Linux API
[Prev Page][Next Page]
- memory hotplug and force_remove
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [PATCH] statx: reject unknown flags when using NULL path
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH 5/8] nowait aio: return on congested block device
- From: Jan Kara <jack@xxxxxxx>
- Re: [PATCH] statx: reject unknown flags when using NULL path
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [RFC] Add option to mount only a pids subset
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- Re: [net-next PATCH 0/5] Add busy poll support for epoll under certain circumstances
- From: Michael Kerrisk <mtk.manpages@xxxxxxxxx>
- Re: binfmts.h MAX_ARG_STRINGS excessive value allows heap spraying
- From: Leonard den Ottolander <leonard-lists@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 5/8] nowait aio: return on congested block device
- From: Goldwyn Rodrigues <rgoldwyn@xxxxxxx>
- Re: [PATCH 5/8] nowait aio: return on congested block device
- From: Goldwyn Rodrigues <rgoldwyn@xxxxxxx>
- Re: [patch 1/3] procfs: fdinfo -- Extend information about epoll target files
- From: Cyrill Gorcunov <gorcunov@xxxxxxxxx>
- Re: [patch 1/3] procfs: fdinfo -- Extend information about epoll target files
- From: Andrei Vagin <avagin@xxxxxxxxxxxxx>
- Re: [PATCH 5/8] nowait aio: return on congested block device
- From: Ming Lei <tom.leiming@xxxxxxxxx>
- Re: [PATCH 5/8] nowait aio: return on congested block device
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH 5/8] nowait aio: return on congested block device
- From: Jens Axboe <axboe@xxxxxxxxx>
- Re: [PATCH 3/8] nowait aio: return if direct write will trigger writeback
- From: Goldwyn Rodrigues <rgoldwyn@xxxxxxx>
- Re: [PATCH 3/8] nowait aio: return if direct write will trigger writeback
- From: Goldwyn Rodrigues <rgoldwyn@xxxxxxx>
- Re: [PATCH 3/8] nowait aio: return if direct write will trigger writeback
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH 3/8] nowait aio: return if direct write will trigger writeback
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- [PATCH 2/8] nowait aio: Return if cannot get hold of i_rwsem
- From: Goldwyn Rodrigues <rgoldwyn@xxxxxxx>
- [PATCH 1/8] nowait aio: Introduce IOCB_RW_FLAG_NOWAIT
- From: Goldwyn Rodrigues <rgoldwyn@xxxxxxx>
- [PATCH 7/8] nowait aio: xfs
- From: Goldwyn Rodrigues <rgoldwyn@xxxxxxx>
- [PATCH 8/8] nowait aio: btrfs
- From: Goldwyn Rodrigues <rgoldwyn@xxxxxxx>
- [PATCH 3/8] nowait aio: return if direct write will trigger writeback
- From: Goldwyn Rodrigues <rgoldwyn@xxxxxxx>
- [PATCH 4/8] nowait-aio: Introduce IOMAP_NOWAIT
- From: Goldwyn Rodrigues <rgoldwyn@xxxxxxx>
- [PATCH 6/8] nowait aio: ext4
- From: Goldwyn Rodrigues <rgoldwyn@xxxxxxx>
- [PATCH 5/8] nowait aio: return on congested block device
- From: Goldwyn Rodrigues <rgoldwyn@xxxxxxx>
- [PATCH 0/8 v3] No wait AIO
- From: Goldwyn Rodrigues <rgoldwyn@xxxxxxx>
- Re: WTH is going on with memory hotplug sysf interface (was: Re: [RFC PATCH] mm, hotplug: get rid of auto_online_blocks)
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [RFC PATCH] mm, hotplug: get rid of auto_online_blocks
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: select fails to verify all file descriptors are valid
- From: "Carlos O'Donell" <carlos@xxxxxxxxxx>
- Re: [RFC 1/2] fanotify: new event FAN_MODIFY_DIR
- From: Michael Kerrisk <mtk.manpages@xxxxxxxxx>
- Re: WTH is going on with memory hotplug sysf interface (was: Re: [RFC PATCH] mm, hotplug: get rid of auto_online_blocks)
- From: Andrea Arcangeli <aarcange@xxxxxxxxxx>
- Re: [PATCH net-next RFC v1 00/27] afnetns: new namespace type for separation on protocol level
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: WTH is going on with memory hotplug sysf interface
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- select fails to verify all file descriptors are valid
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: WTH is going on with memory hotplug sysf interface
- From: YASUAKI ISHIMATSU <yasu.isimatu@xxxxxxxxx>
- Re: [PATCH] ioctl_list.2: BLKRASET/BLKRAGET take unsigned long
- From: Cyril Hrubis <chrubis@xxxxxxx>
- Re: [RFC PATCH] mm, hotplug: get rid of auto_online_blocks
- From: Igor Mammedov <imammedo@xxxxxxxxxx>
- Re: [PATCH net-next RFC v1 00/27] afnetns: new namespace type for separation on protocol level
- From: Hannes Frederic Sowa <hannes@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 10/13] mm: Introduce first class virtual address spaces
- From: Till Smejkal <till.smejkal@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 10/13] mm: Introduce first class virtual address spaces
- From: Vineet Gupta <Vineet.Gupta1@xxxxxxxxxxxx>
- Re: binfmts.h MAX_ARG_STRINGS excessive value allows heap spraying
- From: "Carlos O'Donell" <carlos@xxxxxxxxxx>
- Re: WTH is going on with memory hotplug sysf interface (was: Re: [RFC PATCH] mm, hotplug: get rid of auto_online_blocks)
- From: Andi Kleen <ak@xxxxxxxxxxxxxxx>
- Re: [PATCH net-next RFC v1 00/27] afnetns: new namespace type for separation on protocol level
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v3 2/4] x86/syscalls: Specific usage of verify_pre_usermode_state
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH net-next RFC v1 00/27] afnetns: new namespace type for separation on protocol level
- From: Michael Kerrisk <mtk.manpages@xxxxxxxxx>
- Re: [patch 2/3] kcmp: Add KCMP_EPOLL_TFD mode to compare epoll target files
- From: Cyrill Gorcunov <gorcunov@xxxxxxxxx>
- Re: [patch 2/3] kcmp: Add KCMP_EPOLL_TFD mode to compare epoll target files
- From: Andrei Vagin <avagin@xxxxxxxxxxxxx>
- Re: [RFC] Add option to mount only a pids subset
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: WTH is going on with memory hotplug sysf interface (was: Re: [RFC PATCH] mm, hotplug: get rid of auto_online_blocks)
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [RFC PATCH] mm, hotplug: get rid of auto_online_blocks
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: WTH is going on with memory hotplug sysf interface (was: Re: [RFC PATCH] mm, hotplug: get rid of auto_online_blocks)
- From: Reza Arbab <arbab@xxxxxxxxxxxxxxxxxx>
- Re: WTH is going on with memory hotplug sysf interface (was: Re: [RFC PATCH] mm, hotplug: get rid of auto_online_blocks)
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [RFC PATCH] mm, hotplug: get rid of auto_online_blocks
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [patch 2/3] kcmp: Add KCMP_EPOLL_TFD mode to compare epoll target files
- From: Cyrill Gorcunov <gorcunov@xxxxxxxxx>
- Re: WTH is going on with memory hotplug sysf interface (was: Re: [RFC PATCH] mm, hotplug: get rid of auto_online_blocks)
- From: Igor Mammedov <imammedo@xxxxxxxxxx>
- Re: [RFC PATCH] mm, hotplug: get rid of auto_online_blocks
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [RFC] Add option to mount only a pids subset
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] mm, hotplug: get rid of auto_online_blocks
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [RFC PATCH] mm, hotplug: get rid of auto_online_blocks
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [RFC PATCH] mm, hotplug: get rid of auto_online_blocks
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [RFC PATCH] mm, hotplug: get rid of auto_online_blocks
- From: Igor Mammedov <imammedo@xxxxxxxxxx>
- Re: WTH is going on with memory hotplug sysf interface (was: Re: [RFC PATCH] mm, hotplug: get rid of auto_online_blocks)
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: WTH is going on with memory hotplug sysf interface (was: Re: [RFC PATCH] mm, hotplug: get rid of auto_online_blocks)
- From: Igor Mammedov <imammedo@xxxxxxxxxx>
- Re: WTH is going on with memory hotplug sysf interface (was: Re: [RFC PATCH] mm, hotplug: get rid of auto_online_blocks)
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: WTH is going on with memory hotplug sysf interface
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [RFC] Add option to mount only a pids subset
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RFC] Add option to mount only a pids subset
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [RFC] Add option to mount only a pids subset
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [RFC] Add option to mount only a pids subset
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH] statx: reject unknown flags when using NULL path
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [RFC] Add option to mount only a pids subset
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- Re: [RFC] Add option to mount only a pids subset
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- Re: [RFC PATCH] mm, hotplug: get rid of auto_online_blocks
- From: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
- Re: WTH is going on with memory hotplug sysf interface (was: Re: [RFC PATCH] mm, hotplug: get rid of auto_online_blocks)
- From: Reza Arbab <arbab@xxxxxxxxxxxxxxxxxx>
- Re: WTH is going on with memory hotplug sysf interface
- From: Yasuaki Ishimatsu <yasu.isimatu@xxxxxxxxx>
- Re: WTH is going on with memory hotplug sysf interface (was: Re: [RFC PATCH] mm, hotplug: get rid of auto_online_blocks)
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- WTH is going on with memory hotplug sysf interface (was: Re: [RFC PATCH] mm, hotplug: get rid of auto_online_blocks)
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: binfmts.h MAX_ARG_STRINGS excessive value allows heap spraying
- From: Leonard den Ottolander <leonard-lists@xxxxxxxxxxxxxxxxx>
- [patch 1/3] procfs: fdinfo -- Extend information about epoll target files
- From: Cyrill Gorcunov <gorcunov@xxxxxxxxxx>
- [patch 0/3] fs,epoll: Add ability to call kcmp to find target files
- From: Cyrill Gorcunov <gorcunov@xxxxxxxxxx>
- [patch 2/3] kcmp: Add KCMP_EPOLL_TFD mode to compare epoll target files
- From: Cyrill Gorcunov <gorcunov@xxxxxxxxxx>
- Re: binfmts.h MAX_ARG_STRINGS excessive value allows heap spraying
- From: "Carlos O'Donell" <carlos@xxxxxxxxxx>
- Re: binfmts.h MAX_ARG_STRINGS excessive value allows heap spraying
- From: Joseph Myers <joseph@xxxxxxxxxxxxxxxx>
- Re: [RFC] Add option to mount only a pids subset
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: binfmts.h MAX_ARG_STRINGS excessive value allows heap spraying
- From: "Carlos O'Donell" <carlos@xxxxxxxxxx>
- Re: binfmts.h MAX_ARG_STRINGS excessive value allows heap spraying
- From: "Carlos O'Donell" <carlos@xxxxxxxxxx>
- Re: binfmts.h MAX_ARG_STRINGS excessive value allows heap spraying
- From: Leonard den Ottolander <leonard-lists@xxxxxxxxxxxxxxxxx>
- Re: binfmts.h MAX_ARG_STRINGS excessive value allows heap spraying
- From: Leonard den Ottolander <leonard-lists@xxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] mm, hotplug: get rid of auto_online_blocks
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [RFC] Add option to mount only a pids subset
- From: Djalal Harouni <tixxdz@xxxxxxxxx>
- Re: binfmts.h MAX_ARG_STRINGS excessive value allows heap spraying
- From: "Carlos O'Donell" <carlos@xxxxxxxxxx>
- Re: [musl] Re: [PATCH resent] uapi libc compat: allow non-glibc to opt out of uapi definitions
- From: Rich Felker <dalias@xxxxxxxxxx>
- Re: [PATCH resent] uapi libc compat: allow non-glibc to opt out of uapi definitions
- From: Szabolcs Nagy <nsz@xxxxxxxxxx>
- Re: [PATCH resent] uapi libc compat: allow non-glibc to opt out of uapi definitions
- From: "Carlos O'Donell" <carlos@xxxxxxxxxx>
- [PATCH v1 2/4] x86/syscalls: Specific usage of verify_pre_usermode_state
- From: Thomas Garnier <thgarnie@xxxxxxxxxx>
- Re: [PATCH v1 3/4] arm/syscalls: Specific usage of verify_pre_usermode_state
- From: Nicolas Pitre <nicolas.pitre@xxxxxxxxxx>
- [PATCH v1 3/4] arm/syscalls: Specific usage of verify_pre_usermode_state
- From: Thomas Garnier <thgarnie@xxxxxxxxxx>
- [PATCH v1 4/4] arm64/syscalls: Specific usage of verify_pre_usermode_state
- From: Thomas Garnier <thgarnie@xxxxxxxxxx>
- [PATCH v1 1/4] syscalls: Restore address limit after a syscall
- From: Thomas Garnier <thgarnie@xxxxxxxxxx>
- Re: binfmts.h MAX_ARG_STRINGS excessive value allows heap spraying
- From: "Carlos O'Donell" <carlos@xxxxxxxxxx>
- Re: [PATCH v1 1/4] syscalls: Restore address limit after a syscall
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH v1 3/4] arm/syscalls: Specific usage of verify_pre_usermode_state
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: binfmts.h MAX_ARG_STRINGS excessive value allows heap spraying
- From: Joseph Myers <joseph@xxxxxxxxxxxxxxxx>
- Re: binfmts.h MAX_ARG_STRINGS excessive value allows heap spraying
- From: Leonard den Ottolander <leonard-lists@xxxxxxxxxxxxxxxxx>
- [resend PATCH 1/2] eventpoll.h: fix epoll event masks
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: binfmts.h MAX_ARG_STRINGS excessive value allows heap spraying
- From: Leonard den Ottolander <leonard@xxxxxxxxxxxxxxxxx>
- Re: binfmts.h MAX_ARG_STRINGS excessive value allows heap spraying
- From: Leonard den Ottolander <leonard-lists@xxxxxxxxxxxxxxxxx>
- Re: opaque types instead of union epoll_data
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [musl] Re: [PATCH resent] uapi libc compat: allow non-glibc to opt out of uapi definitions
- From: "Carlos O'Donell" <carlos@xxxxxxxxxx>
- Re: opaque types instead of union epoll_data
- From: "Carlos O'Donell" <carlos@xxxxxxxxxx>
- Re: [musl] Re: [PATCH resent] uapi libc compat: allow non-glibc to opt out of uapi definitions
- From: Rich Felker <dalias@xxxxxxxxxx>
- Re: [PATCH resent] uapi libc compat: allow non-glibc to opt out of uapi definitions
- From: "Carlos O'Donell" <carlos@xxxxxxxxxx>
- Re: [PATCH resent] uapi libc compat: allow non-glibc to opt out of uapi definitions
- From: "Carlos O'Donell" <carlos@xxxxxxxxxx>
- Re: [PATCH resent] uapi libc compat: allow non-glibc to opt out of uapi definitions
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: opaque types instead of union epoll_data
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Add option to mount only a pids subset
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [RFC] Add option to mount only a pids subset
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: opaque types instead of union epoll_data
- From: "Carlos O'Donell" <carlos@xxxxxxxxxx>
- binfmts.h MAX_ARG_STRINGS excessive value allows heap spraying
- From: Leonard den Ottolander <leonard-lists@xxxxxxxxxxxxxxxxx>
- opaque types instead of union epoll_data
- From: Sodagudi Prasad <psodagud@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] mm, hotplug: get rid of auto_online_blocks
- From: Igor Mammedov <imammedo@xxxxxxxxxx>
- [RFC] Add option to mount only a pids subset
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH] [media] lirc: introduce LIRC_SET_POLL_MODE
- From: Sean Young <sean@xxxxxxxx>
- Re: [RFC PATCH] mm, hotplug: get rid of auto_online_blocks
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [PATCHv3 33/33] mm, x86: introduce PR_SET_MAX_VADDR and PR_GET_MAX_VADDR
- From: Dmitry Safonov <dsafonov@xxxxxxxxxxxxx>
- Re: [PATCHv3 33/33] mm, x86: introduce PR_SET_MAX_VADDR and PR_GET_MAX_VADDR
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCHv3 33/33] mm, x86: introduce PR_SET_MAX_VADDR and PR_GET_MAX_VADDR
- From: Dmitry Safonov <0x7f454c46@xxxxxxxxx>
- Re: [PATCH 0/2] fix the traced mt-exec deadlock
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [RFC][PATCH] exec: Don't wait for ptraced threads to be reaped.
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH 0/2] fix the traced mt-exec deadlock
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 0/2] fix the traced mt-exec deadlock
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [RFC][PATCH] exec: Don't wait for ptraced threads to be reaped.
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 0/2] fix the traced mt-exec deadlock
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC PATCH] mm, hotplug: get rid of auto_online_blocks
- From: Igor Mammedov <imammedo@xxxxxxxxxx>
- Re: [PATCH 0/7] Non-blocking AIO
- From: Michael Kerrisk <mtk.manpages@xxxxxxxxx>
- Re: [RFC PATCH] mm, hotplug: get rid of auto_online_blocks
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [PATCH v5 06/10] seccomp,landlock: Handle Landlock events per process hierarchy
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [kernel-hardening] [PATCH v5 06/10] seccomp,landlock: Handle Landlock events per process hierarchy
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v5 06/10] seccomp,landlock: Handle Landlock events per process hierarchy
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v5 06/10] seccomp,landlock: Handle Landlock events per process hierarchy
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH RFC v2 00/12] socket sendmsg MSG_ZEROCOPY
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] mm, hotplug: get rid of auto_online_blocks
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [RFC PATCH] mm, hotplug: get rid of auto_online_blocks
- From: Igor Mammedov <imammedo@xxxxxxxxxx>
- Re: [PATCH v5 06/10] seccomp,landlock: Handle Landlock events per process hierarchy
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH 1/5] selftests: Fix selftests build to just build, not run tests
- From: Shuah Khan <shuahkh@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH] mm, hotplug: get rid of auto_online_blocks
- From: Igor Mammedov <imammedo@xxxxxxxxxx>
- Re: [PATCH v3 17/19] [media] lirc: implement reading scancode
- From: Sean Young <sean@xxxxxxxx>
- Re: [kernel-hardening] [PATCH v5 06/10] seccomp,landlock: Handle Landlock events per process hierarchy
- From: Djalal Harouni <tixxdz@xxxxxxxxx>
- Re: [RFC v2 2/3] kcmp: Add KCMP_EPOLL_TFD mode to compare epoll target files
- From: Cyrill Gorcunov <gorcunov@xxxxxxxxx>
- Re: [PATCH 1/5] selftests: Fix selftests build to just build, not run tests
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [RFC v2 2/3] kcmp: Add KCMP_EPOLL_TFD mode to compare epoll target files
- From: Andrei Vagin <avagin@xxxxxxxxxxxxx>
- Re: [PATCH v5 06/10] seccomp,landlock: Handle Landlock events per process hierarchy
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v5 06/10] seccomp,landlock: Handle Landlock events per process hierarchy
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v5 03/10] bpf: Define handle_fs and add a new helper bpf_handle_fs_get_mode()
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v5 06/10] seccomp,landlock: Handle Landlock events per process hierarchy
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH 1/5] selftests: Fix selftests build to just build, not run tests
- From: Shuah Khan <shuahkh@xxxxxxxxxxxxxxx>
- Re: [RFC] failure atomic writes for file systems and block devices
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [RFC] failure atomic writes for file systems and block devices
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v5 03/10] bpf: Define handle_fs and add a new helper bpf_handle_fs_get_mode()
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 1/2] vfs: implement fchmodat2() syscall
- From: Michael Kerrisk <mtk.manpages@xxxxxxxxx>
- Re: [PATCH] mnt: allow to add a mount into an existing group
- From: Andrei Vagin <avagin@xxxxxxxxxxxxx>
- Re: [PATCH RFC v2 00/12] socket sendmsg MSG_ZEROCOPY
- From: Willem de Bruijn <willemdebruijn.kernel@xxxxxxxxx>
- Re: [PATCH RFC v2 00/12] socket sendmsg MSG_ZEROCOPY
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Re: [PATCH RFC v2 00/12] socket sendmsg MSG_ZEROCOPY
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH RFC v2 00/12] socket sendmsg MSG_ZEROCOPY
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH RFC v2 00/12] socket sendmsg MSG_ZEROCOPY
- From: Tom Herbert <tom@xxxxxxxxxxxxxxx>
- Re: [PATCH RFC v2 00/12] socket sendmsg MSG_ZEROCOPY
- From: Tom Herbert <tom@xxxxxxxxxxxxxxx>
- Re: [PATCH RFC v2 00/12] socket sendmsg MSG_ZEROCOPY
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v2 00/12] socket sendmsg MSG_ZEROCOPY
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Re: [PATCH RFC v2 00/12] socket sendmsg MSG_ZEROCOPY
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Re: [PATCH RFC v2 00/12] socket sendmsg MSG_ZEROCOPY
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Re: [PATCH RFC v2 00/12] socket sendmsg MSG_ZEROCOPY
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v2 00/12] socket sendmsg MSG_ZEROCOPY
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Re: [PATCH RFC v2 00/12] socket sendmsg MSG_ZEROCOPY
- From: Willem de Bruijn <willemdebruijn.kernel@xxxxxxxxx>
- Re: [PATCH RFC v2 00/12] socket sendmsg MSG_ZEROCOPY
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v2 00/12] socket sendmsg MSG_ZEROCOPY
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v2 00/12] socket sendmsg MSG_ZEROCOPY
- From: Willem de Bruijn <willemdebruijn.kernel@xxxxxxxxx>
- Re: [PATCH v5 06/10] seccomp,landlock: Handle Landlock events per process hierarchy
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v2 00/12] socket sendmsg MSG_ZEROCOPY
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- [RFC v2 2/3] kcmp: Add KCMP_EPOLL_TFD mode to compare epoll target files
- From: Cyrill Gorcunov <gorcunov@xxxxxxxxx>
- Re: [RFC 0/3] fs,epoll: Add ability to call kcmp to find target files
- From: Cyrill Gorcunov <gorcunov@xxxxxxxxx>
- Re: [RFC PATCH] mm, hotplug: get rid of auto_online_blocks
- From: Heiko Carstens <heiko.carstens@xxxxxxxxxx>
- Re: [RFC 2/3] kcmp: Add KCMP_EPOLL_TFD mode to compare epoll target files
- From: Cyrill Gorcunov <gorcunov@xxxxxxxxx>
- Re: [RFC PATCH] mm, hotplug: get rid of auto_online_blocks
- From: Reza Arbab <arbab@xxxxxxxxxxxxxxxxxx>
- Re: [RFC 2/3] kcmp: Add KCMP_EPOLL_TFD mode to compare epoll target files
- From: Andrei Vagin <avagin@xxxxxxxxxxxxx>
- Re: [PATCH] Add pidfs filesystem
- From: Michael Kerrisk <mtk.manpages@xxxxxxxxx>
- Re: [PATCH RFC v2 00/12] socket sendmsg MSG_ZEROCOPY
- From: Michael Kerrisk <mtk.manpages@xxxxxxxxx>
- Re: [RFC PATCH] mm, hotplug: get rid of auto_online_blocks
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [RFC PATCH] mm, hotplug: get rid of auto_online_blocks
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [RFC PATCH] mm, hotplug: get rid of auto_online_blocks
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [RFC PATCH] mm, hotplug: get rid of auto_online_blocks
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [RFC PATCH] mm, hotplug: get rid of auto_online_blocks
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [RFC PATCH] mm, hotplug: get rid of auto_online_blocks
- From: Heiko Carstens <heiko.carstens@xxxxxxxxxx>
- Re: [RFC PATCH] mm, hotplug: get rid of auto_online_blocks
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [RFC PATCH] mm, hotplug: get rid of auto_online_blocks
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [RFC PATCH] mm, hotplug: get rid of auto_online_blocks
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [RFC PATCH] mm, hotplug: get rid of auto_online_blocks
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [PATCH v5 07/10] bpf: Add a Landlock sandbox example
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [GIT PULL] namespaces related fixes for v4.11-rc1
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [GIT PULL] namespaces related fixes for v4.11-rc1
- From: Aleksa Sarai <asarai@xxxxxxx>
- Re: [GIT PULL] namespaces related fixes for v4.11-rc1
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [GIT PULL] namespaces related fixes for v4.11-rc1
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [GIT PULL] namespaces related fixes for v4.11-rc1
- From: Aleksa Sarai <asarai@xxxxxxx>
- Re: [PATCH v3 0/4] Improved seccomp logging
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCHv3 33/33] mm, x86: introduce PR_SET_MAX_VADDR and PR_GET_MAX_VADDR
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [RFC 1/3] procfs: fdinfo -- Extend information about epoll target files
- From: Cyrill Gorcunov <gorcunov@xxxxxxxxx>
- Re: [RFC 1/3] procfs: fdinfo -- Extend information about epoll target files
- From: Pavel Emelyanov <xemul@xxxxxxxxxxxxx>
- Re: [RFC 1/3] procfs: fdinfo -- Extend information about epoll target files
- From: Cyrill Gorcunov <gorcunov@xxxxxxxxx>
- Re: [RFC 1/3] procfs: fdinfo -- Extend information about epoll target files
- From: Pavel Emelyanov <xemul@xxxxxxxxxxxxx>
- Re: [RFC 1/3] procfs: fdinfo -- Extend information about epoll target files
- From: Cyrill Gorcunov <gorcunov@xxxxxxxxx>
- Re: [PATCH v5 10/10] landlock: Add user and kernel documentation for Landlock
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RFC 1/3] procfs: fdinfo -- Extend information about epoll target files
- From: Pavel Emelyanov <xemul@xxxxxxxxxxxxx>
- Re: [PATCH v5 10/10] landlock: Add user and kernel documentation for Landlock
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- [PATCH v5 00/10] Landlock LSM: Toward unprivileged sandboxing
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v5 02/10] bpf,landlock: Define an eBPF program type for Landlock
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v5 08/10] seccomp: Enhance test_harness with an assert step mechanism
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v5 05/10] seccomp: Split put_seccomp_filter() with put_seccomp()
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v5 06/10] seccomp,landlock: Handle Landlock events per process hierarchy
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v5 09/10] bpf,landlock: Add tests for Landlock
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v5 03/10] bpf: Define handle_fs and add a new helper bpf_handle_fs_get_mode()
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v5 10/10] landlock: Add user and kernel documentation for Landlock
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v5 04/10] landlock: Add LSM hooks related to filesystem
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v5 07/10] bpf: Add a Landlock sandbox example
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v5 01/10] bpf: Add eBPF program subtype and is_valid_subtype() verifier
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH] ioctl_getfsmap.2: document the GETFSMAP ioctl
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- Re: [RFC 0/3] fs,epoll: Add ability to call kcmp to find target files
- From: Cyrill Gorcunov <gorcunov@xxxxxxxxx>
- Re: [PATCHv3 33/33] mm, x86: introduce PR_SET_MAX_VADDR and PR_GET_MAX_VADDR
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC 0/3] fs,epoll: Add ability to call kcmp to find target files
- From: Jason Baron <jbaron@xxxxxxxxxx>
- Re: [RFC 1/3] procfs: fdinfo -- Extend information about epoll target files
- From: Cyrill Gorcunov <gorcunov@xxxxxxxxx>
- Re: [RFC 1/3] procfs: fdinfo -- Extend information about epoll target files
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- [RFC 2/3] kcmp: Add KCMP_EPOLL_TFD mode to compare epoll target files
- From: Cyrill Gorcunov <gorcunov@xxxxxxxxxx>
- [RFC 0/3] fs,epoll: Add ability to call kcmp to find target files
- From: Cyrill Gorcunov <gorcunov@xxxxxxxxxx>
- [RFC 1/3] procfs: fdinfo -- Extend information about epoll target files
- From: Cyrill Gorcunov <gorcunov@xxxxxxxxxx>
- Re: Hard-coding PTY device node numbers in userspace
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCHv3 33/33] mm, x86: introduce PR_SET_MAX_VADDR and PR_GET_MAX_VADDR
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCHv3 33/33] mm, x86: introduce PR_SET_MAX_VADDR and PR_GET_MAX_VADDR
- From: Dmitry Safonov <0x7f454c46@xxxxxxxxx>
- Re: [PATCHv3 33/33] mm, x86: introduce PR_SET_MAX_VADDR and PR_GET_MAX_VADDR
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCHv3 33/33] mm, x86: introduce PR_SET_MAX_VADDR and PR_GET_MAX_VADDR
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCHv3 33/33] mm, x86: introduce PR_SET_MAX_VADDR and PR_GET_MAX_VADDR
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCHv3 33/33] mm, x86: introduce PR_SET_MAX_VADDR and PR_GET_MAX_VADDR
- From: Michael Pratt <mpratt@xxxxxxxxxx>
- Re: [PATCH] groups: don't return unmapped gids in getgroups(2)
- From: Djalal Harouni <tixxdz@xxxxxxxxx>
- Re: [PATCHv3 33/33] mm, x86: introduce PR_SET_MAX_VADDR and PR_GET_MAX_VADDR
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: Hard-coding PTY device node numbers in userspace
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [PATCHv3 33/33] mm, x86: introduce PR_SET_MAX_VADDR and PR_GET_MAX_VADDR
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCHv3 33/33] mm, x86: introduce PR_SET_MAX_VADDR and PR_GET_MAX_VADDR
- Re: [PATCHv3 33/33] mm, x86: introduce PR_SET_MAX_VADDR and PR_GET_MAX_VADDR
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCHv3 33/33] mm, x86: introduce PR_SET_MAX_VADDR and PR_GET_MAX_VADDR
- Re: [PATCHv3 33/33] mm, x86: introduce PR_SET_MAX_VADDR and PR_GET_MAX_VADDR
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCHv3 33/33] mm, x86: introduce PR_SET_MAX_VADDR and PR_GET_MAX_VADDR
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCHv3 33/33] mm, x86: introduce PR_SET_MAX_VADDR and PR_GET_MAX_VADDR
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCHv3 33/33] mm, x86: introduce PR_SET_MAX_VADDR and PR_GET_MAX_VADDR
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCHv3 33/33] mm, x86: introduce PR_SET_MAX_VADDR and PR_GET_MAX_VADDR
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC 1/2] fs,eventpoll: Add ability to install target file by its number
- From: Cyrill Gorcunov <gorcunov@xxxxxxxxx>
- Re: [PATCH] groups: don't return unmapped gids in getgroups(2)
- From: Mike Frysinger <vapier@xxxxxxxxxxxx>
- Re: [RFC 1/2] fs,eventpoll: Add ability to install target file by its number
- From: Jason Baron <jbaron@xxxxxxxxxx>
- Re: Hard-coding PTY device node numbers in userspace
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC 1/2] fs,eventpoll: Add ability to install target file by its number
- From: Cyrill Gorcunov <gorcunov@xxxxxxxxx>
- Re: [PATCH] groups: don't return unmapped gids in getgroups(2)
- From: Aleksa Sarai <asarai@xxxxxxx>
- Re: [PATCHv3 33/33] mm, x86: introduce PR_SET_MAX_VADDR and PR_GET_MAX_VADDR
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RFC 1/2] fs,eventpoll: Add ability to install target file by its number
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCHv3 33/33] mm, x86: introduce PR_SET_MAX_VADDR and PR_GET_MAX_VADDR
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC 1/2] fs,eventpoll: Add ability to install target file by its number
- From: Cyrill Gorcunov <gorcunov@xxxxxxxxx>
- Re: [PATCH] groups: don't return unmapped gids in getgroups(2)
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RFC 1/2] fs,eventpoll: Add ability to install target file by its number
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCHv3 33/33] mm, x86: introduce PR_SET_MAX_VADDR and PR_GET_MAX_VADDR
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- [PATCHv3 33/33] mm, x86: introduce PR_SET_MAX_VADDR and PR_GET_MAX_VADDR
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH] groups: don't return unmapped gids in getgroups(2)
- From: Aleksa Sarai <asarai@xxxxxxx>
- [RFC 0/2] fs,eventpoll: Add EPOLL_CTL_DUP into epoll_ctl syscall
- From: Cyrill Gorcunov <gorcunov@xxxxxxxxxx>
- [RFC 1/2] fs,eventpoll: Add ability to install target file by its number
- From: Cyrill Gorcunov <gorcunov@xxxxxxxxxx>
- Re: [PATCH v4 2/4] seccomp: Add sysctl to configure actions that should be logged
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxx>
- Re: [PATCH v4 4/4] seccomp: Add tests for SECCOMP_RET_LOG
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxx>
- Re: [PATCH v4 2/4] seccomp: Add sysctl to configure actions that should be logged
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxx>
- Re: [PATCH] groups: don't return unmapped gids in getgroups(2)
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v4 0/4] Improved seccomp logging
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 4/4] seccomp: Add tests for SECCOMP_RET_LOG
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 2/4] seccomp: Add sysctl to configure actions that should be logged
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] ioctl_list.2: BLKRASET/BLKRAGET take unsigned long
- From: Cyril Hrubis <chrubis@xxxxxxx>
- Re: [PATCH] ioctl_list.2: BLKRASET/BLKRAGET take unsigned long
- From: Cyril Hrubis <chrubis@xxxxxxx>
- Re: [PATCH] ioctl_list.2: BLKRASET/BLKRAGET take unsigned long
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH] ioctl_list.2: BLKRASET/BLKRAGET take unsigned long
- From: Cyril Hrubis <chrubis@xxxxxxx>
- Re: [RFC simple allocator v2 1/2] Create Simple Allocator module
- From: Benjamin Gaignard <benjamin.gaignard@xxxxxxxxxx>
- Re: [PATCH] prctl: implement PR_GET_ENDIAN for all architectures
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH 1/5] selftests: Fix selftests build to just build, not run tests
- From: Michael Ellerman <michael@xxxxxxxxxxxxxx>
- Re: [RFC simple allocator v2 1/2] Create Simple Allocator module
- From: Laurent Pinchart <laurent.pinchart@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/5] selftests: Fix selftests build to just build, not run tests
- From: Shuah Khan <shuahkh@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] procfs/tasks: add a simple per-task procfs hidepid= field
- From: Christian Kujau <lists@xxxxxxxxxxxxxxx>
- [PATCH v4 1/4] seccomp: Add sysctl to display available actions
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxx>
- [PATCH v4 2/4] seccomp: Add sysctl to configure actions that should be logged
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxx>
- [PATCH v4 3/4] seccomp: Create an action to log before allowing
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxx>
- [PATCH v4 4/4] seccomp: Add tests for SECCOMP_RET_LOG
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxx>
- [PATCH v4 0/4] Improved seccomp logging
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxx>
- Re: [PATCH 3/5] selftests: Fix the .S and .S -> .o rules
- From: Bamvor Zhang Jian <bamvor.zhangjian@xxxxxxxxxx>
- Re: [PATCH 2/5] selftests: Fix the .c linking rule
- From: Bamvor Zhang Jian <bamvor.zhangjian@xxxxxxxxxx>
- Re: [PATCH 1/5] selftests: Fix selftests build to just build, not run tests
- From: Bamvor Zhang Jian <bamvor.zhangjian@xxxxxxxxxx>
- Re: [PATCH 1/5] selftests: Fix selftests build to just build, not run tests
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] procfs/tasks: add a simple per-task procfs hidepid= field
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 2/2] procfs/tasks: add a simple per-task procfs hidepid= field
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- [PATCH v28 02/21] vfs: Add MAY_CREATE_FILE and MAY_CREATE_DIR permission flags
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v28 00/21] Richacls (Core and Ext4)
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v28 04/21] vfs: Add permission flags for setting file attributes
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v28 01/21] vfs: Add IS_ACL() and IS_RICHACL() tests
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v28 05/21] richacl: In-memory representation and helper functions
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v28 03/21] vfs: Add MAY_DELETE_SELF and MAY_DELETE_CHILD permission flags
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v28 06/21] richacl: Permission mapping functions
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- Re: [PATCH v27 03/21] vfs: Add MAY_DELETE_SELF and MAY_DELETE_CHILD permission flags
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v28 07/21] richacl: Permission check algorithm
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v28 08/21] richacl: Compute maximum file masks from an acl
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v28 09/21] vfs: Cache base_acl objects in inodes
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v28 10/21] vfs: Add get_richacl and set_richacl inode operations
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- Re: [PATCH v27 03/21] vfs: Add MAY_DELETE_SELF and MAY_DELETE_CHILD permission flags
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v28 11/21] vfs: Cache richacl in struct inode
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v28 13/21] richacl: Check if an acl is equivalent to a file mode
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v28 14/21] richacl: Create-time inheritance
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v28 12/21] richacl: Update the file masks in chmod()
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v28 15/21] richacl: Automatic Inheritance
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v28 16/21] richacl: xattr mapping functions
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v28 19/21] vfs: Move check_posix_acl and check_richacl out of fs/namei.c
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v28 17/21] richacl: Add richacl xattr handler
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v28 18/21] vfs: Add richacl permission checking
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v28 20/21] ext4: Add richacl support
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- Re: [PATCH v27 02/21] vfs: Add MAY_CREATE_FILE and MAY_CREATE_DIR permission flags
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v28 21/21] ext4: Add richacl feature flag
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- Re: [PATCH v4 2/2] procfs/tasks: add a simple per-task procfs hidepid= field
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC] syscalls: Restore address limit after a syscall
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [RFC] syscalls: Restore address limit after a syscall
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC] syscalls: Restore address limit after a syscall
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] procfs/tasks: add a simple per-task procfs hidepid= field
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] procfs/tasks: add a simple per-task procfs hidepid= field
- From: Lafcadio Wluiki <wluikil@xxxxxxxxx>
- Re: [RFC] syscalls: Restore address limit after a syscall
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RFC] syscalls: Restore address limit after a syscall
- From: Thomas Garnier <thgarnie@xxxxxxxxxx>
- Re: [RFC] syscalls: Restore address limit after a syscall
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RFC] syscalls: Restore address limit after a syscall
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [RFC] syscalls: Restore address limit after a syscall
- From: Thomas Garnier <thgarnie@xxxxxxxxxx>
- Re: [kernel-hardening] [PATCH v2] time: Remove CONFIG_TIMER_STATS
- From: Yann Droneaud <ydroneaud@xxxxxxxxxx>
- [PATCH 4/5] selftests/powerpc: Fix the clean rule since recent changes
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- [PATCH 5/5] selftests/powerpc: Fix remaining fallout from recent changes
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- [PATCH 3/5] selftests: Fix the .S and .S -> .o rules
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- [PATCH 2/5] selftests: Fix the .c linking rule
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- [PATCH 1/5] selftests: Fix selftests build to just build, not run tests
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v4 0/2] Add further ioctl() operations for namespace discovery
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCHSET for-4.11] cgroup: implement cgroup v2 thread mode
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH] prctl: implement PR_GET_ENDIAN for all architectures
- From: "Maciej W. Rozycki" <macro@xxxxxxxxxxxxxx>
- Re: [PATCH] prctl: implement PR_GET_ENDIAN for all architectures
- From: Matt Turner <mattst88@xxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCHSET for-4.11] cgroup: implement cgroup v2 thread mode
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [PATCHSET for-4.11] cgroup: implement cgroup v2 thread mode
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v4 0/2] Add further ioctl() operations for namespace discovery
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCHSET for-4.11] cgroup: implement cgroup v2 thread mode
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [PATCHSET for-4.11] cgroup: implement cgroup v2 thread mode
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH] prctl: implement PR_GET_ENDIAN for all architectures
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH] prctl: implement PR_GET_ENDIAN for all architectures
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] prctl: implement PR_GET_ENDIAN for all architectures
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] prctl: implement PR_GET_ENDIAN for all architectures
- From: Helge Deller <deller@xxxxxx>
- Re: [PATCH] prctl: implement PR_GET_ENDIAN for all architectures
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: utimensat EACCES vs. EPERM in 4.8+
- From: Cyril Hrubis <chrubis@xxxxxxx>
- Re: [PATCH v3 2/5] vfs: deny copy_file_range() for non regular files
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v3 1/5] vfs: deny fallocate() on directory
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH v3 2/5] vfs: deny copy_file_range() for non regular files
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [PATCH v3 1/5] vfs: deny fallocate() on directory
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v2 0/2] setgid hardening
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] fs: Harden against open(..., O_CREAT, 02777) in a setgid directory
- From: Michael Kerrisk <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v2 1/2] fs: Check f_cred as well as of current's creds in should_remove_suid()
- From: Michael Kerrisk <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v2 0/2] setgid hardening
- From: Michael Kerrisk <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v4 2/2] procfs/tasks: add a simple per-task procfs hidepid= field
- From: Djalal Harouni <tixxdz@xxxxxxxxx>
- Re: [PATCH v4 0/2] Add further ioctl() operations for namespace discovery
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v4 0/2] Add further ioctl() operations for namespace discovery
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v4 0/2] Add further ioctl() operations for namespace discovery
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v4 0/2] Add further ioctl() operations for namespace discovery
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v4 0/2] Add further ioctl() operations for namespace discovery
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v4 0/2] Add further ioctl() operations for namespace discovery
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH v4 2/2] nsfs: Add an ioctl() to return owner UID of a userns
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- [PATCH v4 0/2] Add further ioctl() operations for namespace discovery
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- [PATCH v4 1/2] nsfs: Add an ioctl() to return the namespace type
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v2 0/2] Add further ioctl() operations for namespace discovery
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v2 0/2] Add further ioctl() operations for namespace discovery
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v3 2/2] nsfs: Add an ioctl() to return owner UID of a userns
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2 0/2] Add further ioctl() operations for namespace discovery
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH 2/2] pidns: Expose task pid_ns_for_children to userspace
- From: Kirill Tkhai <ktkhai@xxxxxxxxxxxxx>
- Re: [PATCH] mnt: allow to add a mount into an existing group
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH] mnt: allow to add a mount into an existing group
- From: Andrei Vagin <avagin@xxxxxxxxxx>
- Re: [PATCH 2/2] pidns: Expose task pid_ns_for_children to userspace
- From: Alban Crequy <alban.crequy@xxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] procfs/tasks: add a simple per-task procfs hidepid= field
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] procfs/tasks: add a simple per-task procfs hidepid= field
- From: Djalal Harouni <tixxdz@xxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH v4 2/2] procfs/tasks: add a simple per-task procfs hidepid= field
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] procfs/tasks: add a simple per-task procfs hidepid= field
- From: Djalal Harouni <tixxdz@xxxxxxxxx>
- Re: [PATCH v4 2/2] procfs/tasks: add a simple per-task procfs hidepid= field
- From: Lafcadio Wluiki <wluikil@xxxxxxxxx>
- Re: [PATCH v4 2/2] procfs/tasks: add a simple per-task procfs hidepid= field
- From: Lafcadio Wluiki <wluikil@xxxxxxxxx>
- Re: [LSF/MM TOPIC ATTEND] thawing the fsnotify subsyetm
- From: Jan Kara <jack@xxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH v4 2/2] procfs/tasks: add a simple per-task procfs hidepid= field
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- [LSF/MM TOPIC ATTEND] thawing the fsnotify subsyetm
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v4 2/2] procfs/tasks: add a simple per-task procfs hidepid= field
- From: Djalal Harouni <tixxdz@xxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: writev error codes
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: writev error codes
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] nsfs: Add an ioctl() to return owner UID of a userns
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: writev error codes
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] procfs/tasks: add a simple per-task procfs hidepid= field
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] procfs/tasks: add a simple per-task procfs hidepid= field
- From: Djalal Harouni <tixxdz@xxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Tejun Heo <tj@xxxxxxxxxx>
- writev error codes
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: utimensat EACCES vs. EPERM in 4.8+
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v4 2/2] procfs/tasks: add a simple per-task procfs hidepid= field
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] pidns: Expose task pid_ns_for_children to userspace
- From: Andrei Vagin <avagin@xxxxxxxxxxxxx>
- Re: utimensat EACCES vs. EPERM in 4.8+
- From: Cyril Hrubis <chrubis@xxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: utimensat EACCES vs. EPERM in 4.8+
- From: Miklos Szeredi <mszeredi@xxxxxxxxxx>
- Re: utimensat EACCES vs. EPERM in 4.8+
- From: Cyril Hrubis <chrubis@xxxxxxx>
- Re: utimensat EACCES vs. EPERM in 4.8+
- From: Jan Stancek <jstancek@xxxxxxxxxx>
- [no subject]
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: utimensat EACCES vs. EPERM in 4.8+
- From: "Carlos O'Donell" <carlos@xxxxxxxxxx>
- Re: [PATCH v3 2/2] nsfs: Add an ioctl() to return owner UID of a userns
- From: "W. Trevor King" <wking@xxxxxxxxxx>
- [PATCH v3 2/2] nsfs: Add an ioctl() to return owner UID of a userns
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- [PATCH v3 1/2] nsfs: Add an ioctl() to return the namespace type
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- [PATCH v3 0/2] Add further ioctl() operations for namespace discovery
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: utimensat EACCES vs. EPERM in 4.8+
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v4 2/2] procfs/tasks: add a simple per-task procfs hidepid= field
- From: Djalal Harouni <tixxdz@xxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- Re: [patch v2] mm, thp: add new defer+madvise defrag option
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: Andi Kleen <ak@xxxxxxxxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [patch v2] mm, thp: add new defer+madvise defrag option
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] nsfs: Add an ioctl() to return owner UID of a userns
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: How should we handle variable address space sizes (Re: [RFC 3/4] x86/mm: define TASK_SIZE as current->mm->task_size)
- Re: How should we handle variable address space sizes (Re: [RFC 3/4] x86/mm: define TASK_SIZE as current->mm->task_size)
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: How should we handle variable address space sizes (Re: [RFC 3/4] x86/mm: define TASK_SIZE as current->mm->task_size)
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- How should we handle variable address space sizes (Re: [RFC 3/4] x86/mm: define TASK_SIZE as current->mm->task_size)
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: "Carlos O'Donell" <carlos@xxxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] nsfs: Add an ioctl() to return owner UID of a userns
- From: Andrei Vagin <avagin@xxxxxxxxxxxxx>
- [PATCH v2 1/2] nsfs: Add an ioctl() to return the namespace type
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- [PATCH v2 2/2] nsfs: Add an ioctl() to return owner UID of a userns
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- [PATCH v2 0/2] Add further ioctl() operations for namespace discovery
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH 0/2] Add further ioctl() operations for namespace discovery
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 2/2] nsfs: Add an ioctl() to return creator UID of a userns
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 0/2] Add further ioctl() operations for namespace discovery
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH 2/2] nsfs: Add an ioctl() to return creator UID of a userns
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH 0/2] Add further ioctl() operations for namespace discovery
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Food for thought: could cgroup+bpf live in a cgroup v1-compatible controller?
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH 0/2] Add further ioctl() operations for namespace discovery
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH 2/2] nsfs: Add an ioctl() to return creator UID of a userns
- From: Andrei Vagin <avagin@xxxxxxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH 0/2] Add further ioctl() operations for namespace discovery
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 0/2] Add further ioctl() operations for namespace discovery
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH 0/2] Add further ioctl() operations for namespace discovery
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Daniel Mack <daniel@xxxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH 0/2] Add further ioctl() operations for namespace discovery
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Daniel Mack <daniel@xxxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: David Ahern <dsahern@xxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: David Ahern <dsahern@xxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH 0/2] Add further ioctl() operations for namespace discovery
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- [PATCH 1/2] nsfs: Add an ioctl() to return the namespace type
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- [PATCH 2/2] nsfs: Add an ioctl() to return creator UID of a userns
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- [PATCH 0/2] Add further ioctl() operations for namespace discovery
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH] cgroup: Add new capability to allow a process to migrate other tasks between cgroups
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [PATCH] cgroup: Add new capability to allow a process to migrate other tasks between cgroups
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH] cgroup: Add new capability to allow a process to migrate other tasks between cgroups
- From: John Stultz <john.stultz@xxxxxxxxxx>
- Re: Documenting the ioctl interfaces to discover relationships between namespaces
- From: Andrei Vagin <avagin@xxxxxxxxxxxxx>
- Re: Documenting the ioctl interfaces to discover relationships between namespaces
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: Documenting the ioctl interfaces to discover relationships between namespaces
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v5] cgroup: Add new capability to allow a process to migrate other tasks between cgroups
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [PATCH v5] cgroup: Add new capability to allow a process to migrate other tasks between cgroups
- From: John Stultz <john.stultz@xxxxxxxxxx>
- Re: [PATCH v5] cgroup: Add new capability to allow a process to migrate other tasks between cgroups
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [PATCH v5] cgroup: Add new capability to allow a process to migrate other tasks between cgroups
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [PATCH v5] cgroup: Add new capability to allow a process to migrate other tasks between cgroups
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5] cgroup: Add new capability to allow a process to migrate other tasks between cgroups
- From: John Stultz <john.stultz@xxxxxxxxxx>
- Re: [PATCH v5] cgroup: Add new capability to allow a process to migrate other tasks between cgroups
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5] cgroup: Add new capability to allow a process to migrate other tasks between cgroups
- From: John Stultz <john.stultz@xxxxxxxxxx>
- Re: [PATCH v5] cgroup: Add new capability to allow a process to migrate other tasks between cgroups
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5] cgroup: Add new capability to allow a process to migrate other tasks between cgroups
- From: John Stultz <john.stultz@xxxxxxxxxx>
- Re: [PATCH v5] cgroup: Add new capability to allow a process to migrate other tasks between cgroups
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5] cgroup: Add new capability to allow a process to migrate other tasks between cgroups
- From: John Stultz <john.stultz@xxxxxxxxxx>
- Re: [PATCH v5] cgroup: Add new capability to allow a process to migrate other tasks between cgroups
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v5] cgroup: Add new capability to allow a process to migrate other tasks between cgroups
- From: John Stultz <john.stultz@xxxxxxxxxx>
- [PATCH v5] cgroup: Add new capability to allow a process to migrate other tasks between cgroups
- From: John Stultz <john.stultz@xxxxxxxxxx>
- Re: Documenting the ioctl interfaces to discover relationships between namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: Documenting the ioctl interfaces to discover relationships between namespaces
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: Documenting the ioctl interfaces to discover relationships between namespaces
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: Documenting the ioctl interfaces to discover relationships between namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Documenting the ioctl interfaces to discover relationships between namespaces
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH RFC] user-namespaced file capabilities - now with even more magic
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH RFC] user-namespaced file capabilities - now with even more magic
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH RFC] user-namespaced file capabilities - now with even more magic
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [RESEND][PATCH v4] cgroup: Use CAP_SYS_RESOURCE to allow a process to migrate other tasks between cgroups
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [PATCH RFC] user-namespaced file capabilities - now with even more magic
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RESEND][PATCH v4] cgroup: Use CAP_SYS_RESOURCE to allow a process to migrate other tasks between cgroups
- From: John Stultz <john.stultz@xxxxxxxxxx>
- Re: [PATCH RFC] user-namespaced file capabilities - now with even more magic
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH RFC] user-namespaced file capabilities - now with even more magic
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH RFC] user-namespaced file capabilities - now with even more magic
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] mm: make transparent hugepage size public
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH v27 03/21] vfs: Add MAY_DELETE_SELF and MAY_DELETE_CHILD permission flags
- From: Jeremy Allison <jra@xxxxxxxxx>
- Re: [PATCH v27 03/21] vfs: Add MAY_DELETE_SELF and MAY_DELETE_CHILD permission flags
- From: Jeremy Allison <jra@xxxxxxxxx>
- Re: [PATCH v27 03/21] vfs: Add MAY_DELETE_SELF and MAY_DELETE_CHILD permission flags
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH v27 03/21] vfs: Add MAY_DELETE_SELF and MAY_DELETE_CHILD permission flags
- From: "J. Bruce Fields" <bfields@xxxxxxxxxxxx>
- Re: [RESEND][PATCH v4] cgroup: Use CAP_SYS_RESOURCE to allow a process to migrate other tasks between cgroups
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [RESEND][PATCH v4] cgroup: Use CAP_SYS_RESOURCE to allow a process to migrate other tasks between cgroups
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RESEND][PATCH v4] cgroup: Use CAP_SYS_RESOURCE to allow a process to migrate other tasks between cgroups
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [RESEND][PATCH v4] cgroup: Use CAP_SYS_RESOURCE to allow a process to migrate other tasks between cgroups
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RESEND][PATCH v4] cgroup: Use CAP_SYS_RESOURCE to allow a process to migrate other tasks between cgroups
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [RESEND][PATCH v4] cgroup: Use CAP_SYS_RESOURCE to allow a process to migrate other tasks between cgroups
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [RESEND][PATCH v4] cgroup: Use CAP_SYS_RESOURCE to allow a process to migrate other tasks between cgroups
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [RESEND][PATCH v4] cgroup: Use CAP_SYS_RESOURCE to allow a process to migrate other tasks between cgroups
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RESEND][PATCH v4] cgroup: Use CAP_SYS_RESOURCE to allow a process to migrate other tasks between cgroups
- From: John Stultz <john.stultz@xxxxxxxxxx>
- Re: [PATCH 1/4] statx: Add a system call to make enhanced file info available [ver #3]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 1/4] statx: Add a system call to make enhanced file info available [ver #3]
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH 1/4] statx: Add a system call to make enhanced file info available [ver #3]
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] statx: Add a system call to make enhanced file info available [ver #3]
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] statx: Add a system call to make enhanced file info available [ver #3]
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] statx: Add a system call to make enhanced file info available [ver #3]
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v27 03/21] vfs: Add MAY_DELETE_SELF and MAY_DELETE_CHILD permission flags
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH v27 02/21] vfs: Add MAY_CREATE_FILE and MAY_CREATE_DIR permission flags
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [RFC PATCH 2/3] vfs: add d_replace()
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- Re: [PATCH v2 0/6] enable O and KBUILD_OUTPUT for kselftest
- From: Shuah Khan <shuahkh@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/5] generic: test encrypted file access
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 0/6] enable O and KBUILD_OUTPUT for kselftest
- From: Bamvor Zhang Jian <bamvor.zhangjian@xxxxxxxxxx>
- Re: [PATCH v2 0/6] enable O and KBUILD_OUTPUT for kselftest
- From: Shuah Khan <shuahkh@xxxxxxxxxxxxxxx>
- Re: [PATCH RFC] user-namespaced file capabilities - now with even more magic
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v2 4/5] generic: test encrypted file access
- From: Richard Weinberger <richard@xxxxxx>
- [PATCH v2 0/6] enable O and KBUILD_OUTPUT for kselftest
- From: <bamvor.zhangjian@xxxxxxxxxx>
- [PATCH v2 1/6] selftests: remove duplicated all and clean target
- From: <bamvor.zhangjian@xxxxxxxxxx>
- [PATCH v2 4/6] selftests: remove CROSS_COMPILE in dedicated Makefile
- From: <bamvor.zhangjian@xxxxxxxxxx>
- [PATCH v2 5/6] selftests: add EXTRA_CLEAN for clean target
- From: <bamvor.zhangjian@xxxxxxxxxx>
- [PATCH v2 6/6] selftests: enable O and KBUILD_OUTPUT
- From: <bamvor.zhangjian@xxxxxxxxxx>
- [PATCH v2 3/6] selftests: add default rules for c source file
- From: <bamvor.zhangjian@xxxxxxxxxx>
- [PATCH v2 2/6] selftests: remove useless TEST_DIRS
- From: <bamvor.zhangjian@xxxxxxxxxx>
- Re: [RFC PATCH v8 1/9] Restartable sequences system call
- From: Paul Turner <pjt@xxxxxxxxxx>
- Re: [RFC PATCH v8 1/9] Restartable sequences system call
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH RFC] user-namespaced file capabilities - now with even more magic
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH RFC] user-namespaced file capabilities - now with even more magic
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH RFC] user-namespaced file capabilities - now with even more magic
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH RFC] user-namespaced file capabilities - now with even more magic
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH RFC] user-namespaced file capabilities - now with even more magic
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH 1/4] statx: Add a system call to make enhanced file info available [ver #3]
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH 1/4] statx: Add a system call to make enhanced file info available [ver #3]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 1/4] statx: Add a system call to make enhanced file info available [ver #3]
- From: Andreas Dilger <adilger@xxxxxxxxx>
- Re: [PATCH 4/4] statx: AFS: Return enhanced file attributes [ver #3]
- From: Andreas Dilger <adilger@xxxxxxxxx>
- Re: [PATCH RFC] user-namespaced file capabilities - now with even more magic
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 1/4] statx: Add a system call to make enhanced file info available [ver #3]
- From: Andreas Dilger <adilger@xxxxxxxxx>
- Re: [PATCH 1/4] statx: Add a system call to make enhanced file info available [ver #3]
- From: Andreas Dilger <adilger@xxxxxxxxx>
- Re: [PATCH 2/4] statx: Ext4: Return enhanced file attributes [ver #3]
- From: Andreas Dilger <adilger@xxxxxxxxx>
- Re: [RFC PATCH 2/3] vfs: add d_replace()
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] statx: Add a system call to make enhanced file info available [ver #3]
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v2] fideduperange.2: fix the discussion of maximum sizes
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v2] fideduperange.2: fix the discussion of maximum sizes
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v2] fideduperange.2: fix the discussion of maximum sizes
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v2] fideduperange.2: fix the discussion of maximum sizes
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- Re: [PATCH] fideduperange.2: fix the discussion of maximum sizes
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- Re: [PATCH] fideduperange.2: fix the discussion of maximum sizes
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH] fideduperange.2: fix the discussion of maximum sizes
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- Re: [RFC PATCH 2/3] vfs: add d_replace()
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- Re: [RFC PATCH 2/3] vfs: add d_replace()
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- [PATCH 4/4] statx: AFS: Return enhanced file attributes [ver #3]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 1/4] statx: Add a system call to make enhanced file info available [ver #3]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [RESEND][PATCH v4] cgroup: Use CAP_SYS_RESOURCE to allow a process to migrate other tasks between cgroups
- From: John Stultz <john.stultz@xxxxxxxxxx>
- [PATCH 2/4] statx: Ext4: Return enhanced file attributes [ver #3]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 3/4] statx: NFS: Return enhanced file attributes [ver #3]
- From: David Howells <dhowells@xxxxxxxxxx>
- [RFC][PATCH 0/4] Enhanced file stat system call [ver #3]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [RFC PATCH 1/3] fs: add AT_REPLACE flag for linkat() which replaces the target
- From: Colin Walters <walters@xxxxxxxxxx>
- Re: Formal description of system call interface
- From: Szabolcs Nagy <nsz@xxxxxxxxxx>
- [RFC PATCH 3/3] Btrfs: add support for linkat() AT_REPLACE
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [RFC PATCH 1/3] fs: add AT_REPLACE flag for linkat() which replaces the target
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [RFC PATCH 2/3] vfs: add d_replace()
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [RFC PATCH 0/3] fs: add AT_REPLACE flag for linkat()
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- Re: Formal description of system call interface
- From: Cyril Hrubis <chrubis@xxxxxxx>
- Re: Formal description of system call interface
- From: Cyril Hrubis <chrubis@xxxxxxx>
- Re: Formal description of system call interface
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: Formal description of system call interface
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: Formal description of system call interface
- From: Tavis Ormandy <taviso@xxxxxxxxxx>
- Re: Formal description of system call interface
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: Formal description of system call interface
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: Formal description of system call interface
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH RFC 1/6] selftests: remove duplicated all and clean target
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- [PATCH RFC] user-namespaced file capabilities - now with even more magic
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 1/4] statx: Add a system call to make enhanced file info available
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH 1/4] statx: Add a system call to make enhanced file info available
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH 1/4] statx: Add a system call to make enhanced file info available
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 1/4] statx: Add a system call to make enhanced file info available
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH 2/4] statx: Ext4: Return enhanced file attributes [ver #2]
- From: Andreas Dilger <adilger@xxxxxxxxx>
- Re: [PATCH 1/4] statx: Add a system call to make enhanced file info available [ver #2]
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH 1/4] statx: Add a system call to make enhanced file info available [ver #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 2/4] statx: Ext4: Return enhanced file attributes [ver #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 4/4] statx: AFS: Return enhanced file attributes [ver #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 3/4] statx: NFS: Return enhanced file attributes [ver #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [RFC][PATCH 0/4] Enhanced file stat system call [ver #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH RFC 6/6] selftests: enable O and KBUILD_OUTPUT
- From: "Zhangjian (Bamvor)" <bamvor.zhangjian@xxxxxxxxxx>
- Re: [PATCH RFC 1/6] selftests: remove duplicated all and clean target
- From: "Zhangjian (Bamvor)" <bamvor.zhangjian@xxxxxxxxxx>
- Re: [PATCH RFC 5/6] selftests: add EXTRA_CLEAN for clean target
- From: "Zhangjian (Bamvor)" <bamvor.zhangjian@xxxxxxxxxx>
- Re: [PATCH RFC 6/6] selftests: enable O and KBUILD_OUTPUT
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH RFC 5/6] selftests: add EXTRA_CLEAN for clean target
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH RFC 4/6] selftests: remove CROSS_COMPILE in dedicated Makefile
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH RFC 3/6] selftests: add default rules for c source file
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH RFC 2/6] selftests: remove useless TEST_DIRS
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH RFC 1/6] selftests: remove duplicated all and clean target
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH 1/4] statx: Add a system call to make enhanced file info available
- From: David Howells <dhowells@xxxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Linux SCSI]
[Samba]
[Yosemite News]