linux-efi.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2017-02-21 19:39:28 to 2017-03-06 20:45:03 UTC [more...]

[PATCH V12 00/10] Add UEFI 2.6 and ACPI 6.1 updates for RAS on ARM64
 2017-03-06 20:45 UTC  (11+ messages)
` [PATCH V12 01/10] acpi: apei: read ack upon ghes record consumption
` [PATCH V12 02/10] ras: acpi/apei: cper: generic error data entry v3 per ACPI 6.1
` [PATCH V12 03/10] efi: parse ARM processor error
` [PATCH V12 04/10] arm64: exception: handle Synchronous External Abort
` [PATCH V12 05/10] acpi: apei: handle SEA notification type for ARMv8
` [PATCH V12 06/10] acpi: apei: panic OS with fatal error status block
` [PATCH V12 07/10] efi: print unrecognized CPER section
` [PATCH V12 08/10] ras: acpi / apei: generate trace event for "
` [PATCH V12 09/10] trace, ras: add ARM processor error trace event
` [PATCH V12 10/10] arm/arm64: KVM: add guest SEA support

[RFC PATCH v2 00/32] x86: Secure Encrypted Virtualization (AMD)
 2017-03-06 18:11 UTC  (45+ messages)
` [RFC PATCH v2 01/32] x86: Add the Secure Encrypted Virtualization CPU feature
` [RFC PATCH v2 02/32] x86: Secure Encrypted Virtualization (SEV) support
` [RFC PATCH v2 03/32] KVM: SVM: prepare for new bit definition in nested_ctl
` [RFC PATCH v2 04/32] KVM: SVM: Add SEV feature definitions to KVM
` [RFC PATCH v2 05/32] x86: Use encrypted access of BOOT related data with SEV
` [RFC PATCH v2 06/32] x86/pci: Use memremap when walking setup data
` [RFC PATCH v2 07/32] x86/efi: Access EFI data as encrypted when SEV is active
` [RFC PATCH v2 08/32] x86: Use PAGE_KERNEL protection for ioremap of memory page
` [RFC PATCH v2 09/32] x86: Change early_ioremap to early_memremap for BOOT data
` [RFC PATCH v2 10/32] x86: DMA support for SEV memory encryption
` [RFC PATCH v2 11/32] x86: Unroll string I/O when SEV is active
` [RFC PATCH v2 12/32] x86: Add early boot support when running with SEV active
` [RFC PATCH v2 13/32] KVM: SVM: Enable SEV by setting the SEV_ENABLE CPU feature
` [RFC PATCH v2 14/32] x86: mm: Provide support to use memblock when spliting large pages
` [RFC PATCH v2 15/32] x86: Add support for changing memory encryption attribute in early boot
` [RFC PATCH v2 16/32] x86: kvm: Provide support to create Guest and HV shared per-CPU variables
` [RFC PATCH v2 17/32] x86: kvmclock: Clear encryption attribute when SEV is active
` [RFC PATCH v2 18/32] kvm: svm: Use the hardware provided GPA instead of page walk
` [RFC PATCH v2 19/32] crypto: ccp: Introduce the AMD Secure Processor device
` [RFC PATCH v2 20/32] crypto: ccp: Add Platform Security Processor (PSP) interface support
` [RFC PATCH v2 21/32] crypto: ccp: Add Secure Encrypted Virtualization (SEV) "
` [RFC PATCH v2 22/32] kvm: svm: prepare to reserve asid for SEV guest
` [RFC PATCH v2 23/32] kvm: introduce KVM_MEMORY_ENCRYPT_OP ioctl
` [RFC PATCH v2 24/32] kvm: x86: prepare for SEV guest management API support
` [RFC PATCH v2 25/32] kvm: svm: Add support for SEV LAUNCH_START command
` [RFC PATCH v2 26/32] kvm: svm: Add support for SEV LAUNCH_UPDATE_DATA command
` [RFC PATCH v2 27/32] kvm: svm: Add support for SEV LAUNCH_FINISH command
` [RFC PATCH v2 28/32] kvm: svm: Add support for SEV GUEST_STATUS command
` [RFC PATCH v2 29/32] kvm: svm: Add support for SEV DEBUG_DECRYPT command
` [RFC PATCH v2 30/32] kvm: svm: Add support for SEV DEBUG_ENCRYPT command
` [RFC PATCH v2 31/32] kvm: svm: Add support for SEV LAUNCH_MEASURE command
` [RFC PATCH v2 32/32] x86: kvm: Pin the guest memory when SEV is active

[RFC PATCH v4 00/28] x86: Secure Memory Encryption (AMD)
 2017-03-06 18:04 UTC  (70+ messages)
` [RFC PATCH v4 05/28] x86: Add Secure Memory Encryption (SME) support
` [RFC PATCH v4 07/28] x86: Provide general kernel support for memory encryption
` [RFC PATCH v4 08/28] x86: Extend the early_memremap support with additional attrs
` [RFC PATCH v4 09/28] x86: Add support for early encryption/decryption of memory
` [RFC PATCH v4 10/28] x86: Insure that boot memory areas are mapped properly
` [RFC PATCH v4 11/28] x86: Add support to determine the E820 type of an address
` [RFC PATCH v4 13/28] efi: Update efi_mem_type() to return defined EFI mem types
` [RFC PATCH v4 14/28] Add support to access boot related data in the clear
` [RFC PATCH v4 16/28] x86: Add support for changing memory encryption attribute
` [RFC PATCH v4 18/28] x86: DMA support for memory encryption
` [RFC PATCH v4 19/28] swiotlb: Add warnings for use of bounce buffers with SME
` [RFC PATCH v4 21/28] x86: Check for memory encryption on the APs
` [RFC PATCH v4 26/28] x86: Allow kexec to be used with SME
` [RFC PATCH v4 27/28] x86: Add support to encrypt the kernel in-place
` [RFC PATCH v4 28/28] x86: Add support to make use of Secure Memory Encryption

[PATCH V11 00/10] Add UEFI 2.6 and ACPI 6.1 updates for RAS on ARM64
 2017-03-06 14:00 UTC  (26+ messages)
` [PATCH V11 01/10] acpi: apei: read ack upon ghes record consumption
` [PATCH V11 02/10] ras: acpi/apei: cper: generic error data entry v3 per ACPI 6.1
` [PATCH V11 03/10] efi: parse ARM processor error
` [PATCH V11 04/10] arm64: exception: handle Synchronous External Abort
  ` [PATCH V11 05/10] acpi: apei: handle SEA notification type for ARMv8
  ` [PATCH V11 08/10] ras: acpi / apei: generate trace event for unrecognized CPER section
` [PATCH V11 06/10] acpi: apei: panic OS with fatal error status block
` [PATCH V11 07/10] efi: print unrecognized CPER section
` [PATCH V11 09/10] trace, ras: add ARM processor error trace event
` [PATCH V11 10/10] arm/arm64: KVM: add guest SEA support

PROBLEM: Unexpected contents of load options (EFI Boot Stub)
 2017-03-04 15:45 UTC  (2+ messages)

the Mail Archive is now (again) subscribed to this list
 2017-03-04  9:24 UTC  (3+ messages)

[PATCH v2 0/2] capsule pstore backend
 2017-03-04  0:54 UTC  (14+ messages)
  ` [PATCH v2 1/2] efi/capsule: Add 'capsule' lookup support
  ` [PATCH v2 2/2] efi: capsule pstore backend

Multiple Acer laptops hang on ACPI poweroff
 2017-03-03 20:15 UTC 

[RFC PATCH V1 v4.10-rc3 1/1] acpi: apei: handle GSIV notification type
 2017-03-03 12:48 UTC  (8+ messages)

[PATCH v2] efi/libstub/arm*: Set default address and size cells values for an empty dtb
 2017-03-02 15:23 UTC  (8+ messages)

[PATCH] efi: arm: enable DMI/SMBIOS
 2017-03-01 23:24 UTC 

[PATCH v1 2/2] efi: capsule pstore backend
 2017-03-01 20:56 UTC  (2+ messages)

[PATCH v1 1/2] efi/capsule: Add 'capsule' lookup support
 2017-03-01 20:46 UTC  (3+ messages)

[GIT PULL 0/2] EFI fixes for v4.11-rc
 2017-03-01 19:05 UTC  (3+ messages)
  ` [PATCH 1/2] efi: libstub: Treat missing SecureBoot variable as S/B disabled
` [PATCH 2/2] efi: arm: Fix boot crash with CONFIG_CPUMASK_OFFSTACK=y

[PATCH 0/2] efi: Enhance capsule loader to support signed Quark images
 2017-03-01 14:55 UTC  (22+ messages)

[PATCH V2] x86/efi: Add missing 1:1 mappings to support buggy firmware
 2017-03-01  3:25 UTC  (4+ messages)

[PATCH] x86/efi: Add missing 1:1 mappings to support buggy firmware
 2017-02-28 11:36 UTC  (4+ messages)

[PATCH v2 1/2] x86/efi: don't allocate memmap through memblock after mm_init()
 2017-02-27 21:57 UTC  (6+ messages)
` [PATCH v2 2/2] efi: efi_mem_reserve(): don't reserve "

[PATCH 1/2] efi/esrt: Not having an ERST descriptor is not an error
 2017-02-27 10:08 UTC  (4+ messages)
  ` [PATCH 2/2] efi/efi_mem_desc_lookup: Not finding a "

CHARITY FOUNDATION
 2017-02-24 18:02 UTC 

[REGRESSION] EFI mixed mode patch triggers boot failure
 2017-02-23 23:02 UTC  (10+ messages)

[PATCH] efi: ARM/arm64: fix boot crash with CONFIG_CPUMASK_OFFSTACK=y
 2017-02-23 19:26 UTC 

RE:
 2017-02-23 15:09 UTC 

[PATCH V10 00/10] Add UEFI 2.6 and ACPI 6.1 updates for RAS on ARM64
 2017-02-22 10:13 UTC  (7+ messages)
` [PATCH V10 07/10] efi: print unrecognized CPER section

[PATCH v3 1/4] x86/mm: Adapt MODULES_END based on Fixmap section size
 2017-02-22  6:34 UTC  (10+ messages)
` [PATCH v3 4/4] KVM: VMX: Simplify segment_base


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).