Eugene Syromiatnikov ([email protected])

Number of posts: 197 (0.11 per day)
First post: 2017-08-28 15:32:11
Last post: 2022-06-08 14:20:05

Date List Subject
2022-06-08 14:20:05 linux-kernel Re: [PATCH v2 2/2] tee: remove flags TEE_IOCTL_SHM_MAPPED and TEE_IOCTL_SHM_DMA_BUF
2022-06-08 10:36:18 linux-kernel Re: [PATCH V12 02/20] uapi: always define F_GETLK64/F_SETLK64/F_SETLKW64 in fcntl.h
2022-05-23 07:11:53 linux-kernel Re: [PATCH bpf-next v3 4/4] bpf_trace: pass array of u64 values in kprobe_multi.addrs
2022-05-23 06:35:37 linux-kernel Re: [PATCH bpf-next v3 4/4] bpf_trace: pass array of u64 values in kprobe_multi.addrs
2022-05-23 06:08:35 linux-kernel [PATCH bpf v4 1/3] bpf_trace: check size for overflow in bpf_kprobe_multi_link_attach
2022-05-21 03:14:17 linux-kernel [PATCH bpf v4 3/3] libbpf, selftests/bpf: pass array of u64 values in kprobe_multi.addrs
2022-05-20 18:32:10 linux-kernel [PATCH bpf v4 0/3] Fix kprobe_multi interface issues for 5.18
2022-05-20 04:53:59 linux-kernel [PATCH bpf v4 2/3] bpf_trace: bail out from bpf_kprobe_multi_link_attach when in compat
2022-05-20 04:46:07 linux-kernel Re: [PATCH bpf-next v3 1/4] bpf_trace: check size for overflow in bpf_kprobe_multi_link_attach
2022-05-18 20:04:42 linux-kernel Re: [PATCH bpf v3 2/2] bpf_trace: bail out from bpf_kprobe_multi_link_attach when in compat
2022-05-18 20:00:38 linux-kernel Re: [PATCH bpf v3 1/2] bpf_trace: check size for overflow in bpf_kprobe_multi_link_attach
2022-05-18 12:47:01 linux-kernel Re: [PATCH bpf-next v3 4/4] bpf_trace: pass array of u64 values in kprobe_multi.addrs
2022-05-18 12:25:57 linux-kernel [PATCH bpf v3 2/2] bpf_trace: bail out from bpf_kprobe_multi_link_attach when in compat
2022-05-18 12:25:52 linux-kernel [PATCH bpf v3 1/2] bpf_trace: check size for overflow in bpf_kprobe_multi_link_attach
2022-05-18 12:25:50 linux-kernel [PATCH bpf v3 0/2] Fix kprobe_multi interface issues for 5.18
2022-05-18 04:26:19 linux-kernel Re: [PATCH bpf-next v3 4/4] bpf_trace: pass array of u64 values in kprobe_multi.addrs
2022-05-17 14:12:29 linux-kernel [PATCH bpf-next v3 1/4] bpf_trace: check size for overflow in bpf_kprobe_multi_link_attach
2022-05-17 13:23:00 linux-kernel [PATCH bpf-next v3 4/4] bpf_trace: pass array of u64 values in kprobe_multi.addrs
2022-05-17 13:11:58 linux-kernel [PATCH bpf-next v3 3/4] bpf_trace: handle compat in copy_user_syms
2022-05-17 10:12:05 linux-kernel [PATCH bpf-next v3 2/4] bpf_trace: support 32-bit kernels in bpf_kprobe_multi_link_attach
2022-05-17 10:08:30 linux-kernel [PATCH bpf-next v3 0/4] Fix 32-bit arch and compat support for the kprobe_multi attach type
2022-05-17 06:52:47 linux-kernel [PATCH bpf 0/4] Fix 32-bit arch and compat support for the kprobe_multi attach type
2022-05-17 03:30:51 linux-kernel [PATCH bpf v2 2/4] bpf_trace: support 32-bit kernels in bpf_kprobe_multi_link_attach
2022-05-17 03:28:07 linux-kernel [PATCH bpf v2 0/4] Fix 32-bit arch and compat support for the kprobe_multi attach type
2022-05-17 01:41:17 linux-kernel [PATCH bpf v2 1/4] bpf_trace: check size for overflow in bpf_kprobe_multi_link_attach
2022-05-17 01:26:10 linux-kernel [PATCH bpf 3/4] bpf_trace: handle compat in kprobe_multi_resolve_syms
2022-05-17 01:18:00 linux-kernel Re: [PATCH bpf 1/4] bpf_trace: check size for overflow in bpf_kprobe_multi_link_attach
2022-05-17 00:49:51 linux-kernel [PATCH bpf 4/4] bpf_trace: pass array of u64 values in kprobe_multi.addrs
2022-05-17 00:41:18 linux-kernel [PATCH bpf v2 4/4] bpf_trace: pass array of u64 values in kprobe_multi.addrs
2022-05-17 00:14:44 linux-kernel [PATCH bpf v2 3/4] bpf_trace: handle compat in kprobe_multi_resolve_syms
2022-05-17 00:09:41 linux-kernel [PATCH bpf 1/4] bpf_trace: check size for overflow in bpf_kprobe_multi_link_attach
2022-05-16 19:53:57 linux-kernel [PATCH bpf 2/4] bpf_trace: support 32-bit kernels in bpf_kprobe_multi_link_attach
2022-05-16 19:44:22 linux-kernel [PATCH bpf 0/4] Fix 32-bit arch and compat support for the kprobe_multi attach type
2022-05-10 22:13:28 linux-kernel Re: [PATCH bpf] bpf_trace: bail out from bpf_kprobe_multi_link_attach when in compat
2022-05-09 07:00:16 linux-kernel [PATCH bpf] bpf_trace: bail out from bpf_kprobe_multi_link_attach when in compat
2022-05-02 17:05:55 linux-kernel [PATCH] io_uring: check that data field is 0 in ringfd unregister
2022-04-06 15:42:39 linux-kernel [PATCH] io_uring: implement compat handling for IORING_REGISTER_IOWQ_AFF
2021-11-03 20:44:10 linux-kernel [PATCH net-next v2 2/2] mctp: handle the struct sockaddr_mctp_ext padding field
2021-11-03 19:11:40 linux-kernel [PATCH net-next v2 1/2] mctp: handle the struct sockaddr_mctp padding fields
2021-11-03 19:11:27 linux-kernel [PATCH net-next v2 0/2] MCTP sockaddr padding check/initialisation fixup
2021-11-02 08:54:58 linux-kernel Re: [PATCH net-next 0/2] MCTP sockaddr padding check/initialisation fixup
2021-11-01 18:00:33 linux-kernel [PATCH net-next 2/2] mctp: handle the struct sockaddr_mctp_ext padding field
2021-11-01 17:57:15 linux-kernel [PATCH net-next 1/2] mctp: handle the struct sockaddr_mctp padding fields
2021-11-01 17:57:11 linux-kernel [PATCH net-next 0/2] MCTP sockaddr padding check/initialisation fixup
2021-09-14 00:40:09 linux-kernel [PATCH v3] io-wq: provide IO_WQ_* constants for IORING_REGISTER_IOWQ_MAX_WORKERS arg items
2021-09-13 15:54:28 linux-kernel Re: [PATCH v2] io-wq: expose IO_WQ_ACCT_* enumeration items to UAPI
2021-09-13 10:42:12 linux-kernel [PATCH v2] io-wq: expose IO_WQ_ACCT_* enumeration items to UAPI
2021-09-13 10:37:51 linux-kernel Re: [PATCH v2] include/uapi/linux/xfrm.h: Fix XFRM_MSG_MAPPING ABI breakage
2021-09-12 12:26:05 linux-kernel [PATCH] io-wq: expose IO_WQ_ACCT_* enumeration items to UAPI
2021-09-12 12:24:49 linux-kernel [PATCH v2] include/uapi/linux/xfrm.h: Fix XFRM_MSG_MAPPING ABI breakage
2021-09-02 16:13:01 linux-kernel Re: [PATCH 1/2] net: Remove net/ipx.h and uapi/linux/ipx.h header files