binutils archive
date index for January, 2018

This is the mail archive of the binutils@sourceware.org mailing list for the binutils project.

Indexes: [Date Index] [Subject Index] [Author Index] [Thread Index]
Site Nav: [Browse other archives for this mailing list]
[Browse other mailing lists at this site]
Search: Limit to:

January 16, 2018
16:02 New Russian PO file for 'bfd' (version 2.30.0) Translation Project Robot
14:32 New Ukrainian PO file for 'bfd' (version 2.30.0) Translation Project Robot
13:20 Re: 2.30 branch created, snapshot available Joel Brobecker
12:47 Re: New French PO file for 'gas' (version 2.30.0) Nick Clifton
12:10 Re: 2.30 branch created, snapshot available Nick Clifton
11:33 Re: 2.30 branch created, snapshot available Joel Brobecker
11:22 FYI/pushed: Remove trailing spaces in binutils/README-how-to-make-a-release Joel Brobecker
11:22 Re: [PATCH, GAS] No IT usage deprecation for ARMv8-M Nick Clifton
11:18 Re: [gold commit] PR 22694: Fix -fuse-ld option to accept string argument Nick Clifton
10:33 Re: 2.30 branch created, snapshot available Nick Clifton

January 15, 2018
22:57 [PATCH] RISC-V: Add support for addi that compresses to c.nop. Jim Wilson
22:29 Re: smaller PLT entries for aarch64 (64-bit ARM) Andreas Schwab
22:07 Re: smaller PLT entries for aarch64 (64-bit ARM) Andrew Pinski
21:46 smaller PLT entries for aarch64 (64-bit ARM) John Reiser
20:55 Re: 2.30 branch created, snapshot available Matt Rice
20:07 New French PO file for 'gas' (version 2.30.0) Translation Project Robot
18:17 New French PO file for 'binutils' (version 2.30.0) Translation Project Robot
18:12 [gold commit] PR 22694: Fix -fuse-ld option to accept string argument Cary Coutant
17:37 New Brazilian Portuguese PO file for 'opcodes' (version 2.30.0) Translation Project Robot
17:17 New German PO file for 'opcodes' (version 2.30.0) Translation Project Robot
16:08 Re: Commit: Update libiberty sources H.J. Lu
16:03 Re: Commit: Update libiberty sources Szabolcs Nagy
15:17 New Brazilian Portuguese PO file for 'ld' (version 2.30.0) Translation Project Robot
15:12 New Brazilian Portuguese PO file for 'ld' (version 2.30.0) Translation Project Robot
14:41 Re: [PATCH, GAS] No IT usage deprecation for ARMv8-M Thomas Preudhomme
14:25 Re: [PATCH, GAS] No IT usage deprecation for ARMv8-M Thomas Preudhomme
12:12 Re: New Ukrainian PO file for 'gold' (version 2.30.0) Nick Clifton
07:29 Re: 2.30 branch created, snapshot available Joel Brobecker

January 14, 2018
20:02 New Ukrainian PO file for 'gold' (version 2.30.0) Translation Project Robot
18:27 New Ukrainian PO file for 'bfd' (version 2.30.0) Translation Project Robot
16:37 New Ukrainian PO file for 'binutils' (version 2.30.0) Translation Project Robot
12:27 New Ukrainian PO file for 'gas' (version 2.30.0) Translation Project Robot
11:27 New Ukrainian PO file for 'opcodes' (version 2.30.0) Translation Project Robot
11:07 New Ukrainian PO file for 'ld' (version 2.30.0) Translation Project Robot
09:50 New template for 'bfd' made available Translation Project Robot
09:48 New template for 'opcodes' made available Translation Project Robot
09:45 New template for 'ld' made available Translation Project Robot
09:42 New template for 'gas' made available Translation Project Robot
09:40 New template for 'gold' made available Translation Project Robot
09:38 New template for 'binutils' made available Translation Project Robot
07:25 re photos Jason
07:21 re your images Jason

January 13, 2018
14:27 2.30 branch created, snapshot available Nick Clifton
08:48 S12Z update John Darrington
02:41 [gold commit] Update gold version number to 1.15 Cary Coutant

January 12, 2018
23:54 Re: [gold patch] When comparing two symbols, handle the forwarding case Sterling Augustine via binutil
20:20 Re: Autoconf catch 22 Maciej W. Rozycki
20:11 Re: Autoconf catch 22 Andreas Schwab
20:02 Autoconf catch 22 John Darrington
17:24 Re: [gold patch] When comparing two symbols, handle the forwarding case Cary Coutant
17:20 Branching tomorrow... Nick Clifton
13:18 Re: [PATCH v2] Optimize reading ELF objects with many group sections Nick Clifton
13:14 Re: [PATCH] [GAS] Remove build warnings for a.out targets Nick Clifton
12:19 Re: [PATCH] ld: Default the maximum page size to the common page size for -z separate-code H.J. Lu
11:39 Re: [PATCH] ld: Default the maximum page size to the common page size for -z separate-code H.J. Lu
11:34 Re: [PATCH] ld: Pad the previous code segment with NOPs H.J. Lu
10:51 pr22374 function pointer initialization Alan Modra
10:50 Re: [PATCH] [BFD] Fix override of COMMON symbols for a.out Alan Modra
10:45 Re: [PATCH] ld: Keep PREINIT_ARRAY/INIT_ARRAY/FINI_ARRAY sections for -r --gc-section Alan Modra
10:29 Re: [PATCH] ld: Keep PREINIT_ARRAY/INIT_ARRAY/FINI_ARRAY sections for -r --gc-section Nick Clifton
09:39 [PATCH v2] Optimize reading ELF objects with many group sections Jens Widell
09:38 Re: [PATCH v2] _bfd_mips_elf_final_link: notify user about wrong .reginfo size Maciej W. Rozycki
09:10 Fixes for "Ignore dynamic references on forced local symbols" Alan Modra
08:45 Re: [PATCH] Ignore dynamic references on forced local symbols Alan Modra
08:44 Re: [PATCH] ld: Pad the previous code segment with NOPs Alan Modra
08:32 Re: [PATCH] Ignore dynamic references on forced local symbols Christophe Lyon
08:18 Re: RFC: -z defs: documentation and reverting Nick Clifton
08:10 Re: [PATCH] ld: Keep PREINIT_ARRAY/INIT_ARRAY/FINI_ARRAY sections for -r --gc-section Alan Modra
05:55 Re: [PATCH] ld: Default the maximum page size to the common page size for -z separate-code Alan Modra
05:13 [PATCH] ld: Default the maximum page size to the common page size for -z separate-code H.J. Lu
04:48 [committed, PATCH] ld: Replace "-z textonly" with "-z separate-code" H.J. Lu
03:25 [PATCH] ld: Pad the previous code segment with NOPs H.J. Lu
02:58 Re: 2.30 Branch Planned for Friday... H.J. Lu
02:16 Re: 2.30 Branch Planned for Friday... Alan Modra

January 11, 2018
23:31 Re: [PATCH] Ignore dynamic references on forced local symbols Alan Modra
21:32 Re: 2.30 Branch Planned for Friday... H.J. Lu
21:31 [PATCH] Ignore dynamic references on forced local symbols H.J. Lu
19:29 [PATCH] [GAS] Remove build warnings for a.out targets gnikl
18:55 [PATCH] [BFD] Fix override of COMMON symbols for a.out gnikl
17:42 Re: [PATCH 0/4] Fix issue with PROVIDE in linker scripts Andrew Burgess
17:34 Re: 2.30 Branch Planned for Friday... Nick Clifton
17:27 Re: 2.30 Branch Planned for Friday... H.J. Lu
17:07 Re: 2.30 Branch Planned for Friday... Nick Clifton
16:58 Re: 2.30 Branch Planned for Friday... H.J. Lu
16:57 [PATCH] ld: Keep PREINIT_ARRAY/INIT_ARRAY/FINI_ARRAY sections for -r --gc-section H.J. Lu
16:30 Re: 2.30 Branch Planned for Friday... H.J. Lu
16:24 Re: 2.30 Branch Planned for Friday... Nick Clifton
15:18 Gold linker / solaris PR ping John Marino
14:47 Re: 2.30 Branch Planned for Friday... H.J. Lu
13:10 [committed, PATCH] Fix the order of SHLIB_RODATA_ADDR in elf.sc H.J. Lu
00:35 Re: 2.30 Branch Planned for Friday... Maciej W. Rozycki

January 10, 2018
23:15 Re: archive test rebuild using binutils trunk Alan Modra
22:50 [gold patch] When comparing two symbols, handle the forwarding case Sterling Augustine via binutil
20:08 Re: archive test rebuild using binutils trunk Matthias Klose
20:07 archive test rebuild using binutils trunk Matthias Klose
18:52 [PATCH 3/4] ld: Add tests for -z separate-code and -z noseparate-code H.J. Lu
18:52 [PATCH 4/4] x86-64: Add tests for -z separate-code -z max-page-size=0x1000 H.J. Lu
18:52 [PATCH 1/4] ld: Add "-z separate-code" option to ELF linker H.J. Lu
18:52 [PATCH 2/4] ld: Create a new LOAD segment for separate code segment H.J. Lu
18:52 [PATCH 0/4] ld: Add "-z separate-code" option to ELF linker H.J. Lu
17:59 Re: [PATCH] Remove VL variants for 4FMAPS and 4VNNIW insns. H.J. Lu
17:35 [PATCH] Remove VL variants for 4FMAPS and 4VNNIW insns. Tsimbalist, Igor V
15:29 Oops - config update patch omitted Nick Clifton
15:28 Commit: Update config/ and the top level configure files Nick Clifton
14:27 Re: [PATCH 0/6] ld: Add "-z textonly" option to ELF linker H.J. Lu
13:59 Commit: Update libiberty sources Nick Clifton
13:43 Re: [PATCH] x86: fix Disp8 handling for scalar AVX512_4FMAPS insns H.J. Lu
13:23 RE: [PATCH] x86: fix Disp8 handling for scalar AVX512_4FMAPS insns Jan Beulich
13:15 RE: [PATCH] x86: fix Disp8 handling for scalar AVX512_4FMAPS insns Tsimbalist, Igor V
13:12 RE: [PATCH] x86: fix Disp8 handling for scalar AVX512_4FMAPS insns Tsimbalist, Igor V
13:08 Re: [PATCH 0/6] ld: Add "-z textonly" option to ELF linker H.J. Lu
13:01 Re: [PATCH] x86: fix Disp8 handling for AVX512VL VPCMP*{B,W} variants H.J. Lu
11:46 Re: 2.30 Branch Planned for Friday... Nick Clifton
11:35 Re: 2.30 Branch Planned for Friday... Francois H. Theron
10:57 RFC: -z defs: documentation and reverting Nick Clifton
09:34 [PATCH] x86: fix Disp8 handling for scalar AVX512_4FMAPS insns Jan Beulich
09:33 [PATCH] x86: fix Disp8 handling for AVX512VL VPCMP*{B,W} variants Jan Beulich
09:32 [PATCH] objcopy: fix 32-bit build Jan Beulich
06:50 Re: [PATCH 4/4] ld: Remove unused expression state Alan Modra
06:50 Re: [PATCH 3/4] ld: Fix issue where PROVIDE overrides defined symbol Alan Modra
06:47 Re: [PATCH 2/4] ld: Find and run some tests using a wildcard pattern Alan Modra
06:45 Re: [PATCH 1/4] ld: In map file use '=' in PROVIDE statements Alan Modra
04:45 Re: [PATCH 0/6] ld: Add "-z textonly" option to ELF linker Alan Modra
01:10 Re: Gold Linker Patch: Introduce the "retpoline" x86 mitigation technique for variant #2 of the speculative execution vulnerabilities disclosed today, specifically identified by CVE-2017-5715 and in some places called "spectre". Sriraman Tallam via binutils
00:41 [PATCH] RISC-V: Disassemble x0 based addresses as 0. Jim Wilson

January 09, 2018
23:10 Re: [PATCH 0/6] ld: Add "-z textonly" option to ELF linker Alan Modra
21:09 [PATCH 3/4] ld: Fix issue where PROVIDE overrides defined symbol Andrew Burgess
21:09 [PATCH 4/4] ld: Remove unused expression state Andrew Burgess
21:09 [PATCH 2/4] ld: Find and run some tests using a wildcard pattern Andrew Burgess
21:09 [PATCH 1/4] ld: In map file use '=' in PROVIDE statements Andrew Burgess
21:09 [PATCH 0/4] Fix issue with PROVIDE in linker scripts Andrew Burgess
20:34 [PATCH v2] _bfd_mips_elf_final_link: notify user about wrong .reginfo size Vlad Ivanov
19:00 RE: [PATCH][MIPS] Add Global INValidate instructions Maciej W. Rozycki
18:37 Re: [PATCH] _bfd_mips_elf_final_link: notify user about wrong .reginfo size Maciej W. Rozycki
17:39 Re: [PATCH 0/6] ld: Add "-z textonly" option to ELF linker H.J. Lu
15:29 Re: [Patch Arm] Add CSDB instruction Ramana Radhakrishnan
15:21 Re: [Patch Arm] Add CSDB instruction Christophe Lyon
14:31 [Patch Arm] Add CSDB instruction Ramana Radhakrishnan
13:21 Re: [PATCH 0/6] ld: Add "-z textonly" option to ELF linker Alan Modra
12:03 Re: Syntax to make .altmacro feature %EXPR work? Erik Christiansen
11:30 Re: [AArch64 Patch] Add support for CSDB Nick Clifton
10:58 [AArch64 Patch] Add support for CSDB James Greenhalgh
10:41 2.30 Branch Planned for Friday... Nick Clifton
09:04 PR22662, nds32: Fix a typographical error. Kuan-Lin Chen
08:30 Re: [PATCH] Add explicit shared check to eh-frame-hdr test. Alan Modra
06:46 Re: [PATCH] _bfd_mips_elf_final_link: notify user about wrong .reginfo size Vlad Ivanov
03:32 [PATCH] Add explicit shared check to eh-frame-hdr test. Jim Wilson
01:57 [PATCH] RISC-V: Fix accidental embedded -shared regressions. Jim Wilson
01:30 Re: [PATCH] _bfd_mips_elf_final_link: notify user about wrong .reginfo size Maciej W. Rozycki

January 08, 2018
21:24 Re: Gold Linker Patch: Introduce the "retpoline" x86 mitigation technique for variant #2 of the speculative execution vulnerabilities disclosed today, specifically identified by CVE-2017-5715 and in some places called "spectre". Sriraman Tallam via binutils
21:16 Re: Gold Linker Patch: Introduce the "retpoline" x86 mitigation technique for variant #2 of the speculative execution vulnerabilities disclosed today, specifically identified by CVE-2017-5715 and in some places called "spectre". Rui Ueyama via binutils
21:14 Re: Gold Linker Patch: Introduce the "retpoline" x86 mitigation technique for variant #2 of the speculative execution vulnerabilities disclosed today, specifically identified by CVE-2017-5715 and in some places called "spectre". H.J. Lu
21:09 Re: Gold Linker Patch: Introduce the "retpoline" x86 mitigation technique for variant #2 of the speculative execution vulnerabilities disclosed today, specifically identified by CVE-2017-5715 and in some places called "spectre". Sriraman Tallam via binutils
21:06 Re: Gold Linker Patch: Introduce the "retpoline" x86 mitigation technique for variant #2 of the speculative execution vulnerabilities disclosed today, specifically identified by CVE-2017-5715 and in some places called "spectre". Sriraman Tallam via binutils
20:23 Re: Gold Linker Patch: Introduce the "retpoline" x86 mitigation technique for variant #2 of the speculative execution vulnerabilities disclosed today, specifically identified by CVE-2017-5715 and in some places called "spectre". Cary Coutant
20:22 Re: Gold Linker Patch: Introduce the "retpoline" x86 mitigation technique for variant #2 of the speculative execution vulnerabilities disclosed today, specifically identified by CVE-2017-5715 and in some places called "spectre". H.J. Lu
20:18 Re: Gold Linker Patch: Introduce the "retpoline" x86 mitigation technique for variant #2 of the speculative execution vulnerabilities disclosed today, specifically identified by CVE-2017-5715 and in some places called "spectre". Sriraman Tallam via binutils
20:12 Re: Gold Linker Patch: Introduce the "retpoline" x86 mitigation technique for variant #2 of the speculative execution vulnerabilities disclosed today, specifically identified by CVE-2017-5715 and in some places called "spectre". Cary Coutant
19:01 Re: Gold Linker Patch: Introduce the "retpoline" x86 mitigation technique for variant #2 of the speculative execution vulnerabilities disclosed today, specifically identified by CVE-2017-5715 and in some places called "spectre". Florian Weimer
18:52 Re: Gold Linker Patch: Introduce the "retpoline" x86 mitigation technique for variant #2 of the speculative execution vulnerabilities disclosed today, specifically identified by CVE-2017-5715 and in some places called "spectre". Rui Ueyama via binutils
18:44 Re: Gold Linker Patch: Introduce the "retpoline" x86 mitigation technique for variant #2 of the speculative execution vulnerabilities disclosed today, specifically identified by CVE-2017-5715 and in some places called "spectre". Sriraman Tallam via binutils
18:40 Re: Gold Linker Patch: Introduce the "retpoline" x86 mitigation technique for variant #2 of the speculative execution vulnerabilities disclosed today, specifically identified by CVE-2017-5715 and in some places called "spectre". Florian Weimer
18:36 Re: Gold Linker Patch: Introduce the "retpoline" x86 mitigation technique for variant #2 of the speculative execution vulnerabilities disclosed today, specifically identified by CVE-2017-5715 and in some places called "spectre". Sriraman Tallam via binutils
18:29 Re: Gold Linker Patch: Introduce the "retpoline" x86 mitigation technique for variant #2 of the speculative execution vulnerabilities disclosed today, specifically identified by CVE-2017-5715 and in some places called "spectre". Sriraman Tallam via binutils
18:27 Re: Gold Linker Patch: Introduce the "retpoline" x86 mitigation technique for variant #2 of the speculative execution vulnerabilities disclosed today, specifically identified by CVE-2017-5715 and in some places called "spectre". H.J. Lu
18:23 Re: Gold Linker Patch: Introduce the "retpoline" x86 mitigation technique for variant #2 of the speculative execution vulnerabilities disclosed today, specifically identified by CVE-2017-5715 and in some places called "spectre". Florian Weimer
18:22 Re: Gold Linker Patch: Introduce the "retpoline" x86 mitigation technique for variant #2 of the speculative execution vulnerabilities disclosed today, specifically identified by CVE-2017-5715 and in some places called "spectre". H.J. Lu
18:22 Re: Gold Linker Patch: Introduce the "retpoline" x86 mitigation technique for variant #2 of the speculative execution vulnerabilities disclosed today, specifically identified by CVE-2017-5715 and in some places called "spectre". Sriraman Tallam via binutils
18:20 Re: Gold Linker Patch: Introduce the "retpoline" x86 mitigation technique for variant #2 of the speculative execution vulnerabilities disclosed today, specifically identified by CVE-2017-5715 and in some places called "spectre". H.J. Lu
18:20 Re: Gold Linker Patch: Introduce the "retpoline" x86 mitigation technique for variant #2 of the speculative execution vulnerabilities disclosed today, specifically identified by CVE-2017-5715 and in some places called "spectre". Florian Weimer
18:19 Re: Gold Linker Patch: Introduce the "retpoline" x86 mitigation technique for variant #2 of the speculative execution vulnerabilities disclosed today, specifically identified by CVE-2017-5715 and in some places called "spectre". Sriraman Tallam via binutils
18:10 Re: Gold Linker Patch: Introduce the "retpoline" x86 mitigation technique for variant #2 of the speculative execution vulnerabilities disclosed today, specifically identified by CVE-2017-5715 and in some places called "spectre". Sriraman Tallam via binutils
18:04 Re: Gold Linker Patch: Introduce the "retpoline" x86 mitigation technique for variant #2 of the speculative execution vulnerabilities disclosed today, specifically identified by CVE-2017-5715 and in some places called "spectre". Sriraman Tallam via binutils
16:10 Re: [PATCH 0/6] ld: Add "-z textonly" option to ELF linker H.J. Lu
15:26 Re: [PATCH 0/6] ld: Add "-z textonly" option to ELF linker Michael Matz
14:58 Re: [PATCH 0/6] ld: Add "-z textonly" option to ELF linker H.J. Lu
14:40 Re: [PATCH] Optimize reading ELF objects with many group sections Nick Clifton
14:14 Re: Targetting S12Z Nick Clifton
13:50 Re: [PATCH] Optimize reading ELF objects with many group sections Jens Widell
13:08 Re: [PATCH] x86: Properly encode vmovd with 64-bit memeory H.J. Lu
12:56 Re: [PATCH] x86: Properly encode vmovd with 64-bit memeory Jan Beulich
12:34 Re: [PATCH] x86: Properly encode vmovd with 64-bit memeory H.J. Lu
12:17 Re: [PATCH] x86: Properly encode vmovd with 64-bit memeory H.J. Lu
12:13 Re: [PATCH] x86: Properly encode vmovd with 64-bit memeory Jan Beulich
12:08 Re: [PATCH] x86: Properly encode vmovd with 64-bit memeory Jan Beulich
11:57 Re: [PATCH] x86: Properly encode vmovd with 64-bit memeory H.J. Lu
11:54 Re: [PATCH] x86: Properly encode vmovd with 64-bit memeory Jan Beulich
11:52 Re: [PATCH] x86: Properly encode vmovd with 64-bit memeory H.J. Lu
11:51 Re: Syntax to make .altmacro feature %EXPR work? Nick Clifton
11:49 Re: [PATCH] x86: Properly encode vmovd with 64-bit memeory H.J. Lu
11:39 Re: [PATCH] x86: Properly encode vmovd with 64-bit memeory Jan Beulich
11:36 Re: [PATCH] x86: Properly encode vmovd with 64-bit memeory Jan Beulich
11:22 Re: [PATCH] x86: Properly encode vmovd with 64-bit memeory H.J. Lu
11:16 Re: Gold Linker Patch: Introduce the "retpoline" x86 mitigation technique for variant #2 of the speculative execution vulnerabilities disclosed today, specifically identified by CVE-2017-5715 and in some places called "spectre". Nick Clifton
11:14 Re: [PATCH] x86: Properly encode vmovd with 64-bit memeory H.J. Lu
10:23 Re: [PATCH] Optimize reading ELF objects with many group sections Nick Clifton
10:09 Re: Targetting S12Z John Darrington
09:54 [PATCH] Optimize reading ELF objects with many group sections Jens Widell
09:15 Re: Targetting S12Z Nick Clifton
08:48 Re: [PATCH] x86: Properly encode vmovd with 64-bit memeory Jan Beulich
08:09 Re: Gold Linker Patch: Introduce the "retpoline" x86 mitigation technique for variant #2 of the speculative execution vulnerabilities disclosed today, specifically identified by CVE-2017-5715 and in some places called "spectre". Florian Weimer
01:18 [PATCH] x86: Properly encode vmovd with 64-bit memeory H.J. Lu

January 07, 2018
23:14 Re: Gold Linker Patch: Introduce the "retpoline" x86 mitigation technique for variant #2 of the speculative execution vulnerabilities disclosed today, specifically identified by CVE-2017-5715 and in some places called "spectre". Cary Coutant
19:41 old bfin bug Waldemar Brodkorb
18:11 Re: Gold Linker Patch: Introduce the "retpoline" x86 mitigation technique for variant #2 of the speculative execution vulnerabilities disclosed today, specifically identified by CVE-2017-5715 and in some places called "spectre". H.J. Lu
11:34 Re: Targetting S12Z Fred Cooke
10:31 Re: Reducing code size of Position Independent Executables (PIE) by shrinking the size of dynamic relocations section Florian Weimer
07:55 Targetting S12Z John Darrington

January 06, 2018
20:47 Test case for bug that occurred in 2.27 on mips coypu
02:53 Re: Gold Linker Patch: Introduce the "retpoline" x86 mitigation technique for variant #2 of the speculative execution vulnerabilities disclosed today, specifically identified by CVE-2017-5715 and in some places called "spectre". Alan Modra
02:09 Syntax to make .altmacro feature %EXPR work? Erik Christiansen
02:07 Re: [PATCH] RISC-V: Disable shared library support for embedded elf. Jim Wilson
01:52 [PATCH] RISC-V: Print symbol address for jalr w/ zero offset. Jim Wilson
00:46 Re: Gold Linker Patch: Introduce the "retpoline" x86 mitigation technique for variant #2 of the speculative execution vulnerabilities disclosed today, specifically identified by CVE-2017-5715 and in some places called "spectre". Ian Lance Taylor via binutils
00:03 Re: Gold Linker Patch: Introduce the "retpoline" x86 mitigation technique for variant #2 of the speculative execution vulnerabilities disclosed today, specifically identified by CVE-2017-5715 and in some places called "spectre". Sriraman Tallam via binutils

January 05, 2018
23:52 Re: Gold Linker Patch: Introduce the "retpoline" x86 mitigation technique for variant #2 of the speculative execution vulnerabilities disclosed today, specifically identified by CVE-2017-5715 and in some places called "spectre". Ian Lance Taylor via binutils
23:45 Re: Gold Linker Patch: Introduce the "retpoline" x86 mitigation technique for variant #2 of the speculative execution vulnerabilities disclosed today, specifically identified by CVE-2017-5715 and in some places called "spectre". Chandler Carruth via binutils
23:28 Re: Gold Linker Patch: Introduce the "retpoline" x86 mitigation technique for variant #2 of the speculative execution vulnerabilities disclosed today, specifically identified by CVE-2017-5715 and in some places called "spectre". Cary Coutant
22:31 [PATCH] RISC-V: Disable shared library support for embedded elf. Jim Wilson
19:09 Re: Gold Linker Patch: Introduce the "retpoline" x86 mitigation technique for variant #2 of the speculative execution vulnerabilities disclosed today, specifically identified by CVE-2017-5715 and in some places called "spectre". Florian Weimer
17:51 Re: Gold Linker Patch: Introduce the "retpoline" x86 mitigation technique for variant #2 of the speculative execution vulnerabilities disclosed today, specifically identified by CVE-2017-5715 and in some places called "spectre". Sriraman Tallam via binutils
15:00 Re: Gold Linker Patch: Introduce the "retpoline" x86 mitigation technique for variant #2 of the speculative execution vulnerabilities disclosed today, specifically identified by CVE-2017-5715 and in some places called "spectre". Ian Lance Taylor via binutils
11:42 Re: Gold Linker Patch: Introduce the "retpoline" x86 mitigation technique for variant #2 of the speculative execution vulnerabilities disclosed today, specifically identified by CVE-2017-5715 and in some places called "spectre". Florian Weimer
02:30 Re: Gold Linker Patch: Introduce the "retpoline" x86 mitigation technique for variant #2 of the speculative execution vulnerabilities disclosed today, specifically identified by CVE-2017-5715 and in some places called "spectre". Cary Coutant
00:35 Re: Gold Linker Patch: Introduce the "retpoline" x86 mitigation technique for variant #2 of the speculative execution vulnerabilities disclosed today, specifically identified by CVE-2017-5715 and in some places called "spectre". Sriraman Tallam via binutils

January 04, 2018
23:08 Re: Gold Linker Patch: Introduce the "retpoline" x86 mitigation technique for variant #2 of the speculative execution vulnerabilities disclosed today, specifically identified by CVE-2017-5715 and in some places called "spectre". Cary Coutant
22:20 [PATCH] RISC-V: Add 2 missing privileged registers. Jim Wilson
17:23 Re: Gold Linker Patch: Introduce the "retpoline" x86 mitigation technique for variant #2 of the speculative execution vulnerabilities disclosed today, specifically identified by CVE-2017-5715 and in some places called "spectre". Sriraman Tallam via binutils
15:56 Re: Documentation for .largecomm and friends Nick Clifton
15:42 Re: Documentation for .largecomm and friends Jan Beulich
15:28 Re: Documentation for .largecomm and friends Nick Clifton

January 03, 2018
23:39 Re: [PATCH 0/4] Support for 'info proc' on FreeBSD cores and native John Baldwin
21:56 Re: [PATCH 3/4] Support 'info proc' for native FreeBSD processes. John Baldwin
19:15 Re: [PATCH 0/4] Support for 'info proc' on FreeBSD cores and native Simon Marchi
19:13 Re: [PATCH 3/4] Support 'info proc' for native FreeBSD processes. Simon Marchi
19:05 Re: [PATCH 2/4] Support 'info proc' for FreeBSD process core dumps. John Baldwin
19:05 Re: [PATCH 3/4] Support 'info proc' for native FreeBSD processes. John Baldwin
19:05 Re: [PATCH 0/4] Support for 'info proc' on FreeBSD cores and native John Baldwin
17:32 Re: Commit: Add support for v3 binary annotation patches Nick Clifton
16:11 Re: [PATCH v2] [BFD] Add support for reading msdos (MZ) executables. Nick Clifton
16:04 Re: [PATCH v2] [BFD] Add support for reading msdos (MZ) executables. Zebediah Figura
12:05 Re: Commit: Add support for v3 binary annotation patches Christophe Lyon
10:39 Re: [PATCH v2] [BFD] Add support for reading msdos (MZ) executables. Nick Clifton
10:38 Re: [PATCH v2] [BFD] Add support for reading msdos (MZ) executables. Nick Clifton
10:33 Re: Get your changes in Jan Beulich
10:28 Commit: Add support for v3 binary annotation patches Nick Clifton
09:58 Get your changes in Nick Clifton

January 02, 2018
18:01 [PATCH v2] [BFD] Add support for reading msdos (MZ) executables. Zebediah Figura
16:21 Re: [PATCH] [BFD] Add support for reading msdos (MZ) executables. Zebediah Figura
16:20 Re: [PATCH] [BFD] Add support for reading msdos (MZ) executables. Nick Clifton
16:07 Re: [PATCH] [BFD] Add support for reading msdos (MZ) executables. Zebediah Figura
12:46 Re: [PATCH] [BFD] Add support for reading msdos (MZ) executables. Nick Clifton
12:18 Re: Release Date For Binutils 2.30 Nick Clifton
11:49 Re: [PATCH 1/4] Create psuedo sections for FreeBSD NT_PROCSTAT_(PROC|FILES|VMMAP) notes. Nick Clifton
11:46 Re: gas: Fatal error: no compiled in support for x86_64 Nick Clifton
10:49 Re: [PATCH 4/4] x86: fold certain AVX and AVX2 templates Jan Beulich

January 01, 2018
17:40 [PATCH] [BFD] Add support for reading msdos (MZ) executables. Zebediah Figura
11:44 Release Date For Binutils 2.30 Maithili Kulkarni


Indexes: [Date Index] [Subject Index] [Author Index] [Thread Index]
Site Nav: [Browse other archives for this mailing list]
[Browse other mailing lists at this site]
Search: Limit to:

Mail converted by MHonArc