linux-efi.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2019-11-04 16:47:25 to 2019-11-14 18:04:54 UTC [more...]

[PATCH v4 00/10] Add Kernel Concurrency Sanitizer (KCSAN)
 2019-11-14 18:03 UTC  (11+ messages)
` [PATCH v4 01/10] kcsan: Add Kernel Concurrency Sanitizer infrastructure
` [PATCH v4 02/10] include/linux/compiler.h: Introduce data_race(expr) macro
` [PATCH v4 03/10] kcsan: Add Documentation entry in dev-tools
` [PATCH v4 04/10] objtool, kcsan: Add KCSAN runtime functions to whitelist
` [PATCH v4 05/10] build, kcsan: Add KCSAN build exceptions
` [PATCH v4 06/10] seqlock, kcsan: Add annotations for KCSAN
` [PATCH v4 07/10] seqlock: Require WRITE_ONCE surrounding raw_seqcount_barrier
` [PATCH v4 08/10] asm-generic, kcsan: Add KCSAN instrumentation for bitops
` [PATCH v4 09/10] locking/atomics, kcsan: Add KCSAN instrumentation
` [PATCH v4 10/10] x86, kcsan: Enable KCSAN for x86

[RFC PATCH v2] efi: arm64: Introduce /sys/firmware/efi/memreserve to tell the persistent pages
 2019-11-14 16:10 UTC 

[PATCH v5 0/6] CCIX Protocol error reporting
 2019-11-14 13:39 UTC  (7+ messages)
` [PATCH v5 1/6] efi / ras: CCIX Memory "
` [PATCH v5 2/6] efi / ras: CCIX Cache "
` [PATCH v5 3/6] efi / ras: CCIX Address Translation "
` [PATCH v5 4/6] efi / ras: CCIX Port "
` [PATCH v5 5/6] efi / ras: CCIX Link "
` [PATCH v5 6/6] efi / ras: CCIX Agent internal "

[PATCH v4 0/6] CCIX Protocol error reporting
 2019-11-14 13:17 UTC  (12+ messages)
` [PATCH v4 1/6] efi / ras: CCIX Memory "
` [PATCH v4 2/6] efi / ras: CCIX Cache "
` [PATCH v4 3/6] efi / ras: CCIX Address Translation "
` [PATCH v4 4/6] efi / ras: CCIX Port "
` [PATCH v4 5/6] efi / ras: CCIX Link "
` [PATCH v4 6/6] efi / ras: CCIX Agent internal "

[PATCH v7 0/8] efi/firmware/platform-x86: Add EFI embedded fw support
 2019-11-14 11:32 UTC  (10+ messages)
` [PATCH v7 1/8] efi: Export boot-services code and data as debugfs-blobs
` [PATCH v7 2/8] efi: Add embedded peripheral firmware support
` [PATCH v7 4/8] firmware: Add new platform fallback mechanism and firmware_request_platform()

[PATCH] sysfs: Fixes __BIN_ATTR_WO() macro
 2019-11-14  9:47 UTC  (3+ messages)

[PATCH v10 4/9] powerpc/ima: define trusted boot policy
 2019-11-14  9:08 UTC  (2+ messages)

[PATCH v10 6/9] certs: add wrapper function to check blacklisted binary hash
 2019-11-14  9:08 UTC  (2+ messages)

[PATCH v10 8/9] powerpc/ima: update ima arch policy to check for blacklist
 2019-11-14  9:08 UTC  (2+ messages)

[PATCH v10 7/9] ima: check against blacklisted hashes for files with modsig
 2019-11-14  9:08 UTC  (2+ messages)

[PATCH v10 0/9] powerpc: Enabling IMA arch specific secure boot policies
 2019-11-14  9:08 UTC  (8+ messages)
` [PATCH v10 1/9] powerpc: detect the secure boot mode of the system
  ` [PATCH v10a "
` [PATCH v10 3/9] powerpc: detect the trusted boot state "
  ` [PATCH v10a "

[PATCH v9 0/4] powerpc: expose secure variables to the kernel and userspace
 2019-11-14  9:08 UTC  (8+ messages)
` [PATCH v9 1/4] powerpc/powernv: Add OPAL API interface to access secure variable
` [PATCH v9 2/4] powerpc: expose secure variables to userspace via sysfs
` [PATCH v9 3/4] x86/efi: move common keyring handler functions to new file
` [PATCH v9 4/4] powerpc: load firmware trusted keys/hashes into kernel keyring

[RFC PATCH v10 9/9] powerpc/ima: indicate kernel modules appended signatures are enforced
 2019-11-14  9:08 UTC  (2+ messages)

[PATCH v10 5/9] ima: make process_buffer_measurement() generic
 2019-11-14  9:08 UTC  (2+ messages)

[PATCH v10 2/9] powerpc/ima: add support to initialize ima policy rules
 2019-11-14  9:08 UTC  (2+ messages)

[PATCH] efi: sanity check in case memermap() at efi_mem_reserve_persistent() returns NULL
 2019-11-13 20:56 UTC 

[RFC PATCH] efi: arm64: Introduce /sys/firmware/efi/memreserve to tell the persistent pages
 2019-11-13 19:43 UTC  (3+ messages)

[PATCH v3 0/6] CCIX Protocol error reporting
 2019-11-13  9:55 UTC  (12+ messages)
` [PATCH v3 1/6] efi / ras: CCIX Memory "
` [PATCH v3 2/6] efi / ras: CCIX Cache "
` [PATCH v3 3/6] efi / ras: CCIX Address Translation "
` [PATCH v3 4/6] efi / ras: CCIX Port "
` [PATCH v3 5/6] efi / ras: CCIX Link "
` [PATCH v3 6/6] efi / ras: CCIX Agent internal "

Investment opportunity
 2019-11-12 17:57 UTC 

[PATCH v6 0/3] x86/boot: Introduce the kernel_info et consortes
 2019-11-12 17:53 UTC  (7+ messages)
` [PATCH v6 1/3] x86/boot: Introduce the kernel_info
  ` [tip: x86/boot] x86/boot: Introduce kernel_info
` [PATCH v6 2/3] x86/boot: Introduce the kernel_info.setup_type_max
  ` [tip: x86/boot] x86/boot: Introduce kernel_info.setup_type_max
` [PATCH v6 3/3] x86/boot: Introduce the setup_indirect
  ` [tip: x86/boot] x86/boot: Introduce setup_indirect

[PATCH v1] efi/earlycon: Remap entire framebuffer after page initialization
 2019-11-12 16:13 UTC  (6+ messages)

[PATCH v2] efi/earlycon: Remap entire framebuffer after page initialization
 2019-11-12 16:12 UTC 

Linux 5.3.8: gsmi: failed to allocate name buffer. BUG: kernel NULL pointer dereference
 2019-11-11 21:46 UTC  (2+ messages)

[PATCH 5.3 175/193] efi/tpm: Return -EINVAL when determining tpm final events log size fails
 2019-11-11 18:29 UTC  (3+ messages)
` [PATCH 5.3 176/193] efi: libstub/arm: Account for firmware reserved memory at the base of RAM
` [PATCH 5.3 177/193] x86, efi: Never relocate kernel below lowest acceptable address

[PATCH] efi: Fix comment for efi_mem_type() wrt absent physical addresses
 2019-11-11  9:44 UTC  (3+ messages)

[PATCH AUTOSEL 4.19 133/191] efi: honour memory reservations passed via a linux specific config table
 2019-11-10 18:08 UTC  (12+ messages)
` [PATCH AUTOSEL 4.19 134/191] efi: Make efi_rts_work accessible to efi page fault handler
` [PATCH AUTOSEL 4.19 135/191] efi/x86: Handle page faults occurring while running EFI runtime services
` [PATCH AUTOSEL 4.19 191/191] x86/efi: fix a -Wtype-limits compilation warning

[PATCH v8 0/4] powerpc: expose secure variables to the kernel and userspace
 2019-11-09 19:00 UTC  (5+ messages)
` [PATCH v8 1/4] powerpc/powernv: Add OPAL API interface to access secure variable
` [PATCH v8 2/4] powerpc: expose secure variables to userspace via sysfs
` [PATCH v8 3/4] x86/efi: move common keyring handler functions to new file
` [PATCH v8 4/4] powerpc: load firmware trusted keys/hashes into kernel keyring

[PATCH v3 0/9] Add Kernel Concurrency Sanitizer (KCSAN)
 2019-11-08 14:23 UTC  (16+ messages)
` [PATCH v3 1/9] kcsan: Add Kernel Concurrency Sanitizer infrastructure

[PATCH v5 0/3] x86/boot: Introduce the kernel_info et consortes
 2019-11-08 13:39 UTC  (15+ messages)
` [PATCH v5 2/3] x86/boot: Introduce the kernel_info.setup_type_max
` [PATCH v5 3/3] x86/boot: Introduce the setup_indirect

[PATCH v7 0/4] powerpc: expose secure variables to the kernel and userspace
 2019-11-08  9:42 UTC  (7+ messages)
` [PATCH v7 1/4] powerpc/powernv: Add OPAL API interface to access secure variable
` [PATCH v7 2/4] powerpc: expose secure variables to userspace via sysfs
` [PATCH v7 3/4] x86/efi: move common keyring handler functions to new file
` [PATCH v7 4/4] powerpc: load firmware trusted keys/hashes into kernel keyring

[GIT PULL 0/4] EFI updates for v5.5
 2019-11-07 15:10 UTC  (5+ messages)
` [PATCH 1/4] MAINTAINERS: update Ard's email address to @kernel.org
` [PATCH 2/4] efi/random: use arch-independent efi_call_proto()
` [PATCH 3/4] x86: efi/random: Invoke EFI_RNG_PROTOCOL to seed the UEFI RNG table
` [PATCH 4/4] efi: libstub/tpm: enable tpm eventlog function for ARM platforms

Investment opportunity
 2019-11-07 15:08 UTC 

[PATCH v8 00/12] EFI Specific Purpose Memory Support
 2019-11-07 14:12 UTC  (16+ messages)
` [PATCH v8 01/12] acpi/numa: Establish a new drivers/acpi/numa/ directory
` [PATCH v8 02/12] efi: Enumerate EFI_MEMORY_SP
` [PATCH v8 03/12] x86/efi: Push EFI_MEMMAP check into leaf routines
` [PATCH v8 04/12] efi: Common enable/disable infrastructure for EFI soft reservation
` [PATCH v8 05/12] x86/efi: EFI soft reservation to E820 enumeration
` [PATCH v8 06/12] arm/efi: EFI soft reservation to memblock
` [PATCH v8 07/12] x86/efi: Add efi_fake_mem support for EFI_MEMORY_SP
` [PATCH v8 08/12] lib: Uplevel the pmem "region" ida to a global allocator
` [PATCH v8 09/12] dax: Fix alloc_dax_region() compile warning
` [PATCH v8 10/12] device-dax: Add a driver for "hmem" devices
` [PATCH v8 11/12] acpi/numa/hmat: Register HMAT at device_initcall level
` [PATCH v8 12/12] acpi/numa/hmat: Register "soft reserved" memory as an "hmem" device

[PATCH V2] EFI/stub: tpm: enable tpm eventlog function for ARM64 platform
 2019-11-07  9:20 UTC  (2+ messages)

[PATCH 00/30] security, efi: Add kernel lockdown
 2019-11-07  8:21 UTC  (3+ messages)
` [PATCH 18/30] acpi: Disable APEI error injection if the kernel is locked down

[PATCH] EFI/stub: tpm: enable tpm eventlog function for ARM64 platform
 2019-11-07  8:03 UTC  (4+ messages)

RE:RE:faktura n.529607753756
 2019-11-07  7:34 UTC 

[PATCH] efi: Return EFI_RESERVED_TYPE in efi_mem_type() for absent addresses
 2019-11-07  2:34 UTC  (3+ messages)

[PATCH 0/2] x86, efi/random: invoke EFI_RNG_PROTOCOL in the x86 EFI stub
 2019-11-06 14:38 UTC  (4+ messages)
` [PATCH 1/2] efi/random: use arch-independent efi_call_proto()
` [PATCH 2/2] x86: efi/random: Invoke EFI_RNG_PROTOCOL to seed the UEFI RNG table

[PATCH v6 0/4] powerpc: expose secure variables to the kernel and userspace
 2019-11-06  3:22 UTC  (7+ messages)
` [PATCH v6 1/4] powerpc/powernv: Add OPAL API interface to access secure variable
` [PATCH v6 2/4] powerpc: expose secure variables to userspace via sysfs
` [PATCH v6 3/4] x86/efi: move common keyring handler functions to new file
` [PATCH v6 4/4] powerpc: load firmware trusted keys/hashes into kernel keyring

[PATCH v3 5/9] seqlock, kcsan: Add annotations for KCSAN
 2019-11-05 15:22 UTC  (3+ messages)

[PATCH 4.4 15/46] efi/cper: Fix endianness of PCIe class code
 2019-11-04 21:44 UTC  (2+ messages)
` [PATCH 4.4 16/46] efi/x86: Do not clean dummy variable in kexec path

[PATCH 4.9 21/62] efi/cper: Fix endianness of PCIe class code
 2019-11-04 21:44 UTC  (2+ messages)
` [PATCH 4.9 22/62] efi/x86: Do not clean dummy variable in kexec path

[PATCH 4.14 41/95] efi/cper: Fix endianness of PCIe class code
 2019-11-04 21:44 UTC  (2+ messages)
` [PATCH 4.14 42/95] efi/x86: Do not clean dummy variable in kexec path

[PATCH 4.19 081/149] efi/cper: Fix endianness of PCIe class code
 2019-11-04 21:44 UTC  (2+ messages)
` [PATCH 4.19 082/149] efi/x86: Do not clean dummy variable in kexec path

[PATCH 5.3 051/163] efi/cper: Fix endianness of PCIe class code
 2019-11-04 21:44 UTC  (2+ messages)
` [PATCH 5.3 052/163] efi/x86: Do not clean dummy variable in kexec path


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).