Linux API
Thread Index
[Prev Page][
Next Page
]
Re: [PATCH v4 1/3] lsm: introduce new hooks for setting/getting inode fsxattr
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [RFC -next 00/10] Add ZC notifications to splice and sendfile
From
: Joe Damato <jdamato@xxxxxxxxxx>
Re: [RFC -next 00/10] Add ZC notifications to splice and sendfile
From
: Pavel Begunkov <asml.silence@xxxxxxxxx>
Re: [RFC -next 00/10] Add ZC notifications to splice and sendfile
From
: Jens Axboe <axboe@xxxxxxxxx>
Re: [RFC -next 00/10] Add ZC notifications to splice and sendfile
From
: Jens Axboe <axboe@xxxxxxxxx>
Re: [RFC -next 00/10] Add ZC notifications to splice and sendfile
From
: Joe Damato <jdamato@xxxxxxxxxx>
[PATCH v4 3/3] fs: introduce getfsxattrat and setfsxattrat syscalls
From
: Andrey Albershteyn <aalbersh@xxxxxxxxxx>
[PATCH v4 0/3] fs: introduce getfsxattrat and setfsxattrat syscalls
From
: Andrey Albershteyn <aalbersh@xxxxxxxxxx>
[PATCH v4 2/3] fs: split fileattr/fsxattr converters into helpers
From
: Andrey Albershteyn <aalbersh@xxxxxxxxxx>
[PATCH v4 1/3] lsm: introduce new hooks for setting/getting inode fsxattr
From
: Andrey Albershteyn <aalbersh@xxxxxxxxxx>
Re: [RFC -next 00/10] Add ZC notifications to splice and sendfile
From
: Joe Damato <jdamato@xxxxxxxxxx>
Re: [RFC -next 00/10] Add ZC notifications to splice and sendfile
From
: Joe Damato <jdamato@xxxxxxxxxx>
Re: [RFC -next 00/10] Add ZC notifications to splice and sendfile
From
: Jens Axboe <axboe@xxxxxxxxx>
Re: [RFC -next 00/10] Add ZC notifications to splice and sendfile
From
: Jens Axboe <axboe@xxxxxxxxx>
Re: [RFC -next 00/10] Add ZC notifications to splice and sendfile
From
: Jens Axboe <axboe@xxxxxxxxx>
Re: [RFC -next 00/10] Add ZC notifications to splice and sendfile
From
: Stefan Metzmacher <metze@xxxxxxxxx>
Re: [RFC -next 00/10] Add ZC notifications to splice and sendfile
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
Re: [RFC -next 00/10] Add ZC notifications to splice and sendfile
From
: Joe Damato <jdamato@xxxxxxxxxx>
Re: [RFC -next 00/10] Add ZC notifications to splice and sendfile
From
: Joe Damato <jdamato@xxxxxxxxxx>
Re: [RFC -next 00/10] Add ZC notifications to splice and sendfile
From
: Pavel Begunkov <asml.silence@xxxxxxxxx>
Re: [RFC -next 00/10] Add ZC notifications to splice and sendfile
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
Re: [RFC -next 00/10] Add ZC notifications to splice and sendfile
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
Re: [PATCH 1/2] fs/proc/task_mmu: add guard region bit to pagemap
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [RFC -next 00/10] Add ZC notifications to splice and sendfile
From
: Joe Damato <jdamato@xxxxxxxxxx>
Re: [RFC -next 00/10] Add ZC notifications to splice and sendfile
From
: Joe Damato <jdamato@xxxxxxxxxx>
Re: [RFC -next 00/10] Add ZC notifications to splice and sendfile
From
: Stefan Metzmacher <metze@xxxxxxxxx>
Re: [PATCH 1/2] fs/proc/task_mmu: add guard region bit to pagemap
From
: Lorenzo Stoakes <lorenzo.stoakes@xxxxxxxxxx>
Re: [RFC -next 00/10] Add ZC notifications to splice and sendfile
From
: Jens Axboe <axboe@xxxxxxxxx>
Re: [PATCH 1/2] fs/proc/task_mmu: add guard region bit to pagemap
From
: Andrei Vagin <avagin@xxxxxxxxx>
Re: [RFC -next 00/10] Add ZC notifications to splice and sendfile
From
: Joe Damato <jdamato@xxxxxxxxxx>
Re: [RFC -next 00/10] Add ZC notifications to splice and sendfile
From
: Jens Axboe <axboe@xxxxxxxxx>
Re: [RFC -next 00/10] Add ZC notifications to splice and sendfile
From
: Joe Damato <jdamato@xxxxxxxxxx>
Re: [RFC -next 00/10] Add ZC notifications to splice and sendfile
From
: Jens Axboe <axboe@xxxxxxxxx>
Re: [RFC -next 00/10] Add ZC notifications to splice and sendfile
From
: Joe Damato <jdamato@xxxxxxxxxx>
Re: [PATCH v4 0/5] implement lightweight guard pages
From
: Lorenzo Stoakes <lorenzo.stoakes@xxxxxxxxxx>
Re: [PATCH v4 0/5] implement lightweight guard pages
From
: Aleksandr Mikhalitsyn <aleksandr.mikhalitsyn@xxxxxxxxxxxxx>
Re: [PATCH v4 0/5] implement lightweight guard pages
From
: Aleksandr Mikhalitsyn <aleksandr.mikhalitsyn@xxxxxxxxxxxxx>
Re: [PATCH v4 0/5] implement lightweight guard pages
From
: Alexander Mikhalitsyn <aleksandr.mikhalitsyn@xxxxxxxxxxxxx>
Re: [PATCH v4 0/5] implement lightweight guard pages
From
: David Hildenbrand <david@xxxxxxxxxx>
Re: [RFC -next 00/10] Add ZC notifications to splice and sendfile
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
[RFC -next 10/10] selftests: Add sendfile zerocopy notification test
From
: Joe Damato <jdamato@xxxxxxxxxx>
[RFC -next 09/10] fs: Add sendfile2 syscall
From
: Joe Damato <jdamato@xxxxxxxxxx>
[RFC -next 06/10] fs: Extend do_sendfile to take a flags argument
From
: Joe Damato <jdamato@xxxxxxxxxx>
[RFC -next 05/10] fs: Add splice_write_sd to file operations
From
: Joe Damato <jdamato@xxxxxxxxxx>
[RFC -next 08/10] fs: Add sendfile flags for sendfile2
From
: Joe Damato <jdamato@xxxxxxxxxx>
[RFC -next 07/10] fs: Add sendfile2 which accepts a flags argument
From
: Joe Damato <jdamato@xxxxxxxxxx>
[RFC -next 04/10] splice: Add SPLICE_F_ZC and attach ubuf
From
: Joe Damato <jdamato@xxxxxxxxxx>
[RFC -next 03/10] splice: Factor splice_socket into a helper
From
: Joe Damato <jdamato@xxxxxxxxxx>
[RFC -next 02/10] splice: Add helper that passes through splice_desc
From
: Joe Damato <jdamato@xxxxxxxxxx>
[RFC -next 01/10] splice: Add ubuf_info to prepare for ZC
From
: Joe Damato <jdamato@xxxxxxxxxx>
[RFC -next 00/10] Add ZC notifications to splice and sendfile
From
: Joe Damato <jdamato@xxxxxxxxxx>
Re: [RFC PATCH 5/9] Define user structure for events and responses.
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: Add sysctl for tcp_delayed_ack
From
: Eric Dumazet <edumazet@xxxxxxxxxx>
Re: Add sysctl for tcp_delayed_ack
From
: Jason Xing <kerneljasonxing@xxxxxxxxx>
Add sysctl for tcp_delayed_ack
From
: Andrew Easton <Andrew@xxxxxxxxxxxx>
Re: [RFC PATCH 5/9] Define user structure for events and responses.
From
: Tingmao Wang <m@xxxxxxxxxx>
Re: [RFC PATCH 5/9] Define user structure for events and responses.
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [PATCHv3 perf/core] uprobes: Harden uretprobe syscall trampoline check
From
: Ingo Molnar <mingo@xxxxxxxxxx>
Re: [PATCHv3 perf/core] uprobes: Harden uretprobe syscall trampoline check
From
: Jiri Olsa <olsajiri@xxxxxxxxx>
Re: [PATCH v3 03/20] mm: let _folio_nr_pages overlay memcg_data in first tail page
From
: David Hildenbrand <david@xxxxxxxxxx>
Re: [PATCH v3 00/20] mm: MM owner tracking for large folios (!hugetlb) + CONFIG_NO_PAGE_MAPCOUNT
From
: David Hildenbrand <david@xxxxxxxxxx>
Re: [PATCH v3 00/20] mm: MM owner tracking for large folios (!hugetlb) + CONFIG_NO_PAGE_MAPCOUNT
From
: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
[PATCH v3 17/20] fs/proc/task_mmu: remove per-page mapcount dependency for PM_MMAP_EXCLUSIVE (CONFIG_NO_PAGE_MAPCOUNT)
From
: David Hildenbrand <david@xxxxxxxxxx>
[PATCH v3 19/20] fs/proc/task_mmu: remove per-page mapcount dependency for smaps/smaps_rollup (CONFIG_NO_PAGE_MAPCOUNT)
From
: David Hildenbrand <david@xxxxxxxxxx>
[PATCH v3 20/20] mm: stop maintaining the per-page mapcount of large folios (CONFIG_NO_PAGE_MAPCOUNT)
From
: David Hildenbrand <david@xxxxxxxxxx>
[PATCH v3 10/20] bit_spinlock: __always_inline (un)lock functions
From
: David Hildenbrand <david@xxxxxxxxxx>
[PATCH v3 18/20] fs/proc/task_mmu: remove per-page mapcount dependency for "mapmax" (CONFIG_NO_PAGE_MAPCOUNT)
From
: David Hildenbrand <david@xxxxxxxxxx>
[PATCH v3 14/20] mm: convert folio_likely_mapped_shared() to folio_maybe_mapped_shared()
From
: David Hildenbrand <david@xxxxxxxxxx>
[PATCH v3 15/20] mm: CONFIG_NO_PAGE_MAPCOUNT to prepare for not maintain per-page mapcounts in large folios
From
: David Hildenbrand <david@xxxxxxxxxx>
[PATCH v3 13/20] mm: Copy-on-Write (COW) reuse support for PTE-mapped THP
From
: David Hildenbrand <david@xxxxxxxxxx>
[PATCH v3 08/20] mm/rmap: pass vma to __folio_add_rmap()
From
: David Hildenbrand <david@xxxxxxxxxx>
[PATCH v3 07/20] mm/rmap: pass dst_vma to folio_dup_file_rmap_pte() and friends
From
: David Hildenbrand <david@xxxxxxxxxx>
[PATCH v3 11/20] mm/rmap: use folio_large_nr_pages() in add/remove functions
From
: David Hildenbrand <david@xxxxxxxxxx>
[PATCH v3 05/20] mm: move _pincount in folio to page[2] on 32bit
From
: David Hildenbrand <david@xxxxxxxxxx>
[PATCH v3 12/20] mm/rmap: basic MM owner tracking for large folios (!hugetlb)
From
: David Hildenbrand <david@xxxxxxxxxx>
[PATCH v3 16/20] fs/proc/page: remove per-page mapcount dependency for /proc/kpagecount (CONFIG_NO_PAGE_MAPCOUNT)
From
: David Hildenbrand <david@xxxxxxxxxx>
[PATCH v3 00/20] mm: MM owner tracking for large folios (!hugetlb) + CONFIG_NO_PAGE_MAPCOUNT
From
: David Hildenbrand <david@xxxxxxxxxx>
[PATCH v3 06/20] mm: move _entire_mapcount in folio to page[2] on 32bit
From
: David Hildenbrand <david@xxxxxxxxxx>
[PATCH v3 09/20] mm/rmap: abstract large mapcount operations for large folios (!hugetlb)
From
: David Hildenbrand <david@xxxxxxxxxx>
[PATCH v3 03/20] mm: let _folio_nr_pages overlay memcg_data in first tail page
From
: David Hildenbrand <david@xxxxxxxxxx>
[PATCH v3 01/20] mm: factor out large folio handling from folio_order() into folio_large_order()
From
: David Hildenbrand <david@xxxxxxxxxx>
[PATCH v3 02/20] mm: factor out large folio handling from folio_nr_pages() into folio_large_nr_pages()
From
: David Hildenbrand <david@xxxxxxxxxx>
[PATCH v3 04/20] mm: move hugetlb specific things in folio to page[3]
From
: David Hildenbrand <david@xxxxxxxxxx>
[PATCH v7 5/6] ptrace: introduce PTRACE_SET_SYSCALL_INFO request
From
: "Dmitry V. Levin" <ldv@xxxxxxxxx>
[PATCH v7 0/6] ptrace: introduce PTRACE_SET_SYSCALL_INFO API
From
: "Dmitry V. Levin" <ldv@xxxxxxxxx>
Re: [PATCH v3] fs: introduce getfsxattrat and setfsxattrat syscalls
From
: Pali Rohár <pali@xxxxxxxxxx>
Re: [PATCH 2/4] selftests/mm: rename guard-pages to guard-regions
From
: Lorenzo Stoakes <lorenzo.stoakes@xxxxxxxxxx>
[PATCH] tools/selftests: fix guard regions invocation
From
: Lorenzo Stoakes <lorenzo.stoakes@xxxxxxxxxx>
Re: [PATCH v3] fs: introduce getfsxattrat and setfsxattrat syscalls
From
: Andrey Albershteyn <aalbersh@xxxxxxxxxx>
Re: [PATCH v3] fs: introduce getfsxattrat and setfsxattrat syscalls
From
: Pali Rohár <pali@xxxxxxxxxx>
[PATCH v4 2/5] futex: Create set_robust_list2
From
: André Almeida <andrealmeid@xxxxxxxxxx>
[PATCH v4 5/5] selftests: futex: Expand robust list test for the new interface
From
: André Almeida <andrealmeid@xxxxxxxxxx>
[PATCH v4 4/5] futex: Remove the limit of elements for sys_set_robust_list2 lists
From
: André Almeida <andrealmeid@xxxxxxxxxx>
[PATCH v4 0/5] futex: Create set_robust_list2
From
: André Almeida <andrealmeid@xxxxxxxxxx>
[PATCH v4 1/5] futex: Use explicit sizes for compat_exit_robust_list
From
: André Almeida <andrealmeid@xxxxxxxxxx>
[PATCH v4 3/5] futex: Wire up set_robust_list2 syscall
From
: André Almeida <andrealmeid@xxxxxxxxxx>
Re: [PATCH 0/4] mm: permit guard regions for file-backed/shmem mappings
From
: David Hildenbrand <david@xxxxxxxxxx>
Re: [PATCH 0/4] mm: permit guard regions for file-backed/shmem mappings
From
: Lorenzo Stoakes <lorenzo.stoakes@xxxxxxxxxx>
Re: [PATCH 0/4] mm: permit guard regions for file-backed/shmem mappings
From
: David Hildenbrand <david@xxxxxxxxxx>
Re: [PATCH v3] fs: introduce getfsxattrat and setfsxattrat syscalls
From
: "Darrick J. Wong" <djwong@xxxxxxxxxx>
Re: [PATCH 0/4] mm: permit guard regions for file-backed/shmem mappings
From
: Vlastimil Babka <vbabka@xxxxxxx>
Re: [PATCH v3] fs: introduce getfsxattrat and setfsxattrat syscalls
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [PATCH v2 17/20] fs/proc/task_mmu: remove per-page mapcount dependency for PM_MMAP_EXCLUSIVE (CONFIG_NO_PAGE_MAPCOUNT)
From
: David Hildenbrand <david@xxxxxxxxxx>
Re: [PATCH v3] fs: introduce getfsxattrat and setfsxattrat syscalls
From
: "Arnd Bergmann" <arnd@xxxxxxxx>
Re: [PATCH v3] fs: introduce getfsxattrat and setfsxattrat syscalls
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [PATCH v3] fs: introduce getfsxattrat and setfsxattrat syscalls
From
: "Arnd Bergmann" <arnd@xxxxxxxx>
Re: [PATCH v3] fs: introduce getfsxattrat and setfsxattrat syscalls
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v2 16/20] fs/proc/page: remove per-page mapcount dependency for /proc/kpagecount (CONFIG_NO_PAGE_MAPCOUNT)
From
: David Hildenbrand <david@xxxxxxxxxx>
Re: [PATCH v2 16/20] fs/proc/page: remove per-page mapcount dependency for /proc/kpagecount (CONFIG_NO_PAGE_MAPCOUNT)
From
: Zi Yan <ziy@xxxxxxxxxx>
Re: [PATCH v2 16/20] fs/proc/page: remove per-page mapcount dependency for /proc/kpagecount (CONFIG_NO_PAGE_MAPCOUNT)
From
: David Hildenbrand <david@xxxxxxxxxx>
Re: [PATCH v2 16/20] fs/proc/page: remove per-page mapcount dependency for /proc/kpagecount (CONFIG_NO_PAGE_MAPCOUNT)
From
: Zi Yan <ziy@xxxxxxxxxx>
Re: [PATCH v2 19/20] fs/proc/task_mmu: remove per-page mapcount dependency for smaps/smaps_rollup (CONFIG_NO_PAGE_MAPCOUNT)
From
: David Hildenbrand <david@xxxxxxxxxx>
Re: [PATCH v2 16/20] fs/proc/page: remove per-page mapcount dependency for /proc/kpagecount (CONFIG_NO_PAGE_MAPCOUNT)
From
: David Hildenbrand <david@xxxxxxxxxx>
Re: [PATCH v2 16/20] fs/proc/page: remove per-page mapcount dependency for /proc/kpagecount (CONFIG_NO_PAGE_MAPCOUNT)
From
: Zi Yan <ziy@xxxxxxxxxx>
Re: [PATCH v2 16/20] fs/proc/page: remove per-page mapcount dependency for /proc/kpagecount (CONFIG_NO_PAGE_MAPCOUNT)
From
: David Hildenbrand <david@xxxxxxxxxx>
Re: [PATCH v2 18/20] fs/proc/task_mmu: remove per-page mapcount dependency for "mapmax" (CONFIG_NO_PAGE_MAPCOUNT)
From
: David Hildenbrand <david@xxxxxxxxxx>
Re: [PATCH v2 16/20] fs/proc/page: remove per-page mapcount dependency for /proc/kpagecount (CONFIG_NO_PAGE_MAPCOUNT)
From
: David Hildenbrand <david@xxxxxxxxxx>
Re: [PATCH v2 19/20] fs/proc/task_mmu: remove per-page mapcount dependency for smaps/smaps_rollup (CONFIG_NO_PAGE_MAPCOUNT)
From
: "Zi Yan" <ziy@xxxxxxxxxx>
Re: [PATCH v2 18/20] fs/proc/task_mmu: remove per-page mapcount dependency for "mapmax" (CONFIG_NO_PAGE_MAPCOUNT)
From
: "Zi Yan" <ziy@xxxxxxxxxx>
Re: [PATCH v2 16/20] fs/proc/page: remove per-page mapcount dependency for /proc/kpagecount (CONFIG_NO_PAGE_MAPCOUNT)
From
: "Zi Yan" <ziy@xxxxxxxxxx>
[PATCH v2 20/20] mm: stop maintaining the per-page mapcount of large folios (CONFIG_NO_PAGE_MAPCOUNT)
From
: David Hildenbrand <david@xxxxxxxxxx>
[PATCH v2 19/20] fs/proc/task_mmu: remove per-page mapcount dependency for smaps/smaps_rollup (CONFIG_NO_PAGE_MAPCOUNT)
From
: David Hildenbrand <david@xxxxxxxxxx>
[PATCH v2 17/20] fs/proc/task_mmu: remove per-page mapcount dependency for PM_MMAP_EXCLUSIVE (CONFIG_NO_PAGE_MAPCOUNT)
From
: David Hildenbrand <david@xxxxxxxxxx>
[PATCH v2 16/20] fs/proc/page: remove per-page mapcount dependency for /proc/kpagecount (CONFIG_NO_PAGE_MAPCOUNT)
From
: David Hildenbrand <david@xxxxxxxxxx>
[PATCH v2 15/20] mm: CONFIG_NO_PAGE_MAPCOUNT to prepare for not maintain per-page mapcounts in large folios
From
: David Hildenbrand <david@xxxxxxxxxx>
[PATCH v2 14/20] mm: convert folio_likely_mapped_shared() to folio_maybe_mapped_shared()
From
: David Hildenbrand <david@xxxxxxxxxx>
[PATCH v2 13/20] mm: Copy-on-Write (COW) reuse support for PTE-mapped THP
From
: David Hildenbrand <david@xxxxxxxxxx>
[PATCH v2 12/20] mm/rmap: basic MM owner tracking for large folios (!hugetlb)
From
: David Hildenbrand <david@xxxxxxxxxx>
[PATCH v2 18/20] fs/proc/task_mmu: remove per-page mapcount dependency for "mapmax" (CONFIG_NO_PAGE_MAPCOUNT)
From
: David Hildenbrand <david@xxxxxxxxxx>
[PATCH v2 09/20] mm/rmap: abstract large mapcount operations for large folios (!hugetlb)
From
: David Hildenbrand <david@xxxxxxxxxx>
[PATCH v2 10/20] bit_spinlock: __always_inline (un)lock functions
From
: David Hildenbrand <david@xxxxxxxxxx>
[PATCH v2 08/20] mm/rmap: pass vma to __folio_add_rmap()
From
: David Hildenbrand <david@xxxxxxxxxx>
[PATCH v2 11/20] mm/rmap: use folio_large_nr_pages() in add/remove functions
From
: David Hildenbrand <david@xxxxxxxxxx>
[PATCH v2 05/20] mm: move _pincount in folio to page[2] on 32bit
From
: David Hildenbrand <david@xxxxxxxxxx>
[PATCH v2 04/20] mm: move hugetlb specific things in folio to page[3]
From
: David Hildenbrand <david@xxxxxxxxxx>
[PATCH v2 07/20] mm/rmap: pass dst_vma to folio_dup_file_rmap_pte() and friends
From
: David Hildenbrand <david@xxxxxxxxxx>
[PATCH v2 01/20] mm: factor out large folio handling from folio_order() into folio_large_order()
From
: David Hildenbrand <david@xxxxxxxxxx>
[PATCH v2 06/20] mm: move _entire_mapcount in folio to page[2] on 32bit
From
: David Hildenbrand <david@xxxxxxxxxx>
[PATCH v2 03/20] mm: let _folio_nr_pages overlay memcg_data in first tail page
From
: David Hildenbrand <david@xxxxxxxxxx>
[PATCH v2 02/20] mm: factor out large folio handling from folio_nr_pages() into folio_large_nr_pages()
From
: David Hildenbrand <david@xxxxxxxxxx>
[PATCH v2 00/20] mm: MM owner tracking for large folios (!hugetlb) + CONFIG_NO_PAGE_MAPCOUNT
From
: David Hildenbrand <david@xxxxxxxxxx>
Re: [PATCH v3] fs: introduce getfsxattrat and setfsxattrat syscalls
From
: Andrey Albershteyn <aalbersh@xxxxxxxxxx>
Re: [PATCH v3] fs: introduce getfsxattrat and setfsxattrat syscalls
From
: Andrey Albershteyn <aalbersh@xxxxxxxxxx>
Re: [PATCH v3] fs: introduce getfsxattrat and setfsxattrat syscalls
From
: Andrey Albershteyn <aalbersh@xxxxxxxxxx>
Re: [PATCH 1/4] mm: allow guard regions in file-backed and read-only mappings
From
: Lorenzo Stoakes <lorenzo.stoakes@xxxxxxxxxx>
Re: [PATCH 1/2] fs/proc/task_mmu: add guard region bit to pagemap
From
: David Hildenbrand <david@xxxxxxxxxx>
Re: [PATCH v3] fs: introduce getfsxattrat and setfsxattrat syscalls
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [PATCH v3] fs: introduce getfsxattrat and setfsxattrat syscalls
From
: Jan Kara <jack@xxxxxxx>
Re: [PATCH 1/2] fs/proc/task_mmu: add guard region bit to pagemap
From
: Lorenzo Stoakes <lorenzo.stoakes@xxxxxxxxxx>
Re: [PATCH 1/2] fs/proc/task_mmu: add guard region bit to pagemap
From
: David Hildenbrand <david@xxxxxxxxxx>
Re: [PATCH 1/2] fs/proc/task_mmu: add guard region bit to pagemap
From
: Lorenzo Stoakes <lorenzo.stoakes@xxxxxxxxxx>
Re: [PATCH 1/2] fs/proc/task_mmu: add guard region bit to pagemap
From
: David Hildenbrand <david@xxxxxxxxxx>
Re: [PATCH v3] fs: introduce getfsxattrat and setfsxattrat syscalls
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v3] fs: introduce getfsxattrat and setfsxattrat syscalls
From
: Amir Goldstein <amir73il@xxxxxxxxx>
Re: [PATCH v3] fs: introduce getfsxattrat and setfsxattrat syscalls
From
: Andreas Dilger <adilger@xxxxxxxxx>
Re: [PATCH v3] fs: introduce getfsxattrat and setfsxattrat syscalls
From
: "Darrick J. Wong" <djwong@xxxxxxxxxx>
Re: [PATCH 1/2] fs/proc/task_mmu: add guard region bit to pagemap
From
: Lorenzo Stoakes <lorenzo.stoakes@xxxxxxxxxx>
Re: [PATCH 0/4] mm: permit guard regions for file-backed/shmem mappings
From
: Kalesh Singh <kaleshsingh@xxxxxxxxxx>
Re: [PATCH 2/2] tools/selftests: add guard region test for /proc/$pid/pagemap
From
: Kalesh Singh <kaleshsingh@xxxxxxxxxx>
Re: [PATCH 1/2] fs/proc/task_mmu: add guard region bit to pagemap
From
: Kalesh Singh <kaleshsingh@xxxxxxxxxx>
Re: [PATCH v3] fs: introduce getfsxattrat and setfsxattrat syscalls
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [PATCH 2/2] tools/selftests: add guard region test for /proc/$pid/pagemap
From
: Lorenzo Stoakes <lorenzo.stoakes@xxxxxxxxxx>
[PATCH] fixup define name
From
: Lorenzo Stoakes <lorenzo.stoakes@xxxxxxxxxx>
[PATCH 2/2] tools/selftests: add guard region test for /proc/$pid/pagemap
From
: Lorenzo Stoakes <lorenzo.stoakes@xxxxxxxxxx>
[PATCH 1/2] fs/proc/task_mmu: add guard region bit to pagemap
From
: Lorenzo Stoakes <lorenzo.stoakes@xxxxxxxxxx>
[PATCH 0/2] fs/proc/task_mmu: add guard region bit to pagemap
From
: Lorenzo Stoakes <lorenzo.stoakes@xxxxxxxxxx>
Re: [PATCH 0/4] mm: permit guard regions for file-backed/shmem mappings
From
: Lorenzo Stoakes <lorenzo.stoakes@xxxxxxxxxx>
Re: [PATCH v2] ntsync: Check wait count based on byte size.
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] ntsync: Check wait count based on byte size.
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
[PATCH v2] ntsync: Check wait count based on byte size.
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
Re: [PATCH 0/4] mm: permit guard regions for file-backed/shmem mappings
From
: Kalesh Singh <kaleshsingh@xxxxxxxxxx>
Re: [PATCH 0/4] mm: permit guard regions for file-backed/shmem mappings
From
: Suren Baghdasaryan <surenb@xxxxxxxxxx>
Re: [PATCH 0/4] mm: permit guard regions for file-backed/shmem mappings
From
: Lorenzo Stoakes <lorenzo.stoakes@xxxxxxxxxx>
Re: [PATCH 0/4] mm: permit guard regions for file-backed/shmem mappings
From
: David Hildenbrand <david@xxxxxxxxxx>
Re: [PATCH 0/4] mm: permit guard regions for file-backed/shmem mappings
From
: Lorenzo Stoakes <lorenzo.stoakes@xxxxxxxxxx>
Re: [PATCH 0/4] mm: permit guard regions for file-backed/shmem mappings
From
: David Hildenbrand <david@xxxxxxxxxx>
Re: [PATCH 0/4] mm: permit guard regions for file-backed/shmem mappings
From
: Lorenzo Stoakes <lorenzo.stoakes@xxxxxxxxxx>
Re: [PATCH 0/4] mm: permit guard regions for file-backed/shmem mappings
From
: Lorenzo Stoakes <lorenzo.stoakes@xxxxxxxxxx>
Re: [PATCH 0/4] mm: permit guard regions for file-backed/shmem mappings
From
: Vlastimil Babka <vbabka@xxxxxxx>
Re: [PATCH 0/4] mm: permit guard regions for file-backed/shmem mappings
From
: David Hildenbrand <david@xxxxxxxxxx>
Re: [PATCH 0/4] mm: permit guard regions for file-backed/shmem mappings
From
: Lorenzo Stoakes <lorenzo.stoakes@xxxxxxxxxx>
Re: [PATCH 0/4] mm: permit guard regions for file-backed/shmem mappings
From
: David Hildenbrand <david@xxxxxxxxxx>
Re: [PATCH 0/4] mm: permit guard regions for file-backed/shmem mappings
From
: Lorenzo Stoakes <lorenzo.stoakes@xxxxxxxxxx>
Re: [PATCH 0/4] mm: permit guard regions for file-backed/shmem mappings
From
: Kalesh Singh <kaleshsingh@xxxxxxxxxx>
Re: [PATCH 0/4] mm: permit guard regions for file-backed/shmem mappings
From
: Lorenzo Stoakes <lorenzo.stoakes@xxxxxxxxxx>
Re: [PATCH 0/4] mm: permit guard regions for file-backed/shmem mappings
From
: Kalesh Singh <kaleshsingh@xxxxxxxxxx>
Re: [PATCH 0/4] mm: permit guard regions for file-backed/shmem mappings
From
: "Liam R. Howlett" <Liam.Howlett@xxxxxxxxxx>
Re: [PATCH] ntsync: Set the permissions to be 0666
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 0/2 v9] reclaim file-backed pages given POSIX_FADV_NOREUSE
From
: Jaegeuk Kim <jaegeuk@xxxxxxxxxx>
Re: [PATCH 0/4] mm: permit guard regions for file-backed/shmem mappings
From
: Lorenzo Stoakes <lorenzo.stoakes@xxxxxxxxxx>
Re: [PATCH 0/4] mm: permit guard regions for file-backed/shmem mappings
From
: David Hildenbrand <david@xxxxxxxxxx>
Re: [PATCH 0/4] mm: permit guard regions for file-backed/shmem mappings
From
: Lorenzo Stoakes <lorenzo.stoakes@xxxxxxxxxx>
Re: [PATCH 0/4] mm: permit guard regions for file-backed/shmem mappings
From
: Lorenzo Stoakes <lorenzo.stoakes@xxxxxxxxxx>
Re: [PATCH 0/4] mm: permit guard regions for file-backed/shmem mappings
From
: Kalesh Singh <kaleshsingh@xxxxxxxxxx>
Re: [PATCH 0/4] mm: permit guard regions for file-backed/shmem mappings
From
: Kalesh Singh <kaleshsingh@xxxxxxxxxx>
Re: [PATCH] ntsync: Set the permissions to be 0666
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
Re: [PATCH 0/4] mm: permit guard regions for file-backed/shmem mappings
From
: David Hildenbrand <david@xxxxxxxxxx>
Re: [PATCH 0/4] mm: permit guard regions for file-backed/shmem mappings
From
: Lorenzo Stoakes <lorenzo.stoakes@xxxxxxxxxx>
Re: [PATCH 0/4] mm: permit guard regions for file-backed/shmem mappings
From
: David Hildenbrand <david@xxxxxxxxxx>
Re: [PATCH 0/4] mm: permit guard regions for file-backed/shmem mappings
From
: Lorenzo Stoakes <lorenzo.stoakes@xxxxxxxxxx>
Re: [PATCH 0/4] mm: permit guard regions for file-backed/shmem mappings
From
: David Hildenbrand <david@xxxxxxxxxx>
Re: [PATCH 1/4] mm: allow guard regions in file-backed and read-only mappings
From
: Lorenzo Stoakes <lorenzo.stoakes@xxxxxxxxxx>
Re: [PATCH 1/4] mm: allow guard regions in file-backed and read-only mappings
From
: David Hildenbrand <david@xxxxxxxxxx>
Re: [PATCH 1/4] mm: allow guard regions in file-backed and read-only mappings
From
: Lorenzo Stoakes <lorenzo.stoakes@xxxxxxxxxx>
Re: [PATCH 0/4] mm: permit guard regions for file-backed/shmem mappings
From
: Lorenzo Stoakes <lorenzo.stoakes@xxxxxxxxxx>
Re: [PATCH 1/4] mm: allow guard regions in file-backed and read-only mappings
From
: David Hildenbrand <david@xxxxxxxxxx>
Re: [PATCH 1/4] mm: allow guard regions in file-backed and read-only mappings
From
: Lorenzo Stoakes <lorenzo.stoakes@xxxxxxxxxx>
Re: [PATCH 1/4] mm: allow guard regions in file-backed and read-only mappings
From
: David Hildenbrand <david@xxxxxxxxxx>
Re: [PATCH 1/4] mm: allow guard regions in file-backed and read-only mappings
From
: Lorenzo Stoakes <lorenzo.stoakes@xxxxxxxxxx>
Re: [PATCH 1/4] mm: allow guard regions in file-backed and read-only mappings
From
: David Hildenbrand <david@xxxxxxxxxx>
Re: [PATCH 0/4] mm: permit guard regions for file-backed/shmem mappings
From
: David Hildenbrand <david@xxxxxxxxxx>
Re: [PATCH 0/4] mm: permit guard regions for file-backed/shmem mappings
From
: Lorenzo Stoakes <lorenzo.stoakes@xxxxxxxxxx>
Re: [PATCH 0/4] mm: permit guard regions for file-backed/shmem mappings
From
: David Hildenbrand <david@xxxxxxxxxx>
Re: [PATCH 4/4] tools/selftests: add file/shmem-backed mapping guard region tests
From
: Vlastimil Babka <vbabka@xxxxxxx>
Re: [PATCH 3/4] tools/selftests: expand all guard region tests to file-backed
From
: Vlastimil Babka <vbabka@xxxxxxx>
Re: [PATCH 2/4] selftests/mm: rename guard-pages to guard-regions
From
: Vlastimil Babka <vbabka@xxxxxxx>
Re: [PATCH 1/4] mm: allow guard regions in file-backed and read-only mappings
From
: Vlastimil Babka <vbabka@xxxxxxx>
Re: [PATCH 0/4] mm: permit guard regions for file-backed/shmem mappings
From
: Lorenzo Stoakes <lorenzo.stoakes@xxxxxxxxxx>
Re: [PATCH 0/4] mm: permit guard regions for file-backed/shmem mappings
From
: Vlastimil Babka <vbabka@xxxxxxx>
Re: [PATCH v3] fs: introduce getfsxattrat and setfsxattrat syscalls
From
: Andrey Albershteyn <aalbersh@xxxxxxxxxx>
Re: [PATCH 0/2 v9] reclaim file-backed pages given POSIX_FADV_NOREUSE
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
Re: [PATCHv3 perf/core] uprobes: Harden uretprobe syscall trampoline check
From
: Jiri Olsa <olsajiri@xxxxxxxxx>
[PATCH v6 5/6] ptrace: introduce PTRACE_SET_SYSCALL_INFO request
From
: "Dmitry V. Levin" <ldv@xxxxxxxxx>
[PATCH v6 0/6] ptrace: introduce PTRACE_SET_SYSCALL_INFO API
From
: "Dmitry V. Levin" <ldv@xxxxxxxxx>
Re: [PATCH v7 1/6] pidfd: add PIDFD_SELF* sentinels to refer to own thread/process
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [PATCH] ntsync: Set the permissions to be 0666
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] ntsync: Set the permissions to be 0666
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
Re: [PATCH] ntsync: Set the permissions to be 0666
From
: "Darrick J. Wong" <djwong@xxxxxxxxxx>
Re: [PATCH] ntsync: Set the permissions to be 0666
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
How should userland app be notified when kernel comes out of suspend or hibernation?
From
: Dale Mellor <no-reply@xxxxxxxx>
How should userland app be notified when kernel comes out of suspend or hibernation?
From
: Dale Mellor <no-reply@xxxxxxxx>
Re: [PATCH] ntsync: Set the permissions to be 0666
From
: "Darrick J. Wong" <djwong@xxxxxxxxxx>
Re: [PATCH] ntsync: Set the permissions to be 0666
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
Re: [PATCH] ntsync: Set the permissions to be 0666
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
[PATCH] ntsync: Set the permissions to be 0666
From
: Mike Lothian <mike@xxxxxxxxxxxxxx>
[PATCH 3/4] tools/selftests: expand all guard region tests to file-backed
From
: Lorenzo Stoakes <lorenzo.stoakes@xxxxxxxxxx>
[PATCH 2/4] selftests/mm: rename guard-pages to guard-regions
From
: Lorenzo Stoakes <lorenzo.stoakes@xxxxxxxxxx>
[PATCH 1/4] mm: allow guard regions in file-backed and read-only mappings
From
: Lorenzo Stoakes <lorenzo.stoakes@xxxxxxxxxx>
[PATCH 4/4] tools/selftests: add file/shmem-backed mapping guard region tests
From
: Lorenzo Stoakes <lorenzo.stoakes@xxxxxxxxxx>
[PATCH 0/4] mm: permit guard regions for file-backed/shmem mappings
From
: Lorenzo Stoakes <lorenzo.stoakes@xxxxxxxxxx>
Re: [PATCHv3 perf/core] uprobes: Harden uretprobe syscall trampoline check
From
: Andy Lutomirski <luto@xxxxxxxxxx>
Re: [PATCHv3 perf/core] uprobes: Harden uretprobe syscall trampoline check
From
: Jiri Olsa <olsajiri@xxxxxxxxx>
Re: [PATCHv3 perf/core] uprobes: Harden uretprobe syscall trampoline check
From
: Eyal Birger <eyal.birger@xxxxxxxxx>
Re: [PATCHv3 perf/core] uprobes: Harden uretprobe syscall trampoline check
From
: Andy Lutomirski <luto@xxxxxxxxxx>
Re: [PATCHv3 perf/core] uprobes: Harden uretprobe syscall trampoline check
From
: Masami Hiramatsu (Google) <mhiramat@xxxxxxxxxx>
[PATCHv3 perf/core] uprobes: Harden uretprobe syscall trampoline check
From
: Jiri Olsa <jolsa@xxxxxxxxxx>
Re: [PATCHv2 perf/core] uprobes: Harden uretprobe syscall trampoline check
From
: Jiri Olsa <olsajiri@xxxxxxxxx>
Re: [PATCHv2 perf/core] uprobes: Harden uretprobe syscall trampoline check
From
: Masami Hiramatsu (Google) <mhiramat@xxxxxxxxxx>
Re: [PATCH v3] fs: introduce getfsxattrat and setfsxattrat syscalls
From
: "Arnd Bergmann" <arnd@xxxxxxxx>
Re: [PATCH v3] fs: introduce getfsxattrat and setfsxattrat syscalls
From
: "H. Peter Anvin" <hpa@xxxxxxxxx>
[PATCH v3] fs: introduce getfsxattrat and setfsxattrat syscalls
From
: Andrey Albershteyn <aalbersh@xxxxxxxxxx>
Re: [PATCHv2 perf/core] uprobes: Harden uretprobe syscall trampoline check
From
: Oleg Nesterov <oleg@xxxxxxxxxx>
Re: [PATCHv2 perf/core] uprobes: Harden uretprobe syscall trampoline check
From
: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
Re: [PATCHv2 perf/core] uprobes: Harden uretprobe syscall trampoline check
From
: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
Re: [PATCH v7 1/6] pidfd: add PIDFD_SELF* sentinels to refer to own thread/process
From
: Lorenzo Stoakes <lorenzo.stoakes@xxxxxxxxxx>
Re: [PATCH v7 1/6] pidfd: add PIDFD_SELF* sentinels to refer to own thread/process
From
: Michal Koutný <mkoutny@xxxxxxxx>
[PATCHv2 perf/core] uprobes: Harden uretprobe syscall trampoline check
From
: Jiri Olsa <jolsa@xxxxxxxxxx>
Re: [PATCH bpf-next] uprobes: Harden uretprobe syscall trampoline check
From
: Jiri Olsa <olsajiri@xxxxxxxxx>
Re: [PATCH bpf-next] uprobes: Harden uretprobe syscall trampoline check
From
: Kees Cook <kees@xxxxxxxxxx>
Re: [PATCH bpf-next] uprobes: Harden uretprobe syscall trampoline check
From
: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
Re: [PATCH bpf-next] uprobes: Harden uretprobe syscall trampoline check
From
: Oleg Nesterov <oleg@xxxxxxxxxx>
[PATCH v5 6/7] ptrace: introduce PTRACE_SET_SYSCALL_INFO request
From
: "Dmitry V. Levin" <ldv@xxxxxxxxx>
[PATCH v5 0/7] ptrace: introduce PTRACE_SET_SYSCALL_INFO API
From
: "Dmitry V. Levin" <ldv@xxxxxxxxx>
[PATCH bpf-next] uprobes: Harden uretprobe syscall trampoline check
From
: Jiri Olsa <jolsa@xxxxxxxxxx>
Re: The business loan-
From
: David Song <chrispinerick@xxxxxxxxxxxxxxxx>
Re: [PATCH v3 0/2] seccomp: pass uretprobe system call through seccomp
From
: Kees Cook <kees@xxxxxxxxxx>
Re: [PATCH v3 0/2] seccomp: pass uretprobe system call through seccomp
From
: Jiri Olsa <olsajiri@xxxxxxxxx>
[no subject]
From
: Unknown
Re: [PATCH v3 0/2] seccomp: pass uretprobe system call through seccomp
From
: Jann Horn <jannh@xxxxxxxxxx>
Re: [PATCH v3 0/2] seccomp: pass uretprobe system call through seccomp
From
: Eyal Birger <eyal.birger@xxxxxxxxx>
Re: [PATCH v3 0/2] seccomp: pass uretprobe system call through seccomp
From
: Jann Horn <jannh@xxxxxxxxxx>
Re: [PATCH v3 0/2] seccomp: pass uretprobe system call through seccomp
From
: Jiri Olsa <olsajiri@xxxxxxxxx>
Re: [PATCH v3 0/2] seccomp: pass uretprobe system call through seccomp
From
: Eyal Birger <eyal.birger@xxxxxxxxx>
Re: [PATCH RFT v14 2/8] Documentation: userspace-api: Add shadow stack API documentation
From
: Deepak Gupta <debug@xxxxxxxxxxxx>
Re: [PATCH v3 0/2] seccomp: pass uretprobe system call through seccomp
From
: Kees Cook <kees@xxxxxxxxxx>
Re: [PATCH v3 1/2] seccomp: passthrough uretprobe systemcall without filtering
From
: Kees Cook <kees@xxxxxxxxxx>
Re: [PATCH v3 2/2] selftests/seccomp: validate uretprobe syscall passes through seccomp
From
: Kees Cook <kees@xxxxxxxxxx>
[PATCH RFT v14 8/8] selftests/clone3: Test shadow stack support
From
: Mark Brown <broonie@xxxxxxxxxx>
[PATCH RFT v14 7/8] selftests/clone3: Allow tests to flag if -E2BIG is a valid error code
From
: Mark Brown <broonie@xxxxxxxxxx>
[PATCH RFT v14 6/8] selftests/clone3: Factor more of main loop into test_clone3()
From
: Mark Brown <broonie@xxxxxxxxxx>
[PATCH RFT v14 5/8] selftests/clone3: Remove redundant flushes of output streams
From
: Mark Brown <broonie@xxxxxxxxxx>
[PATCH RFT v14 4/8] fork: Add shadow stack support to clone3()
From
: Mark Brown <broonie@xxxxxxxxxx>
[PATCH RFT v14 3/8] selftests: Provide helper header for shadow stack testing
From
: Mark Brown <broonie@xxxxxxxxxx>
[PATCH RFT v14 2/8] Documentation: userspace-api: Add shadow stack API documentation
From
: Mark Brown <broonie@xxxxxxxxxx>
[PATCH RFT v14 1/8] arm64/gcs: Return a success value from gcs_alloc_thread_stack()
From
: Mark Brown <broonie@xxxxxxxxxx>
[PATCH RFT v14 0/8] fork: Support shadow stacks in clone3()
From
: Mark Brown <broonie@xxxxxxxxxx>
Re: [PATCH v7 2/6] selftests/pidfd: add missing system header imcludes to pidfd tests
From
: Peter Seiderer <ps.report@xxxxxxx>
Re: [PATCH v7 0/6] introduce PIDFD_SELF* sentinels
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [PATCH v7 6/6] selftests/mm: use PIDFD_SELF in guard pages test
From
: Shakeel Butt <shakeel.butt@xxxxxxxxx>
Re: [PATCH v7 5/6] selftests: pidfd: add tests for PIDFD_SELF_*
From
: Shakeel Butt <shakeel.butt@xxxxxxxxx>
Re: [PATCH v7 3/6] tools: testing: separate out wait_for_pid() into helper header
From
: Shakeel Butt <shakeel.butt@xxxxxxxxx>
Re: [PATCH v7 2/6] selftests/pidfd: add missing system header imcludes to pidfd tests
From
: Shakeel Butt <shakeel.butt@xxxxxxxxx>
Re: [PATCH v7 0/6] introduce PIDFD_SELF* sentinels
From
: Suren Baghdasaryan <surenb@xxxxxxxxxx>
Re: [PATCH v7 1/6] pidfd: add PIDFD_SELF* sentinels to refer to own thread/process
From
: Shakeel Butt <shakeel.butt@xxxxxxxxx>
Re: [PATCH 0/2 v8] add ioctl/sysfs to donate file-backed pages
From
: Jaegeuk Kim <jaegeuk@xxxxxxxxxx>
Re: [PATCH v7 0/6] introduce PIDFD_SELF* sentinels
From
: Lorenzo Stoakes <lorenzo.stoakes@xxxxxxxxxx>
Re: [PATCH v7 0/6] introduce PIDFD_SELF* sentinels
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [PATCH 0/2 v8] add ioctl/sysfs to donate file-backed pages
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
Re: [PATCH v4 0/7] ptrace: introduce PTRACE_SET_SYSCALL_INFO API
From
: "Dmitry V. Levin" <ldv@xxxxxxxxx>
Re: [PATCH v4 0/7] ptrace: introduce PTRACE_SET_SYSCALL_INFO API
From
: Alexander Gordeev <agordeev@xxxxxxxxxxxxx>
[PATCH v4 0/7] ptrace: introduce PTRACE_SET_SYSCALL_INFO API
From
: "Dmitry V. Levin" <ldv@xxxxxxxxx>
[PATCH v4 6/7] ptrace: introduce PTRACE_SET_SYSCALL_INFO request
From
: "Dmitry V. Levin" <ldv@xxxxxxxxx>
Re: [PATCH v3 2/2] selftests/seccomp: validate uretprobe syscall passes through seccomp
From
: Eyal Birger <eyal.birger@xxxxxxxxx>
Re: [PATCH v3 2/2] selftests/seccomp: validate uretprobe syscall passes through seccomp
From
: Jiri Olsa <olsajiri@xxxxxxxxx>
[PATCH v3 2/2] selftests/seccomp: validate uretprobe syscall passes through seccomp
From
: Eyal Birger <eyal.birger@xxxxxxxxx>
[PATCH v3 1/2] seccomp: passthrough uretprobe systemcall without filtering
From
: Eyal Birger <eyal.birger@xxxxxxxxx>
[PATCH v3 0/2] seccomp: pass uretprobe system call through seccomp
From
: Eyal Birger <eyal.birger@xxxxxxxxx>
Re: [PATCH v2] seccomp: passthrough uretprobe systemcall without filtering
From
: Eyal Birger <eyal.birger@xxxxxxxxx>
Re: [PATCH v2] seccomp: passthrough uretprobe systemcall without filtering
From
: Jiri Olsa <olsajiri@xxxxxxxxx>
Re: [PATCH v7 0/6] introduce PIDFD_SELF* sentinels
From
: Lorenzo Stoakes <lorenzo.stoakes@xxxxxxxxxx>
Re: [PATCH v7 0/6] introduce PIDFD_SELF* sentinels
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [PATCH 1/5] Add manpage for open_tree(2)
From
: Askar Safin <safinaskar@xxxxxxxxxxxx>
Re: [PATCH v2] seccomp: passthrough uretprobe systemcall without filtering
From
: Eyal Birger <eyal.birger@xxxxxxxxx>
Re: [PATCH v7 0/6] introduce PIDFD_SELF* sentinels
From
: Lorenzo Stoakes <lorenzo.stoakes@xxxxxxxxxx>
Re: [PATCH v7 0/6] introduce PIDFD_SELF* sentinels
From
: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v7 0/6] introduce PIDFD_SELF* sentinels
From
: Pedro Falcato <pedro.falcato@xxxxxxxxx>
Re: [PATCH v7 0/6] introduce PIDFD_SELF* sentinels
From
: Lorenzo Stoakes <lorenzo.stoakes@xxxxxxxxxx>
Re: [PATCH v7 0/6] introduce PIDFD_SELF* sentinels
From
: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] seccomp: passthrough uretprobe systemcall without filtering
From
: Jiri Olsa <olsajiri@xxxxxxxxx>
[PATCH v7 6/6] selftests/mm: use PIDFD_SELF in guard pages test
From
: Lorenzo Stoakes <lorenzo.stoakes@xxxxxxxxxx>
[PATCH v7 5/6] selftests: pidfd: add tests for PIDFD_SELF_*
From
: Lorenzo Stoakes <lorenzo.stoakes@xxxxxxxxxx>
[PATCH v7 4/6] selftests: pidfd: add pidfd.h UAPI wrapper
From
: Lorenzo Stoakes <lorenzo.stoakes@xxxxxxxxxx>
[PATCH v7 0/6] introduce PIDFD_SELF* sentinels
From
: Lorenzo Stoakes <lorenzo.stoakes@xxxxxxxxxx>
[PATCH v7 3/6] tools: testing: separate out wait_for_pid() into helper header
From
: Lorenzo Stoakes <lorenzo.stoakes@xxxxxxxxxx>
[PATCH v7 2/6] selftests/pidfd: add missing system header imcludes to pidfd tests
From
: Lorenzo Stoakes <lorenzo.stoakes@xxxxxxxxxx>
[PATCH v7 1/6] pidfd: add PIDFD_SELF* sentinels to refer to own thread/process
From
: Lorenzo Stoakes <lorenzo.stoakes@xxxxxxxxxx>
Re: [PATCH v2] seccomp: passthrough uretprobe systemcall without filtering
From
: Eyal Birger <eyal.birger@xxxxxxxxx>
Re: [PATCH v2] seccomp: passthrough uretprobe systemcall without filtering
From
: Kees Cook <kees@xxxxxxxxxx>
Re: [PATCH v2] seccomp: passthrough uretprobe systemcall without filtering
From
: Oleg Nesterov <oleg@xxxxxxxxxx>
Re: [PATCH v2] seccomp: passthrough uretprobe systemcall without filtering
From
: Eyal Birger <eyal.birger@xxxxxxxxx>
Re: [PATCH v2] seccomp: passthrough uretprobe systemcall without filtering
From
: Jiri Olsa <olsajiri@xxxxxxxxx>
Re: [PATCH v2] seccomp: passthrough uretprobe systemcall without filtering
From
: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
Re: [PATCH v3 0/6] ptrace: introduce PTRACE_SET_SYSCALL_INFO API
From
: Oleg Nesterov <oleg@xxxxxxxxxx>
Re: [PATCH v2] seccomp: passthrough uretprobe systemcall without filtering
From
: Eyal Birger <eyal.birger@xxxxxxxxx>
Re: [PATCH v2] fs: introduce getfsxattrat and setfsxattrat syscalls
From
: Andrey Albershteyn <aalbersh@xxxxxxxxxx>
Re: [PATCH v2] seccomp: passthrough uretprobe systemcall without filtering
From
: Kees Cook <kees@xxxxxxxxxx>
Re: [PATCH v3 5/6] ptrace: introduce PTRACE_SET_SYSCALL_INFO request
From
: "Dmitry V. Levin" <ldv@xxxxxxxxx>
Re: [PATCH v2] seccomp: passthrough uretprobe systemcall without filtering
From
: Oleg Nesterov <oleg@xxxxxxxxxx>
Re: [PATCH v3 5/6] ptrace: introduce PTRACE_SET_SYSCALL_INFO request
From
: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
Re: [PATCH v2] seccomp: passthrough uretprobe systemcall without filtering
From
: Oleg Nesterov <oleg@xxxxxxxxxx>
[PATCH v2] seccomp: passthrough uretprobe systemcall without filtering
From
: Eyal Birger <eyal.birger@xxxxxxxxx>
[PATCH v3 5/6] ptrace: introduce PTRACE_SET_SYSCALL_INFO request
From
: "Dmitry V. Levin" <ldv@xxxxxxxxx>
[PATCH v3 0/6] ptrace: introduce PTRACE_SET_SYSCALL_INFO API
From
: "Dmitry V. Levin" <ldv@xxxxxxxxx>
Re: [PATCH] seccomp: passthrough uretprobe systemcall without filtering
From
: Kees Cook <kees@xxxxxxxxxx>
Re: [PATCH] seccomp: passthrough uretprobe systemcall without filtering
From
: Eyal Birger <eyal.birger@xxxxxxxxx>
Re: [PATCH] seccomp: passthrough uretprobe systemcall without filtering
From
: Kees Cook <kees@xxxxxxxxxx>
Re: [PATCH] seccomp: passthrough uretprobe systemcall without filtering
From
: Eyal Birger <eyal.birger@xxxxxxxxx>
Re: [PATCH v2] fs: introduce getfsxattrat and setfsxattrat syscalls
From
: Christian Brauner <brauner@xxxxxxxxxx>
[PATCH v2] fs: introduce getfsxattrat and setfsxattrat syscalls
From
: Andrey Albershteyn <aalbersh@xxxxxxxxxx>
Re: [PATCH] seccomp: passthrough uretprobe systemcall without filtering
From
: Steven Rostedt <rostedt@xxxxxxxxxxx>
Re: [PATCH] seccomp: passthrough uretprobe systemcall without filtering
From
: Eyal Birger <eyal.birger@xxxxxxxxx>
Re: [PATCH] seccomp: passthrough uretprobe systemcall without filtering
From
: Steven Rostedt <rostedt@xxxxxxxxxxx>
Re: [PATCH] seccomp: passthrough uretprobe systemcall without filtering
From
: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
Re: [PATCH v6 01/15] lib: Add TLV parser
From
: Thomas Weißschuh <linux@xxxxxxxxxxxxxx>
Re: [PATCH] seccomp: passthrough uretprobe systemcall without filtering
From
: Jiri Olsa <olsajiri@xxxxxxxxx>
Re: [PATCH] seccomp: passthrough uretprobe systemcall without filtering
From
: Oleg Nesterov <oleg@xxxxxxxxxx>
Re: [PATCH] seccomp: passthrough uretprobe systemcall without filtering
From
: Steven Rostedt <rostedt@xxxxxxxxxxx>
Re: [PATCH] seccomp: passthrough uretprobe systemcall without filtering
From
: Oleg Nesterov <oleg@xxxxxxxxxx>
Re: [PATCH v6 01/15] lib: Add TLV parser
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH] seccomp: passthrough uretprobe systemcall without filtering
From
: Eyal Birger <eyal.birger@xxxxxxxxx>
Re: [PATCH] seccomp: passthrough uretprobe systemcall without filtering
From
: Jiri Olsa <olsajiri@xxxxxxxxx>
Re: [PATCH v6 01/15] lib: Add TLV parser
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH v6 01/15] lib: Add TLV parser
From
: Thomas Weißschuh <linux@xxxxxxxxxxxxxx>
Re: [PATCH v6 01/15] lib: Add TLV parser
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH v6 01/15] lib: Add TLV parser
From
: Thomas Weißschuh <linux@xxxxxxxxxxxxxx>
Re: [PATCH] seccomp: passthrough uretprobe systemcall without filtering
From
: Kees Cook <kees@xxxxxxxxxx>
Re: [PATCH] seccomp: passthrough uretprobe systemcall without filtering
From
: Kees Cook <kees@xxxxxxxxxx>
Re: [PATCH v2 6/7] ptrace: introduce PTRACE_SET_SYSCALL_INFO request
From
: Oleg Nesterov <oleg@xxxxxxxxxx>
Re: [PATCH RFC v3 02/10] sched_getattr: port to copy_struct_to_user
From
: Florian Weimer <fweimer@xxxxxxxxxx>
Re: [PATCH RFC v3 02/10] sched_getattr: port to copy_struct_to_user
From
: Xi Ruoyao <xry111@xxxxxxxxxxx>
Re: [PATCH RFC v3 02/10] sched_getattr: port to copy_struct_to_user
From
: Florian Weimer <fweimer@xxxxxxxxxx>
[RFC] Extension to POSIX API for zero-copy data transfers
From
: mcaju95@xxxxxxxxx
Re: [PATCH] seccomp: passthrough uretprobe systemcall without filtering
From
: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
Re: [PATCH v2 6/7] ptrace: introduce PTRACE_SET_SYSCALL_INFO request
From
: Aleksa Sarai <cyphar@xxxxxxxxxx>
Re: [PATCH v2 6/7] ptrace: introduce PTRACE_SET_SYSCALL_INFO request
From
: "Dmitry V. Levin" <ldv@xxxxxxxxx>
Re: [PATCH] seccomp: passthrough uretprobe systemcall without filtering
From
: Oleg Nesterov <oleg@xxxxxxxxxx>
Re: [PATCH] seccomp: passthrough uretprobe systemcall without filtering
From
: Jiri Olsa <olsajiri@xxxxxxxxx>
Re: [PATCH] seccomp: passthrough uretprobe systemcall without filtering
From
: Eyal Birger <eyal.birger@xxxxxxxxx>
Re: [PATCH] seccomp: passthrough uretprobe systemcall without filtering
From
: Kees Cook <kees@xxxxxxxxxx>
Re: [PATCH] seccomp: passthrough uretprobe systemcall without filtering
From
: Eyal Birger <eyal.birger@xxxxxxxxx>
Re: [PATCH] seccomp: passthrough uretprobe systemcall without filtering
From
: "Darrick J. Wong" <djwong@xxxxxxxxxx>
Re: [PATCH] seccomp: passthrough uretprobe systemcall without filtering
From
: Kees Cook <kees@xxxxxxxxxx>
Re: [PATCH] seccomp: passthrough uretprobe systemcall without filtering
From
: Oleg Nesterov <oleg@xxxxxxxxxx>
Re: [PATCH v2 6/7] ptrace: introduce PTRACE_SET_SYSCALL_INFO request
From
: Oleg Nesterov <oleg@xxxxxxxxxx>
Re: [PATCH RFC v3 02/10] sched_getattr: port to copy_struct_to_user
From
: Xi Ruoyao <xry111@xxxxxxxxxxx>
Re: [PATCH] seccomp: passthrough uretprobe systemcall without filtering
From
: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
Re: [PATCH] seccomp: passthrough uretprobe systemcall without filtering
From
: Eyal Birger <eyal.birger@xxxxxxxxx>
Re: [PATCH] seccomp: passthrough uretprobe systemcall without filtering
From
: Eyal Birger <eyal.birger@xxxxxxxxx>
Re: [PATCH] seccomp: passthrough uretprobe systemcall without filtering
From
: "Dmitry V. Levin" <ldv@xxxxxxxxx>
Re: Crash when attaching uretprobes to processes running in Docker
From
: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
Re: [PATCH] seccomp: passthrough uretprobe systemcall without filtering
From
: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
Re: [PATCH v2 6/7] ptrace: introduce PTRACE_SET_SYSCALL_INFO request
From
: "Dmitry V. Levin" <ldv@xxxxxxxxx>
Re: [PATCH v2 6/7] ptrace: introduce PTRACE_SET_SYSCALL_INFO request
From
: Oleg Nesterov <oleg@xxxxxxxxxx>
Re: [PATCH v2 6/7] ptrace: introduce PTRACE_SET_SYSCALL_INFO request
From
: "Dmitry V. Levin" <ldv@xxxxxxxxx>
Re: [PATCH v2 6/7] ptrace: introduce PTRACE_SET_SYSCALL_INFO request
From
: Oleg Nesterov <oleg@xxxxxxxxxx>
Re: [PATCH] seccomp: passthrough uretprobe systemcall without filtering
From
: Oleg Nesterov <oleg@xxxxxxxxxx>
Re: [PATCH] seccomp: passthrough uretprobe systemcall without filtering
From
: Eyal Birger <eyal.birger@xxxxxxxxx>
Re: Crash when attaching uretprobes to processes running in Docker
From
: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
Re: [PATCH] seccomp: passthrough uretprobe systemcall without filtering
From
: Masami Hiramatsu (Google) <mhiramat@xxxxxxxxxx>
Re: [PATCH 1/2] f2fs: register inodes which is able to donate pages
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
Re: Crash when attaching uretprobes to processes running in Docker
From
: Oleg Nesterov <oleg@xxxxxxxxxx>
Re: [PATCH] seccomp: passthrough uretprobe systemcall without filtering
From
: Oleg Nesterov <oleg@xxxxxxxxxx>
Re: Crash when attaching uretprobes to processes running in Docker
From
: Masami Hiramatsu (Google) <mhiramat@xxxxxxxxxx>
[PATCH] seccomp: passthrough uretprobe systemcall without filtering
From
: Eyal Birger <eyal.birger@xxxxxxxxx>
Re: Crash when attaching uretprobes to processes running in Docker
From
: Oleg Nesterov <oleg@xxxxxxxxxx>
Re: [PATCH v2 6/7] ptrace: introduce PTRACE_SET_SYSCALL_INFO request
From
: Charlie Jenkins <charlie@xxxxxxxxxxxx>
Re: [PATCH v2 6/7] ptrace: introduce PTRACE_SET_SYSCALL_INFO request
From
: Charlie Jenkins <charlie@xxxxxxxxxxxx>
Re: [PATCH 1/2] f2fs: register inodes which is able to donate pages
From
: Jaegeuk Kim <jaegeuk@xxxxxxxxxx>
Re: Crash when attaching uretprobes to processes running in Docker
From
: Eyal Birger <eyal.birger@xxxxxxxxx>
Re: [PATCH v2 6/7] ptrace: introduce PTRACE_SET_SYSCALL_INFO request
From
: "Dmitry V. Levin" <ldv@xxxxxxxxx>
Re: [PATCH v2 6/7] ptrace: introduce PTRACE_SET_SYSCALL_INFO request
From
: "Dmitry V. Levin" <ldv@xxxxxxxxx>
Re: Crash when attaching uretprobes to processes running in Docker
From
: Oleg Nesterov <oleg@xxxxxxxxxx>
Re: [PATCH v2 6/7] ptrace: introduce PTRACE_SET_SYSCALL_INFO request
From
: Oleg Nesterov <oleg@xxxxxxxxxx>
Re: Crash when attaching uretprobes to processes running in Docker
From
: Eyal Birger <eyal.birger@xxxxxxxxx>
Re: Crash when attaching uretprobes to processes running in Docker
From
: Oleg Nesterov <oleg@xxxxxxxxxx>
Re: [PATCH v2 6/7] ptrace: introduce PTRACE_SET_SYSCALL_INFO request
From
: "Dmitry V. Levin" <ldv@xxxxxxxxx>
Re: [PATCH 1/2] f2fs: register inodes which is able to donate pages
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
Re: [PATCH v2 6/7] ptrace: introduce PTRACE_SET_SYSCALL_INFO request
From
: Charlie Jenkins <charlie@xxxxxxxxxxxx>
Re: Crash when attaching uretprobes to processes running in Docker
From
: Eyal Birger <eyal.birger@xxxxxxxxx>
Re: [PATCH v2 6/7] ptrace: introduce PTRACE_SET_SYSCALL_INFO request
From
: Oleg Nesterov <oleg@xxxxxxxxxx>
Re: Crash when attaching uretprobes to processes running in Docker
From
: Oleg Nesterov <oleg@xxxxxxxxxx>
Re: Crash when attaching uretprobes to processes running in Docker
From
: Eyal Birger <eyal.birger@xxxxxxxxx>
Re: Crash when attaching uretprobes to processes running in Docker
From
: Oleg Nesterov <oleg@xxxxxxxxxx>
Re: Crash when attaching uretprobes to processes running in Docker
From
: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
Re: Crash when attaching uretprobes to processes running in Docker
From
: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
Re: [PATCH v2 6/7] ptrace: introduce PTRACE_SET_SYSCALL_INFO request
From
: "Dmitry V. Levin" <ldv@xxxxxxxxx>
Re: [PATCH v2 6/7] ptrace: introduce PTRACE_SET_SYSCALL_INFO request
From
: Oleg Nesterov <oleg@xxxxxxxxxx>
Re: Crash when attaching uretprobes to processes running in Docker
From
: Oleg Nesterov <oleg@xxxxxxxxxx>
Re: [PATCH v23 7/8] samples/check-exec: Add an enlighten "inc" interpreter and 28 tests
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: Crash when attaching uretprobes to processes running in Docker
From
: Oleg Nesterov <oleg@xxxxxxxxxx>
Re: Crash when attaching uretprobes to processes running in Docker
From
: Jiri Olsa <olsajiri@xxxxxxxxx>
Re: Crash when attaching uretprobes to processes running in Docker
From
: Eyal Birger <eyal.birger@xxxxxxxxx>
Re: Crash when attaching uretprobes to processes running in Docker
From
: Jiri Olsa <olsajiri@xxxxxxxxx>
Re: Crash when attaching uretprobes to processes running in Docker
From
: Shmulik Ladkani <shmulik.ladkani@xxxxxxxxx>
Re: Crash when attaching uretprobes to processes running in Docker
From
: Oleg Nesterov <oleg@xxxxxxxxxx>
Re: Crash when attaching uretprobes to processes running in Docker
From
: Eyal Birger <eyal.birger@xxxxxxxxx>
Re: [PATCH] fs: introduce getfsxattrat and setfsxattrat syscalls
From
: "Darrick J. Wong" <djwong@xxxxxxxxxx>
Re: Crash when attaching uretprobes to processes running in Docker
From
: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
Re: Crash when attaching uretprobes to processes running in Docker
From
: Oleg Nesterov <oleg@xxxxxxxxxx>
Re: Crash when attaching uretprobes to processes running in Docker
From
: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
Re: [PATCH v23 7/8] samples/check-exec: Add an enlighten "inc" interpreter and 28 tests
From
: Nathan Chancellor <nathan@xxxxxxxxxx>
Re: Crash when attaching uretprobes to processes running in Docker
From
: Oleg Nesterov <oleg@xxxxxxxxxx>
Re: Crash when attaching uretprobes to processes running in Docker
From
: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
Re: Crash when attaching uretprobes to processes running in Docker
From
: Oleg Nesterov <oleg@xxxxxxxxxx>
Re: Crash when attaching uretprobes to processes running in Docker
From
: Oleg Nesterov <oleg@xxxxxxxxxx>
Re: Crash when attaching uretprobes to processes running in Docker
From
: Jiri Olsa <olsajiri@xxxxxxxxx>
Re: Crash when attaching uretprobes to processes running in Docker
From
: Oleg Nesterov <oleg@xxxxxxxxxx>
Re: Crash when attaching uretprobes to processes running in Docker
From
: Jiri Olsa <olsajiri@xxxxxxxxx>
Re: Crash when attaching uretprobes to processes running in Docker
From
: Jiri Olsa <olsajiri@xxxxxxxxx>
Re: Crash when attaching uretprobes to processes running in Docker
From
: Eyal Birger <eyal.birger@xxxxxxxxx>
Re: Crash when attaching uretprobes to processes running in Docker
From
: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
Re: Crash when attaching uretprobes to processes running in Docker
From
: Oleg Nesterov <oleg@xxxxxxxxxx>
Re: Crash when attaching uretprobes to processes running in Docker
From
: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
Re: Crash when attaching uretprobes to processes running in Docker
From
: Oleg Nesterov <oleg@xxxxxxxxxx>
Re: Crash when attaching uretprobes to processes running in Docker
From
: Oleg Nesterov <oleg@xxxxxxxxxx>
Re: Crash when attaching uretprobes to processes running in Docker
From
: Oleg Nesterov <oleg@xxxxxxxxxx>
Re: Crash when attaching uretprobes to processes running in Docker
From
: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
Re: Crash when attaching uretprobes to processes running in Docker
From
: Masami Hiramatsu (Google) <mhiramat@xxxxxxxxxx>
Re: Crash when attaching uretprobes to processes running in Docker
From
: Jiri Olsa <olsajiri@xxxxxxxxx>
[PATCH v2 6/7] ptrace: introduce PTRACE_SET_SYSCALL_INFO request
From
: "Dmitry V. Levin" <ldv@xxxxxxxxx>
[PATCH v2 0/7] ptrace: introduce PTRACE_SET_SYSCALL_INFO API
From
: "Dmitry V. Levin" <ldv@xxxxxxxxx>
Re: [PATCH] fs: introduce getfsxattrat and setfsxattrat syscalls
From
: Andrey Albershteyn <aalbersh@xxxxxxxxxx>
Re: [PATCH] fs: introduce getfsxattrat and setfsxattrat syscalls
From
: Jan Kara <jack@xxxxxxx>
Re: [PATCH] fs: introduce getfsxattrat and setfsxattrat syscalls
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH] fs: introduce getfsxattrat and setfsxattrat syscalls
From
: kernel test robot <lkp@xxxxxxxxx>
Re: Crash when attaching uretprobes to processes running in Docker
From
: Jiri Olsa <olsajiri@xxxxxxxxx>
Re: [PATCH] fs: introduce getfsxattrat and setfsxattrat syscalls
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH] fs: introduce getfsxattrat and setfsxattrat syscalls
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH 5/6] ptrace: introduce PTRACE_SET_SYSCALL_INFO request
From
: "Dmitry V. Levin" <ldv@xxxxxxxxx>
Re: Crash when attaching uretprobes to processes running in Docker
From
: Aleksa Sarai <cyphar@xxxxxxxxxx>
Crash when attaching uretprobes to processes running in Docker
From
: Eyal Birger <eyal.birger@xxxxxxxxx>
Re: [PATCH] fs: introduce getfsxattrat and setfsxattrat syscalls
From
: Andrey Albershteyn <aalbersh@xxxxxxxxxx>
Re: [PATCH] fs: introduce getfsxattrat and setfsxattrat syscalls
From
: "Arnd Bergmann" <arnd@xxxxxxxx>
[PATCH] fs: introduce getfsxattrat and setfsxattrat syscalls
From
: Andrey Albershteyn <aalbersh@xxxxxxxxxx>
Re: [PATCH 5/6] ptrace: introduce PTRACE_SET_SYSCALL_INFO request
From
: Oleg Nesterov <oleg@xxxxxxxxxx>
Re: [PATCH 5/6] ptrace: introduce PTRACE_SET_SYSCALL_INFO request
From
: Eugene Syromiatnikov <esyr@xxxxxxxxxx>
Re: [PATCH 5/6] ptrace: introduce PTRACE_SET_SYSCALL_INFO request
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH 5/6] ptrace: introduce PTRACE_SET_SYSCALL_INFO request
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH 5/6] ptrace: introduce PTRACE_SET_SYSCALL_INFO request
From
: kernel test robot <lkp@xxxxxxxxx>
[PATCH 5/6] ptrace: introduce PTRACE_SET_SYSCALL_INFO request
From
: "Dmitry V. Levin" <ldv@xxxxxxxxx>
Re: [PATCH v7 00/30] NT synchronization primitive driver
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
Re: [PATCH v7 00/30] NT synchronization primitive driver
From
: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
Re: [PATCH v7 00/30] NT synchronization primitive driver
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v6 2/5] pidfd: add PIDFD_SELF_* sentinels to refer to own thread/process
From
: Lorenzo Stoakes <lorenzo.stoakes@xxxxxxxxxx>
Re: [PATCH v6 2/5] pidfd: add PIDFD_SELF_* sentinels to refer to own thread/process
From
: Shakeel Butt <shakeel.butt@xxxxxxxxx>
Re: [RFC PATCH 1/2] ptp: add PTP_SYS_OFFSET_STAT for xtstamping with status
From
: Peter Hilber <quic_philber@xxxxxxxxxxx>
Re: [RFC PATCH 1/2] ptp: add PTP_SYS_OFFSET_STAT for xtstamping with status
From
: Richard Cochran <richardcochran@xxxxxxxxx>
Re: [RFC PATCH 1/2] ptp: add PTP_SYS_OFFSET_STAT for xtstamping with status
From
: Peter Hilber <quic_philber@xxxxxxxxxxx>
Re: [RFC PATCH 1/2] ptp: add PTP_SYS_OFFSET_STAT for xtstamping with status
From
: Richard Cochran <richardcochran@xxxxxxxxx>
Re: [RFC PATCH 1/2] ptp: add PTP_SYS_OFFSET_STAT for xtstamping with status
From
: Peter Hilber <quic_philber@xxxxxxxxxxx>
Re: [RFC PATCH 1/2] ptp: add PTP_SYS_OFFSET_STAT for xtstamping with status
From
: Richard Cochran <richardcochran@xxxxxxxxx>
[RFC PATCH 2/2] virtio_rtc: Support PTP_SYS_OFFSET_STAT ioctl
From
: Peter Hilber <quic_philber@xxxxxxxxxxx>
[RFC PATCH 1/2] ptp: add PTP_SYS_OFFSET_STAT for xtstamping with status
From
: Peter Hilber <quic_philber@xxxxxxxxxxx>
[RFC PATCH 0/2] ptp: add PTP_SYS_OFFSET_STAT ioctl, support it in virtio_rtc
From
: Peter Hilber <quic_philber@xxxxxxxxxxx>
Re: [PATCH v3 0/3] futex: Create set_robust_list2
From
: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
Re: [PATCH v3 0/3] futex: Create set_robust_list2
From
: André Almeida <andrealmeid@xxxxxxxxxx>
Re: [PATCH v23 0/8] Script execution control (was O_MAYEXEC)
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [PATCH v23 0/8] Script execution control (was O_MAYEXEC)
From
: Kees Cook <kees@xxxxxxxxxx>
Re: [PATCH v23 0/8] Script execution control (was O_MAYEXEC)
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [PATCH v3 0/3] futex: Create set_robust_list2
From
: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
Re: [PATCH v3 3/3] futex: Wire up set_robust_list2 syscall
From
: "Arnd Bergmann" <arnd@xxxxxxxx>
[PATCH v3 2/3] futex: Create set_robust_list2
From
: André Almeida <andrealmeid@xxxxxxxxxx>
[PATCH v3 0/3] futex: Create set_robust_list2
From
: André Almeida <andrealmeid@xxxxxxxxxx>
[PATCH v3 3/3] futex: Wire up set_robust_list2 syscall
From
: André Almeida <andrealmeid@xxxxxxxxxx>
[PATCH v3 1/3] futex: Use explicit sizes for compat_exit_robust_list
From
: André Almeida <andrealmeid@xxxxxxxxxx>
[PATCH v7 02/30] ntsync: Rename NTSYNC_IOC_SEM_POST to NTSYNC_IOC_SEM_RELEASE.
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
[PATCH v7 10/30] ntsync: Introduce NTSYNC_IOC_EVENT_RESET.
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
[PATCH v7 30/30] ntsync: No longer depend on BROKEN.
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
[PATCH v7 29/30] docs: ntsync: Add documentation for the ntsync uAPI.
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
[PATCH v7 28/30] maintainers: Add an entry for ntsync.
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
[PATCH v7 27/30] selftests: ntsync: Add a stress test for contended waits.
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
[PATCH v7 26/30] selftests: ntsync: Add some tests for wakeup signaling via alerts.
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
[PATCH v7 25/30] selftests: ntsync: Add tests for alertable waits.
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
[PATCH v7 24/30] selftests: ntsync: Add some tests for wakeup signaling with events.
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
[PATCH v7 23/30] selftests: ntsync: Add some tests for auto-reset event state.
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
[PATCH v7 22/30] selftests: ntsync: Add some tests for manual-reset event state.
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
[PATCH v7 21/30] selftests: ntsync: Add some tests for wakeup signaling with WINESYNC_IOC_WAIT_ALL.
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
[PATCH v7 20/30] selftests: ntsync: Add some tests for wakeup signaling with WINESYNC_IOC_WAIT_ANY.
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
[PATCH v7 19/30] selftests: ntsync: Add some tests for NTSYNC_IOC_WAIT_ALL.
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
[PATCH v7 18/30] selftests: ntsync: Add some tests for NTSYNC_IOC_WAIT_ANY.
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
[PATCH v7 17/30] selftests: ntsync: Add some tests for mutex state.
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
[PATCH v7 16/30] selftests: ntsync: Add some tests for semaphore state.
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
[PATCH v7 15/30] ntsync: Introduce alertable waits.
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
[PATCH v7 07/30] ntsync: Introduce NTSYNC_IOC_MUTEX_KILL.
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
[PATCH v7 14/30] ntsync: Introduce NTSYNC_IOC_EVENT_READ.
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
[PATCH v7 06/30] ntsync: Introduce NTSYNC_IOC_MUTEX_UNLOCK.
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
[PATCH v7 13/30] ntsync: Introduce NTSYNC_IOC_MUTEX_READ.
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
[PATCH v7 05/30] ntsync: Introduce NTSYNC_IOC_CREATE_MUTEX.
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
[PATCH v7 03/30] ntsync: Introduce NTSYNC_IOC_WAIT_ANY.
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
[PATCH v7 04/30] ntsync: Introduce NTSYNC_IOC_WAIT_ALL.
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
[PATCH v7 12/30] ntsync: Introduce NTSYNC_IOC_SEM_READ.
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
[PATCH v7 11/30] ntsync: Introduce NTSYNC_IOC_EVENT_PULSE.
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
[PATCH v7 09/30] ntsync: Introduce NTSYNC_IOC_EVENT_SET.
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
[PATCH v7 01/30] ntsync: Return the fd from NTSYNC_IOC_CREATE_SEM.
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
[PATCH v7 08/30] ntsync: Introduce NTSYNC_IOC_CREATE_EVENT.
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
[PATCH v7 00/30] NT synchronization primitive driver
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
[PATCH v23 8/8] ima: instantiate the bprm_creds_for_exec() hook
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[PATCH v23 6/8] selftests: ktap_helpers: Fix uninitialized variable
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[PATCH v23 7/8] samples/check-exec: Add an enlighten "inc" interpreter and 28 tests
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[PATCH v23 3/8] selftests/exec: Add 32 tests for AT_EXECVE_CHECK and exec securebits
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[PATCH v23 0/8] Script execution control (was O_MAYEXEC)
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[PATCH v23 4/8] selftests/landlock: Add tests for execveat + AT_EXECVE_CHECK
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[PATCH v23 1/8] exec: Add a new AT_EXECVE_CHECK flag to execveat(2)
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[PATCH v23 2/8] security: Add EXEC_RESTRICT_FILE and EXEC_DENY_INTERACTIVE securebits
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[PATCH v23 5/8] samples/check-exec: Add set-exec
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [PATCH v6 00/28] NT synchronization primitive driver
From
: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
Re: [PATCH v6 28/28] ntsync: No longer depend on BROKEN.
From
: "Arnd Bergmann" <arnd@xxxxxxxx>
Re: [PATCH v6 28/28] ntsync: No longer depend on BROKEN.
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH RFC v3 02/10] sched_getattr: port to copy_struct_to_user
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [PATCH v22 2/8] security: Add EXEC_RESTRICT_FILE and EXEC_DENY_INTERACTIVE securebits
From
: Jeff Xu <jeffxu@xxxxxxxxxxxx>
Re: [PATCH v22 1/8] exec: Add a new AT_EXECVE_CHECK flag to execveat(2)
From
: Jeff Xu <jeffxu@xxxxxxxxxxxx>
Re: [PATCH v22 0/8] Script execution control (was O_MAYEXEC)
From
: jeffxu <jeffxu@xxxxxxxxxxxx>
Re: [PATCH v22 8/8] ima: instantiate the bprm_creds_for_exec() hook
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH RFC v3 02/10] sched_getattr: port to copy_struct_to_user
From
: Florian Weimer <fweimer@xxxxxxxxxx>
Re: [PATCH v22 2/8] security: Add EXEC_RESTRICT_FILE and EXEC_DENY_INTERACTIVE securebits
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [PATCH net-next v2 11/12] net: homa: create homa_plumbing.c homa_utils.c
From
: "D. Wythe" <alibuda@xxxxxxxxxxxxxxxxx>
Re: [PATCH net-next v2 11/12] net: homa: create homa_plumbing.c homa_utils.c
From
: John Ousterhout <ouster@xxxxxxxxxxxxxxx>
Re: [PATCH net-next v2 11/12] net: homa: create homa_plumbing.c homa_utils.c
From
: "D. Wythe" <alibuda@xxxxxxxxxxxxxxxxx>
Re: [PATCH v6 00/28] NT synchronization primitive driver
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
Re: [PATCH v6 00/28] NT synchronization primitive driver
From
: "Arnd Bergmann" <arnd@xxxxxxxx>
[PATCH v6 16/28] selftests: ntsync: Add some tests for NTSYNC_IOC_WAIT_ANY.
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
[PATCH v6 07/28] ntsync: Introduce NTSYNC_IOC_EVENT_SET.
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
[PATCH v6 02/28] ntsync: Introduce NTSYNC_IOC_WAIT_ALL.
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
[PATCH v6 00/28] NT synchronization primitive driver
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
[PATCH v6 01/28] ntsync: Introduce NTSYNC_IOC_WAIT_ANY.
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
[PATCH v6 05/28] ntsync: Introduce NTSYNC_IOC_MUTEX_KILL.
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
[PATCH v6 06/28] ntsync: Introduce NTSYNC_IOC_CREATE_EVENT.
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
[PATCH v6 04/28] ntsync: Introduce NTSYNC_IOC_MUTEX_UNLOCK.
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
[PATCH v6 10/28] ntsync: Introduce NTSYNC_IOC_SEM_READ.
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
[PATCH v6 03/28] ntsync: Introduce NTSYNC_IOC_CREATE_MUTEX.
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
[PATCH v6 08/28] ntsync: Introduce NTSYNC_IOC_EVENT_RESET.
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
[PATCH v6 09/28] ntsync: Introduce NTSYNC_IOC_EVENT_PULSE.
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
[PATCH v6 15/28] selftests: ntsync: Add some tests for mutex state.
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
[PATCH v6 11/28] ntsync: Introduce NTSYNC_IOC_MUTEX_READ.
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
[PATCH v6 13/28] ntsync: Introduce alertable waits.
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
[PATCH v6 12/28] ntsync: Introduce NTSYNC_IOC_EVENT_READ.
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
[PATCH v6 14/28] selftests: ntsync: Add some tests for semaphore state.
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
[PATCH v6 27/28] docs: ntsync: Add documentation for the ntsync uAPI.
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
[PATCH v6 28/28] ntsync: No longer depend on BROKEN.
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
[PATCH v6 24/28] selftests: ntsync: Add some tests for wakeup signaling via alerts.
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
[PATCH v6 25/28] selftests: ntsync: Add a stress test for contended waits.
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
[PATCH v6 26/28] maintainers: Add an entry for ntsync.
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
[PATCH v6 23/28] selftests: ntsync: Add tests for alertable waits.
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
[PATCH v6 22/28] selftests: ntsync: Add some tests for wakeup signaling with events.
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
[PATCH v6 21/28] selftests: ntsync: Add some tests for auto-reset event state.
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
[PATCH v6 20/28] selftests: ntsync: Add some tests for manual-reset event state.
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
[PATCH v6 18/28] selftests: ntsync: Add some tests for wakeup signaling with WINESYNC_IOC_WAIT_ANY.
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
[PATCH v6 17/28] selftests: ntsync: Add some tests for NTSYNC_IOC_WAIT_ALL.
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
[PATCH v6 19/28] selftests: ntsync: Add some tests for wakeup signaling with WINESYNC_IOC_WAIT_ALL.
From
: Elizabeth Figura <zfigura@xxxxxxxxxxxxxxx>
Re: [PATCH net-next v2 11/12] net: homa: create homa_plumbing.c homa_utils.c
From
: John Ousterhout <ouster@xxxxxxxxxxxxxxx>
Re: [PATCH net-next v2 11/12] net: homa: create homa_plumbing.c homa_utils.c
From
: John Ousterhout <ouster@xxxxxxxxxxxxxxx>
Re: [PATCH net-next v2 11/12] net: homa: create homa_plumbing.c homa_utils.c
From
: "D. Wythe" <alibuda@xxxxxxxxxxxxxxxxx>
Re: [PATCH net-next v2 11/12] net: homa: create homa_plumbing.c homa_utils.c
From
: "D. Wythe" <alibuda@xxxxxxxxxxxxxxxxx>
Re: [PATCH v6 00/15] integrity: Introduce the Integrity Digest Cache
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH v6 00/15] integrity: Introduce the Integrity Digest Cache
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH v6 00/15] integrity: Introduce the Integrity Digest Cache
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH net-next v2 11/12] net: homa: create homa_plumbing.c homa_utils.c
From
: John Ousterhout <ouster@xxxxxxxxxxxxxxx>
Re: [PATCH v6 00/15] integrity: Introduce the Integrity Digest Cache
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH v22 0/8] Script execution control (was O_MAYEXEC)
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [PATCH v6 00/15] integrity: Introduce the Integrity Digest Cache
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH v22 2/8] security: Add EXEC_RESTRICT_FILE and EXEC_DENY_INTERACTIVE securebits
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[PATCH v22 7/8] samples/check-exec: Add an enlighten "inc" interpreter and 28 tests
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[PATCH v22 8/8] ima: instantiate the bprm_creds_for_exec() hook
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[PATCH v22 6/8] selftests: ktap_helpers: Fix uninitialized variable
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[PATCH v22 5/8] samples/check-exec: Add set-exec
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[PATCH v22 4/8] selftests/landlock: Add tests for execveat + AT_EXECVE_CHECK
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[PATCH v22 3/8] selftests/exec: Add 32 tests for AT_EXECVE_CHECK and exec securebits
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[PATCH v22 1/8] exec: Add a new AT_EXECVE_CHECK flag to execveat(2)
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[PATCH v22 0/8] Script execution control (was O_MAYEXEC)
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [PATCH v6 00/15] integrity: Introduce the Integrity Digest Cache
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH v21 1/6] exec: Add a new AT_EXECVE_CHECK flag to execveat(2)
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v6 00/15] integrity: Introduce the Integrity Digest Cache
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH net-next v2 11/12] net: homa: create homa_plumbing.c homa_utils.c
From
: John Ousterhout <ouster@xxxxxxxxxxxxxxx>
Re: [PATCH v6 00/15] integrity: Introduce the Integrity Digest Cache
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH RFT v13 8/8] selftests/clone3: Test shadow stack support
From
: Mark Brown <broonie@xxxxxxxxxx>
Re: [PATCH v6 00/15] integrity: Introduce the Integrity Digest Cache
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH RFT v13 6/8] selftests/clone3: Factor more of main loop into test_clone3()
From
: Mark Brown <broonie@xxxxxxxxxx>
[PATCH RFT v13 7/8] selftests/clone3: Allow tests to flag if -E2BIG is a valid error code
From
: Mark Brown <broonie@xxxxxxxxxx>
[PATCH RFT v13 5/8] selftests/clone3: Remove redundant flushes of output streams
From
: Mark Brown <broonie@xxxxxxxxxx>
[PATCH RFT v13 0/8] fork: Support shadow stacks in clone3()
From
: Mark Brown <broonie@xxxxxxxxxx>
[PATCH RFT v13 4/8] fork: Add shadow stack support to clone3()
From
: Mark Brown <broonie@xxxxxxxxxx>
[PATCH RFT v13 3/8] selftests: Provide helper header for shadow stack testing
From
: Mark Brown <broonie@xxxxxxxxxx>
[PATCH RFT v13 2/8] Documentation: userspace-api: Add shadow stack API documentation
From
: Mark Brown <broonie@xxxxxxxxxx>
[PATCH RFT v13 1/8] arm64/gcs: Return a success value from gcs_alloc_thread_stack()
From
: Mark Brown <broonie@xxxxxxxxxx>
Re: [PATCH net-next v2 11/12] net: homa: create homa_plumbing.c homa_utils.c
From
: Andrew Lunn <andrew@xxxxxxx>
Re: [PATCH net-next v2 12/12] net: homa: create Makefile and Kconfig
From
: John Ousterhout <ouster@xxxxxxxxxxxxxxx>
Re: [PATCH v6 2/5] pidfd: add PIDFD_SELF_* sentinels to refer to own thread/process
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [PATCH v6 2/5] pidfd: add PIDFD_SELF_* sentinels to refer to own thread/process
From
: Lorenzo Stoakes <lorenzo.stoakes@xxxxxxxxxx>
Re: [PATCH net-next v2 11/12] net: homa: create homa_plumbing.c homa_utils.c
From
: "D. Wythe" <alibuda@xxxxxxxxxxxxxxxxx>
Re: [PATCH RFT v12 4/8] fork: Add shadow stack support to clone3()
From
: Yury Khrustalev <yury.khrustalev@xxxxxxx>
Re: [PATCH RFT v12 2/8] Documentation: userspace-api: Add shadow stack API documentation
From
: Yury Khrustalev <yury.khrustalev@xxxxxxx>
Re: [PATCH v6 07/15] digest_cache: Allow registration of digest list parsers
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH v6 07/15] digest_cache: Allow registration of digest list parsers
From
: Luis Chamberlain <mcgrof@xxxxxxxxxx>
Re: [PATCH v6 07/15] digest_cache: Allow registration of digest list parsers
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH v6 07/15] digest_cache: Allow registration of digest list parsers
From
: Luis Chamberlain <mcgrof@xxxxxxxxxx>
Re: [PATCH v6 00/15] integrity: Introduce the Integrity Digest Cache
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH v6 00/15] integrity: Introduce the Integrity Digest Cache
From
: "Dr. Greg" <greg@xxxxxxxxxxxx>
Re: [PATCH v21 6/6] samples/check-exec: Add an enlighten "inc" interpreter and 28 tests
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v21 1/6] exec: Add a new AT_EXECVE_CHECK flag to execveat(2)
From
: Jeff Xu <jeffxu@xxxxxxxxxx>
Re: [PATCH v21 6/6] samples/check-exec: Add an enlighten "inc" interpreter and 28 tests
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [PATCH v21 1/6] exec: Add a new AT_EXECVE_CHECK flag to execveat(2)
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [PATCH v6 07/15] digest_cache: Allow registration of digest list parsers
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH v6 07/15] digest_cache: Allow registration of digest list parsers
From
: Luis Chamberlain <mcgrof@xxxxxxxxxx>
Re: [PATCH v21 6/6] samples/check-exec: Add an enlighten "inc" interpreter and 28 tests
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v6 00/15] integrity: Introduce the Integrity Digest Cache
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH v6 07/15] digest_cache: Allow registration of digest list parsers
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH v6 02/15] module: Introduce ksys_finit_module()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH net-next v2 11/12] net: homa: create homa_plumbing.c homa_utils.c
From
: "D. Wythe" <alibuda@xxxxxxxxxxxxxxxxx>
Re: [PATCH net-next v2 12/12] net: homa: create Makefile and Kconfig
From
: "D. Wythe" <alibuda@xxxxxxxxxxxxxxxxx>
Re: [PATCH net-next v2 12/12] net: homa: create Makefile and Kconfig
From
: "D. Wythe" <alibuda@xxxxxxxxxxxxxxxxx>
Re: [PATCH v6 00/15] integrity: Introduce the Integrity Digest Cache
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH v6 07/15] digest_cache: Allow registration of digest list parsers
From
: Luis Chamberlain <mcgrof@xxxxxxxxxx>
Re: [PATCH v6 02/15] module: Introduce ksys_finit_module()
From
: Luis Chamberlain <mcgrof@xxxxxxxxxx>
Re: [PATCH v21 1/6] exec: Add a new AT_EXECVE_CHECK flag to execveat(2)
From
: Jeff Xu <jeffxu@xxxxxxxxxx>
Re: [PATCH v2] vfs: add RWF_NOAPPEND flag for pwritev2
From
: John Garry <john.g.garry@xxxxxxxxxx>
Re: [PATCH v2] vfs: add RWF_NOAPPEND flag for pwritev2
From
: Alejandro Colomar <alx@xxxxxxxxxx>
Re: [PATCH net-next v2 00/12] Begin upstreaming Homa transport protocol
From
: Cong Wang <xiyou.wangcong@xxxxxxxxx>
Re: [PATCH v21 6/6] samples/check-exec: Add an enlighten "inc" interpreter and 28 tests
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [PATCH v21 1/6] exec: Add a new AT_EXECVE_CHECK flag to execveat(2)
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [PATCH v21 6/6] samples/check-exec: Add an enlighten "inc" interpreter and 28 tests
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v21 1/6] exec: Add a new AT_EXECVE_CHECK flag to execveat(2)
From
: Jeff Xu <jeffxu@xxxxxxxxxxxx>
Re: [PATCH v21 1/6] exec: Add a new AT_EXECVE_CHECK flag to execveat(2)
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [PATCH v21 0/6] Script execution control (was O_MAYEXEC)
From
: Kees Cook <kees@xxxxxxxxxx>
Re: [PATCH v21 1/6] exec: Add a new AT_EXECVE_CHECK flag to execveat(2)
From
: Jeff Xu <jeffxu@xxxxxxxxxxxx>
Re: [PATCH v21 1/6] exec: Add a new AT_EXECVE_CHECK flag to execveat(2)
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [PATCH v21 2/6] security: Add EXEC_RESTRICT_FILE and EXEC_DENY_INTERACTIVE securebits
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Linux SCSI]
[Samba]
[Yosemite News]