messages from 2013-02-16 19:01:40 to 2013-03-20 11:47:45 UTC [more...]
[PATCH] x86/efi: pull NV+BS variables out before we exit boot services
2013-03-20 11:47 UTC (15+ messages)
EFI: Stash ROMs if they're not in the PCI BAR
2013-03-20 9:27 UTC (7+ messages)
efivarfs: Bad directory entry when variable has / in name
2013-03-20 8:41 UTC (2+ messages)
[PATCH 01/12] Security: Add CAP_COMPROMISE_KERNEL
2013-03-20 3:27 UTC (6+ messages)
[PATCH] efivar: Disable get_next_variable when firmware is broken
2013-03-20 2:10 UTC (4+ messages)
[PATCH 01/12] Security: Add CAP_COMPROMISE_KERNEL
2013-03-20 1:11 UTC (2+ messages)
[PATCH 01/12] Security: Add CAP_COMPROMISE_KERNEL
2013-03-20 1:09 UTC
[PATCH 01/12] Security: Add CAP_COMPROMISE_KERNEL
2013-03-20 1:05 UTC (21+ messages)
` [PATCH 03/12] Secure boot: Add a dummy kernel parameter that will switch on Secure Boot mode
` [PATCH 05/12] PCI: Require CAP_COMPROMISE_KERNEL for PCI BAR access
` [PATCH 06/12] x86: Require CAP_COMPROMISE_KERNEL for IO port access
` [PATCH 08/12] asus-wmi: Restrict debugfs interface
` [PATCH 09/12] Require CAP_COMPROMISE_KERNEL for /dev/mem and /dev/kmem access
` [PATCH 02/12] SELinux: define mapping for CAP_COMPROMISE_KERNEL
` [PATCH 04/12] efi: Enable secure boot lockdown automatically when enabled in firmware
` [PATCH 07/12] ACPI: Limit access to custom_method
` [PATCH 10/12] acpi: Ignore acpi_rsdp kernel parameter in a secure boot environment
` [PATCH v2] "
` [PATCH 11/12] x86: Require CAP_COMPROMISE_KERNEL for MSR writing
` [PATCH 12/12] kexec: Require CAP_SYS_COMPROMISE_KERNEL
[PATCH 06/12] x86: Require CAP_COMPROMISE_KERNEL for IO port access
2013-03-20 1:05 UTC
sysfs: cannot create duplicate filename
2013-03-19 16:00 UTC (21+ messages)
Curious crash with secure variables
2013-03-18 18:22 UTC (10+ messages)
[PATCH] efivarfs: fix abnormal GUID in variable name by using strcpy to replace null with dash
2013-03-18 15:29 UTC (23+ messages)
[PATCH] efivars: Allow disabling use as a pstore backend
2013-03-13 19:44 UTC (14+ messages)
[PATCH] efivars: allow efi pstore variable when validate filename
2013-03-12 3:06 UTC (2+ messages)
[PATCH] efivars: allow efi pstore variable when validate filename
2013-03-11 18:57 UTC
Problem mounting efivarfs in 3.9
2013-03-07 15:09 UTC (4+ messages)
[PATCH] efivarfs: loosen restriction on valid names
2013-03-07 15:09 UTC (2+ messages)
[GIT PULL] EFI changes for v3.9-rc2
2013-03-06 15:28 UTC
efivarfs: guid part of filenames are case-insensitive is broken
2013-03-06 7:41 UTC (5+ messages)
[PATCH] efi: be more paranoid about available space when creating variables
2013-03-04 20:24 UTC (2+ messages)
EFI runtime and kexec
2013-03-02 11:47 UTC (14+ messages)
[PATCH v5] efi: split efisubsystem from efivars
2013-03-01 19:59 UTC (2+ messages)
[PATCH -next] efivarfs: convert to use simple_open()
2013-03-01 15:33 UTC (2+ messages)
[RFE PATCH 0/2] x86, rtc, ntp, Enable full rtc synchronization
2013-02-28 18:51 UTC (14+ messages)
` [RFE PATCH 1/2] x86, rtc, ntp, Do full rtc synchronization with ntp
` [RFE PATCH 2/2] rtc, add write functionality to sysfs
[PATCH] efivars: Make efivarfs autoloading on mount request
2013-02-28 12:18 UTC (4+ messages)
[PATCH] x86, efi: Mark disable_runtime as __initdata
2013-02-25 23:55 UTC (2+ messages)
[PATCH 1/2] efi: register efivars with efi or gsmi from module_init
2013-02-25 15:24 UTC (5+ messages)
` [PATCH 2/2] efi: rename the efivars module
[PATCH] ia64/mm: fix a bad_page bug when crash kernel booting
2013-02-21 18:21 UTC (8+ messages)
` [PATCH V2] "
` [PATCH V3] "
[PATCH v4] efi: split efisubsystem from efivars
2013-02-21 12:45 UTC (4+ messages)
[PATCH v2] x86, efi: Make "noefi" really disable EFI runtime serivces
2013-02-21 10:57 UTC
[PATCH] x86, efi: Make "noefi" really disable EFI runtime serivces
2013-02-20 23:50 UTC (3+ messages)
[PATCH 00/15] Secure boot policy support
2013-02-20 13:39 UTC (5+ messages)
` [PATCH 10/15] acpi: Ignore acpi_rsdp kernel parameter in a secure boot environment
We offer 3% interest rate for loan
2013-02-17 12:13 UTC
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).