messages from 2018-03-07 16:00:58 to 2018-03-13 15:40:45 UTC [more...]
[PATCH 4.14 115/140] nospec: Kill array_index_nospec_mask_check()
2018-03-13 15:25 UTC (4+ messages)
` [PATCH 4.14 116/140] nospec: Include <asm/barrier.h> dependency
[PATCH 4.15 080/146] nospec: Kill array_index_nospec_mask_check()
2018-03-13 15:24 UTC (4+ messages)
` [PATCH 4.15 081/146] nospec: Include <asm/barrier.h> dependency
[PATCH v16 0/9] LPC: legacy ISA I/O support
2018-03-13 10:42 UTC (9+ messages)
[PATCH v4 00/10] posix_clocks: Prepare syscalls for 64 bit time_t conversion
2018-03-12 17:53 UTC (4+ messages)
` [PATCH v4 07/10] include: Add new y2038 safe __kernel_timespec
[PATCH] x86, powerpc : pkey-mprotect must allow pkey-0
2018-03-12 15:46 UTC (26+ messages)
[PATCH 3.16 58/76] nl80211: Sanitize array index in parse_txq_params
2018-03-12 7:32 UTC (30+ messages)
` [PATCH 3.16 56/76] x86/syscall: Sanitize syscall table de-references under speculation
` [PATCH 3.16 69/76] nospec: Kill array_index_nospec_mask_check()
` [PATCH 3.16 59/76] x86/spectre: Report get_user mitigation for spectre_v1
` [PATCH 3.16 75/76] x86/uaccess: Use __uaccess_begin_nospec() and uaccess_try_nospec
` [PATCH 3.16 52/76] array_index_nospec: Sanitize speculative array de-references
` [PATCH 3.16 54/76] x86: Introduce barrier_nospec
` [PATCH 3.16 55/76] x86/get_user: Use pointer masking to limit speculation
` [PATCH 3.16 51/76] Documentation: Document array_index_nospec
` [PATCH 3.16 70/76] nospec: Include <asm/barrier.h> dependency
` [PATCH 3.16 73/76] x86: Introduce __uaccess_begin_nospec() and uaccess_try_nospec
` [PATCH 3.16 53/76] x86: Implement array_index_mask_nospec
` [PATCH 3.16 57/76] vfs, fdtable: Prevent bounds-check bypass via speculative execution
` [PATCH 3.16 74/76] x86/usercopy: Replace open coded stac/clac with __uaccess_{begin, end}
[PATCH 3.2 089/104] x86/spectre: Report get_user mitigation for spectre_v1
2018-03-12 3:03 UTC (24+ messages)
` [PATCH 3.2 100/104] nospec: Include <asm/barrier.h> dependency
` [PATCH 3.2 082/104] Documentation: Document array_index_nospec
` [PATCH 3.2 087/104] x86/syscall: Sanitize syscall table de-references under speculation
` [PATCH 3.2 083/104] array_index_nospec: Sanitize speculative array de-references
` [PATCH 3.2 101/104] x86: Introduce __uaccess_begin_nospec() and uaccess_try_nospec
` [PATCH 3.2 086/104] x86/get_user: Use pointer masking to limit speculation
` [PATCH 3.2 102/104] x86/uaccess: Use __uaccess_begin_nospec() and uaccess_try_nospec
` [PATCH 3.2 088/104] vfs, fdtable: Prevent bounds-check bypass via speculative execution
` [PATCH 3.2 099/104] nospec: Kill array_index_nospec_mask_check()
` [PATCH 3.2 085/104] x86: Introduce barrier_nospec
` [PATCH 3.2 084/104] x86: Implement array_index_mask_nospec
[PATCH 4.9 18/65] nospec: Allow index argument to have const-qualified type
2018-03-10 0:18 UTC (2+ messages)
[PATCH 4.4 08/36] nospec: Allow index argument to have const-qualified type
2018-03-10 0:18 UTC (4+ messages)
` [PATCH 4.4 11/36] x86/syscall: Sanitize syscall table de-references under speculation fix
[RFC PATCH 6/6] arch: add untagged_addr definition for other arches
2018-03-09 17:58 UTC (21+ messages)
` [RFC PATCH 0/6] arm64: untag user pointers passed to the kernel
` [RFC PATCH 2/6] arm64: untag user addresses in copy_from_user and others
` [RFC PATCH 3/6] mm, arm64: untag user addresses in memory syscalls
RFC: remove the "tile" architecture from glibc
2018-03-09 16:53 UTC (23+ messages)
Removing architectures without upstream gcc support
2018-03-09 14:00 UTC (3+ messages)
Removing architectures without upstream gcc support
2018-03-09 14:33 UTC (4+ messages)
[PATCHv2 00/12] ARMv8.3 pointer authentication userspace support
2018-03-09 14:28 UTC (5+ messages)
` [PATCHv2 10/12] arm64/kvm: context-switch ptrauth registers
[PATCH v2 0/3] arm64: Fix invalid si_codes for fault signals
2018-03-09 14:25 UTC (20+ messages)
` [PATCH v2 1/3] signal: Add FPE_FLTUNK si_code for undiagnosable fp exceptions
` [PATCH v2 2/3] arm64: fpsimd: Fix bad si_code for undiagnosed SIGFPE
` [PATCH v2 3/3] arm64: signal: Ensure si_code is valid for all fault signals
[PATCH v3] arm64: signal: Ensure si_code is valid for all fault signals
2018-03-09 14:21 UTC (6+ messages)
` [PATCH v3] arm64: signal: Ensure si_code is valid for all fault signalsy
Debian Ports architecture status (Re: Re: Removing architectures without upstream gcc support)
2018-03-09 13:05 UTC (2+ messages)
[PATCH v12 0/3] mm, x86, powerpc: Enhancements to Memory Protection Keys
2018-03-08 19:30 UTC (7+ messages)
` [PATCH v12 3/3] mm, x86, powerpc: display pkey in smaps only if arch supports pkeys
` mm, x86, powerpc: pkey semantics for key-0 ?
[stable] nospec: Kill array_index_nospec_mask_check()
2018-03-08 16:29 UTC (3+ messages)
[PATCH] mn10300: Remove the architecture
2018-03-08 13:36 UTC (3+ messages)
[PATCH 4.14 090/110] nospec: Allow index argument to have const-qualified type
2018-03-07 19:39 UTC (2+ messages)
[PATCH 4.15 105/122] nospec: Allow index argument to have const-qualified type
2018-03-07 19:38 UTC (2+ messages)
[PATCH tools/memory-model 0/4] Documentation updates and fixes
2018-03-07 17:27 UTC (10+ messages)
` [PATCH tools/memory-model 1/4] memory-barriers: More text to de-emphasize smp_read_barrier_depends()
` [PATCH tools/memory-model 2/4] tools/memory-model: Remove mention of docker/gentoo image
` [PATCH tools/memory-model 3/4] tools/memory-order: Add documentation of new litmus test
` [PATCH tools/memory-model 4/4] tools/memory-model: Update: Remove rb-dep, smp_read_barrier_depends, and lockless_dereference
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).