public inbox for linux-efi@vger.kernel.org
 help / color / mirror / Atom feed
 messages from 2024-10-08 14:36:17 to 2024-11-04 11:54:01 UTC [more...]

[PATCH] efi: Fix memory leak in efivar_ssdt_load
 2024-11-04 11:53 UTC  (2+ messages)

[PATCH v9 00/19] x86: Trenchboot secure dynamic launch Linux kernel support
 2024-11-02 16:04 UTC  (14+ messages)
` [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements

[PATCH v11 00/20] x86: Trenchboot secure dynamic launch Linux kernel support
 2024-11-02 14:26 UTC  (44+ messages)
` [PATCH v11 01/20] Documentation/x86: Secure Launch kernel documentation
` [PATCH v11 14/20] tpm: Protect against locality counter underflow
` [PATCH v11 15/20] tpm: Ensure tpm is in known state at startup
` [PATCH v11 16/20] tpm: Make locality requests return consistent values
` [PATCH v11 17/20] tpm: Add ability to set the default locality the TPM chip uses
  ` [RFC PATCH] tpm, tpm_tis: Introduce TPM_IOC_SET_LOCALITY
      ` [RFC PATCH v2 1/2] "
        ` [RFC PATCH v2 2/2] tpm: show the default locality in sysfs
` [PATCH v11 18/20] tpm: Add sysfs interface to allow setting and querying the default locality

[PATCH v2] efi/memattr: Ignore table if the size is clearly bogus
 2024-10-31 17:58 UTC 

[PATCH 0/3] x86: Make 5-level paging support unconditional for x86-64
 2024-10-31 15:36 UTC  (5+ messages)

[PATCH] efi/memattr: Ignore table if the size is clearly bogus
 2024-10-31 14:32 UTC  (3+ messages)

[PATCH] efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption
 2024-10-31  9:04 UTC  (18+ messages)

[PATCH v5 00/16] Enable Linear Address Space Separation support
 2024-10-31  0:06 UTC  (42+ messages)
` [PATCH v5 01/16] x86/cpu: Enumerate the LASS feature bits
` [PATCH v5 02/16] x86/asm: Introduce inline memcpy and memset
` [PATCH v5 03/16] x86/alternatives: Disable LASS when patching kernel alternatives
` [PATCH v5 04/16] init/main.c: Move EFI runtime service initialization to x86/cpu
` [PATCH v5 05/16] x86/cpu: Defer CR pinning setup until after EFI initialization
` [PATCH v5 06/16] efi: Disable LASS around set_virtual_address_map call
` [PATCH v5 07/16] x86/vsyscall: Reorganize the #PF emulation code
` [PATCH v5 08/16] x86/traps: Consolidate user fixups in exc_general_protection()
` [PATCH v5 09/16] x86/vsyscall: Add vsyscall emulation for #GP
` [PATCH v5 10/16] x86/vsyscall: Disable LASS if vsyscall mode is set to EMULATE
` [PATCH v5 11/16] x86/vsyscall: Document the fact that vsyscall=emulate disables LASS
` [PATCH v5 12/16] x86/cpu: Set LASS CR4 bit as pinning sensitive
` [PATCH v5 13/16] x86/traps: Communicate a LASS violation in #GP message
` [PATCH v5 14/16] x86/cpu: Make LAM depend on LASS
` [PATCH v5 15/16] x86/cpu: Enable LASS during CPU initialization
` [PATCH v5 16/16] Revert "x86/lam: Disable ADDRESS_MASKING in most cases"

[PATCH v2] efi: sysfb_efi: Fix unused const variable 'efifb_fwnode_ops'
 2024-10-26  7:02 UTC 

[PATCH] drivers/firmware: Fix unused const variable 'efifb_fwnode_ops'
 2024-10-25  5:03 UTC  (2+ messages)

[RFC PATCH v3 00/13] Clavis LSM
 2024-10-24 19:57 UTC  (32+ messages)
` [RFC PATCH v3 01/13] certs: Remove CONFIG_INTEGRITY_PLATFORM_KEYRING check
` [RFC PATCH v3 02/13] certs: Introduce ability to link to a system key
` [RFC PATCH v3 03/13] clavis: Introduce a new system keyring called clavis
` [RFC PATCH v3 04/13] keys: Add new verification type (VERIFYING_CLAVIS_SIGNATURE)
` [RFC PATCH v3 05/13] clavis: Introduce a new key type called clavis_key_acl
` [RFC PATCH v3 06/13] clavis: Populate clavis keyring acl with kernel module signature
` [RFC PATCH v3 07/13] keys: Add ability to track intended usage of the public key
` [RFC PATCH v3 08/13] clavis: Introduce new LSM called clavis
` [RFC PATCH v3 09/13] clavis: Allow user to define acl at build time
` [RFC PATCH v3 10/13] efi: Make clavis boot param persist across kexec
` [RFC PATCH v3 11/13] clavis: Prevent boot param change during kexec
` [RFC PATCH v3 12/13] clavis: Add function redirection for Kunit support
` [RFC PATCH v3 13/13] clavis: "

[PATCH V10] acpi/prmt: find block with specific type
 2024-10-21 11:52 UTC  (2+ messages)

[efi:next] BUILD SUCCESS 63971b0f51faff0ff844a85d297e27861555c328
 2024-10-16 18:55 UTC 

[RFC PATCH v1 56/57] arm64: Determine THREAD_SIZE at boot-time
 2024-10-16 14:35 UTC  (9+ messages)
  ` [RFC PATCH v1 57/57] arm64: Enable boot-time page size selection

[PATCH v2 0/4] libstub,tpm: fix small bugs and improve error reporting
 2024-10-15 18:29 UTC  (2+ messages)

[PATCH] efi/libstub: measure initrd to PCR9 independent of source
 2024-10-15 18:23 UTC  (8+ messages)

[PATCH 0/4] efi/libstub: Clean up command line handling
 2024-10-15 18:15 UTC  (5+ messages)
` [PATCH 1/4] efi/libstub: Free correct pointer on failure
` [PATCH 2/4] efi/libstub: Parse builtin command line after bootloader provided one
` [PATCH 3/4] efi/libstub: Fix command line fallback handling when loading files
` [PATCH 4/4] efi/libstub: Take command line overrides into account for loaded files

[PATCH 1/3] efi/libstub: fix efi_parse_options() ignoring the default command line
 2024-10-15  2:08 UTC  (15+ messages)
` [PATCH 2/3] efi/libstub: remove uneccessary cmdline_size init/check
` [PATCH 3/3] efi/libstub: consider CONFIG_CMDLINE for initrd= and dtb= options

[PATCH v3 0/5] Fix issues with ARM Processor CPER records
 2024-10-14 10:00 UTC  (3+ messages)

[PATCH v2 0/2] efi/libstub: fix efi_parse_options() ignoring the default command line
 2024-10-14  9:55 UTC  (6+ messages)
` [PATCH v2 1/2] "
` [PATCH v2 2/2] efi/libstub: remove unnecessary cmd_line_len from efi_convert_cmdline()

[PATCH V9] acpi/prmt: find block with specific type
 2024-10-12 19:49 UTC  (3+ messages)

[PATCH V8] acpi/prmt: find block with specific type
 2024-10-12 19:38 UTC  (3+ messages)

[PATCH V7] acpi/prmt: find block with specific type
 2024-10-12 17:57 UTC  (5+ messages)

Possible overflow of TPM log
 2024-10-09 16:13 UTC  (2+ messages)

[RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
 2024-10-09 14:05 UTC  (13+ messages)

[PATCH v2 0/4] Enable measuring the kernel's Source-based Code Coverage and MC/DC with Clang
 2024-10-09  3:17 UTC  (2+ messages)

[RFC PATCH 00/28] x86: Rely on toolchain for relocatable code
 2024-10-08 14:36 UTC  (6+ messages)
` [RFC PATCH 05/28] x86: Define the stack protector guard symbol explicitly


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox