Linux EFI/UEFI Development
[Prev Page][Next Page]
- [PATCH 07/18] Move relocate_kernel() to shared file.
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 09/18] Move unicode to ASCII conversion to shared function.
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 11/18] Rename __get_map() to efi_get_memory_map()
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 13/18] use efi_get_memory_map() to get final map for x86
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 14/18] Allow efi_free() to be called with size of 0, and do nothing in that case.
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 15/18] Generalize handle_ramdisks() and rename to handle_cmdline_files().
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 12/18] generalize efi_get_memory_map()
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 16/18] Renames in handle_cmdline_files() to complete generalization.
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 17/18] Fix types in EFI calls to match EFI function definitions.
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 18/18] resolve warnings found on ARM compile
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 06/18] Enforce minimum alignment of 1 page on allocations.
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 01/18] EFI stub documentation updates
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH V5 00/18] ARM EFI stub common code
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- Re: [PATCH -v2] EFI: Runtime services virtual mapping
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH -v2] EFI: Runtime services virtual mapping
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH -v2] EFI: Runtime services virtual mapping
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH -v2] EFI: Runtime services virtual mapping
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH -v2] EFI: Runtime services virtual mapping
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH -v2] EFI: Runtime services virtual mapping
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH 09/17] Move unicode to ASCII conversion to shared function.
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- Re: [PATCH 02/11] efi: Remove EFI_PAGE_SHIFT and EFI_PAGE_SIZE
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 02/11] efi: Remove EFI_PAGE_SHIFT and EFI_PAGE_SIZE
- From: Leif Lindholm <leif.lindholm@xxxxxxxxxx>
- Re: [PATCH 02/11] efi: Remove EFI_PAGE_SHIFT and EFI_PAGE_SIZE
- From: Leif Lindholm <leif.lindholm@xxxxxxxxxx>
- Re: [PATCH 02/11] efi: Remove EFI_PAGE_SHIFT and EFI_PAGE_SIZE
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 02/11] efi: Remove EFI_PAGE_SHIFT and EFI_PAGE_SIZE
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] x86 efi: bugfix interrupt disabling sequence
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 02/11] efi: Remove EFI_PAGE_SHIFT and EFI_PAGE_SIZE
- From: Leif Lindholm <leif.lindholm@xxxxxxxxxx>
- [PATCH -v2] EFI: Runtime services virtual mapping
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] x86 efi: bugfix interrupt disabling sequence
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH] x86 efi: bugfix interrupt disabling sequence
- From: Bart Kuivenhoven <bemk@xxxxxxxxxx>
- Re: [PATCH] x86 efi: bugfix interrupt disabling sequence
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 09/17] Move unicode to ASCII conversion to shared function.
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH V4 00/17] ARM EFI stub common code
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH 00/11] EFI runtime services virtual mapping
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH 00/11] EFI runtime services virtual mapping
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/11] EFI runtime services virtual mapping
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH 02/11] efi: Remove EFI_PAGE_SHIFT and EFI_PAGE_SIZE
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/11] EFI runtime services virtual mapping
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH 00/11] EFI runtime services virtual mapping
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 00/11] EFI runtime services virtual mapping
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/11] EFI runtime services virtual mapping
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/11] EFI runtime services virtual mapping
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 09/17] Move unicode to ASCII conversion to shared function.
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 09/17] Move unicode to ASCII conversion to shared function.
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [edk2] Corrupted EFI region
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/11] EFI runtime services virtual mapping
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 00/11] EFI runtime services virtual mapping
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [GIT PULL] EFI urgent fix
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH 00/11] EFI runtime services virtual mapping
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH 09/17] Move unicode to ASCII conversion to shared function.
- From: Adam Borowski <kilobyte@xxxxxxxxxx>
- [PATCH 04/11] x86, pageattr: Add a PGD pagetable populating function
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH 08/11] x86, pageattr: Add a PUD error unwinding path
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH 05/11] x86, pageattr: Add a PUD pagetable populating function
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH 03/11] x86, pageattr: Lookup address in an arbitrary PGD
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH 09/11] x86, pageattr: Add last levels of error path
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH 02/11] efi: Remove EFI_PAGE_SHIFT and EFI_PAGE_SIZE
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH 11/11] EFI: Runtime services virtual mapping
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH 06/11] x86, pageattr: Add a PMD pagetable populating function
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH 07/11] x86, pageattr: Add a PTE pagetable populating function
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH 00/11] EFI runtime services virtual mapping
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH 10/11] x86, cpa: Map in an arbitrary pgd
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH 01/11] efi: Simplify EFI_DEBUG
- From: Borislav Petkov <bp@xxxxxxxxx>
- [GIT PULL] EFI urgent fix
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 09/17] Move unicode to ASCII conversion to shared function.
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- Re: [PATCH 09/17] Move unicode to ASCII conversion to shared function.
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH 09/17] Move unicode to ASCII conversion to shared function.
- From: Adam Borowski <kilobyte@xxxxxxxxxx>
- Re: [edk2] Corrupted EFI region
- From: jerry.hoemann@xxxxxx
- [PATCH] x86 efi: bugfix interrupt disabling sequence
- From: Bart Kuivenhoven <bemk@xxxxxxxxxx>
- Re: [PATCH 08/17] Generalize relocate_kernel() for use by other architectures.
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- Re: [PATCH V4 13/15] Hibernate: introduced SNAPSHOT_SIG_HASH config for select hash algorithm
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH V4 00/17] ARM EFI stub common code
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 08/17] Generalize relocate_kernel() for use by other architectures.
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH V4 02/15] asymmetric keys: implement EMSA_PKCS1-v1_5-ENCODE in rsa
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH] EFI: use nr_tables param directly in efi_config_init
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH V4 02/15] asymmetric keys: implement EMSA_PKCS1-v1_5-ENCODE in rsa
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- Re: [PATCH V4 02/15] asymmetric keys: implement EMSA_PKCS1-v1_5-ENCODE in rsa
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- Re: [PATCHv2] x86: EFI stub support for large memory maps
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] EFI: use nr_tables param directly in efi_config_init
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: access efi variables
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH 03/17] Move common EFI stub code from x86 arch code to common location
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 04/17] Add system table pointer argument to shared functions.
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 02/17] Add proper definitions for some EFI function pointers.
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 05/17] Rename memory allocation/free functions
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 08/17] Generalize relocate_kernel() for use by other architectures.
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 09/17] Move unicode to ASCII conversion to shared function.
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 06/17] Enforce minimum alignment of 1 page on allocations.
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 11/17] generalize efi_get_memory_map()
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 10/17] Rename __get_map() to efi_get_memory_map()
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 12/17] use efi_get_memory_map() to get final map for x86
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 14/17] Generalize handle_ramdisks() and rename to handle_cmdline_files().
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 15/17] Renames in handle_cmdline_files() to complete generalization.
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 16/17] Fix types in EFI calls to match EFI function definitions.
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 17/17] resolve warnings found on ARM compile
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 13/17] Allow efi_free() to be called with size of 0, and do nothing in that case.
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 07/17] Move relocate_kernel() to shared file.
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 01/17] EFI stub documentation updates
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH V4 00/17] ARM EFI stub common code
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- Re: [edk2] Corrupted EFI region
- From: Josh Triplett <josh@xxxxxxxxxxxxxxxx>
- Re: [edk2] Corrupted EFI region
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [edk2] Corrupted EFI region
- From: Laszlo Ersek <lersek@xxxxxxxxxx>
- Re: [edk2] Corrupted EFI region
- From: Josh Triplett <josh@xxxxxxxxxxxxxxxx>
- Re: EFI stub boots only with setup_efi_pc() commented
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [edk2] Corrupted EFI region
- From: Laszlo Ersek <lersek@xxxxxxxxxx>
- Re: [edk2] Corrupted EFI region
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH V4 03/15] asymmetric keys: separate the length checking of octet string from RSA_I2OSP
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH V4 01/15] asymmetric keys: add interface and skeleton for implement signature generation
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH V4 02/15] asymmetric keys: implement EMSA_PKCS1-v1_5-ENCODE in rsa
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH V4 04/15] asymmetric keys: implement OS2IP in rsa
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH V4 05/15] asymmetric keys: implement RSASP1
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH V4 06/15] asymmetric keys: support parsing PKCS #8 private key information
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH V4 07/15] asymmetric keys: explicitly add the leading zero byte to encoded message
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH V4 08/15] Hibernate: introduced RSA key-pair to verify signature of snapshot
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH V4 09/15] Hibernate: generate and verify signature of snapshot
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 10/15] Hibernate: Avoid S4 sign key data included in snapshot image
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH V4 11/15] Hibernate: taint kernel when signature check fail
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH V4 12/15] Hibernate: show the verification time for monitor performance
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH V4 13/15] Hibernate: introduced SNAPSHOT_SIG_HASH config for select hash algorithm
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH V4 14/15] Hibernate: notify bootloader regenerate key-pair for snapshot verification
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH V4 15/15] Hibernate: adapt to UEFI secure boot with signature check
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [RFC V4 PATCH 00/15] Signature verification of hibernate snapshot
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- Re: access efi variables
- From: "Arend van Spriel" <arend@xxxxxxxxxxxx>
- Re: access efi variables
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [edk2] Corrupted EFI region
- From: jerry.hoemann@xxxxxx
- Re: access efi variables
- From: "Arend van Spriel" <arend@xxxxxxxxxxxx>
- access efi variables
- From: "Arend van Spriel" <arend@xxxxxxxxxxxx>
- Re: [PATCH] Remove warning in efi_enter_virtual_mode
- From: Darren Hart <darren.hart@xxxxxxxxx>
- [PATCH] EFI: use nr_tables param directly in efi_config_init
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH] Remove warning in efi_enter_virtual_mode
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/12] One more attempt at useful kernel lockdown
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH 00/12] One more attempt at useful kernel lockdown
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH 00/12] One more attempt at useful kernel lockdown
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/12] One more attempt at useful kernel lockdown
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH 00/12] One more attempt at useful kernel lockdown
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/12] One more attempt at useful kernel lockdown
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH 00/12] One more attempt at useful kernel lockdown
- From: David Lang <david@xxxxxxx>
- Re: [PATCH 00/12] One more attempt at useful kernel lockdown
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 00/12] One more attempt at useful kernel lockdown
- From: "gregkh@xxxxxxxxxxxxxxxxxxx" <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/12] One more attempt at useful kernel lockdown
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 00/12] One more attempt at useful kernel lockdown
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH 00/12] One more attempt at useful kernel lockdown
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH] Remove warning in efi_enter_virtual_mode
- From: Darren Hart <darren.hart@xxxxxxxxx>
- Re: [PATCH 00/12] One more attempt at useful kernel lockdown
- From: Henrique de Moraes Holschuh <hmh@xxxxxxxxxx>
- Re: [PATCH 00/12] One more attempt at useful kernel lockdown
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH 00/12] One more attempt at useful kernel lockdown
- From: David Lang <david@xxxxxxx>
- Re: [PATCH 00/12] One more attempt at useful kernel lockdown
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH 00/12] One more attempt at useful kernel lockdown
- From: David Lang <david@xxxxxxx>
- Re: [PATCH 00/12] One more attempt at useful kernel lockdown
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH 00/12] One more attempt at useful kernel lockdown
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 00/12] One more attempt at useful kernel lockdown
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/12] One more attempt at useful kernel lockdown
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 00/12] One more attempt at useful kernel lockdown
- From: David Lang <david@xxxxxxx>
- Re: [PATCH 00/12] One more attempt at useful kernel lockdown
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH 00/12] One more attempt at useful kernel lockdown
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/12] One more attempt at useful kernel lockdown
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH 00/12] One more attempt at useful kernel lockdown
- From: David Lang <david@xxxxxxx>
- Re: [PATCH 00/12] One more attempt at useful kernel lockdown
- From: Josh Boyer <jwboyer@xxxxxxxxx>
- Re: [PATCH 00/12] One more attempt at useful kernel lockdown
- From: David Lang <david@xxxxxxx>
- Re: [PATCH 00/12] One more attempt at useful kernel lockdown
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH 00/12] One more attempt at useful kernel lockdown
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH 00/12] One more attempt at useful kernel lockdown
- From: David Lang <david@xxxxxxx>
- Re: [PATCH 00/12] One more attempt at useful kernel lockdown
- From: Josh Boyer <jwboyer@xxxxxxxxx>
- Re: [PATCH 00/12] One more attempt at useful kernel lockdown
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH 00/12] One more attempt at useful kernel lockdown
- From: Josh Boyer <jwboyer@xxxxxxxxx>
- Re: [PATCH 00/12] One more attempt at useful kernel lockdown
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH 00/12] One more attempt at useful kernel lockdown
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH 00/12] One more attempt at useful kernel lockdown
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH 00/12] One more attempt at useful kernel lockdown
- From: Valdis.Kletnieks@xxxxxx
- Re: [PATCH 00/12] One more attempt at useful kernel lockdown
- From: David Lang <david@xxxxxxx>
- Re: [PATCH 00/12] One more attempt at useful kernel lockdown
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH 00/12] One more attempt at useful kernel lockdown
- From: David Lang <david@xxxxxxx>
- Re: [PATCH 01/12] Add BSD-style securelevel support
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH 00/12] One more attempt at useful kernel lockdown
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH 00/12] One more attempt at useful kernel lockdown
- From: David Lang <david@xxxxxxx>
- Re: [PATCH 00/12] One more attempt at useful kernel lockdown
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH 00/12] One more attempt at useful kernel lockdown
- From: Valdis.Kletnieks@xxxxxx
- Re: [PATCH 01/12] Add BSD-style securelevel support
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH 01/12] Add BSD-style securelevel support
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH 01/12] Add BSD-style securelevel support
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH 01/12] Add BSD-style securelevel support
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH 01/12] Add BSD-style securelevel support
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH 01/12] Add BSD-style securelevel support
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- [PATCH 10/12] x86: Restrict MSR access when securelevel is set
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH 12/12] Add option to automatically set securelevel when in Secure Boot mode
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH 11/12] asus-wmi: Restrict debugfs interface when securelevel is set
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH 02/12] Enforce module signatures when securelevel is greater than 0
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH 00/12] One more attempt at useful kernel lockdown
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH 06/12] acpi: Limit access to custom_method if securelevel is set
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH 04/12] x86: Lock down IO port access when securelevel is enabled
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH 09/12] uswsusp: Disable when securelevel is set
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH 07/12] acpi: Ignore acpi_rsdp kernel parameter when securelevel is set
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH 01/12] Add BSD-style securelevel support
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH 08/12] kexec: Disable at runtime if securelevel has been set.
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH 05/12] Restrict /dev/mem and /dev/kmem when securelevel is set.
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH 03/12] PCI: Lock down BAR access when securelevel is enabled
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: EFI stub boots only with setup_efi_pc() commented
- From: "Clea F. Rees" <reescf@xxxxxxxxx>
- Re: [PATCH V3 08/11] kexec: Disable at runtime if the kernel enforces module loading restrictions
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH V3 08/11] kexec: Disable at runtime if the kernel enforces module loading restrictions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V3 08/11] kexec: Disable at runtime if the kernel enforces module loading restrictions
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH V3 08/11] kexec: Disable at runtime if the kernel enforces module loading restrictions
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH V3 08/11] kexec: Disable at runtime if the kernel enforces module loading restrictions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V3 08/11] kexec: Disable at runtime if the kernel enforces module loading restrictions
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V3 08/11] kexec: Disable at runtime if the kernel enforces module loading restrictions
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH V3 08/11] kexec: Disable at runtime if the kernel enforces module loading restrictions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V3 08/11] kexec: Disable at runtime if the kernel enforces module loading restrictions
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH V3 08/11] kexec: Disable at runtime if the kernel enforces module loading restrictions
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V3 08/11] kexec: Disable at runtime if the kernel enforces module loading restrictions
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH V3 08/11] kexec: Disable at runtime if the kernel enforces module loading restrictions
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V3 08/11] kexec: Disable at runtime if the kernel enforces module loading restrictions
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH V3 08/11] kexec: Disable at runtime if the kernel enforces module loading restrictions
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH V3 08/11] kexec: Disable at runtime if the kernel enforces module loading restrictions
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V3 08/11] kexec: Disable at runtime if the kernel enforces module loading restrictions
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH V3 08/11] kexec: Disable at runtime if the kernel enforces module loading restrictions
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCHv2] x86: EFI stub support for large memory maps
- From: Linn Crosetto <linn@xxxxxx>
- Re: [PATCH] x86: EFI stub support for large memory maps
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH V3 03/11] x86: Lock down IO port access when module security is enabled
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH 11/18] Hibernate: introduced RSA key-pair to verify signature of snapshot
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH v4 0/3] Make commonly useful UEFI functions common
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH V3 11/11] Add option to automatically enforce module signatures when in Secure Boot mode
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH v4 2/3] efi: x86: ia64: provide a generic efi_config_init()
- From: Leif Lindholm <leif.lindholm@xxxxxxxxxx>
- [PATCH v4 3/3] efi: x86: make efi_lookup_mapped_addr() a common function
- From: Leif Lindholm <leif.lindholm@xxxxxxxxxx>
- [PATCH v4 1/3] ia64: add early_memremap() alias for early_ioremap()
- From: Leif Lindholm <leif.lindholm@xxxxxxxxxx>
- [PATCH v4 0/3] Make commonly useful UEFI functions common
- From: Leif Lindholm <leif.lindholm@xxxxxxxxxx>
- Re: [PATCH 11/18] Hibernate: introduced RSA key-pair to verify signature of snapshot
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/5] efi: provide a generic efi_config_init()
- From: Leif Lindholm <leif.lindholm@xxxxxxxxxx>
- Re: [PATCH V3 11/11] Add option to automatically enforce module signatures when in Secure Boot mode
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 11/18] Hibernate: introduced RSA key-pair to verify signature of snapshot
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH] efivars: Mark local function as static
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 11/18] Hibernate: introduced RSA key-pair to verify signature of snapshot
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: EFI stub boots only with setup_efi_pc() commented
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH V3 11/11] Add option to automatically enforce module signatures when in Secure Boot mode
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH V3 03/11] x86: Lock down IO port access when module security is enabled
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH V3 03/11] x86: Lock down IO port access when module security is enabled
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH V3 09/11] uswsusp: Disable when module loading is restricted
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH V3 11/11] Add option to automatically enforce module signatures when in Secure Boot mode
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH V3 01/11] Add secure_modules() call
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH V3 08/11] kexec: Disable at runtime if the kernel enforces module loading restrictions
- From: Josh Boyer <jwboyer@xxxxxxxxxxxxxxxxx>
- Re: [PATCH V3 08/11] kexec: Disable at runtime if the kernel enforces module loading restrictions
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH V3 08/11] kexec: Disable at runtime if the kernel enforces module loading restrictions
- From: jerry.hoemann@xxxxxx
- Re: [PATCH V3 02/11] PCI: Lock down BAR access when module security is enabled
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH V3 02/11] PCI: Lock down BAR access when module security is enabled
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH V3 02/11] PCI: Lock down BAR access when module security is enabled
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH V3 02/11] PCI: Lock down BAR access when module security is enabled
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH V3 02/11] PCI: Lock down BAR access when module security is enabled
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re:
- From: Josh Boyer <jwboyer@xxxxxxxxxxxxxxxxx>
- Re:
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH V2 10/10] Add option to automatically enforce module signatures when in Secure Boot mode
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH V2 10/10] Add option to automatically enforce module signatures when in Secure Boot mode
- From: Josh Boyer <jwboyer@xxxxxxxxxxxxxxxxx>
- Re: [PATCH V2 10/10] Add option to automatically enforce module signatures when in Secure Boot mode
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH V3 11/11] Add option to automatically enforce module signatures when in Secure Boot mode
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH V3 11/11] Add option to automatically enforce module signatures when in Secure Boot mode
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH V3 10/11] x86: Restrict MSR access when module loading is restricted
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH V3 09/11] uswsusp: Disable when module loading is restricted
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH V3 08/11] kexec: Disable at runtime if the kernel enforces module loading restrictions
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH V3 05/11] asus-wmi: Restrict debugfs interface when module loading is restricted
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH V3 06/11] Restrict /dev/mem and /dev/kmem when module loading is restricted
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH V3 04/11] ACPI: Limit access to custom_method
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH V3 03/11] x86: Lock down IO port access when module security is enabled
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH V3 02/11] PCI: Lock down BAR access when module security is enabled
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH V3 01/11] Add secure_modules() call
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH V3 10/11] x86: Restrict MSR access when module loading is restricted
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH V3 11/11] Add option to automatically enforce module signatures when in Secure Boot mode
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH V3 01/11] Add secure_modules() call
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH V3 03/11] x86: Lock down IO port access when module security is enabled
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH V3 02/11] PCI: Lock down BAR access when module security is enabled
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH V3 04/11] ACPI: Limit access to custom_method
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH V3 05/11] asus-wmi: Restrict debugfs interface when module loading is restricted
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH V3 06/11] Restrict /dev/mem and /dev/kmem when module loading is restricted
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH V3 09/11] uswsusp: Disable when module loading is restricted
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH V3 08/11] kexec: Disable at runtime if the kernel enforces module loading restrictions
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH V3 07/11] acpi: Ignore acpi_rsdp kernel parameter when module loading is restricted
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [no subject]
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH 10/18] efi: Enable secure boot lockdown automatically when enabled in firmware
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH] efivars: Mark local function as static
- From: Bojan Prtvar <prtvar.b@xxxxxxxxx>
- Re: [PATCH V3 RFC 00/16] EFI stub for ARM
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- Re: [PATCH V3 RFC 00/16] EFI stub for ARM
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/5] efi: provide a generic efi_config_init()
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [edk2] Corrupted EFI region
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: UEFI Plugfest 2013 -- New Orleans
- From: Alex Elsayed <eternaleye@xxxxxxxxx>
- Re: [PATCH V3 RFC 00/16] EFI stub for ARM
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: UEFI Plugfest 2013 -- New Orleans
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/10] Add additional security checks when module loading is restricted
- From: joeyli <jlee@xxxxxxxx>
- Re: [RFC PATCH 00/18 v3] Signature verification of hibernate snapshot
- From: joeyli <jlee@xxxxxxxx>
- Re: [RFC PATCH 00/18 v3] Signature verification of hibernate snapshot
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [RFC PATCH 00/18 v3] Signature verification of hibernate snapshot
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [RFC PATCH 00/18 v3] Signature verification of hibernate snapshot
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [RFC PATCH 00/18 v3] Signature verification of hibernate snapshot
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [PATCH 08/10] kexec: Disable at runtime if the kernel enforces module loading restrictions
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: EFI mode after running kexec
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: EFI mode after running kexec
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 15/16] Add EFI stub for ARM
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- Re: [PATCH V2 10/10] Add option to automatically enforce module signatures when in Secure Boot mode
- From: Josh Boyer <jwboyer@xxxxxxxxxx>
- Re: [PATCH 12/16] Fix types in EFI calls to match EFI function definitions.
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- Re: [PATCH 12/16] Fix types in EFI calls to match EFI function definitions.
- From: Grant Likely <grant.likely@xxxxxxxxxxxx>
- Re: [PATCH 12/16] Fix types in EFI calls to match EFI function definitions.
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- Re: [PATCH 04/16] Add minimum address parameter to efi_low_alloc()
- From: Grant Likely <grant.likely@xxxxxxxxxxxx>
- Re: [PATCH 10/16] Move EFI_READ_CHUNK_SIZE define to shared location.
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- Re: [PATCH 04/16] Add minimum address parameter to efi_low_alloc()
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- Re: [PATCH 02/16] Add system pointer argument to shared EFI stub related functions so they no longer use global system table pointer as they did when part of eboot.c. This code is now shared, so using a global variable as part of the interface is not that nice. Also, by avoiding any global variables in the ARM EFI stub, this allows the code to be position independent without requiring GOT fixups.
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- Re: [PATCH V2 10/10] Add option to automatically enforce module signatures when in Secure Boot mode
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: EFI mode after running kexec
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH 15/16] Add EFI stub for ARM
- From: Grant Likely <grant.likely@xxxxxxxxxxxx>
- Re: [PATCH 14/16] Add strstr to compressed string.c for ARM.
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- Re: [PATCH 14/16] Add strstr to compressed string.c for ARM.
- From: Grant Likely <grant.likely@xxxxxxxxxxxx>
- Re: [PATCH 14/16] Add strstr to compressed string.c for ARM.
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxxx>
- Re: [PATCH 14/16] Add strstr to compressed string.c for ARM.
- From: Grant Likely <grant.likely@xxxxxxxxxxxx>
- Re: [PATCH 13/16] resolve warnings found on ARM compile
- From: Grant Likely <grant.likely@xxxxxxxxxxxx>
- Re: [PATCH 12/16] Fix types in EFI calls to match EFI function definitions.
- From: Grant Likely <grant.likely@xxxxxxxxxxxx>
- Re: [PATCH 11/16] Add proper definitions for some EFI function pointers.
- From: Grant Likely <grant.likely@xxxxxxxxxxxx>
- Re: [PATCH 10/16] Move EFI_READ_CHUNK_SIZE define to shared location.
- From: Grant Likely <grant.likely@xxxxxxxxxxxx>
- Re: [PATCH 09/16] Renames in handle_cmdline_files() to complete generalization.
- From: Grant Likely <grant.likely@xxxxxxxxxxxx>
- Re: [PATCH 08/16] Generalize handle_ramdisks() and rename to handle_cmdline_files().
- From: Grant Likely <grant.likely@xxxxxxxxxxxx>
- Re: [PATCH 06/16] Enforce minimum alignment of 1 page on allocations. The efi_high_alloc() and efi_low_alloc() functions use the EFI_ALLOCATE_ADDRESS option to the EFI function allocate_pages(), which requires a minimum of page alignment, and rejects all other requests.
- From: Grant Likely <grant.likely@xxxxxxxxxxxx>
- Re: [PATCH 05/16] rename __get_map() to efi_get_memory_map(), add parameter to optionally return mmap key. The mmap key is required to exit EFI boot services, and allows efi_get_memory_map() to be used for getting final memory map.
- From: Grant Likely <grant.likely@xxxxxxxxxxxx>
- Re: [PATCH 04/16] Add minimum address parameter to efi_low_alloc()
- From: Grant Likely <grant.likely@xxxxxxxxxxxx>
- Re: [PATCH 03/16] Rename memory allocation/free functions
- From: Grant Likely <grant.likely@xxxxxxxxxxxx>
- Re: [PATCH 02/16] Add system pointer argument to shared EFI stub related functions so they no longer use global system table pointer as they did when part of eboot.c. This code is now shared, so using a global variable as part of the interface is not that nice. Also, by avoiding any global variables in the ARM EFI stub, this allows the code to be position independent without requiring GOT fixups.
- From: Grant Likely <grant.likely@xxxxxxxxxxxx>
- Re: [PATCH 01/16] Move common EFI stub code from x86 arch code to common location
- From: Grant Likely <grant.likely@xxxxxxxxxxxx>
- Re: [PATCH 16/16] Add config EFI_STUB for ARM to Kconfig
- From: Grant Likely <grant.likely@xxxxxxxxxxxx>
- Re: [RFC PATCH 00/18 v3] Signature verification of hibernate snapshot
- From: joeyli <jlee@xxxxxxxx>
- Re: [RFC PATCH 00/18 v3] Signature verification of hibernate snapshot
- From: Pavel Machek <pavel@xxxxxxx>
- Re: EFI mode after running kexec
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: EFI mode after running kexec
- From: Josh Boyer <jwboyer@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 05/10] asus-wmi: Restrict debugfs interface when module loading is restricted
- From: Josh Boyer <jwboyer@xxxxxxxxxx>
- Re: EFI mode after running kexec
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: EFI mode after running kexec
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 05/10] asus-wmi: Restrict debugfs interface when module loading is restricted
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH 05/10] asus-wmi: Restrict debugfs interface when module loading is restricted
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH 05/10] asus-wmi: Restrict debugfs interface when module loading is restricted
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH 05/10] asus-wmi: Restrict debugfs interface when module loading is restricted
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH V2 10/10] Add option to automatically enforce module signatures when in Secure Boot mode
- From: Josh Boyer <jwboyer@xxxxxxxxxx>
- Re: [PATCH 05/10] asus-wmi: Restrict debugfs interface when module loading is restricted
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH 05/10] asus-wmi: Restrict debugfs interface when module loading is restricted
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH V2 08/10] kexec: Disable at runtime if the kernel enforces module loading restrictions
- From: Lenny Szubowicz <lszubowi@xxxxxxxxxx>
- Re: [PATCH V2 08/10] kexec: Disable at runtime if the kernel enforces module loading restrictions
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH 04/10] ACPI: Limit access to custom_method
- From: Lenny Szubowicz <lszubowi@xxxxxxxxxx>
- Re: [PATCH V2 08/10] kexec: Disable at runtime if the kernel enforces module loading restrictions
- From: Lenny Szubowicz <lszubowi@xxxxxxxxxx>
- Re: [PATCH V2 01/10] Add secure_modules() call
- From: Josh Boyer <jwboyer@xxxxxxxxxx>
- Re: EFI mode after running kexec
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: EFI mode after running kexec
- From: Josh Boyer <jwboyer@xxxxxxxxxxxxxxxxx>
- EFI mode after running kexec
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 00/18 v3] Signature verification of hibernate snapshot
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH 0/10] Add additional security checks when module loading is restricted
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH 0/10] Add additional security checks when module loading is restricted
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 0/10] Add additional security checks when module loading is restricted
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH 0/10] Add additional security checks when module loading is restricted
- From: Lenny Szubowicz <lszubowi@xxxxxxxxxx>
- Re: [PATCH 0/10] Add additional security checks when module loading is restricted
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH 0/10] Add additional security checks when module loading is restricted
- From: Lenny Szubowicz <lszubowi@xxxxxxxxxx>
- Re: [RFC PATCH 00/18 v3] Signature verification of hibernate snapshot
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [PATCH 11/18] Hibernate: introduced RSA key-pair to verify signature of snapshot
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 11/18] Hibernate: introduced RSA key-pair to verify signature of snapshot
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH 17/18] Hibernate: introduced SNAPSHOT_SIG_HASH config for select hash algorithm
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH 11/18] Hibernate: introduced RSA key-pair to verify signature of snapshot
- From: Manfred Hollstein <mhollstein@xxxxxxxxxxx>
- Re: [PATCH 17/18] Hibernate: introduced SNAPSHOT_SIG_HASH config for select hash algorithm
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 11/18] Hibernate: introduced RSA key-pair to verify signature of snapshot
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 17/18] Hibernate: introduced SNAPSHOT_SIG_HASH config for select hash algorithm
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH 15/18] Hibernate: adapt to UEFI secure boot with signature check
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH 11/18] Hibernate: introduced RSA key-pair to verify signature of snapshot
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH 03/18] asymmetric keys: separate the length checking of octet string from RSA_I2OSP
- From: Jiri Kosina <jiri.kosina@xxxxxxxx>
- Re: [PATCH 13/18] Hibernate: Avoid S4 sign key data included in snapshot image
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH 12/18] Hibernate: generate and verify signature of snapshot
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH 03/18] asymmetric keys: separate the length checking of octet string from RSA_I2OSP
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 03/18] asymmetric keys: separate the length checking of octet string from RSA_I2OSP
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH 02/18] asymmetric keys: implement EMSA_PKCS1-v1_5-ENCODE in rsa
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH 17/18] Hibernate: introduced SNAPSHOT_SIG_HASH config for select hash algorithm
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 15/18] Hibernate: adapt to UEFI secure boot with signature check
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 13/18] Hibernate: Avoid S4 sign key data included in snapshot image
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 12/18] Hibernate: generate and verify signature of snapshot
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 10/18] efi: Enable secure boot lockdown automatically when enabled in firmware
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH 11/18] Hibernate: introduced RSA key-pair to verify signature of snapshot
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 10/18] efi: Enable secure boot lockdown automatically when enabled in firmware
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 09/18] Secure boot: Add a dummy kernel parameter that will switch on Secure Boot mode
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 08/18] Secure boot: Add new capability
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 07/18] asymmetric keys: explicitly add the leading zero byte to encoded message
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 06/18] asymmetric keys: support parsing PKCS #8 private key information
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 03/18] asymmetric keys: separate the length checking of octet string from RSA_I2OSP
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 02/18] asymmetric keys: implement EMSA_PKCS1-v1_5-ENCODE in rsa
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH V3 RFC 00/16] EFI stub for ARM
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH] x86: EFI stub support for large memory maps
- From: Linn Crosetto <linn@xxxxxx>
- [PATCH 02/18] asymmetric keys: implement EMSA_PKCS1-v1_5-ENCODE in rsa
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 04/18] asymmetric keys: implement OS2IP in rsa
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 05/18] asymmetric keys: implement RSASP1
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 06/18] asymmetric keys: support parsing PKCS #8 private key information
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 07/18] asymmetric keys: explicitly add the leading zero byte to encoded message
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 09/18] Secure boot: Add a dummy kernel parameter that will switch on Secure Boot mode
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 10/18] efi: Enable secure boot lockdown automatically when enabled in firmware
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 11/18] Hibernate: introduced RSA key-pair to verify signature of snapshot
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 12/18] Hibernate: generate and verify signature of snapshot
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 13/18] Hibernate: Avoid S4 sign key data included in snapshot image
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 14/18] Hibernate: applied SNAPSHOT_VERIFICATION config to switch signature check
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 15/18] Hibernate: adapt to UEFI secure boot with signature check
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 16/18] Hibernate: show the verification time for monitor performance
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 17/18] Hibernate: introduced SNAPSHOT_SIG_HASH config for select hash algorithm
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 18/18] Hibernate: notify bootloader regenerate key-pair for snapshot verification
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 08/18] Secure boot: Add new capability
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 03/18] asymmetric keys: separate the length checking of octet string from RSA_I2OSP
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 01/18] asymmetric keys: add interface and skeleton for implement signature generation
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [RFC PATCH 00/18 v3] Signature verification of hibernate snapshot
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 00/18 v3] Signature verification of hibernate snapshot
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 01/18] asymmetric keys: add interface and skeleton for implement signature generation
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [RFC][PATCH] efivars,efi-pstore: Hold off deletion of sysfs entry until the scan is completed
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- Re: [RFC PATCH 0/4] EFI boot stub memory map fix
- From: Yinghai Lu <yinghai@xxxxxxxxxx>
- Re: UEFI Plugfest 2013 -- New Orleans
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [RFC PATCH 0/4] EFI boot stub memory map fix
- From: Linn Crosetto <linn@xxxxxx>
- Re: UEFI Plugfest 2013 -- New Orleans
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [RFC PATCH 0/4] EFI boot stub memory map fix
- From: Yinghai Lu <yinghai@xxxxxxxxxx>
- Re: UEFI Plugfest 2013 -- New Orleans
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: UEFI Plugfest 2013 -- New Orleans
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: UEFI Plugfest 2013 -- New Orleans
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: UEFI Plugfest 2013 -- New Orleans
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [RFC PATCH 0/4] EFI boot stub memory map fix
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- [RFC PATCH 2/4] efi: Add memory_setup function efi_memory_setup()
- From: Linn Crosetto <linn@xxxxxx>
- [RFC PATCH 3/4] efi: Add efi_memmap_needed()
- From: Linn Crosetto <linn@xxxxxx>
- [RFC PATCH 4/4] x86: Fix EFI boot stub for large memory maps
- From: Linn Crosetto <linn@xxxxxx>
- [RFC PATCH 1/4] efi: Decouple efi_memmap_init() and do_add_efi_memmap()
- From: Linn Crosetto <linn@xxxxxx>
- [RFC PATCH 0/4] EFI boot stub memory map fix
- From: Linn Crosetto <linn@xxxxxx>
- [PATCH V2 10/10] Add option to automatically enforce module signatures when in Secure Boot mode
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: UEFI Plugfest 2013 -- New Orleans
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: UEFI Plugfest 2013 -- New Orleans
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/10] Add additional security checks when module loading is restricted
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH V2 02/10] PCI: Lock down BAR access when module security is enabled
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH V2 01/10] Add secure_modules() call
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH V2 03/10] x86: Lock down IO port access when module security is enabled
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH V2 04/10] ACPI: Limit access to custom_method
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH V2 07/10] acpi: Ignore acpi_rsdp kernel parameter when module loading is restricted
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH V2 05/10] asus-wmi: Restrict debugfs interface when module loading is restricted
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH V2 08/10] kexec: Disable at runtime if the kernel enforces module loading restrictions
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH V2 09/10] x86: Restrict MSR access when module loading is restricted
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH V2 06/10] Restrict /dev/mem and /dev/kmem when module loading is restricted
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH 0/10] Add additional security checks when module loading is restricted
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: UEFI Plugfest 2013 -- New Orleans
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH 05/10] asus-wmi: Restrict debugfs interface when module loading is restricted
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: UEFI Plugfest 2013 -- New Orleans
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 05/10] asus-wmi: Restrict debugfs interface when module loading is restricted
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 04/10] ACPI: Limit access to custom_method
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH 02/10] PCI: Lock down BAR access when module security is enabled
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH 05/10] asus-wmi: Restrict debugfs interface when module loading is restricted
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH 01/10] Add secure_modules() call
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH 06/10] Restrict /dev/mem and /dev/kmem when module loading is restricted
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH 07/10] acpi: Ignore acpi_rsdp kernel parameter when module loading is restricted
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH 08/10] kexec: Disable at runtime if the kernel enforces module loading restrictions
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH 09/10] x86: Restrict MSR access when module loading is restricted
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH 10/10] Add option to automatically enforce module signatures when in Secure Boot mode
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH 03/10] x86: Lock down IO port access when module security is enabled
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: UEFI Plugfest 2013 -- New Orleans
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: UEFI Plugfest 2013 -- New Orleans
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: UEFI Plugfest 2013 -- New Orleans
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: UEFI Plugfest 2013 -- New Orleans
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: UEFI Plugfest 2013 -- New Orleans
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [edk2] Corrupted EFI region
- From: Jordan Justen <jljusten@xxxxxxxxx>
- Re: UEFI Plugfest 2013 -- New Orleans
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V3 RFC 00/16] EFI stub for ARM
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- UEFI Plugfest 2013 -- New Orleans
- From: "John W. Linville" <linville@xxxxxxxxxxxxx>
- Re: RFC: default CONFIG_EFI_STUB=y
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH 15/16] Add EFI stub for ARM
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- Re: RFC: default CONFIG_EFI_STUB=y
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: RFC: default CONFIG_EFI_STUB=y
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: RFC: default CONFIG_EFI_STUB=y
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: RFC: default CONFIG_EFI_STUB=y
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: RFC: default CONFIG_EFI_STUB=y
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH V3 RFC 00/16] EFI stub for ARM
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- Re: [PATCH 16/16] Add config EFI_STUB for ARM to Kconfig
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- Re: [PATCH V3 RFC 00/16] EFI stub for ARM
- From: Mark Salter <msalter@xxxxxxxxxx>
- Re: [PATCH 16/17] Add EFI stub for ARM
- From: Dave P Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH 15/16] Add EFI stub for ARM
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH 01/16] Move common EFI stub code from x86 arch code to common location
- From: Mark Salter <msalter@xxxxxxxxxx>
- Re: [PATCH 03/16] Rename memory allocation/free functions
- From: Mark Salter <msalter@xxxxxxxxxx>
- Re: [PATCH 04/16] Add minimum address parameter to efi_low_alloc()
- From: Mark Salter <msalter@xxxxxxxxxx>
- Re: [PATCH 05/16] rename __get_map() to efi_get_memory_map(), add parameter to optionally return mmap key. The mmap key is required to exit EFI boot services, and allows efi_get_memory_map() to be used for getting final memory map.
- From: Mark Salter <msalter@xxxxxxxxxx>
- Re: [PATCH 06/16] Enforce minimum alignment of 1 page on allocations. The efi_high_alloc() and efi_low_alloc() functions use the EFI_ALLOCATE_ADDRESS option to the EFI function allocate_pages(), which requires a minimum of page alignment, and rejects all other requests.
- From: Mark Salter <msalter@xxxxxxxxxx>
- Re: [PATCH 08/16] Generalize handle_ramdisks() and rename to handle_cmdline_files().
- From: Mark Salter <msalter@xxxxxxxxxx>
- Re: [PATCH 09/16] Renames in handle_cmdline_files() to complete generalization.
- From: Mark Salter <msalter@xxxxxxxxxx>
- Re: [PATCH 10/16] Move EFI_READ_CHUNK_SIZE define to shared location.
- From: Mark Salter <msalter@xxxxxxxxxx>
- Re: [PATCH 11/16] Add proper definitions for some EFI function pointers.
- From: Mark Salter <msalter@xxxxxxxxxx>
- Re: [PATCH 12/16] Fix types in EFI calls to match EFI function definitions.
- From: Mark Salter <msalter@xxxxxxxxxx>
- Re: [PATCH 13/16] resolve warnings found on ARM compile
- From: Mark Salter <msalter@xxxxxxxxxx>
- Re: [PATCH 02/16] Add system pointer argument to shared EFI stub related functions so they no longer use global system table pointer as they did when part of eboot.c. This code is now shared, so using a global variable as part of the interface is not that nice. Also, by avoiding any global variables in the ARM EFI stub, this allows the code to be position independent without requiring GOT fixups.
- From: Mark Salter <msalter@xxxxxxxxxx>
- Re: [PATCH 16/16] Add config EFI_STUB for ARM to Kconfig
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH V3 RFC 00/16] EFI stub for ARM
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- Re: [PATCH 15/16] Add EFI stub for ARM
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- Re: [PATCH 15/16] Add EFI stub for ARM
- From: Mark Salter <msalter@xxxxxxxxxx>
- Re: [PATCH V3 RFC 00/16] EFI stub for ARM
- From: Mark Salter <msalter@xxxxxxxxxx>
- [PATCH V3 RFC 00/16] EFI stub for ARM
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 01/16] Move common EFI stub code from x86 arch code to common location
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 03/16] Rename memory allocation/free functions
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 02/16] Add system pointer argument to shared EFI stub related functions so they no longer use global system table pointer as they did when part of eboot.c. This code is now shared, so using a global variable as part of the interface is not that nice. Also, by avoiding any global variables in the ARM EFI stub, this allows the code to be position independent without requiring GOT fixups.
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 06/16] Enforce minimum alignment of 1 page on allocations. The efi_high_alloc() and efi_low_alloc() functions use the EFI_ALLOCATE_ADDRESS option to the EFI function allocate_pages(), which requires a minimum of page alignment, and rejects all other requests.
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 08/16] Generalize handle_ramdisks() and rename to handle_cmdline_files().
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 07/16] Allow efi_free() to be called with size of 0, and do nothing in that case.
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 09/16] Renames in handle_cmdline_files() to complete generalization.
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 10/16] Move EFI_READ_CHUNK_SIZE define to shared location.
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 13/16] resolve warnings found on ARM compile
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 11/16] Add proper definitions for some EFI function pointers.
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 16/16] Add config EFI_STUB for ARM to Kconfig
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 15/16] Add EFI stub for ARM
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 14/16] Add strstr to compressed string.c for ARM.
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 12/16] Fix types in EFI calls to match EFI function definitions.
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 05/16] rename __get_map() to efi_get_memory_map(), add parameter to optionally return mmap key. The mmap key is required to exit EFI boot services, and allows efi_get_memory_map() to be used for getting final memory map.
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 04/16] Add minimum address parameter to efi_low_alloc()
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- Re: RFC: default CONFIG_EFI_STUB=y
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: RFC: default CONFIG_EFI_STUB=y
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- RFC: default CONFIG_EFI_STUB=y
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH 12/17] Add proper definitions for some EFI function pointers.
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- Re: [PATCH 12/17] Add proper definitions for some EFI function pointers.
- From: Mark Salter <msalter@xxxxxxxxxx>
- Re: [PATCH 16/17] Add EFI stub for ARM
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- Re: [PATCH 16/17] Add EFI stub for ARM
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- Re: [edk2] Corrupted EFI region
- From: "Brian J. Johnson" <bjohnson@xxxxxxx>
- Re: [edk2] Corrupted EFI region
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [edk2] Corrupted EFI region
- From: Andrew Fish <afish@xxxxxxxxx>
- Re: [edk2] Corrupted EFI region
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 03/17] Add system pointer argument to shared EFI stub related functions so they no longer use global system table pointer as they did when part of eboot.c.
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [edk2] Corrupted EFI region
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [edk2] Corrupted EFI region
- From: Andrew Fish <afish@xxxxxxxxx>
- Re: [edk2] Corrupted EFI region
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [edk2] Corrupted EFI region
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH v3 2/5] efi: provide a generic efi_config_init()
- From: Leif Lindholm <leif.lindholm@xxxxxxxxxx>
- [PATCH v3 1/5] ia64: add early_memremap() alias for early_ioremap()
- From: Leif Lindholm <leif.lindholm@xxxxxxxxxx>
- [PATCH v3 4/5] efi: ia64: use common code for (U)EFI configuration scanning
- From: Leif Lindholm <leif.lindholm@xxxxxxxxxx>
- [PATCH v3 3/5] efi: x86: use common code for (U)EFI configuration scanning
- From: Leif Lindholm <leif.lindholm@xxxxxxxxxx>
- [PATCH v3 5/5] efi: x86: make efi_lookup_mapped_addr() a common function
- From: Leif Lindholm <leif.lindholm@xxxxxxxxxx>
- [PATCH v3 0/5] Make commonly useful UEFI functions common
- From: Leif Lindholm <leif.lindholm@xxxxxxxxxx>
- Re: [PATCH 16/17] Add EFI stub for ARM
- From: Leif Lindholm <leif.lindholm@xxxxxxxxxx>
- Re: [PATCH 16/17] Add EFI stub for ARM
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [edk2] Corrupted EFI region
- From: Laszlo Ersek <lersek@xxxxxxxxxx>
- Re: [edk2] Corrupted EFI region
- From: Andrew Fish <afish@xxxxxxxxx>
- Re: [PATCH 12/17] Add proper definitions for some EFI function pointers.
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- Re: [PATCH 04/17] Rename memory allocation/free functions
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- Re: [PATCH 03/17] Add system pointer argument to shared EFI stub related functions so they no longer use global system table pointer as they did when part of eboot.c.
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- Re: [PATCH 10/17] Renames in handle_cmdline_files() to complete generalization.
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 12/17] Add proper definitions for some EFI function pointers.
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 04/17] Rename memory allocation/free functions
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 03/17] Add system pointer argument to shared EFI stub related functions so they no longer use global system table pointer as they did when part of eboot.c.
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/5] efi: provide a generic efi_config_init()
- From: Leif Lindholm <leif.lindholm@xxxxxxxxxx>
- Re: [PATCH V2 00/17] EFI stub for ARM
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH 01/17] EFI stub documentation updates
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 11/17] Move EFI_READ_CHUNK_SIZE define to shared location.
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH V2 00/17] EFI stub for ARM
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 03/17] Add system pointer argument to shared EFI stub related functions so they no longer use global system table pointer as they did when part of eboot.c.
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 02/17] Move common EFI stub code from x86 arch code to common location
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 06/17] rename __get_map() to efi_get_memory_map(), add parameter to optionally return mmap key. The mmap key is required to exit EFI boot services, and allows efi_get_memory_map() to be used for getting final memory map.
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 08/17] Allow efi_free() to be called with size of 0, and do nothing in that case.
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 07/17] Enforce minimum alignment of 1 page on allocations. The efi_high_alloc() and efi_low_alloc() functions use the EFI_ALLOCATE_ADDRESS option to the EFI function allocate_pages(), which requires a minimum of page alignment, and rejects all other requests.
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 09/17] Generalize handle_ramdisks() and rename to handle_cmdline_files().
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 05/17] Add minimum address parameter to efi_low_alloc()
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 10/17] Renames in handle_cmdline_files() to complete generalization.
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 04/17] Rename memory allocation/free functions
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 14/17] resolve warnings found on ARM compile
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 13/17] Fix types in EFI calls to match EFI function definitions.
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 15/17] Add strstr to compressed string.c for ARM.
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 12/17] Add proper definitions for some EFI function pointers.
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 17/17] Add config EFI_STUB for ARM to Kconfig
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 16/17] Add EFI stub for ARM
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- Re: [edk2] Corrupted EFI region
- From: Laszlo Ersek <lersek@xxxxxxxxxx>
- Re: [edk2] Corrupted EFI region
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 2/7] Move common EFI stub code from x86 arch code to common location
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/7] Change EFI helper APIs to be more flexible
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/7] Add proper definitions for some EFI function pointers.
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 6/7] Add EFI stub for ARM
- From: Dave P Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH 6/7] Add EFI stub for ARM
- From: Dave P Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH 1/7] EFI stub documentation updates
- From: Dave P Martin <Dave.Martin@xxxxxxx>
- Re: [edk2] Corrupted EFI region
- From: Laszlo Ersek <lersek@xxxxxxxxxx>
- Re: [PATCH v2 1/5] ia64: add early_memremap() alias for early_ioremap()
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 6/7] Add EFI stub for ARM
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- Re: [PATCH 6/7] Add EFI stub for ARM
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- Re: [PATCH 1/7] EFI stub documentation updates
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- Re: [edk2] Corrupted EFI region
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [edk2] Corrupted EFI region
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [edk2] Corrupted EFI region
- From: Laszlo Ersek <lersek@xxxxxxxxxx>
- Re: [edk2] Corrupted EFI region
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [edk2] Corrupted EFI region
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [edk2] Corrupted EFI region
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [edk2] Corrupted EFI region
- From: Laszlo Ersek <lersek@xxxxxxxxxx>
- Re: [edk2] Corrupted EFI region
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [edk2] Corrupted EFI region
- From: Laszlo Ersek <lersek@xxxxxxxxxx>
- RE: [edk2] Corrupted EFI region
- From: "Kinney, Michael D" <michael.d.kinney@xxxxxxxxx>
- Re: [edk2] Corrupted EFI region
- From: Andrew Fish <afish@xxxxxxxxx>
- Re: [edk2] Corrupted EFI region
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [edk2] Corrupted EFI region
- From: Laszlo Ersek <lersek@xxxxxxxxxx>
- Re: [edk2] Corrupted EFI region
- From: Laszlo Ersek <lersek@xxxxxxxxxx>
- Re: [edk2] Corrupted EFI region
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 1/5] ia64: add early_memremap() alias for early_ioremap()
- From: Tony Luck <tony.luck@xxxxxxxxx>
- Re: [edk2] Corrupted EFI region
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 6/7] Add EFI stub for ARM
- From: Leif Lindholm <leif.lindholm@xxxxxxxxxx>
- Re: [edk2] Corrupted EFI region
- From: Laszlo Ersek <lersek@xxxxxxxxxx>
- Re: [edk2] Corrupted EFI region
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [edk2] Corrupted EFI region
- From: Laszlo Ersek <lersek@xxxxxxxxxx>
- Re: [PATCH 6/7] Add EFI stub for ARM
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH 1/7] EFI stub documentation updates
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [edk2] Corrupted EFI region
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [edk2] Corrupted EFI region
- From: Laszlo Ersek <lersek@xxxxxxxxxx>
- Re: [GIT PULL] urgent fix
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [edk2] Corrupted EFI region
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [GIT PULL] urgent fix
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 5/5] efi: x86: make efi_lookup_mapped_addr() a common function
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/5] efi: ia64: use common code for (U)EFI configuration scanning
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/5] efi: x86: use common code for (U)EFI configuration scanning
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/5] efi: provide a generic efi_config_init()
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [edk2] Corrupted EFI region
- From: Laszlo Ersek <lersek@xxxxxxxxxx>
- Re: [PATCH v2 1/5] ia64: add early_memremap() alias for early_ioremap()
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- EFI stub boots only with setup_efi_pc() commented
- From: "Clea F. Rees" <reescf@xxxxxxxxx>
- [PATCH 1/7] EFI stub documentation updates
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 0/7] RFC: EFI stub for ARM
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 2/7] Move common EFI stub code from x86 arch code to common location
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 3/7] Change EFI helper APIs to be more flexible
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 5/7] Add strstr to compressed string.c for ARM.
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 4/7] Add proper definitions for some EFI function pointers.
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 7/7] Add config EFI_STUB for ARM
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH 6/7] Add EFI stub for ARM
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH v2 1/5] ia64: add early_memremap() alias for early_ioremap()
- From: Leif Lindholm <leif.lindholm@xxxxxxxxxx>
- [PATCH v2 3/5] efi: x86: use common code for (U)EFI configuration scanning
- From: Leif Lindholm <leif.lindholm@xxxxxxxxxx>
- [PATCH v2 4/5] efi: ia64: use common code for (U)EFI configuration scanning
- From: Leif Lindholm <leif.lindholm@xxxxxxxxxx>
- [PATCH v2 5/5] efi: x86: make efi_lookup_mapped_addr() a common function
- From: Leif Lindholm <leif.lindholm@xxxxxxxxxx>
- [PATCH v2 2/5] efi: provide a generic efi_config_init()
- From: Leif Lindholm <leif.lindholm@xxxxxxxxxx>
- [PATCH v2 0/5] Make commonly useful UEFI functions common
- From: Leif Lindholm <leif.lindholm@xxxxxxxxxx>
- Re: [PATCH 0/4] Make commonly useful UEFI functions common
- From: "Fleming, Matt" <matt.fleming@xxxxxxxxx>
- Re: [PATCH 0/4] Make commonly useful UEFI functions common
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: Corrupted EFI region
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: Corrupted EFI region
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 4/4] efi: x86: make efi_lookup_mapped_addr() a common function
- From: Leif Lindholm <leif.lindholm@xxxxxxxxxx>
- Re: Corrupted EFI region
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: Corrupted EFI region
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: Corrupted EFI region
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: Corrupted EFI region
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Corrupted EFI region
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 4/4] efi: x86: make efi_lookup_mapped_addr() a common function
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- Re: [PATCH 0/4] Make commonly useful UEFI functions common
- From: Tony Luck <tony.luck@xxxxxxxxx>
- Re: [GIT PULL] urgent fix
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH 1/4] efi: provide a generic efi_config_init()
- From: Tony Luck <tony.luck@xxxxxxxxx>
- Re: [PATCH 1/4] efi: provide a generic efi_config_init()
- From: Leif Lindholm <leif.lindholm@xxxxxxxxxx>
- Re: [PATCH 1/4] efi: provide a generic efi_config_init()
- From: Tony Luck <tony.luck@xxxxxxxxx>
- [PATCH 1/4] efi: provide a generic efi_config_init()
- From: Leif Lindholm <leif.lindholm@xxxxxxxxxx>
- [PATCH 3/4] efi: ia64: use common code for (U)EFI configuration scanning
- From: Leif Lindholm <leif.lindholm@xxxxxxxxxx>
- [PATCH 2/4] efi: x86: use common code for (U)EFI configuration scanning
- From: Leif Lindholm <leif.lindholm@xxxxxxxxxx>
- [PATCH 4/4] efi: x86: make efi_lookup_mapped_addr() a common function
- From: Leif Lindholm <leif.lindholm@xxxxxxxxxx>
- [PATCH 0/4] Make commonly useful UEFI functions common
- From: Leif Lindholm <leif.lindholm@xxxxxxxxxx>
- [GIT PULL] urgent fix
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] correct call to free_pages to specify memory size in pages, not bytes.
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- [PATCH] correct call to free_pages to specify memory size in pages, not bytes.
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- [PATCH] correct call to free_pages to specify memory size in pages, not bytes.
- From: Roy Franz <roy.franz@xxxxxxxxxx>
- Re: [RESEND][v3.8] [v3.9] [v3.10] [Regression] efi: be more paranoid about available space when creating variables
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [RESEND][v3.8] [v3.9] [v3.10] [Regression] efi: be more paranoid about available space when creating variables
- From: Joseph Salisbury <joseph.salisbury@xxxxxxxxxxxxx>
- Re: [REGRESSION] "UEFI: Don't pass boot services regions to SetVirtualAddressMap()" breaks macbook efi boot
- From: "Fleming, Matt" <matt.fleming@xxxxxxxxx>
- Re: [REGRESSION] "UEFI: Don't pass boot services regions to SetVirtualAddressMap()" breaks macbook efi boot
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [REGRESSION] "UEFI: Don't pass boot services regions to SetVirtualAddressMap()" breaks macbook efi boot
- From: Igor Gnatenko <i.gnatenko.brain@xxxxxxxxx>
- [GIT PULL] EFI urgent fixes
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [REGRESSION] "UEFI: Don't pass boot services regions to SetVirtualAddressMap()" breaks macbook efi boot
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [REGRESSION] "UEFI: Don't pass boot services regions to SetVirtualAddressMap()" breaks macbook efi boot
- From: "Fleming, Matt" <matt.fleming@xxxxxxxxx>
- [REGRESSION] "UEFI: Don't pass boot services regions to SetVirtualAddressMap()" breaks macbook efi boot
- From: Maarten Lankhorst <maarten.lankhorst@xxxxxxxxxxxxx>
- Re: [GIT PULL] EFI changes for v3.11
- From: Tony Luck <tony.luck@xxxxxxxxx>
- Re: [GIT PULL] EFI changes for v3.11
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- RE: [GIT PULL] EFI changes for v3.11
- From: "Luck, Tony" <tony.luck@xxxxxxxxx>
- Re: [GIT PULL] EFI changes for v3.11
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH -v2 4/4] x86, efi: Map runtime services 1:1
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH -v2 0/4] EFI 1:1 mapping
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 1/4] Documentation: arm: [U]EFI runtime services
- From: Rob Landley <rob@xxxxxxxxxxx>
- Re: [PATCH 1/4] Documentation: arm: [U]EFI runtime services
- From: Grant Likely <grant.likely@xxxxxxxxxxxx>
- Re: [PATCH 1/4] Documentation: arm: [U]EFI runtime services
- From: "H. Peter Anvin" <hpa@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] Documentation: arm: [U]EFI runtime services
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] Documentation: arm: [U]EFI runtime services
- From: Stephen Warren <swarren@xxxxxxxxxxxxx>
- Re: [PATCH 1/4] Documentation: arm: [U]EFI runtime services
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH 1/4] Documentation: arm: [U]EFI runtime services
- From: Grant Likely <grant.likely@xxxxxxxxxxxx>
- Re: [PATCH 1/4] Documentation: arm: [U]EFI runtime services
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] Documentation: arm: [U]EFI runtime services
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] Documentation: arm: [U]EFI runtime services
- From: Grant Likely <grant.likely@xxxxxxxxxxxx>
- Re: [PATCH 1/4] Documentation: arm: [U]EFI runtime services
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH 1/4] Documentation: arm: [U]EFI runtime services
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH 1/4] Documentation: arm: [U]EFI runtime services
- From: Arnd Bergmann <arnd@xxxxxxxx>
[Index of Archives]
[Linux Kernel Development]
[Security]
[Linux ARM Kernel]
[Tools]
[Linux MIPS]
[Linux S390]
[Bugtraq]
[Share Photos]>
[Fedora ARM]