messages from 2018-04-04 01:13:10 to 2018-04-17 14:34:37 UTC [more...]
[PATCH bpf-next v3 0/8] bpf: document eBPF helpers and add a script to generate man page
2018-04-17 14:34 UTC (8+ messages)
` [PATCH bpf-next v3 1/8] bpf: add script and prepare bpf.h for new helpers documentation
` [PATCH bpf-next v3 2/8] bpf: add documentation for eBPF helpers (01-11)
` [PATCH bpf-next v3 3/8] bpf: add documentation for eBPF helpers (12-22)
` [PATCH bpf-next v3 4/8] bpf: add documentation for eBPF helpers (23-32)
` [PATCH bpf-next v3 5/8] bpf: add documentation for eBPF helpers (33-41)
` [PATCH bpf-next v3 6/8] bpf: add documentation for eBPF helpers (42-50)
` [PATCH bpf-next v3 7/8] bpf: add documentation for eBPF helpers (51-57)
[PATCH 2/2] crypt.3, encrypt.3: Add notes about _XOPEN_CRYPT
2018-04-17 13:31 UTC (12+ messages)
[PATCH] mmap.2: MAP_FIXED is okay if the address range has been reserved
2018-04-17 6:23 UTC (23+ messages)
[PATCH 1/2] posixoptions.7: Expand XSI Options groups
2018-04-16 1:17 UTC (5+ messages)
[PATCH 00/24] security: Add kernel lockdown
2018-04-13 20:22 UTC (55+ messages)
` [PATCH 01/24] Add the ability to lock down access to the running kernel image
` [PATCH 02/24] Add a SysRq option to lift kernel lockdown
` [PATCH 03/24] ima: require secure_boot rules in lockdown mode
` [PATCH 04/24] Enforce module signatures if the kernel is locked down
` [PATCH 05/24] Restrict /dev/{mem, kmem, port} when "
` [PATCH 06/24] kexec_load: Disable at runtime if "
` [PATCH 07/24] hibernate: Disable when "
` [PATCH 08/24] uswsusp: "
` [PATCH 09/24] PCI: Lock down BAR access "
` [PATCH 10/24] x86: Lock down IO port "
` [PATCH 11/24] x86/msr: Restrict MSR "
` [PATCH 12/24] ACPI: Limit access to custom_method "
` [PATCH 13/24] acpi: Ignore acpi_rsdp kernel param when the kernel has been "
` [PATCH 14/24] acpi: Disable ACPI table override if the kernel is "
` [PATCH 15/24] acpi: Disable APEI error injection "
` [PATCH 16/24] Prohibit PCMCIA CIS storage when "
` [PATCH 17/24] Lock down TIOCSSERIAL
` [PATCH 18/24] Lock down module params that specify hardware parameters (eg. ioport)
` [PATCH 19/24] x86/mmiotrace: Lock down the testmmiotrace module
` [PATCH 20/24] Lock down /proc/kcore
` [PATCH 21/24] Lock down kprobes
` [PATCH 22/24] bpf: Restrict kernel image access functions when the kernel is locked down
` [PATCH 23/24] Lock down perf
` [PATCH 24/24] debugfs: Restrict debugfs when the kernel is locked down
[RFC bpf-next v2 0/8] bpf: document eBPF helpers and add a script to generate man page
2018-04-13 18:18 UTC (20+ messages)
` [RFC bpf-next v2 1/8] bpf: add script and prepare bpf.h for new helpers documentation
` [RFC bpf-next v2 2/8] bpf: add documentation for eBPF helpers (01-11)
` [RFC bpf-next v2 3/8] bpf: add documentation for eBPF helpers (12-22)
` [RFC bpf-next v2 4/8] bpf: add documentation for eBPF helpers (23-32)
` [RFC bpf-next v2 5/8] bpf: add documentation for eBPF helpers (33-41)
` [RFC bpf-next v2 6/8] bpf: add documentation for eBPF helpers (42-50)
` [RFC bpf-next v2 7/8] bpf: add documentation for eBPF helpers (51-57)
` [RFC bpf-next v2 8/8] bpf: add documentation for eBPF helpers (58-64)
[PATCH] getcwd.3: Mention that "(unreachable)" is no longer returned for glibc > 2.27
2018-04-12 11:50 UTC (2+ messages)
[PATCH] readv.2, io_submit.2: Document RWF_APPEND added in Linux 4.16
2018-04-12 9:11 UTC (4+ messages)
` [PATCH v2] "
[RFC bpf-next] bpf: document eBPF helpers and add a script to generate man page
2018-04-10 10:21 UTC (12+ messages)
[GIT PULL] Kernel lockdown for secure boot
2018-04-09 13:55 UTC (7+ messages)
[GIT PULL] Kernel lockdown for secure boot
2018-04-08 22:00 UTC (90+ messages)
An actual suggestion (Re: [GIT PULL] Kernel lockdown for secure boot)
2018-04-05 16:11 UTC (12+ messages)
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).