messages from 2025-07-07 03:30:41 to 2025-07-15 04:54:24 UTC [more...]
[PATCH v3 00/16] objtool: Detect and warn about indirect calls in __nocfi functions
2025-07-15 4:54 UTC (21+ messages)
` [PATCH v3 01/16] x86/kvm/emulate: Implement test_cc() in C
` [PATCH v3 02/16] x86/kvm/emulate: Introduce EM_ASM_1
` [PATCH v3 03/16] x86/kvm/emulate: Introduce EM_ASM_2
` [PATCH v3 04/16] x86/kvm/emulate: Introduce EM_ASM_2R
` [PATCH v3 05/16] x86/kvm/emulate: Introduce EM_ASM_2W
` [PATCH v3 06/16] x86/kvm/emulate: Introduce EM_ASM_2CL
` [PATCH v3 07/16] x86/kvm/emulate: Introduce EM_ASM_1SRC2
` [PATCH v3 08/16] x86/kvm/emulate: Introduce EM_ASM_3WCL
` [PATCH v3 09/16] x86/kvm/emulate: Convert em_salc() to C
` [PATCH v3 10/16] x86/kvm/emulate: Remove fastops
` [PATCH v3 11/16] x86,hyperv: Clean up hv_do_hypercall()
` [PATCH v3 12/16] x86_64,hyperv: Use direct call to hypercall-page
` [PATCH v3 13/16] x86/fred: Install system vector handlers even if FRED isnt fully enabled
` [PATCH v3 14/16] x86/fred: Play nice with invoking asm_fred_entry_from_kvm() on non-FRED hardware
` [PATCH v3 15/16] x86/fred: KVM: VMX: Always use FRED for IRQs when CONFIG_X86_FRED=y
` [PATCH v3 16/16] objtool: Validate kCFI calls
[RFC PATCH 0/3] Remove unused EFI runtime APIs
2025-07-15 3:29 UTC (11+ messages)
` [RFC PATCH 1/3] efi-rtc: Remove wakeup functionality
` [RFC PATCH 2/3] efi/test: Don't bother pseudo-testing unused EFI services
` [RFC PATCH 3/3] efi: Remove support for pointless, "
[PATCH] efi: add API doc entry for ovmf_debug_log
2025-07-15 2:17 UTC (4+ messages)
[PATCH] efistub: Lower default log level
2025-07-15 1:35 UTC (3+ messages)
[RFC PATCH 0/7] arm64: Make EFI calls preemptible
2025-07-15 0:46 UTC (10+ messages)
` [RFC PATCH 6/7] arm64/efi: Move uaccess en/disable out of efi_set_pgd()
` [RFC PATCH 7/7] arm64/efi: Call EFI runtime services without disabling preemption
[PATCH V6] efi/tpm: Fix the issue where the CC platforms event log header can't be correctly identified
2025-07-14 13:28 UTC (3+ messages)
[PATCH] rtc: efi: Add runtime check for the wakeup service capability
2025-07-14 2:36 UTC (6+ messages)
[PATCH v4 00/24] x86: strict separation of startup code
2025-07-12 15:02 UTC (42+ messages)
` [PATCH v4 01/24] x86/sev: Separate MSR and GHCB based snp_cpuid() via a callback
` [PATCH v4 02/24] x86/sev: Use MSR protocol for remapping SVSM calling area
` [PATCH v4 03/24] x86/sev: Use MSR protocol only for early SVSM PVALIDATE call
` [PATCH v4 04/24] x86/sev: Run RMPADJUST on SVSM calling area page to test VMPL
` [PATCH v4 05/24] x86/sev: Move GHCB page based HV communication out of startup code
` [PATCH v4 06/24] x86/sev: Avoid global variable to store virtual address of SVSM area
` [PATCH v4 07/24] x86/sev: Move MSR save/restore out of early page state change helper
` [PATCH v4 08/24] x86/sev: Share implementation of MSR-based page state change
` [PATCH v4 09/24] x86/sev: Pass SVSM calling area down to early page state change API
` [PATCH v4 10/24] x86/sev: Use boot SVSM CA for all startup and init code
` [PATCH v4 11/24] x86/boot: Drop redundant RMPADJUST in SEV SVSM presence check
` [PATCH v4 12/24] x86/sev: Unify SEV-SNP hypervisor feature check
` [PATCH v4 13/24] x86/boot: Provide PIC aliases for 5-level paging related constants
` [PATCH v4 14/24] x86/sev: Provide PIC aliases for SEV related data objects
` [PATCH v4 15/24] x86/sev: Move __sev_[get|put]_ghcb() into separate noinstr object
` [PATCH v4 16/24] x86/sev: Export startup routines for later use
` [PATCH v4 17/24] objtool: Add action to check for absence of absolute relocations
` [PATCH v4 18/24] x86/boot: Check startup code "
` [PATCH v4 19/24] x86/boot: Revert "Reject absolute references in .head.text"
` [PATCH v4 20/24] x86/kbuild: Incorporate boot/startup/ via Kbuild makefile
` [PATCH v4 21/24] x86/boot: Create a confined code area for startup code
` [PATCH v4 22/24] efistub/x86: Remap inittext read-execute when needed
` [PATCH v4 23/24] x86/boot: Move startup code out of __head section
` [PATCH v4 24/24] x86/boot: Get rid of the .head.text section
[PATCH V5] efi/tpm: Fix the issue where the CC platforms event log header can't be correctly identified
2025-07-12 3:24 UTC (3+ messages)
[PATCH V4] efi/tpm: Fix the issue where the CC platforms event log header can't be correctly identified
2025-07-12 2:24 UTC (4+ messages)
[efi:next] BUILD SUCCESS dedf090561dc6e1dcccf7b495a61bec57f2e7079
2025-07-12 1:52 UTC
[PATCH V3] efi/tpm: Fix the issue where the CC platforms event log header can't be correctly identified
2025-07-11 12:32 UTC (6+ messages)
[PATCHv9 00/16] x86: Enable Linear Address Space Separation support
2025-07-11 1:23 UTC (36+ messages)
` [PATCHv9 01/16] x86/cpu: Enumerate the LASS feature bits
` [PATCHv9 02/16] x86/alternatives: Disable LASS when patching kernel alternatives
` [PATCHv9 03/16] x86/cpu: Set LASS CR4 bit as pinning sensitive
` [PATCHv9 04/16] x86/cpu: Defer CR pinning setup until core initcall
` [PATCHv9 05/16] efi: Disable LASS around set_virtual_address_map() EFI call
` [PATCHv9 06/16] x86/vsyscall: Do not require X86_PF_INSTR to emulate vsyscall
` [PATCHv9 07/16] x86/vsyscall: Reorganize the #PF emulation code
` [PATCHv9 08/16] x86/traps: Consolidate user fixups in exc_general_protection()
` [PATCHv9 09/16] x86/vsyscall: Add vsyscall emulation for #GP
` [PATCHv9 10/16] x86/vsyscall: Disable LASS if vsyscall mode is set to EMULATE
` [PATCHv9 11/16] x86/traps: Communicate a LASS violation in #GP message
` [PATCHv9 12/16] x86/traps: Generalize #GP address decode and hint code
` [PATCHv9 13/16] x86/traps: Handle LASS thrown #SS
` [PATCHv9 14/16] x86/cpu: Enable LASS during CPU initialization
` [PATCHv9 15/16] x86/cpu: Make LAM depend on LASS
` [PATCHv9 16/16] x86: Re-enable Linear Address Masking
[efi:next] BUILD SUCCESS f393a761763c542761abcf978252d431269366d6
2025-07-10 11:52 UTC
[PATCH v4 0/8] firmware: qcom: enable UEFI variables on Lenovo Yoga C630
2025-07-10 9:40 UTC (11+ messages)
` [PATCH v4 6/8] firmware: qcom: scm: add modparam to control QSEECOM enablement
[PATCH] efi: remove the rtc-wakeup capability from default value
2025-07-10 7:32 UTC (6+ messages)
[PATCH v2] efi: add ovmf debug log driver
2025-07-10 6:41 UTC (11+ messages)
[PATCH v2 00/14] stackleak: Support Clang stack depth tracking
2025-07-10 1:57 UTC (4+ messages)
` [PATCH v2 08/14] powerpc: Handle KCOV __init vs inline mismatches
[PATCH] efi: remove modular option for ovmf-debug-log
2025-07-09 10:24 UTC (2+ messages)
[efi:next 1/1] ERROR: modpost: "efi_kobj" [drivers/firmware/efi/ovmf-debug-log.ko] undefined!
2025-07-09 8:54 UTC (3+ messages)
[efi:next] BUILD REGRESSION 42c68c6e354f71498f9e3e31aa5b0f9243bc1618
2025-07-09 6:14 UTC
[GIT PULL] EFI fixes for v6.16 #1
2025-07-08 16:00 UTC (2+ messages)
[PATCH] arm64: fix unnecessary rebuilding when CONFIG_DEBUG_EFI=y
2025-07-08 14:44 UTC (2+ messages)
[PATCH 0/8] arm64: set VMAP_STACK by default
2025-07-08 14:44 UTC (15+ messages)
` [PATCH 1/8] arm64: Enable VMAP_STACK support
` [PATCH 2/8] arm64: efi: Remove CONFIG_VMAP_STACK check
` [PATCH 3/8] arm64: Remove CONFIG_VMAP_STACK conditionals from THREAD_SHIFT and THREAD_ALIGN
` [PATCH 4/8] arm64: remove CONFIG_VMAP_STACK conditionals from irq stack setup
` [PATCH 5/8] arm64: remove CONFIG_VMAP_STACK conditionals from traps overflow stack
` [PATCH 6/8] arm64: remove CONFIG_VMAP_STACK checks from stacktrace overflow logic
` [PATCH 7/8] arm64: remove CONFIG_VMAP_STACK checks from SDEI stack handling
` [PATCH 8/8] arm64: remove CONFIG_VMAP_STACK checks from entry code
[PATCH] efi: add ovmf debug log driver
2025-07-08 12:09 UTC (2+ messages)
[PATCH v3 0/8] firmware: qcom: enable UEFI variables on Lenovo Yoga C630
2025-07-08 3:18 UTC (3+ messages)
` [PATCH v3 1/8] efi: efivars: don't crash in efivar_set_variable{,_locked} in r/o case
[PATCH] efi: Drop preprocessor directives from zboot.lds
2025-07-08 0:46 UTC (5+ messages)
[PATCH] arm64: efi: Fix KASAN false positive for EFI runtime stack
2025-07-07 16:08 UTC (8+ messages)
[PATCHv8 00/17] x86: Enable Linear Address Space Separation support
2025-07-07 9:33 UTC (6+ messages)
` [PATCHv8 02/17] x86/asm: Introduce inline memcpy and memset
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).