messages from 2018-11-30 08:00:03 to 2018-12-11 14:36:41 UTC [more...]
[PATCH 0/3] THP eligibility reporting via proc
2018-12-11 14:36 UTC (4+ messages)
` [PATCH 1/3] mm, proc: be more verbose about unstable VMA flags in /proc/<pid>/smaps
` [PATCH 2/3] mm, thp, proc: report THP eligibility for each vma
` [PATCH 3/3] mm, proc: report PR_SET_THP_DISABLE in proc
Can we drop upstream Linux x32 support?
2018-12-11 11:52 UTC (14+ messages)
Security modules and sending signals within the same process
2018-12-11 10:42 UTC (6+ messages)
[RFC PATCH glibc 1/4] glibc: Perform rseq(2) registration at nptl init and thread creation (v4)
2018-12-11 10:40 UTC (5+ messages)
` [RFC PATCH glibc 2/4] glibc: sched_getcpu(): use rseq cpu_id TLS on Linux
Official Linux system wrapper library?
2018-12-10 23:32 UTC (9+ messages)
[PATCH v5 0/5] cgroup: Introducing bypass mode
2018-12-10 21:40 UTC (6+ messages)
` [PATCH v5 1/5] cgroup: subtree_control bypass mode for bypassable controllers
` [PATCH v5 2/5] cgroup: Allow reenabling of controller in bypass mode
` [PATCH v5 3/5] cgroup: Make debug controller report new controller masks
` [PATCH v5 4/5] sched/core: Make cpu cgroup controller bypassable
` [PATCH v5 5/5] cgroup: Document bypass mode
[PATCH v5 00/25] ptrace: add PTRACE_GET_SYSCALL_INFO request
2018-12-10 21:04 UTC (10+ messages)
` [PATCH v5 24/25] "
[PATCH v3 0/2] sysctl: handle overflow for file-max
2018-12-10 17:51 UTC (5+ messages)
[PATCH v10 0/4] seccomp trap to userspace
2018-12-09 18:24 UTC (5+ messages)
` [PATCH v10 1/4] seccomp: hoist struct seccomp_data recalculation higher
` [PATCH v10 2/4] seccomp: switch system call argument type to void *
` [PATCH v10 3/4] seccomp: add a return code to trap to userspace
` [PATCH v10 4/4] samples: add an example of seccomp user trap
[PATCH v5 0/1] signaling processes through pidfds
2018-12-09 8:39 UTC (3+ messages)
` [PATCH v5 1/1] signal: add pidfd_send_signal() syscall
[PATCH v4] signal: add taskfd_send_signal() syscall
2018-12-08 21:46 UTC (38+ messages)
[GIT PULL] asm-generic: bugfix for asm/unistd.h
2018-12-08 19:50 UTC (2+ messages)
[PATCH 0/5] y2038: further system call conversion
2018-12-07 21:18 UTC (6+ messages)
` [PATCH 1/5] y2038: futex: Move compat implementation into futex.c
` [PATCH 2/5] y2038: futex: Add support for __kernel_timespec
` [PATCH 3/5] y2038: socket: Add compat_sys_recvmmsg_time64
` [PATCH 4/5] y2038: signal: Add sys_rt_sigtimedwait_time32
` [PATCH 5/5] y2038: signal: Add compat_sys_rt_sigtimedwait_time64
[RFC PATCH 0/3] THP eligibility reporting via proc
2018-12-07 10:55 UTC (2+ messages)
[PATCH v2] signal: add procfd_signal() syscall
2018-12-06 19:03 UTC (46+ messages)
[PATCH v4 0/5] y2038: Make ppoll, io_pgetevents and pselect y2038 safe
2018-12-06 16:26 UTC (2+ messages)
[PATCH 0/1] Add prctl to kill descendants on exit
2018-12-06 15:54 UTC (16+ messages)
` [PATCH] prctl: add PR_{GET,SET}_KILL_DESCENDANTS_ON_EXIT
` [PATCH v2 0/1] Add prctl to kill descendants on exit
` [PATCH v2 1/1] prctl: add PR_{GET,SET}_KILL_DESCENDANTS_ON_EXIT
[PATCH man-pages] Add rseq manpage
2018-12-06 14:42 UTC
[PATCH v3] signal: add procfd_send_signal() syscall
2018-12-06 3:27 UTC (8+ messages)
pkeys: Reserve PKEY_DISABLE_READ
2018-12-05 20:36 UTC (15+ messages)
[RFC PATCH v4 1/5] glibc: Perform rseq(2) registration at nptl init and thread creation
2018-12-05 17:24 UTC (13+ messages)
[PATCH] Y2038: provide kernel support indication
2018-12-05 15:26 UTC (4+ messages)
[RFC PATCH v6 00/26] Control-flow Enforcement: Shadow Stack
2018-12-04 18:16 UTC (5+ messages)
` [RFC PATCH v6 04/26] x86/fpu/xstate: Introduce XSAVES system states
[PATCH 0/3] Fix unsafe BPF_PROG_TEST_RUN interface
2018-12-04 16:22 UTC (10+ messages)
` [PATCH v4 0/4] "
` [PATCH v4 3/4] libbpf: add bpf_prog_test_run_xattr
` [PATCH v5 0/4] Fix unsafe BPF_PROG_TEST_RUN interface
` [PATCH v5 1/4] bpf: respect size hint to BPF_PROG_TEST_RUN if present
` [PATCH v5 2/4] tools: sync uapi/linux/bpf.h
` [PATCH v5 3/4] libbpf: add bpf_prog_test_run_xattr
` [PATCH v5 4/4] selftests: add a test for bpf_prog_test_run_xattr
[PATCH v9 0/4] seccomp trap to userspace
2018-12-04 2:34 UTC (14+ messages)
` [PATCH v9 1/4] seccomp: hoist struct seccomp_data recalculation higher
` [PATCH v9 2/4] seccomp: switch system call argument type to void *
` [PATCH v9 3/4] seccomp: add a return code to trap to userspace
` [PATCH v9 4/4] samples: add an example of seccomp user trap
[PATCH v4 0/2] ptrace: add PTRACE_GET_SYSCALL_INFO request
2018-11-30 22:53 UTC (11+ messages)
` [PATCH v4 1/2] ptrace: save the type of syscall-stop in ptrace_message
[PATCH v8 0/2] seccomp trap to userspace
2018-11-30 10:17 UTC (4+ messages)
` [PATCH v8 1/2] seccomp: add a return code to "
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).