messages from 2013-09-04 20:14:00 to 2013-09-20 07:29:04 UTC [more...]
[PATCH 00/11] EFI runtime services virtual mapping
2013-09-20 7:29 UTC (13+ messages)
` [PATCH 03/11] x86, pageattr: Lookup address in an arbitrary PGD
` [PATCH 04/11] x86, pageattr: Add a PGD pagetable populating function
` [PATCH 01/11] efi: Simplify EFI_DEBUG
` [PATCH 02/11] efi: Remove EFI_PAGE_SHIFT and EFI_PAGE_SIZE
` [PATCH 05/11] x86, pageattr: Add a PUD pagetable populating function
` [PATCH 09/11] x86, pageattr: Add last levels of error path
` [PATCH 06/11] x86, pageattr: Add a PMD pagetable populating function
` [PATCH 07/11] x86, pageattr: Add a PTE "
` [PATCH 08/11] x86, pageattr: Add a PUD error unwinding path
` [PATCH 10/11] x86, cpa: Map in an arbitrary pgd
` [PATCH 11/11] EFI: Runtime services virtual mapping
[PATCH V4 00/17] ARM EFI stub common code
2013-09-19 23:02 UTC (25+ messages)
` [PATCH 01/17] EFI stub documentation updates
` [PATCH 07/17] Move relocate_kernel() to shared file
` [PATCH 13/17] Allow efi_free() to be called with size of 0, and do nothing in that case
` [PATCH 16/17] Fix types in EFI calls to match EFI function definitions
` [PATCH 17/17] resolve warnings found on ARM compile
` [PATCH 02/17] Add proper definitions for some EFI function pointers
` [PATCH 03/17] Move common EFI stub code from x86 arch code to common location
` [PATCH 04/17] Add system table pointer argument to shared functions
` [PATCH 05/17] Rename memory allocation/free functions
` [PATCH 06/17] Enforce minimum alignment of 1 page on allocations
` [PATCH 08/17] Generalize relocate_kernel() for use by other architectures
` [PATCH 09/17] Move unicode to ASCII conversion to shared function
` [PATCH 10/17] Rename __get_map() to efi_get_memory_map()
` [PATCH 11/17] generalize efi_get_memory_map()
` [PATCH 12/17] use efi_get_memory_map() to get final map for x86
` [PATCH 14/17] Generalize handle_ramdisks() and rename to handle_cmdline_files()
` [PATCH 15/17] Renames in handle_cmdline_files() to complete generalization
[GIT PULL] EFI urgent fix
2013-09-19 12:41 UTC
[edk2] Corrupted EFI region
2013-09-18 19:24 UTC (18+ messages)
[PATCH] x86 efi: bugfix interrupt disabling sequence
2013-09-18 17:28 UTC
[RFC V4 PATCH 00/15] Signature verification of hibernate snapshot
2013-09-18 13:45 UTC (24+ messages)
` [PATCH V4 01/15] asymmetric keys: add interface and skeleton for implement signature generation
` [PATCH V4 02/15] asymmetric keys: implement EMSA_PKCS1-v1_5-ENCODE in rsa
` [PATCH V4 03/15] asymmetric keys: separate the length checking of octet string from RSA_I2OSP
` [PATCH V4 04/15] asymmetric keys: implement OS2IP in rsa
` [PATCH V4 05/15] asymmetric keys: implement RSASP1
` [PATCH V4 06/15] asymmetric keys: support parsing PKCS #8 private key information
` [PATCH V4 07/15] asymmetric keys: explicitly add the leading zero byte to encoded message
` [PATCH V4 08/15] Hibernate: introduced RSA key-pair to verify signature of snapshot
` [PATCH V4 09/15] Hibernate: generate and "
` [PATCH 10/15] Hibernate: Avoid S4 sign key data included in snapshot image
` [PATCH V4 11/15] Hibernate: taint kernel when signature check fail
` [PATCH V4 12/15] Hibernate: show the verification time for monitor performance
` [PATCH V4 13/15] Hibernate: introduced SNAPSHOT_SIG_HASH config for select hash algorithm
` [PATCH V4 14/15] Hibernate: notify bootloader regenerate key-pair for snapshot verification
` [PATCH V4 15/15] Hibernate: adapt to UEFI secure boot with signature check
[PATCH] EFI: use nr_tables param directly in efi_config_init
2013-09-18 1:37 UTC (3+ messages)
[PATCH] x86: EFI stub support for large memory maps
2013-09-17 20:14 UTC (4+ messages)
` [PATCHv2] "
access efi variables
2013-09-17 15:46 UTC (5+ messages)
EFI stub boots only with setup_efi_pc() commented
2013-09-16 11:58 UTC (4+ messages)
[PATCH] Remove warning in efi_enter_virtual_mode
2013-09-12 22:30 UTC (11+ messages)
[PATCH 00/12] One more attempt at useful kernel lockdown
2013-09-11 9:32 UTC (65+ messages)
` [PATCH 01/12] Add BSD-style securelevel support
` [PATCH 02/12] Enforce module signatures when securelevel is greater than 0
` [PATCH 03/12] PCI: Lock down BAR access when securelevel is enabled
` [PATCH 04/12] x86: Lock down IO port "
` [PATCH 05/12] Restrict /dev/mem and /dev/kmem when securelevel is set
` [PATCH 06/12] acpi: Limit access to custom_method if "
` [PATCH 07/12] acpi: Ignore acpi_rsdp kernel parameter when "
` [PATCH 08/12] kexec: Disable at runtime if securelevel has been set
` [PATCH 09/12] uswsusp: Disable when securelevel is set
` [PATCH 10/12] x86: Restrict MSR access "
` [PATCH 11/12] asus-wmi: Restrict debugfs interface "
` [PATCH 12/12] Add option to automatically set securelevel when in Secure Boot mode
(unknown),
2013-09-08 17:38 UTC (34+ messages)
` [PATCH V3 01/11] Add secure_modules() call
` [PATCH V3 03/11] x86: Lock down IO port access when module security is enabled
` [PATCH V3 08/11] kexec: Disable at runtime if the kernel enforces module loading restrictions
` [PATCH V3 09/11] uswsusp: Disable when module loading is restricted
` [PATCH V3 11/11] Add option to automatically enforce module signatures when in Secure Boot mode
[RFC PATCH 00/18 v3] Signature verification of hibernate snapshot
2013-09-05 13:28 UTC (14+ messages)
` [PATCH 11/18] Hibernate: introduced RSA key-pair to verify signature of snapshot
[PATCH v4 0/3] Make commonly useful UEFI functions common
2013-09-05 13:21 UTC (5+ messages)
` [PATCH v4 1/3] ia64: add early_memremap() alias for early_ioremap()
` [PATCH v4 2/3] efi: x86: ia64: provide a generic efi_config_init()
` [PATCH v4 3/3] efi: x86: make efi_lookup_mapped_addr() a common function
[PATCH v3 0/5] Make commonly useful UEFI functions common
2013-09-05 10:23 UTC (4+ messages)
` [PATCH v3 2/5] efi: provide a generic efi_config_init()
[PATCH] efivars: Mark local function as static
2013-09-05 9:59 UTC (2+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).