linux-doc.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2018-10-01 21:08:02 to 2018-10-03 20:10:57 UTC [more...]

[PATCH security-next v4 00/32] LSM: Explict LSM ordering
 2018-10-03 20:10 UTC  (72+ messages)
` [PATCH security-next v4 01/32] LSM: Correctly announce start of LSM initialization
` [PATCH security-next v4 02/32] vmlinux.lds.h: Avoid copy/paste of security_init section
` [PATCH security-next v4 03/32] LSM: Rename .security_initcall section to .lsm_info
` [PATCH security-next v4 04/32] LSM: Remove initcall tracing
` [PATCH security-next v4 05/32] LSM: Convert from initcall to struct lsm_info
` [PATCH security-next v4 06/32] vmlinux.lds.h: Move LSM_TABLE into INIT_DATA
` [PATCH security-next v4 07/32] LSM: Convert security_initcall() into DEFINE_LSM()
` [PATCH security-next v4 08/32] LSM: Record LSM name in struct lsm_info
` [PATCH security-next v4 09/32] LSM: Provide init debugging infrastructure
` [PATCH security-next v4 10/32] LSM: Don't ignore initialization failures
` [PATCH security-next v4 11/32] LSM: Introduce LSM_FLAG_LEGACY_MAJOR
` [PATCH security-next v4 12/32] LSM: Provide separate ordered initialization
` [PATCH security-next v4 13/32] LoadPin: Rename "enable" to "enforce"
` [PATCH security-next v4 14/32] LSM: Plumb visibility into optional "enabled" state
` [PATCH security-next v4 15/32] LSM: Lift LSM selection out of individual LSMs
` [PATCH security-next v4 16/32] LSM: Prepare for arbitrary LSM enabling
` [PATCH security-next v4 17/32] LSM: Introduce CONFIG_LSM_ENABLE
` [PATCH security-next v4 18/32] LSM: Introduce lsm.enable= and lsm.disable=
` [PATCH security-next v4 19/32] LSM: Prepare for reorganizing "security=" logic
` [PATCH security-next v4 20/32] LSM: Refactor "security=" in terms of enable/disable
` [PATCH security-next v4 21/32] LSM: Finalize centralized LSM enabling logic
` [PATCH security-next v4 22/32] apparmor: Remove boot parameter
` [PATCH security-next v4 23/32] selinux: "
` [PATCH security-next v4 24/32] LSM: Build ordered list of ordered LSMs for init
` [PATCH security-next v4 25/32] LSM: Introduce CONFIG_LSM_ORDER
` [PATCH security-next v4 26/32] LSM: Introduce "lsm.order=" for boottime ordering
` [PATCH security-next v4 27/32] LoadPin: Initialize as ordered LSM
` [PATCH security-next v4 28/32] Yama: "
` [PATCH security-next v4 29/32] LSM: Introduce enum lsm_order
` [PATCH security-next v4 30/32] capability: Initialize as LSM_ORDER_FIRST
` [PATCH security-next v4 31/32] LSM: Separate idea of "major" LSM from "exclusive" LSM
` [PATCH security-next v4 32/32] LSM: Add all exclusive LSMs to ordered initialization

[RFC PATCH v4 0/9] Control Flow Enforcement: Branch Tracking, PTRACE
 2018-10-03 19:57 UTC  (5+ messages)
` [RFC PATCH v4 2/9] x86/cet/ibt: User-mode indirect branch tracking support
` [RFC PATCH v4 3/9] x86/cet/ibt: Add IBT legacy code bitmap allocation function

[PATCH v8 00/10] Add the I3C subsystem
 2018-10-03 19:06 UTC  (15+ messages)
` [PATCH v8 02/10] docs: driver-api: Add I3C documentation
` [PATCH v8 03/10] i3c: Add sysfs ABI spec
` [PATCH v8 04/10] dt-bindings: i3c: Document core bindings
` [PATCH v8 05/10] dt-bindings: i3c: Add macros to help fill I3C/I2C device's reg property
` [PATCH v8 06/10] MAINTAINERS: Add myself as the I3C subsystem maintainer
` [PATCH v8 07/10] i3c: master: Add driver for Cadence IP
` [PATCH v8 08/10] dt-bindings: i3c: Document Cadence I3C master bindings
` [PATCH v8 09/10] gpio: Add a driver for Cadence I3C GPIO expander
` [PATCH v8 10/10] dt-bindings: gpio: Add bindings for Cadence I3C gpio expander

[RFC PATCH v4 00/27] Control Flow Enforcement: Shadow Stack
 2018-10-03 17:57 UTC  (37+ messages)
` [RFC PATCH v4 02/27] x86/fpu/xstate: Change some names to separate XSAVES system and user states
` [RFC PATCH v4 03/27] x86/fpu/xstate: Enable XSAVES system states
` [RFC PATCH v4 06/27] x86/cet: Control protection exception handler
` [RFC PATCH v4 09/27] x86/mm: Change _PAGE_DIRTY to _PAGE_DIRTY_HW
` [RFC PATCH v4 10/27] drm/i915/gvt: Update _PAGE_DIRTY to _PAGE_DIRTY_BITS
` [RFC PATCH v4 18/27] x86/cet/shstk: User-mode shadow stack support
` [RFC PATCH v4 19/27] x86/cet/shstk: Introduce WRUSS instruction
` [RFC PATCH v4 20/27] x86/cet/shstk: Signal handling for shadow stack
` [RFC PATCH v4 24/27] mm/mmap: Create a guard area between VMAs
` [RFC PATCH v4 26/27] x86/cet/shstk: Add arch_prctl functions for Shadow Stack

[PATCH v7 0/8] arm64: untag user pointers passed to the kernel
 2018-10-03 17:32 UTC  (11+ messages)
` [PATCH v7 1/8] arm64: add type casts to untagged_addr macro
` [PATCH v7 2/8] uaccess: add untagged_addr definition for other arches
` [PATCH v7 3/8] arm64: untag user addresses in access_ok and __uaccess_mask_ptr
` [PATCH v7 4/8] mm, arm64: untag user addresses in mm/gup.c
` [PATCH v7 5/8] lib, arm64: untag addrs passed to strncpy_from_user and strnlen_user
` [PATCH v7 6/8] fs, arm64: untag user address in copy_mount_options
` [PATCH v7 7/8] arm64: update Documentation/arm64/tagged-pointers.txt
` [PATCH v7 8/8] selftests, arm64: add a selftest for passing tagged pointers to kernel

[GIT PULL linux-next] Add Compiler Attributes tree
 2018-10-03 15:33 UTC  (14+ messages)

[PATCH v5 04/21] dt-bindings: Add doc for the Ingenic TCU drivers
 2018-10-03 13:02 UTC 

[RESEND PATCH v5 0/9] extend PWM framework to support PWM modes
 2018-10-03 12:49 UTC  (3+ messages)

[PATCH v5 04/21] dt-bindings: Add doc for the Ingenic TCU drivers
 2018-10-03 12:47 UTC 

[PATCH] tools/pci: Change pcitest compiling process
 2018-10-03 10:44 UTC  (3+ messages)

[PATCH v2 0/3] x86/mm/doc: Clean up mm.txt
 2018-10-03  8:45 UTC  (7+ messages)
` [PATCH v2 1/3] x86/KASLR: Update document about KERNEL_IMAGE_SIZE
` [PATCH v2 2/3] x86/mm/doc: Clean up the memory region layout descriptions

[PATCH] yama: clarify ptrace_scope=2 in Yama documentation
 2018-10-02 21:08 UTC  (5+ messages)

[PATCH v12 0/9] cpuset: Enable cpuset controller in default hierarchy
 2018-10-02 20:44 UTC  (6+ messages)
` [PATCH v12 9/9] cpuset: Support forced turning off of partition flag

[PATCH v8 0/5] ipc: IPCMNI limit check for *mni & increase that limit
 2018-10-02 17:43 UTC  (6+ messages)
` [PATCH v8 3/5] ipc: Allow boot time extension of IPCMNI from 32k to 2M

[PATCH v9 0/2] Add an initial DT binding doc for ina3221
 2018-10-02 17:07 UTC  (5+ messages)
` [PATCH v9 1/2] dt-bindings: hwmon: Add ina3221 documentation
` [PATCH v9 2/2] hwmon: (ina3221) Read channel input source info from DT

[PATCH v9 00/20] kasan: add software tag-based mode for arm64
 2018-10-02 13:42 UTC  (3+ messages)
` [PATCH v9 19/20] kasan: update documentation

[PATCH v6 00/11] arm64: untag user pointers passed to the kernel
 2018-10-02 13:19 UTC  (10+ messages)
` [PATCH v6 11/11] arm64: annotate user pointers casts detected by sparse

[PATCH v2] nvmem: fix nvmem_cell_get_from_lookup()
 2018-10-02  9:43 UTC 

[PATCH] nvmem: fix nvmem_cell_get_from_lookup()
 2018-10-02  9:43 UTC  (2+ messages)

[PATCH] doc:it_IT: add some process/* translations
 2018-10-02  8:43 UTC  (3+ messages)

[PATCH security-next v3 00/29] LSM: Explict LSM ordering
 2018-10-01 23:57 UTC  (48+ messages)
` [PATCH security-next v3 04/29] LSM: Remove initcall tracing
` [PATCH security-next v3 05/29] LSM: Convert from initcall to struct lsm_info
` [PATCH security-next v3 06/29] vmlinux.lds.h: Move LSM_TABLE into INIT_DATA
` [PATCH security-next v3 07/29] LSM: Convert security_initcall() into DEFINE_LSM()
` [PATCH security-next v3 08/29] LSM: Record LSM name in struct lsm_info
` [PATCH security-next v3 09/29] LSM: Provide init debugging infrastructure
` [PATCH security-next v3 10/29] LSM: Don't ignore initialization failures
` [PATCH security-next v3 11/29] LSM: Introduce LSM_FLAG_LEGACY_MAJOR
` [PATCH security-next v3 12/29] LSM: Provide separate ordered initialization
` [PATCH security-next v3 13/29] LoadPin: Rename "enable" to "enforce"
` [PATCH security-next v3 14/29] LSM: Plumb visibility into optional "enabled" state
` [PATCH security-next v3 15/29] LSM: Lift LSM selection out of individual LSMs
` [PATCH security-next v3 16/29] LSM: Prepare for arbitrary LSM enabling
` [PATCH security-next v3 17/29] LSM: Introduce CONFIG_LSM_ENABLE
` [PATCH security-next v3 18/29] LSM: Introduce lsm.enable= and lsm.disable=
` [PATCH security-next v3 19/29] LSM: Prepare for reorganizing "security=" logic


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).