Linux-EFI Archive mirror
 help / color / mirror / Atom feed
[PATCH] x86: Fix build warnings about export.h
 2025-06-12  9:57 UTC  (2+ messages)

[efi:urgent] BUILD SUCCESS c33453d08a56a45c2e72f9f56043610b8f7449c7
 2025-06-12  1:58 UTC 

[PATCH v2] x86/efi: error handling on efi memory map
 2025-06-08 17:11 UTC 

[PATCH] x86/efi: error handling on efi memory map
 2025-06-08 13:22 UTC  (2+ messages)

[efi:urgent] BUILD SUCCESS 76f6cf6676f4e2d83acdb7d93bba71340a95f5bb
 2025-06-07  7:10 UTC 

[PATCH v3 0/5] Fix issues with ARM Processor CPER records
 2025-06-06 18:30 UTC  (4+ messages)

[PATCH] efi: Drop preprocessor directives from zboot.lds
 2025-06-06 15:55 UTC  (3+ messages)

[PATCH v2 00/13] objtool: Detect and warn about indirect calls in __nocfi functions
 2025-06-06 13:20 UTC  (20+ messages)

[PATCH] efi/libstub: use 'targets' instead of extra-y in Makefile
 2025-06-05 20:42 UTC  (3+ messages)

[PATCH RESEND v3] x86/efi: Implement support for embedding SBAT data for x86
 2025-06-03  9:19 UTC 

[PATCH v2 2/2] x86/sev: let sev_es_efi_map_ghcbs map the caa pages too
 2025-06-02 10:50 UTC 

[RFT PATCH v3 00/21] x86: strict separation of startup code
 2025-06-01  9:39 UTC  (58+ messages)
` [RFT PATCH v3 01/21] x86/sev: Separate MSR and GHCB based snp_cpuid() via a callback
` [RFT PATCH v3 02/21] x86/sev: Use MSR protocol for remapping SVSM calling area
` [RFT PATCH v3 03/21] x86/sev: Use MSR protocol only for early SVSM PVALIDATE call
` [RFT PATCH v3 04/21] x86/sev: Run RMPADJUST on SVSM calling area page to test VMPL
` [RFT PATCH v3 05/21] x86/sev: Move GHCB page based HV communication out of startup code
` [RFT PATCH v3 06/21] x86/sev: Avoid global variable to store virtual address of SVSM area
` [RFT PATCH v3 07/21] x86/sev: Move MSR save/restore out of early page state change helper
` [RFT PATCH v3 08/21] x86/sev: Share implementation of MSR-based page state change
` [RFT PATCH v3 09/21] x86/sev: Pass SVSM calling area down to early page state change API
` [RFT PATCH v3 10/21] x86/sev: Use boot SVSM CA for all startup and init code
` [RFT PATCH v3 11/21] x86/boot: Drop redundant RMPADJUST in SEV SVSM presence check
` [RFT PATCH v3 12/21] x86/sev: Unify SEV-SNP hypervisor feature check
` [RFT PATCH v3 13/21] x86/sev: Provide PIC aliases for SEV related data objects
` [RFT PATCH v3 14/21] x86/boot: Provide PIC aliases for 5-level paging related constants
` [RFT PATCH v3 15/21] x86/sev: Move __sev_[get|put]_ghcb() into separate noinstr object
` [RFT PATCH v3 16/21] x86/sev: Export startup routines for later use
` [RFT PATCH v3 17/21] x86/boot: Create a confined code area for startup code
` [RFT PATCH v3 18/21] x86/boot: Move startup code out of __head section
` [RFT PATCH v3 19/21] x86/boot: Disallow absolute symbol references in startup code
` [RFT PATCH v3 20/21] x86/boot: Revert "Reject absolute references in .head.text"
` [RFT PATCH v3 21/21] x86/boot: Get rid of the .head.text section

[GIT PULL] EFI updates for v6.16
 2025-05-30 23:17 UTC  (2+ messages)

[PATCH 2/2] x86/sev: let sev_es_efi_map_ghcbs map the caa pages too
 2025-05-28  7:16 UTC  (3+ messages)

[PATCH v2 00/14] stackleak: Support Clang stack depth tracking
 2025-05-27  3:30 UTC  (24+ messages)
` [PATCH v2 01/14] stackleak: Rename STACKLEAK to KSTACK_ERASE
` [PATCH v2 02/14] stackleak: Rename stackleak_track_stack to __sanitizer_cov_stack_depth
` [PATCH v2 03/14] stackleak: Split KSTACK_ERASE_CFLAGS from GCC_PLUGINS_CFLAGS
` [PATCH v2 04/14] x86: Handle KCOV __init vs inline mismatches
` [PATCH v2 05/14] arm: "
` [PATCH v2 06/14] arm64: "
` [PATCH v2 07/14] s390: "
` [PATCH v2 08/14] powerpc: "
` [PATCH v2 09/14] mips: "
` [PATCH v2 10/14] loongarch: "
` [PATCH v2 11/14] init.h: Disable sanitizer coverage for __init and __head
` [PATCH v2 12/14] kstack_erase: Support Clang stack depth tracking
` [PATCH v2 13/14] configs/hardening: Enable CONFIG_KSTACK_ERASE
` [PATCH v2 14/14] configs/hardening: Enable CONFIG_INIT_ON_FREE_DEFAULT_ON

[efi:next] BUILD SUCCESS 46550e2b878d60923c72f0526a7aac02e8eda3d5
 2025-05-22 15:53 UTC 

[syzbot] [fs?] [efi?] BUG: unable to handle kernel paging request in alloc_fs_context
 2025-05-22 13:47 UTC  (4+ messages)

[efi:efi-sbat] BUILD SUCCESS 0f9a1739dd0e1ca3942e51dc3ec18f0d68c23be5
 2025-05-22 12:01 UTC 

[PATCH] include: pe.h: Fix PE definitions
 2025-05-21 15:10 UTC  (6+ messages)

[PATCH] efi/efi_test: Fix missing pending status update in getwakeuptime
 2025-05-21 13:40 UTC  (2+ messages)

[PATCH v3 0/2] efi: Add a mechanism for embedding SBAT section
 2025-05-21 13:37 UTC  (4+ messages)
` [PATCH v3 1/2] efi: zboot specific "
` [PATCH v3 2/2] x86/efi: Implement support for embedding SBAT data for x86

[PATCH v14 00/19] x86: Trenchboot secure dynamic launch Linux kernel support
 2025-05-18 14:42 UTC  (5+ messages)

[PATCHv3 0/4] x86: Make 5-level paging support unconditional for x86-64
 2025-05-17  9:59 UTC  (20+ messages)
` [PATCHv3 1/4] x86/64/mm: Always use dynamic memory layout
` [PATCHv3 2/4] x86/64/mm: Make SPARSEMEM_VMEMMAP the only memory model
` [PATCHv3 3/4] x86/64/mm: Make 5-level paging support unconditional
` [PATCHv3 4/4] x86/paravirt: Restrict PARAVIRT_XXL to 64-bit only

[PATCH v2] LoongArch: Enable HAVE_ARCH_STACKLEAK
 2025-05-17  9:33 UTC  (2+ messages)

[PATCHv2 0/3] x86: Make 5-level paging support unconditional for x86-64
 2025-05-17  8:44 UTC  (17+ messages)
` [PATCHv2 1/3] x86/64/mm: Always use dynamic memory layout
` [PATCHv2 2/3] x86/64/mm: Make SPARSEMEM_VMEMMAP the only memory model
` [PATCHv2 3/3] x86/64/mm: Make 5-level paging support unconditional

[RFC PATCH 0/7] arm64: Make EFI calls preemptible
 2025-05-14 17:43 UTC  (8+ messages)
` [RFC PATCH 1/7] efi: Add missing static initializer for efi_mm::cpus_allowed_lock
` [RFC PATCH 2/7] efi/runtime: Return success/failure from arch_efi_call_virt_setup()
` [RFC PATCH 3/7] efi/runtime: Deal with arch_efi_call_virt_setup() returning failure
` [RFC PATCH 4/7] arm64/fpsimd: Don't warn when EFI execution context is preemptible
` [RFC PATCH 5/7] arm64/efi: Use a semaphore to protect the EFI stack and FP/SIMD state
` [RFC PATCH 6/7] arm64/efi: Move uaccess en/disable out of efi_set_pgd()
` [RFC PATCH 7/7] arm64/efi: Call EFI runtime services without disabling preemption

[PATCH v2 0/2] efi: Add a mechanism for embedding SBAT section
 2025-05-13 12:22 UTC  (7+ messages)
` [PATCH v2 1/2] efi: zboot specific "
` [PATCH v2 2/2] x86/efi: Implement support for embedding SBAT data for x86

[PATCH v4 00/16] Enable Linear Address Space Separation support
 2025-05-13  3:08 UTC  (3+ messages)
` [PATCH v4 01/16] x86/cpu: Enumerate the LASS feature bits

[efi:next] BUILD SUCCESS c8e1927e7f7d63721e32ec41d27ccb0eb1a1b0fc
 2025-05-10 11:05 UTC 

[PATCH v2 1/4] fs: add owner of freeze/thaw
 2025-05-09 10:38 UTC  (4+ messages)
` [PATCH] fs: allow nesting with FREEZE_EXCL

[PATCH] efi/libstub: Describe missing 'out' parameter in efi_load_initrd
 2025-05-09  9:24 UTC  (2+ messages)

[PATCH] efi: Improve logging around memmap init
 2025-05-09  9:07 UTC  (2+ messages)

[PATCH v3] securityfs: fix missing of d_delete() in securityfs_remove()
 2025-05-09  2:45 UTC 

[PATCH v3] securityfs: fix missing of d_delete() in securityfs_remove()
 2025-05-09  2:41 UTC 

[PATCH 0/8] stackleak: Support Clang stack depth tracking
 2025-05-08 12:25 UTC  (14+ messages)
` [PATCH 1/8] nvme-pci: Make nvme_pci_npages_prp() __always_inline
` [PATCH 2/8] init.h: Disable sanitizer coverage for __init and __head
` [PATCH 3/8] stackleak: Rename CONFIG_GCC_PLUGIN_STACKLEAK to CONFIG_STACKLEAK
` [PATCH 5/8] stackleak: Split STACKLEAK_CFLAGS from GCC_PLUGINS_CFLAGS
` [PATCH 6/8] stackleak: Support Clang stack depth tracking
` [PATCH 7/8] configs/hardening: Enable CONFIG_STACKLEAK
` [PATCH 8/8] configs/hardening: Enable CONFIG_INIT_ON_FREE_DEFAULT_ON

[RFT PATCH v2 00/23] x86: strict separation of startup code
 2025-05-08 11:08 UTC  (8+ messages)
` [RFT PATCH v2 05/23] x86/sev: Move instruction decoder into separate source file

[PATCH 6.12 031/164] x86/boot/sev: Support memory acceptance in the EFI stub under SVSM
 2025-05-07 18:38 UTC 

[PATCH 6.14 027/183] x86/boot/sev: Support memory acceptance in the EFI stub under SVSM
 2025-05-07 18:37 UTC 


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).