linux-arch.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2018-03-08 17:11:49 to 2018-03-14 04:06:23 UTC [more...]

[PATCH v5 00/10] posix_clocks: Prepare syscalls for 64 bit time_t conversion
 2018-03-14  4:03 UTC  (4+ messages)
` [PATCH v5 07/10] include: Add new y2038 safe __kernel_timespec

[PATCH] earlycon: Fix __earlycon_table stride... again
 2018-03-14  0:19 UTC  (2+ messages)

[PATCH v2 00/27] x86: PIE support and option to extend KASLR randomization
 2018-03-13 20:59 UTC  (28+ messages)
` [PATCH v2 01/27] x86/crypto: Adapt assembly for PIE support
` [PATCH v2 02/27] x86: Use symbol name on bug table "
` [PATCH v2 03/27] x86: Use symbol name in jump "
` [PATCH v2 04/27] x86: Add macro to get symbol address "
` [PATCH v2 05/27] x86: relocate_kernel - Adapt assembly "
` [PATCH v2 06/27] x86/entry/64: "
` [PATCH v2 07/27] x86: pm-trace - "
` [PATCH v2 08/27] x86/CPU: "
` [PATCH v2 09/27] x86/acpi: "
` [PATCH v2 10/27] x86/boot/64: "
` [PATCH v2 11/27] x86/power/64: "
` [PATCH v2 12/27] x86/paravirt: "
` [PATCH v2 13/27] x86/boot/64: Build head64.c as mcmodel large when PIE is enabled
` [PATCH v2 14/27] x86/percpu: Adapt percpu for PIE support
` [PATCH v2 15/27] compiler: Option to default to hidden symbols
` [PATCH v2 16/27] compiler: Option to add PROVIDE_HIDDEN replacement for weak symbols
` [PATCH v2 17/27] x86/relocs: Handle PIE relocations
` [PATCH v2 18/27] xen: Adapt assembly for PIE support
` [PATCH v2 19/27] kvm: "
` [PATCH v2 20/27] x86: Support global stack cookie
` [PATCH v2 21/27] x86/ftrace: Adapt function tracing for PIE support
` [PATCH v2 22/27] x86/modules: Add option to start module section after kernel
` [PATCH v2 23/27] x86/modules: Adapt module loading for PIE support
` [PATCH v2 24/27] x86/mm: Make the x86 GOT read-only
` [PATCH v2 25/27] x86/pie: Add option to build the kernel as PIE
` [PATCH v2 26/27] x86/relocs: Add option to generate 64-bit relocations
` [PATCH v2 27/27] x86/kaslr: Add option to extend KASLR range from 1GB to 3GB

[PATCH 4.14 115/140] nospec: Kill array_index_nospec_mask_check()
 2018-03-13 15:25 UTC  (4+ messages)
` [PATCH 4.14 116/140] nospec: Include <asm/barrier.h> dependency

[PATCH 4.15 080/146] nospec: Kill array_index_nospec_mask_check()
 2018-03-13 15:24 UTC  (4+ messages)
` [PATCH 4.15 081/146] nospec: Include <asm/barrier.h> dependency

[PATCH v16 0/9] LPC: legacy ISA I/O support
 2018-03-13 10:42 UTC  (9+ messages)

[PATCH v4 00/10] posix_clocks: Prepare syscalls for 64 bit time_t conversion
 2018-03-12 17:53 UTC  (4+ messages)
` [PATCH v4 07/10] include: Add new y2038 safe __kernel_timespec

[PATCH] x86, powerpc : pkey-mprotect must allow pkey-0
 2018-03-12 15:46 UTC  (26+ messages)

[PATCH 3.16 52/76] array_index_nospec: Sanitize speculative array de-references
 2018-03-12  7:32 UTC  (30+ messages)
` [PATCH 3.16 51/76] Documentation: Document array_index_nospec
` [PATCH 3.16 55/76] x86/get_user: Use pointer masking to limit speculation
` [PATCH 3.16 54/76] x86: Introduce barrier_nospec
` [PATCH 3.16 69/76] nospec: Kill array_index_nospec_mask_check()
` [PATCH 3.16 56/76] x86/syscall: Sanitize syscall table de-references under speculation
` [PATCH 3.16 58/76] nl80211: Sanitize array index in parse_txq_params
` [PATCH 3.16 75/76] x86/uaccess: Use __uaccess_begin_nospec() and uaccess_try_nospec
` [PATCH 3.16 59/76] x86/spectre: Report get_user mitigation for spectre_v1
` [PATCH 3.16 57/76] vfs, fdtable: Prevent bounds-check bypass via speculative execution
` [PATCH 3.16 74/76] x86/usercopy: Replace open coded stac/clac with __uaccess_{begin, end}
` [PATCH 3.16 70/76] nospec: Include <asm/barrier.h> dependency
` [PATCH 3.16 53/76] x86: Implement array_index_mask_nospec
` [PATCH 3.16 73/76] x86: Introduce __uaccess_begin_nospec() and uaccess_try_nospec

[PATCH 3.2 084/104] x86: Implement array_index_mask_nospec
 2018-03-12  3:03 UTC  (24+ messages)
` [PATCH 3.2 085/104] x86: Introduce barrier_nospec
` [PATCH 3.2 099/104] nospec: Kill array_index_nospec_mask_check()
` [PATCH 3.2 088/104] vfs, fdtable: Prevent bounds-check bypass via speculative execution
` [PATCH 3.2 102/104] x86/uaccess: Use __uaccess_begin_nospec() and uaccess_try_nospec
` [PATCH 3.2 101/104] x86: Introduce "
` [PATCH 3.2 086/104] x86/get_user: Use pointer masking to limit speculation
` [PATCH 3.2 083/104] array_index_nospec: Sanitize speculative array de-references
` [PATCH 3.2 087/104] x86/syscall: Sanitize syscall table de-references under speculation
` [PATCH 3.2 082/104] Documentation: Document array_index_nospec
` [PATCH 3.2 100/104] nospec: Include <asm/barrier.h> dependency
` [PATCH 3.2 089/104] x86/spectre: Report get_user mitigation for spectre_v1

[PATCH 4.9 18/65] nospec: Allow index argument to have const-qualified type
 2018-03-10  0:18 UTC  (2+ messages)

[PATCH 4.4 08/36] nospec: Allow index argument to have const-qualified type
 2018-03-10  0:18 UTC  (4+ messages)
` [PATCH 4.4 11/36] x86/syscall: Sanitize syscall table de-references under speculation fix

[RFC PATCH 6/6] arch: add untagged_addr definition for other arches
 2018-03-09 17:58 UTC  (21+ messages)
` [RFC PATCH 0/6] arm64: untag user pointers passed to the kernel
  ` [RFC PATCH 2/6] arm64: untag user addresses in copy_from_user and others
  ` [RFC PATCH 3/6] mm, arm64: untag user addresses in memory syscalls

RFC: remove the "tile" architecture from glibc
 2018-03-09 16:53 UTC  (14+ messages)

Removing architectures without upstream gcc support
 2018-03-09 14:00 UTC  (3+ messages)

Removing architectures without upstream gcc support
 2018-03-09 14:33 UTC  (4+ messages)

[PATCHv2 00/12] ARMv8.3 pointer authentication userspace support
 2018-03-09 14:28 UTC  (5+ messages)
` [PATCHv2 10/12] arm64/kvm: context-switch ptrauth registers

[PATCH v2 0/3] arm64: Fix invalid si_codes for fault signals
 2018-03-09 14:25 UTC  (16+ messages)
` [PATCH v2 1/3] signal: Add FPE_FLTUNK si_code for undiagnosable fp exceptions
` [PATCH v2 2/3] arm64: fpsimd: Fix bad si_code for undiagnosed SIGFPE

[PATCH v3] arm64: signal: Ensure si_code is valid for all fault signals
 2018-03-09 14:21 UTC  (6+ messages)
  ` [PATCH v3] arm64: signal: Ensure si_code is valid for all fault signalsy

Debian Ports architecture status (Re: Re: Removing architectures without upstream gcc support)
 2018-03-09 13:05 UTC  (2+ messages)

[PATCH v12 0/3] mm, x86, powerpc: Enhancements to Memory Protection Keys
 2018-03-08 19:30 UTC  (7+ messages)
` [PATCH v12 3/3] mm, x86, powerpc: display pkey in smaps only if arch supports pkeys
    ` mm, x86, powerpc: pkey semantics for key-0 ?


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).