Alan Cox ([email protected])

Number of posts: 796 (0.57 per day)
First post: 2014-01-01 20:11:15
Last post: 2017-10-20 18:35:32

Date List Subject
2018-02-25 20:30:56 linux-kernel Re: Removing architectures without upstream gcc support
2018-02-24 20:09:56 linux-kernel Re: [PATCH 1/2] fs/efivarfs: restrict inode permissions
2018-02-23 15:45:44 linux-kernel Re: Removing architectures without upstream gcc support
2018-02-23 15:40:06 linux-kernel Re: Reasoning about memory ordering
2018-02-20 01:09:20 linux-kernel Re: [PATCH 2/2] x86/speculation: Support "Enhanced IBRS" on future CPUs
2018-02-20 00:14:49 linux-kernel Re: [PATCH 2/2] x86/speculation: Support "Enhanced IBRS" on future CPUs
2018-02-19 20:26:52 linux-kernel Re: Read-protected UEFI variables
2018-02-13 23:48:57 linux-kernel Re: [BUG] x86 : i486 reporting to be vulnerable to Meltdown/Spectre_V1/Spectre_V2
2018-02-13 23:20:40 linux-kernel Re: [PATCH] x86/microcode/intel: Use 64-bit arithmetic instead of 32-bit
2018-02-11 23:30:00 linux-kernel Re: [PATCH 00/31 v2] PTI support for x86_32
2018-02-08 21:19:09 linux-kernel Re: [BUG] x86 : i486 reporting to be vulnerable to Meltdown/Spectre_V1/Spectre_V2
2018-02-08 20:55:54 linux-kernel Re: [BUG] x86 : i486 reporting to be vulnerable to Meltdown/Spectre_V1/Spectre_V2
2018-02-08 14:06:14 linux-kernel Re: [PATCH 5/9] perf utils: add support for arch standard events
2018-02-08 13:52:08 linux-kernel Re: [BUG] x86 : i486 reporting to be vulnerable to Meltdown/Spectre_V1/Spectre_V2
2018-02-06 22:02:53 linux-kernel Re: [BUG] x86 : i486 reporting to be vulnerable to Meltdown/Spectre_V1/Spectre_V2
2018-02-02 22:26:37 linux-kernel Re: [PATCH] KVM: x86: Reduce retpoline performance impact in slot_handle_level_range()
2018-02-02 22:22:39 linux-kernel Re: asm-generic: Disallow no-op mb() for SMP systems
2018-02-02 22:20:58 linux-kernel Re: [PATCH v6 2/5] KVM: x86: Add IBPB support
2018-02-01 00:34:13 linux-kernel Re: [PATCH] tcp_lp: use 64-bit arithmetic instead of 32-bit
2018-01-30 21:12:32 linux-kernel Re: [RFC,05/10] x86/speculation: Add basic IBRS support infrastructure
2018-01-30 14:57:12 linux-kernel Re: [PATCH] x86/cpuid: Fix up "virtual" IBRS/IBPB/STIBP feature bits on Intel
2018-01-29 20:39:24 linux-kernel Re: Avoiding information leaks between users and between processes by default? [Was: : [PATCH 1/5] prctl: add PR_ISOLATE_BP process control]
2018-01-26 19:12:46 linux-kernel Re: [kernel-hardening] Re: [PATCH v2] cpu: do not leak vulnerabilities to unprivileged users
2018-01-26 16:50:45 linux-kernel Re: [PATCH v3 5/6] x86/pti: Do not enable PTI on processors which are not vulnerable to Meltdown
2018-01-26 16:44:13 linux-kernel Re: [PATCH v2] cpu: do not leak vulnerabilities to unprivileged users
2018-01-25 17:13:19 linux-kernel Re: [RFC PATCH 00/16] PTI support for x86-32
2018-01-25 16:18:35 linux-kernel Re: [PATCH v4 6/7] x86/cpufeature: Blacklist SPEC_CTRL on early Spectre v2 microcodes
2018-01-25 15:15:00 linux-kernel Re: [PATCH v4 5/7] x86/pti: Do not enable PTI on processors which are not vulnerable to Meltdown
2018-01-25 14:34:23 linux-kernel Re: [PATCH] cpu: do not leak vulnerabilities to unprivileged users
2018-01-24 20:47:55 linux-kernel Re: Avoiding information leaks between users and between processes by default? [Was: : [PATCH 1/5] prctl: add PR_ISOLATE_BP process control]
2018-01-24 18:42:26 linux-kernel Re: [PATCH v2 5/5] x86/pti: Do not enable PTI on fixed Intel processors
2018-01-24 18:27:37 linux-kernel Re: [PATCH] x86/centaur: Mark TSC invariant
2018-01-24 17:08:20 linux-kernel Re: [PATCH v2 5/5] x86/pti: Do not enable PTI on fixed Intel processors
2018-01-24 16:05:40 linux-kernel Re: LKML admins (syzbot emails are not delivered)
2018-01-24 15:44:23 linux-kernel Re: Avoiding information leaks between users and between processes by default? [Was: : [PATCH 1/5] prctl: add PR_ISOLATE_BP process control]
2018-01-23 20:46:39 linux-kernel Re: [PATCH v2 5/5] x86/pti: Do not enable PTI on fixed Intel processors
2018-01-23 18:47:17 linux-kernel Re: [PATCH v2 5/5] x86/pti: Do not enable PTI on fixed Intel processors
2018-01-23 15:53:48 linux-kernel Re: RCU stall in 8250 serial driver Linux 4.15-rc1
2018-01-23 15:01:13 linux-kernel Re: [RFC PATCH 00/16] PTI support for x86-32
2018-01-23 14:44:38 linux-kernel Re: [RFC PATCH 00/16] PTI support for x86-32
2018-01-20 18:53:52 linux-kernel Re: [PATCH V1] tty: fix data race between tty_init_dev and flush of buf
2018-01-20 18:53:52 linux-kernel Re: [PATCH] tty: fix data race in n_tty_receive_buf_common
2018-01-11 19:35:45 linux-kernel Re: [RFC PATCH v2 6/6] x86/entry/pti: don't switch PGD on when pti_disable is set
2018-01-08 18:25:45 linux-kernel Re: [PATCH RFC 3/4] x86/pti: don't mark the user PGD with _PAGE_NX.
2018-01-08 18:22:54 linux-kernel Re: [v2,03/11] arm64: Take into account ID_AA64PFR0_EL1.CSV3
2018-01-08 12:13:43 linux-kernel Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
2018-01-08 11:55:11 linux-kernel Re: [patch V2 1/2] sysfs/cpu: Add vulnerability folder
2018-01-08 11:46:13 linux-kernel Re: [PATCH 00/18] prevent bounds-check bypass via speculative execution
2018-01-08 11:46:09 linux-wireless Re: [PATCH 00/18] prevent bounds-check bypass via speculative execution
2018-01-07 19:25:21 linux-kernel Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
2018-01-07 14:36:33 linux-kernel Re: Proposal: CAP_PAYLOAD to reduce Meltdown and Spectre mitigation costs