linux-efi.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2021-12-31 03:04:16 to 2022-01-24 20:38:45 UTC [more...]

[PATCH 5.15 428/846] efi: apply memblock cap after memblock_add()
 2022-01-24 18:39 UTC 

[efi:urgent] BUILD SUCCESS f5390cd0b43c2e54c7cf5506c7da4a37c5cef746
 2022-01-24  7:31 UTC 

[PATCH v2 0/3] ghes_edac: refactor memory error reporting to avoid code duplication
 2022-01-24  2:47 UTC  (12+ messages)
` [PATCH v2 1/3] ghes_edac: unify memory error report format with cper
` [PATCH v3 0/2] EDAC/ghes: refactor memory error reporting to avoid
` [PATCH v3 1/2] efi/cper: add cper_mem_err_status_str to decode error description
` [PATCH v3 2/2] EDAC/ghes: use cper functions to avoid code duplication
` [RESEND PATCH v3 0/2] EDAC/ghes: refactor memory error reporting to avoid
` [RESEND PATCH v3 1/2] efi/cper: add cper_mem_err_status_str to decode error description
` [RESEND PATCH v3 2/2] EDAC/ghes: use cper functions to avoid code duplication

[PATCH v8 00/40] Add AMD Secure Nested Paging (SEV-SNP) Guest Support
 2022-01-20 12:18 UTC  (104+ messages)
` [PATCH v8 08/40] x86/sev: Check the vmpl level
` [PATCH v8 09/40] x86/compressed: Add helper for validating pages in the decompression stage
` [PATCH v8 10/40] x86/compressed: Register GHCB memory when SEV-SNP is active
` [PATCH v8 11/40] x86/sev: "
` [PATCH v8 12/40] x86/sev: Add helper for validating pages in early enc attribute changes
` [PATCH v8 13/40] x86/kernel: Make the bss.decrypted section shared in RMP table
` [PATCH v8 15/40] x86/mm: Add support to validate memory when changing C-bit
` [PATCH v8 16/40] KVM: SVM: Define sev_features and vmpl field in the VMSA
` [PATCH v8 17/40] KVM: SVM: Create a separate mapping for the SEV-ES save area
` [PATCH v8 18/40] KVM: SVM: Create a separate mapping for the GHCB "
` [PATCH v8 19/40] KVM: SVM: Update the SEV-ES save area mapping
` [PATCH v8 20/40] x86/sev: Use SEV-SNP AP creation to start secondary CPUs
` [PATCH v8 21/40] x86/head: re-enable stack protection for 32/64-bit builds
` [PATCH v8 22/40] x86/sev: move MSR-based VMGEXITs for CPUID to helper
` [PATCH v8 23/40] KVM: x86: move lookup of indexed CPUID leafs "
` [PATCH v8 24/40] x86/compressed/acpi: move EFI system table lookup "
` [PATCH v8 25/40] x86/compressed/acpi: move EFI config "
` [PATCH v8 26/40] x86/compressed/acpi: move EFI vendor "
` [PATCH v8 27/40] x86/boot: Add Confidential Computing type to setup_data
` [PATCH v8 28/40] KVM: SEV: Add documentation for SEV-SNP CPUID Enforcement
` [PATCH v8 29/40] x86/compressed/64: add support for SEV-SNP CPUID table in #VC handlers
` [PATCH v8 30/40] x86/boot: add a pointer to Confidential Computing blob in bootparams
` [PATCH v8 31/40] x86/compressed: add SEV-SNP feature detection/setup
` [PATCH v8 32/40] x86/compressed: use firmware-validated CPUID for SEV-SNP guests

[PATCH v3 00/13] Introduce sv48 support without relocatable kernel
 2022-01-20 10:05 UTC  (11+ messages)
` [PATCH v3 07/13] riscv: Implement sv48 support
` [PATCH v3 12/13] riscv: Initialize thread pointer before calling C functions

[PATCH] efi/libstub: arm64: Fix image check alignment at entry
 2022-01-19 17:22 UTC  (2+ messages)

[PATCHv2 0/7] Implement support for unaccepted memory
 2022-01-18 21:05 UTC  (25+ messages)
` [PATCHv2 1/7] mm: Add "
` [PATCHv2 2/7] efi/x86: Get full memory map in allocate_e820()
` [PATCHv2 3/7] efi/x86: Implement support for unaccepted memory
` [PATCHv2 4/7] x86/boot/compressed: Handle "
` [PATCHv2 5/7] x86/mm: Reserve unaccepted memory bitmap
` [PATCHv2 6/7] x86/mm: Provide helpers for unaccepted memory
` [PATCHv2 7/7] x86/tdx: Unaccepted memory support

[PATCH v9 0/8] Enroll kernel keys thru MOK
 2022-01-18 16:32 UTC  (36+ messages)
` [PATCH v9 1/8] integrity: Fix warning about missing prototypes
` [PATCH v9 2/8] integrity: Introduce a Linux keyring called machine
` [PATCH v9 3/8] integrity: add new keyring handler for mok keys
` [PATCH v9 4/8] KEYS: store reference to machine keyring
` [PATCH v9 5/8] KEYS: Introduce link restriction for machine keys
` [PATCH v9 6/8] efi/mokvar: move up init order
` [PATCH v9 7/8] integrity: Trust MOK keys if MokListTrustedRT found
` [PATCH v9 8/8] integrity: Only use machine keyring when uefi_check_trust_mok_keys is true

[PATCH] efi: runtime: avoid EFIv2 runtime services on Apple x86 machines
 2022-01-18  7:44 UTC  (3+ messages)

[PATCH v5 0/5] x86: Show in sysfs if a memory node is able to do encryption
 2022-01-17 12:42 UTC  (10+ messages)
` [PATCH v5 1/5] mm/memblock: Tag memblocks with crypto capabilities
` [PATCH v5 2/5] mm/mmzone: Tag pg_data_t "
` [PATCH v5 3/5] x86/e820: Tag e820_entry "
` [PATCH v5 4/5] x86/efi: Tag e820_entries as crypto capable from EFI memmap
` [PATCH v5 5/5] drivers/node: Show in sysfs node's crypto capabilities

[PATCH 0/3] usable memory range fixes (arm64/fdt/efi)
 2022-01-14 23:27 UTC  (11+ messages)
` [PATCH 1/3] memblock: define functions to set the usable memory range
` [PATCH 2/3] of: fdt: use memblock usable range interface
` [PATCH 3/3] efi: enforce usable memory range after reserving regions

[BUG][SEVERE] Enabling EFI runtime services causes panics in the T2 security chip on Macs equipped with it
 2022-01-12  9:13 UTC  (12+ messages)

[GIT PULL] EFI updates for v5.17
 2022-01-12  0:13 UTC  (2+ messages)

Wycena paneli fotowoltaicznych
 2022-01-11  7:45 UTC 

[PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
 2022-01-10 21:38 UTC  (15+ messages)

[PATCH v6 0/5] Allow guest access to EFI confidential computing secret area
 2022-01-10 16:27 UTC  (11+ messages)

[efi:next] BUILD SUCCESS 42f4046bc4ba56c6e4d2af7a9d7f70eaa563daec
 2022-01-08  9:05 UTC 

[PATCH] efi: use default_groups in kobj_type
 2022-01-06 10:20 UTC  (2+ messages)

[PATCH v2] builddeb: Support signing kernels with the module signing key
 2022-01-04 18:13 UTC  (3+ messages)

[PATCH] Revert "efi/random: Treat EFI_RNG_PROTOCOL output as bootloader randomness"
 2022-01-04 15:06 UTC  (9+ messages)
  ` [PATCH v3, resend] random: fix crash on multiple early calls to add_bootloader_randomness()
      ` [PATCH v4] "


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).