linux-efi.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2021-07-08 15:40:59 to 2021-07-27 17:08:46 UTC [more...]

[PATCH v11 0/5] Enable Linux guests on Hyper-V on ARM64
 2021-07-27 17:08 UTC  (11+ messages)
` [PATCH v11 1/5] arm64: hyperv: Add Hyper-V hypercall and register access utilities
` [PATCH v11 2/5] arm64: hyperv: Add panic handler
` [PATCH v11 3/5] arm64: hyperv: Initialize hypervisor on boot
` [PATCH v11 4/5] arm64: efi: Export screen_info
` [PATCH v11 5/5] Drivers: hv: Enable Hyper-V code to be built on ARM64

[PATCH] efi: sysfb_efi: fix build when EFI is not set
 2021-07-27 16:25 UTC  (6+ messages)

[PATCH AUTOSEL 5.10 13/17] efi/mokvar: Reserve the table only if it is in boot services data
 2021-07-27 13:19 UTC 

[PATCH AUTOSEL 5.13 15/21] efi/mokvar: Reserve the table only if it is in boot services data
 2021-07-27 13:19 UTC 

[efi:urgent] BUILD SUCCESS 6dec88b1f3caee8c8460ac199a6c6ea702c85603
 2021-07-27  8:03 UTC 

[PATCH v3 0/4] efi/arm64: work around Image placement issues
 2021-07-26 14:51 UTC  (5+ messages)
` [PATCH v3 1/4] efi/libstub: arm64: Force Image reallocation if BSS was not reserved
` [PATCH v3 2/4] efi/libstub: arm64: Relax 2M alignment again for relocatable kernels
` [PATCH v3 3/4] efi/libstub: arm64: Warn when efi_random_alloc() fails
` [PATCH v3 4/4] efi/libstub: arm64: Double check image alignment at entry

[PATCH v2 0/2] efi/arm64: work around Image placement issues
 2021-07-26 11:38 UTC  (5+ messages)
` [PATCH v2 1/2] efi/libstub: arm64: Force Image reallocation if BSS was not reserved
` [PATCH v2 2/2] efistub: arm64: relax 2M alignment again for relocatable kernels

[PATCH] efistub: arm64: relax 2M alignment again for relocatable kernels
 2021-07-26  4:09 UTC  (2+ messages)

[efi:urgent] BUILD SUCCESS 5bb60b28ce5bee48838c3fdc667c7247e722b34d
 2021-07-23  5:04 UTC 

[PATCH 1/1] RISC-V: load initrd wherever it fits into memory
 2021-07-22  6:09 UTC  (5+ messages)

[PATCH Part2 RFC v4 00/40] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
 2021-07-21 20:15 UTC  (159+ messages)
` [PATCH Part2 RFC v4 01/40] KVM: SVM: Add support to handle AP reset MSR protocol
` [PATCH Part2 RFC v4 02/40] KVM: SVM: Provide the Hypervisor Feature support VMGEXIT
` [PATCH Part2 RFC v4 04/40] x86/sev: Add the host SEV-SNP initialization support
` [PATCH Part2 RFC v4 05/40] x86/sev: Add RMP entry lookup helpers
` [PATCH Part2 RFC v4 06/40] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
` [PATCH Part2 RFC v4 07/40] x86/sev: Split the physmap when adding the page in RMP table
` [PATCH Part2 RFC v4 08/40] x86/traps: Define RMP violation #PF error code
` [PATCH Part2 RFC v4 09/40] x86/fault: Add support to dump RMP entry on fault
` [PATCH Part2 RFC v4 10/40] x86/fault: Add support to handle the RMP fault for user address
` [PATCH Part2 RFC v4 14/40] crypto:ccp: Provide APIs to issue SEV-SNP commands
` [PATCH Part2 RFC v4 15/40] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
` [PATCH Part2 RFC v4 20/40] KVM: SVM: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
` [PATCH Part2 RFC v4 21/40] KVM: SVM: Add initial SEV-SNP support
` [PATCH Part2 RFC v4 22/40] KVM: SVM: Add KVM_SNP_INIT command
` [PATCH Part2 RFC v4 23/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_START command
` [PATCH Part2 RFC v4 24/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_UPDATE command
` [PATCH Part2 RFC v4 25/40] KVM: SVM: Reclaim the guest pages when SEV-SNP VM terminates
` [PATCH Part2 RFC v4 26/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
` [PATCH Part2 RFC v4 27/40] KVM: X86: Add kvm_x86_ops to get the max page level for the TDP
` [PATCH Part2 RFC v4 28/40] KVM: X86: Introduce kvm_mmu_map_tdp_page() for use by SEV
` [PATCH Part2 RFC v4 30/40] KVM: X86: Define new RMP check related #NPF error bits
` [PATCH Part2 RFC v4 31/40] KVM: X86: update page-fault trace to log the 64-bit error code
` [PATCH Part2 RFC v4 32/40] KVM: SVM: Add support to handle GHCB GPA register VMGEXIT
` [PATCH Part2 RFC v4 33/40] KVM: SVM: Add support to handle MSR based Page State Change VMGEXIT
` [PATCH Part2 RFC v4 34/40] KVM: SVM: Add support to handle "
` [PATCH Part2 RFC v4 35/40] KVM: Add arch hooks to track the host write to guest memory
` [PATCH Part2 RFC v4 37/40] KVM: SVM: Add support to handle the RMP nested page fault
` [PATCH Part2 RFC v4 38/40] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
` [PATCH Part2 RFC v4 39/40] KVM: SVM: Use a VMSA physical address variable for populating VMCB
` [PATCH Part2 RFC v4 40/40] KVM: SVM: Support SEV-SNP AP Creation NAE event

[PATCH v3 0/2] allow simple{fb,drm} drivers to be used on non-x86 EFI platforms
 2021-07-21 11:23 UTC  (13+ messages)
  ` [PATCH v3 0/2] allow simple{fb, drm} "

[efi:urgent] BUILD SUCCESS 47e1e233e9d822dfda068383fb9a616451bda703
 2021-07-20 21:06 UTC 

[PATCH 2/2] arm64: efi: kaslr: Fix boot failure if efi_random_alloc() fails
 2021-07-20 14:40 UTC  (8+ messages)

[PATCH 1/2] arm64: efi: kaslr: Fix occasional random alloc (and boot) failure
 2021-07-20 12:37 UTC  (2+ messages)

[GIT PULL] EFI fixes for v5.14-rc2
 2021-07-20 11:33 UTC  (2+ messages)

[efi:urgent] BUILD SUCCESS 7c33940e16b6cc297c5648b65180451b404b8a5e
 2021-07-19 19:39 UTC 

[PATCH v1 0/2] firmware: dmi_scan: Make it work in kexec'ed kernel
 2021-07-19  8:25 UTC  (13+ messages)

[RFC PATCH] efi/mokvar: Reserve the table only if it is in boot services data
 2021-07-19  7:12 UTC  (4+ messages)

[efi:urgent] BUILD SUCCESS 2bab693a608bdf614b9fcd44083c5100f34b9f77
 2021-07-18 14:00 UTC 

[PATCH v2 1/1] ACPI: utils: Fix reference counting in for_each_acpi_dev_match()
 2021-07-16 17:27 UTC  (3+ messages)

[PATCH] efi/libstub: Fix the efi_load_initrd function description
 2021-07-16 16:18 UTC  (2+ messages)

[PATCH] efi/tpm: Differentiate missing and invalid final event log table
 2021-07-16 16:04 UTC  (3+ messages)

[PATCH v3] lockdown,selinux: fix wrong subject in some SELinux lockdown checks
 2021-07-13  2:34 UTC  (3+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).