messages from 2014-06-23 19:44:29 to 2014-06-30 10:28:16 UTC [more...]
[RFC PATCH 00/11] Adding FreeBSD's Capsicum security framework (part 1)
2014-06-30 10:28 UTC (17+ messages)
` [PATCH 01/11] fs: add O_BENEATH_ONLY flag to openat(2)
` [PATCH 02/11] selftests: Add test of O_BENEATH_ONLY & openat(2)
` [PATCH 03/11] capsicum: rights values and structure definitions
` [PATCH 04/11] capsicum: implement fgetr() and friends
` [PATCH 05/11] capsicum: convert callers to use fgetr() etc
` [PATCH 06/11] capsicum: implement sockfd_lookupr()
` [PATCH 07/11] capsicum: convert callers to use sockfd_lookupr() etc
` [PATCH 08/11] capsicum: add new LSM hooks on FD/file conversion
` [PATCH 09/11] capsicum: implementations of new LSM hooks
` [PATCH 10/11] capsicum: invocation "
` [PATCH 11/11] capsicum: add syscalls to limit FD rights
` [PATCH 1/5] man-pages: open.2: describe O_BENEATH_ONLY flag
` [PATCH 2/5] man-pages: capsicum.7: describe Capsicum capability framework
` [PATCH 3/5] man-pages: rights.7: Describe Capsicum primary rights
` [PATCH 4/5] man-pages: cap_rights_limit.2: limit FD rights for Capsicum
` [PATCH 5/5] man-pages: cap_rights_get: retrieve Capsicum fd rights
[PATCH RFC net-next 00/14] BPF syscall, maps, verifier, samples
2014-06-30 10:06 UTC (38+ messages)
` [PATCH RFC net-next 01/14] net: filter: split filter.c into two files
` [PATCH RFC net-next 02/14] net: filter: split filter.h and expose eBPF to user space
` [PATCH RFC net-next 03/14] bpf: introduce syscall(BPF, ...) and BPF maps
` [PATCH RFC net-next 04/14] bpf: update MAINTAINERS entry
` [PATCH RFC net-next 05/14] bpf: add lookup/update/delete/iterate methods to BPF maps
` [PATCH RFC net-next 06/14] bpf: add hashtable type of "
` [PATCH RFC net-next 07/14] bpf: expand BPF syscall with program load/unload
` [PATCH RFC net-next 08/14] bpf: add eBPF verifier
` [PATCH RFC net-next 09/14] bpf: allow eBPF programs to use maps
` [PATCH RFC net-next 10/14] net: sock: allow eBPF programs to be attached to sockets
` [PATCH RFC net-next 11/14] tracing: allow eBPF programs to be attached to events
` [PATCH RFC net-next 12/14] samples: bpf: add mini eBPF library to manipulate maps and programs
` [PATCH RFC net-next 13/14] samples: bpf: example of stateful socket filtering
` [PATCH RFC net-next 14/14] samples: bpf: example of tracing filters with eBPF
[PATCH v3 0/2] block: virtio-blk: support multi vq per virtio-blk
2014-06-29 16:32 UTC (6+ messages)
` [PATCH v3 1/2] include/uapi/linux/virtio_blk.h: introduce feature of VIRTIO_BLK_F_MQ
` [PATCH v3 2/2] block: virtio-blk: support multi virt queues per virtio-blk device
Does it make sense to define a constant for openat and such that is guaranteed not to be used for special purposes later on?
2014-06-28 19:16 UTC
[PATCH v9 0/11] seccomp: add thread sync ability
2014-06-27 23:23 UTC (12+ messages)
` [PATCH v9 01/11] seccomp: create internal mode-setting function
` [PATCH v9 02/11] seccomp: extract check/assign mode helpers
` [PATCH v9 03/11] seccomp: split mode setting routines
` [PATCH v9 04/11] seccomp: add "seccomp" syscall
` [PATCH v9 05/11] ARM: add seccomp syscall
` [PATCH v9 06/11] MIPS: "
` [PATCH v9 07/11] sched: move no_new_privs into new atomic flags
` [PATCH v9 08/11] seccomp: split filter prep from check and apply
` [PATCH v9 09/11] seccomp: introduce writer locking
` [PATCH v9 10/11] seccomp: allow mode setting across threads
` [PATCH v9 11/11] seccomp: implement SECCOMP_FILTER_FLAG_TSYNC
[PATCH v8 0/9] seccomp: add thread sync ability
2014-06-27 20:56 UTC (53+ messages)
` [PATCH v8 1/9] seccomp: create internal mode-setting function
` [PATCH v8 2/9] seccomp: split filter prep from check and apply
` [PATCH v8 3/9] seccomp: introduce writer locking
` [PATCH v8 4/9] sched: move no_new_privs into new atomic flags
` [PATCH v8 5/9] seccomp: split mode set routines
` [PATCH v8 6/9] seccomp: add "seccomp" syscall
` [PATCH v8 7/9] ARM: add seccomp syscall
` [PATCH v8 8/9] MIPS: "
` [PATCH v8 9/9] seccomp: implement SECCOMP_FILTER_FLAG_TSYNC
` [PATCH v8 1/1] man-pages: seccomp.2: document syscall
[PATCH v7 0/9] seccomp: add thread sync ability
2014-06-27 18:45 UTC (36+ messages)
` [PATCH v7 1/9] seccomp: create internal mode-setting function
` [PATCH v7 2/9] seccomp: split filter prep from check and apply
` [PATCH v7 3/9] seccomp: introduce writer locking
` [PATCH v7 4/9] seccomp: move no_new_privs into seccomp
` [PATCH v7 5/9] seccomp: split mode set routines
` [PATCH v7 6/9] seccomp: add "seccomp" syscall
` [PATCH v7 7/9] seccomp: implement SECCOMP_FILTER_FLAG_TSYNC
` [PATCH v7 8/9] ARM: add seccomp syscall
` [PATCH v7 9/9] MIPS: "
` [PATCH v7 1/1] man-pages: seccomp.2: document syscall
` [PATCH v7.1 "
[PATCH v2 1/4] drm/tegra: Implement more tiling modes
2014-06-27 18:04 UTC (8+ messages)
` [PATCH v2 2/4] drm/tegra: Add SET/GET_TILING IOCTLs
` [PATCH v2 3/4] drm/tegra: Add SET/GET_FLAGS IOCTLs
` [PATCH v2 4/4] drm/tegra: Allow non-authenticated processes to create buffer objects
[PATCH 08/15] kexec: New syscall kexec_file_load() declaration
2014-06-27 12:20 UTC (5+ messages)
[PATCH v2] mm: export NR_SHMEM via sysinfo(2) / si_meminfo() interfaces
2014-06-26 20:06 UTC (2+ messages)
[PATCH v2] ns: introduce getnspid syscall
2014-06-26 10:19 UTC (7+ messages)
[PATCH v2 0/2] block: virtio-blk: support multi vq per virtio-blk
2014-06-26 8:23 UTC (8+ messages)
` [PATCH v2 1/2] include/uapi/linux/virtio_blk.h: introduce feature of VIRTIO_BLK_F_MQ
` [PATCH v2 2/2] block: virtio-blk: support multi virt queues per virtio-blk device
[PATCH] mm: update the description for madvise_remove
2014-06-25 22:30 UTC (3+ messages)
hello
2014-06-25 12:12 UTC
[patch 0/4] timerfd c/r support, v4
2014-06-24 22:03 UTC (6+ messages)
` [patch 1/4] timerfd: Implement show_fdinfo method
` [patch 3/4] timerfd: Implement timerfd_ioctl method to restore timerfd_ctx::ticks
[PATCH] Documentation: sysfs-bus-usb: update power/persist description
2014-06-24 17:17 UTC (4+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).