linux-efi.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2017-02-07 08:07:26 to 2017-02-16 19:42:13 UTC [more...]

[RFC PATCH v4 00/28] x86: Secure Memory Encryption (AMD)
 2017-02-16 19:42 UTC  (32+ messages)
` [RFC PATCH v4 03/28] x86: Add the Secure Memory Encryption CPU feature
` [RFC PATCH v4 04/28] x86: Handle reduction in physical address size with SME
` [RFC PATCH v4 06/28] x86: Add support to enable SME during early boot processing
` [RFC PATCH v4 07/28] x86: Provide general kernel support for memory encryption
` [RFC PATCH v4 11/28] x86: Add support to determine the E820 type of an address
` [RFC PATCH v4 14/28] Add support to access boot related data in the clear
` [RFC PATCH v4 15/28] Add support to access persistent memory "
` [RFC PATCH v4 16/28] x86: Add support for changing memory encryption attribute
` [RFC PATCH v4 17/28] x86: Decrypt trampoline area if memory encryption is active
` [RFC PATCH v4 19/28] swiotlb: Add warnings for use of bounce buffers with SME
` [RFC PATCH v4 20/28] iommu/amd: Disable AMD IOMMU if memory encryption is active
` [RFC PATCH v4 21/28] x86: Check for memory encryption on the APs
` [RFC PATCH v4 22/28] x86: Do not specify encrypted memory for video mappings
  ` [RFC PATCH v4 01/28] x86: Documentation for AMD Secure Memory Encryption (SME)
  ` [RFC PATCH v4 02/28] x86: Set the write-protect cache mode for full PAT support
  ` [RFC PATCH v4 05/28] x86: Add Secure Memory Encryption (SME) support
  ` [RFC PATCH v4 08/28] x86: Extend the early_memremap support with additional attrs
  ` [RFC PATCH v4 09/28] x86: Add support for early encryption/decryption of memory
  ` [RFC PATCH v4 10/28] x86: Insure that boot memory areas are mapped properly
  ` [RFC PATCH v4 12/28] efi: Add an EFI table address match function
  ` [RFC PATCH v4 13/28] efi: Update efi_mem_type() to return defined EFI mem types
  ` [RFC PATCH v4 18/28] x86: DMA support for memory encryption
  ` [RFC PATCH v4 23/28] x86/kvm: Enable Secure Memory Encryption of nested page tables
  ` [RFC PATCH v4 24/28] x86: Access the setup data through debugfs decrypted
  ` [RFC PATCH v4 25/28] x86: Access the setup data through sysfs decrypted
  ` [RFC PATCH v4 26/28] x86: Allow kexec to be used with SME
` [RFC PATCH v4 27/28] x86: Add support to encrypt the kernel in-place
` [RFC PATCH v4 28/28] x86: Add support to make use of Secure Memory Encryption

[PATCH V10 00/10] Add UEFI 2.6 and ACPI 6.1 updates for RAS on ARM64
 2017-02-16 18:32 UTC  (16+ messages)
` [PATCH V10 01/10] acpi: apei: read ack upon ghes record consumption
` [PATCH V10 02/10] ras: acpi/apei: cper: generic error data entry v3 per ACPI 6.1
` [PATCH V10 03/10] efi: parse ARM processor error
` [PATCH V10 04/10] arm64: exception: handle Synchronous External Abort
` [PATCH V10 05/10] acpi: apei: handle SEA notification type for ARMv8
` [PATCH V10 06/10] acpi: apei: panic OS with fatal error status block
` [PATCH V10 07/10] efi: print unrecognized CPER section
` [PATCH V10 08/10] ras: acpi / apei: generate trace event for "
` [PATCH V10 09/10] trace, ras: add ARM processor error trace event
` [PATCH V10 10/10] arm/arm64: KVM: add guest SEA support

[PATCH v2] efi: libstub: treat missing SecureBoot variable as S/B disabled
 2017-02-16 18:08 UTC 

[PATCH] efi: libstub: treat missing SecureBoot/SetupMode vars as SB disabled
 2017-02-16 17:59 UTC  (2+ messages)

[PATCH] efi: bgrt: add missing 'return 0' to acpi_parse_bgrt() non-ACPI stub
 2017-02-16 17:38 UTC 

[efi:next 24/24] include/linux/efi-bgrt.h:18:49: warning: no return statement in function returning non-void
 2017-02-16 17:12 UTC 

[PATCH 0/2] RFC: Move efi bgrt code out of arch/x86
 2017-02-16 11:58 UTC  (7+ messages)
  ` [PATCH 1/2] x86/efi-bgrt: Move efi-bgrt handling "
` [PATCH 2/2] bgrt: Make ACPI BGRT parsing code common for ARCHs

EFI stub kexec probelm
 2017-02-16  8:05 UTC 

[PATCH 0/2] efi: Enhance capsule loader to support signed Quark images
 2017-02-16  7:29 UTC  (11+ messages)
` [PATCH 1/2] efi/capsule: Prepare for loading images with security header
` [PATCH 2/2] efi/capsule: Add support for Quark "

[PATCH v3 1/4] x86/mm: Adapt MODULES_END based on Fixmap section size
 2017-02-15 21:08 UTC  (12+ messages)
` [PATCH v3 2/4] x86: Remap GDT tables in the Fixmap section
` [PATCH v3 3/4] x86: Make the GDT remapping read-only on 64-bit
` [PATCH v3 4/4] KVM: VMX: Simplify segment_base

[PATCH V9 00/10] Add UEFI 2.6 and ACPI 6.1 updates for RAS on ARM64
 2017-02-15 20:52 UTC  (14+ messages)
` [PATCH V9 01/10] acpi: apei: read ack upon ghes record consumption
` [PATCH V9 02/10] ras: acpi/apei: cper: generic error data entry v3 per ACPI 6.1
` [PATCH V9 03/10] efi: parse ARM processor error
` [PATCH V9 04/10] arm64: exception: handle Synchronous External Abort
` [PATCH V9 05/10] acpi: apei: handle SEA notification type for ARMv8
` [PATCH V9 06/10] acpi: apei: panic OS with fatal error status block
` [PATCH V9 07/10] efi: print unrecognized CPER section
` [PATCH V9 08/10] ras: acpi / apei: generate trace event for "
` [PATCH V9 09/10] trace, ras: add ARM processor error trace event
` [PATCH V9 10/10] arm/arm64: KVM: add guest SEA support

[PATCH v2 1/2] efi: arm-stub: Correct FDT and initrd allocation rules for arm64
 2017-02-15 17:29 UTC  (10+ messages)
` [PATCH v2 2/2] efi: arm-stub: Round up FDT allocation to mapping size

[PATCH V8 00/10] Add UEFI 2.6 and ACPI 6.1 updates for RAS on ARM64
 2017-02-15 17:07 UTC  (14+ messages)
` [PATCH V8 05/10] acpi: apei: handle SEA notification type for ARMv8
` [PATCH V8 06/10] acpi: apei: panic OS with fatal error status block
` [PATCH V8 08/10] ras: acpi / apei: generate trace event for unrecognized CPER section

[PATCH V2] x86/efi: Add missing 1:1 mappings to support buggy firmware
 2017-02-15  4:03 UTC 

[PATCH] x86/efi: Add missing 1:1 mappings to support buggy firmware
 2017-02-15  3:42 UTC  (3+ messages)

[PATCH] x86/efi: Clean up efi CR3 save/restore
 2017-02-14 21:03 UTC  (2+ messages)

[PATCH] efi/libstub/arm*: Set default address and size cells values for an empty dtb
 2017-02-13 20:55 UTC  (20+ messages)

KLIENTSKIE BAZI +79139230330 Skype: prodawez390 Email: prodawez393-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org UZNAITE PODROBNEE!!!
 2017-02-10 23:49 UTC 

[PATCH v2 00/14] arm64+ARM: efi: PE/COFF cleanup/hardening
 2017-02-10 14:31 UTC  (23+ messages)
` [PATCH v2 01/14] include: pe.h: allow for use in assembly
` [PATCH v2 02/14] include: pe.h: add some missing definitions
` [PATCH v2 03/14] arm64: efi: move EFI header and related data to a separate .S file
` [PATCH v2 04/14] arm64: efi: clean up Image header after PE header has been split off
` [PATCH v2 05/14] arm64: efi: remove forbidden values from the PE/COFF header
` [PATCH v2 06/14] arm64: efi: remove pointless dummy .reloc section
` [PATCH v2 07/14] arm64: efi: replace open coded constants with symbolic ones
` [PATCH v2 08/14] arm64: efi: split Image code and data into separate PE/COFF sections
` [PATCH v2 09/14] arm: compressed: put zImage header and EFI header in dedicated section
` [PATCH v2 10/14] arm: efi: remove forbidden values from the PE/COFF header
` [PATCH v2 11/14] arm: efi: remove pointless dummy .reloc section
` [PATCH v2 12/14] arm: efi: replace open coded constants with symbolic ones
` [PATCH v2 13/14] arm: efi: split zImage code and data into separate PE/COFF sections
` [PATCH v2 14/14] arm: efi: add PE/COFF debug table to EFI header

[PATCH] efi: arm-stub: Correct FDT and initrd allocation rules for arm64
 2017-02-10  0:28 UTC  (12+ messages)

[PATCH] efi/esrt: cleanup bad memory map log messages
 2017-02-09 11:30 UTC  (6+ messages)

[PATCH v3 00/10] arm64: UEFI support
 2017-02-08 17:40 UTC  (10+ messages)
` [PATCH v3 06/10] arm64: efi: add EFI stub

[PATCH v2] efi/libstub/arm*: Set default address and size cells values for an empty dtb
 2017-02-07 21:19 UTC 

[PATCH 4.9 03/66] x86/efi: Always map the first physical page into the EFI pagetables
 2017-02-07 12:58 UTC  (2+ messages)
` [PATCH 4.9 04/66] efi/fdt: Avoid FDT manipulation after ExitBootServices()

[GIT PULL 0/7] EFI updates for v4.11 part 2
 2017-02-07  9:42 UTC  (6+ messages)
` [PATCH 3/7] efi: Add SHIM and image security database GUID definitions


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).