linux-efi.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2025-05-12 19:12:10 to 2025-06-20 16:14:13 UTC [more...]

[PATCHv6 00/16] x86: Enable Linear Address Space Separation support
 2025-06-20 16:12 UTC  (28+ messages)
` [PATCHv6 01/16] x86/cpu: Enumerate the LASS feature bits
` [PATCHv6 02/16] x86/asm: Introduce inline memcpy and memset
` [PATCHv6 03/16] x86/alternatives: Disable LASS when patching kernel alternatives
` [PATCHv6 04/16] x86/efi: Move runtime service initialization to arch/x86
` [PATCHv6 05/16] x86/cpu: Defer CR pinning setup until after EFI initialization
` [PATCHv6 06/16] efi: Disable LASS around set_virtual_address_map() EFI call
` [PATCHv6 07/16] x86/vsyscall: Reorganize the #PF emulation code
` [PATCHv6 08/16] x86/traps: Consolidate user fixups in exc_general_protection()
` [PATCHv6 09/16] x86/vsyscall: Add vsyscall emulation for #GP
` [PATCHv6 10/16] x86/vsyscall: Disable LASS if vsyscall mode is set to EMULATE
` [PATCHv6 11/16] x86/cpu: Set LASS CR4 bit as pinning sensitive
` [PATCHv6 12/16] x86/traps: Communicate a LASS violation in #GP message
` [PATCHv6 13/16] x86/traps: Handle LASS thrown #SS
` [PATCHv6 14/16] x86/cpu: Make LAM depend on LASS
` [PATCHv6 15/16] x86/cpu: Enable LASS during CPU initialization
` [PATCHv6 16/16] x86: Re-enable Linear Address Masking

[PATCH v2] efi: Fix .data section size calculations when .sbat is present
 2025-06-20 11:38 UTC  (2+ messages)

[PATCH] efi: Fix .data section size calculations when .sbat is present
 2025-06-20 10:58 UTC  (6+ messages)

[PATCH v4] x86/efi: Implement support for embedding SBAT data for x86
 2025-06-19 15:17 UTC 

[PATCH RESEND v3] x86/efi: Implement support for embedding SBAT data for x86
 2025-06-19 15:15 UTC  (2+ messages)

[PATCH v2 00/14] stackleak: Support Clang stack depth tracking
 2025-06-19  8:55 UTC  (26+ messages)
` [PATCH v2 01/14] stackleak: Rename STACKLEAK to KSTACK_ERASE
` [PATCH v2 02/14] stackleak: Rename stackleak_track_stack to __sanitizer_cov_stack_depth
` [PATCH v2 03/14] stackleak: Split KSTACK_ERASE_CFLAGS from GCC_PLUGINS_CFLAGS
` [PATCH v2 04/14] x86: Handle KCOV __init vs inline mismatches
` [PATCH v2 05/14] arm: "
` [PATCH v2 06/14] arm64: "
` [PATCH v2 07/14] s390: "
` [PATCH v2 08/14] powerpc: "
` [PATCH v2 09/14] mips: "
` [PATCH v2 10/14] loongarch: "
` [PATCH v2 11/14] init.h: Disable sanitizer coverage for __init and __head
` [PATCH v2 12/14] kstack_erase: Support Clang stack depth tracking
` [PATCH v2 13/14] configs/hardening: Enable CONFIG_KSTACK_ERASE
` [PATCH v2 14/14] configs/hardening: Enable CONFIG_INIT_ON_FREE_DEFAULT_ON

[PATCH v14 00/19] x86: Trenchboot secure dynamic launch Linux kernel support
 2025-06-18 15:02 UTC  (6+ messages)
` [PATCH v14 01/19] Documentation/x86: Secure Launch kernel documentation
` [PATCH v14 02/19] x86: Secure Launch Kconfig

[PATCH] x86: Fix build warnings about export.h
 2025-06-12  9:57 UTC  (2+ messages)

[efi:urgent] BUILD SUCCESS c33453d08a56a45c2e72f9f56043610b8f7449c7
 2025-06-12  1:58 UTC 

[PATCH v2] x86/efi: error handling on efi memory map
 2025-06-08 17:11 UTC 

[PATCH] x86/efi: error handling on efi memory map
 2025-06-08 13:22 UTC  (2+ messages)

[efi:urgent] BUILD SUCCESS 76f6cf6676f4e2d83acdb7d93bba71340a95f5bb
 2025-06-07  7:10 UTC 

[PATCH v3 0/5] Fix issues with ARM Processor CPER records
 2025-06-06 18:30 UTC  (4+ messages)

[PATCH] efi: Drop preprocessor directives from zboot.lds
 2025-06-06 15:55 UTC  (3+ messages)

[PATCH v2 00/13] objtool: Detect and warn about indirect calls in __nocfi functions
 2025-06-06 13:20 UTC  (20+ messages)

[PATCH] efi/libstub: use 'targets' instead of extra-y in Makefile
 2025-06-05 20:42 UTC  (3+ messages)

[PATCH v2 2/2] x86/sev: let sev_es_efi_map_ghcbs map the caa pages too
 2025-06-02 10:50 UTC 

[RFT PATCH v3 00/21] x86: strict separation of startup code
 2025-06-01  9:39 UTC  (47+ messages)
` [RFT PATCH v3 01/21] x86/sev: Separate MSR and GHCB based snp_cpuid() via a callback
` [RFT PATCH v3 02/21] x86/sev: Use MSR protocol for remapping SVSM calling area
` [RFT PATCH v3 04/21] x86/sev: Run RMPADJUST on SVSM calling area page to test VMPL
` [RFT PATCH v3 05/21] x86/sev: Move GHCB page based HV communication out of startup code
` [RFT PATCH v3 09/21] x86/sev: Pass SVSM calling area down to early page state change API
` [RFT PATCH v3 12/21] x86/sev: Unify SEV-SNP hypervisor feature check
` [RFT PATCH v3 18/21] x86/boot: Move startup code out of __head section
` [RFT PATCH v3 19/21] x86/boot: Disallow absolute symbol references in startup code
` [RFT PATCH v3 20/21] x86/boot: Revert "Reject absolute references in .head.text"
` [RFT PATCH v3 21/21] x86/boot: Get rid of the .head.text section

[GIT PULL] EFI updates for v6.16
 2025-05-30 23:17 UTC  (2+ messages)

[PATCH 2/2] x86/sev: let sev_es_efi_map_ghcbs map the caa pages too
 2025-05-28  7:16 UTC  (3+ messages)

[efi:next] BUILD SUCCESS 46550e2b878d60923c72f0526a7aac02e8eda3d5
 2025-05-22 15:53 UTC 

[syzbot] [fs?] [efi?] BUG: unable to handle kernel paging request in alloc_fs_context
 2025-05-22 13:47 UTC  (4+ messages)

[efi:efi-sbat] BUILD SUCCESS 0f9a1739dd0e1ca3942e51dc3ec18f0d68c23be5
 2025-05-22 12:01 UTC 

[PATCH] include: pe.h: Fix PE definitions
 2025-05-21 15:10 UTC  (6+ messages)

[PATCH] efi/efi_test: Fix missing pending status update in getwakeuptime
 2025-05-21 13:40 UTC  (2+ messages)

[PATCH v3 0/2] efi: Add a mechanism for embedding SBAT section
 2025-05-21 13:37 UTC  (4+ messages)
` [PATCH v3 1/2] efi: zboot specific "
` [PATCH v3 2/2] x86/efi: Implement support for embedding SBAT data for x86

[PATCH v14 00/19] x86: Trenchboot secure dynamic launch Linux kernel support
 2025-05-18 14:42 UTC  (5+ messages)

[PATCHv3 0/4] x86: Make 5-level paging support unconditional for x86-64
 2025-05-17  9:59 UTC  (20+ messages)
` [PATCHv3 1/4] x86/64/mm: Always use dynamic memory layout
` [PATCHv3 2/4] x86/64/mm: Make SPARSEMEM_VMEMMAP the only memory model
` [PATCHv3 3/4] x86/64/mm: Make 5-level paging support unconditional
` [PATCHv3 4/4] x86/paravirt: Restrict PARAVIRT_XXL to 64-bit only

[PATCH v2] LoongArch: Enable HAVE_ARCH_STACKLEAK
 2025-05-17  9:33 UTC  (2+ messages)

[PATCHv2 0/3] x86: Make 5-level paging support unconditional for x86-64
 2025-05-17  8:44 UTC  (17+ messages)
` [PATCHv2 1/3] x86/64/mm: Always use dynamic memory layout
` [PATCHv2 2/3] x86/64/mm: Make SPARSEMEM_VMEMMAP the only memory model
` [PATCHv2 3/3] x86/64/mm: Make 5-level paging support unconditional

[RFC PATCH 0/7] arm64: Make EFI calls preemptible
 2025-05-14 17:43 UTC  (8+ messages)
` [RFC PATCH 1/7] efi: Add missing static initializer for efi_mm::cpus_allowed_lock
` [RFC PATCH 2/7] efi/runtime: Return success/failure from arch_efi_call_virt_setup()
` [RFC PATCH 3/7] efi/runtime: Deal with arch_efi_call_virt_setup() returning failure
` [RFC PATCH 4/7] arm64/fpsimd: Don't warn when EFI execution context is preemptible
` [RFC PATCH 5/7] arm64/efi: Use a semaphore to protect the EFI stack and FP/SIMD state
` [RFC PATCH 6/7] arm64/efi: Move uaccess en/disable out of efi_set_pgd()
` [RFC PATCH 7/7] arm64/efi: Call EFI runtime services without disabling preemption

[PATCH v2 0/2] efi: Add a mechanism for embedding SBAT section
 2025-05-13 12:22 UTC  (5+ messages)
` [PATCH v2 2/2] x86/efi: Implement support for embedding SBAT data for x86

[PATCH v4 00/16] Enable Linear Address Space Separation support
 2025-05-13  3:08 UTC  (3+ messages)
` [PATCH v4 01/16] x86/cpu: Enumerate the LASS feature bits


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).