linux-efi.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2016-09-12 11:42:30 to 2016-10-13 13:56:30 UTC [more...]

[PATCH V3 00/10] Add UEFI 2.6 and ACPI 6.1 updates for RAS on ARM64
 2016-10-13 13:56 UTC  (26+ messages)
` [PATCH V3 01/10] acpi: apei: read ack upon ghes record consumption
` [PATCH V3 02/10] ras: acpi/apei: cper: generic error data entry v3 per ACPI 6.1
` [PATCH V3 04/10] arm64: exception: handle Synchronous External Abort
` [PATCH V3 06/10] acpi: apei: panic OS with fatal error status block
` [PATCH V3 08/10] ras: acpi / apei: generate trace event for unrecognized CPER section
  ` [PATCH V3 03/10] efi: parse ARMv8 processor error
  ` [PATCH V3 05/10] acpi: apei: handle SEA notification type for ARMv8
  ` [PATCH V3 07/10] efi: print unrecognized CPER section
  ` [PATCH V3 09/10] trace, ras: add ARM processor error trace event
` [PATCH V3 10/10] arm64: KVM: add guest SEA support

[RFC PATCH v1 00/28] x86: Secure Encrypted Virtualization (AMD)
 2016-10-13 11:19 UTC  (43+ messages)
` [RFC PATCH v1 01/28] kvm: svm: Add support for additional SVM NPF error codes
` [RFC PATCH v1 02/28] kvm: svm: Add kvm_fast_pio_in support
` [RFC PATCH v1 03/28] kvm: svm: Use the hardware provided GPA instead of page walk
` [RFC PATCH v1 04/28] x86: Secure Encrypted Virtualization (SEV) support
` [RFC PATCH v1 05/28] KVM: SVM: prepare for new bit definition in nested_ctl
` [RFC PATCH v1 09/28] x86/efi: Access EFI data as encrypted when SEV is active
` [RFC PATCH v1 19/28] KVM: SVM: prepare to reserve asid for SEV guest
` [RFC PATCH v1 20/28] KVM: SVM: prepare for SEV guest management API support
` [RFC PATCH v1 21/28] KVM: introduce KVM_SEV_ISSUE_CMD ioctl
` [RFC PATCH v1 22/28] KVM: SVM: add SEV launch start command
` [RFC PATCH v1 24/28] KVM: SVM: add SEV_LAUNCH_FINISH command

[patch] efi: fix an error code
 2016-10-13 10:59 UTC  (2+ messages)

[PATCH] efi: Use LocateHandleBuffer instead of LocateHandle
 2016-10-12 12:35 UTC  (10+ messages)

Хочу предложить услуги по подготовке статей
 2016-10-11  6:00 UTC 

[PATCH] arm64: mm: Fix memmap to be initialized for the entire section
 2016-10-10 15:33 UTC  (4+ messages)

[PATCH] efi/arm: fix absolute relocation detection for older toolchains
 2016-10-10  8:39 UTC  (7+ messages)

[PATCH 0/2] efi: add support for seeding the kernel RNG from UEFI
 2016-10-06 10:27 UTC  (3+ messages)
  ` [PATCH 1/2] efi: add support for seeding the RNG from a UEFI config table
  ` [PATCH 2/2] efi/arm*: libstub: invoke EFI_RNG_PROTOCOL to seed the UEFI RNG table

arm64: kernel BUG at mm/page_alloc.c:1844!
 2016-10-06  9:16 UTC  (2+ messages)

[PATCH] efifb: show framebuffer layout as device attributes
 2016-10-05 18:05 UTC  (5+ messages)

[PATCH 1/3 V2] efi/efi_test: use memdup_user() as a cleanup
 2016-10-05 10:37 UTC  (2+ messages)

[PATCH 0/3] efi_test: fix Coccinelle warning and CoverityScan issues
 2016-10-05  1:31 UTC  (10+ messages)
  ` [PATCH 1/3] efi/efi_test: use memdup_user() as a cleanup
  ` [PATCH 2/3] efi/efi_test: fix the uninitialized value datasize
  ` [PATCH 3/3] efi/efi_test: fix the uninitialized value rv

[PATCH -next v2] arm*/efi: efi_init error handling fix
 2016-10-03 19:51 UTC  (2+ messages)

[PATCH -next] efi: Remove unused including <linux/version.h>
 2016-10-03 19:41 UTC  (2+ messages)

Credit Suisse Bank England
 2016-10-03  6:21 UTC 

[RFC PATCH 0/3] efi: MMC proxy support for the UEFI varstore
 2016-09-29  0:13 UTC  (10+ messages)
  ` [RFC PATCH 1/3] efi/arm64: add SIMD stash/unstash operations
  ` [RFC PATCH 2/3] efi/arm: "
  ` [RFC PATCH 3/3] efi: implement MMC proxy support for the UEFI variable store

EFI co-maintainer
 2016-09-22  8:57 UTC  (6+ messages)

[PATCH 1/2] MAINTAINERS: add myself as EFI maintainer
 2016-09-21 15:44 UTC  (5+ messages)
` [PATCH 2/2] MAINTAINERS: add ARM and arm64 EFI specific files to EFI subsystem

[GIT PULL 0/2] EFI urgent fixes
 2016-09-20 15:27 UTC  (6+ messages)
` [PATCH 1/2] x86/mm/pat: Prevent hang during boot when mapping pages
` [PATCH 2/2] x86/efi: Only map RAM into EFI page tables if in mixed-mode

[GIT PULL] EFI fix for v4.9 queue
 2016-09-20 14:59 UTC  (3+ messages)
` [PATCH] x86/efi: Round EFI memmap reservations to EFI_PAGE_SIZE

[PATCH] x86/efi: Add necessary checks before iterating over efi.memmap
 2016-09-20  9:56 UTC  (5+ messages)

[PATCH] arm64/efi: efi_init error handling fix
 2016-09-19 12:29 UTC  (5+ messages)

Cannot load linux after recent efi-related changes
 2016-09-19 11:41 UTC  (5+ messages)

[tip regression] efi: Allow drivers to reserve boot services forever == toxic
 2016-09-19 11:15 UTC  (10+ messages)

[PATCH 2/3] efi: add firmware version information to sysfs
 2016-09-16 14:42 UTC  (10+ messages)
` [PATCH 1/3] efi: don't call the system table version the runtime services version
  ` [PATCH 3/3] efi: Format EFI version prints the way the standard says

[RFC PATCH v2 00/20] x86: Secure Memory Encryption (AMD)
 2016-09-16  7:11 UTC  (54+ messages)
` [RFC PATCH v2 07/20] x86: Provide general kernel support for memory encryption
` [RFC PATCH v2 10/20] x86: Insure that memory areas are encrypted when possible
` [RFC PATCH v2 11/20] mm: Access BOOT related data in the clear
` [RFC PATCH v2 12/20] x86: Add support for changing memory encryption attribute
` [RFC PATCH v2 13/20] x86: Decrypt trampoline area if memory encryption is active
` [RFC PATCH v2 14/20] x86: DMA support for memory encryption
` [RFC PATCH v2 15/20] iommu/amd: AMD IOMMU "
` [RFC PATCH v2 16/20] x86: Check for memory encryption on the APs
` [RFC PATCH v2 18/20] x86/kvm: Enable Secure Memory Encryption of nested page tables
` [RFC PATCH v2 19/20] x86: Access the setup data through debugfs un-encrypted
` [RFC PATCH v2 20/20] x86: Add support to make use of Secure Memory Encryption

[GIT PULL 00/29] EFI changes for v4.9
 2016-09-13 18:32 UTC  (4+ messages)

[PATCH v2 0/4] Apple device properties
 2016-09-13 11:29 UTC  (2+ messages)

[PATCH 0/6] Apple device properties
 2016-09-12 22:03 UTC  (7+ messages)
` [PATCH 2/6] ACPI / bus: Make acpi_get_first_physical_node() public
` [PATCH 4/6] driver core: Don't leak secondary fwnode on device removal


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).