Linux API
[Prev Page][Next Page]
- Re: [PATCH] mm/mincore: allow for making sys_mincore() privileged
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [RFC PATCH glibc 1/4] glibc: Perform rseq(2) registration at nptl init and thread creation (v4)
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH 00/15] arch: synchronize syscall tables in preparation for y2038
- From: Michael Cree <mcree@xxxxxxxxxxxx>
- Re: [PATCH 00/15] arch: synchronize syscall tables in preparation for y2038
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 00/15] arch: synchronize syscall tables in preparation for y2038
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH] mm/mincore: allow for making sys_mincore() privileged
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] mm/mincore: allow for making sys_mincore() privileged
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] mm/mincore: allow for making sys_mincore() privileged
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH 07/11] y2038: syscalls: rename y2038 compat syscalls
- From: Heiko Carstens <heiko.carstens@xxxxxxxxxx>
- Re: [PATCH 15/15] arch: add pkey and rseq syscall numbers everywhere
- From: Heiko Carstens <heiko.carstens@xxxxxxxxxx>
- Re: [PATCH 14/15] arch: add split IPC system calls where needed
- From: Heiko Carstens <heiko.carstens@xxxxxxxxxx>
- Re: [RFC PATCH glibc 1/4] glibc: Perform rseq(2) registration at nptl init and thread creation (v4)
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH 00/15] arch: synchronize syscall tables in preparation for y2038
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH 00/15] arch: synchronize syscall tables in preparation for y2038
- From: Joseph Myers <joseph@xxxxxxxxxxxxxxxx>
- [PATCH 11/11] y2038: add 64-bit time_t syscalls to all 32-bit architectures
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH 00/11] y2038: add time64 syscalls
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH 06/11] timex: change syscalls to use struct __kernel_timex
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH 10/11] y2038: rename old time and utime syscalls
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH 09/11] y2038: remove struct definition redirects
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH 07/11] y2038: syscalls: rename y2038 compat syscalls
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH 08/11] y2038: use time32 syscall names on 32-bit
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH 04/11] sparc64: add custom adjtimex/clock_adjtime functions
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH 01/11] time: make adjtime compat handling available for 32 bit
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH 05/11] timex: use __kernel_timex internally
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH 03/11] time: fix sys_timer_settime prototype
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH 02/11] time: Add struct __kernel_timex
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 07/15] ARM: add kexec_file_load system call number
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 06/15] ARM: add migrate_pages() system call
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 00/15] arch: synchronize syscall tables in preparation for y2038
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH v5 17/17] fanotify: report FAN_ONDIR to listener with FAN_REPORT_FID
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [PATCH v5 16/17] fanotify: add support for create/attrib/move/delete events
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [PATCH v5 09/17] fanotify: enable FAN_REPORT_FID init flag
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [PATCH v5 08/17] fanotify: copy event fid info to user
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [PATCH v5 00/17] fanotify: add support for more event types
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH 00/15] arch: synchronize syscall tables in preparation for y2038
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH 07/15] ARM: add kexec_file_load system call number
- From: Will Deacon <will.deacon@xxxxxxx>
- Re: [PATCH 06/15] ARM: add migrate_pages() system call
- From: Will Deacon <will.deacon@xxxxxxx>
- [PATCH 12/15] sparc64: fix sparc_ipc type conversion
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH 05/15] alpha: update syscall macro definitions
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH 03/15] ia64: assign syscall numbers for perf and seccomp
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH 11/15] mips: fix n32 compat_ipc_parse_version
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH 02/15] ia64: add statx and io_pgetevents syscalls
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH 04/15] alpha: wire up io_pgetevents system call
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH 06/15] ARM: add migrate_pages() system call
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH 08/15] m68k: assign syscall number for seccomp
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH 07/15] ARM: add kexec_file_load system call number
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH 15/15] arch: add pkey and rseq syscall numbers everywhere
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH 00/15] arch: synchronize syscall tables in preparation for y2038
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH 13/15] ipc: rename old-style shmctl/semctl/msgctl syscalls
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH 14/15] arch: add split IPC system calls where needed
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH 10/15] sh: add statx system call
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH 09/15] sh: remove duplicate unistd_32.h file
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH 01/15] ia64: add __NR_umount2 definition
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [RESEND PATCH v3 2/2] sysctl: handle overflow for file-max
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [RESEND PATCH v3 2/2] sysctl: handle overflow for file-max
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] mm/mincore: allow for making sys_mincore() privileged
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [RESEND PATCH v3 2/2] sysctl: handle overflow for file-max
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH] mm/mincore: allow for making sys_mincore() privileged
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH] mm/mincore: allow for making sys_mincore() privileged
- From: Dominique Martinet <asmadeus@xxxxxxxxxxxxx>
- Re: [PATCH v4 00/15] fanotify: add support for more event types
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH] mm/mincore: allow for making sys_mincore() privileged
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 00/15] fanotify: add support for more event types
- From: Jan Kara <jack@xxxxxxx>
- Re: [PATCH v4 00/15] fanotify: add support for more event types
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v4 00/15] fanotify: add support for more event types
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v4 00/15] fanotify: add support for more event types
- From: Jan Kara <jack@xxxxxxx>
- Re: [PATCH v4 00/15] fanotify: add support for more event types
- From: Jan Kara <jack@xxxxxxx>
- Re: [PATCH] mm/mincore: allow for making sys_mincore() privileged
- From: Jiri Kosina <jikos@xxxxxxxxxx>
- Re: [PATCH v4 00/15] fanotify: add support for more event types
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH] mm/mincore: allow for making sys_mincore() privileged
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH] mm/mincore: allow for making sys_mincore() privileged
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH] mm/mincore: allow for making sys_mincore() privileged
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] mm/mincore: allow for making sys_mincore() privileged
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH] mm/mincore: allow for making sys_mincore() privileged
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH] mm/mincore: allow for making sys_mincore() privileged
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: Can we drop upstream Linux x32 support?
- From: Rich Felker <dalias@xxxxxxxx>
- Re: [PATCH v4 00/15] fanotify: add support for more event types
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v4 00/15] fanotify: add support for more event types
- From: Jan Kara <jack@xxxxxxx>
- Re: [RFC PATCH v1 3/5] Yama: Enforces noexec mounts or file executability through O_MAYEXEC
- From: Mickaël Salaün <mickael.salaun@xxxxxxxxxxx>
- Re: Can we drop upstream Linux x32 support?
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH] mm/mincore: allow for making sys_mincore() privileged
- From: Jiri Kosina <jikos@xxxxxxxxxx>
- Re: [PATCH] mm/mincore: allow for making sys_mincore() privileged
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH] mm/mincore: allow for making sys_mincore() privileged
- From: Jiri Kosina <jikos@xxxxxxxxxx>
- Re: [PATCH] mm/mincore: allow for making sys_mincore() privileged
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH v7 1/2] signal: add pidfd_send_signal() syscall
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [RFC PATCH v1 3/5] Yama: Enforces noexec mounts or file executability through O_MAYEXEC
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH] arm64: introduce AUDIT_ARCH_AARCH64ILP32 for ilp32
- From: Yuri Norov <ynorov@xxxxxxxxxxx>
- Re: [PATCH v7 2/2] selftests: add tests for pidfd_send_signal()
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH v7 2/2] selftests: add tests for pidfd_send_signal()
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH v7 2/2] selftests: add tests for pidfd_send_signal()
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v7 2/2] selftests: add tests for pidfd_send_signal()
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH v7 2/2] selftests: add tests for pidfd_send_signal()
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v7 2/2] selftests: add tests for pidfd_send_signal()
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH] mm/mincore: allow for making sys_mincore() privileged
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 2/2] selftests: add tests for pidfd_send_signal()
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v7 2/2] selftests: add tests for pidfd_send_signal()
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH] mm/mincore: allow for making sys_mincore() privileged
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH] mm/mincore: allow for making sys_mincore() privileged
- From: Bernd Petrovitsch <bernd@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v1 3/5] Yama: Enforces noexec mounts or file executability through O_MAYEXEC
- From: Mickaël Salaün <mickael.salaun@xxxxxxxxxxx>
- Re: [PATCH] mm/mincore: allow for making sys_mincore() privileged
- From: Jiri Kosina <jikos@xxxxxxxxxx>
- Re: [PATCH] mm/mincore: allow for making sys_mincore() privileged
- From: Bernd Petrovitsch <bernd@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] mm/mincore: allow for making sys_mincore() privileged
- From: Kevin Easton <kevin@xxxxxxxxxxx>
- Re: [RESEND PATCH v3 2/2] sysctl: handle overflow for file-max
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] mm/mincore: allow for making sys_mincore() privileged
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [RESEND PATCH v3 0/2] sysctl: handle overflow for file-max
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [RESEND PATCH v3 2/2] sysctl: handle overflow for file-max
- From: Christian Brauner <christian@xxxxxxxxxx>
- [RESEND PATCH v3 1/2] sysctl: handle overflow in proc_get_long
- From: Christian Brauner <christian@xxxxxxxxxx>
- [RESEND PATCH v3 0/2] sysctl: handle overflow for file-max
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH v9 00/24] ILP32 for ARM64
- From: Yuri Norov <ynorov@xxxxxxxxxxx>
- Re: [PATCH v9 00/24] ILP32 for ARM64
- From: Yuri Norov <ynorov@xxxxxxxxxxx>
- Re: [PATCH] mm/mincore: allow for making sys_mincore() privileged
- From: Daniel Gruss <daniel@xxxxxxxx>
- Re: [PATCH] mm/mincore: allow for making sys_mincore() privileged
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH] mm/mincore: allow for making sys_mincore() privileged
- From: Dominique Martinet <asmadeus@xxxxxxxxxxxxx>
- Re: [PATCH] mm/mincore: allow for making sys_mincore() privileged
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH] mm/mincore: allow for making sys_mincore() privileged
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v4 00/15] fanotify: add support for more event types
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v4 15/15] fanotify: report FAN_ONDIR to listener with FAN_REPORT_FID
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v4 15/15] fanotify: report FAN_ONDIR to listener with FAN_REPORT_FID
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v7 21/22] ptrace: add PTRACE_GET_SYSCALL_INFO request
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH] mm/mincore: allow for making sys_mincore() privileged
- From: Dominique Martinet <asmadeus@xxxxxxxxxxxxx>
- [PATCH v7 21/22] ptrace: add PTRACE_GET_SYSCALL_INFO request
- From: "Dmitry V. Levin" <ldv@xxxxxxxxxxxx>
- Re: [PATCH] mm/mincore: allow for making sys_mincore() privileged
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] mm/mincore: allow for making sys_mincore() privileged
- From: Kevin Easton <kevin@xxxxxxxxxxx>
- Re: [PATCH] mm/mincore: allow for making sys_mincore() privileged
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] mm/mincore: allow for making sys_mincore() privileged
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] mm/mincore: allow for making sys_mincore() privileged
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH] mm/mincore: allow for making sys_mincore() privileged
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] mm/mincore: allow for making sys_mincore() privileged
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] mm/mincore: allow for making sys_mincore() privileged
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] mm/mincore: allow for making sys_mincore() privileged
- From: Jiri Kosina <jikos@xxxxxxxxxx>
- Re: [PATCH] mm/mincore: allow for making sys_mincore() privileged
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] mm/mincore: allow for making sys_mincore() privileged
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH] mm/mincore: allow for making sys_mincore() privileged
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] mm/mincore: allow for making sys_mincore() privileged
- From: Jiri Kosina <jikos@xxxxxxxxxx>
- Re: [PATCH] mm/mincore: allow for making sys_mincore() privileged
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] mm/mincore: allow for making sys_mincore() privileged
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] mm/mincore: allow for making sys_mincore() privileged
- From: Jiri Kosina <jikos@xxxxxxxxxx>
- Re: [PATCH] mm/mincore: allow for making sys_mincore() privileged
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH] mm/mincore: allow for making sys_mincore() privileged
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] mm/mincore: allow for making sys_mincore() privileged
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH] mm/mincore: allow for making sys_mincore() privileged
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH] mm/mincore: allow for making sys_mincore() privileged
- From: Jiri Kosina <jikos@xxxxxxxxxx>
- Re: [PATCH] mm/mincore: allow for making sys_mincore() privileged
- From: Vlastimil Babka <vbabka@xxxxxxx>
- [PATCH] mm/mincore: allow for making sys_mincore() privileged
- From: Jiri Kosina <jikos@xxxxxxxxxx>
- Re: [PATCH v4 15/15] fanotify: report FAN_ONDIR to listener with FAN_REPORT_FID
- From: Matthew Bobrowski <mbobrowski@xxxxxxxxxxxxxx>
- Re: [PATCH v4 15/15] fanotify: report FAN_ONDIR to listener with FAN_REPORT_FID
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v4 15/15] fanotify: report FAN_ONDIR to listener with FAN_REPORT_FID
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v4 15/15] fanotify: report FAN_ONDIR to listener with FAN_REPORT_FID
- From: Matthew Bobrowski <mbobrowski@xxxxxxxxxxxxxx>
- Re: [PATCH v4 15/15] fanotify: report FAN_ONDIR to listener with FAN_REPORT_FID
- From: Matthew Bobrowski <mbobrowski@xxxxxxxxxxxxxx>
- Re: [PATCH ghak90 (was ghak32) V4 01/10] audit: collect audit task parameters
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH ghak90 (was ghak32) V4 01/10] audit: collect audit task parameters
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH v4 15/15] fanotify: report FAN_ONDIR to listener with FAN_REPORT_FID
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v4 15/15] fanotify: report FAN_ONDIR to listener with FAN_REPORT_FID
- From: Jan Kara <jack@xxxxxxx>
- Re: [PATCH v4 15/15] fanotify: report FAN_ONDIR to listener with FAN_REPORT_FID
- From: Jan Kara <jack@xxxxxxx>
- Re: [PATCH v4 15/15] fanotify: report FAN_ONDIR to listener with FAN_REPORT_FID
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v4 00/15] fanotify: add support for more event types
- From: Jan Kara <jack@xxxxxxx>
- Re: [PATCH v4 15/15] fanotify: report FAN_ONDIR to listener with FAN_REPORT_FID
- From: Jan Kara <jack@xxxxxxx>
- Re: [PATCH v4 14/15] fanotify: add support for create/attrib/move/delete events
- From: Jan Kara <jack@xxxxxxx>
- Re: [PATCH v4 07/15] fanotify: copy event fid info to user
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH ghak90 (was ghak32) V4 01/10] audit: collect audit task parameters
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH ghak90 (was ghak32) V4 01/10] audit: collect audit task parameters
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH ghak90 (was ghak32) V4 01/10] audit: collect audit task parameters
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH ghak90 (was ghak32) V4 01/10] audit: collect audit task parameters
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH ghak90 (was ghak32) V4 00/10] audit: implement container identifier
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH ghak90 (was ghak32) V4 00/10] audit: implement container identifier
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH ghak90 (was ghak32) V4 01/10] audit: collect audit task parameters
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH ghak90 (was ghak32) V4 00/10] audit: implement container identifier
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH ghak90 (was ghak32) V4 00/10] audit: implement container identifier
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH v4 07/15] fanotify: copy event fid info to user
- From: Jan Kara <jack@xxxxxxx>
- Re: [PATCH ghak90 (was ghak32) V4 00/10] audit: implement container identifier
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [RFC PATCH v1 3/5] Yama: Enforces noexec mounts or file executability through O_MAYEXEC
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: + mm-thp-always-specify-disabled-vmas-as-nh-in-smaps.patch added to -mm tree
- From: Mike Rapoport <rppt@xxxxxxxxxxxxx>
- Re: + mm-thp-always-specify-disabled-vmas-as-nh-in-smaps.patch added to -mm tree
- From: David Rientjes <rientjes@xxxxxxxxxx>
- [PATCH v7 2/2] selftests: add tests for pidfd_send_signal()
- From: Christian Brauner <christian@xxxxxxxxxx>
- [PATCH v7 1/2] signal: add pidfd_send_signal() syscall
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: d_off field in struct dirent and 32-on-64 emulation
- From: Adhemerval Zanella <adhemerval.zanella@xxxxxxxxxx>
- Re: [PATCH v6 2/2] selftests: add tests for pidfd_send_signal()
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v6 2/2] selftests: add tests for pidfd_send_signal()
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: d_off field in struct dirent and 32-on-64 emulation
- From: Joseph Myers <joseph@xxxxxxxxxxxxxxxx>
- Re: [PATCH v6 2/2] selftests: add tests for pidfd_send_signal()
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH v6 2/2] selftests: add tests for pidfd_send_signal()
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: + mm-thp-always-specify-disabled-vmas-as-nh-in-smaps.patch added to -mm tree
- From: Mike Rapoport <rppt@xxxxxxxxxxxxx>
- Re: [Qemu-devel] d_off field in struct dirent and 32-on-64 emulation
- From: Peter Maydell <peter.maydell@xxxxxxxxxx>
- [PATCH v6 1/2] signal: add pidfd_send_signal() syscall
- From: Christian Brauner <christian@xxxxxxxxxx>
- [PATCH v6 2/2] selftests: add tests for pidfd_send_signal()
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [Qemu-devel] d_off field in struct dirent and 32-on-64 emulation
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v6 0/1] ns: introduce binfmt_misc namespace
- From: Laurent Vivier <laurent@xxxxxxxxx>
- Re: [V9fs-developer] [Qemu-devel] d_off field in struct dirent and 32-on-64 emulation
- From: Dominique Martinet <asmadeus@xxxxxxxxxxxxx>
- Re: [Qemu-devel] d_off field in struct dirent and 32-on-64 emulation
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [Qemu-devel] d_off field in struct dirent and 32-on-64 emulation
- From: Dominique Martinet <asmadeus@xxxxxxxxxxxxx>
- Re: [Qemu-devel] d_off field in struct dirent and 32-on-64 emulation
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [Qemu-devel] d_off field in struct dirent and 32-on-64 emulation
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [GIT PULL] y2038: more syscalls and cleanups
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [Qemu-devel] d_off field in struct dirent and 32-on-64 emulation
- From: Peter Maydell <peter.maydell@xxxxxxxxxx>
- Re: [PATCH v5 RESEND] signal: add pidfd_send_signal() syscall
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH v5 RESEND] signal: add pidfd_send_signal() syscall
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [Qemu-devel] d_off field in struct dirent and 32-on-64 emulation
- From: Andreas Dilger <adilger@xxxxxxxxx>
- Re: + mm-thp-always-specify-disabled-vmas-as-nh-in-smaps.patch added to -mm tree
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- [PATCH v5 RESEND] signal: add pidfd_send_signal() syscall
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: + mm-thp-always-specify-disabled-vmas-as-nh-in-smaps.patch added to -mm tree
- From: David Rientjes <rientjes@xxxxxxxxxx>
- Re: + mm-thp-always-specify-disabled-vmas-as-nh-in-smaps.patch added to -mm tree
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: + mm-thp-always-specify-disabled-vmas-as-nh-in-smaps.patch added to -mm tree
- From: David Rientjes <rientjes@xxxxxxxxxx>
- Re: + mm-thp-always-specify-disabled-vmas-as-nh-in-smaps.patch added to -mm tree
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: + mm-thp-always-specify-disabled-vmas-as-nh-in-smaps.patch added to -mm tree
- From: David Rientjes <rientjes@xxxxxxxxxx>
- Re: d_off field in struct dirent and 32-on-64 emulation
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: + mm-thp-always-specify-disabled-vmas-as-nh-in-smaps.patch added to -mm tree
- From: Cyrill Gorcunov <gorcunov@xxxxxxxxx>
- Re: d_off field in struct dirent and 32-on-64 emulation
- From: Adhemerval Zanella <adhemerval.zanella@xxxxxxxxxx>
- Re: + mm-thp-always-specify-disabled-vmas-as-nh-in-smaps.patch added to -mm tree
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: d_off field in struct dirent and 32-on-64 emulation
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: d_off field in struct dirent and 32-on-64 emulation
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: d_off field in struct dirent and 32-on-64 emulation
- From: Adhemerval Zanella <adhemerval.zanella@xxxxxxxxxx>
- Re: [Qemu-devel] d_off field in struct dirent and 32-on-64 emulation
- From: Peter Maydell <peter.maydell@xxxxxxxxxx>
- Re: + mm-thp-always-specify-disabled-vmas-as-nh-in-smaps.patch added to -mm tree
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: + mm-thp-always-specify-disabled-vmas-as-nh-in-smaps.patch added to -mm tree
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: d_off field in struct dirent and 32-on-64 emulation
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: + mm-thp-always-specify-disabled-vmas-as-nh-in-smaps.patch added to -mm tree
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: d_off field in struct dirent and 32-on-64 emulation
- From: "Dmitry V. Levin" <ldv@xxxxxxxxxxxx>
- Re: [Qemu-devel] d_off field in struct dirent and 32-on-64 emulation
- From: Andreas Dilger <adilger@xxxxxxxxx>
- Re: d_off field in struct dirent and 32-on-64 emulation
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: d_off field in struct dirent and 32-on-64 emulation
- From: Adhemerval Zanella <adhemerval.zanella@xxxxxxxxxx>
- Re: d_off field in struct dirent and 32-on-64 emulation
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [Qemu-devel] d_off field in struct dirent and 32-on-64 emulation
- From: Peter Maydell <peter.maydell@xxxxxxxxxx>
- d_off field in struct dirent and 32-on-64 emulation
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: + mm-thp-always-specify-disabled-vmas-as-nh-in-smaps.patch added to -mm tree
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [GIT PULL] asm-generic: syscall table script for arch/sh
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v2] signal: add procfd_signal() syscall
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- Re: [PATCH v2] signal: add procfd_signal() syscall
- From: Lai Jiangshan <jiangshanlai+lkml@xxxxxxxxx>
- Re: [PATCH v2] signal: add procfd_signal() syscall
- From: Lai Jiangshan <jiangshanlai+lkml@xxxxxxxxx>
- Re: + mm-thp-always-specify-disabled-vmas-as-nh-in-smaps.patch added to -mm tree
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: + mm-thp-always-specify-disabled-vmas-as-nh-in-smaps.patch added to -mm tree
- From: David Rientjes <rientjes@xxxxxxxxxx>
- Re: + mm-thp-always-specify-disabled-vmas-as-nh-in-smaps.patch added to -mm tree
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: + mm-thp-always-specify-disabled-vmas-as-nh-in-smaps.patch added to -mm tree
- From: David Rientjes <rientjes@xxxxxxxxxx>
- Re: + mm-thp-always-specify-disabled-vmas-as-nh-in-smaps.patch added to -mm tree
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: + mm-thp-always-specify-disabled-vmas-as-nh-in-smaps.patch added to -mm tree
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: + mm-thp-always-specify-disabled-vmas-as-nh-in-smaps.patch added to -mm tree
- From: David Rientjes <rientjes@xxxxxxxxxx>
- Re: + mm-thp-always-specify-disabled-vmas-as-nh-in-smaps.patch added to -mm tree
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: + mm-thp-always-specify-disabled-vmas-as-nh-in-smaps.patch added to -mm tree
- From: David Rientjes <rientjes@xxxxxxxxxx>
- Re: + mm-thp-always-specify-disabled-vmas-as-nh-in-smaps.patch added to -mm tree
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: + mm-thp-always-specify-disabled-vmas-as-nh-in-smaps.patch added to -mm tree
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [GIT PULL] asm-generic: syscall table script for arch/sh
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- [GIT PULL] asm-generic: syscall table script for arch/sh
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [GIT PULL] y2038: more syscalls and cleanups
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v5 1/1] signal: add pidfd_send_signal() syscall
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: Can we drop upstream Linux x32 support?
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- [PATCH 1/4] vt: refactor vc_ques to allow of other private sequences.
- From: Martin Hostettler <textshell@xxxxxxxxxxx>
- [PATCH 4/4] vt: ignore sequences that contain ':' in parameters.
- From: Martin Hostettler <textshell@xxxxxxxxxxx>
- [PATCH 3/4] vt: ignore csi sequences with intermediate characters.
- From: Martin Hostettler <textshell@xxxxxxxxxxx>
- [PATCH 2/4] vt: Implement parsing for >, =, < private sequences.
- From: Martin Hostettler <textshell@xxxxxxxxxxx>
- vt: Improve CSI parsing
- From: Martin Hostettler <textshell@xxxxxxxxxxx>
- Re: Can we drop upstream Linux x32 support?
- From: Thomas Schoebel-Theuer <tst@xxxxxxxxxxxxxxxxxx>
- Re: Can we drop upstream Linux x32 support?
- From: Thorsten Glaser <tg@xxxxxxxxx>
- Re: Can we drop upstream Linux x32 support?
- From: Thomas Schöbel-Theuer <thomas@xxxxxxxxxxxxxxxxxx>
- Re: Can we drop upstream Linux x32 support?
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: Can we drop upstream Linux x32 support?
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: Can we drop upstream Linux x32 support?
- From: Thomas Schöbel-Theuer <thomas@xxxxxxxxxxxxxxxxxx>
- Re: Can we drop upstream Linux x32 support?
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: Can we drop upstream Linux x32 support?
- From: Lance Richardson <lance.richardson.net@xxxxxxxxx>
- Re: Can we drop upstream Linux x32 support?
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: Can we drop upstream Linux x32 support?
- From: Rich Felker <dalias@xxxxxxxx>
- Re: Can we drop upstream Linux x32 support?
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: Can we drop upstream Linux x32 support?
- From: Bernd Petrovitsch <bernd@xxxxxxxxxxxxxxxxxxx>
- Re: Can we drop upstream Linux x32 support?
- From: Rich Felker <dalias@xxxxxxxx>
- Re: Can we drop upstream Linux x32 support?
- From: Rich Felker <dalias@xxxxxxxx>
- Re: Can we drop upstream Linux x32 support?
- From: Richard Weinberger <richard@xxxxxx>
- Re: Can we drop upstream Linux x32 support?
- From: Bernd Petrovitsch <bernd@xxxxxxxxxxxxxxxxxxx>
- RE: Can we drop upstream Linux x32 support?
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: Can we drop upstream Linux x32 support?
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH v5 1/1] signal: add pidfd_send_signal() syscall
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: Can we drop upstream Linux x32 support?
- From: Joseph Myers <joseph@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v1 0/5] Add support for O_MAYEXEC
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [RFC PATCH v1 0/5] Add support for O_MAYEXEC
- From: Mickaël Salaün <mickael.salaun@xxxxxxxxxxx>
- [PATCH v6 26/27] ptrace: add PTRACE_GET_SYSCALL_INFO request
- From: "Dmitry V. Levin" <ldv@xxxxxxxxxxxx>
- Re: [RFC PATCH v1 0/5] Add support for O_MAYEXEC
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: Can we drop upstream Linux x32 support?
- From: Rich Felker <dalias@xxxxxxxx>
- Re: Can we drop upstream Linux x32 support?
- From: Richard Purdie <richard.purdie@xxxxxxxxxxxxxxxxxxx>
- Re: Can we drop upstream Linux x32 support?
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: Can we drop upstream Linux x32 support?
- From: Rich Felker <dalias@xxxxxxxx>
- Re: Can we drop upstream Linux x32 support?
- From: Rich Felker <dalias@xxxxxxxx>
- Re: Can we drop upstream Linux x32 support?
- From: Lance Richardson <lance.richardson.net@xxxxxxxxx>
- Re: [RFC PATCH v1 0/5] Add support for O_MAYEXEC
- From: Mickaël Salaün <mickael.salaun@xxxxxxxxxxx>
- Re: [RFC PATCH v1 0/5] Add support for O_MAYEXEC
- From: Mickaël Salaün <mickael.salaun@xxxxxxxxxxx>
- Re: [RFC PATCH v1 3/5] Yama: Enforces noexec mounts or file executability through O_MAYEXEC
- From: Mickaël Salaün <mickael.salaun@xxxxxxxxxxx>
- Re: Can we drop upstream Linux x32 support?
- From: Olof Johansson <olof@xxxxxxxxx>
- Re: [RFC PATCH v1 1/5] fs: Add support for an O_MAYEXEC flag on sys_open()
- From: Mickaël Salaün <mickael.salaun@xxxxxxxxxxx>
- Re: Can we drop upstream Linux x32 support?
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [RFC PATCH v1 0/5] Add support for O_MAYEXEC
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v1 0/5] Add support for O_MAYEXEC
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: Can we drop upstream Linux x32 support?
- From: Kevin Easton <kevin@xxxxxxxxxxx>
- Re: [RFC PATCH v1 0/5] Add support for O_MAYEXEC
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [RFC PATCH v1 0/5] Add support for O_MAYEXEC
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v1 1/5] fs: Add support for an O_MAYEXEC flag on sys_open()
- From: Matthew Bobrowski <mbobrowski@xxxxxxxxxxxxxx>
- Re: Can we drop upstream Linux x32 support?
- From: Richard Weinberger <richard.weinberger@xxxxxxxxx>
- Re: [RFC PATCH v1 0/5] Add support for O_MAYEXEC
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [RFC PATCH v1 0/5] Add support for O_MAYEXEC
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: Can we drop upstream Linux x32 support?
- From: Kevin Easton <kevin@xxxxxxxxxxx>
- Re: [RFC PATCH v1 0/5] Add support for O_MAYEXEC
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [RFC PATCH v1 0/5] Add support for O_MAYEXEC
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH -manpage 2/2] memfd_create.2: Update manpage with new memfd F_SEAL_FUTURE_WRITE seal
- From: "Joel Fernandes (Google)" <joel@xxxxxxxxxxxxxxxxx>
- [PATCH -manpage 1/2] fcntl.2: Update manpage with new memfd F_SEAL_FUTURE_WRITE seal
- From: "Joel Fernandes (Google)" <joel@xxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v1 1/5] fs: Add support for an O_MAYEXEC flag on sys_open()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v1 0/5] Add support for O_MAYEXEC
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [RFC PATCH v1 0/5] Add support for O_MAYEXEC
- From: James Morris <jmorris@xxxxxxxxx>
- Re: Can we drop upstream Linux x32 support?
- From: Ivan Ivanov <qmastery16@xxxxxxxxx>
- Re: Can we drop upstream Linux x32 support?
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: Can we drop upstream Linux x32 support?
- From: Ivan Ivanov <qmastery16@xxxxxxxxx>
- Re: Can we drop upstream Linux x32 support?
- From: Joseph Myers <joseph@xxxxxxxxxxxxxxxx>
- Re: Can we drop upstream Linux x32 support?
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v5 24/25] ptrace: add PTRACE_GET_SYSCALL_INFO request
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [RFC PATCH v1 3/5] Yama: Enforces noexec mounts or file executability through O_MAYEXEC
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [RFC PATCH v1 1/5] fs: Add support for an O_MAYEXEC flag on sys_open()
- From: Mickaël Salaün <mickael.salaun@xxxxxxxxxxx>
- Re: [RFC PATCH v1 0/5] Add support for O_MAYEXEC
- From: Mickaël Salaün <mickael.salaun@xxxxxxxxxxx>
- Re: Can we drop upstream Linux x32 support?
- From: Rich Felker <dalias@xxxxxxxx>
- Re: Can we drop upstream Linux x32 support?
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [RFC PATCH v1 0/5] Add support for O_MAYEXEC
- From: Jordan Glover <Golden_Miller83@xxxxxxxxxxxxx>
- Re: [RFC PATCH v1 1/5] fs: Add support for an O_MAYEXEC flag on sys_open()
- From: Jan Kara <jack@xxxxxxx>
- Re: [RFC PATCH v1 3/5] Yama: Enforces noexec mounts or file executability through O_MAYEXEC
- From: Mickaël Salaün <mickael.salaun@xxxxxxxxxxx>
- Re: [PATCH v5 24/25] ptrace: add PTRACE_GET_SYSCALL_INFO request
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: Can we drop upstream Linux x32 support?
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [RFC PATCH v1 4/5] selftest/yama: Add tests for O_MAYEXEC enforcing
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v1 3/5] Yama: Enforces noexec mounts or file executability through O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v1 1/5] fs: Add support for an O_MAYEXEC flag on sys_open()
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v1 5/5] doc: Add documentation for Yama's open_mayexec_enforce
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v1 0/5] Add support for O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v1 2/5] fs: Add a MAY_EXECMOUNT flag to infer the noexec mount propertie
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: Can we drop upstream Linux x32 support?
- From: Thorsten Glaser <tg@xxxxxxxxx>
- Re: Can we drop upstream Linux x32 support?
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v10 4/4] samples: add an example of seccomp user trap
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v10 3/4] seccomp: add a return code to trap to userspace
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v10 2/4] seccomp: switch system call argument type to void *
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v10 1/4] seccomp: hoist struct seccomp_data recalculation higher
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: Can we drop upstream Linux x32 support?
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: Can we drop upstream Linux x32 support?
- From: "Maciej W. Rozycki" <macro@xxxxxxxxxxxxxx>
- Re: Can we drop upstream Linux x32 support?
- From: Thorsten Glaser <tg@xxxxxxxxx>
- Re: Can we drop upstream Linux x32 support?
- From: Rich Felker <dalias@xxxxxxxx>
- Re: Can we drop upstream Linux x32 support?
- From: Rich Felker <dalias@xxxxxxxx>
- Re: Can we drop upstream Linux x32 support?
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v10 4/4] samples: add an example of seccomp user trap
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: Can we drop upstream Linux x32 support?
- From: Thorsten Glaser <tg@xxxxxxxxx>
- Re: Can we drop upstream Linux x32 support?
- From: Thorsten Glaser <tg@xxxxxxxxx>
- Re: [PATCH v5 24/25] ptrace: add PTRACE_GET_SYSCALL_INFO request
- From: "Dmitry V. Levin" <ldv@xxxxxxxxxxxx>
- Re: [PATCH v5 24/25] ptrace: add PTRACE_GET_SYSCALL_INFO request
- From: "Dmitry V. Levin" <ldv@xxxxxxxxxxxx>
- Re: [PATCH v5 24/25] ptrace: add PTRACE_GET_SYSCALL_INFO request
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- [PATCH 1/3] mm, proc: be more verbose about unstable VMA flags in /proc/<pid>/smaps
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- [PATCH 2/3] mm, thp, proc: report THP eligibility for each vma
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- [PATCH 3/3] mm, proc: report PR_SET_THP_DISABLE in proc
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- [PATCH 0/3] THP eligibility reporting via proc
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: Can we drop upstream Linux x32 support?
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: Can we drop upstream Linux x32 support?
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: Can we drop upstream Linux x32 support?
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: Can we drop upstream Linux x32 support?
- From: John Paul Adrian Glaubitz <glaubitz@xxxxxxxxxxxxxxxxxxx>
- Re: Security modules and sending signals within the same process
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [RFC PATCH glibc 1/4] glibc: Perform rseq(2) registration at nptl init and thread creation (v4)
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: Can we drop upstream Linux x32 support?
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: Can we drop upstream Linux x32 support?
- From: John Paul Adrian Glaubitz <glaubitz@xxxxxxxxxxxxxxxxxxx>
- Re: Can we drop upstream Linux x32 support?
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: Can we drop upstream Linux x32 support?
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH v4 08/15] fanotify: enable FAN_REPORT_FID init flag
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v4 08/15] fanotify: enable FAN_REPORT_FID init flag
- From: Matthew Bobrowski <mbobrowski@xxxxxxxxxxxxxx>
- Re: Can we drop upstream Linux x32 support?
- From: Christian Brauner <christian.brauner@xxxxxxxxxxxxx>
- Re: Can we drop upstream Linux x32 support?
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: Can we drop upstream Linux x32 support?
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- Re: Can we drop upstream Linux x32 support?
- Re: Can we drop upstream Linux x32 support?
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Can we drop upstream Linux x32 support?
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: Official Linux system wrapper library?
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH v5 0/5] cgroup: Introducing bypass mode
- From: Waiman Long <longman@xxxxxxxxxx>
- [PATCH v5 2/5] cgroup: Allow reenabling of controller in bypass mode
- From: Waiman Long <longman@xxxxxxxxxx>
- [PATCH v5 1/5] cgroup: subtree_control bypass mode for bypassable controllers
- From: Waiman Long <longman@xxxxxxxxxx>
- [PATCH v5 5/5] cgroup: Document bypass mode
- From: Waiman Long <longman@xxxxxxxxxx>
- [PATCH v5 4/5] sched/core: Make cpu cgroup controller bypassable
- From: Waiman Long <longman@xxxxxxxxxx>
- [PATCH v5 3/5] cgroup: Make debug controller report new controller masks
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [PATCH v5 24/25] ptrace: add PTRACE_GET_SYSCALL_INFO request
- From: Palmer Dabbelt <palmer@xxxxxxxxxx>
- Re: [PATCH v5 24/25] ptrace: add PTRACE_GET_SYSCALL_INFO request
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v5 24/25] ptrace: add PTRACE_GET_SYSCALL_INFO request
- From: Paul Burton <paul.burton@xxxxxxxx>
- Re: [PATCH v3 0/2] sysctl: handle overflow for file-max
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v5 24/25] ptrace: add PTRACE_GET_SYSCALL_INFO request
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: Official Linux system wrapper library?
- From: "Carlos O'Donell" <carlos@xxxxxxxxxx>
- Re: Official Linux system wrapper library?
- From: Jonathan Corbet <corbet@xxxxxxx>
- Re: [PATCH v5 24/25] ptrace: add PTRACE_GET_SYSCALL_INFO request
- From: "Dmitry V. Levin" <ldv@xxxxxxxxxxxx>
- Re: [PATCH v4 08/15] fanotify: enable FAN_REPORT_FID init flag
- From: Jan Kara <jack@xxxxxxx>
- Re: [PATCH v5 24/25] ptrace: add PTRACE_GET_SYSCALL_INFO request
- From: "Dmitry V. Levin" <ldv@xxxxxxxxxxxx>
- Re: [PATCH v5 24/25] ptrace: add PTRACE_GET_SYSCALL_INFO request
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v5 24/25] ptrace: add PTRACE_GET_SYSCALL_INFO request
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- [PATCH v5 24/25] ptrace: add PTRACE_GET_SYSCALL_INFO request
- From: "Dmitry V. Levin" <ldv@xxxxxxxxxxxx>
- [PATCH v10 1/4] seccomp: hoist struct seccomp_data recalculation higher
- From: Tycho Andersen <tycho@xxxxxxxx>
- [PATCH v10 3/4] seccomp: add a return code to trap to userspace
- From: Tycho Andersen <tycho@xxxxxxxx>
- [PATCH v10 4/4] samples: add an example of seccomp user trap
- From: Tycho Andersen <tycho@xxxxxxxx>
- [PATCH v10 2/4] seccomp: switch system call argument type to void *
- From: Tycho Andersen <tycho@xxxxxxxx>
- [PATCH v10 0/4] seccomp trap to userspace
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH v3 0/2] sysctl: handle overflow for file-max
- From: Christian Brauner <christian.brauner@xxxxxxxxxxxxx>
- Re: [PATCH v5 1/1] signal: add pidfd_send_signal() syscall
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: Official Linux system wrapper library?
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v4] signal: add taskfd_send_signal() syscall
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [GIT PULL] asm-generic: bugfix for asm/unistd.h
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] asm-generic: bugfix for asm/unistd.h
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v4 08/15] fanotify: enable FAN_REPORT_FID init flag
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [PATCH v5 1/1] signal: add pidfd_send_signal() syscall
- From: Christian Brauner <christian@xxxxxxxxxx>
- [PATCH v5 0/1] signaling processes through pidfds
- From: Christian Brauner <christian@xxxxxxxxxx>
- [PATCH 4/5] y2038: signal: Add sys_rt_sigtimedwait_time32
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH 2/5] y2038: futex: Add support for __kernel_timespec
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH 1/5] y2038: futex: Move compat implementation into futex.c
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH 3/5] y2038: socket: Add compat_sys_recvmmsg_time64
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH 5/5] y2038: signal: Add compat_sys_rt_sigtimedwait_time64
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH 0/5] y2038: further system call conversion
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v4] signal: add taskfd_send_signal() syscall
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v4] signal: add taskfd_send_signal() syscall
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [RFC PATCH 0/3] THP eligibility reporting via proc
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [PATCH v4] signal: add taskfd_send_signal() syscall
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH v4] signal: add taskfd_send_signal() syscall
- From: Daniel Colascione <dancol@xxxxxxxxxx>
- Re: [PATCH v4] signal: add taskfd_send_signal() syscall
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v4] signal: add taskfd_send_signal() syscall
- From: Daniel Colascione <dancol@xxxxxxxxxx>
- Re: [PATCH v4] signal: add taskfd_send_signal() syscall
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v4] signal: add taskfd_send_signal() syscall
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH v4] signal: add taskfd_send_signal() syscall
- From: Daniel Colascione <dancol@xxxxxxxxxx>
- Re: [PATCH v4] signal: add taskfd_send_signal() syscall
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH v4] signal: add taskfd_send_signal() syscall
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v4] signal: add taskfd_send_signal() syscall
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v4] signal: add taskfd_send_signal() syscall
- From: Daniel Colascione <dancol@xxxxxxxxxx>
- Re: [PATCH v4] signal: add taskfd_send_signal() syscall
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v4] signal: add taskfd_send_signal() syscall
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH v4] signal: add taskfd_send_signal() syscall
- From: Daniel Colascione <dancol@xxxxxxxxxx>
- Re: [PATCH v4] signal: add taskfd_send_signal() syscall
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v4] signal: add taskfd_send_signal() syscall
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH v4] signal: add taskfd_send_signal() syscall
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2] signal: add procfd_signal() syscall
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH v2] signal: add procfd_signal() syscall
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH v2] signal: add procfd_signal() syscall
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v4] signal: add taskfd_send_signal() syscall
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4] signal: add taskfd_send_signal() syscall
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH v4] signal: add taskfd_send_signal() syscall
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v4] signal: add taskfd_send_signal() syscall
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH v4 0/5] y2038: Make ppoll, io_pgetevents and pselect y2038 safe
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v4] signal: add taskfd_send_signal() syscall
- From: Daniel Colascione <dancol@xxxxxxxxxx>
- Re: [PATCH v2 0/1] Add prctl to kill descendants on exit
- From: Jürg Billeter <j@xxxxxxxxx>
- Re: [PATCH v4] signal: add taskfd_send_signal() syscall
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH man-pages] Add rseq manpage
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH v4] signal: add taskfd_send_signal() syscall
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v4] signal: add taskfd_send_signal() syscall
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- Re: [PATCH v4] signal: add taskfd_send_signal() syscall
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH v4] signal: add taskfd_send_signal() syscall
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v4] signal: add taskfd_send_signal() syscall
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH v4] signal: add taskfd_send_signal() syscall
- From: Jürg Billeter <j@xxxxxxxxx>
- Re: [PATCH v4] signal: add taskfd_send_signal() syscall
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH v4] signal: add taskfd_send_signal() syscall
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH v4] signal: add taskfd_send_signal() syscall
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH v4] signal: add taskfd_send_signal() syscall
- From: Jürg Billeter <j@xxxxxxxxx>
- Re: [PATCH v4] signal: add taskfd_send_signal() syscall
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- [PATCH v4] signal: add taskfd_send_signal() syscall
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH v3] signal: add procfd_send_signal() syscall
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3] signal: add procfd_send_signal() syscall
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH v3] signal: add procfd_send_signal() syscall
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3] signal: add procfd_send_signal() syscall
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: pkeys: Reserve PKEY_DISABLE_READ
- From: Ram Pai <linuxram@xxxxxxxxxx>
- Re: pkeys: Reserve PKEY_DISABLE_READ
- From: Ram Pai <linuxram@xxxxxxxxxx>
- Re: [PATCH v3] signal: add procfd_send_signal() syscall
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v3] signal: add procfd_send_signal() syscall
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v3] signal: add procfd_send_signal() syscall
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [RFC PATCH v4 1/5] glibc: Perform rseq(2) registration at nptl init and thread creation
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: pkeys: Reserve PKEY_DISABLE_READ
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH] Y2038: provide kernel support indication
- From: Joseph Myers <joseph@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Y2038: provide kernel support indication
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH] Y2038: provide kernel support indication
- From: Joseph Myers <joseph@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Y2038: provide kernel support indication
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: pkeys: Reserve PKEY_DISABLE_READ
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- [PATCH v3] signal: add procfd_send_signal() syscall
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [RFC PATCH glibc 1/4] glibc: Perform rseq(2) registration at nptl init and thread creation (v4)
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [RFC PATCH glibc 1/4] glibc: Perform rseq(2) registration at nptl init and thread creation (v4)
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- [RFC PATCH glibc 1/4] glibc: Perform rseq(2) registration at nptl init and thread creation (v4)
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [RFC PATCH glibc 2/4] glibc: sched_getcpu(): use rseq cpu_id TLS on Linux
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [RFC PATCH v6 04/26] x86/fpu/xstate: Introduce XSAVES system states
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH v6 04/26] x86/fpu/xstate: Introduce XSAVES system states
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v5 0/4] Fix unsafe BPF_PROG_TEST_RUN interface
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [RFC PATCH v6 04/26] x86/fpu/xstate: Introduce XSAVES system states
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2] signal: add procfd_signal() syscall
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH v2] signal: add procfd_signal() syscall
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: pkeys: Reserve PKEY_DISABLE_READ
- From: Ram Pai <linuxram@xxxxxxxxxx>
- Re: [PATCH v2] signal: add procfd_signal() syscall
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- Re: [PATCH v9 2/4] seccomp: switch system call argument type to void *
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH v9 2/4] seccomp: switch system call argument type to void *
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH v9 2/4] seccomp: switch system call argument type to void *
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v9 3/4] seccomp: add a return code to trap to userspace
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v9 2/4] seccomp: switch system call argument type to void *
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v4 1/5] glibc: Perform rseq(2) registration at nptl init and thread creation
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH v2] signal: add procfd_signal() syscall
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH v2] signal: add procfd_signal() syscall
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH v9 3/4] seccomp: add a return code to trap to userspace
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: pkeys: Reserve PKEY_DISABLE_READ
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH 12/11] man-pages: copy_file_range updates
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [PATCH v5 3/4] libbpf: add bpf_prog_test_run_xattr
- From: Lorenz Bauer <lmb@xxxxxxxxxxxxxx>
- [PATCH v5 2/4] tools: sync uapi/linux/bpf.h
- From: Lorenz Bauer <lmb@xxxxxxxxxxxxxx>
- [PATCH v5 4/4] selftests: add a test for bpf_prog_test_run_xattr
- From: Lorenz Bauer <lmb@xxxxxxxxxxxxxx>
- [PATCH v5 1/4] bpf: respect size hint to BPF_PROG_TEST_RUN if present
- From: Lorenz Bauer <lmb@xxxxxxxxxxxxxx>
- [PATCH v5 0/4] Fix unsafe BPF_PROG_TEST_RUN interface
- From: Lorenz Bauer <lmb@xxxxxxxxxxxxxx>
- [PATCH 12/11] man-pages: copy_file_range updates
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] generic/43[014]: copy_range beyond source EOF should fail
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] generic/43[014]: copy_range beyond source EOF should fail
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v9 3/4] seccomp: add a return code to trap to userspace
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v9 2/4] seccomp: switch system call argument type to void *
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v9 1/4] seccomp: hoist struct seccomp_data recalculation higher
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: pkeys: Reserve PKEY_DISABLE_READ
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [PATCH v9 1/4] seccomp: hoist struct seccomp_data recalculation higher
- From: Tycho Andersen <tycho@xxxxxxxx>
- [PATCH v9 2/4] seccomp: switch system call argument type to void *
- From: Tycho Andersen <tycho@xxxxxxxx>
- [PATCH v9 4/4] samples: add an example of seccomp user trap
- From: Tycho Andersen <tycho@xxxxxxxx>
- [PATCH v9 3/4] seccomp: add a return code to trap to userspace
- From: Tycho Andersen <tycho@xxxxxxxx>
- [PATCH v9 0/4] seccomp trap to userspace
- From: Tycho Andersen <tycho@xxxxxxxx>
- [PATCH v4 15/15] fanotify: report FAN_ONDIR to listener with FAN_REPORT_FID
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [PATCH v4 14/15] fanotify: add support for create/attrib/move/delete events
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [PATCH v4 08/15] fanotify: enable FAN_REPORT_FID init flag
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [PATCH v4 07/15] fanotify: copy event fid info to user
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [PATCH v4 00/15] fanotify: add support for more event types
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v2] signal: add procfd_signal() syscall
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH v2] signal: add procfd_signal() syscall
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH v2] signal: add procfd_signal() syscall
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v2] signal: add procfd_signal() syscall
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v3 04/13] fanotify: define the structures to report a unique file identifier
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v2] signal: add procfd_signal() syscall
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH v2] signal: add procfd_signal() syscall
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v2] signal: add procfd_signal() syscall
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2] signal: add procfd_signal() syscall
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2 1/1] prctl: add PR_{GET,SET}_KILL_DESCENDANTS_ON_EXIT
- From: Jürg Billeter <j@xxxxxxxxx>
- Re: [PATCH v2] signal: add procfd_signal() syscall
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2 1/1] prctl: add PR_{GET,SET}_KILL_DESCENDANTS_ON_EXIT
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH v2 1/1] prctl: add PR_{GET,SET}_KILL_DESCENDANTS_ON_EXIT
- From: Jürg Billeter <j@xxxxxxxxx>
- Re: [PATCH v2] signal: add procfd_signal() syscall
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v2] signal: add procfd_signal() syscall
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH v2] signal: add procfd_signal() syscall
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH] prctl: add PR_{GET,SET}_KILL_DESCENDANTS_ON_EXIT
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2] signal: add procfd_signal() syscall
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH v2] signal: add procfd_signal() syscall
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH v2] signal: add procfd_signal() syscall
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v2] signal: add procfd_signal() syscall
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH v2] signal: add procfd_signal() syscall
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v2] signal: add procfd_signal() syscall
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [apparmor] Security modules and sending signals within the same process
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v2] signal: add procfd_signal() syscall
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v2] signal: add procfd_signal() syscall
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v2] signal: add procfd_signal() syscall
- From: Daniel Colascione <dancol@xxxxxxxxxx>
- Re: [PATCH v4 1/2] ptrace: save the type of syscall-stop in ptrace_message
- From: "Dmitry V. Levin" <ldv@xxxxxxxxxxxx>
- Re: [PATCH v2] signal: add procfd_signal() syscall
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH v2] signal: add procfd_signal() syscall
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v2] signal: add procfd_signal() syscall
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH v4 3/4] libbpf: add bpf_prog_test_run_xattr
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: Security modules and sending signals within the same process
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: Security modules and sending signals within the same process
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2] signal: add procfd_signal() syscall
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: Security modules and sending signals within the same process
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3 04/13] fanotify: define the structures to report a unique file identifier
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Security modules and sending signals within the same process
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH v2 1/1] prctl: add PR_{GET,SET}_KILL_DESCENDANTS_ON_EXIT
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH v2] signal: add procfd_signal() syscall
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v4 1/2] ptrace: save the type of syscall-stop in ptrace_message
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH v2 1/1] prctl: add PR_{GET,SET}_KILL_DESCENDANTS_ON_EXIT
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH] prctl: add PR_{GET,SET}_KILL_DESCENDANTS_ON_EXIT
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH v8 1/2] seccomp: add a return code to trap to userspace
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- [PATCH v2 1/1] prctl: add PR_{GET,SET}_KILL_DESCENDANTS_ON_EXIT
- From: Jürg Billeter <j@xxxxxxxxx>
- [PATCH v2 0/1] Add prctl to kill descendants on exit
- From: Jürg Billeter <j@xxxxxxxxx>
- Re: [PATCH v2] signal: add procfd_signal() syscall
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH v2] signal: add procfd_signal() syscall
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2] signal: add procfd_signal() syscall
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- Re: [PATCH v8 1/2] seccomp: add a return code to trap to userspace
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH v2] signal: add procfd_signal() syscall
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v2] signal: add procfd_signal() syscall
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH v4 1/2] ptrace: save the type of syscall-stop in ptrace_message
- From: "Dmitry V. Levin" <ldv@xxxxxxxxxxxx>
- Re: [PATCH v2] signal: add procfd_signal() syscall
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v2] signal: add procfd_signal() syscall
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v2] signal: add procfd_signal() syscall
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH v2] signal: add procfd_signal() syscall
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v2] signal: add procfd_signal() syscall
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH v2] signal: add procfd_signal() syscall
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH] prctl: add PR_{GET,SET}_KILL_DESCENDANTS_ON_EXIT
- From: Jürg Billeter <j@xxxxxxxxx>
- Re: [PATCH v4 1/2] ptrace: save the type of syscall-stop in ptrace_message
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH v4 1/2] ptrace: save the type of syscall-stop in ptrace_message
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH v3 08/13] fanotify: enable FAN_REPORT_FID init flag
- From: Jan Kara <jack@xxxxxxx>
- Re: [PATCH v6 0/1] ns: introduce binfmt_misc namespace
- From: Laurent Vivier <laurent@xxxxxxxxx>
- Re: [PATCH] prctl: add PR_{GET,SET}_KILL_DESCENDANTS_ON_EXIT
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH v2] signal: add procfd_signal() syscall
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: pkeys: Reserve PKEY_DISABLE_READ
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH v3 08/13] fanotify: enable FAN_REPORT_FID init flag
- From: Jan Kara <jack@xxxxxxx>
- Re: [PATCH v3 04/13] fanotify: define the structures to report a unique file identifier
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v3 08/13] fanotify: enable FAN_REPORT_FID init flag
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v4 1/2] ptrace: save the type of syscall-stop in ptrace_message
- From: "Dmitry V. Levin" <ldv@xxxxxxxxxxxx>
- Re: [PATCH v3 04/13] fanotify: define the structures to report a unique file identifier
- From: Jan Kara <jack@xxxxxxx>
- Re: [PATCH v3 08/13] fanotify: enable FAN_REPORT_FID init flag
- From: Jan Kara <jack@xxxxxxx>
- Re: [PATCH v3 04/13] fanotify: define the structures to report a unique file identifier
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v3 04/13] fanotify: define the structures to report a unique file identifier
- From: Jan Kara <jack@xxxxxxx>
- Re: [PATCH v4 1/2] ptrace: save the type of syscall-stop in ptrace_message
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v1 2/2] signal: add procfd_signal() syscall
- From: Joey Pabalinas <joeypabalinas@xxxxxxxxx>
- Re: [PATCH v4 1/2] ptrace: save the type of syscall-stop in ptrace_message
- From: "Dmitry V. Levin" <ldv@xxxxxxxxxxxx>
- Re: [PATCH v1 2/2] signal: add procfd_signal() syscall
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH v1 2/2] signal: add procfd_signal() syscall
- From: Joey Pabalinas <joeypabalinas@xxxxxxxxx>
- Re: [PATCH] procfd_signal.2: document procfd_signal syscall
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH] procfd_signal.2: document procfd_signal syscall
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: extending wait4(2) or waitid(2) linux syscall
- From: Daniel Colascione <dancol@xxxxxxxxxx>
- Re: [PATCH v3 04/13] fanotify: define the structures to report a unique file identifier
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v3 04/13] fanotify: define the structures to report a unique file identifier
- From: Jan Kara <jack@xxxxxxx>
- [PATCH v4 4/4] selftests: add a test for bpf_prog_test_run_xattr
- From: Lorenz Bauer <lmb@xxxxxxxxxxxxxx>
- [PATCH v4 3/4] libbpf: add bpf_prog_test_run_xattr
- From: Lorenz Bauer <lmb@xxxxxxxxxxxxxx>
- [PATCH v4 2/4] tools: sync uapi/linux/bpf.h
- From: Lorenz Bauer <lmb@xxxxxxxxxxxxxx>
- [PATCH v4 1/4] bpf: respect size hint to BPF_PROG_TEST_RUN if present
- From: Lorenz Bauer <lmb@xxxxxxxxxxxxxx>
- [PATCH v4 0/4] Fix unsafe BPF_PROG_TEST_RUN interface
- From: Lorenz Bauer <lmb@xxxxxxxxxxxxxx>
- Re: [PATCH v3 3/4] libbpf: add bpf_prog_test_run_xattr
- From: Lorenz Bauer <lmb@xxxxxxxxxxxxxx>
- Re: [PATCH v3 04/13] fanotify: define the structures to report a unique file identifier
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v3 04/13] fanotify: define the structures to report a unique file identifier
- From: Jan Kara <jack@xxxxxxx>
- Re: [PATCH] prctl: add PR_{GET,SET}_KILL_DESCENDANTS_ON_EXIT
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v4 1/2] ptrace: save the type of syscall-stop in ptrace_message
- From: "Dmitry V. Levin" <ldv@xxxxxxxxxxxx>
- Re: [PATCH] prctl: add PR_{GET,SET}_KILL_DESCENDANTS_ON_EXIT
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH v4 2/2] ptrace: add PTRACE_GET_SYSCALL_INFO request
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH v4 1/2] ptrace: save the type of syscall-stop in ptrace_message
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH v4 2/2] ptrace: add PTRACE_GET_SYSCALL_INFO request
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH v2] signal: add procfd_signal() syscall
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v4 1/2] ptrace: save the type of syscall-stop in ptrace_message
- From: "Dmitry V. Levin" <ldv@xxxxxxxxxxxx>
- Re: [PATCH v4 1/2] ptrace: save the type of syscall-stop in ptrace_message
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- RE: Official Linux system wrapper library?
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [RFC PATCH RESEND v3 3/3] ptrace: add PTRACE_EVENT_SECCOMP support to PTRACE_GET_SYSCALL_INFO
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- [PATCH v4 2/2] ptrace: add PTRACE_GET_SYSCALL_INFO request
- From: "Dmitry V. Levin" <ldv@xxxxxxxxxxxx>
- [PATCH v4 1/2] ptrace: save the type of syscall-stop in ptrace_message
- From: "Dmitry V. Levin" <ldv@xxxxxxxxxxxx>
- [PATCH v4 0/2] ptrace: add PTRACE_GET_SYSCALL_INFO request
- From: "Dmitry V. Levin" <ldv@xxxxxxxxxxxx>
- Re: [RFC PATCH RESEND v3 3/3] ptrace: add PTRACE_EVENT_SECCOMP support to PTRACE_GET_SYSCALL_INFO
- From: "Dmitry V. Levin" <ldv@xxxxxxxxxxxx>
- Re: [RFC PATCH RESEND v3 3/3] ptrace: add PTRACE_EVENT_SECCOMP support to PTRACE_GET_SYSCALL_INFO
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: extending wait4(2) or waitid(2) linux syscall
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: extending wait4(2) or waitid(2) linux syscall
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: extending wait4(2) or waitid(2) linux syscall
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH v3 3/4] libbpf: add bpf_prog_test_run_xattr
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [RFC PATCH RESEND v3 3/3] ptrace: add PTRACE_EVENT_SECCOMP support to PTRACE_GET_SYSCALL_INFO
- From: "Dmitry V. Levin" <ldv@xxxxxxxxxxxx>
- [PATCH] prctl: add PR_{GET,SET}_KILL_DESCENDANTS_ON_EXIT
- From: Jürg Billeter <j@xxxxxxxxx>
- [PATCH 0/1] Add prctl to kill descendants on exit
- From: Jürg Billeter <j@xxxxxxxxx>
- Re: [RFC PATCH v2] ptrace: add PTRACE_GET_SYSCALL_INFO request
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC PATCH 3/3] mm, proc: report PR_SET_THP_DISABLE in proc
- From: William Kucharski <william.kucharski@xxxxxxxxxx>
- Re: [RFC PATCH 3/3] mm, proc: report PR_SET_THP_DISABLE in proc
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [RFC PATCH 3/3] mm, proc: report PR_SET_THP_DISABLE in proc
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: pkeys: Reserve PKEY_DISABLE_READ
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC PATCH 3/3] mm, proc: report PR_SET_THP_DISABLE in proc
- From: William Kucharski <william.kucharski@xxxxxxxxxx>
- Re: [RFC PATCH 3/3] mm, proc: report PR_SET_THP_DISABLE in proc
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [RFC PATCH RESEND v3 3/3] ptrace: add PTRACE_EVENT_SECCOMP support to PTRACE_GET_SYSCALL_INFO
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: pkeys: Reserve PKEY_DISABLE_READ
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: pkeys: Reserve PKEY_DISABLE_READ
- From: Ram Pai <linuxram@xxxxxxxxxx>
- Re: [PATCH RESEND v3 1/3] ptrace: pass type of a syscall-stop in ptrace_message
- From: "Dmitry V. Levin" <ldv@xxxxxxxxxxxx>
- Re: [RFC PATCH RESEND v3 3/3] ptrace: add PTRACE_EVENT_SECCOMP support to PTRACE_GET_SYSCALL_INFO
- From: "Dmitry V. Levin" <ldv@xxxxxxxxxxxx>
- Re: [RFC PATCH RESEND v3 3/3] ptrace: add PTRACE_EVENT_SECCOMP support to PTRACE_GET_SYSCALL_INFO
- From: Elvira Khabirova <lineprinter@xxxxxxxxxxxx>
- Re: [PATCH RESEND v3 1/3] ptrace: pass type of a syscall-stop in ptrace_message
- From: Elvira Khabirova <lineprinter@xxxxxxxxxxxx>
- Re: [RFC PATCH 3/3] mm, proc: report PR_SET_THP_DISABLE in proc
- From: William Kucharski <william.kucharski@xxxxxxxxxx>
- Re: RFC: userspace exception fixups
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v4 1/5] glibc: Perform rseq(2) registration at nptl init and thread creation
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [RFC PATCH v6 00/26] Control-flow Enforcement: Shadow Stack
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [RFC PATCH v6 00/26] Control-flow Enforcement: Shadow Stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: extending wait4(2) or waitid(2) linux syscall
- From: Daniel Colascione <dancol@xxxxxxxxxx>
- Re: extending wait4(2) or waitid(2) linux syscall
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [RFC PATCH v4 1/5] glibc: Perform rseq(2) registration at nptl init and thread creation
- From: Rich Felker <dalias@xxxxxxxx>
- Re: [RFC PATCH v4 1/5] glibc: Perform rseq(2) registration at nptl init and thread creation
- From: Rich Felker <dalias@xxxxxxxx>
- Re: [RFC PATCH v4 1/5] glibc: Perform rseq(2) registration at nptl init and thread creation
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [RFC PATCH v4 1/5] glibc: Perform rseq(2) registration at nptl init and thread creation
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [RFC PATCH v4 1/5] glibc: Perform rseq(2) registration at nptl init and thread creation
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: extending wait4(2) or waitid(2) linux syscall
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH RESEND v3 1/3] ptrace: pass type of a syscall-stop in ptrace_message
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [RFC PATCH RESEND v3 3/3] ptrace: add PTRACE_EVENT_SECCOMP support to PTRACE_GET_SYSCALL_INFO
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: RFC: userspace exception fixups
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- Re: [PATCH v3 3/4] libbpf: add bpf_prog_test_run_xattr
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- Re: [PATCH -next 1/2] mm/memfd: make F_SEAL_FUTURE_WRITE seal more robust
- From: Joel Fernandes <joel@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/4] libbpf: add bpf_prog_test_run_xattr
- From: Lorenz Bauer <lmb@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v4 1/5] glibc: Perform rseq(2) registration at nptl init and thread creation
- From: Szabolcs Nagy <Szabolcs.Nagy@xxxxxxx>
- Re: [RFC PATCH v4 1/5] glibc: Perform rseq(2) registration at nptl init and thread creation
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH] Add /proc/pid_generation
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH] Add /proc/pid_generation
- From: Pavel Machek <pavel@xxxxxx>
- [PATCH v3 13/13] fanotify: report FAN_ONDIR to listener with FAN_REPORT_FID
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [PATCH v3 12/13] fanotify: add support for create/attrib/move/delete events
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [PATCH v3 08/13] fanotify: enable FAN_REPORT_FID init flag
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [PATCH v3 04/13] fanotify: define the structures to report a unique file identifier
- From: Amir Goldstein <amir73il@xxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Linux SCSI]
[Samba]
[Yosemite News]