linux-efi.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2013-03-06 12:36:41 to 2013-04-08 09:32:05 UTC [more...]

Patch "efi: Build EFI stub with EFI-appropriate options" has been added to the 3.6-stable tree
 2013-04-08  9:32 UTC  (5+ messages)

[PATCH v2 1/2] efivars: Check max_size only if it is non-zero
 2013-04-07 22:32 UTC  (2+ messages)
` [PATCH 2/2] efivars: Implement no_storage_paranoia parameter

[PATCH 1/2] efivars: Check max_size only if it is non-zero
 2013-04-05 14:03 UTC  (5+ messages)
` [PATCH 2/2] efivars: Implement no_storage_paranoia parameter

[PATCH 0/6] Chainsaw efivars.c
 2013-04-04 12:18 UTC  (7+ messages)
  ` [PATCH 1/6] efi: move utf16 string functions to efi.h
  ` [PATCH 2/6] efivars: Keep a private global pointer to efivars
  ` [PATCH 3/6] efivars: efivar_entry API
` [PATCH 4/6] efivars: Move pstore code into the new EFI directory
` [PATCH 5/6] efivarfs: Move to fs/efivarfs
` [PATCH 6/6] efi: split efisubsystem from efivars

efi: be more paranoid about available space when creating variables
 2013-04-03 17:20 UTC  (24+ messages)
                    ` [PATCH 1/2] efi: Determine how much space is used by boot services-only variables
                        ` [PATCH 2/2] efi: Distinguish between "remaining space" and actually used space

Offer to Attend Events for AMD
 2013-03-29 16:28 UTC 

[PATCH 01/12] Security: Add CAP_COMPROMISE_KERNEL
 2013-03-28 12:46 UTC  (44+ messages)
` [PATCH 03/12] Secure boot: Add a dummy kernel parameter that will switch on Secure Boot mode
` [PATCH 05/12] PCI: Require CAP_COMPROMISE_KERNEL for PCI BAR access
` [PATCH 06/12] x86: Require CAP_COMPROMISE_KERNEL for IO port access
` [PATCH 08/12] asus-wmi: Restrict debugfs interface
` [PATCH 09/12] Require CAP_COMPROMISE_KERNEL for /dev/mem and /dev/kmem access
  ` [PATCH 02/12] SELinux: define mapping for CAP_COMPROMISE_KERNEL
  ` [PATCH 04/12] efi: Enable secure boot lockdown automatically when enabled in firmware
  ` [PATCH 07/12] ACPI: Limit access to custom_method
  ` [PATCH 10/12] acpi: Ignore acpi_rsdp kernel parameter in a secure boot environment
            ` [PATCH v2] "
  ` [PATCH 11/12] x86: Require CAP_COMPROMISE_KERNEL for MSR writing
  ` [PATCH 12/12] kexec: Require CAP_SYS_COMPROMISE_KERNEL

[PATCH] efivars: Fix check for CONFIG_EFI_VARS_PSTORE_DEFAULT_DISABLE
 2013-03-22 20:22 UTC  (5+ messages)

[PATCH 01/12] Security: Add CAP_COMPROMISE_KERNEL
 2013-03-21 16:32 UTC 

[GIT PULL] EFI changes for v3.9-rc3
 2013-03-21 13:17 UTC 

sysfs: cannot create duplicate filename
 2013-03-21  7:44 UTC  (23+ messages)

efivarfs: Bad directory entry when variable has / in name
 2013-03-20 17:02 UTC  (3+ messages)

[PATCH] x86/efi: pull NV+BS variables out before we exit boot services
 2013-03-20 11:47 UTC  (15+ messages)

EFI: Stash ROMs if they're not in the PCI BAR
 2013-03-20  9:27 UTC  (7+ messages)

[PATCH 01/12] Security: Add CAP_COMPROMISE_KERNEL
 2013-03-20  3:27 UTC  (6+ messages)

[PATCH] efivar: Disable get_next_variable when firmware is broken
 2013-03-20  2:10 UTC  (4+ messages)

[PATCH 01/12] Security: Add CAP_COMPROMISE_KERNEL
 2013-03-20  1:11 UTC  (2+ messages)

[PATCH 01/12] Security: Add CAP_COMPROMISE_KERNEL
 2013-03-20  1:09 UTC 

[PATCH 06/12] x86: Require CAP_COMPROMISE_KERNEL for IO port access
 2013-03-20  1:05 UTC 

Curious crash with secure variables
 2013-03-18 18:22 UTC  (10+ messages)

[PATCH] efivarfs: fix abnormal GUID in variable name by using strcpy to replace null with dash
 2013-03-18 15:29 UTC  (19+ messages)

[PATCH] efivars: Allow disabling use as a pstore backend
 2013-03-13 19:44 UTC  (14+ messages)

[PATCH] efivars: allow efi pstore variable when validate filename
 2013-03-12  3:06 UTC  (2+ messages)

[PATCH] efivars: allow efi pstore variable when validate filename
 2013-03-11 18:57 UTC 

Problem mounting efivarfs in 3.9
 2013-03-07 15:09 UTC  (4+ messages)

[PATCH] efivarfs: loosen restriction on valid names
 2013-03-07 15:09 UTC  (2+ messages)

[GIT PULL] EFI changes for v3.9-rc2
 2013-03-06 15:28 UTC 


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).