Linux EFI Development - Date Index
[Prev Page][Next Page]
- Re: [PATCH V4 0/3] Use mm_struct and switch_mm() instead of manually, (continued)
- [PATCH] efi: arm64: Check whether x18 is preserved by runtime services calls, Ard Biesheuvel
- [PATCH] efi/arm*: Only register page tables when they exist,
Mark Rutland
- [PATCH 4.14 090/118] x86/pti: Unbreak EFI old_memmap, Greg Kroah-Hartman
- [PATCH 0/4] x86/xen/efi: Initialize UEFI secure boot state during dom0 boot,
Daniel Kiper
- [PATCH] efi: Clarify that reset attack mitigation needs appropriate userspace,
Matthew Garrett
- [PATCH 4.14 13/38] efi/capsule-loader: Reinstate virtual capsule mapping, Greg Kroah-Hartman
- [PATCH] PTI: unbreak EFI old_memmap, Jiri Kosina
- [PATCH] MAINTAINERS: Add Ard Biesheuvel to EFI test driver and efivarfs, Ard Biesheuvel
- [PATCH] MAINTAINERS: Remove Matt Fleming as EFI co-maintainer,
Matt Fleming
- [GIT PULL 0/5] EFI updates for v4.16,
Ard Biesheuvel
- [GIT PULL 0/2] EFI fixes for v4.15,
Ard Biesheuvel
- [PATCH] module: allow symbol exports to be disabled, Ard Biesheuvel
- [RFT PATCH] efi: capsule-loader: reinstate virtual capsule mapping,
Ard Biesheuvel
- BUG: EFI capsule loader fails as of 4.13, the capsule is not passed in contiguous virtual memory, Richard Ruigrok
- EFI crash with PCID on,
Andy Lutomirski
- [PATCH 0/2] Make capsules in a contiguous virtual space,
Ge Song
- [PATCH 1/2] Revert "efi/capsule-loader: Use page addresses rather than struct page pointers", Ge Song
- [PATCH 2/2] efi/capsule-loader: Request a contiguous virtual space for capsules, Ge Song
- [PATCH 3/3] x86/efi: Use efi_switch_mm() rather than manually twiddling with %cr3, Sai Praneeth Prakhya
- [PATCH 2/3] x86/efi: Replace efi_pgd with efi_mm.pgd, Sai Praneeth Prakhya
- [PATCH 1/3] efi: Use efi_mm in x86 as well as ARM, Sai Praneeth Prakhya
- [PATCH V2] x86/efi: fix kernel param add_efi_memmap regression,
Dave Young
- [PATCH 1/2] kconfig: use bool instead of boolean for type definition attributes, again,
Masahiro Yamada
- [PATCH 4.4 013/105] efi: Move some sysfs files to be read-only by root, Greg Kroah-Hartman
- [PATCH 4.4 103/105] Revert "x86/mm/pat: Ensure cpa->pfn only contains page frame numbers",
Greg Kroah-Hartman
- [PATCH 4.4 102/105] Revert "x86/efi: Hoist page table switching code into efi_call_virt()", Greg Kroah-Hartman
- [PATCH 4.4 101/105] Revert "x86/efi: Build our own page table structures", Greg Kroah-Hartman
- [PATCH 3.18 11/64] efi: Move some sysfs files to be read-only by root, Greg Kroah-Hartman
- Booting LiveCD image from EFI PXE?, Locane
- [PATCH V3 0/2] CPER ARM error information parsing,
Tyler Baicar
- [PATCH 4.14 038/164] efi: Move some sysfs files to be read-only by root, Greg Kroah-Hartman
- [PATCH 4.14 039/164] efi/esrt: Use memunmap() instead of kfree() to free the remapping, Greg Kroah-Hartman
- [PATCH 4.9 017/148] efi/esrt: Use memunmap() instead of kfree() to free the remapping, Greg Kroah-Hartman
- [PATCH 4.9 016/148] efi: Move some sysfs files to be read-only by root, Greg Kroah-Hartman
- [PATCH v5 1/2] arm64: Define cputype macros for Falkor CPU,
Shanker Donthineni
- [PATCH 41/45] arch/x86: remove duplicate includes,
Pravin Shedge
- [RESEND PATCH v4 1/2] arm64: Define cputype macros for Falkor CPU,
Shanker Donthineni
- [PATCH] efi: make EFI a menuconfig to ease disabling it all,
Vincent Legoll
- [PATCH resend] fix boot hang with earlyprintk=efi,keep, Dave Young
- [PATCH V2 0/2] CPER ARM error information parsing,
Tyler Baicar
- [GIT PULL 0/3] EFI fixes for v4.15,
Ard Biesheuvel
- [PATCH] efi: move some sysfs files to be read-only by root,
Greg Kroah-Hartman
- [RFC v3 PATCH 0/2] Introduce Security Version to EFI Stub,
Gary Lin
- [PATCH] efi: add comment to avoid future expanding of sysfs systab,
Dave Young
- [PATCH 4.4 03/27] x86/mm/pat: Ensure cpa->pfn only contains page frame numbers, Greg Kroah-Hartman
- [PATCH 4.4 05/27] x86/efi: Build our own page table structures,
Greg Kroah-Hartman
- [PATCH 4.4 04/27] x86/efi: Hoist page table switching code into efi_call_virt(), Greg Kroah-Hartman
- [PATCH] fix system_state checking in early_ioremap,
Dave Young
- [PATCH v5 19/27] x86: assembly, make some functions local, Jiri Slaby
- [PATCH v5 26/27] x86_32: assembly, change all ENTRY+ENDPROC to SYM_FUNC_*, Jiri Slaby
- [PATCH v5 23/27] x86_64: assembly, change all ENTRY+ENDPROC to SYM_FUNC_*, Jiri Slaby
- [PATCH] x86: move parse_early_param to earlier code for add_efi_memmap,
Dave Young
- Re: [GIT PULL] hash addresses printed with %p,
Linus Torvalds
- [PATCH 0/4] Using the hash in MOKx to blacklist kernel module,
Lee, Chun-Yi
- [PATCH] efi: Use PTR_ERR_OR_ZERO(),
Vasyl Gomonovych
- [PATCH v4 0/2] Implement a software workaround for Falkor erratum 1041,
Shanker Donthineni
- [PATCH v3 0/2] Implement a software workaround for Falkor erratum 1041,
Shanker Donthineni
- [PATCH v2 0/2] Implement a software workaround for Falkor erratum 1041,
Shanker Donthineni
- arm64 crashkernel fails to boot on acpi-only machines due to ACPI regions being no longer mapped as NOMAP,
Bhupesh Sharma
- [PATCH 00/30] security, efi: Add kernel lockdown,
David Howells
- [PATCH 02/30] Add a SysRq option to lift kernel lockdown, David Howells
- [PATCH 04/30] Enforce module signatures if the kernel is locked down, David Howells
- [PATCH 09/30] hibernate: Disable when the kernel is locked down, David Howells
- [PATCH 30/30] efi: Lock down the kernel if booted in secure boot mode, David Howells
- [PATCH 29/30] efi: Add an EFI_SECURE_BOOT flag to indicate secure boot mode, David Howells
- [PATCH 28/30] bpf: Restrict kernel image access functions when the kernel is locked down, David Howells
- [PATCH 27/30] Lock down kprobes, David Howells
- [PATCH 26/30] Lock down ftrace, David Howells
- [PATCH 25/30] Lock down /proc/kcore, David Howells
- [PATCH 23/30] x86/mmiotrace: Lock down the testmmiotrace module, David Howells
- [PATCH 24/30] debugfs: Disallow use of debugfs files when the kernel is locked down, David Howells
- [PATCH 22/30] Lock down module params that specify hardware parameters (eg. ioport), David Howells
- [PATCH 20/30] Prohibit PCMCIA CIS storage when the kernel is locked down, David Howells
- [PATCH 21/30] Lock down TIOCSSERIAL, David Howells
- [PATCH 18/30] acpi: Disable APEI error injection if the kernel is locked down, David Howells
- [PATCH 19/30] scsi: Lock down the eata driver, David Howells
- [PATCH 17/30] acpi: Disable ACPI table override if the kernel is locked down, David Howells
- [PATCH 16/30] acpi: Ignore acpi_rsdp kernel param when the kernel has been locked down, David Howells
- [PATCH 14/30] asus-wmi: Restrict debugfs interface when the kernel is locked down, David Howells
- [PATCH 15/30] ACPI: Limit access to custom_method when the kernel is locked down, David Howells
- [PATCH 12/30] x86: Lock down IO port access when the kernel is locked down, David Howells
- [PATCH 13/30] x86/msr: Restrict MSR access when the kernel is locked down, David Howells
- [PATCH 08/30] kexec_file: Restrict at runtime if the kernel is locked down, David Howells
- [PATCH 10/30] uswsusp: Disable when the kernel is locked down, David Howells
- [PATCH 11/30] PCI: Lock down BAR access when the kernel is locked down, David Howells
- [PATCH 07/30] Copy secure_boot flag in boot params across kexec reboot, David Howells
- [PATCH 03/30] ima: require secure_boot rules in lockdown mode, David Howells
- [PATCH 05/30] Restrict /dev/{mem, kmem, port} when the kernel is locked down, David Howells
- [PATCH 06/30] kexec: Disable at runtime if the kernel is locked down, David Howells
- [PATCH 01/30] Add the ability to lock down access to the running kernel image, David Howells
- Re: [PATCH 04/30] Enforce module signatures if the kernel is locked down, David Howells
- Re: [PATCH 08/30] kexec_file: Restrict at runtime if the kernel is locked down, David Howells
- Re: [PATCH 08/30] kexec_file: Restrict at runtime if the kernel is locked down, David Howells
- Re: [PATCH 00/30] security, efi: Add kernel lockdown, Andrew Morton
- [PATCH 0/3] Implement a software workaround for Falkor erratum 1041,
Shanker Donthineni
- efi/esrt: use memunmap rather kfree to free the remapping,
Pan Bian
- [PATCH] efi: setting secure boot flag in EFI stub when the sentinel is tainted., Lee, Chun-Yi
- [GIT PULL] Kernel lockdown for secure boot,
David Howells
- Re: [GIT PULL] Kernel lockdown for secure boot, Mimi Zohar
- Re: [GIT PULL] Kernel lockdown for secure boot, James Morris
- <Possible follow-ups>
- [GIT PULL] Kernel lockdown for secure boot, David Howells
- Re: [GIT PULL] Kernel lockdown for secure boot, James Morris
- Message not available
- Message not available
- Re: [GIT PULL] Kernel lockdown for secure boot, Andy Lutomirski
- Re: [GIT PULL] Kernel lockdown for secure boot, Alexei Starovoitov
- Re: [GIT PULL] Kernel lockdown for secure boot, Matthew Garrett
- Re: [GIT PULL] Kernel lockdown for secure boot, Andy Lutomirski
- Re: [GIT PULL] Kernel lockdown for secure boot, David Howells
- Re: [GIT PULL] Kernel lockdown for secure boot, Andy Lutomirski
- Re: [GIT PULL] Kernel lockdown for secure boot, David Howells
- Re: [GIT PULL] Kernel lockdown for secure boot, Andy Lutomirski
- Re: [GIT PULL] Kernel lockdown for secure boot, David Howells
- Re: [GIT PULL] Kernel lockdown for secure boot, Andy Lutomirski
- Re: [GIT PULL] Kernel lockdown for secure boot, Linus Torvalds
- Re: [GIT PULL] Kernel lockdown for secure boot, Matthew Garrett
- Re: [GIT PULL] Kernel lockdown for secure boot, Andy Lutomirski
- Re: [GIT PULL] Kernel lockdown for secure boot, Linus Torvalds
- Re: [GIT PULL] Kernel lockdown for secure boot, Linus Torvalds
- Re: [GIT PULL] Kernel lockdown for secure boot, Matthew Garrett
- Re: [GIT PULL] Kernel lockdown for secure boot, Linus Torvalds
- Re: [GIT PULL] Kernel lockdown for secure boot, Linus Torvalds
- Re: [GIT PULL] Kernel lockdown for secure boot, Matthew Garrett
- Re: [GIT PULL] Kernel lockdown for secure boot, Linus Torvalds
- Re: [GIT PULL] Kernel lockdown for secure boot, Matthew Garrett
- Re: [GIT PULL] Kernel lockdown for secure boot, Linus Torvalds
- Re: [GIT PULL] Kernel lockdown for secure boot, Matthew Garrett
- Re: [GIT PULL] Kernel lockdown for secure boot, Linus Torvalds
- Re: [GIT PULL] Kernel lockdown for secure boot, Matthew Garrett
- Re: [GIT PULL] Kernel lockdown for secure boot, Andy Lutomirski
- Re: [GIT PULL] Kernel lockdown for secure boot, Linus Torvalds
- Re: [GIT PULL] Kernel lockdown for secure boot, Linus Torvalds
- Re: [GIT PULL] Kernel lockdown for secure boot, Matthew Garrett
- Re: [GIT PULL] Kernel lockdown for secure boot, Linus Torvalds
- Re: [GIT PULL] Kernel lockdown for secure boot, Matthew Garrett
- Re: [GIT PULL] Kernel lockdown for secure boot, Linus Torvalds
- Re: [GIT PULL] Kernel lockdown for secure boot, Matthew Garrett
- Re: [GIT PULL] Kernel lockdown for secure boot, Theodore Y. Ts'o
- Re: [GIT PULL] Kernel lockdown for secure boot, Greg Kroah-Hartman
- Re: [GIT PULL] Kernel lockdown for secure boot, Theodore Y. Ts'o
- Re: [GIT PULL] Kernel lockdown for secure boot, Greg Kroah-Hartman
- Re: [GIT PULL] Kernel lockdown for secure boot, Mike Galbraith
- Re: [GIT PULL] Kernel lockdown for secure boot, Matthew Garrett
- Re: [GIT PULL] Kernel lockdown for secure boot, Pavel Machek
- Re: [GIT PULL] Kernel lockdown for secure boot, David Howells
- Re: [GIT PULL] Kernel lockdown for secure boot, Theodore Y. Ts'o
- Re: [GIT PULL] Kernel lockdown for secure boot, Matthew Garrett
- Re: [GIT PULL] Kernel lockdown for secure boot, Andy Lutomirski
- Re: [GIT PULL] Kernel lockdown for secure boot, Matthew Garrett
- Re: [GIT PULL] Kernel lockdown for secure boot, Justin Forbes
- Re: [GIT PULL] Kernel lockdown for secure boot, Peter Dolding
- Re: [GIT PULL] Kernel lockdown for secure boot, Matthew Garrett
- Re: [GIT PULL] Kernel lockdown for secure boot, David Howells
- Re: [GIT PULL] Kernel lockdown for secure boot, Linus Torvalds
- Re: [GIT PULL] Kernel lockdown for secure boot, Matthew Garrett
- Re: [GIT PULL] Kernel lockdown for secure boot, Peter Dolding
- Re: [GIT PULL] Kernel lockdown for secure boot, Matthew Garrett
- Re: [GIT PULL] Kernel lockdown for secure boot, Peter Dolding
- Re: [GIT PULL] Kernel lockdown for secure boot, Justin Forbes
- Message not available
- Re: [GIT PULL] Kernel lockdown for secure boot, Linus Torvalds
- Re: [GIT PULL] Kernel lockdown for secure boot, Jann Horn
- Re: [GIT PULL] Kernel lockdown for secure boot, David Howells
- Re: [GIT PULL] Kernel lockdown for secure boot, David Howells
- Re: [GIT PULL] Kernel lockdown for secure boot, David Howells
- Re: [GIT PULL] Kernel lockdown for secure boot, Linus Torvalds
- Re: [GIT PULL] Kernel lockdown for secure boot, David Howells
Re: [GIT PULL] Kernel lockdown for secure boot, Alexei Starovoitov
[GIT PULL 0/2] EFI updates for v4.15,
Ard Biesheuvel
[GIT PULL 0/2] EFI fixes for v4.14,
Ard Biesheuvel
[PATCH] efi/libstub: arm: don't randomize runtime regions when CONFIG_HIBERNATION=y, Ard Biesheuvel
[PATCH] efi/libstub: arm: omit sorting of the UEFI memory map,
Ard Biesheuvel
[Part1 PATCH v7 07/17] x86/efi: Access EFI data as encrypted when SEV is active, Brijesh Singh
[PATCH 00/27] security, efi: Add kernel lockdown,
David Howells
- [PATCH 14/27] ACPI: Limit access to custom_method when the kernel is locked down, David Howells
- [PATCH 27/27] efi: Lock down the kernel if booted in secure boot mode, David Howells
- [PATCH 26/27] efi: Add an EFI_SECURE_BOOT flag to indicate secure boot mode, David Howells
- [PATCH 25/27] Lock down /proc/kcore, David Howells
- [PATCH 24/27] debugfs: Disallow use of debugfs files when the kernel is locked down, David Howells
- [PATCH 23/27] x86/mmiotrace: Lock down the testmmiotrace module, David Howells
- [PATCH 22/27] Lock down module params that specify hardware parameters (eg. ioport), David Howells
- [PATCH 20/27] Prohibit PCMCIA CIS storage when the kernel is locked down, David Howells
- [PATCH 21/27] Lock down TIOCSSERIAL, David Howells
- [PATCH 19/27] scsi: Lock down the eata driver, David Howells
- [PATCH 17/27] acpi: Disable APEI error injection if the kernel is locked down, David Howells
- [PATCH 18/27] bpf: Restrict kernel image access functions when the kernel is locked down, David Howells
- [PATCH 16/27] acpi: Disable ACPI table override if the kernel is locked down, David Howells
- [PATCH 15/27] acpi: Ignore acpi_rsdp kernel param when the kernel has been locked down, David Howells
- [PATCH 13/27] asus-wmi: Restrict debugfs interface when the kernel is locked down, David Howells
- [PATCH 12/27] x86/msr: Restrict MSR access when the kernel is locked down, David Howells
- [PATCH 11/27] x86: Lock down IO port access when the kernel is locked down, David Howells
- [PATCH 08/27] hibernate: Disable when the kernel is locked down, David Howells
- [PATCH 09/27] uswsusp: Disable when the kernel is locked down, David Howells
- [PATCH 10/27] PCI: Lock down BAR access when the kernel is locked down, David Howells
- [PATCH 06/27] Copy secure_boot flag in boot params across kexec reboot, David Howells
- [PATCH 07/27] kexec_file: Disable at runtime if securelevel has been set, David Howells
- [PATCH 01/27] Add the ability to lock down access to the running kernel image, David Howells
- [PATCH 03/27] Enforce module signatures if the kernel is locked down, David Howells
- [PATCH 02/27] Add a SysRq option to lift kernel lockdown, David Howells
- [PATCH 04/27] Restrict /dev/mem and /dev/kmem when the kernel is locked down, David Howells
- [PATCH 05/27] kexec: Disable at runtime if the kernel is locked down, David Howells
- Re: [PATCH 00/27] security, efi: Add kernel lockdown, David Howells
- Re: [PATCH 04/27] Restrict /dev/mem and /dev/kmem when the kernel is locked down, David Howells
- Re: [PATCH 00/27] security, efi: Add kernel lockdown, Mimi Zohar
- Firmware signing -- Re: [PATCH 00/27] security, efi: Add kernel lockdown, David Howells
[PATCH] efi: parse ARM error information value,
Tyler Baicar
[Part1 PATCH v6 07/17] x86/efi: Access EFI data as encrypted when SEV is active, Brijesh Singh
Draft manpage explaining kernel lockdown,
David Howells
[PATCH v4 19/27] x86: assembly, make some functions local,
Jiri Slaby
[PATCH v4 26/27] x86_32: assembly, change all ENTRY+ENDPROC to SYM_FUNC_*, Jiri Slaby
[Index of Archives]
[Linux Kernel Development]
[Security]
[Linux ARM Kernel]
[Tools]
[Linux MIPS]
[Linux S390]
[Bugtraq]
[Share Photos]>
[Fedora ARM]