Linux API
[Prev Page][Next Page]
- Re: [PATCH] ioctl_getfsmap.2: document the GETFSMAP ioctl, (continued)
- [RFC 2/3] kcmp: Add KCMP_EPOLL_TFD mode to compare epoll target files,
Cyrill Gorcunov
- [RFC 0/3] fs,epoll: Add ability to call kcmp to find target files,
Cyrill Gorcunov
- [RFC 1/3] procfs: fdinfo -- Extend information about epoll target files,
Cyrill Gorcunov
- Re: Hard-coding PTY device node numbers in userspace,
Greg KH
- [PATCHv3 33/33] mm, x86: introduce PR_SET_MAX_VADDR and PR_GET_MAX_VADDR,
Kirill A. Shutemov
- Re: [PATCHv3 33/33] mm, x86: introduce PR_SET_MAX_VADDR and PR_GET_MAX_VADDR, Dave Hansen
- Re: [PATCHv3 33/33] mm, x86: introduce PR_SET_MAX_VADDR and PR_GET_MAX_VADDR, Kirill A. Shutemov
[RFC 0/2] fs,eventpoll: Add EPOLL_CTL_DUP into epoll_ctl syscall, Cyrill Gorcunov
[RFC 1/2] fs,eventpoll: Add ability to install target file by its number,
Cyrill Gorcunov
Re: [PATCH] groups: don't return unmapped gids in getgroups(2),
Eric W. Biederman
Re: [PATCH] ioctl_list.2: BLKRASET/BLKRAGET take unsigned long,
Cyril Hrubis
Re: [RFC simple allocator v2 1/2] Create Simple Allocator module,
Laurent Pinchart
[PATCH v4 0/4] Improved seccomp logging,
Tyler Hicks
[PATCH v28 00/21] Richacls (Core and Ext4),
Andreas Gruenbacher
- [PATCH v28 21/21] ext4: Add richacl feature flag, Andreas Gruenbacher
- [PATCH v28 20/21] ext4: Add richacl support, Andreas Gruenbacher
- [PATCH v28 18/21] vfs: Add richacl permission checking, Andreas Gruenbacher
- [PATCH v28 17/21] richacl: Add richacl xattr handler, Andreas Gruenbacher
- [PATCH v28 19/21] vfs: Move check_posix_acl and check_richacl out of fs/namei.c, Andreas Gruenbacher
- [PATCH v28 16/21] richacl: xattr mapping functions, Andreas Gruenbacher
- [PATCH v28 15/21] richacl: Automatic Inheritance, Andreas Gruenbacher
- [PATCH v28 12/21] richacl: Update the file masks in chmod(), Andreas Gruenbacher
- [PATCH v28 14/21] richacl: Create-time inheritance, Andreas Gruenbacher
- [PATCH v28 13/21] richacl: Check if an acl is equivalent to a file mode, Andreas Gruenbacher
- [PATCH v28 11/21] vfs: Cache richacl in struct inode, Andreas Gruenbacher
- [PATCH v28 10/21] vfs: Add get_richacl and set_richacl inode operations, Andreas Gruenbacher
- [PATCH v28 09/21] vfs: Cache base_acl objects in inodes, Andreas Gruenbacher
- [PATCH v28 08/21] richacl: Compute maximum file masks from an acl, Andreas Gruenbacher
- [PATCH v28 07/21] richacl: Permission check algorithm, Andreas Gruenbacher
- [PATCH v28 06/21] richacl: Permission mapping functions, Andreas Gruenbacher
- [PATCH v28 03/21] vfs: Add MAY_DELETE_SELF and MAY_DELETE_CHILD permission flags, Andreas Gruenbacher
- [PATCH v28 05/21] richacl: In-memory representation and helper functions, Andreas Gruenbacher
- [PATCH v28 01/21] vfs: Add IS_ACL() and IS_RICHACL() tests, Andreas Gruenbacher
- [PATCH v28 04/21] vfs: Add permission flags for setting file attributes, Andreas Gruenbacher
- [PATCH v28 02/21] vfs: Add MAY_CREATE_FILE and MAY_CREATE_DIR permission flags, Andreas Gruenbacher
[RFC] syscalls: Restore address limit after a syscall,
Thomas Garnier
Re: [kernel-hardening] [PATCH v2] time: Remove CONFIG_TIMER_STATS, Yann Droneaud
[PATCH 1/5] selftests: Fix selftests build to just build, not run tests,
Michael Ellerman
Re: [PATCHSET for-4.11] cgroup: implement cgroup v2 thread mode,
Andy Lutomirski
Re: [PATCH] prctl: implement PR_GET_ENDIAN for all architectures,
Andrew Morton
[PATCH v3 2/5] vfs: deny copy_file_range() for non regular files,
Amir Goldstein
[PATCH v3 1/5] vfs: deny fallocate() on directory,
Amir Goldstein
Re: [PATCH v2 2/2] fs: Harden against open(..., O_CREAT, 02777) in a setgid directory, Michael Kerrisk
Re: [PATCH v2 1/2] fs: Check f_cred as well as of current's creds in should_remove_suid(), Michael Kerrisk
Re: [PATCH v2 0/2] setgid hardening,
Michael Kerrisk
[PATCH] mnt: allow to add a mount into an existing group,
Andrei Vagin
[LSF/MM TOPIC ATTEND] thawing the fsnotify subsyetm,
Amir Goldstein
writev error codes,
Michal Hocko
Re: [PATCH 2/2] pidns: Expose task pid_ns_for_children to userspace,
Andrei Vagin
[no subject],
Andy Lutomirski
[PATCH v3 2/2] nsfs: Add an ioctl() to return owner UID of a userns,
Michael Kerrisk (man-pages)
[PATCH v3 1/2] nsfs: Add an ioctl() to return the namespace type, Michael Kerrisk (man-pages)
[PATCH v3 0/2] Add further ioctl() operations for namespace discovery, Michael Kerrisk (man-pages)
Re: utimensat EACCES vs. EPERM in 4.8+,
Michael Kerrisk (man-pages)
Re: [PATCH v4 2/2] procfs/tasks: add a simple per-task procfs hidepid= field,
Djalal Harouni
Re: [patch v2] mm, thp: add new defer+madvise defrag option,
Vlastimil Babka
How should we handle variable address space sizes (Re: [RFC 3/4] x86/mm: define TASK_SIZE as current->mm->task_size),
Andy Lutomirski
[RFC, PATCHv2 29/29] mm, x86: introduce RLIMIT_VADDR,
Kirill A. Shutemov
[PATCH v2 1/2] nsfs: Add an ioctl() to return the namespace type, Michael Kerrisk (man-pages)
[PATCH v2 2/2] nsfs: Add an ioctl() to return owner UID of a userns,
Michael Kerrisk (man-pages)
[PATCH v2 0/2] Add further ioctl() operations for namespace discovery,
Michael Kerrisk (man-pages)
[PATCH v4 0/2] Add further ioctl() operations for namespace discovery, Michael Kerrisk (man-pages)
Message not available
Food for thought: could cgroup+bpf live in a cgroup v1-compatible controller?, Andy Lutomirski
[PATCH 1/2] nsfs: Add an ioctl() to return the namespace type, Michael Kerrisk (man-pages)
[PATCH 2/2] nsfs: Add an ioctl() to return creator UID of a userns,
Michael Kerrisk (man-pages)
[PATCH 0/2] Add further ioctl() operations for namespace discovery,
Michael Kerrisk (man-pages)
Potential issues (security and otherwise) with the current cgroup-bpf API,
Andy Lutomirski
[PATCH v5] cgroup: Add new capability to allow a process to migrate other tasks between cgroups,
John Stultz
Documenting the ioctl interfaces to discover relationships between namespaces,
Michael Kerrisk (man-pages)
Re: [PATCH] mm: make transparent hugepage size public, Vlastimil Babka
Re: [PATCH v2 4/5] generic: test encrypted file access,
Richard Weinberger
[PATCH v2 0/6] enable O and KBUILD_OUTPUT for kselftest,
bamvor.zhangjian
Re: [RFC PATCH v8 1/9] Restartable sequences system call, Paul Turner
[PATCH v2] fideduperange.2: fix the discussion of maximum sizes,
Darrick J. Wong
[PATCH] fideduperange.2: fix the discussion of maximum sizes,
Darrick J. Wong
[RFC][PATCH 0/4] Enhanced file stat system call [ver #3],
David Howells
[RFC PATCH 0/3] fs: add AT_REPLACE flag for linkat(),
Omar Sandoval
[PATCH RFC] user-namespaced file capabilities - now with even more magic,
Serge E. Hallyn
[RFC][PATCH 0/4] Enhanced file stat system call [ver #2],
David Howells
Re: [PATCH 1/4] statx: Add a system call to make enhanced file info available,
David Howells
Re: [RFC][PATCH 0/4] Enhanced file stat system call,
Michael Kerrisk
[PATCH resent] uapi libc compat: allow non-glibc to opt out of uapi definitions,
Felix Janda
[PATCH] uapi libc compat: allow non-glibc to opt out of uapi definitions,
Felix Janda
[PATCH RESEND] tools-powerpc: Return false instead of -1,
Andrew Shadura
[PATCH 0/2] Support compiling out the prctl syscall,
Josh Triplett
[RESEND][PATCH v4] cgroup: Use CAP_SYS_RESOURCE to allow a process to migrate other tasks between cgroups,
John Stultz
Formal description of system call interface,
Dmitry Vyukov
[PATCH] mm: only enable sys_pkey* when ARCH_HAS_PKEYS,
Mark Rutland
Re: [RFC v1 00/14] Bus1 Kernel Message Bus, Michael Kerrisk
[RFC v4 00/18] Landlock LSM: Unprivileged sandboxing,
Mickaël Salaün
- [RFC v4 06/18] fs: Constify path_is_under()'s arguments, Mickaël Salaün
- [RFC v4 18/18] samples/landlock: Add sandbox example, Mickaël Salaün
- [RFC v4 16/18] bpf/cgroup,landlock: Handle Landlock hooks per cgroup, Mickaël Salaün
- [RFC v4 17/18] landlock: Add update and debug access flags, Mickaël Salaün
- [RFC v4 08/18] landlock: Handle file comparisons, Mickaël Salaün
- [RFC v4 11/18] seccomp,landlock: Handle Landlock hooks per process hierarchy, Mickaël Salaün
- [RFC v4 07/18] landlock: Add LSM hooks, Mickaël Salaün
- [RFC v4 15/18] bpf/cgroup: Move capability check, Mickaël Salaün
- [RFC v4 09/18] landlock: Add manager functions, Mickaël Salaün
- [RFC v4 01/18] landlock: Add Kconfig, Mickaël Salaün
- [RFC v4 05/18] bpf,landlock: Define an eBPF program type for Landlock, Mickaël Salaün
- [RFC v4 02/18] bpf: Move u64_to_ptr() to BPF headers and inline it, Mickaël Salaün
- [RFC v4 14/18] bpf/cgroup: Make cgroup_bpf_update() return an error code, Mickaël Salaün
- [RFC v4 12/18] bpf: Cosmetic change for bpf_prog_attach(), Mickaël Salaün
- [RFC v4 13/18] bpf/cgroup: Replace struct bpf_prog with struct bpf_object, Mickaël Salaün
- [RFC v4 04/18] bpf,landlock: Add eBPF program subtype and is_valid_subtype() verifier, Mickaël Salaün
- [RFC v4 03/18] bpf,landlock: Add a new arraymap type to deal with (Landlock) handles, Mickaël Salaün
- [RFC v4 10/18] seccomp: Split put_seccomp_filter() with put_seccomp(), Mickaël Salaün
- Re: [RFC v4 00/18] Landlock LSM: Unprivileged sandboxing, Jann Horn
- Re: [RFC v4 00/18] Landlock LSM: Unprivileged sandboxing, Mickaël Salaün
- <Possible follow-ups>
- Re: [RFC v4 00/18] Landlock LSM: Unprivileged sandboxing, Alexei Starovoitov
[PATCH net-next] net: add an ioctl to get a socket network namespace,
Andrei Vagin
[PATCH v4] cgroup: Use CAP_SYS_RESOURCE to allow a process to migrate other tasks between cgroups, John Stultz
Re: [PATCH 2/3] ARM: convert to generated system call tables,
Arnd Bergmann
Re: [PATCH RFC 6/6] selftests: enable O and KBUILD_OUTPUT, Bamvor Zhang Jian
Re: [PATCH RFC 5/6] selftests: add EXTRA_CLEAN for clean target, Bamvor Zhang Jian
Re: [PATCH RFC 4/6] selftests: remove CROSS_COMPILE in dedicated Makefile, Bamvor Zhang Jian
Re: [PATCH RFC 3/6] selftests: add default rules for c source file, Bamvor Zhang Jian
Re: [PATCH RFC 2/6] selftests: remove useless TEST_DIRS, Bamvor Zhang Jian
Re: [PATCH RFC 1/6] selftests: remove duplicated all and clean target, Bamvor Zhang Jian
[PATCH RFC 0/6] enable O and KBUILD_OUTPUT for kselftest,
bamvor.zhangjian
[RFC][PATCH v3] cgroup: Use CAP_SYS_RESOURCE to allow a process to migrate other tasks between cgroups,
John Stultz
[PATCH v7 0/6] x86/arch_prctl Add ARCH_[GET|SET]_CPUID for controlling the CPUID instruction,
Kyle Huey
[PATCH 1/2] man2/fallocate.2: document behavior with shared blocks,
Darrick J. Wong
[PATCH] cgroup: Add new capability to allow a process to migrate other tasks between cgroups,
John Stultz
[PATCH] pkey.7: add description of signal handling behavior,
Dave Hansen
[PATCH] x86, pkeys: remove cruft from never-merged syscalls,
Dave Hansen
[PATCH] generic syscalls: kill cruft from removed pkey syscalls,
Dave Hansen
pkeys: Remove easily triggered WARN,
Dave Jones
[PATCH v4 00/12] syscall/tracing: compat syscall support,
Marcin Nowakowski
- [PATCH v4 10/12] tile/tracing: fix compat syscall handling, Marcin Nowakowski
- [PATCH v4 06/12] x86/tracing: fix compat syscall handling, Marcin Nowakowski
- [PATCH v4 11/12] sparc/tracing: fix compat syscall handling, Marcin Nowakowski
- [PATCH v4 05/12] tracing/syscalls: allow arch to override syscall_get_nr for ftrace, Marcin Nowakowski
- [PATCH v4 05/12] syscall/tracing: allow arch to override syscall_get_nr for ftrace, Marcin Nowakowski
- [PATCH v4 04/12] tracing/syscalls: add compat syscall metadata, Marcin Nowakowski
- [PATCH v4 07/12] s390/tracing: fix compat syscall handling, Marcin Nowakowski
- [PATCH v4 09/12] powerpc/tracing: fix compat syscall handling, Marcin Nowakowski
- [PATCH v4 08/12] arm64/tracing: fix compat syscall handling, Marcin Nowakowski
- [PATCH v4 01/12] tracing/syscalls: remove syscall_nr from syscall metadata, Marcin Nowakowski
- [PATCH v4 02/12] tracing/syscalls: add handling for compat tasks, Marcin Nowakowski
- [PATCH v4 03/12] tracing/syscalls: drop arch_syscall_match_sym_name, Marcin Nowakowski
- [PATCH v4 12/12] parisc/tracing: fix compat syscall handling, Marcin Nowakowski
[PATCH v27 00/21] Richacls (Core and Ext4),
Andreas Gruenbacher
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Linux SCSI]
[Yosemite Forum]