Dave Martin ([email protected])

Number of posts: 800 (0.2 per day)
First post: 2013-06-06 11:03:40
Last post: 2024-06-14 16:09:31

Date List Subject
2020-11-12 11:18:32 linux-crypto Re: [PATCH 0/1] arm64: Accelerate Adler32 using arm64 SVE instructions.
2020-11-11 18:00:38 linux-kernel Re: [PATCH v8 06/22] perf arm-spe: Refactor printing string to buffer
2020-11-11 16:00:58 linux-kernel Re: [PATCH v8 06/22] perf arm-spe: Refactor printing string to buffer
2020-11-11 15:55:31 linux-kernel Re: [PATCH v8 06/22] perf arm-spe: Refactor printing string to buffer
2020-11-10 16:08:12 linux-crypto Re: [PATCH 0/1] arm64: Accelerate Adler32 using arm64 SVE instructions.
2020-11-10 10:47:14 linux-crypto Re: [PATCH 0/1] arm64: Accelerate Adler32 using arm64 SVE instructions.
2020-11-05 17:57:29 linux-crypto Re: [PATCH 1/1] arm64: Accelerate Adler32 using arm64 SVE instructions.
2020-11-05 16:54:12 linux-crypto Re: [PATCH 0/1] arm64: Accelerate Adler32 using arm64 SVE instructions.
2020-11-04 19:08:19 linux-crypto Re: [PATCH 1/1] arm64: Accelerate Adler32 using arm64 SVE instructions.
2020-11-04 14:51:19 linux-crypto Re: [PATCH 1/1] arm64: Accelerate Adler32 using arm64 SVE instructions.
2020-11-04 12:21:35 linux-kernel Re: BTI interaction between seccomp filters in systemd and glibc mprotect calls, causing service failures
2020-11-03 18:02:04 linux-crypto Re: [PATCH 1/1] arm64: Accelerate Adler32 using arm64 SVE instructions.
2020-10-28 18:32:10 linux-kernel Re: BTI interaction between seccomp filters in systemd and glibc mprotect calls, causing service failures
2020-10-28 09:35:33 linux-kernel Re: BTI interaction between seccomp filters in systemd and glibc mprotect calls, causing service failures
2020-10-26 23:34:38 linux-kernel Re: BTI interaction between seccomp filters in systemd and glibc mprotect calls, causing service failures
2020-10-26 20:58:15 linux-kernel Re: BTI interaction between seccomp filters in systemd and glibc mprotect calls, causing service failures
2020-10-26 19:36:09 linux-kernel Re: BTI interaction between seccomp filters in systemd and glibc mprotect calls, causing service failures
2020-10-13 12:00:36 linux-ext4 Re: [PATCH v3 RESEND] fcntl: Add 32bit filesystem mode
2020-10-12 13:37:03 linux-kernel Re: [RFC PATCH 1/4] x86/signal: Introduce helpers to get the maximum signal frame size
2020-10-07 16:19:34 linux-kernel Re: [RFC PATCH 0/4] x86: Improve Minimum Alternate Stack Size
2020-10-07 11:08:04 linux-kernel Re: [RFC PATCH 0/4] x86: Improve Minimum Alternate Stack Size
2020-10-07 10:24:46 linux-kernel Re: [RFC PATCH 0/4] x86: Improve Minimum Alternate Stack Size
2020-10-07 10:21:32 linux-kernel Re: [RFC PATCH 0/4] x86: Improve Minimum Alternate Stack Size
2020-10-07 10:07:32 linux-kernel Re: [RFC PATCH 1/4] x86/signal: Introduce helpers to get the maximum signal frame size
2020-10-07 08:50:52 linux-crypto Re: [BUG][PATCH v3] crypto: arm64: Use x16 with indirect branch to bti_c
2020-10-06 17:01:54 linux-kernel Re: [RFC PATCH 0/4] x86: Improve Minimum Alternate Stack Size
2020-10-06 16:59:07 linux-kernel Re: [RFC PATCH 0/4] x86: Improve Minimum Alternate Stack Size
2020-10-06 15:45:34 linux-kernel Re: [RFC PATCH 0/4] x86: Improve Minimum Alternate Stack Size
2020-10-06 15:28:44 linux-kernel Re: [RFC PATCH 0/4] x86: Improve Minimum Alternate Stack Size
2020-10-06 10:43:58 linux-crypto Re: [BUG][PATCH] crypto: arm64: Avoid indirect branch to bti_c
2020-10-06 10:02:00 linux-crypto Re: [BUG][PATCH] crypto: arm64: Avoid indirect branch to bti_c
2020-10-06 09:39:08 linux-crypto Re: [BUG][PATCH] arm64: bti: fix BTI to handle local indirect branches
2020-10-06 09:29:36 linux-kernel Re: [RFC PATCH 0/4] x86: Improve Minimum Alternate Stack Size
2020-10-05 13:48:02 linux-kernel Re: [RFC PATCH 0/4] x86: Improve Minimum Alternate Stack Size
2020-10-05 13:45:23 linux-kernel Re: [RFC PATCH 1/4] x86/signal: Introduce helpers to get the maximum signal frame size
2020-09-16 18:05:43 linux-kernel Re: [PATCH 3/4] kselftests/arm64: add PAuth test for whether exec() changes keys
2020-09-07 10:38:58 linux-kernel Re: [PATCH v2 3/4] kselftests/arm64: add PAuth test for whether exec() changes keys
2020-09-07 10:32:26 linux-kernel Re: [PATCH 0/4] kselftests/arm64: add PAuth tests
2020-09-07 10:28:37 linux-kernel Re: [PATCH 3/4] kselftests/arm64: add PAuth test for whether exec() changes keys
2020-09-07 10:27:06 linux-kernel Re: [PATCH 1/4] kselftests/arm64: add a basic Pointer Authentication test
2020-09-02 17:12:47 linux-kernel Re: [PATCH v2 3/4] kselftests/arm64: add PAuth test for whether exec() changes keys
2020-09-02 17:02:58 linux-kernel Re: [PATCH 3/4] kselftests/arm64: add PAuth test for whether exec() changes keys
2020-09-02 16:52:10 linux-kernel Re: [PATCH 1/4] kselftests/arm64: add a basic Pointer Authentication test
2020-09-02 16:50:55 linux-kernel Re: [PATCH 0/4] kselftests/arm64: add PAuth tests
2020-09-02 14:12:41 linux-kernel Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
2020-09-01 10:29:33 linux-kernel Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
2020-08-26 17:10:06 linux-kernel Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
2020-08-26 16:50:52 linux-kernel Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
2020-07-07 10:31:23 linux-kernel Re: [PATCH 18/18] arm64: lto: Strengthen READ_ONCE() to acquire when CLANG_LTO=y
2020-07-07 10:13:15 linux-kernel Re: [PATCH 18/18] arm64: lto: Strengthen READ_ONCE() to acquire when CLANG_LTO=y
2020-07-06 17:26:17 linux-kernel Re: [PATCH 0/3] readfile(2): a new syscall to make open/read/close faster