messages from 2018-01-24 18:20:10 to 2018-01-31 03:22:12 UTC [more...]
[PATCH v6 00/13] spectre variant1 mitigations for tip/x86/pti
2018-01-31 3:22 UTC (27+ messages)
` [PATCH v6 01/13] Documentation: document array_index_nospec
` [PATCH v6 02/13] array_index_nospec: sanitize speculative array de-references
` [PATCH v6 03/13] x86: implement array_index_mask_nospec
` [PATCH v6 04/13] x86: introduce barrier_nospec
` [PATCH v6 05/13] x86: introduce __uaccess_begin_nospec
` [PATCH v6 06/13] x86, usercopy: replace open coded stac/clac with __uaccess_{begin, end}
` [PATCH v6 07/13] x86, __get_user: use __uaccess_begin_nospec
` [PATCH v6 08/13] x86, get_user: use pointer masking to limit speculation
` [PATCH v6 09/13] x86: sanitize syscall table de-references under speculation
` [PATCH v6 10/13] vfs, fdtable: prevent bounds-check bypass via speculative execution
` [PATCH v6 11/13] kvm, x86: update spectre-v1 mitigation
` [PATCH v6 12/13] nl80211: sanitize array index in parse_txq_params
` [PATCH v6 13/13] x86/spectre: report get_user mitigation for spectre_v1
[git pull] vfs.git: poll annotations
2018-01-31 3:19 UTC (7+ messages)
[PATCH v5 00/12] spectre variant1 mitigations for tip/x86/pti
2018-01-30 20:27 UTC (52+ messages)
` [PATCH v5 01/12] Documentation: document array_idx
` [PATCH v5 02/12] array_idx: sanitize speculative array de-references
` [PATCH v5 03/12] x86: implement array_idx_mask
` [PATCH v5 04/12] x86: introduce __uaccess_begin_nospec and ifence
` [PATCH v5 05/12] x86, __get_user: use __uaccess_begin_nospec
` [PATCH v5 06/12] x86, get_user: use pointer masking to limit speculation
` [PATCH v5 07/12] x86: remove the syscall_64 fast-path
` [PATCH v5 08/12] x86: sanitize sycall table de-references under speculation
` [PATCH v5 09/12] vfs, fdtable: prevent bounds-check bypass via speculative execution
` [PATCH v5 10/12] kvm, x86: update spectre-v1 mitigation
` [PATCH v5 11/12] nl80211: sanitize array index in parse_txq_params
` [PATCH v5 12/12] x86/spectre: report get_user mitigation for spectre_v1
[PATCH v11 0/3] mm, x86, powerpc: Enhancements to Memory Protection Keys
2018-01-30 19:44 UTC (8+ messages)
` [PATCH v11 1/3] mm, powerpc, x86: define VM_PKEY_BITx bits if CONFIG_ARCH_HAS_PKEYS is enabled
` [PATCH v11 2/3] mm, powerpc, x86: introduce an additional vma bit for powerpc pkey
` [PATCH v11 3/3] mm, x86: display pkey in smaps only if arch supports pkeys
[RFC PATCH v2 0/3] arm64: Fix invalid si_codes for fault signals
2018-01-30 18:50 UTC (8+ messages)
` [RFC PATCH v2 1/3] signal: Add FPE_FLTUNK si_code for undiagnosable fp exceptions
` [RFC PATCH v2 2/3] arm64: fpsimd: Fix bad si_code for undiagnosed SIGFPE
` [RFC PATCH v2 3/3] arm64: signal: Ensure si_code is valid for all fault signals
[PATCH v10 00/27] powerpc, mm: Memory Protection Keys
2018-01-30 16:28 UTC (6+ messages)
` [PATCH v10 27/27] mm: display pkey in smaps if arch_pkeys_enabled() is true
[PATCH v6 00/36] Andes(nds32) Linux Kernel Port
2018-01-30 15:27 UTC (25+ messages)
` [PATCH v6 07/36] nds32: Exception handling
` [PATCH v6 16/36] nds32: DMA mapping API
[PATCH v12 0/9] LPC: legacy ISA I/O support
2018-01-30 15:11 UTC (4+ messages)
` [PATCH v12 3/9] PCI: Add fwnode handler as input param of pci_register_io_range()
[GIT PULL] siginfo cleanups for 4.16-rc1
2018-01-30 2:36 UTC (3+ messages)
[PATCH for 4.16 v2 01/11] membarrier: selftest: Test private expedited cmd
2018-01-29 20:20 UTC (18+ messages)
` [PATCH for 4.16 v7 02/11] powerpc: membarrier: Skip memory barrier in switch_mm()
` [PATCH for 4.16 v2 05/11] membarrier: selftest: Test global expedited cmd
` [PATCH for 4.16 v2 06/11] Introduce sync_core_before_usermode
` [PATCH for 4.16 v3 07/11] x86: Implement sync_core_before_usermode
` [PATCH for 4.16 v3 08/11] membarrier: Provide core serializing command
` [PATCH for 4.16 11/11] membarrier: selftest: Test private expedited sync core cmd
` [PATCH for 4.16 v4 09/11] membarrier: x86: Provide core serializing command
` [PATCH for 4.16 10/11] membarrier: arm64: "
[PATCH 08/11] membarrier: Provide core serializing command (v2)
2018-01-29 19:20 UTC (11+ messages)
[PATCH RFC 0/3] API for 128-bit IO access
2018-01-29 10:25 UTC (11+ messages)
` [PATCH 3/3] arm64: enable 128-bit memory read/write support
[GIT PULL tools] Linux kernel memory model
2018-01-29 9:54 UTC (4+ messages)
[PATCH 0/8] kprobes: Fix %p in kprobes
2018-01-27 10:15 UTC (16+ messages)
` [PATCH 1/8] kprobes: Show blacklist addresses as same as kallsyms does
` [PATCH 2/8] kprobes: Show address of kprobes if "
` [PATCH 3/8] kprobes: Replace %p with other pointer types
` [PATCH 4/8] kprobes/x86: Fix %p uses in error messages
` [PATCH 5/8] kprobes/arm: "
` [PATCH 6/8] kprobes/arm64: "
` [PATCH 7/8] kprobes/MN10300: "
` [PATCH 8/8] kprobes/s390: "
Darlehen Geld für Einzelpersonen und Fachleute in weniger als 72 Stunden
2018-01-26 7:22 UTC
Darlehen
2018-01-21 17:05 UTC
[PATCH v4 00/10] prevent bounds-check bypass via speculative execution
2018-01-25 22:37 UTC (6+ messages)
` [PATCH v4 02/10] asm/nospec, array_ptr: sanitize speculative array de-references
[PATCH RFC 0/3] API for 128-bit IO access
2018-01-25 13:59 UTC (7+ messages)
[PATCH v2] Automate memory-barriers.txt; provide Linux-kernel memory model
2018-01-25 9:35 UTC (6+ messages)
[PATCH 00/11] siginfo fixes/cleanups esp SI_USER
2018-01-24 21:28 UTC (13+ messages)
` [PATCH 07/11] signal/arm64: Document conflicts with SI_USER and SIGFPE,SIGTRAP,SIGBUS
` [PATCH 07/11] signal/arm64: Document conflicts with SI_USER and SIGFPE, SIGTRAP, SIGBUS
[PATCH 00/10] siginfo infrastructure
2018-01-24 20:54 UTC (6+ messages)
` [PATCH 06/10] signal: Helpers for faults with specialized siginfo layouts
Re:
2018-01-24 19:54 UTC
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).