messages from 2018-07-31 12:39:16 to 2018-08-30 14:40:04 UTC [more...]
[RFC PATCH v3 0/8] Control Flow Enforcement: Branch Tracking, PTRACE
2018-08-30 14:40 UTC (4+ messages)
` [RFC PATCH v3 1/8] x86/cet/ibt: Add Kconfig option for user-mode Indirect Branch Tracking
` [RFC PATCH v3 2/8] x86/cet/ibt: User-mode indirect branch tracking support
` [RFC PATCH v3 3/8] x86/cet/ibt: ELF header parsing for IBT
[RFC PATCH v3 00/24] Control Flow Enforcement: Shadow Stack
2018-08-30 14:39 UTC (25+ messages)
` [RFC PATCH v3 01/24] x86/cpufeatures: Add CPUIDs for Control-flow Enforcement Technology (CET)
` [RFC PATCH v3 02/24] x86/fpu/xstate: Change some names to separate XSAVES system and user states
` [RFC PATCH v3 03/24] x86/fpu/xstate: Enable XSAVES system states
` [RFC PATCH v3 04/24] x86/fpu/xstate: Add XSAVES system states for shadow stack
` [RFC PATCH v3 05/24] Documentation/x86: Add CET description
` [RFC PATCH v3 06/24] x86/cet: Control protection exception handler
` [RFC PATCH v3 07/24] x86/cet/shstk: Add Kconfig option for user-mode shadow stack
` [RFC PATCH v3 08/24] mm: Introduce VM_SHSTK for shadow stack memory
` [RFC PATCH v3 09/24] x86/mm: Change _PAGE_DIRTY to _PAGE_DIRTY_HW
` [RFC PATCH v3 10/24] x86/mm: Introduce _PAGE_DIRTY_SW
` [RFC PATCH v3 11/24] drm/i915/gvt: Update _PAGE_DIRTY to _PAGE_DIRTY_BITS
` [RFC PATCH v3 12/24] x86/mm: Modify ptep_set_wrprotect and pmdp_set_wrprotect for _PAGE_DIRTY_SW
` [RFC PATCH v3 13/24] x86/mm: Shadow stack page fault error checking
` [RFC PATCH v3 14/24] mm: Handle shadow stack page fault
` [RFC PATCH v3 15/24] mm: Handle THP/HugeTLB "
` [RFC PATCH v3 16/24] mm: Update can_follow_write_pte/pmd for shadow stack
` [RFC PATCH v3 17/24] mm: Introduce do_mmap_locked()
` [RFC PATCH v3 18/24] x86/cet/shstk: User-mode shadow stack support
` [RFC PATCH v3 19/24] x86/cet/shstk: Introduce WRUSS instruction
` [RFC PATCH v3 20/24] x86/cet/shstk: Signal handling for shadow stack
` [RFC PATCH v3 21/24] x86/cet/shstk: ELF header parsing of Shadow Stack
` [RFC PATCH v3 22/24] x86/cet/shstk: Handle thread shadow stack
` [RFC PATCH v3 23/24] x86/cet/shstk: Add arch_prctl functions for Shadow Stack
` [RFC PATCH v3 24/24] x86/cet/shstk: Add Shadow Stack instructions to opcode map
[PATCH v5 0/5] seccomp trap to userspace
2018-08-29 21:21 UTC (9+ messages)
` [PATCH v5 1/5] seccomp: add a return code to "
` [PATCH v5 2/5] seccomp: make get_nth_filter available outside of CHECKPOINT_RESTORE
` [PATCH v5 3/5] seccomp: add a way to get a listener fd from ptrace
` [PATCH v5 4/5] seccomp: add support for passing fds via USER_NOTIF
` [PATCH v5 5/5] samples: add an example of seccomp user trap
[PATCH 00/14] y2038 syscall changes for 4.20
2018-08-29 13:59 UTC (19+ messages)
` [PATCH 01/14] y2038: Remove unused time interfaces
` [PATCH 02/14] y2038: Make do_gettimeofday() and get_seconds() inline
` [PATCH 03/14] y2038: Globally rename compat_time to old_time32
` [RFC PATCH] y2038: __get_old_timespec32() can be static
` [Y2038] "
` [PATCH 04/14] y2038: Remove newstat family from default syscall set
` [PATCH 05/14] y2038: Remove stat64 "
` [PATCH 06/14] asm-generic: Move common compat types to asm-generic/compat.h
` [PATCH 07/14] asm-generic: Remove unneeded __ARCH_WANT_SYS_LLSEEK macro
` [PATCH 08/14] asm-generic: Remove empty asm/unistd.h
` [PATCH 09/14] y2038: Change sys_utimensat() to use __kernel_timespec
` [PATCH 10/14] y2038: Compile utimes()/futimesat() conditionally
` [PATCH 11/14] y2038: utimes: Rework #ifdef guards for compat syscalls
` [PATCH 12/14] y2038: sched: Change sched_rr_get_interval to use __kernel_timespec
` [PATCH 13/14] y2038: socket: Change recvmmsg "
` [PATCH 14/14] y2038: signal: Change rt_sigtimedwait "
[PATCH v4 00/16] Add utilization clamping support
2018-08-28 13:53 UTC (2+ messages)
` [PATCH v4 01/16] sched/core: uclamp: extend sched_setattr to support utilization clamping
[PATCH ghak90 (was ghak32) V4 00/10] audit: implement container identifier
2018-08-24 16:01 UTC (13+ messages)
` [PATCH ghak90 (was ghak32) V4 01/10] audit: collect audit task parameters
` [PATCH ghak90 (was ghak32) V4 02/10] audit: add container id
` [PATCH ghak90 (was ghak32) V4 03/10] audit: log container info of syscalls
` [PATCH ghak90 (was ghak32) V4 04/10] audit: add containerid support for ptrace and signals
` [PATCH ghak90 (was ghak32) V4 05/10] audit: add support for non-syscall auxiliary records
` [PATCH ghak90 (was ghak32) V4 06/10] audit: add containerid support for tty_audit
` [PATCH ghak90 (was ghak32) V4 07/10] audit: add containerid filtering
` [PATCH ghak90 (was ghak32) V4 08/10] audit: add support for containerid to network namespaces
` [PATCH ghak90 (was ghak32) V4 09/10] audit: NETFILTER_PKT: record each container ID associated with a netNS
` [PATCH ghak90 (was ghak32) V4 10/10] debug audit: read container ID of a process
[PATCH 00/33] VFS: Introduce filesystem context [ver #11]
2018-08-24 14:54 UTC (70+ messages)
` [PATCH 01/33] vfs: syscall: Add open_tree(2) to reference or clone a mount "
` [PATCH 02/33] vfs: syscall: Add move_mount(2) to move mounts around "
` [PATCH 25/33] vfs: syscall: Add fsopen() to prepare for superblock creation "
` [PATCH 28/33] vfs: syscall: Add fsconfig() for configuring and managing a context "
` [PATCH 29/33] vfs: syscall: Add fsmount() to create a mount for a superblock "
` [PATCH 30/33] vfs: syscall: Add fspick() to select a superblock for reconfiguration "
` BUG: Mount ignores mount options
` Should we split the network filesystem setup into two phases?
exporting uuid_t from uapi/linux/uuid.h
2018-08-22 6:05 UTC (2+ messages)
Kernel lockdown patch & IPAddressAllow/IPAddressDeny systemd feature with Secure Boot
2018-08-16 17:01 UTC (4+ messages)
[PATCH 0/4] cleanups and refactor of /proc/pid/smaps*
2018-08-16 14:20 UTC (6+ messages)
` [PATCH 4/4] mm: proc/pid/smaps_rollup: convert to single value seq_file
[RFC PATCH v2 00/27] Control Flow Enforcement (CET)
2018-08-14 21:28 UTC (5+ messages)
` [RFC PATCH v2 13/27] mm: Handle shadow stack page fault
[PATCH v4 0/4] seccomp trap to userspace
2018-08-11 2:32 UTC (9+ messages)
[PATCH 1/1] selftest/net: fix FILE_SIZE for 32 bit architecture
2018-08-10 6:03 UTC (5+ messages)
[PATCH v2] proc: add percpu populated pages count to meminfo
2018-08-08 7:53 UTC (5+ messages)
[RESEND][PATCH v5 0/2] vfs: better dedupe permission check
2018-08-07 22:21 UTC (4+ messages)
` [PATCH v5 1/2] vfs: allow dedupe of user owned read-only files
` [PATCH v5 2/2] vfs: dedupe should return EPERM if permission is not granted
[PATCH] proc: add percpu populated pages count to meminfo
2018-08-07 15:03 UTC (2+ messages)
[PATCH] prctl: add PR_[GS]ET_KILLABLE
2018-08-03 14:40 UTC (14+ messages)
` [PATCH v2] "
` [PATCH v3 1/2] fork: do not rely on SIGNAL_UNKILLABLE for init check
` [PATCH v3 2/2] prctl: add PR_[GS]ET_KILLABLE
[PATCH 04/24] 32-bit userspace ABI: introduce ARCH_32BIT_OFF_T config option
2018-08-02 18:30 UTC (2+ messages)
[PATCH 1/1] selftest/net: fix protocol family to work for IPv4
2018-08-02 17:35 UTC (4+ messages)
[PATCH 0/5] VFS: Introduce filesystem information query syscall
2018-08-01 22:20 UTC (4+ messages)
` [PATCH 1/5] vfs: syscall: Add fsinfo() to query filesystem information
[PATCH 34/38] vfs: syscall: Add fsinfo() to query filesystem information [ver #10]
2018-08-01 1:07 UTC (7+ messages)
` [PATCH 00/38] VFS: Introduce filesystem context "
[RFC PATCH ghak90 (was ghak32) V3 00/10] audit: implement container identifier
2018-07-31 20:07 UTC (7+ messages)
` [RFC PATCH ghak90 (was ghak32) V3 02/10] audit: log container info of syscalls
[PATCH 34/38] vfs: syscall: Add fsinfo() to query filesystem information [ver #10]
2018-07-27 23:14 UTC
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).