
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 2/3] nsproxy: attach to namespaces via pidfds
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v3 2/3] nsproxy: attach to namespaces via pidfds
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 2/3] nsproxy: attach to namespaces via pidfds
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v3 1/3] nsproxy: add struct nsset
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 1/3] nsproxy: add struct nsset
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [ANNOUNCE] xfs-linux: vfs-for-next updated to 83d9088659e8
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH v3 2/3] nsproxy: attach to namespaces via pidfds
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 3/3] selftests/pidfd: add pidfd setns tests
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 1/3] nsproxy: add struct nsset
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 0/3] nsproxy: attach to multiple namespaces
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH man-pages v2 2/2] openat2.2: document new openat2(2) syscall
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- [RFC] get_mempolicy(2) behaviour
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] capability: add ns_capable_cred()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2 1/4] capability: add ns_capable_cred()
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2 1/4] capability: add ns_capable_cred()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2 1/4] capability: add ns_capable_cred()
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 02/18] xfs: fix xfs_reflink_remap_prep calling conventions
- From: Allison Collins <allison.henderson@xxxxxxxxxx>
- Re: [PATCH v4 1/5] fs: Add support for an O_MAYEXEC flag on openat2(2)
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC 00/18] xfs: atomic file updates
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- Re: [PATCH RFC 00/18] xfs: atomic file updates
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v3 3/5] fs: Enable to enforce noexec mounts or file exec through RESOLVE_MAYEXEC
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v2 1/4] capability: add ns_capable_cred()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 3/5] fs: Enable to enforce noexec mounts or file exec through RESOLVE_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v3 2/5] fs: Add a MAY_EXECMOUNT flag to infer the noexec mount property
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v3 1/5] fs: Add support for a RESOLVE_MAYEXEC flag on openat2(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v3 0/5] Add support for RESOLVE_MAYEXEC
- From: Christian Heimes <christian@xxxxxxxxxx>
- Re: [PATCH v3 3/5] fs: Enable to enforce noexec mounts or file exec through RESOLVE_MAYEXEC
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v3 1/5] fs: Add support for a RESOLVE_MAYEXEC flag on openat2(2)
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v3 2/5] fs: Add a MAY_EXECMOUNT flag to infer the noexec mount property
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v3 0/5] Add support for RESOLVE_MAYEXEC
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH glibc 1/3] glibc: Perform rseq registration at C startup and thread creation (v19)
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [PATCH glibc 2/3] glibc: sched_getcpu(): use rseq cpu_id TLS on Linux (v7)
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH v2 1/4] capability: add ns_capable_cred()
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC PATCH glibc 1/3] glibc: Perform rseq(2) registration at C startup and thread creation (v18)
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [RFC PATCH glibc 1/3] glibc: Perform rseq(2) registration at C startup and thread creation (v18)
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- [PATCH v2 4/4] selftests/pidfd: add pidfd setns tests
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 3/4] nsproxy: attach to namespaces via pidfds
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 2/4] nsproxy: add struct nsset
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 1/4] capability: add ns_capable_cred()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RFC PATCH glibc 1/3] glibc: Perform rseq(2) registration at C startup and thread creation (v18)
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [RFC PATCH glibc 1/3] glibc: Perform rseq(2) registration at C startup and thread creation (v18)
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [RFC PATCH glibc 1/3] glibc: Perform rseq(2) registration at C startup and thread creation (v18)
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [PATCH AUTOSEL 5.6 15/79] selftests: vm: Do not override definition of ARCH
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.6 19/79] selftests/ipc: Fix test failure seen after initial test run
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.6 18/79] Revert "Kernel selftests: tpm2: check for tpm support"
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.6 16/79] selftests: vm: Fix 64-bit test builds for powerpc64le
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.6 52/79] bpf: Forbid XADD on spilled pointers for unprivileged users
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 04/30] selftests/ipc: Fix test failure seen after initial test run
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.4 38/57] bpf: Forbid XADD on spilled pointers for unprivileged users
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.4 02/11] selftests/ipc: Fix test failure seen after initial test run
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.9 03/17] selftests/ipc: Fix test failure seen after initial test run
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 05/27] selftests/ipc: Fix test failure seen after initial test run
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.4 09/57] selftests/ipc: Fix test failure seen after initial test run
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.6 79/79] selftests/bpf: Fix a couple of broken test_btf cases
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH v4 5/5] doc: Add documentation for the fs.open_mayexec_enforce sysctl
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 4/5] selftest/openat2: Add tests for O_MAYEXEC enforcing
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 3/5] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 1/5] fs: Add support for an O_MAYEXEC flag on openat2(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 2/5] fs: Add a MAY_EXECMOUNT flag to infer the noexec mount property
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 0/5] Add support for O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RFC PATCH glibc 1/3] glibc: Perform rseq(2) registration at C startup and thread creation (v18)
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH v3 0/5] Add support for RESOLVE_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v3 7/7] n_tty: Provide an informational line on VSTATUS receipt
- From: Arseny Maslennikov <ar@xxxxxxxxx>
- Re: [PATCH v3 0/5] Add support for RESOLVE_MAYEXEC
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 4/7] linux/signal.h: Ignore SIGINFO by default in new tasks
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 4/7] linux/signal.h: Ignore SIGINFO by default in new tasks
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- Re: [PATCH v3 7/7] n_tty: Provide an informational line on VSTATUS receipt
- From: Jiri Slaby <jslaby@xxxxxxx>
- Re: [PATCH v3 5/7] tty: Add NOKERNINFO lflag to termios
- From: Arseny Maslennikov <ar@xxxxxxxxx>
- Re: [PATCH v3 4/7] linux/signal.h: Ignore SIGINFO by default in new tasks
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 5/7] tty: Add NOKERNINFO lflag to termios
- From: Arseny Maslennikov <ar@xxxxxxxxx>
- [PATCH v3 4/7] linux/signal.h: Ignore SIGINFO by default in new tasks
- From: Arseny Maslennikov <ar@xxxxxxxxx>
- [PATCH v3 6/7] n_tty: ->ops->write: Cut core logic out to a separate function
- From: Arseny Maslennikov <ar@xxxxxxxxx>
- [PATCH v3 0/7] TTY Keyboard Status Request
- From: Arseny Maslennikov <ar@xxxxxxxxx>
- [PATCH v3 2/7] tty: termios: Reserve space for VSTATUS in .c_cc
- From: Arseny Maslennikov <ar@xxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Linux SCSI]
[Samba]
[Yosemite News]