linux-api.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2016-07-06 13:54:46 to 2016-07-21 21:14:17 UTC [more...]

[RFC PATCH v7 0/7] Restartable sequences system call
 2016-07-21 21:14 UTC  (3+ messages)
  ` [RFC PATCH v7 1/7] "
` [RFC PATCH v7 2/7] tracing: instrument restartable sequences

[PATCH 0/5 RFC] Add an interface to discover relationships between namespaces
 2016-07-21 21:06 UTC  (18+ messages)
` [PATCH 1/5] namespaces: move user_ns into ns_common
` [PATCH 3/5] nsfs: add ioctl to get an owning user namespace for ns file descriptor
  ` [PATCH 2/5] kernel: add a helper to get an owning user namespace for a namespace
  ` [PATCH 4/5] nsfs: add ioctl to get a parent namespace
  ` [PATCH 5/5] tools/testing: add a test to check nsfs ioctl-s

[PATCH 01/10] sysctl: Stop implicitly passing current into sysctl_table_root.lookup
 2016-07-21 16:40 UTC  (12+ messages)
  ` [PATCH v2 00/10] userns: sysctl limits for namespaces
      ` [PATCH v2 01/10] sysctl: Stop implicitly passing current into sysctl_table_root.lookup
        ` [PATCH v2 04/10] userns: Generalize the user namespace count into ucount
        ` [PATCH v2 06/10] utsns: Add a limit on the number of uts namespaces
          ` [PATCH v2 02/10] userns: Add per user namespace sysctls
          ` [PATCH v2 03/10] userns: Add a limit on the number of user namespaces
          ` [PATCH v2 05/10] pidns: Add a limit on the number of pid namespaces
          ` [PATCH v2 07/10] ipcns: Add a limit on the number of ipc namespaces
          ` [PATCH v2 08/10] cgroupns: Add a limit on the number of cgroup namespaces
          ` [PATCH v2 09/10] netns: Add a limit on the number of net namespaces
        ` [PATCH v2 10/10] mntns: Add a limit on the number of mount namespaces

[PATCH v13 00/12] support "task_isolation" mode
 2016-07-21 14:06 UTC  (10+ messages)
` [PATCH v13 04/12] task_isolation: add initial support
` [PATCH v13 12/12] task_isolation: add user-settable notification signal

[PATCH 0/3 v3] fs: allow to use dirfd as root for openat and other *at syscalls
 2016-07-20 20:42 UTC  (4+ messages)
  ` [PATCH 1/3 v2] namei: add LOOKUP_DFD_ROOT to use dfd as root
  ` [PATCH 2/3 v2] fs: allow to use dirfd as root for openat and other *at syscalls
  ` [PATCH 3/3] selftests: check O_ATROOT and AT_FDROOT flags

[PATCH 3/3] f2fs: support clone_file_range
 2016-07-19  4:48 UTC  (2+ messages)

[PATCH 0/9] [REVIEW-REQUEST] [v4] System Calls for Memory Protection Keys
 2016-07-18 20:12 UTC  (45+ messages)
` [PATCH 1/9] x86, pkeys: add fault handling for PF_PK page fault bit
` [PATCH 2/9] mm: implement new pkey_mprotect() system call
` [PATCH 3/9] x86, pkeys: make mprotect_key() mask off additional vm_flags
` [PATCH 4/9] x86: wire up mprotect_key() system call
` [PATCH 5/9] x86, pkeys: allocation/free syscalls
` [PATCH 6/9] x86, pkeys: add pkey set/get syscalls
` [PATCH 7/9] generic syscalls: wire up memory protection keys syscalls
` [PATCH 8/9] pkeys: add details of system call use to Documentation/
` [PATCH 9/9] x86, pkeys: add self-tests

[PATCH] ioctl_ficlonerange.2: mention a subtlety with length == 0
 2016-07-16 10:26 UTC  (2+ messages)

[PATCH v23 00/22] Richacls (Core and Ext4)
 2016-07-14 20:59 UTC  (39+ messages)
` [PATCH v23 06/22] richacl: In-memory representation and helper functions
` [PATCH v23 07/22] richacl: Permission mapping functions
` [PATCH v23 08/22] richacl: Compute maximum file masks from an acl
` [PATCH v23 09/22] richacl: Permission check algorithm
` [PATCH v23 12/22] vfs: Add get_richacl and set_richacl inode operations
` [PATCH v23 13/22] vfs: Cache richacl in struct inode
` [PATCH v23 14/22] richacl: Update the file masks in chmod()
` [PATCH v23 15/22] richacl: Check if an acl is equivalent to a file mode
` [PATCH v23 16/22] richacl: Create-time inheritance
` [PATCH v23 17/22] richacl: Automatic Inheritance
` [PATCH v23 18/22] richacl: xattr mapping functions
` [PATCH v23 19/22] richacl: Add richacl xattr handler
` [PATCH v23 20/22] vfs: Add richacl permission checking

[PATCH review 0/11] General unprivileged mount support
 2016-07-14 17:03 UTC  (49+ messages)
` [PATCH review 01/11] fs: Refuse uid/gid changes which don't map into s_user_ns
  ` [PATCH review 07/11] vfs: Don't create inodes with a uid or gid unknown to the vfs
  ` [PATCH review 09/11] quota: Handle quota data stored in s_user_ns
    ` [PATCH v2 "
  ` [PATCH review 0/12] General unprivileged mount support v2
      ` [PATCH review 01/12] fs: Refuse uid/gid changes which don't map into s_user_ns
        ` [PATCH review 02/12] userns: Handle -1 in k[ug]id_has_mapping when !CONFIG_USER_NS
        ` [PATCH review 03/12] vfs: Verify acls are valid within superblock's s_user_ns
        ` [PATCH review 04/12] fs: Check for invalid i_uid in may_follow_link()
        ` [PATCH review 05/12] cred: Reject inodes with invalid ids in set_create_file_as()
        ` [PATCH review 08/12] quota: Ensure qids map to the filesystem
        ` [PATCH review 09/12] quota: Handle quota data stored in s_user_ns in quota_setxquota
          ` [PATCH review 06/12] vfs: Don't modify inodes with a uid or gid unknown to the vfs
          ` [PATCH review 07/12] vfs: Don't create "
          ` [PATCH review 10/12] dquot: For now explicitly don't support filesystems outside of init_user_ns
          ` [PATCH review 11/12] evm: Translate user/group ids relative to s_user_ns when computing HMAC
        ` [PATCH review 12/12] fs: Update i_[ug]id_(read|write) to translate relative to s_user_ns

Introspecting userns relationships to other namespaces?
 2016-07-13  3:59 UTC  (46+ messages)
              ` [CRIU] "

[PATCH v8 0/6] crypto: algif - add akcipher
 2016-07-08 17:26 UTC  (8+ messages)
` [PATCH v8 6/6] crypto: AF_ALG - add support for key_id

[RFC][PATCH] x86, pkeys: scalable pkey_set()/pkey_get()
 2016-07-08 15:15 UTC  (4+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).