public inbox for linux-efi@vger.kernel.org
 help / color / mirror / Atom feed
 messages from 2025-06-20 13:53:49 to 2025-07-01 09:59:03 UTC [more...]

[PATCHv8 00/17] x86: Enable Linear Address Space Separation support
 2025-07-01  9:58 UTC  (3+ messages)
` [PATCHv8 01/17] x86/cpu: Enumerate the LASS feature bits
` [PATCHv8 02/17] x86/asm: Introduce inline memcpy and memset

[PATCH v4 0/8] firmware: qcom: enable UEFI variables on Lenovo Yoga C630
 2025-06-30 12:42 UTC  (36+ messages)
` [PATCH v4 1/8] efi: efivars: don't crash in efivar_set_variable{,_locked} in r/o case
` [PATCH v4 2/8] firmware: qcom: scm: allow specifying quirks for QSEECOM implementations
` [PATCH v4 3/8] firmware: qcom: uefisecapp: add support for R/O UEFI vars
` [PATCH v4 4/8] firmware: qcom: enable QSEECOM on Lenovo Yoga C630
` [PATCH v4 5/8] firmware; qcom: scm: enable QSEECOM on SC8280XP CRD
` [PATCH v4 6/8] firmware: qcom: scm: add modparam to control QSEECOM enablement
` [PATCH v4 7/8] firmware: qcom: scm: rework QSEECOM allowlist
` [PATCH v4 8/8] arm64: dts: qcom: sdm850-lenovo-yoga-c630: fix RTC offset info

[PATCHv7 00/16] x86: Enable Linear Address Space Separation support
 2025-06-30  9:50 UTC  (33+ messages)
` [PATCHv7 01/16] x86/cpu: Enumerate the LASS feature bits
` [PATCH] x86/vsyscall: Do not require X86_PF_INSTR to emulate vsyscall
` [PATCHv7 02/16] x86/asm: Introduce inline memcpy and memset
` [PATCHv7 03/16] x86/alternatives: Disable LASS when patching kernel alternatives
` [PATCHv7 04/16] x86/cpu: Defer CR pinning setup until after EFI initialization
` [PATCHv7 05/16] efi: Disable LASS around set_virtual_address_map() EFI call
` [PATCHv7 06/16] x86/vsyscall: Do not require X86_PF_INSTR to emulate vsyscall
` [PATCHv7 07/16] x86/vsyscall: Reorganize the #PF emulation code
` [PATCHv7 08/16] x86/traps: Consolidate user fixups in exc_general_protection()
` [PATCHv7 09/16] x86/vsyscall: Add vsyscall emulation for #GP
` [PATCHv7 10/16] x86/vsyscall: Disable LASS if vsyscall mode is set to EMULATE
` [PATCHv7 11/16] x86/cpu: Set LASS CR4 bit as pinning sensitive
` [PATCHv7 12/16] x86/traps: Communicate a LASS violation in #GP message
` [PATCHv7 13/16] x86/traps: Handle LASS thrown #SS
` [PATCHv7 14/16] x86/cpu: Make LAM depend on LASS
` [PATCHv7 15/16] x86/cpu: Enable LASS during CPU initialization
` [PATCHv7 16/16] x86: Re-enable Linear Address Masking

[PATCHv6 00/16] x86: Enable Linear Address Space Separation support
 2025-06-27 13:57 UTC  (78+ messages)
` [PATCHv6 01/16] x86/cpu: Enumerate the LASS feature bits
` [PATCHv6 03/16] x86/alternatives: Disable LASS when patching kernel alternatives
` [PATCHv6 04/16] x86/efi: Move runtime service initialization to arch/x86
` [PATCHv6 05/16] x86/cpu: Defer CR pinning setup until after EFI initialization
` [PATCHv6 06/16] efi: Disable LASS around set_virtual_address_map() EFI call
` [PATCHv6 07/16] x86/vsyscall: Reorganize the #PF emulation code
                ` [PATCH] x86/vsyscall: Do not require X86_PF_INSTR to emulate vsyscall
` [PATCHv6 08/16] x86/traps: Consolidate user fixups in exc_general_protection()
` [PATCHv6 09/16] x86/vsyscall: Add vsyscall emulation for #GP
` [PATCHv6 10/16] x86/vsyscall: Disable LASS if vsyscall mode is set to EMULATE
` [PATCHv6 12/16] x86/traps: Communicate a LASS violation in #GP message
` [PATCHv6 13/16] x86/traps: Handle LASS thrown #SS
` [PATCHv6 14/16] x86/cpu: Make LAM depend on LASS
` [PATCHv6 15/16] x86/cpu: Enable LASS during CPU initialization
` [PATCHv6 16/16] x86: Re-enable Linear Address Masking

[PATCH v14 00/19] x86: Trenchboot secure dynamic launch Linux kernel support
 2025-06-27  9:15 UTC  (5+ messages)
` [PATCH v14 04/19] x86: Secure Launch main header file

[PATCH 0/2] Secure Boot lock down
 2025-06-26 22:10 UTC  (3+ messages)
` [PATCH 1/2] security: introduce security_lock_kernel_down()
` [PATCH 2/2] efi: introduce EFI_KERNEL_LOCK_DOWN_IN_SECURE_BOOT

[PATCH] efi/loongarch: Reserve EFI memory map region
 2025-06-26 12:34 UTC  (2+ messages)

[PATCH v4 3/3] x86/sev: Let sev_es_efi_map_ghcbs() map the caa pages too
 2025-06-26 11:40 UTC 

[PATCH v3 2/2] x86/sev: Let sev_es_efi_map_ghcbs() map the caa pages too
 2025-06-26  8:19 UTC  (2+ messages)

[PATCH v2 2/2] x86/sev: let sev_es_efi_map_ghcbs map the caa pages too
 2025-06-26  7:43 UTC  (7+ messages)

[PATCH] arm64: fix unnecessary rebuilding when CONFIG_DEBUG_EFI=y
 2025-06-25 14:11 UTC  (2+ messages)

[PATCH v2 00/14] stackleak: Support Clang stack depth tracking
 2025-06-25  1:09 UTC  (5+ messages)
` [PATCH v2 10/14] loongarch: Handle KCOV __init vs inline mismatches

[PATCH v3 0/8] firmware: qcom: enable UEFI variables on Lenovo Yoga C630
 2025-06-24 12:58 UTC  (13+ messages)
` [PATCH v3 1/8] efi: efivars: don't crash in efivar_set_variable{,_locked} in r/o case
` [PATCH v3 2/8] firmware: qcom: scm: allow specifying quirks for QSEECOM implementations
` [PATCH v3 3/8] firmware: qcom: uefisecapp: add support for R/O UEFI vars
` [PATCH v3 4/8] firmware: qcom: enable QSEECOM on Lenovo Yoga C630
` [PATCH v3 5/8] firmware; qcom: scm: enable QSEECOM on SC8280XP CRD
` [PATCH v3 6/8] firmware: qcom: scm: add modparam to control QSEECOM enablement
` [PATCH v3 7/8] firmware: qcom: scm: rework QSEECOM allowlist
` [PATCH v3 8/8] arm64: dts: qcom: sdm850-lenovo-yoga-c630: fix RTC offset info

[PATCH] arm64: efi: Fix KASAN false positive for EFI runtime stack
 2025-06-24 12:55 UTC 

[PATCHv2 0/3] x86: Make 5-level paging support unconditional for x86-64
 2025-06-24  8:49 UTC  (4+ messages)

[PATCHv3 0/4] x86: Make 5-level paging support unconditional for x86-64
 2025-06-24  8:23 UTC  (2+ messages)
` [PATCHv2 0/3] "

[PATCH v1 0/3] x86/boot: Supply boot_param in rdi instead of rsi from startup_64()
 2025-06-24  0:49 UTC  (8+ messages)

[PATCH v1 1/3] Recieve boot_param from RDI Instead of RSI
 2025-06-23 17:58 UTC  (4+ messages)
  `  "

[PATCH v1 1/3] x86/boot: Recieve boot_param from RDI Instead of RSI
 2025-06-23  8:17 UTC 

[PATCH v1 3/3] efi/efistub: Make libstub to supply boot_param from RDI
 2025-06-23  8:16 UTC 

[PATCH v1 2/3] x86/boot: the decompressor must supply boot_param from RDI
 2025-06-23  8:16 UTC 

[PATCH] efi/libstub: Print status codes on failure
 2025-06-21 11:33 UTC 

[efi:urgent] BUILD SUCCESS f8b53cc9174c5980549f60c972faad82b660b62d
 2025-06-21 10:05 UTC 

[PATCH v4] x86/efi: Implement support for embedding SBAT data for x86
 2025-06-21  8:23 UTC  (2+ messages)

[PATCH v3 0/5] Fix issues with ARM Processor CPER records
 2025-06-21  8:15 UTC  (5+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox