Andrea Righi

@arighi

Linux kernel engineer @ Canonical.

Vrijeme pridruživanja: studeni 2008.

Tweetovi

Blokirali ste korisnika/cu @arighi

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @arighi

  1. proslijedio/la je Tweet
    6. stu 2019.

    [$] Filesystem sandboxing with eBPF

    Poništi
  2. proslijedio/la je Tweet
    5. stu 2019.

    [$] Generalizing address-space isolation

    Poništi
  3. proslijedio/la je Tweet
    28. lis 2019.

    KernelCI joins the Linux Foundation

    Poništi
  4. proslijedio/la je Tweet
    Poništi
  5. proslijedio/la je Tweet
    26. lis 2019.
    Poništi
  6. 23. lis 2019.
    Poništi
  7. 25. ruj 2019.

    Nasty caching bug in PM hibernation that can cause memory corruptions on resume:

    Poništi
  8. proslijedio/la je Tweet
    18. ruj 2019.

    Speed up your Linux boot by replacing /dev/random with a symlink to /dev/zero

    Poništi
  9. proslijedio/la je Tweet
    15. kol 2019.

    Nice, cpuid with eax=0x8FFFFFFF on AMD K7 and K8 CPUs returns "IT'S HAMMER TIME" in eax, ebx, ecx and edx

    Poništi
  10. 15. kol 2019.

    Just finished reading 's patch workflow with mutt, - super useful reading for those who have to deal with lots of patches every day!

    Poništi
  11. 11. kol 2019.

    New blog post: "Kernel debugging using QEMU/KVM, virtme and crash"

    Poništi
  12. proslijedio/la je Tweet
    24. srp 2019.

    Canonical's Charmed OpenStack has been selected by for its cloud open source strategy. Read the full announcement here.

    Poništi
  13. proslijedio/la je Tweet
    24. srp 2019.

    And, BTW, (Kconfig for) is in! Given it happened close to the anniversary of another big event, something like this comes to mind as a comment: <<That's one small pull for Linus, one giant leap for the real-time community!>> :-D

    Poništi
  14. 15. srp 2019.

    My talk about eBPF/tracing stuff from LinuxLab 2018

    Poništi
  15. 10. srp 2019.

    Potential deadlock in bcache

    Poništi
  16. proslijedio/la je Tweet
    17. lip 2019.

    The status of Ubuntu kernel updates to address SACK Panic and friends ( CVE-2019-11477, CVE-2019-11478, CVE-2019-11479) can be found here:

    Poništi
  17. proslijedio/la je Tweet
    14. svi 2019.

    "ZombieLoad": a new set of speculative-execution attacks

    Poništi
  18. 27. ožu 2019.

    Potential buffer overflow in openvswitch

    Poništi
  19. proslijedio/la je Tweet
    21. ožu 2019.

    Wanna see where CPU cycles (or cache misses, etc) are being used in BPF programs? Go try it in the tree containing this cset: , perf now annotates BPF programs in record/report or live, in 'perf top', even intermixing the original C source code

    Prikaži ovu nit
    Poništi
  20. 14. ožu 2019.

    btrfs + i386 = nice mix to trigger kernel bugs

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·