messages from 2018-03-09 20:00:17 to 2018-03-14 14:52:31 UTC [more...]
[PATCH 00/16] remove eight obsolete architectures
2018-03-14 14:52 UTC (28+ messages)
` [PATCH 01/16] mn10300: Remove the architecture
` [PATCH 02/16] arch: remove frv port
` [PATCH 03/16] arch: remove m32r port
` [PATCH 04/16] arch: remove score port
` [PATCH 05/16] arch: remove blackfin port
` [PATCH 06/16] arch: remove tile port
` [PATCH 07/16] CRIS: Drop support for the CRIS port
` [PATCH 10/16] mm: remove obsolete alloc_remap()
` [PATCH 11/16] treewide: simplify Kconfig dependencies for removed archs
` [PATCH 12/16] asm-generic: siginfo: remove obsolete #ifdefs
` [PATCH 13/16] Documentation: arch-support: remove obsolete architectures
` [PATCH 15/16] recordmcount.pl: drop blackin and tile support
[PATCH 08/16] procfs: remove CONFIG_HARDWALL dependency
2018-03-14 14:37 UTC (4+ messages)
` [PATCH 09/16] mm: remove blackfin MPU support
[PATCH v1 0/4] Fix issues with huge mapping in ioremap
2018-03-14 14:38 UTC (30+ messages)
` [PATCH v1 1/4] asm/tlbflush: Add flush_tlb_pgtable() for ARM64
` [PATCH v1 2/4] ioremap: Invalidate TLB after huge mappings
` [PATCH v1 3/4] arm64: Fix the page leak in pud/pmd_set_huge
` [PATCH v1 4/4] Revert "arm64: Enforce BBM for huge IO/VMAP mappings"
[PATCH 1/1 v2] x86: pkey-mprotect must allow pkey-0
2018-03-14 14:19 UTC (4+ messages)
[PATCH] x86, powerpc : pkey-mprotect must allow pkey-0
2018-03-14 14:08 UTC (24+ messages)
[PATCH v2 00/27] x86: PIE support and option to extend KASLR randomization
2018-03-14 10:35 UTC (30+ messages)
` [PATCH v2 01/27] x86/crypto: Adapt assembly for PIE support
` [PATCH v2 02/27] x86: Use symbol name on bug table "
` [PATCH v2 03/27] x86: Use symbol name in jump "
` [PATCH v2 04/27] x86: Add macro to get symbol address "
` [PATCH v2 05/27] x86: relocate_kernel - Adapt assembly "
` [PATCH v2 06/27] x86/entry/64: "
` [PATCH v2 07/27] x86: pm-trace - "
` [PATCH v2 08/27] x86/CPU: "
` [PATCH v2 09/27] x86/acpi: "
` [PATCH v2 10/27] x86/boot/64: "
` [PATCH v2 11/27] x86/power/64: "
` [PATCH v2 12/27] x86/paravirt: "
` [PATCH v2 13/27] x86/boot/64: Build head64.c as mcmodel large when PIE is enabled
` [PATCH v2 14/27] x86/percpu: Adapt percpu for PIE support
` [PATCH v2 15/27] compiler: Option to default to hidden symbols
` [PATCH v2 16/27] compiler: Option to add PROVIDE_HIDDEN replacement for weak symbols
` [PATCH v2 17/27] x86/relocs: Handle PIE relocations
` [PATCH v2 18/27] xen: Adapt assembly for PIE support
` [PATCH v2 19/27] kvm: "
` [PATCH v2 20/27] x86: Support global stack cookie
` [PATCH v2 21/27] x86/ftrace: Adapt function tracing for PIE support
` [PATCH v2 22/27] x86/modules: Add option to start module section after kernel
` [PATCH v2 23/27] x86/modules: Adapt module loading for PIE support
` [PATCH v2 24/27] x86/mm: Make the x86 GOT read-only
` [PATCH v2 25/27] x86/pie: Add option to build the kernel as PIE
` [PATCH v2 26/27] x86/relocs: Add option to generate 64-bit relocations
` [PATCH v2 27/27] x86/kaslr: Add option to extend KASLR range from 1GB to 3GB
[PATCH 1/1 v2] powerpc: pkey-mprotect must allow pkey-0
2018-03-14 7:45 UTC (2+ messages)
[PATCH v5 00/10] posix_clocks: Prepare syscalls for 64 bit time_t conversion
2018-03-14 4:03 UTC (4+ messages)
` [PATCH v5 07/10] include: Add new y2038 safe __kernel_timespec
[PATCH] earlycon: Fix __earlycon_table stride... again
2018-03-14 0:19 UTC (2+ messages)
[PATCH 4.14 115/140] nospec: Kill array_index_nospec_mask_check()
2018-03-13 15:25 UTC (4+ messages)
` [PATCH 4.14 116/140] nospec: Include <asm/barrier.h> dependency
[PATCH 4.15 080/146] nospec: Kill array_index_nospec_mask_check()
2018-03-13 15:24 UTC (4+ messages)
` [PATCH 4.15 081/146] nospec: Include <asm/barrier.h> dependency
[PATCH v16 0/9] LPC: legacy ISA I/O support
2018-03-13 10:42 UTC (9+ messages)
[PATCH v4 00/10] posix_clocks: Prepare syscalls for 64 bit time_t conversion
2018-03-12 17:53 UTC (4+ messages)
` [PATCH v4 07/10] include: Add new y2038 safe __kernel_timespec
[PATCH 3.16 52/76] array_index_nospec: Sanitize speculative array de-references
2018-03-12 7:32 UTC (30+ messages)
` [PATCH 3.16 55/76] x86/get_user: Use pointer masking to limit speculation
` [PATCH 3.16 54/76] x86: Introduce barrier_nospec
` [PATCH 3.16 51/76] Documentation: Document array_index_nospec
` [PATCH 3.16 58/76] nl80211: Sanitize array index in parse_txq_params
` [PATCH 3.16 69/76] nospec: Kill array_index_nospec_mask_check()
` [PATCH 3.16 56/76] x86/syscall: Sanitize syscall table de-references under speculation
` [PATCH 3.16 59/76] x86/spectre: Report get_user mitigation for spectre_v1
` [PATCH 3.16 75/76] x86/uaccess: Use __uaccess_begin_nospec() and uaccess_try_nospec
` [PATCH 3.16 74/76] x86/usercopy: Replace open coded stac/clac with __uaccess_{begin, end}
` [PATCH 3.16 57/76] vfs, fdtable: Prevent bounds-check bypass via speculative execution
` [PATCH 3.16 70/76] nospec: Include <asm/barrier.h> dependency
` [PATCH 3.16 73/76] x86: Introduce __uaccess_begin_nospec() and uaccess_try_nospec
` [PATCH 3.16 53/76] x86: Implement array_index_mask_nospec
[PATCH 3.2 087/104] x86/syscall: Sanitize syscall table de-references under speculation
2018-03-12 3:03 UTC (24+ messages)
` [PATCH 3.2 082/104] Documentation: Document array_index_nospec
` [PATCH 3.2 089/104] x86/spectre: Report get_user mitigation for spectre_v1
` [PATCH 3.2 100/104] nospec: Include <asm/barrier.h> dependency
` [PATCH 3.2 085/104] x86: Introduce barrier_nospec
` [PATCH 3.2 084/104] x86: Implement array_index_mask_nospec
` [PATCH 3.2 102/104] x86/uaccess: Use __uaccess_begin_nospec() and uaccess_try_nospec
` [PATCH 3.2 088/104] vfs, fdtable: Prevent bounds-check bypass via speculative execution
` [PATCH 3.2 099/104] nospec: Kill array_index_nospec_mask_check()
` [PATCH 3.2 101/104] x86: Introduce __uaccess_begin_nospec() and uaccess_try_nospec
` [PATCH 3.2 086/104] x86/get_user: Use pointer masking to limit speculation
` [PATCH 3.2 083/104] array_index_nospec: Sanitize speculative array de-references
[PATCH 4.9 18/65] nospec: Allow index argument to have const-qualified type
2018-03-10 0:18 UTC (2+ messages)
[PATCH 4.4 08/36] nospec: Allow index argument to have const-qualified type
2018-03-10 0:18 UTC (4+ messages)
` [PATCH 4.4 11/36] x86/syscall: Sanitize syscall table de-references under speculation fix
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).