messages from 2019-07-01 15:32:27 to 2019-07-17 12:39:59 UTC [more...]
Add a new fchmodat4() syscall, v2
2019-07-17 12:39 UTC (11+ messages)
` [PATCH v2 1/4] Non-functional cleanup of a "__user * filename"
` [PATCH v2 2/4] Add fchmodat4(), a new syscall
` [PATCH v2 3/4] arch: Register fchmodat4, usually as syscall 434
` [PATCH v2 4/4] tools: Add fchmodat4
[PATCH ghak90 V6 00/10] audit: implement container identifier
2019-07-16 23:30 UTC (26+ messages)
` [PATCH ghak90 V6 02/10] audit: add container id
[PATCH V35 00/29] Kernel lockdown functionality
2019-07-16 23:22 UTC (38+ messages)
` [PATCH V35 01/29] security: Support early LSMs
` [PATCH V35 02/29] security: Add a "locked down" LSM hook
` [PATCH V35 03/29] security: Add a static lockdown policy LSM
` [PATCH V35 04/29] Enforce module signatures if the kernel is locked down
` [PATCH V35 05/29] Restrict /dev/{mem,kmem,port} when "
` [PATCH V35 06/29] kexec_load: Disable at runtime if "
` [PATCH V35 07/29] Copy secure_boot flag in boot params across kexec reboot
` [PATCH V35 09/29] kexec_file: Restrict at runtime if the kernel is locked down
` [PATCH V35 08/29] kexec_file: split KEXEC_VERIFY_SIG into KEXEC_SIG and KEXEC_SIG_FORCE
` [PATCH V35 10/29] hibernate: Disable when the kernel is locked down
` [PATCH V35 11/29] PCI: Lock down BAR access "
` [PATCH V35 12/29] x86: Lock down IO port "
` [PATCH V35 13/29] x86/msr: Restrict MSR "
` [PATCH V35 14/29] ACPI: Limit access to custom_method "
` [PATCH V35 15/29] acpi: Ignore acpi_rsdp kernel param when the kernel has been "
` [PATCH V35 16/29] acpi: Disable ACPI table override if the kernel is "
` [PATCH V35 17/29] Prohibit PCMCIA CIS storage when "
` [PATCH V35 18/29] Lock down TIOCSSERIAL
` [PATCH V35 19/29] Lock down module params that specify hardware parameters (eg. ioport)
` [PATCH V35 20/29] x86/mmiotrace: Lock down the testmmiotrace module
` [PATCH V35 21/29] Lock down /proc/kcore
` [PATCH V35 22/29] Lock down tracing and perf kprobes when in confidentiality mode
` [PATCH V35 23/29] bpf: Restrict bpf when kernel lockdown is "
` [PATCH V35 24/29] Lock down perf when "
` [PATCH V35 25/29] kexec: Allow kexec_file() with appropriate IMA policy when locked down
` [PATCH V35 26/29] debugfs: Restrict debugfs when the kernel is "
` [PATCH V35 27/29] tracefs: Restrict tracefs "
` [PATCH V35 28/29] efi: Restrict efivar_ssdt_load "
` [PATCH V35 29/29] lockdown: Print current->comm in restriction messages
[PATCH v9 00/10] namei: openat2(2) path resolution restrictions
2019-07-16 8:03 UTC (35+ messages)
` [PATCH v9 01/10] namei: obey trailing magic-link DAC permissions
` [PATCH v9 02/10] procfs: switch magic-link modes to be more sane
` [PATCH v9 03/10] open: O_EMPTYPATH: procfs-less file descriptor re-opening
` [PATCH v9 04/10] namei: split out nd->dfd handling to dirfd_path_init
` [PATCH v9 05/10] namei: O_BENEATH-style path resolution flags
` [PATCH v9 06/10] namei: LOOKUP_IN_ROOT: chroot-like path resolution
` [PATCH v9 07/10] namei: aggressively check for nd->root escape on ".." resolution
` [PATCH v9 08/10] open: openat2(2) syscall
` [PATCH v9 09/10] kselftest: save-and-restore errno to allow for %m formatting
` [PATCH v9 10/10] selftests: add openat2(2) selftests
[PATCH v4 0/3] initramfs: add support for xattrs in the initial ram disk
2019-07-15 16:54 UTC (8+ messages)
[PATCH v5 0/5] Introduce MADV_COLD and MADV_PAGEOUT
2019-07-14 23:34 UTC (6+ messages)
` [PATCH v5 1/5] mm: introduce MADV_COLD
` [PATCH v5 2/5] mm: change PAGEREF_RECLAIM_CLEAN with PAGE_REFRECLAIM
` [PATCH v5 3/5] mm: account nr_isolated_xxx in [isolate|putback]_lru_page
` [PATCH v5 4/5] mm: introduce MADV_PAGEOUT
` [PATCH v5 5/5] mm: factor out common parts between MADV_COLD and MADV_PAGEOUT
[PATCH v4 0/4] Introduce MADV_COLD and MADV_PAGEOUT
2019-07-14 23:11 UTC (13+ messages)
` [PATCH v4 1/4] mm: introduce MADV_COLD
` [PATCH v4 2/4] mm: change PAGEREF_RECLAIM_CLEAN with PAGE_REFRECLAIM
` [PATCH v4 3/4] mm: account nr_isolated_xxx in [isolate|putback]_lru_page
` [PATCH v4 4/4] mm: introduce MADV_PAGEOUT
[PATCH 0/6] Mount and superblock notifications [ver #5]
2019-07-12 20:11 UTC (3+ messages)
` [PATCH 1/6] security: Add hooks to rule on setting a superblock or mount watch "
On
2019-07-12 1:19 UTC (3+ messages)
` Is a new EPOLLCLOSED a solution to the problem that EPOLL_CTL_DISABLE tried to solve?
[PATCH V34 00/29] Lockdown as an LSM
2019-07-11 4:11 UTC (6+ messages)
` [PATCH V34 10/29] hibernate: Disable when the kernel is locked down
[PATCH v3 0/5] Introduce MADV_COLD and MADV_PAGEOUT
2019-07-11 0:25 UTC (21+ messages)
` [PATCH v3 1/5] mm: introduce MADV_COLD
` [PATCH v3 3/5] mm: account nr_isolated_xxx in [isolate|putback]_lru_page
` [PATCH v3 4/5] mm: introduce MADV_PAGEOUT
` [PATCH v3 5/5] mm: factor out pmd young/dirty bit handling and THP split
[PATCH v2 00/11] FPGA DFL updates
2019-07-10 7:22 UTC (15+ messages)
` [PATCH v2 01/11] fpga: dfl: fme: support 512bit data width PR
` [PATCH v2 02/11] fpga: dfl: fme: add DFL_FPGA_FME_PORT_RELEASE/ASSIGN ioctl support
` [PATCH v2 03/11] fpga: dfl: pci: enable SRIOV support
` [PATCH v2 04/11] fpga: dfl: afu: add AFU state related sysfs interfaces
` [PATCH v2 05/11] fpga: dfl: afu: add userclock "
` [PATCH v2 06/11] fpga: dfl: add id_table for dfl private feature driver
` [PATCH v2 07/11] fpga: dfl: afu: export __port_enable/disable function
` [PATCH v2 08/11] fpga: dfl: afu: add error reporting support
` [PATCH v2 09/11] fpga: dfl: afu: add STP (SignalTap) support
` [PATCH v2 10/11] fpga: dfl: fme: add capability sysfs interfaces
` [PATCH v2 11/11] fpga: dfl: fme: add global error reporting support
[PATCH v9 00/24] ILP32 for ARM64
2019-07-09 22:42 UTC (2+ messages)
[PATCH 0/9] Keyrings, Block and USB notifications [ver #5]
2019-07-08 19:13 UTC (19+ messages)
` [PATCH 1/9] uapi: General notification ring definitions "
` [PATCH 2/9] security: Add hooks to rule on setting a watch "
` [PATCH 3/9] security: Add a hook for the point of notification insertion "
` [PATCH 4/9] General notification queue with user mmap()'able ring buffer "
` [PATCH 6/9] Add a general, global device notification watch list "
` [PATCH 8/9] usb: Add USB subsystem notifications "
[PATCH for 5.2] rseq/selftests: Fix Thumb mode build failure on arm32
2019-07-08 18:10 UTC (3+ messages)
[PATCH v6 00/17] fs-verity: read-only file-based authenticity protection
2019-07-07 18:54 UTC (18+ messages)
` [PATCH v6 07/17] fs-verity: add the hook for file ->open()
` [PATCH v6 08/17] fs-verity: add the hook for file ->setattr()
` [PATCH v6 09/17] fs-verity: add data verification hooks for ->readpages()
` [PATCH v6 10/17] fs-verity: implement FS_IOC_ENABLE_VERITY ioctl
` [PATCH v6 11/17] fs-verity: implement FS_IOC_MEASURE_VERITY ioctl
` [PATCH v6 12/17] fs-verity: add SHA-512 support
` [PATCH v6 13/17] fs-verity: support builtin file signatures
` [PATCH v6 14/17] ext4: add basic fs-verity support
` [PATCH v6 15/17] ext4: add fs-verity read support
` [PATCH v6 16/17] ext4: update on-disk format documentation for fs-verity
` [PATCH v6 17/17] f2fs: add fs-verity support
[RFC PATCH] binfmt_elf: Extract .note.gnu.property from an ELF file
2019-07-04 19:50 UTC (5+ messages)
[PATCH 01/13] vfs: verify param type in vfs_parse_sb_flag()
2019-07-04 16:19 UTC (3+ messages)
[PATCH 0/6] fsinfo: Add mount topology query [ver #15]
2019-07-03 1:42 UTC (5+ messages)
` [PATCH 4/6] vfs: Allow mount information to be queried by fsinfo() "
[PATCH v2 bpf-next 1/4] bpf: unprivileged BPF access via /dev/bpf
2019-07-02 23:48 UTC (4+ messages)
[PATCH 01/11] vfs: syscall: Add fsinfo() to query filesystem information [ver #15]
2019-07-02 19:10 UTC (8+ messages)
` [PATCH 00/11] VFS: Introduce filesystem information query syscall "
` fsinfo(2) manpage
[PATCH v5 0/3] add thermal/power management features for FPGA DFL drivers
2019-07-02 4:26 UTC (5+ messages)
` [PATCH v5 2/3] fpga: dfl: fme: add thermal management support
` [PATCH v5 3/3] fpga: dfl: fme: add power "
[RFC PATCH 1/3] mm: Introduce VM_IBT for CET legacy code bitmap
2019-07-01 19:48 UTC (4+ messages)
` [RFC PATCH 3/3] Prevent user from writing to IBT bitmap
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).