messages from 2019-10-11 00:48:08 to 2019-10-23 17:32:23 UTC [more...]
[GIT PULL 0/5] EFI fixes for v5.4
2019-10-23 17:32 UTC (6+ messages)
` [PATCH 1/5] efi: Make CONFIG_EFI_RCI2_TABLE selectable on x86 only
` [PATCH 2/5] efi/tpm: return -EINVAL when determining tpm final events log size fails
` [PATCH 3/5] efi/random: treat EFI_RNG_PROTOCOL output as bootloader randomness
` [PATCH 4/5] efi: libstub/arm: account for firmware reserved memory at the base of RAM
` [PATCH 5/5] x86, efi: never relocate kernel below lowest acceptable address
[PATCH v2 0/8] Add Kernel Concurrency Sanitizer (KCSAN)
2019-10-23 16:24 UTC (31+ messages)
` [PATCH v2 1/8] kcsan: Add Kernel Concurrency Sanitizer infrastructure
` [PATCH v2 2/8] objtool, kcsan: Add KCSAN runtime functions to whitelist
` [PATCH v2 3/8] build, kcsan: Add KCSAN build exceptions
` [PATCH v2 4/8] seqlock, kcsan: Add annotations for KCSAN
` [PATCH v2 5/8] seqlock: Require WRITE_ONCE surrounding raw_seqcount_barrier
` [PATCH v2 6/8] asm-generic, kcsan: Add KCSAN instrumentation for bitops
` [PATCH v2 7/8] locking/atomics, kcsan: Add KCSAN instrumentation
` [PATCH v2 8/8] x86, kcsan: Enable KCSAN for x86
[PATCH] Cleanup: replace prefered with preferred
2019-10-23 15:40 UTC (3+ messages)
[PATCH v4] x86, efi: never relocate kernel below lowest acceptable address
2019-10-23 6:37 UTC (5+ messages)
[PATCH v8 0/8] powerpc: Enabling IMA arch specific secure boot policies
2019-10-22 23:38 UTC (18+ messages)
` [PATCH v8 1/8] powerpc: detect the secure boot mode of the system
` [PATCH v8 2/8] powerpc/ima: add support to initialize ima policy rules
` [PATCH v8 3/8] powerpc: detect the trusted boot state of the system
` [PATCH v8 4/8] powerpc/ima: add measurement rules to ima arch specific policy
` [PATCH v8 5/8] ima: make process_buffer_measurement() generic
` [PATCH v8 6/8] certs: add wrapper function to check blacklisted binary hash
` [PATCH v8 7/8] ima: check against blacklisted hashes for files with modsig
` [PATCH v8 8/8] powerpc/ima: update ima arch policy to check for blacklist
[PATCH v7 00/12] EFI Specific Purpose Memory Support
2019-10-22 16:48 UTC (20+ messages)
` [PATCH v7 01/12] acpi/numa: Establish a new drivers/acpi/numa/ directory
` [PATCH v7 02/12] efi: Enumerate EFI_MEMORY_SP
` [PATCH v7 03/12] x86/efi: Push EFI_MEMMAP check into leaf routines
` [PATCH v7 04/12] efi: Common enable/disable infrastructure for EFI soft reservation
` [PATCH v7 05/12] x86/efi: EFI soft reservation to E820 enumeration
` [PATCH v7 06/12] arm/efi: EFI soft reservation to memblock
` [PATCH v7 07/12] x86/efi: Add efi_fake_mem support for EFI_MEMORY_SP
` [PATCH v7 08/12] lib: Uplevel the pmem "region" ida to a global allocator
` [PATCH v7 09/12] dax: Fix alloc_dax_region() compile warning
` [PATCH v7 10/12] device-dax: Add a driver for "hmem" devices
` [PATCH v7 11/12] acpi/numa/hmat: Register HMAT at device_initcall level
` [PATCH v7 12/12] acpi/numa/hmat: Register "soft reserved" memory as an "hmem" device
[PATCH v7 0/8] powerpc: Enabling IMA arch specific secure boot policies
2019-10-19 18:30 UTC (22+ messages)
` [PATCH v7 1/8] powerpc: detect the secure boot mode of the system
` [PATCH v7 2/8] powerpc: add support to initialize ima policy rules
` [PATCH v7 3/8] powerpc: detect the trusted boot state of the system
` [PATCH v7 4/8] powerpc/ima: add measurement rules to ima arch specific policy
` [PATCH v7 5/8] ima: make process_buffer_measurement() generic
` [PATCH v7 6/8] certs: add wrapper function to check blacklisted binary hash
` [PATCH v7 7/8] ima: check against blacklisted hashes for files with modsig
` [PATCH v7 8/8] powerpc/ima: update ima arch policy to check for blacklist
[PATCH AUTOSEL 5.3 48/89] efi/cper: Fix endianness of PCIe class code
2019-10-18 22:02 UTC (2+ messages)
` [PATCH AUTOSEL 5.3 49/89] efi/x86: Do not clean dummy variable in kexec path
[PATCH AUTOSEL 4.19 075/100] efi/cper: Fix endianness of PCIe class code
2019-10-18 22:05 UTC (2+ messages)
` [PATCH AUTOSEL 4.19 076/100] efi/x86: Do not clean dummy variable in kexec path
[PATCH AUTOSEL 4.14 37/56] efi/cper: Fix endianness of PCIe class code
2019-10-18 22:07 UTC (2+ messages)
` [PATCH AUTOSEL 4.14 38/56] efi/x86: Do not clean dummy variable in kexec path
[PATCH AUTOSEL 4.9 17/29] efi/cper: Fix endianness of PCIe class code
2019-10-18 22:09 UTC (2+ messages)
` [PATCH AUTOSEL 4.9 18/29] efi/x86: Do not clean dummy variable in kexec path
[PATCH AUTOSEL 4.4 12/21] efi/cper: Fix endianness of PCIe class code
2019-10-18 22:09 UTC (2+ messages)
` [PATCH AUTOSEL 4.4 13/21] efi/x86: Do not clean dummy variable in kexec path
[PATCH v9 20/28] x86/asm: Make some functions local
2019-10-18 16:30 UTC (7+ messages)
` [tip: x86/asm] "
` [PATCH v9 24/28] x86_64/asm: Change all ENTRY+ENDPROC to SYM_FUNC_*
` [PATCH v9 27/28] x86_32/asm: "
` [tip: x86/asm] x86/asm/32: "
[PATCH 0/8] Add Kernel Concurrency Sanitizer (KCSAN)
2019-10-17 14:15 UTC (25+ messages)
` [PATCH 1/8] kcsan: Add Kernel Concurrency Sanitizer infrastructure
` [PATCH 2/8] objtool, kcsan: Add KCSAN runtime functions to whitelist
` [PATCH 3/8] build, kcsan: Add KCSAN build exceptions
` [PATCH 4/8] seqlock, kcsan: Add annotations for KCSAN
` [PATCH 5/8] seqlock: Require WRITE_ONCE surrounding raw_seqcount_barrier
` [PATCH 6/8] asm-generic, kcsan: Add KCSAN instrumentation for bitops
` [PATCH 7/8] locking/atomics, kcsan: Add KCSAN instrumentation
` [PATCH 8/8] x86, kcsan: Enable KCSAN for x86
[PATCH v3] x86, efi: never relocate kernel below lowest acceptable address
2019-10-16 23:25 UTC (11+ messages)
[PATCH 4.9 76/92] efivar/ssdt: Dont iterate over EFI vars if no SSDT override was specified
2019-10-16 21:50 UTC
[PATCH 4.14 43/65] efivar/ssdt: Dont iterate over EFI vars if no SSDT override was specified
2019-10-16 21:50 UTC
[PATCH 4.19 49/81] efivar/ssdt: Dont iterate over EFI vars if no SSDT override was specified
2019-10-16 21:51 UTC
[PATCH 5.3 062/112] efivar/ssdt: Dont iterate over EFI vars if no SSDT override was specified
2019-10-16 21:51 UTC (5+ messages)
` [PATCH 5.3 063/112] efi/tpm: Dont access event->count when it isnt mapped
` [PATCH 5.3 064/112] efi/tpm: Dont traverse an event log with no events
` [PATCH 5.3 065/112] efi/tpm: Only set efi_tpm_final_log_size after successful event log parsing
` [PATCH 5.3 111/112] efi/tpm: Fix sanity check of unsigned tbl_size being less than zero
[PATCH v7 0/8] efi/firmware/platform-x86: Add EFI embedded fw support
2019-10-16 12:45 UTC (22+ messages)
` [PATCH v7 1/8] efi: Export boot-services code and data as debugfs-blobs
` [PATCH v7 2/8] efi: Add embedded peripheral firmware support
` [PATCH v7 3/8] firmware: Rename FW_OPT_NOFALLBACK to FW_OPT_NOFALLBACK_SYSFS
` [PATCH v7 4/8] firmware: Add new platform fallback mechanism and firmware_request_platform()
` [PATCH v7 6/8] Input: icn8505 - Switch to firmware_request_platform for retreiving the fw
[PATCH v3 0/3] x86/boot: Introduce the kernel_info et consortes
2019-10-16 11:06 UTC (7+ messages)
` [PATCH v3 1/3] x86/boot: Introduce the kernel_info
[PATCH] efi/tpm: return -EINVAL when determining tpm final events log size fails
2019-10-16 10:56 UTC (2+ messages)
[PATCH v4 0/4] powerpc: expose secure variables to the kernel and userspace
2019-10-15 8:34 UTC (5+ messages)
` [PATCH v4 1/4] powerpc/powernv: Add OPAL API interface to access secure variable
` [PATCH v4 2/4] powerpc: expose secure variables to userspace via sysfs
[PATCH] efi: libstub/arm: account for firmware reserved memory at the base of RAM
2019-10-15 6:14 UTC (3+ messages)
[PATCH v1] Ask user input only when CONFIG_X86 or CONFIG_COMPILE_TEST is set to y
2019-10-14 9:51 UTC (5+ messages)
[PATCH] Ask user input only when CONFIG_X86 or CONFIG_COMPILE_TEST is set to y
2019-10-13 19:08 UTC (9+ messages)
[GIT PULL] EFI fixes
2019-10-12 22:35 UTC (2+ messages)
[PATCH v2] x86, efi: never relocate kernel below lowest acceptable address
2019-10-12 3:46 UTC (6+ messages)
[PATCH v6 00/12] EFI Specific Purpose Memory Support
2019-10-11 14:38 UTC (9+ messages)
` [PATCH v6 05/12] x86/efi: EFI soft reservation to E820 enumeration
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).