messages from 2017-06-27 15:14:38 to 2017-07-26 10:03:03 UTC [more...]
[PATCH v1 0/6] uuid: Convert rest users to new API
2017-07-26 10:03 UTC (25+ messages)
` [PATCH v1 1/6] efi: Switch to use new generic UUID API
` [PATCH v1 3/6] staging: unisys: "
` [PATCH v1 4/6] vmbus: "
` [PATCH v1 5/6] uuid: Kill uapi/uuid.h
` [PATCH v1 2/6] mei: Switch to use new generic UUID API
` [PATCH v1 6/6] device property: "
[RFC Part1 PATCH v3 00/17] x86: Secure Encrypted Virtualization (AMD)
2017-07-26 4:28 UTC (29+ messages)
` [RFC Part1 PATCH v3 02/17] x86/CPU/AMD: Add the Secure Encrypted Virtualization CPU feature
` [RFC Part1 PATCH v3 03/17] x86/mm: Secure Encrypted Virtualization (SEV) support
` [RFC Part1 PATCH v3 01/17] Documentation/x86: Add AMD Secure Encrypted Virtualization (SEV) descrption
` [RFC Part1 PATCH v3 04/17] x86/mm: Don't attempt to encrypt initrd under SEV
` [RFC Part1 PATCH v3 05/17] x86, realmode: Don't decrypt trampoline area "
` [RFC Part1 PATCH v3 06/17] x86/mm: Use encrypted access of boot related data with SEV
` [RFC Part1 PATCH v3 09/17] resource: Consolidate resource walking code
` [RFC Part1 PATCH v3 12/17] x86/mm: DMA support for SEV memory encryption
` [RFC Part1 PATCH v3 14/17] x86/boot: Add early boot support when running with SEV active
` [RFC Part1 PATCH v3 17/17] X86/KVM: Clear encryption attribute when SEV is active
` [RFC Part1 PATCH v3 07/17] x86/mm: Include SEV for encryption memory attribute changes
` [RFC Part1 PATCH v3 08/17] x86/efi: Access EFI data as encrypted when SEV is active
` [RFC Part1 PATCH v3 10/17] resource: Provide resource struct in resource walk callback
` [RFC Part1 PATCH v3 11/17] x86/mm, resource: Use PAGE_KERNEL protection for ioremap of memory pages
` [RFC Part1 PATCH v3 13/17] x86/io: Unroll string I/O when SEV is active
` [RFC Part1 PATCH v3 15/17] x86: Add support for changing memory encryption attribute in early boot
` [RFC Part1 PATCH v3 16/17] X86/KVM: Provide support to create Guest and HV shared per-CPU variables
[PATCH 4.12 26/84] x86/xen/efi: Initialize only the EFI struct members used by Xen
2017-07-21 6:32 UTC (12+ messages)
` [PATCH 4.12 27/84] efi: Process the MEMATTR table only if EFI_MEMMAP is enabled
[PATCH 4.11 38/88] efi: Process the MEMATTR table only if EFI_MEMMAP is enabled
2017-07-19 10:08 UTC
[PATCH v10 00/38] x86: Secure Memory Encryption (AMD)
2017-07-18 14:02 UTC (43+ messages)
` [PATCH v10 01/38] x86: Document AMD Secure Memory Encryption (SME)
` [PATCH v10 02/38] x86/mm/pat: Set write-protect cache mode for full PAT support
` [PATCH v10 03/38] x86, mpparse, x86/acpi, x86/PCI, x86/dmi, SFI: Use memremap for RAM mappings
` [PATCH v10 04/38] x86/CPU/AMD: Add the Secure Memory Encryption CPU feature
` [PATCH v10 05/38] x86/CPU/AMD: Handle SME reduction in physical address size
` [PATCH v10 06/38] x86/mm: Add Secure Memory Encryption (SME) support
` [PATCH v10 07/38] x86/mm: Remove phys_to_virt() usage in ioremap()
` [PATCH v10 08/38] x86/mm: Add support to enable SME in early boot processing
` [PATCH v10 09/38] x86/mm: Simplify p[g4um]d_page() macros
` [PATCH v10 10/38] x86/mm: Provide general kernel support for memory encryption
` [PATCH v10 11/38] x86/mm: Add SME support for read_cr3_pa()
` [PATCH v10 12/38] x86/mm: Extend early_memremap() support with additional attrs
` [PATCH v10 13/38] x86/mm: Add support for early encrypt/decrypt of memory
` [PATCH v10 14/38] x86/mm: Insure that boot memory areas are mapped properly
` [PATCH v10 15/38] x86/boot/e820: Add support to determine the E820 type of an address
` [PATCH v10 16/38] efi: Add an EFI table address match function
` [PATCH v10 17/38] efi: Update efi_mem_type() to return an error rather than 0
` [PATCH v10 18/38] x86/efi: Update EFI pagetable creation to work with SME
` [PATCH v10 19/38] x86/mm: Add support to access boot related data in the clear
` [PATCH v10 20/38] x86, mpparse: Use memremap to map the mpf and mpc data
` [PATCH v10 21/38] x86/mm: Add support to access persistent memory in the clear
` [PATCH v10 22/38] x86/mm: Add support for changing the memory encryption attribute
` [PATCH v10 23/38] x86/realmode: Decrypt trampoline area if memory encryption is active
` [PATCH v10 24/38] x86, swiotlb: Add memory encryption support
` [PATCH v10 25/38] swiotlb: Add warnings for use of bounce buffers with SME
` [PATCH v10 26/38] x86/CPU/AMD: Make the microcode level available earlier in the boot
` [PATCH v10 27/38] iommu/amd: Allow the AMD IOMMU to work with memory encryption
` [PATCH v10 28/38] x86, realmode: Check for memory encryption on the APs
` [PATCH v10 29/38] x86, drm, fbdev: Do not specify encrypted memory for video mappings
` [PATCH v10 30/38] kvm: x86: svm: Support Secure Memory Encryption within KVM
` [PATCH v10 31/38] x86/mm, kexec: Allow kexec to be used with SME
` [PATCH v10 32/38] xen/x86: Remove SME feature in PV guests
` [PATCH v10 33/38] x86/mm: Use proper encryption attributes with /dev/mem
` [PATCH v10 34/38] x86/mm: Create native_make_p4d() for PGTABLE_LEVELS <= 4
` [PATCH v10 35/38] x86/mm: Add support to encrypt the kernel in-place
` [PATCH v10 36/38] x86/boot: Add early cmdline parsing for options with arguments
` [PATCH v10 37/38] compiler-gcc.h: Introduce __nostackp function attribute
` [PATCH v10 38/38] x86/mm: Add support to make use of Secure Memory Encryption
[PATCH v3] drivers/fbdev: efifb: allow BAR to be moved instead of claiming it
2017-07-14 13:48 UTC
[PATCH] efi: add gpt_overprovisioned kernel command line parameter
2017-07-13 22:21 UTC
[PATCH v2] drivers/fbdev: efifb: allow BAR to be moved instead of claiming it
2017-07-12 19:54 UTC (7+ messages)
[PATCH v9 00/38] x86: Secure Memory Encryption (AMD)
2017-07-11 15:44 UTC (55+ messages)
` [PATCH v9 01/38] x86: Document AMD Secure Memory Encryption (SME)
` [PATCH v9 02/38] x86/mm/pat: Set write-protect cache mode for full PAT support
` [PATCH v9 03/38] x86, mpparse, x86/acpi, x86/PCI, x86/dmi, SFI: Use memremap for RAM mappings
` [PATCH v9 04/38] x86/CPU/AMD: Add the Secure Memory Encryption CPU feature
` [PATCH v9 05/38] x86/CPU/AMD: Handle SME reduction in physical address size
` [PATCH v9 06/38] x86/mm: Add Secure Memory Encryption (SME) support
` [PATCH v9 07/38] x86/mm: Remove phys_to_virt() usage in ioremap()
` [PATCH v9 10/38] x86/mm: Provide general kernel support for memory encryption
` [PATCH v9 11/38] x86/mm: Add SME support for read_cr3_pa()
` [PATCH v9 12/38] x86/mm: Extend early_memremap() support with additional attrs
` [PATCH v9 17/38] efi: Update efi_mem_type() to return an error rather than 0
` [PATCH v9 22/38] x86/mm: Add support for changing the memory encryption attribute
` [PATCH v9 24/38] x86, swiotlb: Add memory encryption support
` [PATCH v9 25/38] swiotlb: Add warnings for use of bounce buffers with SME
` [PATCH v9 27/38] iommu/amd: Allow the AMD IOMMU to work with memory encryption
` [PATCH v9 33/38] x86/mm: Use proper encryption attributes with /dev/mem
` [PATCH v9 35/38] x86/mm: Add support to encrypt the kernel in-place
` [PATCH v9 37/38] compiler-gcc.h: Introduce __nostackp function attribute
` [PATCH v9 08/38] x86/mm: Add support to enable SME in early boot processing
` [PATCH v9 09/38] x86/mm: Simplify p[g4um]d_page() macros
` [PATCH v9 13/38] x86/mm: Add support for early encrypt/decrypt of memory
` [PATCH v9 14/38] x86/mm: Insure that boot memory areas are mapped properly
` [PATCH v9 15/38] x86/boot/e820: Add support to determine the E820 type of an address
` [PATCH v9 16/38] efi: Add an EFI table address match function
` [PATCH v9 18/38] x86/efi: Update EFI pagetable creation to work with SME
` [PATCH v9 19/38] x86/mm: Add support to access boot related data in the clear
` [PATCH v9 20/38] x86, mpparse: Use memremap to map the mpf and mpc data
` [PATCH v9 21/38] x86/mm: Add support to access persistent memory in the clear
` [PATCH v9 23/38] x86/realmode: Decrypt trampoline area if memory encryption is active
` [PATCH v9 26/38] x86/CPU/AMD: Make the microcode level available earlier in the boot
` [PATCH v9 28/38] x86, realmode: Check for memory encryption on the APs
` [PATCH v9 29/38] x86, drm, fbdev: Do not specify encrypted memory for video mappings
` [PATCH v9 30/38] kvm: x86: svm: Support Secure Memory Encryption within KVM
` [PATCH v9 31/38] x86/mm, kexec: Allow kexec to be used with SME
` [PATCH v9 32/38] xen/x86: Remove SME feature in PV guests
` [PATCH v9 34/38] x86/mm: Create native_make_p4d() for PGTABLE_LEVELS <= 4
` [PATCH v9 36/38] x86/boot: Add early cmdline parsing for options with arguments
` [PATCH v9 38/38] x86/mm: Add support to make use of Secure Memory Encryption
(unknown),
2017-07-09 20:52 UTC
[RFC PATCH v1] efivarfs: define integrity_read method
2017-07-06 18:10 UTC
[RFC PATCH] efivarfs: define integrity_read method
2017-07-06 12:45 UTC (2+ messages)
[PATCH 00/18] treewide: Move storage class before return type
2017-07-05 20:02 UTC (2+ messages)
` [PATCH 11/18] x86/efi: Move asmlinkage "
(unknown),
2017-07-04 22:53 UTC
[GIT PULL] EFI changes for v4.13
2017-07-03 8:00 UTC
[PATCH V17 00/11] Add UEFI 2.6 and ACPI 6.1 updates for RAS on ARM64
2017-06-30 16:47 UTC (4+ messages)
` [PATCH V17 01/11] acpi: apei: read ack upon ghes record consumption
[PATCH v2 0/7] ARM: efi: PE/COFF cleanup/hardening
2017-06-29 8:18 UTC (8+ messages)
` [PATCH v2 1/7] arm: efi: remove forbidden values from the PE/COFF header
` [PATCH v2 2/7] arm: efi: remove pointless dummy .reloc section
` [PATCH v2 3/7] arm: efi: replace open coded constants with symbolic ones
` [PATCH v2 4/7] arm: compressed: discard ksymtab/kcrctab sections
` [PATCH v2 5/7] arm: efi: split zImage code and data into separate PE/COFF sections
` [PATCH v2 6/7] arm: compressed: put zImage header and EFI header in dedicated section
` [PATCH v2 7/7] arm: efi: add PE/COFF debug table to EFI header
[PATCH v8 RESEND 00/38] x86: Secure Memory Encryption (AMD)
2017-06-28 14:05 UTC (6+ messages)
` [PATCH v8 RESEND 27/38] iommu/amd: Allow the AMD IOMMU to work with memory encryption
` [PATCH v8 RESEND 37/38] compiler-gcc.h: Introduce __nostackp function attribute
` [PATCH v8 RESEND 38/38] x86/mm: Add support to make use of Secure Memory Encryption
[PATCH] drivers/fbdev: efifb: allow BAR to be moved instead of claiming it
2017-06-27 20:03 UTC (4+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).