linux-efi.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2024-02-20 20:33:42 to 2024-03-11 16:19:48 UTC [more...]

[PATCH RFC 0/8] Clavis LSM
 2024-03-11 16:11 UTC  (6+ messages)
` [PATCH RFC 1/8] certs: Introduce ability to link to a system key
` [PATCH RFC 2/8] clavis: Introduce a new system keyring called clavis
` [PATCH RFC 3/8] efi: Make clavis boot param persist across kexec
` [PATCH RFC 4/8] clavis: Prevent clavis boot param from changing during kexec
` [PATCH RFC 5/8] keys: Add new verification type (VERIFYING_CLAVIS_SIGNATURE)

[PATCH 0/4] PCI: Consolidate TLP Log reading and printing
 2024-03-11 11:34 UTC  (3+ messages)

[efi:next] BUILD SUCCESS 021bc4b9d7ed8dcc90dc288e59f120fa6e3087dc
 2024-03-09 23:30 UTC 

[efi:next] BUILD SUCCESS WITH WARNING 4749cfc7ffaa827b6ecc916ab8d09bae718688bc
 2024-03-09  7:01 UTC 

[efi:next 1/7] drivers/firmware/efi/libstub/efi-stub-helper.c:225:26: warning: field tagged_event within 'struct efistub_measured_event' is less aligned than 'TCG_PCClientTaggedEvent' (aka 'struct tdTCG_PCClientTaggedEvent') and is usually due to 'struct efistub_measure
 2024-03-09  3:07 UTC 

[PATCH v3 0/5] efi/libstub: Fall back to CC proto for measurement
 2024-03-08 10:05 UTC  (10+ messages)
` [PATCH v3 1/5] efi/libstub: Use correct event size when measuring data into the TPM
` [PATCH v3 2/5] efi/tpm: Use symbolic GUID name from spec for final events table
` [PATCH v3 3/5] efi/libstub: Add Confidential Computing (CC) measurement typedefs
` [PATCH v3 4/5] efi/libstub: Measure into CC protocol if TCG2 protocol is absent
` [PATCH v3 5/5] efi/libstub: Add get_event_log() support for CC platforms

[efi:next] BUILD SUCCESS 540e90b461259ac990ce234f526668b86583e3cc
 2024-03-08  9:04 UTC 

[PATCH 1/3] Revert "riscv/efistub: Ensure GP-relative addressing is not used"
 2024-03-08  8:16 UTC  (24+ messages)
` [PATCH 2/3] Revert "riscv/efistub: Tighten ELF relocation check"
` [PATCH 3/3] efistub: fix missed the initialization of gp
    ` [External] "
    ` [External] Re: [PATCH 1/3] Revert "riscv/efistub: Ensure GP-relative addressing is not used"

[PATCH] riscv: dmi: Add SMBIOS/DMI support
 2024-03-08  7:38 UTC  (3+ messages)

[PATCH v2 0/5] efi/libstub: Fall back to CC proto for measurement
 2024-03-08  7:03 UTC  (9+ messages)
` [PATCH v2 1/5] efi/libstub: Fold efi_tcg2_tagged_event into efi_measured_event
` [PATCH v2 2/5] efi/tpm: Use symbolic GUID name from spec for final events table
` [PATCH v2 3/5] efi/libstub: Add Confidential Computing (CC) measurement typedefs
` [PATCH v2 4/5] efi/libstub: Measure into CC protocol if TCG2 protocol is absent
` [PATCH v2 5/5] efi/libstub: Add get_event_log() support for CC platforms

[Bug Report] Bug in "efi/libstub: Add get_event_log() support for CC platforms"
 2024-03-07 16:21 UTC  (7+ messages)

[efi:next] BUILD SUCCESS 34dbd8b7c991b784fcc1af7bfa5b6f96f33ff196
 2024-03-06 14:54 UTC 

판매 문의 2024
 2024-03-06  3:51 UTC 

[PATCH 0/4] efi/libstub: Fall back to CC proto for measurement
 2024-03-05 21:39 UTC  (21+ messages)
` [PATCH 1/4] efi/libstub: Fold efi_tcg2_tagged_event into efi_measured_event
` [PATCH 2/4] efi/libstub: Add Confidential Computing (CC) measurement typedefs
` [PATCH 3/4] efi/libstub: Measure into CC protocol if TCG2 protocol is absent
` [PATCH 4/4] efi/libstub: Add get_event_log() support for CC platforms

[PATCH v5 0/3] Add post-init-providers binding to improve suspend/resume stability
 2024-03-05  5:04 UTC  (4+ messages)
` [PATCH v5 1/3] driver core: Adds flags param to fwnode_link_add()
` [PATCH v5 2/3] driver core: Add FWLINK_FLAG_IGNORE to completely ignore a fwnode link
` [PATCH v5 3/3] of: property: fw_devlink: Add support for "post-init-providers" property

[PATCH v4 0/4] Add post-init-providers binding to improve suspend/resume stability
 2024-03-04 14:06 UTC  (8+ messages)
` [PATCH v4 1/4] driver core: Adds flags param to fwnode_link_add()
` [PATCH v4 2/4] driver core: Add FWLINK_FLAG_IGNORE to completely ignore a fwnode link
` [PATCH v4 3/4] dt-bindings: Add post-init-providers property
` [PATCH v4 4/4] of: property: fw_devlink: Add support for "post-init-providers" property

[PATCH stable-v6.1 00/18] efistub/x86 changes for secure boot
 2024-03-04 11:42 UTC  (20+ messages)
` [PATCH stable-v6.1 01/18] arm64: efi: Limit allocations to 48-bit addressable physical region
` [PATCH stable-v6.1 02/18] efi: efivars: prevent double registration
` [PATCH stable-v6.1 03/18] x86/efistub: Simplify and clean up handover entry code
` [PATCH stable-v6.1 04/18] x86/decompressor: Avoid magic offsets for EFI handover entrypoint
` [PATCH stable-v6.1 05/18] x86/efistub: Clear BSS in EFI handover protocol entrypoint
` [PATCH stable-v6.1 06/18] x86/decompressor: Move global symbol references to C code
` [PATCH stable-v6.1 07/18] efi/libstub: Add memory attribute protocol definitions
` [PATCH stable-v6.1 08/18] efi/libstub: Add limit argument to efi_random_alloc()
` [PATCH stable-v6.1 09/18] x86/efistub: Perform 4/5 level paging switch from the stub
` [PATCH stable-v6.1 10/18] x86/decompressor: Factor out kernel decompression and relocation
` [PATCH stable-v6.1 11/18] x86/efistub: Prefer EFI memory attributes protocol over DXE services
` [PATCH stable-v6.1 12/18] x86/efistub: Perform SNP feature test while running in the firmware
` [PATCH stable-v6.1 13/18] x86/efistub: Avoid legacy decompressor when doing EFI boot
` [PATCH stable-v6.1 14/18] efi/x86: Avoid physical KASLR on older Dell systems
` [PATCH stable-v6.1 15/18] x86/efistub: Avoid placing the kernel below LOAD_PHYSICAL_ADDR
` [PATCH stable-v6.1 16/18] x86/boot: Rename conflicting 'boot_params' pointer to 'boot_params_ptr'
` [PATCH stable-v6.1 17/18] x86/boot: efistub: Assign global boot_params variable
` [PATCH stable-v6.1 18/18] efi/x86: Fix the missing KASLR_FLAG bit in boot_params->hdr.loadflags

[PATCH v2 0/2] Add measurement and event log support for CC platforms
 2024-03-04 10:41 UTC  (13+ messages)
` [PATCH v2 1/2] efi/libstub: Add Confidential Computing (CC) measurement support
` [PATCH v2 2/2] efi/libstub: Add get_event_log() support for CC platforms

Development of new flavors
 2024-03-04  8:50 UTC 

[PATCH 0/4] efi/cxl-cper: Report CXL CPER events through tracing
 2024-03-01 22:19 UTC  (12+ messages)
` [PATCH 1/4] cxl/event: Add missing include files
` [PATCH 2/4] acpi/ghes: Process CXL Component Events
` [PATCH 3/4] cxl/pci: Register for and process CPER events
` [PATCH 4/4] ras/events: Trace CXL CPER events even without the CXL stack loaded

[GIT PULL] EFI fixes for v6.8 #2
 2024-03-01 20:17 UTC  (2+ messages)

[PATCH v3 0/4] Add post-init-providers binding to improve suspend/resume stability
 2024-02-29 18:01 UTC  (14+ messages)
` [PATCH v3 1/4] driver core: Adds flags param to fwnode_link_add()
` [PATCH v3 2/4] driver core: Add FWLINK_FLAG_IGNORE to completely ignore a fwnode link
` [PATCH v3 3/4] dt-bindings: Add post-init-providers property
` [PATCH v3 4/4] of: property: fw_devlink: Add support for "post-init-providers" property

[efi:urgent] BUILD SUCCESS 2ce507f57ba9c78c080d4a050ebdc97263239de8
 2024-02-25 21:28 UTC 

[PATCH 1/2] efivarfs: Drop redundant cleanup on fill_super() failure
 2024-02-24 18:03 UTC  (2+ messages)
` [PATCH 2/2] efivarfs: Drop 'duplicates' bool parameter on efivar_init()

[PATCH v8 00/15] x86: Trenchboot secure dynamic launch Linux kernel support
 2024-02-23 18:30 UTC  (25+ messages)
` [PATCH v8 04/15] x86: Secure Launch Resource Table header file
` [PATCH v8 06/15] x86: Add early SHA support for Secure Launch early measurements
` [PATCH v8 14/15] x86: Secure Launch late initcall platform module
` [PATCH v8 15/15] x86: EFI stub DRTM launch support for Secure Launch

[PATCH 0/2] x86/snp: Add kexec support
 2024-02-22 13:58 UTC  (5+ messages)
  ` [PATCH 2/2] x86/snp: Convert shared memory back to private on kexec

[PATCH v2 0/4] Add post-init-supplier binding to improve suspend/resume stability
 2024-02-21 22:47 UTC  (12+ messages)
` [PATCH v2 3/4] dt-bindings: Add post-init-supplier property

[PATCH 0/4] arm64: mm: support dynamic vmalloc/pmd configuration
 2024-02-21 17:57 UTC  (17+ messages)
` [PATCH 1/4] mm/vmalloc: allow arch-specific vmalloc_node overrides
` [PATCH 2/4] mm: pgalloc: support address-conditional pmd allocation
      ` [External] "
` [PATCH 3/4] arm64: separate code and data virtual memory allocation
` [PATCH 4/4] arm64: dynamic enforcement of pmd-level PXNTable
  ` [External] Re: [PATCH 0/4] arm64: mm: support dynamic vmalloc/pmd configuration


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).