Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | Switch Secure Boot to lock down in integrity mode (rhbz 1815571) | Jeremy Cline | 2020-03-20 | 1 | -1/+1 |
| | |||||
* | Linux v5.5.5 rebase | Justin M. Forbes | 2020-02-19 | 1 | -15/+18 |
| | |||||
* | Linux v5.4.5 rebase | Justin M. Forbes | 2019-12-19 | 1 | -99/+155 |
| | |||||
* | Linux v5.2-rc3-37-g156c05917e09 | Justin M. Forbes | 2019-06-06 | 1 | -4/+4 |
| | |||||
* | Linux v5.1-1199-g71ae5fc87c34 | Justin M. Forbes | 2019-05-07 | 1 | -3/+3 |
| | |||||
* | Linux v5.1-rc6 | Jeremy Cline | 2019-04-22 | 1 | -1/+2 |
| | |||||
* | Fix up the kexec IMA patch | Jeremy Cline | 2019-04-15 | 1 | -1/+1 |
| | |||||
* | Rebase the kernel lockdown patch set | Jeremy Cline | 2019-04-15 | 1 | -66/+28 |
| | | | | | | | | | | | | | | | | Use the latest version of the kernel lockdown patch set. This includes a few configuration renames: CONFIG_KEXEC_VERIFY_SIG became CONFIG_KEXEC_SIG and CONFIG_KEXEC_SIG_FORCE was added. CONFIG_KEXEC_SIG_FORCE=n because the "kexec_file: Restrict at runtime if the kernel is locked down" patch enforces the signature requirement when the kernel is locked down. CONFIG_LOCK_DOWN_MANDATORY got renamed to CONFIG_LOCK_DOWN_KERNEL_FORCE and remains false as LOCK_DOWN_IN_EFI_SECURE_BOOT covers enabling it for EFI Secure Boot users. Finally, the SysRq patches got dropped for the present. | ||||
* | Linux v5.0-10360-g12ad143e1b80 | Jeremy Cline | 2019-03-11 | 1 | -0/+1 |
| | |||||
* | Linux v5.0-rc7 | Laura Abbott | 2019-02-17 | 1 | -5/+5 |
| | |||||
* | Linux v4.20-9163-g195303136f19 | Laura Abbott | 2018-12-30 | 1 | -2/+2 |
| | |||||
* | Resolve a conflict in the efi secureboot patch set | Jeremy Cline | 2018-11-19 | 1 | -25/+28 |
| | |||||
* | Secure Boot updates | Justin M. Forbes | 2018-06-11 | 1 | -0/+311 |