Linux API
[Prev Page][Next Page]
- Re: [PATCH v2 2/4] Add fchmodat4(), a new syscall
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/4] Add fchmodat4(), a new syscall
- From: Rich Felker <dalias@xxxxxxxx>
- Re: [PATCH v2 2/4] Add fchmodat4(), a new syscall
- From: Palmer Dabbelt <palmer@xxxxxxxxxx>
- Re: [PATCH v2 2/4] Add fchmodat4(), a new syscall
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 1/4] Non-functional cleanup of a "__user * filename"
- From: Palmer Dabbelt <palmer@xxxxxxxxxx>
- [PATCH v2 2/4] Add fchmodat4(), a new syscall
- From: Palmer Dabbelt <palmer@xxxxxxxxxx>
- [PATCH v2 3/4] arch: Register fchmodat4, usually as syscall 434
- From: Palmer Dabbelt <palmer@xxxxxxxxxx>
- [PATCH v2 4/4] tools: Add fchmodat4
- From: Palmer Dabbelt <palmer@xxxxxxxxxx>
- Add a new fchmodat4() syscall, v2
- From: Palmer Dabbelt <palmer@xxxxxxxxxx>
- Re: [PATCH ghak90 V6 02/10] audit: add container id
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH V35 27/29] tracefs: Restrict tracefs when the kernel is locked down
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V35 27/29] tracefs: Restrict tracefs when the kernel is locked down
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH ghak90 V6 02/10] audit: add container id
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH ghak90 V6 02/10] audit: add container id
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH V35 15/29] acpi: Ignore acpi_rsdp kernel param when the kernel has been locked down
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V35 23/29] bpf: Restrict bpf when kernel lockdown is in confidentiality mode
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH ghak90 V6 02/10] audit: add container id
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH ghak90 V6 02/10] audit: add container id
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH ghak90 V6 02/10] audit: add container id
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH ghak90 V6 02/10] audit: add container id
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH v9 05/10] namei: O_BENEATH-style path resolution flags
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- Re: [PATCH V35 15/29] acpi: Ignore acpi_rsdp kernel param when the kernel has been locked down
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH V35 19/29] Lock down module params that specify hardware parameters (eg. ioport)
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH V35 26/29] debugfs: Restrict debugfs when the kernel is locked down
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH V35 23/29] bpf: Restrict bpf when kernel lockdown is in confidentiality mode
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- Re: [PATCH ghak90 V6 02/10] audit: add container id
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH ghak90 V6 02/10] audit: add container id
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH ghak90 V6 02/10] audit: add container id
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH V35 02/29] security: Add a "locked down" LSM hook
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V35 06/29] kexec_load: Disable at runtime if the kernel is locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V35 07/29] Copy secure_boot flag in boot params across kexec reboot
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V35 10/29] hibernate: Disable when the kernel is locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V35 08/29] kexec_file: split KEXEC_VERIFY_SIG into KEXEC_SIG and KEXEC_SIG_FORCE
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V35 00/29] Kernel lockdown functionality
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V35 12/29] x86: Lock down IO port access when the kernel is locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V35 16/29] acpi: Disable ACPI table override if the kernel is locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V35 14/29] ACPI: Limit access to custom_method when the kernel is locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V35 17/29] Prohibit PCMCIA CIS storage when the kernel is locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V35 21/29] Lock down /proc/kcore
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V35 23/29] bpf: Restrict bpf when kernel lockdown is in confidentiality mode
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V35 27/29] tracefs: Restrict tracefs when the kernel is locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V35 29/29] lockdown: Print current->comm in restriction messages
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V35 28/29] efi: Restrict efivar_ssdt_load when the kernel is locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V35 26/29] debugfs: Restrict debugfs when the kernel is locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V35 25/29] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V35 24/29] Lock down perf when in confidentiality mode
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V35 22/29] Lock down tracing and perf kprobes when in confidentiality mode
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V35 20/29] x86/mmiotrace: Lock down the testmmiotrace module
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V35 19/29] Lock down module params that specify hardware parameters (eg. ioport)
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V35 18/29] Lock down TIOCSSERIAL
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V35 15/29] acpi: Ignore acpi_rsdp kernel param when the kernel has been locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V35 13/29] x86/msr: Restrict MSR access when the kernel is locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V35 11/29] PCI: Lock down BAR access when the kernel is locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V35 09/29] kexec_file: Restrict at runtime if the kernel is locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V35 04/29] Enforce module signatures if the kernel is locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V35 05/29] Restrict /dev/{mem,kmem,port} when the kernel is locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V35 03/29] security: Add a static lockdown policy LSM
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V35 01/29] security: Support early LSMs
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: [PATCH v4 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v5 5/5] mm: factor out common parts between MADV_COLD and MADV_PAGEOUT
- From: Minchan Kim <minchan@xxxxxxxxxx>
- [PATCH v5 4/5] mm: introduce MADV_PAGEOUT
- From: Minchan Kim <minchan@xxxxxxxxxx>
- [PATCH v5 3/5] mm: account nr_isolated_xxx in [isolate|putback]_lru_page
- From: Minchan Kim <minchan@xxxxxxxxxx>
- [PATCH v5 2/5] mm: change PAGEREF_RECLAIM_CLEAN with PAGE_REFRECLAIM
- From: Minchan Kim <minchan@xxxxxxxxxx>
- [PATCH v5 1/5] mm: introduce MADV_COLD
- From: Minchan Kim <minchan@xxxxxxxxxx>
- [PATCH v5 0/5] Introduce MADV_COLD and MADV_PAGEOUT
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [PATCH v4 4/4] mm: introduce MADV_PAGEOUT
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [PATCH v9 05/10] namei: O_BENEATH-style path resolution flags
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 05/10] namei: O_BENEATH-style path resolution flags
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- Re: [PATCH v9 01/10] namei: obey trailing magic-link DAC permissions
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- Re: [PATCH v9 05/10] namei: O_BENEATH-style path resolution flags
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- Re: [PATCH v9 05/10] namei: O_BENEATH-style path resolution flags
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 05/10] namei: O_BENEATH-style path resolution flags
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/6] security: Add hooks to rule on setting a superblock or mount watch [ver #5]
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v9 00/10] namei: openat2(2) path resolution restrictions
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- Re: [PATCH v9 00/10] namei: openat2(2) path resolution restrictions
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 4/4] mm: introduce MADV_PAGEOUT
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [PATCH v9 05/10] namei: O_BENEATH-style path resolution flags
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 4/4] mm: introduce MADV_PAGEOUT
- From: Johannes Weiner <hannes@xxxxxxxxxxx>
- Re: [PATCH v9 05/10] namei: O_BENEATH-style path resolution flags
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 01/10] namei: obey trailing magic-link DAC permissions
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 05/10] namei: O_BENEATH-style path resolution flags
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 01/10] namei: obey trailing magic-link DAC permissions
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- Re: [PATCH v9 05/10] namei: O_BENEATH-style path resolution flags
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 04/10] namei: split out nd->dfd handling to dirfd_path_init
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- Re: [PATCH v9 04/10] namei: split out nd->dfd handling to dirfd_path_init
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- Re: [PATCH v9 05/10] namei: O_BENEATH-style path resolution flags
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- Re: [PATCH v4 4/4] mm: introduce MADV_PAGEOUT
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [PATCH v9 01/10] namei: obey trailing magic-link DAC permissions
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 4/4] mm: introduce MADV_PAGEOUT
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [PATCH v9 05/10] namei: O_BENEATH-style path resolution flags
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 04/10] namei: split out nd->dfd handling to dirfd_path_init
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 01/10] namei: obey trailing magic-link DAC permissions
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: Is a new EPOLLCLOSED a solution to the problem that EPOLL_CTL_DISABLE tried to solve?
- From: Carlo Wood <carlo@xxxxxxxxxx>
- Re: On
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- On
- From: Carlo Wood <carlo@xxxxxxxxxx>
- Re: [PATCH v4 4/4] mm: introduce MADV_PAGEOUT
- From: Johannes Weiner <hannes@xxxxxxxxxxx>
- Re: [PATCH v4 3/4] mm: account nr_isolated_xxx in [isolate|putback]_lru_page
- From: Johannes Weiner <hannes@xxxxxxxxxxx>
- Re: [PATCH v4 1/4] mm: introduce MADV_COLD
- From: Johannes Weiner <hannes@xxxxxxxxxxx>
- Re: [PATCH V34 10/29] hibernate: Disable when the kernel is locked down
- From: joeyli <joeyli.kernel@xxxxxxxxx>
- [PATCH v4 4/4] mm: introduce MADV_PAGEOUT
- From: Minchan Kim <minchan@xxxxxxxxxx>
- [PATCH v4 3/4] mm: account nr_isolated_xxx in [isolate|putback]_lru_page
- From: Minchan Kim <minchan@xxxxxxxxxx>
- [PATCH v4 2/4] mm: change PAGEREF_RECLAIM_CLEAN with PAGE_REFRECLAIM
- From: Minchan Kim <minchan@xxxxxxxxxx>
- [PATCH v4 1/4] mm: introduce MADV_COLD
- From: Minchan Kim <minchan@xxxxxxxxxx>
- [PATCH v4 0/4] Introduce MADV_COLD and MADV_PAGEOUT
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [PATCH v3 4/5] mm: introduce MADV_PAGEOUT
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [PATCH v3 4/5] mm: introduce MADV_PAGEOUT
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [PATCH v3 4/5] mm: introduce MADV_PAGEOUT
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [PATCH v3 4/5] mm: introduce MADV_PAGEOUT
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [PATCH v3 5/5] mm: factor out pmd young/dirty bit handling and THP split
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [PATCH v3 4/5] mm: introduce MADV_PAGEOUT
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [PATCH v2 00/11] FPGA DFL updates
- From: Wu Hao <hao.wu@xxxxxxxxx>
- Re: [PATCH v2 00/11] FPGA DFL updates
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/11] FPGA DFL updates
- From: Wu Hao <hao.wu@xxxxxxxxx>
- Re: [PATCH v9 00/24] ILP32 for ARM64
- From: Yury Norov <yury.norov@xxxxxxxxx>
- Re: [PATCH v3 5/5] mm: factor out pmd young/dirty bit handling and THP split
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [PATCH 02/10] vfs: syscall: Add move_mount(2) to move mounts around
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 4/5] mm: introduce MADV_PAGEOUT
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [PATCH v3 3/5] mm: account nr_isolated_xxx in [isolate|putback]_lru_page
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [PATCH v3 1/5] mm: introduce MADV_COLD
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [PATCH 02/10] vfs: syscall: Add move_mount(2) to move mounts around
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH ghak90 V6 02/10] audit: add container id
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 02/10] vfs: syscall: Add move_mount(2) to move mounts around
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/9] security: Add a hook for the point of notification insertion [ver #5]
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/9] security: Add hooks to rule on setting a watch [ver #5]
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 02/10] vfs: syscall: Add move_mount(2) to move mounts around
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH ghak90 V6 02/10] audit: add container id
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH for 5.2] rseq/selftests: Fix Thumb mode build failure on arm32
- From: shuah <shuah@xxxxxxxxxx>
- Re: [PATCH ghak90 V6 02/10] audit: add container id
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH 02/10] vfs: syscall: Add move_mount(2) to move mounts around
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH for 5.2] rseq/selftests: Fix Thumb mode build failure on arm32
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH ghak90 V6 02/10] audit: add container id
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH 02/10] vfs: syscall: Add move_mount(2) to move mounts around
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 02/10] vfs: syscall: Add move_mount(2) to move mounts around
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 02/10] vfs: syscall: Add move_mount(2) to move mounts around
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 10/10] selftests: add openat2(2) selftests
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- Re: [PATCH v9 10/10] selftests: add openat2(2) selftests
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v6 16/17] ext4: update on-disk format documentation for fs-verity
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v6 15/17] ext4: add fs-verity read support
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v6 14/17] ext4: add basic fs-verity support
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v6 13/17] fs-verity: support builtin file signatures
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- [PATCH v9 10/10] selftests: add openat2(2) selftests
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- [PATCH v9 09/10] kselftest: save-and-restore errno to allow for %m formatting
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- [PATCH v9 08/10] open: openat2(2) syscall
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- [PATCH v9 07/10] namei: aggressively check for nd->root escape on ".." resolution
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- [PATCH v9 06/10] namei: LOOKUP_IN_ROOT: chroot-like path resolution
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- [PATCH v9 05/10] namei: O_BENEATH-style path resolution flags
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- [PATCH v9 04/10] namei: split out nd->dfd handling to dirfd_path_init
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- [PATCH v9 03/10] open: O_EMPTYPATH: procfs-less file descriptor re-opening
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- [PATCH v9 02/10] procfs: switch magic-link modes to be more sane
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- [PATCH v9 01/10] namei: obey trailing magic-link DAC permissions
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- [PATCH v9 00/10] namei: openat2(2) path resolution restrictions
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- Re: [PATCH 6/9] Add a general, global device notification watch list [ver #5]
- From: Alan Stern <stern@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 6/9] Add a general, global device notification watch list [ver #5]
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 6/9] Add a general, global device notification watch list [ver #5]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 6/9] Add a general, global device notification watch list [ver #5]
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 00/11] FPGA DFL updates
- From: Wu Hao <hao.wu@xxxxxxxxx>
- [PATCH v2 07/11] fpga: dfl: afu: export __port_enable/disable function.
- From: Wu Hao <hao.wu@xxxxxxxxx>
- [PATCH v2 03/11] fpga: dfl: pci: enable SRIOV support.
- From: Wu Hao <hao.wu@xxxxxxxxx>
- [PATCH v2 02/11] fpga: dfl: fme: add DFL_FPGA_FME_PORT_RELEASE/ASSIGN ioctl support.
- From: Wu Hao <hao.wu@xxxxxxxxx>
- [PATCH v2 01/11] fpga: dfl: fme: support 512bit data width PR
- From: Wu Hao <hao.wu@xxxxxxxxx>
- [PATCH v2 06/11] fpga: dfl: add id_table for dfl private feature driver
- From: Wu Hao <hao.wu@xxxxxxxxx>
- [PATCH v2 08/11] fpga: dfl: afu: add error reporting support.
- From: Wu Hao <hao.wu@xxxxxxxxx>
- [PATCH v2 10/11] fpga: dfl: fme: add capability sysfs interfaces
- From: Wu Hao <hao.wu@xxxxxxxxx>
- [PATCH v2 09/11] fpga: dfl: afu: add STP (SignalTap) support
- From: Wu Hao <hao.wu@xxxxxxxxx>
- [PATCH v2 11/11] fpga: dfl: fme: add global error reporting support
- From: Wu Hao <hao.wu@xxxxxxxxx>
- [PATCH v2 05/11] fpga: dfl: afu: add userclock sysfs interfaces.
- From: Wu Hao <hao.wu@xxxxxxxxx>
- [PATCH v2 04/11] fpga: dfl: afu: add AFU state related sysfs interfaces
- From: Wu Hao <hao.wu@xxxxxxxxx>
- Re: [RFC PATCH] binfmt_elf: Extract .note.gnu.property from an ELF file
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 01/13] vfs: verify param type in vfs_parse_sb_flag()
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 6/9] Add a general, global device notification watch list [ver #5]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v6 10/17] fs-verity: implement FS_IOC_ENABLE_VERITY ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 6/9] Add a general, global device notification watch list [ver #5]
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 6/9] Add a general, global device notification watch list [ver #5]
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/9] General notification queue with user mmap()'able ring buffer [ver #5]
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/9] uapi: General notification ring definitions [ver #5]
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 8/9] usb: Add USB subsystem notifications [ver #5]
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/6] vfs: Allow mount information to be queried by fsinfo() [ver #15]
- From: Ian Kent <raven@xxxxxxxxxx>
- Re: [PATCH v2 bpf-next 1/4] bpf: unprivileged BPF access via /dev/bpf
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [f2fs-dev] [PATCH v6 17/17] f2fs: add fs-verity support
- From: Chao Yu <yuchao0@xxxxxxxxxx>
- Re: [PATCH 4/6] vfs: Allow mount information to be queried by fsinfo() [ver #15]
- From: Ian Kent <raven@xxxxxxxxxx>
- Re: [PATCH v2 bpf-next 1/4] bpf: unprivileged BPF access via /dev/bpf
- From: Song Liu <songliubraving@xxxxxx>
- Re: [PATCH 4/6] vfs: Allow mount information to be queried by fsinfo() [ver #15]
- From: Ian Kent <raven@xxxxxxxxxx>
- Re: [PATCH v2 bpf-next 1/4] bpf: unprivileged BPF access via /dev/bpf
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- fsinfo(2) manpage
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 00/11] VFS: Introduce filesystem information query syscall [ver #15]
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC PATCH] binfmt_elf: Extract .note.gnu.property from an ELF file
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH 01/11] vfs: syscall: Add fsinfo() to query filesystem information [ver #15]
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH 01/11] vfs: syscall: Add fsinfo() to query filesystem information [ver #15]
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH v5 2/3] fpga: dfl: fme: add thermal management support
- From: Moritz Fischer <mdf@xxxxxxxxxx>
- Re: [PATCH v5 3/3] fpga: dfl: fme: add power management support
- From: Moritz Fischer <mdf@xxxxxxxxxx>
- Re: [PATCH v2 bpf-next 1/4] bpf: unprivileged BPF access via /dev/bpf
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [RFC PATCH] binfmt_elf: Extract .note.gnu.property from an ELF file
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [RFC PATCH 3/3] Prevent user from writing to IBT bitmap.
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [RFC PATCH] binfmt_elf: Extract .note.gnu.property from an ELF file
- From: Jann Horn <jannh@xxxxxxxxxx>
- [PATCH v6 06/17] fs-verity: add inode and superblock fields
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 07/17] fs-verity: add the hook for file ->open()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 02/17] fs-verity: add MAINTAINERS file entry
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 05/17] fs-verity: add Kconfig and the helper functions for hashing
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 08/17] fs-verity: add the hook for file ->setattr()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 04/17] fs: uapi: define verity bit for FS_IOC_GETFLAGS
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 11/17] fs-verity: implement FS_IOC_MEASURE_VERITY ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 12/17] fs-verity: add SHA-512 support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 09/17] fs-verity: add data verification hooks for ->readpages()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 15/17] ext4: add fs-verity read support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 16/17] ext4: update on-disk format documentation for fs-verity
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 10/17] fs-verity: implement FS_IOC_ENABLE_VERITY ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 14/17] ext4: add basic fs-verity support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 13/17] fs-verity: support builtin file signatures
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 17/17] f2fs: add fs-verity support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 03/17] fs-verity: add UAPI header
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 01/17] fs-verity: add a documentation file
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 00/17] fs-verity: read-only file-based authenticity protection
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v3 2/2] arch: wire-up clone3() syscall
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH v3 2/2] arch: wire-up clone3() syscall
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 2/6] Adjust watch_queue documentation to mention mount and superblock watches. [ver #5]
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v4 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v5 3/3] fpga: dfl: fme: add power management support
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH v4 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 01/11] vfs: syscall: Add fsinfo() to query filesystem information [ver #15]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v4 2/3] initramfs: read metadata from special file METADATA!!!
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 01/11] vfs: syscall: Add fsinfo() to query filesystem information [ver #15]
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH v3 0/5] Introduce MADV_COLD and MADV_PAGEOUT
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [PATCH 2/6] Adjust watch_queue documentation to mention mount and superblock watches. [ver #5]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 01/13] vfs: verify param type in vfs_parse_sb_flag()
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH v3 0/5] Introduce MADV_COLD and MADV_PAGEOUT
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [PATCH v3 1/5] mm: introduce MADV_COLD
- From: Minchan Kim <minchan@xxxxxxxxxx>
- [PATCH v5 2/3] fpga: dfl: fme: add thermal management support
- From: Wu Hao <hao.wu@xxxxxxxxx>
- [PATCH v5 3/3] fpga: dfl: fme: add power management support
- From: Wu Hao <hao.wu@xxxxxxxxx>
- [PATCH v5 1/3] Documentation: fpga: dfl: add descriptions for thermal/power management interfaces
- From: Wu Hao <hao.wu@xxxxxxxxx>
- [PATCH v5 0/3] add thermal/power management features for FPGA DFL drivers
- From: Wu Hao <hao.wu@xxxxxxxxx>
- Re: [PATCH v4 05/15] Documentation: fpga: dfl: add descriptions for virtualization and new interfaces.
- From: Wu Hao <hao.wu@xxxxxxxxx>
- [PATCH v2 05/15] Documentation: fpga: dfl: add descriptions for virtualization and new interfaces.
- From: Wu Hao <hao.wu@xxxxxxxxx>
- Re: [PATCH 2/6] Adjust watch_queue documentation to mention mount and superblock watches. [ver #5]
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v4 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 3/3] gen_init_cpio: add support for file metadata
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH for 5.2] rseq/selftests: Fix Thumb mode build failure on arm32
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH] binfmt_elf: Extract .note.gnu.property from an ELF file
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH V33 24/30] bpf: Restrict bpf when kernel lockdown is in confidentiality mode
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [RFC PATCH 3/3] Prevent user from writing to IBT bitmap.
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [RFC PATCH 2/3] Introduce arch_prctl(ARCH_X86_CET_MARK_LEGACY_CODE)
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v4 3/3] fpga: dfl: fme: add power management support
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH v4 3/3] fpga: dfl: fme: add power management support
- From: Wu Hao <hao.wu@xxxxxxxxx>
- Re: [RFC PATCH 1/3] mm: Introduce VM_IBT for CET legacy code bitmap
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v5 17/18] kernel/sysctl-test: Add null pointer test for sysctl.c:proc_dointvec()
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- [RFC PATCH 1/3] mm: Introduce VM_IBT for CET legacy code bitmap
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [RFC PATCH 3/3] Prevent user from writing to IBT bitmap.
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [RFC PATCH 2/3] Introduce arch_prctl(ARCH_X86_CET_MARK_LEGACY_CODE)
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH V33 24/30] bpf: Restrict bpf when kernel lockdown is in confidentiality mode
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v4 3/3] fpga: dfl: fme: add power management support
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH v4 2/3] fpga: dfl: fme: add thermal management support
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- [RFC PATCH] binfmt_elf: Extract .note.gnu.property from an ELF file
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH 0/6] Mount and superblock notifications [ver #5]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 6/6] Add sample notification program [ver #5]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 5/6] fsinfo: Export superblock notification counter [ver #5]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 4/6] vfs: Add superblock notifications [ver #5]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 3/6] vfs: Add a mount-notification facility [ver #5]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 2/6] Adjust watch_queue documentation to mention mount and superblock watches. [ver #5]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 1/6] security: Add hooks to rule on setting a superblock or mount watch [ver #5]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 0/6] Mount and superblock notifications [ver #5]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 9/9] Add sample notification program [ver #5]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 8/9] usb: Add USB subsystem notifications [ver #5]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 7/9] block: Add block layer notifications [ver #5]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 6/9] Add a general, global device notification watch list [ver #5]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 5/9] keys: Add a notification facility [ver #5]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 4/9] General notification queue with user mmap()'able ring buffer [ver #5]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 3/9] security: Add a hook for the point of notification insertion [ver #5]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 2/9] security: Add hooks to rule on setting a watch [ver #5]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 1/9] uapi: General notification ring definitions [ver #5]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 0/9] Keyrings, Block and USB notifications [ver #5]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 6/6] fsinfo: Add documentation for mount and sb watches [ver #15]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 5/6] vfs: fsinfo sample: Mount listing program [ver #15]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 4/6] vfs: Allow mount information to be queried by fsinfo() [ver #15]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 3/6] vfs: Add mount change counter [ver #15]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 2/6] vfs: Introduce a non-repeating system-unique superblock ID [ver #15]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 1/6] vfs: Allow fsinfo() to look up a mount object by ID [ver #15]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 0/6] fsinfo: Add mount topology query [ver #15]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 11/11] fsinfo: proc - add sb operation fsinfo() [ver #15]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 10/11] kernfs, cgroup: Add fsinfo support [ver #15]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 09/11] hugetlbfs: Add support for fsinfo() [ver #15]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 08/11] fsinfo: Add API documentation [ver #15]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 07/11] afs: Support fsinfo() [ver #15]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 06/11] fsinfo: Implement retrieval of LSM parameters with fsinfo() [ver #15]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 05/11] vfs: Implement parameter value retrieval with fsinfo() [ver #15]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 04/11] vfs: Allow fsinfo() to be used to query an fs parameter description [ver #15]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 03/11] vfs: Allow fsinfo() to query what's in an fs_context [ver #15]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 02/11] fsinfo: Add syscalls to other arches [ver #15]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 01/11] vfs: syscall: Add fsinfo() to query filesystem information [ver #15]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 00/11] VFS: Introduce filesystem information query syscall [ver #15]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH bpf-next v9 05/10] bpf,landlock: Add a new map type: inode
- From: Mickaël Salaün <mickael.salaun@xxxxxxxxxxx>
- Re: [PATCH v2 bpf-next 1/4] bpf: unprivileged BPF access via /dev/bpf
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH v5 17/18] kernel/sysctl-test: Add null pointer test for sysctl.c:proc_dointvec()
- From: Brendan Higgins <brendanhiggins@xxxxxxxxxx>
- Re: [PATCH v4 05/15] Documentation: fpga: dfl: add descriptions for virtualization and new interfaces.
- From: Wu Hao <hao.wu@xxxxxxxxx>
- Re: [PATCH v4 05/15] Documentation: fpga: dfl: add descriptions for virtualization and new interfaces.
- From: Moritz Fischer <mdf@xxxxxxxxxx>
- Re: [PATCH v4 2/2] fpga: dfl: fme: add performance reporting support
- From: Wu Hao <hao.wu@xxxxxxxxx>
- Re: [PATCH v3 1/5] mm: introduce MADV_COLD
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [PATCH v3 1/5] mm: introduce MADV_COLD
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [PATCH v2 bpf-next 1/4] bpf: unprivileged BPF access via /dev/bpf
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH V33 24/30] bpf: Restrict bpf when kernel lockdown is in confidentiality mode
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH V33 24/30] bpf: Restrict bpf when kernel lockdown is in confidentiality mode
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH V34 09/29] kexec_file: Restrict at runtime if the kernel is locked down
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V33 24/30] bpf: Restrict bpf when kernel lockdown is in confidentiality mode
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v3 0/5] Introduce MADV_COLD and MADV_PAGEOUT
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [PATCH V33 24/30] bpf: Restrict bpf when kernel lockdown is in confidentiality mode
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH V34 09/29] kexec_file: Restrict at runtime if the kernel is locked down
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH V33 24/30] bpf: Restrict bpf when kernel lockdown is in confidentiality mode
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v3 0/5] Introduce MADV_COLD and MADV_PAGEOUT
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH bpf-next v9 05/10] bpf,landlock: Add a new map type: inode
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] fpga: dfl: fme: add performance reporting support
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH bpf-next v9 05/10] bpf,landlock: Add a new map type: inode
- From: Mickaël Salaün <mickael.salaun@xxxxxxxxxxx>
- Re: [PATCH V34 19/29] Lock down module params that specify hardware parameters (eg. ioport)
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V34 09/29] kexec_file: Restrict at runtime if the kernel is locked down
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v3 1/5] mm: introduce MADV_COLD
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [PATCH v3 1/5] mm: introduce MADV_COLD
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH V33 24/30] bpf: Restrict bpf when kernel lockdown is in confidentiality mode
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/5] mm: introduce MADV_COLD
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [PATCH v3 1/2] pid: add pidfd_open()
- From: Konstantin Khlebnikov <khlebnikov@xxxxxxxxxxxxxx>
- Re: [PATCH v3 1/5] mm: introduce MADV_COLD
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH v3 5/5] mm: factor out pmd young/dirty bit handling and THP split
- From: Minchan Kim <minchan@xxxxxxxxxx>
- [PATCH v3 4/5] mm: introduce MADV_PAGEOUT
- From: Minchan Kim <minchan@xxxxxxxxxx>
- [PATCH v3 3/5] mm: account nr_isolated_xxx in [isolate|putback]_lru_page
- From: Minchan Kim <minchan@xxxxxxxxxx>
- [PATCH v3 2/5] mm: change PAGEREF_RECLAIM_CLEAN with PAGE_REFRECLAIM
- From: Minchan Kim <minchan@xxxxxxxxxx>
- [PATCH v3 1/5] mm: introduce MADV_COLD
- From: Minchan Kim <minchan@xxxxxxxxxx>
- [PATCH v3 0/5] Introduce MADV_COLD and MADV_PAGEOUT
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [PATCH] binfmt_elf: Extract .note.gnu.property from an ELF file
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH] binfmt_elf: Extract .note.gnu.property from an ELF file
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v5 17/18] kernel/sysctl-test: Add null pointer test for sysctl.c:proc_dointvec()
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- [PATCH v4 2/2] fpga: dfl: fme: add performance reporting support
- From: Wu Hao <hao.wu@xxxxxxxxx>
- [PATCH v4 0/2] add performance reporting support to FPGA DFL drivers
- From: Wu Hao <hao.wu@xxxxxxxxx>
- [PATCH v4 1/2] Documentation: fpga: dfl: add description for performance reporting support
- From: Wu Hao <hao.wu@xxxxxxxxx>
- [PATCH v4 3/3] fpga: dfl: fme: add power management support
- From: Wu Hao <hao.wu@xxxxxxxxx>
- [PATCH v4 2/3] fpga: dfl: fme: add thermal management support
- From: Wu Hao <hao.wu@xxxxxxxxx>
- [PATCH v4 0/3] add thermal/power management features for FPGA DFL drivers
- From: Wu Hao <hao.wu@xxxxxxxxx>
- [PATCH v4 1/3] Documentation: fpga: dfl: add descriptions for thermal/power management interfaces
- From: Wu Hao <hao.wu@xxxxxxxxx>
- [PATCH v4 05/15] Documentation: fpga: dfl: add descriptions for virtualization and new interfaces.
- From: Wu Hao <hao.wu@xxxxxxxxx>
- [PATCH v4 03/15] fpga: dfl: fme: align PR buffer size per PR datawidth
- From: Wu Hao <hao.wu@xxxxxxxxx>
- [PATCH v4 04/15] fpga: dfl: fme: support 512bit data width PR
- From: Wu Hao <hao.wu@xxxxxxxxx>
- [PATCH v4 01/15] fpga: dfl-fme-mgr: fix FME_PR_INTFC_ID register address.
- From: Wu Hao <hao.wu@xxxxxxxxx>
- [PATCH v4 09/15] fpga: dfl: afu: add userclock sysfs interfaces.
- From: Wu Hao <hao.wu@xxxxxxxxx>
- [PATCH v4 06/15] fpga: dfl: fme: add DFL_FPGA_FME_PORT_RELEASE/ASSIGN ioctl support.
- From: Wu Hao <hao.wu@xxxxxxxxx>
- [PATCH v4 10/15] fpga: dfl: add id_table for dfl private feature driver
- From: Wu Hao <hao.wu@xxxxxxxxx>
- [PATCH v4 11/15] fpga: dfl: afu: export __port_enable/disable function.
- From: Wu Hao <hao.wu@xxxxxxxxx>
- [PATCH v4 15/15] fpga: dfl: fme: add global error reporting support
- From: Wu Hao <hao.wu@xxxxxxxxx>
- [PATCH v4 13/15] fpga: dfl: afu: add STP (SignalTap) support
- From: Wu Hao <hao.wu@xxxxxxxxx>
- [PATCH v4 12/15] fpga: dfl: afu: add error reporting support.
- From: Wu Hao <hao.wu@xxxxxxxxx>
- [PATCH v4 14/15] fpga: dfl: fme: add capability sysfs interfaces
- From: Wu Hao <hao.wu@xxxxxxxxx>
- [PATCH v4 08/15] fpga: dfl: afu: add AFU state related sysfs interfaces
- From: Wu Hao <hao.wu@xxxxxxxxx>
- [PATCH v4 07/15] fpga: dfl: pci: enable SRIOV support.
- From: Wu Hao <hao.wu@xxxxxxxxx>
- [PATCH v4 02/15] fpga: dfl: fme: remove copy_to_user() in ioctl for PR
- From: Wu Hao <hao.wu@xxxxxxxxx>
- [PATCH v4 00/15] add new features for FPGA DFL drivers
- From: Wu Hao <hao.wu@xxxxxxxxx>
- Re: [PATCH V34 09/29] kexec_file: Restrict at runtime if the kernel is locked down
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH V34 19/29] Lock down module params that specify hardware parameters (eg. ioport)
- From: Daniel Axtens <dja@xxxxxxxxxx>
- Re: [PATCH V33 24/30] bpf: Restrict bpf when kernel lockdown is in confidentiality mode
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH 00/25] VFS: Introduce filesystem information query syscall [ver #14]
- From: Ian Kent <raven@xxxxxxxxxx>
- Re: [PATCH V33 24/30] bpf: Restrict bpf when kernel lockdown is in confidentiality mode
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH V33 29/30] tracefs: Restrict tracefs when the kernel is locked down
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v5 16/16] f2fs: add fs-verity support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC PATCH 1/1] Revert "rseq/selftests: arm: use udf instruction for RSEQ_SIG"
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH] binfmt_elf: Extract .note.gnu.property from an ELF file
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: Detecting the availability of VSYSCALL
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH] binfmt_elf: Extract .note.gnu.property from an ELF file
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: Detecting the availability of VSYSCALL
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: Detecting the availability of VSYSCALL
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: Detecting the availability of VSYSCALL
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: Detecting the availability of VSYSCALL
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: New glibc-testfail io/tst-copy_file_range with kernel-next.
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: Detecting the availability of VSYSCALL
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: Detecting the availability of VSYSCALL
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: Detecting the availability of VSYSCALL
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH 00/25] VFS: Introduce filesystem information query syscall [ver #14]
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH 00/25] VFS: Introduce filesystem information query syscall [ver #14]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: Detecting the availability of VSYSCALL
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH 00/25] VFS: Introduce filesystem information query syscall [ver #14]
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH V33 29/30] tracefs: Restrict tracefs when the kernel is locked down
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH V33 21/30] x86/mmiotrace: Lock down the testmmiotrace module
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: Detecting the availability of VSYSCALL
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH 00/25] VFS: Introduce filesystem information query syscall [ver #14]
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH 00/25] VFS: Introduce filesystem information query syscall [ver #14]
- From: Ian Kent <raven@xxxxxxxxxx>
- Re: [PATCH 03/25] vfs: Allow fsinfo() to query what's in an fs_context [ver #14]
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH 00/25] VFS: Introduce filesystem information query syscall [ver #14]
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH 03/25] vfs: Allow fsinfo() to query what's in an fs_context [ver #14]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 01/25] vfs: syscall: Add fsinfo() to query filesystem information [ver #14]
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH 10/25] vfs: Allow mount information to be queried by fsinfo() [ver #14]
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH 09/25] vfs: Add mount notification count [ver #14]
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH 08/25] vfs: Allow fsinfo() to look up a mount object by ID [ver #14]
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH 01/25] vfs: syscall: Add fsinfo() to query filesystem information [ver #14]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v4 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH bpf-next v9 02/10] bpf: Add eBPF program subtype and is_valid_subtype() verifier
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v5 16/16] f2fs: add fs-verity support
- From: Chao Yu <yuchao0@xxxxxxxxxx>
- Re: [PATCH bpf-next v9 02/10] bpf: Add eBPF program subtype and is_valid_subtype() verifier
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH bpf-next v9 05/10] bpf,landlock: Add a new map type: inode
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- [PATCH bpf-next v9 06/10] landlock: Handle filesystem access control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH bpf-next v9 05/10] bpf,landlock: Add a new map type: inode
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH bpf-next v9 09/10] bpf,landlock: Add tests for Landlock
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH bpf-next v9 04/10] seccomp,landlock: Enforce Landlock programs per process hierarchy
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH bpf-next v9 03/10] bpf,landlock: Define an eBPF program type for Landlock hooks
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH bpf-next v9 00/10] Landlock LSM: Toward unprivileged sandboxing
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH bpf-next v9 02/10] bpf: Add eBPF program subtype and is_valid_subtype() verifier
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH bpf-next v9 08/10] bpf: Add a Landlock sandbox example
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH bpf-next v9 10/10] landlock: Add user and kernel documentation for Landlock
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH bpf-next v9 07/10] landlock: Add ptrace restrictions
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH bpf-next v9 01/10] fs,security: Add a new file access type: MAY_CHROOT
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: Detecting the availability of VSYSCALL
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: Detecting the availability of VSYSCALL
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: Detecting the availability of VSYSCALL
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: Detecting the availability of VSYSCALL
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: Detecting the availability of VSYSCALL
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v5 16/16] f2fs: add fs-verity support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: Detecting the availability of VSYSCALL
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: Detecting the availability of VSYSCALL
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Detecting the availability of VSYSCALL
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH V34 28/29] efi: Restrict efivar_ssdt_load when the kernel is locked down
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH 1/1] Revert "rseq/selftests: arm: use udf instruction for RSEQ_SIG"
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH 05/25] vfs: Implement parameter value retrieval with fsinfo() [ver #14]
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH 04/25] vfs: Allow fsinfo() to be used to query an fs parameter description [ver #14]
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH 02/25] fsinfo: Add syscalls to other arches [ver #14]
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH 03/25] vfs: Allow fsinfo() to query what's in an fs_context [ver #14]
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [RFC PATCH 1/1] Revert "rseq/selftests: arm: use udf instruction for RSEQ_SIG"
- From: Will Deacon <will.deacon@xxxxxxx>
- Re: [PATCH 01/25] vfs: syscall: Add fsinfo() to query filesystem information [ver #14]
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH V34 00/29] Lockdown as an LSM
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v5 16/16] f2fs: add fs-verity support
- From: Chao Yu <yuchao0@xxxxxxxxxx>
- Re: [PATCH V34 00/29] Lockdown as an LSM
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH V31 07/25] kexec_file: Restrict at runtime if the kernel is locked down
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH V34 08/29] kexec_file: split KEXEC_VERIFY_SIG into KEXEC_SIG and KEXEC_SIG_FORCE
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH V31 07/25] kexec_file: Restrict at runtime if the kernel is locked down
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH V31 07/25] kexec_file: Restrict at runtime if the kernel is locked down
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V34 00/29] Lockdown as an LSM
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V34 00/29] Lockdown as an LSM
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH V34 00/29] Lockdown as an LSM
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH V34 23/29] bpf: Restrict bpf when kernel lockdown is in confidentiality mode
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V31 07/25] kexec_file: Restrict at runtime if the kernel is locked down
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH V34 23/29] bpf: Restrict bpf when kernel lockdown is in confidentiality mode
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- Re: [PATCH V31 07/25] kexec_file: Restrict at runtime if the kernel is locked down
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V34 23/29] bpf: Restrict bpf when kernel lockdown is in confidentiality mode
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V34 23/29] bpf: Restrict bpf when kernel lockdown is in confidentiality mode
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH V34 23/29] bpf: Restrict bpf when kernel lockdown is in confidentiality mode
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [RFC PATCH 1/1] Revert "rseq/selftests: arm: use udf instruction for RSEQ_SIG"
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [RFC PATCH 1/1] Revert "rseq/selftests: arm: use udf instruction for RSEQ_SIG"
- From: Will Deacon <will.deacon@xxxxxxx>
- Re: [PATCH V34 23/29] bpf: Restrict bpf when kernel lockdown is in confidentiality mode
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- [PATCH 25/25] fsinfo: ufs - add sb operation fsinfo() [ver #14]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 24/25] fsinfo: bpf - add sb operation fsinfo() [ver #14]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 23/25] fsinfo: debugfs - add sb operation fsinfo() [ver #14]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 22/25] fsinfo: pstore - add sb operation fsinfo() [ver #14]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 21/25] fsinfo: devpts - add sb operation fsinfo() [ver #14]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 20/25] fsinfo: shmem - add tmpfs sb operation fsinfo() [ver #14]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 19/25] fsinfo: autofs - add sb operation fsinfo() [ver #14]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 18/25] fsinfo: proc - add sb operation fsinfo() [ver #14]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 17/25] afs: Support fsinfo() [ver #14]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 16/25] fsinfo: Support Smack superblock parameter retrieval [ver #14]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 15/25] fsinfo: Support SELinux superblock parameter retrieval [ver #14]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 14/25] kernfs, cgroup: Add fsinfo support [ver #14]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 13/25] hugetlbfs: Add support for fsinfo() [ver #14]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 12/25] fsinfo: Add API documentation [ver #14]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 11/25] vfs: fsinfo sample: Mount listing program [ver #14]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 10/25] vfs: Allow mount information to be queried by fsinfo() [ver #14]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 07/25] vfs: Introduce a non-repeating system-unique superblock ID [ver #14]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 06/25] fsinfo: Implement retrieval of LSM parameters with fsinfo() [ver #14]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 09/25] vfs: Add mount notification count [ver #14]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 08/25] vfs: Allow fsinfo() to look up a mount object by ID [ver #14]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 05/25] vfs: Implement parameter value retrieval with fsinfo() [ver #14]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 04/25] vfs: Allow fsinfo() to be used to query an fs parameter description [ver #14]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 02/25] fsinfo: Add syscalls to other arches [ver #14]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 03/25] vfs: Allow fsinfo() to query what's in an fs_context [ver #14]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 01/25] vfs: syscall: Add fsinfo() to query filesystem information [ver #14]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 00/25] VFS: Introduce filesystem information query syscall [ver #14]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 1/2] CLONE_PIDFD: do not use the value pointed by parent_tidptr
- From: Christian Brauner <christian@xxxxxxxxxx>
- [bug report] read-ahead can't work properly
- From: "Weijie Yang" <weijieut@xxxxxxx>
- Re: [PATCH 1/2] CLONE_PIDFD: do not use the value pointed by parent_tidptr
- From: "Dmitry V. Levin" <ldv@xxxxxxxxxxxx>
- Re: [PATCH V34 10/29] hibernate: Disable when the kernel is locked down
- From: Jiri Kosina <jikos@xxxxxxxxxx>
- Re: [PATCH 1/2] CLONE_PIDFD: do not use the value pointed by parent_tidptr
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH 05/13] vfs: don't parse "silent" option
- From: Miklos Szeredi <mszeredi@xxxxxxxxxx>
- Re: [PATCH 05/13] vfs: don't parse "silent" option
- From: Miklos Szeredi <mszeredi@xxxxxxxxxx>
- Re: [PATCH 05/13] vfs: don't parse "silent" option
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] samples: make pidfd-metadata fail gracefully on older kernels
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH 2/2] samples: make pidfd-metadata fail gracefully on older kernels
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH 1/2] CLONE_PIDFD: do not use the value pointed by parent_tidptr
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH 05/13] vfs: don't parse "silent" option
- From: Miklos Szeredi <mszeredi@xxxxxxxxxx>
- Re: [PATCH V34 08/29] kexec_file: split KEXEC_VERIFY_SIG into KEXEC_SIG and KEXEC_SIG_FORCE
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH V31 07/25] kexec_file: Restrict at runtime if the kernel is locked down
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH] samples: make pidfd-metadata fail gracefully on older kernels
- From: "Dmitry V. Levin" <ldv@xxxxxxxxxxxx>
- Re: [PATCH V34 20/29] x86/mmiotrace: Lock down the testmmiotrace module
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- [PATCH 2/2] samples: make pidfd-metadata fail gracefully on older kernels
- From: "Dmitry V. Levin" <ldv@xxxxxxxxxxxx>
- [PATCH 1/2] CLONE_PIDFD: do not use the value pointed by parent_tidptr
- From: "Dmitry V. Levin" <ldv@xxxxxxxxxxxx>
- Re: [PATCHv4 26/28] x86/vdso: Align VDSO functions by CPU L1 cache line
- From: Andrei Vagin <avagin@xxxxxxxxx>
- Re: [PATCH V34 22/29] Lock down tracing and perf kprobes when in confidentiality mode
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- Re: [PATCH V34 29/29] lockdown: Print current->comm in restriction messages
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH V34 28/29] efi: Restrict efivar_ssdt_load when the kernel is locked down
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH V34 24/29] Lock down perf when in confidentiality mode
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH V34 23/29] bpf: Restrict bpf when kernel lockdown is in confidentiality mode
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH V34 22/29] Lock down tracing and perf kprobes when in confidentiality mode
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH V34 21/29] Lock down /proc/kcore
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH V34 20/29] x86/mmiotrace: Lock down the testmmiotrace module
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH V34 19/29] Lock down module params that specify hardware parameters (eg. ioport)
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH V34 18/29] Lock down TIOCSSERIAL
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH V34 17/29] Prohibit PCMCIA CIS storage when the kernel is locked down
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH V34 16/29] acpi: Disable ACPI table override if the kernel is locked down
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH V34 15/29] acpi: Ignore acpi_rsdp kernel param when the kernel has been locked down
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH V34 14/29] ACPI: Limit access to custom_method when the kernel is locked down
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH V34 12/29] x86: Lock down IO port access when the kernel is locked down
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH V34 11/29] PCI: Lock down BAR access when the kernel is locked down
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH V34 10/29] hibernate: Disable when the kernel is locked down
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH V34 09/29] kexec_file: Restrict at runtime if the kernel is locked down
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH V34 07/29] Copy secure_boot flag in boot params across kexec reboot
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH V34 06/29] kexec_load: Disable at runtime if the kernel is locked down
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH V34 05/29] Restrict /dev/{mem,kmem,port} when the kernel is locked down
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH V34 04/29] Enforce module signatures if the kernel is locked down
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH V34 03/29] security: Add a static lockdown policy LSM
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH V34 02/29] security: Add a "locked down" LSM hook
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH V34 01/29] security: Support early LSMs
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v5 16/16] f2fs: add fs-verity support
- From: Jaegeuk Kim <jaegeuk@xxxxxxxxxx>
- Re: [PATCH v5 12/16] fs-verity: add SHA-512 support
- From: Jaegeuk Kim <jaegeuk@xxxxxxxxxx>
- Re: [PATCH v5 11/16] fs-verity: implement FS_IOC_MEASURE_VERITY ioctl
- From: Jaegeuk Kim <jaegeuk@xxxxxxxxxx>
- Re: [PATCH v5 10/16] fs-verity: implement FS_IOC_ENABLE_VERITY ioctl
- From: Jaegeuk Kim <jaegeuk@xxxxxxxxxx>
- Re: [PATCH v5 09/16] fs-verity: add data verification hooks for ->readpages()
- From: Jaegeuk Kim <jaegeuk@xxxxxxxxxx>
- Re: [PATCH v5 08/16] fs-verity: add the hook for file ->setattr()
- From: Jaegeuk Kim <jaegeuk@xxxxxxxxxx>
- Re: [PATCH v5 07/16] fs-verity: add the hook for file ->open()
- From: Jaegeuk Kim <jaegeuk@xxxxxxxxxx>
- Re: [PATCH v5 06/16] fs-verity: add inode and superblock fields
- From: Jaegeuk Kim <jaegeuk@xxxxxxxxxx>
- Re: [PATCH v5 05/16] fs-verity: add Kconfig and the helper functions for hashing
- From: Jaegeuk Kim <jaegeuk@xxxxxxxxxx>
- Re: [PATCH v5 04/16] fs: uapi: define verity bit for FS_IOC_GETFLAGS
- From: Jaegeuk Kim <jaegeuk@xxxxxxxxxx>
- Re: [PATCH v5 03/16] fs-verity: add UAPI header
- From: Jaegeuk Kim <jaegeuk@xxxxxxxxxx>
- Re: [PATCH v5 02/16] fs-verity: add MAINTAINERS file entry
- From: Jaegeuk Kim <jaegeuk@xxxxxxxxxx>
- Re: [PATCH v5 01/16] fs-verity: add a documentation file
- From: Jaegeuk Kim <jaegeuk@xxxxxxxxxx>
- Re: [PATCH V34 10/29] hibernate: Disable when the kernel is locked down
- From: Pavel Machek <pavel@xxxxxx>
- [PATCH V34 06/29] kexec_load: Disable at runtime if the kernel is locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V34 09/29] kexec_file: Restrict at runtime if the kernel is locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V34 19/29] Lock down module params that specify hardware parameters (eg. ioport)
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V34 22/29] Lock down tracing and perf kprobes when in confidentiality mode
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V34 26/29] debugfs: Restrict debugfs when the kernel is locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V34 29/29] lockdown: Print current->comm in restriction messages
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V34 27/29] tracefs: Restrict tracefs when the kernel is locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V34 23/29] bpf: Restrict bpf when kernel lockdown is in confidentiality mode
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V34 20/29] x86/mmiotrace: Lock down the testmmiotrace module
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V34 18/29] Lock down TIOCSSERIAL
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V34 12/29] x86: Lock down IO port access when the kernel is locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V34 07/29] Copy secure_boot flag in boot params across kexec reboot
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V34 05/29] Restrict /dev/{mem,kmem,port} when the kernel is locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V34 04/29] Enforce module signatures if the kernel is locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V34 03/29] security: Add a static lockdown policy LSM
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V34 02/29] security: Add a "locked down" LSM hook
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V34 01/29] security: Support early LSMs
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V34 28/29] efi: Restrict efivar_ssdt_load when the kernel is locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V34 25/29] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V34 24/29] Lock down perf when in confidentiality mode
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V34 21/29] Lock down /proc/kcore
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V34 17/29] Prohibit PCMCIA CIS storage when the kernel is locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V34 16/29] acpi: Disable ACPI table override if the kernel is locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V34 15/29] acpi: Ignore acpi_rsdp kernel param when the kernel has been locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V34 14/29] ACPI: Limit access to custom_method when the kernel is locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V34 13/29] x86/msr: Restrict MSR access when the kernel is locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V34 11/29] PCI: Lock down BAR access when the kernel is locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V34 10/29] hibernate: Disable when the kernel is locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V34 08/29] kexec_file: split KEXEC_VERIFY_SIG into KEXEC_SIG and KEXEC_SIG_FORCE
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V34 00/29] Lockdown as an LSM
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: [PATCH V33 03/30] security: Add a static lockdown policy LSM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] samples: make pidfd-metadata fail gracefully on older kernels
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH V33 03/30] security: Add a static lockdown policy LSM
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V31 07/25] kexec_file: Restrict at runtime if the kernel is locked down
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V31 06/25] kexec_file: split KEXEC_VERIFY_SIG into KEXEC_SIG and KEXEC_SIG_FORCE
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V31 06/25] kexec_file: split KEXEC_VERIFY_SIG into KEXEC_SIG and KEXEC_SIG_FORCE
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V33 24/30] bpf: Restrict bpf when kernel lockdown is in confidentiality mode
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V33 03/30] security: Add a static lockdown policy LSM
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V33 02/30] security: Add a "locked down" LSM hook
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V33 01/30] security: Support early LSMs
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V33 01/30] security: Support early LSMs
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH] samples: make pidfd-metadata fail gracefully on older kernels
- From: "Dmitry V. Levin" <ldv@xxxxxxxxxxxx>
- Re: [PATCH v3 2/2] arch: wire-up clone3() syscall
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH 02/25] vfs: Allow fsinfo() to query what's in an fs_context [ver #13]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v3 2/2] arch: wire-up clone3() syscall
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 02/25] vfs: Allow fsinfo() to query what's in an fs_context [ver #13]
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH 02/25] vfs: Allow fsinfo() to query what's in an fs_context [ver #13]
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH 02/25] vfs: Allow fsinfo() to query what's in an fs_context [ver #13]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v3 2/2] arch: wire-up clone3() syscall
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH 02/25] vfs: Allow fsinfo() to query what's in an fs_context [ver #13]
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH v3 2/2] arch: wire-up clone3() syscall
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH V31 07/25] kexec_file: Restrict at runtime if the kernel is locked down
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH V31 06/25] kexec_file: split KEXEC_VERIFY_SIG into KEXEC_SIG and KEXEC_SIG_FORCE
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH V33 01/30] security: Support early LSMs
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH V33 24/30] bpf: Restrict bpf when kernel lockdown is in confidentiality mode
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH V33 27/30] lockdown: Print current->comm in restriction messages
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH V33 04/30] Enforce module signatures if the kernel is locked down
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH V33 03/30] security: Add a static lockdown policy LSM
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH V33 02/30] security: Add a "locked down" LSM hook
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH V33 01/30] security: Support early LSMs
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v5 14/16] ext4: add basic fs-verity support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH V33 02/30] security: Add a "locked down" LSM hook
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V33 07/30] Copy secure_boot flag in boot params across kexec reboot
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V33 08/30] kexec_file: split KEXEC_VERIFY_SIG into KEXEC_SIG and KEXEC_SIG_FORCE
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V33 10/30] hibernate: Disable when the kernel is locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V33 05/30] Restrict /dev/{mem,kmem,port} when the kernel is locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V33 01/30] security: Support early LSMs
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V33 13/30] x86: Lock down IO port access when the kernel is locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V33 14/30] x86/msr: Restrict MSR access when the kernel is locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V33 17/30] acpi: Disable ACPI table override if the kernel is locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V33 18/30] Prohibit PCMCIA CIS storage when the kernel is locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V33 19/30] Lock down TIOCSSERIAL
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V33 21/30] x86/mmiotrace: Lock down the testmmiotrace module
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V33 16/30] acpi: Ignore acpi_rsdp kernel param when the kernel has been locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V33 23/30] Lock down tracing and perf kprobes when in confidentiality mode
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V33 26/30] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V33 28/30] debugfs: Restrict debugfs when the kernel is locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V33 24/30] bpf: Restrict bpf when kernel lockdown is in confidentiality mode
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V33 29/30] tracefs: Restrict tracefs when the kernel is locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V33 30/30] efi: Restrict efivar_ssdt_load when the kernel is locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V33 27/30] lockdown: Print current->comm in restriction messages
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V33 25/30] Lock down perf when in confidentiality mode
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V33 22/30] Lock down /proc/kcore
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V33 20/30] Lock down module params that specify hardware parameters (eg. ioport)
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V33 15/30] ACPI: Limit access to custom_method when the kernel is locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V33 12/30] PCI: Lock down BAR access when the kernel is locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V33 11/30] uswsusp: Disable when the kernel is locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V33 09/30] kexec_file: Restrict at runtime if the kernel is locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V33 06/30] kexec_load: Disable at runtime if the kernel is locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V33 04/30] Enforce module signatures if the kernel is locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V33 03/30] security: Add a static lockdown policy LSM
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V33 00/30] Lockdown as an LSM
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: [PATCH v5 14/16] ext4: add basic fs-verity support
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- Re: [PATCH v3 2/2] arch: wire-up clone3() syscall
- From: Christian Brauner <christian@xxxxxxxxxx>
- [PATCH v5 03/16] fs-verity: add UAPI header
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v5 01/16] fs-verity: add a documentation file
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v5 02/16] fs-verity: add MAINTAINERS file entry
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v5 05/16] fs-verity: add Kconfig and the helper functions for hashing
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v5 09/16] fs-verity: add data verification hooks for ->readpages()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v5 07/16] fs-verity: add the hook for file ->open()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v5 08/16] fs-verity: add the hook for file ->setattr()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v5 06/16] fs-verity: add inode and superblock fields
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v5 13/16] fs-verity: support builtin file signatures
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v5 11/16] fs-verity: implement FS_IOC_MEASURE_VERITY ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v5 16/16] f2fs: add fs-verity support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v5 12/16] fs-verity: add SHA-512 support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v5 15/16] ext4: add fs-verity read support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v5 14/16] ext4: add basic fs-verity support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v5 10/16] fs-verity: implement FS_IOC_ENABLE_VERITY ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v5 04/16] fs: uapi: define verity bit for FS_IOC_GETFLAGS
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v5 00/16] fs-verity: read-only file-based authenticity protection
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v3 2/2] arch: wire-up clone3() syscall
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH v1 1/4] mm: introduce MADV_COLD
- From: Joel Fernandes <joel@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] samples: make pidfd-metadata fail gracefully on older kernels
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH] samples: make pidfd-metadata fail gracefully on older kernels
- From: "Dmitry V. Levin" <ldv@xxxxxxxxxxxx>
- Re: [PATCH v2 4/5] mm: introduce MADV_PAGEOUT
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [PATCH v2 4/5] mm: introduce MADV_PAGEOUT
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [PATCH v2 4/5] mm: introduce MADV_PAGEOUT
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [PATCH v2 1/5] mm: introduce MADV_COLD
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [PATCH v2 4/5] mm: introduce MADV_PAGEOUT
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [PATCH v2 1/5] mm: introduce MADV_COLD
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [PATCH v2 4/5] mm: introduce MADV_PAGEOUT
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [PATCH v1 1/4] mm: introduce MADV_COLD
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [PATCH 05/13] vfs: don't parse "silent" option
- From: Ian Kent <raven@xxxxxxxxxx>
- Re: [PATCH v2 4/5] mm: introduce MADV_PAGEOUT
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [PATCH v2 1/5] mm: introduce MADV_COLD
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [PATCH v2 0/5] Introduce MADV_COLD and MADV_PAGEOUT
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [PATCH v4 14/16] ext4: add basic fs-verity support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v1 1/4] mm: introduce MADV_COLD
- From: Joel Fernandes <joel@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/5] mm: introduce MADV_PAGEOUT
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [PATCH v2 2/5] mm: change PAGEREF_RECLAIM_CLEAN with PAGE_REFRECLAIM
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [PATCH v2 1/5] mm: introduce MADV_COLD
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- [PATCH v2 05/13] vfs: don't parse "silent" option
- From: Miklos Szeredi <mszeredi@xxxxxxxxxx>
- [PATCH 03/13] vfs: don't parse forbidden flags
- From: Miklos Szeredi <mszeredi@xxxxxxxxxx>
- [PATCH 04/13] vfs: don't parse "posixacl" option
- From: Miklos Szeredi <mszeredi@xxxxxxxxxx>
- [PATCH 07/13] proc: don't ignore options
- From: Miklos Szeredi <mszeredi@xxxxxxxxxx>
- [PATCH 05/13] vfs: don't parse "silent" option
- From: Miklos Szeredi <mszeredi@xxxxxxxxxx>
- [PATCH 08/13] sysfs: don't ignore options
- From: Miklos Szeredi <mszeredi@xxxxxxxxxx>
- [PATCH 10/13] cpuset: don't ignore options
- From: Miklos Szeredi <mszeredi@xxxxxxxxxx>
- [PATCH 11/13] cgroup: don't ignore options
- From: Miklos Szeredi <mszeredi@xxxxxxxxxx>
- [PATCH 13/13] resctrl: don't ignore options
- From: Miklos Szeredi <mszeredi@xxxxxxxxxx>
- [PATCH 12/13] fusectl: don't ignore options
- From: Miklos Szeredi <mszeredi@xxxxxxxxxx>
- [PATCH 09/13] mqueue: don't ignore options
- From: Miklos Szeredi <mszeredi@xxxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Linux SCSI]
[Samba]
[Yosemite News]