messages from 2022-03-10 14:26:35 to 2022-03-10 14:51:36 UTC [more...]
[PATCH v2 0/2] exfat: allow access to paths with trailing dots
2022-03-10 14:24 UTC (2+ messages)
` [PATCH v2 2/2] exfat currently unconditionally strips trailing periods '.' when performing path lookup, but allows them in the filenames during file creation. This is done intentionally, loosely following Windows behaviour and specifications which state:
[PATCH 5.15 00/58] 5.15.28-rc2 review
2022-03-10 14:19 UTC (49+ messages)
` [PATCH 5.15 01/58] slip: fix macro redefine warning
` [PATCH 5.15 02/58] x86,bugs: Unconditionally allow spectre_v2=retpoline,amd
` [PATCH 5.15 03/58] x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE
` [PATCH 5.15 04/58] x86/speculation: Add eIBRS + Retpoline options
` [PATCH 5.15 05/58] Documentation/hw-vuln: Update spectre doc
` [PATCH 5.15 06/58] x86/speculation: Include unprivileged eBPF status in Spectre v2 mitigation reporting
` [PATCH 5.15 07/58] x86/speculation: Use generic retpoline by default on AMD
` [PATCH 5.15 09/58] x86/speculation: Warn about Spectre v2 LFENCE mitigation
` [PATCH 5.15 10/58] x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + SMT
` [PATCH 5.15 11/58] ARM: report Spectre v2 status through sysfs
` [PATCH 5.15 12/58] ARM: early traps initialisation
` [PATCH 5.15 13/58] ARM: use LOADADDR() to get load address of sections
` [PATCH 5.15 14/58] ARM: Spectre-BHB workaround
` [PATCH 5.15 15/58] ARM: include unprivileged BPF status in Spectre V2 reporting
` [PATCH 5.15 16/58] arm64: Add Neoverse-N2, Cortex-A710 CPU part definition
` [PATCH 5.15 17/58] arm64: Add HWCAP for self-synchronising virtual counter
` [PATCH 5.15 18/58] arm64: Add Cortex-X2 CPU part definition
` [PATCH 5.15 19/58] arm64: add ID_AA64ISAR2_EL1 sys register
` [PATCH 5.15 20/58] arm64: cpufeature: add HWCAP for FEAT_AFP
` [PATCH 5.15 22/58] arm64: entry.S: Add ventry overflow sanity checks
` [PATCH 5.15 23/58] arm64: spectre: Rename spectre_v4_patch_fw_mitigation_conduit
` [PATCH 5.15 24/58] KVM: arm64: Allow indirect vectors to be used without SPECTRE_V3A
` [PATCH 5.15 25/58] arm64: entry: Make the trampoline cleanup optional
` [PATCH 5.15 26/58] arm64: entry: Free up another register on kptis tramp_exit path
` [PATCH 5.15 27/58] arm64: entry: Move the trampoline data page before the text page
` [PATCH 5.15 28/58] arm64: entry: Allow tramp_alias to access symbols after the 4K boundary
` [PATCH 5.15 29/58] arm64: entry: Dont assume tramp_vectors is the start of the vectors
` [PATCH 5.15 30/58] arm64: entry: Move trampoline macros out of ifdefd section
` [PATCH 5.15 31/58] arm64: entry: Make the kpti trampolines kpti sequence optional
` [PATCH 5.15 32/58] arm64: entry: Allow the trampoline text to occupy multiple pages
` [PATCH 5.15 40/58] arm64: Use the clearbhb instruction in mitigations
` [PATCH 5.15 41/58] arm64: proton-pack: Include unprivileged eBPF status in Spectre v2 mitigation reporting
` [PATCH 5.15 42/58] ARM: fix build error when BPF_SYSCALL is disabled
` [PATCH 5.15 43/58] ARM: fix co-processor register typo
` [PATCH 5.15 44/58] ARM: Do not use NOCROSSREFS directive with ld.lld
` [PATCH 5.15 45/58] arm64: Do not include __READ_ONCE() block in assembly files
` [PATCH 5.15 46/58] ARM: fix build warning in proc-v7-bugs.c
` [PATCH 5.15 47/58] xen/xenbus: dont let xenbus_grant_ring() remove grants in error case
` [PATCH 5.15 48/58] xen/grant-table: add gnttab_try_end_foreign_access()
` [PATCH 5.15 49/58] xen/blkfront: dont use gnttab_query_foreign_access() for mapped status
` [PATCH 5.15 50/58] xen/netfront: "
` [PATCH 5.15 51/58] xen/scsifront: "
` [PATCH 5.15 52/58] xen/gntalloc: dont use gnttab_query_foreign_access()
` [PATCH 5.15 53/58] xen: remove gnttab_query_foreign_access()
` [PATCH 5.15 54/58] xen/9p: use alloc/free_pages_exact()
` [PATCH 5.15 55/58] xen/pvcalls: "
` [PATCH 5.15 56/58] xen/gnttab: fix gnttab_end_foreign_access() without page specified
` [PATCH 5.15 57/58] xen/netfront: react properly to failing gnttab_end_foreign_access_ref()
[PATCH 5.10 00/58] 5.10.105-rc2 review
2022-03-10 14:19 UTC (58+ messages)
` [PATCH 5.10 01/58] x86,bugs: Unconditionally allow spectre_v2=retpoline,amd
` [PATCH 5.10 02/58] x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE
` [PATCH 5.10 03/58] x86/speculation: Add eIBRS + Retpoline options
` [PATCH 5.10 04/58] Documentation/hw-vuln: Update spectre doc
` [PATCH 5.10 05/58] x86/speculation: Include unprivileged eBPF status in Spectre v2 mitigation reporting
` [PATCH 5.10 06/58] x86/speculation: Use generic retpoline by default on AMD
` [PATCH 5.10 07/58] x86/speculation: Update link to AMD speculation whitepaper
` [PATCH 5.10 08/58] x86/speculation: Warn about Spectre v2 LFENCE mitigation
` [PATCH 5.10 09/58] x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + SMT
` [PATCH 5.10 10/58] ARM: report Spectre v2 status through sysfs
` [PATCH 5.10 11/58] ARM: early traps initialisation
` [PATCH 5.10 12/58] ARM: use LOADADDR() to get load address of sections
` [PATCH 5.10 13/58] ARM: Spectre-BHB workaround
` [PATCH 5.10 14/58] ARM: include unprivileged BPF status in Spectre V2 reporting
` [PATCH 5.10 15/58] arm64: cputype: Add CPU implementor & types for the Apple M1 cores
` [PATCH 5.10 16/58] arm64: Add Neoverse-N2, Cortex-A710 CPU part definition
` [PATCH 5.10 17/58] arm64: Add Cortex-X2 "
` [PATCH 5.10 18/58] arm64: Add Cortex-A510 "
` [PATCH 5.10 19/58] arm64: Add HWCAP for self-synchronising virtual counter
` [PATCH 5.10 20/58] arm64: add ID_AA64ISAR2_EL1 sys register
` [PATCH 5.10 21/58] arm64: cpufeature: add HWCAP for FEAT_AFP
` [PATCH 5.10 22/58] arm64: cpufeature: add HWCAP for FEAT_RPRES
` [PATCH 5.10 23/58] arm64: entry.S: Add ventry overflow sanity checks
` [PATCH 5.10 24/58] arm64: spectre: Rename spectre_v4_patch_fw_mitigation_conduit
` [PATCH 5.10 25/58] arm64: entry: Make the trampoline cleanup optional
` [PATCH 5.10 26/58] arm64: entry: Free up another register on kptis tramp_exit path
` [PATCH 5.10 27/58] arm64: entry: Move the trampoline data page before the text page
` [PATCH 5.10 28/58] arm64: entry: Allow tramp_alias to access symbols after the 4K boundary
` [PATCH 5.10 29/58] arm64: entry: Dont assume tramp_vectors is the start of the vectors
` [PATCH 5.10 30/58] arm64: entry: Move trampoline macros out of ifdefd section
` [PATCH 5.10 31/58] arm64: entry: Make the kpti trampolines kpti sequence optional
` [PATCH 5.10 32/58] arm64: entry: Allow the trampoline text to occupy multiple pages
` [PATCH 5.10 33/58] arm64: entry: Add non-kpti __bp_harden_el1_vectors for mitigations
` [PATCH 5.10 34/58] arm64: entry: Add vectors that have the bhb mitigation sequences
` [PATCH 5.10 35/58] arm64: entry: Add macro for reading symbol addresses from the trampoline
` [PATCH 5.10 36/58] arm64: Add percpu vectors for EL1
` [PATCH 5.10 37/58] arm64: proton-pack: Report Spectre-BHB vulnerabilities as part of Spectre-v2
` [PATCH 5.10 38/58] KVM: arm64: Allow indirect vectors to be used without SPECTRE_V3A
` [PATCH 5.10 40/58] KVM: arm64: Allow SMCCC_ARCH_WORKAROUND_3 to be discovered and migrated
` [PATCH 5.10 41/58] arm64: Use the clearbhb instruction in mitigations
` [PATCH 5.10 42/58] arm64: proton-pack: Include unprivileged eBPF status in Spectre v2 mitigation reporting
` [PATCH 5.10 43/58] ARM: fix build error when BPF_SYSCALL is disabled
` [PATCH 5.10 44/58] ARM: fix co-processor register typo
` [PATCH 5.10 45/58] ARM: Do not use NOCROSSREFS directive with ld.lld
` [PATCH 5.10 46/58] ARM: fix build warning in proc-v7-bugs.c
` [PATCH 5.10 47/58] xen/xenbus: dont let xenbus_grant_ring() remove grants in error case
` [PATCH 5.10 48/58] xen/grant-table: add gnttab_try_end_foreign_access()
` [PATCH 5.10 49/58] xen/blkfront: dont use gnttab_query_foreign_access() for mapped status
` [PATCH 5.10 50/58] xen/netfront: "
` [PATCH 5.10 51/58] xen/scsifront: "
` [PATCH 5.10 52/58] xen/gntalloc: dont use gnttab_query_foreign_access()
` [PATCH 5.10 53/58] xen: remove gnttab_query_foreign_access()
` [PATCH 5.10 54/58] xen/9p: use alloc/free_pages_exact()
` [PATCH 5.10 55/58] xen/pvcalls: "
` [PATCH 5.10 56/58] xen/gnttab: fix gnttab_end_foreign_access() without page specified
` [PATCH 5.10 57/58] xen/netfront: react properly to failing gnttab_end_foreign_access_ref()
` [PATCH 5.10 58/58] Revert "ACPI: PM: s2idle: Cancel wakeup before dispatching EC GPE"
[PATCH 5.4 00/33] 5.4.184-rc2 review
2022-03-10 14:19 UTC (34+ messages)
` [PATCH 5.4 01/33] x86/speculation: Merge one test in spectre_v2_user_select_mitigation()
` [PATCH 5.4 02/33] x86,bugs: Unconditionally allow spectre_v2=retpoline,amd
` [PATCH 5.4 03/33] x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE
` [PATCH 5.4 04/33] x86/speculation: Add eIBRS + Retpoline options
` [PATCH 5.4 05/33] Documentation/hw-vuln: Update spectre doc
` [PATCH 5.4 06/33] x86/speculation: Include unprivileged eBPF status in Spectre v2 mitigation reporting
` [PATCH 5.4 07/33] x86/speculation: Use generic retpoline by default on AMD
` [PATCH 5.4 08/33] x86/speculation: Update link to AMD speculation whitepaper
` [PATCH 5.4 09/33] x86/speculation: Warn about Spectre v2 LFENCE mitigation
` [PATCH 5.4 10/33] x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + SMT
` [PATCH 5.4 11/33] arm/arm64: Provide a wrapper for SMCCC 1.1 calls
` [PATCH 5.4 12/33] arm/arm64: smccc/psci: add arm_smccc_1_1_get_conduit()
` [PATCH 5.4 13/33] ARM: report Spectre v2 status through sysfs
` [PATCH 5.4 14/33] ARM: early traps initialisation
` [PATCH 5.4 15/33] ARM: use LOADADDR() to get load address of sections
` [PATCH 5.4 16/33] ARM: Spectre-BHB workaround
` [PATCH 5.4 17/33] ARM: include unprivileged BPF status in Spectre V2 reporting
` [PATCH 5.4 18/33] ARM: fix build error when BPF_SYSCALL is disabled
` [PATCH 5.4 19/33] ARM: fix co-processor register typo
` [PATCH 5.4 20/33] ARM: Do not use NOCROSSREFS directive with ld.lld
` [PATCH 5.4 21/33] ARM: fix build warning in proc-v7-bugs.c
` [PATCH 5.4 22/33] xen/xenbus: dont let xenbus_grant_ring() remove grants in error case
` [PATCH 5.4 23/33] xen/grant-table: add gnttab_try_end_foreign_access()
` [PATCH 5.4 24/33] xen/blkfront: dont use gnttab_query_foreign_access() for mapped status
` [PATCH 5.4 25/33] xen/netfront: "
` [PATCH 5.4 26/33] xen/scsifront: "
` [PATCH 5.4 27/33] xen/gntalloc: dont use gnttab_query_foreign_access()
` [PATCH 5.4 28/33] xen: remove gnttab_query_foreign_access()
` [PATCH 5.4 29/33] xen/9p: use alloc/free_pages_exact()
` [PATCH 5.4 30/33] xen/pvcalls: "
` [PATCH 5.4 31/33] xen/gnttab: fix gnttab_end_foreign_access() without page specified
` [PATCH 5.4 32/33] xen/netfront: react properly to failing gnttab_end_foreign_access_ref()
` [PATCH 5.4 33/33] Revert "ACPI: PM: s2idle: Cancel wakeup before dispatching EC GPE"
[PATCHv5 00/30] TDX Guest: TDX core support
2022-03-10 14:29 UTC (4+ messages)
` [PATCHv5 27/30] x86/kvm: Use bounce buffers for TD guest
[PATCH v1 0/4] arm64: mvebu: Support for Marvell 98DX2530 (and variants)
2022-03-10 14:26 UTC (3+ messages)
` [PATCH v1 3/4] arm64: dts: marvell: Add Armada 98DX2530 SoC and RD-AC5X board
[PATCH 4.19 00/33] 4.19.234-rc2 review
2022-03-10 14:19 UTC (34+ messages)
` [PATCH 4.19 01/33] x86/speculation: Merge one test in spectre_v2_user_select_mitigation()
` [PATCH 4.19 02/33] x86,bugs: Unconditionally allow spectre_v2=retpoline,amd
` [PATCH 4.19 03/33] x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE
` [PATCH 4.19 04/33] x86/speculation: Add eIBRS + Retpoline options
` [PATCH 4.19 05/33] Documentation/hw-vuln: Update spectre doc
` [PATCH 4.19 06/33] x86/speculation: Include unprivileged eBPF status in Spectre v2 mitigation reporting
` [PATCH 4.19 07/33] x86/speculation: Use generic retpoline by default on AMD
` [PATCH 4.19 08/33] x86/speculation: Update link to AMD speculation whitepaper
` [PATCH 4.19 09/33] x86/speculation: Warn about Spectre v2 LFENCE mitigation
` [PATCH 4.19 10/33] x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + SMT
` [PATCH 4.19 11/33] arm/arm64: Provide a wrapper for SMCCC 1.1 calls
` [PATCH 4.19 12/33] arm/arm64: smccc/psci: add arm_smccc_1_1_get_conduit()
` [PATCH 4.19 13/33] ARM: report Spectre v2 status through sysfs
` [PATCH 4.19 14/33] ARM: early traps initialisation
` [PATCH 4.19 15/33] ARM: use LOADADDR() to get load address of sections
` [PATCH 4.19 16/33] ARM: Spectre-BHB workaround
` [PATCH 4.19 17/33] ARM: include unprivileged BPF status in Spectre V2 reporting
` [PATCH 4.19 18/33] ARM: fix build error when BPF_SYSCALL is disabled
` [PATCH 4.19 19/33] kbuild: add CONFIG_LD_IS_LLD
` [PATCH 4.19 20/33] ARM: fix co-processor register typo
` [PATCH 4.19 21/33] ARM: Do not use NOCROSSREFS directive with ld.lld
` [PATCH 4.19 22/33] ARM: fix build warning in proc-v7-bugs.c
` [PATCH 4.19 23/33] xen/xenbus: dont let xenbus_grant_ring() remove grants in error case
` [PATCH 4.19 24/33] xen/grant-table: add gnttab_try_end_foreign_access()
` [PATCH 4.19 25/33] xen/blkfront: dont use gnttab_query_foreign_access() for mapped status
` [PATCH 4.19 26/33] xen/netfront: "
` [PATCH 4.19 27/33] xen/scsifront: "
` [PATCH 4.19 28/33] xen/gntalloc: dont use gnttab_query_foreign_access()
` [PATCH 4.19 29/33] xen: remove gnttab_query_foreign_access()
` [PATCH 4.19 30/33] xen/9p: use alloc/free_pages_exact()
` [PATCH 4.19 31/33] xen/pvcalls: "
` [PATCH 4.19 32/33] xen/gnttab: fix gnttab_end_foreign_access() without page specified
` [PATCH 4.19 33/33] xen/netfront: react properly to failing gnttab_end_foreign_access_ref()
[PATCH net-next 0/3] Extend locked port feature with FDB locked flag (MAC-Auth/MAB)
2022-03-10 14:28 UTC (5+ messages)
` [PATCH net-next 1/3] net: bridge: add fdb flag to extent locked port feature
` [PATCH net-next 2/3] net: switchdev: add support for offloading of fdb locked flag
` [PATCH net-next 3/3] net: dsa: mv88e6xxx: mac-auth/MAB implementation
[PATCH v4 00/45] x86: Kernel IBT
2022-03-10 14:27 UTC (5+ messages)
[PATCH v2 0/2] Cleanups for slab
2022-03-10 14:27 UTC (3+ messages)
` [PATCH v2 1/2] mm: slab: Delete unused SLAB_DEACTIVATED flag
[PATCH iproute2-next 0/3] Extend locked port feature with FDB locked flag (MAC-Auth/MAB)
2022-03-10 14:26 UTC (3+ messages)
[PATCH] task_work: simplify the task_work_add() interface
2022-03-10 14:27 UTC (3+ messages)
[PATCH] riscv: ftrace: no need to acquire text_mutex when executed in stop_machine
2022-03-10 14:27 UTC (2+ messages)
[PATCH -next] i2c: designware: Add helper to remove redundancy
2022-03-10 14:22 UTC
[PATCH 4.14 00/31] 4.14.271-rc2 review
2022-03-10 14:18 UTC (10+ messages)
` [PATCH 4.14 03/31] x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE
` [PATCH 4.14 04/31] x86/speculation: Add eIBRS + Retpoline options
` [PATCH 4.14 05/31] Documentation/hw-vuln: Update spectre doc
` [PATCH 4.14 06/31] x86/speculation: Include unprivileged eBPF status in Spectre v2 mitigation reporting
` [PATCH 4.14 07/31] x86/speculation: Use generic retpoline by default on AMD
` [PATCH 4.14 08/31] x86/speculation: Update link to AMD speculation whitepaper
` [PATCH 4.14 09/31] x86/speculation: Warn about Spectre v2 LFENCE mitigation
` [PATCH 4.14 30/31] xen/gnttab: fix gnttab_end_foreign_access() without page specified
` [PATCH 4.14 31/31] xen/netfront: react properly to failing gnttab_end_foreign_access_ref()
[syzbot] INFO: task hung in port100_probe
2022-03-10 14:22 UTC
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox