messages from 2025-06-20 13:53:49 to 2025-07-01 09:59:03 UTC [more...]
[PATCHv8 00/17] x86: Enable Linear Address Space Separation support
2025-07-01 9:58 UTC (3+ messages)
` [PATCHv8 01/17] x86/cpu: Enumerate the LASS feature bits
` [PATCHv8 02/17] x86/asm: Introduce inline memcpy and memset
[PATCH v4 0/8] firmware: qcom: enable UEFI variables on Lenovo Yoga C630
2025-06-30 12:42 UTC (36+ messages)
` [PATCH v4 1/8] efi: efivars: don't crash in efivar_set_variable{,_locked} in r/o case
` [PATCH v4 2/8] firmware: qcom: scm: allow specifying quirks for QSEECOM implementations
` [PATCH v4 3/8] firmware: qcom: uefisecapp: add support for R/O UEFI vars
` [PATCH v4 4/8] firmware: qcom: enable QSEECOM on Lenovo Yoga C630
` [PATCH v4 5/8] firmware; qcom: scm: enable QSEECOM on SC8280XP CRD
` [PATCH v4 6/8] firmware: qcom: scm: add modparam to control QSEECOM enablement
` [PATCH v4 7/8] firmware: qcom: scm: rework QSEECOM allowlist
` [PATCH v4 8/8] arm64: dts: qcom: sdm850-lenovo-yoga-c630: fix RTC offset info
[PATCHv7 00/16] x86: Enable Linear Address Space Separation support
2025-06-30 9:50 UTC (33+ messages)
` [PATCHv7 01/16] x86/cpu: Enumerate the LASS feature bits
` [PATCH] x86/vsyscall: Do not require X86_PF_INSTR to emulate vsyscall
` [PATCHv7 02/16] x86/asm: Introduce inline memcpy and memset
` [PATCHv7 03/16] x86/alternatives: Disable LASS when patching kernel alternatives
` [PATCHv7 04/16] x86/cpu: Defer CR pinning setup until after EFI initialization
` [PATCHv7 05/16] efi: Disable LASS around set_virtual_address_map() EFI call
` [PATCHv7 06/16] x86/vsyscall: Do not require X86_PF_INSTR to emulate vsyscall
` [PATCHv7 07/16] x86/vsyscall: Reorganize the #PF emulation code
` [PATCHv7 08/16] x86/traps: Consolidate user fixups in exc_general_protection()
` [PATCHv7 09/16] x86/vsyscall: Add vsyscall emulation for #GP
` [PATCHv7 10/16] x86/vsyscall: Disable LASS if vsyscall mode is set to EMULATE
` [PATCHv7 11/16] x86/cpu: Set LASS CR4 bit as pinning sensitive
` [PATCHv7 12/16] x86/traps: Communicate a LASS violation in #GP message
` [PATCHv7 13/16] x86/traps: Handle LASS thrown #SS
` [PATCHv7 14/16] x86/cpu: Make LAM depend on LASS
` [PATCHv7 15/16] x86/cpu: Enable LASS during CPU initialization
` [PATCHv7 16/16] x86: Re-enable Linear Address Masking
[PATCHv6 00/16] x86: Enable Linear Address Space Separation support
2025-06-27 13:57 UTC (78+ messages)
` [PATCHv6 01/16] x86/cpu: Enumerate the LASS feature bits
` [PATCHv6 03/16] x86/alternatives: Disable LASS when patching kernel alternatives
` [PATCHv6 04/16] x86/efi: Move runtime service initialization to arch/x86
` [PATCHv6 05/16] x86/cpu: Defer CR pinning setup until after EFI initialization
` [PATCHv6 06/16] efi: Disable LASS around set_virtual_address_map() EFI call
` [PATCHv6 07/16] x86/vsyscall: Reorganize the #PF emulation code
` [PATCH] x86/vsyscall: Do not require X86_PF_INSTR to emulate vsyscall
` [PATCHv6 08/16] x86/traps: Consolidate user fixups in exc_general_protection()
` [PATCHv6 09/16] x86/vsyscall: Add vsyscall emulation for #GP
` [PATCHv6 10/16] x86/vsyscall: Disable LASS if vsyscall mode is set to EMULATE
` [PATCHv6 12/16] x86/traps: Communicate a LASS violation in #GP message
` [PATCHv6 13/16] x86/traps: Handle LASS thrown #SS
` [PATCHv6 14/16] x86/cpu: Make LAM depend on LASS
` [PATCHv6 15/16] x86/cpu: Enable LASS during CPU initialization
` [PATCHv6 16/16] x86: Re-enable Linear Address Masking
[PATCH v14 00/19] x86: Trenchboot secure dynamic launch Linux kernel support
2025-06-27 9:15 UTC (5+ messages)
` [PATCH v14 04/19] x86: Secure Launch main header file
[PATCH 0/2] Secure Boot lock down
2025-06-26 22:10 UTC (3+ messages)
` [PATCH 1/2] security: introduce security_lock_kernel_down()
` [PATCH 2/2] efi: introduce EFI_KERNEL_LOCK_DOWN_IN_SECURE_BOOT
[PATCH] efi/loongarch: Reserve EFI memory map region
2025-06-26 12:34 UTC (2+ messages)
[PATCH v4 3/3] x86/sev: Let sev_es_efi_map_ghcbs() map the caa pages too
2025-06-26 11:40 UTC
[PATCH v3 2/2] x86/sev: Let sev_es_efi_map_ghcbs() map the caa pages too
2025-06-26 8:19 UTC (2+ messages)
[PATCH v2 2/2] x86/sev: let sev_es_efi_map_ghcbs map the caa pages too
2025-06-26 7:43 UTC (7+ messages)
[PATCH] arm64: fix unnecessary rebuilding when CONFIG_DEBUG_EFI=y
2025-06-25 14:11 UTC (2+ messages)
[PATCH v2 00/14] stackleak: Support Clang stack depth tracking
2025-06-25 1:09 UTC (5+ messages)
` [PATCH v2 10/14] loongarch: Handle KCOV __init vs inline mismatches
[PATCH v3 0/8] firmware: qcom: enable UEFI variables on Lenovo Yoga C630
2025-06-24 12:58 UTC (13+ messages)
` [PATCH v3 1/8] efi: efivars: don't crash in efivar_set_variable{,_locked} in r/o case
` [PATCH v3 2/8] firmware: qcom: scm: allow specifying quirks for QSEECOM implementations
` [PATCH v3 3/8] firmware: qcom: uefisecapp: add support for R/O UEFI vars
` [PATCH v3 4/8] firmware: qcom: enable QSEECOM on Lenovo Yoga C630
` [PATCH v3 5/8] firmware; qcom: scm: enable QSEECOM on SC8280XP CRD
` [PATCH v3 6/8] firmware: qcom: scm: add modparam to control QSEECOM enablement
` [PATCH v3 7/8] firmware: qcom: scm: rework QSEECOM allowlist
` [PATCH v3 8/8] arm64: dts: qcom: sdm850-lenovo-yoga-c630: fix RTC offset info
[PATCH] arm64: efi: Fix KASAN false positive for EFI runtime stack
2025-06-24 12:55 UTC
[PATCHv2 0/3] x86: Make 5-level paging support unconditional for x86-64
2025-06-24 8:49 UTC (4+ messages)
[PATCHv3 0/4] x86: Make 5-level paging support unconditional for x86-64
2025-06-24 8:23 UTC (2+ messages)
` [PATCHv2 0/3] "
[PATCH v1 0/3] x86/boot: Supply boot_param in rdi instead of rsi from startup_64()
2025-06-24 0:49 UTC (8+ messages)
[PATCH v1 1/3] Recieve boot_param from RDI Instead of RSI
2025-06-23 17:58 UTC (4+ messages)
` "
[PATCH v1 1/3] x86/boot: Recieve boot_param from RDI Instead of RSI
2025-06-23 8:17 UTC
[PATCH v1 3/3] efi/efistub: Make libstub to supply boot_param from RDI
2025-06-23 8:16 UTC
[PATCH v1 2/3] x86/boot: the decompressor must supply boot_param from RDI
2025-06-23 8:16 UTC
[PATCH] efi/libstub: Print status codes on failure
2025-06-21 11:33 UTC
[efi:urgent] BUILD SUCCESS f8b53cc9174c5980549f60c972faad82b660b62d
2025-06-21 10:05 UTC
[PATCH v4] x86/efi: Implement support for embedding SBAT data for x86
2025-06-21 8:23 UTC (2+ messages)
[PATCH v3 0/5] Fix issues with ARM Processor CPER records
2025-06-21 8:15 UTC (5+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox