Linux EFI development
 help / color / mirror / Atom feed
 messages from 2025-07-22 07:29:55 to 2025-08-28 10:22:52 UTC [more...]

[PATCH v7 00/22] x86: strict separation of startup code
 2025-08-28 10:22 UTC  (15+ messages)
` [PATCH v7 01/22] x86/sev: Separate MSR and GHCB based snp_cpuid() via a callback
` [PATCH v7 02/22] x86/sev: Use MSR protocol for remapping SVSM calling area
` [PATCH v7 03/22] x86/sev: Use MSR protocol only for early SVSM PVALIDATE call
` [PATCH v7 04/22] x86/sev: Run RMPADJUST on SVSM calling area page to test VMPL
` [PATCH v7 05/22] x86/sev: Move GHCB page based HV communication out of startup code
` [PATCH v7 06/22] x86/sev: Avoid global variable to store virtual address of SVSM area
` [PATCH v7 07/22] x86/sev: Share implementation of MSR-based page state change
` [PATCH v7 08/22] x86/sev: Pass SVSM calling area down to early page state change API
` [PATCH v7 09/22] x86/sev: Use boot SVSM CA for all startup and init code
` [PATCH v7 10/22] x86/boot: Drop redundant RMPADJUST in SEV SVSM presence check
` [PATCH v7 11/22] x86/boot: Provide PIC aliases for 5-level paging related constants
` [PATCH v7 12/22] x86/sev: Provide PIC aliases for SEV related data objects
` [PATCH v7 13/22] x86/sev: Move __sev_[get|put]_ghcb() into separate noinstr object
` [PATCH v7 14/22] x86/sev: Export startup routines for later use

[PATCH v6 00/22] x86: strict separation of startup code
 2025-08-28  7:36 UTC  (34+ messages)
` [PATCH v6 03/22] x86/sev: Use MSR protocol only for early SVSM PVALIDATE call
` [PATCH v6 04/22] x86/sev: Run RMPADJUST on SVSM calling area page to test VMPL
` [PATCH v6 05/22] x86/sev: Move GHCB page based HV communication out of startup code
` [PATCH v6 06/22] x86/sev: Avoid global variable to store virtual address of SVSM area
` [PATCH v6 07/22] x86/sev: Share implementation of MSR-based page state change
` [PATCH v6 08/22] x86/sev: Pass SVSM calling area down to early page state change API
` [PATCH v6 09/22] x86/sev: Use boot SVSM CA for all startup and init code
` [PATCH v6 10/22] x86/boot: Drop redundant RMPADJUST in SEV SVSM presence check
` [PATCH v6 11/22] x86/boot: Provide PIC aliases for 5-level paging related constants
` [PATCH v6 12/22] x86/sev: Provide PIC aliases for SEV related data objects
` [PATCH v6 13/22] x86/sev: Move __sev_[get|put]_ghcb() into separate noinstr object
` [PATCH v6 14/22] x86/sev: Export startup routines for later use
` [PATCH v6 15/22] objtool: Add action to check for absence of absolute relocations
` [PATCH v6 16/22] x86/boot: Check startup code "
` [PATCH v6 17/22] x86/boot: Revert "Reject absolute references in .head.text"
` [PATCH v6 18/22] x86/kbuild: Incorporate boot/startup/ via Kbuild makefile
` [PATCH v6 19/22] x86/boot: Create a confined code area for startup code
` [PATCH v6 20/22] efistub/x86: Remap inittext read-execute when needed
` [PATCH v6 21/22] x86/boot: Move startup code out of __head section
` [PATCH v6 22/22] x86/boot: Get rid of the .head.text section

[PATCH v3] efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare
 2025-08-28  6:40 UTC  (2+ messages)

[efi:urgent] BUILD SUCCESS 134ed1093907a79e5d98087513f13fd7652c4df9
 2025-08-27  7:47 UTC 

[PATCH v2] efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare
 2025-08-27  2:23 UTC  (3+ messages)

[PATCH] efistub: Lower default log level
 2025-08-26 16:34 UTC  (14+ messages)

[PATCH v3 0/4] efi: stmm: Fix for incorrect buffer allocation and cleanups
 2025-08-26 12:54 UTC  (7+ messages)
` [PATCH v3 1/4] efi: stmm: Fix incorrect buffer allocation method
` [PATCH v3 2/4] efi: stmm: Do not return EFI_OUT_OF_RESOURCES on internal errors
` [PATCH v3 3/4] efi: stmm: Drop unused EFI error from setup_mm_hdr arguments
` [PATCH v3 4/4] efi: stmm: Drop unneeded null pointer check

[PATCH v2 0/4] efi: stmm: Fix for incorrect buffer allocation and cleanups
 2025-08-25  8:17 UTC  (8+ messages)
` [PATCH v2 1/4] efi: stmm: Fix incorrect buffer allocation method
` [PATCH v2 2/4] efi: stmm: Do not return EFI_OUT_OF_RESOURCES on internal errors
` [PATCH v2 3/4] efi: stmm: Drop unused EFI error from setup_mm_hdr arguments
` [PATCH v2 4/4] efi: stmm: Drop unneeded null pointer check

[PATCH v3 0/2] efi: Fix EFI boot with kexec handover (KHO)
 2025-08-23 21:47 UTC  (5+ messages)
` [PATCH v3 1/2] kexec: introduce is_kho_boot()
` [PATCH v3 2/2] efi: Support booting with kexec handover (KHO)

[PATCH 0/3] efi: stmm: Fix for incorrect buffer allocation and cleanups
 2025-08-22  9:07 UTC  (14+ messages)
` [PATCH 1/3] efi: stmm: Fix incorrect buffer allocation method
` [PATCH 2/3] efi: stmm: Use EFI return code of setup_mm_hdr
` [PATCH 3/3] efi: stmm: Drop unneeded null pointer check

[PATCH v2 0/2] efi: Fix EFI boot with kexec handover (KHO)
 2025-08-20  8:24 UTC  (6+ messages)
` [PATCH v2 1/2] kexec: introduce is_kho_boot()
` [PATCH v2 2/2] efi: Support booting with kexec handover (KHO)

[PATCH v3 00/16] objtool: Detect and warn about indirect calls in __nocfi functions
 2025-08-18 12:09 UTC  (16+ messages)
` [PATCH v3 07/16] x86/kvm/emulate: Introduce EM_ASM_1SRC2
` [PATCH v3 12/16] x86_64,hyperv: Use direct call to hypercall-page
` [PATCH v3 14/16] x86/fred: Play nice with invoking asm_fred_entry_from_kvm() on non-FRED hardware
` [PATCH v3 16/16] objtool: Validate kCFI calls

[PATCH] efi: Explain OVMF acronym in OVMF_DEBUG_LOG help text
 2025-08-18  6:52 UTC  (3+ messages)

[PATCH] efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare
 2025-08-15 10:04 UTC 

[PATCH v6 0/5] Fix issues with ARM Processor CPER records
 2025-08-14 16:52 UTC  (6+ messages)
` [PATCH v6 1/5] RAS: Report all ARM processor CPER information to userspace
` [PATCH v6 2/5] efi/cper: Adjust infopfx size to accept an extra space
` [PATCH v6 3/5] efi/cper: Add a new helper function to print bitmasks
` [PATCH v6 4/5] efi/cper: align ARM CPER type with UEFI 2.9A/2.10 specs
` [PATCH v6 5/5] docs: efi: add CPER functions to driver-api

[PATCH v5 0/5] Fix issues with ARM Processor CPER records
 2025-08-14 16:13 UTC  (7+ messages)
` [PATCH v5 1/5] RAS: Report all ARM processor CPER information to userspace
` [PATCH v5 2/5] efi/cper: Adjust infopfx size to accept an extra space
` [PATCH v5 3/5] efi/cper: Add a new helper function to print bitmasks
` [PATCH v5 4/5] efi/cper: align ARM CPER type with UEFI 2.9A/2.10 specs
` [PATCH v5 5/5] docs: efi: add CPER functions to driver-api

[PATCH] efi: Support booting with kexec handover (KHO)
 2025-08-14  8:51 UTC  (4+ messages)

[PATCH v4 0/5] Fix issues with ARM Processor CPER records
 2025-08-12 14:05 UTC  (16+ messages)
` [PATCH v4 1/5] RAS: Report all ARM processor CPER information to userspace
` [PATCH v4 2/5] efi/cper: Adjust infopfx size to accept an extra space
` [PATCH v4 3/5] efi/cper: Add a new helper function to print bitmasks
` [PATCH v4 4/5] efi/cper: align ARM CPER type with UEFI 2.9A/2.10 specs
` [PATCH v4 5/5] docs: efi: add CPER functions to driver-api

[PATCH v3 00/13] stackleak: Support Clang stack depth tracking
 2025-08-10 21:12 UTC  (12+ messages)
` [PATCH v3 04/13] x86: Handle KCOV __init vs inline mismatches

[RFC PATCH 0/3] Remove unused EFI runtime APIs
 2025-08-09 23:02 UTC  (4+ messages)
` [RFC PATCH 1/3] efi-rtc: Remove wakeup functionality

[GIT PULL] EFI updates for v6.17
 2025-08-09 15:20 UTC  (2+ messages)

[GIT PULL] EFI updates for v6.17
 2025-08-09  6:46 UTC 

[PATCHv9 00/16] x86: Enable Linear Address Space Separation support
 2025-08-04  6:55 UTC  (16+ messages)
` [PATCHv9 02/16] x86/alternatives: Disable LASS when patching kernel alternatives
` [PATCHv9 04/16] x86/cpu: Defer CR pinning setup until core initcall

[PATCH v2 0/4] power: wire-up filesystem freeze/thaw with suspend/resume
 2025-08-04  6:51 UTC  (6+ messages)

[PATCH v6 0/6] acpi/ghes, cper, cxl: Process CXL CPER Protocol errors
 2025-07-29 17:39 UTC  (11+ messages)
` [PATCH v6 4/6] acpi/ghes, cper: Recognize and cache CXL "
  ` "invalid agent type: 1" in "

[PATCH v4 0/4] stackleak: Support Clang stack depth tracking
 2025-07-29  9:34 UTC  (12+ messages)
` [PATCH v4 1/4] arm64: Handle KCOV __init vs inline mismatches
` [PATCH v4 2/4] x86: "
` [PATCH v4 3/4] init.h: Disable sanitizer coverage for __init and __head
` [PATCH v4 4/4] kstack_erase: Support Clang stack depth tracking

[PATCH 0/2] Secure Boot lock down
 2025-07-25  2:43 UTC  (7+ messages)

[PATCH] Fixed several coding style issues in the efi driver as reported by checkpatch.pl:
 2025-07-22 13:56 UTC  (2+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox