messages from 2018-08-11 16:31:29 to 2018-09-06 09:19:11 UTC [more...]
[RFC] UAPI: Check headers by compiling all together as C++
2018-09-06 9:19 UTC (8+ messages)
` [PATCH 01/11] UAPI: drm: Fix use of C++ keywords as structural members [ver #2]
` [PATCH 02/11] UAPI: keys: "
` [PATCH 03/11] UAPI: virtio_net: "
` [PATCH 04/11] UAPI: bcache: Fix use of embedded flexible array "
` [PATCH 05/11] UAPI: coda: Move kernel internals out of public view "
` [PATCH 06/11] coda: Move internal defs out of include/linux/ "
` [PATCH 07/11] UAPI: netfilter: Fix symbol collision issues "
[RFC] UAPI: Check headers by compiling all together as C++
2018-09-06 8:17 UTC (30+ messages)
` [PATCH 01/11] UAPI: drm: Fix use of C++ keywords as structural members
` [PATCH 02/11] UAPI: keys: "
` [PATCH 03/11] UAPI: virtio_net: "
` [PATCH 04/11] UAPI: bcache: Fix use of embedded flexible array
` [PATCH 05/11] UAPI: coda: Don't use internal kernel structs in UAPI
` [PATCH 06/11] UAPI: netfilter: Fix symbol collision issues
` [PATCH 07/11] UAPI: nilfs2: Fix use of undefined byteswapping functions
` [PATCH 08/11] UAPI: sound: Fix use of u32 and co. in UAPI headers
` [PATCH 10/11] UAPI: ndctl: Remove use of PAGE_SIZE
` [PATCH 11/11] UAPI: Check headers build for C++
` [PATCH 09/11] UAPI: ndctl: Fix g++-unsupported initialisation in headers
[PATCH v4 00/16] Add utilization clamping support
2018-09-05 11:01 UTC (3+ messages)
` [PATCH v4 01/16] sched/core: uclamp: extend sched_setattr to support utilization clamping
[RESEND][PATCH v5 0/2] vfs: fix dedupe permission check
2018-09-04 20:40 UTC (3+ messages)
` [PATCH v5 1/2] vfs: allow dedupe of user owned read-only files
` [PATCH v5 2/2] vfs: dedupe should return EPERM if permission is not granted
[RFC PATCH v3 00/24] Control Flow Enforcement: Shadow Stack
2018-09-04 14:47 UTC (67+ messages)
` [RFC PATCH v3 01/24] x86/cpufeatures: Add CPUIDs for Control-flow Enforcement Technology (CET)
` [RFC PATCH v3 02/24] x86/fpu/xstate: Change some names to separate XSAVES system and user states
` [RFC PATCH v3 03/24] x86/fpu/xstate: Enable XSAVES system states
` [RFC PATCH v3 04/24] x86/fpu/xstate: Add XSAVES system states for shadow stack
` [RFC PATCH v3 05/24] Documentation/x86: Add CET description
` [RFC PATCH v3 06/24] x86/cet: Control protection exception handler
` [RFC PATCH v3 07/24] x86/cet/shstk: Add Kconfig option for user-mode shadow stack
` [RFC PATCH v3 08/24] mm: Introduce VM_SHSTK for shadow stack memory
` [RFC PATCH v3 09/24] x86/mm: Change _PAGE_DIRTY to _PAGE_DIRTY_HW
` [RFC PATCH v3 10/24] x86/mm: Introduce _PAGE_DIRTY_SW
` [RFC PATCH v3 11/24] drm/i915/gvt: Update _PAGE_DIRTY to _PAGE_DIRTY_BITS
` [RFC PATCH v3 12/24] x86/mm: Modify ptep_set_wrprotect and pmdp_set_wrprotect for _PAGE_DIRTY_SW
` [RFC PATCH v3 13/24] x86/mm: Shadow stack page fault error checking
` [RFC PATCH v3 14/24] mm: Handle shadow stack page fault
` [RFC PATCH v3 15/24] mm: Handle THP/HugeTLB "
` [RFC PATCH v3 16/24] mm: Update can_follow_write_pte/pmd for shadow stack
` [RFC PATCH v3 17/24] mm: Introduce do_mmap_locked()
` [RFC PATCH v3 18/24] x86/cet/shstk: User-mode shadow stack support
` [RFC PATCH v3 19/24] x86/cet/shstk: Introduce WRUSS instruction
` [RFC PATCH v3 20/24] x86/cet/shstk: Signal handling for shadow stack
` [RFC PATCH v3 21/24] x86/cet/shstk: ELF header parsing of Shadow Stack
` [RFC PATCH v3 22/24] x86/cet/shstk: Handle thread shadow stack
` [RFC PATCH v3 23/24] x86/cet/shstk: Add arch_prctl functions for Shadow Stack
` [RFC PATCH v3 24/24] x86/cet/shstk: Add Shadow Stack instructions to opcode map
[PATCH 00/10] Removing SEND_SIG_FORCED
2018-09-03 20:44 UTC (11+ messages)
` [PATCH 01/10] signal: Always ignore SIGKILL and SIGSTOP sent to the global init
` [PATCH 02/10] signal: Properly deliver SIGILL from uprobes
` [PATCH 03/10] signal: Properly deliver SIGSEGV from x86 uprobes
` [PATCH 04/10] signal: Always deliver the kernel's SIGKILL and SIGSTOP to a pid namespace init
` [PATCH 05/10] signal: send_sig_all no longer needs SEND_SIG_FORCED
` [PATCH 06/10] signal: Remove the siginfo paramater from kernel_dqueue_signal
` [PATCH 07/10] signal: Don't send siginfo to kthreads
` [PATCH 08/10] signal: Never allocate siginfo for SIGKILL or SIGSTOP
` [PATCH 09/10] signal: Use SEND_SIG_PRIV not SEND_SIG_FORCED with SIGKILL and SIGSTOP
` [PATCH 10/10] signal: Remove SEND_SIG_FORCED
[PATCH 0/5] y2038: Make ppoll, io_pgetevents and pselect y2038 safe
2018-09-01 20:47 UTC (6+ messages)
` [PATCH 1/5] signal: Add set_user_sigmask()
` [PATCH 2/5] signal: Add restore_user_sigmask()
` [PATCH 3/5] ppoll: use __kernel_timespec
` [PATCH 4/5] pselect6: "
` [PATCH 5/5] io_pgetevents: "
[RFC PATCH v3 0/8] Control Flow Enforcement: Branch Tracking, PTRACE
2018-08-30 19:38 UTC (10+ messages)
` [RFC PATCH v3 1/8] x86/cet/ibt: Add Kconfig option for user-mode Indirect Branch Tracking
` [RFC PATCH v3 2/8] x86/cet/ibt: User-mode indirect branch tracking support
` [RFC PATCH v3 3/8] x86/cet/ibt: ELF header parsing for IBT
` [RFC PATCH v3 4/8] x86/cet/ibt: Add arch_prctl functions "
` [RFC PATCH v3 5/8] x86/cet/ibt: Add ENDBR to op-code-map
` [RFC PATCH v3 6/8] mm/mmap: Add IBT bitmap size to address space limit check
` [RFC PATCH v3 7/8] x86: Insert endbr32/endbr64 to vDSO
` [RFC PATCH v3 8/8] x86/cet: Add PTRACE interface for CET
[PATCH v5 0/5] seccomp trap to userspace
2018-08-29 21:21 UTC (9+ messages)
` [PATCH v5 1/5] seccomp: add a return code to "
` [PATCH v5 2/5] seccomp: make get_nth_filter available outside of CHECKPOINT_RESTORE
` [PATCH v5 3/5] seccomp: add a way to get a listener fd from ptrace
` [PATCH v5 4/5] seccomp: add support for passing fds via USER_NOTIF
` [PATCH v5 5/5] samples: add an example of seccomp user trap
[PATCH 00/14] y2038 syscall changes for 4.20
2018-08-29 13:59 UTC (19+ messages)
` [PATCH 01/14] y2038: Remove unused time interfaces
` [PATCH 02/14] y2038: Make do_gettimeofday() and get_seconds() inline
` [PATCH 03/14] y2038: Globally rename compat_time to old_time32
` [RFC PATCH] y2038: __get_old_timespec32() can be static
` [Y2038] "
` [PATCH 04/14] y2038: Remove newstat family from default syscall set
` [PATCH 05/14] y2038: Remove stat64 "
` [PATCH 06/14] asm-generic: Move common compat types to asm-generic/compat.h
` [PATCH 07/14] asm-generic: Remove unneeded __ARCH_WANT_SYS_LLSEEK macro
` [PATCH 08/14] asm-generic: Remove empty asm/unistd.h
` [PATCH 09/14] y2038: Change sys_utimensat() to use __kernel_timespec
` [PATCH 10/14] y2038: Compile utimes()/futimesat() conditionally
` [PATCH 11/14] y2038: utimes: Rework #ifdef guards for compat syscalls
` [PATCH 12/14] y2038: sched: Change sched_rr_get_interval to use __kernel_timespec
` [PATCH 13/14] y2038: socket: Change recvmmsg "
` [PATCH 14/14] y2038: signal: Change rt_sigtimedwait "
[PATCH ghak90 (was ghak32) V4 00/10] audit: implement container identifier
2018-08-24 16:01 UTC (5+ messages)
` [PATCH ghak90 (was ghak32) V4 02/10] audit: add container id
` [PATCH ghak90 (was ghak32) V4 03/10] audit: log container info of syscalls
BUG: Mount ignores mount options
2018-08-24 14:54 UTC (42+ messages)
` [PATCH 00/33] VFS: Introduce filesystem context [ver #11]
` [PATCH 28/33] vfs: syscall: Add fsconfig() for configuring and managing a "
` [PATCH 30/33] vfs: syscall: Add fspick() to select a superblock for reconfiguration "
` Should we split the network filesystem setup into two phases?
exporting uuid_t from uapi/linux/uuid.h
2018-08-22 6:05 UTC (2+ messages)
Kernel lockdown patch & IPAddressAllow/IPAddressDeny systemd feature with Secure Boot
2018-08-16 17:01 UTC (4+ messages)
[PATCH 0/4] cleanups and refactor of /proc/pid/smaps*
2018-08-16 14:20 UTC (6+ messages)
` [PATCH 4/4] mm: proc/pid/smaps_rollup: convert to single value seq_file
[RFC PATCH v2 00/27] Control Flow Enforcement (CET)
2018-08-14 21:28 UTC (5+ messages)
` [RFC PATCH v2 13/27] mm: Handle shadow stack page fault
BUG: Mount ignores mount options
2018-08-10 15:39 UTC
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).