linux-efi.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2013-09-04 20:14:00 to 2013-09-20 07:29:04 UTC [more...]

[PATCH 00/11] EFI runtime services virtual mapping
 2013-09-20  7:29 UTC  (13+ messages)
` [PATCH 03/11] x86, pageattr: Lookup address in an arbitrary PGD
` [PATCH 04/11] x86, pageattr: Add a PGD pagetable populating function
  ` [PATCH 01/11] efi: Simplify EFI_DEBUG
  ` [PATCH 02/11] efi: Remove EFI_PAGE_SHIFT and EFI_PAGE_SIZE
  ` [PATCH 05/11] x86, pageattr: Add a PUD pagetable populating function
  ` [PATCH 09/11] x86, pageattr: Add last levels of error path
` [PATCH 06/11] x86, pageattr: Add a PMD pagetable populating function
` [PATCH 07/11] x86, pageattr: Add a PTE "
` [PATCH 08/11] x86, pageattr: Add a PUD error unwinding path
` [PATCH 10/11] x86, cpa: Map in an arbitrary pgd
` [PATCH 11/11] EFI: Runtime services virtual mapping

[PATCH V4 00/17] ARM EFI stub common code
 2013-09-19 23:02 UTC  (25+ messages)
  ` [PATCH 01/17] EFI stub documentation updates
  ` [PATCH 07/17] Move relocate_kernel() to shared file
  ` [PATCH 13/17] Allow efi_free() to be called with size of 0, and do nothing in that case
  ` [PATCH 16/17] Fix types in EFI calls to match EFI function definitions
  ` [PATCH 17/17] resolve warnings found on ARM compile
` [PATCH 02/17] Add proper definitions for some EFI function pointers
` [PATCH 03/17] Move common EFI stub code from x86 arch code to common location
` [PATCH 04/17] Add system table pointer argument to shared functions
` [PATCH 05/17] Rename memory allocation/free functions
` [PATCH 06/17] Enforce minimum alignment of 1 page on allocations
` [PATCH 08/17] Generalize relocate_kernel() for use by other architectures
` [PATCH 09/17] Move unicode to ASCII conversion to shared function
` [PATCH 10/17] Rename __get_map() to efi_get_memory_map()
` [PATCH 11/17] generalize efi_get_memory_map()
` [PATCH 12/17] use efi_get_memory_map() to get final map for x86
` [PATCH 14/17] Generalize handle_ramdisks() and rename to handle_cmdline_files()
` [PATCH 15/17] Renames in handle_cmdline_files() to complete generalization

[GIT PULL] EFI urgent fix
 2013-09-19 12:41 UTC 

[edk2] Corrupted EFI region
 2013-09-18 19:24 UTC  (18+ messages)

[PATCH] x86 efi: bugfix interrupt disabling sequence
 2013-09-18 17:28 UTC 

[RFC V4 PATCH 00/15] Signature verification of hibernate snapshot
 2013-09-18 13:45 UTC  (24+ messages)
  ` [PATCH V4 01/15] asymmetric keys: add interface and skeleton for implement signature generation
  ` [PATCH V4 02/15] asymmetric keys: implement EMSA_PKCS1-v1_5-ENCODE in rsa
  ` [PATCH V4 03/15] asymmetric keys: separate the length checking of octet string from RSA_I2OSP
  ` [PATCH V4 04/15] asymmetric keys: implement OS2IP in rsa
  ` [PATCH V4 05/15] asymmetric keys: implement RSASP1
  ` [PATCH V4 06/15] asymmetric keys: support parsing PKCS #8 private key information
  ` [PATCH V4 07/15] asymmetric keys: explicitly add the leading zero byte to encoded message
  ` [PATCH V4 08/15] Hibernate: introduced RSA key-pair to verify signature of snapshot
  ` [PATCH V4 09/15] Hibernate: generate and "
  ` [PATCH 10/15] Hibernate: Avoid S4 sign key data included in snapshot image
  ` [PATCH V4 11/15] Hibernate: taint kernel when signature check fail
  ` [PATCH V4 12/15] Hibernate: show the verification time for monitor performance
  ` [PATCH V4 13/15] Hibernate: introduced SNAPSHOT_SIG_HASH config for select hash algorithm
  ` [PATCH V4 14/15] Hibernate: notify bootloader regenerate key-pair for snapshot verification
  ` [PATCH V4 15/15] Hibernate: adapt to UEFI secure boot with signature check

[PATCH] EFI: use nr_tables param directly in efi_config_init
 2013-09-18  1:37 UTC  (3+ messages)

[PATCH] x86: EFI stub support for large memory maps
 2013-09-17 20:14 UTC  (4+ messages)
` [PATCHv2] "

access efi variables
 2013-09-17 15:46 UTC  (5+ messages)

EFI stub boots only with setup_efi_pc() commented
 2013-09-16 11:58 UTC  (4+ messages)

[PATCH] Remove warning in efi_enter_virtual_mode
 2013-09-12 22:30 UTC  (11+ messages)

[PATCH 00/12] One more attempt at useful kernel lockdown
 2013-09-11  9:32 UTC  (65+ messages)
` [PATCH 01/12] Add BSD-style securelevel support
` [PATCH 02/12] Enforce module signatures when securelevel is greater than 0
` [PATCH 03/12] PCI: Lock down BAR access when securelevel is enabled
` [PATCH 04/12] x86: Lock down IO port "
` [PATCH 05/12] Restrict /dev/mem and /dev/kmem when securelevel is set
` [PATCH 06/12] acpi: Limit access to custom_method if "
` [PATCH 07/12] acpi: Ignore acpi_rsdp kernel parameter when "
` [PATCH 08/12] kexec: Disable at runtime if securelevel has been set
` [PATCH 09/12] uswsusp: Disable when securelevel is set
` [PATCH 10/12] x86: Restrict MSR access "
` [PATCH 11/12] asus-wmi: Restrict debugfs interface "
` [PATCH 12/12] Add option to automatically set securelevel when in Secure Boot mode

(unknown),
 2013-09-08 17:38 UTC  (34+ messages)
` [PATCH V3 01/11] Add secure_modules() call
` [PATCH V3 03/11] x86: Lock down IO port access when module security is enabled
` [PATCH V3 08/11] kexec: Disable at runtime if the kernel enforces module loading restrictions
` [PATCH V3 09/11] uswsusp: Disable when module loading is restricted
` [PATCH V3 11/11] Add option to automatically enforce module signatures when in Secure Boot mode

[RFC PATCH 00/18 v3] Signature verification of hibernate snapshot
 2013-09-05 13:28 UTC  (14+ messages)
` [PATCH 11/18] Hibernate: introduced RSA key-pair to verify signature of snapshot

[PATCH v4 0/3] Make commonly useful UEFI functions common
 2013-09-05 13:21 UTC  (5+ messages)
  ` [PATCH v4 1/3] ia64: add early_memremap() alias for early_ioremap()
  ` [PATCH v4 2/3] efi: x86: ia64: provide a generic efi_config_init()
` [PATCH v4 3/3] efi: x86: make efi_lookup_mapped_addr() a common function

[PATCH v3 0/5] Make commonly useful UEFI functions common
 2013-09-05 10:23 UTC  (4+ messages)
` [PATCH v3 2/5] efi: provide a generic efi_config_init()

[PATCH] efivars: Mark local function as static
 2013-09-05  9:59 UTC  (2+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).