Patchwork Linux EFI Devel

login
register
mail settings

Incoming patches

« Previous 1 2 3 Next »
Filters: Submitter = David Howells remove filter    |    State = Action Required remove filter    |    Archived = No remove filter
Patch A/R/T Date Submitter Delegate State
[RFC,29/68] vfs: Convert efivarfs to use the new mount API - - - 2019-03-27 David Howells New
[26/38] vfs: Convert efivarfs to fs_context - - - 2019-03-14 David Howells New
[08/30] kexec_file: Restrict at runtime if the kernel is locked down - 1 - 2018-02-22 David Howells New
[08/30] kexec_file: Restrict at runtime if the kernel is locked down - 1 - 2018-02-22 David Howells New
[04/30] Enforce module signatures if the kernel is locked down - 1 - 2018-02-22 David Howells New
[30/30] efi: Lock down the kernel if booted in secure boot mode 1 - - 2017-11-09 David Howells New
[29/30] efi: Add an EFI_SECURE_BOOT flag to indicate secure boot mode - 1 - 2017-11-09 David Howells New
[28/30] bpf: Restrict kernel image access functions when the kernel is locked down - - - 2017-11-09 David Howells New
[27/30] Lock down kprobes - - - 2017-11-09 David Howells New
[26/30] Lock down ftrace - - - 2017-11-09 David Howells New
[25/30] Lock down /proc/kcore - 1 - 2017-11-09 David Howells New
[24/30] debugfs: Disallow use of debugfs files when the kernel is locked down - - - 2017-11-09 David Howells New
[23/30] x86/mmiotrace: Lock down the testmmiotrace module - - - 2017-11-09 David Howells New
[22/30] Lock down module params that specify hardware parameters (eg. ioport) - - - 2017-11-09 David Howells New
[21/30] Lock down TIOCSSERIAL - - - 2017-11-09 David Howells New
[20/30] Prohibit PCMCIA CIS storage when the kernel is locked down - - - 2017-11-09 David Howells New
[19/30] scsi: Lock down the eata driver - - - 2017-11-09 David Howells New
[18/30] acpi: Disable APEI error injection if the kernel is locked down - 1 - 2017-11-09 David Howells New
[17/30] acpi: Disable ACPI table override if the kernel is locked down - 1 - 2017-11-09 David Howells New
[16/30] acpi: Ignore acpi_rsdp kernel param when the kernel has been locked down - 1 - 2017-11-09 David Howells New
[15/30] ACPI: Limit access to custom_method when the kernel is locked down - 1 - 2017-11-09 David Howells New
[14/30] asus-wmi: Restrict debugfs interface when the kernel is locked down - 1 - 2017-11-09 David Howells New
[13/30] x86/msr: Restrict MSR access when the kernel is locked down 1 2 - 2017-11-09 David Howells New
[12/30] x86: Lock down IO port access when the kernel is locked down - 2 - 2017-11-09 David Howells New
[11/30] PCI: Lock down BAR access when the kernel is locked down 1 1 - 2017-11-09 David Howells New
[10/30] uswsusp: Disable when the kernel is locked down - 2 - 2017-11-09 David Howells New
[09/30] hibernate: Disable when the kernel is locked down - 1 - 2017-11-09 David Howells New
[08/30] kexec_file: Restrict at runtime if the kernel is locked down - 1 - 2017-11-09 David Howells New
[07/30] Copy secure_boot flag in boot params across kexec reboot - 1 - 2017-11-09 David Howells New
[06/30] kexec: Disable at runtime if the kernel is locked down 1 2 - 2017-11-09 David Howells New
[05/30] Restrict /dev/{mem, kmem, port} when the kernel is locked down - 1 - 2017-11-09 David Howells New
[04/30] Enforce module signatures if the kernel is locked down - 2 - 2017-11-09 David Howells New
[03/30] ima: require secure_boot rules in lockdown mode - - - 2017-11-09 David Howells New
[02/30] Add a SysRq option to lift kernel lockdown - - - 2017-11-09 David Howells New
[01/30] Add the ability to lock down access to the running kernel image 1 - - 2017-11-09 David Howells New
[07/27] kexec_file: Disable at runtime if securelevel has been set - - - 2017-11-02 David Howells New
[03/27] Enforce module signatures if the kernel is locked down - - - 2017-11-02 David Howells New
[GIT,PULL] Kernel lockdown for secure boot - - - 2017-10-26 David Howells New
[12/27] x86/msr: Restrict MSR access when the kernel is locked down - - - 2017-10-23 David Howells New
[04/27] Restrict /dev/mem and /dev/kmem when the kernel is locked down - - - 2017-10-23 David Howells New
[27/27] efi: Lock down the kernel if booted in secure boot mode 1 - - 2017-10-19 David Howells New
[26/27] efi: Add an EFI_SECURE_BOOT flag to indicate secure boot mode - 1 - 2017-10-19 David Howells New
[25/27] Lock down /proc/kcore - 1 - 2017-10-19 David Howells New
[24/27] debugfs: Disallow use of debugfs files when the kernel is locked down - - - 2017-10-19 David Howells New
[23/27] x86/mmiotrace: Lock down the testmmiotrace module - - - 2017-10-19 David Howells New
[22/27] Lock down module params that specify hardware parameters (eg. ioport) - - - 2017-10-19 David Howells New
[21/27] Lock down TIOCSSERIAL - - - 2017-10-19 David Howells New
[20/27] Prohibit PCMCIA CIS storage when the kernel is locked down - - - 2017-10-19 David Howells New
[19/27] scsi: Lock down the eata driver - - - 2017-10-19 David Howells New
[18/27] bpf: Restrict kernel image access functions when the kernel is locked down - - - 2017-10-19 David Howells New
[17/27] acpi: Disable APEI error injection if the kernel is locked down - 1 - 2017-10-19 David Howells New
[16/27] acpi: Disable ACPI table override if the kernel is locked down - 1 - 2017-10-19 David Howells New
[15/27] acpi: Ignore acpi_rsdp kernel param when the kernel has been locked down - 1 - 2017-10-19 David Howells New
[14/27] ACPI: Limit access to custom_method when the kernel is locked down - 1 - 2017-10-19 David Howells New
[13/27] asus-wmi: Restrict debugfs interface when the kernel is locked down - 1 - 2017-10-19 David Howells New
[12/27] x86/msr: Restrict MSR access when the kernel is locked down 1 2 - 2017-10-19 David Howells New
[11/27] x86: Lock down IO port access when the kernel is locked down - 2 - 2017-10-19 David Howells New
[10/27] PCI: Lock down BAR access when the kernel is locked down 1 1 - 2017-10-19 David Howells New
[09/27] uswsusp: Disable when the kernel is locked down - 2 - 2017-10-19 David Howells New
[08/27] hibernate: Disable when the kernel is locked down - 1 - 2017-10-19 David Howells New
[07/27] kexec_file: Disable at runtime if securelevel has been set - 1 - 2017-10-19 David Howells New
[06/27] Copy secure_boot flag in boot params across kexec reboot - 1 - 2017-10-19 David Howells New
[05/27] kexec: Disable at runtime if the kernel is locked down 1 2 - 2017-10-19 David Howells New
[04/27] Restrict /dev/mem and /dev/kmem when the kernel is locked down - 2 - 2017-10-19 David Howells New
[03/27] Enforce module signatures if the kernel is locked down - 2 - 2017-10-19 David Howells New
[02/27] Add a SysRq option to lift kernel lockdown - - - 2017-10-19 David Howells New
[01/27] Add the ability to lock down access to the running kernel image 1 - - 2017-10-19 David Howells New
Problem with new X.509 is_hash_blacklisted() interface 1 - - 2017-06-20 David Howells New
[5/5] Add a sysrq option to exit secure boot mode - 1 - 2017-05-24 David Howells New
[4/5] efi: Lock down the kernel if booted in secure boot mode - 1 - 2017-05-24 David Howells New
[3/5] Add the ability to lock down access to the running kernel image 1 1 - 2017-05-24 David Howells New
[2/5] efi: Add EFI_SECURE_BOOT bit - 1 - 2017-05-24 David Howells New
[1/5] efi: Move the x86 secure boot switch to generic code - 1 - 2017-05-24 David Howells New
[GIT,PULL] Hardware module parameter annotation for secure boot - - - 2017-05-02 David Howells New
[5/5] Add a sysrq option to exit secure boot mode - - - 2017-04-06 David Howells New
[4/5] efi: Lock down the kernel if booted in secure boot mode - - - 2017-04-06 David Howells New
[3/5] Add the ability to lock down access to the running kernel image 1 - - 2017-04-06 David Howells New
[2/5] efi: Add EFI_SECURE_BOOT bit - - - 2017-04-06 David Howells New
[1/5] efi: Move the x86 secure boot switch to generic code - - - 2017-04-06 David Howells New
[24/24] Lock down module params that specify hardware parameters (eg. ioport) - - - 2017-04-05 David Howells New
[23/24] Lock down TIOCSSERIAL - - - 2017-04-05 David Howells New
[22/24] Prohibit PCMCIA CIS storage when the kernel is locked down - - - 2017-04-05 David Howells New
[21/24] scsi: Lock down the eata driver - - - 2017-04-05 David Howells New
[20/24] bpf: Restrict kernel image access functions when the kernel is locked down - - - 2017-04-05 David Howells New
[19/24] acpi: Disable APEI error injection if the kernel is locked down - - - 2017-04-05 David Howells New
[18/24] acpi: Disable ACPI table override if the kernel is locked down - - - 2017-04-05 David Howells New
[17/24] acpi: Ignore acpi_rsdp kernel param when the kernel has been locked down - - - 2017-04-05 David Howells New
[16/24] ACPI: Limit access to custom_method when the kernel is locked down - - - 2017-04-05 David Howells New
[15/24] asus-wmi: Restrict debugfs interface when the kernel is locked down - - - 2017-04-05 David Howells New
[14/24] x86: Restrict MSR access when the kernel is locked down 1 1 - 2017-04-05 David Howells New
[13/24] x86: Lock down IO port access when the kernel is locked down - 1 - 2017-04-05 David Howells New
[12/24] PCI: Lock down BAR access when the kernel is locked down 1 - - 2017-04-05 David Howells New
[11/24] uswsusp: Disable when the kernel is locked down - - - 2017-04-05 David Howells New
[10/24] hibernate: Disable when the kernel is locked down - - - 2017-04-05 David Howells New
[09/24] kexec_file: Disable at runtime if securelevel has been set 1 - - 2017-04-05 David Howells New
[08/24] Copy secure_boot flag in boot params across kexec reboot - - - 2017-04-05 David Howells New
[07/24] kexec: Disable at runtime if the kernel is locked down 1 - - 2017-04-05 David Howells New
[06/24] Add a sysrq option to exit secure boot mode - - - 2017-04-05 David Howells New
[05/24] Restrict /dev/mem and /dev/kmem when the kernel is locked down - - - 2017-04-05 David Howells New
[04/24] Enforce module signatures if the kernel is locked down - - - 2017-04-05 David Howells New
« Previous 1 2 3 Next »