Linux EFI Development - Date Index
[Prev Page][Next Page]
- Re: [PATCHv6 02/15] mm: Add support for unaccepted memory, (continued)
- [efi:next] BUILD SUCCESS a6cfe03c34bad8c7f51aba49a73403e348c51d1f, kernel test robot
- [PATCH V10 09/22] LoongArch: Add boot and setup routines,
Huacai Chen
- [syzbot] KASAN: use-after-free Read in anon_vma_interval_tree_remove, syzbot
- [PATCH v3 5/5] mtd: ubi: block: add option to enable scanning for partitions, Daniel Golle
- [PATCH v3 3/5] partitions/efi: add support for uImage.FIT sub-partitions, Daniel Golle
- [PATCH v3 4/5] mtd_blkdevs: add option to enable scanning for partitions,
Daniel Golle
- [PATCH v3 2/5] block: add partition parser for U-Boot uImage.FIT, Daniel Golle
- [PATCH v3 1/5] block: add new flag to add partitions read-only, Daniel Golle
- [PATCH v3 0/5] partition parser for U-Boot's uImage.FIT, Daniel Golle
- [PATCH v2 3/5] partitions/efi: add support for uImage.FIT sub-partitions, Daniel Golle
- [PATCH v2 4/5] mtd_blkdevs: add option to enable scanning for partitions, Daniel Golle
- [PATCH v2 5/5] mtd: ubi: block: add option to enable scanning for partitions, Daniel Golle
- [PATCH v2 2/5] block: add partition parser for U-Boot uImage.FIT,
Daniel Golle
- [PATCH v2 1/5] block: add new flag to add partitions read-only, Daniel Golle
- [PATCH v2 0/5] partition parser for U-Boot's uImage.FIT, Daniel Golle
- [efi:next] BUILD SUCCESS 736e0f2179d3005d994ab5addd282988de2e4615, kernel test robot
- [PATCH] efi: stub: prefer mirrored memory for randomized allocations,
Ard Biesheuvel
- [PATCH 5/5] mtd: ubi: block: add option to enable scanning for partitions, Daniel Golle
- [PATCH 4/5] mtd_blkdevs: add option to enable scanning for partitions, Daniel Golle
- [PATCH 3/5] partitions/efi: add support for uImage.FIT sub-partitions, Daniel Golle
- [PATCH 2/5] block: add partition parser for U-Boot uImage.FIT, Daniel Golle
- [PATCH 1/5] block: add new flag to add partitions read-only, Daniel Golle
- [PATCH 0/5] partition parser for U-Boot's uImage.FIT, Daniel Golle
- [RFC PATCH 0/4] efi: implement generic compressed boot support,
Ard Biesheuvel
- Re: [PATCH V9 21/24] LoongArch: Add zboot (compressed kernel) support,
Arnd Bergmann
- [PATCH V9 09/24] LoongArch: Add boot and setup routines, Huacai Chen
- [PATCH v8 0/8] x86: Show in sysfs if a memory node is able to do encryption,
Martin Fernandez
- [PATCH v8 1/8] mm/memblock: Tag memblocks with crypto capabilities, Martin Fernandez
- [PATCH v8 7/8] x86/efi: Mark e820_entries as crypto capable from EFI memmap, Martin Fernandez
- [PATCH v8 4/8] x86/e820: Refactor __e820__range_update, Martin Fernandez
- [PATCH v8 2/8] mm/mmzone: Tag pg_data_t with crypto capabilities, Martin Fernandez
- [PATCH v8 3/8] x86/e820: Add infrastructure to refactor e820__range_{update,remove}, Martin Fernandez
- [PATCH v8 5/8] x86/e820: Refactor e820__range_remove, Martin Fernandez
- [PATCH v8 6/8] x86/e820: Tag e820_entry with crypto capabilities, Martin Fernandez
- [PATCH v8 8/8] drivers/node: Show in sysfs node's crypto capabilities, Martin Fernandez
- Re: [PATCH v8 0/8] x86: Show in sysfs if a memory node is able to do encryption, Borislav Petkov
- [PATCH v7 0/8] x86: Show in sysfs if a memory node is able to do encryption,
Martin Fernandez
- [PATCH v7 1/8] mm/memblock: Tag memblocks with crypto capabilities, Martin Fernandez
- [PATCH v7 2/8] mm/mmzone: Tag pg_data_t with crypto capabilities, Martin Fernandez
- [PATCH v7 3/8] x86/e820: Add infrastructure to refactor e820__range_{update,remove}, Martin Fernandez
- [PATCH v7 5/8] x86/e820: Refactor e820__range_remove, Martin Fernandez
- [PATCH v7 4/8] x86/e820: Refactor __e820__range_update, Martin Fernandez
- [PATCH v7 7/8] x86/efi: Mark e820_entries as crypto capable from EFI memmap, Martin Fernandez
- [PATCH v7 8/8] drivers/node: Show in sysfs node's crypto capabilities, Martin Fernandez
- [PATCH v7 6/8] x86/e820: Tag e820_entry with crypto capabilities, Martin Fernandez
- Re: [PATCH v7 0/8] x86: Show in sysfs if a memory node is able to do encryption, Andrew Morton
- [RFC PATCH 1/5] block: add new flag to add partitions read-only, Daniel Golle
- [RFC PATCH 0/5] partition parser for U-Boot's uImage.FIT, Daniel Golle
- [RFC PATCH 5/5] mtd/ubi/block: scan for partitions in case FIT_PARTITION is set, Daniel Golle
- [RFC PATCH 4/5] mtd_blkdevs: scan partitions on mtdblock if FIT_PARTITION is set,
Daniel Golle
- [RFC PATCH 3/5] partitions/efi: add support for uImage.FIT sub-partitions, Daniel Golle
- [RFC PATCH 2/5] block: add partition parser for U-Boot uImage.FIT, Daniel Golle
- [PATCHv5 00/12] mm, x86/cc: Implement support for unaccepted memory,
Kirill A. Shutemov
- [PATCHv5 04/12] x86/boot: Add infrastructure required for unaccepted memory support, Kirill A. Shutemov
- [PATCHv5 03/12] efi/x86: Get full memory map in allocate_e820(), Kirill A. Shutemov
- [PATCHv5 08/12] x86/mm: Provide helpers for unaccepted memory, Kirill A. Shutemov
- [PATCHv5 10/12] x86/tdx: Unaccepted memory support, Kirill A. Shutemov
- [PATCHv5 02/12] mm: Add support for unaccepted memory, Kirill A. Shutemov
- [PATCHv5 05/12] efi/x86: Implement support for unaccepted memory, Kirill A. Shutemov
- [PATCHv5 01/12] x86/boot/: Centralize __pa()/__va() definitions, Kirill A. Shutemov
- [PATCHv5 06/12] x86/boot/compressed: Handle unaccepted memory, Kirill A. Shutemov
- [PATCHv5 11/12] mm/vmstat: Add counter for memory accepting, Kirill A. Shutemov
- [PATCHv5 07/12] x86/mm: Reserve unaccepted memory bitmap, Kirill A. Shutemov
- [PATCHv5 12/12] x86/mm: Report unaccepted memory in /proc/meminfo, Kirill A. Shutemov
- [PATCHv5 09/12] x86/tdx: Make _tdx_hypercall() and __tdx_module_call() available in boot stub, Kirill A. Shutemov
- [no subject], Unknown
- Re: Supplies needed from INDIA, reply for details, GCAP Supplies
- [efi:next] BUILD SUCCESS 21b68da7bf4a0f27837a652565a76b9c95e54793, kernel test robot
- How to list keys used for kexec,
Michal Suchánek
- [PATCH v2 0/9] introduce mirrored memory support for arm64,
Wupeng Ma
- [PATCH v2 1/9] efi: Make efi_print_memmap() public, Wupeng Ma
- [PATCH v2 2/9] arm64: efi: Add fake memory support, Wupeng Ma
- [PATCH v2 4/9] arm64/mirror: arm64 enabling - find mirrored memory ranges, Wupeng Ma
- [PATCH v2 3/9] efi: Make efi_find_mirror() public, Wupeng Ma
- [PATCH v2 5/9] mm: Ratelimited mirrored memory related warning messages, Wupeng Ma
- [PATCH v2 7/9] mm: Calc the right pfn if page size is not 4K, Wupeng Ma
- [PATCH v2 6/9] mm: Demote warning message in vmemmap_verify() to debug level, Wupeng Ma
- [PATCH v2 8/9] efi: Disable mirror feature if kernelcore is not specified, Wupeng Ma
- [PATCH v2 9/9] ia64/efi: Code simplification in efi_init, Wupeng Ma
- Re: [PATCH v2 0/9] introduce mirrored memory support for arm64, Ard Biesheuvel
- [PATCH v10 0/4] Allow guest access to EFI confidential computing secret area,
Dov Murik
- [PATCH v3 00/30] arm64: support WXN and entry with MMU enabled,
Ard Biesheuvel
- [PATCH v3 01/30] arm64: head: move kimage_vaddr variable into C file, Ard Biesheuvel
- [PATCH v3 03/30] arm64: head: move assignment of idmap_t0sz to C code, Ard Biesheuvel
- [PATCH v3 04/30] arm64: head: drop idmap_ptrs_per_pgd, Ard Biesheuvel
- [PATCH v3 06/30] arm64: head: switch to map_memory macro for the extended ID map, Ard Biesheuvel
- [PATCH v3 08/30] arm64: kernel: drop unnecessary PoC cache clean+invalidate, Ard Biesheuvel
- [PATCH v3 07/30] arm64: head: split off idmap creation code, Ard Biesheuvel
- [PATCH v3 09/30] arm64: head: pass ID map root table address to __enable_mmu(), Ard Biesheuvel
- [PATCH v3 10/30] arm64: mm: provide idmap pointer to cpu_replace_ttbr1(), Ard Biesheuvel
- [PATCH v3 12/30] arm64: head: cover entire kernel image in initial ID map, Ard Biesheuvel
- [PATCH v3 13/30] arm64: head: use relative references to the RELA and RELR tables, Ard Biesheuvel
- [PATCH v3 14/30] arm64: head: create a temporary FDT mapping in the initial ID map, Ard Biesheuvel
- [PATCH v3 17/30] arm64: head: populate kernel page tables with MMU and caches on, Ard Biesheuvel
- [PATCH v3 15/30] arm64: idreg-override: use early FDT mapping in ID map, Ard Biesheuvel
- [PATCH v3 16/30] arm64: head: factor out TTBR1 assignment into a macro, Ard Biesheuvel
- [PATCH v3 18/30] arm64: head: record CPU boot mode after enabling the MMU, Ard Biesheuvel
- [PATCH v3 20/30] arm64: head: relocate kernel only a single time if KASLR is enabled, Ard Biesheuvel
- [PATCH v3 19/30] arm64: kaslr: deal with init called with VA randomization enabled, Ard Biesheuvel
- [PATCH v3 05/30] arm64: head: simplify page table mapping macros (slightly), Ard Biesheuvel
- [PATCH v3 11/30] arm64: head: add helper function to remap regions in early page tables, Ard Biesheuvel
- [PATCH v3 02/30] arm64: mm: make vabits_actual a build time constant if possible, Ard Biesheuvel
- [PATCH v3 21/30] arm64: head: remap the kernel text/inittext region read-only, Ard Biesheuvel
- [PATCH v3 23/30] arm64: mm: move ro_after_init section into the data segment, Ard Biesheuvel
- [PATCH v3 22/30] arm64: setup: drop early FDT pointer helpers, Ard Biesheuvel
- [PATCH v3 24/30] arm64: mm: add support for WXN memory translation attribute, Ard Biesheuvel
- [PATCH v3 25/30] arm64: head: record the MMU state at primary entry, Ard Biesheuvel
- [PATCH v3 27/30] arm64: head: clean the ID map page to the PoC, Ard Biesheuvel
- [PATCH v3 26/30] arm64: head: avoid cache invalidation when entering with the MMU on, Ard Biesheuvel
- [PATCH v3 28/30] efi: libstub: pass image handle to handle_kernel_image(), Ard Biesheuvel
- [PATCH v3 30/30] arm64: efi/libstub: enter with the MMU on if executing in place, Ard Biesheuvel
- [PATCH v3 29/30] efi/arm64: libstub: run image in place if randomized by the loader, Ard Biesheuvel
- Re: [PATCH v3 00/30] arm64: support WXN and entry with MMU enabled, Kees Cook
- [PATCH v2] fs: remove unnecessary conditional,
cgel . zte
- [PATCHv4 0/8] mm, x86/cc: Implement support for unaccepted memory,
Kirill A. Shutemov
- [PATCHv4 5/8] x86/mm: Reserve unaccepted memory bitmap, Kirill A. Shutemov
- [PATCHv4 8/8] mm/vmstat: Add counter for memory accepting, Kirill A. Shutemov
- [PATCHv4 3/8] efi/x86: Implement support for unaccepted memory, Kirill A. Shutemov
- [PATCHv4 4/8] x86/boot/compressed: Handle unaccepted memory, Kirill A. Shutemov
- [PATCHv4 6/8] x86/mm: Provide helpers for unaccepted memory, Kirill A. Shutemov
- [PATCHv4 2/8] efi/x86: Get full memory map in allocate_e820(), Kirill A. Shutemov
- [PATCHv4 7/8] x86/tdx: Unaccepted memory support, Kirill A. Shutemov
- [PATCHv4 1/8] mm: Add support for unaccepted memory, Kirill A. Shutemov
- Re: [PATCHv4 0/8] mm, x86/cc: Implement support for unaccepted memory, Dave Hansen
- [PATCH 1/2] efi: remove use of list iterator variable after loop,
Jakob Koschel
- [PATCH v9 0/4] Allow guest access to EFI confidential computing secret area,
Dov Murik
- [PATCH v2] efi: Allow to enable EFI runtime services by default on RT,
Javier Martinez Canillas
- [PATCH] efi: Allow to enable EFI runtime services with PREEMPT_RT,
Javier Martinez Canillas
- [no subject], Unknown
- [RFC PATCH v2 00/18] arm64: efi: leave MMU and caches on at boot,
Ard Biesheuvel
- [RFC PATCH v2 01/18] arm64: head: drop idmap_ptrs_per_pgd, Ard Biesheuvel
- [RFC PATCH v2 07/18] arm64: kaslr: deal with init called with VA randomization enabled, Ard Biesheuvel
- [RFC PATCH v2 03/18] arm64: kernel: drop unnecessary PoC cache clean+invalidate, Ard Biesheuvel
- [RFC PATCH v2 06/18] arm64: head: populate kernel page tables with MMU and caches on, Ard Biesheuvel
- [RFC PATCH v2 02/18] arm64: head: split off idmap creation code, Ard Biesheuvel
- [RFC PATCH v2 04/18] arm64: head: cover entire kernel image in ID map, Ard Biesheuvel
- [RFC PATCH v2 05/18] arm64: head: factor out TTBR1 assignment into a macro, Ard Biesheuvel
- [RFC PATCH v2 08/18] arm64: setup: defer R/O remapping of FDT, Ard Biesheuvel
- [RFC PATCH v2 09/18] arm64: head: relocate kernel only a single time if KASLR is enabled, Ard Biesheuvel
- [RFC PATCH v2 10/18] arm64: head: record the MMU state at primary entry, Ard Biesheuvel
- [RFC PATCH v2 11/18] arm64: mm: make vabits_actual a build time constant if possible, Ard Biesheuvel
- [RFC PATCH v2 13/18] arm64: head: record CPU boot mode after enabling the MMU, Ard Biesheuvel
- [RFC PATCH v2 14/18] arm64: head: clean the ID map page to the PoC, Ard Biesheuvel
- [RFC PATCH v2 12/18] arm64: head: avoid cache invalidation when entering with the MMU on, Ard Biesheuvel
- [RFC PATCH v2 15/18] arm64: lds: move idmap_pg_dir out of .rodata, Ard Biesheuvel
- [RFC PATCH v2 16/18] efi: libstub: pass image handle to handle_kernel_image(), Ard Biesheuvel
- [RFC PATCH v2 18/18] arm64: efi/libstub: enter with the MMU on if executing in place, Ard Biesheuvel
- [RFC PATCH v2 17/18] efi/arm64: libstub: run image in place if randomized by the loader, Ard Biesheuvel
- Re: [RFC PATCH v2 00/18] arm64: efi: leave MMU and caches on at boot, Mark Rutland
- Linux DRTM on UEFI platforms,
Matthew Garrett
- [PATCH] Removing the unused TODO,
Dipankar Das
- [PATCH 0/9] introduce mirrored memory support for arm64,
Wupeng Ma
- [PATCH 1/9] efi: Make efi_print_memmap() public, Wupeng Ma
- [PATCH 2/9] arm64: efi: Add fake memory support, Wupeng Ma
- [PATCH 3/9] efi: Make efi_find_mirror() public, Wupeng Ma
- [PATCH 4/9] arm64/mirror: arm64 enabling - find mirrored memory ranges, Wupeng Ma
- [PATCH 5/9] mm: Ratelimited mirrored memory related warning messages, Wupeng Ma
- [PATCH 6/9] mm: Demote warning message in vmemmap_verify() to debug level, Wupeng Ma
- [PATCH 7/9] mm: Calc the right pfn if page size is not 4K, Wupeng Ma
- [PATCH 9/9] ia64/efi: Code simplification in efi_init, Wupeng Ma
- [PATCH 8/9] efi: Disable mirror feature if kernelcore is not specified, Wupeng Ma
- Re: [PATCH 0/9] introduce mirrored memory support for arm64, Ard Biesheuvel
- [PATCH V3 0/1] RISCV_EFI_BOOT_PROTOCOL support in linux,
Sunil V L
- [PATCH 0/1] RISCV_EFI_BOOT_PROTOCOL support in linux,
Sunil V L
- [PATCH 5.16 06/37] efi: fix return value of __setup handlers, Greg Kroah-Hartman
- [PATCH 5.15 06/32] efi: fix return value of __setup handlers, Greg Kroah-Hartman
- [PATCH 5.10 04/30] efi: fix return value of __setup handlers, Greg Kroah-Hartman
- [PATCH 4.19 47/57] efi: fix return value of __setup handlers, Greg Kroah-Hartman
- [PATCH 5.4 03/17] efi: fix return value of __setup handlers, Greg Kroah-Hartman
- [PATCH 4.14 15/22] efi: fix return value of __setup handlers, Greg Kroah-Hartman
- [PATCH] x86/efi: Remove references of EFI earlyprintk from documentation,
Akihiko Odaki
- [PATCH V8 09/22] LoongArch: Add boot and setup routines,
Huacai Chen
- [GIT PULL] EFI fix for v5.17,
Ard Biesheuvel
- [PATCH v3] pstore: Don't use semaphores in always-atomic-context code,
Jann Horn
- [RFC PATCH v0 0/6] Minimal Linux/arm64 VM firmware (written in Rust),
ardb
- [PATCH v12 00/46] Add AMD Secure Nested Paging (SEV-SNP) Guest Support,
Brijesh Singh
- [PATCH v12 01/46] KVM: SVM: Define sev_features and vmpl field in the VMSA, Brijesh Singh
- [PATCH v12 02/46] KVM: SVM: Create a separate mapping for the SEV-ES save area, Brijesh Singh
- [PATCH v12 03/46] KVM: SVM: Create a separate mapping for the GHCB save area, Brijesh Singh
- [PATCH v12 04/46] KVM: SVM: Update the SEV-ES save area mapping, Brijesh Singh
- [PATCH v12 06/46] x86/boot: Use MSR read/write helpers instead of inline assembly, Brijesh Singh
- [PATCH v12 05/46] x86/boot: Introduce helpers for MSR reads/writes, Brijesh Singh
- [PATCH v12 07/46] x86/compressed/64: Detect/setup SEV/SME features earlier in boot, Brijesh Singh
- [PATCH v12 09/46] x86/mm: Extend cc_attr to include AMD SEV-SNP, Brijesh Singh
- [PATCH v12 11/46] x86/sev: Save the negotiated GHCB version, Brijesh Singh
- [PATCH v12 08/46] x86/sev: Detect/setup SEV/SME features earlier in boot, Brijesh Singh
- [PATCH v12 10/46] x86/sev: Define the Linux specific guest termination reasons, Brijesh Singh
- [PATCH v12 12/46] x86/sev: Check SEV-SNP features support, Brijesh Singh
- [PATCH v12 13/46] x86/sev: Add a helper for the PVALIDATE instruction, Brijesh Singh
- [PATCH v12 14/46] x86/sev: Check the vmpl level, Brijesh Singh
- [PATCH v12 15/46] x86/compressed: Add helper for validating pages in the decompression stage, Brijesh Singh
- [PATCH v12 16/46] x86/compressed: Register GHCB memory when SEV-SNP is active, Brijesh Singh
- [PATCH v12 20/46] x86/kernel: Validate ROM memory before accessing when SEV-SNP is active, Brijesh Singh
- [PATCH v12 22/46] x86/sev: Use SEV-SNP AP creation to start secondary CPUs, Brijesh Singh
- [PATCH v12 23/46] x86/head/64: Re-enable stack protection, Brijesh Singh
- [PATCH v12 19/46] x86/kernel: Make the .bss..decrypted section shared in RMP table, Brijesh Singh
- [PATCH v12 18/46] x86/sev: Add helper for validating pages in early enc attribute changes, Brijesh Singh
- [PATCH v12 24/46] x86/compressed/acpi: Move EFI detection to helper, Brijesh Singh
- [PATCH v12 25/46] x86/compressed/acpi: Move EFI system table lookup to helper, Brijesh Singh
- [PATCH v12 26/46] x86/compressed/acpi: Move EFI config table lookup to helper, Brijesh Singh
- [PATCH v12 21/46] x86/mm: Validate memory when changing the C-bit, Brijesh Singh
- [PATCH v12 17/46] x86/sev: Register GHCB memory when SEV-SNP is active, Brijesh Singh
- [PATCH v12 28/46] x86/compressed/acpi: Move EFI kexec handling into common code, Brijesh Singh
- [PATCH v12 27/46] x86/compressed/acpi: Move EFI vendor table lookup to helper, Brijesh Singh
- [PATCH v12 34/46] x86/compressed: Add SEV-SNP feature detection/setup, Brijesh Singh
- [PATCH v12 46/46] virt: sevguest: Add documentation for SEV-SNP CPUID Enforcement, Brijesh Singh
- [PATCH v12 30/46] KVM: x86: Move lookup of indexed CPUID leafs to helper, Brijesh Singh
- [PATCH v12 42/46] x86/sev: Register SEV-SNP guest request platform device, Brijesh Singh
- [PATCH v12 39/46] x86/sev: Use firmware-validated CPUID for SEV-SNP guests, Brijesh Singh
- [PATCH v12 43/46] virt: Add SEV-SNP guest driver, Brijesh Singh
- [PATCH v12 31/46] x86/sev: Move MSR-based VMGEXITs for CPUID to helper, Brijesh Singh
- [PATCH v12 29/46] x86/boot: Add Confidential Computing type to setup_data, Brijesh Singh
- [PATCH v12 44/46] virt: sevguest: Add support to derive key, Brijesh Singh
- [PATCH v12 33/46] x86/boot: Add a pointer to Confidential Computing blob in bootparams, Brijesh Singh
- [PATCH v12 45/46] virt: sevguest: Add support to get extended report, Brijesh Singh
- [PATCH v12 35/46] x86/compressed: Use firmware-validated CPUID leaves for SEV-SNP guests, Brijesh Singh
- [PATCH v12 32/46] x86/compressed/64: Add support for SEV-SNP CPUID table in #VC handlers, Brijesh Singh
- [PATCH v12 40/46] x86/sev: add sev=debug cmdline option to dump SNP CPUID table, Brijesh Singh
- [PATCH v12 41/46] x86/sev: Provide support for SNP guest request NAEs, Brijesh Singh
- [PATCH v12 36/46] x86/compressed: Export and rename add_identity_map(), Brijesh Singh
- [PATCH v12 37/46] x86/compressed/64: Add identity mapping for Confidential Computing blob, Brijesh Singh
- [PATCH v12 38/46] x86/sev: Add SEV-SNP feature detection/setup, Brijesh Singh
- [PATCH v12 43.1/46] virt: Add SEV-SNP guest driver, Brijesh Singh
- [PATCH V7 09/22] LoongArch: Add boot and setup routines, Huacai Chen
- [PATCH] efi: Add missing prototype for efi_capsule_setup_info,
Jan Kiszka
- [efi:next] BUILD SUCCESS 2baa81c83f6f3a927cfbbbd707b669d039302625, kernel test robot
- [RFC PATCH V2 0/1] RISCV_EFI_BOOT_PROTOCOL support in linux,
Sunil V L
- [PATCH v3 0/2] Handle UEFI NX-restricted page tables,
Baskov Evgeniy
- [efi:urgent] BUILD SUCCESS 9feaf8b387ee0ece9c1d7add308776b502a35d0c, kernel test robot
- [Question] Should retain 2M alignment if kernel image is bad aligned at entry or BSS overlaps?,
Kefeng Wang
- [PATCH] efi: fix return value of __setup handlers,
Randy Dunlap
- [efi:urgent] BUILD SUCCESS 258dd902022cb10c83671176688074879517fd21, kernel test robot
- [PATCH v8 0/4] Allow guest access to EFI confidential computing secret area,
Dov Murik
- [GIT PULL] More EFI fixes for v5.17,
Ard Biesheuvel
- [PATCH V6 09/22] LoongArch: Add boot and setup routines,
Huacai Chen
- [PATCH v4 2/3] sysfb: Enable boot time VESA graphic mode selection,
Michal Suchanek
- [PATCH v4 3/3] efifb: Remove redundant efifb_setup_from_dmi stub,
Michal Suchanek
- [PATCH v4 1/3] sysfb: Make config option dependencies explicit,
Michal Suchanek
- [PATCH v11 00/45] Add AMD Secure Nested Paging (SEV-SNP) Guest Support,
Brijesh Singh
- [PATCH v11 04/45] KVM: SVM: Update the SEV-ES save area mapping, Brijesh Singh
- [PATCH v11 01/45] KVM: SVM: Define sev_features and vmpl field in the VMSA, Brijesh Singh
- [PATCH v11 03/45] KVM: SVM: Create a separate mapping for the GHCB save area, Brijesh Singh
- [PATCH v11 02/45] KVM: SVM: Create a separate mapping for the SEV-ES save area, Brijesh Singh
- [PATCH v11 05/45] x86/boot: Introduce helpers for MSR reads/writes, Brijesh Singh
- [PATCH v11 24/45] x86/compressed/acpi: Move EFI detection to helper, Brijesh Singh
- [PATCH v11 44/45] virt: sevguest: Add support to get extended report, Brijesh Singh
- [PATCH v11 13/45] x86/sev: Add a helper for the PVALIDATE instruction, Brijesh Singh
- [PATCH v11 25/45] x86/compressed/acpi: Move EFI system table lookup to helper, Brijesh Singh
- [PATCH v11 40/45] x86/sev: Provide support for SNP guest request NAEs, Brijesh Singh
- [PATCH v11 32/45] x86/compressed/64: Add support for SEV-SNP CPUID table in #VC handlers, Brijesh Singh
- [PATCH v11 09/45] x86/mm: Extend cc_attr to include AMD SEV-SNP, Brijesh Singh
- [PATCH v11 30/45] KVM: x86: Move lookup of indexed CPUID leafs to helper, Brijesh Singh
- [PATCH v11 20/45] x86/kernel: Validate ROM memory before accessing when SEV-SNP is active, Brijesh Singh
- [PATCH v11 45/45] virt: sevguest: Add documentation for SEV-SNP CPUID Enforcement, Brijesh Singh
- [PATCH v11 22/45] x86/sev: Use SEV-SNP AP creation to start secondary CPUs, Brijesh Singh
- [PATCH v11 10/45] x86/sev: Define the Linux specific guest termination reasons, Brijesh Singh
- [PATCH v11 21/45] x86/mm: Validate memory when changing the C-bit, Brijesh Singh
- [PATCH v11 26/45] x86/compressed/acpi: Move EFI config table lookup to helper, Brijesh Singh
- [PATCH v11 39/45] x86/sev: Use firmware-validated CPUID for SEV-SNP guests, Brijesh Singh
- [PATCH v11 27/45] x86/compressed/acpi: Move EFI vendor table lookup to helper, Brijesh Singh
- [PATCH v11 18/45] x86/sev: Add helper for validating pages in early enc attribute changes, Brijesh Singh
- [PATCH v11 23/45] x86/head/64: Re-enable stack protection, Brijesh Singh
- [PATCH v11 19/45] x86/kernel: Make the .bss..decrypted section shared in RMP table, Brijesh Singh
- [PATCH v11 14/45] x86/sev: Check the vmpl level, Brijesh Singh
- [PATCH v11 41/45] x86/sev: Register SEV-SNP guest request platform device, Brijesh Singh
- [PATCH v11 42/45] virt: Add SEV-SNP guest driver, Brijesh Singh
- [PATCH v11 07/45] x86/compressed/64: Detect/setup SEV/SME features earlier in boot, Brijesh Singh
- [PATCH v11 12/45] x86/sev: Check SEV-SNP features support, Brijesh Singh
- [PATCH v11 08/45] x86/sev: Detect/setup SEV/SME features earlier in boot, Brijesh Singh
- [PATCH v11 38/45] x86/sev: Add SEV-SNP feature detection/setup, Brijesh Singh
- [PATCH v11 31/45] x86/sev: Move MSR-based VMGEXITs for CPUID to helper, Brijesh Singh
- [PATCH v11 34/45] x86/compressed: Add SEV-SNP feature detection/setup, Brijesh Singh
- [PATCH v11 36/45] x86/compressed: Export and rename add_identity_map(), Brijesh Singh
- [PATCH v11 15/45] x86/compressed: Add helper for validating pages in the decompression stage, Brijesh Singh
- [PATCH v11 37/45] x86/compressed/64: Add identity mapping for Confidential Computing blob, Brijesh Singh
- [PATCH v11 06/45] x86/boot: Use MSR read/write helpers instead of inline assembly, Brijesh Singh
- [PATCH v11 17/45] x86/sev: Register GHCB memory when SEV-SNP is active, Brijesh Singh
- [PATCH v11 33/45] x86/boot: Add a pointer to Confidential Computing blob in bootparams, Brijesh Singh
[Index of Archives]
[Linux Kernel Development]
[Security]
[Linux ARM Kernel]
[Tools]
[Linux MIPS]
[Linux S390]
[Bugtraq]
[Share Photos]>
[Fedora ARM]