Linux API
[Prev Page][Next Page]
- Re: [RFC PATCH v2 00/13] Add futex2 syscall, (continued)
- [PATCH] mtd: add OTP (one-time-programmable) erase ioctl,
Michael Walle
- [PATCH v3 1/1] mm/madvise: replace ptrace attach requirement for process_madvise,
Suren Baghdasaryan
- [PATCH v18 0/9] mm: introduce memfd_secret system call to create "secret" memory areas,
Mike Rapoport
- [PATCH v18 1/9] mm: add definition of PMD_PAGE_ORDER, Mike Rapoport
- [PATCH v18 2/9] mmap: make mlock_future_check() global, Mike Rapoport
- [PATCH v18 3/9] riscv/Kconfig: make direct map manipulation options depend on MMU, Mike Rapoport
- [PATCH v18 4/9] set_memory: allow set_direct_map_*_noflush() for multiple pages, Mike Rapoport
- [PATCH v18 7/9] PM: hibernate: disable when there are active secretmem users, Mike Rapoport
- [PATCH v18 5/9] set_memory: allow querying whether set_direct_map_*() is actually enabled, Mike Rapoport
- [PATCH v18 6/9] mm: introduce memfd_secret system call to create "secret" memory areas, Mike Rapoport
- [PATCH v18 8/9] arch, mm: wire up memfd_secret system call where relevant, Mike Rapoport
- [PATCH v18 9/9] secretmem: test: add basic selftest for memfd_secret(2), Mike Rapoport
- Re: [PATCH v18 0/9] mm: introduce memfd_secret system call to create "secret" memory areas, Andrew Morton
- [PATCH v6 0/4] block-layer interposer,
Sergei Shtepa
- [PATCH AUTOSEL 5.11 47/52] drivers/base/memory: don't store phys_device in memory blocks, Sasha Levin
- [PATCH AUTOSEL 5.10 42/47] drivers/base/memory: don't store phys_device in memory blocks, Sasha Levin
- [RFC PATCH] mtd: add OTP (one-time-programmable) erase ioctl,
Michael Walle
- [PATCH] ARM: syscalls: switch to generic syscallhdr.sh,
Masahiro Yamada
- [PATCH] MAINTAINERS: exclude uapi directories in API/ABI section,
Vlastimil Babka
- [RFC PATCH] fs: introduce mkdirat2 syscall for atomic mkdir,
Drew DeVault
- [PATCH v6 0/6] x86: Improve Minimum Alternate Stack Size,
Chang S. Bae
- Re: [PATCH] ipc/msg: add msgsnd_timed and msgrcv_timed syscall for system V message queue,
Arnd Bergmann
[PATCH v2] ptrace: add PTRACE_GET_RSEQ_CONFIGURATION request,
Piotr Figiel
[PATCH 0/7] Add FFT Support for R-Car Gen3 devices,
Fabrizio Castro
[PATCH v29 00/12] Landlock LSM,
Mickaël Salaün
- [PATCH v29 01/12] landlock: Add object management, Mickaël Salaün
- [PATCH v29 07/12] landlock: Support filesystem access-control, Mickaël Salaün
- [PATCH v29 05/12] LSM: Infrastructure management of the superblock, Mickaël Salaün
- [PATCH v29 02/12] landlock: Add ruleset and domain management, Mickaël Salaün
- [PATCH v29 03/12] landlock: Set up the security framework and manage credentials, Mickaël Salaün
- [PATCH v29 06/12] fs,security: Add sb_delete hook, Mickaël Salaün
- [PATCH v29 10/12] selftests/landlock: Add user space tests, Mickaël Salaün
- [PATCH v29 09/12] arch: Wire up Landlock syscalls, Mickaël Salaün
- [PATCH v29 08/12] landlock: Add syscall implementations, Mickaël Salaün
- [PATCH v29 11/12] samples/landlock: Add a sandbox manager example, Mickaël Salaün
- [PATCH v29 12/12] landlock: Add user and kernel documentation, Mickaël Salaün
- [PATCH v29 04/12] landlock: Add ptrace restrictions, Mickaël Salaün
Reporting pids to unpriviledged processes with fanotify events, Jan Kara
[PATCH] ptrace: add PTRACE_GET_RSEQ_CONFIGURATION request,
Piotr Figiel
[PATCH RFC] madvise.2: Document MADV_POPULATE, David Hildenbrand
[PATCH v21 0/7] Control-flow Enforcement: Indirect Branch Tracking,
Yu-cheng Yu
[PATCH v21 00/26] Control-flow Enforcement: Shadow Stack,
Yu-cheng Yu
- [PATCH v21 01/26] Documentation/x86: Add CET description, Yu-cheng Yu
- [PATCH v21 03/26] x86/cpufeatures: Add CET CPU feature flags for Control-flow Enforcement Technology (CET), Yu-cheng Yu
- [PATCH v21 02/26] x86/cet/shstk: Add Kconfig option for user-mode control-flow protection, Yu-cheng Yu
- [PATCH v21 04/26] x86/cpufeatures: Introduce X86_FEATURE_CET and setup functions, Yu-cheng Yu
- [PATCH v21 05/26] x86/fpu/xstate: Introduce CET MSR and XSAVES supervisor states, Yu-cheng Yu
- [PATCH v21 06/26] x86/cet: Add control-protection fault handler, Yu-cheng Yu
- [PATCH v21 08/26] x86/mm: Introduce _PAGE_COW, Yu-cheng Yu
- [PATCH v21 07/26] x86/mm: Remove _PAGE_DIRTY from kernel RO pages, Yu-cheng Yu
- [PATCH v21 11/26] x86/mm: Update ptep_set_wrprotect() and pmdp_set_wrprotect() for transition from _PAGE_DIRTY to _PAGE_COW, Yu-cheng Yu
- [PATCH v21 09/26] drm/i915/gvt: Change _PAGE_DIRTY to _PAGE_DIRTY_BITS, Yu-cheng Yu
- [PATCH v21 10/26] x86/mm: Update pte_modify for _PAGE_COW, Yu-cheng Yu
- [PATCH v21 15/26] mm: Fixup places that call pte_mkwrite() directly, Yu-cheng Yu
- [PATCH v21 16/26] mm: Add guard pages around a shadow stack., Yu-cheng Yu
- [PATCH v21 13/26] x86/mm: Shadow Stack page fault error checking, Yu-cheng Yu
- [PATCH v21 14/26] x86/mm: Update maybe_mkwrite() for shadow stack, Yu-cheng Yu
- [PATCH v21 12/26] mm: Introduce VM_SHSTK for shadow stack memory, Yu-cheng Yu
- [PATCH v21 20/26] x86/cet/shstk: User-mode shadow stack support, Yu-cheng Yu
- [PATCH v21 19/26] mm: Re-introduce vm_flags to do_mmap(), Yu-cheng Yu
- [PATCH v21 18/26] mm: Update can_follow_write_pte() for shadow stack, Yu-cheng Yu
- [PATCH v21 17/26] mm/mmap: Add shadow stack pages to memory accounting, Yu-cheng Yu
- [PATCH v21 21/26] x86/cet/shstk: Handle signals for shadow stack, Yu-cheng Yu
- [PATCH v21 22/26] ELF: Introduce arch_setup_elf_property(), Yu-cheng Yu
- [PATCH v21 24/26] x86/cet/shstk: Add arch_prctl functions for shadow stack, Yu-cheng Yu
- [PATCH v21 25/26] mm: Move arch_calc_vm_prot_bits() to arch/x86/include/asm/mman.h, Yu-cheng Yu
- [PATCH v21 23/26] x86/cet/shstk: Handle thread shadow stack, Yu-cheng Yu
- [PATCH v21 26/26] mm: Introduce PROT_SHSTK for shadow stack, Yu-cheng Yu
[PATCH] MAINTAINERS: add uapi directories to API/ABI section, Vlastimil Babka
Re: [PATCH RFC] mm/madvise: introduce MADV_POPULATE to prefault/prealloc memory,
Vlastimil Babka
Re: [RFC] Hugepage collapse in process context,
Michal Hocko
[PATCH v3] mm/vmalloc: randomize vmalloc() allocations,
Topi Miettinen
[RFC PATCH 00/13] Add futex2 syscalls,
André Almeida
- [RFC PATCH 01/13] futex2: Implement wait and wake functions, André Almeida
- [RFC PATCH 02/13] futex2: Add support for shared futexes, André Almeida
- [RFC PATCH 03/13] futex2: Implement vectorized wait, André Almeida
- [RFC PATCH 04/13] futex2: Implement requeue operation, André Almeida
- [RFC PATCH 06/13] docs: locking: futex2: Add documentation, André Almeida
- [RFC PATCH 08/13] selftests: futex2: Add timeout test, André Almeida
- [RFC PATCH 07/13] selftests: futex2: Add wake/wait test, André Almeida
- [RFC PATCH 05/13] futex2: Add compatibility entry point for x86_x32 ABI, André Almeida
- [RFC PATCH 10/13] selftests: futex2: Add waitv test, André Almeida
- [RFC PATCH 11/13] selftests: futex2: Add requeue test, André Almeida
- [RFC PATCH 12/13] perf bench: Add futex2 benchmark tests, André Almeida
- [RFC PATCH 09/13] selftests: futex2: Add wouldblock test, André Almeida
- [RFC PATCH 13/13] kernel: Enable waitpid() for futex2, André Almeida
RFC: ksmbd ABI for ksmbd-tools...,
Stefan Metzmacher
[PATCH v7 1/3] arm64: mte: make the per-task SCTLR_EL1 field usable elsewhere,
Peter Collingbourne
LINUX_VERSION_CODE overflow (was: Re: Linux 4.9.256),
Florian Weimer
Are vDSO addresses special?,
Florian Weimer
[PATCH v2 1/1] af_unix: Allow Unix sockets to raise SIGURG, rao . shoaib
[PATCH v20 0/7] Control-flow Enforcement: Indirect Branch Tracking,
Yu-cheng Yu
[PATCH v20 00/25] Control-flow Enforcement: Shadow Stack,
Yu-cheng Yu
- [PATCH v20 01/25] Documentation/x86: Add CET description, Yu-cheng Yu
- [PATCH v20 09/25] drm/i915/gvt: Change _PAGE_DIRTY to _PAGE_DIRTY_BITS, Yu-cheng Yu
- [PATCH v20 08/25] x86/mm: Introduce _PAGE_COW, Yu-cheng Yu
- [PATCH v20 10/25] x86/mm: Update pte_modify for _PAGE_COW, Yu-cheng Yu
- [PATCH v20 07/25] x86/mm: Remove _PAGE_DIRTY from kernel RO pages, Yu-cheng Yu
- [PATCH v20 02/25] x86/cet/shstk: Add Kconfig option for user-mode control-flow protection, Yu-cheng Yu
- [PATCH v20 12/25] mm: Introduce VM_SHSTK for shadow stack memory, Yu-cheng Yu
- [PATCH v20 04/25] x86/cpufeatures: Introduce X86_FEATURE_CET and setup functions, Yu-cheng Yu
- [PATCH v20 13/25] x86/mm: Shadow Stack page fault error checking, Yu-cheng Yu
- [PATCH v20 11/25] x86/mm: Update ptep_set_wrprotect() and pmdp_set_wrprotect() for transition from _PAGE_DIRTY to _PAGE_COW, Yu-cheng Yu
- [PATCH v20 03/25] x86/cpufeatures: Add CET CPU feature flags for Control-flow Enforcement Technology (CET), Yu-cheng Yu
- [PATCH v20 05/25] x86/fpu/xstate: Introduce CET MSR and XSAVES supervisor states, Yu-cheng Yu
- [PATCH v20 15/25] mm: Fixup places that call pte_mkwrite() directly, Yu-cheng Yu
- [PATCH v20 06/25] x86/cet: Add control-protection fault handler, Yu-cheng Yu
- [PATCH v20 16/25] mm: Add guard pages around a shadow stack., Yu-cheng Yu
- [PATCH v20 14/25] x86/mm: Update maybe_mkwrite() for shadow stack, Yu-cheng Yu
- [PATCH v20 20/25] x86/cet/shstk: User-mode shadow stack support, Yu-cheng Yu
- [PATCH v20 19/25] mm: Re-introduce vm_flags to do_mmap(), Yu-cheng Yu
- [PATCH v20 17/25] mm/mmap: Add shadow stack pages to memory accounting, Yu-cheng Yu
- [PATCH v20 22/25] ELF: Introduce arch_setup_elf_property(), Yu-cheng Yu
- [PATCH v20 23/25] x86/cet/shstk: Handle thread shadow stack, Yu-cheng Yu
- [PATCH v20 18/25] mm: Update can_follow_write_pte() for shadow stack, Yu-cheng Yu
- [PATCH v20 24/25] x86/cet/shstk: Add arch_prctl functions for shadow stack, Yu-cheng Yu
- [PATCH v20 21/25] x86/cet/shstk: Handle signals for shadow stack, Yu-cheng Yu
- [PATCH v20 25/25] mm: Introduce PROT_SHSTK for shadow stack, Yu-cheng Yu
[PATCH bpf 0/4] Expose network namespace cookies to user space,
Lorenz Bauer
Re: [x86/signal] dc8df6e85d: kernel-selftests.sigaltstack.sas.fail, Bae, Chang Seok
[PATCH v17 00/10] mm: introduce memfd_secret system call to create "secret" memory areas,
Mike Rapoport
- [PATCH v17 01/10] mm: add definition of PMD_PAGE_ORDER, Mike Rapoport
- [PATCH v17 02/10] mmap: make mlock_future_check() global, Mike Rapoport
- [PATCH v17 03/10] riscv/Kconfig: make direct map manipulation options depend on MMU, Mike Rapoport
- [PATCH v17 04/10] set_memory: allow set_direct_map_*_noflush() for multiple pages, Mike Rapoport
- [PATCH v17 06/10] arm64: kfence: fix header inclusion, Mike Rapoport
- [PATCH v17 05/10] set_memory: allow querying whether set_direct_map_*() is actually enabled, Mike Rapoport
- [PATCH v17 08/10] PM: hibernate: disable when there are active secretmem users, Mike Rapoport
- [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas, Mike Rapoport
- Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas, Michal Hocko
- Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas, Mike Rapoport
- Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas, Michal Hocko
- Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas, Mike Rapoport
- Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas, Michal Hocko
- Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas, Mike Rapoport
- Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas, Michal Hocko
- Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas, David Hildenbrand
- Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas, Michal Hocko
- Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas, Mike Rapoport
- Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas, David Hildenbrand
- Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas, Mike Rapoport
- Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas, David Hildenbrand
- Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas, Mike Rapoport
- Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas, David Hildenbrand
- Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas, James Bottomley
- Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas, Michal Hocko
- Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas, James Bottomley
- Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas, Michal Hocko
- Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas, James Bottomley
- Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas, David Hildenbrand
- Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas, James Bottomley
- Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas, David Hildenbrand
- Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas, James Bottomley
- Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas, David Hildenbrand
- Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas, David Hildenbrand
- Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas, Michal Hocko
- Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas, Mike Rapoport
- [PATCH v17 09/10] arch, mm: wire up memfd_secret system call where relevant, Mike Rapoport
- [PATCH v17 10/10] secretmem: test: add basic selftest for memfd_secret(2), Mike Rapoport
- Re: [PATCH v17 00/10] mm: introduce memfd_secret system call to create "secret" memory areas, David Hildenbrand
[RFC PATCH v3 0/2] mempinfd: Add new syscall to provide memory pin,
Zhou Wang
[PATCH v2] entry: Use different define for selector variable in SUD, Gabriel Krisman Bertazi
Re: [PATCH] printk: Userspace format enumeration support,
Petr Mladek
[PATCH RESEND] entry: Use different define for selector variable in SUD,
Gabriel Krisman Bertazi
[RFC][PATCH 0/2] keys: request_key() interception in containers,
David Howells
[PATCH v19 00/25] Control-flow Enforcement: Shadow Stack,
Yu-cheng Yu
- [PATCH v19 02/25] x86/cet/shstk: Add Kconfig option for user-mode control-flow protection, Yu-cheng Yu
- [PATCH v19 04/25] x86/cpufeatures: Introduce X86_FEATURE_CET and setup functions, Yu-cheng Yu
- [PATCH v19 06/25] x86/cet: Add control-protection fault handler, Yu-cheng Yu
- [PATCH v19 07/25] x86/mm: Remove _PAGE_DIRTY from kernel RO pages, Yu-cheng Yu
- [PATCH v19 08/25] x86/mm: Introduce _PAGE_COW, Yu-cheng Yu
- [PATCH v19 10/25] x86/mm: Update pte_modify for _PAGE_COW, Yu-cheng Yu
- [PATCH v19 13/25] x86/mm: Shadow Stack page fault error checking, Yu-cheng Yu
- [PATCH v19 12/25] mm: Introduce VM_SHSTK for shadow stack memory, Yu-cheng Yu
- [PATCH v19 11/25] x86/mm: Update ptep_set_wrprotect() and pmdp_set_wrprotect() for transition from _PAGE_DIRTY to _PAGE_COW, Yu-cheng Yu
- [PATCH v19 19/25] mm: Re-introduce vm_flags to do_mmap(), Yu-cheng Yu
- [PATCH v19 15/25] mm: Fixup places that call pte_mkwrite() directly, Yu-cheng Yu
- [PATCH v19 20/25] x86/cet/shstk: User-mode shadow stack support, Yu-cheng Yu
- [PATCH v19 21/25] x86/cet/shstk: Handle signals for shadow stack, Yu-cheng Yu
- [PATCH v19 25/25] mm: Introduce PROT_SHSTK for shadow stack, Yu-cheng Yu
- [PATCH v19 24/25] x86/cet/shstk: Add arch_prctl functions for shadow stack, Yu-cheng Yu
- [PATCH v19 22/25] ELF: Introduce arch_setup_elf_property(), Yu-cheng Yu
- [PATCH v19 23/25] x86/cet/shstk: Handle thread shadow stack, Yu-cheng Yu
- [PATCH v19 17/25] mm/mmap: Add shadow stack pages to memory accounting, Yu-cheng Yu
- [PATCH v19 18/25] mm: Update can_follow_write_pte() for shadow stack, Yu-cheng Yu
- [PATCH v19 09/25] drm/i915/gvt: Change _PAGE_DIRTY to _PAGE_DIRTY_BITS, Yu-cheng Yu
- [PATCH v19 14/25] x86/mm: Update maybe_mkwrite() for shadow stack, Yu-cheng Yu
- [PATCH v19 16/25] mm: Add guard pages around a shadow stack., Yu-cheng Yu
- [PATCH v19 03/25] x86/cpufeatures: Add CET CPU feature flags for Control-flow Enforcement Technology (CET), Yu-cheng Yu
- [PATCH v19 05/25] x86/fpu/xstate: Introduce CET MSR and XSAVES supervisor states, Yu-cheng Yu
- [PATCH v19 01/25] Documentation/x86: Add CET description, Yu-cheng Yu
[PATCH v19 0/7] Control-flow Enforcement: Indirect Branch Tracking,
Yu-cheng Yu
[PATCH v5 0/5] x86: Improve Minimum Alternate Stack Size,
Chang S. Bae
[PATCH v28 00/12] Landlock LSM,
Mickaël Salaün
- [PATCH v28 04/12] landlock: Add ptrace restrictions, Mickaël Salaün
- [PATCH v28 06/12] fs,security: Add sb_delete hook, Mickaël Salaün
- [PATCH v28 07/12] landlock: Support filesystem access-control, Mickaël Salaün
- [PATCH v28 08/12] landlock: Add syscall implementations, Mickaël Salaün
- [PATCH v28 11/12] samples/landlock: Add a sandbox manager example, Mickaël Salaün
- [PATCH v28 12/12] landlock: Add user and kernel documentation, Mickaël Salaün
- [PATCH v28 10/12] selftests/landlock: Add user space tests, Mickaël Salaün
- [PATCH v28 09/12] arch: Wire up Landlock syscalls, Mickaël Salaün
- [PATCH v28 03/12] landlock: Set up the security framework and manage credentials, Mickaël Salaün
- [PATCH v28 02/12] landlock: Add ruleset and domain management, Mickaël Salaün
- [PATCH v28 05/12] LSM: Infrastructure management of the superblock, Mickaël Salaün
- [PATCH v28 01/12] landlock: Add object management, Mickaël Salaün
[PATCH v3 1/1] process_madvise.2: Add process_madvise man page,
Suren Baghdasaryan
[PATCH 0/3 v2] arm64/ptrace: allow to get all registers on syscall traps,
Andrei Vagin
Re: [PATCH v3] mm/page_alloc: count CMA pages per zone and print them in /proc/zoneinfo,
Oscar Salvador
[PATCH v2 1/1] process_madvise.2: Add process_madvise man page,
Suren Baghdasaryan
Re: [PATCH v2 1/1] process_madvise.2: Add process_madvise man page, Michael Kerrisk (man-pages)
[PATCH v2] mm/page_alloc: count CMA pages per zone and print them in /proc/zoneinfo,
David Hildenbrand
[PATCH v18 0/7] Control-flow Enforcement: Indirect Branch Tracking,
Yu-cheng Yu
[PATCH v18 00/25] Control-flow Enforcement: Shadow Stack,
Yu-cheng Yu
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Linux SCSI]
[Yosemite Forum]