linux-efi.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2017-03-28 19:30:33 to 2017-04-10 17:13:30 UTC [more...]

[PATCH v3] efifb: avoid reconfiguration of BAR that covers the framebuffer
 2017-04-10 17:13 UTC  (20+ messages)

[PATCH 0/8] efi: add support for non-standard capsule headers
 2017-04-10 16:34 UTC  (10+ messages)
  ` [PATCH 1/8] efi/capsule: Fix return code on failing kmap/vmap
  ` [PATCH 2/8] efi/capsule: Remove pr_debug on ENOMEM or EFAULT
  ` [PATCH 3/8] efi/capsule: Clean up pr_err/info messages
  ` [PATCH 4/8] efi/capsule: Adjust return type of efi_capsule_setup_info
  ` [PATCH 5/8] efi/capsule-loader: use cached copy of capsule header
  ` [PATCH 6/8] efi/capsule-loader: indirect calls to efi_capsule_setup_info via weak alias
  ` [PATCH 7/8] efi/capsule-loader: use page addresses rather than struct page pointers
  ` [PATCH 8/8] efi/capsule: Add support for Quark security header

[PATCH] efi/libstub: arm/arm64: don't use TASK_SIZE when randomising the RT space
 2017-04-10 14:42 UTC  (4+ messages)

[PATCH 00/24] Kernel lockdown
 2017-04-10 13:19 UTC  (63+ messages)
` [PATCH 01/24] efi: Add EFI_SECURE_BOOT bit
` [PATCH 03/24] efi: Lock down the kernel if booted in secure boot mode
` [PATCH 04/24] Enforce module signatures if the kernel is locked down
` [PATCH 05/24] Restrict /dev/mem and /dev/kmem when "
` [PATCH 06/24] Add a sysrq option to exit secure boot mode
` [PATCH 07/24] kexec: Disable at runtime if the kernel is locked down
` [PATCH 08/24] Copy secure_boot flag in boot params across kexec reboot
` [PATCH 10/24] hibernate: Disable when the kernel is locked down
` [PATCH 11/24] uswsusp: "
` [PATCH 12/24] PCI: Lock down BAR access "
  ` [PATCH 02/24] Add the ability to lock down access to the running kernel image
  ` [PATCH 09/24] kexec_file: Disable at runtime if securelevel has been set
  ` [PATCH 13/24] x86: Lock down IO port access when the kernel is locked down
  ` [PATCH 22/24] Prohibit PCMCIA CIS storage "
  ` [PATCH 23/24] Lock down TIOCSSERIAL
  ` [PATCH 24/24] Lock down module params that specify hardware parameters (eg. ioport)
` [PATCH 14/24] x86: Restrict MSR access when the kernel is locked down
` [PATCH 15/24] asus-wmi: Restrict debugfs interface "
` [PATCH 16/24] ACPI: Limit access to custom_method "
` [PATCH 17/24] acpi: Ignore acpi_rsdp kernel param when the kernel has been "
` [PATCH 18/24] acpi: Disable ACPI table override if the kernel is "
` [PATCH 19/24] acpi: Disable APEI error injection "
` [PATCH 20/24] bpf: Restrict kernel image access functions when "
` [PATCH 21/24] scsi: Lock down the eata driver

[PATCH 0/4] efi: libstub enhancements for cmdline parsing and kaslr
 2017-04-10  9:44 UTC  (7+ messages)
` [PATCH 4/4] ef/libstub: arm/arm64: randomize the base of the UEFI rt services region

[PATCH 00/24] Kernel lockdown
 2017-04-07 16:32 UTC  (10+ messages)
  ` [PATCH 01/24] efi: Add EFI_SECURE_BOOT bit
  ` [PATCH 05/24] Restrict /dev/mem and /dev/kmem when the kernel is locked down
  ` [PATCH 07/24] kexec: Disable at runtime if "
` [PATCH 02/24] Add the ability to lock down access to the running kernel image
` [PATCH 03/24] efi: Lock down the kernel if booted in secure boot mode
` [PATCH 04/24] Enforce module signatures if the kernel is locked down
` [PATCH 06/24] Add a sysrq option to exit secure boot mode
` [PATCH 08/24] Copy secure_boot flag in boot params across kexec reboot

[GIT PULL 00/12] EFI updates for v4.12
 2017-04-07 16:02 UTC  (18+ messages)
` [PATCH 01/12] x86/efi: Clean up efi CR3 save/restore
` [PATCH 03/12] efi: arm-stub: Round up FDT allocation to mapping size
` [PATCH 05/12] efi: bgrt: Enable ACPI BGRT handling on arm64
` [PATCH 06/12] pstore: return error code (if any) from efi_pstore_write
  ` [PATCH 1/2] efi/libstub: Skip GOP with PIXEL_BLT_ONLY format
  ` [PATCH 02/12] efi: arm-stub: Correct FDT and initrd allocation rules for arm64
  ` [PATCH 2/2] efifb: Avoid reconfiguration of BAR that covers the framebuffer
  ` [PATCH 04/12] x86/efi-bgrt: Move efi-bgrt handling out of arch/x86
  ` [PATCH 07/12] x86/efi: Clean up a minor mistake in code comment
  ` [PATCH 08/12] efi/arm32-stub: Allow boottime allocations in the vmlinux region
  ` [PATCH 09/12] efi/libstub: Fix harmless command line parsing bug
  ` [PATCH 10/12] efi/libstub: Unify command line param parsing
    ` [PATCH 11/12] efi/libstub: arm/arm64: Disable debug prints on 'quiet' cmdline arg
      ` [PATCH 12/12] ef/libstub: arm/arm64: Randomize the base of the UEFI rt services region

[RFC PATCH v2 00/32] x86: Secure Encrypted Virtualization (AMD)
 2017-04-07 14:50 UTC  (19+ messages)
` [RFC PATCH v2 14/32] x86: mm: Provide support to use memblock when spliting large pages
` [RFC PATCH v2 16/32] x86: kvm: Provide support to create Guest and HV shared per-CPU variables
` [RFC PATCH v2 18/32] kvm: svm: Use the hardware provided GPA instead of page walk

[PATCH 1/5] efi: Move the x86 secure boot switch to generic code
 2017-04-06 22:45 UTC  (7+ messages)
` [PATCH 2/5] efi: Add EFI_SECURE_BOOT bit
` [PATCH 3/5] Add the ability to lock down access to the running kernel image
` [PATCH 4/5] efi: Lock down the kernel if booted in secure boot mode
  ` [PATCH 5/5] Add a sysrq option to exit "

[PATCH 00/24] Kernel lockdown
 2017-04-06 21:55 UTC  (27+ messages)
` [PATCH 01/24] efi: Add EFI_SECURE_BOOT bit
` [PATCH 02/24] Add the ability to lock down access to the running kernel image
` [PATCH 05/24] Restrict /dev/mem and /dev/kmem when the kernel is locked down
` [PATCH 06/24] Add a sysrq option to exit secure boot mode
` [PATCH 07/24] kexec: Disable at runtime if the kernel is locked down
` [PATCH 08/24] Copy secure_boot flag in boot params across kexec reboot
` [PATCH 09/24] kexec_file: Disable at runtime if securelevel has been set
` [PATCH 11/24] uswsusp: Disable when the kernel is locked down
` [PATCH 12/24] PCI: Lock down BAR access "
` [PATCH 13/24] x86: Lock down IO port "
` [PATCH 14/24] x86: Restrict MSR "
` [PATCH 15/24] asus-wmi: Restrict debugfs interface "
  ` [PATCH 03/24] efi: Lock down the kernel if booted in secure boot mode
  ` [PATCH 04/24] Enforce module signatures if the kernel is locked down
  ` [PATCH 10/24] hibernate: Disable when "
  ` [PATCH 16/24] ACPI: Limit access to custom_method "
  ` [PATCH 17/24] acpi: Ignore acpi_rsdp kernel param when the kernel has been "
` [PATCH 18/24] acpi: Disable ACPI table override if the kernel is "
` [PATCH 19/24] acpi: Disable APEI error injection "

[PATCH V14 00/10] Add UEFI 2.6 and ACPI 6.1 updates for RAS on ARM64
 2017-04-06 17:12 UTC  (13+ messages)
` [PATCH V14 03/10] efi: parse ARM processor error
` [PATCH V14 04/10] arm64: exception: handle Synchronous External Abort
` [PATCH V14 05/10] acpi: apei: handle SEA notification type for ARMv8
` [PATCH V14 06/10] acpi: apei: panic OS with fatal error status block
` [PATCH V14 07/10] efi: print unrecognized CPER section
` [PATCH V14 08/10] ras: acpi / apei: generate trace event for "
` [PATCH V14 09/10] trace, ras: add ARM processor error trace event
` [PATCH V14 10/10] arm/arm64: KVM: add guest SEA support

[PATCH] arm64: xen: Implement EFI reset_system callback
 2017-04-06 15:55 UTC 

(unknown),
 2017-04-06 11:45 UTC 

[PATCH 4.10 65/81] x86/mm/KASLR: Exclude EFI region from KASLR VA space randomization
 2017-04-06  8:38 UTC 

[PATCH 4.9 58/72] x86/mm/KASLR: Exclude EFI region from KASLR VA space randomization
 2017-04-06  8:38 UTC 

[GIT PULL 0/2] EFI fixes for v4.11
 2017-04-05 10:45 UTC  (9+ messages)
  ` [PATCH 1/2] efi/libstub: Skip GOP with PIXEL_BLT_ONLY format
  ` [PATCH 2/2] efifb: Avoid reconfiguration of BAR that covers the framebuffer

kexec regression since 4.9 caused by efi
 2017-04-05  1:23 UTC  (11+ messages)

[PATCH v2 0/7] efi: Enhance capsule loader to support signed Quark images
 2017-04-04 17:39 UTC  (11+ messages)
` [PATCH v2 5/7] efi/capsule: Prepare for loading images with security header

[PATCH] efi/libstub: skip GOP with PIXEL_BLT_ONLY format
 2017-04-04 13:18 UTC  (2+ messages)

[PATCH v35 14/14] efi/libstub/arm*: Set default address and size cells values for an empty dtb
 2017-04-03  2:26 UTC 

12911 linux-efi
 2017-04-01  2:12 UTC 


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).