linux-arch.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2018-10-02 00:54:40 to 2018-10-02 22:41:05 UTC [more...]

[PATCH v22 0/6] Add io{read|write}64 to io-64-atomic headers
 2018-10-02 22:41 UTC  (4+ messages)
` [PATCH v22 1/6] iomap: Use non-raw io functions for io{read|write}XXbe
` [PATCH v22 2/6] parisc: iomap: introduce io{read|write}64
` [PATCH v22 3/6] iomap: introduce io{read|write}64_{lo_hi|hi_lo}

[RFC PATCH v4 00/27] Control Flow Enforcement: Shadow Stack
 2018-10-02 17:15 UTC  (11+ messages)
` [RFC PATCH v4 02/27] x86/fpu/xstate: Change some names to separate XSAVES system and user states
` [RFC PATCH v4 03/27] x86/fpu/xstate: Enable XSAVES system states

[PATCH security-next v4 00/32] LSM: Explict LSM ordering
 2018-10-02 22:06 UTC  (99+ messages)
` [PATCH security-next v4 01/32] LSM: Correctly announce start of LSM initialization
` [PATCH security-next v4 02/32] vmlinux.lds.h: Avoid copy/paste of security_init section
` [PATCH security-next v4 03/32] LSM: Rename .security_initcall section to .lsm_info
` [PATCH security-next v4 04/32] LSM: Remove initcall tracing
` [PATCH security-next v4 05/32] LSM: Convert from initcall to struct lsm_info
` [PATCH security-next v4 06/32] vmlinux.lds.h: Move LSM_TABLE into INIT_DATA
` [PATCH security-next v4 07/32] LSM: Convert security_initcall() into DEFINE_LSM()
` [PATCH security-next v4 08/32] LSM: Record LSM name in struct lsm_info
` [PATCH security-next v4 09/32] LSM: Provide init debugging infrastructure
` [PATCH security-next v4 10/32] LSM: Don't ignore initialization failures
` [PATCH security-next v4 11/32] LSM: Introduce LSM_FLAG_LEGACY_MAJOR
` [PATCH security-next v4 12/32] LSM: Provide separate ordered initialization
` [PATCH security-next v4 13/32] LoadPin: Rename "enable" to "enforce"
` [PATCH security-next v4 14/32] LSM: Plumb visibility into optional "enabled" state
` [PATCH security-next v4 15/32] LSM: Lift LSM selection out of individual LSMs
` [PATCH security-next v4 16/32] LSM: Prepare for arbitrary LSM enabling
` [PATCH security-next v4 17/32] LSM: Introduce CONFIG_LSM_ENABLE
` [PATCH security-next v4 18/32] LSM: Introduce lsm.enable= and lsm.disable=
` [PATCH security-next v4 19/32] LSM: Prepare for reorganizing "security=" logic
` [PATCH security-next v4 20/32] LSM: Refactor "security=" in terms of enable/disable
` [PATCH security-next v4 21/32] LSM: Finalize centralized LSM enabling logic
` [PATCH security-next v4 22/32] apparmor: Remove boot parameter
` [PATCH security-next v4 23/32] selinux: "
` [PATCH security-next v4 24/32] LSM: Build ordered list of ordered LSMs for init
` [PATCH security-next v4 25/32] LSM: Introduce CONFIG_LSM_ORDER
` [PATCH security-next v4 26/32] LSM: Introduce "lsm.order=" for boottime ordering
` [PATCH security-next v4 27/32] LoadPin: Initialize as ordered LSM
` [PATCH security-next v4 28/32] Yama: "
` [PATCH security-next v4 29/32] LSM: Introduce enum lsm_order
` [PATCH security-next v4 30/32] capability: Initialize as LSM_ORDER_FIRST
` [PATCH security-next v4 31/32] LSM: Separate idea of "major" LSM from "exclusive" LSM
` [PATCH security-next v4 32/32] LSM: Add all exclusive LSMs to ordered initialization

[PATCH v2 0/3] System call table generation support
 2018-10-02 14:06 UTC  (4+ messages)
` [PATCH v2 3/3] microblaze: uapi header and system call table file generation

[PATCH v6 00/11] arm64: untag user pointers passed to the kernel
 2018-10-02 13:19 UTC  (11+ messages)
` [PATCH v6 11/11] arm64: annotate user pointers casts detected by sparse

[PATCH v7 0/8] arm64: untag user pointers passed to the kernel
 2018-10-02 13:12 UTC  (18+ messages)
` [PATCH v7 1/8] arm64: add type casts to untagged_addr macro
` [PATCH v7 2/8] uaccess: add untagged_addr definition for other arches
` [PATCH v7 3/8] arm64: untag user addresses in access_ok and __uaccess_mask_ptr
` [PATCH v7 4/8] mm, arm64: untag user addresses in mm/gup.c
` [PATCH v7 5/8] lib, arm64: untag addrs passed to strncpy_from_user and strnlen_user
` [PATCH v7 6/8] fs, arm64: untag user address in copy_mount_options
` [PATCH v7 7/8] arm64: update Documentation/arm64/tagged-pointers.txt
` [PATCH v7 8/8] selftests, arm64: add a selftest for passing tagged pointers to kernel

[PATCH memory-model 0/5] Updates to the formal memory model
 2018-10-02  8:28 UTC  (3+ messages)

[RESEND PATCH v4 0/8] Introduce the for_each_set_clump macro
 2018-10-02  8:21 UTC  (24+ messages)
` [RESEND PATCH v4 1/8] bitops: "
` [RESEND PATCH v4 2/8] lib/test_bitmap.c: Add for_each_set_clump test cases
` [RESEND PATCH v4 3/8] gpio: 104-dio-48e: Utilize for_each_set_clump macro
` [RESEND PATCH v4 4/8] gpio: 104-idi-48: "
` [RESEND PATCH v4 5/8] gpio: gpio-mm: "
` [RESEND PATCH v4 6/8] gpio: ws16c48: "
` [RESEND PATCH v4 7/8] gpio: pci-idio-16: "
` [RESEND PATCH v4 8/8] gpio: pcie-idio-24: "

[PATCH 0/3] namei: implement various scoping AT_* flags
 2018-10-02  7:32 UTC  (12+ messages)
` [PATCH 2/3] namei: implement AT_THIS_ROOT chroot-like path resolution

[PATCH net-next v6 01/23] asm: simd context helper API
 2018-10-02  7:18 UTC  (14+ messages)

[PATCH 0/3] System call table generation support
 2018-10-02  7:07 UTC  (6+ messages)
` [PATCH 1/3] microblaze: Replace NR_syscalls macro from asm/unistd.h

[PATCH security-next v3 00/29] LSM: Explict LSM ordering
 2018-10-01 23:57 UTC  (96+ messages)
` [PATCH security-next v3 01/29] LSM: Correctly announce start of LSM initialization
` [PATCH security-next v3 02/29] vmlinux.lds.h: Avoid copy/paste of security_init section
` [PATCH security-next v3 03/29] LSM: Rename .security_initcall section to .lsm_info
` [PATCH security-next v3 04/29] LSM: Remove initcall tracing
` [PATCH security-next v3 05/29] LSM: Convert from initcall to struct lsm_info
` [PATCH security-next v3 06/29] vmlinux.lds.h: Move LSM_TABLE into INIT_DATA
` [PATCH security-next v3 07/29] LSM: Convert security_initcall() into DEFINE_LSM()
` [PATCH security-next v3 08/29] LSM: Record LSM name in struct lsm_info
` [PATCH security-next v3 09/29] LSM: Provide init debugging infrastructure
` [PATCH security-next v3 10/29] LSM: Don't ignore initialization failures
` [PATCH security-next v3 11/29] LSM: Introduce LSM_FLAG_LEGACY_MAJOR
` [PATCH security-next v3 12/29] LSM: Provide separate ordered initialization
` [PATCH security-next v3 13/29] LoadPin: Rename "enable" to "enforce"
` [PATCH security-next v3 14/29] LSM: Plumb visibility into optional "enabled" state
` [PATCH security-next v3 15/29] LSM: Lift LSM selection out of individual LSMs
` [PATCH security-next v3 16/29] LSM: Prepare for arbitrary LSM enabling
` [PATCH security-next v3 17/29] LSM: Introduce CONFIG_LSM_ENABLE
` [PATCH security-next v3 18/29] LSM: Introduce lsm.enable= and lsm.disable=
` [PATCH security-next v3 19/29] LSM: Prepare for reorganizing "security=" logic

[PATCH v3 0/5] System call table generation support
 2018-10-01 22:52 UTC  (4+ messages)
` [PATCH v3 3/5] m68k: add system "

[PATCH v6 00/16] Add support for Hygon Dhyana Family 18h processor
 2018-10-01 19:38 UTC  (4+ messages)
` [PATCH v6 16/16] cpupower, x86: Add Hygon Dhyana support


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).