| Age | Commit message (Collapse) | Author | Lines | |
|---|---|---|---|---|
| 2024-01-11 | std: begin moving platform support modules into `pal` | joboet | -56/+0 | |
| 2022-08-21 | Rollup merge of #100822 - WaffleLapkin:no_offset_question_mark, r=scottmcm | Matthias Krüger | -2/+2 | |
| Replace most uses of `pointer::offset` with `add` and `sub` As PR title says, it replaces `pointer::offset` in compiler and standard library with `pointer::add` and `pointer::sub`. This generally makes code cleaner, easier to grasp and removes (or, well, hides) integer casts. This is generally trivially correct, `.offset(-constant)` is just `.sub(constant)`, `.offset(usized as isize)` is just `.add(usized)`, etc. However in some cases we need to be careful with signs of things. r? ````@scottmcm```` _split off from #100746_ | ||||
| 2022-08-21 | Replace most uses of `pointer::offset` with `add` and `sub` | Maybe Waffle | -2/+2 | |
| 2022-08-17 | Mitigate Stale Data Read for xAPIC vulnerability | Raoul Strackx | -2/+28 | |
| In order to mitigate the Stale Data Read for xAPIC vulnerability completely, reading userspace from an SGX enclave must be aligned and in 8-bytes chunks. References: - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00657.html - https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/stale-data-read-from-xapic.html | ||||
| 2022-06-15 | Test `copy_to_userspace` function | Raoul Strackx | -0/+30 | |
