messages from 2025-03-10 22:03:11 to 2025-04-01 09:08:12 UTC [more...]
[GIT PULL] EFI updates for v6.15
2025-04-01 9:08 UTC (12+ messages)
[PATCH 0/2] efivarfs: support freeze/thaw
2025-04-01 8:16 UTC (16+ messages)
` [PATCH 1/2] libfs: export find_next_child()
` [PATCH 2/2] efivarfs: support freeze/thaw
` [PATCH 0/6] power: wire-up filesystem freeze/thaw with suspend/resume
` [PATCH 1/6] ext4: replace kthread freezing with auto fs freezing
` [PATCH 2/6] btrfs: "
` [PATCH 3/6] xfs: "
` [PATCH 4/6] fs: add owner of freeze/thaw
` [PATCH 5/6] fs: allow pagefault based writers to be frozen
` [PATCH 6/6] power: freeze filesystems during suspend/resume
[PATCH v13 00/19] x86: Trenchboot secure dynamic launch Linux kernel support
2025-03-31 18:29 UTC (24+ messages)
` [PATCH v13 01/19] Documentation/x86: Secure Launch kernel documentation
` [PATCH v13 02/19] x86: Secure Launch Kconfig
` [PATCH v13 03/19] x86: Secure Launch Resource Table header file
` [PATCH v13 04/19] x86: Secure Launch main "
` [PATCH v13 05/19] x86: Add early SHA-1 support for Secure Launch early measurements
` [PATCH v13 06/19] x86: Add early SHA-256 "
` [PATCH v13 07/19] x86/msr: Add variable MTRR base/mask and x2apic ID registers
` [PATCH v13 08/19] x86/boot: Place TXT MLE header in the kernel_info section
` [PATCH v13 09/19] x86: Secure Launch kernel early boot stub
` [PATCH v13 10/19] x86: Secure Launch kernel late "
` [PATCH v13 11/19] x86: Secure Launch SMP bringup support
` [PATCH v13 12/19] kexec: Secure Launch kexec SEXIT support
` [PATCH v13 13/19] x86/reboot: Secure Launch SEXIT support on reboot paths
` [PATCH v13 14/19] tpm, tpm_tis: Close all localities
` [PATCH v13 15/19] tpm, tpm_tis: Address positive localities in tpm_tis_request_locality()
` [PATCH v13 16/19] tpm, tpm_tis: Allow locality to be set to a different value
` [PATCH v13 17/19] tpm, sysfs: Show locality used by kernel
` [PATCH v13 18/19] x86: Secure Launch late initcall platform module
` [PATCH v13 19/19] x86/efi: EFI stub DRTM launch support for Secure Launch
[PATCH] efi/efi_test: Fix missing pending status update in getwakeuptime
2025-03-31 7:45 UTC
[PATCH V3] block: fix conversion of GPT partition name to 7-bit
2025-03-28 19:57 UTC (5+ messages)
[PATCH 0/2] string.c: Add wcslen()
2025-03-26 15:43 UTC (12+ messages)
` [PATCH 1/2] lib/string.c: "
` [PATCH RFC 2/2] wcslen() prototype in string.h
[PATCH] efi/libstub: Do not accept parts of memory before ExitBootServices()
2025-03-26 9:28 UTC (9+ messages)
query regarding SEV logic in early boot
2025-03-25 17:03 UTC (5+ messages)
[RFC PATCH v3 00/13] Clavis LSM
2025-03-24 17:44 UTC (35+ messages)
[PATCH 6.1 v2 1/2] efivarfs: Add uid/gid mount options
2025-03-21 19:42 UTC (2+ messages)
` [PATCH 6.1 v2 2/2] efivarfs: Move efivarfs list into superblock s_fs_info
[PATCH 6.1] efivarfs: Move efivarfs list into superblock s_fs_info
2025-03-21 19:00 UTC (2+ messages)
[PATCH 5.10 1/2] efi: vars: Use locking version to iterate over efivars linked lists
2025-03-21 18:21 UTC (2+ messages)
` [PATCH 5.10 2/2] efivarfs: Add efivars_lock to synchronize list operations
[GIT PULL] EFI fixes for v6.14 #3
2025-03-20 17:02 UTC (2+ messages)
[PATCH RFC v2 00/29] Address Space Isolation (ASI)
2025-03-20 10:44 UTC (5+ messages)
` [PATCH RFC v2 04/29] mm: asi: Add infrastructure for boot-time enablement
[RFC PATCH 0/3] create simple libfs directory iterator and make efivarfs use it
2025-03-19 18:45 UTC (13+ messages)
` [RFC PATCH 1/3] libfs: rework dcache_readdir to use an internal function with callback
` [RFC PATCH 2/3] libfs: add simple directory iteration "
` [RFC PATCH 3/3] efivarfs: replace iterate_dir with libfs function simple_iterate_call
[PATCH v2 0/8] drivers: Transition to the faux device interface
2025-03-19 14:30 UTC (8+ messages)
` [PATCH v2 4/8] rtc: efi: "
` [PATCH v2 5/8] virt: efi_secret: "
` [PATCH v2 6/8] efi: efivars: "
[efi:urgent] BUILD SUCCESS 11092db5b57377ac99e6339cfd16ca35ef011f3c
2025-03-19 9:40 UTC
[PATCH] efivarfs: fix NULL dereference on resume
2025-03-18 14:52 UTC (7+ messages)
[PATCH] arm64/fpsimd: Avoid unnecessary per-CPU buffers for EFI runtime calls
2025-03-18 14:21 UTC (2+ messages)
[PATCH 0/9] drivers: Transition to the faux device interface
2025-03-17 18:10 UTC (13+ messages)
` [PATCH 3/9] efi: Remove redundant creation of the "efivars" platform device
` [PATCH 4/9] rtc: efi: Transition to the faux device interface
` [PATCH 5/9] virt: efi_secret: "
` (subset) [PATCH 0/9] drivers: "
[efi:urgent 10/10] fs/efivarfs/super.c:424:27: error: use of undeclared identifier 'INODE_CHILD'
2025-03-17 17:17 UTC (3+ messages)
[efi:urgent 10/10] fs/efivarfs/super.c:424:34: error: 'INODE_CHILD' undeclared; did you mean 'I_MUTEX_CHILD'?
2025-03-17 15:08 UTC
apparmor NULL pointer dereference on resume
2025-03-17 8:56 UTC (17+ messages)
` apparmor NULL pointer dereference on resume [efivarfs]
` [RFC 1/1] fix NULL mnt [was Re: apparmor NULL pointer dereference on resume [efivarfs]]
[PATCH] efivarfs: use INODE_CHILD nested lock to traverse variables on resume
2025-03-17 7:30 UTC
[efi:next] BUILD SUCCESS 0dc1754e16b4c14ae42f6cf59f319331d885f0f6
2025-03-15 13:00 UTC
[efi:urgent] BUILD SUCCESS cb16dfed0093217a68c0faa9394fa5823927e04c
2025-03-15 11:43 UTC
[efi:next] BUILD SUCCESS 74d613e046e418ed512b265aa2ef8a27a761fb4d
2025-03-14 12:28 UTC
[PATCH] efi/libstub: Avoid physical address 0x0 when doing random allocation
2025-03-14 11:18 UTC (2+ messages)
[PATCH v8 0/2] acpi/ghes, cper, cxl: Process CXL CPER Protocol errors
2025-03-13 19:58 UTC (10+ messages)
` [PATCH v8 1/2] acpi/ghes, cxl/pci: Process CXL CPER Protocol Errors
` [PATCH v8 2/2] cxl/pci: Add trace logging for CXL PCIe Port RAS errors
efi_random_alloc() returning EFI_NOT_FOUND
2025-03-12 21:29 UTC (13+ messages)
[efi:next] BUILD SUCCESS ac2efaa8455021ce1e6216457684d60a9e2c77fd
2025-03-11 18:12 UTC
[syzbot] [efi?] [fs?] possible deadlock in efivarfs_actor
2025-03-10 23:58 UTC (6+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox