messages from 2018-03-08 17:11:49 to 2018-03-14 04:06:23 UTC [more...]
[PATCH v5 00/10] posix_clocks: Prepare syscalls for 64 bit time_t conversion
2018-03-14 4:03 UTC (4+ messages)
` [PATCH v5 07/10] include: Add new y2038 safe __kernel_timespec
[PATCH] earlycon: Fix __earlycon_table stride... again
2018-03-14 0:19 UTC (2+ messages)
[PATCH v2 00/27] x86: PIE support and option to extend KASLR randomization
2018-03-13 20:59 UTC (28+ messages)
` [PATCH v2 01/27] x86/crypto: Adapt assembly for PIE support
` [PATCH v2 02/27] x86: Use symbol name on bug table "
` [PATCH v2 03/27] x86: Use symbol name in jump "
` [PATCH v2 04/27] x86: Add macro to get symbol address "
` [PATCH v2 05/27] x86: relocate_kernel - Adapt assembly "
` [PATCH v2 06/27] x86/entry/64: "
` [PATCH v2 07/27] x86: pm-trace - "
` [PATCH v2 08/27] x86/CPU: "
` [PATCH v2 09/27] x86/acpi: "
` [PATCH v2 10/27] x86/boot/64: "
` [PATCH v2 11/27] x86/power/64: "
` [PATCH v2 12/27] x86/paravirt: "
` [PATCH v2 13/27] x86/boot/64: Build head64.c as mcmodel large when PIE is enabled
` [PATCH v2 14/27] x86/percpu: Adapt percpu for PIE support
` [PATCH v2 15/27] compiler: Option to default to hidden symbols
` [PATCH v2 16/27] compiler: Option to add PROVIDE_HIDDEN replacement for weak symbols
` [PATCH v2 17/27] x86/relocs: Handle PIE relocations
` [PATCH v2 18/27] xen: Adapt assembly for PIE support
` [PATCH v2 19/27] kvm: "
` [PATCH v2 20/27] x86: Support global stack cookie
` [PATCH v2 21/27] x86/ftrace: Adapt function tracing for PIE support
` [PATCH v2 22/27] x86/modules: Add option to start module section after kernel
` [PATCH v2 23/27] x86/modules: Adapt module loading for PIE support
` [PATCH v2 24/27] x86/mm: Make the x86 GOT read-only
` [PATCH v2 25/27] x86/pie: Add option to build the kernel as PIE
` [PATCH v2 26/27] x86/relocs: Add option to generate 64-bit relocations
` [PATCH v2 27/27] x86/kaslr: Add option to extend KASLR range from 1GB to 3GB
[PATCH 4.14 115/140] nospec: Kill array_index_nospec_mask_check()
2018-03-13 15:25 UTC (4+ messages)
` [PATCH 4.14 116/140] nospec: Include <asm/barrier.h> dependency
[PATCH 4.15 080/146] nospec: Kill array_index_nospec_mask_check()
2018-03-13 15:24 UTC (4+ messages)
` [PATCH 4.15 081/146] nospec: Include <asm/barrier.h> dependency
[PATCH v16 0/9] LPC: legacy ISA I/O support
2018-03-13 10:42 UTC (9+ messages)
[PATCH v4 00/10] posix_clocks: Prepare syscalls for 64 bit time_t conversion
2018-03-12 17:53 UTC (4+ messages)
` [PATCH v4 07/10] include: Add new y2038 safe __kernel_timespec
[PATCH] x86, powerpc : pkey-mprotect must allow pkey-0
2018-03-12 15:46 UTC (26+ messages)
[PATCH 3.16 52/76] array_index_nospec: Sanitize speculative array de-references
2018-03-12 7:32 UTC (30+ messages)
` [PATCH 3.16 51/76] Documentation: Document array_index_nospec
` [PATCH 3.16 55/76] x86/get_user: Use pointer masking to limit speculation
` [PATCH 3.16 54/76] x86: Introduce barrier_nospec
` [PATCH 3.16 69/76] nospec: Kill array_index_nospec_mask_check()
` [PATCH 3.16 56/76] x86/syscall: Sanitize syscall table de-references under speculation
` [PATCH 3.16 58/76] nl80211: Sanitize array index in parse_txq_params
` [PATCH 3.16 75/76] x86/uaccess: Use __uaccess_begin_nospec() and uaccess_try_nospec
` [PATCH 3.16 59/76] x86/spectre: Report get_user mitigation for spectre_v1
` [PATCH 3.16 57/76] vfs, fdtable: Prevent bounds-check bypass via speculative execution
` [PATCH 3.16 74/76] x86/usercopy: Replace open coded stac/clac with __uaccess_{begin, end}
` [PATCH 3.16 70/76] nospec: Include <asm/barrier.h> dependency
` [PATCH 3.16 53/76] x86: Implement array_index_mask_nospec
` [PATCH 3.16 73/76] x86: Introduce __uaccess_begin_nospec() and uaccess_try_nospec
[PATCH 3.2 084/104] x86: Implement array_index_mask_nospec
2018-03-12 3:03 UTC (24+ messages)
` [PATCH 3.2 085/104] x86: Introduce barrier_nospec
` [PATCH 3.2 099/104] nospec: Kill array_index_nospec_mask_check()
` [PATCH 3.2 088/104] vfs, fdtable: Prevent bounds-check bypass via speculative execution
` [PATCH 3.2 102/104] x86/uaccess: Use __uaccess_begin_nospec() and uaccess_try_nospec
` [PATCH 3.2 101/104] x86: Introduce "
` [PATCH 3.2 086/104] x86/get_user: Use pointer masking to limit speculation
` [PATCH 3.2 083/104] array_index_nospec: Sanitize speculative array de-references
` [PATCH 3.2 087/104] x86/syscall: Sanitize syscall table de-references under speculation
` [PATCH 3.2 082/104] Documentation: Document array_index_nospec
` [PATCH 3.2 100/104] nospec: Include <asm/barrier.h> dependency
` [PATCH 3.2 089/104] x86/spectre: Report get_user mitigation for spectre_v1
[PATCH 4.9 18/65] nospec: Allow index argument to have const-qualified type
2018-03-10 0:18 UTC (2+ messages)
[PATCH 4.4 08/36] nospec: Allow index argument to have const-qualified type
2018-03-10 0:18 UTC (4+ messages)
` [PATCH 4.4 11/36] x86/syscall: Sanitize syscall table de-references under speculation fix
[RFC PATCH 6/6] arch: add untagged_addr definition for other arches
2018-03-09 17:58 UTC (21+ messages)
` [RFC PATCH 0/6] arm64: untag user pointers passed to the kernel
` [RFC PATCH 2/6] arm64: untag user addresses in copy_from_user and others
` [RFC PATCH 3/6] mm, arm64: untag user addresses in memory syscalls
RFC: remove the "tile" architecture from glibc
2018-03-09 16:53 UTC (14+ messages)
Removing architectures without upstream gcc support
2018-03-09 14:00 UTC (3+ messages)
Removing architectures without upstream gcc support
2018-03-09 14:33 UTC (4+ messages)
[PATCHv2 00/12] ARMv8.3 pointer authentication userspace support
2018-03-09 14:28 UTC (5+ messages)
` [PATCHv2 10/12] arm64/kvm: context-switch ptrauth registers
[PATCH v2 0/3] arm64: Fix invalid si_codes for fault signals
2018-03-09 14:25 UTC (16+ messages)
` [PATCH v2 1/3] signal: Add FPE_FLTUNK si_code for undiagnosable fp exceptions
` [PATCH v2 2/3] arm64: fpsimd: Fix bad si_code for undiagnosed SIGFPE
[PATCH v3] arm64: signal: Ensure si_code is valid for all fault signals
2018-03-09 14:21 UTC (6+ messages)
` [PATCH v3] arm64: signal: Ensure si_code is valid for all fault signalsy
Debian Ports architecture status (Re: Re: Removing architectures without upstream gcc support)
2018-03-09 13:05 UTC (2+ messages)
[PATCH v12 0/3] mm, x86, powerpc: Enhancements to Memory Protection Keys
2018-03-08 19:30 UTC (7+ messages)
` [PATCH v12 3/3] mm, x86, powerpc: display pkey in smaps only if arch supports pkeys
` mm, x86, powerpc: pkey semantics for key-0 ?
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).