Linux EFI Development - Date Index
[Prev Page][Next Page]
- Re: [PATCH v3 1/9] kcsan: Add Kernel Concurrency Sanitizer infrastructure, (continued)
- [PATCH v3 2/9] kcsan: Add Documentation entry in dev-tools, Marco Elver
- [PATCH v3 3/9] objtool, kcsan: Add KCSAN runtime functions to whitelist, Marco Elver
- [PATCH v3 5/9] seqlock, kcsan: Add annotations for KCSAN, Marco Elver
- [PATCH v3 6/9] seqlock: Require WRITE_ONCE surrounding raw_seqcount_barrier, Marco Elver
- [PATCH v3 7/9] asm-generic, kcsan: Add KCSAN instrumentation for bitops, Marco Elver
- [PATCH v3 8/9] locking/atomics, kcsan: Add KCSAN instrumentation, Marco Elver
- [PATCH v3 9/9] x86, kcsan: Enable KCSAN for x86, Marco Elver
- [PATCH v3 4/9] build, kcsan: Add KCSAN build exceptions, Marco Elver
- Re: [PATCH v3 0/9] Add Kernel Concurrency Sanitizer (KCSAN), Paul E. McKenney
- Re: x86/boot: add ramoops.mem_size=1048576 boot parameter cause can't boot,
youling 257
- [PATCH v10 0/9] powerpc: Enabling IMA arch specific secure boot policies,
Mimi Zohar
- [PATCH v10 1/9] powerpc: detect the secure boot mode of the system, Mimi Zohar
- [PATCH v10 2/9] powerpc/ima: add support to initialize ima policy rules, Mimi Zohar
- [PATCH v10 4/9] powerpc/ima: define trusted boot policy, Mimi Zohar
- [PATCH v10 6/9] certs: add wrapper function to check blacklisted binary hash, Mimi Zohar
- [PATCH v10 7/9] ima: check against blacklisted hashes for files with modsig, Mimi Zohar
- [RFC PATCH v10 9/9] powerpc/ima: indicate kernel modules appended signatures are enforced, Mimi Zohar
- [PATCH v10 8/9] powerpc/ima: update ima arch policy to check for blacklist, Mimi Zohar
- [PATCH v10 5/9] ima: make process_buffer_measurement() generic, Mimi Zohar
- [PATCH v10 3/9] powerpc: detect the trusted boot state of the system, Mimi Zohar
- Re: [PATCH v10 0/9] powerpc: Enabling IMA arch specific secure boot policies, Lakshmi Ramasubramanian
- [ARK INTERNAL PATCHv2 2/5] efi: Add an EFI_SECURE_BOOT flag to indicate secure boot mode, Jeremy Cline
- [GIT PULL v2 0/6] EFI fixes for v5.4,
Ard Biesheuvel
- [PATCH v5 4/4] powerpc: load firmware trusted keys/hashes into kernel keyring,
Nayna Jain
- [PATCH v5 0/4] powerpc: expose secure variables to the kernel and userspace,
Nayna Jain
- [PATCH v4 0/3] x86/boot: Introduce the kernel_info et consortes,
Daniel Kiper
- [PATCH v9 0/8] powerpc: Enabling IMA arch specific secure boot policies,
Nayna Jain
- [GIT PULL 0/5] EFI fixes for v5.4,
Ard Biesheuvel
- Re: [PATCH] Cleanup: replace prefered with preferred,
Laurent Pinchart
- [PATCH v8 0/8] powerpc: Enabling IMA arch specific secure boot policies,
Nayna Jain
- [PATCH AUTOSEL 5.3 48/89] efi/cper: Fix endianness of PCIe class code, Sasha Levin
- [PATCH AUTOSEL 5.3 49/89] efi/x86: Do not clean dummy variable in kexec path, Sasha Levin
- [PATCH AUTOSEL 4.19 075/100] efi/cper: Fix endianness of PCIe class code, Sasha Levin
- [PATCH AUTOSEL 4.19 076/100] efi/x86: Do not clean dummy variable in kexec path, Sasha Levin
- [PATCH AUTOSEL 4.14 38/56] efi/x86: Do not clean dummy variable in kexec path, Sasha Levin
- [PATCH AUTOSEL 4.9 17/29] efi/cper: Fix endianness of PCIe class code, Sasha Levin
- [PATCH AUTOSEL 4.4 12/21] efi/cper: Fix endianness of PCIe class code, Sasha Levin
- [PATCH AUTOSEL 4.4 13/21] efi/x86: Do not clean dummy variable in kexec path, Sasha Levin
- [PATCH AUTOSEL 4.9 18/29] efi/x86: Do not clean dummy variable in kexec path, Sasha Levin
- [PATCH AUTOSEL 4.14 37/56] efi/cper: Fix endianness of PCIe class code, Sasha Levin
- [PATCH v2 0/8] Add Kernel Concurrency Sanitizer (KCSAN),
Marco Elver
- [PATCH v2 1/8] kcsan: Add Kernel Concurrency Sanitizer infrastructure, Marco Elver
- Re: [PATCH v2 1/8] kcsan: Add Kernel Concurrency Sanitizer infrastructure, Alexander Potapenko
- Re: [PATCH v2 1/8] kcsan: Add Kernel Concurrency Sanitizer infrastructure, Mark Rutland
- Re: [PATCH v2 1/8] kcsan: Add Kernel Concurrency Sanitizer infrastructure, Oleg Nesterov
- Re: [PATCH v2 1/8] kcsan: Add Kernel Concurrency Sanitizer infrastructure, Dmitry Vyukov
- Re: [PATCH v2 1/8] kcsan: Add Kernel Concurrency Sanitizer infrastructure, Dmitry Vyukov
- Re: [PATCH v2 1/8] kcsan: Add Kernel Concurrency Sanitizer infrastructure, Dmitry Vyukov
- Re: [PATCH v2 1/8] kcsan: Add Kernel Concurrency Sanitizer infrastructure, Dmitry Vyukov
- Re: [PATCH v2 1/8] kcsan: Add Kernel Concurrency Sanitizer infrastructure, Dmitry Vyukov
- Re: [PATCH v2 1/8] kcsan: Add Kernel Concurrency Sanitizer infrastructure, Dmitry Vyukov
- Re: [PATCH v2 1/8] kcsan: Add Kernel Concurrency Sanitizer infrastructure, Dmitry Vyukov
- Re: [PATCH v2 1/8] kcsan: Add Kernel Concurrency Sanitizer infrastructure, Dmitry Vyukov
- Re: [PATCH v2 1/8] kcsan: Add Kernel Concurrency Sanitizer infrastructure, Dmitry Vyukov
- [PATCH v2 2/8] objtool, kcsan: Add KCSAN runtime functions to whitelist, Marco Elver
- [PATCH v2 3/8] build, kcsan: Add KCSAN build exceptions, Marco Elver
- [PATCH v2 4/8] seqlock, kcsan: Add annotations for KCSAN, Marco Elver
- [PATCH v2 7/8] locking/atomics, kcsan: Add KCSAN instrumentation, Marco Elver
- [PATCH v2 8/8] x86, kcsan: Enable KCSAN for x86, Marco Elver
- [PATCH v2 5/8] seqlock: Require WRITE_ONCE surrounding raw_seqcount_barrier, Marco Elver
- [PATCH v2 6/8] asm-generic, kcsan: Add KCSAN instrumentation for bitops, Marco Elver
- [PATCH v4] x86, efi: never relocate kernel below lowest acceptable address,
Kairui Song
- [PATCH 4.9 76/92] efivar/ssdt: Dont iterate over EFI vars if no SSDT override was specified, Greg Kroah-Hartman
- [PATCH 4.14 43/65] efivar/ssdt: Dont iterate over EFI vars if no SSDT override was specified, Greg Kroah-Hartman
- [PATCH 4.19 49/81] efivar/ssdt: Dont iterate over EFI vars if no SSDT override was specified, Greg Kroah-Hartman
- [PATCH 5.3 063/112] efi/tpm: Dont access event->count when it isnt mapped, Greg Kroah-Hartman
- [PATCH 5.3 064/112] efi/tpm: Dont traverse an event log with no events, Greg Kroah-Hartman
- [PATCH 5.3 065/112] efi/tpm: Only set efi_tpm_final_log_size after successful event log parsing, Greg Kroah-Hartman
- [PATCH 5.3 111/112] efi/tpm: Fix sanity check of unsigned tbl_size being less than zero, Greg Kroah-Hartman
- [PATCH 5.3 062/112] efivar/ssdt: Dont iterate over EFI vars if no SSDT override was specified, Greg Kroah-Hartman
- [PATCH 0/8] Add Kernel Concurrency Sanitizer (KCSAN),
Marco Elver
- [PATCH 1/8] kcsan: Add Kernel Concurrency Sanitizer infrastructure, Marco Elver
- [PATCH 2/8] objtool, kcsan: Add KCSAN runtime functions to whitelist, Marco Elver
- [PATCH 4/8] seqlock, kcsan: Add annotations for KCSAN, Marco Elver
- [PATCH 5/8] seqlock: Require WRITE_ONCE surrounding raw_seqcount_barrier, Marco Elver
- [PATCH 6/8] asm-generic, kcsan: Add KCSAN instrumentation for bitops, Marco Elver
- [PATCH 8/8] x86, kcsan: Enable KCSAN for x86, Marco Elver
- [PATCH 7/8] locking/atomics, kcsan: Add KCSAN instrumentation, Marco Elver
- [PATCH 3/8] build, kcsan: Add KCSAN build exceptions, Marco Elver
- Re: [PATCH 0/8] Add Kernel Concurrency Sanitizer (KCSAN), Marco Elver
- [PATCH v7 00/12] EFI Specific Purpose Memory Support,
Dan Williams
- [PATCH v7 01/12] acpi/numa: Establish a new drivers/acpi/numa/ directory, Dan Williams
- [PATCH v7 02/12] efi: Enumerate EFI_MEMORY_SP, Dan Williams
- [PATCH v7 03/12] x86/efi: Push EFI_MEMMAP check into leaf routines, Dan Williams
- [PATCH v7 04/12] efi: Common enable/disable infrastructure for EFI soft reservation, Dan Williams
- [PATCH v7 05/12] x86/efi: EFI soft reservation to E820 enumeration, Dan Williams
- [PATCH v7 06/12] arm/efi: EFI soft reservation to memblock, Dan Williams
- [PATCH v7 07/12] x86/efi: Add efi_fake_mem support for EFI_MEMORY_SP, Dan Williams
- [PATCH v7 08/12] lib: Uplevel the pmem "region" ida to a global allocator, Dan Williams
- [PATCH v7 09/12] dax: Fix alloc_dax_region() compile warning, Dan Williams
- [PATCH v7 10/12] device-dax: Add a driver for "hmem" devices, Dan Williams
- [PATCH v7 11/12] acpi/numa/hmat: Register HMAT at device_initcall level, Dan Williams
- [PATCH v7 12/12] acpi/numa/hmat: Register "soft reserved" memory as an "hmem" device, Dan Williams
- Re: [PATCH v7 00/12] EFI Specific Purpose Memory Support, Ard Biesheuvel
- [PATCH] efi/tpm: return -EINVAL when determining tpm final events log size fails,
Jerry Snitselaar
- [PATCH] efi: libstub/arm: account for firmware reserved memory at the base of RAM,
Ard Biesheuvel
- [PATCH v1] Ask user input only when CONFIG_X86 or CONFIG_COMPILE_TEST is set to y,
Narendra.K
- [PATCH v3] x86, efi: never relocate kernel below lowest acceptable address,
Kairui Song
- [PATCH v9 20/28] x86/asm: Make some functions local,
Jiri Slaby
- [PATCH v9 24/28] x86_64/asm: Change all ENTRY+ENDPROC to SYM_FUNC_*,
Jiri Slaby
- [PATCH v9 27/28] x86_32/asm: Change all ENTRY+ENDPROC to SYM_FUNC_*,
Jiri Slaby
- [PATCH v6 00/12] EFI Specific Purpose Memory Support,
Dan Williams
- [PATCH v6 01/12] acpi/numa: Establish a new drivers/acpi/numa/ directory, Dan Williams
- [PATCH v6 02/12] efi: Enumerate EFI_MEMORY_SP, Dan Williams
- [PATCH v6 05/12] x86/efi: EFI soft reservation to E820 enumeration, Dan Williams
- [PATCH v6 04/12] efi: Common enable/disable infrastructure for EFI soft reservation, Dan Williams
- [PATCH v6 06/12] arm/efi: EFI soft reservation to memblock, Dan Williams
- [PATCH v6 07/12] x86/efi: Add efi_fake_mem support for EFI_MEMORY_SP, Dan Williams
- [PATCH v6 08/12] lib: Uplevel the pmem "region" ida to a global allocator, Dan Williams
- [PATCH v6 09/12] dax: Fix alloc_dax_region() compile warning, Dan Williams
- [PATCH v6 10/12] device-dax: Add a driver for "hmem" devices, Dan Williams
- [PATCH v6 11/12] acpi/numa/hmat: Register HMAT at device_initcall level, Dan Williams
- [PATCH v6 03/12] x86/efi: Push EFI_MEMMAP check into leaf routines, Dan Williams
- [PATCH v6 12/12] acpi/numa/hmat: Register "soft reserved" memory as an "hmem" device, Dan Williams
- [PATCH v3 0/3] x86/boot: Introduce the kernel_info et consortes,
Daniel Kiper
- [PATCH v2] efi/efi_test: lock down /dev/efi_test and require CAP_SYS_ADMIN,
Javier Martinez Canillas
- [PATCH][next] efi/tpm: fix sanity check of unsigned tbl_size being less than zero,
Colin King
- [PATCH v7 0/8] powerpc: Enabling IMA arch specific secure boot policies,
Nayna Jain
- [RFC PATCH] arch/x86: efistub: Invoke EFI_RNG_PROTOCOL to seed the UEFI RNG table,
Dominik Brodowski
- [PATCH v7 0/8] efi/firmware/platform-x86: Add EFI embedded fw support,
Hans de Goede
- [PATCH v7 1/8] efi: Export boot-services code and data as debugfs-blobs, Hans de Goede
- [PATCH v7 2/8] efi: Add embedded peripheral firmware support, Hans de Goede
- [PATCH v7 3/8] firmware: Rename FW_OPT_NOFALLBACK to FW_OPT_NOFALLBACK_SYSFS, Hans de Goede
- [PATCH v7 4/8] firmware: Add new platform fallback mechanism and firmware_request_platform(), Hans de Goede
- [PATCH v7 5/8] Input: silead - Switch to firmware_request_platform for retreiving the fw, Hans de Goede
- [PATCH v7 6/8] Input: icn8505 - Switch to firmware_request_platform for retreiving the fw, Hans de Goede
- [PATCH v7 7/8] platform/x86: touchscreen_dmi: Add EFI embedded firmware info support, Hans de Goede
- [PATCH v7 8/8] platform/x86: touchscreen_dmi: Add info for the Chuwi Vi8 Plus tablet, Hans de Goede
- Re: [PATCH v7 0/8] efi/firmware/platform-x86: Add EFI embedded fw support, Ingo Molnar
- Re: [PATCH v7 0/8] efi/firmware/platform-x86: Add EFI embedded fw support, Luis Chamberlain
- [PATCH] efi/efi_test: require CAP_SYS_ADMIN to open the chardev,
Javier Martinez Canillas
- [PATCH] Ask user input only when CONFIG_X86 or CONFIG_COMPILE_TEST is set to y,
Narendra.K
- [GIT PULL 0/7] EFI fixes for v5.4,
Ard Biesheuvel
- [PATCH v4 0/4] powerpc: expose secure variables to the kernel and userspace,
Nayna Jain
- [PATCH] sysfs: Fixes __BIN_ATTR_WO() macro,
Nayna Jain
- 5.3.1: x86: efi stub seems to fail to load initrd file,
Thomas Meyer
- [RFC] random: UEFI RNG input is bootloader randomness,
Dominik Brodowski
- [PATCH v6 0/9] powerpc: Enabling IMA arch specific secure boot policies,
Nayna Jain
- [PATCH v6 1/9] dt-bindings: ibm,secureboot: secure boot specific properties for PowerNV, Nayna Jain
- [PATCH v6 2/9] powerpc: detect the secure boot mode of the system, Nayna Jain
- [PATCH v6 3/9] powerpc: add support to initialize ima policy rules, Nayna Jain
- [PATCH v6 4/9] powerpc: detect the trusted boot state of the system, Nayna Jain
- [PATCH v6 5/9] powerpc/ima: add measurement rules to ima arch specific policy, Nayna Jain
- [PATCH v6 6/9] ima: make process_buffer_measurement() non static, Nayna Jain
- [PATCH v6 7/9] ima: check against blacklisted hashes for files with modsig, Nayna Jain
- [PATCH v6 8/9] ima: deprecate permit_directio, instead use appraise_flag, Nayna Jain
- [PATCH v6 9/9] powerpc/ima: update ima arch policy to check for blacklist, Nayna Jain
- [PATCH] x86/efi: Don't require non-blocking EFI callbacks,
Ross Lagerwall
- [PATCH v3] tpm: only set efi_tpm_final_log_size after successful event log parsing,
Jerry Snitselaar
- [PATCH v2] tpm: only set efi_tpm_final_log_size after successful event log parsing, Jerry Snitselaar
- [PATCH] efi: make unexported efi_rci2_sysfs_init static,
Ben Dooks
- [PATCH v2 1/2] efi+tpm: Don't access event->count when it isn't mapped.,
Jarkko Sakkinen
- [PATCH 1/2] efi: Add efi_memmap_free() to free EFI memory map,
Yunfeng Ye
- [PATCH AUTOSEL 4.19 039/128] efi: cper: print AER info of PCIe fatal error, Sasha Levin
- [PATCH AUTOSEL 5.2 053/185] efi: cper: print AER info of PCIe fatal error, Sasha Levin
- [PATCH AUTOSEL 4.14 30/89] efi: cper: print AER info of PCIe fatal error, Sasha Levin
- [PATCH AUTOSEL 4.9 22/60] efi: cper: print AER info of PCIe fatal error, Sasha Levin
- [PATCH AUTOSEL 4.4 19/44] efi: cper: print AER info of PCIe fatal error, Sasha Levin
- [PATCH AUTOSEL 5.3 062/203] efi: cper: print AER info of PCIe fatal error, Sasha Levin
- [PATCH v2] x86, efi: never relocate kernel below lowest acceptable address,
Kairui Song
- [RFC PATCH] tpm: only set efi_tpm_final_log_size after successful event log parsing,
Jerry Snitselaar
- [GIT PULL] EFI changes for v5.4,
Ingo Molnar
- [PATCH] efi: don't iterate over EFI vars pointlessly if no SSDT override was specified,
Ard Biesheuvel
- Boot regression in 4.8 for Mac Pro server,
Scott Talbert
- [RFC PATCH] x86, efi: never relocate the kernel below LOAD_PHYSICAL_ADDR, Kairui Song
- [PATCH 0/9] crypto: sha256 - Merge crypto/sha256.h into crypto/sha.h,
Hans de Goede
- [PATCH 3/9] crypto: s390 - Rename functions to avoid conflict with crypto/sha256.h, Hans de Goede
- [PATCH 4/9] crypto: x86 - Rename functions to avoid conflict with crypto/sha256.h, Hans de Goede
- [PATCH 2/9] crypto: arm64 - Rename functions to avoid conflict with crypto/sha256.h, Hans de Goede
- [PATCH 1/9] crypto: arm - Rename functions to avoid conflict with crypto/sha256.h, Hans de Goede
- [PATCH 5/9] crypto: ccree - Rename arrays to avoid conflict with crypto/sha256.h, Hans de Goede
- [PATCH 6/9] crypto: chelsio - Rename arrays to avoid conflict with crypto/sha256.h, Hans de Goede
- [PATCH 7/9] crypto: n2 - Rename arrays to avoid conflict with crypto/sha256.h, Hans de Goede
- [PATCH 8/9] crypto: sha256 - Merge crypto/sha256.h into crypto/sha.h, Hans de Goede
- [PATCH 9/9] crypto: sha256 - Remove sha256/224_init code duplication, Hans de Goede
- Re: [PATCH 0/9] crypto: sha256 - Merge crypto/sha256.h into crypto/sha.h, Ard Biesheuvel
- Re: [PATCH 0/9] crypto: sha256 - Merge crypto/sha256.h into crypto/sha.h, Herbert Xu
- [PATCH v5 00/10] EFI Specific Purpose Memory Support,
Dan Williams
- [PATCH v5 01/10] acpi/numa: Establish a new drivers/acpi/numa/ directory, Dan Williams
- [PATCH v5 02/10] efi: Enumerate EFI_MEMORY_SP, Dan Williams
- [PATCH v5 03/10] x86, efi: Push EFI_MEMMAP check into leaf routines, Dan Williams
- [PATCH v5 04/10] x86, efi: Reserve UEFI 2.8 Specific Purpose Memory for dax, Dan Williams
- [PATCH v5 05/10] x86, efi: Add efi_fake_mem support for EFI_MEMORY_SP, Dan Williams
- [PATCH v5 06/10] lib: Uplevel the pmem "region" ida to a global allocator, Dan Williams
- [PATCH v5 07/10] dax: Fix alloc_dax_region() compile warning, Dan Williams
- [PATCH v5 08/10] device-dax: Add a driver for "hmem" devices, Dan Williams
- [PATCH v5 09/10] acpi/numa/hmat: Register HMAT at device_initcall level, Dan Williams
- [PATCH v5 10/10] acpi/numa/hmat: Register "soft reserved" memory as an "hmem" device, Dan Williams
- Re: [PATCH v5 00/10] EFI Specific Purpose Memory Support, Rafael J. Wysocki
- [PATCH 1/2] efi+tpm: Don't access event->count when it isn't mapped.,
Peter Jones
- [PATCH v3 0/4] powerpc: expose secure variables to the kernel and userspace,
Nayna Jain
- [PATCH] crypto: sha256 - Add missing MODULE_LICENSE() to lib/crypto/sha256.c,
Hans de Goede
- [PATCH] efi: cper: Fix endianness of PCIe class code,
Lukas Wunner
- [PATCH v2 0/4] powerpc: expose secure variables to the kernel and userspace,
Nayna Jain
- [PATCH 0/6 V2] CCIX Protocol error reporting.,
Jonathan Cameron
- [PATCH V40 28/29] efi: Restrict efivar_ssdt_load when the kernel is locked down, Matthew Garrett
- [PATCH 0/2] efi: Allow to auto-disable it on RT,
Sebastian Andrzej Siewior
- Early EFI-related boot freeze in parse_setup_data(),
Daniel Drake
- arm64/efistub boot error with CONFIG_GCC_PLUGIN_STACKLEAK,
skodde
- [GIT PULL 0/5] EFI updates for v5.4,
Ard Biesheuvel
- [GIT PULL 0/1] EFI fix for v5.3-rc4,
Ard Biesheuvel
- [PATCH v8 20/28] x86/asm: make some functions local, Jiri Slaby
- [PATCH v8 27/28] x86_32/asm: change all ENTRY+ENDPROC to SYM_FUNC_*, Jiri Slaby
- [PATCH v8 24/28] x86_64/asm: change all ENTRY+ENDPROC to SYM_FUNC_*, Jiri Slaby
- [PATCH V38 28/29] efi: Restrict efivar_ssdt_load when the kernel is locked down, Matthew Garrett
- [PATCH 5.3 regression fix] efi-stub: Fix get_efi_config_table on mixed-mode setups,
Hans de Goede
- [PATCH AUTOSEL 5.2 36/59] arm64/efi: fix variable 'si' set but not used, Sasha Levin
- [PATCH AUTOSEL 4.19 20/32] arm64/efi: fix variable 'si' set but not used, Sasha Levin
- [PATCH AUTOSEL 4.9 11/17] arm64/efi: fix variable 'si' set but not used, Sasha Levin
- [PATCH AUTOSEL 4.14 16/25] arm64/efi: fix variable 'si' set but not used, Sasha Levin
- [PATCH] do not clean dummy variable in kexec path,
Dave Young
- [PATCH 2/2] ia64: Replace strncmp with str_has_prefix, Chuhong Yuan
[Index of Archives]
[Linux Kernel Development]
[Security]
[Linux ARM Kernel]
[Tools]
[Linux MIPS]
[Linux S390]
[Bugtraq]
[Share Photos]>
[Fedora ARM]