linux-efi.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2023-04-12 07:41:31 to 2023-05-12 13:20:11 UTC [more...]

[PATCH v6 00/14] x86: Trenchboot secure dynamic launch Linux kernel support
 2023-05-12 13:19 UTC  (58+ messages)
` [PATCH v6 01/14] x86/boot: Place kernel_info at a fixed offset
` [PATCH v6 02/14] Documentation/x86: Secure Launch kernel documentation
` [PATCH v6 03/14] x86: Secure Launch Kconfig
` [PATCH v6 04/14] x86: Secure Launch Resource Table header file
` [PATCH v6 05/14] x86: Secure Launch main "
` [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
` [PATCH v6 07/14] x86: Secure Launch kernel early boot stub
` [PATCH v6 08/14] x86: Secure Launch kernel late "
` [PATCH v6 09/14] x86: Secure Launch SMP bringup support
` [PATCH v6 10/14] kexec: Secure Launch kexec SEXIT support
` [PATCH v6 11/14] reboot: Secure Launch SEXIT support on reboot paths
` [PATCH v6 12/14] x86: Secure Launch late initcall platform module
` [PATCH v6 13/14] tpm: Allow locality 2 to be set when initializing the TPM for Secure Launch
` [PATCH v6 14/14] x86: EFI stub DRTM launch support "

[PATCHv10 00/11] mm, x86/cc: Implement support for unaccepted memory
 2023-05-12 11:01 UTC  (23+ messages)
` [PATCHv10 01/11] mm: Add "
` [PATCHv10 02/11] efi/x86: Get full memory map in allocate_e820()
` [PATCHv10 03/11] x86/boot: Add infrastructure required for unaccepted memory support
` [PATCHv10 04/11] efi/x86: Implement support for unaccepted memory
` [PATCHv10 05/11] x86/boot/compressed: Handle "
` [PATCHv10 06/11] x86/mm: Reserve unaccepted memory bitmap
` [PATCHv10 07/11] x86/mm: Provide helpers for unaccepted memory
` [PATCHv10 08/11] x86/mm: Avoid load_unaligned_zeropad() stepping into "
` [PATCHv10 09/11] x86/tdx: Make _tdx_hypercall() and __tdx_module_call() available in boot stub
` [PATCHv10 10/11] x86/tdx: Refactor try_accept_one()
` [PATCHv10 11/11] x86/tdx: Add unaccepted memory support

[PATCH] efivarfs: expose used and total size
 2023-05-11 13:21 UTC  (5+ messages)

[efi:next] BUILD SUCCESS 0153431c85af3d4470ac8c59a3f854a3926dff86
 2023-05-11  5:48 UTC 

[PATCH v5 0/4] generic and PowerPC SED Opal keystore
 2023-05-10 22:50 UTC  (6+ messages)
` [PATCH 1/4] block:sed-opal: "
` [PATCH 2/4] powerpc/pseries: PLPKS SED Opal keystore support
` [PATCH 3/4] block: sed-opal: keystore access for SED Opal keys
` [PATCH 4/4] powerpc/pseries: update SED for PLPKS api changes

Pompy ciepła - nowe warunki
 2023-05-09  7:36 UTC 

[PATCH v3 3/3] efi: Add tee-based EFI variable driver
 2023-05-08  9:45 UTC  (2+ messages)

[PATCH v2 00/20] efi/x86: Avoid bare metal decompressor during EFI boot
 2023-05-08  7:03 UTC  (21+ messages)
` [PATCH v2 01/20] x86: decompressor: Use proper sequence to take the address of the GOT
` [PATCH v2 02/20] x86: decompressor: Store boot_params pointer in callee save register
` [PATCH v2 03/20] x86: decompressor: Call trampoline as a normal function
` [PATCH v2 04/20] x86: decompressor: Use standard calling convention for trampoline
` [PATCH v2 05/20] x86: decompressor: Avoid the need for a stack in the 32-bit trampoline
` [PATCH v2 06/20] x86: decompressor: Call trampoline directly from C code
` [PATCH v2 07/20] x86: decompressor: Only call the trampoline when changing paging levels
` [PATCH v2 08/20] x86: decompressor: Merge trampoline cleanup with switching code
` [PATCH v2 09/20] x86: efistub: Perform 4/5 level paging switch from the stub
` [PATCH v2 10/20] x86: efistub: Prefer EFI memory attributes protocol over DXE services
` [PATCH v2 11/20] decompress: Use 8 byte alignment
` [PATCH v2 12/20] x86: decompressor: Move global symbol references to C code
` [PATCH v2 13/20] x86: decompressor: Factor out kernel decompression and relocation
` [PATCH v2 14/20] x86: head_64: Store boot_params pointer in callee-preserved register
` [PATCH v2 15/20] x86: head_64: Switch to kernel CS before enabling memory encryption
` [PATCH v2 16/20] efi: libstub: Add limit argument to efi_random_alloc()
` [PATCH v2 17/20] x86: efistub: Check SEV/SNP support while running in the firmware
` [PATCH v2 18/20] x86: efistub: Avoid legacy decompressor when doing EFI boot
` [PATCH v2 19/20] x86: efistub: Clear BSS in EFI handover protocol entrypoint
` [PATCH v2 20/20] x86: decompressor: Avoid magic offsets for EFI handover entrypoint

[PATCH v4 0/3] sed-opal: keyrings, discovery, revert, key store
 2023-05-05 19:41 UTC  (4+ messages)
` [PATCH v4 1/3] block: sed-opal: Implement IOC_OPAL_DISCOVERY
` [PATCH v4 2/3] block: sed-opal: Implement IOC_OPAL_REVERT_LSP
` [PATCH v4 3/3] block: sed-opal: keyring support for SED keys

[PATCH 0/6] efi/x86: Avoid legacy decompressor during EFI boot
 2023-05-03 21:30 UTC  (26+ messages)
` [PATCH 1/6] x86: decompressor: Move global symbol references to C code
` [PATCH 2/6] x86: decompressor: Factor out kernel decompression and relocation
` [PATCH 3/6] x86: efistub: Obtain ACPI RSDP address while running in the stub
` [PATCH 4/6] x86: efistub: Perform 4/5 level paging switch from "
` [PATCH 5/6] x86: efistub: Prefer EFI memory attributes protocol over DXE services
` [PATCH 6/6] x86: efistub: Avoid legacy decompressor when doing EFI boot

[RFC PATCH 0/3] efi: Implement generic zboot support
 2023-05-03 18:13 UTC  (15+ messages)
` [RFC PATCH 1/3] efi/libstub: x86: Split off pieces shared with zboot
` [RFC PATCH 2/3] efi/zboot: x86: Implement EFI zboot support
` [RFC PATCH 3/3] efi/zboot: x86: Clear NX restrictions on populated code regions

[PATCH v2 3/4] arm64: libstub: Move KASLR handling functions to efi-stub-helper.c
 2023-05-01  8:11 UTC  (3+ messages)

[GIT PULL] EFI updates for v6.4
 2023-04-30  0:52 UTC  (2+ messages)

[PATCH RFC 42/43] x86/pie: Allow kernel image to be relocated in top 512G
 2023-04-28  9:51 UTC 

[efi:next] BUILD SUCCESS 026b85796ab4d52af56f8a1c60d2613983ecd845
 2023-04-27 10:16 UTC 

[PATCH 0/2] arm64: Expose kernel code size to EFI zboot code
 2023-04-26 15:58 UTC  (6+ messages)
` [PATCH 1/2] efi/zboot: arm64: Inject kernel code size symbol into the zboot payload
` [PATCH 2/2] efi/zboot: arm64: Grab kernel code size from "

biznesowy angielski
 2023-04-25  7:30 UTC 

[PATCH v4 0/6] RISC-V kasan rework
 2023-04-20 17:36 UTC  (3+ messages)

[efi:next] BUILD SUCCESS 4067a1265c976819d749b61b5406ab6bfacd3a08
 2023-04-21  1:54 UTC 

W sprawie samochodu
 2023-04-19  8:45 UTC 

[PATCH v2 0/6] arm64/efi/zboot: Clean up and enable BTI annotation
 2023-04-18 13:49 UTC  (7+ messages)
` [PATCH v2 1/6] efi/pe: Import new BTI/IBT header flags from the spec
` [PATCH v2 2/6] arm64: efi: Enable BTI codegen and add PE/COFF annotation
` [PATCH v2 3/6] efi/zboot: arm64: Poke kernel code size into the zboot payload image header
` [PATCH v2 4/6] efi/zboot: Add BSS padding before compression
` [PATCH v2 5/6] efi/zboot: Set forward edge CFI compat header flag if supported
` [PATCH v2 6/6] efi/zboot: arm64: Grab code size from image header

kernel 6.2 stuck at boot (efi_call_rts) on arm64
 2023-04-18  5:42 UTC  (13+ messages)

[PATCH v3 2/6] efi/cper: Export cper_mem_err_unpack() for use by modules
 2023-04-17 23:08 UTC  (8+ messages)

Tlakově litý
 2023-04-17  7:55 UTC 

[PATCHv9 00/14] mm, x86/cc: Implement support for unaccepted memory
 2023-04-17  7:37 UTC  (9+ messages)
` [PATCHv9 03/14] mm/page_alloc: Fake "

Słowa kluczowe do wypozycjonowania
 2023-04-12  7:40 UTC 


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).