linux-api.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2019-07-09 22:42:41 to 2019-07-19 22:25:46 UTC [more...]

[PATCH v10 0/9] namei: openat2(2) path resolution restrictions
 2019-07-19 22:25 UTC  (11+ messages)
` [PATCH v10 1/9] namei: obey trailing magic-link DAC permissions
` [PATCH v10 2/9] procfs: switch magic-link modes to be more sane
` [PATCH v10 3/9] open: O_EMPTYPATH: procfs-less file descriptor re-opening
` [PATCH v10 4/9] namei: O_BENEATH-style path resolution flags
` [PATCH v10 5/9] namei: LOOKUP_IN_ROOT: chroot-like path resolution
` [PATCH v10 6/9] namei: aggressively check for nd->root escape on ".." resolution
` [PATCH v10 7/9] open: openat2(2) syscall
` [PATCH v10 8/9] kselftest: save-and-restore errno to allow for %m formatting
` [PATCH v10 9/9] selftests: add openat2(2) selftests

[v4 PATCH 0/2] mm: mempolicy: fix mbind()'s inconsistent behavior for unmovable pages
 2019-07-19 17:21 UTC  (3+ messages)
` [v4 PATCH 1/2] mm: mempolicy: make the behavior consistent when MPOL_MF_MOVE* and MPOL_MF_STRICT were specified
` [v4 PATCH 2/2] mm: mempolicy: handle vma with unmovable pages mapped correctly in mbind

[PATCH ghak90 V6 00/10] audit: implement container identifier
 2019-07-19 17:05 UTC  (33+ messages)
` [PATCH ghak90 V6 02/10] audit: add container id
` [PATCH ghak90 V6 03/10] audit: read container ID of a process

[v3 PATCH 0/2] mm: mempolicy: fix mbind()'s inconsistent behavior for unmovable pages
 2019-07-19 16:18 UTC  (7+ messages)
` [v3 PATCH 1/2] mm: mempolicy: make the behavior consistent when MPOL_MF_MOVE* and MPOL_MF_STRICT were specified
` [v3 PATCH 2/2] mm: mempolicy: handle vma with unmovable pages mapped correctly in mbind

[PATCH v9 00/10] namei: openat2(2) path resolution restrictions
 2019-07-19 10:29 UTC  (37+ messages)
` [PATCH v9 01/10] namei: obey trailing magic-link DAC permissions
` [PATCH v9 04/10] namei: split out nd->dfd handling to dirfd_path_init
` [PATCH v9 05/10] namei: O_BENEATH-style path resolution flags
` [PATCH v9 08/10] open: openat2(2) syscall

[PATCH AUTOSEL 5.2 124/171] rseq/selftests: Fix Thumb mode build failure on arm32
 2019-07-19  3:55 UTC 

[PATCH V36 00/29] security: Add kernel lockdown functionality
 2019-07-18 21:06 UTC  (34+ messages)
` [PATCH V36 01/29] security: Support early LSMs
` [PATCH V36 02/29] security: Add a "locked down" LSM hook
` [PATCH V36 03/29] security: Add a static lockdown policy LSM
` [PATCH V36 04/29] Enforce module signatures if the kernel is locked down
` [PATCH V36 05/29] Restrict /dev/{mem,kmem,port} when "
` [PATCH V36 06/29] kexec_load: Disable at runtime if "
` [PATCH V36 07/29] Copy secure_boot flag in boot params across kexec reboot
  ` [PATCH V36 08/29] kexec_file: split KEXEC_VERIFY_SIG into KEXEC_SIG and KEXEC_SIG_FORCE
` [PATCH V36 09/29] kexec_file: Restrict at runtime if the kernel is locked down
` [PATCH V36 10/29] hibernate: Disable when "
` [PATCH V36 11/29] PCI: Lock down BAR access "
` [PATCH V36 12/29] x86: Lock down IO port "
` [PATCH V36 13/29] x86/msr: Restrict MSR "
` [PATCH V36 14/29] ACPI: Limit access to custom_method "
` [PATCH V36 15/29] acpi: Ignore acpi_rsdp kernel param when the kernel has been "
` [PATCH V36 16/29] acpi: Disable ACPI table override if the kernel is "
` [PATCH V36 17/29] Prohibit PCMCIA CIS storage when "
` [PATCH V36 18/29] Lock down TIOCSSERIAL
` [PATCH V36 19/29] Lock down module params that specify hardware parameters (eg. ioport)
` [PATCH V36 20/29] x86/mmiotrace: Lock down the testmmiotrace module
` [PATCH V36 21/29] Lock down /proc/kcore
` [PATCH V36 22/29] Lock down tracing and perf kprobes when in confidentiality mode
` [PATCH V36 23/29] bpf: Restrict bpf when kernel lockdown is "
` [PATCH V36 24/29] Lock down perf when "
` [PATCH V36 25/29] kexec: Allow kexec_file() with appropriate IMA policy when locked down
` [PATCH V36 26/29] debugfs: Restrict debugfs when the kernel is "
` [PATCH V36 27/29] tracefs: Restrict tracefs "
` [PATCH V36 28/29] efi: Restrict efivar_ssdt_load "
` [PATCH V36 29/29] lockdown: Print current->comm in restriction messages

[PATCH v12 0/6] Add utilization clamping support (CGroups API)
 2019-07-18 18:17 UTC  (7+ messages)
` [PATCH v12 1/6] sched/core: uclamp: Extend CPU's cgroup controller
` [PATCH v12 2/6] sched/core: uclamp: Propagate parent clamps
` [PATCH v12 3/6] sched/core: uclamp: Propagate system defaults to root group
` [PATCH v12 4/6] sched/core: uclamp: Use TG's clamps to restrict TASK's clamps
` [PATCH v12 5/6] sched/core: uclamp: Update CPU's refcount on TG's clamp changes
` [PATCH v12 6/6] sched/core: uclamp: always use enum uclamp_id for clamp_id values

[PATCH v5 0/5] Introduce MADV_COLD and MADV_PAGEOUT
 2019-07-17 22:14 UTC  (7+ messages)
` [PATCH v5 1/5] mm: introduce MADV_COLD
` [PATCH v5 2/5] mm: change PAGEREF_RECLAIM_CLEAN with PAGE_REFRECLAIM
` [PATCH v5 3/5] mm: account nr_isolated_xxx in [isolate|putback]_lru_page
` [PATCH v5 4/5] mm: introduce MADV_PAGEOUT
` [PATCH v5 5/5] mm: factor out common parts between MADV_COLD and MADV_PAGEOUT

[v2 PATCH 2/2] mm: mempolicy: handle vma with unmovable pages mapped correctly in mbind
 2019-07-17 19:25 UTC  (2+ messages)

Add a new fchmodat4() syscall, v2
 2019-07-17 12:39 UTC  (11+ messages)
` [PATCH v2 1/4] Non-functional cleanup of a "__user * filename"
` [PATCH v2 2/4] Add fchmodat4(), a new syscall
` [PATCH v2 3/4] arch: Register fchmodat4, usually as syscall 434
` [PATCH v2 4/4] tools: Add fchmodat4

[PATCH V35 00/29] Kernel lockdown functionality
 2019-07-16 23:22 UTC  (38+ messages)
` [PATCH V35 01/29] security: Support early LSMs
` [PATCH V35 02/29] security: Add a "locked down" LSM hook
` [PATCH V35 03/29] security: Add a static lockdown policy LSM
` [PATCH V35 04/29] Enforce module signatures if the kernel is locked down
` [PATCH V35 05/29] Restrict /dev/{mem,kmem,port} when "
` [PATCH V35 08/29] kexec_file: split KEXEC_VERIFY_SIG into KEXEC_SIG and KEXEC_SIG_FORCE
  ` [PATCH V35 06/29] kexec_load: Disable at runtime if the kernel is locked down
  ` [PATCH V35 07/29] Copy secure_boot flag in boot params across kexec reboot
  ` [PATCH V35 09/29] kexec_file: Restrict at runtime if the kernel is locked down
` [PATCH V35 10/29] hibernate: Disable when "
` [PATCH V35 11/29] PCI: Lock down BAR access "
` [PATCH V35 12/29] x86: Lock down IO port "
` [PATCH V35 13/29] x86/msr: Restrict MSR "
` [PATCH V35 14/29] ACPI: Limit access to custom_method "
` [PATCH V35 15/29] acpi: Ignore acpi_rsdp kernel param when the kernel has been "
` [PATCH V35 16/29] acpi: Disable ACPI table override if the kernel is "
` [PATCH V35 17/29] Prohibit PCMCIA CIS storage when "
` [PATCH V35 18/29] Lock down TIOCSSERIAL
` [PATCH V35 19/29] Lock down module params that specify hardware parameters (eg. ioport)
` [PATCH V35 20/29] x86/mmiotrace: Lock down the testmmiotrace module
` [PATCH V35 21/29] Lock down /proc/kcore
` [PATCH V35 22/29] Lock down tracing and perf kprobes when in confidentiality mode
` [PATCH V35 23/29] bpf: Restrict bpf when kernel lockdown is "
` [PATCH V35 24/29] Lock down perf when "
` [PATCH V35 25/29] kexec: Allow kexec_file() with appropriate IMA policy when locked down
` [PATCH V35 26/29] debugfs: Restrict debugfs when the kernel is "
` [PATCH V35 27/29] tracefs: Restrict tracefs "
` [PATCH V35 28/29] efi: Restrict efivar_ssdt_load "
` [PATCH V35 29/29] lockdown: Print current->comm in restriction messages

[PATCH v4 0/3] initramfs: add support for xattrs in the initial ram disk
 2019-07-15 16:54 UTC  (8+ messages)

[PATCH v4 0/4] Introduce MADV_COLD and MADV_PAGEOUT
 2019-07-14 23:11 UTC  (13+ messages)
` [PATCH v4 1/4] mm: introduce MADV_COLD
` [PATCH v4 2/4] mm: change PAGEREF_RECLAIM_CLEAN with PAGE_REFRECLAIM
` [PATCH v4 3/4] mm: account nr_isolated_xxx in [isolate|putback]_lru_page
` [PATCH v4 4/4] mm: introduce MADV_PAGEOUT

[PATCH 0/6] Mount and superblock notifications [ver #5]
 2019-07-12 20:11 UTC  (3+ messages)
` [PATCH 1/6] security: Add hooks to rule on setting a superblock or mount watch "

On
 2019-07-12  1:19 UTC  (3+ messages)
  ` Is a new EPOLLCLOSED a solution to the problem that EPOLL_CTL_DISABLE tried to solve?

[PATCH V34 00/29] Lockdown as an LSM
 2019-07-11  4:11 UTC  (6+ messages)
` [PATCH V34 10/29] hibernate: Disable when the kernel is locked down

[PATCH v3 0/5] Introduce MADV_COLD and MADV_PAGEOUT
 2019-07-11  0:25 UTC  (11+ messages)
` [PATCH v3 4/5] mm: introduce MADV_PAGEOUT
` [PATCH v3 5/5] mm: factor out pmd young/dirty bit handling and THP split

[PATCH v2 00/11] FPGA DFL updates
 2019-07-10  7:22 UTC  (4+ messages)

[PATCH v9 00/24] ILP32 for ARM64
 2019-07-09 22:42 UTC  (2+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).