messages from 2016-04-25 13:54:09 to 2016-05-04 12:28:50 UTC [more...]
efi: Add 'capsule' update support
2016-05-04 12:28 UTC (5+ messages)
[PATCH] efi/capsule: Make efi_capsule_pending() lockless
2016-05-04 12:20 UTC (6+ messages)
[BUG] x86/efi: MMRs no longer properly mapped after switch to isolated page table
2016-05-04 10:36 UTC (17+ messages)
[GIT PULL 0/3] EFI urgent fixes
2016-05-04 10:29 UTC (8+ messages)
` [PATCH 1/3] MAINTAINERS: Remove asterisk from EFI directory names
` [PATCH 2/3] x86/sysfb_efi: Fix valid BAR address range check
` [PATCH 3/3] x86/efi-bgrt: Switch all pr_err() to pr_notice() for invalid BGRT
[PATCH v2] x86/efi-bgrt: Switch all pr_err() to pr_notice() for invalid BGRT
2016-05-03 20:16 UTC (4+ messages)
[RFC PATCH v1 00/18] x86: Secure Memory Encryption (AMD)
2016-05-03 15:59 UTC (53+ messages)
` [RFC PATCH v1 01/18] x86: Set the write-protect cache mode for AMD processors
` [RFC PATCH v1 02/18] x86: Secure Memory Encryption (SME) build enablement
` [RFC PATCH v1 03/18] x86: Secure Memory Encryption (SME) support
` [RFC PATCH v1 04/18] x86: Add the Secure Memory Encryption cpu feature
` [RFC PATCH v1 05/18] x86: Handle reduction in physical address size with SME
` [RFC PATCH v1 06/18] x86: Provide general kernel support for memory encryption
` [RFC PATCH v1 07/18] x86: Extend the early_memmap support with additional attrs
` [RFC PATCH v1 08/18] x86: Add support for early encryption/decryption of memory
` [RFC PATCH v1 09/18] x86: Insure that memory areas are encrypted when possible
` [RFC PATCH v1 10/18] x86/efi: Access EFI related tables in the clear
` [RFC PATCH v1 11/18] x86: Decrypt trampoline area if memory encryption is active
` [RFC PATCH v1 12/18] x86: Access device tree in the clear
` [RFC PATCH v1 13/18] x86: DMA support for memory encryption
` [RFC PATCH v1 14/18] iommu/amd: AMD IOMMU "
` [RFC PATCH v1 15/18] x86: Enable memory encryption on the APs
` [RFC PATCH v1 16/18] x86: Do not specify encrypted memory for VGA mapping
` [RFC PATCH v1 17/18] x86/kvm: Enable Secure Memory Encryption of nested page tables
` [RFC PATCH v1 18/18] x86: Add support to turn on Secure Memory Encryption
[PATCH] efivarfs: merge boolean flag arguments
2016-05-03 15:35 UTC (2+ messages)
[PATCH] efivarfs: make efivarfs_file_ioctl static
2016-05-03 14:56 UTC (2+ messages)
[RFC PATCH v2 00/10] ACPI overlays
2016-05-03 12:19 UTC (8+ messages)
` [RFC PATCH v2 05/10] i2c: add support for ACPI reconfigure notifications
` [RFC PATCH v2 06/10] spi: "
[PATCH 4.4 098/163] efi: Expose non-blocking set_variable() wrapper to efivars
2016-05-03 0:12 UTC
[PATCH 4.5 126/200] efi: Expose non-blocking set_variable() wrapper to efivars
2016-05-03 0:12 UTC
[PATCH] pstore: add lzo/lz4 compression support
2016-05-02 18:43 UTC (6+ messages)
` [PATCH v2] "
[PATCH] efibc: avoid stack overflow warning
2016-05-01 13:13 UTC (6+ messages)
[PATCH] x86/efi-bgrt: Switch all pr_err() to pr_debug() for invalid BGRT
2016-04-30 23:13 UTC (10+ messages)
[PATCH] block: partitions: efi: Always check for alternative GPT at end of drive
2016-04-27 21:44 UTC (15+ messages)
[PATCH v2 0/6] arm64/ARM pt dumper changes
2016-04-27 20:12 UTC (9+ messages)
` [PATCH v2 6/6] efi/arm*: add support to dump the EFI page tables
[RFC PATCH v1 00/18] x86: Secure Memory Encryption (AMD)
2016-04-26 22:47 UTC (11+ messages)
` [RFC PATCH v1 01/18] x86: Set the write-protect cache mode for AMD processors
` [RFC PATCH v1 02/18] x86: Secure Memory Encryption (SME) build enablement
` [RFC PATCH v1 03/18] x86: Secure Memory Encryption (SME) support
` [RFC PATCH v1 04/18] x86: Add the Secure Memory Encryption cpu feature
` [RFC PATCH v1 05/18] x86: Handle reduction in physical address size with SME
` [RFC PATCH v1 06/18] x86: Provide general kernel support for memory encryption
` [RFC PATCH v1 07/18] x86: Extend the early_memmap support with additional attrs
` [RFC PATCH v1 08/18] x86: Add support for early encryption/decryption of memory
` [RFC PATCH v1 09/18] x86: Insure that memory areas are encrypted when possible
` [RFC PATCH v1 10/18] x86/efi: Access EFI related tables in the clear
[GIT PULL 00/40] EFI changes for v4.7
2016-04-25 20:07 UTC (41+ messages)
` [PATCH 03/40] x86/mm/pat: Document the (currently) EFI-only code path
` [PATCH 04/40] efi/arm64: Report unexpected errors when determining Secure Boot status
` [PATCH 05/40] efi/arm64: Check SetupMode "
` [PATCH 06/40] efi: Iterate over efi.memmap in for_each_efi_memory_desc
` [PATCH 07/40] efi: Remove global 'memmap'
` [PATCH 08/40] efi: Check EFI_MEMORY_DESCRIPTOR version explicitly
` [PATCH 11/40] arm64: efi: Apply strict permissons for UEFI Runtime Services regions
` [PATCH 12/40] efi: Add support for the EFI_MEMORY_ATTRIBUTES_TABLE config table
` [PATCH 13/40] efi: Implement generic support for the Memory Attributes table
` [PATCH 16/40] x86/efi: Prepare GOP handling code for reuse as generic code
` [PATCH 17/40] efi/libstub: Move Graphics Output Protocol handling to "
` [PATCH 18/40] x86/efi: efifb: Move DMI based quirks handling out of "
` [PATCH 19/40] efifb: Use builtin_platform_driver and drop unused includes
` [PATCH 20/40] arm64/efi: libstub: Make screen_info accessible to the UEFI stub
` [PATCH 22/40] efi/arm*: libstub: Wire up GOP protocol to struct screen_info
` [PATCH 23/40] efi/arm*: Wire up struct screen_info to efi-framebuffer platform device
` [PATCH 24/40] efifb: Enable the efi-framebuffer platform driver for ARM and arm64
` [PATCH 01/40] efi: Get rid of EFI_SYSTEM_TABLES status bit
` [PATCH 02/40] efi/arm*: Drop writable mapping of the UEFI System table
` [PATCH 09/40] efi/arm*: Use memremap() to create the persistent memmap mapping
` [PATCH 10/40] ARM: efi: Apply strict permissons for UEFI Runtime Services regions
` [PATCH 14/40] efi/arm*: Take the Memory Attributes table into account
` [PATCH 15/40] x86/efi: Remove the always true EFI_DEBUG symbol
` [PATCH 21/40] efi/arm: libstub: Make screen_info accessible to the UEFI stub
` [PATCH 25/40] efibc: EFI Bootloader Control
` [PATCH 31/40] efi/runtime-wrappers: Add {__,}efi_call_virt templates
` [PATCH 32/40] arm64/efi: Move to generic {__,}efi_call_virt
` [PATCH 34/40] x86/efi: "
` [PATCH 35/40] efi/runtime-wrappers: Remove redundant ifdefs
` [PATCH 26/40] efi: Move efi_status_to_err() to drivers/firmware/efi/
` [PATCH 27/40] efi: Capsule update support
` [PATCH 28/40] x86/efi: Force EFI reboot to process pending capsules
` [PATCH 29/40] efi: A misc char interface to update EFI firmware
` [PATCH 30/40] efi/arm-init: Reserve rather than unmap the memory map for ARM as well
` [PATCH 33/40] arm/efi: Move to generic {__,}efi_call_virt
` [PATCH 36/40] efi/runtime-wrappers: Detect firmware irq flag corruption
` [PATCH 37/40] arm64/efi: Enable runtime call flag checking
` [PATCH 38/40] arm/efi: "
` [PATCH 39/40] x86/efi: "
` [PATCH 40/40] efi/runtime-wrappers: Remove ARCH_EFI_IRQ_FLAGS_MASK ifdef
[PATCHv3 0/5] efi: detect erroneous firmware IRQ manipulation
2016-04-25 16:03 UTC (13+ messages)
` [PATCHv3 1/5] efi/runtime-wrappers: detect FW irq flag corruption
` [PATCHv3 2/5] arm64/efi: enable runtime call flag checking
[GIT PULL] EFI urgent fix
2016-04-25 15:29 UTC (2+ messages)
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).