linux-efi.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2017-11-09 17:32:15 to 2017-12-12 12:43:46 UTC [more...]

[PATCH 4.9 016/148] efi: Move some sysfs files to be read-only by root
 2017-12-12 12:43 UTC 

[PATCH 4.14 038/164] efi: Move some sysfs files to be read-only by root
 2017-12-12 12:43 UTC  (2+ messages)
` [PATCH 4.14 039/164] efi/esrt: Use memunmap() instead of kfree() to free the remapping

[PATCH 41/45] arch/x86: remove duplicate includes
 2017-12-12  7:01 UTC  (2+ messages)

[PATCH V2 0/2] CPER ARM error information parsing
 2017-12-11 23:17 UTC  (9+ messages)
  ` [PATCH V2 1/2] efi: move ARM CPER code to new file
  ` [PATCH V2 2/2] efi: parse ARM error information value

[PATCH v5 1/2] arm64: Define cputype macros for Falkor CPU
 2017-12-11 22:42 UTC  (2+ messages)
` [PATCH v5 2/2] arm64: Add software workaround for Falkor erratum 1041

[RESEND PATCH v4 1/2] arm64: Define cputype macros for Falkor CPU
 2017-12-11 22:26 UTC  (4+ messages)
` [RESEND PATCH v4 2/2] arm64: Add software workaround for Falkor erratum 1041

[PATCH 4.4 03/27] x86/mm/pat: Ensure cpa->pfn only contains page frame numbers
 2017-12-10 21:26 UTC  (5+ messages)
` [PATCH 4.4 04/27] x86/efi: Hoist page table switching code into efi_call_virt()
` [PATCH 4.4 05/27] x86/efi: Build our own page table structures

[PATCH] efi: make EFI a menuconfig to ease disabling it all
 2017-12-09 15:52 UTC 

[PATCH resend] fix boot hang with earlyprintk=efi,keep
 2017-12-09  4:16 UTC 

[PATCH 00/27] security, efi: Add kernel lockdown
 2017-12-08 17:11 UTC  (47+ messages)
  ` Firmware signing -- "

[RFC v3 PATCH 0/2] Introduce Security Version to EFI Stub
 2017-12-08 10:03 UTC  (15+ messages)
` [RFC v3 PATCH 1/2] x86/efi: Introduce Security Version to x86
` [RFC v3 PATCH 2/2] arm64/efi: Introduce Security Version to ARM64

[GIT PULL 0/3] EFI fixes for v4.15
 2017-12-06 17:20 UTC  (5+ messages)
` [PATCH 1/3] efi: move some sysfs files to be read-only by root
` [PATCH 2/3] efi/esrt: use memunmap rather kfree to free the remapping
  ` [PATCH 3/3] efi: add comment to avoid future expanding of sysfs systab

[PATCH] efi: move some sysfs files to be read-only by root
 2017-12-06  6:30 UTC  (7+ messages)
  ` [PATCH v2] "

efi/esrt: use memunmap rather kfree to free the remapping
 2017-12-05 18:08 UTC  (2+ messages)

[PATCH] efi: add comment to avoid future expanding of sysfs systab
 2017-12-05 10:16 UTC  (2+ messages)

[GIT PULL] hash addresses printed with %p
 2017-12-05 10:15 UTC  (34+ messages)

[PATCH v4 0/2] Implement a software workaround for Falkor erratum 1041
 2017-12-04 20:09 UTC  (6+ messages)
` [PATCH v4 1/2] arm64: Define cputype macros for Falkor CPU
` [PATCH v4 2/2] arm64: Add software workaround for Falkor erratum 1041

arm64 crashkernel fails to boot on acpi-only machines due to ACPI regions being no longer mapped as NOMAP
 2017-12-04 14:02 UTC  (9+ messages)

[PATCH] fix system_state checking in early_ioremap
 2017-12-03  0:55 UTC  (2+ messages)

[PATCH 0/4] Using the hash in MOKx to blacklist kernel module
 2017-12-01  6:59 UTC  (7+ messages)
` [PATCH 1/4] MODSIGN: do not load mok when secure boot disabled
` [PATCH 2/4] MODSIGN: print appropriate status message when getting UEFI certificates list
  ` [PATCH 3/4] MODSIGN: load blacklist from MOKx
` [PATCH 4/4] MODSIGN: checking the blacklisted hash before loading a kernel module

[PATCH v5 19/27] x86: assembly, make some functions local
 2017-11-30 14:46 UTC  (3+ messages)
  ` [PATCH v5 23/27] x86_64: assembly, change all ENTRY+ENDPROC to SYM_FUNC_*
  ` [PATCH v5 26/27] x86_32: "

Хотела бы найти подработку копирайтером, рерайтером
 2017-11-30  6:24 UTC 

[PATCH] x86: move parse_early_param to earlier code for add_efi_memmap
 2017-11-30  5:23 UTC 

[PATCH 0/4] Using the hash in MOKx to blacklist kernel module
 2017-11-29 14:00 UTC 

[PATCH] efi: Use PTR_ERR_OR_ZERO()
 2017-11-28 21:39 UTC 

[PATCH v3 0/2] Implement a software workaround for Falkor erratum 1041
 2017-11-15 23:24 UTC  (6+ messages)
` [PATCH v3 1/2] arm64: Define cputype macros for Falkor CPU
` [PATCH v3 2/2] arm64: Add software workaround for Falkor erratum 1041
    ` [v3,2/2] "

Draft manpage explaining kernel lockdown
 2017-11-15 21:12 UTC  (2+ messages)

[PATCH 0/3] Implement a software workaround for Falkor erratum 1041
 2017-11-15 15:12 UTC  (15+ messages)
` [PATCH 3/3] arm64: Add "
  ` [3/3] "

Hello Dear
 2017-11-15 11:33 UTC 

Re:
 2017-11-13 14:55 UTC 

[PATCH v2 0/2] Implement a software workaround for Falkor erratum 1041
 2017-11-13  1:54 UTC  (4+ messages)
` [PATCH v2 1/2] arm64: Define cputype macros for Falkor CPU
` [PATCH v2 2/2] arm64: Add software workaround for Falkor erratum 1041

[PATCH 00/30] security, efi: Add kernel lockdown
 2017-11-10 11:06 UTC  (25+ messages)
` [PATCH 13/30] x86/msr: Restrict MSR access when the kernel is locked down
` [PATCH 14/30] asus-wmi: Restrict debugfs interface "
` [PATCH 15/30] ACPI: Limit access to custom_method "
` [PATCH 16/30] acpi: Ignore acpi_rsdp kernel param when the kernel has been "
` [PATCH 17/30] acpi: Disable ACPI table override if the kernel is "
` [PATCH 18/30] acpi: Disable APEI error injection "
` [PATCH 19/30] scsi: Lock down the eata driver
` [PATCH 20/30] Prohibit PCMCIA CIS storage when the kernel is locked down
` [PATCH 21/30] Lock down TIOCSSERIAL
` [PATCH 22/30] Lock down module params that specify hardware parameters (eg. ioport)
` [PATCH 23/30] x86/mmiotrace: Lock down the testmmiotrace module
` [PATCH 24/30] debugfs: Disallow use of debugfs files when the kernel is locked down
` [PATCH 25/30] Lock down /proc/kcore
` [PATCH 26/30] Lock down ftrace
` [PATCH 27/30] Lock down kprobes
` [PATCH 28/30] bpf: Restrict kernel image access functions when the kernel is locked down
` [PATCH 29/30] efi: Add an EFI_SECURE_BOOT flag to indicate secure boot mode
  ` [PATCH 30/30] efi: Lock down the kernel if booted in "


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).