Linux EFI/UEFI Development
[Prev Page][Next Page]
- Re: [PATCH 1/4] Documentation: arm: [U]EFI runtime services
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 1/4] Documentation: arm: [U]EFI runtime services
- From: Leif Lindholm <leif.lindholm@xxxxxxxxxx>
- Re: [PATCH 1/4] Documentation: arm: [U]EFI runtime services
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] Documentation: arm: [U]EFI runtime services
- From: Grant Likely <grant.likely@xxxxxxxxxxxx>
- Re: [PATCH 1/4] Documentation: arm: [U]EFI runtime services
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH 1/4] Documentation: arm: [U]EFI runtime services
- From: Leif Lindholm <leif.lindholm@xxxxxxxxxx>
- Re: [PATCH 1/4] Documentation: arm: [U]EFI runtime services
- From: Stephen Warren <swarren@xxxxxxxxxxxxx>
- Re: [PATCH 2/4] x86: efi: break efi_lookup_mapped_addr out to generic code
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] Documentation: arm: [U]EFI runtime services
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/4] arm: Add [U]EFI runtime services support
- From: Grant Likely <grant.likely@xxxxxxxxxxxx>
- Re: [PATCH 1/4] Documentation: arm: [U]EFI runtime services
- From: Grant Likely <grant.likely@xxxxxxxxxxxx>
- Re: [PATCH 3/4] arm: Add [U]EFI runtime services support
- From: Leif Lindholm <leif.lindholm@xxxxxxxxxx>
- Re: [PATCH 3/4] arm: Add [U]EFI runtime services support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 2/4] x86: efi: break efi_lookup_mapped_addr out to generic code
- From: Leif Lindholm <leif.lindholm@xxxxxxxxxx>
- Re: [PATCH 1/4] Documentation: arm: [U]EFI runtime services
- From: Leif Lindholm <leif.lindholm@xxxxxxxxxx>
- Re: [PATCH 1/4] Documentation: arm: [U]EFI runtime services
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/4] arm: Add [U]EFI runtime services support
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] Documentation: arm: [U]EFI runtime services
- From: Leif Lindholm <leif.lindholm@xxxxxxxxxx>
- Re: [PATCH 3/4] arm: Add [U]EFI runtime services support
- From: Grant Likely <grant.likely@xxxxxxxxxxxx>
- Re: [PATCH 3/4] arm: Add [U]EFI runtime services support
- From: Grant Likely <grant.likely@xxxxxxxxxxxx>
- Re: [PATCH 2/4] x86: efi: break efi_lookup_mapped_addr out to generic code
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/4] x86: efi: break efi_lookup_mapped_addr out to generic code
- From: Grant Likely <grant.likely@xxxxxxxxxxxx>
- Re: [PATCH 4/4] init: efi: arm: enable (U)EFI runtime services on arm
- From: Grant Likely <grant.likely@xxxxxxxxxxxx>
- Re: [PATCH 1/4] Documentation: arm: [U]EFI runtime services
- From: Grant Likely <grant.likely@xxxxxxxxxxxx>
- Re: [PATCH 1/4] Documentation: arm: [U]EFI runtime services
- From: Grant Likely <grant.likely@xxxxxxxxxxxx>
- Re: [PATCH] x86, efi: retry ExitBootServices() on failure
- From: "matt@xxxxxxxxxxxxxxxxx" <matt@xxxxxxxxxxxxxxxxx>
- [GIT PULL] EFI changes for v3.11
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] Documentation: arm: [U]EFI runtime services
- From: Stephen Warren <swarren@xxxxxxxxxxxxx>
- Re: [PATCH 1/4] Documentation: arm: [U]EFI runtime services
- From: Christopher Covington <cov@xxxxxxxxxxxxxx>
- Re: [PATCH 3/4] arm: Add [U]EFI runtime services support
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- [PATCH 0/4] arm: [U]EFI runtime services support
- From: Leif Lindholm <leif.lindholm@xxxxxxxxxx>
- [PATCH 1/4] Documentation: arm: [U]EFI runtime services
- From: Leif Lindholm <leif.lindholm@xxxxxxxxxx>
- [PATCH 2/4] x86: efi: break efi_lookup_mapped_addr out to generic code
- From: Leif Lindholm <leif.lindholm@xxxxxxxxxx>
- [PATCH 3/4] arm: Add [U]EFI runtime services support
- From: Leif Lindholm <leif.lindholm@xxxxxxxxxx>
- [PATCH 4/4] init: efi: arm: enable (U)EFI runtime services on arm
- From: Leif Lindholm <leif.lindholm@xxxxxxxxxx>
- Re: [PATCH -v2 0/4] EFI 1:1 mapping
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH -v2 0/4] EFI 1:1 mapping
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH -v2 4/4] x86, efi: Map runtime services 1:1
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH -v2 0/4] EFI 1:1 mapping
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- [GIT PULL] EFI urgent fix
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH -v2 0/4] EFI 1:1 mapping
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH -v2 0/4] EFI 1:1 mapping
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH -v2 0/4] EFI 1:1 mapping
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH -v2 0/4] EFI 1:1 mapping
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH -v2 0/4] EFI 1:1 mapping
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH -v2 0/4] EFI 1:1 mapping
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH -v2 0/4] EFI 1:1 mapping
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH -v2 0/4] EFI 1:1 mapping
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH -v2 0/4] EFI 1:1 mapping
- From: Borislav Petkov <bp@xxxxxxxxx>
- RE: [PATCH] x86, efi: retry ExitBootServices() on failure
- From: Zachary Bobroff <zacharyb@xxxxxxx>
- Re: [PATCH -v2 0/4] EFI 1:1 mapping
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH -v2 0/4] EFI 1:1 mapping
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH -v2 0/4] EFI 1:1 mapping
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH -v2 0/4] EFI 1:1 mapping
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH -v2 0/4] EFI 1:1 mapping
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -v2 0/4] EFI 1:1 mapping
- From: Jiri Kosina <jkosina@xxxxxxx>
- Re: [PATCH -v2 0/4] EFI 1:1 mapping
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH -v2 0/4] EFI 1:1 mapping
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -v2 0/4] EFI 1:1 mapping
- From: Jiri Kosina <jkosina@xxxxxxx>
- Re: [PATCH -v2 0/4] EFI 1:1 mapping
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH -v2 0/4] EFI 1:1 mapping
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH -v2 0/4] EFI 1:1 mapping
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH -v2 0/4] EFI 1:1 mapping
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH -v2 0/4] EFI 1:1 mapping
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH -v2 0/4] EFI 1:1 mapping
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH -v2 0/4] EFI 1:1 mapping
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH -v2 0/4] EFI 1:1 mapping
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH -v2 0/4] EFI 1:1 mapping
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH -v2 0/4] EFI 1:1 mapping
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH -v2 0/4] EFI 1:1 mapping
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -v2 0/4] EFI 1:1 mapping
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH -v2 0/4] EFI 1:1 mapping
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH -v2 0/4] EFI 1:1 mapping
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH -v2 0/4] EFI 1:1 mapping
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH -v2 0/4] EFI 1:1 mapping
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH -v2 0/4] EFI 1:1 mapping
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH -v2 0/4] EFI 1:1 mapping
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH -v2 0/4] EFI 1:1 mapping
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH -v2 0/4] EFI 1:1 mapping
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH -v2 0/4] EFI 1:1 mapping
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH] x86, efi: retry ExitBootServices() on failure
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH] x86, efi: retry ExitBootServices() on failure
- From: "matt@xxxxxxxxxxxxxxxxx" <matt@xxxxxxxxxxxxxxxxx>
- RE: [PATCH] x86, efi: retry ExitBootServices() on failure
- From: Zachary Bobroff <zacharyb@xxxxxxx>
- RE: [PATCH] x86, efi: retry ExitBootServices() on failure
- From: "Jan Beulich" <jbeulich@xxxxxxxx>
- Re: [PATCH] x86, efi: retry ExitBootServices() on failure
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH] x86, efi: retry ExitBootServices() on failure
- From: Zachary Bobroff <zacharyb@xxxxxxx>
- RE: [PATCH] x86, efi: retry ExitBootServices() on failure
- From: joeyli <jlee@xxxxxxxx>
- RE: [PATCH] x86, efi: retry ExitBootServices() on failure
- From: Zachary Bobroff <zacharyb@xxxxxxx>
- [PATCH -v2 0/4] EFI 1:1 mapping
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH -v2 3/4] x86, efi: Add an efi= kernel command line parameter
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH -v2 1/4] efi: Convert runtime services function ptrs
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH -v2 2/4] x86, cpa: Map in an arbitrary pgd
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH -v2 4/4] x86, efi: Map runtime services 1:1
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] x86, efi: retry ExitBootServices() on failure
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86, efi: retry ExitBootServices() on failure
- From: "Jan Beulich" <JBeulich@xxxxxxxx>
- Re: [PATCH] x86, efi: retry ExitBootServices() on failure
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH] x86, efi: retry ExitBootServices() on failure
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86/efi: Fix dummy variable buffer allocation
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86, efi: retry ExitBootServices() on failure
- From: "Jan Beulich" <JBeulich@xxxxxxxx>
- Re: [PATCH] x86, efi: retry ExitBootServices() on failure
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH] x86/efi: Fix dummy variable buffer allocation
- From: Ben Hutchings <ben@xxxxxxxxxxxxxxx>
- Re: [PATCH] x86, efi: retry ExitBootServices() on failure
- From: joeyli <jlee@xxxxxxxx>
- [GIT PULL] EFI changes for v3.11
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] efi: Convert runtime services function ptrs
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] x86, efi: retry ExitBootServices() on failure
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH] x86, efi: retry ExitBootServices() on failure
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] efi: Convert runtime services function ptrs
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [GIT PULL] EFI urgent fixes
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] Modify UEFI anti-bricking code
- From: Russ Anderson <rja@xxxxxxx>
- Re: [PATCH 4/4] x86, efi: Map runtime services 1:1
- From: Borislav Petkov <bp@xxxxxxxxx>
- [GIT PULL] EFI urgent fixes
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/4] x86, efi: Add an efi= kernel command line parameter
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH 3/4] x86, efi: Add an efi= kernel command line parameter
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 3/4] x86, efi: Add an efi= kernel command line parameter
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH 3/4] x86, efi: Add an efi= kernel command line parameter
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 3/4] x86, efi: Add an efi= kernel command line parameter
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH 3/4] x86, efi: Add an efi= kernel command line parameter
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 3/4] x86, efi: Add an efi= kernel command line parameter
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH 3/4] x86, efi: Add an efi= kernel command line parameter
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 3/4] x86, efi: Add an efi= kernel command line parameter
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH 3/4] x86, efi: Add an efi= kernel command line parameter
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 4/4] x86, efi: Map runtime services 1:1
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH 4/4] x86, efi: Map runtime services 1:1
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 3/4] x86, efi: Add an efi= kernel command line parameter
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH 4/4] x86, efi: Map runtime services 1:1
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH 3/4] x86, efi: Add an efi= kernel command line parameter
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 3/4] x86, efi: Add an efi= kernel command line parameter
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH 4/4] x86, efi: Map runtime services 1:1
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] Modify UEFI anti-bricking code
- From: Russ Anderson <rja@xxxxxxx>
- Re: [PATCH] Modify UEFI anti-bricking code
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] Modify UEFI anti-bricking code
- From: Russ Anderson <rja@xxxxxxx>
- Re: [PATCH 3/4] x86, efi: Add an efi= kernel command line parameter
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/4] x86, cpa: Map in an arbitrary pgd
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 2/4] x86, cpa: Map in an arbitrary pgd
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/4] x86, efi: Map runtime services 1:1
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 3/4] x86, efi: Add an efi= kernel command line parameter
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 2/4] x86, cpa: Map in an arbitrary pgd
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 4/4] x86, efi: Map runtime services 1:1
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/4] x86, efi: Add an efi= kernel command line parameter
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/4] x86, cpa: Map in an arbitrary pgd
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] efi: Convert runtime services function ptrs
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] Modify UEFI anti-bricking code
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] Modify UEFI anti-bricking code
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH] Modify UEFI anti-bricking code
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH] Modify UEFI anti-bricking code
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH] Modify UEFI anti-bricking code
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH] Modify UEFI anti-bricking code
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH] Modify UEFI anti-bricking code
- From: "H. Peter Anvin" <hpa@xxxxxxxxxxxxxxx>
- Re: [PATCH] Modify UEFI anti-bricking code
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] Modify UEFI anti-bricking code
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH] Modify UEFI anti-bricking code
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] Modify UEFI anti-bricking code
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH] Modify UEFI anti-bricking code
- From: "Fleming, Matt" <matt.fleming@xxxxxxxxx>
- Re: [PATCH 3/4] x86, efi: Add an efi= kernel command line parameter
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 0/4] EFI 1:1 mapping
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] Modify UEFI anti-bricking code
- From: Lingzhu Xiang <lxiang@xxxxxxxxxx>
- Re: [PATCH] Modify UEFI anti-bricking code
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH 0/4] EFI 1:1 mapping
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH 0/4] EFI 1:1 mapping
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] EFI 1:1 mapping
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH 0/4] EFI 1:1 mapping
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- RE: [PATCH] efi, pstore: Cocci spatch "memdup.spatch"
- From: "Luck, Tony" <tony.luck@xxxxxxxxx>
- Re: [PATCH 0/4] EFI 1:1 mapping
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH 0/4] EFI 1:1 mapping
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Modify UEFI anti-bricking code
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH 0/4] EFI 1:1 mapping
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH 0/4] EFI 1:1 mapping
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Modify UEFI anti-bricking code
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH 0/4] EFI 1:1 mapping
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH] Modify UEFI anti-bricking code
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH 0/4] EFI 1:1 mapping
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] EFI 1:1 mapping
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] EFI 1:1 mapping
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH 0/4] EFI 1:1 mapping
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH 0/4] EFI 1:1 mapping
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Modify UEFI anti-bricking code
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- Re: [PATCH] efi, pstore: Cocci spatch "memdup.spatch"
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] EFI 1:1 mapping
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 0/4] EFI 1:1 mapping
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH] Modify UEFI anti-bricking code
- From: Russ Anderson <rja@xxxxxxx>
- [PATCH 4/4] x86, efi: Map runtime services 1:1
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH 2/4] x86, cpa: Map in an arbitrary pgd
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH 1/4] efi: Convert runtime services function ptrs
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH 3/4] x86, efi: Add an efi= kernel command line parameter
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH 0/4] EFI 1:1 mapping
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH] Modify UEFI anti-bricking code
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH] efi, pstore: Cocci spatch "memdup.spatch"
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [regression, bisected] x86: efi: Pass boot services variable info to runtime code
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [regression, bisected] x86: efi: Pass boot services variable info to runtime code
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [PATCH] efi, pstore: Cocci spatch "memdup.spatch"
- From: Thomas Meyer <thomas@xxxxxxxx>
- Re: [regression, bisected] x86: efi: Pass boot services variable info to runtime code
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [regression, bisected] x86: efi: Pass boot services variable info to runtime code
- From: Russ Anderson <rja@xxxxxxx>
- Re: [regression, bisected] x86: efi: Pass boot services variable info to runtime code
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [regression, bisected] x86: efi: Pass boot services variable info to runtime code
- From: Jiri Kosina <jkosina@xxxxxxx>
- Re: [regression, bisected] x86: efi: Pass boot services variable info to runtime code
- From: "H. Peter Anvin" <hpa@xxxxxxxxxxxxxxx>
- Re: [regression, bisected] x86: efi: Pass boot services variable info to runtime code
- From: Russ Anderson <rja@xxxxxxx>
- [v3.8] [v3.9] [v3.10] [Regression] efi: be more paranoid about available space when creating variables
- From: Joseph Salisbury <joseph.salisbury@xxxxxxxxxxxxx>
- Re: [regression, bisected] x86: efi: Pass boot services variable info to runtime code
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [regression, bisected] x86: efi: Pass boot services variable info to runtime code
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [regression, bisected] x86: efi: Pass boot services variable info to runtime code
- From: Russ Anderson <rja@xxxxxxx>
- Re: [regression, bisected] x86: efi: Pass boot services variable info to runtime code
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [regression, bisected] x86: efi: Pass boot services variable info to runtime code
- From: "H. Peter Anvin" <hpa@xxxxxxxxxxxxxxx>
- Re: [regression, bisected] x86: efi: Pass boot services variable info to runtime code
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [regression, bisected] x86: efi: Pass boot services variable info to runtime code
- From: "H. Peter Anvin" <hpa@xxxxxxxxxxxxxxx>
- Re: [regression, bisected] x86: efi: Pass boot services variable info to runtime code
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [regression, bisected] x86: efi: Pass boot services variable info to runtime code
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [regression, bisected] x86: efi: Pass boot services variable info to runtime code
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [regression, bisected] x86: efi: Pass boot services variable info to runtime code
- From: Josh Boyer <jwboyer@xxxxxxxxx>
- Re: [regression, bisected] x86: efi: Pass boot services variable info to runtime code
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [regression, bisected] x86: efi: Pass boot services variable info to runtime code
- From: Jiri Kosina <jkosina@xxxxxxx>
- Re: [regression, bisected] x86: efi: Pass boot services variable info to runtime code
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [regression, bisected] x86: efi: Pass boot services variable info to runtime code
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [regression, bisected] x86: efi: Pass boot services variable info to runtime code
- From: joeyli <jlee@xxxxxxxx>
- Re: [regression, bisected] x86: efi: Pass boot services variable info to runtime code
- From: Russ Anderson <rja@xxxxxxx>
- Re: [regression, bisected] x86: efi: Pass boot services variable info to runtime code
- From: Russ Anderson <rja@xxxxxxx>
- Re: [regression, bisected] x86: efi: Pass boot services variable info to runtime code
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [regression, bisected] x86: efi: Pass boot services variable info to runtime code
- From: Jiri Kosina <jkosina@xxxxxxx>
- Re: [regression, bisected] x86: efi: Pass boot services variable info to runtime code
- From: Russ Anderson <rja@xxxxxxx>
- Re: [regression, bisected] x86: efi: Pass boot services variable info to runtime code
- From: Jiri Kosina <jkosina@xxxxxxx>
- Re: [regression, bisected] x86: efi: Pass boot services variable info to runtime code
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [regression, bisected] x86: efi: Pass boot services variable info to runtime code
- From: Russ Anderson <rja@xxxxxxx>
- Re: Unable to set efi boot variables on 3.10-rc3
- From: Felix Braun <Felix.Braun@xxxxxxxxxxxxxx>
- Re: [regression, bisected] x86: efi: Pass boot services variable info to runtime code
- From: joeyli <jlee@xxxxxxxx>
- Re: [regression, bisected] x86: efi: Pass boot services variable info to runtime code
- From: joeyli <jlee@xxxxxxxx>
- Re: [regression, bisected] x86: efi: Pass boot services variable info to runtime code
- From: Jiri Kosina <jkosina@xxxxxxx>
- Re: [regression, bisected] x86: efi: Pass boot services variable info to runtime code
- From: Russ Anderson <rja@xxxxxxx>
- Re: [regression, bisected] x86: efi: Pass boot services variable info to runtime code
- From: Jiri Kosina <jkosina@xxxxxxx>
- Re: [regression, bisected] x86: efi: Pass boot services variable info to runtime code
- From: Russ Anderson <rja@xxxxxxx>
- Re: [regression, bisected] x86: efi: Pass boot services variable info to runtime code
- From: Russ Anderson <rja@xxxxxxx>
- Re: Unable to set efi boot variables on 3.10-rc3
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Unable to set efi boot variables on 3.10-rc3
- From: Felix Braun <Felix.Braun@xxxxxxxxxxxxxx>
- Re: [regression, bisected] x86: efi: Pass boot services variable info to runtime code
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [regression, bisected] x86: efi: Pass boot services variable info to runtime code
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [regression, bisected] x86: efi: Pass boot services variable info to runtime code
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [regression, bisected] x86: efi: Pass boot services variable info to runtime code
- From: Russ Anderson <rja@xxxxxxx>
- Re: [regression, bisected] x86: efi: Pass boot services variable info to runtime code
- From: joeyli <jlee@xxxxxxxx>
- Re: [regression, bisected] x86: efi: Pass boot services variable info to runtime code
- From: joeyli <jlee@xxxxxxxx>
- Re: [regression, bisected] x86: efi: Pass boot services variable info to runtime code
- From: Dave Jones <davej@xxxxxxxxxx>
- Re: [regression, bisected] x86: efi: Pass boot services variable info to runtime code
- From: Russ Anderson <rja@xxxxxxx>
- Re: [regression, bisected] x86: efi: Pass boot services variable info to runtime code
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [regression, bisected] x86: efi: Pass boot services variable info to runtime code
- From: Russ Anderson <rja@xxxxxxx>
- Re: [regression, bisected] x86: efi: Pass boot services variable info to runtime code
- From: Russ Anderson <rja@xxxxxxx>
- Re: [regression, bisected] x86: efi: Pass boot services variable info to runtime code
- From: Robin Holt <holt@xxxxxxx>
- Re: [regression, bisected] x86: efi: Pass boot services variable info to runtime code
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [regression, bisected] x86: efi: Pass boot services variable info to runtime code
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [regression, bisected] x86: efi: Pass boot services variable info to runtime code
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [regression, bisected] x86: efi: Pass boot services variable info to runtime code
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [regression, bisected] x86: efi: Pass boot services variable info to runtime code
- From: Russ Anderson <rja@xxxxxxx>
- Re: [regression, bisected] x86: efi: Pass boot services variable info to runtime code
- From: Russ Anderson <rja@xxxxxxx>
- Re: [PATCH] Print the actual UEFI error name, not just the error code.
- From: Joe Perches <joe@xxxxxxxxxxx>
- [PATCH] Print the actual UEFI error name, not just the error code.
- From: Peter Jones <pjones@xxxxxxxxxx>
- Re: [regression, bisected] x86: efi: Pass boot services variable info to runtime code
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [regression, bisected] x86: efi: Pass boot services variable info to runtime code
- From: Russ Anderson <rja@xxxxxxx>
- [PATCH] x86, efi: retry ExitBootServices() on failure
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [GIT PULL] EFI urgent fixes
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] efivarfs: Never return ENOENT from firmware again
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH] efivarfs: Never return ENOENT from firmware again
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- Re: [PATCH] efivarfs: Never return ENOENT from firmware again
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH] efivar: fix oops in efivar_update_sysfs_entries() caused by memory reuse
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- Re: [PATCH] efivarfs: Never return ENOENT from firmware again
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- [PATCH] efivar: fix oops in efivar_update_sysfs_entries() caused by memory reuse
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- RE: [PATCH v2]Move kzalloc() just before memset() to avoid initializing new sysfs entries
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- Re: [PATCH v2]Move kzalloc() just before memset() to avoid initializing new sysfs entries
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v3]Move kzalloc() inside while(1) to avoid initializing new sysfs entries
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- RE: [PATCH v2]Move kzalloc() just before memset() to avoid initializing new sysfs entries
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- [PATCH v2]Move kzalloc() just before memset() to avoid initializing new sysfs entries
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- RE: [PATCH]Move kzalloc() just before memset() to avoid initializing new sysfs entries wrongly
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- Re: [PATCH]Move kzalloc() just before memset() to avoid initializing new sysfs entries wrongly
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- RE: [PATCH]Move kzalloc() just before memset() to avoid initializing new sysfs entries wrongly
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- Re: [PATCH]Move kzalloc() just before memset() to avoid initializing new sysfs entries wrongly
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH]Move kzalloc() just before memset() to avoid initializing new sysfs entries wrongly
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- [PATCH] efivarfs: Never return ENOENT from firmware again
- From: Lingzhu Xiang <lxiang@xxxxxxxxxx>
- Re: [PATCH] x86, efi: initial the local variable of DataSize to zero
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH] x86, efi: initial the local variable of DataSize to zero
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- Re: unusual uefi call/mapping problem
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: unusual uefi call/mapping problem
- From: Joel Schopp <jschopp@xxxxxxxxxxxxxxxxxx>
- [GIT PULL] EFI merge botch fix
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [GIT PULL] EFI fixes for tip/x86/efi
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] EFI merge botch fix
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: unusual uefi call/mapping problem
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [GIT PULL] EFI merge botch fix
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [patch] efi: remove "kfree(NULL)"
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [patch] efi: locking fix in efivar_entry_set_safe()
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] EFI merge botch fix
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- [patch] efi: remove "kfree(NULL)"
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- [patch] efi: locking fix in efivar_entry_set_safe()
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- [GIT PULL] EFI merge botch fix
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: linux-next: Tree for Apr 26
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- Re: [PATCH] x86, efi: initial the local variable of DataSize to zero
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH] x86, efi: initial the local variable of DataSize to zero
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH] x86, efi: initial the local variable of DataSize to zero
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: linux-next: Tree for Apr 26
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: linux-next: Tree for Apr 26
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- Re: linux-next: Tree for Apr 26
- From: Sedat Dilek <sedat.dilek@xxxxxxxxx>
- Re: linux-next: Tree for Apr 26
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: linux-next: Tree for Apr 26
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: linux-next: Tree for Apr 26
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH] x86, efi: initial the local variable of DataSize to zero
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- Re: [GIT PULL] EFI urgent fix
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] EFI urgent fix
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [GIT PULL] EFI urgent fix
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [GIT PULL] EFI urgent fixes
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] efi: Check EFI revision in setup_efi_vars
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- [PATCH v2] efi: Check EFI revision in setup_efi_vars
- From: Josh Boyer <jwboyer@xxxxxxxxxx>
- Re: [PATCH] efi: Check EFI revision in setup_efi_vars
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH] efi: Check EFI revision in setup_efi_vars
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- Re: [PATCH] efi: Check EFI revision in setup_efi_vars
- From: Josh Boyer <jwboyer@xxxxxxxxxx>
- Re: [PATCH] efi: Check EFI revision in setup_efi_vars
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- [PATCH] efi: Check EFI revision in setup_efi_vars
- From: Josh Boyer <jwboyer@xxxxxxxxxx>
- Re: [PATCH V6 3/3] efi: Distinguish between "remaining space" and actually used space
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH V6 3/3] efi: Distinguish between "remaining space" and actually used space
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH V6 3/3] efi: Distinguish between "remaining space" and actually used space
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH V6 3/3] efi: Distinguish between "remaining space" and actually used space
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH V6 3/3] efi: Distinguish between "remaining space" and actually used space
- From: joeyli <jlee@xxxxxxxx>
- Re: Cannot add new efi boot entry
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH V6 2/3] efi: Pass boot services variable info to runtime code
- From: Paul Bolle <pebolle@xxxxxxxxxx>
- Re: Cannot add new efi boot entry
- From: Jiri Slaby <jslaby@xxxxxxx>
- Re: Cannot add new efi boot entry
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: Cannot add new efi boot entry
- From: joeyli <jlee@xxxxxxxx>
- Re: Cannot add new efi boot entry
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: Cannot add new efi boot entry
- From: Jiri Slaby <jslaby@xxxxxxx>
- Re: [GIT PULL] EFI fixes for v3.10
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [GIT PULL] EFI fixes for v3.10
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- [GIT PULL] EFI fixes for v3.10
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] Remove warning in efi_enter_virtual_mode
- From: Josh Boyer <jwboyer@xxxxxxxxxx>
- Re: [PATCH] Remove warning in efi_enter_virtual_mode V2
- From: "Bryan O'Donoghue" <bryan.odonoghue.lkml@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] Remove warning in efi_enter_virtual_mode
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] Remove warning in efi_enter_virtual_mode V2
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH] Remove warning in efi_enter_virtual_mode V2
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Remove warning in efi_enter_virtual_mode V2
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH] Remove warning in efi_enter_virtual_mode V2
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Remove warning in efi_enter_virtual_mode
- From: Darren Hart <darren.hart@xxxxxxxxx>
- Re: [PATCH] Remove warning in efi_enter_virtual_mode
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH] Remove warning in efi_enter_virtual_mode
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH] Remove warning in efi_enter_virtual_mode
- From: Josh Triplett <josh@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Remove warning in efi_enter_virtual_mode
- From: "Bryan O'Donoghue" <bryan.odonoghue.lkml@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] Remove warning in efi_enter_virtual_mode
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH] Remove warning in efi_enter_virtual_mode
- From: Darren Hart <darren.hart@xxxxxxxxx>
- Re: [PATCH] Remove warning in efi_enter_virtual_mode
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH] Remove warning in efi_enter_virtual_mode
- From: Darren Hart <darren.hart@xxxxxxxxx>
- Re: [PATCH] Remove warning in efi_enter_virtual_mode
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH] Remove warning in efi_enter_virtual_mode
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH] Remove warning in efi_enter_virtual_mode
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- EFI phys_prelog, run a physical address directly in kernel space with efi api.
- From: leosilva <leosilva@xxxxxxxxxxxxxxxxxx>
- Re: Cannot add new efi boot entry
- From: Jiri Slaby <jslaby@xxxxxxx>
- Re: [PATCH] Remove warning in efi_enter_virtual_mode
- From: Josh Triplett <josh@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Remove warning in efi_enter_virtual_mode
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH] Remove warning in efi_enter_virtual_mode
- From: Josh Triplett <josh@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Remove warning in efi_enter_virtual_mode
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [GIT PULL] EFI efivars.c dissection
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] Remove warning in efi_enter_virtual_mode
- From: Josh Boyer <jwboyer@xxxxxxxxxx>
- Re: [PATCH] Remove warning in efi_enter_virtual_mode
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH] Remove warning in efi_enter_virtual_mode
- From: Darren Hart <darren.hart@xxxxxxxxx>
- Re: [PATCH] Remove warning in efi_enter_virtual_mode
- From: Josh Boyer <jwboyer@xxxxxxxxxx>
- Re: [PATCH] Remove warning in efi_enter_virtual_mode
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH] Remove warning in efi_enter_virtual_mode V2
- From: "Bryan O'Donoghue" <bryan.odonoghue.lkml@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] Remove warning in efi_enter_virtual_mode
- From: "Bryan O'Donoghue" <bryan.odonoghue.lkml@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86,efi: Implement efi_no_storage_paranoia parameter
- From: Richard Weinberger <richard@xxxxxx>
- Re: [PATCH] x86,efi: Implement efi_no_storage_paranoia parameter
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: Cannot add new efi boot entry
- From: joeyli <jlee@xxxxxxxx>
- Re: Cannot add new efi boot entry
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: Cannot add new efi boot entry
- From: joeyli <jlee@xxxxxxxx>
- Re: Cannot add new efi boot entry
- From: Jiri Slaby <jslaby@xxxxxxx>
- Re: [PATCH] Remove warning in efi_enter_virtual_mode
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/6] Chainsaw efivars.c
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH v3 0/6] Chainsaw efivars.c
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH v3 3/6] efivars: efivar_entry API
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH 4/6] efivars: Move pstore code into the new EFI directory
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH 5/6] efivarfs: Move to fs/efivarfs
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH 2/6] efivars: Keep a private global pointer to efivars
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH 1/6] efi: move utf16 string functions to efi.h
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: Cannot add new efi boot entry
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH V6 3/3] efi: Distinguish between "remaining space" and actually used space
- From: Lingzhu Xiang <lxiang@xxxxxxxxxx>
- Re: [PATCH] x86,efi: Implement efi_no_storage_paranoia parameter
- From: Richard Weinberger <richard@xxxxxx>
- Re: unusual uefi call/mapping problem
- From: Joel Schopp <jschopp@xxxxxxxxxxxxxxxxxx>
- Re: unusual uefi call/mapping problem
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 01/28] Include missing linux/slab.h inclusions [RFC]
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/6] Chainsaw efivars.c
- From: Tom Gundersen <teg@xxxxxxx>
- Re: [PATCH] x86,efi: Implement efi_no_storage_paranoia parameter
- From: Jiri Kosina <jkosina@xxxxxxx>
- [PATCH] x86,efi: Implement efi_no_storage_paranoia parameter
- From: Richard Weinberger <richard@xxxxxx>
- [PATCH 5/6] efivarfs: Move to fs/efivarfs
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH 4/6] efivars: Move pstore code into the new EFI directory
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH v2 3/6] efivars: efivar_entry API
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH v2 2/6] efivars: Keep a private global pointer to efivars
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH v2 1/6] efi: move utf16 string functions to efi.h
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH v2 0/6] Chainsaw efivars.c
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- unusual uefi call/mapping problem
- From: Joel Schopp <jschopp@xxxxxxxxxxxxxxxxxx>
- [PATCH 02/28] Include missing linux/magic.h inclusions [RFC]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 01/28] Include missing linux/slab.h inclusions [RFC]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 2/2] efi: Export efi_query_variable_store() for efivars.ko
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- Re: [PATCH 1/2] x86/Kconfig: Make EFI select UCS2_STRING
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- [PATCH] Remove warning in efi_enter_virtual_mode
- From: "Bryan O'Donoghue" <bryan.odonoghue.lkml@xxxxxxxxxxxxxxxxx>
- [PATCH 2/2] efi: Export efi_query_variable_store() for efivars.ko
- From: Sergey Vlasov <vsu@xxxxxxxxxxx>
- [PATCH 1/2] x86/Kconfig: Make EFI select UCS2_STRING
- From: Sergey Vlasov <vsu@xxxxxxxxxxx>
- Re: Fix UEFI variable paranoia
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: Cannot add new efi boot entry
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- Re: Cannot add new efi boot entry
- From: joeyli <jlee@xxxxxxxx>
- [PATCH V6 1/3] Move utf16 functions to kernel core and rename
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH V6 2/3] efi: Pass boot services variable info to runtime code
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH V6 3/3] efi: Distinguish between "remaining space" and actually used space
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Fix UEFI variable paranoia
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH V5 2/2] efi: Distinguish between "remaining space" and actually used space
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH V5 1/2] efi: Pass boot services variable info to runtime code
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Cannot add new efi boot entry
- From: Jiri Slaby <jslaby@xxxxxxx>
- RE: EFI pstore: BUG: scheduling while atomic, and possible circular locking dependency
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- Re: [PATCH V4 1/3] efi: Determine how much space is used by boot services-only variables
- From: Lingzhu Xiang <lxiang@xxxxxxxxxx>
- Re: EFI pstore: BUG: scheduling while atomic, and possible circular locking dependency
- From: Lingzhu Xiang <lxiang@xxxxxxxxxx>
- Re: [PATCH V4 1/3] efi: Determine how much space is used by boot services-only variables
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- Re: [PATCH V4 1/3] efi: Determine how much space is used by boot services-only variables
- From: Lingzhu Xiang <lxiang@xxxxxxxxxx>
- Re: [PATCH 2/2] x86,efi: Implement no_storage_paranoia parameter
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- Re: [PATCH 1/2] x86,efi: Check max_size only if it is non-zero.
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- Re: [PATCH 3/6] efivars: efivar_entry API
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH V4 2/3] Revert "x86, efivars: firmware bug workarounds should be in platform code"
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH V4 2/3] Revert "x86, efivars: firmware bug workarounds should be in platform code"
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/6] efivars: Keep a private global pointer to efivars
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH V4 1/3] efi: Determine how much space is used by boot services-only variables
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH V4 2/3] Revert "x86, efivars: firmware bug workarounds should be in platform code"
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH V4 3/3] efi: Distinguish between "remaining space" and actually used space
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- RE: [PATCH 3/6] efivars: efivar_entry API
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- Re: [PATCH 1/6] efi: move utf16 string functions to efi.h
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH 2/2] x86,efi: Implement no_storage_paranoia parameter
- From: Richard Weinberger <richard@xxxxxx>
- [PATCH 1/2] x86,efi: Check max_size only if it is non-zero.
- From: Richard Weinberger <richard@xxxxxx>
- Re: [PATCH 3/3] efi: Distinguish between "remaining space" and actually used space
- From: Lingzhu Xiang <lxiang@xxxxxxxxxx>
- [PATCH 3/3] efi: Distinguish between "remaining space" and actually used space
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH 2/3] Revert "x86, efivars: firmware bug workarounds should be in platform code"
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH 1/3] efi: Determine how much space is used by boot services-only variables
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH 2/6] efivars: Keep a private global pointer to efivars
- From: Mike Waychison <mikew@xxxxxxxxxx>
- Re: [PATCH 1/6] efi: move utf16 string functions to efi.h
- From: Mike Waychison <mikew@xxxxxxxxxx>
- Re: [PATCH 0/6] Chainsaw efivars.c
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- Re: [PATCH 0/6] Chainsaw efivars.c
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH 2/2] efivars: Implement no_storage_paranoia parameter
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [GIT PULL] EFI changes for v3.9
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: Patch "efi: Build EFI stub with EFI-appropriate options" has been added to the 3.6-stable tree
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH 2/2] efivars: Implement no_storage_paranoia parameter
- From: Richard Weinberger <richard@xxxxxx>
- [PATCH v2 1/2] efivars: Check max_size only if it is non-zero.
- From: Richard Weinberger <richard@xxxxxx>
- Re: [PATCH 1/2] efivars: Check max_size only if it is non-zero.
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- Re: [PATCH 1/2] efivars: Check max_size only if it is non-zero.
- From: Richard Weinberger <richard@xxxxxx>
- RE: [PATCH 1/2] efivars: Check max_size only if it is non-zero.
- From: "Luck, Tony" <tony.luck@xxxxxxxxx>
- [PATCH 2/2] efivars: Implement no_storage_paranoia parameter
- From: Richard Weinberger <richard@xxxxxx>
- [PATCH 1/2] efivars: Check max_size only if it is non-zero.
- From: Richard Weinberger <richard@xxxxxx>
- [PATCH 4/6] efivars: Move pstore code into the new EFI directory
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH 5/6] efivarfs: Move to fs/efivarfs
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH 0/6] Chainsaw efivars.c
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH 3/6] efivars: efivar_entry API
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH 2/6] efivars: Keep a private global pointer to efivars
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH 1/6] efi: move utf16 string functions to efi.h
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] efi: Distinguish between "remaining space" and actually used space
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH 2/2] efi: Distinguish between "remaining space" and actually used space
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] efi: Distinguish between "remaining space" and actually used space
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH 1/2] efi: Determine how much space is used by boot services-only variables
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH 2/2] efi: Distinguish between "remaining space" and actually used space
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] efi: Determine how much space is used by boot services-only variables
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: Patch "efi: Build EFI stub with EFI-appropriate options" has been added to the 3.6-stable tree
- From: Daniel Vacek <neelx.g@xxxxxxxxx>
- Re: Patch "efi: Build EFI stub with EFI-appropriate options" has been added to the 3.6-stable tree
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] efi: Distinguish between "remaining space" and actually used space
- From: Ben Hutchings <ben@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] efi: Determine how much space is used by boot services-only variables
- From: Ben Hutchings <ben@xxxxxxxxxxxxxxx>
- [PATCH 1/2] efi: Determine how much space is used by boot services-only variables
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH 2/2] efi: Distinguish between "remaining space" and actually used space
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: efi: be more paranoid about available space when creating variables
- From: Ben Hutchings <ben@xxxxxxxxxxxxxxx>
- Re: Patch "efi: Build EFI stub with EFI-appropriate options" has been added to the 3.6-stable tree
- From: Daniel Vacek <neelx.g@xxxxxxxxx>
- Re: Patch "efi: Build EFI stub with EFI-appropriate options" has been added to the 3.6-stable tree
- From: Ben Hutchings <ben@xxxxxxxxxxxxxxx>
- Re: [PATCH 05/12] PCI: Require CAP_COMPROMISE_KERNEL for PCI BAR access
- From: Josh Boyer <jwboyer@xxxxxxxxx>
- Re: [PATCH 05/12] PCI: Require CAP_COMPROMISE_KERNEL for PCI BAR access
- From: Kyle McMartin <kmcmarti@xxxxxxxxxx>
- Re: [PATCH 05/12] PCI: Require CAP_COMPROMISE_KERNEL for PCI BAR access
- From: Josh Boyer <jwboyer@xxxxxxxxx>
- Re: efi: be more paranoid about available space when creating variables
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: efi: be more paranoid about available space when creating variables
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- RE: efi: be more paranoid about available space when creating variables
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- Re: efi: be more paranoid about available space when creating variables
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: efi: be more paranoid about available space when creating variables
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: efi: be more paranoid about available space when creating variables
- From: Lingzhu Xiang <lxiang@xxxxxxxxxx>
- Re: efi: be more paranoid about available space when creating variables
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: efi: be more paranoid about available space when creating variables
- From: Ben Hutchings <ben@xxxxxxxxxxxxxxx>
- Re: efi: be more paranoid about available space when creating variables
- From: Lingzhu Xiang <lxiang@xxxxxxxxxx>
- Re: efi: be more paranoid about available space when creating variables
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: efi: be more paranoid about available space when creating variables
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- Re: efi: be more paranoid about available space when creating variables
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: efi: be more paranoid about available space when creating variables
- From: "Fleming, Matt" <matt.fleming@xxxxxxxxx>
- Re: [PATCH] efivars: Fix check for CONFIG_EFI_VARS_PSTORE_DEFAULT_DISABLE
- From: Paul Bolle <pebolle@xxxxxxxxxx>
- Re: [PATCH] efivars: Fix check for CONFIG_EFI_VARS_PSTORE_DEFAULT_DISABLE
- From: Ben Hutchings <ben@xxxxxxxxxxxxxxx>
- Re: [PATCH] efivars: Fix check for CONFIG_EFI_VARS_PSTORE_DEFAULT_DISABLE
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- Re: [PATCH] efivars: Fix check for CONFIG_EFI_VARS_PSTORE_DEFAULT_DISABLE
- From: Paul Bolle <pebolle@xxxxxxxxxx>
- [PATCH] efivars: Fix check for CONFIG_EFI_VARS_PSTORE_DEFAULT_DISABLE
- From: Ben Hutchings <ben@xxxxxxxxxxxxxxx>
- Re: [PATCH 01/12] Security: Add CAP_COMPROMISE_KERNEL
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH 01/12] Security: Add CAP_COMPROMISE_KERNEL
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH 01/12] Security: Add CAP_COMPROMISE_KERNEL
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 01/12] Security: Add CAP_COMPROMISE_KERNEL
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH 01/12] Security: Add CAP_COMPROMISE_KERNEL
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 01/12] Security: Add CAP_COMPROMISE_KERNEL
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH 01/12] Security: Add CAP_COMPROMISE_KERNEL
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 01/12] Security: Add CAP_COMPROMISE_KERNEL
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- [GIT PULL] EFI changes for v3.9-rc3
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: sysfs: cannot create duplicate filename
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: sysfs: cannot create duplicate filename
- From: Lingzhu Xiang <lxiang@xxxxxxxxxx>
- Re: [PATCH 01/12] Security: Add CAP_COMPROMISE_KERNEL
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 01/12] Security: Add CAP_COMPROMISE_KERNEL
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH 01/12] Security: Add CAP_COMPROMISE_KERNEL
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 01/12] Security: Add CAP_COMPROMISE_KERNEL
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH 01/12] Security: Add CAP_COMPROMISE_KERNEL
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 01/12] Security: Add CAP_COMPROMISE_KERNEL
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH 01/12] Security: Add CAP_COMPROMISE_KERNEL
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 01/12] Security: Add CAP_COMPROMISE_KERNEL
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: efivarfs: Bad directory entry when variable has / in name
- Re: [PATCH 01/12] Security: Add CAP_COMPROMISE_KERNEL
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH 01/12] Security: Add CAP_COMPROMISE_KERNEL
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 01/12] Security: Add CAP_COMPROMISE_KERNEL
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH 01/12] Security: Add CAP_COMPROMISE_KERNEL
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH 01/12] Security: Add CAP_COMPROMISE_KERNEL
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH] x86/efi: pull NV+BS variables out before we exit boot services
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH] x86/efi: pull NV+BS variables out before we exit boot services
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: EFI: Stash ROMs if they're not in the PCI BAR
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: EFI: Stash ROMs if they're not in the PCI BAR
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: EFI: Stash ROMs if they're not in the PCI BAR
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: efivarfs: Bad directory entry when variable has / in name
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86/efi: pull NV+BS variables out before we exit boot services
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 01/12] Security: Add CAP_COMPROMISE_KERNEL
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 01/12] Security: Add CAP_COMPROMISE_KERNEL
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH 01/12] Security: Add CAP_COMPROMISE_KERNEL
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 01/12] Security: Add CAP_COMPROMISE_KERNEL
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH 01/12] Security: Add CAP_COMPROMISE_KERNEL
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- RE: [PATCH] efivar: Disable get_next_variable when firmware is broken
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- Re: [PATCH 01/12] Security: Add CAP_COMPROMISE_KERNEL
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH 01/12] Security: Add CAP_COMPROMISE_KERNEL
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH 01/12] Security: Add CAP_COMPROMISE_KERNEL
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH 01/12] Security: Add CAP_COMPROMISE_KERNEL
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH 01/12] Security: Add CAP_COMPROMISE_KERNEL
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH 06/12] x86: Require CAP_COMPROMISE_KERNEL for IO port access
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH 01/12] Security: Add CAP_COMPROMISE_KERNEL
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH 01/12] Security: Add CAP_COMPROMISE_KERNEL
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH 06/12] x86: Require CAP_COMPROMISE_KERNEL for IO port access
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH] x86/efi: pull NV+BS variables out before we exit boot services
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH] x86/efi: pull NV+BS variables out before we exit boot services
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] efivar: Disable get_next_variable when firmware is broken
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] efivar: Disable get_next_variable when firmware is broken
- From: Mike Waychison <mikew@xxxxxxxxxx>
- [PATCH] efivar: Disable get_next_variable when firmware is broken
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- efivarfs: Bad directory entry when variable has / in name
- Re: [PATCH] x86/efi: pull NV+BS variables out before we exit boot services
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH] x86/efi: pull NV+BS variables out before we exit boot services
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86/efi: pull NV+BS variables out before we exit boot services
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH] x86/efi: pull NV+BS variables out before we exit boot services
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86/efi: pull NV+BS variables out before we exit boot services
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH] x86/efi: pull NV+BS variables out before we exit boot services
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v2] acpi: Ignore acpi_rsdp kernel parameter in a secure boot environment
- From: Josh Boyer <jwboyer@xxxxxxxxxx>
- Re: [PATCH] x86/efi: pull NV+BS variables out before we exit boot services
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: sysfs: cannot create duplicate filename
- From: Lingzhu Xiang <lxiang@xxxxxxxxxx>
- RE: sysfs: cannot create duplicate filename
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- Re: sysfs: cannot create duplicate filename
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- RE: sysfs: cannot create duplicate filename
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- Re: [PATCH 10/12] acpi: Ignore acpi_rsdp kernel parameter in a secure boot environment
- From: Josh Boyer <jwboyer@xxxxxxxxxx>
- Re: sysfs: cannot create duplicate filename
- From: Lingzhu Xiang <lxiang@xxxxxxxxxx>
- Re: [PATCH 10/12] acpi: Ignore acpi_rsdp kernel parameter in a secure boot environment
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH] x86/efi: pull NV+BS variables out before we exit boot services
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 01/12] Security: Add CAP_COMPROMISE_KERNEL
- From: Yves-Alexis Perez <corsac@xxxxxxxxxx>
- Re: [PATCH 01/12] Security: Add CAP_COMPROMISE_KERNEL
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] x86/efi: pull NV+BS variables out before we exit boot services
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- [PATCH 12/12] kexec: Require CAP_SYS_COMPROMISE_KERNEL
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH 11/12] x86: Require CAP_COMPROMISE_KERNEL for MSR writing
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH 04/12] efi: Enable secure boot lockdown automatically when enabled in firmware
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH 02/12] SELinux: define mapping for CAP_COMPROMISE_KERNEL
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH 05/12] PCI: Require CAP_COMPROMISE_KERNEL for PCI BAR access
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH 03/12] Secure boot: Add a dummy kernel parameter that will switch on Secure Boot mode
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH 06/12] x86: Require CAP_COMPROMISE_KERNEL for IO port access
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH 07/12] ACPI: Limit access to custom_method
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH 01/12] Security: Add CAP_COMPROMISE_KERNEL
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH 08/12] asus-wmi: Restrict debugfs interface
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH 09/12] Require CAP_COMPROMISE_KERNEL for /dev/mem and /dev/kmem access
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH 10/12] acpi: Ignore acpi_rsdp kernel parameter in a secure boot environment
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: Curious crash with secure variables
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: Curious crash with secure variables
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: EFI: Stash ROMs if they're not in the PCI BAR
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: Curious crash with secure variables
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH] efivarfs: fix abnormal GUID in variable name by using strcpy to replace null with dash
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: Curious crash with secure variables
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: Curious crash with secure variables
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: Curious crash with secure variables
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: sysfs: cannot create duplicate filename
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: Curious crash with secure variables
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: Curious crash with secure variables
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: Curious crash with secure variables
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: EFI: Stash ROMs if they're not in the PCI BAR
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH] x86/efi: pull NV+BS variables out before we exit boot services
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Curious crash with secure variables
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: EFI: Stash ROMs if they're not in the PCI BAR
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- re: EFI: Stash ROMs if they're not in the PCI BAR
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- RE: sysfs: cannot create duplicate filename
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- Re: sysfs: cannot create duplicate filename
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] efivars: Allow disabling use as a pstore backend
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- Re: [PATCH] efivars: Allow disabling use as a pstore backend
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- Re: [PATCH] efivars: Allow disabling use as a pstore backend
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- Re: [PATCH] efivars: Allow disabling use as a pstore backend
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH] efivars: Allow disabling use as a pstore backend
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- Re: [PATCH] efivars: Allow disabling use as a pstore backend
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- Re: sysfs: cannot create duplicate filename
- From: Lingzhu Xiang <lxiang@xxxxxxxxxx>
- Re: [PATCH] efivars: Allow disabling use as a pstore backend
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- Re: [PATCH] efivars: Allow disabling use as a pstore backend
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- RE: sysfs: cannot create duplicate filename
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- Re: sysfs: cannot create duplicate filename
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: sysfs: cannot create duplicate filename
- From: Andre Heider <a.heider@xxxxxxxxx>
- Re: sysfs: cannot create duplicate filename
- From: Lingzhu Xiang <lxiang@xxxxxxxxxx>
- Re: sysfs: cannot create duplicate filename
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] efivars: allow efi pstore variable when validate filename
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH] efivars: Allow disabling use as a pstore backend
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH] efivars: allow efi pstore variable when validate filename
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH] efivars: allow efi pstore variable when validate filename
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- Re: [PATCH] efivarfs: fix abnormal GUID in variable name by using strcpy to replace null with dash
- From: joeyli <jlee@xxxxxxxx>
- Re: sysfs: cannot create duplicate filename
- From: Lingzhu Xiang <lxiang@xxxxxxxxxx>
- Re: sysfs: cannot create duplicate filename
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] efivarfs: fix abnormal GUID in variable name by using strcpy to replace null with dash
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH] efivars: Allow disabling use as a pstore backend
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH] efivars: Allow disabling use as a pstore backend
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- Re: [PATCH] efivars: Allow disabling use as a pstore backend
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- Re: [PATCH] efivars: Allow disabling use as a pstore backend
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- [PATCH] efivars: Allow disabling use as a pstore backend
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- Re: Problem mounting efivarfs in 3.9
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- Re: [PATCH] efivarfs: loosen restriction on valid names
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- [PATCH] efivarfs: loosen restriction on valid names
- From: Maarten Lankhorst <maarten.lankhorst@xxxxxxxxxxxxx>
- Re: Problem mounting efivarfs in 3.9
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- Re: Problem mounting efivarfs in 3.9
- Problem mounting efivarfs in 3.9
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- Re: [PATCH] efivarfs: fix abnormal GUID in variable name by using strcpy to replace null with dash
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH] efivarfs: fix abnormal GUID in variable name by using strcpy to replace null with dash
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] efivarfs: fix abnormal GUID in variable name by using strcpy to replace null with dash
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] efivarfs: fix abnormal GUID in variable name by using strcpy to replace null with dash
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH] efivarfs: fix abnormal GUID in variable name by using strcpy to replace null with dash
- From: joeyli <jlee@xxxxxxxx>
- [GIT PULL] EFI changes for v3.9-rc2
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: sysfs: cannot create duplicate filename
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] efivarfs: fix abnormal GUID in variable name by using strcpy to replace null with dash
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: sysfs: cannot create duplicate filename
- Re: [PATCH] efivarfs: fix abnormal GUID in variable name by using strcpy to replace null with dash
- From: Frederic Crozat <fcrozat@xxxxxxxx>
- Re: sysfs: cannot create duplicate filename
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] efivarfs: fix abnormal GUID in variable name by using strcpy to replace null with dash
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] efivarfs: fix abnormal GUID in variable name by using strcpy to replace null with dash
- From: Frederic Crozat <fcrozat@xxxxxxxx>
- Re: [PATCH] efivarfs: fix abnormal GUID in variable name by using strcpy to replace null with dash
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] efivarfs: fix abnormal GUID in variable name by using strcpy to replace null with dash
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] efivarfs: fix abnormal GUID in variable name by using strcpy to replace null with dash
- From: Lingzhu Xiang <lxiang@xxxxxxxxxx>
- Re: efivarfs: guid part of filenames are case-insensitive is broken
- From: Lingzhu Xiang <lxiang@xxxxxxxxxx>
- Re: [PATCH] efivarfs: fix abnormal GUID in variable name by using strcpy to replace null with dash
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH] efivarfs: fix abnormal GUID in variable name by using strcpy to replace null with dash
- From: joeyli <jlee@xxxxxxxx>
- Re: efivarfs: guid part of filenames are case-insensitive is broken
- From: Joseph Yasi <joe.yasi@xxxxxxxxx>
- Re: efivarfs: guid part of filenames are case-insensitive is broken
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- Re: sysfs: cannot create duplicate filename
- From: Lingzhu Xiang <lxiang@xxxxxxxxxx>
- Re: efivarfs: guid part of filenames are case-insensitive is broken
- From: Lingzhu Xiang <lxiang@xxxxxxxxxx>
- efivarfs: guid part of filenames are case-insensitive is broken
- From: Joseph Yasi <joe.yasi@xxxxxxxxx>
- Re: [PATCH] efi: be more paranoid about available space when creating variables
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- [PATCH] efi: be more paranoid about available space when creating variables
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- sysfs: cannot create duplicate filename
- From: Andre Heider <a.heider@xxxxxxxxx>
- Re: EFI runtime and kexec
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: EFI runtime and kexec
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: EFI runtime and kexec
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: EFI runtime and kexec
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: EFI runtime and kexec
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: EFI runtime and kexec
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH] efivarfs: fix abnormal GUID in variable name by using strcpy to replace null with dash
- From: joeyli <jlee@xxxxxxxx>
- Re: EFI runtime and kexec
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: EFI runtime and kexec
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: EFI runtime and kexec
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: EFI runtime and kexec
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: EFI runtime and kexec
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: EFI runtime and kexec
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: EFI runtime and kexec
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: EFI runtime and kexec
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH v5] efi: split efisubsystem from efivars
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- Re: [PATCH] efivarfs: fix abnormal GUID in variable name by using strcpy to replace null with dash
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] efivarfs: convert to use simple_open()
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- Re: [PATCH] efivarfs: fix abnormal GUID in variable name by using strcpy to replace null with dash
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] efivarfs: fix abnormal GUID in variable name by using strcpy to replace null with dash
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH] efivarfs: fix abnormal GUID in variable name by using strcpy to replace null with dash
- From: Lingzhu Xiang <lxiang@xxxxxxxxxx>
[Index of Archives]
[Linux Kernel Development]
[Security]
[Linux ARM Kernel]
[Tools]
[Linux MIPS]
[Linux S390]
[Bugtraq]
[Share Photos]>
[Fedora ARM]