Linux API
[Prev Page][Next Page]
- [RFC 4/4] selftests: futex: Add futex2 wouldblock test
- From: André Almeida <andrealmeid@xxxxxxxxxxxxx>
- [RFC 3/4] selftests: futex: Add futex2 timeout test
- From: André Almeida <andrealmeid@xxxxxxxxxxxxx>
- [RFC 2/4] selftests: futex: Add futex2 wake/wait test
- From: André Almeida <andrealmeid@xxxxxxxxxxxxx>
- [RFC 1/4] futex2: Add new futex interface
- From: André Almeida <andrealmeid@xxxxxxxxxxxxx>
- [RFC 0/4] futex2: Add new futex interface
- From: André Almeida <andrealmeid@xxxxxxxxxxxxx>
- Re: [RFC] unexport linux/elfcore.h
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: Linux powerpc new system call instruction and ABI
- From: Segher Boessenkool <segher@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH glibc 1/3] glibc: Perform rseq registration at C startup and thread creation (v20)
- From: Joseph Myers <joseph@xxxxxxxxxxxxxxxx>
- Re: [PATCH v6] mm: Proactive compaction
- From: Nitin Gupta <ngupta@xxxxxxxxxxxxxx>
- Re: [RFC] unexport linux/elfcore.h
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH glibc 1/3] glibc: Perform rseq registration at C startup and thread creation (v20)
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [RFC] unexport linux/elfcore.h
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] powerpc/64s: system call support for scv/rfscv instructions
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [PATCH 1/2] powerpc/64s/exception: treat NIA below __end_interrupts as soft-masked
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- Linux powerpc new system call instruction and ABI
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- Re: [PATCH v7 7/7] mm/madvise: allow KSM hints for remote API
- From: Jann Horn <jannh@xxxxxxxxxx>
- [RFC] unexport linux/elfcore.h
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- [Patch v1 2/3] PCI: prevent work_on_cpu's probe to execute on isolated CPUs
- From: Nitesh Narayan Lal <nitesh@xxxxxxxxxx>
- [PATCH v1 0/3] Preventing job distribution to isolated CPUs
- From: Nitesh Narayan Lal <nitesh@xxxxxxxxxx>
- [Patch v1 1/3] lib: restricting cpumask_local_spread to only houskeeping CPUs
- From: Nitesh Narayan Lal <nitesh@xxxxxxxxxx>
- [Patch v1 3/3] net: restrict queuing of receive packets to housekeeping CPUs
- From: Nitesh Narayan Lal <nitesh@xxxxxxxxxx>
- [PATCH] symlink.7: document magic-links more completely
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- Re: [PATCH v6] mm: Proactive compaction
- From: Khalid Aziz <khalid.aziz@xxxxxxxxxx>
- Re: [PATCH v6] mm: Proactive compaction
- From: Nitin Gupta <ngupta@xxxxxxxxxxxxxx>
- Re: Add a new fchmodat4() syscall, v2
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH ghak90 V8 07/16] audit: add contid support for signalling the audit daemon
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- RE: [PATCH v5 1/3] open: add close_range()
- From: David Laight <David.Laight@xxxxxxxxxx>
- RE: [PATCH v5 0/3] close_range()
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH v5 1/3] open: add close_range()
- From: Kyle Evans <kevans@xxxxxxxxxxx>
- Re: [PATCH v5 1/3] open: add close_range()
- From: Szabolcs Nagy <nsz@xxxxxxxxxx>
- Re: [PATCH v5 1/3] open: add close_range()
- From: Kyle Evans <kevans@xxxxxxxxxxx>
- Re: [PATCH v5 1/3] open: add close_range()
- From: Kyle Evans <kevans@xxxxxxxxxxx>
- Re: [PATCH v5 1/3] open: add close_range()
- From: Szabolcs Nagy <nsz@xxxxxxxxxx>
- Re: [exec] 166d03c9ec: ltp.execveat02.fail
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [exec] 166d03c9ec: ltp.execveat02.fail
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH glibc 1/3] glibc: Perform rseq registration at C startup and thread creation (v20)
- From: Joseph Myers <joseph@xxxxxxxxxxxxxxxx>
- Re: [PATCH glibc 1/3] glibc: Perform rseq registration at C startup and thread creation (v20)
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH v5 0/3] close_range()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v5 0/3] close_range()
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 0/3] close_range()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: seccomp feature development
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH glibc 1/3] glibc: Perform rseq registration at C startup and thread creation (v20)
- From: Joseph Myers <joseph@xxxxxxxxxxxxxxxx>
- Re: [PATCH V11 11/11] fs/xfs: Update xfs_ioctl_setattr_dax_invalidate()
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- Re: [PATCH glibc 1/3] glibc: Perform rseq registration at C startup and thread creation (v20)
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH glibc 1/3] glibc: Perform rseq registration at C startup and thread creation (v20)
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH glibc 1/3] glibc: Perform rseq registration at C startup and thread creation (v20)
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH glibc 1/3] glibc: Perform rseq registration at C startup and thread creation (v20)
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: sys/sysinfo.h clash with linux/kernel.h
- From: Szabolcs Nagy <nsz@xxxxxxxxxx>
- Re: [PATCH v5 1/3] open: add close_range()
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH V11 11/11] fs/xfs: Update xfs_ioctl_setattr_dax_invalidate()
- From: Jan Kara <jack@xxxxxxx>
- [PATCH v3 3/4] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [PATCH v5 0/3] close_range()
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/3] open: add close_range()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v5 0/3] close_range()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v5 1/3] open: add close_range()
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [PATCH V11 11/11] fs/xfs: Update xfs_ioctl_setattr_dax_invalidate()
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH v5 0/3] close_range()
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [PATCH v5 2/3] arch: wire-up close_range()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 3/3] tests: add close_range() tests
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 1/3] open: add close_range()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 0/3] close_range()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH V11 11/11] fs/xfs: Update xfs_ioctl_setattr_dax_invalidate()
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- Re: robinhood, fanotify name info events and lustre changelog
- From: "Quentin.BOUGET@xxxxxx" <Quentin.BOUGET@xxxxxx>
- Re: robinhood, fanotify name info events and lustre changelog
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: robinhood, fanotify name info events and lustre changelog
- From: "Quentin.BOUGET@xxxxxx" <Quentin.BOUGET@xxxxxx>
- Re: [PATCH v2 2/3] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v6] mm: Proactive compaction
- From: Nitin Gupta <nigupta@xxxxxxxxxx>
- Re: [PATCH v2 2/3] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [PATCH v3] seccomp: Add find_notification helper
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3] seccomp: Add find_notification helper
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: robinhood, fanotify name info events and lustre changelog
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v2 2/3] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2 2/3] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 2/3] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 2/3] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 2/3] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2 2/3] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/3] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: robinhood, fanotify name info events and lustre changelog
- From: Dominique Martinet <asmadeus@xxxxxxxxxxxxx>
- Re: robinhood, fanotify name info events and lustre changelog
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v2 2/3] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 2/3] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 2/3] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [PATCH v2 2/3] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v2 2/3] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 2/3] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [PATCH v2 2/3] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [PATCH v2 1/3] seccomp: Add find_notification helper
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 3/3] selftests/seccomp: Test SECCOMP_IOCTL_NOTIF_ADDFD
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: robinhood, fanotify name info events and lustre changelog
- From: "Quentin.BOUGET@xxxxxx" <Quentin.BOUGET@xxxxxx>
- Re: [PATCH v2 3/3] selftests/seccomp: Test SECCOMP_IOCTL_NOTIF_ADDFD
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH v2 3/3] selftests/seccomp: Test SECCOMP_IOCTL_NOTIF_ADDFD
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [PATCH v2 1/3] seccomp: Add find_notification helper
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [PATCH v2 2/3] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2 0/3] Add seccomp notifier ioctl that enables adding fds
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH v2 3/3] selftests/seccomp: Test SECCOMP_IOCTL_NOTIF_ADDFD
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH v18 07/12] landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v2 2/3] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2 1/3] seccomp: Add find_notification helper
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2 2/3] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Giuseppe Scrivano <gscrivan@xxxxxxxxxx>
- Re: [PATCH v2 2/3] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 3/3] selftests/seccomp: Test SECCOMP_IOCTL_NOTIF_ADDFD
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 2/3] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2 2/3] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2] fcntl: Add 32bit filesystem mode
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- Re: [PATCH v2 1/3] seccomp: Add find_notification helper
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v10 01/26] Documentation/x86: Add CET description
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v5] mm: Proactive compaction
- From: Nitin Gupta <ngupta@xxxxxxxxxxxxxx>
- Re: [PATCH v5] mm: Proactive compaction
- From: Khalid Aziz <khalid.aziz@xxxxxxxxxx>
- Re: [PATCH v5] mm: Proactive compaction
- From: Nitin Gupta <ngupta@xxxxxxxxxxxxxx>
- Re: [PATCH v5] mm: Proactive compaction
- From: Nitin Gupta <ngupta@xxxxxxxxxxxxxx>
- Re: robinhood, fanotify name info events and lustre changelog
- From: Dominique Martinet <asmadeus@xxxxxxxxxxxxx>
- [PATCH AUTOSEL 5.6 33/47] selftests: mlxsw: qos_mc_aware: Specify arping timeout as an integer
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.4 17/26] selftests: mlxsw: qos_mc_aware: Specify arping timeout as an integer
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.6 23/47] wireguard: selftests: use newer iproute2 for gcc-10
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH v2 3/3] selftests/seccomp: Test SECCOMP_IOCTL_NOTIF_ADDFD
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- [PATCH v2 2/3] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- [PATCH v2 1/3] seccomp: Add find_notification helper
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- [PATCH v2 0/3] Add seccomp notifier ioctl that enables adding fds
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [PATCH v5] mm: Proactive compaction
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH v5] mm: Proactive compaction
- From: Holger Hoffstätte <holger@xxxxxxxxxxxxxxxxxxxxxx>
- [PATCH glibc 1/3] glibc: Perform rseq registration at C startup and thread creation (v20)
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [PATCH glibc 2/3] Linux: Use rseq in sched_getcpu if available (v9)
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH v5] mm: Proactive compaction
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH v18 07/12] landlock: Support filesystem access-control
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [net-next RFC PATCH 00/13] net: hsr: Add PRP driver
- From: Murali Karicheri <m-karicheri2@xxxxxx>
- Re: [net-next RFC PATCH 00/13] net: hsr: Add PRP driver
- From: Murali Karicheri <m-karicheri2@xxxxxx>
- [PATCH v18 01/12] landlock: Add object management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v18 05/12] LSM: Infrastructure management of the superblock
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v18 06/12] fs,security: Add sb_delete hook
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v18 09/12] arch: Wire up landlock() syscall
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v18 12/12] landlock: Add user and kernel documentation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v18 07/12] landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v18 10/12] selftests/landlock: Add initial tests
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v18 03/12] landlock: Set up the security framework and manage credentials
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v18 08/12] landlock: Add syscall implementation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v18 11/12] samples/landlock: Add a sandbox manager example
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v18 04/12] landlock: Add ptrace restrictions
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v18 02/12] landlock: Add ruleset and domain management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v18 00/12] Landlock LSM
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [net-next RFC PATCH 00/13] net: hsr: Add PRP driver
- From: Vinicius Costa Gomes <vinicius.gomes@xxxxxxxxx>
- Re: [net-next RFC PATCH 00/13] net: hsr: Add PRP driver
- From: Vladimir Oltean <olteanv@xxxxxxxxx>
- Re: [net-next RFC PATCH 00/13] net: hsr: Add PRP driver
- From: Vinicius Costa Gomes <vinicius.gomes@xxxxxxxxx>
- Re: [PATCH glibc 1/3] glibc: Perform rseq registration at C startup and thread creation (v19)
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH glibc 1/3] glibc: Perform rseq registration at C startup and thread creation (v19)
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH glibc 1/3] glibc: Perform rseq registration at C startup and thread creation (v19)
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH glibc 1/3] glibc: Perform rseq registration at C startup and thread creation (v19)
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH glibc 1/3] glibc: Perform rseq registration at C startup and thread creation (v19)
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [net-next RFC PATCH 00/13] net: hsr: Add PRP driver
- From: Murali Karicheri <m-karicheri2@xxxxxx>
- Re: [PATCH glibc 1/3] glibc: Perform rseq registration at C startup and thread creation (v19)
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH 2/5] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH 2/5] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [PATCH 4/5] seccomp: Add SECCOMP_ADDFD_FLAG_MOVE flag to add fd ioctl
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [net-next RFC PATCH 00/13] net: hsr: Add PRP driver
- From: Vladimir Oltean <olteanv@xxxxxxxxx>
- Re: [PATCH] proc.5: add "wf" to VmFlags in /proc/[pid]/smaps
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH glibc 1/3] glibc: Perform rseq registration at C startup and thread creation (v19)
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [net-next RFC PATCH 00/13] net: hsr: Add PRP driver
- From: Murali Karicheri <m-karicheri2@xxxxxx>
- Re: [PATCH glibc 1/3] glibc: Perform rseq registration at C startup and thread creation (v19)
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH] proc.5: add "wf" to VmFlags in /proc/[pid]/smaps
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH glibc 1/3] glibc: Perform rseq registration at C startup and thread creation (v19)
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH 4/5] seccomp: Add SECCOMP_ADDFD_FLAG_MOVE flag to add fd ioctl
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH] proc.5: add "wf" to VmFlags in /proc/[pid]/smaps
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH 2/5] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH] proc.5: add "wf" to VmFlags in /proc/[pid]/smaps
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH 1/5] seccomp: Add find_notification helper
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH 2/5] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/5] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [PATCH 2/5] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/5] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH 2/5] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH 1/5] seccomp: Add find_notification helper
- From: Tycho Andersen <tycho@xxxxxxxx>
- [PATCH 4/5] seccomp: Add SECCOMP_ADDFD_FLAG_MOVE flag to add fd ioctl
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- [PATCH 5/5] selftests/seccomp: Add test for addfd move semantics
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- [PATCH 3/5] selftests/seccomp: Test SECCOMP_IOCTL_NOTIF_ADDFD
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- [PATCH 2/5] seccomp: Introduce addfd ioctl to seccomp user notifier
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- [PATCH 1/5] seccomp: Add find_notification helper
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- [PATCH 0/5] Add seccomp notifier ioctl that enables adding fds
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: seccomp feature development
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [PATCH v10 26/26] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v10 01/26] Documentation/x86: Add CET description
- From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
- Re: [RFC PATCH 5/5] selftest/x86: Add CET quick test
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH] seccomp: Add group_leader pid to seccomp_notif
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [RFC PATCH 5/5] selftest/x86: Add CET quick test
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v10 26/26] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Eugene Syromiatnikov <esyr@xxxxxxxxxx>
- Re: [RFC PATCH 5/5] selftest/x86: Add CET quick test
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [RFC PATCH 5/5] selftest/x86: Add CET quick test
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v10 26/26] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v10 01/26] Documentation/x86: Add CET description
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [RFC PATCH 5/5] selftest/x86: Add CET quick test
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH AUTOSEL 5.6 13/41] kselftests: dmabuf-heaps: Fix confused return value on expected error testing
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [RFC PATCH 5/5] selftest/x86: Add CET quick test
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [RFC PATCH 5/5] selftest/x86: Add CET quick test
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH] proc.5: add "wf" to VmFlags in /proc/[pid]/smaps
- From: Ian Rogers <irogers@xxxxxxxxxx>
- Re: [RFC PATCH 5/5] selftest/x86: Add CET quick test
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC PATCH 4/5] selftest/x86: Fix sysret_rip with ENDBR
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [RFC PATCH 2/5] selftest/x86: Enable CET for selftests/x86
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [RFC PATCH 3/5] selftest/x86: Fix sigreturn_64 test.
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC PATCH 3/5] selftest/x86: Fix sigreturn_64 test.
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC PATCH 2/5] selftest/x86: Enable CET for selftests/x86
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC PATCH 1/5] x86/cet/shstk: Modify ARCH_X86_CET_ALLOC_SHSTK for 32-bit address range
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v10 26/26] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH] proc.5: add "wf" to VmFlags in /proc/[pid]/smaps
- From: Ian Rogers <irogers@xxxxxxxxxx>
- Re: [RFC PATCH 4/5] selftest/x86: Fix sysret_rip with ENDBR
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- [RFC PATCH 2/5] selftest/x86: Enable CET for selftests/x86
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [RFC PATCH 5/5] selftest/x86: Add CET quick test
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [RFC PATCH 4/5] selftest/x86: Fix sysret_rip with ENDBR
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [RFC PATCH 3/5] selftest/x86: Fix sigreturn_64 test.
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [RFC PATCH 1/5] x86/cet/shstk: Modify ARCH_X86_CET_ALLOC_SHSTK for 32-bit address range
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [RFC PATCH 0/5] Update selftests/x86 for CET
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v10 00/26] Control-flow Enforcement: Shadow Stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v10 00/26] Control-flow Enforcement: Shadow Stack
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [net-next RFC PATCH 00/13] net: hsr: Add PRP driver
- From: Vinicius Costa Gomes <vinicius.gomes@xxxxxxxxx>
- Re: [PATCH v10 00/26] Control-flow Enforcement: Shadow Stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v10 00/26] Control-flow Enforcement: Shadow Stack
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [net-next RFC PATCH 00/13] net: hsr: Add PRP driver
- From: Murali Karicheri <m-karicheri2@xxxxxx>
- Re: [PATCH glibc 1/3] glibc: Perform rseq registration at C startup and thread creation (v19)
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH glibc 2/3] glibc: sched_getcpu(): use rseq cpu_id TLS on Linux (v7)
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: seccomp feature development
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: seccomp feature development
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [PATCH] futex: send SIGBUS if argument is not aligned on a four-byte boundary
- From: Konstantin Khlebnikov <khlebnikov@xxxxxxxxxxxxxx>
- Re: seccomp feature development
- From: Aleksa Sarai <asarai@xxxxxxx>
- Re: seccomp feature development
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: seccomp feature development
- From: Aleksa Sarai <asarai@xxxxxxx>
- Re: [PATCH v10 01/26] Documentation/x86: Add CET description
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH 0/4] Relocate execve() sanity checks
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH] futex: send SIGBUS if argument is not aligned on a four-byte boundary
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: seccomp feature development
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 0/4] Relocate execve() sanity checks
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2] clone.2: Document CLONE_INTO_CGROUP
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH 0/4] Relocate execve() sanity checks
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] mm: use only pidfd for process_madvise syscall
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [PATCH 0/4] Relocate execve() sanity checks
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 0/4] Relocate execve() sanity checks
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] futex: send SIGBUS if argument is not aligned on a four-byte boundary
- From: "Carlos O'Donell" <carlos@xxxxxxxxxx>
- Re: [PATCH 0/4] Relocate execve() sanity checks
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] mm: use only pidfd for process_madvise syscall
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: seccomp feature development
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH 0/4] Relocate execve() sanity checks
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 1/4] exec: Change uselib(2) IS_SREG() failure to EACCES
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 1/4] exec: Change uselib(2) IS_SREG() failure to EACCES
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH 1/4] exec: Change uselib(2) IS_SREG() failure to EACCES
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: seccomp feature development
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: seccomp feature development
- From: Aleksa Sarai <asarai@xxxxxxx>
- Re: [PATCH v2] clone.2: Document CLONE_INTO_CGROUP
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: seccomp feature development
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- Re: [PATCH v2] clone.2: Document CLONE_INTO_CGROUP
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH 1/4] exec: Change uselib(2) IS_SREG() failure to EACCES
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH 1/4] exec: Change uselib(2) IS_SREG() failure to EACCES
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH 1/4] exec: Change uselib(2) IS_SREG() failure to EACCES
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 1/4] exec: Change uselib(2) IS_SREG() failure to EACCES
- From: Andreas Schwab <schwab@xxxxxxxxxxxxxx>
- Re: [PATCH 1/4] exec: Change uselib(2) IS_SREG() failure to EACCES
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: seccomp feature development
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: seccomp feature development
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: seccomp feature development
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: How about just O_EXEC? (was Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH 1/4] exec: Change uselib(2) IS_SREG() failure to EACCES
- From: Andreas Schwab <schwab@xxxxxxxxxxxxxx>
- Re: seccomp feature development
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH 1/4] exec: Change uselib(2) IS_SREG() failure to EACCES
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH] mm: use only pidfd for process_madvise syscall
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: seccomp feature development
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: seccomp feature development
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- Re: [PATCH] mm: use only pidfd for process_madvise syscall
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: seccomp feature development
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- Re: How about just O_EXEC? (was Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC)
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- Re: [PATCH v10 01/26] Documentation/x86: Add CET description
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v10 01/26] Documentation/x86: Add CET description
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 1/4] exec: Change uselib(2) IS_SREG() failure to EACCES
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v10 01/26] Documentation/x86: Add CET description
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH] seccomp: Add group_leader pid to seccomp_notif
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] mm: use only pidfd for process_madvise syscall
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: seccomp feature development
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: seccomp feature development
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH] seccomp: Add group_leader pid to seccomp_notif
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [PATCH] mm: use only pidfd for process_madvise syscall
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [PATCH] seccomp: Add group_leader pid to seccomp_notif
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- seccomp feature development
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] mm: use only pidfd for process_madvise syscall
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- [PATCH v5] mm: Proactive compaction
- From: Nitin Gupta <nigupta@xxxxxxxxxx>
- [PATCH v2] clone.2: Document CLONE_INTO_CGROUP
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH 1/4] exec: Change uselib(2) IS_SREG() failure to EACCES
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH 1/4] exec: Change uselib(2) IS_SREG() failure to EACCES
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v10 01/26] Documentation/x86: Add CET description
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v10 01/26] Documentation/x86: Add CET description
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v10 01/26] Documentation/x86: Add CET description
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- Re: [PATCH] seccomp: Add group_leader pid to seccomp_notif
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v10 01/26] Documentation/x86: Add CET description
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH] seccomp: Add group_leader pid to seccomp_notif
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH] seccomp: Add group_leader pid to seccomp_notif
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH 1/4] exec: Change uselib(2) IS_SREG() failure to EACCES
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH] seccomp: Add group_leader pid to seccomp_notif
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH] seccomp: Add group_leader pid to seccomp_notif
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH] seccomp: Add group_leader pid to seccomp_notif
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 0/7] fanotify events on child with name info
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH] seccomp: Add group_leader pid to seccomp_notif
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: How about just O_EXEC? (was Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC)
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- [PATCH 0/4] Relocate execve() sanity checks
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 2/4] exec: Relocate S_ISREG() check
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 4/4] fs: Include FMODE_EXEC when converting flags to f_mode
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 1/4] exec: Change uselib(2) IS_SREG() failure to EACCES
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 3/4] exec: Relocate path_noexec() check
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v10 01/26] Documentation/x86: Add CET description
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH] seccomp: Add group_leader pid to seccomp_notif
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v5 2/6] fs: Add a MAY_EXECMOUNT flag to infer the noexec mount property
- From: "Lev R. Oshvang ." <levonshe@xxxxxxxxx>
- Re: [PATCH] seccomp: Add group_leader pid to seccomp_notif
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH] seccomp: Add group_leader pid to seccomp_notif
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH] seccomp: Add group_leader pid to seccomp_notif
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH] seccomp: Add group_leader pid to seccomp_notif
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH] seccomp: Add group_leader pid to seccomp_notif
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH] seccomp: Add group_leader pid to seccomp_notif
- From: Aleksa Sarai <asarai@xxxxxxx>
- Re: [PATCH] seccomp: Add group_leader pid to seccomp_notif
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [PATCH] seccomp: Add group_leader pid to seccomp_notif
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH] seccomp: Add group_leader pid to seccomp_notif
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v10 01/26] Documentation/x86: Add CET description
- From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
- Re: [PATCH v10 01/26] Documentation/x86: Add CET description
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v10 01/26] Documentation/x86: Add CET description
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- Re: [PATCH v10 01/26] Documentation/x86: Add CET description
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- [PATCH] mm: use only pidfd for process_madvise syscall
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [PATCH v10 01/26] Documentation/x86: Add CET description
- From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
- Re: [PATCH v10 01/26] Documentation/x86: Add CET description
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH] seccomp: Add group_leader pid to seccomp_notif
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [PATCH v10 01/26] Documentation/x86: Add CET description
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v10 01/26] Documentation/x86: Add CET description
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v10 01/26] Documentation/x86: Add CET description
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v10 01/26] Documentation/x86: Add CET description
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: How about just O_EXEC? (was Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v4] mm: Proactive compaction
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH] futex: send SIGBUS if argument is not aligned on a four-byte boundary
- From: "Carlos O'Donell" <carlos@xxxxxxxxxx>
- Re: [PATCH] futex: send SIGBUS if argument is not aligned on a four-byte boundary
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3 5/5] lib/test_sysctl: support testing of sysctl. boot parameter
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: How about just O_EXEC? (was Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC)
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: How about just O_EXEC? (was Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC)
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH] futex: send SIGBUS if argument is not aligned on a four-byte boundary
- From: Konstantin Khlebnikov <khlebnikov@xxxxxxxxxxxxxx>
- Re: How about just O_EXEC? (was Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC)
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: How about just O_EXEC? (was Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC)
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] sched_getattr.2: update to include changed size semantics
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH] clone.2: Document CLONE_INTO_CGROUP
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH 3/4] seccomp: Add SECCOMP_USER_NOTIF_FLAG_PIDFD to get pidfd on listener trap
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH RFC 1/3] symlink.7: document magic-links more completely
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH] clone.2: Document CLONE_INTO_CGROUP
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: How about just O_EXEC? (was Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: How about just O_EXEC? (was Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC)
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- How about just O_EXEC? (was Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC)
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- [PATCH v17 22/23] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v17 05/10] fs,landlock: Support filesystem access-control
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v17 05/10] fs,landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v17 05/10] fs,landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v17 05/10] fs,landlock: Support filesystem access-control
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v17 05/10] fs,landlock: Support filesystem access-control
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v5 2/6] fs: Add a MAY_EXECMOUNT flag to infer the noexec mount property
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v17 05/10] fs,landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v17 02/10] landlock: Add ruleset and domain management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- RE: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH v5 2/6] fs: Add a MAY_EXECMOUNT flag to infer the noexec mount property
- From: "Lev R. Oshvang ." <levonshe@xxxxxxxxx>
- Re: [PATCH v17 05/10] fs,landlock: Support filesystem access-control
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v17 02/10] landlock: Add ruleset and domain management
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [ANNOUNCE] xfs-linux: vfs-for-next updated to 2c567af418e3
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v4 10/10] loop: Add LOOP_CONFIGURE ioctl
- From: Martijn Coenen <maco@xxxxxxxxxxx>
- [PATCH v5 11/11] loop: Add LOOP_CONFIGURE ioctl
- From: Martijn Coenen <maco@xxxxxxxxxxx>
- Re: [PATCH v3 5/5] lib/test_sysctl: support testing of sysctl. boot parameter
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH v3 5/5] lib/test_sysctl: support testing of sysctl. boot parameter
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [net-next RFC PATCH 00/13] net: hsr: Add PRP driver
- From: Murali Karicheri <m-karicheri2@xxxxxx>
- Re: [PATCH v5 5/6] doc: Add documentation for the fs.open_mayexec_enforce sysctl
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v5 4/6] selftest/openat2: Add tests for O_MAYEXEC enforcing
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v4 10/10] loop: Add LOOP_CONFIGURE ioctl
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v5 1/6] fs: Add support for an O_MAYEXEC flag on openat2(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v3 5/5] lib/test_sysctl: support testing of sysctl. boot parameter
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH v4 10/10] loop: Add LOOP_CONFIGURE ioctl
- From: Martijn Coenen <maco@xxxxxxxxxxx>
- Re: [PATCH v4 10/10] loop: Add LOOP_CONFIGURE ioctl
- From: Jens Axboe <axboe@xxxxxxxxx>
- Re: [PATCH v4 10/10] loop: Add LOOP_CONFIGURE ioctl
- From: Jens Axboe <axboe@xxxxxxxxx>
- Re: [PATCH v10 01/26] Documentation/x86: Add CET description
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v5 1/6] fs: Add support for an O_MAYEXEC flag on openat2(2)
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v5 5/6] doc: Add documentation for the fs.open_mayexec_enforce sysctl
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v5 4/6] selftest/openat2: Add tests for O_MAYEXEC enforcing
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v5 1/6] fs: Add support for an O_MAYEXEC flag on openat2(2)
- From: Christian Heimes <christian@xxxxxxxxxx>
- Re: [PATCH v5 2/6] fs: Add a MAY_EXECMOUNT flag to infer the noexec mount property
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v5 1/6] fs: Add support for an O_MAYEXEC flag on openat2(2)
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v7 5/7] mm: support both pid and pidfd for process_madvise
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v4 10/10] loop: Add LOOP_CONFIGURE ioctl
- From: Martijn Coenen <maco@xxxxxxxxxxx>
- Re: [PATCH v17 00/10] Landlock LSM
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v17 05/10] fs,landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v17 09/10] samples/landlock: Add a sandbox manager example
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v17 00/10] Landlock LSM
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v17 02/10] landlock: Add ruleset and domain management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v17 08/10] selftests/landlock: Add initial tests
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v17 06/10] landlock: Add syscall implementation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v17 10/10] landlock: Add user and kernel documentation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v17 07/10] arch: Wire up landlock() syscall
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v17 04/10] landlock: Add ptrace restrictions
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v17 03/10] landlock: Set up the security framework and manage credentials
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v17 01/10] landlock: Add object management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v3 5/5] lib/test_sysctl: support testing of sysctl. boot parameter
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH v3 5/5] lib/test_sysctl: support testing of sysctl. boot parameter
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH v7 5/7] mm: support both pid and pidfd for process_madvise
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [PATCH v7 5/7] mm: support both pid and pidfd for process_madvise
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v7 5/7] mm: support both pid and pidfd for process_madvise
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 5/7] mm: support both pid and pidfd for process_madvise
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [PATCH v7 2/7] mm: introduce external memory hinting API
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [PATCH v7 1/7] mm: pass task and mm to do_madvise
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [PATCH v5 0/6] Add support for O_MAYEXEC
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 0/6] Add support for O_MAYEXEC
- From: "Lev R. Oshvang ." <levonshe@xxxxxxxxx>
- Re: [PATCH v4 2/3] nsproxy: attach to namespaces via pidfds
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v4 1/3] nsproxy: add struct nsset
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v10 05/26] x86/cet/shstk: Add Kconfig option for user-mode Shadow Stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v10 05/26] x86/cet/shstk: Add Kconfig option for user-mode Shadow Stack
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v5 0/6] Add support for O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- RE: [PATCH v5 0/6] Add support for O_MAYEXEC
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH v5 0/6] Add support for O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- RE: [PATCH v5 0/6] Add support for O_MAYEXEC
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH v5 0/6] Add support for O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v5 0/6] Add support for O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- RE: [PATCH v5 0/6] Add support for O_MAYEXEC
- From: David Laight <David.Laight@xxxxxxxxxx>
- [net-next RFC PATCH 02/13] net: hsr: rename hsr directory to hsr-prp to introduce PRP
- From: Murali Karicheri <m-karicheri2@xxxxxx>
- [net-next RFC PATCH 01/13] net: hsr: Re-use Kconfig option to support PRP
- From: Murali Karicheri <m-karicheri2@xxxxxx>
- [net-next RFC PATCH 05/13] net: hsr: rename hsr_port_get_hsr() to hsr_prp_get_port()
- From: Murali Karicheri <m-karicheri2@xxxxxx>
- [net-next RFC PATCH 03/13] net: hsr: rename files to introduce PRP support
- From: Murali Karicheri <m-karicheri2@xxxxxx>
- [net-next RFC PATCH 07/13] net: hsr: introduce common uapi include/definitions for HSR and PRP
- From: Murali Karicheri <m-karicheri2@xxxxxx>
- [net-next RFC PATCH 10/13] net: hsr: add netlink socket interface for PRP
- From: Murali Karicheri <m-karicheri2@xxxxxx>
- [net-next RFC PATCH 08/13] net: hsr: migrate HSR netlink socket code to use new common API
- From: Murali Karicheri <m-karicheri2@xxxxxx>
- [net-next RFC PATCH 04/13] net: hsr: rename hsr variable inside struct hsr_port to priv
- From: Murali Karicheri <m-karicheri2@xxxxxx>
- [net-next RFC PATCH 13/13] net: prp: enhance debugfs to display PRP specific info in node table
- From: Murali Karicheri <m-karicheri2@xxxxxx>
- [net-next RFC PATCH 12/13] net: prp: add packet handling support
- From: Murali Karicheri <m-karicheri2@xxxxxx>
- [net-next RFC PATCH 11/13] net: prp: add supervision frame generation and handling support
- From: Murali Karicheri <m-karicheri2@xxxxxx>
- [net-next RFC PATCH 06/13] net: hsr: some renaming to introduce PRP driver support
- From: Murali Karicheri <m-karicheri2@xxxxxx>
- [net-next RFC PATCH 09/13] net: hsr: move re-usable code for PRP to hsr_prp_netlink.c
- From: Murali Karicheri <m-karicheri2@xxxxxx>
- [net-next RFC PATCH 00/13] net: hsr: Add PRP driver
- From: Murali Karicheri <m-karicheri2@xxxxxx>
- Re: [PATCH v5 0/6] Add support for O_MAYEXEC
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- Re: [PATCH v5 0/6] Add support for O_MAYEXEC
- From: "Lev R. Oshvang ." <levonshe@xxxxxxxxx>
- Re: [PATCH v4 10/10] loop: Add LOOP_CONFIGURE ioctl
- From: Martijn Coenen <maco@xxxxxxxxxxx>
- Re: [PATCH v4 10/10] loop: Add LOOP_CONFIGURE ioctl
- From: Martijn Coenen <maco@xxxxxxxxxxx>
- Re: [PATCH v4 10/10] loop: Add LOOP_CONFIGURE ioctl
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v4 10/10] loop: Add LOOP_CONFIGURE ioctl
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v3 7/7] fanotify: report events "on child" with name info to sb/mount marks
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [PATCH v3 5/7] fanotify: report parent fid + name for events on children
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [PATCH v3 0/7] fanotify events on child with name info
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v5 0/6] Add support for O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v5 5/6] doc: Add documentation for the fs.open_mayexec_enforce sysctl
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v5 6/6] ima: add policy support for the new file open MAY_OPENEXEC flag
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v5 0/6] Add support for O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v5 4/6] selftest/openat2: Add tests for O_MAYEXEC enforcing
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v5 1/6] fs: Add support for an O_MAYEXEC flag on openat2(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v5 2/6] fs: Add a MAY_EXECMOUNT flag to infer the noexec mount property
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v3 0/5] Add support for RESOLVE_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 3/3] selftests/pidfd: add pidfd setns tests
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 0/3] nsproxy: attach to multiple namespaces
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 2/3] nsproxy: attach to namespaces via pidfds
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 1/3] nsproxy: add struct nsset
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RFC] get_mempolicy(2) behaviour
- From: Andi Kleen <ak@xxxxxxxxxxxxxxx>
- [PATCH] man/statx: Add STATX_ATTR_DAX
- From: ira.weiny@xxxxxxxxx
- Re: [PATCH v3 2/3] nsproxy: attach to namespaces via pidfds
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 2/3] nsproxy: attach to namespaces via pidfds
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v3 2/3] nsproxy: attach to namespaces via pidfds
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 2/3] nsproxy: attach to namespaces via pidfds
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v3 1/3] nsproxy: add struct nsset
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 1/3] nsproxy: add struct nsset
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [ANNOUNCE] xfs-linux: vfs-for-next updated to 83d9088659e8
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH v3 2/3] nsproxy: attach to namespaces via pidfds
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 3/3] selftests/pidfd: add pidfd setns tests
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 1/3] nsproxy: add struct nsset
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 0/3] nsproxy: attach to multiple namespaces
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH man-pages v2 2/2] openat2.2: document new openat2(2) syscall
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- [RFC] get_mempolicy(2) behaviour
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] capability: add ns_capable_cred()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2 1/4] capability: add ns_capable_cred()
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2 1/4] capability: add ns_capable_cred()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2 1/4] capability: add ns_capable_cred()
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 02/18] xfs: fix xfs_reflink_remap_prep calling conventions
- From: Allison Collins <allison.henderson@xxxxxxxxxx>
- Re: [PATCH v4 1/5] fs: Add support for an O_MAYEXEC flag on openat2(2)
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC 00/18] xfs: atomic file updates
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- Re: [PATCH RFC 00/18] xfs: atomic file updates
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v3 3/5] fs: Enable to enforce noexec mounts or file exec through RESOLVE_MAYEXEC
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v2 1/4] capability: add ns_capable_cred()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 3/5] fs: Enable to enforce noexec mounts or file exec through RESOLVE_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v3 2/5] fs: Add a MAY_EXECMOUNT flag to infer the noexec mount property
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v3 1/5] fs: Add support for a RESOLVE_MAYEXEC flag on openat2(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v3 0/5] Add support for RESOLVE_MAYEXEC
- From: Christian Heimes <christian@xxxxxxxxxx>
- Re: [PATCH v3 3/5] fs: Enable to enforce noexec mounts or file exec through RESOLVE_MAYEXEC
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v3 1/5] fs: Add support for a RESOLVE_MAYEXEC flag on openat2(2)
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v3 2/5] fs: Add a MAY_EXECMOUNT flag to infer the noexec mount property
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v3 0/5] Add support for RESOLVE_MAYEXEC
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH glibc 1/3] glibc: Perform rseq registration at C startup and thread creation (v19)
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [PATCH glibc 2/3] glibc: sched_getcpu(): use rseq cpu_id TLS on Linux (v7)
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH v2 1/4] capability: add ns_capable_cred()
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC PATCH glibc 1/3] glibc: Perform rseq(2) registration at C startup and thread creation (v18)
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [RFC PATCH glibc 1/3] glibc: Perform rseq(2) registration at C startup and thread creation (v18)
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- [PATCH v2 4/4] selftests/pidfd: add pidfd setns tests
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 3/4] nsproxy: attach to namespaces via pidfds
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 2/4] nsproxy: add struct nsset
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 1/4] capability: add ns_capable_cred()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RFC PATCH glibc 1/3] glibc: Perform rseq(2) registration at C startup and thread creation (v18)
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [RFC PATCH glibc 1/3] glibc: Perform rseq(2) registration at C startup and thread creation (v18)
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [RFC PATCH glibc 1/3] glibc: Perform rseq(2) registration at C startup and thread creation (v18)
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [PATCH AUTOSEL 5.6 15/79] selftests: vm: Do not override definition of ARCH
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.6 19/79] selftests/ipc: Fix test failure seen after initial test run
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.6 18/79] Revert "Kernel selftests: tpm2: check for tpm support"
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.6 16/79] selftests: vm: Fix 64-bit test builds for powerpc64le
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.6 52/79] bpf: Forbid XADD on spilled pointers for unprivileged users
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 04/30] selftests/ipc: Fix test failure seen after initial test run
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.4 38/57] bpf: Forbid XADD on spilled pointers for unprivileged users
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.4 02/11] selftests/ipc: Fix test failure seen after initial test run
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.9 03/17] selftests/ipc: Fix test failure seen after initial test run
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 05/27] selftests/ipc: Fix test failure seen after initial test run
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.4 09/57] selftests/ipc: Fix test failure seen after initial test run
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.6 79/79] selftests/bpf: Fix a couple of broken test_btf cases
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH v4 5/5] doc: Add documentation for the fs.open_mayexec_enforce sysctl
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 4/5] selftest/openat2: Add tests for O_MAYEXEC enforcing
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 3/5] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 1/5] fs: Add support for an O_MAYEXEC flag on openat2(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 2/5] fs: Add a MAY_EXECMOUNT flag to infer the noexec mount property
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 0/5] Add support for O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RFC PATCH glibc 1/3] glibc: Perform rseq(2) registration at C startup and thread creation (v18)
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH v3 0/5] Add support for RESOLVE_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v3 7/7] n_tty: Provide an informational line on VSTATUS receipt
- From: Arseny Maslennikov <ar@xxxxxxxxx>
- Re: [PATCH v3 0/5] Add support for RESOLVE_MAYEXEC
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 4/7] linux/signal.h: Ignore SIGINFO by default in new tasks
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 4/7] linux/signal.h: Ignore SIGINFO by default in new tasks
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- Re: [PATCH v3 7/7] n_tty: Provide an informational line on VSTATUS receipt
- From: Jiri Slaby <jslaby@xxxxxxx>
- Re: [PATCH v3 5/7] tty: Add NOKERNINFO lflag to termios
- From: Arseny Maslennikov <ar@xxxxxxxxx>
- Re: [PATCH v3 4/7] linux/signal.h: Ignore SIGINFO by default in new tasks
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 5/7] tty: Add NOKERNINFO lflag to termios
- From: Arseny Maslennikov <ar@xxxxxxxxx>
- [PATCH v3 4/7] linux/signal.h: Ignore SIGINFO by default in new tasks
- From: Arseny Maslennikov <ar@xxxxxxxxx>
- [PATCH v3 6/7] n_tty: ->ops->write: Cut core logic out to a separate function
- From: Arseny Maslennikov <ar@xxxxxxxxx>
- [PATCH v3 0/7] TTY Keyboard Status Request
- From: Arseny Maslennikov <ar@xxxxxxxxx>
- [PATCH v3 2/7] tty: termios: Reserve space for VSTATUS in .c_cc
- From: Arseny Maslennikov <ar@xxxxxxxxx>
- [PATCH v3 1/7] signal.h: Define SIGINFO on all architectures
- From: Arseny Maslennikov <ar@xxxxxxxxx>
- [PATCH v3 7/7] n_tty: Provide an informational line on VSTATUS receipt
- From: Arseny Maslennikov <ar@xxxxxxxxx>
- [PATCH v3 3/7] n_tty: Send SIGINFO to fg pgrp on status request character
- From: Arseny Maslennikov <ar@xxxxxxxxx>
- Re: [PATCH v3 4/7] linux/signal.h: Ignore SIGINFO by default in new tasks
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 5/7] tty: Add NOKERNINFO lflag to termios
- From: Jiri Slaby <jslaby@xxxxxxx>
- Re: [PATCH v3 4/7] linux/signal.h: Ignore SIGINFO by default in new tasks
- From: Jiri Slaby <jslaby@xxxxxxx>
- Re: [PATCH v3 0/5] Add support for RESOLVE_MAYEXEC
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- Re: [PATCH v10 01/26] Documentation/x86: Add CET description
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v10 01/26] Documentation/x86: Add CET description
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH v10 04/26] x86/cet: Add control-protection fault handler
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v10 05/26] x86/cet/shstk: Add Kconfig option for user-mode Shadow Stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v10 07/26] x86/mm: Remove _PAGE_DIRTY_HW from kernel RO pages
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v10 09/26] drm/i915/gvt: Change _PAGE_DIRTY to _PAGE_DIRTY_BITS
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v10 08/26] x86/mm: Introduce _PAGE_COW
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v10 10/26] x86/mm: Update pte_modify for _PAGE_COW
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v10 15/26] mm: Fixup places that call pte_mkwrite() directly
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v10 16/26] mm: Add guard pages around a shadow stack.
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v10 17/26] mm/mmap: Add shadow stack pages to memory accounting
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v10 18/26] mm: Update can_follow_write_pte() for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v10 21/26] ELF: UAPI and Kconfig additions for ELF program properties
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v10 22/26] ELF: Add ELF program property parsing support
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v10 19/26] x86/cet/shstk: User-mode shadow stack support
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v10 20/26] x86/cet/shstk: Handle signals for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v10 26/26] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v10 23/26] ELF: Introduce arch_setup_elf_property()
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v10 25/26] x86/cet/shstk: Handle thread shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v10 24/26] x86/cet/shstk: ELF header parsing for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v10 11/26] x86/mm: Update ptep_set_wrprotect() and pmdp_set_wrprotect() for transition from _PAGE_DIRTY_HW to _PAGE_COW
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v10 13/26] x86/mm: Shadow Stack page fault error checking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v10 14/26] x86/mm: Update maybe_mkwrite() for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v10 12/26] mm: Introduce VM_SHSTK for shadow stack memory
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v10 06/26] x86/mm: Change _PAGE_DIRTY to _PAGE_DIRTY_HW
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v10 03/26] x86/fpu/xstate: Introduce CET MSR XSAVES supervisor states
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v10 01/26] Documentation/x86: Add CET description
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v10 02/26] x86/cpufeatures: Add CET CPU feature flags for Control-flow Enforcement Technology (CET)
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v10 00/26] Control-flow Enforcement: Shadow Stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH] [v2] ARM: oabi-compat: fix epoll_ctl build failure
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: Build 0.6 version fail on musl libc
- From: Jens Axboe <axboe@xxxxxxxxx>
- Re: Build 0.6 version fail on musl libc
- From: Jann Horn <jannh@xxxxxxxxxx>
- [PATCH v4 10/10] loop: Add LOOP_CONFIGURE ioctl
- From: Martijn Coenen <maco@xxxxxxxxxxx>
- Re: [PATCH] [v2] ARM: oabi-compat: fix epoll_ctl build failure
- From: Russell King - ARM Linux admin <linux@xxxxxxxxxxxxxxx>
- [PATCH] [v2] ARM: oabi-compat: fix epoll_ctl build failure
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v6 RESEND 0/2] vfs: have syncfs() return error when there are writeback errors
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [PATCH glibc 5/9] glibc: Perform rseq(2) registration at C startup and thread creation (v17)
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [PATCH glibc 5/9] glibc: Perform rseq(2) registration at C startup and thread creation (v17)
- From: Szabolcs Nagy <szabolcs.nagy@xxxxxxx>
- Re: [PATCH v3 0/5] Add support for RESOLVE_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH glibc 5/9] glibc: Perform rseq(2) registration at C startup and thread creation (v17)
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [PATCH glibc 5/9] glibc: Perform rseq(2) registration at C startup and thread creation (v17)
- From: Szabolcs Nagy <szabolcs.nagy@xxxxxxx>
- Re: [PATCH V11.2] Documentation/dax: Update Usage section
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH V11.2] Documentation/dax: Update Usage section
- From: ira.weiny@xxxxxxxxx
- Re: [PATCH V11.1] Documentation/dax: Update Usage section
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- [PATCH 09/18] xfs: create deferred log items for extent swapping
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH 06/18] xfs: create a log incompat flag for atomic extent swapping
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH 05/18] xfs: xfs_bmap_finish_one should map unwritten extents properly
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH 02/18] xfs: fix xfs_reflink_remap_prep calling conventions
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH RFC 00/18] xfs: atomic file updates
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH 18/18] xfs: fix quota accounting in the old fork swap code
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH 17/18] xfs: remove old swap extents implementation
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH 16/18] xfs: refactor reflink flag handling in xfs_swap_extent_forks
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH 15/18] xfs: consolidate all of the xfs_swap_extent_forks code
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH 14/18] xfs: port xfs_swap_extents_rmap to our new code
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH 13/18] xfs: allow xfs_swap_range to use older extent swap algorithms
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH 12/18] xfs: add error injection to test swapext recovery
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH 11/18] xfs: add a ->swap_file_range handler
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH 10/18] xfs: refactor locking and unlocking two inodes against userspace IO
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH 08/18] xfs: introduce a swap-extent log intent item
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH 07/18] xfs: allow deferred ops items to put themselves at the end of the pending queue
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH 04/18] xfs: support deferred bmap updates on the attr fork
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH 03/18] vfs: introduce new file extent swap ioctl
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH 01/18] xfs: clean up the error handling in xfs_swap_extent_rmap
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- Re: [PATCH V11.1] Documentation/dax: Update Usage section
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v6 RESEND 0/2] vfs: have syncfs() return error when there are writeback errors
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V11.1] Documentation/dax: Update Usage section
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- [PATCH V11.1] Documentation/dax: Update Usage section
- From: ira.weiny@xxxxxxxxx
- [PATCH V11.1] Documentation/dax: Update Usage section
- From: ira.weiny@xxxxxxxxx
- [PATCH v4] mm: Proactive compaction
- From: Nitin Gupta <nigupta@xxxxxxxxxx>
- Re: [PATCH v3 0/5] Add support for RESOLVE_MAYEXEC
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v3 0/5] Add support for RESOLVE_MAYEXEC
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [PATCH V11 04/11] Documentation/dax: Update Usage section
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- Re: [PATCH V11 04/11] Documentation/dax: Update Usage section
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH V11 04/11] Documentation/dax: Update Usage section
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- Re: [PATCH V11 11/11] fs/xfs: Update xfs_ioctl_setattr_dax_invalidate()
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- Re: [PATCH V11 10/11] fs: Introduce DCACHE_DONTCACHE
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- Re: [PATCH V11 06/11] fs/xfs: Make DAX mount option a tri-state
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- Re: [PATCH V11 09/11] fs: Lift XFS_IDONTCACHE to the VFS layer
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- Re: [PATCH v3 0/5] Add support for RESOLVE_MAYEXEC
- From: Jann Horn <jannh@xxxxxxxxxx>
- [PATCH v3 4/5] selftest/openat2: Add tests for RESOLVE_MAYEXEC enforcing
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v3 5/5] doc: Add documentation for the fs.open_mayexec_enforce sysctl
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v3 2/5] fs: Add a MAY_EXECMOUNT flag to infer the noexec mount property
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v3 3/5] fs: Enable to enforce noexec mounts or file exec through RESOLVE_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v3 0/5] Add support for RESOLVE_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v3 1/5] fs: Add support for a RESOLVE_MAYEXEC flag on openat2(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH glibc 1/3] glibc: Perform rseq(2) registration at C startup and thread creation (v18)
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [RFC PATCH glibc 2/3] glibc: sched_getcpu(): use rseq cpu_id TLS on Linux (v7)
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH 03/12] task_isolation: userspace hard isolation from kernel
- From: Marcelo Tosatti <mtosatti@xxxxxxxxxx>
- Re: [PATCH glibc 5/9] glibc: Perform rseq(2) registration at C startup and thread creation (v17)
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [PATCH v6 RESEND 0/2] vfs: have syncfs() return error when there are writeback errors
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- [PATCH v6 RESEND 1/2] vfs: track per-sb writeback errors and report them to syncfs
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- [PATCH v6 RESEND 2/2] buffer: record blockdev write errors in super_block that it backs
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [PATCH V11 10/11] fs: Introduce DCACHE_DONTCACHE
- From: Jan Kara <jack@xxxxxxx>
- Re: [PATCH glibc 5/9] glibc: Perform rseq(2) registration at C startup and thread creation (v17)
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH glibc 5/9] glibc: Perform rseq(2) registration at C startup and thread creation (v17)
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [PATCH glibc 5/9] glibc: Perform rseq(2) registration at C startup and thread creation (v17)
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH glibc 5/9] glibc: Perform rseq(2) registration at C startup and thread creation (v17)
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [PATCH glibc 5/9] glibc: Perform rseq(2) registration at C startup and thread creation (v17)
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH glibc 5/9] glibc: Perform rseq(2) registration at C startup and thread creation (v17)
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/5] kernel/sysctl: support setting sysctl parameters from kernel command line
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [RFC v2] ptrace, pidfd: add pidfd_ptrace syscall
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 1/5] kernel/sysctl: support setting sysctl parameters from kernel command line
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [RFC v2] ptrace, pidfd: add pidfd_ptrace syscall
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RFC v2] ptrace, pidfd: add pidfd_ptrace syscall
- From: Hagen Paul Pfeifer <hagen@xxxxxxxx>
- Re: [RFC v2] ptrace, pidfd: add pidfd_ptrace syscall
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC v2] ptrace, pidfd: add pidfd_ptrace syscall
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RFC v2] ptrace, pidfd: add pidfd_ptrace syscall
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC v2] ptrace, pidfd: add pidfd_ptrace syscall
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- [PATCH V11 02/11] fs: Remove unneeded IS_DAX() check in io_is_direct()
- From: ira.weiny@xxxxxxxxx
- [PATCH V11 05/11] fs/xfs: Change XFS_MOUNT_DAX to XFS_MOUNT_DAX_ALWAYS
- From: ira.weiny@xxxxxxxxx
- [PATCH V11 01/11] fs/xfs: Remove unnecessary initialization of i_rwsem
- From: ira.weiny@xxxxxxxxx
- [PATCH V11 03/11] fs/stat: Define DAX statx attribute
- From: ira.weiny@xxxxxxxxx
- [PATCH V11 04/11] Documentation/dax: Update Usage section
- From: ira.weiny@xxxxxxxxx
- [PATCH V11 08/11] fs/xfs: Combine xfs_diflags_to_linux() and xfs_diflags_to_iflags()
- From: ira.weiny@xxxxxxxxx
- [PATCH V11 06/11] fs/xfs: Make DAX mount option a tri-state
- From: ira.weiny@xxxxxxxxx
- [PATCH V11 10/11] fs: Introduce DCACHE_DONTCACHE
- From: ira.weiny@xxxxxxxxx
- [PATCH V11 07/11] fs/xfs: Create function xfs_inode_should_enable_dax()
- From: ira.weiny@xxxxxxxxx
- [PATCH V11 09/11] fs: Lift XFS_IDONTCACHE to the VFS layer
- From: ira.weiny@xxxxxxxxx
- [PATCH V11 11/11] fs/xfs: Update xfs_ioctl_setattr_dax_invalidate()
- From: ira.weiny@xxxxxxxxx
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Linux SCSI]
[Samba]
[Yosemite News]