messages from 2017-11-09 17:32:15 to 2017-12-12 12:43:46 UTC [more...]
[PATCH 4.9 016/148] efi: Move some sysfs files to be read-only by root
2017-12-12 12:43 UTC
[PATCH 4.14 038/164] efi: Move some sysfs files to be read-only by root
2017-12-12 12:43 UTC (2+ messages)
` [PATCH 4.14 039/164] efi/esrt: Use memunmap() instead of kfree() to free the remapping
[PATCH 41/45] arch/x86: remove duplicate includes
2017-12-12 7:01 UTC (2+ messages)
[PATCH V2 0/2] CPER ARM error information parsing
2017-12-11 23:17 UTC (9+ messages)
` [PATCH V2 1/2] efi: move ARM CPER code to new file
` [PATCH V2 2/2] efi: parse ARM error information value
[PATCH v5 1/2] arm64: Define cputype macros for Falkor CPU
2017-12-11 22:42 UTC (2+ messages)
` [PATCH v5 2/2] arm64: Add software workaround for Falkor erratum 1041
[RESEND PATCH v4 1/2] arm64: Define cputype macros for Falkor CPU
2017-12-11 22:26 UTC (4+ messages)
` [RESEND PATCH v4 2/2] arm64: Add software workaround for Falkor erratum 1041
[PATCH 4.4 03/27] x86/mm/pat: Ensure cpa->pfn only contains page frame numbers
2017-12-10 21:26 UTC (5+ messages)
` [PATCH 4.4 04/27] x86/efi: Hoist page table switching code into efi_call_virt()
` [PATCH 4.4 05/27] x86/efi: Build our own page table structures
[PATCH] efi: make EFI a menuconfig to ease disabling it all
2017-12-09 15:52 UTC
[PATCH resend] fix boot hang with earlyprintk=efi,keep
2017-12-09 4:16 UTC
[PATCH 00/27] security, efi: Add kernel lockdown
2017-12-08 17:11 UTC (47+ messages)
` Firmware signing -- "
[RFC v3 PATCH 0/2] Introduce Security Version to EFI Stub
2017-12-08 10:03 UTC (15+ messages)
` [RFC v3 PATCH 1/2] x86/efi: Introduce Security Version to x86
` [RFC v3 PATCH 2/2] arm64/efi: Introduce Security Version to ARM64
[GIT PULL 0/3] EFI fixes for v4.15
2017-12-06 17:20 UTC (5+ messages)
` [PATCH 1/3] efi: move some sysfs files to be read-only by root
` [PATCH 2/3] efi/esrt: use memunmap rather kfree to free the remapping
` [PATCH 3/3] efi: add comment to avoid future expanding of sysfs systab
[PATCH] efi: move some sysfs files to be read-only by root
2017-12-06 6:30 UTC (7+ messages)
` [PATCH v2] "
efi/esrt: use memunmap rather kfree to free the remapping
2017-12-05 18:08 UTC (2+ messages)
[PATCH] efi: add comment to avoid future expanding of sysfs systab
2017-12-05 10:16 UTC (2+ messages)
[GIT PULL] hash addresses printed with %p
2017-12-05 10:15 UTC (34+ messages)
[PATCH v4 0/2] Implement a software workaround for Falkor erratum 1041
2017-12-04 20:09 UTC (6+ messages)
` [PATCH v4 1/2] arm64: Define cputype macros for Falkor CPU
` [PATCH v4 2/2] arm64: Add software workaround for Falkor erratum 1041
arm64 crashkernel fails to boot on acpi-only machines due to ACPI regions being no longer mapped as NOMAP
2017-12-04 14:02 UTC (9+ messages)
[PATCH] fix system_state checking in early_ioremap
2017-12-03 0:55 UTC (2+ messages)
[PATCH 0/4] Using the hash in MOKx to blacklist kernel module
2017-12-01 6:59 UTC (7+ messages)
` [PATCH 1/4] MODSIGN: do not load mok when secure boot disabled
` [PATCH 2/4] MODSIGN: print appropriate status message when getting UEFI certificates list
` [PATCH 3/4] MODSIGN: load blacklist from MOKx
` [PATCH 4/4] MODSIGN: checking the blacklisted hash before loading a kernel module
[PATCH v5 19/27] x86: assembly, make some functions local
2017-11-30 14:46 UTC (3+ messages)
` [PATCH v5 23/27] x86_64: assembly, change all ENTRY+ENDPROC to SYM_FUNC_*
` [PATCH v5 26/27] x86_32: "
Хотела бы найти подработку копирайтером, рерайтером
2017-11-30 6:24 UTC
[PATCH] x86: move parse_early_param to earlier code for add_efi_memmap
2017-11-30 5:23 UTC
[PATCH 0/4] Using the hash in MOKx to blacklist kernel module
2017-11-29 14:00 UTC
[PATCH] efi: Use PTR_ERR_OR_ZERO()
2017-11-28 21:39 UTC
[PATCH v3 0/2] Implement a software workaround for Falkor erratum 1041
2017-11-15 23:24 UTC (6+ messages)
` [PATCH v3 1/2] arm64: Define cputype macros for Falkor CPU
` [PATCH v3 2/2] arm64: Add software workaround for Falkor erratum 1041
` [v3,2/2] "
Draft manpage explaining kernel lockdown
2017-11-15 21:12 UTC (2+ messages)
[PATCH 0/3] Implement a software workaround for Falkor erratum 1041
2017-11-15 15:12 UTC (15+ messages)
` [PATCH 3/3] arm64: Add "
` [3/3] "
Hello Dear
2017-11-15 11:33 UTC
Re:
2017-11-13 14:55 UTC
[PATCH v2 0/2] Implement a software workaround for Falkor erratum 1041
2017-11-13 1:54 UTC (4+ messages)
` [PATCH v2 1/2] arm64: Define cputype macros for Falkor CPU
` [PATCH v2 2/2] arm64: Add software workaround for Falkor erratum 1041
[PATCH 00/30] security, efi: Add kernel lockdown
2017-11-10 11:06 UTC (25+ messages)
` [PATCH 13/30] x86/msr: Restrict MSR access when the kernel is locked down
` [PATCH 14/30] asus-wmi: Restrict debugfs interface "
` [PATCH 15/30] ACPI: Limit access to custom_method "
` [PATCH 16/30] acpi: Ignore acpi_rsdp kernel param when the kernel has been "
` [PATCH 17/30] acpi: Disable ACPI table override if the kernel is "
` [PATCH 18/30] acpi: Disable APEI error injection "
` [PATCH 19/30] scsi: Lock down the eata driver
` [PATCH 20/30] Prohibit PCMCIA CIS storage when the kernel is locked down
` [PATCH 21/30] Lock down TIOCSSERIAL
` [PATCH 22/30] Lock down module params that specify hardware parameters (eg. ioport)
` [PATCH 23/30] x86/mmiotrace: Lock down the testmmiotrace module
` [PATCH 24/30] debugfs: Disallow use of debugfs files when the kernel is locked down
` [PATCH 25/30] Lock down /proc/kcore
` [PATCH 26/30] Lock down ftrace
` [PATCH 27/30] Lock down kprobes
` [PATCH 28/30] bpf: Restrict kernel image access functions when the kernel is locked down
` [PATCH 29/30] efi: Add an EFI_SECURE_BOOT flag to indicate secure boot mode
` [PATCH 30/30] efi: Lock down the kernel if booted in "
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).