Linux EFI/UEFI Development
[Prev Page][Next Page]
- Re: [RFC] Second attempt at kernel secure boot support
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Alan Cox <alan@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Jiri Kosina <jkosina@xxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Alan Cox <alan@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Alan Cox <alan@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Shea Levy <shea@xxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Alan Cox <alan@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Shea Levy <shea@xxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Alan Cox <alan@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Josh Boyer <jwboyer@xxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Jiri Kosina <jkosina@xxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Jiri Kosina <jkosina@xxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Alan Cox <alan@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Shea Levy <shea@xxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Shea Levy <shea@xxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Josh Boyer <jwboyer@xxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Jiri Kosina <jkosina@xxxxxxx>
- Re: [systemd-devel] [PATCH] systemd: mount the EFI variable filesystem
- From: Colin Walters <walters@xxxxxxxxxx>
- Re: [systemd-devel] [PATCH] systemd: mount the EFI variable filesystem
- From: Kay Sievers <kay@xxxxxxxx>
- Re: [PATCH v4 5/7] efi_pstore: Add a sequence counter to a variable name
- From: "Rafael J. Wysocki" <rjw@xxxxxxx>
- [PATCH v4 7/7] efi_pstore: Add a format check for an existing variable name at erasing time
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- [PATCH v4 6/7] efi_pstore: Add a format check for an existing variable name at reading time
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- [PATCH v4 5/7] efi_pstore: Add a sequence counter to a variable name
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- [PATCH v4 4/7] efi_pstore: Add ctime to argument of erase callback
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- [PATCH v4 3/7] efi_pstore: Remove a logic erasing entries from a write callback to hold multiple logs
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- [PATCH v4 2/7] efi_pstore: Add a logic erasing entries to an erase callback
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- [PATCH v4 1/7] efi_pstore: Check remaining space with QueryVariableInfo() before writing data
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- [PATCH v4 0/7] efi_pstore: multiple event logging support
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- Re: [PATCH V3 07/10] Secure boot: Add a dummy kernel parameter that will switch on Secure Boot mode
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH V3 07/10] Secure boot: Add a dummy kernel parameter that will switch on Secure Boot mode
- From: Josh Boyer <jwboyer@xxxxxxxxxx>
- Re: [PATCH] efi: fix always unregister kset of efivars in register_efivars
- From: joeyli <jlee@xxxxxxxx>
- RE: [PATCH v3 7/7] Add a format check for an existing variable name at erasing time
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- RE: [PATCH v3 6/7] efi_pstore: Add a format check for an existing variable name at reading time
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- Re: [PATCH v3 7/7] Add a format check for an existing variable name at erasing time
- From: Mike Waychison <mikew@xxxxxxxxxx>
- Re: [PATCH v3 6/7] efi_pstore: Add a format check for an existing variable name at reading time
- From: Mike Waychison <mikew@xxxxxxxxxx>
- Re: [PATCH] efi: fix always unregister kset of efivars in register_efivars
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] efivars: disable seeking on efivarfs files
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Matthew Garrett <mjg@xxxxxxxxxx>
- Re: [PATCH V3 07/10] Secure boot: Add a dummy kernel parameter that will switch on Secure Boot mode
- From: joeyli <jlee@xxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Jiri Kosina <jkosina@xxxxxxx>
- Re: [PATCH 03/20] efi: add efivars kobject to efi sysfs folder
- From: joeyli <jlee@xxxxxxxx>
- [PATCH] efi: fix always unregister kset of efivars in register_efivars
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- Re: [PATCH] systemd: mount the EFI variable filesystem
- From: joeyli <jlee@xxxxxxxx>
- [PATCH] efivars: disable seeking on efivarfs files
- From: Jeremy Kerr <jk@xxxxxxxxxx>
- Re: [PATCH] systemd: mount the EFI variable filesystem
- From: Lennart Poettering <lennart@xxxxxxxxxxxxxx>
- [PATCH] systemd: mount the EFI variable filesystem
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH v3 7/7] Add a format check for an existing variable name at erasing time
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- [PATCH v3 6/7] efi_pstore: Add a format check for an existing variable name at reading time
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- [PATCH v3 5/7] efi_pstore: Add a sequence counter to a variable name
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- [PATCH v3 4/7] efi_pstore: Add ctime to argument of erase callback
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- [PATCH v3 3/7] efi_pstore: Remove a logic erasing entries from a write callback to hold multiple logs
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- [PATCH v3 2/7] efi_pstore: Add a logic erasing entries to an erase callback
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- [PATCH v3 1/7] efi_pstore: Check remaining space with QueryVariableInfo() before writing data
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- [PATCH v3 0/7] efi_pstore: multiple event logging support
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- Re: [PATCH 03/20] efi: add efivars kobject to efi sysfs folder
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 01/20] efi: Add support for a UEFI variable filesystem
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 03/20] efi: add efivars kobject to efi sysfs folder
- From: Alan Cox <alan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 01/20] efi: Add support for a UEFI variable filesystem
- From: Alan Cox <alan@xxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] EFI fixes for v3.7
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] EFI fixes for v3.7
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- [GIT PULL] EFI fixes for v3.7
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH 20/20] efivarfs: Return a consistent error when efivarfs_get_inode() fails
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH 19/20] efivarfs: Make 'datasize' unsigned long
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH 18/20] efivarfs: Add unique magic number
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH 17/20] efivarfs: Replace magic number with sizeof(attributes)
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH 16/20] efivarfs: Return an error if we fail to read a variable
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH 15/20] efi: Clarify GUID length calculations
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH 14/20] efivarfs: Implement exclusive access for {get,set}_variable
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH 13/20] efivarfs: efivarfs_fill_super() ensure we clean up correctly on error
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH 12/20] efivarfs: efivarfs_fill_super() ensure we free our temporary name
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH 11/20] efivarfs: efivarfs_fill_super() fix inode reference counts
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH 10/20] efivarfs: efivarfs_create() ensure we drop our reference on inode on error
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH 09/20] efivarfs: efivarfs_file_read ensure we free data in error paths
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH 08/20] x86-64/efi: Use EFI to deal with platform wall clock (again)
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH 07/20] x86/kernel: remove tboot 1:1 page table creation code
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH 06/20] x86, efi: 1:1 pagetable mapping for virtual EFI calls
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH 05/20] x86, mm: Include the entire kernel memory map in trampoline_pgd
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH 04/20] efivarfs: Add documentation for the EFI variable filesystem
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH 03/20] efi: add efivars kobject to efi sysfs folder
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH 02/20] efi: Handle deletions and size changes in efivarfs_write_file
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH 01/20] efi: Add support for a UEFI variable filesystem
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH 00/20] EFI changes for v3.8
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- RE: [PATCH v2 3/5] efi_pstore: Remove a logic erasing entries from a write callback to hold multiple logs
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- Re: [PATCH v2 3/5] efi_pstore: Remove a logic erasing entries from a write callback to hold multiple logs
- From: Mike Waychison <mikew@xxxxxxxxxx>
- RE: [PATCH v2 3/5] efi_pstore: Remove a logic erasing entries from a write callback to hold multiple logs
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- Re: [PATCH v2 3/5] efi_pstore: Remove a logic erasing entries from a write callback to hold multiple logs
- From: Mike Waychison <mikew@xxxxxxxxxx>
- RE: [PATCH v2 3/5] efi_pstore: Remove a logic erasing entries from a write callback to hold multiple logs
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- Re: [PATCH v2 3/5] efi_pstore: Remove a logic erasing entries from a write callback to hold multiple logs
- From: Mike Waychison <mikew@xxxxxxxxxx>
- Re: [PATCH v2 3/5] efi_pstore: Remove a logic erasing entries from a write callback to hold multiple logs
- From: Mike Waychison <mikew@xxxxxxxxxx>
- Re: [PATCH v2 1/5] efi_pstore: Check remaining space with QueryVariableInfo() before writing data
- From: Mike Waychison <mikew@xxxxxxxxxx>
- Re: Use PCI ROMs from EFI boot services
- From: Bjorn Helgaas <bhelgaas@xxxxxxxxxx>
- Re: [PATCH v3] x86: efi: Turn off efi_enabled after setup on mixed fw/kernel
- From: Olof Johansson <olof@xxxxxxxxx>
- Re: [PATCH v3] x86: efi: Turn off efi_enabled after setup on mixed fw/kernel
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] efi: Clarify GUID length calculations
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH] systemd: mount the EFI variable filesystem
- From: "Lee, Chun-Yi" <jlee@xxxxxxxx>
- [PATCH] systemd: mount the EFI variable filesystem
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- Re: [PATCH] Add syste-firmware-efi-efivars.mount for support automount EFI variable filesystem
- From: joeyli <jlee@xxxxxxxx>
- [PATCH v2 2/5] efi_pstore: Add a logic erasing entries to an erase callback
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- [PATCH v2 5/5] efi_pstore: Add a sequence counter to a variable name
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- [PATCH v2 4/5] efi_pstore: Add ctime to argument of erase callback
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- [PATCH v2 3/5] efi_pstore: Remove a logic erasing entries from a write callback to hold multiple logs
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- [PATCH 2/5] efi_pstore: Add a logic erasing entries to an erase callback
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- [PATCH v2 1/5] efi_pstore: Check remaining space with QueryVariableInfo() before writing data
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- [PATCH v2 0/5] efi_pstore: multiple event logging support
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- Re: [PATCH] efi: Build EFI stub with EFI-appropriate options
- From: Daniel Vacek <neelx.g@xxxxxxxxx>
- Re: [PATCH] efi: Build EFI stub with EFI-appropriate options
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Add syste-firmware-efi-efivars.mount for support automount EFI variable filesystem
- From: Lennart Poettering <lennart@xxxxxxxxxxxxxx>
- Re: [systemd-devel] [PATCH] Add syste-firmware-efi-efivars.mount for support automount EFI variable filesystem
- From: Kay Sievers <kay@xxxxxxxx>
- Re: [systemd-devel] [PATCH] Add syste-firmware-efi-efivars.mount for support automount EFI variable filesystem
- From: Zbigniew Jędrzejewski-Szmek <zbyszek@xxxxxxxxx>
- Re: [systemd-devel] [PATCH] Add syste-firmware-efi-efivars.mount for support automount EFI variable filesystem
- From: Kay Sievers <kay@xxxxxxxx>
- Re: [systemd-devel] [PATCH] Add syste-firmware-efi-efivars.mount for support automount EFI variable filesystem
- From: Zbigniew Jędrzejewski-Szmek <zbyszek@xxxxxxxxx>
- Re: [systemd-devel] [PATCH] Add syste-firmware-efi-efivars.mount for support automount EFI variable filesystem
- From: Zbigniew Jędrzejewski-Szmek <zbyszek@xxxxxxxxx>
- Re: [systemd-devel] [PATCH] Add syste-firmware-efi-efivars.mount for support automount EFI variable filesystem
- From: Kay Sievers <kay@xxxxxxxx>
- Re: [systemd-devel] [PATCH] Add syste-firmware-efi-efivars.mount for support automount EFI variable filesystem
- From: joeyli <jlee@xxxxxxxx>
- Re: [systemd-devel] [PATCH] Add syste-firmware-efi-efivars.mount for support automount EFI variable filesystem
- From: joeyli <jlee@xxxxxxxx>
- Re: [systemd-devel] [PATCH] Add syste-firmware-efi-efivars.mount for support automount EFI variable filesystem
- From: Mantas Mikulėnas <grawity@xxxxxxxxx>
- [PATCH] Add syste-firmware-efi-efivars.mount for support automount EFI variable filesystem
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- Re: [PATCH V2 08/10] efi: Enable secure boot lockdown automatically when enabled in firmware
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH V2 01/10] Secure boot: Add new capability
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- Re: [PATCH V2 01/10] Secure boot: Add new capability
- From: joeyli <jlee@xxxxxxxx>
- RE: [RFC][PATCH 1/2] efi_pstore: hold multiple logs
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- [PATCH] x86/efi: Fix oops caused by incorrect set_memory_uc() usage
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] efi: Clarify GUID length calculations
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- [PATCH] efi: Clarify GUID length calculations
- From: Jeremy Kerr <jeremy.kerr@xxxxxxxxxxxxx>
- Re: [RFC][PATCH 2/2] efi_pstore: add a sequence counter to a variable name
- From: Mike Waychison <mikew@xxxxxxxxxx>
- Re: [RFC][PATCH 1/2] efi_pstore: hold multiple logs
- From: Mike Waychison <mikew@xxxxxxxxxx>
- Re: [PATCH] efi: Build EFI stub with EFI-appropriate options
- From: Daniel Vacek <neelx.g@xxxxxxxxx>
- Re: [PATCH] efi: Build EFI stub with EFI-appropriate options
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH] efi: Build EFI stub with EFI-appropriate options
- From: Daniel Vacek <neelx.g@xxxxxxxxx>
- Re: [PATCH 5/5] efivarfs: efivarfs_fill_super() ensure we clean up correctly on error
- From: Jeremy Kerr <jeremy.kerr@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] x86, mm: Include the entire kernel memory map in trampoline_pgd
- From: "Jan Beulich" <JBeulich@xxxxxxxx>
- Re: [PATCH 2/5] efivarfs: efivarfs_create() ensure we drop our reference on inode on error
- From: Khalid Aziz <khalid@xxxxxxxxxxxxxx>
- Re: [PATCH 2/5] efivarfs: efivarfs_create() ensure we drop our reference on inode on error
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- Re: [PATCH 2/5] efivarfs: efivarfs_create() ensure we drop our reference on inode on error
- From: Khalid Aziz <khalid@xxxxxxxxxxxxxx>
- [PATCH] x86, boot: Explicitly include autoconf.h for hostprogs
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] efivarfs: Implement exclusive access for {get,set}_variable
- From: Jeremy Kerr <jeremy.kerr@xxxxxxxxxxxxx>
- Re: [PATCH] efivarfs: Implement exclusive access for {get,set}_variable
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 5/5] efivarfs: efivarfs_fill_super() ensure we clean up correctly on error
- From: Andy Whitcroft <apw@xxxxxxxxxxxxx>
- Re: [PATCH 2/5] efivarfs: efivarfs_create() ensure we drop our reference on inode on error
- From: Jeremy Kerr <jeremy.kerr@xxxxxxxxxxxxx>
- Re: [PATCH 3/5] efivarfs: efivarfs_fill_super() fix inode reference counts
- From: Jeremy Kerr <jeremy.kerr@xxxxxxxxxxxxx>
- Re: [PATCH 5/5] efivarfs: efivarfs_fill_super() ensure we clean up correctly on error
- From: Jeremy Kerr <jeremy.kerr@xxxxxxxxxxxxx>
- Re: [PATCH 4/5] efivarfs: efivarfs_fill_super() ensure we free our temporary name
- From: Jeremy Kerr <jeremy.kerr@xxxxxxxxxxxxx>
- Re: [PATCH 1/5] efivarfs: efivarfs_file_read ensure we free data in error paths
- From: Jeremy Kerr <jeremy.kerr@xxxxxxxxxxxxx>
- Re: [PATCH] efivarfs: Implement exclusive access for {get,set}_variable
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- [PATCH] efivarfs: Implement exclusive access for {get,set}_variable
- From: Jeremy Kerr <jeremy.kerr@xxxxxxxxxxxxx>
- Re: [PATCH 0/5] efivarfs: fixes and cleanups
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- Re: [PATCH 0/5] efivarfs: fixes and cleanups
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- [PATCH 5/5] efivarfs: efivarfs_fill_super() ensure we clean up correctly on error
- From: Andy Whitcroft <apw@xxxxxxxxxxxxx>
- [PATCH 3/5] efivarfs: efivarfs_fill_super() fix inode reference counts
- From: Andy Whitcroft <apw@xxxxxxxxxxxxx>
- [PATCH 4/5] efivarfs: efivarfs_fill_super() ensure we free our temporary name
- From: Andy Whitcroft <apw@xxxxxxxxxxxxx>
- [PATCH 1/5] efivarfs: efivarfs_file_read ensure we free data in error paths
- From: Andy Whitcroft <apw@xxxxxxxxxxxxx>
- [PATCH 0/5] efivarfs: fixes and cleanups
- From: Andy Whitcroft <apw@xxxxxxxxxxxxx>
- [PATCH 2/5] efivarfs: efivarfs_create() ensure we drop our reference on inode on error
- From: Andy Whitcroft <apw@xxxxxxxxxxxxx>
- Re: [PATCH] x86, boot: Explicitly include autoconf.h for hostprogs
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH] x86, boot: Explicitly include autoconf.h for hostprogs
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86: Switch to vga console only if framebuffer details are missing
- From: Peter Jones <pjones@xxxxxxxxxx>
- Re: [PATCH] x86: Switch to vga console only if framebuffer details are missing
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- Re: [PATCH 1/3] x86, mm: Include the entire kernel memory map in trampoline_pgd
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- RE: boot failure on i7-3317u in Samsung 900x3c
- From: "Luck, Tony" <tony.luck@xxxxxxxxx>
- Re: boot failure on i7-3317u in Samsung 900x3c
- From: Mike Bakhterev <mike.bakhterev@xxxxxxxxx>
- Re: boot failure on i7-3317u in Samsung 900x3c
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: boot failure on i7-3317u in Samsung 900x3c
- From: Mike Bakhterev <mike.bakhterev@xxxxxxxxx>
- Re: Git Trees for EFI Development
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: boot failure on i7-3317u in Samsung 900x3c
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] x86, mm: Include the entire kernel memory map in trampoline_pgd
- From: "Jan Beulich" <jbeulich@xxxxxxxx>
- Git Trees for EFI Development
- From: Shea Levy <shea@xxxxxxxxxxxx>
- Re: [PATCH 1/3] x86, mm: Include the entire kernel memory map in trampoline_pgd
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH 1/3] x86, mm: Include the entire kernel memory map in trampoline_pgd
- From: "Jan Beulich" <jbeulich@xxxxxxxx>
- Re: [PATCH 1/3] efi: Add support for a UEFI variable filesystem
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- [RFC][PATCH 2/2] efi_pstore: add a sequence counter to a variable name
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- [RFC][PATCH 1/2] efi_pstore: hold multiple logs
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- [RFC][PATCH 0/2] efi_pstore: multiple event logging support
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- Re: [PATCH 1/3] x86, mm: Include the entire kernel memory map in trampoline_pgd
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH v2 0/3] x86/efi: Identity mapping pagetable
- From: "Jan Beulich" <JBeulich@xxxxxxxx>
- [PATCH v2 1/3] x86, mm: Include the entire kernel memory map in trampoline_pgd
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH 2/3] x86, efi: 1:1 pagetable mapping for virtual EFI calls
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH 3/3] x86/kernel: remove tboot 1:1 page table creation code
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH v2 0/3] x86/efi: Identity mapping pagetable
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] x86, mm: Include the entire kernel memory map in trampoline_pgd
- From: "Jan Beulich" <JBeulich@xxxxxxxx>
- Re: [PATCH 2/3] efi: add efivars kobject to efi sysfs folder
- From: Jeremy Kerr <jeremy.kerr@xxxxxxxxxxxxx>
- [PATCH 3/3] efi: Handle deletions and size changes in efivarfs_write_file
- From: Jeremy Kerr <jeremy.kerr@xxxxxxxxxxxxx>
- [PATCH 2/3] efi: add efivars kobject to efi sysfs folder
- From: Jeremy Kerr <jeremy.kerr@xxxxxxxxxxxxx>
- [PATCH 1/3] efi: Add support for a UEFI variable filesystem
- From: Jeremy Kerr <jeremy.kerr@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] efi: add efivars kobject to efi sysfs folder
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH 1/3] x86, mm: Include the entire kernel memory map in trampoline_pgd
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] x86, mm: Include the entire kernel memory map in trampoline_pgd
- From: "Jan Beulich" <JBeulich@xxxxxxxx>
- Re: [PATCH 1/3] x86, mm: Include the entire kernel memory map in trampoline_pgd
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: List Archive
- From: Shea Levy <shea@xxxxxxxxxxxx>
- Re: [PATCH] efi: add efivars kobject to efi sysfs folder
- From: Peter Jones <pjones@xxxxxxxxxx>
- Re: [PATCH 1/3] x86, mm: Include the entire kernel memory map in trampoline_pgd
- From: "Jan Beulich" <JBeulich@xxxxxxxx>
- Re: [PATCH] efi: add efivars kobject to efi sysfs folder
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH 1/3] x86, mm: Include the entire kernel memory map in trampoline_pgd
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- Re: [PATCH] efi: add efivars kobject to efi sysfs folder
- From: Jeremy Kerr <jeremy.kerr@xxxxxxxxxxxxx>
- Re: [PATCH] efi: add efivars kobject to efi sysfs folder
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- Re: List Archive
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] x86, mm: Include the entire kernel memory map in trampoline_pgd
- From: "Jan Beulich" <JBeulich@xxxxxxxx>
- List Archive
- From: Shea Levy <shea@xxxxxxxxxxxx>
- [PATCH] efi: add efivars kobject to efi sysfs folder
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- Re: [PATCH 1/3] x86, mm: Include the entire kernel memory map in trampoline_pgd
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- Re: [PATCH 1/3] x86, mm: Include the entire kernel memory map in trampoline_pgd
- From: "Jan Beulich" <jbeulich@xxxxxxxx>
- [PATCH 3/3] x86/kernel: remove tboot 1:1 page table creation code
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH 2/3] x86, efi: 1:1 pagetable mapping for virtual EFI calls
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH 1/3] x86, mm: Include the entire kernel memory map in trampoline_pgd
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH 0/3] x86/efi: Identity mapping pagetable
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: Add EFI maintainer entry
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: Add EFI maintainer entry
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- [PATCH] MAINTAINERS: Add EFI maintainer entry
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [RFC] First attempt at kernel secure boot support
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 02/11] PCI: Lock down BAR access in secure boot environments
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH V2 08/10] efi: Enable secure boot lockdown automatically when enabled in firmware
- From: Serge Hallyn <serge.hallyn@xxxxxxxxxxxxx>
- Re: [PATCH V2 07/10] Secure boot: Add a dummy kernel parameter that will switch on Secure Boot mode
- From: Serge Hallyn <serge.hallyn@xxxxxxxxxxxxx>
- Re: [PATCH V2 01/10] Secure boot: Add new capability
- From: Serge Hallyn <serge.hallyn@xxxxxxxxxxxxx>
- [PATCH V3 07/10] Secure boot: Add a dummy kernel parameter that will switch on Secure Boot mode
- From: Josh Boyer <jwboyer@xxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [RFC] Second attempt at kernel secure boot support
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH V2 07/10] Secure boot: Add a dummy kernel parameter that will switch on Secure Boot mode
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH V2 07/10] Secure boot: Add a dummy kernel parameter that will switch on Secure Boot mode
- From: Josh Boyer <jwboyer@xxxxxxxxxx>
- Re: [PATCH V2 07/10] Secure boot: Add a dummy kernel parameter that will switch on Secure Boot mode
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH V2 10/10] SELinux: define mapping for new Secure Boot capability
- From: Matthew Garrett <mjg@xxxxxxxxxx>
- [PATCH V2 02/10] PCI: Lock down BAR access in secure boot environments
- From: Matthew Garrett <mjg@xxxxxxxxxx>
- [PATCH V2 03/10] x86: Lock down IO port access in secure boot environments
- From: Matthew Garrett <mjg@xxxxxxxxxx>
- [PATCH V2 05/10] asus-wmi: Restrict debugfs interface
- From: Matthew Garrett <mjg@xxxxxxxxxx>
- [PATCH V2 04/10] ACPI: Limit access to custom_method
- From: Matthew Garrett <mjg@xxxxxxxxxx>
- [PATCH V2 06/10] Restrict /dev/mem and /dev/kmem in secure boot setups
- From: Matthew Garrett <mjg@xxxxxxxxxx>
- [PATCH V2 08/10] efi: Enable secure boot lockdown automatically when enabled in firmware
- From: Matthew Garrett <mjg@xxxxxxxxxx>
- [PATCH V2 07/10] Secure boot: Add a dummy kernel parameter that will switch on Secure Boot mode
- From: Matthew Garrett <mjg@xxxxxxxxxx>
- [PATCH V2 09/10] acpi: Ignore acpi_rsdp kernel parameter in a secure boot environment
- From: Matthew Garrett <mjg@xxxxxxxxxx>
- [PATCH V2 01/10] Secure boot: Add new capability
- From: Matthew Garrett <mjg@xxxxxxxxxx>
- [RFC] Second attempt at kernel secure boot support
- From: Matthew Garrett <mjg@xxxxxxxxxx>
- Re: [PATCH] x86: Switch to vga console only if framebuffer details are missing
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86: Switch to vga console only if framebuffer details are missing
- From: Alan Cox <alan@xxxxxxxxxxxxxxxxxxx>
- [PATCH] x86: Switch to vga console only if framebuffer details are missing
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86, efi: 1:1 pagetable mapping for virtual EFI calls
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- Re: [PATCH] x86, efi: 1:1 pagetable mapping for virtual EFI calls
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- Re: [PATCH] x86, efi: 1:1 pagetable mapping for virtual EFI calls
- From: "Jan Beulich" <JBeulich@xxxxxxxx>
- Re: [PATCH] x86, efi: 1:1 pagetable mapping for virtual EFI calls
- From: "Jan Beulich" <JBeulich@xxxxxxxx>
- Re: [PATCH] x86, efi: 1:1 pagetable mapping for virtual EFI calls
- From: "Jan Beulich" <JBeulich@xxxxxxxx>
- Re: [PATCH] x86: Fix build warning on 32-bit
- From: Bjorn Helgaas <bhelgaas@xxxxxxxxxx>
- [PATCH] x86: Fix build warning on 32-bit
- From: Matthew Garrett <mjg@xxxxxxxxxx>
- Re: [PATCH] x86, efi: 1:1 pagetable mapping for virtual EFI calls
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH] x86, efi: 1:1 pagetable mapping for virtual EFI calls
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- Re: [PATCH] x86, efi: 1:1 pagetable mapping for virtual EFI calls
- From: "Jan Beulich" <JBeulich@xxxxxxxx>
- Re: [PATCH V3 1/4] EFI: Stash ROMs if they're not in the PCI BAR
- From: Bjorn Helgaas <bhelgaas@xxxxxxxxxx>
- [PATCH] x86, efi: 1:1 pagetable mapping for virtual EFI calls
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 07/11] kexec: Disable in a secure boot environment
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH 07/11] kexec: Disable in a secure boot environment
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH 07/11] kexec: Disable in a secure boot environment
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 07/11] kexec: Disable in a secure boot environment
- From: Roland Eggner <edvx1@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 07/11] kexec: Disable in a secure boot environment
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH V3 3/4] PCI: Add support for non-BAR ROMs
- From: Matthew Garrett <mjg@xxxxxxxxxx>
- Re: [PATCH V3 3/4] PCI: Add support for non-BAR ROMs
- From: Alan Cox <alan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V3 3/4] PCI: Add support for non-BAR ROMs
- From: Matthew Garrett <mjg@xxxxxxxxxx>
- Re: [PATCH V3 3/4] PCI: Add support for non-BAR ROMs
- From: Alan Cox <alan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 07/11] kexec: Disable in a secure boot environment
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH 07/11] kexec: Disable in a secure boot environment
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 07/11] kexec: Disable in a secure boot environment
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH 07/11] kexec: Disable in a secure boot environment
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH V3 3/4] PCI: Add support for non-BAR ROMs
- From: Matthew Garrett <mjg@xxxxxxxxxx>
- Re: [PATCH V3 3/4] PCI: Add support for non-BAR ROMs
- From: Don Dutile <ddutile@xxxxxxxxxx>
- Re: [PATCH 07/11] kexec: Disable in a secure boot environment
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- [RESEND][PATCH v4 0/3] make efivars/efi_pstore interrupt-safe
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- [RESEND][PATCH v4 3/3] efi_pstore: Skiping scheduling a workqueue in cases other than oops
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- RE: [RESEND][PATCH v4 0/3] make efivars/efi_pstore interrupt-safe
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- Re: [PATCH 07/11] kexec: Disable in a secure boot environment
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [RESEND][PATCH v4 2/3] efi_pstore: Introducing workqueue updating sysfs entries
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- [RESEND][PATCH v4 1/3] efivars: Disable external interrupt while holding efivars->lock
- From: Seiji Aguchi <seiji.aguchi@xxxxxxx>
- Re: [PATCH 07/11] kexec: Disable in a secure boot environment
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH 07/11] kexec: Disable in a secure boot environment
- From: Alan Cox <alan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 07/11] kexec: Disable in a secure boot environment
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH 07/11] kexec: Disable in a secure boot environment
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 10/11] acpi: Ignore acpi_rsdp kernel parameter in a secure boot environment
- From: Josh Boyer <jwboyer@xxxxxxxxxx>
- Re: [PATCH 10/11] acpi: Ignore acpi_rsdp kernel parameter in a secure boot environment
- From: Matthew Garrett <mjg@xxxxxxxxxx>
- Re: [PATCH 10/11] acpi: Ignore acpi_rsdp kernel parameter in a secure boot environment
- From: Alan Cox <alan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] Fix ACPI BGRT support for images located in EFI boot services memory
- From: Josh Triplett <josh@xxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] Fix ACPI BGRT support for images located in EFI boot services memory
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH 07/11] kexec: Disable in a secure boot environment
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH 07/11] kexec: Disable in a secure boot environment
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 0/3] Fix ACPI BGRT support for images located in EFI boot services memory
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- Re: [PATCH 0/3] Fix ACPI BGRT support for images located in EFI boot services memory
- From: Josh Triplett <josh@xxxxxxxxxxxxxxxx>
- Re: Random boot fail on 'cannot allocate trampoline' on Intel DQ57TM board with B.11 BIOS
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH 0/3] Fix ACPI BGRT support for images located in EFI boot services memory
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH 0/3] Fix ACPI BGRT support for images located in EFI boot services memory
- From: Josh Triplett <josh@xxxxxxxxxxxxxxxx>
- Re: [PATCH 10/11] acpi: Ignore acpi_rsdp kernel parameter in a secure boot environment
- From: Shuah Khan <shuahkhan@xxxxxxxxx>
- Re: [PATCH 10/11] acpi: Ignore acpi_rsdp kernel parameter in a secure boot environment
- From: Matthew Garrett <mjg@xxxxxxxxxx>
- Re: [PATCH 10/11] acpi: Ignore acpi_rsdp kernel parameter in a secure boot environment
- From: Shuah Khan <shuahkhan@xxxxxxxxx>
- [PATCH 11/11] SELinux: define mapping for new Secure Boot capability
- From: Matthew Garrett <mjg@xxxxxxxxxx>
- [PATCH 10/11] acpi: Ignore acpi_rsdp kernel parameter in a secure boot environment
- From: Matthew Garrett <mjg@xxxxxxxxxx>
- Re: [PATCH 03/11] x86: Lock down IO port access in secure boot environments
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH 05/11] asus-wmi: Restrict debugfs interface
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [RFC] First attempt at kernel secure boot support
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH 03/11] x86: Lock down IO port access in secure boot environments
- From: Alan Cox <alan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 05/11] asus-wmi: Restrict debugfs interface
- From: Alan Cox <alan@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] First attempt at kernel secure boot support
- From: Alan Cox <alan@xxxxxxxxxxxxxxxxxxx>
- [RFC] First attempt at kernel secure boot support
- From: Matthew Garrett <mjg@xxxxxxxxxx>
- [PATCH 03/11] x86: Lock down IO port access in secure boot environments
- From: Matthew Garrett <mjg@xxxxxxxxxx>
- [PATCH 04/11] ACPI: Limit access to custom_method
- From: Matthew Garrett <mjg@xxxxxxxxxx>
- [PATCH 05/11] asus-wmi: Restrict debugfs interface
- From: Matthew Garrett <mjg@xxxxxxxxxx>
- [PATCH 06/11] Restrict /dev/mem and /dev/kmem in secure boot setups
- From: Matthew Garrett <mjg@xxxxxxxxxx>
- [PATCH 07/11] kexec: Disable in a secure boot environment
- From: Matthew Garrett <mjg@xxxxxxxxxx>
- [PATCH 09/11] efi: Enable secure boot lockdown automatically when enabled in firmware
- From: Matthew Garrett <mjg@xxxxxxxxxx>
- [PATCH 08/11] Secure boot: Add a dummy kernel parameter that will switch on Secure Boot mode
- From: Matthew Garrett <mjg@xxxxxxxxxx>
- [PATCH 01/11] Secure boot: Add new capability
- From: Matthew Garrett <mjg@xxxxxxxxxx>
- [PATCH 02/11] PCI: Lock down BAR access in secure boot environments
- From: Matthew Garrett <mjg@xxxxxxxxxx>
- Re: [PATCH 0/3] Fix ACPI BGRT support for images located in EFI boot services memory
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- Re: [PATCH V3 1/4] EFI: Stash ROMs if they're not in the PCI BAR
- From: Matthew Garrett <mjg@xxxxxxxxxx>
- Random boot fail on 'cannot allocate trampoline' on Intel DQ57TM board with B.11 BIOS
- From: joeyli <jlee@xxxxxxxx>
- Re: Use PCI ROMs from EFI boot services
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: Use PCI ROMs from EFI boot services
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH V3 1/4] EFI: Stash ROMs if they're not in the PCI BAR
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH V3 1/4] EFI: Stash ROMs if they're not in the PCI BAR
- From: Bjorn Helgaas <bhelgaas@xxxxxxxxxx>
- [PATCH V3 3/4] PCI: Add support for non-BAR ROMs
- From: Matthew Garrett <mjg@xxxxxxxxxx>
- [PATCH V3 2/4] PCI: Add pcibios_add_device
- From: Matthew Garrett <mjg@xxxxxxxxxx>
- [PATCH V3 1/4] EFI: Stash ROMs if they're not in the PCI BAR
- From: Matthew Garrett <mjg@xxxxxxxxxx>
- [PATCH V3 4/4] X86: Use PCI setup data
- From: Matthew Garrett <mjg@xxxxxxxxxx>
- Use PCI ROMs from EFI boot services
- From: Matthew Garrett <mjg@xxxxxxxxxx>
- efivars kernel oops booting 32bit kernel on UEFI 64bit
- From: Phattanon Duangdara <sfalpha@xxxxxxxxx>
- Re: [Regression] "x86-64/efi: Use EFI to deal with platform wall clock" prevents my machine from booting
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- Re: [RESEND][PATCH]efi: initialize efi.runtime_version to make query_variable_info/update_capsule workable
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
- Re: [RESEND][PATCH]efi: initialize efi.runtime_version to make query_variable_info/update_capsule workable
- From: "H. Peter Anvin" <hpa@xxxxxxxxxxxxxxx>
- Re: [RESEND][PATCH]efi: initialize efi.runtime_version to make query_variable_info/update_capsule workable
- From: Matt Fleming <matt.fleming@xxxxxxxxx>
[Index of Archives]
[Linux Kernel Development]
[Security]
[Linux ARM Kernel]
[Tools]
[Linux MIPS]
[Linux S390]
[Bugtraq]
[Share Photos]>
[Fedora ARM]