messages from 2023-04-12 07:41:31 to 2023-05-12 13:20:11 UTC [more...]
[PATCH v6 00/14] x86: Trenchboot secure dynamic launch Linux kernel support
2023-05-12 13:19 UTC (58+ messages)
` [PATCH v6 01/14] x86/boot: Place kernel_info at a fixed offset
` [PATCH v6 02/14] Documentation/x86: Secure Launch kernel documentation
` [PATCH v6 03/14] x86: Secure Launch Kconfig
` [PATCH v6 04/14] x86: Secure Launch Resource Table header file
` [PATCH v6 05/14] x86: Secure Launch main "
` [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
` [PATCH v6 07/14] x86: Secure Launch kernel early boot stub
` [PATCH v6 08/14] x86: Secure Launch kernel late "
` [PATCH v6 09/14] x86: Secure Launch SMP bringup support
` [PATCH v6 10/14] kexec: Secure Launch kexec SEXIT support
` [PATCH v6 11/14] reboot: Secure Launch SEXIT support on reboot paths
` [PATCH v6 12/14] x86: Secure Launch late initcall platform module
` [PATCH v6 13/14] tpm: Allow locality 2 to be set when initializing the TPM for Secure Launch
` [PATCH v6 14/14] x86: EFI stub DRTM launch support "
[PATCHv10 00/11] mm, x86/cc: Implement support for unaccepted memory
2023-05-12 11:01 UTC (23+ messages)
` [PATCHv10 01/11] mm: Add "
` [PATCHv10 02/11] efi/x86: Get full memory map in allocate_e820()
` [PATCHv10 03/11] x86/boot: Add infrastructure required for unaccepted memory support
` [PATCHv10 04/11] efi/x86: Implement support for unaccepted memory
` [PATCHv10 05/11] x86/boot/compressed: Handle "
` [PATCHv10 06/11] x86/mm: Reserve unaccepted memory bitmap
` [PATCHv10 07/11] x86/mm: Provide helpers for unaccepted memory
` [PATCHv10 08/11] x86/mm: Avoid load_unaligned_zeropad() stepping into "
` [PATCHv10 09/11] x86/tdx: Make _tdx_hypercall() and __tdx_module_call() available in boot stub
` [PATCHv10 10/11] x86/tdx: Refactor try_accept_one()
` [PATCHv10 11/11] x86/tdx: Add unaccepted memory support
[PATCH] efivarfs: expose used and total size
2023-05-11 13:21 UTC (5+ messages)
[efi:next] BUILD SUCCESS 0153431c85af3d4470ac8c59a3f854a3926dff86
2023-05-11 5:48 UTC
[PATCH v5 0/4] generic and PowerPC SED Opal keystore
2023-05-10 22:50 UTC (6+ messages)
` [PATCH 1/4] block:sed-opal: "
` [PATCH 2/4] powerpc/pseries: PLPKS SED Opal keystore support
` [PATCH 3/4] block: sed-opal: keystore access for SED Opal keys
` [PATCH 4/4] powerpc/pseries: update SED for PLPKS api changes
Pompy ciepła - nowe warunki
2023-05-09 7:36 UTC
[PATCH v3 3/3] efi: Add tee-based EFI variable driver
2023-05-08 9:45 UTC (2+ messages)
[PATCH v2 00/20] efi/x86: Avoid bare metal decompressor during EFI boot
2023-05-08 7:03 UTC (21+ messages)
` [PATCH v2 01/20] x86: decompressor: Use proper sequence to take the address of the GOT
` [PATCH v2 02/20] x86: decompressor: Store boot_params pointer in callee save register
` [PATCH v2 03/20] x86: decompressor: Call trampoline as a normal function
` [PATCH v2 04/20] x86: decompressor: Use standard calling convention for trampoline
` [PATCH v2 05/20] x86: decompressor: Avoid the need for a stack in the 32-bit trampoline
` [PATCH v2 06/20] x86: decompressor: Call trampoline directly from C code
` [PATCH v2 07/20] x86: decompressor: Only call the trampoline when changing paging levels
` [PATCH v2 08/20] x86: decompressor: Merge trampoline cleanup with switching code
` [PATCH v2 09/20] x86: efistub: Perform 4/5 level paging switch from the stub
` [PATCH v2 10/20] x86: efistub: Prefer EFI memory attributes protocol over DXE services
` [PATCH v2 11/20] decompress: Use 8 byte alignment
` [PATCH v2 12/20] x86: decompressor: Move global symbol references to C code
` [PATCH v2 13/20] x86: decompressor: Factor out kernel decompression and relocation
` [PATCH v2 14/20] x86: head_64: Store boot_params pointer in callee-preserved register
` [PATCH v2 15/20] x86: head_64: Switch to kernel CS before enabling memory encryption
` [PATCH v2 16/20] efi: libstub: Add limit argument to efi_random_alloc()
` [PATCH v2 17/20] x86: efistub: Check SEV/SNP support while running in the firmware
` [PATCH v2 18/20] x86: efistub: Avoid legacy decompressor when doing EFI boot
` [PATCH v2 19/20] x86: efistub: Clear BSS in EFI handover protocol entrypoint
` [PATCH v2 20/20] x86: decompressor: Avoid magic offsets for EFI handover entrypoint
[PATCH v4 0/3] sed-opal: keyrings, discovery, revert, key store
2023-05-05 19:41 UTC (4+ messages)
` [PATCH v4 1/3] block: sed-opal: Implement IOC_OPAL_DISCOVERY
` [PATCH v4 2/3] block: sed-opal: Implement IOC_OPAL_REVERT_LSP
` [PATCH v4 3/3] block: sed-opal: keyring support for SED keys
[PATCH 0/6] efi/x86: Avoid legacy decompressor during EFI boot
2023-05-03 21:30 UTC (26+ messages)
` [PATCH 1/6] x86: decompressor: Move global symbol references to C code
` [PATCH 2/6] x86: decompressor: Factor out kernel decompression and relocation
` [PATCH 3/6] x86: efistub: Obtain ACPI RSDP address while running in the stub
` [PATCH 4/6] x86: efistub: Perform 4/5 level paging switch from "
` [PATCH 5/6] x86: efistub: Prefer EFI memory attributes protocol over DXE services
` [PATCH 6/6] x86: efistub: Avoid legacy decompressor when doing EFI boot
[RFC PATCH 0/3] efi: Implement generic zboot support
2023-05-03 18:13 UTC (15+ messages)
` [RFC PATCH 1/3] efi/libstub: x86: Split off pieces shared with zboot
` [RFC PATCH 2/3] efi/zboot: x86: Implement EFI zboot support
` [RFC PATCH 3/3] efi/zboot: x86: Clear NX restrictions on populated code regions
[PATCH v2 3/4] arm64: libstub: Move KASLR handling functions to efi-stub-helper.c
2023-05-01 8:11 UTC (3+ messages)
[GIT PULL] EFI updates for v6.4
2023-04-30 0:52 UTC (2+ messages)
[PATCH RFC 42/43] x86/pie: Allow kernel image to be relocated in top 512G
2023-04-28 9:51 UTC
[efi:next] BUILD SUCCESS 026b85796ab4d52af56f8a1c60d2613983ecd845
2023-04-27 10:16 UTC
[PATCH 0/2] arm64: Expose kernel code size to EFI zboot code
2023-04-26 15:58 UTC (6+ messages)
` [PATCH 1/2] efi/zboot: arm64: Inject kernel code size symbol into the zboot payload
` [PATCH 2/2] efi/zboot: arm64: Grab kernel code size from "
biznesowy angielski
2023-04-25 7:30 UTC
[PATCH v4 0/6] RISC-V kasan rework
2023-04-20 17:36 UTC (3+ messages)
[efi:next] BUILD SUCCESS 4067a1265c976819d749b61b5406ab6bfacd3a08
2023-04-21 1:54 UTC
W sprawie samochodu
2023-04-19 8:45 UTC
[PATCH v2 0/6] arm64/efi/zboot: Clean up and enable BTI annotation
2023-04-18 13:49 UTC (7+ messages)
` [PATCH v2 1/6] efi/pe: Import new BTI/IBT header flags from the spec
` [PATCH v2 2/6] arm64: efi: Enable BTI codegen and add PE/COFF annotation
` [PATCH v2 3/6] efi/zboot: arm64: Poke kernel code size into the zboot payload image header
` [PATCH v2 4/6] efi/zboot: Add BSS padding before compression
` [PATCH v2 5/6] efi/zboot: Set forward edge CFI compat header flag if supported
` [PATCH v2 6/6] efi/zboot: arm64: Grab code size from image header
kernel 6.2 stuck at boot (efi_call_rts) on arm64
2023-04-18 5:42 UTC (13+ messages)
[PATCH v3 2/6] efi/cper: Export cper_mem_err_unpack() for use by modules
2023-04-17 23:08 UTC (8+ messages)
Tlakově litý
2023-04-17 7:55 UTC
[PATCHv9 00/14] mm, x86/cc: Implement support for unaccepted memory
2023-04-17 7:37 UTC (9+ messages)
` [PATCHv9 03/14] mm/page_alloc: Fake "
Słowa kluczowe do wypozycjonowania
2023-04-12 7:40 UTC
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).