linux-api.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2014-08-13 07:57:20 to 2014-08-27 02:29:25 UTC [more...]

[PATCH RFC v7 net-next 00/28] BPF syscall
 2014-08-27  2:29 UTC  (12+ messages)
` [PATCH RFC v7 net-next 01/28] net: filter: add "load 64-bit immediate" eBPF instruction
` [PATCH RFC v7 net-next 02/28] net: filter: split filter.h and expose eBPF to user space
` [PATCH RFC v7 net-next 03/28] bpf: introduce syscall(BPF, ...) and BPF maps
` [PATCH RFC v7 net-next 04/28] bpf: enable bpf syscall on x64 and i386
` [PATCH RFC v7 net-next 05/28] bpf: add lookup/update/delete/iterate methods to BPF maps
` [PATCH RFC v7 net-next 06/28] bpf: add hashtable type of "
` [PATCH RFC v7 net-next 07/28] bpf: expand BPF syscall with program load/unload
` [PATCH RFC v7 net-next 08/28] bpf: handle pseudo BPF_CALL insn
` [PATCH RFC v7 net-next 09/28] bpf: verifier (add docs)
` [PATCH RFC v7 net-next 10/28] bpf: verifier (add ability to receive verification log)
` [PATCH RFC v7 net-next 11/28] bpf: handle pseudo BPF_LD_IMM64 insn

[PATCH 1/1] add selftest for virtio-net
 2014-08-27  1:45 UTC 

[PATCH v6 net-next 0/6] introduce BPF syscall
 2014-08-26 16:40 UTC  (24+ messages)
` [PATCH v6 net-next 1/6] net: filter: add "load 64-bit immediate" eBPF instruction
  ` [PATCH v6 net-next 2/6] net: filter: split filter.h and expose eBPF to user space
  ` [PATCH v6 net-next 5/6] bpf: add lookup/update/delete/iterate methods to BPF maps
  ` [PATCH v6 net-next 6/6] bpf: add hashtable type of "
` [PATCH v6 net-next 3/6] bpf: introduce syscall(BPF, ...) and "
` [PATCH v6 net-next 4/6] bpf: enable bpf syscall on x64 and i386

[PATCH v5 net-next 00/29] BPF syscall, maps, verifier, samples, llvm
 2014-08-25 22:07 UTC  (33+ messages)
` [PATCH v5 net-next 01/29] bpf: x86: add missing 'shift by register' instructions to x64 eBPF JIT
` [PATCH v5 net-next 02/29] net: filter: add "load 64-bit immediate" eBPF instruction
` [PATCH v5 net-next 03/29] net: filter: split filter.h and expose eBPF to user space
` [PATCH v5 net-next 04/29] bpf: introduce syscall(BPF, ...) and BPF maps
` [PATCH v5 net-next 10/29] bpf: verifier (add docs)
` [PATCH v5 net-next 11/29] bpf: verifier (add ability to receive verification log)
` [PATCH v5 net-next 13/29] bpf: verifier (add branch/goto checks)
` [PATCH v5 net-next 14/29] bpf: verifier (add verifier core)
` [PATCH v5 net-next 15/29] bpf: verifier (add state prunning optimization)
` [PATCH v5 net-next 16/29] bpf: allow eBPF programs to use maps
` [PATCH v5 net-next 17/29] bpf: split eBPF out of NET
` [PATCH v5 net-next 18/29] tracing: allow eBPF programs to be attached to events
` [PATCH v5 net-next 19/29] tracing: allow eBPF programs call printk()
` [PATCH v5 net-next 20/29] tracing: allow eBPF programs to be attached to kprobe/kretprobe
  ` [PATCH v5 net-next 05/29] bpf: enable bpf syscall on x64 and i386
  ` [PATCH v5 net-next 06/29] bpf: add lookup/update/delete/iterate methods to BPF maps
  ` [PATCH v5 net-next 07/29] bpf: add hashtable type of "
  ` [PATCH v5 net-next 08/29] bpf: expand BPF syscall with program load/unload
  ` [PATCH v5 net-next 09/29] bpf: handle pseudo BPF_CALL insn
  ` [PATCH v5 net-next 12/29] bpf: handle pseudo BPF_LD_IMM64 insn
  ` [PATCH v5 net-next 21/29] tracing: allow eBPF programs to call ktime_get_ns() and get_current()
  ` [PATCH v5 net-next 27/29] samples: bpf: eBPF example in C
` [PATCH v5 net-next 22/29] samples: bpf: add mini eBPF library to manipulate maps and programs
` [PATCH v5 net-next 23/29] samples: bpf: example of tracing filters with eBPF
` [PATCH v5 net-next 24/29] bpf: verifier test
` [PATCH v5 net-next 25/29] bpf: llvm backend
` [PATCH v5 net-next 26/29] samples: bpf: elf file loader
` [PATCH v5 net-next 28/29] samples: bpf: counting eBPF example in C
` [PATCH v5 net-next 29/29] samples: bpf: IO latency analysis (iosnoop/heatmap)

[PATCH V4 0/8] namespaces: log namespaces per task
 2014-08-25 16:50 UTC  (27+ messages)
  ` [PATCH V4 1/8] namespaces: assign each namespace instance a serial number
  ` [PATCH V4 2/8] namespaces: expose namespace instance serial number in proc_ns_operations
  ` [PATCH V4 3/8] namespaces: expose ns instance serial numbers in proc
  ` [PATCH V4 4/8] Documentation: add a section for /proc/<pid>/ns/
  ` [PATCH V4 5/8] namespaces: expose ns_entries
  ` [PATCH V4 6/8] audit: log namespace serial numbers
  ` [PATCH V4 7/8] audit: log creation and deletion of namespace instances
` [PATCH V4 8/8] audit: initialize at subsystem time rather than device time

Pharmacy international
 2014-08-22 13:23 UTC 

[PATCH V3 0/6] namespaces: log namespaces per task
 2014-08-20 17:43 UTC  (4+ messages)

[PATCH RFC v4 net-next 00/26] BPF syscall, maps, verifier, samples, llvm
 2014-08-19 18:39 UTC  (72+ messages)
` [PATCH RFC v4 net-next 01/26] net: filter: add "load 64-bit immediate" eBPF instruction
` [PATCH RFC v4 net-next 03/26] bpf: introduce syscall(BPF, ...) and BPF maps
` [PATCH RFC v4 net-next 09/26] bpf: verifier (add docs)
` [PATCH RFC v4 net-next 10/26] bpf: verifier (add ability to receive verification log)
` [PATCH RFC v4 net-next 14/26] bpf: verifier (add state prunning optimization)
` [PATCH RFC v4 net-next 15/26] bpf: allow eBPF programs to use maps
` [PATCH RFC v4 net-next 16/26] net: sock: allow eBPF programs to be attached to sockets
` [PATCH RFC v4 net-next 17/26] tracing: allow eBPF programs to be attached to events
` [PATCH RFC v4 net-next 18/26] tracing: allow eBPF programs to be attached to kprobe/kretprobe
` [PATCH RFC v4 net-next 19/26] samples: bpf: add mini eBPF library to manipulate maps and programs
` [PATCH RFC v4 net-next 20/26] samples: bpf: example of stateful socket filtering
` [PATCH RFC v4 net-next 21/26] samples: bpf: example of tracing filters with eBPF
` [PATCH RFC v4 net-next 24/26] samples: bpf: eBPF example in C
` [PATCH RFC v4 net-next 25/26] samples: bpf: counting "
` [PATCH RFC v4 net-next 26/26] bpf: verifier test
  ` [PATCH RFC v4 net-next 11/26] bpf: handle pseudo BPF_LD_IMM64 insn
  ` [PATCH RFC v4 net-next 12/26] bpf: verifier (add branch/goto checks)
  ` [PATCH RFC v4 net-next 13/26] bpf: verifier (add verifier core)
  ` [PATCH RFC v4 net-next 22/26] bpf: llvm backend
  ` [PATCH RFC v4 net-next 23/26] samples: bpf: elf file loader

[PATCH v15 0/7] MADV_FREE support
 2014-08-19  2:10 UTC  (10+ messages)
` [PATCH v15 1/7] mm: support madvise(MADV_FREE)
` [PATCH v15 2/7] x86: add pmd_[dirty|mkclean] for THP
` [PATCH v15 3/7] sparc: "
` [PATCH v15 4/7] powerpc: "
` [PATCH v15 5/7] arm: add pmd_mkclean "
` [PATCH v15 6/7] arm64: add pmd_[dirty|mkclean] "
` [PATCH v15 7/7] mm: Don't split THP page when syscall is called

[PATCH v14 0/8] MADV_FREE support
 2014-08-18  0:06 UTC  (14+ messages)
` [PATCH v14 1/8] mm: support madvise(MADV_FREE)
` [PATCH v14 2/8] x86: add pmd_[dirty|mkclean] for THP
` [PATCH v14 3/8] sparc: "
` [PATCH v14 4/8] powerpc: "
` [PATCH v14 5/8] s390: "
` [PATCH v14 6/8] arm: add pmd_mkclean "
` [PATCH v14 7/8] arm64: add pmd_[dirty|mkclean] "
` [PATCH v14 8/8] mm: Don't split THP page when syscall is called

Does anyone know when FUTEX_WAIT can fail with EAGAIN?
 2014-08-17 15:48 UTC  (3+ messages)

[RFC PATCH 00/11] Adding FreeBSD's Capsicum security framework (part 1)
 2014-08-16 15:41 UTC  (8+ messages)

2038 Kernel Summit Discussion Fodder
 2014-08-13 15:37 UTC 

[PATCH 1/4] VFIO: PLATFORM: Add device tree info API and skeleton
 2014-08-13 11:02 UTC 


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).