Linux EFI/UEFI Development
[Prev Page][Next Page]
- Re: [PATCH] efivarfs: fix abnormal GUID in variable name by using strcpy to replace null with dash
- From: Lingzhu Xiang <lxiang@xxxxxxxxxx>
- [PATCH] efivarfs: fix abnormal GUID in variable name by using strcpy to replace null with dash
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- Re: [RFE PATCH 2/2] rtc, add write functionality to sysfs
- From: John Stultz <john.stultz@xxxxxxxxxx>
- Re: [RFE PATCH 2/2] rtc, add write functionality to sysfs
- From: Prarit Bhargava <prarit@xxxxxxxxxx>
- Re: [PATCH] efivars: Make efivarfs autoloading on mount request
- From: Tom Gundersen <teg@xxxxxxx>
- Re: [PATCH] efivars: Make efivarfs autoloading on mount request
- From: James Bottomley <jbottomley@xxxxxxxxxxxxx>
- Re: [PATCH] efivars: Make efivarfs autoloading on mount request
- From: Tom Gundersen <teg@xxxxxxx>
- [PATCH] efivars: Make efivarfs autoloading on mount request
- From: James Bottomley <jbottomley@xxxxxxxxxxxxx>
- [PATCH v5] efi: split efisubsystem from efivars
- From: Tom Gundersen <teg@xxxxxxx>
- [PATCH -next] efivarfs: convert to use simple_open()
- From: Wei Yongjun <weiyj.lk@xxxxxxxxx>
- Re: [PATCH] x86, efi: Mark disable_runtime as __initdata
- From: Satoru Takeuchi <takeuchi_satoru@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] efi: register efivars with efi or gsmi from module_init
- From: Tom Gundersen <teg@xxxxxxx>
- Re: [RFE PATCH 1/2] x86, rtc, ntp, Do full rtc synchronization with ntp
- From: Alessandro Zummo <a.zummo@xxxxxxxxxxxx>
- Re: [RFE PATCH 2/2] rtc, add write functionality to sysfs
- From: Alessandro Zummo <a.zummo@xxxxxxxxxxxx>
- Re: [RFE PATCH 1/2] x86, rtc, ntp, Do full rtc synchronization with ntp
- From: Prarit Bhargava <prarit@xxxxxxxxxx>
- Re: [RFE PATCH 2/2] rtc, add write functionality to sysfs
- From: Prarit Bhargava <prarit@xxxxxxxxxx>
- Re: [RFE PATCH 2/2] rtc, add write functionality to sysfs
- From: Alessandro Zummo <a.zummo@xxxxxxxxxxxx>
- Re: [RFE PATCH 2/2] rtc, add write functionality to sysfs
- From: John Stultz <john.stultz@xxxxxxxxxx>
- Re: [RFE PATCH 2/2] rtc, add write functionality to sysfs
- From: Prarit Bhargava <prarit@xxxxxxxxxx>
- Re: [RFE PATCH 2/2] rtc, add write functionality to sysfs
- From: John Stultz <john.stultz@xxxxxxxxxx>
- Re: [RFE PATCH 1/2] x86, rtc, ntp, Do full rtc synchronization with ntp
- From: John Stultz <john.stultz@xxxxxxxxxx>
- [PATCH] x86, efi: Mark disable_runtime as __initdata
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH V3] ia64/mm: fix a bad_page bug when crash kernel booting
- From: Tony Luck <tony.luck@xxxxxxxxx>
- Re: [PATCH 2/2] efi: rename the efivars module
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- Re: [PATCH 1/2] efi: register efivars with efi or gsmi from module_init
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- Re: [PATCH v4] efi: split efisubsystem from efivars
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- Re: [PATCH v4] efi: split efisubsystem from efivars
- From: Tom Gundersen <teg@xxxxxxx>
- Re: [PATCH v4] efi: split efisubsystem from efivars
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- [PATCH v2] x86, efi: Make "noefi" really disable EFI runtime serivces
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86, efi: Make "noefi" really disable EFI runtime serivces
- From: "H. Peter Anvin" <hpa@xxxxxxxxxxxxxxx>
- Re: [PATCH] x86, efi: Make "noefi" really disable EFI runtime serivces
- From: Satoru Takeuchi <takeuchi_satoru@xxxxxxxxxxxxxx>
- [PATCH] x86, efi: Make "noefi" really disable EFI runtime serivces
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 10/15] acpi: Ignore acpi_rsdp kernel parameter in a secure boot environment
- From: Josh Boyer <jwboyer@xxxxxxxxxx>
- Re: [PATCH V3] ia64/mm: fix a bad_page bug when crash kernel booting
- From: Xishi Qiu <qiuxishi@xxxxxxxxxx>
- Re: [PATCH V3] ia64/mm: fix a bad_page bug when crash kernel booting
- From: Tony Luck <tony.luck@xxxxxxxxx>
- RE: [PATCH V3] ia64/mm: fix a bad_page bug when crash kernel booting
- From: "Luck, Tony" <tony.luck@xxxxxxxxx>
- [PATCH 2/2] efi: rename the efivars module
- From: Tom Gundersen <teg@xxxxxxx>
- [PATCH 1/2] efi: register efivars with efi or gsmi from module_init
- From: Tom Gundersen <teg@xxxxxxx>
- Re: [PATCH 00/15] Secure boot policy support
- From: Yves-Alexis Perez <corsac@xxxxxxxxxx>
- Re: [PATCH 10/15] acpi: Ignore acpi_rsdp kernel parameter in a secure boot environment
- From: Dave Young <hidave.darkstar@xxxxxxxxx>
- [PATCH v4] efi: split efisubsystem from efivars
- From: Tom Gundersen <teg@xxxxxxx>
- Re: [PATCH] efi: split efisubsystem from efivars
- From: Tom Gundersen <teg@xxxxxxx>
- Re: [PATCH] efi: split efisubsystem from efivars
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- Re: [PATCH V3] ia64/mm: fix a bad_page bug when crash kernel booting
- From: Xishi Qiu <qiuxishi@xxxxxxxxxx>
- Re: [PATCH 2/2 v2] efivarfs: guid part of filenames are case-insensitive
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2 v2] efivarfs: guid part of filenames are case-insensitive
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [RFE PATCH 1/2] x86, rtc, ntp, Do full rtc synchronization with ntp
- From: Prarit Bhargava <prarit@xxxxxxxxxx>
- [RFE PATCH 2/2] rtc, add write functionality to sysfs
- From: Prarit Bhargava <prarit@xxxxxxxxxx>
- [RFE PATCH 0/2] x86, rtc, ntp, Enable full rtc synchronization
- From: Prarit Bhargava <prarit@xxxxxxxxxx>
- Re: [PATCH 2/2 v2] efivarfs: guid part of filenames are case-insensitive
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86, efi: remove duplicate code in setup_arch() by using, efi_is_native()
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- Re: [PATCH] efi: Clear EFI_RUNTIME_SERVICES rather than EFI_BOOT by "noefi" boot parameter
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- Re: [PATCH] x86: Lock down MSR writing in secure boot
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH] x86: Lock down MSR writing in secure boot
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] efi: Clear EFI_RUNTIME_SERVICES rather than EFI_BOOT by "noefi" boot parameter
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH] x86: Lock down MSR writing in secure boot
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH] x86: Lock down MSR writing in secure boot
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH] x86: Lock down MSR writing in secure boot
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] x86: Lock down MSR writing in secure boot
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- [PATCH] efi: Clear EFI_RUNTIME_SERVICES rather than EFI_BOOT by "noefi" boot parameter
- From: Satoru Takeuchi <takeuchi_satoru@xxxxxxxxxxxxxx>
- [PATCH] x86, efi: remove duplicate code in setup_arch() by using, efi_is_native()
- From: Satoru Takeuchi <takeuchi_satoru@xxxxxxxxxxxxxx>
- Re: [PATCH] x86: Lock down MSR writing in secure boot
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] x86: Lock down MSR writing in secure boot
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH] x86: Lock down MSR writing in secure boot
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH] x86: Lock down MSR writing in secure boot
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] x86: Lock down MSR writing in secure boot
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH] x86: Lock down MSR writing in secure boot
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH] x86: Lock down MSR writing in secure boot
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] x86: Lock down MSR writing in secure boot
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH] x86: Lock down MSR writing in secure boot
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH] x86: Lock down MSR writing in secure boot
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH] x86: Lock down MSR writing in secure boot
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH] x86: Lock down MSR writing in secure boot
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH V3] ia64/mm: fix a bad_page bug when crash kernel booting
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- Re: [PATCH] x86: Lock down MSR writing in secure boot
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 1/3 v3] selftests: Add tests for efivarfs
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- Re: [PATCH] x86: Lock down MSR writing in secure boot
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH] x86: Lock down MSR writing in secure boot
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH] x86: Lock down MSR writing in secure boot
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH] x86: Lock down MSR writing in secure boot
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH] x86: Lock down MSR writing in secure boot
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH] x86: Lock down MSR writing in secure boot
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH V3] ia64/mm: fix a bad_page bug when crash kernel booting
- From: Tony Luck <tony.luck@xxxxxxxxx>
- Re: [PATCH V3] ia64/mm: fix a bad_page bug when crash kernel booting
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V3] ia64/mm: fix a bad_page bug when crash kernel booting
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V3] ia64/mm: fix a bad_page bug when crash kernel booting
- From: Tony Luck <tony.luck@xxxxxxxxx>
- Re: [PATCH 1/3 v3] selftests: Add tests for efivarfs
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3 v3] selftests: Add tests for efivarfs
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- RE: [PATCH v6 -next 0/2] make efivars/efi_pstore interrupt-safe
- From: "Luck, Tony" <tony.luck@xxxxxxxxx>
- [PATCH 2/2 v2] efivarfs: guid part of filenames are case-insensitive
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH 1/2 v2] efivarfs: Validate filenames much more aggressively
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] efivarfs: guid part of filenames are case-insensitive
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH v2] x86/platform/efi/efi_64.c: fix a possible hang in efi_ioremap when init_memory_mapping fails.
- From: T Makphaibulchoke <tmac@xxxxxx>
- [PATCH v6 -next 2/2]efi_pstore: Introducing workqueue updating sysfs entries
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- [PATCH v6 -next 1/2] efivars: Disable external interrupt while holding efivars->lock
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- [PATCH v6 -next 0/2] make efivars/efi_pstore interrupt-safe
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- Re: [PATCH 2/2] efivarfs: guid part of filenames are case-insensitive
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- RE: [PATCH v5 -next 1/2]efivars: Disable external interrupt while holding efivars->lock
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- Re: [PATCH 2/2] efivarfs: guid part of filenames are case-insensitive
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] efivarfs: guid part of filenames are case-insensitive
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] efivarfs: guid part of filenames are case-insensitive
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] efivarfs: Validate filenames much more aggressively
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] efivarfs: Validate filenames much more aggressively
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [RFC][PATCH 0/7] Chainsaw efivars.c
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [RFC][PATCH 5/7 v2] efivars: Move pstore code out of efivars.c
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [RFC][PATCH 4/7 v2] drivers/firmware: Create a new EFI drivers directory
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [RFC][PATCH 3/7 v2] efivars: New efivar_entry API
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH 2/2] efivarfs: guid part of filenames are case-insensitive
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH 1/2] efivarfs: Validate filenames much more aggressively
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH 0/2] efivarfs patch queue
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [RFC][PATCH 3/7] efivars: New efivar_entry API
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 -next 2/2]efi_pstore: Introducing workqueue updating sysfs entries
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 -next 1/2]efivars: Disable external interrupt while holding efivars->lock
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86: Lock down MSR writing in secure boot
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH] x86: Lock down MSR writing in secure boot
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] x86: Lock down MSR writing in secure boot
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] x86: Lock down MSR writing in secure boot
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] x86: Lock down MSR writing in secure boot
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH] x86: Lock down MSR writing in secure boot
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH] x86: Lock down MSR writing in secure boot
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- RE: [RFC][PATCH 3/7] efivars: New efivar_entry API
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- Re: [PATCH] x86: Lock down MSR writing in secure boot
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH] x86: Lock down MSR writing in secure boot
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC][PATCH 3/7] efivars: New efivar_entry API
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- RE: [RFC][PATCH 3/7] efivars: New efivar_entry API
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- Re: [PATCH v5 -next 0/2] make efivars/efi_pstore interrupt-safe
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- RE: [PATCH v5 -next 0/2] make efivars/efi_pstore interrupt-safe
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- Re: [PATCH] x86: Lock down MSR writing in secure boot
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [RFC][PATCH 3/7] efivars: New efivar_entry API
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- RE: [RFC][PATCH 3/7] efivars: New efivar_entry API
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- Re: [PATCH] x86: Lock down MSR writing in secure boot
- From: Josh Boyer <jwboyer@xxxxxxxxx>
- Re: [PATCH] x86: Lock down MSR writing in secure boot
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH] x86: Lock down MSR writing in secure boot
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [RFC][PATCH 7/7] efivarfs: Move to fs/efivarfs
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [RFC][PATCH 6/7] efi: Add generic variable operations
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [RFC][PATCH 5/7] efivars: Move pstore code out of efivars.c
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [RFC][PATCH 4/7] drivers/firmware: Create a new EFI drivers directory
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [RFC][PATCH 3/7] efivars: New efivar_entry API
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [RFC][PATCH 2/7] efi: Move utf16_strlen() to efi.h
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [RFC][PATCH 1/7] efivars: Keep a private global pointer to efivars
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [RFC][PATCH 0/7] Chainsaw efivars.c
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86: Lock down MSR writing in secure boot
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH] x86: Lock down MSR writing in secure boot
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] x86: Lock down MSR writing in secure boot
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH] x86: Lock down MSR writing in secure boot
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] x86: Lock down MSR writing in secure boot
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH] x86: Lock down MSR writing in secure boot
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH] x86: Lock down MSR writing in secure boot
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] x86: Lock down MSR writing in secure boot
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] x86: Lock down MSR writing in secure boot
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH] x86: Lock down MSR writing in secure boot
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- [PATCH] x86: Lock down MSR writing in secure boot
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 1/3 v3] selftests: Add tests for efivarfs
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- Re: [PATCH 1/3 v3] selftests: Add tests for efivarfs
- From: Jeremy Kerr <jk@xxxxxxxxxx>
- Re: [PATCH 1/3 v3] selftests: Add tests for efivarfs
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- [PATCH V3] ia64/mm: fix a bad_page bug when crash kernel booting
- From: Xishi Qiu <qiuxishi@xxxxxxxxxx>
- [PATCH V2] ia64/mm: fix a bad_page bug when crash kernel booting
- From: Xishi Qiu <qiuxishi@xxxxxxxxxx>
- [PATCH 2/3 v3] selftests/efivarfs: Add empty file creation test
- From: Jeremy Kerr <jk@xxxxxxxxxx>
- [PATCH 1/3 v3] selftests: Add tests for efivarfs
- From: Jeremy Kerr <jk@xxxxxxxxxx>
- [PATCH 0/3 v3] selftests: Add efivarfs tests
- From: Jeremy Kerr <jk@xxxxxxxxxx>
- [PATCH 3/3 v3] selftests/efivarfs: Add create-read test
- From: Jeremy Kerr <jk@xxxxxxxxxx>
- Re: [PATCH] ia64/mm: fix a bad_page bug when crash kernel booting
- From: Xishi Qiu <qiuxishi@xxxxxxxxxx>
- Re: [PATCH] ia64/mm: fix a bad_page bug when crash kernel booting
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- Re: [PATCH] efi: split efisubsystem from efivars
- From: Tom Gundersen <teg@xxxxxxx>
- Re: CONFIG_GOOGLE_SMI and efivars
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] efi: split efisubsystem from efivars
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- Re: CONFIG_GOOGLE_SMI and efivars
- From: Mike Waychison <mikew@xxxxxxxxxx>
- CONFIG_GOOGLE_SMI and efivars
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: efivarfs allows non-canonical GUID and duplicate filenames
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [RFC,PATCH] efivarfs: Don't delete efivar_entry structures on unlink
- From: Lingzhu Xiang <lxiang@xxxxxxxxxx>
- Re: [PATCH 3/3] selftests/efivarfs: Add create-read test
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] EFI fixes for v3.8
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86, efi: remove attribute check from setup_efi_pci
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- [PATCH] x86, efi: remove attribute check from setup_efi_pci
- From: Maarten Lankhorst <maarten.lankhorst@xxxxxxxxxxxxx>
- Re: [RFC,PATCH] efivarfs: Don't delete efivar_entry structures on unlink
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [patch] x86, efi: precedence error in setup_efi_pci()
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [patch] x86, efi: precedence error in setup_efi_pci()
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [patch] x86, efi: precedence error in setup_efi_pci()
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [patch] x86, efi: precedence error in setup_efi_pci()
- From: Vitaly Budovski <vbudovski+news@xxxxxxxxx>
- Re: efivarfs allows non-canonical GUID and duplicate filenames
- From: Lingzhu Xiang <lxiang@xxxxxxxxxx>
- Re: efivarfs allows non-canonical GUID and duplicate filenames
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: efivarfs allows non-canonical GUID and duplicate filenames
- From: Lingzhu Xiang <lxiang@xxxxxxxxxx>
- Re: efivarfs allows non-canonical GUID and duplicate filenames
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH 0/2] Secure Boot: More controversial changes
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- [PATCH] ia64/mm: fix a bad_page bug when crash kernel booting
- From: Xishi Qiu <qiuxishi@xxxxxxxxxx>
- Re: [PATCH 3/3] selftests/efivarfs: Add create-read test
- From: Lingzhu Xiang <lxiang@xxxxxxxxxx>
- Re: [RFC] efivars write(2) races
- From: Lingzhu Xiang <lxiang@xxxxxxxxxx>
- Re: [PATCH 0/2] Secure Boot: More controversial changes
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [RFC,PATCH] efivarfs: Don't delete efivar_entry structures on unlink
- From: Jeremy Kerr <jk@xxxxxxxxxx>
- Re: [PATCH 3/3] selftests/efivarfs: Add create-read test
- From: Jeremy Kerr <jk@xxxxxxxxxx>
- [PATCH 13/15] MODSIGN: Add module certificate blacklist keyring
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH 14/15] MODSIGN: Import certificates from UEFI Secure Boot
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH 11/15] Add EFI signature data types
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH 12/15] Add an EFI signature blob parser and key loader.
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH 10/15] acpi: Ignore acpi_rsdp kernel parameter in a secure boot environment
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH 15/15] MODSIGN: Always enforce module signing in a Secure Boot environment
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH 0/2] Secure Boot: More controversial changes
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH 2/2] hibernate: Disable in a Secure Boot environment
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH 1/2] kexec: Disable in a secure boot environment
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [RFC,PATCH] efivarfs: Don't delete efivar_entry structures on unlink
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH 03/15] Secure boot: Add a dummy kernel parameter that will switch on Secure Boot mode
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH 02/15] SELinux: define mapping for new Secure Boot capability
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH 01/15] Secure boot: Add new capability
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH 04/15] efi: Enable secure boot lockdown automatically when enabled in firmware
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH 07/15] ACPI: Limit access to custom_method
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH 06/15] x86: Lock down IO port access in secure boot environments
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH 05/15] PCI: Lock down BAR access in secure boot environments
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH 08/15] asus-wmi: Restrict debugfs interface
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH 09/15] Restrict /dev/mem and /dev/kmem in secure boot setups
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH 00/15] Secure boot policy support
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [RFC] efivars write(2) races
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- Re: [PATCH 3/3] selftests/efivarfs: Add create-read test
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] selftests/efivarfs: Add create-read test
- From: Lingzhu Xiang <lxiang@xxxxxxxxxx>
- Re: [RFC] efivars write(2) races
- From: Lingzhu Xiang <lxiang@xxxxxxxxxx>
- Re: [PATCH] efivarfs: drop_nlink on the correct inode in efivarfs_unlink
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH v2] efi: split efisubsystem from efivars
- From: Tom Gundersen <teg@xxxxxxx>
- [RFC,PATCH] efivarfs: Don't delete efivar_entry structures on unlink
- From: Jeremy Kerr <jk@xxxxxxxxxx>
- [PATCH] efivarfs: drop_nlink on the correct inode in efivarfs_unlink
- From: Jeremy Kerr <jk@xxxxxxxxxx>
- [PATCH 3/3] selftests/efivarfs: Add create-read test
- From: Jeremy Kerr <jk@xxxxxxxxxx>
- [PATCH 1/3] selftests: Add tests for efivarfs
- From: Jeremy Kerr <jk@xxxxxxxxxx>
- [PATCH 0/3] selftests: Add efivarfs tests
- From: Jeremy Kerr <jk@xxxxxxxxxx>
- [PATCH 2/3] selftests/efivarfs: Add empty file creation test
- From: Jeremy Kerr <jk@xxxxxxxxxx>
- Re: [PATCH 1/2] efi: Make 'efi_enabled' a function to query EFI facilities
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] efi: Make 'efi_enabled' a function to query EFI facilities
- From: Ben Hutchings <ben@xxxxxxxxxxxxxxx>
- [PATCH] efi: split efisubsystem from efivars
- From: Tom Gundersen <teg@xxxxxxx>
- Re: [PATCH v2] fix setup_efi_pci()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v2] fix setup_efi_pci()
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [RFC] efivars write(2) races
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- Re: [RFC] efivars write(2) races
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- Re: [PATCH] efivars: allow module autoloading when mounting efivarfs
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- Re: [PATCH v2] fix setup_efi_pci()
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- Re: [PATCH v2] fix setup_efi_pci()
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- Re: [PATCH v2] fix setup_efi_pci()
- From: "Jan Beulich" <JBeulich@xxxxxxxx>
- efivarfs allows non-canonical GUID and duplicate filenames
- From: Lingzhu Xiang <lxiang@xxxxxxxxxx>
- Re: [RFC] efivars write(2) races
- From: Lingzhu Xiang <lxiang@xxxxxxxxxx>
- [RFC] efivars write(2) races
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] fix setup_efi_pci()
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- [PATCH] efivars: allow module autoloading when mounting efivarfs
- From: Tom Gundersen <teg@xxxxxxx>
- [PATCH v5 -next 0/2] make efivars/efi_pstore interrupt-safe
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- [PATCH v5 -next 2/2]efi_pstore: Introducing workqueue updating sysfs entries
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- [PATCH v5 -next 1/2]efivars: Disable external interrupt while holding efivars->lock
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- Re: [PATCH 2/6] x86, efi: Fix 32-bit EFI handover protocol entry point
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH 2/6] x86, efi: Fix 32-bit EFI handover protocol entry point
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] efi: Make 'efi_enabled' a function to query EFI facilities
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] efi: Make 'efi_enabled' a function to query EFI facilities
- From: Ben Hutchings <ben@xxxxxxxxxxxxxxx>
- Re: [usb-storage] Re: Fwd: 2TB USB hard drive for backing up
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [usb-storage] Re: Fwd: 2TB USB hard drive for backing up
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [usb-storage] Re: Fwd: 2TB USB hard drive for backing up
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [usb-storage] Re: Fwd: 2TB USB hard drive for backing up
- From: Alan Stern <stern@xxxxxxxxxxxxxxxxxxx>
- Re: Fwd: 2TB USB hard drive for backing up
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: Fwd: 2TB USB hard drive for backing up
- From: Oliver Neukum <oneukum@xxxxxxx>
- Re: Fwd: 2TB USB hard drive for backing up
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: Fwd: 2TB USB hard drive for backing up
- From: Ellwood Blues <elwood.blue@xxxxxxxxx>
- Re: [PATCH] selftests: Add tests for efivarfs
- From: Jeremy Kerr <jeremy.kerr@xxxxxxxxxxxxx>
- Re: Fwd: 2TB USB hard drive for backing up
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH 1/2] efi: Make 'efi_enabled' a function to query EFI facilities
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] efi: Make 'efi_enabled' a function to query EFI facilities
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] efi: Make 'efi_enabled' a function to query EFI facilities
- From: Dave Jiang <dave.jiang@xxxxxxxxx>
- Re: [PATCH 1/2] efi: Make 'efi_enabled' a function to query EFI facilities
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- [PATCH 2/2] samsung-laptop: Disable on EFI hardware
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH 1/2] efi: Make 'efi_enabled' a function to query EFI facilities
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH 0/2] EFI facilities
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] selftests: Add tests for efivarfs
- From: Lingzhu Xiang <lxiang@xxxxxxxxxx>
- Fwd: 2TB USB hard drive for backing up
- From: Ellwood Blues <elwood.blue@xxxxxxxxx>
- Re: [GIT PULL] EFI fixes for v3.8
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v2] fix setup_efi_pci()
- From: "Jan Beulich" <JBeulich@xxxxxxxx>
- [GIT PULL] EFI fixes for v3.8
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH] selftests: Add tests for efivarfs
- From: Jeremy Kerr <jeremy.kerr@xxxxxxxxxxxxx>
- Re: [PATCH] fix setup_efi_pci()
- From: "Jan Beulich" <JBeulich@xxxxxxxx>
- Re: [PATCH] fix setup_efi_pci()
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] efivarfs: Delete dentry from dcache in efivarfs_file_write()
- From: Jeremy Kerr <jeremy.kerr@xxxxxxxxxxxxx>
- Re: [PATCH] efivarfs: Delete dentry from dcache in efivarfs_file_write()
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH] efivarfs: Delete dentry from dcache in efivarfs_file_write()
- From: joeyli <jlee@xxxxxxxx>
- [PATCH] efivarfs: Never return ENOENT from firmware
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH] efivarfs: Delete dentry from dcache in efivarfs_file_write()
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] efi, x86: Pass a proper identity mapping in efi_call_phys_prelog
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- Re: [patch] x86, efi: precedence error in setup_efi_pci()
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- Re: [PATCH 17/20] efivarfs: Replace magic number with sizeof(attributes)
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 16/20] efivarfs: Return an error if we fail to read a variable
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: General protection fault in efivarfs
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH 3/6] x86, efi: Fix PCI ROM handing in EFI boot stub, in 32-bit mode
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH 6/6] x86, boot: Deliver us from evil
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH 5/6] x86, boot: Lead us not into temptation
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH 4/6] x86, efi: Add loadflags for EFI handover support in 32-bit and 64-bit mode
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH 2/6] x86, efi: Fix 32-bit EFI handover protocol entry point
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH 1/6] x86, efi: Fix display detection in EFI boot stub
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] rtc-efi: register rtc-efi device when EFI enabled
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH 1/3] rtc-efi: register rtc-efi device when EFI enabled
- From: joeyli <jlee@xxxxxxxx>
- [PATCH v2] efi, x86: Pass a proper identity mapping in efi_call_phys_prelog
- From: Nathan Zimmer <nzimmer@xxxxxxx>
- Re: [RFC PATCH 1/2] efi: Make 'efi_enabled' a function to
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] Fix efifb initialisation when the only GOP device implements ConOut.
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH] Fix efifb initialisation when the only GOP device implements ConOut.
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH] Fix efifb initialisation when the only GOP device implements ConOut.
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH] Specify ELF ABI for EFI handover protocol
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- Re: [PATCH] Fix efifb initialisation when the only GOP device implements ConOut.
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH] Fix efifb initialisation when the only GOP device implements ConOut.
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH] Fix efifb initialisation when the only GOP device implements ConOut.
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH] Fix efifb initialisation when the only GOP device implements ConOut.
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH] Fix efifb initialisation when the only GOP device implements ConOut.
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- Re: [PATCH] Fix efifb initialisation when the only GOP device implements ConOut.
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- Re: [PATCH] efivarfs: Drop link count of the right inode
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] efivarfs: Drop link count of the right inode
- From: joeyli <jlee@xxxxxxxx>
- [PATCH] efivarfs: Drop link count of the right inode
- From: Lingzhu Xiang <lxiang@xxxxxxxxxx>
- Re: [RFC PATCH 1/2] efi: Make 'efi_enabled' a function to
- From: Guo Chao <yan@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 01/20] efi: Add support for a UEFI variable filesystem
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/2] efi: Make 'efi_enabled' a function to query EFI facilities
- From: Tim Gardner <rtg.canonical@xxxxxxxxx>
- Re: [RFC PATCH 1/2] efi: Make 'efi_enabled' a function to query EFI facilities
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/2] efi: Make 'efi_enabled' a function to query EFI facilities
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [RFC PATCH 1/2] efi: Make 'efi_enabled' a function to query EFI facilities
- From: Tim Gardner <rtg.canonical@xxxxxxxxx>
- Re: BUG: unable to handle kernel paging request at 000000effd870020
- From: Nathan Zimmer <nzimmer@xxxxxxx>
- Re: [RFC PATCH 1/2] efi: Make 'efi_enabled' a function to query EFI facilities
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: BUG: unable to handle kernel paging request at 000000effd870020
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- [RFC PATCH 1/2] efi: Make 'efi_enabled' a function to query EFI facilities
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [RFC PATCH 2/2] samsung-laptop: Disable on EFI hardware
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [RFC PATCH 0/2] EFI facilities bitfield
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] arch: x86: boot: compressed: eboot: fix cast warnings on 32b platforms
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: BUG: unable to handle kernel paging request at 000000effd870020
- From: Robin Holt <holt@xxxxxxx>
- Re: BUG: unable to handle kernel paging request at 000000effd870020
- From: Nathan Zimmer <nzimmer@xxxxxxx>
- Re: BUG: unable to handle kernel paging request at 000000effd870020
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: Revisiting EFI boot stub config file support
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: Revisiting EFI boot stub config file support
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: Revisiting EFI boot stub config file support
- From: Shea Levy <shea@xxxxxxxxxxxx>
- Re: Revisiting EFI boot stub config file support
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- BUG: unable to handle kernel paging request at 000000effd870020
- From: Nathan Zimmer <nzimmer@xxxxxxx>
- Re: Revisiting EFI boot stub config file support
- From: Shea Levy <shea@xxxxxxxxxxxx>
- Re: [PATCH 1/3] rtc-efi: register rtc-efi device when EFI enabled
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- Re: [PATCH 1/3] rtc-efi: register rtc-efi device when EFI enabled
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH] arch: x86: boot: compressed: eboot: fix cast warnings on 32b platforms
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: Revisiting EFI boot stub config file support
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Revisiting EFI boot stub config file support
- From: Shea Levy <shea@xxxxxxxxxxxx>
- Re: [PATCH 1/3] rtc-efi: register rtc-efi device when EFI enabled
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH 1/3] rtc-efi: register rtc-efi device when EFI enabled
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH 1/3] rtc-efi: register rtc-efi device when EFI enabled
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH 1/3] rtc-efi: register rtc-efi device when EFI enabled
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH 1/3] rtc-efi: register rtc-efi device when EFI enabled
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH 1/3] rtc-efi: register rtc-efi device when EFI enabled
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH 1/3] rtc-efi: register rtc-efi device when EFI enabled
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH 1/3] rtc-efi: register rtc-efi device when EFI enabled
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH 1/3] rtc-efi: register rtc-efi device when EFI enabled
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH 1/3] rtc-efi: register rtc-efi device when EFI enabled
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH 1/3] rtc-efi: register rtc-efi device when EFI enabled
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- Re: [PATCH 1/3] rtc-efi: register rtc-efi device when EFI enabled
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH 1/3] rtc-efi: register rtc-efi device when EFI enabled
- From: Matthew Garrett <matthew.garrett@xxxxxxxxxx>
- [PATCH 1/3] rtc-efi: register rtc-efi device when EFI enabled
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 3/3] rtc-efi: set uie_unsupported for indicate rtc-efi doesn't support UIE mode
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 2/3] rtc-efi: add timezone to rtc_time that will used by rtc-efi
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- Re: efivarfs: unlinking open files results in spinlock corruption
- From: Lingzhu Xiang <lxiang@xxxxxxxxxx>
- File lingers after deletion with efivarfs_write_file
- From: Lingzhu Xiang <lxiang@xxxxxxxxxx>
- Re: efivarfs: unlinking open files results in spinlock corruption
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH 17/20] efivarfs: Replace magic number with sizeof(attributes)
- From: Lingzhu Xiang <lxiang@xxxxxxxxxx>
- efivarfs: unlinking open files results in spinlock corruption
- From: Lingzhu Xiang <lxiang@xxxxxxxxxx>
- Re: [PATCH] arch: x86: boot: compressed: eboot: fix cast warnings on 32b platforms
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: General protection fault in efivarfs
- From: joeyli <jlee@xxxxxxxx>
- Re: General protection fault in efivarfs
- From: joeyli <jlee@xxxxxxxx>
- Re: General protection fault in efivarfs
- From: Lingzhu Xiang <lxiang@xxxxxxxxxx>
- Re: General protection fault in efivarfs
- From: joeyli <jlee@xxxxxxxx>
- [PATCH] arch: x86: boot: compressed: eboot: fix cast warnings on 32b platforms
- From: Stefan Hasko <hasko.stevo@xxxxxxxxx>
- General protection fault in efivarfs
- From: Lingzhu Xiang <lxiang@xxxxxxxxxx>
- Re: [PATCH v2 16/20] efivarfs: Return an error if we fail to read a variable
- From: Lingzhu Xiang <lxiang@xxxxxxxxxx>
- Re: [PATCH 01/20] efi: Add support for a UEFI variable filesystem
- From: Lingzhu Xiang <lxiang@xxxxxxxxxx>
- [PATCH] x86, efi: correct precedence of operators in setup_efi_pci
- From: Sasha Levin <sasha.levin@xxxxxxxxxx>
- Re: [patch] x86, efi: precedence error in setup_efi_pci()
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [patch] x86, efi: precedence error in setup_efi_pci()
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- [patch] x86, efi: precedence error in setup_efi_pci()
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: Use PCI ROMs from EFI boot services
- From: Bjorn Helgaas <bhelgaas@xxxxxxxxxx>
- Re: Use PCI ROMs from EFI boot services
- From: Yinghai Lu <yinghai@xxxxxxxxxx>
- Re: Use PCI ROMs from EFI boot services
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: Use PCI ROMs from EFI boot services
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: Use PCI ROMs from EFI boot services
- From: Bjorn Helgaas <bhelgaas@xxxxxxxxxx>
- Re: Use PCI ROMs from EFI boot services
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: Use PCI ROMs from EFI boot services
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: Use PCI ROMs from EFI boot services
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: Use PCI ROMs from EFI boot services
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: Use PCI ROMs from EFI boot services
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: Use PCI ROMs from EFI boot services
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: Use PCI ROMs from EFI boot services
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: Use PCI ROMs from EFI boot services
- From: Yinghai Lu <yinghai@xxxxxxxxxx>
- Re: Use PCI ROMs from EFI boot services
- From: Yinghai Lu <yinghai@xxxxxxxxxx>
- Re: Use PCI ROMs from EFI boot services
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: Use PCI ROMs from EFI boot services
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: Use PCI ROMs from EFI boot services
- From: Yinghai Lu <yinghai@xxxxxxxxxx>
- Re: Use PCI ROMs from EFI boot services
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: Use PCI ROMs from EFI boot services
- From: Yinghai Lu <yinghai@xxxxxxxxxx>
- Re: Use PCI ROMs from EFI boot services
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: Use PCI ROMs from EFI boot services
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: Use PCI ROMs from EFI boot services
- From: Yinghai Lu <yinghai@xxxxxxxxxx>
- Re: Use PCI ROMs from EFI boot services
- From: Bjorn Helgaas <bhelgaas@xxxxxxxxxx>
- Re: Use PCI ROMs from EFI boot services
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: Use PCI ROMs from EFI boot services
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: Use PCI ROMs from EFI boot services
- From: Bjorn Helgaas <bhelgaas@xxxxxxxxxx>
- Re: Random boot fail on 'cannot allocate trampoline' on Intel DQ57TM board with B.11 BIOS
- From: joeyli <jlee@xxxxxxxx>
- Re: Random boot fail on 'cannot allocate trampoline' on Intel DQ57TM board with B.11 BIOS
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: Random boot fail on 'cannot allocate trampoline' on Intel DQ57TM board with B.11 BIOS
- From: joeyli <jlee@xxxxxxxx>
- Re: Use PCI ROMs from EFI boot services
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- Heads up on EFI error status change
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- RE: EFI pstore: BUG: scheduling while atomic, and possible circular locking dependency
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- Re: EFI pstore: BUG: scheduling while atomic, and possible circular locking dependency
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- Re: [PATCH RFC v2 3/4] firmware: Add support for signature checks
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [PATCH RFC v2 3/4] firmware: Add support for signature checks
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH RFC v2 4/4] firmware: Install firmware signature files automatically
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH RFC v2 1/4] firmware: Add the firmware signing support to scripts/sign-file
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH RFC v2 2/4] firmware: Add -a option to scripts/sign-file
- From: joeyli <jlee@xxxxxxxx>
- Re: EFI pstore: BUG: scheduling while atomic, and possible circular locking dependency
- From: Anton Vorontsov <anton.vorontsov@xxxxxxxxxx>
- Re: EFI pstore: BUG: scheduling while atomic, and possible circular locking dependency
- From: Lingzhu Xiang <lxiang@xxxxxxxxxx>
- Re: EFI pstore: BUG: scheduling while atomic, and possible circular locking dependency
- From: Anton Vorontsov <cbouatmailru@xxxxxxxxx>
- EFI pstore: BUG: scheduling while atomic, and possible circular locking dependency
- From: Lingzhu Xiang <lxiang@xxxxxxxxxx>
- [GIT PULL] EFI changes for v3.7 - part 2
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [GIT PULL] EFI changes for v3.8 - part 2
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH v6 7/7] efi_pstore: Add a format check for an existing variable name at erasing time
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- [PATCH v6 6/7] efi_pstore: Add a format check for an existing variable name at reading time
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- [PATCH v6 5/7] efi_pstore: Add a sequence counter to a variable name
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- [PATCH v6 4/7] efi_pstore: Add ctime to argument of erase callback
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- [PATCH v6 3/7] efi_pstore: Remove a logic erasing entries from a write callback to hold multiple logs
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- [PATCH v6 2/7] efi_pstore: Add a logic erasing entries to an erase callback
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- [PATCH v6 1/7] efi_pstore: Check remaining space with QueryVariableInfo() before writing data
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- [PATCH v6 0/7] efi_pstore: multiple event logging support
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- Re: [PATCH] x86/EFI: check table header length in efi_bgrt_init()
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86/EFI: check table header length in efi_bgrt_init()
- From: "Jan Beulich" <JBeulich@xxxxxxxx>
- Re: [PATCH] x86/EFI: check table header length in efi_bgrt_init()
- From: Josh Triplett <josh@xxxxxxxxxxxxxxxx>
- Re: [GIT PULL] EFI changes for v3.8
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] EFI changes for v3.8
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- [GIT PULL] EFI changes for v3.8
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86/EFI: check table header length in efi_bgrt_init()
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- RE: [PATCH v5 0/7] efi_pstore: multiple event logging support
- From: "Luck, Tony" <tony.luck@xxxxxxxxx>
- [PATCH v5 7/7] efi_pstore: Add a format check for an existing variable name at erasing time
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- [PATCH v5 6/7] efi_pstore: Add a format check for an existing variable name at reading time
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- [PATCH v5 5/7] efi_pstore: Add a sequence counter to a variable name
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- [PATCH v5 4/7] efi_pstore: Add ctime to argument of erase callback
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- [PATCH v5 1/7] efi_pstore: Check remaining space with QueryVariableInfo() before writing data
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- [PATCH v5 3/7] efi_pstore: Remove a logic erasing entries from a write callback to hold multiple logs
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- [PATCH v5 2/7] efi_pstore: Add a logic erasing entries to an erase callback
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- [PATCH v5 0/7] efi_pstore: multiple event logging support
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- Re: [PATCH v2 01/20] efi: Add support for a UEFI variable filesystem
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: Do not allow MSR or Embedded Controller writes from userspace in secure boot case
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- [PATCH RFC v2 2/4] firmware: Add -a option to scripts/sign-file
- From: Takashi Iwai <tiwai@xxxxxxx>
- [PATCH RFC v2 1/4] firmware: Add the firmware signing support to scripts/sign-file
- From: Takashi Iwai <tiwai@xxxxxxx>
- [PATCH RFC v2 0/4] Add firmware signature file check
- From: Takashi Iwai <tiwai@xxxxxxx>
- [PATCH RFC v2 3/4] firmware: Add support for signature checks
- From: Takashi Iwai <tiwai@xxxxxxx>
- [PATCH RFC v2 4/4] firmware: Install firmware signature files automatically
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: Do not allow MSR or Embedded Controller writes from userspace in secure boot case
- From: Alan Cox <alan@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] [PATCH] X86 MSR read whitelist
- From: Alan Cox <alan@xxxxxxxxxxxxxxxxxxx>
- Re: Do not allow MSR or Embedded Controller writes from userspace in secure boot case
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: Do not allow MSR or Embedded Controller writes from userspace in secure boot case
- From: Shea Levy <shea@xxxxxxxxxxxx>
- Re: Do not allow MSR or Embedded Controller writes from userspace in secure boot case
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: Do not allow MSR or Embedded Controller writes from userspace in secure boot case
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: Do not allow MSR or Embedded Controller writes from userspace in secure boot case
- From: Thomas Renninger <trenn@xxxxxxx>
- [RFC] [PATCH] X86 MSR read whitelist
- From: Thomas Renninger <trenn@xxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Alan Cox <alan@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: James Courtier-Dutton <james.dutton@xxxxxxxxx>
- Re: Do not allow MSR or Embedded Controller writes from userspace in secure boot case
- From: Thomas Renninger <trenn@xxxxxxx>
- Re: Do not allow MSR or Embedded Controller writes from userspace in secure boot case
- From: Alan Cox <alan@xxxxxxxxxxxxxxxxxxx>
- Re: Do not allow MSR or Embedded Controller writes from userspace in secure boot case
- From: Alan Cox <alan@xxxxxxxxxxxxxxxxxxx>
- Re: Do not allow MSR or Embedded Controller writes from userspace in secure boot case
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: Do not allow MSR or Embedded Controller writes from userspace in secure boot case
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: Do not allow MSR or Embedded Controller writes from userspace in secure boot case
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- [PATCH 2/2] X86 msr: Do not allow MSR writes in secure boot mode
- From: Thomas Renninger <trenn@xxxxxxx>
- [PATCH 1/2] ACPI ec_sys: Do not allow write access to EC in secure boot mode
- From: Thomas Renninger <trenn@xxxxxxx>
- Do not allow MSR or Embedded Controller writes from userspace in secure boot case
- From: Thomas Renninger <trenn@xxxxxxx>
- Re: [PATCH] x86/EFI: check table header length in efi_bgrt_init()
- From: Josh Triplett <josh@xxxxxxxxxxxxxxxx>
- [PATCH] x86/EFI: check table header length in efi_bgrt_init()
- From: "Jan Beulich" <JBeulich@xxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH] x86/EFI: additional checks in efi_bgrt_init()
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH] x86/EFI: additional checks in efi_bgrt_init()
- From: "Jan Beulich" <JBeulich@xxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Alan Cox <alan@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [PATCH] x86/EFI: additional checks in efi_bgrt_init()
- From: Josh Triplett <josh@xxxxxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Jiri Kosina <jkosina@xxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Chris Friesen <chris.friesen@xxxxxxxxxxx>
- Re: [PATCH] x86/EFI: additional checks in efi_bgrt_init()
- From: "Jan Beulich" <JBeulich@xxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Matthew Garrett <mjg@xxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Matthew Garrett <mjg@xxxxxxxxxx>
- Re: [PATCH] x86/EFI: additional checks in efi_bgrt_init()
- From: Josh Triplett <josh@xxxxxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Jiri Kosina <jkosina@xxxxxxx>
- Re: [PATCH RFC 0/4] Add firmware signature file check
- From: Alan Cox <alan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC 0/4] Add firmware signature file check
- From: Ming Lei <tom.leiming@xxxxxxxxx>
- Re: [PATCH RFC 0/4] Add firmware signature file check
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [PATCH RFC 0/4] Add firmware signature file check
- From: Ming Lei <tom.leiming@xxxxxxxxx>
- Re: [PATCH RFC 0/4] Add firmware signature file check
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [PATCH RFC 0/4] Add firmware signature file check
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [PATCH RFC 0/4] Add firmware signature file check
- From: Ming Lei <tom.leiming@xxxxxxxxx>
- Re: [PATCH RFC 0/4] Add firmware signature file check
- From: Alan Cox <alan@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Alan Cox <alan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86/EFI: additional checks in efi_bgrt_init()
- From: "Jan Beulich" <JBeulich@xxxxxxxx>
- Re: [PATCH RFC 0/4] Add firmware signature file check
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Valdis.Kletnieks@xxxxxx
- Re: [PATCH RFC 0/4] Add firmware signature file check
- From: Ming Lei <tom.leiming@xxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [PATCH RFC 0/4] Add firmware signature file check
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [PATCH RFC 0/4] Add firmware signature file check
- From: Ming Lei <tom.leiming@xxxxxxxxx>
- Re: [PATCH RFC 0/4] Add firmware signature file check
- From: Ming Lei <tom.leiming@xxxxxxxxx>
- Re: [PATCH RFC 0/4] Add firmware signature file check
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [PATCH RFC 0/4] Add firmware signature file check
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [PATCH RFC 0/4] Add firmware signature file check
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [PATCH RFC 0/4] Add firmware signature file check
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [PATCH RFC 0/4] Add firmware signature file check
- From: lee joey <joeyli.kernel@xxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC] Second attempt at kernel secure boot support
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC] Second attempt at kernel secure boot support
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH RFC 0/4] Add firmware signature file check
- From: Ming Lei <tom.leiming@xxxxxxxxx>
- Re: [PATCH RFC 0/4] Add firmware signature file check
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH RFC 0/4] Add firmware signature file check
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [systemd-devel] [PATCH] systemd: mount the EFI variable filesystem
- From: Josh Boyer <jwboyer@xxxxxxxxx>
- Re: [PATCH RFC 0/4] Add firmware signature file check
- From: Josh Boyer <jwboyer@xxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] x86/EFI: additional checks in efi_bgrt_init()
- From: Josh Triplett <josh@xxxxxxxxxxxxxxxx>
- Re: [PATCH] x86/EFI: additional checks in efi_bgrt_init()
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH] x86/EFI: additional checks in efi_bgrt_init()
- From: Josh Triplett <josh@xxxxxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH RFC 0/4] Add firmware signature file check
- From: Takashi Iwai <tiwai@xxxxxxx>
- [PATCH RFC 4/4] firmware: Install signature files automatically
- From: Takashi Iwai <tiwai@xxxxxxx>
- [PATCH RFC 3/4] firmware: Add a signature check
- From: Takashi Iwai <tiwai@xxxxxxx>
- [PATCH RFC 2/4] scripts/sign-file: Support firmware signing
- From: Takashi Iwai <tiwai@xxxxxxx>
- [PATCH RFC 1/4] scripts/sign-file: Allow specifying hash algorithm via -a option
- From: Takashi Iwai <tiwai@xxxxxxx>
- [PATCH RFC 0/4] Add firmware signature file check
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Chris Friesen <chris.friesen@xxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Jiri Kosina <jkosina@xxxxxxx>
- [PATCH] x86/EFI: additional checks in efi_bgrt_init()
- From: "Jan Beulich" <JBeulich@xxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Jiri Kosina <jkosina@xxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Alan Cox <alan@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH] samsung-laptop: Disable if CONFIG_EFI=y
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] samsung-laptop: Disable if CONFIG_EFI=y
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] samsung-laptop: Disable if CONFIG_EFI=y
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] samsung-laptop: Disable if CONFIG_EFI=y
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] samsung-laptop: Disable if CONFIG_EFI=y
- From: Alan Cox <alan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] samsung-laptop: Disable if CONFIG_EFI=y
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] samsung-laptop: Disable if CONFIG_EFI=y
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] samsung-laptop: Disable if CONFIG_EFI=y
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] samsung-laptop: Disable if CONFIG_EFI=y
- From: Corentin Chary <corentincj@xxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC] Second attempt at kernel secure boot support
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 01/20] efi: Add support for a UEFI variable filesystem
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC] Second attempt at kernel secure boot support
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC] Second attempt at kernel secure boot support
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2 01/20] efi: Add support for a UEFI variable filesystem
- From: Alan Cox <alan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] samsung-laptop: Disable if CONFIG_EFI=y
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 01/20] efi: Add support for a UEFI variable filesystem
- From: Matthew Garrett <mjg@xxxxxxxxxx>
- Re: [PATCH v2 01/20] efi: Add support for a UEFI variable filesystem
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 01/20] efi: Add support for a UEFI variable filesystem
- From: Matthew Garrett <mjg@xxxxxxxxxx>
- Re: [PATCH v2 01/20] efi: Add support for a UEFI variable filesystem
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] samsung-laptop: Disable if CONFIG_EFI=y
- From: Alan Cox <alan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] samsung-laptop: Disable if CONFIG_EFI=y
- From: Jonathan Nieder <jrnieder@xxxxxxxxx>
- Re: [PATCH] samsung-laptop: Disable if CONFIG_EFI=y
- From: Corentin Chary <corentincj@xxxxxxxxxx>
- [PATCH] samsung-laptop: Disable if CONFIG_EFI=y
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Pavel Machek <pavel@xxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Jiri Kosina <jkosina@xxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Alan Cox <alan@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Alan Cox <alan@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Alan Cox <alan@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC] Second attempt at kernel secure boot support
- From: Matthew Garrett <mjg@xxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Matthew Garrett <mjg@xxxxxxxxxx>
- Re: [PATCH v2 01/20] efi: Add support for a UEFI variable filesystem
- From: Matthew Garrett <mjg@xxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v2 01/20] efi: Add support for a UEFI variable filesystem
- From: Alan Cox <alan@xxxxxxxxxxxxxxxxxxx>
- Re: [RESEND][PATCH v4 0/7] efi_pstore: multiple event logging support
- From: Mike Waychison <mikew@xxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Alan Cox <alan@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Chris Friesen <chris.friesen@xxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC] Second attempt at kernel secure boot support
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Chris Friesen <chris.friesen@xxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Matthew Garrett <mjg@xxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Shuah Khan <shuahkhan@xxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Pavel Machek <pavel@xxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Jiri Kosina <jkosina@xxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Matthew Garrett <mjg@xxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- [PATCH 21/20] efivarfs: Fix return value of efivarfs_file_write()
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH v2 16/20] efivarfs: Return an error if we fail to read a variable
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH v2 03/20] efi: add efivars kobject to efi sysfs folder
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH v2 01/20] efi: Add support for a UEFI variable filesystem
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [RESEND][PATCH v4 7/7] Add a format check for an existing variable name at erasing time
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- [RESEND][PATCH v4 6/7] efi_pstore: Add a format check for an existing variable name at reading time
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- [RESEND][PATCH v4 5/7] efi_pstore: Add a sequence counter to a variable name
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- [RESEND][PATCH v4 4/7] efi_pstore: Add ctime to argument of erase callback
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- [RESEND][PATCH v4 3/7] efi_pstore: Remove a logic erasing entries from a write callback to hold multiple logs
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- [RESEND][PATCH v4 2/7] efi_pstore: Add a logic erasing entries to an erase callback
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- [RESEND][PATCH v4 1/7] efi_pstore: Check remaining space with QueryVariableInfo() before writing data
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- [RESEND][PATCH v4 0/7] efi_pstore: multiple event logging support
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Alan Cox <alan@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Alan Cox <alan@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Alan Cox <alan@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Alan Cox <alan@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Chris Friesen <chris.friesen@xxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Pavel Machek <pavel@xxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Alan Cox <alan@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Matthew Garrett <mjg@xxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Matthew Garrett <mjg@xxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Alan Cox <alan@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Alan Cox <alan@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Alan Cox <alan@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Alan Cox <alan@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Oliver Neukum <oneukum@xxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Jiri Kosina <jkosina@xxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Jiri Kosina <jkosina@xxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Jiri Kosina <jkosina@xxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: joeyli <jlee@xxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Oliver Neukum <oneukum@xxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Chris Friesen <chris.friesen@xxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Jiri Kosina <jkosina@xxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Oliver Neukum <oneukum@xxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Alan Cox <alan@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Alan Cox <alan@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
[Index of Archives]
[Linux Kernel Development]
[Security]
[Linux ARM Kernel]
[Tools]
[Linux MIPS]
[Linux S390]
[Bugtraq]
[Share Photos]>
[Fedora ARM]