linux-efi.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2021-03-28 21:23:36 to 2021-06-08 18:06:41 UTC [more...]

[PATCH v3 0/5] Add Guest API & Guest Kernel support for SEV live migration
 2021-06-08 18:06 UTC  (4+ messages)
` [PATCH v3 1/5] KVM: X86: Introduce KVM_HC_MAP_GPA_RANGE hypercall
` [PATCH v3 2/5] KVM: x86: invert KVM_HYPERCALL to default to VMMCALL
` [PATCH v3 3/5] mm: x86: Invoke hypercall when page encryption status is changed

[PATCH Part1 RFC v3 00/22] Add AMD Secure Nested Paging (SEV-SNP) Guest Support
 2021-06-08 17:35 UTC  (39+ messages)
` [PATCH Part1 RFC v3 01/22] x86/sev: shorten GHCB terminate macro names
` [PATCH Part1 RFC v3 02/22] x86/sev: Define the Linux specific guest termination reasons
` [PATCH Part1 RFC v3 03/22] x86/sev: Save the negotiated GHCB version
` [PATCH Part1 RFC v3 04/22] x86/mm: Add sev_feature_enabled() helper
` [PATCH Part1 RFC v3 05/22] x86/sev: Add support for hypervisor feature VMGEXIT
` [PATCH Part1 RFC v3 06/22] x86/sev: check SEV-SNP features support
` [PATCH Part1 RFC v3 07/22] x86/sev: Add a helper for the PVALIDATE instruction
` [PATCH Part1 RFC v3 08/22] x86/compressed: Add helper for validating pages in the decompression stage
` [PATCH Part1 RFC v3 09/22] x86/compressed: Register GHCB memory when SEV-SNP is active
` [PATCH Part1 RFC v3 10/22] x86/sev: "
` [PATCH Part1 RFC v3 11/22] x86/sev: Add helper for validating pages in early enc attribute changes
` [PATCH Part1 RFC v3 12/22] x86/kernel: Make the bss.decrypted section shared in RMP table
` [PATCH Part1 RFC v3 13/22] x86/kernel: Validate rom memory before accessing when SEV-SNP is active
` [PATCH Part1 RFC v3 14/22] x86/mm: Add support to validate memory when changing C-bit
` [PATCH Part1 RFC v3 15/22] KVM: SVM: define new SEV_FEATURES field in the VMCB Save State Area
` [PATCH Part1 RFC v3 16/22] KVM: SVM: Create a separate mapping for the SEV-ES save area
` [PATCH Part1 RFC v3 17/22] KVM: SVM: Create a separate mapping for the GHCB "
` [PATCH Part1 RFC v3 18/22] KVM: SVM: Update the SEV-ES save area mapping
` [PATCH Part1 RFC v3 19/22] x86/sev-snp: SEV-SNP AP creation support
` [PATCH Part1 RFC v3 20/22] x86/boot: Add Confidential Computing address to setup_header
` [PATCH Part1 RFC v3 21/22] x86/sev: Register SNP guest request platform device
` [PATCH Part1 RFC v3 22/22] virt: Add SEV-SNP guest driver

[PATCH v10 0/7] Enable Linux guests on Hyper-V on ARM64
 2021-06-08 15:36 UTC  (20+ messages)
` [PATCH v10 1/7] asm-generic: hyperv: Fix incorrect architecture dependencies
` [PATCH v10 2/7] arm64: hyperv: Add Hyper-V hypercall and register access utilities
` [PATCH v10 3/7] arm64: hyperv: Add Hyper-V clocksource/clockevent support
` [PATCH v10 4/7] arm64: hyperv: Add kexec and panic handlers
` [PATCH v10 5/7] arm64: hyperv: Initialize hypervisor on boot
` [PATCH v10 6/7] arm64: efi: Export screen_info
` [PATCH v10 7/7] Drivers: hv: Enable Hyper-V code to be built on ARM64

[PATCH v1 0/2] firmware: dmi_scan: Make it work in kexec'ed kernel
 2021-06-08 12:38 UTC  (7+ messages)

[PATCH v2 0/2] allow simple{fb,drm} drivers to be used on non-x86 EFI platforms
 2021-06-04 13:22 UTC  (5+ messages)
` [PATCH v2 1/2] drivers/firmware: move x86 Generic System Framebuffers support

[PATCH 0/3] x86/setup: always resrve the first 1M of RAM
 2021-06-03 17:57 UTC  (8+ messages)
` [PATCH 1/3] x86/setup: always reserve "
` [PATCH 2/3] x86/setup: remove CONFIG_X86_RESERVE_LOW and reservelow options
` [PATCH 3/3] x86/crash: remove crash_reserve_low_1M()

[PATCH v1 2/2] firmware: dmi_scan: Pass dmi_entry_point to kexec'ed kernel
 2021-06-02  8:53 UTC  (7+ messages)

[PATCH v2 2/2] drivers/firmware: consolidate EFI framebuffer setup for all arches
 2021-06-01 15:00 UTC 

[PATCH v2] x86/efi: unconditionally hold the whole low-1MB memory regions
 2021-05-31 14:26 UTC  (7+ messages)

[PATCH 2/2] drivers/firmware: consolidate EFI framebuffer setup for all arches
 2021-05-28  8:03 UTC  (3+ messages)

[RFC PATCH 0/3] Allow access to confidential computing secret area
 2021-05-24 17:12 UTC  (16+ messages)
` [RFC PATCH 1/3] efi/libstub: Copy "
` [RFC PATCH 2/3] efi: Reserve "
` [RFC PATCH 3/3] virt: Add sev_secret module to expose confidential computing secrets

[PATCH 0/2] allow the sysfb support to be used in non-x86 arches
 2021-05-24 10:52 UTC  (4+ messages)
` [PATCH 1/2] drivers/firmware: move x86 Generic System Framebuffers support

[PATCH] x86/efi: Do not release sub-1MB memory regions when the crashkernel option is specified
 2021-05-24  8:32 UTC  (10+ messages)

[GIT PULL] EFI fixes for v5.13-rc
 2021-05-23  9:42 UTC  (4+ messages)
` [GIT PULL] EFI updates for v5.14

[efi:next] BUILD SUCCESS bb11580f61b6c4ba5c35706abd927c8ac8c32852
 2021-05-23  1:07 UTC 

[efi:urgent] BUILD SUCCESS 942859d969de7f6f7f2659a79237a758b42782da
 2021-05-23  1:07 UTC 

[PATCH] x86/efi: Log 32/64-bit mismatch with kernel as an error
 2021-05-22 12:09 UTC  (2+ messages)

[PATCH] arm64: efi: add check for broken efi poweroff
 2021-05-19 14:20 UTC  (6+ messages)

[PATCH v6 2/2] eif/capsule-pstore: Add capsule pstore backend
 2021-05-14  3:21 UTC  (2+ messages)

[PATCH v2 3/4] EFI: Introduce the new AMD Memory Encryption GUID
 2021-05-13  4:36 UTC  (3+ messages)

[RFC PATCH v5 17/28] dyndbg: prevent build bugs via -DNO_DYNAMIC_DEBUG_TABLE
 2021-05-12 18:03 UTC  (3+ messages)

efivarfs fails with `No such device` when EFI runtime is missing
 2021-05-11 22:06 UTC  (3+ messages)

Personal
 2021-05-10 14:06 UTC 

[PATCH] efi: cper: fix snprintf() use in cper_dimm_err_location()
 2021-05-10 15:39 UTC  (2+ messages)

[PATCH] efi/libstub: prevent read overflow in find_file_option()
 2021-05-10 15:38 UTC  (2+ messages)

[RFC PATCH 0/4] efi/libstub: measurement initrd data loaded by the EFI stub
 2021-05-09 11:44 UTC  (5+ messages)
` [RFC PATCH 1/4] efi/libstub: add prototype of efi_tcg2_protocol::hash_log_extend_event()
` [RFC PATCH 2/4] efi/libstub: x86/mixed: increase supported argument count
` [RFC PATCH 3/4] efi/libstub: consolidate initrd handling across architectures
` [RFC PATCH 4/4] efi/libstub: measure loaded initrd info into the TPM

[PATCH] efi: Allow EFI_MEMORY_XP and EFI_MEMORY_RO both to be cleared
 2021-05-07 17:33 UTC  (2+ messages)

[PATCH] builddeb: Support signing kernels with a Machine Owner Key
 2021-05-06 17:38 UTC  (4+ messages)

[PATCH] RISC-V: Relocate the kernel relative to a DRAM base
 2021-05-04 10:28 UTC  (4+ messages)

Still required that EFI_MEMORY_XP and EFI_MEMORY_RO must not both be cleared?
 2021-04-30 10:38 UTC  (3+ messages)

[PATCH] efi: cper: fix scnprintf() use in cper_mem_err_location()
 2021-04-21 19:31 UTC 

[PATCH 0/8] generic command line v4
 2021-04-16  4:09 UTC  (2+ messages)
` [PATCH 5/8] drivers: firmware: efi: libstub: enable generic commandline

[efi:next] BUILD SUCCESS 3a457dd105315386bc85f0af2bf08944cd7fc0dd
 2021-04-10 22:08 UTC 

[PATCH v2 1/1] efi/dev-path-parser: Switch to use for_each_acpi_dev_match()
 2021-04-10  8:33 UTC  (2+ messages)

[PATCH v2 0/8] linux: implement LoadFile2 initrd loading
 2021-04-09  6:58 UTC  (10+ messages)
` [PATCH v2 3/8] efi: move MS-DOS stub out of generic PE header definition
` [PATCH v2 5/8] linux/arm: account for COFF headers appearing at unexpected offsets

[PATCH 6/8] drivers: firmware: efi: libstub: enable generic commandline
 2021-04-06 16:42 UTC  (5+ messages)

[PATCH v9 0/7] Enable Linux guests on Hyper-V on ARM64
 2021-04-05 17:45 UTC  (3+ messages)

[PATCH v1 1/1] efi/dev-path-parser: Switch to use for_each_acpi_dev_match()
 2021-04-04 17:43 UTC 

[efitools PATCH 1/1] Make.rules: enable building on riscv64
 2021-04-01 16:57 UTC 

Bidding invitation
 2021-03-31  7:12 UTC 

[PATCH v1 0/3] Support EFI partition on NVIDIA Tegra devices
 2021-03-29 18:38 UTC  (6+ messages)
` [PATCH v1 3/3] partitions/efi: Support gpt_sector parameter needed by "

[efi:next 7/8] drivers/firmware/google/gsmi.c:477:18: error: initialization of 'efi_status_t (*)(const efi_char16_t *, const efi_guid_t *, u32 *, long unsigned int *, void *)' {aka 'long unsigned int (*)(const short unsigned int *, const struct <anonymous> *, unsigned i
 2021-03-29  3:31 UTC 

[efi:next 7/8] drivers/firmware/google/gsmi.c:477:18: error: incompatible function pointer types initializing 'efi_get_variable_t *' (aka 'unsigned long (*)(const unsigned short *, const guid_t *, unsigned int *, unsigned long *, void *)') with an expression of type 'ef
 2021-03-29  3:12 UTC 

[PATCH] ia64: fix EFI_DEBUG build
 2021-03-28 21:22 UTC  (2+ messages)
` [PATCH v2] "


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).