[PATCH] x86: Fix build warnings about export.h
2025-06-12 9:57 UTC (2+ messages)
[efi:urgent] BUILD SUCCESS c33453d08a56a45c2e72f9f56043610b8f7449c7
2025-06-12 1:58 UTC
[PATCH v2] x86/efi: error handling on efi memory map
2025-06-08 17:11 UTC
[PATCH] x86/efi: error handling on efi memory map
2025-06-08 13:22 UTC (2+ messages)
[efi:urgent] BUILD SUCCESS 76f6cf6676f4e2d83acdb7d93bba71340a95f5bb
2025-06-07 7:10 UTC
[PATCH v3 0/5] Fix issues with ARM Processor CPER records
2025-06-06 18:30 UTC (4+ messages)
[PATCH] efi: Drop preprocessor directives from zboot.lds
2025-06-06 15:55 UTC (3+ messages)
[PATCH v2 00/13] objtool: Detect and warn about indirect calls in __nocfi functions
2025-06-06 13:20 UTC (20+ messages)
[PATCH] efi/libstub: use 'targets' instead of extra-y in Makefile
2025-06-05 20:42 UTC (3+ messages)
[PATCH RESEND v3] x86/efi: Implement support for embedding SBAT data for x86
2025-06-03 9:19 UTC
[PATCH v2 2/2] x86/sev: let sev_es_efi_map_ghcbs map the caa pages too
2025-06-02 10:50 UTC
[RFT PATCH v3 00/21] x86: strict separation of startup code
2025-06-01 9:39 UTC (58+ messages)
` [RFT PATCH v3 01/21] x86/sev: Separate MSR and GHCB based snp_cpuid() via a callback
` [RFT PATCH v3 02/21] x86/sev: Use MSR protocol for remapping SVSM calling area
` [RFT PATCH v3 03/21] x86/sev: Use MSR protocol only for early SVSM PVALIDATE call
` [RFT PATCH v3 04/21] x86/sev: Run RMPADJUST on SVSM calling area page to test VMPL
` [RFT PATCH v3 05/21] x86/sev: Move GHCB page based HV communication out of startup code
` [RFT PATCH v3 06/21] x86/sev: Avoid global variable to store virtual address of SVSM area
` [RFT PATCH v3 07/21] x86/sev: Move MSR save/restore out of early page state change helper
` [RFT PATCH v3 08/21] x86/sev: Share implementation of MSR-based page state change
` [RFT PATCH v3 09/21] x86/sev: Pass SVSM calling area down to early page state change API
` [RFT PATCH v3 10/21] x86/sev: Use boot SVSM CA for all startup and init code
` [RFT PATCH v3 11/21] x86/boot: Drop redundant RMPADJUST in SEV SVSM presence check
` [RFT PATCH v3 12/21] x86/sev: Unify SEV-SNP hypervisor feature check
` [RFT PATCH v3 13/21] x86/sev: Provide PIC aliases for SEV related data objects
` [RFT PATCH v3 14/21] x86/boot: Provide PIC aliases for 5-level paging related constants
` [RFT PATCH v3 15/21] x86/sev: Move __sev_[get|put]_ghcb() into separate noinstr object
` [RFT PATCH v3 16/21] x86/sev: Export startup routines for later use
` [RFT PATCH v3 17/21] x86/boot: Create a confined code area for startup code
` [RFT PATCH v3 18/21] x86/boot: Move startup code out of __head section
` [RFT PATCH v3 19/21] x86/boot: Disallow absolute symbol references in startup code
` [RFT PATCH v3 20/21] x86/boot: Revert "Reject absolute references in .head.text"
` [RFT PATCH v3 21/21] x86/boot: Get rid of the .head.text section
[GIT PULL] EFI updates for v6.16
2025-05-30 23:17 UTC (2+ messages)
[PATCH 2/2] x86/sev: let sev_es_efi_map_ghcbs map the caa pages too
2025-05-28 7:16 UTC (3+ messages)
[PATCH v2 00/14] stackleak: Support Clang stack depth tracking
2025-05-27 3:30 UTC (24+ messages)
` [PATCH v2 01/14] stackleak: Rename STACKLEAK to KSTACK_ERASE
` [PATCH v2 02/14] stackleak: Rename stackleak_track_stack to __sanitizer_cov_stack_depth
` [PATCH v2 03/14] stackleak: Split KSTACK_ERASE_CFLAGS from GCC_PLUGINS_CFLAGS
` [PATCH v2 04/14] x86: Handle KCOV __init vs inline mismatches
` [PATCH v2 05/14] arm: "
` [PATCH v2 06/14] arm64: "
` [PATCH v2 07/14] s390: "
` [PATCH v2 08/14] powerpc: "
` [PATCH v2 09/14] mips: "
` [PATCH v2 10/14] loongarch: "
` [PATCH v2 11/14] init.h: Disable sanitizer coverage for __init and __head
` [PATCH v2 12/14] kstack_erase: Support Clang stack depth tracking
` [PATCH v2 13/14] configs/hardening: Enable CONFIG_KSTACK_ERASE
` [PATCH v2 14/14] configs/hardening: Enable CONFIG_INIT_ON_FREE_DEFAULT_ON
[efi:next] BUILD SUCCESS 46550e2b878d60923c72f0526a7aac02e8eda3d5
2025-05-22 15:53 UTC
[syzbot] [fs?] [efi?] BUG: unable to handle kernel paging request in alloc_fs_context
2025-05-22 13:47 UTC (4+ messages)
[efi:efi-sbat] BUILD SUCCESS 0f9a1739dd0e1ca3942e51dc3ec18f0d68c23be5
2025-05-22 12:01 UTC
[PATCH] include: pe.h: Fix PE definitions
2025-05-21 15:10 UTC (6+ messages)
[PATCH] efi/efi_test: Fix missing pending status update in getwakeuptime
2025-05-21 13:40 UTC (2+ messages)
[PATCH v3 0/2] efi: Add a mechanism for embedding SBAT section
2025-05-21 13:37 UTC (4+ messages)
` [PATCH v3 1/2] efi: zboot specific "
` [PATCH v3 2/2] x86/efi: Implement support for embedding SBAT data for x86
[PATCH v14 00/19] x86: Trenchboot secure dynamic launch Linux kernel support
2025-05-18 14:42 UTC (5+ messages)
[PATCHv3 0/4] x86: Make 5-level paging support unconditional for x86-64
2025-05-17 9:59 UTC (20+ messages)
` [PATCHv3 1/4] x86/64/mm: Always use dynamic memory layout
` [PATCHv3 2/4] x86/64/mm: Make SPARSEMEM_VMEMMAP the only memory model
` [PATCHv3 3/4] x86/64/mm: Make 5-level paging support unconditional
` [PATCHv3 4/4] x86/paravirt: Restrict PARAVIRT_XXL to 64-bit only
[PATCH v2] LoongArch: Enable HAVE_ARCH_STACKLEAK
2025-05-17 9:33 UTC (2+ messages)
[PATCHv2 0/3] x86: Make 5-level paging support unconditional for x86-64
2025-05-17 8:44 UTC (17+ messages)
` [PATCHv2 1/3] x86/64/mm: Always use dynamic memory layout
` [PATCHv2 2/3] x86/64/mm: Make SPARSEMEM_VMEMMAP the only memory model
` [PATCHv2 3/3] x86/64/mm: Make 5-level paging support unconditional
[RFC PATCH 0/7] arm64: Make EFI calls preemptible
2025-05-14 17:43 UTC (8+ messages)
` [RFC PATCH 1/7] efi: Add missing static initializer for efi_mm::cpus_allowed_lock
` [RFC PATCH 2/7] efi/runtime: Return success/failure from arch_efi_call_virt_setup()
` [RFC PATCH 3/7] efi/runtime: Deal with arch_efi_call_virt_setup() returning failure
` [RFC PATCH 4/7] arm64/fpsimd: Don't warn when EFI execution context is preemptible
` [RFC PATCH 5/7] arm64/efi: Use a semaphore to protect the EFI stack and FP/SIMD state
` [RFC PATCH 6/7] arm64/efi: Move uaccess en/disable out of efi_set_pgd()
` [RFC PATCH 7/7] arm64/efi: Call EFI runtime services without disabling preemption
[PATCH v2 0/2] efi: Add a mechanism for embedding SBAT section
2025-05-13 12:22 UTC (7+ messages)
` [PATCH v2 1/2] efi: zboot specific "
` [PATCH v2 2/2] x86/efi: Implement support for embedding SBAT data for x86
[PATCH v4 00/16] Enable Linear Address Space Separation support
2025-05-13 3:08 UTC (3+ messages)
` [PATCH v4 01/16] x86/cpu: Enumerate the LASS feature bits
[efi:next] BUILD SUCCESS c8e1927e7f7d63721e32ec41d27ccb0eb1a1b0fc
2025-05-10 11:05 UTC
[PATCH v2 1/4] fs: add owner of freeze/thaw
2025-05-09 10:38 UTC (4+ messages)
` [PATCH] fs: allow nesting with FREEZE_EXCL
[PATCH] efi/libstub: Describe missing 'out' parameter in efi_load_initrd
2025-05-09 9:24 UTC (2+ messages)
[PATCH] efi: Improve logging around memmap init
2025-05-09 9:07 UTC (2+ messages)
[PATCH v3] securityfs: fix missing of d_delete() in securityfs_remove()
2025-05-09 2:45 UTC
[PATCH v3] securityfs: fix missing of d_delete() in securityfs_remove()
2025-05-09 2:41 UTC
[PATCH 0/8] stackleak: Support Clang stack depth tracking
2025-05-08 12:25 UTC (14+ messages)
` [PATCH 1/8] nvme-pci: Make nvme_pci_npages_prp() __always_inline
` [PATCH 2/8] init.h: Disable sanitizer coverage for __init and __head
` [PATCH 3/8] stackleak: Rename CONFIG_GCC_PLUGIN_STACKLEAK to CONFIG_STACKLEAK
` [PATCH 5/8] stackleak: Split STACKLEAK_CFLAGS from GCC_PLUGINS_CFLAGS
` [PATCH 6/8] stackleak: Support Clang stack depth tracking
` [PATCH 7/8] configs/hardening: Enable CONFIG_STACKLEAK
` [PATCH 8/8] configs/hardening: Enable CONFIG_INIT_ON_FREE_DEFAULT_ON
[RFT PATCH v2 00/23] x86: strict separation of startup code
2025-05-08 11:08 UTC (8+ messages)
` [RFT PATCH v2 05/23] x86/sev: Move instruction decoder into separate source file
[PATCH 6.12 031/164] x86/boot/sev: Support memory acceptance in the EFI stub under SVSM
2025-05-07 18:38 UTC
[PATCH 6.14 027/183] x86/boot/sev: Support memory acceptance in the EFI stub under SVSM
2025-05-07 18:37 UTC
page: next (older)
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).