Linux-EFI Archive on lore.kernel.org
 help / color / mirror / Atom feed
 messages from 2013-08-22 11:01:42 to 2013-09-04 16:05:53 UTC [more...]

(unknown),
 2013-09-04 16:05 UTC  (25+ messages)
` [PATCH V3 01/11] Add secure_modules() call
` [PATCH V3 02/11] PCI: Lock down BAR access when module security is enabled
` [PATCH V3 03/11] x86: Lock down IO port "
` [PATCH V3 04/11] ACPI: Limit access to custom_method
` [PATCH V3 05/11] asus-wmi: Restrict debugfs interface when module loading is restricted
` [PATCH V3 06/11] Restrict /dev/mem and /dev/kmem "
` [PATCH V3 08/11] kexec: Disable at runtime if the kernel enforces module loading restrictions
` [PATCH V3 09/11] uswsusp: Disable when module loading is restricted
` [PATCH V3 10/11] x86: Restrict MSR access "
  ` [PATCH V3 07/11] acpi: Ignore acpi_rsdp kernel parameter "
  ` [PATCH V3 11/11] Add option to automatically enforce module signatures when in Secure Boot mode
  ` 

[PATCH 0/10] Add additional security checks when module loading is restricted
 2013-09-04 13:13 UTC  (21+ messages)
` [PATCH V2 01/10] Add secure_modules() call
` [PATCH V2 08/10] kexec: Disable at runtime if the kernel enforces module loading restrictions
` [PATCH V2 10/10] Add option to automatically enforce module signatures when in Secure Boot mode

[RFC PATCH 00/18 v3] Signature verification of hibernate snapshot
 2013-09-03 10:49 UTC  (104+ messages)
` [PATCH 02/18] asymmetric keys: implement EMSA_PKCS1-v1_5-ENCODE in rsa
` [PATCH 03/18] asymmetric keys: separate the length checking of octet string from RSA_I2OSP
` [PATCH 05/18] asymmetric keys: implement RSASP1
` [PATCH 06/18] asymmetric keys: support parsing PKCS #8 private key information
` [PATCH 07/18] asymmetric keys: explicitly add the leading zero byte to encoded message
` [PATCH 08/18] Secure boot: Add new capability
` [PATCH 09/18] Secure boot: Add a dummy kernel parameter that will switch on Secure Boot mode
` [PATCH 14/18] Hibernate: applied SNAPSHOT_VERIFICATION config to switch signature check
  ` [PATCH 04/18] asymmetric keys: implement OS2IP in rsa
  ` [PATCH 10/18] efi: Enable secure boot lockdown automatically when enabled in firmware
  ` [PATCH 11/18] Hibernate: introduced RSA key-pair to verify signature of snapshot
  ` [PATCH 12/18] Hibernate: generate and "
  ` [PATCH 13/18] Hibernate: Avoid S4 sign key data included in snapshot image
  ` [PATCH 15/18] Hibernate: adapt to UEFI secure boot with signature check
  ` [PATCH 16/18] Hibernate: show the verification time for monitor performance
` [PATCH 17/18] Hibernate: introduced SNAPSHOT_SIG_HASH config for select hash algorithm
` [PATCH 18/18] Hibernate: notify bootloader regenerate key-pair for snapshot verification

[PATCH] efivars: Mark local function as static
 2013-09-03  6:56 UTC 

[PATCH V3 RFC 00/16] EFI stub for ARM
 2013-09-02 15:49 UTC  (51+ messages)
` [PATCH 01/16] Move common EFI stub code from x86 arch code to common location
` [PATCH 02/16] Add system pointer argument to shared EFI stub related functions so they no longer use global system table pointer as they did when part of eboot.c. This code is now shared, so using a global variable as part of the interface is not that nice. Also, by avoiding any global variables in the ARM EFI stub, this allows the code to be position independent without requiring GOT fixups
` [PATCH 03/16] Rename memory allocation/free functions
` [PATCH 04/16] Add minimum address parameter to efi_low_alloc()
` [PATCH 05/16] rename __get_map() to efi_get_memory_map(), add parameter to optionally return mmap key. The mmap key is required to exit EFI boot services, and allows efi_get_memory_map() to be used for getting final memory map
` [PATCH 06/16] Enforce minimum alignment of 1 page on allocations. The efi_high_alloc() and efi_low_alloc() functions use the EFI_ALLOCATE_ADDRESS option to the EFI function allocate_pages(), which requires a minimum of page alignment, and rejects all other requests
` [PATCH 08/16] Generalize handle_ramdisks() and rename to handle_cmdline_files()
` [PATCH 09/16] Renames in handle_cmdline_files() to complete generalization
` [PATCH 10/16] Move EFI_READ_CHUNK_SIZE define to shared location
` [PATCH 11/16] Add proper definitions for some EFI function pointers
` [PATCH 12/16] Fix types in EFI calls to match EFI function definitions
` [PATCH 13/16] resolve warnings found on ARM compile
` [PATCH 14/16] Add strstr to compressed string.c for ARM
` [PATCH 15/16] Add EFI stub "
` [PATCH 16/16] Add config EFI_STUB for ARM to Kconfig

[PATCH v3 0/5] Make commonly useful UEFI functions common
 2013-09-02  9:29 UTC  (3+ messages)
` [PATCH v3 2/5] efi: provide a generic efi_config_init()

[edk2] Corrupted EFI region
 2013-09-02  8:19 UTC  (11+ messages)

UEFI Plugfest 2013 -- New Orleans
 2013-09-02  7:42 UTC  (14+ messages)

[PATCH 01/10] Add secure_modules() call
 2013-09-01  8:52 UTC  (13+ messages)
` [PATCH 04/10] ACPI: Limit access to custom_method
` [PATCH 05/10] asus-wmi: Restrict debugfs interface when module loading is restricted
` [PATCH 08/10] kexec: Disable at runtime if the kernel enforces module loading restrictions

EFI mode after running kexec
 2013-08-31  4:59 UTC  (10+ messages)

[SPAM] - let's discuss further
 2013-08-25 12:02 UTC 

[PATCH] x86: EFI stub support for large memory maps
 2013-08-23 21:02 UTC 


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).