linux-api.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2018-11-30 08:00:03 to 2018-12-11 14:36:41 UTC [more...]

[PATCH 0/3] THP eligibility reporting via proc
 2018-12-11 14:36 UTC  (4+ messages)
` [PATCH 1/3] mm, proc: be more verbose about unstable VMA flags in /proc/<pid>/smaps
` [PATCH 2/3] mm, thp, proc: report THP eligibility for each vma
` [PATCH 3/3] mm, proc: report PR_SET_THP_DISABLE in proc

Can we drop upstream Linux x32 support?
 2018-12-11 11:52 UTC  (14+ messages)

Security modules and sending signals within the same process
 2018-12-11 10:42 UTC  (6+ messages)

[RFC PATCH glibc 1/4] glibc: Perform rseq(2) registration at nptl init and thread creation (v4)
 2018-12-11 10:40 UTC  (5+ messages)
` [RFC PATCH glibc 2/4] glibc: sched_getcpu(): use rseq cpu_id TLS on Linux

Official Linux system wrapper library?
 2018-12-10 23:32 UTC  (9+ messages)

[PATCH v5 0/5] cgroup: Introducing bypass mode
 2018-12-10 21:40 UTC  (6+ messages)
` [PATCH v5 1/5] cgroup: subtree_control bypass mode for bypassable controllers
` [PATCH v5 2/5] cgroup: Allow reenabling of controller in bypass mode
` [PATCH v5 3/5] cgroup: Make debug controller report new controller masks
` [PATCH v5 4/5] sched/core: Make cpu cgroup controller bypassable
` [PATCH v5 5/5] cgroup: Document bypass mode

[PATCH v5 00/25] ptrace: add PTRACE_GET_SYSCALL_INFO request
 2018-12-10 21:04 UTC  (10+ messages)
` [PATCH v5 24/25] "

[PATCH v3 0/2] sysctl: handle overflow for file-max
 2018-12-10 17:51 UTC  (5+ messages)

[PATCH v10 0/4] seccomp trap to userspace
 2018-12-09 18:24 UTC  (5+ messages)
` [PATCH v10 1/4] seccomp: hoist struct seccomp_data recalculation higher
` [PATCH v10 2/4] seccomp: switch system call argument type to void *
` [PATCH v10 3/4] seccomp: add a return code to trap to userspace
` [PATCH v10 4/4] samples: add an example of seccomp user trap

[PATCH v5 0/1] signaling processes through pidfds
 2018-12-09  8:39 UTC  (3+ messages)
` [PATCH v5 1/1] signal: add pidfd_send_signal() syscall

[PATCH v4] signal: add taskfd_send_signal() syscall
 2018-12-08 21:46 UTC  (38+ messages)

[GIT PULL] asm-generic: bugfix for asm/unistd.h
 2018-12-08 19:50 UTC  (2+ messages)

[PATCH 0/5] y2038: further system call conversion
 2018-12-07 21:18 UTC  (6+ messages)
` [PATCH 1/5] y2038: futex: Move compat implementation into futex.c
` [PATCH 2/5] y2038: futex: Add support for __kernel_timespec
` [PATCH 3/5] y2038: socket: Add compat_sys_recvmmsg_time64
` [PATCH 4/5] y2038: signal: Add sys_rt_sigtimedwait_time32
` [PATCH 5/5] y2038: signal: Add compat_sys_rt_sigtimedwait_time64

[RFC PATCH 0/3] THP eligibility reporting via proc
 2018-12-07 10:55 UTC  (2+ messages)

[PATCH v2] signal: add procfd_signal() syscall
 2018-12-06 19:03 UTC  (46+ messages)

[PATCH v4 0/5] y2038: Make ppoll, io_pgetevents and pselect y2038 safe
 2018-12-06 16:26 UTC  (2+ messages)

[PATCH 0/1] Add prctl to kill descendants on exit
 2018-12-06 15:54 UTC  (16+ messages)
` [PATCH] prctl: add PR_{GET,SET}_KILL_DESCENDANTS_ON_EXIT
  ` [PATCH v2 0/1] Add prctl to kill descendants on exit
    ` [PATCH v2 1/1] prctl: add PR_{GET,SET}_KILL_DESCENDANTS_ON_EXIT

[PATCH man-pages] Add rseq manpage
 2018-12-06 14:42 UTC 

[PATCH v3] signal: add procfd_send_signal() syscall
 2018-12-06  3:27 UTC  (8+ messages)

pkeys: Reserve PKEY_DISABLE_READ
 2018-12-05 20:36 UTC  (15+ messages)

[RFC PATCH v4 1/5] glibc: Perform rseq(2) registration at nptl init and thread creation
 2018-12-05 17:24 UTC  (13+ messages)

[PATCH] Y2038: provide kernel support indication
 2018-12-05 15:26 UTC  (4+ messages)

[RFC PATCH v6 00/26] Control-flow Enforcement: Shadow Stack
 2018-12-04 18:16 UTC  (5+ messages)
` [RFC PATCH v6 04/26] x86/fpu/xstate: Introduce XSAVES system states

[PATCH 0/3] Fix unsafe BPF_PROG_TEST_RUN interface
 2018-12-04 16:22 UTC  (10+ messages)
` [PATCH v4 0/4] "
  ` [PATCH v4 3/4] libbpf: add bpf_prog_test_run_xattr
` [PATCH v5 0/4] Fix unsafe BPF_PROG_TEST_RUN interface
  ` [PATCH v5 1/4] bpf: respect size hint to BPF_PROG_TEST_RUN if present
  ` [PATCH v5 2/4] tools: sync uapi/linux/bpf.h
  ` [PATCH v5 3/4] libbpf: add bpf_prog_test_run_xattr
  ` [PATCH v5 4/4] selftests: add a test for bpf_prog_test_run_xattr

[PATCH v9 0/4] seccomp trap to userspace
 2018-12-04  2:34 UTC  (14+ messages)
` [PATCH v9 1/4] seccomp: hoist struct seccomp_data recalculation higher
` [PATCH v9 2/4] seccomp: switch system call argument type to void *
` [PATCH v9 3/4] seccomp: add a return code to trap to userspace
` [PATCH v9 4/4] samples: add an example of seccomp user trap

[PATCH v4 0/2] ptrace: add PTRACE_GET_SYSCALL_INFO request
 2018-11-30 22:53 UTC  (11+ messages)
` [PATCH v4 1/2] ptrace: save the type of syscall-stop in ptrace_message

[PATCH v8 0/2] seccomp trap to userspace
 2018-11-30 10:17 UTC  (4+ messages)
` [PATCH v8 1/2] seccomp: add a return code to "


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).