messages from 2018-11-27 16:50:24 to 2018-12-07 10:55:54 UTC [more...]
[RFC PATCH 0/3] THP eligibility reporting via proc
2018-12-07 10:55 UTC (8+ messages)
` [RFC PATCH 3/3] mm, proc: report PR_SET_THP_DISABLE in proc
[PATCH v4] signal: add taskfd_send_signal() syscall
2018-12-07 1:54 UTC (35+ messages)
[PATCH v2] signal: add procfd_signal() syscall
2018-12-06 19:03 UTC (48+ messages)
[PATCH v4 0/5] y2038: Make ppoll, io_pgetevents and pselect y2038 safe
2018-12-06 16:26 UTC (2+ messages)
[PATCH 0/1] Add prctl to kill descendants on exit
2018-12-06 15:54 UTC (16+ messages)
` [PATCH] prctl: add PR_{GET,SET}_KILL_DESCENDANTS_ON_EXIT
` [PATCH v2 0/1] Add prctl to kill descendants on exit
` [PATCH v2 1/1] prctl: add PR_{GET,SET}_KILL_DESCENDANTS_ON_EXIT
[PATCH man-pages] Add rseq manpage
2018-12-06 14:42 UTC
[PATCH v3] signal: add procfd_send_signal() syscall
2018-12-06 3:27 UTC (8+ messages)
pkeys: Reserve PKEY_DISABLE_READ
2018-12-05 20:36 UTC (15+ messages)
[RFC PATCH v4 1/5] glibc: Perform rseq(2) registration at nptl init and thread creation
2018-12-05 17:24 UTC (13+ messages)
[PATCH] Y2038: provide kernel support indication
2018-12-05 15:26 UTC (4+ messages)
[RFC PATCH glibc 1/4] glibc: Perform rseq(2) registration at nptl init and thread creation (v4)
2018-12-04 19:50 UTC (4+ messages)
` [RFC PATCH glibc 2/4] glibc: sched_getcpu(): use rseq cpu_id TLS on Linux
[RFC PATCH v6 00/26] Control-flow Enforcement: Shadow Stack
2018-12-04 18:16 UTC (5+ messages)
` [RFC PATCH v6 04/26] x86/fpu/xstate: Introduce XSAVES system states
[PATCH 0/3] Fix unsafe BPF_PROG_TEST_RUN interface
2018-12-04 16:22 UTC (20+ messages)
` [PATCH v3 0/4] "
` [PATCH v3 3/4] libbpf: add bpf_prog_test_run_xattr
` [PATCH v4 0/4] Fix unsafe BPF_PROG_TEST_RUN interface
` [PATCH v4 1/4] bpf: respect size hint to BPF_PROG_TEST_RUN if present
` [PATCH v4 2/4] tools: sync uapi/linux/bpf.h
` [PATCH v4 3/4] libbpf: add bpf_prog_test_run_xattr
` [PATCH v4 4/4] selftests: add a test for bpf_prog_test_run_xattr
` [PATCH v5 0/4] Fix unsafe BPF_PROG_TEST_RUN interface
` [PATCH v5 1/4] bpf: respect size hint to BPF_PROG_TEST_RUN if present
` [PATCH v5 2/4] tools: sync uapi/linux/bpf.h
` [PATCH v5 3/4] libbpf: add bpf_prog_test_run_xattr
` [PATCH v5 4/4] selftests: add a test for bpf_prog_test_run_xattr
[PATCH v9 0/4] seccomp trap to userspace
2018-12-04 2:34 UTC (14+ messages)
` [PATCH v9 1/4] seccomp: hoist struct seccomp_data recalculation higher
` [PATCH v9 2/4] seccomp: switch system call argument type to void *
` [PATCH v9 3/4] seccomp: add a return code to trap to userspace
` [PATCH v9 4/4] samples: add an example of seccomp user trap
Security modules and sending signals within the same process
2018-11-30 23:38 UTC (5+ messages)
[PATCH v4 0/2] ptrace: add PTRACE_GET_SYSCALL_INFO request
2018-11-30 22:53 UTC (17+ messages)
` [PATCH v4 1/2] ptrace: save the type of syscall-stop in ptrace_message
` [PATCH v4 2/2] ptrace: add PTRACE_GET_SYSCALL_INFO request
[PATCH v8 0/2] seccomp trap to userspace
2018-11-30 10:17 UTC (4+ messages)
` [PATCH v8 1/2] seccomp: add a return code to "
[PATCH v6 0/1] ns: introduce binfmt_misc namespace
2018-11-29 13:05 UTC (7+ messages)
[PATCH v1 0/2] proc: allow signaling processes via file descriptors
2018-11-28 23:02 UTC (8+ messages)
` [PATCH v1 2/2] signal: add procfd_signal() syscall
` [PATCH] procfd_signal.2: document procfd_signal syscall
extending wait4(2) or waitid(2) linux syscall
2018-11-28 18:50 UTC (8+ messages)
Official Linux system wrapper library?
2018-11-28 13:18 UTC (9+ messages)
[PATCH RESEND v3 0/3] ptrace: add PTRACE_GET_SYSCALL_INFO request
2018-11-28 13:13 UTC (9+ messages)
` [RFC PATCH RESEND v3 3/3] ptrace: add PTRACE_EVENT_SECCOMP support to PTRACE_GET_SYSCALL_INFO
[RFC PATCH v2] ptrace: add PTRACE_GET_SYSCALL_INFO request
2018-11-27 22:28 UTC (8+ messages)
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).