Linux EFI development
 help / color / mirror / Atom feed
 messages from 2025-04-23 21:08:49 to 2025-05-08 12:25:27 UTC [more...]

[PATCH 0/8] stackleak: Support Clang stack depth tracking
 2025-05-08 12:25 UTC  (15+ messages)
` [PATCH 1/8] nvme-pci: Make nvme_pci_npages_prp() __always_inline
` [PATCH 2/8] init.h: Disable sanitizer coverage for __init and __head
` [PATCH 3/8] stackleak: Rename CONFIG_GCC_PLUGIN_STACKLEAK to CONFIG_STACKLEAK
` [PATCH 4/8] stackleak: Rename stackleak_track_stack to __sanitizer_cov_stack_depth
` [PATCH 5/8] stackleak: Split STACKLEAK_CFLAGS from GCC_PLUGINS_CFLAGS
` [PATCH 6/8] stackleak: Support Clang stack depth tracking
` [PATCH 7/8] configs/hardening: Enable CONFIG_STACKLEAK
` [PATCH 8/8] configs/hardening: Enable CONFIG_INIT_ON_FREE_DEFAULT_ON

[RFT PATCH v2 00/23] x86: strict separation of startup code
 2025-05-08 11:08 UTC  (59+ messages)
` [RFT PATCH v2 01/23] x86/boot: Move early_setup_gdt() back into head64.c
  ` [tip: x86/boot] "
` [RFT PATCH v2 02/23] x86/boot: Disregard __supported_pte_mask in __startup_64()
  ` [tip: x86/boot] "
` [RFT PATCH v2 03/23] x86/boot: Drop global variables keeping track of LA57 state
` [RFT PATCH v2 04/23] x86/sev: Make sev_snp_enabled() a static function
  ` [tip: x86/boot] "
` [RFT PATCH v2 05/23] x86/sev: Move instruction decoder into separate source file
  ` [tip: x86/boot] "
` [RFT PATCH v2 06/23] x86/sev: Disentangle #VC handling code from startup code
  ` [tip: x86/boot] "
` [RFT PATCH v2 07/23] x86/sev: Separate MSR and GHCB based snp_cpuid() via a callback
` [RFT PATCH v2 08/23] x86/sev: Fall back to early page state change code only during boot
` [RFT PATCH v2 09/23] x86/sev: Move GHCB page based HV communication out of startup code
` [RFT PATCH v2 10/23] x86/sev: Use boot SVSM CA for all startup and init code
` [RFT PATCH v2 11/23] x86/boot: Drop redundant RMPADJUST in SEV SVSM presence check
` [RFT PATCH v2 12/23] x86/sev: Unify SEV-SNP hypervisor feature check
` [RFT PATCH v2 13/23] x86/linkage: Add SYM_PIC_ALIAS() macro helper to emit symbol aliases
  ` [tip: x86/boot] "
` [RFT PATCH v2 14/23] x86/boot: Add a bunch of PIC aliases
  ` [tip: x86/boot] "
` [RFT PATCH v2 15/23] x86/boot: Provide __pti_set_user_pgtbl() to startup code
  ` [tip: x86/boot] "
` [RFT PATCH v2 16/23] x86/sev: Provide PIC aliases for SEV related data objects
` [RFT PATCH v2 17/23] x86/sev: Move __sev_[get|put]_ghcb() into separate noinstr object
` [RFT PATCH v2 18/23] x86/sev: Export startup routines for ordinary use
` [RFT PATCH v2 19/23] x86/boot: Created a confined code area for startup code
` [RFT PATCH v2 20/23] x86/boot: Move startup code out of __head section
` [RFT PATCH v2 21/23] x86/boot: Disallow absolute symbol references in startup code
` [RFT PATCH v2 22/23] x86/boot: Revert "Reject absolute references in .head.text"
` [RFT PATCH v2 23/23] x86/boot: Get rid of the .head.text section

[PATCH 6.12 031/164] x86/boot/sev: Support memory acceptance in the EFI stub under SVSM
 2025-05-07 18:38 UTC 

[PATCH 6.14 027/183] x86/boot/sev: Support memory acceptance in the EFI stub under SVSM
 2025-05-07 18:37 UTC 

[PATCH v2 1/4] fs: add owner of freeze/thaw
 2025-05-07 11:18 UTC  (3+ messages)
` [PATCH] fs: allow nesting with FREEZE_EXCL

UEFI EBS() failures on Lenovo T14s
 2025-05-07  7:21 UTC  (7+ messages)

[PATCH v2 00/13] objtool: Detect and warn about indirect calls in __nocfi functions
 2025-05-06 19:18 UTC  (42+ messages)
` [PATCH v2 01/13] x86/kvm/emulate: Implement test_cc() in C
` [PATCH v2 02/13] x86/kvm/emulate: Introduce COP1
` [PATCH v2 03/13] x86/kvm/emulate: Introduce COP2
` [PATCH v2 04/13] x86/kvm/emulate: Introduce COP2R
` [PATCH v2 05/13] x86/kvm/emulate: Introduce COP2W
` [PATCH v2 06/13] x86/kvm/emulate: Introduce COP2CL
` [PATCH v2 07/13] x86/kvm/emulate: Introduce COP1SRC2
` [PATCH v2 08/13] x86/kvm/emulate: Introduce COP3WCL
` [PATCH v2 09/13] x86/kvm/emulate: Convert em_salc() to C
` [PATCH v2 10/13] x86/kvm/emulate: Remove fastops
` [PATCH v2 11/13] x86,hyperv: Clean up hv_do_hypercall()
` [PATCH v2 12/13] x86_64,hyperv: Use direct call to hypercall-page
` [PATCH v2 13/13] objtool: Validate kCFI calls

[PATCH] efi/libstub: Describe missing 'out' parameter in efi_load_initrd
 2025-05-06 16:31 UTC 

x86/Documentation: explain LINUX_EFI_INITRD_MEDIA_GUID
 2025-05-06 13:11 UTC  (2+ messages)

4067196a5227 ("mm/page_alloc: fix deadlock on cpu_hotplug_lock in __accept_page()") (was: Re: [tip: x86/boot] x86/boot: Provide __pti_set_user_pgtbl() to startup code)
 2025-05-06 10:23 UTC  (3+ messages)

[PATCH] fs: Prevent panic from NULL dereference in alloc_fs_context() during do_exit()
 2025-05-05 22:58 UTC 

[PATCH] include: pe.h: Fix PE definitions
 2025-05-05 17:32 UTC  (3+ messages)

[PATCH v2 0/2] efi: Add a mechanism for embedding SBAT section
 2025-05-05 15:45 UTC  (3+ messages)
` [PATCH v2 1/2] efi: zboot specific "
` [PATCH v2 2/2] x86/efi: Implement support for embedding SBAT data for x86

[RFC PATCH v1 00/10] Add RAS support for RISC-V architecture
 2025-05-05 12:32 UTC  (3+ messages)
` [RFC PATCH v1 01/10] riscv: Define ioremap_cache for RISC-V

[PATCH] x86/boot/sev: Support memory acceptance in the EFI stub under SVSM
 2025-05-04  7:42 UTC  (6+ messages)
` [tip: x86/urgent] "

[PATCH v5 0/6] x86: Refactor and consolidate startup code
 2025-05-04  7:33 UTC  (11+ messages)
` [PATCH v5 3/6] x86/sev: Split off startup code from core code
    ` [PATCH] x86/sev: Share the sev_secrets_pa value again
` [PATCH v5 6/6] x86/asm: Retire RIP_REL_REF()

[PATCH RFC 0/4] stackleak: Support Clang stack depth tracking
 2025-05-02 19:01 UTC  (5+ messages)
` [PATCH RFC 1/4] stackleak: Rename CONFIG_GCC_PLUGIN_STACKLEAK to CONFIG_STACKLEAK
` [PATCH RFC 2/4] stackleak: Rename stackleak_track_stack to __sanitizer_cov_stack_depth
` [PATCH RFC 3/4] stackleak: Split STACKLEAK_CFLAGS from GCC_PLUGINS_CFLAGS
` [PATCH RFC 4/4] stackleak: Support Clang stack depth tracking

wts
 2025-05-02 14:54 UTC 

[PATCH 0/2] efi: Add a mechanism for embedding SBAT section
 2025-05-02 13:59 UTC  (16+ messages)
` [PATCH 1/2] efi/libstub: zboot specific "
` [PATCH 2/2] x86/efi: Implement support for embedding SBAT data for x86

[PATCH v14 00/19] x86: Trenchboot secure dynamic launch Linux kernel support
 2025-04-30 18:51 UTC  (15+ messages)
` [PATCH v14 03/19] x86: Secure Launch Resource Table header file
` [PATCH v14 04/19] x86: Secure Launch main "
` [PATCH v14 09/19] x86: Secure Launch kernel early boot stub
` [PATCH v14 18/19] x86: Secure Launch late initcall platform module

[PATCH 0/6] objtool: Detect and warn about indirect calls in __nocfi functions
 2025-04-29 20:36 UTC  (27+ messages)
` [PATCH 3/6] x86/kvm/emulate: Avoid RET for fastops
` [PATCH 4/6] x86,hyperv: Clean up hv_do_hypercall()
` [PATCH 5/6] x86_64,hyperv: Use direct call to hypercall-page
` [PATCH 6/6] objtool: Validate kCFI calls

[PATCH] arm64/fpsimd: Avoid unnecessary per-CPU buffers for EFI runtime calls
 2025-04-29 20:27 UTC  (2+ messages)

[PATCH v14 00/19] x86: Trenchboot secure dynamic launch Linux kernel support
 2025-04-29  0:56 UTC  (4+ messages)

[PATCH v3 0/5] efi: Don't initalize SEV-SNP from the EFI stub
 2025-04-25 18:40 UTC  (7+ messages)

[PATCH v2] LoongArch: Enable HAVE_ARCH_STACKLEAK
 2025-04-24  7:32 UTC 


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox