messages from 2016-07-06 15:01:12 to 2016-07-21 21:14:22 UTC [more...]
[RFC PATCH v7 0/7] Restartable sequences system call
2016-07-21 21:14 UTC (8+ messages)
` [RFC PATCH v7 2/7] tracing: instrument restartable sequences
` [RFC PATCH v7 3/7] Restartable sequences: ARM 32 architecture support
` [RFC PATCH v7 1/7] Restartable sequences system call
` [RFC PATCH v7 4/7] Restartable sequences: wire up ARM 32 "
` [RFC PATCH v7 5/7] Restartable sequences: x86 32/64 architecture support
` [RFC PATCH v7 6/7] Restartable sequences: wire up x86 32/64 system call
` [RFC PATCH v7 7/7] Restartable sequences: self-tests
[PATCH 0/5 RFC] Add an interface to discover relationships between namespaces
2016-07-21 21:06 UTC (18+ messages)
` [PATCH 1/5] namespaces: move user_ns into ns_common
` [PATCH 3/5] nsfs: add ioctl to get an owning user namespace for ns file descriptor
` [PATCH 2/5] kernel: add a helper to get an owning user namespace for a namespace
` [PATCH 4/5] nsfs: add ioctl to get a parent namespace
` [PATCH 5/5] tools/testing: add a test to check nsfs ioctl-s
[PATCH 01/10] sysctl: Stop implicitly passing current into sysctl_table_root.lookup
2016-07-21 16:40 UTC (12+ messages)
` [PATCH v2 00/10] userns: sysctl limits for namespaces
` [PATCH v2 01/10] sysctl: Stop implicitly passing current into sysctl_table_root.lookup
` [PATCH v2 04/10] userns: Generalize the user namespace count into ucount
` [PATCH v2 06/10] utsns: Add a limit on the number of uts namespaces
` [PATCH v2 02/10] userns: Add per user namespace sysctls
` [PATCH v2 03/10] userns: Add a limit on the number of user namespaces
` [PATCH v2 05/10] pidns: Add a limit on the number of pid namespaces
` [PATCH v2 07/10] ipcns: Add a limit on the number of ipc namespaces
` [PATCH v2 08/10] cgroupns: Add a limit on the number of cgroup namespaces
` [PATCH v2 09/10] netns: Add a limit on the number of net namespaces
` [PATCH v2 10/10] mntns: Add a limit on the number of mount namespaces
[PATCH v13 00/12] support "task_isolation" mode
2016-07-21 14:06 UTC (10+ messages)
` [PATCH v13 04/12] task_isolation: add initial support
` [PATCH v13 12/12] task_isolation: add user-settable notification signal
[PATCH 0/3 v3] fs: allow to use dirfd as root for openat and other *at syscalls
2016-07-20 20:42 UTC (4+ messages)
` [PATCH 1/3 v2] namei: add LOOKUP_DFD_ROOT to use dfd as root
` [PATCH 2/3 v2] fs: allow to use dirfd as root for openat and other *at syscalls
` [PATCH 3/3] selftests: check O_ATROOT and AT_FDROOT flags
[PATCH 3/3] f2fs: support clone_file_range
2016-07-19 4:48 UTC (2+ messages)
[PATCH 0/9] [REVIEW-REQUEST] [v4] System Calls for Memory Protection Keys
2016-07-18 20:12 UTC (45+ messages)
` [PATCH 1/9] x86, pkeys: add fault handling for PF_PK page fault bit
` [PATCH 2/9] mm: implement new pkey_mprotect() system call
` [PATCH 3/9] x86, pkeys: make mprotect_key() mask off additional vm_flags
` [PATCH 4/9] x86: wire up mprotect_key() system call
` [PATCH 5/9] x86, pkeys: allocation/free syscalls
` [PATCH 6/9] x86, pkeys: add pkey set/get syscalls
` [PATCH 7/9] generic syscalls: wire up memory protection keys syscalls
` [PATCH 8/9] pkeys: add details of system call use to Documentation/
` [PATCH 9/9] x86, pkeys: add self-tests
[PATCH] ioctl_ficlonerange.2: mention a subtlety with length == 0
2016-07-16 10:26 UTC (2+ messages)
[PATCH v23 00/22] Richacls (Core and Ext4)
2016-07-14 20:59 UTC (39+ messages)
` [PATCH v23 06/22] richacl: In-memory representation and helper functions
` [PATCH v23 07/22] richacl: Permission mapping functions
` [PATCH v23 08/22] richacl: Compute maximum file masks from an acl
` [PATCH v23 09/22] richacl: Permission check algorithm
` [PATCH v23 12/22] vfs: Add get_richacl and set_richacl inode operations
` [PATCH v23 13/22] vfs: Cache richacl in struct inode
` [PATCH v23 14/22] richacl: Update the file masks in chmod()
` [PATCH v23 15/22] richacl: Check if an acl is equivalent to a file mode
` [PATCH v23 16/22] richacl: Create-time inheritance
` [PATCH v23 17/22] richacl: Automatic Inheritance
` [PATCH v23 18/22] richacl: xattr mapping functions
` [PATCH v23 19/22] richacl: Add richacl xattr handler
` [PATCH v23 20/22] vfs: Add richacl permission checking
[PATCH review 0/11] General unprivileged mount support
2016-07-14 17:03 UTC (48+ messages)
` [PATCH review 01/11] fs: Refuse uid/gid changes which don't map into s_user_ns
` [PATCH review 07/11] vfs: Don't create inodes with a uid or gid unknown to the vfs
` [PATCH review 09/11] quota: Handle quota data stored in s_user_ns
` [PATCH v2 "
` [PATCH review 0/12] General unprivileged mount support v2
` [PATCH review 01/12] fs: Refuse uid/gid changes which don't map into s_user_ns
` [PATCH review 02/12] userns: Handle -1 in k[ug]id_has_mapping when !CONFIG_USER_NS
` [PATCH review 03/12] vfs: Verify acls are valid within superblock's s_user_ns
` [PATCH review 04/12] fs: Check for invalid i_uid in may_follow_link()
` [PATCH review 05/12] cred: Reject inodes with invalid ids in set_create_file_as()
` [PATCH review 06/12] vfs: Don't modify inodes with a uid or gid unknown to the vfs
` [PATCH review 07/12] vfs: Don't create "
` [PATCH review 10/12] dquot: For now explicitly don't support filesystems outside of init_user_ns
` [PATCH review 11/12] evm: Translate user/group ids relative to s_user_ns when computing HMAC
` [PATCH review 08/12] quota: Ensure qids map to the filesystem
` [PATCH review 09/12] quota: Handle quota data stored in s_user_ns in quota_setxquota
` [PATCH review 12/12] fs: Update i_[ug]id_(read|write) to translate relative to s_user_ns
Introspecting userns relationships to other namespaces?
2016-07-13 3:59 UTC (46+ messages)
` [CRIU] "
[PATCH v8 0/6] crypto: algif - add akcipher
2016-07-08 17:26 UTC (8+ messages)
` [PATCH v8 6/6] crypto: AF_ALG - add support for key_id
[RFC][PATCH] x86, pkeys: scalable pkey_set()/pkey_get()
2016-07-08 15:15 UTC (4+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).