linux-efi.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2013-08-29 19:20:01 to 2013-09-10 17:43:27 UTC [more...]

[PATCH] Remove warning in efi_enter_virtual_mode
 2013-09-10 17:43 UTC  (9+ messages)

[PATCH 00/12] One more attempt at useful kernel lockdown
 2013-09-10 17:23 UTC  (53+ messages)
` [PATCH 01/12] Add BSD-style securelevel support
` [PATCH 02/12] Enforce module signatures when securelevel is greater than 0
` [PATCH 03/12] PCI: Lock down BAR access when securelevel is enabled
` [PATCH 04/12] x86: Lock down IO port "
` [PATCH 05/12] Restrict /dev/mem and /dev/kmem when securelevel is set
` [PATCH 06/12] acpi: Limit access to custom_method if "
` [PATCH 07/12] acpi: Ignore acpi_rsdp kernel parameter when "
` [PATCH 08/12] kexec: Disable at runtime if securelevel has been set
` [PATCH 09/12] uswsusp: Disable when securelevel is set
` [PATCH 10/12] x86: Restrict MSR access "
` [PATCH 11/12] asus-wmi: Restrict debugfs interface "
` [PATCH 12/12] Add option to automatically set securelevel when in Secure Boot mode

EFI stub boots only with setup_efi_pc() commented
 2013-09-09 11:45 UTC  (3+ messages)

(unknown),
 2013-09-08 17:38 UTC  (59+ messages)
` [PATCH V3 01/11] Add secure_modules() call
` [PATCH V3 02/11] PCI: Lock down BAR access when module security is enabled
` [PATCH V3 03/11] x86: Lock down IO port "
` [PATCH V3 04/11] ACPI: Limit access to custom_method
` [PATCH V3 05/11] asus-wmi: Restrict debugfs interface when module loading is restricted
` [PATCH V3 06/11] Restrict /dev/mem and /dev/kmem "
` [PATCH V3 08/11] kexec: Disable at runtime if the kernel enforces module loading restrictions
` [PATCH V3 09/11] uswsusp: Disable when module loading is restricted
` [PATCH V3 10/11] x86: Restrict MSR access "
  ` [PATCH V3 07/11] acpi: Ignore acpi_rsdp kernel parameter "
  ` [PATCH V3 11/11] Add option to automatically enforce module signatures when in Secure Boot mode
  ` 

[PATCH] x86: EFI stub support for large memory maps
 2013-09-06 17:04 UTC  (3+ messages)
` [PATCHv2] "

[RFC PATCH 00/18 v3] Signature verification of hibernate snapshot
 2013-09-05 13:28 UTC  (32+ messages)
` [PATCH 10/18] efi: Enable secure boot lockdown automatically when enabled in firmware
` [PATCH 11/18] Hibernate: introduced RSA key-pair to verify signature of snapshot

[PATCH v4 0/3] Make commonly useful UEFI functions common
 2013-09-05 13:21 UTC  (5+ messages)
  ` [PATCH v4 1/3] ia64: add early_memremap() alias for early_ioremap()
  ` [PATCH v4 2/3] efi: x86: ia64: provide a generic efi_config_init()
` [PATCH v4 3/3] efi: x86: make efi_lookup_mapped_addr() a common function

[PATCH v3 0/5] Make commonly useful UEFI functions common
 2013-09-05 10:23 UTC  (4+ messages)
` [PATCH v3 2/5] efi: provide a generic efi_config_init()

[PATCH] efivars: Mark local function as static
 2013-09-05  9:59 UTC  (2+ messages)

[PATCH 0/10] Add additional security checks when module loading is restricted
 2013-09-04 13:13 UTC  (13+ messages)
` [PATCH V2 10/10] Add option to automatically enforce module signatures when in Secure Boot mode

[PATCH V3 RFC 00/16] EFI stub for ARM
 2013-09-02 15:49 UTC  (51+ messages)
` [PATCH 01/16] Move common EFI stub code from x86 arch code to common location
` [PATCH 02/16] Add system pointer argument to shared EFI stub related functions so they no longer use global system table pointer as they did when part of eboot.c. This code is now shared, so using a global variable as part of the interface is not that nice. Also, by avoiding any global variables in the ARM EFI stub, this allows the code to be position independent without requiring GOT fixups
` [PATCH 03/16] Rename memory allocation/free functions
` [PATCH 04/16] Add minimum address parameter to efi_low_alloc()
` [PATCH 05/16] rename __get_map() to efi_get_memory_map(), add parameter to optionally return mmap key. The mmap key is required to exit EFI boot services, and allows efi_get_memory_map() to be used for getting final memory map
` [PATCH 06/16] Enforce minimum alignment of 1 page on allocations. The efi_high_alloc() and efi_low_alloc() functions use the EFI_ALLOCATE_ADDRESS option to the EFI function allocate_pages(), which requires a minimum of page alignment, and rejects all other requests
` [PATCH 08/16] Generalize handle_ramdisks() and rename to handle_cmdline_files()
` [PATCH 09/16] Renames in handle_cmdline_files() to complete generalization
` [PATCH 10/16] Move EFI_READ_CHUNK_SIZE define to shared location
` [PATCH 11/16] Add proper definitions for some EFI function pointers
` [PATCH 12/16] Fix types in EFI calls to match EFI function definitions
` [PATCH 13/16] resolve warnings found on ARM compile
` [PATCH 14/16] Add strstr to compressed string.c for ARM
` [PATCH 15/16] Add EFI stub "
` [PATCH 16/16] Add config EFI_STUB for ARM to Kconfig

[edk2] Corrupted EFI region
 2013-09-02  8:19 UTC  (11+ messages)

UEFI Plugfest 2013 -- New Orleans
 2013-09-02  7:42 UTC  (14+ messages)

[PATCH 01/10] Add secure_modules() call
 2013-09-01  8:52 UTC  (10+ messages)
` [PATCH 05/10] asus-wmi: Restrict debugfs interface when module loading is restricted
` [PATCH 08/10] kexec: Disable at runtime if the kernel enforces module loading restrictions

EFI mode after running kexec
 2013-08-31  4:59 UTC  (10+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).