linux-efi.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2023-05-17 15:38:52 to 2023-06-06 14:27:59 UTC [more...]

[PATCHv14 0/9] mm, x86/cc, efi: Implement support for unaccepted memory
 2023-06-06 14:26 UTC  (10+ messages)
` [PATCHv14 1/9] mm: Add "
` [PATCHv14 2/9] efi/x86: Get full memory map in allocate_e820()
` [PATCHv14 3/9] efi/libstub: Implement support for unaccepted memory
` [PATCHv14 4/9] x86/boot/compressed: Handle "
` [PATCHv14 5/9] efi: Add unaccepted memory support
` [PATCHv14 6/9] efi/unaccepted: Avoid load_unaligned_zeropad() stepping into unaccepted memory
` [PATCHv14 7/9] x86/tdx: Make _tdx_hypercall() and __tdx_module_call() available in boot stub
` [PATCHv14 8/9] x86/tdx: Refactor try_accept_one()
` [PATCHv14 9/9] x86/tdx: Add unaccepted memory support

[PATCH v3 0/5] riscv: Introduce KASLR
 2023-06-06 12:32 UTC  (6+ messages)
` [PATCH v3 1/5] riscv: Introduce virtual kernel mapping KASLR
` [PATCH v3 2/5] riscv: Dump out kernel offset information on panic
` [PATCH v3 3/5] arm64: libstub: Move KASLR handling functions to efi-stub-helper.c
` [PATCH v3 4/5] libstub: Fix compilation warning for rv32
` [PATCH v3 5/5] riscv: libstub: Implement KASLR by using generic functions

[PATCHv13 0/9] mm, x86/cc, efi: Implement support for unaccepted memory
 2023-06-06 12:29 UTC  (31+ messages)
` [PATCHv13 1/9] mm: Add "
` [PATCHv13 2/9] efi/x86: Get full memory map in allocate_e820()
` [PATCHv13 3/9] efi/libstub: Implement support for unaccepted memory
` [PATCHv13 4/9] x86/boot/compressed: Handle "
` [PATCHv13 5/9] efi: Add unaccepted memory support
` [PATCHv13 6/9] efi/unaccepted: Avoid load_unaligned_zeropad() stepping into unaccepted memory
` [PATCHv13 7/9] x86/tdx: Make _tdx_hypercall() and __tdx_module_call() available in boot stub
` [PATCHv13 8/9] x86/tdx: Refactor try_accept_one()
` [PATCHv13 9/9] x86/tdx: Add unaccepted memory support

[PATCH v5 1/3] efi: expose efivar generic ops register function
 2023-06-06  7:52 UTC  (8+ messages)
` [PATCH v5 2/3] efi: Add EFI_ACCESS_DENIED status code
` [PATCH v5 3/3] efi: Add tee-based EFI variable driver

[efi:next] BUILD SUCCESS 13c21ab8038d00b4bcc69a46c5f7f1c95e5decce
 2023-06-05 10:43 UTC 

[PATCH] efi: bump efistub version from 1.1 to 3.0 for VZLinuxBootLoader compatibility
 2023-06-03 10:50 UTC  (6+ messages)

Wyższa konwersja w e-sklepie
 2023-06-02  8:50 UTC 

[efi:next] BUILD SUCCESS 128d85761fe9ccd91ea685287c3472d09be6de29
 2023-06-03  1:55 UTC 

[PATCH v4 00/21] efi/x86: Avoid bare metal decompressor during EFI boot
 2023-06-02 22:22 UTC  (27+ messages)
` [PATCH v4 01/21] x86/efistub: Branch straight to kernel entry point from C code
` [PATCH v4 02/21] x86/efistub: Simplify and clean up handover entry code
` [PATCH v4 03/21] x86/decompressor: Avoid magic offsets for EFI handover entrypoint
` [PATCH v4 04/21] x86/efistub: Clear BSS in EFI handover protocol entrypoint
` [PATCH v4 05/21] x86/decompressor: Use proper sequence to take the address of the GOT
` [PATCH v4 06/21] x86/decompressor: Store boot_params pointer in callee save register
` [PATCH v4 07/21] x86/decompressor: Call trampoline as a normal function
` [PATCH v4 08/21] x86/decompressor: Use standard calling convention for trampoline
` [PATCH v4 09/21] x86/decompressor: Avoid the need for a stack in the 32-bit trampoline
` [PATCH v4 10/21] x86/decompressor: Call trampoline directly from C code
` [PATCH v4 11/21] x86/decompressor: Only call the trampoline when changing paging levels
` [PATCH v4 12/21] x86/decompressor: Merge trampoline cleanup with switching code
` [PATCH v4 13/21] x86/efistub: Perform 4/5 level paging switch from the stub
` [PATCH v4 14/21] x86/efistub: Prefer EFI memory attributes protocol over DXE services
` [PATCH v4 15/21] decompress: Use 8 byte alignment
` [PATCH v4 16/21] x86/decompressor: Move global symbol references to C code
` [PATCH v4 17/21] x86/decompressor: Factor out kernel decompression and relocation
` [PATCH v4 18/21] x86/head_64: Store boot_params pointer in callee-preserved register
` [PATCH v4 19/21] efi/libstub: Add limit argument to efi_random_alloc()
` [PATCH v4 20/21] x86/efistub: Perform SNP feature test while running in the firmware
` [PATCH v4 21/21] x86/efistub: Avoid legacy decompressor when doing EFI boot

[PATCH] efi/esrt: Allow ESRT access without CAP_SYS_ADMIN
 2023-06-02 12:59 UTC  (3+ messages)

[GIT PULL] EFI fixes for v6.4 #1
 2023-06-02 11:29 UTC  (2+ messages)

[PATCH v5 0/4] generic and PowerPC SED Opal keystore
 2023-06-01 14:29 UTC  (7+ messages)
` [PATCH 1/4] block:sed-opal: "
` [PATCH 4/4] powerpc/pseries: update SED for PLPKS api changes

[PATCH v2] x86/kexec: Add EFI config table identity mapping for kexec kernel
 2023-06-01  8:25 UTC  (3+ messages)

Słowa kluczowe do wypozycjonowania
 2023-06-01  7:30 UTC 

[PATCHv12 0/9] mm, x86/cc, efi: Implement support for unaccepted memory
 2023-05-31 18:10 UTC  (20+ messages)
` [PATCHv12 1/9] mm: Add "
        ` [PATCHv12.1 "
` [PATCHv12 2/9] efi/x86: Get full memory map in allocate_e820()
` [PATCHv12 3/9] efi/libstub: Implement support for unaccepted memory
` [PATCHv12 4/9] x86/boot/compressed: Handle "
` [PATCHv12 5/9] efi: Add unaccepted memory support
` [PATCHv12 6/9] efi/unaccepted: Avoid load_unaligned_zeropad() stepping into unaccepted memory
` [PATCHv12 7/9] x86/tdx: Make _tdx_hypercall() and __tdx_module_call() available in boot stub
` [PATCHv12 8/9] x86/tdx: Refactor try_accept_one()
` [PATCHv12 9/9] x86/tdx: Add unaccepted memory support

[efi:next] BUILD SUCCESS ac3bb6e23bbb0a87fac68ec6bcdecd1a36d8c53f
 2023-05-30 12:03 UTC 

[efi:urgent] BUILD SUCCESS 36e4fc57fc1619f462e669e939209c45763bc8f5
 2023-05-30 11:40 UTC 

Wake up - Audit time
 2023-05-29  8:05 UTC 

mix of ACPICA regression and EFISTUB regression (Was: kernel >= v6.2 no longer boots on Apple's Virtualization.framework (x86_64); likely to be related to ACPICA)
 2023-05-28  7:02 UTC  (7+ messages)

[PATCH] x86/kexec: Add EFI config table identity mapping for kexec kernel
 2023-05-26  9:55 UTC  (4+ messages)

[efi:urgent] BUILD SUCCESS fd936fd8ac105ba3eb764185e8ba483c789c893e
 2023-05-26  1:41 UTC 

[PATCH 00/15] arm64: address -Wmissing-prototype warnings
 2023-05-25 18:25 UTC  (2+ messages)

[PATCH] [v2] efi: fix missing prototype warnings
 2023-05-24 14:33 UTC  (3+ messages)

[PATCH v6 00/14] x86: Trenchboot secure dynamic launch Linux kernel support
 2023-05-24  2:55 UTC  (5+ messages)
` [PATCH v6 08/14] x86: Secure Launch kernel late boot stub

[PATCH v3 00/21] efi/x86: Avoid bare metal decompressor during EFI boot
 2023-05-23 10:06 UTC  (23+ messages)
` [PATCH v3 01/21] x86/efistub: Branch straight to kernel entry point from C code
` [PATCH v3 02/21] x86/efistub: Simplify and clean up handover entry code
` [PATCH v3 03/21] x86/decompressor: Avoid magic offsets for EFI handover entrypoint
` [PATCH v3 04/21] x86/efistub: Clear BSS in EFI handover protocol entrypoint
` [PATCH v3 05/21] x86/decompressor: Use proper sequence to take the address of the GOT
` [PATCH v3 06/21] x86/decompressor: Store boot_params pointer in callee save register
` [PATCH v3 07/21] x86/decompressor: Call trampoline as a normal function
` [PATCH v3 08/21] x86/decompressor: Use standard calling convention for trampoline
` [PATCH v3 09/21] x86/decompressor: Avoid the need for a stack in the 32-bit trampoline
` [PATCH v3 10/21] x86/decompressor: Call trampoline directly from C code
` [PATCH v3 11/21] x86/decompressor: Only call the trampoline when changing paging levels
` [PATCH v3 12/21] x86/decompressor: Merge trampoline cleanup with switching code
` [PATCH v3 13/21] x86/efistub: Perform 4/5 level paging switch from the stub
` [PATCH v3 14/21] x86/efistub: Prefer EFI memory attributes protocol over DXE services
` [PATCH v3 15/21] decompress: Use 8 byte alignment
` [PATCH v3 16/21] x86/decompressor: Move global symbol references to C code
` [PATCH v3 17/21] x86/decompressor: Factor out kernel decompression and relocation
` [PATCH v3 18/21] x86/head_64: Store boot_params pointer in callee-preserved register
` [PATCH v3 19/21] efi/libstub: Add limit argument to efi_random_alloc()
` [PATCH v3 20/21] x86/efistub: Check SEV/SNP support while running in the firmware
  ` [PATCH v3a "
` [PATCH v3 21/21] x86/efistub: Avoid legacy decompressor when doing EFI boot

[PATCH v4 1/3] efi: expose efivar generic ops register function
 2023-05-23  9:06 UTC  (3+ messages)
` [PATCH v4 2/3] efi: Add EFI_ACCESS_DENIED status code
` [PATCH v4 3/3] efi: Add tee-based EFI variable driver

[PATCH v3 3/3] efi: Add tee-based EFI variable driver
 2023-05-23  8:36 UTC  (3+ messages)

[PATCH v2 0/1] block: fix conversion of GPT partition name to 7-bit
 2023-05-23  7:54 UTC  (2+ messages)
` [PATCH v2 1/1] "

[efi:urgent] BUILD SUCCESS 3610dc36f4fd767c382e5f9b234d19d0610eb950
 2023-05-22 20:14 UTC 

[PATCH] efi/libstub: zboot: Avoid eager evaluation of objcopy flags
 2023-05-22 13:39 UTC  (2+ messages)

[PATCH v2 00/20] efi/x86: Avoid bare metal decompressor during EFI boot
 2023-05-22 13:35 UTC  (19+ messages)
` [PATCH v2 01/20] x86: decompressor: Use proper sequence to take the address of the GOT
` [PATCH v2 05/20] x86: decompressor: Avoid the need for a stack in the 32-bit trampoline
` [PATCH v2 15/20] x86: head_64: Switch to kernel CS before enabling memory encryption
` [PATCH v2 17/20] x86: efistub: Check SEV/SNP support while running in the firmware
` [PATCH v2 18/20] x86: efistub: Avoid legacy decompressor when doing EFI boot

W sprawie samochodu
 2023-05-22  8:15 UTC 

[PATCH] efi: fix missing prototype warnings
 2023-05-22  8:09 UTC  (2+ messages)

Fwd: Regression. -6.3.X Good. -6.4-rcY Bad
 2023-05-22  6:45 UTC  (4+ messages)
`  "

[efi:next] BUILD SUCCESS d86ff3333cb1d5f42d8898fb5fdb304e143c0237
 2023-05-18 10:46 UTC 

[PATCHv11 0/9] mm, x86/cc, efi: Implement support for unaccepted memory
 2023-05-17 18:50 UTC  (10+ messages)
` [PATCHv11 4/9] x86/boot/compressed: Handle "
` [PATCHv11 6/9] efi/unaccepted: Avoid load_unaligned_zeropad() stepping into "

[PATCH v2] efivarfs: expose used and total size
 2023-05-17 17:17 UTC  (2+ messages)

[PATCHv11 5/9] efi: Provide helpers for unaccepted memory
 2023-05-17 15:58 UTC  (3+ messages)
` [PATCHv11.1 5/9] efi: Add unaccepted memory support


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).