messages from 2016-10-24 13:32:31 to 2016-11-16 22:28:31 UTC [more...]
[PATCH 00/16] Kernel lockdown
2016-11-16 22:28 UTC (20+ messages)
` [PATCH 01/16] Add the ability to lock down access to the running kernel image
` [PATCH 02/16] efi: Get the secure boot status
` [PATCH 03/16] efi: Disable secure boot if shim is in insecure mode
` [PATCH 04/16] efi: Lock down the kernel if booted in secure boot mode
` [PATCH 05/16] efi: Add EFI_SECURE_BOOT bit
` [PATCH 06/16] Add a sysrq option to exit secure boot mode
` [PATCH 07/16] kexec: Disable at runtime if the kernel is locked down
` [PATCH 08/16] Copy secure_boot flag in boot params across kexec reboot
` [PATCH 09/16] hibernate: Disable when the kernel is locked down
` [PATCH 10/16] PCI: Lock down BAR access "
` [PATCH 11/16] x86: Lock down IO port "
` [PATCH 16/16] x86: Restrict MSR "
` [PATCH 12/16] ACPI: Limit access to custom_method "
` [PATCH 13/16] asus-wmi: Restrict debugfs interface "
` [PATCH 14/16] Restrict /dev/mem and /dev/kmem "
` [PATCH 15/16] acpi: Ignore acpi_rsdp kernel param when the kernel has been "
[RFC PATCH v3 00/20] x86: Secure Memory Encryption (AMD)
2016-11-16 19:22 UTC (54+ messages)
` [RFC PATCH v3 01/20] x86: Documentation for AMD Secure Memory Encryption (SME)
` [RFC PATCH v3 02/20] x86: Set the write-protect cache mode for full PAT support
` [RFC PATCH v3 07/20] x86: Provide general kernel support for memory encryption
` [RFC PATCH v3 08/20] x86: Add support for early encryption/decryption of memory
` [RFC PATCH v3 09/20] x86: Insure that boot memory areas are mapped properly
` [RFC PATCH v3 13/20] x86: DMA support for memory encryption
` [RFC PATCH v3 15/20] x86: Check for memory encryption on the APs
` [RFC PATCH v3 03/20] x86: Add the Secure Memory Encryption cpu feature
` [RFC PATCH v3 04/20] x86: Handle reduction in physical address size with SME
` [RFC PATCH v3 05/20] x86: Add Secure Memory Encryption (SME) support
` [RFC PATCH v3 06/20] x86: Add support to enable SME during early boot processing
` [RFC PATCH v3 10/20] Add support to access boot related data in the clear
` [RFC PATCH v3 11/20] x86: Add support for changing memory encryption attribute
` [RFC PATCH v3 12/20] x86: Decrypt trampoline area if memory encryption is active
` [RFC PATCH v3 14/20] iommu/amd: Disable AMD IOMMU "
` [RFC PATCH v3 16/20] x86: Do not specify encrypted memory for video mappings
` [RFC PATCH v3 17/20] x86/kvm: Enable Secure Memory Encryption of nested page tables
` [RFC PATCH v3 18/20] x86: Access the setup data through debugfs un-encrypted
` [RFC PATCH v3 19/20] x86: Add support to make use of Secure Memory Encryption
` [RFC PATCH v3 20/20] "
[PATCH 0/9] KEYS: Blacklisting & UEFI database load
2016-11-16 18:11 UTC (10+ messages)
` [PATCH 1/9] KEYS: Add a system blacklist keyring
` [PATCH 2/9] X.509: Allow X.509 certs to be blacklisted
` [PATCH 3/9] PKCS#7: Handle blacklisted certificates
` [PATCH 4/9] KEYS: Allow unrestricted boot-time addition of keys to secondary keyring
` [PATCH 5/9] efi: Add SHIM and image security database GUID definitions
` [PATCH 6/9] efi: Add EFI signature data types
` [PATCH 7/9] efi: Add an EFI signature blob parser
` [PATCH 8/9] MODSIGN: Import certificates from UEFI Secure Boot
` [PATCH 9/9] MODSIGN: Allow the "db" UEFI variable to be suppressed
[PATCH] efi/libstub: Make efi_random_alloc() allocate below 4 GB on 32-bit
2016-11-15 15:53 UTC
[PATCH v2 0/3] efi: add support for seeding the kernel RNG from UEFI
2016-11-15 15:19 UTC (5+ messages)
` [PATCH v2 2/3] efi/libstub: add random.c to ARM build
[PATCH 0/2] Honey, I shrunk the EFI stub
2016-11-14 15:32 UTC (6+ messages)
` [PATCH 1/2] efi: Deduplicate efi_file_size() / _read() / _close()
` [PATCH 2/2] x86/efi: Deduplicate efi_char16_printk()
[GIT PULL 0/9] EFI changes for v4.10
2016-11-14 15:10 UTC (17+ messages)
` [PATCH 2/9] MAINTAINERS: Add ARM and arm64 EFI specific files to EFI subsystem
` [PATCH 3/9] efi: Add support for seeding the RNG from a UEFI config table
` [PATCH 5/9] efi/arm*: libstub: Invoke EFI_RNG_PROTOCOL to seed the UEFI RNG table
` [PATCH 1/9] efi/libstub: Fix allocation size calculations
` [PATCH 4/9] efi/libstub: Add random.c to ARM build
` [PATCH 6/9] efi: Add device path parser
` [PATCH 7/9] efi: Allow bitness-agnostic protocol calls
` [PATCH 8/9] x86/efi: Retrieve and assign Apple device properties
` [PATCH 9/9] thunderbolt: Use Device ROM retrieved from EFI
PLEASE VIEW THE ATTACHED FILE AND CONTACT ME
2016-11-14 7:43 UTC
[efi:master 9/10] drivers/firmware/efi/apple-properties.c:149:3: error: implicit declaration of function 'efi_get_device_by_path'
2016-11-12 23:25 UTC
20315 linux-efi
2016-11-12 22:33 UTC
[GIT PULL 0/2] EFI urgent fixes
2016-11-12 21:04 UTC (3+ messages)
` [PATCH 1/2] x86/efi: Fix EFI memmap pointer size warning
` [PATCH 2/2] x86/efi: Prevent mixed mode boot corruption with CONFIG_VMAP_STACK
[PATCH v4 0/4] Apple device properties
2016-11-12 10:10 UTC (7+ messages)
` [PATCH v4 1/4] efi: Add device path parser
` [PATCH v4 3/4] x86/efi: Retrieve and assign Apple device properties
` [PATCH v4 2/4] efi: Allow bitness-agnostic protocol calls
` [PATCH v4 4/4] thunderbolt: Use Device ROM retrieved from EFI
9160 linux-efi
2016-11-10 20:21 UTC
[PATCH] arm64: mm: Fix memmap to be initialized for the entire section
2016-11-09 19:51 UTC (9+ messages)
[PATCHv4 0/4] WX checking for arm64
2016-11-07 19:58 UTC (12+ messages)
` [PATCHv4 1/4] arm64: dump: Make ptdump debugfs a separate option
` [PATCHv4 2/4] arm64: dump: Make the page table dumping seq_file optional
` [PATCHv4 3/4] arm64: dump: Remove max_addr
` [PATCHv4 4/4] arm64: dump: Add checking for writable and exectuable pages
` Re: [PATCHv4 0/4] WX checking for arm64
` [kernel-hardening] "
[tip:x86/asm] x86/mm/64: Enable vmapped stacks (CONFIG_HAVE_ARCH_VMAP_STACK=y)
2016-11-07 12:32 UTC (5+ messages)
[PATCH v3 0/3] Apple device properties
2016-11-07 11:28 UTC (11+ messages)
` [PATCH v3 2/3] x86/efi: Retrieve and assign "
` [PATCH v3 1/3] efi: Add device path parser
` [PATCH v3 3/3] thunderbolt: Use Device ROM retrieved from EFI
[PATCH] x86/efi: Fix EFI memmap pointer size warning
2016-11-07 9:59 UTC (2+ messages)
47346 linux-efi
2016-11-05 20:40 UTC
4.9-rc1 boot regression, ambiguous bisect result
2016-11-03 5:18 UTC (12+ messages)
[PATCH] EFI loader: remove pointless "if" statement
2016-11-02 15:03 UTC
[PATCH v2] EFI loader: remove redundant code
2016-11-02 13:57 UTC (4+ messages)
[PATCH] EFI loader: remove dead code
2016-11-02 5:55 UTC (3+ messages)
[PATCH V4 00/10] Add UEFI 2.6 and ACPI 6.1 updates for RAS on ARM64
2016-11-01 9:36 UTC (14+ messages)
` [PATCH V4 01/10] acpi: apei: read ack upon ghes record consumption
` [PATCH V4 02/10] ras: acpi/apei: cper: generic error data entry v3 per ACPI 6.1
` [PATCH V4 09/10] trace, ras: add ARM processor error trace event
` [PATCH V4 10/10] arm64: KVM: add guest SEA support
[PATCH 1/2] MAINTAINERS: add myself as EFI maintainer
2016-10-31 16:14 UTC (4+ messages)
` [PATCH 2/2] MAINTAINERS: add ARM and arm64 EFI specific files to EFI subsystem
[PATCH v3] Fix allocation size calculations
2016-10-31 7:57 UTC (3+ messages)
776134 linux-efi
2016-10-29 9:45 UTC
[PATCH v2 0/3] Apple device properties
2016-10-27 12:31 UTC (10+ messages)
` [PATCH v2 1/3] efi: Add device path parser
[PATCH 4.8 104/140] x86/platform/UV: Fix support for EFI_OLD_MEMMAP after BIOS callback updates
2016-10-26 12:22 UTC
[PATCH] efi: Add SHIM and image security database GUID definitions
2016-10-26 8:01 UTC (8+ messages)
[PATCH v2] Fix allocation size calculations
2016-10-25 7:37 UTC (2+ messages)
[REGRESSION] EFI mixed mode patch triggers boot failure
2016-10-24 19:54 UTC (4+ messages)
(unknown),
2016-10-24 13:32 UTC
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).