linux-efi.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2016-09-14 13:50:25 to 2016-10-18 14:33:14 UTC [more...]

[GIT PULL 0/8] EFI changes for v4.10
 2016-10-18 14:33 UTC  (5+ messages)
  ` [PATCH 1/8] MAINTAINERS: add myself as EFI maintainer
  ` [PATCH 2/8] efi: Remove unused including <linux/version.h>
  ` [PATCH 3/8] efi/arm*: efi_init() error handling fix
  ` [PATCH 4/8] efi/efi_test: Fix the uninitialized value datasize

[PATCH V3 00/10] Add UEFI 2.6 and ACPI 6.1 updates for RAS on ARM64
 2016-10-18 13:04 UTC  (38+ messages)
` [PATCH V3 01/10] acpi: apei: read ack upon ghes record consumption
` [PATCH V3 02/10] ras: acpi/apei: cper: generic error data entry v3 per ACPI 6.1
` [PATCH V3 04/10] arm64: exception: handle Synchronous External Abort
` [PATCH V3 06/10] acpi: apei: panic OS with fatal error status block
` [PATCH V3 08/10] ras: acpi / apei: generate trace event for unrecognized CPER section
  ` [PATCH V3 03/10] efi: parse ARMv8 processor error
  ` [PATCH V3 05/10] acpi: apei: handle SEA notification type for ARMv8
  ` [PATCH V3 07/10] efi: print unrecognized CPER section
  ` [PATCH V3 09/10] trace, ras: add ARM processor error trace event
` [PATCH V3 10/10] arm64: KVM: add guest SEA support

[PATCH] arm64: mm: Fix memmap to be initialized for the entire section
 2016-10-18 10:18 UTC  (6+ messages)

[PATCH] partitions/efi: Ignore errors when alternate GPT is not at the end of disk
 2016-10-18 10:07 UTC  (3+ messages)

[RFC PATCH v1 00/28] x86: Secure Encrypted Virtualization (AMD)
 2016-10-17 20:14 UTC  (44+ messages)
` [RFC PATCH v1 02/28] kvm: svm: Add kvm_fast_pio_in support
` [RFC PATCH v1 03/28] kvm: svm: Use the hardware provided GPA instead of page walk
` [RFC PATCH v1 04/28] x86: Secure Encrypted Virtualization (SEV) support
` [RFC PATCH v1 05/28] KVM: SVM: prepare for new bit definition in nested_ctl
` [RFC PATCH v1 09/28] x86/efi: Access EFI data as encrypted when SEV is active
` [RFC PATCH v1 19/28] KVM: SVM: prepare to reserve asid for SEV guest
` [RFC PATCH v1 20/28] KVM: SVM: prepare for SEV guest management API support
` [RFC PATCH v1 21/28] KVM: introduce KVM_SEV_ISSUE_CMD ioctl
` [RFC PATCH v1 22/28] KVM: SVM: add SEV launch start command
` [RFC PATCH v1 24/28] KVM: SVM: add SEV_LAUNCH_FINISH command

[PATCH v2 0/3] Apple device properties
 2016-10-17 10:57 UTC  (4+ messages)
  ` [PATCH v2 3/3] thunderbolt: Use Device ROM retrieved from EFI
  ` [PATCH v2 2/3] x86/efi: Retrieve and assign Apple device properties
  ` [PATCH v2 1/3] efi: Add device path parser

[patch] efi: fix an error code
 2016-10-13 10:59 UTC  (2+ messages)

[PATCH] efi: Use LocateHandleBuffer instead of LocateHandle
 2016-10-12 12:35 UTC  (10+ messages)

Хочу предложить услуги по подготовке статей
 2016-10-11  6:00 UTC 

[PATCH] efi/arm: fix absolute relocation detection for older toolchains
 2016-10-10  8:39 UTC  (7+ messages)

[PATCH 0/2] efi: add support for seeding the kernel RNG from UEFI
 2016-10-06 10:27 UTC  (3+ messages)
  ` [PATCH 1/2] efi: add support for seeding the RNG from a UEFI config table
  ` [PATCH 2/2] efi/arm*: libstub: invoke EFI_RNG_PROTOCOL to seed the UEFI RNG table

arm64: kernel BUG at mm/page_alloc.c:1844!
 2016-10-06  9:16 UTC  (2+ messages)

[PATCH] efifb: show framebuffer layout as device attributes
 2016-10-05 18:05 UTC  (5+ messages)

[PATCH 1/3 V2] efi/efi_test: use memdup_user() as a cleanup
 2016-10-05 10:37 UTC  (2+ messages)

[PATCH 0/3] efi_test: fix Coccinelle warning and CoverityScan issues
 2016-10-05  1:31 UTC  (10+ messages)
  ` [PATCH 1/3] efi/efi_test: use memdup_user() as a cleanup
  ` [PATCH 2/3] efi/efi_test: fix the uninitialized value datasize
  ` [PATCH 3/3] efi/efi_test: fix the uninitialized value rv

[PATCH -next v2] arm*/efi: efi_init error handling fix
 2016-10-03 19:51 UTC  (2+ messages)

[PATCH -next] efi: Remove unused including <linux/version.h>
 2016-10-03 19:41 UTC  (2+ messages)

Credit Suisse Bank England
 2016-10-03  6:21 UTC 

[RFC PATCH 0/3] efi: MMC proxy support for the UEFI varstore
 2016-09-29  0:13 UTC  (10+ messages)
  ` [RFC PATCH 1/3] efi/arm64: add SIMD stash/unstash operations
  ` [RFC PATCH 2/3] efi/arm: "
  ` [RFC PATCH 3/3] efi: implement MMC proxy support for the UEFI variable store

EFI co-maintainer
 2016-09-22  8:57 UTC  (6+ messages)

[PATCH 1/2] MAINTAINERS: add myself as EFI maintainer
 2016-09-21 15:44 UTC  (5+ messages)
` [PATCH 2/2] MAINTAINERS: add ARM and arm64 EFI specific files to EFI subsystem

[GIT PULL 0/2] EFI urgent fixes
 2016-09-20 15:27 UTC  (6+ messages)
` [PATCH 1/2] x86/mm/pat: Prevent hang during boot when mapping pages
` [PATCH 2/2] x86/efi: Only map RAM into EFI page tables if in mixed-mode

[GIT PULL] EFI fix for v4.9 queue
 2016-09-20 14:59 UTC  (3+ messages)
` [PATCH] x86/efi: Round EFI memmap reservations to EFI_PAGE_SIZE

[PATCH] x86/efi: Add necessary checks before iterating over efi.memmap
 2016-09-20  9:56 UTC  (3+ messages)

[PATCH] arm64/efi: efi_init error handling fix
 2016-09-19 12:29 UTC  (5+ messages)

Cannot load linux after recent efi-related changes
 2016-09-19 11:41 UTC  (5+ messages)

[tip regression] efi: Allow drivers to reserve boot services forever == toxic
 2016-09-19 11:15 UTC  (10+ messages)

[PATCH 2/3] efi: add firmware version information to sysfs
 2016-09-16 14:42 UTC  (7+ messages)
` [PATCH 1/3] efi: don't call the system table version the runtime services version
  ` [PATCH 3/3] efi: Format EFI version prints the way the standard says

[RFC PATCH v2 00/20] x86: Secure Memory Encryption (AMD)
 2016-09-16  7:11 UTC  (34+ messages)
` [RFC PATCH v2 10/20] x86: Insure that memory areas are encrypted when possible
` [RFC PATCH v2 11/20] mm: Access BOOT related data in the clear
` [RFC PATCH v2 15/20] iommu/amd: AMD IOMMU support for memory encryption
` [RFC PATCH v2 16/20] x86: Check for memory encryption on the APs
` [RFC PATCH v2 18/20] x86/kvm: Enable Secure Memory Encryption of nested page tables
` [RFC PATCH v2 19/20] x86: Access the setup data through debugfs un-encrypted
` [RFC PATCH v2 20/20] x86: Add support to make use of Secure Memory Encryption


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).