Linux EFI Development - Date Index
[Prev Page][Next Page]
- Re: [GIT PULL] Kernel lockdown for secure boot, (continued)
- Re: [GIT PULL] Kernel lockdown for secure boot, David Howells
- Re: [GIT PULL] Kernel lockdown for secure boot, Andy Lutomirski
- Re: [GIT PULL] Kernel lockdown for secure boot, David Howells
- Re: [GIT PULL] Kernel lockdown for secure boot, Andy Lutomirski
- Re: [GIT PULL] Kernel lockdown for secure boot, David Howells
- Re: [GIT PULL] Kernel lockdown for secure boot, Andy Lutomirski
- Re: [GIT PULL] Kernel lockdown for secure boot, Linus Torvalds
- Re: [GIT PULL] Kernel lockdown for secure boot, Matthew Garrett
- Re: [GIT PULL] Kernel lockdown for secure boot, Andy Lutomirski
- Re: [GIT PULL] Kernel lockdown for secure boot, Linus Torvalds
- Re: [GIT PULL] Kernel lockdown for secure boot, Linus Torvalds
- Re: [GIT PULL] Kernel lockdown for secure boot, Matthew Garrett
- Re: [GIT PULL] Kernel lockdown for secure boot, Linus Torvalds
- Re: [GIT PULL] Kernel lockdown for secure boot, Linus Torvalds
- Re: [GIT PULL] Kernel lockdown for secure boot, Matthew Garrett
- Re: [GIT PULL] Kernel lockdown for secure boot, Linus Torvalds
- Re: [GIT PULL] Kernel lockdown for secure boot, Matthew Garrett
- Re: [GIT PULL] Kernel lockdown for secure boot, Linus Torvalds
- Re: [GIT PULL] Kernel lockdown for secure boot, Matthew Garrett
- Re: [GIT PULL] Kernel lockdown for secure boot, Linus Torvalds
- Re: [GIT PULL] Kernel lockdown for secure boot, Matthew Garrett
- Re: [GIT PULL] Kernel lockdown for secure boot, Andy Lutomirski
- Re: [GIT PULL] Kernel lockdown for secure boot, Linus Torvalds
- Re: [GIT PULL] Kernel lockdown for secure boot, Linus Torvalds
- Re: [GIT PULL] Kernel lockdown for secure boot, Matthew Garrett
- Re: [GIT PULL] Kernel lockdown for secure boot, Linus Torvalds
- Re: [GIT PULL] Kernel lockdown for secure boot, Matthew Garrett
- Re: [GIT PULL] Kernel lockdown for secure boot, Linus Torvalds
- Re: [GIT PULL] Kernel lockdown for secure boot, Matthew Garrett
- Re: [GIT PULL] Kernel lockdown for secure boot, Theodore Y. Ts'o
- Re: [GIT PULL] Kernel lockdown for secure boot, Greg Kroah-Hartman
- Re: [GIT PULL] Kernel lockdown for secure boot, Theodore Y. Ts'o
- Re: [GIT PULL] Kernel lockdown for secure boot, Greg Kroah-Hartman
- Re: [GIT PULL] Kernel lockdown for secure boot, Mike Galbraith
- Re: [GIT PULL] Kernel lockdown for secure boot, Matthew Garrett
- Re: [GIT PULL] Kernel lockdown for secure boot, Pavel Machek
- Re: [GIT PULL] Kernel lockdown for secure boot, David Howells
- Re: [GIT PULL] Kernel lockdown for secure boot, Theodore Y. Ts'o
- Re: [GIT PULL] Kernel lockdown for secure boot, Matthew Garrett
- Re: [GIT PULL] Kernel lockdown for secure boot, Andy Lutomirski
- Re: [GIT PULL] Kernel lockdown for secure boot, Matthew Garrett
- Re: [GIT PULL] Kernel lockdown for secure boot, Justin Forbes
- Re: [GIT PULL] Kernel lockdown for secure boot, Peter Dolding
- Re: [GIT PULL] Kernel lockdown for secure boot, Matthew Garrett
- Re: [GIT PULL] Kernel lockdown for secure boot, David Howells
- Re: [GIT PULL] Kernel lockdown for secure boot, Linus Torvalds
- Re: [GIT PULL] Kernel lockdown for secure boot, Matthew Garrett
- Re: [GIT PULL] Kernel lockdown for secure boot, Peter Dolding
- Re: [GIT PULL] Kernel lockdown for secure boot, Matthew Garrett
- Re: [GIT PULL] Kernel lockdown for secure boot, Peter Dolding
- Re: [GIT PULL] Kernel lockdown for secure boot, Justin Forbes
- Message not available
- Re: [GIT PULL] Kernel lockdown for secure boot, Linus Torvalds
- Re: [GIT PULL] Kernel lockdown for secure boot, Jann Horn
- Re: [GIT PULL] Kernel lockdown for secure boot, David Howells
- Re: [GIT PULL] Kernel lockdown for secure boot, David Howells
- Re: [GIT PULL] Kernel lockdown for secure boot, David Howells
- Re: [GIT PULL] Kernel lockdown for secure boot, Linus Torvalds
Re: [GIT PULL] Kernel lockdown for secure boot, David Howells
Re: [GIT PULL] Kernel lockdown for secure boot, Alexei Starovoitov
[GIT PULL 0/2] EFI updates for v4.15,
Ard Biesheuvel
[GIT PULL 0/2] EFI fixes for v4.14,
Ard Biesheuvel
[PATCH] efi/libstub: arm: don't randomize runtime regions when CONFIG_HIBERNATION=y, Ard Biesheuvel
[PATCH] efi/libstub: arm: omit sorting of the UEFI memory map,
Ard Biesheuvel
[Part1 PATCH v7 07/17] x86/efi: Access EFI data as encrypted when SEV is active, Brijesh Singh
[PATCH 00/27] security, efi: Add kernel lockdown,
David Howells
- [PATCH 14/27] ACPI: Limit access to custom_method when the kernel is locked down, David Howells
- [PATCH 27/27] efi: Lock down the kernel if booted in secure boot mode, David Howells
- [PATCH 26/27] efi: Add an EFI_SECURE_BOOT flag to indicate secure boot mode, David Howells
- [PATCH 25/27] Lock down /proc/kcore, David Howells
- [PATCH 24/27] debugfs: Disallow use of debugfs files when the kernel is locked down, David Howells
- [PATCH 23/27] x86/mmiotrace: Lock down the testmmiotrace module, David Howells
- [PATCH 22/27] Lock down module params that specify hardware parameters (eg. ioport), David Howells
- [PATCH 20/27] Prohibit PCMCIA CIS storage when the kernel is locked down, David Howells
- [PATCH 21/27] Lock down TIOCSSERIAL, David Howells
- [PATCH 19/27] scsi: Lock down the eata driver, David Howells
- [PATCH 17/27] acpi: Disable APEI error injection if the kernel is locked down, David Howells
- [PATCH 18/27] bpf: Restrict kernel image access functions when the kernel is locked down, David Howells
- [PATCH 16/27] acpi: Disable ACPI table override if the kernel is locked down, David Howells
- [PATCH 15/27] acpi: Ignore acpi_rsdp kernel param when the kernel has been locked down, David Howells
- [PATCH 13/27] asus-wmi: Restrict debugfs interface when the kernel is locked down, David Howells
- [PATCH 12/27] x86/msr: Restrict MSR access when the kernel is locked down, David Howells
- [PATCH 11/27] x86: Lock down IO port access when the kernel is locked down, David Howells
- [PATCH 08/27] hibernate: Disable when the kernel is locked down, David Howells
- [PATCH 09/27] uswsusp: Disable when the kernel is locked down, David Howells
- [PATCH 10/27] PCI: Lock down BAR access when the kernel is locked down, David Howells
- [PATCH 06/27] Copy secure_boot flag in boot params across kexec reboot, David Howells
- [PATCH 07/27] kexec_file: Disable at runtime if securelevel has been set, David Howells
- [PATCH 01/27] Add the ability to lock down access to the running kernel image, David Howells
- [PATCH 03/27] Enforce module signatures if the kernel is locked down, David Howells
- [PATCH 02/27] Add a SysRq option to lift kernel lockdown, David Howells
- [PATCH 04/27] Restrict /dev/mem and /dev/kmem when the kernel is locked down, David Howells
- [PATCH 05/27] kexec: Disable at runtime if the kernel is locked down, David Howells
- Re: [PATCH 00/27] security, efi: Add kernel lockdown, David Howells
- Re: [PATCH 04/27] Restrict /dev/mem and /dev/kmem when the kernel is locked down, David Howells
- Re: [PATCH 00/27] security, efi: Add kernel lockdown, Mimi Zohar
- Firmware signing -- Re: [PATCH 00/27] security, efi: Add kernel lockdown, David Howells
[PATCH] efi: parse ARM error information value,
Tyler Baicar
[Part1 PATCH v6 07/17] x86/efi: Access EFI data as encrypted when SEV is active, Brijesh Singh
Draft manpage explaining kernel lockdown,
David Howells
[PATCH v4 19/27] x86: assembly, make some functions local,
Jiri Slaby
[PATCH v4 26/27] x86_32: assembly, change all ENTRY+ENDPROC to SYM_FUNC_*, Jiri Slaby
[PATCH v4 23/27] x86_64: assembly, change all ENTRY+ENDPROC to SYM_FUNC_*,
Jiri Slaby
[PATCH] efi/efi_test: Prevent an Oops in efi_runtime_query_capsulecaps(),
Dan Carpenter
[0-Day CI notification] 0-Day kernel test service will be shut down from Sep 30 3PM to Oct 5, Philip Li
[Part1 PATCH v5 07/17] x86/efi: Access EFI data as encrypted when SEV is active, Brijesh Singh
[PATCH] efi/capsule-loader: pr_err() strings should end with newlines,
Arvind Yadav
[PATCH v3 0/5] Call GetEventLog before ExitBootServices,
Thiebaud Weksteen
[Part1 PATCH v4 07/17] x86/efi: Access EFI data as encrypted when SEV is active,
Brijesh Singh
Re: [PATCH v2 RESEND 1/2] x86/UV: Introduce a helper function to check UV system at earlier stage, Dave Young
[PATCH] arm64: efi: ignore EFI_MEMORY_XP attribute if RP and/or WP are set,
Ard Biesheuvel
[PATCH v2 0/3] Call GetEventLog before ExitBootServices,
Thiebaud Weksteen
[PATCH 1/2] efi: call get_event_log before ExitBootServices,
Thiebaud Weksteen
[GIT PULL] EFI changes for v4.14, Ingo Molnar
[PATCH 00/14] EFI capsule update support for IOT2000 devices,
Jan Kiszka
- [PATCH 13/14] efi/capsule-loader: Use page addresses rather than struct page pointers, Jan Kiszka
- [PATCH 12/14] efi/capsule-loader: Redirect calls to efi_capsule_setup_info() via weak alias, Jan Kiszka
- [PATCH 14/14] efi/capsule: Add support for Quark security header, Jan Kiszka
- [PATCH 07/14] efi/capsule: Fix return code on failing kmap/vmap, Jan Kiszka
- [PATCH 08/14] efi/capsule: Remove pr_debug() on ENOMEM or EFAULT, Jan Kiszka
- [PATCH 10/14] efi/capsule: Adjust return type of efi_capsule_setup_info(), Jan Kiszka
- [PATCH 11/14] efi/capsule-loader: Use a cached copy of the capsule header, Jan Kiszka
- [PATCH 09/14] efi/capsule: Clean up pr_err/_info() messages, Jan Kiszka
- [PATCH 01/14] efi: Move efi_status_to_err() to drivers/firmware/efi/, Jan Kiszka
- [PATCH 04/14] efi: Add misc char driver interface to update EFI firmware, Jan Kiszka
- [PATCH 05/14] efi/capsule: Move 'capsule' to the stack in efi_capsule_supported(), Jan Kiszka
- [PATCH 06/14] efi/capsule: Allocate whole capsule into virtual memory, Jan Kiszka
- [PATCH 03/14] x86/efi: Force EFI reboot to process pending capsules, Jan Kiszka
- [PATCH 02/14] efi: Add 'capsule' update support, Jan Kiszka
- Re: [PATCH 00/14] EFI capsule update support for IOT2000 devices, Ard Biesheuvel
[PATCH V2 0/3] Use mm_struct and switch_mm() instead of manually,
Sai Praneeth Prakhya
[GIT PULL 0/5] more EFI changes for v4.14,
Ard Biesheuvel
[RFC 00/11] KVM, EFI, arm64: EFI Runtime Services Sandboxing,
Florent Revest
- [RFC 09/11] EFI, arm, arm64: Enable EFI Runtime Services later, Florent Revest
- [RFC 11/11] KVM, arm64: Don't trap internal VMs SMC calls, Florent Revest
- [RFC 10/11] efi, arm64: Sandbox Runtime Services in a VM, Florent Revest
- [RFC 08/11] KVM, arm, arm64: Initialize KVM's core earlier, Florent Revest
- [RFC 05/11] KVM: Expose VM/VCPU creation functions, Florent Revest
- [RFC 07/11] KVM: Allow initialization before the module target, Florent Revest
- [RFC 04/11] KVM, arm, arm64: Offer PAs to IPAs idmapping to internal VMs, Florent Revest
- [RFC 06/11] KVM, arm64: Expose a VCPU initialization function, Florent Revest
- [RFC 03/11] KVM: Allow VM lifecycle management without userspace, Florent Revest
- [RFC 02/11] KVM: arm64: Return an Unknown ID on unhandled HVC, Florent Revest
- [RFC 01/11] arm64: Add an SMCCC function IDs header, Florent Revest
- Re: [RFC 00/11] KVM, EFI, arm64: EFI Runtime Services Sandboxing, Florent Revest
- Re: [RFC 00/11] KVM, EFI, arm64: EFI Runtime Services Sandboxing, Christoffer Dall
- Re: [RFC 00/11] KVM, EFI, arm64: EFI Runtime Services Sandboxing, Ard Biesheuvel
[PATCH 1/2] x86_32: boot, extract efi_pe_entry from startup_32,
Jiri Slaby
[efi:next 2/3] drivers/firmware/efi/libstub/random.c:163:21: error: 'RANDOM_SEED_SIZE' undeclared, kbuild test robot
[PATCH][next] efi/reboot: make function pointer orig_pm_power_off static,
Colin King
Thinkpad e545 woes, Evgeny Laktanov
[PATCH] efi: random: increase size of firmware supplied randomness, Ard Biesheuvel
[RFC PATCH 1/2] efi: import USB I/O related declarations from the UEFI spec,
Ard Biesheuvel
[GIT PULL 00/14] EFI changes for v4.14,
Ard Biesheuvel
- [PATCH 05/14] efi: arm/arm64: Add missing assignment of efi.config_table, Ard Biesheuvel
- [PATCH 09/14] arm: efi: remove pointless dummy .reloc section, Ard Biesheuvel
- [PATCH 14/14] firmware: efi: esrt: constify attribute_group structures., Ard Biesheuvel
- [PATCH 13/14] firmware: efi: constify attribute_group structures., Ard Biesheuvel
- [PATCH 11/14] arm: efi: split zImage code and data into separate PE/COFF sections, Ard Biesheuvel
- [PATCH 12/14] firmware: dcdbas: constify attribute_group structures., Ard Biesheuvel
- [PATCH 10/14] arm: efi: replace open coded constants with symbolic ones, Ard Biesheuvel
- [PATCH 06/14] efi/reboot: Fall back to original power-off method if EFI_RESET_SHUTDOWN returns, Ard Biesheuvel
- [PATCH 08/14] arm: efi: remove forbidden values from the PE/COFF header, Ard Biesheuvel
- [PATCH 07/14] drivers/fbdev: efifb: allow BAR to be moved instead of claiming it, Ard Biesheuvel
- [PATCH 04/14] efi/libstub: arm64: set -fpie when building the EFI stub, Ard Biesheuvel
- [PATCH 02/14] efi/libstub: arm64: use hidden attribute for struct screen_info reference, Ard Biesheuvel
- [PATCH 03/14] efi/libstub: arm64: force 'hidden' visibility for section markers, Ard Biesheuvel
- [PATCH 01/14] efi: arm: Don't mark ACPI reclaim memory as MEMBLOCK_NOMAP, Ard Biesheuvel
- Re: [GIT PULL 00/14] EFI changes for v4.14, Ingo Molnar
[PATCH 0/3] Use mm_struct and switch_mm() instead of manually,
Sai Praneeth Prakhya
[PATCH v9 0/2] x86/boot/KASLR: Restrict kernel to be randomized in mirror regions,
Baoquan He
[PATCH] Enable reset attack mitigation,
Matthew Garrett
Re: [PATCH v6 RESEND] x86/boot/KASLR: Restrict kernel to be randomized in mirror regions,
Matt Fleming
[PATCH v8 0/2] x86/boot/KASLR: Restrict kernel to be randomized in mirror regions,
Baoquan He
[PATCH 0/3] constify firmware attribute_group structures.,
Arvind Yadav
[PATCH] x86/efi: page align EFI ROM image ranges,
Stuart Hayes
[RFC Part1 PATCH v3 00/17] x86: Secure Encrypted Virtualization (AMD),
Brijesh Singh
- [RFC Part1 PATCH v3 01/17] Documentation/x86: Add AMD Secure Encrypted Virtualization (SEV) descrption, Brijesh Singh
- [RFC Part1 PATCH v3 03/17] x86/mm: Secure Encrypted Virtualization (SEV) support, Brijesh Singh
- [RFC Part1 PATCH v3 02/17] x86/CPU/AMD: Add the Secure Encrypted Virtualization CPU feature, Brijesh Singh
- [RFC Part1 PATCH v3 04/17] x86/mm: Don't attempt to encrypt initrd under SEV, Brijesh Singh
- [RFC Part1 PATCH v3 08/17] x86/efi: Access EFI data as encrypted when SEV is active, Brijesh Singh
- [RFC Part1 PATCH v3 07/17] x86/mm: Include SEV for encryption memory attribute changes, Brijesh Singh
- [RFC Part1 PATCH v3 06/17] x86/mm: Use encrypted access of boot related data with SEV, Brijesh Singh
- [RFC Part1 PATCH v3 05/17] x86, realmode: Don't decrypt trampoline area under SEV, Brijesh Singh
- [RFC Part1 PATCH v3 09/17] resource: Consolidate resource walking code, Brijesh Singh
- [RFC Part1 PATCH v3 10/17] resource: Provide resource struct in resource walk callback, Brijesh Singh
- [RFC Part1 PATCH v3 12/17] x86/mm: DMA support for SEV memory encryption, Brijesh Singh
- [RFC Part1 PATCH v3 11/17] x86/mm, resource: Use PAGE_KERNEL protection for ioremap of memory pages, Brijesh Singh
- [RFC Part1 PATCH v3 17/17] X86/KVM: Clear encryption attribute when SEV is active, Brijesh Singh
- [RFC Part1 PATCH v3 16/17] X86/KVM: Provide support to create Guest and HV shared per-CPU variables, Brijesh Singh
- [RFC Part1 PATCH v3 15/17] x86: Add support for changing memory encryption attribute in early boot, Brijesh Singh
- [RFC Part1 PATCH v3 14/17] x86/boot: Add early boot support when running with SEV active, Brijesh Singh
- [RFC Part1 PATCH v3 13/17] x86/io: Unroll string I/O when SEV is active, Brijesh Singh
[PATCH v1 0/6] uuid: Convert rest users to new API,
Andy Shevchenko
[PATCH 4.11 38/88] efi: Process the MEMATTR table only if EFI_MEMMAP is enabled, Greg Kroah-Hartman
[PATCH 4.12 26/84] x86/xen/efi: Initialize only the EFI struct members used by Xen,
Greg Kroah-Hartman
[Index of Archives]
[Linux Kernel Development]
[Security]
[Linux ARM Kernel]
[Tools]
[Linux MIPS]
[Linux S390]
[Bugtraq]
[Share Photos]>
[Fedora ARM]