messages from 2017-05-19 20:32:09 to 2017-06-08 10:02:58 UTC [more...]
[PATCH] x86/efi: fix boot panic because of invalid bgrt image address
2017-06-08 10:02 UTC (3+ messages)
[PATCH v6 00/34] x86: Secure Memory Encryption (AMD)
2017-06-08 7:58 UTC (43+ messages)
` [PATCH v6 01/34] x86: Document AMD Secure Memory Encryption (SME)
` [PATCH v6 02/34] x86/mm/pat: Set write-protect cache mode for full PAT support
` [PATCH v6 03/34] x86, mpparse, x86/acpi, x86/PCI, x86/dmi, SFI: Use memremap for RAM mappings
` [PATCH v6 05/34] x86/CPU/AMD: Handle SME reduction in physical address size
` [PATCH v6 06/34] x86/mm: Add Secure Memory Encryption (SME) support
` [PATCH v6 14/34] x86/mm: Insure that boot memory areas are mapped properly
` [PATCH v6 15/34] x86/boot/e820: Add support to determine the E820 type of an address
` [PATCH v6 18/34] x86/efi: Update EFI pagetable creation to work with SME
` [PATCH v6 20/34] x86, mpparse: Use memremap to map the mpf and mpc data
` [PATCH v6 21/34] x86/mm: Add support to access persistent memory in the clear
` [PATCH v6 23/34] x86, realmode: Decrypt trampoline area if memory encryption is active
` [PATCH v6 25/34] swiotlb: Add warnings for use of bounce buffers with SME
` [PATCH v6 27/34] x86, realmode: Check for memory encryption on the APs
` [PATCH v6 31/34] x86/mm: Use proper encryption attributes with /dev/mem
` [PATCH v6 32/34] x86/mm: Add support to encrypt the kernel in-place
` [PATCH v6 04/34] x86/CPU/AMD: Add the Secure Memory Encryption CPU feature
` [PATCH v6 07/34] x86/mm: Don't use phys_to_virt in ioremap() if SME is active
` [PATCH v6 08/34] x86/mm: Add support to enable SME in early boot processing
` [PATCH v6 09/34] x86/mm: Simplify p[gum]d_page() macros
` [PATCH v6 10/34] x86, x86/mm, x86/xen, olpc: Use __va() against just the physical address in cr3
` [PATCH v6 11/34] x86/mm: Provide general kernel support for memory encryption
` [PATCH v6 12/34] x86/mm: Extend early_memremap() support with additional attrs
` [PATCH v6 13/34] x86/mm: Add support for early encrypt/decrypt of memory
` [PATCH v6 16/34] efi: Add an EFI table address match function
` [PATCH v6 17/34] efi: Update efi_mem_type() to return an error rather than 0
` [PATCH v6 19/34] x86/mm: Add support to access boot related data in the clear
` [PATCH v6 22/34] x86/mm: Add support for changing the memory encryption attribute
` [PATCH v6 24/34] x86, swiotlb: Add memory encryption support
` [PATCH v6 26/34] iommu/amd: Allow the AMD IOMMU to work with memory encryption
` [PATCH v6 28/34] x86, drm, fbdev: Do not specify encrypted memory for video mappings
` [PATCH v6 29/34] kvm: x86: svm: Support Secure Memory Encryption within KVM
` [PATCH v6 30/34] x86/mm, kexec: Allow kexec to be used with SME
` [PATCH v6 33/34] x86/boot: Add early cmdline parsing for options with arguments
` [PATCH v6 34/34] x86/mm: Add support to make use of Secure Memory Encryption
[PATCH V17 00/11] Add UEFI 2.6 and ACPI 6.1 updates for RAS on ARM64
2017-06-07 11:50 UTC (14+ messages)
` [PATCH V17 02/11] ras: acpi/apei: cper: add support for generic data v3 structure
` [PATCH V17 03/11] cper: add timestamp print to CPER status printing
` [PATCH V17 07/11] acpi: apei: panic OS with fatal error status block
` [PATCH V17 08/11] efi: print unrecognized CPER section
` [PATCH V17 09/11] ras: acpi / apei: generate trace event for "
` [PATCH V17 10/11] trace, ras: add ARM processor error trace event
` [PATCH V17 11/11] arm/arm64: KVM: add guest SEA support
PROBLEM: Kernel panic on EFI BGRT early init code (kernel 4.11/4.12rc2) [regression]
2017-06-07 8:57 UTC (11+ messages)
[PATCH 0/5] security, efi: Set lockdown if in secure boot mode
2017-06-06 9:34 UTC (23+ messages)
` [PATCH 1/5] efi: Move the x86 secure boot switch to generic code
` [PATCH 2/5] efi: Add EFI_SECURE_BOOT bit
` [PATCH 3/5] Add the ability to lock down access to the running kernel image
` [PATCH 4/5] efi: Lock down the kernel if booted in secure boot mode
` [PATCH 5/5] Add a sysrq option to exit "
[GIT PULL 00/13] First batch of EFI updates for v4.13
2017-06-05 16:14 UTC (24+ messages)
` [PATCH 02/13] efi/capsule: Fix return code on failing kmap/vmap
` [PATCH 04/13] efi/capsule: Clean up pr_err/info messages
` [PATCH 05/13] efi/capsule: Adjust return type of efi_capsule_setup_info
` [PATCH 06/13] efi/capsule-loader: Use a cached copy of the capsule header
` [PATCH 07/13] efi/capsule: Remove NULL test on kmap()
` [PATCH 08/13] efi/capsule-loader: Redirect calls to efi_capsule_setup_info via weak alias
` [PATCH 10/13] efi/capsule: Add support for Quark security header
` [PATCH 01/13] x86/efi: Clean up efi CR3 save/restore
` [PATCH 03/13] efi/capsule: Remove pr_debug on ENOMEM or EFAULT
` [PATCH 09/13] efi/capsule-loader: Use page addresses rather than struct page pointers
` [PATCH 11/13] efi/efi_test: Use memdup_user() helper
` [PATCH 12/13] x86/efi: Add EFI_PGT_DUMP support for x86_32 and kexec
` [PATCH 13/13] efi: arm: enable DMI/SMBIOS
[PATCH] efi: arm: Don't mark ACPI reclaim memory as MEMBLOCK_NOMAP
2017-06-05 9:08 UTC (2+ messages)
[GIT PULL] EFI fixes
2017-06-02 6:46 UTC
[PATCH v2] efi: arm: enable DMI/SMBIOS
2017-06-01 16:51 UTC (4+ messages)
[PATCH v5 00/32] x86: Secure Memory Encryption (AMD)
2017-05-31 15:48 UTC (55+ messages)
` [PATCH v5 17/32] x86/mm: Add support to access boot related data in the clear
` [PATCH v5 26/32] x86, drm, fbdev: Do not specify encrypted memory for video mappings
` [PATCH v5 28/32] x86/mm, kexec: Allow kexec to be used with SME
` [PATCH v5 29/32] x86/mm: Add support to encrypt the kernel in-place
` [PATCH v5 31/32] x86: Add sysfs support for Secure Memory Encryption
` [PATCH v5 32/32] x86/mm: Add support to make use of "
[PATCH 0/7] ARM: efi: PE/COFF cleanup/hardening
2017-05-30 18:36 UTC (8+ messages)
` [PATCH 1/7] arm: efi: remove forbidden values from the PE/COFF header
` [PATCH 2/7] arm: efi: remove pointless dummy .reloc section
` [PATCH 3/7] arm: efi: replace open coded constants with symbolic ones
` [PATCH 4/7] arm: compressed: discard ksymtab/kcrctab sections
` [PATCH 5/7] arm: efi: split zImage code and data into separate PE/COFF sections
` [PATCH 6/7] arm: compressed: put zImage header and EFI header in dedicated section
` [PATCH 7/7] arm: efi: add PE/COFF debug table to EFI header
Problem with new X.509 is_hash_blacklisted() interface
2017-05-30 10:37 UTC (2+ messages)
[GIT PULL 0/5] EFI urgent fixes
2017-05-26 11:36 UTC (6+ messages)
` [PATCH 1/5] efi: Don't issue error message when booted under xen
` [PATCH 2/5] efi: Remove duplicate 'const' specifiers
` [PATCH 3/5] x86/efi: Disable runtime services on kexec kernel if booted with efi=old_map
` [PATCH 4/5] x86/efi: Correct ident mapping of efi old_map when kalsr enabled
` [PATCH 5/5] efi/bgrt: Skip efi_bgrt_init in case of non-efi boot
[PATCH] efi/cper: Fix endianness of PCI class code
2017-05-26 10:45 UTC (17+ messages)
[PATCH v4] x86/efi: Correct ident mapping of efi old_map when kalsr enabled
2017-05-25 21:14 UTC (4+ messages)
[PATCH 4.11 00/28] 4.11.1-stable review
2017-05-25 20:06 UTC (4+ messages)
[PATCH v2] x86/efi: Disable runtime services on kexec kernel if booted with efi=old_map
2017-05-25 11:58 UTC (2+ messages)
[PATCH] efi/reboot: Fall back to original power-off method if EFI_RESET_SHUTDOWN returns
2017-05-25 11:11 UTC (3+ messages)
[PATCH 1/5] efi: Move the x86 secure boot switch to generic code
2017-05-24 14:04 UTC (4+ messages)
[PATCH] efi-pstore: Fix write/erase id tracking
2017-05-22 6:51 UTC (2+ messages)
[PATCH v3 3/3] arm/arm64: signal SIBGUS and inject SEA Error
2017-05-21 9:23 UTC (8+ messages)
[PATCH v3] efifb: avoid reconfiguration of BAR that covers the framebuffer
2017-05-20 8:19 UTC (4+ messages)
[GIT PULL 0/2] EFI fixes for v4.11
2017-05-19 22:04 UTC (6+ messages)
` [PATCH 2/2] efifb: Avoid reconfiguration of BAR that covers the framebuffer
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).