linux-efi.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2025-07-11 07:04:25 to 2025-07-25 19:56:46 UTC [more...]

[PATCH v3 00/16] objtool: Detect and warn about indirect calls in __nocfi functions
 2025-07-25 19:56 UTC  (31+ messages)
` [PATCH v3 01/16] x86/kvm/emulate: Implement test_cc() in C
` [PATCH v3 02/16] x86/kvm/emulate: Introduce EM_ASM_1
` [PATCH v3 03/16] x86/kvm/emulate: Introduce EM_ASM_2
` [PATCH v3 04/16] x86/kvm/emulate: Introduce EM_ASM_2R
` [PATCH v3 05/16] x86/kvm/emulate: Introduce EM_ASM_2W
` [PATCH v3 06/16] x86/kvm/emulate: Introduce EM_ASM_2CL
` [PATCH v3 07/16] x86/kvm/emulate: Introduce EM_ASM_1SRC2
` [PATCH v3 08/16] x86/kvm/emulate: Introduce EM_ASM_3WCL
` [PATCH v3 09/16] x86/kvm/emulate: Convert em_salc() to C
` [PATCH v3 10/16] x86/kvm/emulate: Remove fastops
` [PATCH v3 11/16] x86,hyperv: Clean up hv_do_hypercall()
` [PATCH v3 12/16] x86_64,hyperv: Use direct call to hypercall-page
` [PATCH v3 13/16] x86/fred: Install system vector handlers even if FRED isnt fully enabled
` [PATCH v3 14/16] x86/fred: Play nice with invoking asm_fred_entry_from_kvm() on non-FRED hardware
` [PATCH v3 15/16] x86/fred: KVM: VMX: Always use FRED for IRQs when CONFIG_X86_FRED=y
` [PATCH v3 16/16] objtool: Validate kCFI calls

[PATCH v6 0/6] acpi/ghes, cper, cxl: Process CXL CPER Protocol errors
 2025-07-25 11:04 UTC  (6+ messages)
` [PATCH v6 4/6] acpi/ghes, cper: Recognize and cache CXL "
  ` "invalid agent type: 1" in "

[PATCH 0/2] Secure Boot lock down
 2025-07-25  2:43 UTC  (7+ messages)

[PATCHv9 00/16] x86: Enable Linear Address Space Separation support
 2025-07-25  2:35 UTC  (4+ messages)
` [PATCHv9 02/16] x86/alternatives: Disable LASS when patching kernel alternatives

[PATCH v4 0/4] stackleak: Support Clang stack depth tracking
 2025-07-24 13:08 UTC  (6+ messages)
` [PATCH v4 1/4] arm64: Handle KCOV __init vs inline mismatches
` [PATCH v4 2/4] x86: "
` [PATCH v4 3/4] init.h: Disable sanitizer coverage for __init and __head
` [PATCH v4 4/4] kstack_erase: Support Clang stack depth tracking

[PATCH] Fixed several coding style issues in the efi driver as reported by checkpatch.pl:
 2025-07-22 13:56 UTC  (2+ messages)

[PATCH v3 00/13] stackleak: Support Clang stack depth tracking
 2025-07-22 13:29 UTC  (29+ messages)
` [PATCH v3 01/13] stackleak: Rename STACKLEAK to KSTACK_ERASE
` [PATCH v3 02/13] stackleak: Rename stackleak_track_stack to __sanitizer_cov_stack_depth
` [PATCH v3 03/13] stackleak: Split KSTACK_ERASE_CFLAGS from GCC_PLUGINS_CFLAGS
` [PATCH v3 04/13] x86: Handle KCOV __init vs inline mismatches
` [PATCH v3 05/13] arm: "
` [PATCH v3 06/13] arm64: "
` [PATCH v3 07/13] s390: "
` [PATCH v3 08/13] powerpc/mm/book3s64: Move kfence and debug_pagealloc related calls to __init section
` [PATCH v3 09/13] mips: Handle KCOV __init vs inline mismatch
` [PATCH v3 10/13] init.h: Disable sanitizer coverage for __init and __head
` [PATCH v3 11/13] kstack_erase: Support Clang stack depth tracking
` [PATCH v3 12/13] configs/hardening: Enable CONFIG_KSTACK_ERASE
` [PATCH v3 13/13] configs/hardening: Enable CONFIG_INIT_ON_FREE_DEFAULT_ON

[PATCH v6 00/22] x86: strict separation of startup code
 2025-07-22  7:27 UTC  (23+ messages)
` [PATCH v6 01/22] x86/sev: Separate MSR and GHCB based snp_cpuid() via a callback
` [PATCH v6 02/22] x86/sev: Use MSR protocol for remapping SVSM calling area
` [PATCH v6 03/22] x86/sev: Use MSR protocol only for early SVSM PVALIDATE call
` [PATCH v6 04/22] x86/sev: Run RMPADJUST on SVSM calling area page to test VMPL
` [PATCH v6 05/22] x86/sev: Move GHCB page based HV communication out of startup code
` [PATCH v6 06/22] x86/sev: Avoid global variable to store virtual address of SVSM area
` [PATCH v6 07/22] x86/sev: Share implementation of MSR-based page state change
` [PATCH v6 08/22] x86/sev: Pass SVSM calling area down to early page state change API
` [PATCH v6 09/22] x86/sev: Use boot SVSM CA for all startup and init code
` [PATCH v6 10/22] x86/boot: Drop redundant RMPADJUST in SEV SVSM presence check
` [PATCH v6 11/22] x86/boot: Provide PIC aliases for 5-level paging related constants
` [PATCH v6 12/22] x86/sev: Provide PIC aliases for SEV related data objects
` [PATCH v6 13/22] x86/sev: Move __sev_[get|put]_ghcb() into separate noinstr object
` [PATCH v6 14/22] x86/sev: Export startup routines for later use
` [PATCH v6 15/22] objtool: Add action to check for absence of absolute relocations
` [PATCH v6 16/22] x86/boot: Check startup code "
` [PATCH v6 17/22] x86/boot: Revert "Reject absolute references in .head.text"
` [PATCH v6 18/22] x86/kbuild: Incorporate boot/startup/ via Kbuild makefile
` [PATCH v6 19/22] x86/boot: Create a confined code area for startup code
` [PATCH v6 20/22] efistub/x86: Remap inittext read-execute when needed
` [PATCH v6 21/22] x86/boot: Move startup code out of __head section
` [PATCH v6 22/22] x86/boot: Get rid of the .head.text section

[PATCH v2 0/4] power: wire-up filesystem freeze/thaw with suspend/resume
 2025-07-21 12:09 UTC  (3+ messages)

[PATCH V2] efi/tpm: Fix the issue where the CC platforms event log header can't be correctly identified
 2025-07-21  0:45 UTC  (3+ messages)

[GIT PULL] EFI fixes for v6.16 #2
 2025-07-19 23:35 UTC  (2+ messages)

[efi:urgent] BUILD SUCCESS 64e135f1eaba0bbb0cdee859af3328c68d5b9789
 2025-07-19 10:13 UTC 

[PATCH v2] efivarfs: Fix memory leak of efivarfs_fs_info in fs_context error paths
 2025-07-18 10:00 UTC  (2+ messages)

[PATCH v5 00/22] x86: strict separation of startup code
 2025-07-18  9:45 UTC  (32+ messages)
` [PATCH v5 01/22] x86/sev: Separate MSR and GHCB based snp_cpuid() via a callback
` [PATCH v5 02/22] x86/sev: Use MSR protocol for remapping SVSM calling area
` [PATCH v5 03/22] x86/sev: Use MSR protocol only for early SVSM PVALIDATE call
` [PATCH v5 04/22] x86/sev: Run RMPADJUST on SVSM calling area page to test VMPL
` [PATCH v5 05/22] x86/sev: Move GHCB page based HV communication out of startup code
` [PATCH v5 06/22] x86/sev: Avoid global variable to store virtual address of SVSM area
` [PATCH v5 07/22] x86/sev: Share implementation of MSR-based page state change
` [PATCH v5 08/22] x86/sev: Pass SVSM calling area down to early page state change API
` [PATCH v5 09/22] x86/sev: Use boot SVSM CA for all startup and init code
` [PATCH v5 10/22] x86/boot: Drop redundant RMPADJUST in SEV SVSM presence check
` [PATCH v5 11/22] x86/boot: Provide PIC aliases for 5-level paging related constants
` [PATCH v5 12/22] x86/sev: Provide PIC aliases for SEV related data objects
` [PATCH v5 13/22] x86/sev: Move __sev_[get|put]_ghcb() into separate noinstr object
` [PATCH v5 14/22] x86/sev: Export startup routines for later use
` [PATCH v5 15/22] objtool: Add action to check for absence of absolute relocations
` [PATCH v5 16/22] x86/boot: Check startup code "
` [PATCH v5 17/22] x86/boot: Revert "Reject absolute references in .head.text"
` [PATCH v5 18/22] x86/kbuild: Incorporate boot/startup/ via Kbuild makefile
` [PATCH v5 19/22] x86/boot: Create a confined code area for startup code
` [PATCH v5 20/22] efistub/x86: Remap inittext read-execute when needed
` [PATCH v5 21/22] x86/boot: Move startup code out of __head section
` [PATCH v5 22/22] x86/boot: Get rid of the .head.text section

[RFC PATCH 0/3] Remove unused EFI runtime APIs
 2025-07-17  0:49 UTC  (14+ messages)
` [RFC PATCH 1/3] efi-rtc: Remove wakeup functionality
` [RFC PATCH 2/3] efi/test: Don't bother pseudo-testing unused EFI services
` [RFC PATCH 3/3] efi: Remove support for pointless, "

[PATCH v4 0/8] firmware: qcom: enable UEFI variables on Lenovo Yoga C630
 2025-07-16 21:07 UTC  (13+ messages)
` [PATCH v4 3/8] firmware: qcom: uefisecapp: add support for R/O UEFI vars
` [PATCH v4 5/8] firmware; qcom: scm: enable QSEECOM on SC8280XP CRD

[PATCH] efivarfs: Suppress false-positive kmemleak warning for sfi
 2025-07-16 14:30 UTC  (8+ messages)

[efi:next] BUILD SUCCESS 02eb7a8eee20b9ec6aafd5e17c5c41b53e8b13ef
 2025-07-16  2:28 UTC 

[PATCH V6] efi/tpm: Fix the issue where the CC platforms event log header can't be correctly identified
 2025-07-15 20:51 UTC  (4+ messages)

[PATCH v4 00/24] x86: strict separation of startup code
 2025-07-15  5:09 UTC  (9+ messages)
` [PATCH v4 01/24] x86/sev: Separate MSR and GHCB based snp_cpuid() via a callback
` [PATCH v4 08/24] x86/sev: Share implementation of MSR-based page state change

[PATCH] efi: add API doc entry for ovmf_debug_log
 2025-07-15  2:17 UTC  (4+ messages)

[PATCH] efistub: Lower default log level
 2025-07-15  1:35 UTC  (3+ messages)

[RFC PATCH 0/7] arm64: Make EFI calls preemptible
 2025-07-15  0:46 UTC  (10+ messages)
` [RFC PATCH 6/7] arm64/efi: Move uaccess en/disable out of efi_set_pgd()
` [RFC PATCH 7/7] arm64/efi: Call EFI runtime services without disabling preemption

[PATCH] rtc: efi: Add runtime check for the wakeup service capability
 2025-07-14  2:36 UTC  (6+ messages)

[PATCH V5] efi/tpm: Fix the issue where the CC platforms event log header can't be correctly identified
 2025-07-12  3:24 UTC  (3+ messages)

[PATCH V4] efi/tpm: Fix the issue where the CC platforms event log header can't be correctly identified
 2025-07-12  2:24 UTC  (4+ messages)

[efi:next] BUILD SUCCESS dedf090561dc6e1dcccf7b495a61bec57f2e7079
 2025-07-12  1:52 UTC 

[PATCH V3] efi/tpm: Fix the issue where the CC platforms event log header can't be correctly identified
 2025-07-11 12:32 UTC  (4+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).