Linux-api Archive on lore.kernel.org
 help / color / Atom feed
The problem of setgroups and containers
 2020-10-19 20:07 UTC  (3+ messages) - mbox.gz / Atom
          ` [RFC][PATCH] userns: Limit process in a user namespace to what the creator is allowed

[PATCH] drivers/virt: vmgenid: add vm generation id driver
 2020-10-19 17:15 UTC  (22+ messages) - mbox.gz / Atom

[RESEND PATCH v11 0/3] Add trusted_for(2) (was O_MAYEXEC)
 2020-10-19 16:58 UTC  (5+ messages) - mbox.gz / Atom
` [RESEND PATCH v11 1/3] fs: Add trusted_for(2) syscall implementation and related sysctl
` [RESEND PATCH v11 2/3] arch: Wire up trusted_for(2)
` [RESEND PATCH v11 3/3] selftest/interpreter: Add tests for trusted_for(2) policies

[PATCH v3 00/14] IOASID extensions for guest SVA
 2020-10-19 16:51 UTC  (2+ messages) - mbox.gz / Atom

[PATCH v4 00/13] "Task_isolation" mode
 2020-10-17 20:03 UTC  (18+ messages) - mbox.gz / Atom
` [PATCH v4 03/13] task_isolation: userspace hard isolation from kernel
    ` [EXT] "
` [PATCH v4 10/13] task_isolation: don't interrupt CPUs with tick_nohz_full_kick_cpu()
    ` [EXT] "

UBSAN: array-index-out-of-bounds in alg_bind
 2020-10-17 14:41 UTC  (3+ messages) - mbox.gz / Atom

[PATCH v12 0/8] arm64: expose FAR_EL1 tag bits in siginfo
 2020-10-17  0:12 UTC  (9+ messages) - mbox.gz / Atom
` [PATCH v12 1/8] parisc: Drop parisc special case for __sighandler_t
` [PATCH v12 2/8] parisc: start using signal-defs.h
` [PATCH v12 3/8] arch: move SA_* definitions to generic headers
` [PATCH v12 4/8] signal: clear non-uapi flag bits when passing/returning sa_flags
` [PATCH v12 5/8] signal: define the SA_UNSUPPORTED bit in sa_flags
` [PATCH v12 6/8] signal: deduplicate code dealing with common _sigfault fields
` [PATCH v12 7/8] signal: define the field siginfo.si_xflags
` [PATCH v12 8/8] arm64: expose FAR_EL1 tag bits in siginfo

[PATCH 1/5] Add manpage for open_tree(2)
 2020-10-16  6:50 UTC  (7+ messages) - mbox.gz / Atom
` [PATCH 4/5] Add manpage for fsopen(2) and fsmount(2)

[PATCH v3 1/1] uapi: Move constants from <linux/kernel.h> to <linux/const.h>
 2020-10-15 20:06 UTC  (2+ messages) - mbox.gz / Atom
` [musl] "

[RFC]: userspace memory reaping
 2020-10-15 19:32 UTC  (9+ messages) - mbox.gz / Atom

[PATCH v21 00/12] Landlock LSM
 2020-10-15 12:31 UTC  (18+ messages) - mbox.gz / Atom
` [PATCH v21 01/12] landlock: Add object management
` [PATCH v21 02/12] landlock: Add ruleset and domain management
` [PATCH v21 03/12] landlock: Set up the security framework and manage credentials
` [PATCH v21 04/12] landlock: Add ptrace restrictions
` [PATCH v21 05/12] LSM: Infrastructure management of the superblock
` [PATCH v21 06/12] fs,security: Add sb_delete hook
` [PATCH v21 07/12] landlock: Support filesystem access-control
` [PATCH v21 08/12] landlock: Add syscall implementations
` [PATCH v21 09/12] arch: Wire up Landlock syscalls
` [PATCH v21 10/12] selftests/landlock: Add initial tests
` [PATCH v21 11/12] samples/landlock: Add a sandbox manager example
` [PATCH v21 12/12] landlock: Add user and kernel documentation

[PATCH v2] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
 2020-10-14  5:51 UTC  - mbox.gz / Atom

[PATCHv4 1/3] block: add zone specific block statuses
 2020-10-13 19:25 UTC  (4+ messages) - mbox.gz / Atom

Regression: epoll edge-triggered (EPOLLET) for pipes/FIFOs
 2020-10-13  9:47 UTC  (9+ messages) - mbox.gz / Atom

[PATCH v3 RESEND] fcntl: Add 32bit filesystem mode
 2020-10-13  9:22 UTC  (3+ messages) - mbox.gz / Atom

[PATCH v14 00/26] Control-flow Enforcement: Shadow Stack
 2020-10-12 20:48 UTC  (29+ messages) - mbox.gz / Atom
` [PATCH v14 01/26] Documentation/x86: Add CET description
` [PATCH v14 02/26] x86/cpufeatures: Add CET CPU feature flags for Control-flow Enforcement Technology (CET)
` [PATCH v14 03/26] x86/fpu/xstate: Introduce CET MSR XSAVES supervisor states
` [PATCH v14 04/26] x86/cet: Add control-protection fault handler
` [PATCH v14 05/26] x86/cet/shstk: Add Kconfig option for user-mode Shadow Stack
` [PATCH v14 06/26] x86/mm: Change _PAGE_DIRTY to _PAGE_DIRTY_HW
` [PATCH v14 07/26] x86/mm: Remove _PAGE_DIRTY_HW from kernel RO pages
` [PATCH v14 08/26] x86/mm: Introduce _PAGE_COW
` [PATCH v14 09/26] drm/i915/gvt: Change _PAGE_DIRTY to _PAGE_DIRTY_BITS
` [PATCH v14 10/26] x86/mm: Update pte_modify for _PAGE_COW
` [PATCH v14 11/26] x86/mm: Update ptep_set_wrprotect() and pmdp_set_wrprotect() for transition from _PAGE_DIRTY_HW to _PAGE_COW
` [PATCH v14 12/26] mm: Introduce VM_SHSTK for shadow stack memory
` [PATCH v14 13/26] x86/mm: Shadow Stack page fault error checking
` [PATCH v14 14/26] x86/mm: Update maybe_mkwrite() for shadow stack
` [PATCH v14 15/26] mm: Fixup places that call pte_mkwrite() directly
` [PATCH v14 16/26] mm: Add guard pages around a shadow stack
` [PATCH v14 17/26] mm/mmap: Add shadow stack pages to memory accounting
` [PATCH v14 18/26] mm: Update can_follow_write_pte() for shadow stack
` [PATCH v14 19/26] mm: Re-introduce vm_flags to do_mmap()
` [PATCH v14 20/26] x86/cet/shstk: User-mode shadow stack support
` [PATCH v14 21/26] x86/cet/shstk: Handle signals for shadow stack
` [PATCH v14 22/26] binfmt_elf: Define GNU_PROPERTY_X86_FEATURE_1_AND properties
` [PATCH v14 23/26] ELF: Introduce arch_setup_elf_property()
` [PATCH v14 24/26] x86/cet/shstk: Handle thread shadow stack
` [PATCH v14 25/26] x86/cet/shstk: Add arch_prctl functions for "
` [PATCH v14 26/26] mm: Introduce PROT_SHSTK "

[PATCH v14 0/7] Control-flow Enforcement: Indirect Branch Tracking
 2020-10-12 20:29 UTC  (10+ messages) - mbox.gz / Atom
` [PATCH v14 1/7] x86/cet/ibt: Add Kconfig option for user-mode "
` [PATCH v14 2/7] x86/cet/ibt: User-mode Indirect Branch Tracking support
` [PATCH v14 3/7] x86/cet/ibt: Handle signals for Indirect Branch Tracking
` [PATCH v14 4/7] x86/cet/ibt: ELF header parsing "
` [PATCH v14 5/7] x86/cet/ibt: Update arch_prctl functions "
` [PATCH v14 6/7] x86/vdso/32: Add ENDBR32 to __kernel_vsyscall entry point
` [PATCH v14 7/7] x86/vdso: Insert endbr32/endbr64 to vDSO

[PATCH v21 22/23] LSM: Add /proc attr entry for full LSM context
 2020-10-12 20:19 UTC  - mbox.gz / Atom

[RFC PATCH 0/4] x86: Improve Minimum Alternate Stack Size
 2020-10-12 13:26 UTC  (28+ messages) - mbox.gz / Atom
` [RFC PATCH 1/4] x86/signal: Introduce helpers to get the maximum signal frame size

[PATCH v6 0/6] mm: introduce memfd_secret system call to create "secret" memory areas
 2020-10-11  9:42 UTC  (8+ messages) - mbox.gz / Atom
` [PATCH v6 3/6] "

[PATCH v14 00/26] Control-flow Enforcement: Shadow Stack
 2020-10-09 18:45 UTC  (21+ messages) - mbox.gz / Atom
` [PATCH v14 01/26] Documentation/x86: Add CET description
` [PATCH v14 02/26] x86/cpufeatures: Add CET CPU feature flags for Control-flow Enforcement Technology (CET)
` [PATCH v14 03/26] x86/fpu/xstate: Introduce CET MSR XSAVES supervisor states
` [PATCH v14 04/26] x86/cet: Add control-protection fault handler
` [PATCH v14 05/26] x86/cet/shstk: Add Kconfig option for user-mode Shadow Stack
` [PATCH v14 06/26] x86/mm: Change _PAGE_DIRTY to _PAGE_DIRTY_HW
` [PATCH v14 07/26] x86/mm: Remove _PAGE_DIRTY_HW from kernel RO pages
` [PATCH v14 08/26] x86/mm: Introduce _PAGE_COW
` [PATCH v14 09/26] drm/i915/gvt: Change _PAGE_DIRTY to _PAGE_DIRTY_BITS
` [PATCH v14 10/26] x86/mm: Update pte_modify for _PAGE_COW
` [PATCH v14 11/26] x86/mm: Update ptep_set_wrprotect() and pmdp_set_wrprotect() for transition from _PAGE_DIRTY_HW to _PAGE_COW
` [PATCH v14 12/26] mm: Introduce VM_SHSTK for shadow stack memory
` [PATCH v14 13/26] x86/mm: Shadow Stack page fault error checking
` [PATCH v14 14/26] x86/mm: Update maybe_mkwrite() for shadow stack
` [PATCH v14 15/26] mm: Fixup places that call pte_mkwrite() directly
` [PATCH v14 16/26] mm: Add guard pages around a shadow stack
` [PATCH v14 17/26] mm/mmap: Add shadow stack pages to memory accounting
` [PATCH v14 18/26] mm: Update can_follow_write_pte() for shadow stack
` [PATCH v14 19/26] mm: Re-introduce vm_flags to do_mmap()

[PATCH v13 8/8] x86/vsyscall/64: Fixup Shadow Stack and Indirect Branch Tracking for vsyscall emulation
 2020-10-09 17:42 UTC  (15+ messages) - mbox.gz / Atom

[PATCH v11 0/8] arm64: expose FAR_EL1 tag bits in siginfo
 2020-10-09 15:47 UTC  (11+ messages) - mbox.gz / Atom
` [PATCH v11 1/8] parisc: Drop parisc special case for __sighandler_t
` [PATCH v11 2/8] parisc: start using signal-defs.h
` [PATCH v11 3/8] arch: move SA_* definitions to generic headers
` [PATCH v11 4/8] signal: clear non-uapi flag bits when passing/returning sa_flags
` [PATCH v11 5/8] signal: define the SA_UNSUPPORTED bit in sa_flags
` [PATCH v11 6/8] signal: deduplicate code dealing with common _sigfault fields
` [PATCH v11 7/8] signal: define the field siginfo.si_xflags
` [PATCH v11 8/8] arm64: expose FAR_EL1 tag bits in siginfo

selftests: pidfd: pidfd_wait hangs on linux next kernel on all devices
 2020-10-09  9:58 UTC  (5+ messages) - mbox.gz / Atom

[PATCH ghak90 V9 00/13] audit: implement container identifier
 2020-10-06 20:03 UTC  (6+ messages) - mbox.gz / Atom
` [PATCH ghak90 V9 11/13] audit: contid check descendancy and nesting

page: 

Linux-api Archive on lore.kernel.org

Archives are clonable:
	git clone --mirror https://lore.kernel.org/linux-api/0 linux-api/git/0.git

	# If you have public-inbox 1.1+ installed, you may
	# initialize and index your mirror using the following commands:
	public-inbox-init -V2 linux-api linux-api/ https://lore.kernel.org/linux-api \
		linux-api@vger.kernel.org
	public-inbox-index linux-api

Example config snippet for mirrors

Newsgroup available over NNTP:
	nntp://nntp.lore.kernel.org/org.kernel.vger.linux-api


AGPL code for this site: git clone https://public-inbox.org/public-inbox.git