linux-efi.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2016-11-12 21:32:34 to 2016-11-23 12:58:26 UTC [more...]

[PATCH 00/16] Kernel lockdown
 2016-11-23 12:58 UTC  (61+ messages)
` [PATCH 01/16] Add the ability to lock down access to the running kernel image
` [PATCH 02/16] efi: Get the secure boot status
    ` [PATCH 2/6] arm/efi: Allow invocation of arbitrary runtime services
    ` [PATCH 3/6] efi: Add SHIM and image security database GUID definitions
    ` [PATCH 4/6] efi: Get the secure boot status
    ` [PATCH 5/6] efi: Disable secure boot if shim is in insecure mode
    ` [PATCH 6/6] efi: Add EFI_SECURE_BOOT bit
    ` [PATCH 1/6] x86/efi: Allow invocation of arbitrary runtime services
` [PATCH 03/16] efi: Disable secure boot if shim is in insecure mode
` [PATCH 04/16] efi: Lock down the kernel if booted in secure boot mode
` [PATCH 05/16] efi: Add EFI_SECURE_BOOT bit
` [PATCH 06/16] Add a sysrq option to exit secure boot mode
` [PATCH 07/16] kexec: Disable at runtime if the kernel is locked down
` [PATCH 08/16] Copy secure_boot flag in boot params across kexec reboot
` [PATCH 09/16] hibernate: Disable when the kernel is locked down
` [PATCH 10/16] PCI: Lock down BAR access "
  ` [PATCH 11/16] x86: Lock down IO port "
  ` [PATCH 16/16] x86: Restrict MSR "
` [PATCH 12/16] ACPI: Limit access to custom_method "
` [PATCH 13/16] asus-wmi: Restrict debugfs interface "
` [PATCH 14/16] Restrict /dev/mem and /dev/kmem "
` [PATCH 15/16] acpi: Ignore acpi_rsdp kernel param when the kernel has been "
` [PATCH] Lock down drivers that can have io ports, io mem, irqs and dma changed

[PATCH 0/7] efi: Pass secure boot mode to kernel [ver #3]
 2016-11-23 12:54 UTC  (8+ messages)
  ` [PATCH 1/7] efi: use typed function pointers for runtime services table "
  ` [PATCH 4/7] efi: Add SHIM and image security database GUID definitions "
` [PATCH 2/7] x86/efi: Allow invocation of arbitrary runtime services "
` [PATCH 3/7] arm/efi: "
` [PATCH 5/7] efi: Get the secure boot status "
` [PATCH 6/7] efi: Disable secure boot if shim is in insecure mode "
` [PATCH 7/7] efi: Add EFI_SECURE_BOOT bit "

[PATCH 0/6] efi: Pass secure boot mode to kernel [ver #2]
 2016-11-23 11:51 UTC  (20+ messages)
` [PATCH 1/6] x86/efi: Allow invocation of arbitrary runtime services "
  ` [PATCH 2/6] arm/efi: "
  ` [PATCH 3/6] efi: Add SHIM and image security database GUID definitions "
` [PATCH 4/6] efi: Get the secure boot status "
` [PATCH 5/6] efi: Disable secure boot if shim is in insecure mode "
` [PATCH 6/6] efi: Add EFI_SECURE_BOOT bit "

[PATCH] efi: use typed function pointers for runtime services table
 2016-11-23 10:42 UTC 

[RFC PATCH v3 00/20] x86: Secure Memory Encryption (AMD)
 2016-11-22 20:41 UTC  (62+ messages)
` [RFC PATCH v3 01/20] x86: Documentation for AMD Secure Memory Encryption (SME)
` [RFC PATCH v3 02/20] x86: Set the write-protect cache mode for full PAT support
` [RFC PATCH v3 04/20] x86: Handle reduction in physical address size with SME
` [RFC PATCH v3 06/20] x86: Add support to enable SME during early boot processing
` [RFC PATCH v3 08/20] x86: Add support for early encryption/decryption of memory
` [RFC PATCH v3 09/20] x86: Insure that boot memory areas are mapped properly
` [RFC PATCH v3 10/20] Add support to access boot related data in the clear
` [RFC PATCH v3 11/20] x86: Add support for changing memory encryption attribute
` [RFC PATCH v3 12/20] x86: Decrypt trampoline area if memory encryption is active
` [RFC PATCH v3 13/20] x86: DMA support for memory encryption
` [RFC PATCH v3 14/20] iommu/amd: Disable AMD IOMMU if memory encryption is active
` [RFC PATCH v3 15/20] x86: Check for memory encryption on the APs
` [RFC PATCH v3 20/20] x86: Add support to make use of Secure Memory Encryption

[PATCH V5 00/10] Add UEFI 2.6 and ACPI 6.1 updates for RAS on ARM64
 2016-11-22 17:13 UTC  (13+ messages)
` [PATCH V5 01/10] acpi: apei: read ack upon ghes record consumption
` [PATCH V5 02/10] ras: acpi/apei: cper: generic error data entry v3 per ACPI 6.1
` [PATCH V5 03/10] efi: parse ARMv8 processor error
` [PATCH V5 04/10] arm64: exception: handle Synchronous External Abort
` [PATCH V5 05/10] acpi: apei: handle SEA notification type for ARMv8
` [PATCH V5 06/10] acpi: apei: panic OS with fatal error status block
` [PATCH V5 07/10] efi: print unrecognized CPER section
` [PATCH V5 08/10] ras: acpi / apei: generate trace event for "
` [PATCH V5 09/10] trace, ras: add ARM processor error trace event
` [PATCH V5 10/10] arm/arm64: KVM: add guest SEA support

[PATCH v2] efi/libstub: Make efi_random_alloc() allocate below 4 GB on 32-bit
 2016-11-22  9:57 UTC 

[PATCH 0/9] KEYS: Blacklisting & UEFI database load
 2016-11-21 19:33 UTC  (30+ messages)
` [PATCH 1/9] KEYS: Add a system blacklist keyring
` [PATCH 2/9] X.509: Allow X.509 certs to be blacklisted
` [PATCH 3/9] PKCS#7: Handle blacklisted certificates
` [PATCH 4/9] KEYS: Allow unrestricted boot-time addition of keys to secondary keyring
` [PATCH 5/9] efi: Add SHIM and image security database GUID definitions
` [PATCH 6/9] efi: Add EFI signature data types
` [PATCH 7/9] efi: Add an EFI signature blob parser
` [PATCH 8/9] MODSIGN: Import certificates from UEFI Secure Boot
` [PATCH 9/9] MODSIGN: Allow the "db" UEFI variable to be suppressed

[PATCH] arm64: mm: Fix memmap to be initialized for the entire section
 2016-11-20 17:07 UTC  (11+ messages)

[PATCH] efi/libstub: Make efi_random_alloc() allocate below 4 GB on 32-bit
 2016-11-15 15:53 UTC 

[PATCH v2 0/3] efi: add support for seeding the kernel RNG from UEFI
 2016-11-15 15:19 UTC  (5+ messages)
` [PATCH v2 2/3] efi/libstub: add random.c to ARM build

[PATCH 0/2] Honey, I shrunk the EFI stub
 2016-11-14 15:32 UTC  (4+ messages)

[GIT PULL 0/9] EFI changes for v4.10
 2016-11-14 15:10 UTC  (13+ messages)
` [PATCH 5/9] efi/arm*: libstub: Invoke EFI_RNG_PROTOCOL to seed the UEFI RNG table
  ` [PATCH 6/9] efi: Add device path parser
` [PATCH 7/9] efi: Allow bitness-agnostic protocol calls
` [PATCH 8/9] x86/efi: Retrieve and assign Apple device properties
` [PATCH 9/9] thunderbolt: Use Device ROM retrieved from EFI

PLEASE VIEW THE ATTACHED FILE AND CONTACT ME
 2016-11-14  7:43 UTC 

[efi:master 9/10] drivers/firmware/efi/apple-properties.c:149:3: error: implicit declaration of function 'efi_get_device_by_path'
 2016-11-12 23:25 UTC 

20315 linux-efi
 2016-11-12 22:33 UTC 


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).