linux-efi.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2021-10-13 11:37:23 to 2021-11-08 16:06:55 UTC [more...]

[PATCH 00/13] power-suppy/i2c/extcon: Add support for cht-wc PMIC without USB-PD support
 2021-11-08 16:06 UTC  (35+ messages)
` [PATCH 01/13] platform/x86: Rename touchscreen_dmi to dmi_device_properties
` [PATCH 02/13] platform/x86: dmi_device_properties: Add setup info for boards with a CHT Whiskey Cove PMIC
` [PATCH 03/13] power: supply: bq25890: Fix race causing oops at boot
` [PATCH 04/13] power: supply: bq25890: Fix initial setting of the F_CONV_RATE field
` [PATCH 05/13] power: supply: bq25890: Add a bq25890_rw_init_data() helper
` [PATCH 06/13] power: supply: bq25890: Add support for skipping initialization
` [PATCH 07/13] power: supply: bq25890: Enable charging on boards where we skip reset
` [PATCH 08/13] power: supply: bq25890: Drop dev->platform_data == NULL check
` [PATCH 09/13] power: supply: bq25890: Add bq25890_set_otg_cfg() helper
` [PATCH 10/13] power: supply: bq25890: Add support for registering the Vbus boost converter as a regulator
` [PATCH 11/13] i2c: cht-wc: Add support for devices using a bq25890 charger
` [PATCH 12/13] extcon: intel-cht-wc: Check new "intel,cht-wc-setup" device-property
` [PATCH 13/13] extcon: intel-cht-wc: Add support for devices with an USB-micro-B connector

[PATCH -next,v2] efi/libstub: arm32: Use "align" for the size alignment
 2021-11-08 12:56 UTC  (4+ messages)

[PATCH 0/5] x86: Show in sysfs if a memory node is able to do encryption
 2021-11-07 17:58 UTC  (14+ messages)
` [PATCH 1/5] Extend memblock to support memory encryption
` [PATCH 2/5] Extend pg_data_t to hold information about "
` [PATCH 3/5] Extend e820_table "
` [PATCH 4/5] Mark e820_entries as crypto capable from EFI memmap
` [PATCH 5/5] Show in sysfs if a memory node is able to do encryption

[PATCH v9 1/4] efi: Introduce EFI_FIRMWARE_MANAGEMENT_CAPSULE_HEADER and corresponding structures
 2021-11-07 15:15 UTC 

[PATCH] Revert "efi/random: Treat EFI_RNG_PROTOCOL output as bootloader randomness"
 2021-11-05  6:04 UTC  (14+ messages)
  ` [RESEND] "
      ` [RESEND] "
  ` [PATCH] random: fix crash on multiple early calls to add_bootloader_randomness()
  ` [PATCH v2] "
  ` [PATCH v3] "

[PATCH v6 00/42] Add AMD Secure Nested Paging (SEV-SNP) Guest Support
 2021-11-04 16:03 UTC  (55+ messages)
` [PATCH v6 07/42] x86/sev: Add support for hypervisor feature VMGEXIT
` [PATCH v6 08/42] x86/sev-es: initialize sev_status/features within #VC handler
` [PATCH v6 09/42] x86/sev: Check SEV-SNP features support
` [PATCH v6 11/42] x86/sev: Check the vmpl level
` [PATCH v6 13/42] x86/compressed: Register GHCB memory when SEV-SNP is active
` [PATCH v6 14/42] x86/sev: "
` [PATCH v6 15/42] x86/sev: Remove do_early_exception() forward declarations
` [PATCH v6 40/42] virt: Add SEV-SNP guest driver

[PATCH] builddeb: Support signing kernels with a Machine Owner Key
 2021-11-04  9:28 UTC  (3+ messages)

[GIT PULL] EFI updates for v5.16
 2021-11-01 23:10 UTC  (2+ messages)

[PATCH v2 0/5] [RFC] x86: Export information about hardware memory encryption to sysfs
 2021-11-01 20:10 UTC  (20+ messages)
` [PATCH v2 1/5] Extend memblock to support memory encryption
` [PATCH v2 2/5] Extend pg_data_t to hold information about "
` [PATCH v2 3/5] Extend e820_table "
` [PATCH v2 4/5] Mark e820_entries as crypto capable from EFI memmap
` [PATCH v2 5/5] Show in sysfs if a memory node is able to do memory encryption

[RFC 0/5] ACPI/power-suppy add fuel-gauge support on cht-wc PMIC without USB-PD support devs
 2021-11-01 19:16 UTC  (11+ messages)
` [RFC 1/5] ACPI / x86: Add 3 devices on the Xiaomi Mi Pad 2 to the always_present list
` [RFC 2/5] gpiolib: acpi: Make acpi_gpio_in_ignore_list() more generic
` [RFC 3/5] gpiolib: acpi: Add a new "ignore" module option
` [RFC 4/5] power: supply: bq27xxx: Add dev helper variable to bq27xxx_battery_i2c_probe()
` [RFC 5/5] power: supply: bq27xxx: Add support for ACPI enumeration

[PATCH v7 1/4] efi: Introduce EFI_FIRMWARE_MANAGEMENT_CAPSULE_HEADER and corresponding structures
 2021-11-01 11:01 UTC  (3+ messages)

[PATCH -next] efi/libstub: arm32: Use "align" for the size alignment
 2021-11-01  9:18 UTC 

[PATCH] include/linux/efi.h: Remove unneeded whitespaces before tabs
 2021-10-28 21:05 UTC 

[PATCH v2] x86/sme: Explicitly map new EFI memmap table as encrypted
 2021-10-27 17:04 UTC  (6+ messages)

[PATCH] x86/sme: Explicitly map new EFI memmap table as encrypted
 2021-10-22 16:21 UTC  (4+ messages)

[PATCH v4 0/3] Allow guest access to EFI confidential computing secret area
 2021-10-20 13:59 UTC  (13+ messages)
` [PATCH v4 1/3] efi/libstub: Copy "
` [PATCH v4 2/3] efi: Reserve "
` [PATCH v4 3/3] virt: Add efi_secret module to expose confidential computing secrets

[PATCH 0/2] efi: Disable runtime services on RT
 2021-10-20  7:20 UTC  (10+ messages)
` [PATCH 1/2] "

[PATCH v3 0/3] Allow guest access to EFI confidential computing secret area
 2021-10-20  6:51 UTC  (7+ messages)
` [PATCH v3 1/3] efi/libstub: Copy "
` [PATCH v3 2/3] efi: Reserve "
` [PATCH v3 3/3] virt: Add efi_secret module to expose confidential computing secrets

more bdev_nr_sectors / bdev_nr_bytes conversions
 2021-10-19 12:18 UTC  (6+ messages)
` [PATCH 1/3] block/ioctl: use bdev_nr_sectors and bdev_nr_bytes
` [PATCH 2/3] partitions/efi: use bdev_nr_bytes instead of open coding it
` [PATCH 3/3] partitions/ibm: use bdev_nr_sectors "

Can EFI memory descriptors overlap? [PING v1]
 2021-10-18 19:53 UTC  (2+ messages)

[GIT PULL] efi/urgent for v5.15-rc6
 2021-10-18  4:08 UTC  (2+ messages)

[PATCH v1 0/2] firmware: dmi_scan: Make it work in kexec'ed kernel
 2021-10-17 13:31 UTC  (14+ messages)

[PATCH v4 1/4] efi: Introduce EFI_FIRMWARE_MANAGEMENT_CAPSULE_HEADER and corresponding structures
 2021-10-16 10:31 UTC 

[PATCH] efi: select CRYPTO for EFI_EMBEDDED_FIRMWARE
 2021-10-15 19:10 UTC  (3+ messages)

[GIT PULL] EFI fixes for v5.15
 2021-10-15 10:12 UTC  (3+ messages)
` [GIT PULL] EFI updates for v5.16


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).