linux-efi.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2017-03-24 09:50:15 to 2017-04-06 08:44:16 UTC [more...]

[PATCH 00/24] Kernel lockdown
 2017-04-06  8:44 UTC  (25+ messages)
` [PATCH 01/24] efi: Add EFI_SECURE_BOOT bit
` [PATCH 02/24] Add the ability to lock down access to the running kernel image
` [PATCH 05/24] Restrict /dev/mem and /dev/kmem when the kernel is locked down
` [PATCH 06/24] Add a sysrq option to exit secure boot mode
` [PATCH 07/24] kexec: Disable at runtime if the kernel is locked down
` [PATCH 08/24] Copy secure_boot flag in boot params across kexec reboot
` [PATCH 09/24] kexec_file: Disable at runtime if securelevel has been set
  ` [PATCH 03/24] efi: Lock down the kernel if booted in secure boot mode
  ` [PATCH 04/24] Enforce module signatures if the kernel is locked down
  ` [PATCH 10/24] hibernate: Disable when "
  ` [PATCH 16/24] ACPI: Limit access to custom_method "
  ` [PATCH 17/24] acpi: Ignore acpi_rsdp kernel param when the kernel has been "
` [PATCH 11/24] uswsusp: Disable when the kernel is "
` [PATCH 12/24] PCI: Lock down BAR access "
` [PATCH 13/24] x86: Lock down IO port "
` [PATCH 14/24] x86: Restrict MSR "
` [PATCH 15/24] asus-wmi: Restrict debugfs interface "
` [PATCH 18/24] acpi: Disable ACPI table override if "
` [PATCH 19/24] acpi: Disable APEI error injection "

[PATCH 00/24] Kernel lockdown
 2017-04-06  8:41 UTC  (30+ messages)
` [PATCH 01/24] efi: Add EFI_SECURE_BOOT bit
` [PATCH 03/24] efi: Lock down the kernel if booted in secure boot mode
` [PATCH 04/24] Enforce module signatures if the kernel is locked down
` [PATCH 05/24] Restrict /dev/mem and /dev/kmem when "
` [PATCH 06/24] Add a sysrq option to exit secure boot mode
` [PATCH 07/24] kexec: Disable at runtime if the kernel is locked down
` [PATCH 08/24] Copy secure_boot flag in boot params across kexec reboot
` [PATCH 10/24] hibernate: Disable when the kernel is locked down
` [PATCH 11/24] uswsusp: "
` [PATCH 12/24] PCI: Lock down BAR access "
` [PATCH 14/24] x86: Restrict MSR "
` [PATCH 15/24] asus-wmi: Restrict debugfs interface "
` [PATCH 16/24] ACPI: Limit access to custom_method "
` [PATCH 17/24] acpi: Ignore acpi_rsdp kernel param when the kernel has been "
` [PATCH 18/24] acpi: Disable ACPI table override if the kernel is "
` [PATCH 19/24] acpi: Disable APEI error injection "
` [PATCH 20/24] bpf: Restrict kernel image access functions when "
` [PATCH 21/24] scsi: Lock down the eata driver
  ` [PATCH 02/24] Add the ability to lock down access to the running kernel image
  ` [PATCH 09/24] kexec_file: Disable at runtime if securelevel has been set
  ` [PATCH 13/24] x86: Lock down IO port access when the kernel is locked down
  ` [PATCH 22/24] Prohibit PCMCIA CIS storage "
  ` [PATCH 23/24] Lock down TIOCSSERIAL
  ` [PATCH 24/24] Lock down module params that specify hardware parameters (eg. ioport)

[PATCH 4.10 65/81] x86/mm/KASLR: Exclude EFI region from KASLR VA space randomization
 2017-04-06  8:38 UTC 

[PATCH 4.9 58/72] x86/mm/KASLR: Exclude EFI region from KASLR VA space randomization
 2017-04-06  8:38 UTC 

[PATCH 00/24] Kernel lockdown
 2017-04-05 17:08 UTC  (9+ messages)
  ` [PATCH 01/24] efi: Add EFI_SECURE_BOOT bit
  ` [PATCH 05/24] Restrict /dev/mem and /dev/kmem when the kernel is locked down
  ` [PATCH 07/24] kexec: Disable at runtime if "
` [PATCH 02/24] Add the ability to lock down access to the running kernel image
` [PATCH 03/24] efi: Lock down the kernel if booted in secure boot mode
` [PATCH 04/24] Enforce module signatures if the kernel is locked down
` [PATCH 06/24] Add a sysrq option to exit secure boot mode
` [PATCH 08/24] Copy secure_boot flag in boot params across kexec reboot

[GIT PULL 0/2] EFI fixes for v4.11
 2017-04-05 10:45 UTC  (9+ messages)
  ` [PATCH 1/2] efi/libstub: Skip GOP with PIXEL_BLT_ONLY format
  ` [PATCH 2/2] efifb: Avoid reconfiguration of BAR that covers the framebuffer

[PATCH 0/8] efi: add support for non-standard capsule headers
 2017-04-05  9:23 UTC  (9+ messages)
  ` [PATCH 1/8] efi/capsule: Fix return code on failing kmap/vmap
  ` [PATCH 2/8] efi/capsule: Remove pr_debug on ENOMEM or EFAULT
  ` [PATCH 3/8] efi/capsule: Clean up pr_err/info messages
  ` [PATCH 4/8] efi/capsule: Adjust return type of efi_capsule_setup_info
  ` [PATCH 5/8] efi/capsule-loader: use cached copy of capsule header
  ` [PATCH 6/8] efi/capsule-loader: indirect calls to efi_capsule_setup_info via weak alias
  ` [PATCH 7/8] efi/capsule-loader: use page addresses rather than struct page pointers
  ` [PATCH 8/8] efi/capsule: Add support for Quark security header

kexec regression since 4.9 caused by efi
 2017-04-05  1:23 UTC  (11+ messages)

[PATCH v2 0/7] efi: Enhance capsule loader to support signed Quark images
 2017-04-04 17:39 UTC  (29+ messages)
  ` [PATCH v2 1/7] efi/capsule: Fix return code on failing kmap/vmap
  ` [PATCH v2 2/7] efi/capsule: Remove pr_debug on ENOMEM or EFAULT
  ` [PATCH v2 3/7] efi/capsule: Clean up pr_err/info messages
  ` [PATCH v2 4/7] efi/capsule: Adjust return type of efi_capsule_setup_info
  ` [PATCH v2 5/7] efi/capsule: Prepare for loading images with security header
  ` [PATCH v2 6/7] efi/capsule: Factor out overloadable efi_capsule_identify_image
  ` [PATCH v2 7/7] efi/capsule: Add support for Quark security header

[GIT PULL 00/12] EFI updates for v4.12
 2017-04-04 16:09 UTC  (16+ messages)
` [PATCH 01/12] x86/efi: Clean up efi CR3 save/restore
` [PATCH 03/12] efi: arm-stub: Round up FDT allocation to mapping size
` [PATCH 05/12] efi: bgrt: Enable ACPI BGRT handling on arm64
` [PATCH 06/12] pstore: return error code (if any) from efi_pstore_write
  ` [PATCH 1/2] efi/libstub: Skip GOP with PIXEL_BLT_ONLY format
  ` [PATCH 02/12] efi: arm-stub: Correct FDT and initrd allocation rules for arm64
  ` [PATCH 2/2] efifb: Avoid reconfiguration of BAR that covers the framebuffer
  ` [PATCH 04/12] x86/efi-bgrt: Move efi-bgrt handling out of arch/x86
  ` [PATCH 07/12] x86/efi: Clean up a minor mistake in code comment
  ` [PATCH 08/12] efi/arm32-stub: Allow boottime allocations in the vmlinux region
  ` [PATCH 09/12] efi/libstub: Fix harmless command line parsing bug
  ` [PATCH 10/12] efi/libstub: Unify command line param parsing
    ` [PATCH 11/12] efi/libstub: arm/arm64: Disable debug prints on 'quiet' cmdline arg
      ` [PATCH 12/12] ef/libstub: arm/arm64: Randomize the base of the UEFI rt services region

[PATCH] efi/libstub: skip GOP with PIXEL_BLT_ONLY format
 2017-04-04 13:18 UTC  (2+ messages)

[PATCH v35 14/14] efi/libstub/arm*: Set default address and size cells values for an empty dtb
 2017-04-03  2:26 UTC 

[PATCH v3] efifb: avoid reconfiguration of BAR that covers the framebuffer
 2017-04-02 15:16 UTC  (20+ messages)

12911 linux-efi
 2017-04-01  2:12 UTC 

[RFC PATCH v2 00/32] x86: Secure Encrypted Virtualization (AMD)
 2017-03-29 17:08 UTC  (11+ messages)
` [RFC PATCH v2 15/32] x86: Add support for changing memory encryption attribute in early boot
` [RFC PATCH v2 16/32] x86: kvm: Provide support to create Guest and HV shared per-CPU variables
` [RFC PATCH v2 18/32] kvm: svm: Use the hardware provided GPA instead of page walk

[PATCH V14 00/10] Add UEFI 2.6 and ACPI 6.1 updates for RAS on ARM64
 2017-03-28 22:18 UTC  (14+ messages)
` [PATCH V14 01/10] acpi: apei: read ack upon ghes record consumption
` [PATCH V14 02/10] ras: acpi/apei: cper: generic error data entry v3 per ACPI 6.1
` [PATCH V14 03/10] efi: parse ARM processor error
` [PATCH V14 04/10] arm64: exception: handle Synchronous External Abort
` [PATCH V14 05/10] acpi: apei: handle SEA notification type for ARMv8
` [PATCH V14 06/10] acpi: apei: panic OS with fatal error status block
` [PATCH V14 07/10] efi: print unrecognized CPER section
` [PATCH V14 08/10] ras: acpi / apei: generate trace event for "
` [PATCH V14 09/10] trace, ras: add ARM processor error trace event
` [PATCH V14 10/10] arm/arm64: KVM: add guest SEA support

[PATCH V13 00/10] Add UEFI 2.6 and ACPI 6.1 updates for RAS on ARM64
 2017-03-28 16:44 UTC  (11+ messages)
` [PATCH V13 10/10] arm/arm64: KVM: add guest SEA support

[PATCH v34 14/14] efi/libstub/arm*: Set default address and size cells values for an empty dtb
 2017-03-28 10:08 UTC  (2+ messages)

[PATCH] efi: arm: enable DMI/SMBIOS
 2017-03-27 17:22 UTC  (2+ messages)

[PATCH v2 0/4] efi: libstub enhancements for cmdline parsing and kaslr
 2017-03-27 17:17 UTC  (5+ messages)
  ` [PATCH v2 1/4] efi/libstub: fix harmless command line parsing bug
  ` [PATCH v2 2/4] efi/libstub: unify command line param parsing
  ` [PATCH v2 3/4] efi/libstub: arm/arm64: disable debug prints on 'quiet' cmdline arg
  ` [PATCH v2 4/4] ef/libstub: arm/arm64: randomize the base of the UEFI rt services region

[efi:next 11/13] drivers/firmware/efi/libstub/efi-stub-helper.c:421:40: error: 'CONFIG_CMDLINE' undeclared
 2017-03-27 16:02 UTC 

[PATCH 0/2] efi: Enhance capsule loader to support signed Quark images
 2017-03-24 16:44 UTC  (13+ messages)
` [PATCH 2/2] efi/capsule: Add support for Quark security header

[PATCH 0/4] efi: libstub enhancements for cmdline parsing and kaslr
 2017-03-24 14:15 UTC  (6+ messages)
` [PATCH 2/4] efi/libstub: unify command line param parsing
  ` [PATCH 1/4] efi/libstub: fix harmless command line parsing bug
  ` [PATCH 3/4] efi/libstub: arm/arm64: disable debug prints on 'quiet' cmdline arg
  ` [PATCH 4/4] ef/libstub: arm/arm64: randomize the base of the UEFI rt services region

[PATCH v2] x86/mm/KASLR: EFI region is mistakenly included into KASLR VA space for randomization
 2017-03-24 11:52 UTC  (14+ messages)

[PATCH v2] efi/arm32-stub: allow boottime allocations in the vmlinux region
 2017-03-24 11:33 UTC 

[PATCH v2] x86/efi: Clean up a minor mistake in code comment
 2017-03-24  9:50 UTC  (3+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).