LinuxLists
Users
About
Alan Cox (
[email protected]
)
Number of posts: 796 (0.57 per day)
First post: 2014-01-01 20:11:15
Last post: 2017-10-20 18:35:32
Previous Page
/
Next Page
Date
List
Subject
2018-02-25 20:30:56
linux-kernel
Re: Removing architectures without upstream gcc support
2018-02-24 20:09:56
linux-kernel
Re: [PATCH 1/2] fs/efivarfs: restrict inode permissions
2018-02-23 15:45:44
linux-kernel
Re: Removing architectures without upstream gcc support
2018-02-23 15:40:06
linux-kernel
Re: Reasoning about memory ordering
2018-02-20 01:09:20
linux-kernel
Re: [PATCH 2/2] x86/speculation: Support "Enhanced IBRS" on future CPUs
2018-02-20 00:14:49
linux-kernel
Re: [PATCH 2/2] x86/speculation: Support "Enhanced IBRS" on future CPUs
2018-02-19 20:26:52
linux-kernel
Re: Read-protected UEFI variables
2018-02-13 23:48:57
linux-kernel
Re: [BUG] x86 : i486 reporting to be vulnerable to Meltdown/Spectre_V1/Spectre_V2
2018-02-13 23:20:40
linux-kernel
Re: [PATCH] x86/microcode/intel: Use 64-bit arithmetic instead of 32-bit
2018-02-11 23:30:00
linux-kernel
Re: [PATCH 00/31 v2] PTI support for x86_32
2018-02-08 21:19:09
linux-kernel
Re: [BUG] x86 : i486 reporting to be vulnerable to Meltdown/Spectre_V1/Spectre_V2
2018-02-08 20:55:54
linux-kernel
Re: [BUG] x86 : i486 reporting to be vulnerable to Meltdown/Spectre_V1/Spectre_V2
2018-02-08 14:06:14
linux-kernel
Re: [PATCH 5/9] perf utils: add support for arch standard events
2018-02-08 13:52:08
linux-kernel
Re: [BUG] x86 : i486 reporting to be vulnerable to Meltdown/Spectre_V1/Spectre_V2
2018-02-06 22:02:53
linux-kernel
Re: [BUG] x86 : i486 reporting to be vulnerable to Meltdown/Spectre_V1/Spectre_V2
2018-02-02 22:26:37
linux-kernel
Re: [PATCH] KVM: x86: Reduce retpoline performance impact in slot_handle_level_range()
2018-02-02 22:22:39
linux-kernel
Re: asm-generic: Disallow no-op mb() for SMP systems
2018-02-02 22:20:58
linux-kernel
Re: [PATCH v6 2/5] KVM: x86: Add IBPB support
2018-02-01 00:34:13
linux-kernel
Re: [PATCH] tcp_lp: use 64-bit arithmetic instead of 32-bit
2018-01-30 21:12:32
linux-kernel
Re: [RFC,05/10] x86/speculation: Add basic IBRS support infrastructure
2018-01-30 14:57:12
linux-kernel
Re: [PATCH] x86/cpuid: Fix up "virtual" IBRS/IBPB/STIBP feature bits on Intel
2018-01-29 20:39:24
linux-kernel
Re: Avoiding information leaks between users and between processes by default? [Was: : [PATCH 1/5] prctl: add PR_ISOLATE_BP process control]
2018-01-26 19:12:46
linux-kernel
Re: [kernel-hardening] Re: [PATCH v2] cpu: do not leak vulnerabilities to unprivileged users
2018-01-26 16:50:45
linux-kernel
Re: [PATCH v3 5/6] x86/pti: Do not enable PTI on processors which are not vulnerable to Meltdown
2018-01-26 16:44:13
linux-kernel
Re: [PATCH v2] cpu: do not leak vulnerabilities to unprivileged users
2018-01-25 17:13:19
linux-kernel
Re: [RFC PATCH 00/16] PTI support for x86-32
2018-01-25 16:18:35
linux-kernel
Re: [PATCH v4 6/7] x86/cpufeature: Blacklist SPEC_CTRL on early Spectre v2 microcodes
2018-01-25 15:15:00
linux-kernel
Re: [PATCH v4 5/7] x86/pti: Do not enable PTI on processors which are not vulnerable to Meltdown
2018-01-25 14:34:23
linux-kernel
Re: [PATCH] cpu: do not leak vulnerabilities to unprivileged users
2018-01-24 20:47:55
linux-kernel
Re: Avoiding information leaks between users and between processes by default? [Was: : [PATCH 1/5] prctl: add PR_ISOLATE_BP process control]
2018-01-24 18:42:26
linux-kernel
Re: [PATCH v2 5/5] x86/pti: Do not enable PTI on fixed Intel processors
2018-01-24 18:27:37
linux-kernel
Re: [PATCH] x86/centaur: Mark TSC invariant
2018-01-24 17:08:20
linux-kernel
Re: [PATCH v2 5/5] x86/pti: Do not enable PTI on fixed Intel processors
2018-01-24 16:05:40
linux-kernel
Re: LKML admins (syzbot emails are not delivered)
2018-01-24 15:44:23
linux-kernel
Re: Avoiding information leaks between users and between processes by default? [Was: : [PATCH 1/5] prctl: add PR_ISOLATE_BP process control]
2018-01-23 20:46:39
linux-kernel
Re: [PATCH v2 5/5] x86/pti: Do not enable PTI on fixed Intel processors
2018-01-23 18:47:17
linux-kernel
Re: [PATCH v2 5/5] x86/pti: Do not enable PTI on fixed Intel processors
2018-01-23 15:53:48
linux-kernel
Re: RCU stall in 8250 serial driver Linux 4.15-rc1
2018-01-23 15:01:13
linux-kernel
Re: [RFC PATCH 00/16] PTI support for x86-32
2018-01-23 14:44:38
linux-kernel
Re: [RFC PATCH 00/16] PTI support for x86-32
2018-01-20 18:53:52
linux-kernel
Re: [PATCH V1] tty: fix data race between tty_init_dev and flush of buf
2018-01-20 18:53:52
linux-kernel
Re: [PATCH] tty: fix data race in n_tty_receive_buf_common
2018-01-11 19:35:45
linux-kernel
Re: [RFC PATCH v2 6/6] x86/entry/pti: don't switch PGD on when pti_disable is set
2018-01-08 18:25:45
linux-kernel
Re: [PATCH RFC 3/4] x86/pti: don't mark the user PGD with _PAGE_NX.
2018-01-08 18:22:54
linux-kernel
Re: [v2,03/11] arm64: Take into account ID_AA64PFR0_EL1.CSV3
2018-01-08 12:13:43
linux-kernel
Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
2018-01-08 11:55:11
linux-kernel
Re: [patch V2 1/2] sysfs/cpu: Add vulnerability folder
2018-01-08 11:46:13
linux-kernel
Re: [PATCH 00/18] prevent bounds-check bypass via speculative execution
2018-01-08 11:46:09
linux-wireless
Re: [PATCH 00/18] prevent bounds-check bypass via speculative execution
2018-01-07 19:25:21
linux-kernel
Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
2018-01-07 14:36:33
linux-kernel
Re: Proposal: CAP_PAYLOAD to reduce Meltdown and Spectre mitigation costs