public inbox for linux-efi@vger.kernel.org
 help / color / mirror / Atom feed
 messages from 2025-04-08 15:01:29 to 2025-04-23 15:50:13 UTC [more...]

[PATCH v5 0/6] x86: Refactor and consolidate startup code
 2025-04-23 15:50 UTC  (13+ messages)
` [PATCH v5 1/6] vmlinux.lds: Include .data.rel[.local] into .data section
` [PATCH v5 2/6] x86/sev: Move noinstr NMI handling code into separate source file
` [PATCH v5 3/6] x86/sev: Split off startup code from core code
` [PATCH v5 4/6] x86/boot: Move SEV startup code into startup/
` [PATCH v5 5/6] x86/boot: Drop RIP_REL_REF() uses from early SEV code
` [PATCH v5 6/6] x86/asm: Retire RIP_REL_REF()

[PATCH 6.6 338/393] x86/boot/sev: Avoid shared GHCB page for early memory acceptance
 2025-04-23 14:43 UTC 

[PATCH 6.14 159/241] x86/boot/sev: Avoid shared GHCB page for early memory acceptance
 2025-04-23 14:43 UTC 

[PATCH] x86/boot: Disable jump tables in PIC code
 2025-04-23 15:01 UTC  (4+ messages)
` [tip: x86/boot] "

[PATCH 6.12 137/223] x86/boot/sev: Avoid shared GHCB page for early memory acceptance
 2025-04-23 14:43 UTC 

[PATCH] LoongArch: Enable HAVE_ARCH_STACKLEAK
 2025-04-23 14:02 UTC  (2+ messages)

[PATCH] efi: Improve logging around memmap init
 2025-04-23  9:05 UTC 

[PATCH v14 00/19] x86: Trenchboot secure dynamic launch Linux kernel support
 2025-04-22 23:21 UTC  (35+ messages)
` [PATCH v14 01/19] Documentation/x86: Secure Launch kernel documentation
` [PATCH v14 02/19] x86: Secure Launch Kconfig
` [PATCH v14 03/19] x86: Secure Launch Resource Table header file
` [PATCH v14 04/19] x86: Secure Launch main "
` [PATCH v14 05/19] x86: Add early SHA-1 support for Secure Launch early measurements
` [PATCH v14 06/19] x86: Add early SHA-256 "
` [PATCH v14 07/19] x86/msr: Add variable MTRR base/mask and x2apic ID registers
` [PATCH v14 08/19] x86/boot: Place TXT MLE header in the kernel_info section
` [PATCH v14 09/19] x86: Secure Launch kernel early boot stub
` [PATCH v14 10/19] x86: Secure Launch kernel late "
` [PATCH v14 11/19] x86: Secure Launch SMP bringup support
` [PATCH v14 12/19] kexec: Secure Launch kexec SEXIT support
` [PATCH v14 13/19] x86/reboot: Secure Launch SEXIT support on reboot paths
` [PATCH v14 14/19] tpm, tpm_tis: Close all localities
` [PATCH v14 15/19] tpm, tpm_tis: Address positive localities in tpm_tis_request_locality()
` [PATCH v14 16/19] tpm, tpm_tis: Allow locality to be set to a different value
` [PATCH v14 17/19] tpm, sysfs: Show locality used by kernel
` [PATCH v14 18/19] x86: Secure Launch late initcall platform module
` [PATCH v14 19/19] x86/efi: EFI stub DRTM launch support for Secure Launch

[PATCH v3 0/5] efi: Don't initalize SEV-SNP from the EFI stub
 2025-04-22 16:40 UTC  (8+ messages)
` [PATCH v3 1/5] x86/boot: Drop unused sev_enable() fallback
` [PATCH v3 2/5] x86/efistub: Obtain SEV CC blob address from the stub
` [PATCH v3 3/5] x86/boot: Drop redundant RMPADJUST in SEV SVSM presence check
` [PATCH v3 4/5] x86/sev: Unify SEV-SNP hypervisor feature check
` [PATCH v3 5/5] x86/efistub: Don't bother enabling SEV in the EFI stub

[PATCH v2] x86/mm: fix _pgd_alloc() for Xen PV mode
 2025-04-22 14:24 UTC  (2+ messages)

[PATCH 0/6] objtool: Detect and warn about indirect calls in __nocfi functions
 2025-04-21 18:28 UTC  (17+ messages)
` [PATCH 1/6] x86/nospec: JMP_NOSPEC
` [PATCH 2/6] x86/kvm/emulate: Implement test_cc() in C
` [PATCH 3/6] x86/kvm/emulate: Avoid RET for fastops
` [PATCH 4/6] x86,hyperv: Clean up hv_do_hypercall()
` [PATCH 5/6] x86_64,hyperv: Use direct call to hypercall-page
` [PATCH 6/6] objtool: Validate kCFI calls

[tip: x86/urgent] x86/boot/sev: Avoid shared GHCB page for early memory acceptance
 2025-04-18 12:36 UTC  (2+ messages)

[PATCH v3] x86/boot/sev: Avoid shared GHCB page for early memory acceptance
 2025-04-18 11:42 UTC  (20+ messages)
` [tip: x86/boot] "

[PATCH v4] x86/boot/sev: Avoid shared GHCB page for early memory acceptance
 2025-04-17 20:21 UTC 

[PATCH v2 0/4] efi: Don't initalize SEV-SNP from the EFI stub
 2025-04-16 16:57 UTC  (5+ messages)
` [PATCH v2 1/4] x86/efistub: Obtain SEV CC blob address from the stub
` [PATCH v2 2/4] x86/boot: Drop redundant RMPADJUST in SEV SVSM presence check
` [PATCH v2 3/4] x86/sev: Unify SEV-SNP hypervisor feature check
` [PATCH v2 4/4] x86/efistub: Don't bother enabling SEV in the EFI stub

[PATCH v13 00/19] x86: Trenchboot secure dynamic launch Linux kernel support
 2025-04-15 22:16 UTC  (34+ messages)
` [PATCH v13 01/19] Documentation/x86: Secure Launch kernel documentation
` [PATCH v13 02/19] x86: Secure Launch Kconfig
` [PATCH v13 03/19] x86: Secure Launch Resource Table header file
` [PATCH v13 04/19] x86: Secure Launch main "
` [PATCH v13 05/19] x86: Add early SHA-1 support for Secure Launch early measurements
` [PATCH v13 06/19] x86: Add early SHA-256 "
` [PATCH v13 07/19] x86/msr: Add variable MTRR base/mask and x2apic ID registers
` [PATCH v13 08/19] x86/boot: Place TXT MLE header in the kernel_info section
` [PATCH v13 09/19] x86: Secure Launch kernel early boot stub
` [PATCH v13 10/19] x86: Secure Launch kernel late "
` [PATCH v13 11/19] x86: Secure Launch SMP bringup support
` [PATCH v13 12/19] kexec: Secure Launch kexec SEXIT support
` [PATCH v13 13/19] x86/reboot: Secure Launch SEXIT support on reboot paths
` [PATCH v13 14/19] tpm, tpm_tis: Close all localities
` [PATCH v13 15/19] tpm, tpm_tis: Address positive localities in tpm_tis_request_locality()
` [PATCH v13 16/19] tpm, tpm_tis: Allow locality to be set to a different value
` [PATCH v13 17/19] tpm, sysfs: Show locality used by kernel
` [PATCH v13 18/19] x86: Secure Launch late initcall platform module
` [PATCH v13 19/19] x86/efi: EFI stub DRTM launch support for Secure Launch

[RFC/RFT PATCH] x86/efistub: Don't bother enabling SEV in the EFI stub
 2025-04-14 19:53 UTC  (4+ messages)

[PATCH v4 00/11] x86: Refactor and consolidate startup code
 2025-04-12 20:50 UTC  (25+ messages)
` [PATCH v4 01/11] x86/asm: Make rip_rel_ptr() usable from fPIC code
  ` [tip: x86/boot] "
` [PATCH v4 02/11] x86/boot: Move the early GDT/IDT setup code into startup/
  ` [tip: x86/boot] "
` [PATCH v4 03/11] x86/boot: Move early kernel mapping "
  ` [tip: x86/boot] "
` [PATCH v4 04/11] x86/boot: Drop RIP_REL_REF() uses from early mapping code
  ` [tip: x86/boot] "
` [PATCH v4 05/11] x86/boot: Move early SME init code into startup/
  ` [tip: x86/boot] "
` [PATCH v4 06/11] x86/boot: Drop RIP_REL_REF() uses from SME startup code
  ` [tip: x86/boot] "
` [PATCH v4 07/11] x86/sev: Prepare for splitting off early SEV code
  ` [tip: x86/boot] "
` [PATCH v4 08/11] x86/sev: Split off startup code from core code
` [PATCH v4 09/11] x86/boot: Move SEV startup code into startup/
` [PATCH v4 10/11] x86/boot: Drop RIP_REL_REF() uses from early SEV code
` [PATCH v4 11/11] x86/asm: Retire RIP_REL_REF()

Why isn't the EFI memory map published in /sys/firmware/efi?
 2025-04-10 17:30 UTC  (3+ messages)

[PATCH v2 0/3] efistub/x86: Fix early SEV-SNP memory acceptance
 2025-04-10 13:28 UTC  (10+ messages)
` [PATCH v2 3/3] x86/boot: Implement early memory acceptance for SEV-SNP

[PATCH v3 0/7] x86: Refactor and consolidate startup code
 2025-04-09 12:01 UTC  (11+ messages)
` [PATCH v3 1/7] x86/boot/startup: Disable objtool validation for library code
` [PATCH v3 3/7] x86/boot: Move the early GDT/IDT setup code into startup/

[PATCH v13 00/19] x86: Trenchboot secure dynamic launch Linux kernel support
 2025-04-09  9:15 UTC  (6+ messages)
` [PATCH v13 19/19] x86/efi: EFI stub DRTM launch support for Secure Launch

[PATCH 0/2] efivarfs: support freeze/thaw
 2025-04-09  7:17 UTC  (10+ messages)
` [PATCH 0/6] power: wire-up filesystem freeze/thaw with suspend/resume

Build Failure on linux-next (next-20250407)
 2025-04-09  6:06 UTC  (2+ messages)

[PATCH v2 0/8] drivers: Transition to the faux device interface
 2025-04-08 15:01 UTC  (4+ messages)
` [PATCH v2 4/8] rtc: efi: "
  ` (subset) "


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox