Linux Arch
[Prev Page][Next Page]
- Re: kmem_cache_attr (was Re: [PATCH 04/36] usercopy: Prepare for usercopy whitelisting)
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH v5 00/30] ARM Scalable Vector Extension (SVE)
- From: Dave Martin <Dave.Martin@xxxxxxx>
- kmem_cache_attr (was Re: [PATCH 04/36] usercopy: Prepare for usercopy whitelisting)
- From: Christopher Lameter <cl@xxxxxxxxx>
- Re: [PATCH v3 00/10] posix_clocks: Prepare syscalls for 64 bit time_t conversion
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 33/38] arm64: Implement thread_struct whitelist for hardened usercopy
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v5 00/30] ARM Scalable Vector Extension (SVE)
- From: Yury Norov <ynorov@xxxxxxxxxxxxxxxxxx>
- Re: consolidate swiotlb dma_map implementations
- From: Christian König <christian.koenig@xxxxxxx>
- Re: consolidate swiotlb dma_map implementations
- From: Christoph Hellwig <hch@xxxxxx>
- Re: consolidate swiotlb dma_map implementations
- From: Christian König <ckoenig.leichtzumerken@xxxxxxxxx>
- Re: consolidate swiotlb dma_map implementations
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: consolidate direct dma mapping V4
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [REGRESSION] testing/selftests/x86/ pkeys build failures
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- [PATCH v3 00/10] posix_clocks: Prepare syscalls for 64 bit time_t conversion
- From: Deepa Dinamani <deepa.kernel@xxxxxxxxx>
- [PATCH v3 07/10] include: Add new y2038 safe __kernel_timespec
- From: Deepa Dinamani <deepa.kernel@xxxxxxxxx>
- [PATCH 03/22] signal: Document glibc's si_code of SI_ASYNCNL
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 21/22] signal: Remove the code to clear siginfo before calling copy_siginfo_from_user32
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 15/22] signal/ia64: Move the ia64 specific si_codes to asm-generic/siginfo.h
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 19/22] signal/blackfin: Remove pointless UID16_SIGINFO_COMPAT_NEEDED
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 02/22] signal: Document the strange si_codes used by ptrace event stops
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 14/22] signal/powerpc: Remove redefinition of NSIGTRAP on powerpc
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 13/22] signal: Move addr_lsb into the _sigfault union for clarity
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 20/22] signal: Unify and correct copy_siginfo_from_user32
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 17/22] signal/tile: Move the tile specific si_codes to asm-generic/siginfo.h
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 12/22] signal: unify compat_siginfo_t
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 18/22] signal/blackfin: Move the blackfin specific si_codes to asm-generic/siginfo.h
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 11/22] signal: kill __ARCH_SI_UID_T
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 22/22] signal: Unify and correct copy_siginfo_to_user32
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 16/22] signal/frv: Move the frv specific si_codes to asm-generic/siginfo.h
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 05/22] signal: Clear si_sys_private before copying siginfo to userspace
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 04/22] signal: Ensure no siginfo union member increases the size of struct siginfo
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 07/22] ia64/signal: switch to generic struct siginfo
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 06/22] signal: Remove _sys_private and _overrun_incr from struct compat_siginfo
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 08/22] signal/ia64: switch the last arch-specific copy_siginfo_to_user() to generic version
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 10/22] signal: Remove unnecessary ifdefs now that there is only one struct siginfo
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 09/22] signal/mips: switch mips to generic siginfo
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 01/22] signal: Document all of the signals that use the _sigfault union member
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 00/22] siginfo unification
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 08/11] signal/arm: Document conflicts with SI_USER and SIGFPE
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 33/38] arm64: Implement thread_struct whitelist for hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 07/11] signal/arm64: Document conflicts with SI_USER and SIGFPE, SIGTRAP, SIGBUS
- From: James Morse <james.morse@xxxxxxx>
- [PATCH for 4.16 06/10] membarrier: Provide core serializing command
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [PATCH for 4.16 05/10] membarrier: selftest: Test shared expedited cmd
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [PATCH for 4.16 07/10] x86: Introduce sync_core_before_usermode (v2)
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [PATCH for 4.16 08/10] membarrier: x86: Provide core serializing command (v3)
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [PATCH for 4.16 10/10] membarrier: selftest: Test private expedited sync core cmd
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [PATCH for 4.16 09/10] membarrier: arm64: Provide core serializing command
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [PATCH for 4.16 02/10] powerpc: membarrier: Skip memory barrier in switch_mm() (v7)
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [PATCH for 4.16 01/10] membarrier: selftest: Test private expedited cmd (v2)
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH 08/11] signal/arm: Document conflicts with SI_USER and SIGFPE
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 13/19] udf: prevent bounds-check bypass via speculative execution
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH 07/11] signal/arm64: Document conflicts with SI_USER and SIGFPE, SIGTRAP, SIGBUS
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v5 00/30] ARM Scalable Vector Extension (SVE)
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v5 00/30] ARM Scalable Vector Extension (SVE)
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH 07/11] signal/arm64: Document conflicts with SI_USER and SIGFPE, SIGTRAP, SIGBUS
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v6 02/36] openrisc: add ioremap_nocache declaration before include asm-generic/io.h and sync ioremap prototype with it.
- From: Greentime Hu <green.hu@xxxxxxxxx>
- Re: [PATCH v6 02/36] openrisc: add ioremap_nocache declaration before include asm-generic/io.h and sync ioremap prototype with it.
- From: Stafford Horne <shorne@xxxxxxxxx>
- Re: [PATCH 33/38] arm64: Implement thread_struct whitelist for hardened usercopy
- From: Dave P Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v2 13/19] udf: prevent bounds-check bypass via speculative execution
- From: Jan Kara <jack@xxxxxxx>
- Re: [PATCH 1/2] microblaze: fix endian handling
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 1/2] microblaze: fix endian handling
- From: Michal Simek <monstr@xxxxxxxxx>
- Re: [PATCH 1/2] microblaze: fix endian handling
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 10/22] swiotlb: refactor coherent buffer allocation
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v2 06/19] asm-generic/barrier: mask speculative execution flows
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v6 01/36] asm-generic/io.h: move ioremap_nocache/ioremap_uc/ioremap_wc/ioremap_wt out of ifndef CONFIG_MMU
- From: Greentime Hu <green.hu@xxxxxxxxx>
- [PATCH v6 03/36] sparc: io: To use the define of ioremap_[nocache|wc|wb] in asm-generic/io.h
- From: Greentime Hu <green.hu@xxxxxxxxx>
- [PATCH v6 02/36] openrisc: add ioremap_nocache declaration before include asm-generic/io.h and sync ioremap prototype with it.
- From: Greentime Hu <green.hu@xxxxxxxxx>
- [PATCH v6 04/36] earlycon: add reg-offset to physical address before mapping
- From: Greentime Hu <green.hu@xxxxxxxxx>
- [PATCH v6 05/36] nds32: Assembly macros and definitions
- From: Greentime Hu <green.hu@xxxxxxxxx>
- [PATCH v6 07/36] nds32: Exception handling
- From: Greentime Hu <green.hu@xxxxxxxxx>
- [PATCH v6 08/36] nds32: MMU definitions
- From: Greentime Hu <green.hu@xxxxxxxxx>
- [PATCH v6 06/36] nds32: Kernel booting and initialization
- From: Greentime Hu <green.hu@xxxxxxxxx>
- [PATCH v6 09/36] nds32: MMU initialization
- From: Greentime Hu <green.hu@xxxxxxxxx>
- [PATCH v6 10/36] nds32: MMU fault handling and page table management
- From: Greentime Hu <green.hu@xxxxxxxxx>
- [PATCH v6 12/36] nds32: Process management
- From: Greentime Hu <green.hu@xxxxxxxxx>
- [PATCH v6 11/36] nds32: Cache and TLB routines
- From: Greentime Hu <green.hu@xxxxxxxxx>
- [PATCH v6 14/36] nds32: Atomic operations
- From: Greentime Hu <green.hu@xxxxxxxxx>
- [PATCH v6 13/36] nds32: IRQ handling
- From: Greentime Hu <green.hu@xxxxxxxxx>
- [PATCH v6 16/36] nds32: DMA mapping API
- From: Greentime Hu <green.hu@xxxxxxxxx>
- [PATCH v6 15/36] nds32: Device specific operations
- From: Greentime Hu <green.hu@xxxxxxxxx>
- [PATCH v6 18/36] nds32: System calls handling
- From: Greentime Hu <green.hu@xxxxxxxxx>
- [PATCH v6 17/36] nds32: ELF definitions
- From: Greentime Hu <green.hu@xxxxxxxxx>
- [PATCH v6 20/36] nds32: Signal handling support
- From: Greentime Hu <green.hu@xxxxxxxxx>
- [PATCH v6 22/36] nds32: Debugging support
- From: Greentime Hu <green.hu@xxxxxxxxx>
- [PATCH v6 21/36] nds32: Library functions
- From: Greentime Hu <green.hu@xxxxxxxxx>
- [PATCH v6 25/36] nds32: Generic timers support
- From: Greentime Hu <green.hu@xxxxxxxxx>
- [PATCH v6 24/36] nds32: Loadable modules
- From: Greentime Hu <green.hu@xxxxxxxxx>
- [PATCH v6 26/36] nds32: Device tree support
- From: Greentime Hu <green.hu@xxxxxxxxx>
- [PATCH v6 27/36] nds32: Miscellaneous header files
- From: Greentime Hu <green.hu@xxxxxxxxx>
- [PATCH v6 28/36] nds32: defconfig
- From: Greentime Hu <green.hu@xxxxxxxxx>
- [PATCH v6 30/36] MAINTAINERS: Add nds32
- From: Greentime Hu <green.hu@xxxxxxxxx>
- [PATCH v6 29/36] nds32: Build infrastructure
- From: Greentime Hu <green.hu@xxxxxxxxx>
- [PATCH v6 32/36] dt-bindings: nds32 L2 cache controller Bindings
- From: Greentime Hu <green.hu@xxxxxxxxx>
- [PATCH v6 34/36] dt-bindings: interrupt-controller: Andestech Internal Vector Interrupt Controller
- From: Greentime Hu <green.hu@xxxxxxxxx>
- [PATCH v6 33/36] dt-bindings: nds32 SoC Bindings
- From: Greentime Hu <green.hu@xxxxxxxxx>
- [PATCH v6 35/36] irqchip: Andestech Internal Vector Interrupt Controller driver
- From: Greentime Hu <green.hu@xxxxxxxxx>
- [PATCH v6 0/3] clocksource/drivers/atcpit100: Add andestech atcpit100 timer
- From: Greentime Hu <green.hu@xxxxxxxxx>
- [PATCH v6 1/3] clocksource/drivers/atcpit100: Add andestech atcpit100 timer
- From: Greentime Hu <green.hu@xxxxxxxxx>
- [PATCH v6 2/3] clocksource/drivers/atcpit100: VDSO support
- From: Greentime Hu <green.hu@xxxxxxxxx>
- [PATCH v6 3/3] dt-bindings: timer: Add andestech atcpit100 timer binding doc
- From: Greentime Hu <green.hu@xxxxxxxxx>
- [PATCH v6 36/36] net: faraday add nds32 support.
- From: Greentime Hu <green.hu@xxxxxxxxx>
- [PATCH v6 31/36] dt-bindings: nds32 CPU Bindings
- From: Greentime Hu <green.hu@xxxxxxxxx>
- [PATCH v6 23/36] nds32: L2 cache support
- From: Greentime Hu <green.hu@xxxxxxxxx>
- [PATCH v6 19/36] nds32: VDSO support
- From: Greentime Hu <green.hu@xxxxxxxxx>
- [PATCH v6 00/36] Andes(nds32) Linux Kernel Port
- From: Greentime Hu <green.hu@xxxxxxxxx>
- Re: [PATCH 04/36] usercopy: Prepare for usercopy whitelisting
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH 13/38] ext4: Define usercopy region in ext4_inode_cache slab cache
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH 02/38] usercopy: Enhance and rename report_usercopy()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 04/11] signal/parisc: Document a conflict with SI_USER with SIGFPE
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 1/2] microblaze: fix endian handling
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 04/11] signal/parisc: Document a conflict with SI_USER with SIGFPE
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v3 8/9] x86: use __uaccess_begin_nospec and ASM_IFENCE in get_user paths
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v3 8/9] x86: use __uaccess_begin_nospec and ASM_IFENCE in get_user paths
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 8/9] x86: use __uaccess_begin_nospec and ASM_IFENCE in get_user paths
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/19] prevent bounds-check bypass via speculative execution
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [PATCH v3 1/9] Documentation: document array_ptr
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v3 3/9] arm: implement ifence_array_ptr()
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v3 4/9] x86: implement ifence()
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v3 5/9] x86: implement ifence_array_ptr() and array_ptr_mask()
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v3 6/9] asm/nospec: mask speculative execution flows
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v3 7/9] x86: introduce __uaccess_begin_nospec and ASM_IFENCE
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v3 8/9] x86: use __uaccess_begin_nospec and ASM_IFENCE in get_user paths
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v3 9/9] vfs, fdtable: prevent bounds-check bypass via speculative execution
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v3 2/9] arm64: implement ifence_array_ptr()
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v3 0/9] core, x86: prevent bounds-check bypass via speculative execution
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v2 10/19] ipv4: prevent bounds-check bypass via speculative execution
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 06/19] asm-generic/barrier: mask speculative execution flows
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v2 00/19] prevent bounds-check bypass via speculative execution
- From: Tony Luck <tony.luck@xxxxxxxxx>
- Re: [PATCH v2 15/19] carl9170: prevent bounds-check bypass via speculative execution
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH 04/11] signal/parisc: Document a conflict with SI_USER with SIGFPE
- From: Helge Deller <deller@xxxxxx>
- Re: [PATCH v2 07/19] x86: introduce __uaccess_begin_nospec and ASM_IFENCE
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- [PATCH 2/2] x86/mm/pkeys: Fix fill_sig_info_pkey
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 1/2] mn10300/misalignment: Use SIGSEGV SEGV_MAPERR to report a failed user copy
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 0/2] siginfo fixes
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2 15/19] carl9170: prevent bounds-check bypass via speculative execution
- From: Christian Lamparter <chunkeey@xxxxxxxxx>
- Re: [PATCH v2 07/19] x86: introduce __uaccess_begin_nospec and ASM_IFENCE
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 07/19] x86: introduce __uaccess_begin_nospec and ASM_IFENCE
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v2 07/19] x86: introduce __uaccess_begin_nospec and ASM_IFENCE
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH v2 10/19] ipv4: prevent bounds-check bypass via speculative execution
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v2 15/19] carl9170: prevent bounds-check bypass via speculative execution
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v2 07/19] x86: introduce __uaccess_begin_nospec and ASM_IFENCE
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v2 07/19] x86: introduce __uaccess_begin_nospec and ASM_IFENCE
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH 03/11] signal/openrisc: Fix do_unaligned_access to send the proper signal
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- RE: [PATCH 04/36] usercopy: Prepare for usercopy whitelisting
- From: Christopher Lameter <cl@xxxxxxxxx>
- RE: [PATCH 04/36] usercopy: Prepare for usercopy whitelisting
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH 10/18] qla2xxx: prevent bounds-check bypass via speculative execution
- From: James Bottomley <jejb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 15/19] carl9170: prevent bounds-check bypass via speculative execution
- From: Christian Lamparter <chunkeey@xxxxxxxxx>
- Re: [REGRESSION] testing/selftests/x86/ pkeys build failures (was: Re: [PATCH] mm, x86: pkeys: Introduce PKEY_ALLOC_SIGNALINHERIT and change signal semantics)
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH 06/22] swiotlb: rename swiotlb_free to swiotlb_exit
- From: Konrad Rzeszutek Wilk <konrad@xxxxxxxxxx>
- Re: [PATCH 04/22] powerpc: rename swiotlb_dma_ops
- From: Konrad Rzeszutek Wilk <konrad@xxxxxxxxxx>
- Re: [PATCH 05/22] x86: rename swiotlb_dma_ops
- From: Konrad Rzeszutek Wilk <konrad@xxxxxxxxxx>
- Re: [PATCH 03/11] signal/openrisc: Fix do_unaligned_access to send the proper signal
- From: Stafford Horne <shorne@xxxxxxxxx>
- Re: [PATCH 03/22] ia64: rename swiotlb_dma_ops
- From: Konrad Rzeszutek Wilk <konrad@xxxxxxxxxx>
- Re: [PATCH 21/33] dma-mapping: add an arch_dma_supported hook
- From: Konrad Rzeszutek Wilk <konrad@xxxxxxxxxx>
- Re: [PATCH 19/33] dma-mapping: warn when there is no coherent_dma_mask
- From: Konrad Rzeszutek Wilk <konrad@xxxxxxxxxx>
- Re: [REGRESSION] testing/selftests/x86/ pkeys build failures
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- [REGRESSION] testing/selftests/x86/ pkeys build failures (was: Re: [PATCH] mm, x86: pkeys: Introduce PKEY_ALLOC_SIGNALINHERIT and change signal semantics)
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH v2 01/19] Documentation: document array_ptr
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH v2 00/19] prevent bounds-check bypass via speculative execution
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 06/19] asm-generic/barrier: mask speculative execution flows
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH 01/34] alpha: mark jensen as broken
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 02/34] hexagon: remove unused flush_write_buffers definition
- From: Christoph Hellwig <hch@xxxxxx>
- consolidate direct dma mapping V4
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 04/34] powerpc: remove unused flush_write_buffers definition
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 03/34] m32r: remove unused flush_write_buffers definition
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 06/34] m32r: remove the unused dma_capable helper
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 05/34] arc: remove CONFIG_ARC_PLAT_NEEDS_PHYS_TO_DMA
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 08/34] s390: remove the unused dma_capable helper
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 09/34] dma-mapping: take dma_pfn_offset into account in dma_max_pfn
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 11/34] mips: fix an off-by-one in dma_capable
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 10/34] arm64: don't override dma_max_pfn
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 12/34] dma-mapping: move swiotlb arch helpers to a new header
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 13/34] dma-mapping: move dma_mark_clean to dma-direct.h
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 14/34] hexagon: use the generic dma_capable helper
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 15/34] powerpc: rename dma_direct_ to dma_nommu_
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 18/34] microblaze: remove the dead !NOT_COHERENT_CACHE dma code
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 20/34] dma-mapping: warn when there is no coherent_dma_mask
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 21/34] dma-mapping: clear harmful GFP_* flags in common code
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 22/34] dma-mapping: add an arch_dma_supported hook
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 23/34] dma-mapping: provide a generic asm/dma-mapping.h
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 19/34] s390: move s390_pci_dma_ops to asm/pci_dma.h
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 25/34] dma-direct: use phys_to_dma
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 26/34] dma-direct: add dma address sanity checks
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 29/34] dma-direct: add support for allocation from ZONE_DMA and ZONE_DMA32
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 30/34] dma-direct: retry allocations using GFP_DMA for small masks
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 31/34] dma-direct: make dma_direct_{alloc,free} available to other implementations
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 34/34] h8300: use dma-direct
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 33/34] cris: use dma-direct
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 32/34] dma-direct: reject too small dma masks
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 28/34] dma-direct: use node local allocations for coherent memory
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 27/34] dma-direct: add support for CMA allocation
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 24/34] dma-direct: rename dma_noop to dma_direct
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 16/34] microblaze: rename dma_direct to dma_nommu
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 17/34] microblaze: remove dma_nommu_dma_supported
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 07/34] riscv: remove the unused dma_capable helper
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v2 10/19] ipv4: prevent bounds-check bypass via speculative execution
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 10/18] qla2xxx: prevent bounds-check bypass via speculative execution
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 17/19] qla2xxx: prevent bounds-check bypass via speculative execution
- From: James Bottomley <jejb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 17/19] qla2xxx: prevent bounds-check bypass via speculative execution
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v2 04/19] x86: implement ifence()
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v2 06/19] asm-generic/barrier: mask speculative execution flows
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2 04/19] x86: implement ifence()
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2 00/19] prevent bounds-check bypass via speculative execution
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v2 17/19] qla2xxx: prevent bounds-check bypass via speculative execution
- From: James Bottomley <jejb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/19] prevent bounds-check bypass via speculative execution
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 08/19] x86: use __uaccess_begin_nospec and ASM_IFENCE in get_user paths
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v2 08/19] x86: use __uaccess_begin_nospec and ASM_IFENCE in get_user paths
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 11/11] signal: Ensure generic siginfos the kernel sends have all bits initialized
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH v2 00/19] prevent bounds-check bypass via speculative execution
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH 01/11] signal: Simplify and fix kdb_send_sig
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 02/11] signal/sh: Ensure si_signo is initialized in do_divide_error
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 05/11] signal/metag: Document a conflict with SI_USER with SIGFPE
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 03/11] signal/openrisc: Fix do_unaligned_access to send the proper signal
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 08/11] signal/arm: Document conflicts with SI_USER and SIGFPE
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 06/11] signal/powerpc: Document conflicts with SI_USER and SIGFPE and SIGTRAP
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 09/11] signal: Reduce copy_siginfo to just a memcpy
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 07/11] signal/arm64: Document conflicts with SI_USER and SIGFPE,SIGTRAP,SIGBUS
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 10/11] signal: Introduce clear_siginfo
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 04/11] signal/parisc: Document a conflict with SI_USER with SIGFPE
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH v2 01/19] Documentation: document array_ptr
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v2 02/19] arm64: implement ifence_array_ptr()
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v2 03/19] arm: implement ifence_array_ptr()
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v2 04/19] x86: implement ifence()
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v2 05/19] x86: implement ifence_array_ptr() and array_ptr_mask()
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v2 07/19] x86: introduce __uaccess_begin_nospec and ASM_IFENCE
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v2 09/19] ipv6: prevent bounds-check bypass via speculative execution
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH 00/11] siginfo fixes/cleanups esp SI_USER
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH v2 11/19] vfs, fdtable: prevent bounds-check bypass via speculative execution
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v2 10/19] ipv4: prevent bounds-check bypass via speculative execution
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v2 14/19] [media] uvcvideo: prevent bounds-check bypass via speculative execution
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v2 13/19] udf: prevent bounds-check bypass via speculative execution
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v2 12/19] userns: prevent bounds-check bypass via speculative execution
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v2 15/19] carl9170: prevent bounds-check bypass via speculative execution
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v2 17/19] qla2xxx: prevent bounds-check bypass via speculative execution
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v2 18/19] cw1200: prevent bounds-check bypass via speculative execution
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v2 19/19] net: mpls: prevent bounds-check bypass via speculative execution
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v2 16/19] p54: prevent bounds-check bypass via speculative execution
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v2 08/19] x86: use __uaccess_begin_nospec and ASM_IFENCE in get_user paths
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v2 06/19] asm-generic/barrier: mask speculative execution flows
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH 34/38] arm: Implement thread_struct whitelist for hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 13/38] ext4: Define usercopy region in ext4_inode_cache slab cache
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 10/18] qla2xxx: prevent bounds-check bypass via speculative execution
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH 13/38] ext4: Define usercopy region in ext4_inode_cache slab cache
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH 02/38] usercopy: Enhance and rename report_usercopy()
- From: Christopher Lameter <cl@xxxxxxxxx>
- Re: [PATCH 00/18] prevent bounds-check bypass via speculative execution
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- Re: [PATCH 00/18] prevent bounds-check bypass via speculative execution
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH 34/38] arm: Implement thread_struct whitelist for hardened usercopy
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH 00/18] prevent bounds-check bypass via speculative execution
- From: Jiri Kosina <jikos@xxxxxxxxxx>
- [PATCH 33/38] arm64: Implement thread_struct whitelist for hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 16/38] befs: Define usercopy region in befs_inode_cache slab cache
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 38/38] lkdtm: Update usercopy tests for whitelisting
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 35/38] kvm: whitelist struct kvm_vcpu_arch
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 00/38] Hardened usercopy whitelisting
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 03/38] usercopy: Include offset in hardened usercopy report
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 04/38] lkdtm/usercopy: Adjust test to include an offset to check reporting
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 02/38] usercopy: Enhance and rename report_usercopy()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 01/38] usercopy: Remove pointer from overflow report
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 05/38] stddef.h: Introduce sizeof_field()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 22/38] scsi: Define usercopy region in scsi_sense_cache slab cache
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 23/38] net: Define usercopy region in struct proto slab cache
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 20/38] vxfs: Define usercopy region in vxfs_inode slab cache
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 26/38] sctp: Define usercopy region in SCTP proto slab cache
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 25/38] caif: Define usercopy region in caif proto slab cache
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 19/38] ufs: Define usercopy region in ufs_inode_cache slab cache
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 36/38] kvm: x86: fix KVM_XEN_HVM_CONFIG ioctl
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 37/38] usercopy: Restrict non-usercopy caches to size 0
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 21/38] cifs: Define usercopy region in cifs_request slab cache
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 27/38] sctp: Copy struct sctp_sock.autoclose to userspace using put_user()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 32/38] x86: Implement thread_struct whitelist for hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 31/38] fork: Provide usercopy whitelisting for task_struct
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 18/38] orangefs: Define usercopy region in orangefs_inode_cache slab cache
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 29/38] fork: Define usercopy region in mm_struct slab caches
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 30/38] fork: Define usercopy region in thread_stack slab caches
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 17/38] exofs: Define usercopy region in exofs_inode_cache slab cache
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 28/38] net: Restrict unwhitelisted proto caches to size 0
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 06/38] usercopy: Prepare for usercopy whitelisting
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 08/38] usercopy: Allow strict enforcement of whitelists
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 09/38] usercopy: Mark kmalloc caches as usercopy caches
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 13/38] ext4: Define usercopy region in ext4_inode_cache slab cache
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 34/38] arm: Implement thread_struct whitelist for hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 14/38] ext2: Define usercopy region in ext2_inode_cache slab cache
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 24/38] ip: Define usercopy region in IP proto slab cache
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 15/38] jfs: Define usercopy region in jfs_ip slab cache
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 11/38] vfs: Define usercopy region in names_cache slab caches
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 12/38] vfs: Copy struct mount.mnt_id to userspace using put_user()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 07/38] usercopy: WARN() on slab cache usercopy region violations
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 10/38] dcache: Define usercopy region in dentry_cache slab cache
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 2/5] clk: Prepare to remove asm-generic/clkdev.h
- From: Stephen Boyd <sboyd@xxxxxxxxxxxxxx>
- Re: [PATCH 4/5] clk: sunxi: Use CLK_IS_CRITICAL flag for critical clks
- From: Stephen Boyd <sboyd@xxxxxxxxxxxxxx>
- Re: [PATCH 3/5] arch: Remove clkdev.h asm-generic from Kbuild
- From: Stephen Boyd <sboyd@xxxxxxxxxxxxxx>
- Re: [PATCH 5/5] clk: Move __clk_{get,put}() into private clk.h API
- From: Stephen Boyd <sboyd@xxxxxxxxxxxxxx>
- Re: [PATCH 1/5] blackfin: Use generic clkdev.h header
- From: Stephen Boyd <sboyd@xxxxxxxxxxxxxx>
- Re: [PATCH 02/36] usercopy: Include offset in overflow report
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 04/36] usercopy: Prepare for usercopy whitelisting
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 05/36] usercopy: WARN() on slab cache usercopy region violations
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 04/36] usercopy: Prepare for usercopy whitelisting
- From: Christopher Lameter <cl@xxxxxxxxx>
- Re: [PATCH 05/36] usercopy: WARN() on slab cache usercopy region violations
- From: Christopher Lameter <cl@xxxxxxxxx>
- Re: [PATCH 04/18] arm: implement nospec_ptr()
- From: Laura Abbott <labbott@xxxxxxxxxx>
- Re: [PATCH 08/22] swiotlb: wire up ->dma_supported in swiotlb_dma_ops
- From: Robin Murphy <robin.murphy@xxxxxxx>
- Re: [PATCH 21/22] arm64: replace ZONE_DMA with ZONE_DMA32
- From: Robin Murphy <robin.murphy@xxxxxxx>
- Re: [PATCH 10/22] swiotlb: refactor coherent buffer allocation
- From: Robin Murphy <robin.murphy@xxxxxxx>
- Re: [PATCH 31/33] dma-direct: reject too small dma masks
- From: Robin Murphy <robin.murphy@xxxxxxx>
- Re: [PATCH 27/33] dma-direct: use node local allocations for coherent memory
- From: Robin Murphy <robin.murphy@xxxxxxx>
- Re: [PATCH 21/22] arm64: replace ZONE_DMA with ZONE_DMA32
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH 21/22] arm64: replace ZONE_DMA with ZONE_DMA32
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH v2 for 4.16 02/11] membarrier: selftest: Test private expedited cmd
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [PATCH for 4.16 06/11] membarrier: selftest: Test shared expedited cmd
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [PATCH v7 for 4.16 03/11] powerpc: membarrier: Skip memory barrier in switch_mm()
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [PATCH v2 for 4.16 08/11] x86: Introduce sync_core_before_usermode
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [PATCH v3 for 4.16 09/11] membarrier: x86: Provide core serializing command
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [PATCH for 4.16 07/11] membarrier: Provide core serializing command
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [PATCH for 4.16 11/11] membarrier: selftest: Test private expedited sync core cmd
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [PATCH for 4.16 10/11] membarrier: arm64: Provide core serializing command
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH 10/22] swiotlb: refactor coherent buffer allocation
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH 11/33] dma-mapping: move swiotlb arch helpers to a new header
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH 08/22] swiotlb: wire up ->dma_supported in swiotlb_dma_ops
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH 02/36] usercopy: Include offset in overflow report
- From: Christopher Lameter <cl@xxxxxxxxx>
- Re: [PATCH 31/33] dma-direct: reject too small dma masks
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH 11/33] dma-mapping: move swiotlb arch helpers to a new header
- From: Robin Murphy <robin.murphy@xxxxxxx>
- Re: [PATCH 27/33] dma-direct: use node local allocations for coherent memory
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH 20/33] dma-mapping: clear harmful GFP_* flags in common code
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH 11/33] dma-mapping: move swiotlb arch helpers to a new header
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH 11/33] dma-mapping: move swiotlb arch helpers to a new header
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH 11/33] dma-mapping: move swiotlb arch helpers to a new header
- From: Robin Murphy <robin.murphy@xxxxxxx>
- Re: [PATCH 22/22] arm64: use swiotlb_alloc and swiotlb_free
- From: Robin Murphy <robin.murphy@xxxxxxx>
- Re: [PATCH 21/22] arm64: replace ZONE_DMA with ZONE_DMA32
- From: Robin Murphy <robin.murphy@xxxxxxx>
- Re: [PATCH 10/22] swiotlb: refactor coherent buffer allocation
- From: Robin Murphy <robin.murphy@xxxxxxx>
- Re: [PATCH 08/22] swiotlb: wire up ->dma_supported in swiotlb_dma_ops
- From: Robin Murphy <robin.murphy@xxxxxxx>
- Re: [PATCH 02/22] arm64: rename swiotlb_dma_ops
- From: Robin Murphy <robin.murphy@xxxxxxx>
- Re: [PATCH 27/33] dma-direct: use node local allocations for coherent memory
- From: Robin Murphy <robin.murphy@xxxxxxx>
- Re: [PATCH 20/33] dma-mapping: clear harmful GFP_* flags in common code
- From: Robin Murphy <robin.murphy@xxxxxxx>
- Re: [PATCH 31/33] dma-direct: reject too small dma masks
- From: Robin Murphy <robin.murphy@xxxxxxx>
- Re: [PATCH 10/33] arm64: don't override dma_max_pfn
- From: Robin Murphy <robin.murphy@xxxxxxx>
- Re: [PATCH 09/33] dma-mapping: take dma_pfn_offset into account in dma_max_pfn
- From: Robin Murphy <robin.murphy@xxxxxxx>
- Re: [PATCH 13/36] befs: Define usercopy region in befs_inode_cache slab cache
- From: Luis de Bethencourt <luisbg@xxxxxxxxxx>
- Re: [PATCH 29/33] dma-direct: retry allocations using GFP_DMA for small masks
- From: Vladimir Murzin <vladimir.murzin@xxxxxxx>
- Re: [PATCH 11/33] dma-mapping: move swiotlb arch helpers to a new header
- From: Vladimir Murzin <vladimir.murzin@xxxxxxx>
- Re: consolidate swiotlb dma_map implementations
- From: Christian König <ckoenig.leichtzumerken@xxxxxxxxx>
- [PATCH 01/33] alpha: mark jensen as broken
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 02/33] hexagon: remove unused flush_write_buffers definition
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 03/33] m32r: remove unused flush_write_buffers definition
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 04/33] powerpc: remove unused flush_write_buffers definition
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 07/33] riscv: remove the unused dma_capable helper
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 05/33] arc: remove CONFIG_ARC_PLAT_NEEDS_PHYS_TO_DMA
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 08/33] s390: remove the unused dma_capable helper
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 10/33] arm64: don't override dma_max_pfn
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 12/33] dma-mapping: move dma_mark_clean to dma-direct.h
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 11/33] dma-mapping: move swiotlb arch helpers to a new header
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 13/33] hexagon: use the generic dma_capable helper
- From: Christoph Hellwig <hch@xxxxxx>
- consolidate swiotlb dma_map implementations
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 01/22] swiotlb: suppress warning when __GFP_NOWARN is set
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 03/22] ia64: rename swiotlb_dma_ops
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 02/22] arm64: rename swiotlb_dma_ops
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 05/22] x86: rename swiotlb_dma_ops
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 04/22] powerpc: rename swiotlb_dma_ops
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 06/22] swiotlb: rename swiotlb_free to swiotlb_exit
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 08/22] swiotlb: wire up ->dma_supported in swiotlb_dma_ops
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 07/22] swiotlb: add common swiotlb_map_ops
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 09/22] swiotlb: refactor coherent buffer freeing
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 10/22] swiotlb: refactor coherent buffer allocation
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 11/22] swiotlb: remove various exports
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 12/22] ia64: replace ZONE_DMA with ZONE_DMA32
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 14/22] ia64: clean up swiotlb support
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 13/22] ia64: use generic swiotlb_ops
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 17/22] tile: replace ZONE_DMA with ZONE_DMA32
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 15/22] ia64: remove an ifdef around the content of pci-dma.c
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 16/22] unicore32: use generic swiotlb_ops
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 18/22] tile: use generic swiotlb_ops
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 20/22] mips: use swiotlb_{alloc,free}
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 19/22] mips/netlogic: remove swiotlb support
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 21/22] arm64: replace ZONE_DMA with ZONE_DMA32
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 22/22] arm64: use swiotlb_alloc and swiotlb_free
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 14/33] powerpc: rename dma_direct_ to dma_nommu_
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 15/33] microblaze: rename dma_direct to dma_nommu
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 16/33] microblaze: remove dma_nommu_dma_supported
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 18/33] s390: move s390_pci_dma_ops to asm/pci_dma.h
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 17/33] microblaze: remove the dead !NOT_COHERENT_CACHE dma code
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 20/33] dma-mapping: clear harmful GFP_* flags in common code
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 19/33] dma-mapping: warn when there is no coherent_dma_mask
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 22/33] dma-mapping: provide a generic asm/dma-mapping.h
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 21/33] dma-mapping: add an arch_dma_supported hook
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 23/33] dma-direct: rename dma_noop to dma_direct
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 24/33] dma-direct: use phys_to_dma
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 26/33] dma-direct: add support for CMA allocation
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 27/33] dma-direct: use node local allocations for coherent memory
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 28/33] dma-direct: add support for allocation from ZONE_DMA and ZONE_DMA32
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 29/33] dma-direct: retry allocations using GFP_DMA for small masks
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 31/33] dma-direct: reject too small dma masks
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 32/33] cris: use dma-direct
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 30/33] dma-direct: make dma_direct_{alloc,free} available to other implementations
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 33/33] h8300: use dma-direct
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 25/33] dma-direct: add dma address sanity checks
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 09/33] dma-mapping: take dma_pfn_offset into account in dma_max_pfn
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 06/33] m32r: remove the unused dma_capable helper
- From: Christoph Hellwig <hch@xxxxxx>
- consolidate direct dma mapping V3
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH 04/18] arm: implement nospec_ptr()
- From: Hanjun Guo <guohanjun@xxxxxxxxxx>
- Re: [PATCH 16/18] net: mpls: prevent bounds-check bypass via speculative execution
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 16/18] net: mpls: prevent bounds-check bypass via speculative execution
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH 16/18] net: mpls: prevent bounds-check bypass via speculative execution
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH 04/18] arm: implement nospec_ptr()
- From: Laura Abbott <labbott@xxxxxxxxxx>
- Re: [PATCH 16/18] net: mpls: prevent bounds-check bypass via speculative execution
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH 16/18] net: mpls: prevent bounds-check bypass via speculative execution
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH 16/18] net: mpls: prevent bounds-check bypass via speculative execution
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH 16/18] net: mpls: prevent bounds-check bypass via speculative execution
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 16/18] net: mpls: prevent bounds-check bypass via speculative execution
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- [PATCH v4 00/36] Hardened usercopy whitelisting
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 04/36] usercopy: Prepare for usercopy whitelisting
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 03/36] lkdtm/usercopy: Adjust test to include an offset to check reporting
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 15/36] orangefs: Define usercopy region in orangefs_inode_cache slab cache
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 14/36] exofs: Define usercopy region in exofs_inode_cache slab cache
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 16/36] ufs: Define usercopy region in ufs_inode_cache slab cache
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 13/36] befs: Define usercopy region in befs_inode_cache slab cache
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 19/36] scsi: Define usercopy region in scsi_sense_cache slab cache
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 17/36] vxfs: Define usercopy region in vxfs_inode slab cache
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 18/36] cifs: Define usercopy region in cifs_request slab cache
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 20/36] net: Define usercopy region in struct proto slab cache
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 24/36] sctp: Copy struct sctp_sock.autoclose to userspace using put_user()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 22/36] caif: Define usercopy region in caif proto slab cache
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 23/36] sctp: Define usercopy region in SCTP proto slab cache
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 21/36] ip: Define usercopy region in IP proto slab cache
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 30/36] arm64: Implement thread_struct whitelist for hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 29/36] x86: Implement thread_struct whitelist for hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 25/36] net: Restrict unwhitelisted proto caches to size 0
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 26/36] fork: Define usercopy region in mm_struct slab caches
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 35/36] usercopy: Restrict non-usercopy caches to size 0
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 34/36] usercopy: Allow strict enforcement of whitelists
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 33/36] kvm: x86: fix KVM_XEN_HVM_CONFIG ioctl
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 31/36] arm: Implement thread_struct whitelist for hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 32/36] kvm: whitelist struct kvm_vcpu_arch
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 05/36] usercopy: WARN() on slab cache usercopy region violations
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 36/36] lkdtm: Update usercopy tests for whitelisting
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 11/36] ext2: Define usercopy region in ext2_inode_cache slab cache
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 09/36] vfs: Copy struct mount.mnt_id to userspace using put_user()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 06/36] usercopy: Mark kmalloc caches as usercopy caches
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 07/36] dcache: Define usercopy region in dentry_cache slab cache
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 08/36] vfs: Define usercopy region in names_cache slab caches
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 12/36] jfs: Define usercopy region in jfs_ip slab cache
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 10/36] ext4: Define usercopy region in ext4_inode_cache slab cache
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 28/36] fork: Provide usercopy whitelisting for task_struct
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 27/36] fork: Define usercopy region in thread_stack slab caches
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 01/36] usercopy: Remove pointer from overflow report
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 02/36] usercopy: Include offset in overflow report
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 00/18] prevent bounds-check bypass via speculative execution
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- [PATCH 3/3] exec: Pin stack limit during exec
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 1/3] exec: Pass stack rlimit into mm layout functions
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 0/3] exec: Pin stack limit during exec
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 2/3] exec: Introduce finalize_exec() before start_thread()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 00/18] prevent bounds-check bypass via speculative execution
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH 00/18] prevent bounds-check bypass via speculative execution
- From: Jiri Kosina <jikos@xxxxxxxxxx>
- Re: [PATCH 16/18] net: mpls: prevent bounds-check bypass via speculative execution
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v5 00/30] ARM Scalable Vector Extension (SVE)
- From: Yury Norov <ynorov@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 16/18] net: mpls: prevent bounds-check bypass via speculative execution
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 05/67] dma-mapping: replace PCI_DMA_BUS_IS_PHYS with a flag in struct dma_map_ops
- From: Jesper Nilsson <jesper.nilsson@xxxxxxxx>
- Re: [PATCH 22/67] dma-mapping: clear harmful GFP_* flags in common code
- From: Jesper Nilsson <jesper.nilsson@xxxxxxxx>
- Re: [PATCH 34/67] cris: use dma-direct
- From: Jesper Nilsson <jesper.nilsson@xxxxxxxx>
- Re: [PATCH 16/67] powerpc: rename dma_direct_ to dma_nommu_
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH 07/18] [media] uvcvideo: prevent bounds-check bypass via speculative execution
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 07/18] [media] uvcvideo: prevent bounds-check bypass via speculative execution
- From: Laurent Pinchart <laurent.pinchart@xxxxxxxxxxxxxxxx>
- Re: [PATCH 07/18] [media] uvcvideo: prevent bounds-check bypass via speculative execution
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 07/18] [media] uvcvideo: prevent bounds-check bypass via speculative execution
- From: Laurent Pinchart <laurent.pinchart@xxxxxxxxxxxxxxxx>
- Re: [PATCH 16/18] net: mpls: prevent bounds-check bypass via speculative execution
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 16/18] net: mpls: prevent bounds-check bypass via speculative execution
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 16/18] net: mpls: prevent bounds-check bypass via speculative execution
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH 06/67] hexagon: remove unused flush_write_buffers definition
- From: Richard Kuo <rkuo@xxxxxxxxxxxxxx>
- Re: [PATCH 16/18] net: mpls: prevent bounds-check bypass via speculative execution
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 07/18] [media] uvcvideo: prevent bounds-check bypass via speculative execution
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFCv2 1/4] asm-generic/barrier: add generic nospec helpers
- From: Mark Salter <msalter@xxxxxxxxxx>
- Re: [PATCH 02/18] Documentation: document nospec helpers
- From: Jonathan Corbet <corbet@xxxxxxx>
- Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH 00/18] prevent bounds-check bypass via speculative execution
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH v5 00/30] ARM Scalable Vector Extension (SVE)
- From: Yury Norov <ynorov@xxxxxxxxxxxxxxxxxx>
- RE: [RFCv2 4/4] bpf: inhibit speculated out-of-bounds pointers
- From: "Reshetova, Elena" <elena.reshetova@xxxxxxxxx>
- Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
- From: Andrea Arcangeli <aarcange@xxxxxxxxxx>
- Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
- From: Alan Cox <gnomes@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/18] prevent bounds-check bypass via speculative execution
- From: Bart Van Assche <bart.vanassche@xxxxxxx>
- Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
- From: David Miller <davem@xxxxxxxxxxxxx>
- RE: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH v5 1/3] clocksource/drivers/atcpit100: Add andestech atcpit100 timer
- From: Daniel Lezcano <daniel.lezcano@xxxxxxxxxx>
- Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v5 1/3] clocksource/drivers/atcpit100: Add andestech atcpit100 timer
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH 00/18] prevent bounds-check bypass via speculative execution
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/18] prevent bounds-check bypass via speculative execution
- From: Alan Cox <gnomes@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
- From: Willy Tarreau <w@xxxxxx>
- Re: [PATCH v5 1/3] clocksource/drivers/atcpit100: Add andestech atcpit100 timer
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
- From: Alan Cox <gnomes@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH 02/18] Documentation: document nospec helpers
- From: Jonathan Corbet <corbet@xxxxxxx>
- Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH 17/18] udf: prevent bounds-check bypass via speculative execution
- From: Jan Kara <jack@xxxxxxx>
- Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH 07/18] [media] uvcvideo: prevent bounds-check bypass via speculative execution
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH 07/18] [media] uvcvideo: prevent bounds-check bypass via speculative execution
- From: Laurent Pinchart <laurent.pinchart@xxxxxxxxxxxxxxxx>
- Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
- From: Willy Tarreau <w@xxxxxx>
- Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
- From: Alan Cox <gnomes@xxxxxxxxxxxxxxxxxxx>
- Re: [RFCv2 2/4] Documentation: document nospec helpers
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH 00/18] prevent bounds-check bypass via speculative execution
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 07/18] [media] uvcvideo: prevent bounds-check bypass via speculative execution
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
- From: Willy Tarreau <w@xxxxxx>
- Re: [RFCv2 2/4] Documentation: document nospec helpers
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [RFCv2 2/4] Documentation: document nospec helpers
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 02/18] Documentation: document nospec helpers
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
- From: Alan Cox <gnomes@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
- From: Willy Tarreau <w@xxxxxx>
- Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
- From: Alan Cox <gnomes@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH 00/18] prevent bounds-check bypass via speculative execution
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
- From: Alan Cox <gnomes@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH 00/18] prevent bounds-check bypass via speculative execution
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH 00/18] prevent bounds-check bypass via speculative execution
- From: Arjan van de Ven <arjan@xxxxxxxxxxxxxxx>
- Re: [PATCH 00/18] prevent bounds-check bypass via speculative execution
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
- From: Alan Cox <gnomes@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH 14/18] ipv4: prevent bounds-check bypass via speculative execution
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH 13/18] ipv6: prevent bounds-check bypass via speculative execution
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 07/18] [media] uvcvideo: prevent bounds-check bypass via speculative execution
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH 12/18] Thermal/int340x: prevent bounds-check bypass via speculative execution
- From: Srinivas Pandruvada <srinivas.pandruvada@xxxxxxxxxxxxxxx>
- Re: [PATCH 01/18] asm-generic/barrier: add generic nospec helpers
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH 08/18] carl9170: prevent bounds-check bypass via speculative execution
- From: Christian Lamparter <chunkeey@xxxxxxxxx>
- Re: [PATCH 08/18] carl9170: prevent bounds-check bypass via speculative execution
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH 14/18] ipv4: prevent bounds-check bypass via speculative execution
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH 14/18] ipv4: prevent bounds-check bypass via speculative execution
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 08/18] carl9170: prevent bounds-check bypass via speculative execution
- From: Alan Cox <gnomes@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 13/18] ipv6: prevent bounds-check bypass via speculative execution
- From: Stephen Hemminger <stephen@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 08/18] carl9170: prevent bounds-check bypass via speculative execution
- From: Christian Lamparter <chunkeey@xxxxxxxxx>
- Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
- From: Alan Cox <gnomes@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 14/18] ipv4: prevent bounds-check bypass via speculative execution
- From: Alan Cox <gnomes@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 16/18] net: mpls: prevent bounds-check bypass via speculative execution
- From: Sergei Shtylyov <sergei.shtylyov@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 15/18] vfs, fdtable: prevent bounds-check bypass via speculative execution
- From: Sergei Shtylyov <sergei.shtylyov@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 14/18] ipv4: prevent bounds-check bypass via speculative execution
- From: Sergei Shtylyov <sergei.shtylyov@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 13/18] ipv6: prevent bounds-check bypass via speculative execution
- From: Sergei Shtylyov <sergei.shtylyov@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 12/18] Thermal/int340x: prevent bounds-check bypass via speculative execution
- From: Sergei Shtylyov <sergei.shtylyov@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 09/18] p54: prevent bounds-check bypass via speculative execution
- From: Sergei Shtylyov <sergei.shtylyov@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 08/18] carl9170: prevent bounds-check bypass via speculative execution
- From: Sergei Shtylyov <sergei.shtylyov@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 10/18] qla2xxx: prevent bounds-check bypass via speculative execution
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 07/18] [media] uvcvideo: prevent bounds-check bypass via speculative execution
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 07/18] [media] uvcvideo: prevent bounds-check bypass via speculative execution
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 10/18] qla2xxx: prevent bounds-check bypass via speculative execution
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 14/18] ipv4: prevent bounds-check bypass via speculative execution
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 14/18] ipv4: prevent bounds-check bypass via speculative execution
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/18] prevent bounds-check bypass via speculative execution
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH 01/18] asm-generic/barrier: add generic nospec helpers
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 01/18] asm-generic/barrier: add generic nospec helpers
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/18] prevent bounds-check bypass via speculative execution
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 12/18] Thermal/int340x: prevent bounds-check bypass via speculative execution
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH 12/18] Thermal/int340x: prevent bounds-check bypass via speculative execution
- From: Srinivas Pandruvada <srinivas.pandruvada@xxxxxxxxxxxxxxx>
- [PATCH 00/18] prevent bounds-check bypass via speculative execution
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH 02/18] Documentation: document nospec helpers
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH 01/18] asm-generic/barrier: add generic nospec helpers
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH 04/18] arm: implement nospec_ptr()
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH 03/18] arm64: implement nospec_ptr()
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH 06/18] x86, barrier: stop speculation for failed access_ok
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH 07/18] [media] uvcvideo: prevent bounds-check bypass via speculative execution
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH 08/18] carl9170: prevent bounds-check bypass via speculative execution
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH 09/18] p54: prevent bounds-check bypass via speculative execution
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH 10/18] qla2xxx: prevent bounds-check bypass via speculative execution
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH 11/18] cw1200: prevent bounds-check bypass via speculative execution
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH 12/18] Thermal/int340x: prevent bounds-check bypass via speculative execution
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH 13/18] ipv6: prevent bounds-check bypass via speculative execution
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH 16/18] net: mpls: prevent bounds-check bypass via speculative execution
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH 17/18] udf: prevent bounds-check bypass via speculative execution
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH 18/18] userns: prevent bounds-check bypass via speculative execution
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH 15/18] vfs, fdtable: prevent bounds-check bypass via speculative execution
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH 14/18] ipv4: prevent bounds-check bypass via speculative execution
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH 05/18] x86: implement nospec_barrier()
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH 09/67] arc: remove CONFIG_ARC_PLAT_NEEDS_PHYS_TO_DMA
- From: Vineet Gupta <Vineet.Gupta1@xxxxxxxxxxxx>
- Re: [RFC PATCH] asm/generic: introduce if_nospec and nospec_barrier
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [RFCv2 4/4] bpf: inhibit speculated out-of-bounds pointers
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [RFCv2 4/4] bpf: inhibit speculated out-of-bounds pointers
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [RFC PATCH] asm/generic: introduce if_nospec and nospec_barrier
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [RFCv2 4/4] bpf: inhibit speculated out-of-bounds pointers
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [RFCv2 0/4] API for inhibiting speculative arbitrary read primitives
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [RFCv2 2/4] Documentation: document nospec helpers
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [RFCv2 1/4] asm-generic/barrier: add generic nospec helpers
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [RFCv2 4/4] bpf: inhibit speculated out-of-bounds pointers
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [RFCv2 3/4] arm64: implement nospec_ptr()
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [RFC PATCH] asm/generic: introduce if_nospec and nospec_barrier
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v5 1/3] clocksource/drivers/atcpit100: Add andestech atcpit100 timer
- From: Daniel Lezcano <daniel.lezcano@xxxxxxxxxx>
- Re: [RFC PATCH 1/4] asm-generic/barrier: add generic nospec helpers
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v5 1/3] clocksource/drivers/atcpit100: Add andestech atcpit100 timer
- From: Greentime Hu <green.hu@xxxxxxxxx>
- Re: [RFC PATCH] asm/generic: introduce if_nospec and nospec_barrier
- From: Julia Lawall <julia.lawall@xxxxxxx>
- Re: [PATCH v10 7/8] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [RFC PATCH 1/4] asm-generic/barrier: add generic nospec helpers
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [RFC PATCH] asm/generic: introduce if_nospec and nospec_barrier
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [RFC PATCH] asm/generic: introduce if_nospec and nospec_barrier
- From: Pavel Machek <pavel@xxxxxx>
- Re: [RFC PATCH] asm/generic: introduce if_nospec and nospec_barrier
- From: Alan Cox <gnomes@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] asm/generic: introduce if_nospec and nospec_barrier
- From: Alan Cox <gnomes@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] asm/generic: introduce if_nospec and nospec_barrier
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [RFC PATCH] asm/generic: introduce if_nospec and nospec_barrier
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] asm/generic: introduce if_nospec and nospec_barrier
- From: Alan Cox <gnomes@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] asm/generic: introduce if_nospec and nospec_barrier
- From: Pavel Machek <pavel@xxxxxx>
- Re: [RFC PATCH] asm/generic: introduce if_nospec and nospec_barrier
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] asm/generic: introduce if_nospec and nospec_barrier
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] asm/generic: introduce if_nospec and nospec_barrier
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [RFC PATCH] asm/generic: introduce if_nospec and nospec_barrier
- From: Pavel Machek <pavel@xxxxxx>
- Re: [RFC PATCH] asm/generic: introduce if_nospec and nospec_barrier
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [RFC PATCH] asm/generic: introduce if_nospec and nospec_barrier
- From: Alan Cox <gnomes@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] asm/generic: introduce if_nospec and nospec_barrier
- From: Pavel Machek <pavel@xxxxxx>
- Re: [RFC PATCH] asm/generic: introduce if_nospec and nospec_barrier
- From: Pavel Machek <pavel@xxxxxx>
- Re: [RFC PATCH] asm/generic: introduce if_nospec and nospec_barrier
- From: Jiri Kosina <jikos@xxxxxxxxxx>
- Re: [RFC PATCH] asm/generic: introduce if_nospec and nospec_barrier
- From: Alan Cox <gnomes@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/3] clocksource/drivers/atcpit100: Add andestech atcpit100 timer
- From: Daniel Lezcano <daniel.lezcano@xxxxxxxxxx>
- Re: [RFC PATCH] asm/generic: introduce if_nospec and nospec_barrier
- From: Pavel Machek <pavel@xxxxxx>
- Re: [RFC PATCH] asm/generic: introduce if_nospec and nospec_barrier
- From: Pavel Machek <pavel@xxxxxx>
- [PATCH v10 8/8] ntb: ntb_hw_switchtec: Cleanup 64bit IO defines to use the common header
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v10 1/8] drm/tilcdc: ensure nonatomic iowrite64 is not used
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v10 4/8] iomap: introduce io{read|write}64_{lo_hi|hi_lo}
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v10 5/8] io-64-nonatomic: add io{read|write}64[be]{_lo_hi|_hi_lo} macros
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v10 3/8] powerpc: iomap.c: introduce io{read|write}64_{lo_hi|hi_lo}
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v10 2/8] powerpc: io.h: move iomap.h include so that it can use readq/writeq defs
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v10 7/8] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v10 6/8] ntb: ntb_hw_intel: use io-64-nonatomic instead of in-driver hacks
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v10 0/8] Add io{read|write}64 to io-64-atomic headers
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [RFC PATCH] asm/generic: introduce if_nospec and nospec_barrier
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v9 7/8] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [RFC PATCH] asm/generic: introduce if_nospec and nospec_barrier
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [RFC PATCH] asm/generic: introduce if_nospec and nospec_barrier
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v5 1/3] clocksource/drivers/atcpit100: Add andestech atcpit100 timer
- From: Greentime Hu <green.hu@xxxxxxxxx>
- Re: [PATCH v5 1/3] clocksource/drivers/atcpit100: Add andestech atcpit100 timer
- From: Daniel Lezcano <daniel.lezcano@xxxxxxxxxx>
- Re: [PATCH 4/5] clk: sunxi: Use CLK_IS_CRITICAL flag for critical clks
- From: Maxime Ripard <maxime.ripard@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/4] asm-generic/barrier: add generic nospec helpers
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [RFC PATCH] asm/generic: introduce if_nospec and nospec_barrier
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [RFC PATCH 4/4] bpf: inhibit speculated out-of-bounds pointers
- From: Mark Rutland <mark.rutland@xxxxxxx>
- RE: [RFC PATCH] asm/generic: introduce if_nospec and nospec_barrier
- From: "Reshetova, Elena" <elena.reshetova@xxxxxxxxx>
- Re: [PATCH 30/67] dma-direct: retry allocations using GFP_DMA for small masks
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH 02/67] alpha: mark jensen as broken
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH 27/67] dma-direct: add dma address sanity checks
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH 16/67] powerpc: rename dma_direct_ to dma_nommu_
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH 16/67] powerpc: rename dma_direct_ to dma_nommu_
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH 17/67] microblaze: rename dma_direct to dma_microblaze
- From: Christoph Hellwig <hch@xxxxxx>
[Index of Archives]
[Kernel Announce]
[IETF Annouce]
[Netdev]
[Netfilter]
[Bugtraq]