Tags give the ability to mark specific points in history as being important
-
ASB-2020-06-05_4.9-p
ea3ee3b9 · ·https://source.android.com/security/bulletin/2020-06-01 CVE-2020-8647 CVE-2020-8648 CVE-2020-8428
-
ASB-2020-06-05_4.9-o
7b5a5386 · ·https://source.android.com/security/bulletin/2020-06-01 CVE-2020-8647 CVE-2020-8648 CVE-2020-8428
-
ASB-2020-06-05_4.4-p-release
0b7b3cb5 · ·https://source.android.com/security/bulletin/2020-06-01 CVE-2020-8647 CVE-2020-8648 CVE-2020-8428
-
ASB-2020-06-05_4.4-o-mr1
3ae660dc · ·https://source.android.com/security/bulletin/2020-06-01 CVE-2020-8647 CVE-2020-8648 CVE-2020-8428
-
ASB-2020-06-05_4.4-o-release
e4fad84a · ·https://source.android.com/security/bulletin/2020-06-01 CVE-2020-8647 CVE-2020-8648 CVE-2020-8428
-
ASB-2020-06-05_4.4-p
60fca757 · ·https://source.android.com/security/bulletin/2020-06-01 CVE-2020-8647 CVE-2020-8648 CVE-2020-8428
-
ASB-2020-06-05_4.4-o
db019c76 · ·https://source.android.com/security/bulletin/2020-06-01 CVE-2020-8647 CVE-2020-8648 CVE-2020-8428
-
ASB-2020-06-05_3.18-o-mr1
32b03155 · ·https://source.android.com/security/bulletin/2020-06-01 CVE-2020-8647 CVE-2020-8648 CVE-2020-8428
-
ASB-2020-06-05_3.18-o-release
964ada1f · ·https://source.android.com/security/bulletin/2020-06-01 CVE-2020-8647 CVE-2020-8648 CVE-2020-8428
-
ASB-2020-06-05_3.18
42844fdb · ·https://source.android.com/security/bulletin/2020-06-01 CVE-2020-8647 CVE-2020-8648 CVE-2020-8428
-
x86-mm-2020-06-05
bd1de2a7 · ·Misc changes: - Unexport various PAT primitives - Unexport per-CPU tlbstate Signed-off-by: Ingo Molnar <mingo@kernel.org>
-
x86-mm-2020-06-04
0fcfdf55 · ·Misc changes: - Unexport various PAT primitives - Unexport per-CPU tlbstate Signed-off-by: Ingo Molnar <mingo@kernel.org>
-
core_core_updates_for_5.8
6e0d6ac5 · ·Split the old READ_IMPLIES_EXEC workaround from executable PT_GNU_STACK now that toolchains long support PT_GNU_STACK marking and there's no need anymore to force modern programs into having all its user mappings executable instead of only the stack and the PROT_EXEC ones. Disable that automatic READ_IMPLIES_EXEC forcing on x86-64 and arm64. Add tables documenting how READ_IMPLIES_EXEC is handled on x86-64, arm and arm64. By Kees Cook.
-
x86-timers-2020-06-03
bd35c77e · ·X86 timer specific updates: - Add TPAUSE based delay which allows the CPU to enter an optimized power state while waiting for the delay to pass. The delay is based on TSC cycles. - Add tsc_early_khz command line parameter to workaround the problem that overclocked CPUs can report the wrong frequency via CPUID.16h which causes the refined calibration to fail because the delta to the initial frequency value is too big. With the parameter users can provide an halfways accurate initial value.