Patchwork Linux EFI Devel

login
register
mail settings

Incoming patches

« Previous 1 2 ... 5 6 7 8 9 10 11 12 13 ... 23 24 Next »
Filters: State = Action Required remove filter    |    Archived = No remove filter
Patch A/R/T Date Submitter Delegate State
[4.4,03/27] x86/mm/pat: Ensure cpa->pfn only contains page frame numbers 1 1 - 2017-12-04 Greg Kroah-Hartman New
[GIT,PULL] hash addresses printed with %p - - - 2017-12-04 Dave Young New
fix system_state checking in early_ioremap - - - 2017-12-02 Dave Young New
[GIT,PULL] hash addresses printed with %p - - - 2017-11-30 Greg Kroah-Hartman New
[v5,26/27] x86_32: assembly, change all ENTRY+ENDPROC to SYM_FUNC_* - - - 2017-11-30 Jiri Slaby New
[v5,23/27] x86_64: assembly, change all ENTRY+ENDPROC to SYM_FUNC_* - 2 - 2017-11-30 Jiri Slaby New
[v5,19/27] x86: assembly, make some functions local - - - 2017-11-30 Jiri Slaby New
x86: move parse_early_param to earlier code for add_efi_memmap - - - 2017-11-30 Dave Young New
[4/4] MODSIGN: checking the blacklisted hash before loading a kernel module - - - 2017-11-29 Lee, Chun-Yi New
[3/4] MODSIGN: load blacklist from MOKx - - - 2017-11-29 Lee, Chun-Yi New
[2/4] MODSIGN: print appropriate status message when getting UEFI certificates list - - - 2017-11-29 Lee, Chun-Yi New
[1/4] MODSIGN: do not load mok when secure boot disabled - - - 2017-11-29 Lee, Chun-Yi New
efi: Use PTR_ERR_OR_ZERO() - - - 2017-11-28 Vasyl Gomonovych New
[v4,2/2] arm64: Add software workaround for Falkor erratum 1041 - - - 2017-11-27 Shanker Donthineni New
[v4,1/2] arm64: Define cputype macros for Falkor CPU - - - 2017-11-27 Shanker Donthineni New
arm64 crashkernel fails to boot on acpi-only machines due to ACPI regions being no longer mapped as NOMAP - - - 2017-11-14 Ard Biesheuvel New
[v3,2/2] arm64: Add software workaround for Falkor erratum 1041 - - 1 2017-11-13 Shanker Donthineni New
[v3,1/2] arm64: Define cputype macros for Falkor CPU - - - 2017-11-13 Shanker Donthineni New
[v2,2/2] arm64: Add software workaround for Falkor erratum 1041 - - - 2017-11-13 Shanker Donthineni New
[v2,1/2] arm64: Define cputype macros for Falkor CPU - - - 2017-11-13 Shanker Donthineni New
[30/30] efi: Lock down the kernel if booted in secure boot mode 1 - - 2017-11-09 David Howells New
[29/30] efi: Add an EFI_SECURE_BOOT flag to indicate secure boot mode - 1 - 2017-11-09 David Howells New
[28/30] bpf: Restrict kernel image access functions when the kernel is locked down - - - 2017-11-09 David Howells New
[27/30] Lock down kprobes - - - 2017-11-09 David Howells New
[26/30] Lock down ftrace - - - 2017-11-09 David Howells New
[25/30] Lock down /proc/kcore - 1 - 2017-11-09 David Howells New
[24/30] debugfs: Disallow use of debugfs files when the kernel is locked down - - - 2017-11-09 David Howells New
[23/30] x86/mmiotrace: Lock down the testmmiotrace module - - - 2017-11-09 David Howells New
[22/30] Lock down module params that specify hardware parameters (eg. ioport) - - - 2017-11-09 David Howells New
[21/30] Lock down TIOCSSERIAL - - - 2017-11-09 David Howells New
[20/30] Prohibit PCMCIA CIS storage when the kernel is locked down - - - 2017-11-09 David Howells New
[19/30] scsi: Lock down the eata driver - - - 2017-11-09 David Howells New
[18/30] acpi: Disable APEI error injection if the kernel is locked down - 1 - 2017-11-09 David Howells New
[17/30] acpi: Disable ACPI table override if the kernel is locked down - 1 - 2017-11-09 David Howells New
[16/30] acpi: Ignore acpi_rsdp kernel param when the kernel has been locked down - 1 - 2017-11-09 David Howells New
[15/30] ACPI: Limit access to custom_method when the kernel is locked down - 1 - 2017-11-09 David Howells New
[14/30] asus-wmi: Restrict debugfs interface when the kernel is locked down - 1 - 2017-11-09 David Howells New
[13/30] x86/msr: Restrict MSR access when the kernel is locked down 1 2 - 2017-11-09 David Howells New
[12/30] x86: Lock down IO port access when the kernel is locked down - 2 - 2017-11-09 David Howells New
[11/30] PCI: Lock down BAR access when the kernel is locked down 1 1 - 2017-11-09 David Howells New
[10/30] uswsusp: Disable when the kernel is locked down - 2 - 2017-11-09 David Howells New
[09/30] hibernate: Disable when the kernel is locked down - 1 - 2017-11-09 David Howells New
[08/30] kexec_file: Restrict at runtime if the kernel is locked down - 1 - 2017-11-09 David Howells New
[07/30] Copy secure_boot flag in boot params across kexec reboot - 1 - 2017-11-09 David Howells New
[06/30] kexec: Disable at runtime if the kernel is locked down 1 2 - 2017-11-09 David Howells New
[05/30] Restrict /dev/{mem, kmem, port} when the kernel is locked down - 1 - 2017-11-09 David Howells New
[04/30] Enforce module signatures if the kernel is locked down - 2 - 2017-11-09 David Howells New
[03/30] ima: require secure_boot rules in lockdown mode - - - 2017-11-09 David Howells New
[02/30] Add a SysRq option to lift kernel lockdown - - - 2017-11-09 David Howells New
[01/30] Add the ability to lock down access to the running kernel image 1 - - 2017-11-09 David Howells New
[3/3] arm64: Add software workaround for Falkor erratum 1041 - - 2 2017-11-03 Shanker Donthineni New
[2/3] arm64: Prepare SCTLR_ELn accesses to handle Falkor erratum 1041 - - - 2017-11-03 Shanker Donthineni New
[1/3] arm64: Define cputype macros for Falkor CPU - - - 2017-11-03 Shanker Donthineni New
[07/27] kexec_file: Disable at runtime if securelevel has been set - - - 2017-11-02 David Howells New
[03/27] Enforce module signatures if the kernel is locked down - - - 2017-11-02 David Howells New
efi/esrt: use memunmap rather kfree to free the remapping - - - 2017-10-29 Pan Bian New
efi: setting secure boot flag in EFI stub when the sentinel is tainted. - - - 2017-10-28 Lee, Chun-Yi New
[GIT,PULL] EFI fixes - - - 2017-10-27 Ingo Molnar New
[GIT,PULL] Kernel lockdown for secure boot - - - 2017-10-26 David Howells New
[07/27] kexec_file: Disable at runtime if securelevel has been set - - - 2017-10-26 joeyli New
[2/2] arm64: efi: ignore EFI_MEMORY_XP attribute if RP and/or WP are set - - 1 2017-10-25 Ard Biesheuvel New
[1/2] efi/capsule-loader: pr_err() strings should end with newlines - - - 2017-10-25 Ard Biesheuvel New
[GIT,PULL,0/2] EFI updates for v4.15 - - - 2017-10-25 Ard Biesheuvel New
[2/2] efi/libstub: arm: don't randomize runtime regions when CONFIG_HIBERNATION=y - - - 2017-10-25 Ard Biesheuvel New
[1/2] efi/efi_test: Prevent an Oops in efi_runtime_query_capsulecaps() 1 - - 2017-10-25 Ard Biesheuvel New
[GIT,PULL,0/2] EFI fixes for v4.14 - - - 2017-10-25 Ard Biesheuvel New
[12/27] x86/msr: Restrict MSR access when the kernel is locked down - - - 2017-10-23 David Howells New
[04/27] Restrict /dev/mem and /dev/kmem when the kernel is locked down - - - 2017-10-23 David Howells New
efi/libstub: arm: don't randomize runtime regions when CONFIG_HIBERNATION=y - - - 2017-10-23 Ard Biesheuvel New
efi/libstub: arm: omit sorting of the UEFI memory map 1 - 6 2017-10-22 Ard Biesheuvel New
[Part1,v7,07/17] x86/efi: Access EFI data as encrypted when SEV is active - 1 1 2017-10-20 Brijesh Singh New
[27/27] efi: Lock down the kernel if booted in secure boot mode 1 - - 2017-10-19 David Howells New
[26/27] efi: Add an EFI_SECURE_BOOT flag to indicate secure boot mode - 1 - 2017-10-19 David Howells New
[25/27] Lock down /proc/kcore - 1 - 2017-10-19 David Howells New
[24/27] debugfs: Disallow use of debugfs files when the kernel is locked down - - - 2017-10-19 David Howells New
[23/27] x86/mmiotrace: Lock down the testmmiotrace module - - - 2017-10-19 David Howells New
[22/27] Lock down module params that specify hardware parameters (eg. ioport) - - - 2017-10-19 David Howells New
[21/27] Lock down TIOCSSERIAL - - - 2017-10-19 David Howells New
[20/27] Prohibit PCMCIA CIS storage when the kernel is locked down - - - 2017-10-19 David Howells New
[19/27] scsi: Lock down the eata driver - - - 2017-10-19 David Howells New
[18/27] bpf: Restrict kernel image access functions when the kernel is locked down - - - 2017-10-19 David Howells New
[17/27] acpi: Disable APEI error injection if the kernel is locked down - 1 - 2017-10-19 David Howells New
[16/27] acpi: Disable ACPI table override if the kernel is locked down - 1 - 2017-10-19 David Howells New
[15/27] acpi: Ignore acpi_rsdp kernel param when the kernel has been locked down - 1 - 2017-10-19 David Howells New
[14/27] ACPI: Limit access to custom_method when the kernel is locked down - 1 - 2017-10-19 David Howells New
[13/27] asus-wmi: Restrict debugfs interface when the kernel is locked down - 1 - 2017-10-19 David Howells New
[12/27] x86/msr: Restrict MSR access when the kernel is locked down 1 2 - 2017-10-19 David Howells New
[11/27] x86: Lock down IO port access when the kernel is locked down - 2 - 2017-10-19 David Howells New
[10/27] PCI: Lock down BAR access when the kernel is locked down 1 1 - 2017-10-19 David Howells New
[09/27] uswsusp: Disable when the kernel is locked down - 2 - 2017-10-19 David Howells New
[08/27] hibernate: Disable when the kernel is locked down - 1 - 2017-10-19 David Howells New
[07/27] kexec_file: Disable at runtime if securelevel has been set - 1 - 2017-10-19 David Howells New
[06/27] Copy secure_boot flag in boot params across kexec reboot - 1 - 2017-10-19 David Howells New
[05/27] kexec: Disable at runtime if the kernel is locked down 1 2 - 2017-10-19 David Howells New
[04/27] Restrict /dev/mem and /dev/kmem when the kernel is locked down - 2 - 2017-10-19 David Howells New
[03/27] Enforce module signatures if the kernel is locked down - 2 - 2017-10-19 David Howells New
[02/27] Add a SysRq option to lift kernel lockdown - - - 2017-10-19 David Howells New
[01/27] Add the ability to lock down access to the running kernel image 1 - - 2017-10-19 David Howells New
efi: parse ARM error information value - - - 2017-10-17 Tyler Baicar New
[Part1,v6,07/17] x86/efi: Access EFI data as encrypted when SEV is active - 1 - 2017-10-16 Brijesh Singh New
« Previous 1 2 ... 5 6 7 8 9 10 11 12 13 ... 23 24 Next »