[<prev month] [next month>] [year] [list]
kernel-hardening mailing list - 2018/01
Messages by day:
January 3 (15 messages)
January 4 (7 messages)
January 5 (4 messages)
January 6 (2 messages)
January 8 (9 messages)
January 9 (42 messages)
January 10 (8 messages)
January 11 (47 messages)
January 12 (54 messages)
January 13 (27 messages)
January 14 (5 messages)
January 15 (8 messages)
January 16 (14 messages)
January 17 (20 messages)
January 18 (19 messages)
January 19 (22 messages)
- [PATCH v4 00/10] prevent bounds-check bypass via speculative
execution (Dan Williams <dan.j.williams@...el.com>)
- [PATCH v4 02/10] asm/nospec,
array_ptr: sanitize speculative array de-references (Dan Williams <dan.j.williams@...el.com>)
- [PATCH v4 01/10] Documentation: document array_ptr (Dan Williams <dan.j.williams@...el.com>)
- [PATCH v4 03/10] x86: implement array_ptr_mask() (Dan Williams <dan.j.williams@...el.com>)
- [PATCH v4 04/10] x86: introduce __uaccess_begin_nospec and ifence (Dan Williams <dan.j.williams@...el.com>)
- [PATCH v4 05/10] x86, __get_user: use __uaccess_begin_nospec (Dan Williams <dan.j.williams@...el.com>)
- [PATCH v4 06/10] x86,
get_user: use pointer masking to limit speculation (Dan Williams <dan.j.williams@...el.com>)
- [PATCH v4 07/10] x86: narrow out of bounds syscalls to sys_read
under speculation (Dan Williams <dan.j.williams@...el.com>)
- [PATCH v4 08/10] vfs,
fdtable: prevent bounds-check bypass via speculative execution (Dan Williams <dan.j.williams@...el.com>)
- [PATCH v4 09/10] kvm, x86: fix spectre-v1 mitigation (Dan Williams <dan.j.williams@...el.com>)
- [PATCH v4 10/10] nl80211: sanitize array index in parse_txq_params (Dan Williams <dan.j.williams@...el.com>)
- Re: [RFC][PATCH] get rid of the use of set_fs() (by way of
kernel_recvmsg()) in sunrpc (Al Viro <viro@...IV.linux.org.uk>)
- Re: [PATCH v4 09/10] kvm, x86: fix spectre-v1 mitigation (Paolo Bonzini <pbonzini@...hat.com>)
- Re: [PATCH v4 02/10] asm/nospec, array_ptr:
sanitize speculative array de-references (Jann Horn <jannh@...gle.com>)
- Re: [PATCH v4 02/10] asm/nospec, array_ptr:
sanitize speculative array de-references (Dan Williams <dan.j.williams@...el.com>)
- Re: [PATCH v4 02/10] asm/nospec, array_ptr: sanitize speculative array de-references (Adam Sampson <ats@...og.org>)
- Re: [PATCH v4 02/10] asm/nospec, array_ptr:
sanitize speculative array de-references (Will Deacon <will.deacon@....com>)
- Re: [PATCH v4 02/10] asm/nospec, array_ptr:
sanitize speculative array de-references (Linus Torvalds <torvalds@...ux-foundation.org>)
- Re: [PATCH v4 02/10] asm/nospec, array_ptr:
sanitize speculative array de-references (Dan Williams <dan.j.williams@...el.com>)
- Re: [PATCH] fork: Allow stack to be wiped on fork (Laura Abbott <labbott@...hat.com>)
- Re: [PATCH v4 02/10] asm/nospec, array_ptr:
sanitize speculative array de-references (Dan Williams <dan.j.williams@...el.com>)
- Re: [PATCH 0/3] exec: Pin stack limit during exec (Kees Cook <keescook@...omium.org>)
January 20 (19 messages)
January 21 (9 messages)
January 22 (10 messages)
January 23 (4 messages)
January 24 (13 messages)
January 25 (23 messages)
January 26 (21 messages)
January 27 (17 messages)
January 28 (26 messages)
January 29 (8 messages)
January 30 (31 messages)
January 31 (9 messages)
493 messages
Powered by blists - more mailing lists
Confused about mailing lists and their use?
Read about mailing lists on Wikipedia
and check out these
guidelines on proper formatting of your messages.