linux-efi.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2019-10-11 00:48:08 to 2019-10-23 17:32:23 UTC [more...]

[GIT PULL 0/5] EFI fixes for v5.4
 2019-10-23 17:32 UTC  (6+ messages)
` [PATCH 1/5] efi: Make CONFIG_EFI_RCI2_TABLE selectable on x86 only
` [PATCH 2/5] efi/tpm: return -EINVAL when determining tpm final events log size fails
` [PATCH 3/5] efi/random: treat EFI_RNG_PROTOCOL output as bootloader randomness
` [PATCH 4/5] efi: libstub/arm: account for firmware reserved memory at the base of RAM
` [PATCH 5/5] x86, efi: never relocate kernel below lowest acceptable address

[PATCH v2 0/8] Add Kernel Concurrency Sanitizer (KCSAN)
 2019-10-23 16:24 UTC  (31+ messages)
` [PATCH v2 1/8] kcsan: Add Kernel Concurrency Sanitizer infrastructure
` [PATCH v2 2/8] objtool, kcsan: Add KCSAN runtime functions to whitelist
` [PATCH v2 3/8] build, kcsan: Add KCSAN build exceptions
` [PATCH v2 4/8] seqlock, kcsan: Add annotations for KCSAN
` [PATCH v2 5/8] seqlock: Require WRITE_ONCE surrounding raw_seqcount_barrier
` [PATCH v2 6/8] asm-generic, kcsan: Add KCSAN instrumentation for bitops
` [PATCH v2 7/8] locking/atomics, kcsan: Add KCSAN instrumentation
` [PATCH v2 8/8] x86, kcsan: Enable KCSAN for x86

[PATCH] Cleanup: replace prefered with preferred
 2019-10-23 15:40 UTC  (3+ messages)

[PATCH v4] x86, efi: never relocate kernel below lowest acceptable address
 2019-10-23  6:37 UTC  (5+ messages)

[PATCH v8 0/8] powerpc: Enabling IMA arch specific secure boot policies
 2019-10-22 23:38 UTC  (18+ messages)
` [PATCH v8 1/8] powerpc: detect the secure boot mode of the system
` [PATCH v8 2/8] powerpc/ima: add support to initialize ima policy rules
` [PATCH v8 3/8] powerpc: detect the trusted boot state of the system
` [PATCH v8 4/8] powerpc/ima: add measurement rules to ima arch specific policy
` [PATCH v8 5/8] ima: make process_buffer_measurement() generic
` [PATCH v8 6/8] certs: add wrapper function to check blacklisted binary hash
` [PATCH v8 7/8] ima: check against blacklisted hashes for files with modsig
` [PATCH v8 8/8] powerpc/ima: update ima arch policy to check for blacklist

[PATCH v7 00/12] EFI Specific Purpose Memory Support
 2019-10-22 16:48 UTC  (20+ messages)
` [PATCH v7 01/12] acpi/numa: Establish a new drivers/acpi/numa/ directory
` [PATCH v7 02/12] efi: Enumerate EFI_MEMORY_SP
` [PATCH v7 03/12] x86/efi: Push EFI_MEMMAP check into leaf routines
` [PATCH v7 04/12] efi: Common enable/disable infrastructure for EFI soft reservation
` [PATCH v7 05/12] x86/efi: EFI soft reservation to E820 enumeration
` [PATCH v7 06/12] arm/efi: EFI soft reservation to memblock
` [PATCH v7 07/12] x86/efi: Add efi_fake_mem support for EFI_MEMORY_SP
` [PATCH v7 08/12] lib: Uplevel the pmem "region" ida to a global allocator
` [PATCH v7 09/12] dax: Fix alloc_dax_region() compile warning
` [PATCH v7 10/12] device-dax: Add a driver for "hmem" devices
` [PATCH v7 11/12] acpi/numa/hmat: Register HMAT at device_initcall level
` [PATCH v7 12/12] acpi/numa/hmat: Register "soft reserved" memory as an "hmem" device

[PATCH v7 0/8] powerpc: Enabling IMA arch specific secure boot policies
 2019-10-19 18:30 UTC  (22+ messages)
` [PATCH v7 1/8] powerpc: detect the secure boot mode of the system
` [PATCH v7 2/8] powerpc: add support to initialize ima policy rules
` [PATCH v7 3/8] powerpc: detect the trusted boot state of the system
` [PATCH v7 4/8] powerpc/ima: add measurement rules to ima arch specific policy
` [PATCH v7 5/8] ima: make process_buffer_measurement() generic
` [PATCH v7 6/8] certs: add wrapper function to check blacklisted binary hash
` [PATCH v7 7/8] ima: check against blacklisted hashes for files with modsig
` [PATCH v7 8/8] powerpc/ima: update ima arch policy to check for blacklist

[PATCH AUTOSEL 5.3 48/89] efi/cper: Fix endianness of PCIe class code
 2019-10-18 22:02 UTC  (2+ messages)
` [PATCH AUTOSEL 5.3 49/89] efi/x86: Do not clean dummy variable in kexec path

[PATCH AUTOSEL 4.19 075/100] efi/cper: Fix endianness of PCIe class code
 2019-10-18 22:05 UTC  (2+ messages)
` [PATCH AUTOSEL 4.19 076/100] efi/x86: Do not clean dummy variable in kexec path

[PATCH AUTOSEL 4.14 37/56] efi/cper: Fix endianness of PCIe class code
 2019-10-18 22:07 UTC  (2+ messages)
` [PATCH AUTOSEL 4.14 38/56] efi/x86: Do not clean dummy variable in kexec path

[PATCH AUTOSEL 4.9 17/29] efi/cper: Fix endianness of PCIe class code
 2019-10-18 22:09 UTC  (2+ messages)
` [PATCH AUTOSEL 4.9 18/29] efi/x86: Do not clean dummy variable in kexec path

[PATCH AUTOSEL 4.4 12/21] efi/cper: Fix endianness of PCIe class code
 2019-10-18 22:09 UTC  (2+ messages)
` [PATCH AUTOSEL 4.4 13/21] efi/x86: Do not clean dummy variable in kexec path

[PATCH v9 20/28] x86/asm: Make some functions local
 2019-10-18 16:30 UTC  (7+ messages)
  ` [tip: x86/asm] "
` [PATCH v9 24/28] x86_64/asm: Change all ENTRY+ENDPROC to SYM_FUNC_*
` [PATCH v9 27/28] x86_32/asm: "
  ` [tip: x86/asm] x86/asm/32: "

[PATCH 0/8] Add Kernel Concurrency Sanitizer (KCSAN)
 2019-10-17 14:15 UTC  (25+ messages)
` [PATCH 1/8] kcsan: Add Kernel Concurrency Sanitizer infrastructure
` [PATCH 2/8] objtool, kcsan: Add KCSAN runtime functions to whitelist
` [PATCH 3/8] build, kcsan: Add KCSAN build exceptions
` [PATCH 4/8] seqlock, kcsan: Add annotations for KCSAN
` [PATCH 5/8] seqlock: Require WRITE_ONCE surrounding raw_seqcount_barrier
` [PATCH 6/8] asm-generic, kcsan: Add KCSAN instrumentation for bitops
` [PATCH 7/8] locking/atomics, kcsan: Add KCSAN instrumentation
` [PATCH 8/8] x86, kcsan: Enable KCSAN for x86

[PATCH v3] x86, efi: never relocate kernel below lowest acceptable address
 2019-10-16 23:25 UTC  (11+ messages)

[PATCH 4.9 76/92] efivar/ssdt: Dont iterate over EFI vars if no SSDT override was specified
 2019-10-16 21:50 UTC 

[PATCH 4.14 43/65] efivar/ssdt: Dont iterate over EFI vars if no SSDT override was specified
 2019-10-16 21:50 UTC 

[PATCH 4.19 49/81] efivar/ssdt: Dont iterate over EFI vars if no SSDT override was specified
 2019-10-16 21:51 UTC 

[PATCH 5.3 062/112] efivar/ssdt: Dont iterate over EFI vars if no SSDT override was specified
 2019-10-16 21:51 UTC  (5+ messages)
` [PATCH 5.3 063/112] efi/tpm: Dont access event->count when it isnt mapped
` [PATCH 5.3 064/112] efi/tpm: Dont traverse an event log with no events
` [PATCH 5.3 065/112] efi/tpm: Only set efi_tpm_final_log_size after successful event log parsing
` [PATCH 5.3 111/112] efi/tpm: Fix sanity check of unsigned tbl_size being less than zero

[PATCH v7 0/8] efi/firmware/platform-x86: Add EFI embedded fw support
 2019-10-16 12:45 UTC  (22+ messages)
` [PATCH v7 1/8] efi: Export boot-services code and data as debugfs-blobs
` [PATCH v7 2/8] efi: Add embedded peripheral firmware support
` [PATCH v7 3/8] firmware: Rename FW_OPT_NOFALLBACK to FW_OPT_NOFALLBACK_SYSFS
` [PATCH v7 4/8] firmware: Add new platform fallback mechanism and firmware_request_platform()
` [PATCH v7 6/8] Input: icn8505 - Switch to firmware_request_platform for retreiving the fw

[PATCH v3 0/3] x86/boot: Introduce the kernel_info et consortes
 2019-10-16 11:06 UTC  (7+ messages)
` [PATCH v3 1/3] x86/boot: Introduce the kernel_info

[PATCH] efi/tpm: return -EINVAL when determining tpm final events log size fails
 2019-10-16 10:56 UTC  (2+ messages)

[PATCH v4 0/4] powerpc: expose secure variables to the kernel and userspace
 2019-10-15  8:34 UTC  (5+ messages)
` [PATCH v4 1/4] powerpc/powernv: Add OPAL API interface to access secure variable
` [PATCH v4 2/4] powerpc: expose secure variables to userspace via sysfs

[PATCH] efi: libstub/arm: account for firmware reserved memory at the base of RAM
 2019-10-15  6:14 UTC  (3+ messages)

[PATCH v1] Ask user input only when CONFIG_X86 or CONFIG_COMPILE_TEST is set to y
 2019-10-14  9:51 UTC  (5+ messages)

[PATCH] Ask user input only when CONFIG_X86 or CONFIG_COMPILE_TEST is set to y
 2019-10-13 19:08 UTC  (9+ messages)

[GIT PULL] EFI fixes
 2019-10-12 22:35 UTC  (2+ messages)

[PATCH v2] x86, efi: never relocate kernel below lowest acceptable address
 2019-10-12  3:46 UTC  (6+ messages)

[PATCH v6 00/12] EFI Specific Purpose Memory Support
 2019-10-11 14:38 UTC  (9+ messages)
` [PATCH v6 05/12] x86/efi: EFI soft reservation to E820 enumeration


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).