linux-efi.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2017-04-05 17:09:54 to 2017-04-18 21:14:31 UTC [more...]

[PATCH v5 00/32] x86: Secure Memory Encryption (AMD)
 2017-04-18 21:14 UTC  (4+ messages)
` [PATCH v5 01/32] x86: Documentation for AMD Secure Memory Encryption (SME)
  ` [PATCH v5 02/32] x86/mm/pat: Set write-protect cache mode for full PAT support
  ` [PATCH v5 03/32] x86, mpparse, x86/acpi, x86/PCI, SFI: Use memremap for RAM mappings

[PATCH 0/8] efi: add support for non-standard capsule headers
 2017-04-18 18:11 UTC  (30+ messages)
` [PATCH 1/8] efi/capsule: Fix return code on failing kmap/vmap
` [PATCH 2/8] efi/capsule: Remove pr_debug on ENOMEM or EFAULT
` [PATCH 3/8] efi/capsule: Clean up pr_err/info messages
` [PATCH 4/8] efi/capsule: Adjust return type of efi_capsule_setup_info
` [PATCH 5/8] efi/capsule-loader: use cached copy of capsule header
` [PATCH 6/8] efi/capsule-loader: indirect calls to efi_capsule_setup_info via weak alias
` [PATCH 7/8] efi/capsule-loader: use page addresses rather than struct page pointers
` [PATCH 8/8] efi/capsule: Add support for Quark security header

[PATCH 00/24] Kernel lockdown
 2017-04-18 17:50 UTC  (81+ messages)
` [PATCH 01/24] efi: Add EFI_SECURE_BOOT bit
` [PATCH 03/24] efi: Lock down the kernel if booted in secure boot mode
` [PATCH 04/24] Enforce module signatures if the kernel is locked down
` [PATCH 05/24] Restrict /dev/mem and /dev/kmem when "
` [PATCH 06/24] Add a sysrq option to exit secure boot mode
` [PATCH 07/24] kexec: Disable at runtime if the kernel is locked down
` [PATCH 08/24] Copy secure_boot flag in boot params across kexec reboot
` [PATCH 10/24] hibernate: Disable when the kernel is locked down
` [PATCH 11/24] uswsusp: "
` [PATCH 12/24] PCI: Lock down BAR access "
` [PATCH 14/24] x86: Restrict MSR "
` [PATCH 15/24] asus-wmi: Restrict debugfs interface "
` [PATCH 16/24] ACPI: Limit access to custom_method "
` [PATCH 17/24] acpi: Ignore acpi_rsdp kernel param when the kernel has been "
` [PATCH 18/24] acpi: Disable ACPI table override if the kernel is "
` [PATCH 19/24] acpi: Disable APEI error injection "
` [PATCH 20/24] bpf: Restrict kernel image access functions when "
` [PATCH 21/24] scsi: Lock down the eata driver
  ` [PATCH 02/24] Add the ability to lock down access to the running kernel image
  ` [PATCH 09/24] kexec_file: Disable at runtime if securelevel has been set
  ` [PATCH 13/24] x86: Lock down IO port access when the kernel is locked down
  ` [PATCH 22/24] Prohibit PCMCIA CIS storage "
  ` [PATCH 23/24] Lock down TIOCSSERIAL
  ` [PATCH 24/24] Lock down module params that specify hardware parameters (eg. ioport)
  ` Why kernel lockdown?

[PATCH] arm64: xen: Implement EFI reset_system callback
 2017-04-18 13:46 UTC  (2+ messages)

[PATCH v2] efi: Config options to assign versions in the PE-COFF header
 2017-04-18  4:09 UTC  (5+ messages)

the Mail Archive is now (again) subscribed to this list
 2017-04-17 21:49 UTC  (3+ messages)
  ` linux-efi archive

(unknown),
 2017-04-17 18:00 UTC 

[GIT PULL] EFI fixup for v4.12 queue
 2017-04-17  9:32 UTC  (2+ messages)
` [PATCH] efi/libstub/arm: Don't use TASK_SIZE when randomising the RT space

Greetings
 2017-04-14  9:22 UTC 

[RFC PATCH] x86: Config options to assign versions in the PE-COFF header
 2017-04-14  5:17 UTC  (6+ messages)

[PATCH V14 00/10] Add UEFI 2.6 and ACPI 6.1 updates for RAS on ARM64
 2017-04-13 21:33 UTC  (14+ messages)
` [PATCH V14 01/10] acpi: apei: read ack upon ghes record consumption
` [PATCH V14 02/10] ras: acpi/apei: cper: generic error data entry v3 per ACPI 6.1
` [PATCH V14 03/10] efi: parse ARM processor error

[GIT PULL] EFI urgent fix
 2017-04-12 15:27 UTC  (2+ messages)
` [PATCH] x86/efi: Don't try to reserve runtime regions

[PATCH v3] efifb: avoid reconfiguration of BAR that covers the framebuffer
 2017-04-11 16:06 UTC  (22+ messages)

[PATCH] efifb: arm/arm64: validate fb BAR instead of claiming it
 2017-04-11  8:43 UTC 

[GIT PULL 00/12] EFI updates for v4.12
 2017-04-11  4:08 UTC  (7+ messages)
` [PATCH 10/12] efi/libstub: Unify command line param parsing
  ` [PATCH 11/12] efi/libstub: arm/arm64: Disable debug prints on 'quiet' cmdline arg
  ` [PATCH 12/12] ef/libstub: arm/arm64: Randomize the base of the UEFI rt services region

[PATCH] efi/libstub: arm/arm64: don't use TASK_SIZE when randomising the RT space
 2017-04-10 14:42 UTC  (4+ messages)

[PATCH 0/4] efi: libstub enhancements for cmdline parsing and kaslr
 2017-04-10  9:44 UTC  (7+ messages)
` [PATCH 4/4] ef/libstub: arm/arm64: randomize the base of the UEFI rt services region

[PATCH 00/24] Kernel lockdown
 2017-04-07 16:32 UTC  (2+ messages)

[RFC PATCH v2 00/32] x86: Secure Encrypted Virtualization (AMD)
 2017-04-07 14:50 UTC  (12+ messages)
` [RFC PATCH v2 14/32] x86: mm: Provide support to use memblock when spliting large pages

[PATCH 1/5] efi: Move the x86 secure boot switch to generic code
 2017-04-06 22:45 UTC  (7+ messages)
` [PATCH 2/5] efi: Add EFI_SECURE_BOOT bit
` [PATCH 3/5] Add the ability to lock down access to the running kernel image
` [PATCH 4/5] efi: Lock down the kernel if booted in secure boot mode
  ` [PATCH 5/5] Add a sysrq option to exit "

[PATCH 00/24] Kernel lockdown
 2017-04-06 21:55 UTC  (27+ messages)
` [PATCH 01/24] efi: Add EFI_SECURE_BOOT bit
` [PATCH 02/24] Add the ability to lock down access to the running kernel image
` [PATCH 05/24] Restrict /dev/mem and /dev/kmem when the kernel is locked down
` [PATCH 06/24] Add a sysrq option to exit secure boot mode
` [PATCH 07/24] kexec: Disable at runtime if the kernel is locked down
` [PATCH 08/24] Copy secure_boot flag in boot params across kexec reboot
` [PATCH 09/24] kexec_file: Disable at runtime if securelevel has been set
` [PATCH 11/24] uswsusp: Disable when the kernel is locked down
` [PATCH 12/24] PCI: Lock down BAR access "
` [PATCH 13/24] x86: Lock down IO port "
` [PATCH 14/24] x86: Restrict MSR "
` [PATCH 15/24] asus-wmi: Restrict debugfs interface "
` [PATCH 18/24] acpi: Disable ACPI table override if "
` [PATCH 19/24] acpi: Disable APEI error injection "
  ` [PATCH 03/24] efi: Lock down the kernel if booted in secure boot mode
  ` [PATCH 04/24] Enforce module signatures if the kernel is locked down
  ` [PATCH 10/24] hibernate: Disable when "
  ` [PATCH 16/24] ACPI: Limit access to custom_method "
  ` [PATCH 17/24] acpi: Ignore acpi_rsdp kernel param when the kernel has been "

(unknown),
 2017-04-06 11:45 UTC 

[PATCH 4.10 65/81] x86/mm/KASLR: Exclude EFI region from KASLR VA space randomization
 2017-04-06  8:38 UTC 

[PATCH 4.9 58/72] x86/mm/KASLR: Exclude EFI region from KASLR VA space randomization
 2017-04-06  8:38 UTC 


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).