public inbox for linux-efi@vger.kernel.org
 help / color / mirror / Atom feed
 messages from 2025-06-06 13:15:21 to 2025-06-26 13:16:50 UTC [more...]

[PATCHv7 00/16] x86: Enable Linear Address Space Separation support
 2025-06-26 13:15 UTC  (23+ messages)
` [PATCHv7 01/16] x86/cpu: Enumerate the LASS feature bits
` [PATCH] x86/vsyscall: Do not require X86_PF_INSTR to emulate vsyscall
` [PATCHv7 02/16] x86/asm: Introduce inline memcpy and memset
` [PATCHv7 03/16] x86/alternatives: Disable LASS when patching kernel alternatives
` [PATCHv7 04/16] x86/cpu: Defer CR pinning setup until after EFI initialization
` [PATCHv7 05/16] efi: Disable LASS around set_virtual_address_map() EFI call
` [PATCHv7 06/16] x86/vsyscall: Do not require X86_PF_INSTR to emulate vsyscall
` [PATCHv7 07/16] x86/vsyscall: Reorganize the #PF emulation code
` [PATCHv7 08/16] x86/traps: Consolidate user fixups in exc_general_protection()
` [PATCHv7 09/16] x86/vsyscall: Add vsyscall emulation for #GP
` [PATCHv7 10/16] x86/vsyscall: Disable LASS if vsyscall mode is set to EMULATE
` [PATCHv7 11/16] x86/cpu: Set LASS CR4 bit as pinning sensitive
` [PATCHv7 12/16] x86/traps: Communicate a LASS violation in #GP message
` [PATCHv7 13/16] x86/traps: Handle LASS thrown #SS
` [PATCHv7 14/16] x86/cpu: Make LAM depend on LASS
` [PATCHv7 15/16] x86/cpu: Enable LASS during CPU initialization
` [PATCHv7 16/16] x86: Re-enable Linear Address Masking

[PATCH v4 0/8] firmware: qcom: enable UEFI variables on Lenovo Yoga C630
 2025-06-26 13:02 UTC  (21+ messages)
` [PATCH v4 1/8] efi: efivars: don't crash in efivar_set_variable{,_locked} in r/o case
` [PATCH v4 2/8] firmware: qcom: scm: allow specifying quirks for QSEECOM implementations
` [PATCH v4 3/8] firmware: qcom: uefisecapp: add support for R/O UEFI vars
` [PATCH v4 4/8] firmware: qcom: enable QSEECOM on Lenovo Yoga C630
` [PATCH v4 5/8] firmware; qcom: scm: enable QSEECOM on SC8280XP CRD
` [PATCH v4 6/8] firmware: qcom: scm: add modparam to control QSEECOM enablement
` [PATCH v4 7/8] firmware: qcom: scm: rework QSEECOM allowlist
` [PATCH v4 8/8] arm64: dts: qcom: sdm850-lenovo-yoga-c630: fix RTC offset info

[PATCH] efi/loongarch: Reserve EFI memory map region
 2025-06-26 12:34 UTC  (2+ messages)

[PATCH v4 3/3] x86/sev: Let sev_es_efi_map_ghcbs() map the caa pages too
 2025-06-26 11:40 UTC 

[PATCH v3 2/2] x86/sev: Let sev_es_efi_map_ghcbs() map the caa pages too
 2025-06-26  8:19 UTC  (2+ messages)

[PATCH v2 2/2] x86/sev: let sev_es_efi_map_ghcbs map the caa pages too
 2025-06-26  7:43 UTC  (7+ messages)

[PATCHv6 00/16] x86: Enable Linear Address Space Separation support
 2025-06-25 18:51 UTC  (74+ messages)
` [PATCHv6 01/16] x86/cpu: Enumerate the LASS feature bits
` [PATCHv6 02/16] x86/asm: Introduce inline memcpy and memset
` [PATCHv6 03/16] x86/alternatives: Disable LASS when patching kernel alternatives
` [PATCHv6 04/16] x86/efi: Move runtime service initialization to arch/x86
` [PATCHv6 05/16] x86/cpu: Defer CR pinning setup until after EFI initialization
` [PATCHv6 06/16] efi: Disable LASS around set_virtual_address_map() EFI call
` [PATCHv6 07/16] x86/vsyscall: Reorganize the #PF emulation code
                ` [PATCH] x86/vsyscall: Do not require X86_PF_INSTR to emulate vsyscall
` [PATCHv6 08/16] x86/traps: Consolidate user fixups in exc_general_protection()
` [PATCHv6 09/16] x86/vsyscall: Add vsyscall emulation for #GP
` [PATCHv6 10/16] x86/vsyscall: Disable LASS if vsyscall mode is set to EMULATE
` [PATCHv6 11/16] x86/cpu: Set LASS CR4 bit as pinning sensitive
` [PATCHv6 12/16] x86/traps: Communicate a LASS violation in #GP message
` [PATCHv6 13/16] x86/traps: Handle LASS thrown #SS
` [PATCHv6 14/16] x86/cpu: Make LAM depend on LASS
` [PATCHv6 15/16] x86/cpu: Enable LASS during CPU initialization
` [PATCHv6 16/16] x86: Re-enable Linear Address Masking

[PATCH] arm64: fix unnecessary rebuilding when CONFIG_DEBUG_EFI=y
 2025-06-25 14:11 UTC  (2+ messages)

[PATCH v2 00/14] stackleak: Support Clang stack depth tracking
 2025-06-25  1:09 UTC  (7+ messages)
` [PATCH v2 09/14] mips: Handle KCOV __init vs inline mismatches
` [PATCH v2 10/14] loongarch: "

[PATCH v3 0/8] firmware: qcom: enable UEFI variables on Lenovo Yoga C630
 2025-06-24 12:58 UTC  (13+ messages)
` [PATCH v3 1/8] efi: efivars: don't crash in efivar_set_variable{,_locked} in r/o case
` [PATCH v3 2/8] firmware: qcom: scm: allow specifying quirks for QSEECOM implementations
` [PATCH v3 3/8] firmware: qcom: uefisecapp: add support for R/O UEFI vars
` [PATCH v3 4/8] firmware: qcom: enable QSEECOM on Lenovo Yoga C630
` [PATCH v3 5/8] firmware; qcom: scm: enable QSEECOM on SC8280XP CRD
` [PATCH v3 6/8] firmware: qcom: scm: add modparam to control QSEECOM enablement
` [PATCH v3 7/8] firmware: qcom: scm: rework QSEECOM allowlist
` [PATCH v3 8/8] arm64: dts: qcom: sdm850-lenovo-yoga-c630: fix RTC offset info

[PATCH] arm64: efi: Fix KASAN false positive for EFI runtime stack
 2025-06-24 12:55 UTC 

[PATCHv2 0/3] x86: Make 5-level paging support unconditional for x86-64
 2025-06-24  8:49 UTC  (4+ messages)

[PATCHv3 0/4] x86: Make 5-level paging support unconditional for x86-64
 2025-06-24  8:23 UTC  (2+ messages)
` [PATCHv2 0/3] "

[PATCH v1 0/3] x86/boot: Supply boot_param in rdi instead of rsi from startup_64()
 2025-06-24  0:49 UTC  (8+ messages)

[PATCH v14 00/19] x86: Trenchboot secure dynamic launch Linux kernel support
 2025-06-23 21:29 UTC  (9+ messages)
` [PATCH v14 01/19] Documentation/x86: Secure Launch kernel documentation
` [PATCH v14 02/19] x86: Secure Launch Kconfig
` [PATCH v14 04/19] x86: Secure Launch main header file

[PATCH v1 1/3] Recieve boot_param from RDI Instead of RSI
 2025-06-23 17:58 UTC  (4+ messages)
  `  "

[PATCH v1 1/3] x86/boot: Recieve boot_param from RDI Instead of RSI
 2025-06-23  8:17 UTC 

[PATCH v1 3/3] efi/efistub: Make libstub to supply boot_param from RDI
 2025-06-23  8:16 UTC 

[PATCH v1 2/3] x86/boot: the decompressor must supply boot_param from RDI
 2025-06-23  8:16 UTC 

[PATCH] efi/libstub: Print status codes on failure
 2025-06-21 11:33 UTC 

[efi:urgent] BUILD SUCCESS f8b53cc9174c5980549f60c972faad82b660b62d
 2025-06-21 10:05 UTC 

[PATCH v4] x86/efi: Implement support for embedding SBAT data for x86
 2025-06-21  8:23 UTC  (2+ messages)

[PATCH v3 0/5] Fix issues with ARM Processor CPER records
 2025-06-21  8:15 UTC  (5+ messages)

[PATCH v2] efi: Fix .data section size calculations when .sbat is present
 2025-06-20 11:38 UTC  (2+ messages)

[PATCH] efi: Fix .data section size calculations when .sbat is present
 2025-06-20 10:58 UTC  (6+ messages)

[PATCH RESEND v3] x86/efi: Implement support for embedding SBAT data for x86
 2025-06-19 15:15 UTC  (2+ messages)

[PATCH] x86: Fix build warnings about export.h
 2025-06-12  9:57 UTC  (2+ messages)

[efi:urgent] BUILD SUCCESS c33453d08a56a45c2e72f9f56043610b8f7449c7
 2025-06-12  1:58 UTC 

[PATCH v2] x86/efi: error handling on efi memory map
 2025-06-08 17:11 UTC 

[PATCH] x86/efi: error handling on efi memory map
 2025-06-08 13:22 UTC  (2+ messages)

[efi:urgent] BUILD SUCCESS 76f6cf6676f4e2d83acdb7d93bba71340a95f5bb
 2025-06-07  7:10 UTC 

[PATCH] efi: Drop preprocessor directives from zboot.lds
 2025-06-06 15:55 UTC  (3+ messages)

[PATCH v2 00/13] objtool: Detect and warn about indirect calls in __nocfi functions
 2025-06-06 13:20 UTC  (12+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox