Linux API
[Prev Page][Next Page]
- Re: [PATCH v17 1/3] proc: add /proc/<pid>/arch_status, (continued)
- [PATCH v3 10/11] platform/x86: asus-wmi: Switch fan boost mode, Yurii Pavlovskyi
- [PATCH] rseq/selftests: x86: Work-around bogus gcc-8 optimisation, Mathieu Desnoyers
- [PATCH v3 09/11] platform/x86: asus-wmi: Control RGB keyboard backlight,
Yurii Pavlovskyi
- [PATCH v3 0/4] clone: add CLONE_PIDFD,
Christian Brauner
- [PATCH v5 00/16] fscrypt: key management improvements,
Eric Biggers
- [PATCH v5 01/16] fs, fscrypt: move uapi definitions to new header <linux/fscrypt.h>, Eric Biggers
- [PATCH v5 16/16] fscrypt: document the new ioctls and policy version, Eric Biggers
- [PATCH v5 09/16] fscrypt: add an HKDF-SHA512 implementation, Eric Biggers
- [PATCH v5 07/16] fscrypt: add FS_IOC_REMOVE_ENCRYPTION_KEY ioctl, Eric Biggers
- [PATCH v5 06/16] fscrypt: add FS_IOC_ADD_ENCRYPTION_KEY ioctl, Eric Biggers
- [PATCH v5 14/16] f2fs: wire up new fscrypt ioctls, Eric Biggers
- [PATCH v5 10/16] fscrypt: v2 encryption policy support, Eric Biggers
- [PATCH v5 11/16] fscrypt: allow unprivileged users to add/remove keys for v2 policies, Eric Biggers
- [PATCH v5 15/16] ubifs: wire up new fscrypt ioctls, Eric Biggers
- [PATCH v5 13/16] ext4: wire up new fscrypt ioctls, Eric Biggers
- [PATCH v5 12/16] fscrypt: require that key be added when setting a v2 encryption policy, Eric Biggers
- [PATCH v5 08/16] fscrypt: add FS_IOC_GET_ENCRYPTION_KEY_STATUS ioctl, Eric Biggers
- [PATCH v5 05/16] fscrypt: refactor v1 policy key setup into keysetup_legacy.c, Eric Biggers
- [PATCH v5 04/16] fscrypt: add ->ci_inode to fscrypt_info, Eric Biggers
- [PATCH v5 02/16] fscrypt: use FSCRYPT_ prefix for uapi constants, Eric Biggers
- [PATCH v5 03/16] fscrypt: use FSCRYPT_* definitions, not FS_*, Eric Biggers
- [PATCH v2 0/5] clone: add CLONE_PIDFD,
Christian Brauner
- [PATCH v16 1/3] /proc/pid/status: Add support for architecture specific output,
Aubrey Li
- [PATCH v4] fs/sync.c: sync_file_range(2) may use WB_SYNC_ALL writeback,
Amir Goldstein
- [PATCH 2/5] glibc: sched_getcpu(): use rseq cpu_id TLS on Linux (v2),
Mathieu Desnoyers
- [PATCH 1/5] glibc: Perform rseq(2) registration at C startup and thread creation (v8),
Mathieu Desnoyers
- [PATCH v1 0/4] clone: add CLONE_PIDFD,
Christian Brauner
- [PATCH v15 1/3] /proc/pid/status: Add support for architecture specific output,
Aubrey Li
- [PATCH linux-next v10 0/7] ptrace: add PTRACE_GET_SYSCALL_INFO request,
Dmitry V. Levin
- Re: bug#35275: spelling mistake manual pages,
Paul Eggert
- [PATCH 0/4] clone: add CLONE_PIDFD,
Christian Brauner
- [PATCH] new flag COPY_FILE_RANGE_FILESIZE for copy_file_range(),
Shawn Landden
- [PATCH v3] fs/sync.c: sync_file_range(2) may use WB_SYNC_ALL writeback, Amir Goldstein
- [PATCH v2] fs/sync.c: sync_file_range(2) may use WB_SYNC_ALL writeback, Amir Goldstein
- [RFC PATCH] fork: add CLONE_PIDFD,
Christian Brauner
- [PATCH 10/11] platform/x86: asus-wmi: Switch fan boost mode,
Yurii Pavlovskyi
- [PATCH 09/11] platform/x86: asus-wmi: Control RGB keyboard backlight,
Yurii Pavlovskyi
- [PATCH v14 1/3] /proc/pid/status: Add support for architecture specific output,
Aubrey Li
- Re: [PATCH] io_uring: add support for barrier fsync,
Christoph Hellwig
- [PATCH] Linux: Define struct termios2 in <termios.h> under _GNU_SOURCE [BZ #10339],
Florian Weimer
- [PATCH v5 0/6] arm64: Initial support for CVADP,
Andrew Murray
- [PATCH ghak90 V6 00/10] audit: implement container identifier,
Richard Guy Briggs
- [PATCH ghak90 V6 01/10] audit: collect audit task parameters, Richard Guy Briggs
- [PATCH ghak90 V6 02/10] audit: add container id, Richard Guy Briggs
- [PATCH ghak90 V6 03/10] audit: read container ID of a process, Richard Guy Briggs
- [PATCH ghak90 V6 04/10] audit: log container info of syscalls, Richard Guy Briggs
- [PATCH ghak90 V6 05/10] audit: add contid support for signalling the audit daemon, Richard Guy Briggs
- [PATCH ghak90 V6 10/10] audit: NETFILTER_PKT: record each container ID associated with a netNS, Richard Guy Briggs
- [PATCH ghak90 V6 09/10] audit: add support for containerid to network namespaces, Richard Guy Briggs
- [PATCH ghak90 V6 08/10] audit: add containerid filtering, Richard Guy Briggs
- [PATCH ghak90 V6 06/10] audit: add support for non-syscall auxiliary records, Richard Guy Briggs
- [PATCH ghak90 V6 07/10] audit: add containerid support for user records, Richard Guy Briggs
- Re: [PATCH ghak90 V6 00/10] audit: implement container identifier, Richard Guy Briggs
- Re: [PATCH ghak90 V6 00/10] audit: implement container identifier, Neil Horman
- [PATCH linux-next v9 0/7] ptrace: add PTRACE_GET_SYSCALL_INFO request,
Dmitry V. Levin
- Re: [PATCH v10 00/18] Introduce the Counter subsystem,
Jonathan Cameron
- [PATCH v2] moduleparam: Save information about built-in modules in separate file,
Alexey Gladkov
- Re: [PATCH v13 2/3] x86,/proc/pid/status: Add AVX-512 usage elapsed time,
Jann Horn
- Re: [PATCH v13 1/3] /proc/pid/status: Add support for architecture specific output,
Thomas Gleixner
- Re: [PATCH] sched/core: expand sched_getaffinity(2) to return number of CPUs,
Peter Zijlstra
- [PATCH V32 0/27] Lockdown patches for 5.2,
Matthew Garrett
- [PATCH V32 03/27] Restrict /dev/{mem,kmem,port} when the kernel is locked down, Matthew Garrett
- [PATCH V32 04/27] kexec_load: Disable at runtime if the kernel is locked down, Matthew Garrett
- [PATCH V32 10/27] PCI: Lock down BAR access when the kernel is locked down, Matthew Garrett
- [PATCH V32 13/27] ACPI: Limit access to custom_method when the kernel is locked down, Matthew Garrett
- [PATCH V32 18/27] Lock down module params that specify hardware parameters (eg. ioport), Matthew Garrett
- [PATCH V32 20/27] Lock down /proc/kcore, Matthew Garrett
- [PATCH V32 23/27] Lock down perf when in confidentiality mode, Matthew Garrett
- [PATCH V32 24/27] kexec: Allow kexec_file() with appropriate IMA policy when locked down, Matthew Garrett
- [PATCH V32 27/27] tracefs: Restrict tracefs when the kernel is locked down, Matthew Garrett
- [PATCH V32 26/27] debugfs: Restrict debugfs when the kernel is locked down, Matthew Garrett
- [PATCH V32 25/27] lockdown: Print current->comm in restriction messages, Matthew Garrett
- [PATCH V32 22/27] bpf: Restrict bpf when kernel lockdown is in confidentiality mode, Matthew Garrett
- [PATCH V32 21/27] Lock down tracing and perf kprobes when in confidentiality mode, Matthew Garrett
- [PATCH V32 19/27] x86/mmiotrace: Lock down the testmmiotrace module, Matthew Garrett
- [PATCH V32 15/27] acpi: Disable ACPI table override if the kernel is locked down, Matthew Garrett
- [PATCH V32 16/27] Prohibit PCMCIA CIS storage when the kernel is locked down, Matthew Garrett
- [PATCH V32 17/27] Lock down TIOCSSERIAL, Matthew Garrett
- [PATCH V32 12/27] x86/msr: Restrict MSR access when the kernel is locked down, Matthew Garrett
- [PATCH V32 14/27] acpi: Ignore acpi_rsdp kernel param when the kernel has been locked down, Matthew Garrett
- [PATCH V32 11/27] x86: Lock down IO port access when the kernel is locked down, Matthew Garrett
- [PATCH V32 09/27] uswsusp: Disable when the kernel is locked down, Matthew Garrett
- [PATCH V32 01/27] Add the ability to lock down access to the running kernel image, Matthew Garrett
- [PATCH V32 02/27] Enforce module signatures if the kernel is locked down, Matthew Garrett
- [PATCH V32 06/27] kexec_file: split KEXEC_VERIFY_SIG into KEXEC_SIG and KEXEC_SIG_FORCE, Matthew Garrett
- [PATCH V32 08/27] hibernate: Disable when the kernel is locked down, Matthew Garrett
- [PATCH V32 07/27] kexec_file: Restrict at runtime if the kernel is locked down, Matthew Garrett
- [PATCH V32 05/27] Copy secure_boot flag in boot params across kexec reboot, Matthew Garrett
- [PATCH v4 0/6] arm64: Initial support for CVADP,
Andrew Murray
- [PATCH v4 00/17] fscrypt: key management improvements,
Eric Biggers
- [PATCH v4 02/17] fscrypt: use FSCRYPT_ prefix for uapi constants, Eric Biggers
- [PATCH v4 01/17] fs, fscrypt: move uapi definitions to new header <linux/fscrypt.h>, Eric Biggers
- [PATCH v4 04/17] fscrypt: add ->ci_inode to fscrypt_info, Eric Biggers
- [PATCH v4 15/17] f2fs: wire up new fscrypt ioctls, Eric Biggers
- [PATCH v4 12/17] fscrypt: allow unprivileged users to add/remove keys for v2 policies, Eric Biggers
- [PATCH v4 13/17] fscrypt: require that key be added when setting a v2 encryption policy, Eric Biggers
- [PATCH v4 16/17] ubifs: wire up new fscrypt ioctls, Eric Biggers
- [PATCH v4 11/17] fscrypt: v2 encryption policy support, Eric Biggers
- [PATCH v4 17/17] fscrypt: document the new ioctls and policy version, Eric Biggers
- [PATCH v4 14/17] ext4: wire up new fscrypt ioctls, Eric Biggers
- [PATCH v4 09/17] fscrypt: add FS_IOC_GET_ENCRYPTION_KEY_STATUS ioctl, Eric Biggers
- [PATCH v4 05/17] fscrypt: refactor v1 policy key setup into keysetup_legacy.c, Eric Biggers
- [PATCH v4 10/17] fscrypt: add an HKDF-SHA512 implementation, Eric Biggers
- [PATCH v4 08/17] fscrypt: add FS_IOC_REMOVE_ENCRYPTION_KEY ioctl, Eric Biggers
- [PATCH v4 06/17] fscrypt: add FS_IOC_ADD_ENCRYPTION_KEY ioctl, Eric Biggers
- [PATCH v4 07/17] fs/dcache.c: add shrink_dcache_inode(), Eric Biggers
- [PATCH v4 03/17] fscrypt: use FSCRYPT_* definitions, not FS_*, Eric Biggers
- [PATCH v8 00/16] Add utilization clamping support,
Patrick Bellasi
- [PATCH v8 12/16] sched/core: uclamp: Extend CPU's cgroup controller, Patrick Bellasi
- [PATCH v8 16/16] sched/core: uclamp: Update CPU's refcount on TG's clamp changes, Patrick Bellasi
- [PATCH v8 15/16] sched/core: uclamp: Use TG's clamps to restrict TASK's clamps, Patrick Bellasi
- [PATCH v8 13/16] sched/core: uclamp: Propagate parent clamps, Patrick Bellasi
- [PATCH v8 14/16] sched/core: uclamp: Propagate system defaults to root group, Patrick Bellasi
- [PATCH v8 09/16] sched/cpufreq: uclamp: Add clamps for FAIR and RT tasks, Patrick Bellasi
- [PATCH v8 10/16] sched/core: uclamp: Add uclamp_util_with(), Patrick Bellasi
- [PATCH v8 11/16] sched/fair: uclamp: Add uclamp support to energy_compute(), Patrick Bellasi
- [PATCH v8 08/16] sched/core: uclamp: Set default clamps for RT tasks, Patrick Bellasi
- [PATCH v8 02/16] sched/core: Add bucket local max tracking, Patrick Bellasi
- [PATCH v8 03/16] sched/core: uclamp: Enforce last task's UCLAMP_MAX, Patrick Bellasi
- [PATCH v8 04/16] sched/core: uclamp: Add system default clamps, Patrick Bellasi
- [PATCH v8 05/16] sched/core: Allow sched_setattr() to use the current policy, Patrick Bellasi
- [PATCH v8 06/16] sched/core: uclamp: Extend sched_setattr() to support utilization clamping, Patrick Bellasi
- [PATCH v8 07/16] sched/core: uclamp: Reset uclamp values on RESET_ON_FORK, Patrick Bellasi
- [PATCH v8 01/16] sched/core: uclamp: Add CPU's clamp buckets refcounting, Patrick Bellasi
- Re: [PATCH v8 00/16] Add utilization clamping support, Peter Zijlstra
- [PATCH v3 0/7] arm64: Initial support for CVADP,
Andrew Murray
- [PATCH v2] fanotify.7, fanotify_init.2, fanotify_mark.2: Document FAN_REPORT_FID and directory modification events,
Matthew Bobrowski
- [PATCH v2 0/5] pid: add pidfd_open(),
Christian Brauner
- [PATCH v2 3/5] signal: support pidfd_open() with pidfd_send_signal(), Christian Brauner
- [PATCH v2 1/5] Make anon_inodes unconditional, Christian Brauner
- [PATCH v2 2/5] pid: add pidfd_open(), Christian Brauner
- [PATCH v2 4/5] signal: PIDFD_SIGNAL_TID threads via pidfds, Christian Brauner
- [PATCH v2 5/5] tests: add pidfd_open() tests, Christian Brauner
- Re: [PATCH v2 0/5] pid: add pidfd_open(), Linus Torvalds
- Re: [PATCH v2 0/5] pid: add pidfd_open(), Daniel Colascione
- Re: [PATCH v2 0/5] pid: add pidfd_open(), Christian Brauner
- Re: [PATCH v2 0/5] pid: add pidfd_open(), Linus Torvalds
- Re: [PATCH v2 0/5] pid: add pidfd_open(), Daniel Colascione
- Re: [PATCH v2 0/5] pid: add pidfd_open(), Christian Brauner
- Re: [PATCH v2 0/5] pid: add pidfd_open(), Linus Torvalds
- Re: [PATCH v2 0/5] pid: add pidfd_open(), Christian Brauner
- Re: [PATCH v2 0/5] pid: add pidfd_open(), Linus Torvalds
- Re: [PATCH v2 0/5] pid: add pidfd_open(), Christian Brauner
- Re: [PATCH v2 0/5] pid: add pidfd_open(), Jonathan Kowalski
- Re: [PATCH v2 0/5] pid: add pidfd_open(), Jann Horn
- Re: [PATCH v2 0/5] pid: add pidfd_open(), Andy Lutomirski
- Re: [PATCH v2 0/5] pid: add pidfd_open(), Linus Torvalds
- Re: [PATCH v2 0/5] pid: add pidfd_open(), Christian Brauner
- Re: [PATCH v2 0/5] pid: add pidfd_open(), Linus Torvalds
- Re: [PATCH v2 0/5] pid: add pidfd_open(), Christian Brauner
- Re: [PATCH v2 0/5] pid: add pidfd_open(), Jonathan Kowalski
- Re: [PATCH v2 0/5] pid: add pidfd_open(), Andy Lutomirski
- Re: [PATCH v2 0/5] pid: add pidfd_open(), Aleksa Sarai
- Re: [PATCH v2 0/5] pid: add pidfd_open(), Linus Torvalds
- Re: [PATCH v2 0/5] pid: add pidfd_open(), Christian Brauner
- Re: [PATCH v2 0/5] pid: add pidfd_open(), Daniel Colascione
- Re: [PATCH v2 0/5] pid: add pidfd_open(), Linus Torvalds
- Re: [PATCH v2 0/5] pid: add pidfd_open(), Daniel Colascione
- Re: [PATCH v2 0/5] pid: add pidfd_open(), Christian Brauner
- Re: [PATCH v2 0/5] pid: add pidfd_open(), Linus Torvalds
- Re: [PATCH v2 0/5] pid: add pidfd_open(), Jonathan Kowalski
- Re: [PATCH v2 0/5] pid: add pidfd_open(), Linus Torvalds
- Re: [PATCH v2 0/5] pid: add pidfd_open(), Daniel Colascione
- Re: [PATCH v2 0/5] pid: add pidfd_open(), Jonathan Kowalski
- Re: [PATCH v2 0/5] pid: add pidfd_open(), Linus Torvalds
- Re: [PATCH v2 0/5] pid: add pidfd_open(), Jonathan Kowalski
- Re: [PATCH v2 0/5] pid: add pidfd_open(), Daniel Colascione
- Re: [PATCH v2 0/5] pid: add pidfd_open(), Linus Torvalds
- Re: [PATCH v2 0/5] pid: add pidfd_open(), Daniel Colascione
- RE: [PATCH v2 0/5] pid: add pidfd_open(), David Laight
- Re: [PATCH v2 0/5] pid: add pidfd_open(), Linus Torvalds
- Re: [PATCH v2 0/5] pid: add pidfd_open(), Florian Weimer
- Re: [PATCH v2 0/5] pid: add pidfd_open(), Andy Lutomirski
- Re: [PATCH v2 0/5] pid: add pidfd_open(), Christian Brauner
- Re: [PATCH v2 0/5] pid: add pidfd_open(), Christian Brauner
- Re: [PATCH v2 0/5] pid: add pidfd_open(), Christian Brauner
- [PATCH v1 0/4] pidfd_open(),
Christian Brauner
- [PATCH 0/4] pidfd_open(),
Christian Brauner
- [PATCH V31 00/25] Add support for kernel lockdown,
Matthew Garrett
- [PATCH V31 01/25] Add the ability to lock down access to the running kernel image, Matthew Garrett
- [PATCH V31 07/25] kexec_file: Restrict at runtime if the kernel is locked down, Matthew Garrett
- [PATCH V31 10/25] PCI: Lock down BAR access when the kernel is locked down, Matthew Garrett
- [PATCH V31 12/25] x86/msr: Restrict MSR access when the kernel is locked down, Matthew Garrett
- [PATCH V31 14/25] acpi: Ignore acpi_rsdp kernel param when the kernel has been locked down, Matthew Garrett
- [PATCH V31 15/25] acpi: Disable ACPI table override if the kernel is locked down, Matthew Garrett
- [PATCH V31 18/25] Lock down module params that specify hardware parameters (eg. ioport), Matthew Garrett
- [PATCH V31 20/25] Lock down /proc/kcore, Matthew Garrett
- [PATCH V31 21/25] Lock down kprobes when in confidentiality mode, Matthew Garrett
- [PATCH V31 22/25] bpf: Restrict bpf when kernel lockdown is in confidentiality mode, Matthew Garrett
- [PATCH V31 23/25] Lock down perf when in confidentiality mode, Matthew Garrett
- [PATCH V31 24/25] lockdown: Print current->comm in restriction messages, Matthew Garrett
- [PATCH V31 25/25] debugfs: Disable open() when kernel is locked down, Matthew Garrett
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Linux SCSI]
[Yosemite Forum]