Linux EFI development
 help / color / mirror / Atom feed
 messages from 2026-04-27 08:39:51 to 2026-05-15 21:15:47 UTC [more...]

[PATCH v16 00/38] x86: Secure Launch support for Intel TXT
 2026-05-15 21:14 UTC  (34+ messages)
` [PATCH v16 01/38] tpm: Initial step to reorganize TPM public headers
` [PATCH v16 02/38] tpm: Move TPM1 specific definitions to the command header
` [PATCH v16 03/38] tpm: Move TPM2 "
` [PATCH v16 04/38] tpm: Move TPM common base "
` [PATCH v16 05/38] tpm: Move platform specific definitions to the new PTP header
` [PATCH v16 06/38] tpm: Remove main TPM header from TPM event log header
` [PATCH v16 07/38] tpm-buf: Merge TPM_BUF_BOUNDARY_ERROR and TPM_BUF_OVERFLOW
` [PATCH v16 08/38] tpm-buf: Remove chip parameter from tpm_buf_append_handle()
` [PATCH v16 09/38] tpm-buf: Implement managed allocations
` [PATCH v16 10/38] tpm-buf: Add TPM buffer support header for standalone reuse
` [PATCH v16 11/38] tpm/tpm_tis: Close all localities
` [PATCH v16 12/38] tpm/tpm_tis: Address positive localities in tpm_tis_request_locality()
` [PATCH v16 13/38] tpm/tpm_tis: Allow locality to be set to a different value
` [PATCH v16 14/38] tpm/sysfs: Show locality used by kernel
` [PATCH v16 15/38] Documentation/security: Secure Launch kernel documentation
` [PATCH v16 16/38] x86: Secure Launch Kconfig
` [PATCH v16 17/38] x86: Secure Launch Resource Table header file
` [PATCH v16 18/38] x86/efi: Secure Launch Resource Table EFI definitions "
` [PATCH v16 19/38] x86: Secure Launch main "
` [PATCH v16 20/38] x86/txt: Intel Trusted eXecution Technology (TXT) definitions
` [PATCH v16 21/38] lib/crypto: Add SHA1 support for pre-boot environments
` [PATCH v16 22/38] lib/crypto: Add SHA512 "
` [PATCH v16 23/38] x86: Allow WARN_trap() macro to be included in "
` [PATCH v16 24/38] x86/msr: Add variable MTRR base/mask and x2apic ID registers
` [PATCH v16 25/38] x86/boot: Slight refactor of the 5 level paging logic
` [PATCH v16 26/38] x86: Add early SHA-1 support for Secure Launch early measurements
` [PATCH v16 27/38] x86: Add early SHA-256 "
` [PATCH v16 28/38] x86: Add early SHA-384/512 "
` [PATCH v16 29/38] x86/tpm: Early startup TPM PCR extending driver
` [PATCH v16 30/38] x86/slaunch: Add MLE header and Secure Launch entrypoint to the core kernel
` [PATCH v16 31/38] x86/slaunch: Secure Launch kernel early boot initialization
` [PATCH v16 32/38] x86/slaunch: Secure Launch kernel late "
` [PATCH v16 33/38] x86/slaunch: Secure Launch SMP bringup support

[PATCH v1] efi/runtime-wrappers: Avoid crashing on early PRM code invocations
 2026-05-15 17:29 UTC  (2+ messages)

Oops when returning from hibernation with changed thunderbolt status
 2026-05-15  6:54 UTC  (6+ messages)

[PATCH v4 00/10] Add RAS support for RISC-V architecture
 2026-05-13 19:25 UTC  (12+ messages)
` [PATCH v4 01/10] riscv: Define ioremap_cache for RISC-V
` [PATCH v4 02/10] riscv: Define arch_apei_get_mem_attribute "
` [PATCH v4 03/10] acpi: Introduce SSE in HEST notification types
` [PATCH v4 04/10] riscv: Add fixmap indices for GHES IRQ and SSE contexts
` [PATCH v4 05/10] riscv: conditionally compile GHES NMI spool function
` [PATCH v4 06/10] riscv: Add functions to register ghes having SSE notification
` [PATCH v4 07/10] riscv: Add RISC-V entries in processor type and ISA strings
` [PATCH v4 08/10] riscv: Introduce HEST SSE notification handlers
` [PATCH v4 09/10] riscv: Select HAVE_ACPI_APEI required for RAS
` [PATCH v4 10/10] riscv: Enable APEI GHES driver in defconfig

[PATCH v10 0/8] lib and lib/cmdline enhancements
 2026-05-13 13:44 UTC  (9+ messages)
` [PATCH v10 1/8] lib: fix _parse_integer_limit() to handle overflow
` [PATCH v10 2/8] lib: fix memparse() "
` [PATCH v10 3/8] lib: add more string to 64-bit integer conversion overflow tests
` [PATCH v10 4/8] lib/cmdline_kunit: add test case for memparse()
` [PATCH v10 5/8] lib/cmdline: adjust a few comments to fix kernel-doc -Wreturn warnings
` [PATCH v10 6/8] riscv: add platform-specific double word shifts for riscv32
` [PATCH v10 7/8] lib: kunit: add tests for __ashldi3(), __ashrdi3(), and __lshrdi3()
` [PATCH v10 8/8] riscv: fix building compressed EFI image

[PATCH v5 0/3] LoongArch: Move KASLR to EFI stub to avoid initrd overlap
 2026-05-11 10:45 UTC  (4+ messages)
` [PATCH v5 1/3] efi/loongarch: Randomize kernel preferred address for KASLR
` [PATCH v5 2/3] LoongArch: Skip relocation-time KASLR if already applied
` [PATCH v5 3/3] LoongArch: Avoid initrd overlap during kernel relocation

[PATCH v4 0/3] LoongArch: Move KASLR to EFI stub to avoid initrd overlap
 2026-05-09 14:10 UTC  (5+ messages)
` [PATCH v4 1/3] efi/loongarch: Randomize kernel preferred address for KASLR
` [PATCH v4 2/3] LoongArch: Skip relocation-time KASLR if it has already been applied
` [PATCH v4 3/3] LoongArch: Avoid initrd overlap during kernel relocation

[GIT PULL] EFI fixes for v7.1 #1
 2026-05-06 14:44 UTC  (2+ messages)

[efi:urgent] BUILD SUCCESS 2c340aab5485ebe9e33c01437dd4815ef33c8df5
 2026-05-05 19:43 UTC 

[efi:urgent] BUILD SUCCESS 316c65fdb3077a68816867c43d0f8cb2d806f83d
 2026-05-05  2:46 UTC 

[PATCH] x86/efi: Restore IRQ state in EFI page fault handler
 2026-05-04 18:01 UTC  (3+ messages)

[efi:urgent] BUILD SUCCESS 1ec660d60891abc70a438cd52e04051605f787cc
 2026-05-02 17:43 UTC 

[PATCH] lkdtm: Add case to provoke a crash in EFI runtime services
 2026-05-01 17:01 UTC 

[PATCH v3 00/19] Prepare to lift lookup out of exclusive lock for directory ops
 2026-05-01 10:46 UTC  (41+ messages)
` [PATCH v3 03/19] VFS: allow d_alloc_name() to be used with ->d_hash
` [PATCH v3 04/19] VFS: use wait_var_event for waiting in d_alloc_parallel()
` [PATCH v3 05/19] VFS: introduce d_alloc_noblock()
` [PATCH v3 07/19] VFS: Add LOOKUP_SHARED flag
` [PATCH v3 08/19] VFS/xfs/ntfs: drop parent lock across d_alloc_parallel() in d_add_ci()
` [PATCH v3 09/19] ovl: stop using lookup_one() in iterate_shared() handling
` [PATCH v3 10/19] VFS/ovl: add d_alloc_noblock_return()
` [syzbot ci] Re: Prepare to lift lookup out of exclusive lock for directory ops

[PATCH] x86/efi: Fix graceful fault handling after FPU softirq changes
 2026-05-01  6:38 UTC  (4+ messages)

[PATCH] arm64/mm: Rename ptdesc_t
 2026-04-30  7:51 UTC  (2+ messages)

[PATCH 0/8] firmware: sysfb: Consolidate config/code wrt. sysfb_primary_screen
 2026-04-30  6:35 UTC  (3+ messages)

[RFC PATCH v1 0/9] uaccess: Convert small fixed size copy_{to/from}_user() to scoped user access
 2026-04-29 11:26 UTC  (30+ messages)
` [RFC PATCH v1 1/9] uaccess: Split check_zeroed_user() out of usercopy.c
` [RFC PATCH v1 2/9] uaccess: Convert INLINE_COPY_{TO/FROM}_USER to kconfig and reduce ifdefery
` [RFC PATCH v1 3/9] x86/umip: Be stricter in fixup_umip_exception()
` [RFC PATCH v1 4/9] uaccess: Introduce copy_{to/from}_user_partial()
` [RFC PATCH v1 5/9] uaccess: Switch to copy_{to/from}_user_partial() when relevant
` [RFC PATCH v1 6/9] uaccess: Change copy_{to/from}_user to return -EFAULT
` [RFC PATCH v1 7/9] x86: Add unsafe_copy_from_user()
` [RFC PATCH v1 8/9] arm64: "
` [RFC PATCH v1 9/9] uaccess: Convert small fixed size copy_{to/from}_user() to scoped user access

[PATCH v3 0/3] LoongArch: Move KASLR to EFI stub to avoid initrd overlap
 2026-04-29  9:16 UTC  (10+ messages)
` [PATCH v3 1/3] efi/loongarch: Randomize kernel preferred address for KASLR
` [PATCH v3 2/3] LoongArch: Skip relocation-time KASLR if it has already been applied
` [PATCH v3 3/3] LoongArch: Avoid initrd overlap during kernel relocation

[PATCH] efi/libstub: Move efi_relocate_kernel() into its only remaining user
 2026-04-29  7:56 UTC  (4+ messages)

[RESEND PATCH v2 0/2] efi/libstub: Ensure instruction cache coherency after kernel relocation
 2026-04-29  7:32 UTC  (6+ messages)
` [RESEND PATCH v2 1/2] efi/loongarch: Implement efi_cache_sync_image()
` [RESEND PATCH v2 2/2] efi/libstub: Synchronize instruction cache after kernel relocation

[PATCH v2 0/2] LoongArch: Move KASLR to EFI stub to avoid initrd overlap
 2026-04-28 14:34 UTC  (5+ messages)
` [PATCH v2 1/2] efi/loongarch: Randomize kernel preferred address for KASLR
` [PATCH v2 2/2] LoongArch: Skip relocation-time KASLR if it has already been applied

[PATCH v3 00/17] efi/x86: Avoid the need to mangle the EFI memory map
 2026-04-28 10:47 UTC  (17+ messages)
` [PATCH v3 01/17] x86/efi: Omit redundant kernel image overlap check
` [PATCH v3 02/17] x86/efi: Drop redundant EFI_PARAVIRT check
` [PATCH v3 03/17] x86/efi: Only merge EFI memory map entries on 32-bit systems
` [PATCH v3 04/17] x86/efi: Defer sub-1M check from unmap to free stage
` [PATCH v3 05/17] x86/efi: Simplify real mode trampoline allocation quirk
` [PATCH v3 08/17] x86/efi: Allow ranges_to_free array to grow beyond initial size
` [PATCH v3 09/17] x86/efi: Intersect ranges_to_free with MEMBLOCK_RSRV_KERN regions

[PATCH] efi: pstore: Drop efivar lock when efi_pstore_open() returns with an error
 2026-04-27 16:10 UTC  (2+ messages)

[PATCH 0/3] LoongArch: Move KASLR to EFI stub to avoid initrd overlap
 2026-04-27 15:30 UTC  (8+ messages)
` [PATCH 1/3] LoongArch: Allow rdtime_h() and rdtime_l() in 64-bit builds
` [PATCH 2/3] efi/loongarch: Randomize kernel preferred address for KASLR
` [PATCH 3/3] LoongArch: Skip relocation-time KASLR if it has already been applied

[PATCH v6 0/3] riscv32 library enhancements and build fixes
 2026-04-27 10:30 UTC  (7+ messages)
` [PATCH v6 3/3] riscv: fix building compressed EFI image

[PATCH v7 0/3] riscv32 library enhancements and build fixes
 2026-04-27  9:01 UTC  (4+ messages)
` [PATCH v7 1/3] riscv: add platform-specific double word shifts for riscv32
` [PATCH v7 2/3] lib: kunit: add tests for __ashldi3(), __ashrdi3(), and __lshrdi3()
` [PATCH v7 3/3] riscv: fix building compressed EFI image

[PATCH v2 00/19] Prepare to lift lookup out of exclusive lock for directory ops
 2026-04-27  8:41 UTC  (2+ messages)
` [syzbot ci] "

[PATCH v2 0/2] efi/libstub: Ensure instruction cache coherency after kernel relocation
 2026-04-27  8:39 UTC  (3+ messages)
` [PATCH v2 1/2] efi/loongarch: Implement efi_cache_sync_image
` [PATCH v2 2/2] efi/libstub: Synchronize instruction cache after kernel relocation


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox