messages from 2016-04-26 22:55:53 to 2016-05-14 19:20:47 UTC [more...]
[GIT PULL 0/5] EFI changes for v4.7
2016-05-14 19:20 UTC (11+ messages)
` [PATCH 1/5] efi/capsule: Make efi_capsule_pending() lockless
` [PATCH 2/5] efibc: Fix excessive stack footprint warning
` [PATCH 3/5] efi/capsule: Move 'capsule' to the stack in efi_capsule_supported()
` [PATCH 4/5] efi: Merge boolean flag arguments
` [PATCH 5/5] efivarfs: Make efivarfs_file_ioctl static
[GIT PULL] EFI ARM Xen support
2016-05-14 19:04 UTC
[PATCH v2] Xen: EFI: Parse DT parameters for Xen specific UEFI
2016-05-13 22:09 UTC (2+ messages)
[GIT PULL] EFI urgent fix
2016-05-13 20:34 UTC (2+ messages)
` [PATCH] x86/efi: Fix 7th argument to efi_call
[patch added to 3.12-stable] MAINTAINERS: Remove asterisk from EFI directory names
2016-05-13 13:09 UTC (2+ messages)
` [patch added to 3.12-stable] x86/sysfb_efi: Fix valid BAR address range check
[PATCH v2 0/6] arm64/ARM pt dumper changes
2016-05-13 12:56 UTC (10+ messages)
` [PATCH v2 4/6] arm64: mm: dump: make page table dumping reusable
` [PATCH v2 6/6] efi/arm*: add support to dump the EFI page tables
[RFC PATCH v1 00/18] x86: Secure Memory Encryption (AMD)
2016-05-12 18:20 UTC (60+ messages)
` [RFC PATCH v1 01/18] x86: Set the write-protect cache mode for AMD processors
` [RFC PATCH v1 02/18] x86: Secure Memory Encryption (SME) build enablement
` [RFC PATCH v1 03/18] x86: Secure Memory Encryption (SME) support
` [RFC PATCH v1 04/18] x86: Add the Secure Memory Encryption cpu feature
` [RFC PATCH v1 05/18] x86: Handle reduction in physical address size with SME
` [RFC PATCH v1 06/18] x86: Provide general kernel support for memory encryption
` [RFC PATCH v1 07/18] x86: Extend the early_memmap support with additional attrs
` [RFC PATCH v1 08/18] x86: Add support for early encryption/decryption of memory
` [RFC PATCH v1 09/18] x86: Insure that memory areas are encrypted when possible
` [RFC PATCH v1 10/18] x86/efi: Access EFI related tables in the clear
` [RFC PATCH v1 11/18] x86: Decrypt trampoline area if memory encryption is active
` [RFC PATCH v1 12/18] x86: Access device tree in the clear
` [RFC PATCH v1 13/18] x86: DMA support for memory encryption
` [RFC PATCH v1 14/18] iommu/amd: AMD IOMMU "
` [RFC PATCH v1 15/18] x86: Enable memory encryption on the APs
` [RFC PATCH v1 16/18] x86: Do not specify encrypted memory for VGA mapping
` [RFC PATCH v1 17/18] x86/kvm: Enable Secure Memory Encryption of nested page tables
` [RFC PATCH v1 18/18] x86: Add support to turn on Secure Memory Encryption
[RFC PATCH 0/2] Fix EFI runtime calls on SGI UV
2016-05-12 12:06 UTC (10+ messages)
` [PATCH 1/2] Create UV efi_call macros
` [PATCH 2/2] Fix efi_call
[PATCH] Xen: EFI: Parse DT parameters for Xen specific UEFI
2016-05-12 10:58 UTC (9+ messages)
[BUG] x86/efi: MMRs no longer properly mapped after switch to isolated page table
2016-05-10 17:35 UTC (20+ messages)
[PATCH 3.19.y-ckt 40/54] MAINTAINERS: Remove asterisk from EFI directory names
2016-05-10 0:05 UTC (2+ messages)
` [PATCH 3.19.y-ckt 42/54] x86/sysfb_efi: Fix valid BAR address range check
[3.19.y-ckt stable] Patch "x86/sysfb_efi: Fix valid BAR address range check" has been added to the 3.19.y-ckt tree
2016-05-10 0:03 UTC
[3.19.y-ckt stable] Patch "MAINTAINERS: Remove asterisk from EFI directory names" has been added to the 3.19.y-ckt tree
2016-05-10 0:03 UTC
[PATCH 4.2.y-ckt 39/59] MAINTAINERS: Remove asterisk from EFI directory names
2016-05-09 19:56 UTC (2+ messages)
` [PATCH 4.2.y-ckt 42/59] x86/sysfb_efi: Fix valid BAR address range check
[4.2.y-ckt stable] Patch "x86/sysfb_efi: Fix valid BAR address range check" has been added to the 4.2.y-ckt tree
2016-05-09 19:44 UTC
[4.2.y-ckt stable] Patch "MAINTAINERS: Remove asterisk from EFI directory names" has been added to the 4.2.y-ckt tree
2016-05-09 19:44 UTC
[RFC PATCH v2 00/10] ACPI overlays
2016-05-09 9:59 UTC (12+ messages)
` [RFC PATCH v2 05/10] i2c: add support for ACPI reconfigure notifications
` [RFC PATCH v2 06/10] spi: "
` [RFC PATCH v2 07/10] efi: load SSTDs from EFI variables
[PATCH 4.5 59/88] MAINTAINERS: Remove asterisk from EFI directory names
2016-05-09 7:21 UTC (2+ messages)
` [PATCH 4.5 65/88] x86/sysfb_efi: Fix valid BAR address range check
[PATCH 4.4 41/67] MAINTAINERS: Remove asterisk from EFI directory names
2016-05-09 7:18 UTC (2+ messages)
` [PATCH 4.4 47/67] x86/sysfb_efi: Fix valid BAR address range check
[PATCH 3.14 15/23] MAINTAINERS: Remove asterisk from EFI directory names
2016-05-09 7:17 UTC (2+ messages)
` [PATCH 3.14 17/23] x86/sysfb_efi: Fix valid BAR address range check
[PATCH] efi/capsule: Make efi_capsule_pending() lockless
2016-05-06 1:32 UTC (12+ messages)
[GIT PULL v2] EFI urgent fix
2016-05-05 13:14 UTC (2+ messages)
` [PATCH] x86/sysfb_efi: Fix valid BAR address range check
Support for generating and verifying the signature of memory snapshot image
2016-05-05 5:50 UTC
[GIT PULL 0/3] EFI urgent fixes
2016-05-04 15:43 UTC (9+ messages)
` [PATCH 1/3] MAINTAINERS: Remove asterisk from EFI directory names
` [PATCH 2/3] x86/sysfb_efi: Fix valid BAR address range check
` [PATCH 3/3] x86/efi-bgrt: Switch all pr_err() to pr_notice() for invalid BGRT
efi: Add 'capsule' update support
2016-05-04 12:28 UTC (5+ messages)
[PATCH v2] x86/efi-bgrt: Switch all pr_err() to pr_notice() for invalid BGRT
2016-05-03 20:16 UTC (4+ messages)
[PATCH] efivarfs: merge boolean flag arguments
2016-05-03 15:35 UTC (2+ messages)
[PATCH] efivarfs: make efivarfs_file_ioctl static
2016-05-03 14:56 UTC (2+ messages)
[PATCH 4.4 098/163] efi: Expose non-blocking set_variable() wrapper to efivars
2016-05-03 0:12 UTC
[PATCH 4.5 126/200] efi: Expose non-blocking set_variable() wrapper to efivars
2016-05-03 0:12 UTC
[PATCH] pstore: add lzo/lz4 compression support
2016-05-02 18:43 UTC (6+ messages)
` [PATCH v2] "
[PATCH] efibc: avoid stack overflow warning
2016-05-01 13:13 UTC (6+ messages)
[PATCH] x86/efi-bgrt: Switch all pr_err() to pr_debug() for invalid BGRT
2016-04-30 23:13 UTC (10+ messages)
[PATCH] block: partitions: efi: Always check for alternative GPT at end of drive
2016-04-27 21:44 UTC (11+ messages)
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).