messages from 2025-05-01 15:56:19 to 2025-05-16 09:51:06 UTC [more...]
[PATCHv2 0/3] x86: Make 5-level paging support unconditional for x86-64
2025-05-16 9:50 UTC (5+ messages)
` [PATCHv2 1/3] x86/64/mm: Always use dynamic memory layout
` [PATCHv2 2/3] x86/64/mm: Make SPARSEMEM_VMEMMAP the only memory model
` [PATCHv2 3/3] x86/64/mm: Make 5-level paging support unconditional
[RFT PATCH v3 00/21] x86: strict separation of startup code
2025-05-15 16:43 UTC (48+ messages)
` [RFT PATCH v3 01/21] x86/sev: Separate MSR and GHCB based snp_cpuid() via a callback
` [RFT PATCH v3 02/21] x86/sev: Use MSR protocol for remapping SVSM calling area
` [RFT PATCH v3 03/21] x86/sev: Use MSR protocol only for early SVSM PVALIDATE call
` [RFT PATCH v3 04/21] x86/sev: Run RMPADJUST on SVSM calling area page to test VMPL
` [RFT PATCH v3 05/21] x86/sev: Move GHCB page based HV communication out of startup code
` [RFT PATCH v3 06/21] x86/sev: Avoid global variable to store virtual address of SVSM area
` [RFT PATCH v3 07/21] x86/sev: Move MSR save/restore out of early page state change helper
` [RFT PATCH v3 08/21] x86/sev: Share implementation of MSR-based page state change
` [RFT PATCH v3 09/21] x86/sev: Pass SVSM calling area down to early page state change API
` [RFT PATCH v3 10/21] x86/sev: Use boot SVSM CA for all startup and init code
` [RFT PATCH v3 11/21] x86/boot: Drop redundant RMPADJUST in SEV SVSM presence check
` [RFT PATCH v3 12/21] x86/sev: Unify SEV-SNP hypervisor feature check
` [RFT PATCH v3 13/21] x86/sev: Provide PIC aliases for SEV related data objects
` [RFT PATCH v3 14/21] x86/boot: Provide PIC aliases for 5-level paging related constants
` [RFT PATCH v3 15/21] x86/sev: Move __sev_[get|put]_ghcb() into separate noinstr object
` [RFT PATCH v3 16/21] x86/sev: Export startup routines for later use
` [RFT PATCH v3 17/21] x86/boot: Create a confined code area for startup code
` [RFT PATCH v3 18/21] x86/boot: Move startup code out of __head section
` [RFT PATCH v3 19/21] x86/boot: Disallow absolute symbol references in startup code
` [RFT PATCH v3 20/21] x86/boot: Revert "Reject absolute references in .head.text"
` [RFT PATCH v3 21/21] x86/boot: Get rid of the .head.text section
[RFC PATCH 0/7] arm64: Make EFI calls preemptible
2025-05-14 17:43 UTC (8+ messages)
` [RFC PATCH 1/7] efi: Add missing static initializer for efi_mm::cpus_allowed_lock
` [RFC PATCH 2/7] efi/runtime: Return success/failure from arch_efi_call_virt_setup()
` [RFC PATCH 3/7] efi/runtime: Deal with arch_efi_call_virt_setup() returning failure
` [RFC PATCH 4/7] arm64/fpsimd: Don't warn when EFI execution context is preemptible
` [RFC PATCH 5/7] arm64/efi: Use a semaphore to protect the EFI stack and FP/SIMD state
` [RFC PATCH 6/7] arm64/efi: Move uaccess en/disable out of efi_set_pgd()
` [RFC PATCH 7/7] arm64/efi: Call EFI runtime services without disabling preemption
[PATCH v3 0/2] efi: Add a mechanism for embedding SBAT section
2025-05-13 12:58 UTC (3+ messages)
` [PATCH v3 1/2] efi: zboot specific "
` [PATCH v3 2/2] x86/efi: Implement support for embedding SBAT data for x86
[PATCH v2 0/2] efi: Add a mechanism for embedding SBAT section
2025-05-13 12:22 UTC (7+ messages)
` [PATCH v2 1/2] efi: zboot specific "
` [PATCH v2 2/2] x86/efi: Implement support for embedding SBAT data for x86
[PATCH v4 00/16] Enable Linear Address Space Separation support
2025-05-13 3:08 UTC (3+ messages)
` [PATCH v4 01/16] x86/cpu: Enumerate the LASS feature bits
[syzbot] [fs?] [efi?] BUG: unable to handle kernel paging request in alloc_fs_context
2025-05-11 17:44 UTC
[efi:next] BUILD SUCCESS c8e1927e7f7d63721e32ec41d27ccb0eb1a1b0fc
2025-05-10 11:05 UTC
[PATCH v2 1/4] fs: add owner of freeze/thaw
2025-05-09 10:38 UTC (4+ messages)
` [PATCH] fs: allow nesting with FREEZE_EXCL
[PATCH] efi/libstub: Describe missing 'out' parameter in efi_load_initrd
2025-05-09 9:24 UTC (2+ messages)
[PATCH] efi: Improve logging around memmap init
2025-05-09 9:07 UTC (2+ messages)
[PATCH v3] securityfs: fix missing of d_delete() in securityfs_remove()
2025-05-09 2:45 UTC
[PATCH v3] securityfs: fix missing of d_delete() in securityfs_remove()
2025-05-09 2:41 UTC
[PATCH 0/8] stackleak: Support Clang stack depth tracking
2025-05-08 12:25 UTC (15+ messages)
` [PATCH 1/8] nvme-pci: Make nvme_pci_npages_prp() __always_inline
` [PATCH 2/8] init.h: Disable sanitizer coverage for __init and __head
` [PATCH 3/8] stackleak: Rename CONFIG_GCC_PLUGIN_STACKLEAK to CONFIG_STACKLEAK
` [PATCH 4/8] stackleak: Rename stackleak_track_stack to __sanitizer_cov_stack_depth
` [PATCH 5/8] stackleak: Split STACKLEAK_CFLAGS from GCC_PLUGINS_CFLAGS
` [PATCH 6/8] stackleak: Support Clang stack depth tracking
` [PATCH 7/8] configs/hardening: Enable CONFIG_STACKLEAK
` [PATCH 8/8] configs/hardening: Enable CONFIG_INIT_ON_FREE_DEFAULT_ON
[RFT PATCH v2 00/23] x86: strict separation of startup code
2025-05-08 11:08 UTC (59+ messages)
` [RFT PATCH v2 01/23] x86/boot: Move early_setup_gdt() back into head64.c
` [tip: x86/boot] "
` [RFT PATCH v2 02/23] x86/boot: Disregard __supported_pte_mask in __startup_64()
` [tip: x86/boot] "
` [RFT PATCH v2 03/23] x86/boot: Drop global variables keeping track of LA57 state
` [RFT PATCH v2 04/23] x86/sev: Make sev_snp_enabled() a static function
` [tip: x86/boot] "
` [RFT PATCH v2 05/23] x86/sev: Move instruction decoder into separate source file
` [tip: x86/boot] "
` [RFT PATCH v2 06/23] x86/sev: Disentangle #VC handling code from startup code
` [tip: x86/boot] "
` [RFT PATCH v2 07/23] x86/sev: Separate MSR and GHCB based snp_cpuid() via a callback
` [RFT PATCH v2 08/23] x86/sev: Fall back to early page state change code only during boot
` [RFT PATCH v2 09/23] x86/sev: Move GHCB page based HV communication out of startup code
` [RFT PATCH v2 10/23] x86/sev: Use boot SVSM CA for all startup and init code
` [RFT PATCH v2 11/23] x86/boot: Drop redundant RMPADJUST in SEV SVSM presence check
` [RFT PATCH v2 12/23] x86/sev: Unify SEV-SNP hypervisor feature check
` [RFT PATCH v2 13/23] x86/linkage: Add SYM_PIC_ALIAS() macro helper to emit symbol aliases
` [tip: x86/boot] "
` [RFT PATCH v2 14/23] x86/boot: Add a bunch of PIC aliases
` [tip: x86/boot] "
` [RFT PATCH v2 15/23] x86/boot: Provide __pti_set_user_pgtbl() to startup code
` [tip: x86/boot] "
` [RFT PATCH v2 16/23] x86/sev: Provide PIC aliases for SEV related data objects
` [RFT PATCH v2 17/23] x86/sev: Move __sev_[get|put]_ghcb() into separate noinstr object
` [RFT PATCH v2 18/23] x86/sev: Export startup routines for ordinary use
` [RFT PATCH v2 19/23] x86/boot: Created a confined code area for startup code
` [RFT PATCH v2 20/23] x86/boot: Move startup code out of __head section
` [RFT PATCH v2 21/23] x86/boot: Disallow absolute symbol references in startup code
` [RFT PATCH v2 22/23] x86/boot: Revert "Reject absolute references in .head.text"
` [RFT PATCH v2 23/23] x86/boot: Get rid of the .head.text section
[PATCH 6.12 031/164] x86/boot/sev: Support memory acceptance in the EFI stub under SVSM
2025-05-07 18:38 UTC
[PATCH 6.14 027/183] x86/boot/sev: Support memory acceptance in the EFI stub under SVSM
2025-05-07 18:37 UTC
UEFI EBS() failures on Lenovo T14s
2025-05-07 7:21 UTC (7+ messages)
[PATCH v2 00/13] objtool: Detect and warn about indirect calls in __nocfi functions
2025-05-06 19:18 UTC (25+ messages)
` [PATCH v2 13/13] objtool: Validate kCFI calls
x86/Documentation: explain LINUX_EFI_INITRD_MEDIA_GUID
2025-05-06 13:11 UTC (2+ messages)
4067196a5227 ("mm/page_alloc: fix deadlock on cpu_hotplug_lock in __accept_page()") (was: Re: [tip: x86/boot] x86/boot: Provide __pti_set_user_pgtbl() to startup code)
2025-05-06 10:23 UTC (3+ messages)
[PATCH] fs: Prevent panic from NULL dereference in alloc_fs_context() during do_exit()
2025-05-05 22:58 UTC
[PATCH] include: pe.h: Fix PE definitions
2025-05-05 17:32 UTC (3+ messages)
[RFC PATCH v1 00/10] Add RAS support for RISC-V architecture
2025-05-05 12:32 UTC (3+ messages)
` [RFC PATCH v1 01/10] riscv: Define ioremap_cache for RISC-V
[PATCH] x86/boot/sev: Support memory acceptance in the EFI stub under SVSM
2025-05-04 7:42 UTC (6+ messages)
` [tip: x86/urgent] "
[PATCH v5 0/6] x86: Refactor and consolidate startup code
2025-05-04 7:33 UTC (5+ messages)
` [PATCH v5 6/6] x86/asm: Retire RIP_REL_REF()
[PATCH RFC 0/4] stackleak: Support Clang stack depth tracking
2025-05-02 19:01 UTC (5+ messages)
` [PATCH RFC 1/4] stackleak: Rename CONFIG_GCC_PLUGIN_STACKLEAK to CONFIG_STACKLEAK
` [PATCH RFC 2/4] stackleak: Rename stackleak_track_stack to __sanitizer_cov_stack_depth
` [PATCH RFC 3/4] stackleak: Split STACKLEAK_CFLAGS from GCC_PLUGINS_CFLAGS
` [PATCH RFC 4/4] stackleak: Support Clang stack depth tracking
wts
2025-05-02 14:54 UTC
[PATCH 0/2] efi: Add a mechanism for embedding SBAT section
2025-05-02 13:59 UTC (9+ messages)
` [PATCH 2/2] x86/efi: Implement support for embedding SBAT data for x86
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox