Toggle navigation
Patchwork
Linux FS Development
Patches
Bundles
About this project
Login
Register
Mail settings
Show patches with
: Submitter =
Eric W. Biederman
| State =
Action Required
| 420 patches
Series
Submitter
State
any
Action Required
New
Under Review
Accepted
Rejected
RFC
Not Applicable
Changes Requested
Awaiting Upstream
Superseded
Deferred
Mainlined
Queued
Needs ACK
Handled Elsewhere
In Next
Search
Archived
No
Yes
Both
Delegate
------
Nobody
holtmann
holtmann
holtmann
agk
mchehab
mchehab
gregkh
gregkh
mtosatti
lethal
lethal
avi
cvaroqui
jbrassow
mikulas
dtor
bmarzins
tmlind
jmberg
jmberg
mcgrof
mcgrof
mcgrof
lenb
lenb
kyle
felipebalbi
varenet
helge
helge
khilman
khilman
khilman
khilman
jwoithe
mlin
Zhang Rui
Zhang Rui
iksaif
cjackiewicz
hmh
jbarnes
jbarnes
jbarnes
willy
snitzer
iwamatsu
dougsland
mjg59
rafael
rafael
rafael
ericvh@gmail.com
ykzhao
venkip
sandeen
pwsan
lucho@ionkov.net
rminnich
anholt
aystarik
roland
shefty
mason
glikely
krh
djbw
djbw
djbw
cmarinas
doyu
jrn
sage
tomba
mmarek
cjb
trondmy
jikos
bcousson
jic23
olof
olof
olof
nsekhar
weiny2
horms
horms
bwidawsk
bwidawsk
shemminger
eulfhan
josef
josef
josef
dianders
jpan9
hal
kdave
bleung
evalenti
jlbec
wsa
bhelgaas
vkoul
vkoul
szlin
davejiang
markgross
tagr
tiwai
vireshk
mmind
dledford
geert
geert
herbert
herbert
kvalo
kvalo
kvalo
bentiss
arend
rzwisler
stellarhopper
stellarhopper
jejb
matthias_bgg
dvhart
axboe
axboe
pcmoore
pcmoore
pcmoore
mkp
mkp
stefan_schmidt
leon
lucvoo
jsakkine
jsakkine
jsakkine
bamse
bamse
demarchi
krzk
groeck
groeck
sboyd
sboyd
mturquette
mturquette
0andriy
carlocaione
luca
dgc
kbingham
derosier
narmstrong
narmstrong
atull
tytso
tytso
djwong
bvanassche
omos
jpirko
jpirko
GustavoARSilva
pkshih
patersonc
brauner
shuahkh
shuahkh
shuahkh
palmer
palmer
jgg
Kishon
idosch
labbott
jsimmons
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
broonie
broonie
broonie
mricon
mricon
mricon
kees
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
arnd
linusw
perfinion
bbrezillon
bachradsusi
rostedt
rostedt
kholk
nbd
ebiggers
ebiggers
pavelm
sds
m0reeze
ganis
jwcart2
matttbe
andmur01
lorpie01
chanwoochoi
dlezcano
jhedberg
vudentz
robertfoss
bgix
tedd_an
tsbogend
wens
wcrobert
robher
kstewart
kwilczynski
hansg
bpf
netdev
dsa
ethtool
netdrv
martineau
abelloni
trix
pabeni
mani_sadhasivam
mlimonci
liusong6
mjp
tohojo
pmalani
prestwoj
prestwoj
dhowells
tzungbi
conchuod
paulmck
jes
mtkaczyk
colyli
cem
pateldipen1984
iweiny
iweiny
bjorn
mhiramat
JanKiszka
jaegeuk
mraynal
aring
konradybcio
ij
Hailan
jstitt007
denkenz
denkenz
mkorenbl
jjohnson
frank_li
geliang
mdraidci
mdraidci
peluse
joelgranados
Apply
«
1
2
3
4
…
4
5
»
Patch
Series
A/R/T
S/W/F
Date
Submitter
Delegate
State
[14/14] umd: Remove exit_umh
Make the user mode driver code a better citizen
- - -
-
-
-
2020-06-26
Eric W. Biederman
New
[13/14] bpfilter: Take advantage of the facilities of struct pid
Make the user mode driver code a better citizen
- - -
-
-
-
2020-06-26
Eric W. Biederman
New
[12/14] umd: Track user space drivers with struct pid
Make the user mode driver code a better citizen
- - -
-
-
-
2020-06-26
Eric W. Biederman
New
[11/14] bpfilter: Move bpfilter_umh back into init data
Make the user mode driver code a better citizen
- - -
-
-
-
2020-06-26
Eric W. Biederman
New
[10/14] exec: Remove do_execve_file
Make the user mode driver code a better citizen
- - -
-
-
-
2020-06-26
Eric W. Biederman
New
[09/14] umh: Stop calling do_execve_file
Make the user mode driver code a better citizen
- - -
-
-
-
2020-06-26
Eric W. Biederman
New
[08/14] umd: Transform fork_usermode_blob into fork_usermode_driver
Make the user mode driver code a better citizen
- - -
-
-
-
2020-06-26
Eric W. Biederman
New
[07/14] umd: Rename umd_info.cmdline umd_info.driver_name
Make the user mode driver code a better citizen
- - -
-
-
-
2020-06-26
Eric W. Biederman
New
[06/14] umd: For clarity rename umh_info umd_info
Make the user mode driver code a better citizen
- - -
-
-
-
2020-06-26
Eric W. Biederman
New
[05/14] umh: Separate the user mode driver and the user mode helper support
Make the user mode driver code a better citizen
- - -
-
-
-
2020-06-26
Eric W. Biederman
New
[04/14] umh: Remove call_usermodehelper_setup_file.
Make the user mode driver code a better citizen
- - -
-
-
-
2020-06-26
Eric W. Biederman
New
[03/14] umh: Rename the user mode driver helpers for clarity
Make the user mode driver code a better citizen
- - -
-
-
-
2020-06-26
Eric W. Biederman
New
[02/14] umh: Move setting PF_UMH into umh_pipe_setup
Make the user mode driver code a better citizen
- - -
-
-
-
2020-06-26
Eric W. Biederman
New
[01/14] umh: Capture the pid in umh_pipe_setup
Make the user mode driver code a better citizen
- - -
-
-
-
2020-06-26
Eric W. Biederman
New
[v2,6/6] exec: Rename group_exit_task group_exec_task and correct the Documentation
exec: s/group_exit_task/group_exec_task/ for clarity
- - -
-
-
-
2020-06-23
Eric W. Biederman
New
[v2,5/6] coredump: Stop using group_exit_task
exec: s/group_exit_task/group_exec_task/ for clarity
- - -
-
-
-
2020-06-23
Eric W. Biederman
New
[v2,4/6] signal: In signal_group_exit remove the group_exit_task test
exec: s/group_exit_task/group_exec_task/ for clarity
- - -
-
-
-
2020-06-23
Eric W. Biederman
New
[v2,3/6] signal: Implement SIGNAL_GROUP_DETHREAD
exec: s/group_exit_task/group_exec_task/ for clarity
- - -
-
-
-
2020-06-23
Eric W. Biederman
New
[v2,2/6] exec: Lock more defensively in exec
exec: s/group_exit_task/group_exec_task/ for clarity
- - -
-
-
-
2020-06-23
Eric W. Biederman
New
[v2,1/6] signal: Pretty up the SIGNAL_GROUP_FLAGS
exec: s/group_exit_task/group_exec_task/ for clarity
- - -
-
-
-
2020-06-23
Eric W. Biederman
New
[2/2] exec: Rename group_exit_task group_exec_task and correct the Documentation
exec: s/group_exit_task/group_exec_task/ for clarity
- - -
-
-
-
2020-06-19
Eric W. Biederman
New
[1/2] exec: Don't set group_exit_task during a coredump
exec: s/group_exit_task/group_exec_task/ for clarity
- - -
-
-
-
2020-06-19
Eric W. Biederman
New
proc: Avoid a thundering herd of threads freeing proc dentries
proc: Avoid a thundering herd of threads freeing proc dentries
- - -
-
-
-
2020-06-19
Eric W. Biederman
New
proc: Use new_inode not new_inode_pseudo
proc: Use new_inode not new_inode_pseudo
- 1 -
-
-
-
2020-06-12
Eric W. Biederman
New
[RFC] net/bpfilter: Remove this broken and apparently unmantained
[RFC] net/bpfilter: Remove this broken and apparently unmantained
- - -
-
-
-
2020-06-06
Eric W. Biederman
New
[2/2] exec: Compute file based creds only once
exec: Remove the computation of bprm->cred
- 1 -
-
-
-
2020-05-29
Eric W. Biederman
New
[1/2] exec: Add a per bprm->file version of per_clear
exec: Remove the computation of bprm->cred
- 1 -
-
-
-
2020-05-29
Eric W. Biederman
New
[11/11] exec: Remove the label after_setid from bprm_fill_uid
Untitled series #295063
- - -
-
-
-
2020-05-28
Eric W. Biederman
New
[10/11] exec: In bprm_fill_uid set secureexec at same time as per_clear
Untitled series #295063
- - -
-
-
-
2020-05-28
Eric W. Biederman
New
[09/11] exec: In bprm_fill_uid only set per_clear when honoring suid or sgid
Untitled series #295063
- - -
-
-
-
2020-05-28
Eric W. Biederman
New
[08/11] exec: In bprm_fill_uid remove unnecessary no new privs check
Untitled series #295063
- - -
-
-
-
2020-05-28
Eric W. Biederman
New
[07/11] exec: Set saved, fs, and effective ids together in bprm_fill_uid
Untitled series #295063
- - -
-
-
-
2020-05-28
Eric W. Biederman
New
[06/11] exec: Don't set secureexec when the uid or gid changes are abandoned
Untitled series #295063
- - -
-
-
-
2020-05-28
Eric W. Biederman
New
[05/11] exec: In bprm_fill_uid use CAP_SETGID to see if a gid change is safe
Untitled series #295063
- - -
-
-
-
2020-05-28
Eric W. Biederman
New
[04/11] exec: Move uid/gid handling from creds_from_file into bprm_fill_uid
Untitled series #295063
- - -
-
-
-
2020-05-28
Eric W. Biederman
New
[04/11] exec: Move uid/gid handling from creds_from_file into bprm_fill_uid
exec: cred calculation simplifications
- - -
-
-
-
2020-05-28
Eric W. Biederman
New
[03/11] exec: Compute file based creds only once
exec: cred calculation simplifications
- - -
-
-
-
2020-05-28
Eric W. Biederman
New
[02/11] exec: Introduce active_per_clear the per file version of per_clear
exec: cred calculation simplifications
- - -
-
-
-
2020-05-28
Eric W. Biederman
New
[01/11] exec: Reduce bprm->per_clear to a single bit
exec: cred calculation simplifications
- - -
-
-
-
2020-05-28
Eric W. Biederman
New
[v2,8/8] exec: Remove recursion from search_binary_handler
exec: Control flow simplifications
- 1 -
-
-
-
2020-05-19
Eric W. Biederman
New
[v2,7/8] exec: Generic execfd support
exec: Control flow simplifications
- 1 -
-
-
-
2020-05-19
Eric W. Biederman
New
[v2,6/8] exec/binfmt_script: Don't modify bprm->buf and then return -ENOEXEC
exec: Control flow simplifications
- 1 -
-
-
-
2020-05-19
Eric W. Biederman
New
[v2,5/8] exec: Move the call of prepare_binprm into search_binary_handler
exec: Control flow simplifications
- 2 -
-
-
-
2020-05-19
Eric W. Biederman
New
[v2,4/8] exec: Allow load_misc_binary to call prepare_binfmt unconditionally
exec: Control flow simplifications
- 1 -
-
-
-
2020-05-19
Eric W. Biederman
New
[v2,3/8] exec: Convert security_bprm_set_creds into security_bprm_repopulate_creds
exec: Control flow simplifications
- 1 -
-
-
-
2020-05-19
Eric W. Biederman
New
[v2,2/8] exec: Factor security_bprm_creds_for_exec out of security_bprm_set_creds
exec: Control flow simplifications
1 1 -
-
-
-
2020-05-19
Eric W. Biederman
New
[v2,1/8] exec: Teach prepare_exec_creds how exec treats uids & gids
exec: Control flow simplifications
- 1 -
-
-
-
2020-05-19
Eric W. Biederman
New
[5/5] exec: Move the call of prepare_binprm into search_binary_handler
exec: Control flow simplifications
- 1 -
-
-
-
2020-05-09
Eric W. Biederman
New
[4/5] exec: Allow load_misc_binary to call prepare_binfmt unconditionally
exec: Control flow simplifications
- - -
-
-
-
2020-05-09
Eric W. Biederman
New
[3/5] exec: Remove recursion from search_binary_handler
exec: Control flow simplifications
- - -
-
-
-
2020-05-09
Eric W. Biederman
New
[2/5] exec: Directly call security_bprm_set_creds from __do_execve_file
exec: Control flow simplifications
- - -
-
-
-
2020-05-09
Eric W. Biederman
New
[1/5] exec: Call cap_bprm_set_creds directly from prepare_binprm
exec: Control flow simplifications
- - -
-
-
-
2020-05-09
Eric W. Biederman
New
[6/6] exec: Set the point of no return sooner
exec: Trivial cleanups for exec
- 1 -
-
-
-
2020-05-08
Eric W. Biederman
New
[5/6] exec: Move handling of the point of no return to the top level
exec: Trivial cleanups for exec
- 1 -
-
-
-
2020-05-08
Eric W. Biederman
New
[4/6] exec: Run sync_mm_rss before taking exec_update_mutex
exec: Trivial cleanups for exec
- 1 -
-
-
-
2020-05-08
Eric W. Biederman
New
[3/6] exec: Stop open coding mutex_lock_killable of cred_guard_mutex
exec: Trivial cleanups for exec
- 1 -
-
-
-
2020-05-08
Eric W. Biederman
New
[2/6] exec: Fix spelling of search_binary_handler in a comment
exec: Trivial cleanups for exec
- 1 -
-
-
-
2020-05-08
Eric W. Biederman
New
[1/6] exec: Move the comment from above de_thread to above unshare_sighand
exec: Trivial cleanups for exec
- 1 -
-
-
-
2020-05-08
Eric W. Biederman
New
[7/7] exec: Rename flush_old_exec begin_new_exec
[1/7] binfmt: Move install_exec_creds after setup_new_exec to match binfmt_elf
- 1 -
-
-
-
2020-05-05
Eric W. Biederman
New
[6/7] exec: Move most of setup_new_exec into flush_old_exec
[1/7] binfmt: Move install_exec_creds after setup_new_exec to match binfmt_elf
1 1 -
-
-
-
2020-05-05
Eric W. Biederman
New
[5/7] exec: In setup_new_exec cache current in the local variable me
[1/7] binfmt: Move install_exec_creds after setup_new_exec to match binfmt_elf
- 1 -
-
-
-
2020-05-05
Eric W. Biederman
New
[4/7] exec: Merge install_exec_creds into setup_new_exec
[1/7] binfmt: Move install_exec_creds after setup_new_exec to match binfmt_elf
- 1 -
-
-
-
2020-05-05
Eric W. Biederman
New
[3/7] exec: Rename the flag called_exec_mmap point_of_no_return
[1/7] binfmt: Move install_exec_creds after setup_new_exec to match binfmt_elf
- 1 -
-
-
-
2020-05-05
Eric W. Biederman
New
[2/7] exec: Make unlocking exec_update_mutex explict
[1/7] binfmt: Move install_exec_creds after setup_new_exec to match binfmt_elf
- 1 -
-
-
-
2020-05-05
Eric W. Biederman
New
[1/7] binfmt: Move install_exec_creds after setup_new_exec to match binfmt_elf
[1/7] binfmt: Move install_exec_creds after setup_new_exec to match binfmt_elf
- 1 -
-
-
-
2020-05-05
Eric W. Biederman
New
[v4,2/2] proc: Ensure we see the exit of each process tid exactly once
proc: Ensure we see the exit of each process tid exactly
- - -
-
-
-
2020-04-28
Eric W. Biederman
New
[v4,1/2] rculist: Add hlists_swap_heads_rcu
proc: Ensure we see the exit of each process tid exactly
- - -
-
-
-
2020-04-28
Eric W. Biederman
New
proc: Put thread_pid in release_task not proc_flush_pid
proc: Put thread_pid in release_task not proc_flush_pid
- - -
-
-
-
2020-04-24
Eric W. Biederman
New
[v2,2/2] proc: Ensure we see the exit of each process tid exactly
[v2,1/2] proc: Use PIDTYPE_TGID in next_tgid
- - -
-
-
-
2020-04-23
Eric W. Biederman
New
[v2,1/2] proc: Use PIDTYPE_TGID in next_tgid
[v2,1/2] proc: Use PIDTYPE_TGID in next_tgid
1 - -
-
-
-
2020-04-23
Eric W. Biederman
New
[2/2] signal: Remove the set_fs in binfmt_elf.c:fill_siginfo_note
[1/2] signal: Factor copy_siginfo_to_external32 from copy_siginfo_to_user32
- - -
-
-
-
2020-04-17
Eric W. Biederman
New
[1/2] signal: Factor copy_siginfo_to_external32 from copy_siginfo_to_user32
[1/2] signal: Factor copy_siginfo_to_external32 from copy_siginfo_to_user32
- - -
-
-
-
2020-04-17
Eric W. Biederman
New
proc: Handle umounts cleanly
proc: Handle umounts cleanly
1 - -
-
-
-
2020-04-15
Eric W. Biederman
New
proc: Use a dedicated lock in struct pid
proc: Use a dedicated lock in struct pid
1 - -
-
-
-
2020-04-08
Eric W. Biederman
New
pidfd: Stop taking cred_guard_mutex
pidfd: Stop taking cred_guard_mutex
1 - -
-
-
-
2020-03-10
Eric W. Biederman
New
[v2,5/5] exec: Add a exec_update_mutex to replace cred_guard_mutex
Infrastructure to allow fixing exec deadlocks
- 3 -
-
-
-
2020-03-08
Eric W. Biederman
New
[v2,4/5] exec: Move exec_mmap right after de_thread in flush_old_exec
Infrastructure to allow fixing exec deadlocks
- 1 -
-
-
-
2020-03-08
Eric W. Biederman
New
[v2,3/5] exec: Move cleanup of posix timers on exec out of de_thread
Infrastructure to allow fixing exec deadlocks
1 2 -
-
-
-
2020-03-08
Eric W. Biederman
New
[v2,2/5] exec: Factor unshare_sighand out of de_thread and call it separately
Infrastructure to allow fixing exec deadlocks
1 2 -
-
-
-
2020-03-08
Eric W. Biederman
New
[v2,1/5] exec: Only compute current once in flush_old_exec
Infrastructure to allow fixing exec deadlocks
1 2 -
-
-
-
2020-03-08
Eric W. Biederman
New
[2/2] exec: Add a exec_update_mutex to replace cred_guard_mutex
Infrastructure to allow fixing exec deadlocks
- - -
-
-
-
2020-03-05
Eric W. Biederman
New
[1/2] exec: Properly mark the point of no return
Infrastructure to allow fixing exec deadlocks
- - -
-
-
-
2020-03-05
Eric W. Biederman
New
[4/3] pid: Improve the comment about waiting in zap_pid_ns_processes
proc: Actually honor the mount options
1 - -
-
-
-
2020-02-28
Eric W. Biederman
New
[3/3] proc: Remove the now unnecessary internal mount of proc
proc: Actually honor the mount options
- - -
-
-
-
2020-02-28
Eric W. Biederman
New
[2/3] uml: Create a private mount of proc for mconsole
proc: Actually honor the mount options
- - -
-
-
-
2020-02-28
Eric W. Biederman
New
[1/3] uml: Don't consult current to find the proc_mnt in mconsole_proc
proc: Actually honor the mount options
- - -
-
-
-
2020-02-28
Eric W. Biederman
New
[v2,6/6] proc: Use a list of inodes to flush from proc
proc: Dentry flushing without proc_mnt
- - -
-
-
-
2020-02-24
Eric W. Biederman
New
[v2,5/6] proc: Clear the pieces of proc_inode that proc_evict_inode cares about
proc: Dentry flushing without proc_mnt
- - -
-
-
-
2020-02-24
Eric W. Biederman
New
[v2,4/6] proc: Use d_invalidate in proc_prune_siblings_dcache
proc: Dentry flushing without proc_mnt
- - -
-
-
-
2020-02-24
Eric W. Biederman
New
[v2,3/6] proc: In proc_prune_siblings_dcache cache an aquired super block
proc: Dentry flushing without proc_mnt
- - -
-
-
-
2020-02-24
Eric W. Biederman
New
[v2,2/6] proc: Generalize proc_sys_prune_dcache into proc_prune_siblings_dcache
proc: Dentry flushing without proc_mnt
- - -
-
-
-
2020-02-24
Eric W. Biederman
New
[v2,1/6] proc: Rename in proc_inode rename sysctl_inodes sibling_inodes
proc: Dentry flushing without proc_mnt
- - -
-
-
-
2020-02-24
Eric W. Biederman
New
[7/7] proc: Ensure we see the exit of each process tid exactly once
proc: Dentry flushing without proc_mnt
- - -
-
-
-
2020-02-20
Eric W. Biederman
New
[6/7] proc: Use a list of inodes to flush from proc
proc: Dentry flushing without proc_mnt
- - -
-
-
-
2020-02-20
Eric W. Biederman
New
[5/7] proc: Clear the pieces of proc_inode that proc_evict_inode cares about
proc: Dentry flushing without proc_mnt
- - -
-
-
-
2020-02-20
Eric W. Biederman
New
[4/7] proc: Use d_invalidate in proc_prune_siblings_dcache
proc: Dentry flushing without proc_mnt
- - -
-
-
-
2020-02-20
Eric W. Biederman
New
[3/7] proc: Mov rcu_read_(lock|unlock) in proc_prune_siblings_dcache
proc: Dentry flushing without proc_mnt
- - -
-
-
-
2020-02-20
Eric W. Biederman
New
[2/7] proc: Generalize proc_sys_prune_dcache into proc_prune_siblings_dcache
proc: Dentry flushing without proc_mnt
- - -
-
-
-
2020-02-20
Eric W. Biederman
New
[1/7] proc: Rename in proc_inode rename sysctl_inodes sibling_inodes
proc: Dentry flushing without proc_mnt
- - -
-
-
-
2020-02-20
Eric W. Biederman
New
[RFC,5/5] signal: Remove the unnecessary restore_sigmask flag
: Removing saved_sigmask
- - -
-
-
-
2019-06-07
Eric W. Biederman
New
«
1
2
3
4
…
4
5
»