messages from 2017-03-28 19:30:33 to 2017-04-10 17:13:30 UTC [more...]
[PATCH v3] efifb: avoid reconfiguration of BAR that covers the framebuffer
2017-04-10 17:13 UTC (20+ messages)
[PATCH 0/8] efi: add support for non-standard capsule headers
2017-04-10 16:34 UTC (10+ messages)
` [PATCH 1/8] efi/capsule: Fix return code on failing kmap/vmap
` [PATCH 2/8] efi/capsule: Remove pr_debug on ENOMEM or EFAULT
` [PATCH 3/8] efi/capsule: Clean up pr_err/info messages
` [PATCH 4/8] efi/capsule: Adjust return type of efi_capsule_setup_info
` [PATCH 5/8] efi/capsule-loader: use cached copy of capsule header
` [PATCH 6/8] efi/capsule-loader: indirect calls to efi_capsule_setup_info via weak alias
` [PATCH 7/8] efi/capsule-loader: use page addresses rather than struct page pointers
` [PATCH 8/8] efi/capsule: Add support for Quark security header
[PATCH] efi/libstub: arm/arm64: don't use TASK_SIZE when randomising the RT space
2017-04-10 14:42 UTC (4+ messages)
[PATCH 00/24] Kernel lockdown
2017-04-10 13:19 UTC (63+ messages)
` [PATCH 01/24] efi: Add EFI_SECURE_BOOT bit
` [PATCH 03/24] efi: Lock down the kernel if booted in secure boot mode
` [PATCH 04/24] Enforce module signatures if the kernel is locked down
` [PATCH 05/24] Restrict /dev/mem and /dev/kmem when "
` [PATCH 06/24] Add a sysrq option to exit secure boot mode
` [PATCH 07/24] kexec: Disable at runtime if the kernel is locked down
` [PATCH 08/24] Copy secure_boot flag in boot params across kexec reboot
` [PATCH 10/24] hibernate: Disable when the kernel is locked down
` [PATCH 11/24] uswsusp: "
` [PATCH 12/24] PCI: Lock down BAR access "
` [PATCH 02/24] Add the ability to lock down access to the running kernel image
` [PATCH 09/24] kexec_file: Disable at runtime if securelevel has been set
` [PATCH 13/24] x86: Lock down IO port access when the kernel is locked down
` [PATCH 22/24] Prohibit PCMCIA CIS storage "
` [PATCH 23/24] Lock down TIOCSSERIAL
` [PATCH 24/24] Lock down module params that specify hardware parameters (eg. ioport)
` [PATCH 14/24] x86: Restrict MSR access when the kernel is locked down
` [PATCH 15/24] asus-wmi: Restrict debugfs interface "
` [PATCH 16/24] ACPI: Limit access to custom_method "
` [PATCH 17/24] acpi: Ignore acpi_rsdp kernel param when the kernel has been "
` [PATCH 18/24] acpi: Disable ACPI table override if the kernel is "
` [PATCH 19/24] acpi: Disable APEI error injection "
` [PATCH 20/24] bpf: Restrict kernel image access functions when "
` [PATCH 21/24] scsi: Lock down the eata driver
[PATCH 0/4] efi: libstub enhancements for cmdline parsing and kaslr
2017-04-10 9:44 UTC (7+ messages)
` [PATCH 4/4] ef/libstub: arm/arm64: randomize the base of the UEFI rt services region
[PATCH 00/24] Kernel lockdown
2017-04-07 16:32 UTC (10+ messages)
` [PATCH 01/24] efi: Add EFI_SECURE_BOOT bit
` [PATCH 05/24] Restrict /dev/mem and /dev/kmem when the kernel is locked down
` [PATCH 07/24] kexec: Disable at runtime if "
` [PATCH 02/24] Add the ability to lock down access to the running kernel image
` [PATCH 03/24] efi: Lock down the kernel if booted in secure boot mode
` [PATCH 04/24] Enforce module signatures if the kernel is locked down
` [PATCH 06/24] Add a sysrq option to exit secure boot mode
` [PATCH 08/24] Copy secure_boot flag in boot params across kexec reboot
[GIT PULL 00/12] EFI updates for v4.12
2017-04-07 16:02 UTC (18+ messages)
` [PATCH 01/12] x86/efi: Clean up efi CR3 save/restore
` [PATCH 03/12] efi: arm-stub: Round up FDT allocation to mapping size
` [PATCH 05/12] efi: bgrt: Enable ACPI BGRT handling on arm64
` [PATCH 06/12] pstore: return error code (if any) from efi_pstore_write
` [PATCH 1/2] efi/libstub: Skip GOP with PIXEL_BLT_ONLY format
` [PATCH 02/12] efi: arm-stub: Correct FDT and initrd allocation rules for arm64
` [PATCH 2/2] efifb: Avoid reconfiguration of BAR that covers the framebuffer
` [PATCH 04/12] x86/efi-bgrt: Move efi-bgrt handling out of arch/x86
` [PATCH 07/12] x86/efi: Clean up a minor mistake in code comment
` [PATCH 08/12] efi/arm32-stub: Allow boottime allocations in the vmlinux region
` [PATCH 09/12] efi/libstub: Fix harmless command line parsing bug
` [PATCH 10/12] efi/libstub: Unify command line param parsing
` [PATCH 11/12] efi/libstub: arm/arm64: Disable debug prints on 'quiet' cmdline arg
` [PATCH 12/12] ef/libstub: arm/arm64: Randomize the base of the UEFI rt services region
[RFC PATCH v2 00/32] x86: Secure Encrypted Virtualization (AMD)
2017-04-07 14:50 UTC (19+ messages)
` [RFC PATCH v2 14/32] x86: mm: Provide support to use memblock when spliting large pages
` [RFC PATCH v2 16/32] x86: kvm: Provide support to create Guest and HV shared per-CPU variables
` [RFC PATCH v2 18/32] kvm: svm: Use the hardware provided GPA instead of page walk
[PATCH 1/5] efi: Move the x86 secure boot switch to generic code
2017-04-06 22:45 UTC (7+ messages)
` [PATCH 2/5] efi: Add EFI_SECURE_BOOT bit
` [PATCH 3/5] Add the ability to lock down access to the running kernel image
` [PATCH 4/5] efi: Lock down the kernel if booted in secure boot mode
` [PATCH 5/5] Add a sysrq option to exit "
[PATCH 00/24] Kernel lockdown
2017-04-06 21:55 UTC (27+ messages)
` [PATCH 01/24] efi: Add EFI_SECURE_BOOT bit
` [PATCH 02/24] Add the ability to lock down access to the running kernel image
` [PATCH 05/24] Restrict /dev/mem and /dev/kmem when the kernel is locked down
` [PATCH 06/24] Add a sysrq option to exit secure boot mode
` [PATCH 07/24] kexec: Disable at runtime if the kernel is locked down
` [PATCH 08/24] Copy secure_boot flag in boot params across kexec reboot
` [PATCH 09/24] kexec_file: Disable at runtime if securelevel has been set
` [PATCH 11/24] uswsusp: Disable when the kernel is locked down
` [PATCH 12/24] PCI: Lock down BAR access "
` [PATCH 13/24] x86: Lock down IO port "
` [PATCH 14/24] x86: Restrict MSR "
` [PATCH 15/24] asus-wmi: Restrict debugfs interface "
` [PATCH 03/24] efi: Lock down the kernel if booted in secure boot mode
` [PATCH 04/24] Enforce module signatures if the kernel is locked down
` [PATCH 10/24] hibernate: Disable when "
` [PATCH 16/24] ACPI: Limit access to custom_method "
` [PATCH 17/24] acpi: Ignore acpi_rsdp kernel param when the kernel has been "
` [PATCH 18/24] acpi: Disable ACPI table override if the kernel is "
` [PATCH 19/24] acpi: Disable APEI error injection "
[PATCH V14 00/10] Add UEFI 2.6 and ACPI 6.1 updates for RAS on ARM64
2017-04-06 17:12 UTC (13+ messages)
` [PATCH V14 03/10] efi: parse ARM processor error
` [PATCH V14 04/10] arm64: exception: handle Synchronous External Abort
` [PATCH V14 05/10] acpi: apei: handle SEA notification type for ARMv8
` [PATCH V14 06/10] acpi: apei: panic OS with fatal error status block
` [PATCH V14 07/10] efi: print unrecognized CPER section
` [PATCH V14 08/10] ras: acpi / apei: generate trace event for "
` [PATCH V14 09/10] trace, ras: add ARM processor error trace event
` [PATCH V14 10/10] arm/arm64: KVM: add guest SEA support
[PATCH] arm64: xen: Implement EFI reset_system callback
2017-04-06 15:55 UTC
(unknown),
2017-04-06 11:45 UTC
[PATCH 4.10 65/81] x86/mm/KASLR: Exclude EFI region from KASLR VA space randomization
2017-04-06 8:38 UTC
[PATCH 4.9 58/72] x86/mm/KASLR: Exclude EFI region from KASLR VA space randomization
2017-04-06 8:38 UTC
[GIT PULL 0/2] EFI fixes for v4.11
2017-04-05 10:45 UTC (9+ messages)
` [PATCH 1/2] efi/libstub: Skip GOP with PIXEL_BLT_ONLY format
` [PATCH 2/2] efifb: Avoid reconfiguration of BAR that covers the framebuffer
kexec regression since 4.9 caused by efi
2017-04-05 1:23 UTC (11+ messages)
[PATCH v2 0/7] efi: Enhance capsule loader to support signed Quark images
2017-04-04 17:39 UTC (11+ messages)
` [PATCH v2 5/7] efi/capsule: Prepare for loading images with security header
[PATCH] efi/libstub: skip GOP with PIXEL_BLT_ONLY format
2017-04-04 13:18 UTC (2+ messages)
[PATCH v35 14/14] efi/libstub/arm*: Set default address and size cells values for an empty dtb
2017-04-03 2:26 UTC
12911 linux-efi
2017-04-01 2:12 UTC
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).