linux-arch.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2018-03-07 16:00:58 to 2018-03-13 15:40:45 UTC [more...]

[PATCH 4.14 115/140] nospec: Kill array_index_nospec_mask_check()
 2018-03-13 15:25 UTC  (4+ messages)
` [PATCH 4.14 116/140] nospec: Include <asm/barrier.h> dependency

[PATCH 4.15 080/146] nospec: Kill array_index_nospec_mask_check()
 2018-03-13 15:24 UTC  (4+ messages)
` [PATCH 4.15 081/146] nospec: Include <asm/barrier.h> dependency

[PATCH v16 0/9] LPC: legacy ISA I/O support
 2018-03-13 10:42 UTC  (9+ messages)

[PATCH v4 00/10] posix_clocks: Prepare syscalls for 64 bit time_t conversion
 2018-03-12 17:53 UTC  (4+ messages)
` [PATCH v4 07/10] include: Add new y2038 safe __kernel_timespec

[PATCH] x86, powerpc : pkey-mprotect must allow pkey-0
 2018-03-12 15:46 UTC  (26+ messages)

[PATCH 3.16 58/76] nl80211: Sanitize array index in parse_txq_params
 2018-03-12  7:32 UTC  (30+ messages)
` [PATCH 3.16 56/76] x86/syscall: Sanitize syscall table de-references under speculation
` [PATCH 3.16 69/76] nospec: Kill array_index_nospec_mask_check()
` [PATCH 3.16 59/76] x86/spectre: Report get_user mitigation for spectre_v1
` [PATCH 3.16 75/76] x86/uaccess: Use __uaccess_begin_nospec() and uaccess_try_nospec
` [PATCH 3.16 52/76] array_index_nospec: Sanitize speculative array de-references
` [PATCH 3.16 54/76] x86: Introduce barrier_nospec
` [PATCH 3.16 55/76] x86/get_user: Use pointer masking to limit speculation
` [PATCH 3.16 51/76] Documentation: Document array_index_nospec
` [PATCH 3.16 70/76] nospec: Include <asm/barrier.h> dependency
` [PATCH 3.16 73/76] x86: Introduce __uaccess_begin_nospec() and uaccess_try_nospec
` [PATCH 3.16 53/76] x86: Implement array_index_mask_nospec
` [PATCH 3.16 57/76] vfs, fdtable: Prevent bounds-check bypass via speculative execution
` [PATCH 3.16 74/76] x86/usercopy: Replace open coded stac/clac with __uaccess_{begin, end}

[PATCH 3.2 089/104] x86/spectre: Report get_user mitigation for spectre_v1
 2018-03-12  3:03 UTC  (24+ messages)
` [PATCH 3.2 100/104] nospec: Include <asm/barrier.h> dependency
` [PATCH 3.2 082/104] Documentation: Document array_index_nospec
` [PATCH 3.2 087/104] x86/syscall: Sanitize syscall table de-references under speculation
` [PATCH 3.2 083/104] array_index_nospec: Sanitize speculative array de-references
` [PATCH 3.2 101/104] x86: Introduce __uaccess_begin_nospec() and uaccess_try_nospec
` [PATCH 3.2 086/104] x86/get_user: Use pointer masking to limit speculation
` [PATCH 3.2 102/104] x86/uaccess: Use __uaccess_begin_nospec() and uaccess_try_nospec
` [PATCH 3.2 088/104] vfs, fdtable: Prevent bounds-check bypass via speculative execution
` [PATCH 3.2 099/104] nospec: Kill array_index_nospec_mask_check()
` [PATCH 3.2 085/104] x86: Introduce barrier_nospec
` [PATCH 3.2 084/104] x86: Implement array_index_mask_nospec

[PATCH 4.9 18/65] nospec: Allow index argument to have const-qualified type
 2018-03-10  0:18 UTC  (2+ messages)

[PATCH 4.4 08/36] nospec: Allow index argument to have const-qualified type
 2018-03-10  0:18 UTC  (4+ messages)
` [PATCH 4.4 11/36] x86/syscall: Sanitize syscall table de-references under speculation fix

[RFC PATCH 6/6] arch: add untagged_addr definition for other arches
 2018-03-09 17:58 UTC  (21+ messages)
` [RFC PATCH 0/6] arm64: untag user pointers passed to the kernel
  ` [RFC PATCH 2/6] arm64: untag user addresses in copy_from_user and others
  ` [RFC PATCH 3/6] mm, arm64: untag user addresses in memory syscalls

RFC: remove the "tile" architecture from glibc
 2018-03-09 16:53 UTC  (23+ messages)

Removing architectures without upstream gcc support
 2018-03-09 14:00 UTC  (3+ messages)

Removing architectures without upstream gcc support
 2018-03-09 14:33 UTC  (4+ messages)

[PATCHv2 00/12] ARMv8.3 pointer authentication userspace support
 2018-03-09 14:28 UTC  (5+ messages)
` [PATCHv2 10/12] arm64/kvm: context-switch ptrauth registers

[PATCH v2 0/3] arm64: Fix invalid si_codes for fault signals
 2018-03-09 14:25 UTC  (20+ messages)
` [PATCH v2 1/3] signal: Add FPE_FLTUNK si_code for undiagnosable fp exceptions
` [PATCH v2 2/3] arm64: fpsimd: Fix bad si_code for undiagnosed SIGFPE
` [PATCH v2 3/3] arm64: signal: Ensure si_code is valid for all fault signals

[PATCH v3] arm64: signal: Ensure si_code is valid for all fault signals
 2018-03-09 14:21 UTC  (6+ messages)
  ` [PATCH v3] arm64: signal: Ensure si_code is valid for all fault signalsy

Debian Ports architecture status (Re: Re: Removing architectures without upstream gcc support)
 2018-03-09 13:05 UTC  (2+ messages)

[PATCH v12 0/3] mm, x86, powerpc: Enhancements to Memory Protection Keys
 2018-03-08 19:30 UTC  (7+ messages)
` [PATCH v12 3/3] mm, x86, powerpc: display pkey in smaps only if arch supports pkeys
    ` mm, x86, powerpc: pkey semantics for key-0 ?

[stable] nospec: Kill array_index_nospec_mask_check()
 2018-03-08 16:29 UTC  (3+ messages)

[PATCH] mn10300: Remove the architecture
 2018-03-08 13:36 UTC  (3+ messages)

[PATCH 4.14 090/110] nospec: Allow index argument to have const-qualified type
 2018-03-07 19:39 UTC  (2+ messages)

[PATCH 4.15 105/122] nospec: Allow index argument to have const-qualified type
 2018-03-07 19:38 UTC  (2+ messages)

[PATCH tools/memory-model 0/4] Documentation updates and fixes
 2018-03-07 17:27 UTC  (10+ messages)
` [PATCH tools/memory-model 1/4] memory-barriers: More text to de-emphasize smp_read_barrier_depends()
  ` [PATCH tools/memory-model 2/4] tools/memory-model: Remove mention of docker/gentoo image
  ` [PATCH tools/memory-model 3/4] tools/memory-order: Add documentation of new litmus test
  ` [PATCH tools/memory-model 4/4] tools/memory-model: Update: Remove rb-dep, smp_read_barrier_depends, and lockless_dereference


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).