messages from 2017-04-05 17:09:54 to 2017-04-18 21:14:31 UTC [more...]
[PATCH v5 00/32] x86: Secure Memory Encryption (AMD)
2017-04-18 21:14 UTC (4+ messages)
` [PATCH v5 01/32] x86: Documentation for AMD Secure Memory Encryption (SME)
` [PATCH v5 02/32] x86/mm/pat: Set write-protect cache mode for full PAT support
` [PATCH v5 03/32] x86, mpparse, x86/acpi, x86/PCI, SFI: Use memremap for RAM mappings
[PATCH 0/8] efi: add support for non-standard capsule headers
2017-04-18 18:11 UTC (30+ messages)
` [PATCH 1/8] efi/capsule: Fix return code on failing kmap/vmap
` [PATCH 2/8] efi/capsule: Remove pr_debug on ENOMEM or EFAULT
` [PATCH 3/8] efi/capsule: Clean up pr_err/info messages
` [PATCH 4/8] efi/capsule: Adjust return type of efi_capsule_setup_info
` [PATCH 5/8] efi/capsule-loader: use cached copy of capsule header
` [PATCH 6/8] efi/capsule-loader: indirect calls to efi_capsule_setup_info via weak alias
` [PATCH 7/8] efi/capsule-loader: use page addresses rather than struct page pointers
` [PATCH 8/8] efi/capsule: Add support for Quark security header
[PATCH 00/24] Kernel lockdown
2017-04-18 17:50 UTC (81+ messages)
` [PATCH 01/24] efi: Add EFI_SECURE_BOOT bit
` [PATCH 03/24] efi: Lock down the kernel if booted in secure boot mode
` [PATCH 04/24] Enforce module signatures if the kernel is locked down
` [PATCH 05/24] Restrict /dev/mem and /dev/kmem when "
` [PATCH 06/24] Add a sysrq option to exit secure boot mode
` [PATCH 07/24] kexec: Disable at runtime if the kernel is locked down
` [PATCH 08/24] Copy secure_boot flag in boot params across kexec reboot
` [PATCH 10/24] hibernate: Disable when the kernel is locked down
` [PATCH 11/24] uswsusp: "
` [PATCH 12/24] PCI: Lock down BAR access "
` [PATCH 14/24] x86: Restrict MSR "
` [PATCH 15/24] asus-wmi: Restrict debugfs interface "
` [PATCH 16/24] ACPI: Limit access to custom_method "
` [PATCH 17/24] acpi: Ignore acpi_rsdp kernel param when the kernel has been "
` [PATCH 18/24] acpi: Disable ACPI table override if the kernel is "
` [PATCH 19/24] acpi: Disable APEI error injection "
` [PATCH 20/24] bpf: Restrict kernel image access functions when "
` [PATCH 21/24] scsi: Lock down the eata driver
` [PATCH 02/24] Add the ability to lock down access to the running kernel image
` [PATCH 09/24] kexec_file: Disable at runtime if securelevel has been set
` [PATCH 13/24] x86: Lock down IO port access when the kernel is locked down
` [PATCH 22/24] Prohibit PCMCIA CIS storage "
` [PATCH 23/24] Lock down TIOCSSERIAL
` [PATCH 24/24] Lock down module params that specify hardware parameters (eg. ioport)
` Why kernel lockdown?
[PATCH] arm64: xen: Implement EFI reset_system callback
2017-04-18 13:46 UTC (2+ messages)
[PATCH v2] efi: Config options to assign versions in the PE-COFF header
2017-04-18 4:09 UTC (5+ messages)
the Mail Archive is now (again) subscribed to this list
2017-04-17 21:49 UTC (3+ messages)
` linux-efi archive
(unknown),
2017-04-17 18:00 UTC
[GIT PULL] EFI fixup for v4.12 queue
2017-04-17 9:32 UTC (2+ messages)
` [PATCH] efi/libstub/arm: Don't use TASK_SIZE when randomising the RT space
Greetings
2017-04-14 9:22 UTC
[RFC PATCH] x86: Config options to assign versions in the PE-COFF header
2017-04-14 5:17 UTC (6+ messages)
[PATCH V14 00/10] Add UEFI 2.6 and ACPI 6.1 updates for RAS on ARM64
2017-04-13 21:33 UTC (14+ messages)
` [PATCH V14 01/10] acpi: apei: read ack upon ghes record consumption
` [PATCH V14 02/10] ras: acpi/apei: cper: generic error data entry v3 per ACPI 6.1
` [PATCH V14 03/10] efi: parse ARM processor error
[GIT PULL] EFI urgent fix
2017-04-12 15:27 UTC (2+ messages)
` [PATCH] x86/efi: Don't try to reserve runtime regions
[PATCH v3] efifb: avoid reconfiguration of BAR that covers the framebuffer
2017-04-11 16:06 UTC (22+ messages)
[PATCH] efifb: arm/arm64: validate fb BAR instead of claiming it
2017-04-11 8:43 UTC
[GIT PULL 00/12] EFI updates for v4.12
2017-04-11 4:08 UTC (7+ messages)
` [PATCH 10/12] efi/libstub: Unify command line param parsing
` [PATCH 11/12] efi/libstub: arm/arm64: Disable debug prints on 'quiet' cmdline arg
` [PATCH 12/12] ef/libstub: arm/arm64: Randomize the base of the UEFI rt services region
[PATCH] efi/libstub: arm/arm64: don't use TASK_SIZE when randomising the RT space
2017-04-10 14:42 UTC (4+ messages)
[PATCH 0/4] efi: libstub enhancements for cmdline parsing and kaslr
2017-04-10 9:44 UTC (7+ messages)
` [PATCH 4/4] ef/libstub: arm/arm64: randomize the base of the UEFI rt services region
[PATCH 00/24] Kernel lockdown
2017-04-07 16:32 UTC (2+ messages)
[RFC PATCH v2 00/32] x86: Secure Encrypted Virtualization (AMD)
2017-04-07 14:50 UTC (12+ messages)
` [RFC PATCH v2 14/32] x86: mm: Provide support to use memblock when spliting large pages
[PATCH 1/5] efi: Move the x86 secure boot switch to generic code
2017-04-06 22:45 UTC (7+ messages)
` [PATCH 2/5] efi: Add EFI_SECURE_BOOT bit
` [PATCH 3/5] Add the ability to lock down access to the running kernel image
` [PATCH 4/5] efi: Lock down the kernel if booted in secure boot mode
` [PATCH 5/5] Add a sysrq option to exit "
[PATCH 00/24] Kernel lockdown
2017-04-06 21:55 UTC (27+ messages)
` [PATCH 01/24] efi: Add EFI_SECURE_BOOT bit
` [PATCH 02/24] Add the ability to lock down access to the running kernel image
` [PATCH 05/24] Restrict /dev/mem and /dev/kmem when the kernel is locked down
` [PATCH 06/24] Add a sysrq option to exit secure boot mode
` [PATCH 07/24] kexec: Disable at runtime if the kernel is locked down
` [PATCH 08/24] Copy secure_boot flag in boot params across kexec reboot
` [PATCH 09/24] kexec_file: Disable at runtime if securelevel has been set
` [PATCH 11/24] uswsusp: Disable when the kernel is locked down
` [PATCH 12/24] PCI: Lock down BAR access "
` [PATCH 13/24] x86: Lock down IO port "
` [PATCH 14/24] x86: Restrict MSR "
` [PATCH 15/24] asus-wmi: Restrict debugfs interface "
` [PATCH 18/24] acpi: Disable ACPI table override if "
` [PATCH 19/24] acpi: Disable APEI error injection "
` [PATCH 03/24] efi: Lock down the kernel if booted in secure boot mode
` [PATCH 04/24] Enforce module signatures if the kernel is locked down
` [PATCH 10/24] hibernate: Disable when "
` [PATCH 16/24] ACPI: Limit access to custom_method "
` [PATCH 17/24] acpi: Ignore acpi_rsdp kernel param when the kernel has been "
(unknown),
2017-04-06 11:45 UTC
[PATCH 4.10 65/81] x86/mm/KASLR: Exclude EFI region from KASLR VA space randomization
2017-04-06 8:38 UTC
[PATCH 4.9 58/72] x86/mm/KASLR: Exclude EFI region from KASLR VA space randomization
2017-04-06 8:38 UTC
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).