public inbox for linux-efi@vger.kernel.org
 help / color / mirror / Atom feed
 messages from 2025-04-22 19:39:39 to 2025-05-06 16:31:43 UTC [more...]

[PATCH] efi/libstub: Describe missing 'out' parameter in efi_load_initrd
 2025-05-06 16:31 UTC 

[PATCH v2 00/13] objtool: Detect and warn about indirect calls in __nocfi functions
 2025-05-06 13:32 UTC  (41+ messages)
` [PATCH v2 01/13] x86/kvm/emulate: Implement test_cc() in C
` [PATCH v2 02/13] x86/kvm/emulate: Introduce COP1
` [PATCH v2 03/13] x86/kvm/emulate: Introduce COP2
` [PATCH v2 04/13] x86/kvm/emulate: Introduce COP2R
` [PATCH v2 05/13] x86/kvm/emulate: Introduce COP2W
` [PATCH v2 06/13] x86/kvm/emulate: Introduce COP2CL
` [PATCH v2 07/13] x86/kvm/emulate: Introduce COP1SRC2
` [PATCH v2 08/13] x86/kvm/emulate: Introduce COP3WCL
` [PATCH v2 09/13] x86/kvm/emulate: Convert em_salc() to C
` [PATCH v2 10/13] x86/kvm/emulate: Remove fastops
` [PATCH v2 11/13] x86,hyperv: Clean up hv_do_hypercall()
` [PATCH v2 12/13] x86_64,hyperv: Use direct call to hypercall-page
` [PATCH v2 13/13] objtool: Validate kCFI calls

x86/Documentation: explain LINUX_EFI_INITRD_MEDIA_GUID
 2025-05-06 13:11 UTC  (2+ messages)

4067196a5227 ("mm/page_alloc: fix deadlock on cpu_hotplug_lock in __accept_page()") (was: Re: [tip: x86/boot] x86/boot: Provide __pti_set_user_pgtbl() to startup code)
 2025-05-06 10:23 UTC  (3+ messages)

[RFT PATCH v2 00/23] x86: strict separation of startup code
 2025-05-06  7:18 UTC  (53+ messages)
` [RFT PATCH v2 01/23] x86/boot: Move early_setup_gdt() back into head64.c
  ` [tip: x86/boot] "
` [RFT PATCH v2 02/23] x86/boot: Disregard __supported_pte_mask in __startup_64()
  ` [tip: x86/boot] "
` [RFT PATCH v2 03/23] x86/boot: Drop global variables keeping track of LA57 state
` [RFT PATCH v2 04/23] x86/sev: Make sev_snp_enabled() a static function
  ` [tip: x86/boot] "
` [RFT PATCH v2 05/23] x86/sev: Move instruction decoder into separate source file
  ` [tip: x86/boot] "
` [RFT PATCH v2 06/23] x86/sev: Disentangle #VC handling code from startup code
  ` [tip: x86/boot] "
` [RFT PATCH v2 07/23] x86/sev: Separate MSR and GHCB based snp_cpuid() via a callback
` [RFT PATCH v2 08/23] x86/sev: Fall back to early page state change code only during boot
` [RFT PATCH v2 09/23] x86/sev: Move GHCB page based HV communication out of startup code
` [RFT PATCH v2 10/23] x86/sev: Use boot SVSM CA for all startup and init code
` [RFT PATCH v2 11/23] x86/boot: Drop redundant RMPADJUST in SEV SVSM presence check
` [RFT PATCH v2 12/23] x86/sev: Unify SEV-SNP hypervisor feature check
` [RFT PATCH v2 13/23] x86/linkage: Add SYM_PIC_ALIAS() macro helper to emit symbol aliases
  ` [tip: x86/boot] "
` [RFT PATCH v2 14/23] x86/boot: Add a bunch of PIC aliases
  ` [tip: x86/boot] "
` [RFT PATCH v2 15/23] x86/boot: Provide __pti_set_user_pgtbl() to startup code
  ` [tip: x86/boot] "
` [RFT PATCH v2 16/23] x86/sev: Provide PIC aliases for SEV related data objects
` [RFT PATCH v2 17/23] x86/sev: Move __sev_[get|put]_ghcb() into separate noinstr object
` [RFT PATCH v2 18/23] x86/sev: Export startup routines for ordinary use
` [RFT PATCH v2 19/23] x86/boot: Created a confined code area for startup code
` [RFT PATCH v2 20/23] x86/boot: Move startup code out of __head section
` [RFT PATCH v2 21/23] x86/boot: Disallow absolute symbol references in startup code
` [RFT PATCH v2 22/23] x86/boot: Revert "Reject absolute references in .head.text"
` [RFT PATCH v2 23/23] x86/boot: Get rid of the .head.text section

[PATCH] fs: Prevent panic from NULL dereference in alloc_fs_context() during do_exit()
 2025-05-05 22:58 UTC 

[PATCH] include: pe.h: Fix PE definitions
 2025-05-05 17:32 UTC  (3+ messages)

[PATCH v2 0/2] efi: Add a mechanism for embedding SBAT section
 2025-05-05 15:45 UTC  (3+ messages)
` [PATCH v2 1/2] efi: zboot specific "
` [PATCH v2 2/2] x86/efi: Implement support for embedding SBAT data for x86

[RFC PATCH v1 00/10] Add RAS support for RISC-V architecture
 2025-05-05 12:32 UTC  (3+ messages)
` [RFC PATCH v1 01/10] riscv: Define ioremap_cache for RISC-V

[PATCH] x86/boot/sev: Support memory acceptance in the EFI stub under SVSM
 2025-05-04  7:42 UTC  (6+ messages)
` [tip: x86/urgent] "

[PATCH v5 0/6] x86: Refactor and consolidate startup code
 2025-05-04  7:33 UTC  (13+ messages)
` [PATCH v5 3/6] x86/sev: Split off startup code from core code
    ` [PATCH] x86/sev: Share the sev_secrets_pa value again
` [PATCH v5 6/6] x86/asm: Retire RIP_REL_REF()

[PATCH RFC 0/4] stackleak: Support Clang stack depth tracking
 2025-05-02 19:01 UTC  (5+ messages)
` [PATCH RFC 1/4] stackleak: Rename CONFIG_GCC_PLUGIN_STACKLEAK to CONFIG_STACKLEAK
` [PATCH RFC 2/4] stackleak: Rename stackleak_track_stack to __sanitizer_cov_stack_depth
` [PATCH RFC 3/4] stackleak: Split STACKLEAK_CFLAGS from GCC_PLUGINS_CFLAGS
` [PATCH RFC 4/4] stackleak: Support Clang stack depth tracking

wts
 2025-05-02 14:54 UTC 

[PATCH 0/2] efi: Add a mechanism for embedding SBAT section
 2025-05-02 13:59 UTC  (16+ messages)
` [PATCH 1/2] efi/libstub: zboot specific "
` [PATCH 2/2] x86/efi: Implement support for embedding SBAT data for x86

[PATCH v14 00/19] x86: Trenchboot secure dynamic launch Linux kernel support
 2025-04-30 18:51 UTC  (31+ messages)
` [PATCH v14 03/19] x86: Secure Launch Resource Table header file
` [PATCH v14 04/19] x86: Secure Launch main "
` [PATCH v14 08/19] x86/boot: Place TXT MLE header in the kernel_info section
` [PATCH v14 09/19] x86: Secure Launch kernel early boot stub
` [PATCH v14 12/19] kexec: Secure Launch kexec SEXIT support
` [PATCH v14 16/19] tpm, tpm_tis: Allow locality to be set to a different value
` [PATCH v14 18/19] x86: Secure Launch late initcall platform module

[PATCH 0/6] objtool: Detect and warn about indirect calls in __nocfi functions
 2025-04-29 20:36 UTC  (27+ messages)
` [PATCH 3/6] x86/kvm/emulate: Avoid RET for fastops
` [PATCH 4/6] x86,hyperv: Clean up hv_do_hypercall()
` [PATCH 5/6] x86_64,hyperv: Use direct call to hypercall-page
` [PATCH 6/6] objtool: Validate kCFI calls

[PATCH] arm64/fpsimd: Avoid unnecessary per-CPU buffers for EFI runtime calls
 2025-04-29 20:27 UTC  (2+ messages)

[PATCH v14 00/19] x86: Trenchboot secure dynamic launch Linux kernel support
 2025-04-29  0:56 UTC  (4+ messages)

[PATCH v3 0/5] efi: Don't initalize SEV-SNP from the EFI stub
 2025-04-25 18:40 UTC  (7+ messages)

[PATCH v2] LoongArch: Enable HAVE_ARCH_STACKLEAK
 2025-04-24  7:32 UTC 

[PATCH] x86/boot: Disable jump tables in PIC code
 2025-04-23 17:02 UTC  (6+ messages)
` [tip: x86/boot] "

[PATCH 6.6 338/393] x86/boot/sev: Avoid shared GHCB page for early memory acceptance
 2025-04-23 14:43 UTC 

[PATCH 6.14 159/241] x86/boot/sev: Avoid shared GHCB page for early memory acceptance
 2025-04-23 14:43 UTC 

[PATCH 6.12 137/223] x86/boot/sev: Avoid shared GHCB page for early memory acceptance
 2025-04-23 14:43 UTC 

[PATCH] LoongArch: Enable HAVE_ARCH_STACKLEAK
 2025-04-23 14:02 UTC  (2+ messages)

[PATCH] efi: Improve logging around memmap init
 2025-04-23  9:05 UTC 


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox