Linux API
[Prev Page][Next Page]
- [PATCH v4 0/4] Improved seccomp logging
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxx>
- Re: [PATCH 3/5] selftests: Fix the .S and .S -> .o rules
- From: Bamvor Zhang Jian <bamvor.zhangjian@xxxxxxxxxx>
- Re: [PATCH 2/5] selftests: Fix the .c linking rule
- From: Bamvor Zhang Jian <bamvor.zhangjian@xxxxxxxxxx>
- Re: [PATCH 1/5] selftests: Fix selftests build to just build, not run tests
- From: Bamvor Zhang Jian <bamvor.zhangjian@xxxxxxxxxx>
- Re: [PATCH 1/5] selftests: Fix selftests build to just build, not run tests
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] procfs/tasks: add a simple per-task procfs hidepid= field
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 2/2] procfs/tasks: add a simple per-task procfs hidepid= field
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- [PATCH v28 02/21] vfs: Add MAY_CREATE_FILE and MAY_CREATE_DIR permission flags
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v28 00/21] Richacls (Core and Ext4)
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v28 04/21] vfs: Add permission flags for setting file attributes
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v28 01/21] vfs: Add IS_ACL() and IS_RICHACL() tests
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v28 05/21] richacl: In-memory representation and helper functions
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v28 03/21] vfs: Add MAY_DELETE_SELF and MAY_DELETE_CHILD permission flags
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v28 06/21] richacl: Permission mapping functions
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- Re: [PATCH v27 03/21] vfs: Add MAY_DELETE_SELF and MAY_DELETE_CHILD permission flags
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v28 07/21] richacl: Permission check algorithm
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v28 08/21] richacl: Compute maximum file masks from an acl
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v28 09/21] vfs: Cache base_acl objects in inodes
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v28 10/21] vfs: Add get_richacl and set_richacl inode operations
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- Re: [PATCH v27 03/21] vfs: Add MAY_DELETE_SELF and MAY_DELETE_CHILD permission flags
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v28 11/21] vfs: Cache richacl in struct inode
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v28 13/21] richacl: Check if an acl is equivalent to a file mode
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v28 14/21] richacl: Create-time inheritance
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v28 12/21] richacl: Update the file masks in chmod()
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v28 15/21] richacl: Automatic Inheritance
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v28 16/21] richacl: xattr mapping functions
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v28 19/21] vfs: Move check_posix_acl and check_richacl out of fs/namei.c
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v28 17/21] richacl: Add richacl xattr handler
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v28 18/21] vfs: Add richacl permission checking
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v28 20/21] ext4: Add richacl support
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- Re: [PATCH v27 02/21] vfs: Add MAY_CREATE_FILE and MAY_CREATE_DIR permission flags
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v28 21/21] ext4: Add richacl feature flag
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- Re: [PATCH v4 2/2] procfs/tasks: add a simple per-task procfs hidepid= field
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC] syscalls: Restore address limit after a syscall
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [RFC] syscalls: Restore address limit after a syscall
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC] syscalls: Restore address limit after a syscall
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] procfs/tasks: add a simple per-task procfs hidepid= field
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] procfs/tasks: add a simple per-task procfs hidepid= field
- From: Lafcadio Wluiki <wluikil@xxxxxxxxx>
- Re: [RFC] syscalls: Restore address limit after a syscall
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RFC] syscalls: Restore address limit after a syscall
- From: Thomas Garnier <thgarnie@xxxxxxxxxx>
- Re: [RFC] syscalls: Restore address limit after a syscall
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RFC] syscalls: Restore address limit after a syscall
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [RFC] syscalls: Restore address limit after a syscall
- From: Thomas Garnier <thgarnie@xxxxxxxxxx>
- Re: [kernel-hardening] [PATCH v2] time: Remove CONFIG_TIMER_STATS
- From: Yann Droneaud <ydroneaud@xxxxxxxxxx>
- [PATCH 4/5] selftests/powerpc: Fix the clean rule since recent changes
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- [PATCH 5/5] selftests/powerpc: Fix remaining fallout from recent changes
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- [PATCH 3/5] selftests: Fix the .S and .S -> .o rules
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- [PATCH 2/5] selftests: Fix the .c linking rule
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- [PATCH 1/5] selftests: Fix selftests build to just build, not run tests
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v4 0/2] Add further ioctl() operations for namespace discovery
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCHSET for-4.11] cgroup: implement cgroup v2 thread mode
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH] prctl: implement PR_GET_ENDIAN for all architectures
- From: "Maciej W. Rozycki" <macro@xxxxxxxxxxxxxx>
- Re: [PATCH] prctl: implement PR_GET_ENDIAN for all architectures
- From: Matt Turner <mattst88@xxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCHSET for-4.11] cgroup: implement cgroup v2 thread mode
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [PATCHSET for-4.11] cgroup: implement cgroup v2 thread mode
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v4 0/2] Add further ioctl() operations for namespace discovery
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCHSET for-4.11] cgroup: implement cgroup v2 thread mode
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [PATCHSET for-4.11] cgroup: implement cgroup v2 thread mode
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH] prctl: implement PR_GET_ENDIAN for all architectures
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH] prctl: implement PR_GET_ENDIAN for all architectures
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] prctl: implement PR_GET_ENDIAN for all architectures
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] prctl: implement PR_GET_ENDIAN for all architectures
- From: Helge Deller <deller@xxxxxx>
- Re: [PATCH] prctl: implement PR_GET_ENDIAN for all architectures
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: utimensat EACCES vs. EPERM in 4.8+
- From: Cyril Hrubis <chrubis@xxxxxxx>
- Re: [PATCH v3 2/5] vfs: deny copy_file_range() for non regular files
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v3 1/5] vfs: deny fallocate() on directory
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH v3 2/5] vfs: deny copy_file_range() for non regular files
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [PATCH v3 1/5] vfs: deny fallocate() on directory
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v2 0/2] setgid hardening
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] fs: Harden against open(..., O_CREAT, 02777) in a setgid directory
- From: Michael Kerrisk <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v2 1/2] fs: Check f_cred as well as of current's creds in should_remove_suid()
- From: Michael Kerrisk <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v2 0/2] setgid hardening
- From: Michael Kerrisk <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v4 2/2] procfs/tasks: add a simple per-task procfs hidepid= field
- From: Djalal Harouni <tixxdz@xxxxxxxxx>
- Re: [PATCH v4 0/2] Add further ioctl() operations for namespace discovery
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v4 0/2] Add further ioctl() operations for namespace discovery
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v4 0/2] Add further ioctl() operations for namespace discovery
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v4 0/2] Add further ioctl() operations for namespace discovery
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v4 0/2] Add further ioctl() operations for namespace discovery
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v4 0/2] Add further ioctl() operations for namespace discovery
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH v4 2/2] nsfs: Add an ioctl() to return owner UID of a userns
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- [PATCH v4 0/2] Add further ioctl() operations for namespace discovery
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- [PATCH v4 1/2] nsfs: Add an ioctl() to return the namespace type
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v2 0/2] Add further ioctl() operations for namespace discovery
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v2 0/2] Add further ioctl() operations for namespace discovery
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v3 2/2] nsfs: Add an ioctl() to return owner UID of a userns
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2 0/2] Add further ioctl() operations for namespace discovery
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH 2/2] pidns: Expose task pid_ns_for_children to userspace
- From: Kirill Tkhai <ktkhai@xxxxxxxxxxxxx>
- Re: [PATCH] mnt: allow to add a mount into an existing group
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH] mnt: allow to add a mount into an existing group
- From: Andrei Vagin <avagin@xxxxxxxxxx>
- Re: [PATCH 2/2] pidns: Expose task pid_ns_for_children to userspace
- From: Alban Crequy <alban.crequy@xxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] procfs/tasks: add a simple per-task procfs hidepid= field
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] procfs/tasks: add a simple per-task procfs hidepid= field
- From: Djalal Harouni <tixxdz@xxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH v4 2/2] procfs/tasks: add a simple per-task procfs hidepid= field
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] procfs/tasks: add a simple per-task procfs hidepid= field
- From: Djalal Harouni <tixxdz@xxxxxxxxx>
- Re: [PATCH v4 2/2] procfs/tasks: add a simple per-task procfs hidepid= field
- From: Lafcadio Wluiki <wluikil@xxxxxxxxx>
- Re: [PATCH v4 2/2] procfs/tasks: add a simple per-task procfs hidepid= field
- From: Lafcadio Wluiki <wluikil@xxxxxxxxx>
- Re: [LSF/MM TOPIC ATTEND] thawing the fsnotify subsyetm
- From: Jan Kara <jack@xxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH v4 2/2] procfs/tasks: add a simple per-task procfs hidepid= field
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- [LSF/MM TOPIC ATTEND] thawing the fsnotify subsyetm
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v4 2/2] procfs/tasks: add a simple per-task procfs hidepid= field
- From: Djalal Harouni <tixxdz@xxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: writev error codes
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: writev error codes
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] nsfs: Add an ioctl() to return owner UID of a userns
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: writev error codes
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] procfs/tasks: add a simple per-task procfs hidepid= field
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] procfs/tasks: add a simple per-task procfs hidepid= field
- From: Djalal Harouni <tixxdz@xxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Tejun Heo <tj@xxxxxxxxxx>
- writev error codes
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: utimensat EACCES vs. EPERM in 4.8+
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v4 2/2] procfs/tasks: add a simple per-task procfs hidepid= field
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] pidns: Expose task pid_ns_for_children to userspace
- From: Andrei Vagin <avagin@xxxxxxxxxxxxx>
- Re: utimensat EACCES vs. EPERM in 4.8+
- From: Cyril Hrubis <chrubis@xxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: utimensat EACCES vs. EPERM in 4.8+
- From: Miklos Szeredi <mszeredi@xxxxxxxxxx>
- Re: utimensat EACCES vs. EPERM in 4.8+
- From: Cyril Hrubis <chrubis@xxxxxxx>
- Re: utimensat EACCES vs. EPERM in 4.8+
- From: Jan Stancek <jstancek@xxxxxxxxxx>
- [no subject]
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: utimensat EACCES vs. EPERM in 4.8+
- From: "Carlos O'Donell" <carlos@xxxxxxxxxx>
- Re: [PATCH v3 2/2] nsfs: Add an ioctl() to return owner UID of a userns
- From: "W. Trevor King" <wking@xxxxxxxxxx>
- [PATCH v3 2/2] nsfs: Add an ioctl() to return owner UID of a userns
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- [PATCH v3 1/2] nsfs: Add an ioctl() to return the namespace type
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- [PATCH v3 0/2] Add further ioctl() operations for namespace discovery
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: utimensat EACCES vs. EPERM in 4.8+
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v4 2/2] procfs/tasks: add a simple per-task procfs hidepid= field
- From: Djalal Harouni <tixxdz@xxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- Re: [patch v2] mm, thp: add new defer+madvise defrag option
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: Andi Kleen <ak@xxxxxxxxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [patch v2] mm, thp: add new defer+madvise defrag option
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] nsfs: Add an ioctl() to return owner UID of a userns
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: How should we handle variable address space sizes (Re: [RFC 3/4] x86/mm: define TASK_SIZE as current->mm->task_size)
- Re: How should we handle variable address space sizes (Re: [RFC 3/4] x86/mm: define TASK_SIZE as current->mm->task_size)
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: How should we handle variable address space sizes (Re: [RFC 3/4] x86/mm: define TASK_SIZE as current->mm->task_size)
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- How should we handle variable address space sizes (Re: [RFC 3/4] x86/mm: define TASK_SIZE as current->mm->task_size)
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: "Carlos O'Donell" <carlos@xxxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- [RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] nsfs: Add an ioctl() to return owner UID of a userns
- From: Andrei Vagin <avagin@xxxxxxxxxxxxx>
- [PATCH v2 1/2] nsfs: Add an ioctl() to return the namespace type
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- [PATCH v2 2/2] nsfs: Add an ioctl() to return owner UID of a userns
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- [PATCH v2 0/2] Add further ioctl() operations for namespace discovery
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH 0/2] Add further ioctl() operations for namespace discovery
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 2/2] nsfs: Add an ioctl() to return creator UID of a userns
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 0/2] Add further ioctl() operations for namespace discovery
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH 2/2] nsfs: Add an ioctl() to return creator UID of a userns
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH 0/2] Add further ioctl() operations for namespace discovery
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Food for thought: could cgroup+bpf live in a cgroup v1-compatible controller?
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH 0/2] Add further ioctl() operations for namespace discovery
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH 2/2] nsfs: Add an ioctl() to return creator UID of a userns
- From: Andrei Vagin <avagin@xxxxxxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH 0/2] Add further ioctl() operations for namespace discovery
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 0/2] Add further ioctl() operations for namespace discovery
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH 0/2] Add further ioctl() operations for namespace discovery
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Daniel Mack <daniel@xxxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH 0/2] Add further ioctl() operations for namespace discovery
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Daniel Mack <daniel@xxxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: David Ahern <dsahern@xxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: David Ahern <dsahern@xxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH 0/2] Add further ioctl() operations for namespace discovery
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- [PATCH 1/2] nsfs: Add an ioctl() to return the namespace type
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- [PATCH 2/2] nsfs: Add an ioctl() to return creator UID of a userns
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- [PATCH 0/2] Add further ioctl() operations for namespace discovery
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH] cgroup: Add new capability to allow a process to migrate other tasks between cgroups
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [PATCH] cgroup: Add new capability to allow a process to migrate other tasks between cgroups
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Potential issues (security and otherwise) with the current cgroup-bpf API
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH] cgroup: Add new capability to allow a process to migrate other tasks between cgroups
- From: John Stultz <john.stultz@xxxxxxxxxx>
- Re: Documenting the ioctl interfaces to discover relationships between namespaces
- From: Andrei Vagin <avagin@xxxxxxxxxxxxx>
- Re: Documenting the ioctl interfaces to discover relationships between namespaces
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: Documenting the ioctl interfaces to discover relationships between namespaces
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v5] cgroup: Add new capability to allow a process to migrate other tasks between cgroups
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [PATCH v5] cgroup: Add new capability to allow a process to migrate other tasks between cgroups
- From: John Stultz <john.stultz@xxxxxxxxxx>
- Re: [PATCH v5] cgroup: Add new capability to allow a process to migrate other tasks between cgroups
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [PATCH v5] cgroup: Add new capability to allow a process to migrate other tasks between cgroups
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [PATCH v5] cgroup: Add new capability to allow a process to migrate other tasks between cgroups
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5] cgroup: Add new capability to allow a process to migrate other tasks between cgroups
- From: John Stultz <john.stultz@xxxxxxxxxx>
- Re: [PATCH v5] cgroup: Add new capability to allow a process to migrate other tasks between cgroups
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5] cgroup: Add new capability to allow a process to migrate other tasks between cgroups
- From: John Stultz <john.stultz@xxxxxxxxxx>
- Re: [PATCH v5] cgroup: Add new capability to allow a process to migrate other tasks between cgroups
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5] cgroup: Add new capability to allow a process to migrate other tasks between cgroups
- From: John Stultz <john.stultz@xxxxxxxxxx>
- Re: [PATCH v5] cgroup: Add new capability to allow a process to migrate other tasks between cgroups
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5] cgroup: Add new capability to allow a process to migrate other tasks between cgroups
- From: John Stultz <john.stultz@xxxxxxxxxx>
- Re: [PATCH v5] cgroup: Add new capability to allow a process to migrate other tasks between cgroups
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v5] cgroup: Add new capability to allow a process to migrate other tasks between cgroups
- From: John Stultz <john.stultz@xxxxxxxxxx>
- [PATCH v5] cgroup: Add new capability to allow a process to migrate other tasks between cgroups
- From: John Stultz <john.stultz@xxxxxxxxxx>
- Re: Documenting the ioctl interfaces to discover relationships between namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: Documenting the ioctl interfaces to discover relationships between namespaces
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: Documenting the ioctl interfaces to discover relationships between namespaces
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: Documenting the ioctl interfaces to discover relationships between namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Documenting the ioctl interfaces to discover relationships between namespaces
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH RFC] user-namespaced file capabilities - now with even more magic
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH RFC] user-namespaced file capabilities - now with even more magic
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH RFC] user-namespaced file capabilities - now with even more magic
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [RESEND][PATCH v4] cgroup: Use CAP_SYS_RESOURCE to allow a process to migrate other tasks between cgroups
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [PATCH RFC] user-namespaced file capabilities - now with even more magic
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RESEND][PATCH v4] cgroup: Use CAP_SYS_RESOURCE to allow a process to migrate other tasks between cgroups
- From: John Stultz <john.stultz@xxxxxxxxxx>
- Re: [PATCH RFC] user-namespaced file capabilities - now with even more magic
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH RFC] user-namespaced file capabilities - now with even more magic
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH RFC] user-namespaced file capabilities - now with even more magic
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] mm: make transparent hugepage size public
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH v27 03/21] vfs: Add MAY_DELETE_SELF and MAY_DELETE_CHILD permission flags
- From: Jeremy Allison <jra@xxxxxxxxx>
- Re: [PATCH v27 03/21] vfs: Add MAY_DELETE_SELF and MAY_DELETE_CHILD permission flags
- From: Jeremy Allison <jra@xxxxxxxxx>
- Re: [PATCH v27 03/21] vfs: Add MAY_DELETE_SELF and MAY_DELETE_CHILD permission flags
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH v27 03/21] vfs: Add MAY_DELETE_SELF and MAY_DELETE_CHILD permission flags
- From: "J. Bruce Fields" <bfields@xxxxxxxxxxxx>
- Re: [RESEND][PATCH v4] cgroup: Use CAP_SYS_RESOURCE to allow a process to migrate other tasks between cgroups
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [RESEND][PATCH v4] cgroup: Use CAP_SYS_RESOURCE to allow a process to migrate other tasks between cgroups
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RESEND][PATCH v4] cgroup: Use CAP_SYS_RESOURCE to allow a process to migrate other tasks between cgroups
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [RESEND][PATCH v4] cgroup: Use CAP_SYS_RESOURCE to allow a process to migrate other tasks between cgroups
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RESEND][PATCH v4] cgroup: Use CAP_SYS_RESOURCE to allow a process to migrate other tasks between cgroups
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [RESEND][PATCH v4] cgroup: Use CAP_SYS_RESOURCE to allow a process to migrate other tasks between cgroups
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [RESEND][PATCH v4] cgroup: Use CAP_SYS_RESOURCE to allow a process to migrate other tasks between cgroups
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [RESEND][PATCH v4] cgroup: Use CAP_SYS_RESOURCE to allow a process to migrate other tasks between cgroups
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RESEND][PATCH v4] cgroup: Use CAP_SYS_RESOURCE to allow a process to migrate other tasks between cgroups
- From: John Stultz <john.stultz@xxxxxxxxxx>
- Re: [PATCH 1/4] statx: Add a system call to make enhanced file info available [ver #3]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 1/4] statx: Add a system call to make enhanced file info available [ver #3]
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH 1/4] statx: Add a system call to make enhanced file info available [ver #3]
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] statx: Add a system call to make enhanced file info available [ver #3]
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] statx: Add a system call to make enhanced file info available [ver #3]
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] statx: Add a system call to make enhanced file info available [ver #3]
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v27 03/21] vfs: Add MAY_DELETE_SELF and MAY_DELETE_CHILD permission flags
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH v27 02/21] vfs: Add MAY_CREATE_FILE and MAY_CREATE_DIR permission flags
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [RFC PATCH 2/3] vfs: add d_replace()
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- Re: [PATCH v2 0/6] enable O and KBUILD_OUTPUT for kselftest
- From: Shuah Khan <shuahkh@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/5] generic: test encrypted file access
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 0/6] enable O and KBUILD_OUTPUT for kselftest
- From: Bamvor Zhang Jian <bamvor.zhangjian@xxxxxxxxxx>
- Re: [PATCH v2 0/6] enable O and KBUILD_OUTPUT for kselftest
- From: Shuah Khan <shuahkh@xxxxxxxxxxxxxxx>
- Re: [PATCH RFC] user-namespaced file capabilities - now with even more magic
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v2 4/5] generic: test encrypted file access
- From: Richard Weinberger <richard@xxxxxx>
- [PATCH v2 0/6] enable O and KBUILD_OUTPUT for kselftest
- From: <bamvor.zhangjian@xxxxxxxxxx>
- [PATCH v2 1/6] selftests: remove duplicated all and clean target
- From: <bamvor.zhangjian@xxxxxxxxxx>
- [PATCH v2 4/6] selftests: remove CROSS_COMPILE in dedicated Makefile
- From: <bamvor.zhangjian@xxxxxxxxxx>
- [PATCH v2 5/6] selftests: add EXTRA_CLEAN for clean target
- From: <bamvor.zhangjian@xxxxxxxxxx>
- [PATCH v2 6/6] selftests: enable O and KBUILD_OUTPUT
- From: <bamvor.zhangjian@xxxxxxxxxx>
- [PATCH v2 3/6] selftests: add default rules for c source file
- From: <bamvor.zhangjian@xxxxxxxxxx>
- [PATCH v2 2/6] selftests: remove useless TEST_DIRS
- From: <bamvor.zhangjian@xxxxxxxxxx>
- Re: [RFC PATCH v8 1/9] Restartable sequences system call
- From: Paul Turner <pjt@xxxxxxxxxx>
- Re: [RFC PATCH v8 1/9] Restartable sequences system call
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH RFC] user-namespaced file capabilities - now with even more magic
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH RFC] user-namespaced file capabilities - now with even more magic
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH RFC] user-namespaced file capabilities - now with even more magic
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH RFC] user-namespaced file capabilities - now with even more magic
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH RFC] user-namespaced file capabilities - now with even more magic
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH 1/4] statx: Add a system call to make enhanced file info available [ver #3]
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH 1/4] statx: Add a system call to make enhanced file info available [ver #3]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 1/4] statx: Add a system call to make enhanced file info available [ver #3]
- From: Andreas Dilger <adilger@xxxxxxxxx>
- Re: [PATCH 4/4] statx: AFS: Return enhanced file attributes [ver #3]
- From: Andreas Dilger <adilger@xxxxxxxxx>
- Re: [PATCH RFC] user-namespaced file capabilities - now with even more magic
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 1/4] statx: Add a system call to make enhanced file info available [ver #3]
- From: Andreas Dilger <adilger@xxxxxxxxx>
- Re: [PATCH 1/4] statx: Add a system call to make enhanced file info available [ver #3]
- From: Andreas Dilger <adilger@xxxxxxxxx>
- Re: [PATCH 2/4] statx: Ext4: Return enhanced file attributes [ver #3]
- From: Andreas Dilger <adilger@xxxxxxxxx>
- Re: [RFC PATCH 2/3] vfs: add d_replace()
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] statx: Add a system call to make enhanced file info available [ver #3]
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v2] fideduperange.2: fix the discussion of maximum sizes
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v2] fideduperange.2: fix the discussion of maximum sizes
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v2] fideduperange.2: fix the discussion of maximum sizes
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v2] fideduperange.2: fix the discussion of maximum sizes
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- Re: [PATCH] fideduperange.2: fix the discussion of maximum sizes
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- Re: [PATCH] fideduperange.2: fix the discussion of maximum sizes
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH] fideduperange.2: fix the discussion of maximum sizes
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- Re: [RFC PATCH 2/3] vfs: add d_replace()
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- Re: [RFC PATCH 2/3] vfs: add d_replace()
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- [PATCH 4/4] statx: AFS: Return enhanced file attributes [ver #3]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 1/4] statx: Add a system call to make enhanced file info available [ver #3]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [RESEND][PATCH v4] cgroup: Use CAP_SYS_RESOURCE to allow a process to migrate other tasks between cgroups
- From: John Stultz <john.stultz@xxxxxxxxxx>
- [PATCH 2/4] statx: Ext4: Return enhanced file attributes [ver #3]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 3/4] statx: NFS: Return enhanced file attributes [ver #3]
- From: David Howells <dhowells@xxxxxxxxxx>
- [RFC][PATCH 0/4] Enhanced file stat system call [ver #3]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [RFC PATCH 1/3] fs: add AT_REPLACE flag for linkat() which replaces the target
- From: Colin Walters <walters@xxxxxxxxxx>
- Re: Formal description of system call interface
- From: Szabolcs Nagy <nsz@xxxxxxxxxx>
- [RFC PATCH 3/3] Btrfs: add support for linkat() AT_REPLACE
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [RFC PATCH 1/3] fs: add AT_REPLACE flag for linkat() which replaces the target
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [RFC PATCH 2/3] vfs: add d_replace()
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [RFC PATCH 0/3] fs: add AT_REPLACE flag for linkat()
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- Re: Formal description of system call interface
- From: Cyril Hrubis <chrubis@xxxxxxx>
- Re: Formal description of system call interface
- From: Cyril Hrubis <chrubis@xxxxxxx>
- Re: Formal description of system call interface
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: Formal description of system call interface
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: Formal description of system call interface
- From: Tavis Ormandy <taviso@xxxxxxxxxx>
- Re: Formal description of system call interface
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: Formal description of system call interface
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: Formal description of system call interface
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH RFC 1/6] selftests: remove duplicated all and clean target
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- [PATCH RFC] user-namespaced file capabilities - now with even more magic
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 1/4] statx: Add a system call to make enhanced file info available
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH 1/4] statx: Add a system call to make enhanced file info available
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH 1/4] statx: Add a system call to make enhanced file info available
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 1/4] statx: Add a system call to make enhanced file info available
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH 2/4] statx: Ext4: Return enhanced file attributes [ver #2]
- From: Andreas Dilger <adilger@xxxxxxxxx>
- Re: [PATCH 1/4] statx: Add a system call to make enhanced file info available [ver #2]
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH 1/4] statx: Add a system call to make enhanced file info available [ver #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 2/4] statx: Ext4: Return enhanced file attributes [ver #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 4/4] statx: AFS: Return enhanced file attributes [ver #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 3/4] statx: NFS: Return enhanced file attributes [ver #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [RFC][PATCH 0/4] Enhanced file stat system call [ver #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH RFC 6/6] selftests: enable O and KBUILD_OUTPUT
- From: "Zhangjian (Bamvor)" <bamvor.zhangjian@xxxxxxxxxx>
- Re: [PATCH RFC 1/6] selftests: remove duplicated all and clean target
- From: "Zhangjian (Bamvor)" <bamvor.zhangjian@xxxxxxxxxx>
- Re: [PATCH RFC 5/6] selftests: add EXTRA_CLEAN for clean target
- From: "Zhangjian (Bamvor)" <bamvor.zhangjian@xxxxxxxxxx>
- Re: [PATCH RFC 6/6] selftests: enable O and KBUILD_OUTPUT
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH RFC 5/6] selftests: add EXTRA_CLEAN for clean target
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH RFC 4/6] selftests: remove CROSS_COMPILE in dedicated Makefile
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH RFC 3/6] selftests: add default rules for c source file
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH RFC 2/6] selftests: remove useless TEST_DIRS
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH RFC 1/6] selftests: remove duplicated all and clean target
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH 1/4] statx: Add a system call to make enhanced file info available
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 1/4] statx: Add a system call to make enhanced file info available
- From: Andreas Dilger <adilger@xxxxxxxxx>
- Re: [PATCH 1/4] statx: Add a system call to make enhanced file info available
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH RFC 0/6] enable O and KBUILD_OUTPUT for kselftest
- From: Shuah Khan <shuahkh@xxxxxxxxxxxxxxx>
- Re: [PATCH RFC 0/6] enable O and KBUILD_OUTPUT for kselftest
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [RFC][PATCH 0/4] Enhanced file stat system call
- From: Michael Kerrisk <mtk.manpages@xxxxxxxxx>
- Re: [RFC][PATCH 0/4] Enhanced file stat system call
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH RFC 0/6] enable O and KBUILD_OUTPUT for kselftest
- From: Shuah Khan <shuahkh@xxxxxxxxxxxxxxx>
- Re: [RFC v4 00/18] Landlock LSM: Unprivileged sandboxing
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RESEND] tools-powerpc: Return false instead of -1
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- Re: [RFC v4 00/18] Landlock LSM: Unprivileged sandboxing
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [RFC v4 00/18] Landlock LSM: Unprivileged sandboxing
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [RFC v4 00/18] Landlock LSM: Unprivileged sandboxing
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: Formal description of system call interface
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- [PATCH resent] uapi libc compat: allow non-glibc to opt out of uapi definitions
- From: Felix Janda <felix.janda@xxxxxxxxx>
- Re: [musl] [PATCH] uapi libc compat: allow non-glibc to opt out of uapi definitions
- From: Rich Felker <dalias@xxxxxxxx>
- [PATCH] uapi libc compat: allow non-glibc to opt out of uapi definitions
- From: Felix Janda <felix.janda@xxxxxxxxx>
- [PATCH RESEND] tools-powerpc: Return false instead of -1
- From: Andrew Shadura <andrew.shadura@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] kernel: Move prctl and helpers from kernel/sys.c to new kernel/prctl.c
- From: Cyrill Gorcunov <gorcunov@xxxxxxxxx>
- Re: [PATCH 0/2] Support compiling out the prctl syscall
- From: Josh Triplett <josh@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] kernel: Support compiling out the prctl syscall
- From: Josh Triplett <josh@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] kernel: Support compiling out the prctl syscall
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 2/2] kernel: Support compiling out the prctl syscall
- From: Josh Triplett <josh@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] kernel: Support compiling out the prctl syscall
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 0/2] Support compiling out the prctl syscall
- From: Nicolas Pitre <nicolas.pitre@xxxxxxxxxx>
- Re: [PATCH 0/2] Support compiling out the prctl syscall
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 1/2] kernel: Move prctl and helpers from kernel/sys.c to new kernel/prctl.c
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- [PATCH 2/2] kernel: Support compiling out the prctl syscall
- From: Josh Triplett <josh@xxxxxxxxxxxxxxxx>
- [PATCH 1/2] kernel: Move prctl and helpers from kernel/sys.c to new kernel/prctl.c
- From: Josh Triplett <josh@xxxxxxxxxxxxxxxx>
- [PATCH 0/2] Support compiling out the prctl syscall
- From: Josh Triplett <josh@xxxxxxxxxxxxxxxx>
- Re: [RESEND][PATCH v4] cgroup: Use CAP_SYS_RESOURCE to allow a process to migrate other tasks between cgroups
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RESEND][PATCH v4] cgroup: Use CAP_SYS_RESOURCE to allow a process to migrate other tasks between cgroups
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [RESEND][PATCH v4] cgroup: Use CAP_SYS_RESOURCE to allow a process to migrate other tasks between cgroups
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [RESEND][PATCH v4] cgroup: Use CAP_SYS_RESOURCE to allow a process to migrate other tasks between cgroups
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [RESEND][PATCH v4] cgroup: Use CAP_SYS_RESOURCE to allow a process to migrate other tasks between cgroups
- From: John Stultz <john.stultz@xxxxxxxxxx>
- Re: [PATCH] mm: only enable sys_pkey* when ARCH_HAS_PKEYS
- From: Dave Hansen <dave.hansen@xxxxxxxxxxxxxxx>
- Re: [PATCH] mm: only enable sys_pkey* when ARCH_HAS_PKEYS
- From: Heiko Carstens <heiko.carstens@xxxxxxxxxx>
- Re: [PATCH] mm: only enable sys_pkey* when ARCH_HAS_PKEYS
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH] mm: only enable sys_pkey* when ARCH_HAS_PKEYS
- From: Heiko Carstens <heiko.carstens@xxxxxxxxxx>
- Re: [PATCH] mm: only enable sys_pkey* when ARCH_HAS_PKEYS
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH] mm: only enable sys_pkey* when ARCH_HAS_PKEYS
- From: Heiko Carstens <heiko.carstens@xxxxxxxxxx>
- Re: Formal description of system call interface
- From: Cyril Hrubis <chrubis@xxxxxxx>
- Re: Formal description of system call interface
- From: Szabolcs Nagy <nsz@xxxxxxxxxx>
- Formal description of system call interface
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH] mm: only enable sys_pkey* when ARCH_HAS_PKEYS
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [4.9-rc3] BUG: unable to handle kernel paging request at ffffc900144dfc60
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH] mm: only enable sys_pkey* when ARCH_HAS_PKEYS
- From: Dave Hansen <dave.hansen@xxxxxxxxxxxxxxx>
- Re: [4.9-rc3] BUG: unable to handle kernel paging request at ffffc900144dfc60
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [4.9-rc3] BUG: unable to handle kernel paging request at ffffc900144dfc60
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [4.9-rc3] BUG: unable to handle kernel paging request at ffffc900144dfc60
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [4.9-rc3] BUG: unable to handle kernel paging request at ffffc900144dfc60
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [4.9-rc3] BUG: unable to handle kernel paging request at ffffc900144dfc60
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/1] mm/mempolicy.c: forbid static or relative flags for local NUMA mode
- From: David Rientjes <rientjes@xxxxxxxxxx>
- [PATCH] mm: only enable sys_pkey* when ARCH_HAS_PKEYS
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH net-next] net: add an ioctl to get a socket network namespace
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH v7 6/6] x86/arch_prctl: Add ARCH_[GET|SET]_CPUID
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v7 6/6] x86/arch_prctl: Add ARCH_[GET|SET]_CPUID
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- [PATCH v3 0/1] mm/mempolicy.c: forbid static or relative flags for local NUMA mode
- From: Piotr Kwapulinski <kwapulinski.piotr@xxxxxxxxx>
- Re: [PATCH v7 6/6] x86/arch_prctl: Add ARCH_[GET|SET]_CPUID
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [RFC v1 00/14] Bus1 Kernel Message Bus
- From: Michael Kerrisk <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v7 5/6] x86/cpufeature: Detect CPUID faulting support
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [kernel-hardening] [RFC v4 03/18] bpf,landlock: Add a new arraymap type to deal with (Landlock) handles
- From: Jann Horn <jann@xxxxxxxxx>
- Re: [PATCH 2/3] ARM: convert to generated system call tables
- From: Robert Jarzmik <robert.jarzmik@xxxxxxx>
- Re: [kernel-hardening] [RFC v4 03/18] bpf,landlock: Add a new arraymap type to deal with (Landlock) handles
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [kernel-hardening] [RFC v4 03/18] bpf,landlock: Add a new arraymap type to deal with (Landlock) handles
- From: Jann Horn <jann@xxxxxxxxx>
- Re: [RFC v4 00/18] Landlock LSM: Unprivileged sandboxing
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RFC v4 00/18] Landlock LSM: Unprivileged sandboxing
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RFC v4 00/18] Landlock LSM: Unprivileged sandboxing
- From: Jann Horn <jann@xxxxxxxxx>
- Re: [kernel-hardening] Re: [RFC v4 02/18] bpf: Move u64_to_ptr() to BPF headers and inline it
- From: David Sterba <dave@xxxxxxxx>
- bpf on Alpha [was Re: [PATCH 2/3] ARM: convert to generated system call tables]
- From: Michael Cree <mcree@xxxxxxxxxxxx>
- Re: [RFC v4 02/18] bpf: Move u64_to_ptr() to BPF headers and inline it
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [RFC v4 10/18] seccomp: Split put_seccomp_filter() with put_seccomp()
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC v4 03/18] bpf,landlock: Add a new arraymap type to deal with (Landlock) handles
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC v4 04/18] bpf,landlock: Add eBPF program subtype and is_valid_subtype() verifier
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC v4 13/18] bpf/cgroup: Replace struct bpf_prog with struct bpf_object
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC v4 12/18] bpf: Cosmetic change for bpf_prog_attach()
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH 2/3] ARM: convert to generated system call tables
- From: Michael Cree <mcree@xxxxxxxxxxxx>
- [RFC v4 14/18] bpf/cgroup: Make cgroup_bpf_update() return an error code
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC v4 02/18] bpf: Move u64_to_ptr() to BPF headers and inline it
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC v4 05/18] bpf,landlock: Define an eBPF program type for Landlock
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC v4 01/18] landlock: Add Kconfig
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC v4 00/18] Landlock LSM: Unprivileged sandboxing
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC v4 09/18] landlock: Add manager functions
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC v4 15/18] bpf/cgroup: Move capability check
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC v4 07/18] landlock: Add LSM hooks
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC v4 11/18] seccomp,landlock: Handle Landlock hooks per process hierarchy
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC v4 08/18] landlock: Handle file comparisons
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC v4 17/18] landlock: Add update and debug access flags
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC v4 16/18] bpf/cgroup,landlock: Handle Landlock hooks per cgroup
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC v4 18/18] samples/landlock: Add sandbox example
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC v4 06/18] fs: Constify path_is_under()'s arguments
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH 2/3] ARM: convert to generated system call tables
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH 2/3] ARM: convert to generated system call tables
- From: Richard Henderson <rth@xxxxxxxxxxx>
- Re: [PATCH v7 0/6] x86/arch_prctl Add ARCH_[GET|SET]_CPUID for controlling the CPUID instruction
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] ARM: convert to generated system call tables
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 2/3] ARM: convert to generated system call tables
- From: Michael Cree <mcree@xxxxxxxxxxxx>
- Re: [PATCH v7 0/6] x86/arch_prctl Add ARCH_[GET|SET]_CPUID for controlling the CPUID instruction
- From: Kyle Huey <me@xxxxxxxxxxxx>
- [PATCH net-next] net: add an ioctl to get a socket network namespace
- From: Andrei Vagin <avagin@xxxxxxxxxx>
- [PATCH v4] cgroup: Use CAP_SYS_RESOURCE to allow a process to migrate other tasks between cgroups
- From: John Stultz <john.stultz@xxxxxxxxxx>
- Re: [PATCH 2/3] ARM: convert to generated system call tables
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH 2/3] ARM: convert to generated system call tables
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH 2/3] ARM: convert to generated system call tables
- From: Robert Jarzmik <robert.jarzmik@xxxxxxx>
- Re: [PATCH 2/3] ARM: convert to generated system call tables
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [RFC][PATCH v3] cgroup: Use CAP_SYS_RESOURCE to allow a process to migrate other tasks between cgroups
- From: John Stultz <john.stultz@xxxxxxxxxx>
- Re: [PATCH 2/3] ARM: convert to generated system call tables
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] ARM: convert to generated system call tables
- From: Joseph Myers <joseph@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] ARM: convert to generated system call tables
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] ARM: convert to generated system call tables
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH] perf_event_open.2: 4.9 PERF_EVENT_IOC_SET_DRV_CONFIGS support
- From: Mathieu Poirier <mathieu.poirier@xxxxxxxxxx>
- Re: [RFC][PATCH v3] cgroup: Use CAP_SYS_RESOURCE to allow a process to migrate other tasks between cgroups
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 2/3] ARM: convert to generated system call tables
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] ARM: convert to generated system call tables
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH RFC 6/6] selftests: enable O and KBUILD_OUTPUT
- From: Bamvor Zhang Jian <bamvor.zhangjian@xxxxxxxxxx>
- Re: [PATCH RFC 5/6] selftests: add EXTRA_CLEAN for clean target
- From: Bamvor Zhang Jian <bamvor.zhangjian@xxxxxxxxxx>
- Re: [PATCH RFC 4/6] selftests: remove CROSS_COMPILE in dedicated Makefile
- From: Bamvor Zhang Jian <bamvor.zhangjian@xxxxxxxxxx>
- Re: [PATCH RFC 3/6] selftests: add default rules for c source file
- From: Bamvor Zhang Jian <bamvor.zhangjian@xxxxxxxxxx>
- Re: [PATCH RFC 2/6] selftests: remove useless TEST_DIRS
- From: Bamvor Zhang Jian <bamvor.zhangjian@xxxxxxxxxx>
- Re: [PATCH RFC 1/6] selftests: remove duplicated all and clean target
- From: Bamvor Zhang Jian <bamvor.zhangjian@xxxxxxxxxx>
- Re: [PATCH RFC 0/6] enable O and KBUILD_OUTPUT for kselftest
- From: Bamvor Zhang Jian <bamvor.zhangjian@xxxxxxxxxx>
- [PATCH RFC 6/6] selftests: enable O and KBUILD_OUTPUT
- From: <bamvor.zhangjian@xxxxxxxxxx>
- [PATCH RFC 4/6] selftests: remove CROSS_COMPILE in dedicated Makefile
- From: <bamvor.zhangjian@xxxxxxxxxx>
- [PATCH RFC 1/6] selftests: remove duplicated all and clean target
- From: <bamvor.zhangjian@xxxxxxxxxx>
- [PATCH RFC 0/6] enable O and KBUILD_OUTPUT for kselftest
- From: <bamvor.zhangjian@xxxxxxxxxx>
- [PATCH RFC 2/6] selftests: remove useless TEST_DIRS
- From: <bamvor.zhangjian@xxxxxxxxxx>
- [PATCH RFC 5/6] selftests: add EXTRA_CLEAN for clean target
- From: <bamvor.zhangjian@xxxxxxxxxx>
- [PATCH RFC 3/6] selftests: add default rules for c source file
- From: <bamvor.zhangjian@xxxxxxxxxx>
- Re: [PATCH] perf_event_open.2: 4.9 PERF_EVENT_IOC_SET_DRV_CONFIGS support
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [RFC][PATCH v3] cgroup: Use CAP_SYS_RESOURCE to allow a process to migrate other tasks between cgroups
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- [RFC][PATCH v3] cgroup: Use CAP_SYS_RESOURCE to allow a process to migrate other tasks between cgroups
- From: John Stultz <john.stultz@xxxxxxxxxx>
- [tip:mm/urgent] mm: Change vm_is_stack_for_task() to vm_is_stack_for_current()
- From: tip-bot for Andy Lutomirski <tipbot@xxxxxxxxx>
- [tip:mm/urgent] fs/proc: Stop trying to report thread stacks
- From: tip-bot for Andy Lutomirski <tipbot@xxxxxxxxx>
- [tip:mm/urgent] fs/proc: Stop reporting eip and esp in /proc/PID/stat
- From: tip-bot for Andy Lutomirski <tipbot@xxxxxxxxx>
- Re: [RFC v3 06/22] landlock: Add LSM hooks
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH] cgroup: Add new capability to allow a process to migrate other tasks between cgroups
- From: John Stultz <john.stultz@xxxxxxxxxx>
- Re: [PATCH] cgroup: Add new capability to allow a process to migrate other tasks between cgroups
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [PATCH] cgroup: Add new capability to allow a process to migrate other tasks between cgroups
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [PATCH] cgroup: Add new capability to allow a process to migrate other tasks between cgroups
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [RFC v3 06/22] landlock: Add LSM hooks
- From: Thomas Graf <tgraf@xxxxxxx>
- Re: [RFC v3 04/22] bpf: Set register type according to is_valid_access()
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- Re: [RFC v3 05/22] bpf,landlock: Add eBPF program subtype and is_valid_subtype() verifier
- From: Thomas Graf <tgraf@xxxxxxx>
- Re: [RFC v3 04/22] bpf: Set register type according to is_valid_access()
- From: Thomas Graf <tgraf@xxxxxxx>
- [PATCH v7 5/6] x86/cpufeature: Detect CPUID faulting support
- From: Kyle Huey <me@xxxxxxxxxxxx>
- [PATCH v7 6/6] x86/arch_prctl: Add ARCH_[GET|SET]_CPUID
- From: Kyle Huey <me@xxxxxxxxxxxx>
- [PATCH v7 2/6] x86/arch_prctl/64: Rename do_arch_prctl to do_arch_prctl_64
- From: Kyle Huey <me@xxxxxxxxxxxx>
- [PATCH v7 4/6] x86/syscalls/32: Wire up arch_prctl on x86-32
- From: Kyle Huey <me@xxxxxxxxxxxx>
- [PATCH v7 3/6] x86/arch_prctl: Add do_arch_prctl_common
- From: Kyle Huey <me@xxxxxxxxxxxx>
- [PATCH v7 1/6] x86/arch_prctl/64: Use SYSCALL_DEFINE2 to define sys_arch_prctl
- From: Kyle Huey <me@xxxxxxxxxxxx>
- [PATCH v7 0/6] x86/arch_prctl Add ARCH_[GET|SET]_CPUID for controlling the CPUID instruction
- From: Kyle Huey <me@xxxxxxxxxxxx>
- Re: [PATCH] cgroup: Add new capability to allow a process to migrate other tasks between cgroups
- From: John Stultz <john.stultz@xxxxxxxxxx>
- [PATCH] x86, pkeys: remove cruft from never-merged syscalls
- From: Dave Hansen <dave@xxxxxxxx>
- Re: [PATCH] cgroup: Add new capability to allow a process to migrate other tasks between cgroups
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH 2/2] man2/ioctl_fideduperange.2: clarify operation some more
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH 1/2] man2/fallocate.2: document behavior with shared blocks
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH] pkey.7: add description of signal handling behavior
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH 1/5] pkey.7: New page with overview of Memory Protection Keys
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- [PATCH 2/2] man2/ioctl_fideduperange.2: clarify operation some more
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH 1/2] man2/fallocate.2: document behavior with shared blocks
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- Re: [PATCH] cgroup: Add new capability to allow a process to migrate other tasks between cgroups
- From: John Stultz <john.stultz@xxxxxxxxxx>
- Re: [PATCH] cgroup: Add new capability to allow a process to migrate other tasks between cgroups
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- [PATCH] cgroup: Add new capability to allow a process to migrate other tasks between cgroups
- From: John Stultz <john.stultz@xxxxxxxxxx>
- [PATCH] pkey.7: add description of signal handling behavior
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 1/5] pkey.7: New page with overview of Memory Protection Keys
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH] x86, pkeys: remove cruft from never-merged syscalls
- From: Dave Hansen <dave@xxxxxxxx>
- Re: [PATCH] generic syscalls: kill cruft from removed pkey syscalls
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH] generic syscalls: kill cruft from removed pkey syscalls
- From: Dave Hansen <dave@xxxxxxxx>
- Re: [PATCH 1/5] pkey.7: New page with overview of Memory Protection Keys
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: pkeys: Remove easily triggered WARN
- From: Heiko Carstens <heiko.carstens@xxxxxxxxxx>
- Re: pkeys: Remove easily triggered WARN
- From: Heiko Carstens <heiko.carstens@xxxxxxxxxx>
- Re: [PATCH 1/3] proc: Stop reporting eip and esp in /proc/PID/stat
- From: Tycho Andersen <tycho.andersen@xxxxxxxxxxxxx>
- Re: pkeys: Remove easily triggered WARN
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 0/3] ABI CHANGE!!! Remove questionable remote SP reads
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- pkeys: Remove easily triggered WARN
- From: Dave Jones <davej@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] proc: Stop reporting eip and esp in /proc/PID/stat
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- [PATCH v4 12/12] parisc/tracing: fix compat syscall handling
- From: Marcin Nowakowski <marcin.nowakowski@xxxxxxxxxx>
- [PATCH v4 03/12] tracing/syscalls: drop arch_syscall_match_sym_name
- From: Marcin Nowakowski <marcin.nowakowski@xxxxxxxxxx>
- [PATCH v4 02/12] tracing/syscalls: add handling for compat tasks
- From: Marcin Nowakowski <marcin.nowakowski@xxxxxxxxxx>
- [PATCH v4 01/12] tracing/syscalls: remove syscall_nr from syscall metadata
- From: Marcin Nowakowski <marcin.nowakowski@xxxxxxxxxx>
- [PATCH v4 08/12] arm64/tracing: fix compat syscall handling
- From: Marcin Nowakowski <marcin.nowakowski@xxxxxxxxxx>
- [PATCH v4 09/12] powerpc/tracing: fix compat syscall handling
- From: Marcin Nowakowski <marcin.nowakowski@xxxxxxxxxx>
- [PATCH v4 07/12] s390/tracing: fix compat syscall handling
- From: Marcin Nowakowski <marcin.nowakowski@xxxxxxxxxx>
- [PATCH v4 04/12] tracing/syscalls: add compat syscall metadata
- From: Marcin Nowakowski <marcin.nowakowski@xxxxxxxxxx>
- [PATCH v4 05/12] syscall/tracing: allow arch to override syscall_get_nr for ftrace
- From: Marcin Nowakowski <marcin.nowakowski@xxxxxxxxxx>
- [PATCH v4 05/12] tracing/syscalls: allow arch to override syscall_get_nr for ftrace
- From: Marcin Nowakowski <marcin.nowakowski@xxxxxxxxxx>
- [PATCH v4 11/12] sparc/tracing: fix compat syscall handling
- From: Marcin Nowakowski <marcin.nowakowski@xxxxxxxxxx>
- [PATCH v4 06/12] x86/tracing: fix compat syscall handling
- From: Marcin Nowakowski <marcin.nowakowski@xxxxxxxxxx>
- [PATCH v4 10/12] tile/tracing: fix compat syscall handling
- From: Marcin Nowakowski <marcin.nowakowski@xxxxxxxxxx>
- [PATCH v4 00/12] syscall/tracing: compat syscall support
- From: Marcin Nowakowski <marcin.nowakowski@xxxxxxxxxx>
- Re: [PATCH v3 03/11] tracing/syscalls: add compat syscall metadata
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v3 05/11] x86/tracing: fix compat syscall handling
- From: Marcin Nowakowski <marcin.nowakowski@xxxxxxxxxx>
- Re: [PATCH v3 0/1] man/set_mempolicy.2,mbind.2: add MPOL_LOCAL NUMA memory policy documentation
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v3 0/1] man/set_mempolicy.2,mbind.2: add MPOL_LOCAL NUMA memory policy documentation
- From: Christoph Lameter <cl@xxxxxxxxx>
- Re: [PATCH 1/5] pkey.7: New page with overview of Memory Protection Keys
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 1/6] pkey.7: New page with overview of Memory Protection Keys
- From: Dave Hansen <dave@xxxxxxxx>
- Re: [PATCH v3 0/1] man/set_mempolicy.2,mbind.2: add MPOL_LOCAL NUMA memory policy documentation
- From: Piotr Kwapulinski <kwapulinski.piotr@xxxxxxxxx>
- Re: [PATCH v3 0/1] man/set_mempolicy.2,mbind.2: add MPOL_LOCAL NUMA memory policy documentation
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v3 0/1] man/set_mempolicy.2,mbind.2: add MPOL_LOCAL NUMA memory policy documentation
- From: Christoph Lameter <cl@xxxxxxxxx>
- Re: [PATCH v3 05/11] x86/tracing: fix compat syscall handling
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v3 08/11] powerpc/tracing: fix compat syscall handling
- From: Marcin Nowakowski <marcin.nowakowski@xxxxxxxxxx>
- Re: [PATCH v3 03/11] tracing/syscalls: add compat syscall metadata
- From: Marcin Nowakowski <marcin.nowakowski@xxxxxxxxxx>
- Re: [PATCH v3 07/11] arm64/tracing: fix compat syscall handling
- From: Will Deacon <will.deacon@xxxxxxx>
- Re: [PATCH v3 08/11] powerpc/tracing: fix compat syscall handling
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v3 03/11] tracing/syscalls: add compat syscall metadata
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH 1/6] pkey.7: New page with overview of Memory Protection Keys
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH v3 0/1] man/set_mempolicy.2,mbind.2: add MPOL_LOCAL NUMA memory policy documentation
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v3 07/11] arm64/tracing: fix compat syscall handling
- From: Marcin Nowakowski <marcin.nowakowski@xxxxxxxxxx>
- Re: [PATCH 1/5] pkey.7: New page with overview of Memory Protection Keys
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: Return type of getrandom(2)
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [PATCH v3 07/11] arm64/tracing: fix compat syscall handling
- From: Will Deacon <will.deacon@xxxxxxx>
- [PATCH v27 05/21] richacl: In-memory representation and helper functions
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v27 04/21] vfs: Add permission flags for setting file attributes
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v27 03/21] vfs: Add MAY_DELETE_SELF and MAY_DELETE_CHILD permission flags
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v27 02/21] vfs: Add MAY_CREATE_FILE and MAY_CREATE_DIR permission flags
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v27 01/21] vfs: Add IS_ACL() and IS_RICHACL() tests
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v27 00/21] Richacls (Core and Ext4)
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v27 06/21] richacl: Permission mapping functions
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v27 07/21] richacl: Permission check algorithm
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v27 09/21] vfs: Cache base_acl objects in inodes
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v27 08/21] richacl: Compute maximum file masks from an acl
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v27 10/21] vfs: Add get_richacl and set_richacl inode operations
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v27 11/21] vfs: Cache richacl in struct inode
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v27 13/21] richacl: Check if an acl is equivalent to a file mode
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v27 14/21] richacl: Create-time inheritance
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v27 12/21] richacl: Update the file masks in chmod()
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v27 15/21] richacl: Automatic Inheritance
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v27 17/21] richacl: Add richacl xattr handler
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v27 16/21] richacl: xattr mapping functions
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v27 18/21] vfs: Add richacl permission checking
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v27 19/21] vfs: Move check_posix_acl and check_richacl out of fs/namei.c
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v27 20/21] ext4: Add richacl support
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v27 21/21] ext4: Add richacl feature flag
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v3 01/11] tracing/syscalls: remove syscall_nr from syscall metadata
- From: Marcin Nowakowski <marcin.nowakowski@xxxxxxxxxx>
- [PATCH v3 02/11] tracing/syscalls: add handling for compat tasks
- From: Marcin Nowakowski <marcin.nowakowski@xxxxxxxxxx>
- [PATCH v3 04/11] syscall/tracing: allow arch to override syscall_get_nr for ftrace
- From: Marcin Nowakowski <marcin.nowakowski@xxxxxxxxxx>
- [PATCH v3 06/11] s390/tracing: fix compat syscall handling
- From: Marcin Nowakowski <marcin.nowakowski@xxxxxxxxxx>
- [PATCH v3 05/11] x86/tracing: fix compat syscall handling
- From: Marcin Nowakowski <marcin.nowakowski@xxxxxxxxxx>
- [PATCH v3 03/11] tracing/syscalls: add compat syscall metadata
- From: Marcin Nowakowski <marcin.nowakowski@xxxxxxxxxx>
- [PATCH v3 08/11] powerpc/tracing: fix compat syscall handling
- From: Marcin Nowakowski <marcin.nowakowski@xxxxxxxxxx>
- [PATCH v3 10/11] sparc/tracing: fix compat syscall handling
- From: Marcin Nowakowski <marcin.nowakowski@xxxxxxxxxx>
- [PATCH v3 09/11] tile/tracing: fix compat syscall handling
- From: Marcin Nowakowski <marcin.nowakowski@xxxxxxxxxx>
- [PATCH v3 11/11] parisc/tracing: fix compat syscall handling
- From: Marcin Nowakowski <marcin.nowakowski@xxxxxxxxxx>
- [PATCH v3 07/11] arm64/tracing: fix compat syscall handling
- From: Marcin Nowakowski <marcin.nowakowski@xxxxxxxxxx>
- [PATCH v3 00/11] syscall/tracing: compat syscall support
- From: Marcin Nowakowski <marcin.nowakowski@xxxxxxxxxx>
- [PATCH v3 0/1] man/set_mempolicy.2,mbind.2: add MPOL_LOCAL NUMA memory policy documentation
- From: Piotr Kwapulinski <kwapulinski.piotr@xxxxxxxxx>
- Re: [PATCH v2 0/1] man/set_mempolicy.2,mbind.2: add MPOL_LOCAL NUMA memory policy documentation
- From: Christoph Lameter <cl@xxxxxxxxx>
- [PATCH v2 0/1] man/set_mempolicy.2,mbind.2: add MPOL_LOCAL NUMA memory policy documentation
- From: Piotr Kwapulinski <kwapulinski.piotr@xxxxxxxxx>
- Re: Return type of getrandom(2)
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: Return type of getrandom(2)
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: Return type of getrandom(2)
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Return type of getrandom(2)
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [RFC v3 03/22] bpf,landlock: Add a new arraymap type to deal with (Landlock) handles
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RFC v3 16/22] bpf/cgroup,landlock: Handle Landlock hooks per cgroup
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC v3 11/22] seccomp,landlock: Handle Landlock hooks per process hierarchy
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RFC v3 19/22] landlock: Add interrupted origin
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RFC v3 16/22] bpf/cgroup,landlock: Handle Landlock hooks per cgroup
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RFC v2 00/10] Landlock LSM: Unprivileged sandboxing
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [Documentation] State of CPU controller in cgroup v2
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [Documentation] State of CPU controller in cgroup v2
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [PATCH 0/1] man/set_mempolicy.2,mbind.2: add MPOL_LOCAL NUMA memory policy documentation
- From: Christoph Lameter <cl@xxxxxxxxx>
- Re: [PATCH 0/3] ABI CHANGE!!! Remove questionable remote SP reads
- From: Raymond Jennings <shentino@xxxxxxxxx>
- Re: [RFC v3 03/22] bpf,landlock: Add a new arraymap type to deal with (Landlock) handles
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC v3 11/22] seccomp,landlock: Handle Landlock hooks per process hierarchy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC v3 19/22] landlock: Add interrupted origin
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC v3 16/22] bpf/cgroup,landlock: Handle Landlock hooks per cgroup
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC v3 07/22] landlock: Handle file comparisons
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 0/3] ABI CHANGE!!! Remove questionable remote SP reads
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] ABI CHANGE!!! Remove questionable remote SP reads
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RFC v2 00/10] Landlock LSM: Unprivileged sandboxing
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 1/3] proc: Stop reporting eip and esp in /proc/PID/stat
- From: Jann Horn <jann@xxxxxxxxx>
- Re: [PATCH 1/3] proc: Stop reporting eip and esp in /proc/PID/stat
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] proc: Stop reporting eip and esp in /proc/PID/stat
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: Ping: [PATCH v15 00/13] support "task_isolation" mode
- From: Chris Metcalf <cmetcalf@xxxxxxxxxxxx>
- Re: [PATCH v15 04/13] task_isolation: add initial support
- From: Chris Metcalf <cmetcalf@xxxxxxxxxxxx>
- Re: [PATCH 1/3] proc: Stop reporting eip and esp in /proc/PID/stat
- From: Jann Horn <jann@xxxxxxxxx>
- [PATCH 2/3] proc: Stop trying to report thread stacks
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH 3/3] mm: Change vm_is_stack_for_task() to vm_is_stack_for_current()
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH 1/3] proc: Stop reporting eip and esp in /proc/PID/stat
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH 0/3] ABI CHANGE!!! Remove questionable remote SP reads
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v25 00/21] Richacls (Core and Ext4)
- From: "J. Bruce Fields" <bfields@xxxxxxxxxxxx>
- Re: [Documentation] State of CPU controller in cgroup v2
- From: Mike Galbraith <umgwanakikbuti@xxxxxxxxx>
- Re: [Documentation] State of CPU controller in cgroup v2
- From: Tejun Heo <tj@xxxxxxxxxx>
- [PATCH 3/3] block: implement (some of) fallocate for block devices
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH 2/3] block: require write_same and discard requests align to logical block size
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH 1/3] block: invalidate the page cache when issuing BLKZEROOUT.
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH v11 0/3] fallocate for block devices
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- Re: [PATCH v2 3/3] block: implement (some of) fallocate for block devices
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- Re: [PATCH v2 3/3] block: implement (some of) fallocate for block devices
- From: Bart Van Assche <bart.vanassche@xxxxxxxxxxx>
- Re: [PATCH v2 2/8] pipe: move limit checking logic into pipe_set_size()
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH v2 0/8] pipe: fix limit handling
- From: Vegard Nossum <vegard.nossum@xxxxxxxxxx>
- Re: [PATCH v2 5/8] pipe: simplify logic in alloc_pipe_info()
- From: Vegard Nossum <vegard.nossum@xxxxxxxxxx>
- Re: [PATCH v2 2/8] pipe: move limit checking logic into pipe_set_size()
- From: Vegard Nossum <vegard.nossum@xxxxxxxxxx>
- Re: [PATCH 3/3] block: implement (some of) fallocate for block devices
- From: Hannes Reinecke <hare@xxxxxxx>
- Re: [PATCH 2/3] block: require write_same and discard requests align to logical block size
- From: Hannes Reinecke <hare@xxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Linux SCSI]
[Samba]
[Yosemite News]