linux-efi.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2017-07-17 21:10:06 to 2017-08-18 19:49:37 UTC [more...]

[GIT PULL 00/14] EFI changes for v4.14
 2017-08-18 19:49 UTC  (5+ messages)
` [PATCH 01/14] efi: arm: Don't mark ACPI reclaim memory as MEMBLOCK_NOMAP
` [PATCH 02/14] efi/libstub: arm64: use hidden attribute for struct screen_info reference
  ` [PATCH 03/14] efi/libstub: arm64: force 'hidden' visibility for section markers
` [PATCH 04/14] efi/libstub: arm64: set -fpie when building the EFI stub

[PATCH] Enable reset attack mitigation
 2017-08-18 19:29 UTC  (8+ messages)

[PATCH v9 0/2] x86/boot/KASLR: Restrict kernel to be randomized in mirror regions
 2017-08-18 15:10 UTC  (8+ messages)
` [PATCH v9 1/2] efi: Introduce efi_early_memdesc_ptr to get pointer to memmap descriptor
  ` [PATCH v10 "
` [PATCH v9 2/2] x86/boot/KASLR: Restrict kernel to be randomized in mirror regions

[PATCH 0/3] constify firmware attribute_group structures
 2017-08-18 14:36 UTC  (5+ messages)
` [PATCH 1/3] firmware: dcdbas: constify "
` [PATCH 2/3] firmware: efi: "
` [PATCH 3/3] firmware: efi: esrt: "

[RFC Part1 PATCH v3 00/17] x86: Secure Encrypted Virtualization (AMD)
 2017-08-17 19:35 UTC  (58+ messages)
` [RFC Part1 PATCH v3 02/17] x86/CPU/AMD: Add the Secure Encrypted Virtualization CPU feature
` [RFC Part1 PATCH v3 03/17] x86/mm: Secure Encrypted Virtualization (SEV) support
` [RFC Part1 PATCH v3 07/17] x86/mm: Include SEV for encryption memory attribute changes
` [RFC Part1 PATCH v3 08/17] x86/efi: Access EFI data as encrypted when SEV is active
` [RFC Part1 PATCH v3 10/17] resource: Provide resource struct in resource walk callback
` [RFC Part1 PATCH v3 11/17] x86/mm, resource: Use PAGE_KERNEL protection for ioremap of memory pages
` [RFC Part1 PATCH v3 13/17] x86/io: Unroll string I/O when SEV is active
` [RFC Part1 PATCH v3 15/17] x86: Add support for changing memory encryption attribute in early boot
` [RFC Part1 PATCH v3 16/17] X86/KVM: Provide support to create Guest and HV shared per-CPU variables
  ` [RFC Part1 PATCH v3 01/17] Documentation/x86: Add AMD Secure Encrypted Virtualization (SEV) descrption
  ` [RFC Part1 PATCH v3 04/17] x86/mm: Don't attempt to encrypt initrd under SEV
  ` [RFC Part1 PATCH v3 05/17] x86, realmode: Don't decrypt trampoline area "
  ` [RFC Part1 PATCH v3 06/17] x86/mm: Use encrypted access of boot related data with SEV
  ` [RFC Part1 PATCH v3 09/17] resource: Consolidate resource walking code
  ` [RFC Part1 PATCH v3 12/17] x86/mm: DMA support for SEV memory encryption
  ` [RFC Part1 PATCH v3 14/17] x86/boot: Add early boot support when running with SEV active
  ` [RFC Part1 PATCH v3 17/17] X86/KVM: Clear encryption attribute when SEV is active

[PATCH v5 0/2] Add EFI capsule pstore backend support
 2017-08-17 16:20 UTC  (3+ messages)

[PATCH 0/3] Use mm_struct and switch_mm() instead of manually
 2017-08-17 15:52 UTC  (16+ messages)
` [PATCH 1/3] efi: Use efi_mm in x86 as well as ARM
  ` [PATCH 2/3] x86/efi: Replace efi_pgd with efi_mm.pgd
` [PATCH 3/3] x86/efi: Use efi_switch_mm() rather than manually twiddling with cr3

[PATCH V15 00/11] Add UEFI 2.6 and ACPI 6.1 updates for RAS on ARM64
 2017-08-14  7:55 UTC  (3+ messages)
` [PATCH V15 06/11] acpi: apei: handle SEA notification type for ARMv8

[PATCH] x86/efi: page align EFI ROM image ranges
 2017-08-11 12:54 UTC  (6+ messages)
        ` [PATCH v2] "

(unknown),
 2017-08-10  9:38 UTC 

[PATCH v6 RESEND] x86/boot/KASLR: Restrict kernel to be randomized in mirror regions
 2017-08-04 12:02 UTC  (4+ messages)

[PATCH v8 0/2] x86/boot/KASLR: Restrict kernel to be randomized in mirror regions
 2017-08-04 10:43 UTC  (8+ messages)
` [PATCH v8 1/2] efi: Introduce efi_memdesc_ptr to get pointer to memmap descriptor
` [PATCH v8 2/2] x86/boot/KASLR: Restrict kernel to be randomized in mirror regions

[PATCH] x86/efi: page align EFI ROM image ranges
 2017-08-02 16:28 UTC 

[PATCH v1 0/6] uuid: Convert rest users to new API
 2017-07-31 17:20 UTC  (30+ messages)
` [PATCH v1 1/6] efi: Switch to use new generic UUID API
` [PATCH v1 3/6] staging: unisys: "
` [PATCH v1 4/6] vmbus: "
` [PATCH v1 5/6] uuid: Kill uapi/uuid.h
  ` [PATCH v1 2/6] mei: Switch to use new generic UUID API
  ` [PATCH v1 6/6] device property: "

[PATCH 4.12 26/84] x86/xen/efi: Initialize only the EFI struct members used by Xen
 2017-07-21  6:32 UTC  (12+ messages)
` [PATCH 4.12 27/84] efi: Process the MEMATTR table only if EFI_MEMMAP is enabled

[PATCH 4.11 38/88] efi: Process the MEMATTR table only if EFI_MEMMAP is enabled
 2017-07-19 10:08 UTC 

[PATCH v10 00/38] x86: Secure Memory Encryption (AMD)
 2017-07-18 14:02 UTC  (35+ messages)
` [PATCH v10 09/38] x86/mm: Simplify p[g4um]d_page() macros
` [PATCH v10 10/38] x86/mm: Provide general kernel support for memory encryption
` [PATCH v10 11/38] x86/mm: Add SME support for read_cr3_pa()
` [PATCH v10 12/38] x86/mm: Extend early_memremap() support with additional attrs
` [PATCH v10 13/38] x86/mm: Add support for early encrypt/decrypt of memory
` [PATCH v10 14/38] x86/mm: Insure that boot memory areas are mapped properly
` [PATCH v10 15/38] x86/boot/e820: Add support to determine the E820 type of an address
` [PATCH v10 16/38] efi: Add an EFI table address match function
` [PATCH v10 17/38] efi: Update efi_mem_type() to return an error rather than 0
` [PATCH v10 18/38] x86/efi: Update EFI pagetable creation to work with SME
` [PATCH v10 19/38] x86/mm: Add support to access boot related data in the clear
` [PATCH v10 20/38] x86, mpparse: Use memremap to map the mpf and mpc data
` [PATCH v10 21/38] x86/mm: Add support to access persistent memory in the clear
` [PATCH v10 22/38] x86/mm: Add support for changing the memory encryption attribute
` [PATCH v10 23/38] x86/realmode: Decrypt trampoline area if memory encryption is active
` [PATCH v10 24/38] x86, swiotlb: Add memory encryption support
` [PATCH v10 25/38] swiotlb: Add warnings for use of bounce buffers with SME
` [PATCH v10 26/38] x86/CPU/AMD: Make the microcode level available earlier in the boot
  ` [PATCH v10 27/38] iommu/amd: Allow the AMD IOMMU to work with memory encryption
` [PATCH v10 28/38] x86, realmode: Check for memory encryption on the APs
` [PATCH v10 29/38] x86, drm, fbdev: Do not specify encrypted memory for video mappings
` [PATCH v10 30/38] kvm: x86: svm: Support Secure Memory Encryption within KVM
` [PATCH v10 31/38] x86/mm, kexec: Allow kexec to be used with SME
` [PATCH v10 32/38] xen/x86: Remove SME feature in PV guests
` [PATCH v10 33/38] x86/mm: Use proper encryption attributes with /dev/mem
` [PATCH v10 34/38] x86/mm: Create native_make_p4d() for PGTABLE_LEVELS <= 4
` [PATCH v10 35/38] x86/mm: Add support to encrypt the kernel in-place
` [PATCH v10 36/38] x86/boot: Add early cmdline parsing for options with arguments
` [PATCH v10 37/38] compiler-gcc.h: Introduce __nostackp function attribute
` [PATCH v10 38/38] x86/mm: Add support to make use of Secure Memory Encryption


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).