messages from 2021-01-26 09:50:47 to 2021-02-02 16:32:48 UTC [more...]
[PATCH v16 00/11] mm: introduce memfd_secret system call to create "secret" memory areas
2021-02-02 14:42 UTC (56+ messages)
` [PATCH v16 06/11] "
` [PATCH v16 07/11] secretmem: use PMD-size pages to amortize direct map fragmentation
` [PATCH v16 08/11] secretmem: add memcg accounting
[PATCH v28 00/12] Landlock LSM
2021-02-02 16:27 UTC (3+ messages)
` [PATCH v28 04/12] landlock: Add ptrace restrictions
` [PATCH v28 06/12] fs,security: Add sb_delete hook
[PATCH v3 1/1] process_madvise.2: Add process_madvise man page
2021-02-02 10:45 UTC (2+ messages)
[PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
2021-02-02 5:34 UTC (10+ messages)
[PATCH v2 1/1] process_madvise.2: Add process_madvise man page
2021-02-02 3:00 UTC (4+ messages)
[PATCH 0/3 v2] arm64/ptrace: allow to get all registers on syscall traps
2021-02-02 0:11 UTC (5+ messages)
` [PATCH 1/3] arm64/ptrace: don't clobber task registers on syscall entry/exit traps
` [PATCH 2/3] arm64/ptrace: introduce PTRACE_O_ARM64_RAW_REGS
` [PATCH 3/3] selftest/arm64/ptrace: add tests for PTRACE_O_ARM64_RAW_REGS
[PATCH v18 00/25] Control-flow Enforcement: Shadow Stack
2021-02-01 23:14 UTC (46+ messages)
` [PATCH v18 01/25] Documentation/x86: Add CET description
` [PATCH v18 02/25] x86/cet/shstk: Add Kconfig option for user-mode control-flow protection
` [PATCH v18 03/25] x86/cpufeatures: Add CET CPU feature flags for Control-flow Enforcement Technology (CET)
` [PATCH v18 04/25] x86/cpufeatures: Introduce X86_FEATURE_CET and setup functions
` [PATCH v18 05/25] x86/fpu/xstate: Introduce CET MSR and XSAVES supervisor states
` [NEEDS-REVIEW] "
` [PATCH v18 06/25] x86/cet: Add control-protection fault handler
` [PATCH v18 07/25] x86/mm: Remove _PAGE_DIRTY from kernel RO pages
` [PATCH v18 08/25] x86/mm: Introduce _PAGE_COW
` [PATCH v18 09/25] drm/i915/gvt: Change _PAGE_DIRTY to _PAGE_DIRTY_BITS
` [PATCH v18 10/25] x86/mm: Update pte_modify for _PAGE_COW
` [PATCH v18 11/25] x86/mm: Update ptep_set_wrprotect() and pmdp_set_wrprotect() for transition from _PAGE_DIRTY to _PAGE_COW
` [PATCH v18 12/25] mm: Introduce VM_SHSTK for shadow stack memory
` [PATCH v18 13/25] x86/mm: Shadow Stack page fault error checking
` [PATCH v18 14/25] x86/mm: Update maybe_mkwrite() for shadow stack
` [PATCH v18 15/25] mm: Fixup places that call pte_mkwrite() directly
` [PATCH v18 16/25] mm: Add guard pages around a shadow stack
` [PATCH v18 17/25] mm/mmap: Add shadow stack pages to memory accounting
` [PATCH v18 18/25] mm: Update can_follow_write_pte() for shadow stack
` [PATCH v18 19/25] mm: Re-introduce vm_flags to do_mmap()
` [PATCH v18 20/25] x86/cet/shstk: User-mode shadow stack support
` [PATCH v18 21/25] x86/cet/shstk: Handle signals for shadow stack
` [PATCH v18 22/25] ELF: Introduce arch_setup_elf_property()
` [PATCH v18 23/25] x86/cet/shstk: Handle thread shadow stack
` [PATCH v18 24/25] x86/cet/shstk: Add arch_prctl functions for "
` [PATCH v18 25/25] mm: Introduce PROT_SHSTK "
[PATCH v4 0/3] Preventing job distribution to isolated CPUs
2021-02-01 17:50 UTC (16+ messages)
` [Patch v4 1/3] lib: Restrict cpumask_local_spread to houskeeping CPUs
` [EXT] "
[PATCH 0/6] fs-verity: add an ioctl to read verity metadata
2021-02-01 17:41 UTC (18+ messages)
` [PATCH 1/6] fs-verity: factor out fsverity_get_descriptor()
` [PATCH 2/6] fs-verity: don't pass whole descriptor to fsverity_verify_signature()
` [PATCH 3/6] fs-verity: add FS_IOC_READ_VERITY_METADATA ioctl
` [PATCH 4/6] fs-verity: support reading Merkle tree with ioctl
` [PATCH 5/6] fs-verity: support reading descriptor "
` [PATCH 6/6] fs-verity: support reading signature "
[PATCH v2] mm/page_alloc: count CMA pages per zone and print them in /proc/zoneinfo
2021-01-30 8:48 UTC (9+ messages)
` [PATCH v3] "
[PATCH] af_unix: Allow Unix sockets to raise SIGURG
2021-01-29 23:47 UTC (17+ messages)
[PATCH v7 00/10] fs: interface for directly reading/writing compressed data
2021-01-29 16:32 UTC (2+ messages)
[PATCH 1/1] process_madvise.2: Add process_madvise man page
2021-01-29 7:15 UTC (7+ messages)
[PATCH] procfs/dmabuf: Add /proc/<pid>/task/<tid>/dmabuf_fds
2021-01-28 10:01 UTC (11+ messages)
[PATCH v18 0/7] Control-flow Enforcement: Indirect Branch Tracking
2021-01-27 21:30 UTC (8+ messages)
` [PATCH v18 1/7] x86/cet/ibt: Update Kconfig for user-mode "
` [PATCH v18 2/7] x86/cet/ibt: User-mode Indirect Branch Tracking support
` [PATCH v18 3/7] x86/cet/ibt: Handle signals for Indirect Branch Tracking
` [PATCH v18 4/7] x86/cet/ibt: Update ELF header parsing "
` [PATCH v18 5/7] x86/cet/ibt: Update arch_prctl functions "
` [PATCH v18 6/7] x86/vdso/32: Add ENDBR32 to __kernel_vsyscall entry point
` [PATCH v18 7/7] x86/vdso: Insert endbr32/endbr64 to vDSO
[PATCH v27 00/12] Landlock LSM
2021-01-27 19:57 UTC (3+ messages)
` [PATCH v27 07/12] landlock: Support filesystem access-control
[PATCH 1/8] quota: Allow to pass mount path to quotactl
2021-01-27 16:25 UTC (2+ messages)
[PATCH v6 00/40] idmapped mounts
2021-01-27 5:50 UTC (6+ messages)
` [PATCH v6 23/40] exec: handle "
[PATCH v15 03/11] riscv/Kconfig: make direct map manipulation options depend on MMU
2021-01-27 5:46 UTC (2+ messages)
[PATCH] tee: Add -q, --quiet option to not write to stdout
2021-01-27 1:40 UTC (8+ messages)
` [PATCH v3 (resend)] tee: Add -q, --quiet, --silent "
[PATCH v24 14/25] LSM: Specify which LSM to display
2021-01-26 16:41 UTC (2+ messages)
` [PATCH v24 24/25] LSM: Add /proc attr entry for full LSM context
[PATCH v17 00/26] Control-flow Enforcement: Shadow Stack
2021-01-26 16:45 UTC (11+ messages)
` [PATCH v17 11/26] x86/mm: Update ptep_set_wrprotect() and pmdp_set_wrprotect() for transition from _PAGE_DIRTY to _PAGE_COW
[PATCH v6 1/3] arm64: mte: make the per-task SCTLR_EL1 field usable elsewhere
2021-01-26 13:09 UTC (6+ messages)
` [PATCH v6 2/3] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
` [PATCH v6 3/3] arm64: pac: Optimize kernel entry/exit key installation code paths
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).