messages from 2023-04-26 10:42:11 to 2023-05-16 00:41:54 UTC [more...]
[PATCH v6 00/14] x86: Trenchboot secure dynamic launch Linux kernel support
2023-05-16 0:41 UTC (84+ messages)
` [PATCH v6 01/14] x86/boot: Place kernel_info at a fixed offset
` [PATCH v6 02/14] Documentation/x86: Secure Launch kernel documentation
` [PATCH v6 03/14] x86: Secure Launch Kconfig
` [PATCH v6 04/14] x86: Secure Launch Resource Table header file
` [PATCH v6 05/14] x86: Secure Launch main "
` [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
` [PATCH v6 07/14] x86: Secure Launch kernel early boot stub
` [PATCH v6 08/14] x86: Secure Launch kernel late "
` [PATCH v6 09/14] x86: Secure Launch SMP bringup support
` [PATCH v6 10/14] kexec: Secure Launch kexec SEXIT support
` [PATCH v6 11/14] reboot: Secure Launch SEXIT support on reboot paths
` [PATCH v6 12/14] x86: Secure Launch late initcall platform module
` [PATCH v6 13/14] tpm: Allow locality 2 to be set when initializing the TPM for Secure Launch
` [PATCH v6 14/14] x86: EFI stub DRTM launch support "
[PATCH v2 00/20] efi/x86: Avoid bare metal decompressor during EFI boot
2023-05-15 14:14 UTC (27+ messages)
` [PATCH v2 01/20] x86: decompressor: Use proper sequence to take the address of the GOT
` [PATCH v2 02/20] x86: decompressor: Store boot_params pointer in callee save register
` [PATCH v2 03/20] x86: decompressor: Call trampoline as a normal function
` [PATCH v2 04/20] x86: decompressor: Use standard calling convention for trampoline
` [PATCH v2 05/20] x86: decompressor: Avoid the need for a stack in the 32-bit trampoline
` [PATCH v2 06/20] x86: decompressor: Call trampoline directly from C code
` [PATCH v2 07/20] x86: decompressor: Only call the trampoline when changing paging levels
` [PATCH v2 08/20] x86: decompressor: Merge trampoline cleanup with switching code
` [PATCH v2 09/20] x86: efistub: Perform 4/5 level paging switch from the stub
` [PATCH v2 10/20] x86: efistub: Prefer EFI memory attributes protocol over DXE services
` [PATCH v2 11/20] decompress: Use 8 byte alignment
` [PATCH v2 12/20] x86: decompressor: Move global symbol references to C code
` [PATCH v2 13/20] x86: decompressor: Factor out kernel decompression and relocation
` [PATCH v2 14/20] x86: head_64: Store boot_params pointer in callee-preserved register
` [PATCH v2 15/20] x86: head_64: Switch to kernel CS before enabling memory encryption
` [PATCH v2 16/20] efi: libstub: Add limit argument to efi_random_alloc()
` [PATCH v2 17/20] x86: efistub: Check SEV/SNP support while running in the firmware
` [PATCH v2 18/20] x86: efistub: Avoid legacy decompressor when doing EFI boot
` [PATCH v2 19/20] x86: efistub: Clear BSS in EFI handover protocol entrypoint
` [PATCH v2 20/20] x86: decompressor: Avoid magic offsets for EFI handover entrypoint
[PATCH] efivarfs: expose used and total size
2023-05-15 14:08 UTC (7+ messages)
[PATCH v5 0/4] generic and PowerPC SED Opal keystore
2023-05-15 5:52 UTC (7+ messages)
` [PATCH 1/4] block:sed-opal: "
` [PATCH 2/4] powerpc/pseries: PLPKS SED Opal keystore support
` [PATCH 3/4] block: sed-opal: keystore access for SED Opal keys
` [PATCH 4/4] powerpc/pseries: update SED for PLPKS api changes
[PATCHv11 0/9] mm, x86/cc, efi: Implement support for unaccepted memory
2023-05-14 21:13 UTC (12+ messages)
` [PATCHv11 1/9] mm: Add "
` [PATCHv11 2/9] efi/x86: Get full memory map in allocate_e820()
` [PATCHv11 3/9] efi/libstub: Implement support for unaccepted memory
` [PATCHv11 4/9] x86/boot/compressed: Handle "
` [PATCHv11 5/9] efi: Provide helpers for "
` [PATCHv11 6/9] efi/unaccepted: Avoid load_unaligned_zeropad() stepping into "
` [PATCHv11 7/9] x86/tdx: Make _tdx_hypercall() and __tdx_module_call() available in boot stub
` [PATCHv11 8/9] x86/tdx: Refactor try_accept_one()
` [PATCHv11 9/9] x86/tdx: Add unaccepted memory support
[PATCH] efi/esrt: Allow ESRT access without CAP_SYS_ADMIN
2023-05-12 19:43 UTC
[PATCHv10 00/11] mm, x86/cc: Implement support for unaccepted memory
2023-05-12 11:01 UTC (23+ messages)
` [PATCHv10 01/11] mm: Add "
` [PATCHv10 02/11] efi/x86: Get full memory map in allocate_e820()
` [PATCHv10 03/11] x86/boot: Add infrastructure required for unaccepted memory support
` [PATCHv10 04/11] efi/x86: Implement support for unaccepted memory
` [PATCHv10 05/11] x86/boot/compressed: Handle "
` [PATCHv10 06/11] x86/mm: Reserve unaccepted memory bitmap
` [PATCHv10 07/11] x86/mm: Provide helpers for unaccepted memory
` [PATCHv10 08/11] x86/mm: Avoid load_unaligned_zeropad() stepping into "
` [PATCHv10 09/11] x86/tdx: Make _tdx_hypercall() and __tdx_module_call() available in boot stub
` [PATCHv10 10/11] x86/tdx: Refactor try_accept_one()
` [PATCHv10 11/11] x86/tdx: Add unaccepted memory support
[efi:next] BUILD SUCCESS 0153431c85af3d4470ac8c59a3f854a3926dff86
2023-05-11 5:48 UTC
Pompy ciepła - nowe warunki
2023-05-09 7:36 UTC
[PATCH v3 3/3] efi: Add tee-based EFI variable driver
2023-05-08 9:45 UTC (2+ messages)
[PATCH v4 0/3] sed-opal: keyrings, discovery, revert, key store
2023-05-05 19:41 UTC (4+ messages)
` [PATCH v4 1/3] block: sed-opal: Implement IOC_OPAL_DISCOVERY
` [PATCH v4 2/3] block: sed-opal: Implement IOC_OPAL_REVERT_LSP
` [PATCH v4 3/3] block: sed-opal: keyring support for SED keys
[PATCH 0/6] efi/x86: Avoid legacy decompressor during EFI boot
2023-05-03 21:30 UTC (21+ messages)
` [PATCH 4/6] x86: efistub: Perform 4/5 level paging switch from the stub
[RFC PATCH 0/3] efi: Implement generic zboot support
2023-05-03 18:13 UTC (5+ messages)
[PATCH v2 3/4] arm64: libstub: Move KASLR handling functions to efi-stub-helper.c
2023-05-01 8:11 UTC (3+ messages)
[GIT PULL] EFI updates for v6.4
2023-04-30 0:52 UTC (2+ messages)
[PATCH RFC 42/43] x86/pie: Allow kernel image to be relocated in top 512G
2023-04-28 9:51 UTC
[efi:next] BUILD SUCCESS 026b85796ab4d52af56f8a1c60d2613983ecd845
2023-04-27 10:16 UTC
[PATCH 0/2] arm64: Expose kernel code size to EFI zboot code
2023-04-26 15:58 UTC (6+ messages)
` [PATCH 1/2] efi/zboot: arm64: Inject kernel code size symbol into the zboot payload
` [PATCH 2/2] efi/zboot: arm64: Grab kernel code size from "
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).