Linux EFI Development - Date Index
[Prev Page][Next Page]
- Re: Regression from efi: call get_event_log before ExitBootServices, (continued)
- Message not available
Re: Regression from efi: call get_event_log before ExitBootServices, Thiebaud Weksteen
Re: Regression from efi: call get_event_log before ExitBootServices, Thiebaud Weksteen
[PATCH V2 0/3] Use efi_rts_workqueue to invoke EFI Runtime Services,
Sai Praneeth Prakhya
[PATCH AUTOSEL for 4.9 054/219] x86/boot/32: Defer resyncing initial_page_table until per-cpu is set up, Sasha Levin
Re: Deleting pstore data causes immediate hang of 4.15.5 on Lenovo P70 with upgraded bios,
Marc MERLIN
[PATCH] efi: make const array 'apple' static,
Colin King
[PATCH 4.14 079/115] x86/efi: Fix kernel param add_efi_memmap regression, Greg Kroah-Hartman
linux-next: UEFI Secure boot lockdown patchset,
David Howells
[RFC/mock up/PoC/DRAFT PATCH v1] efi/apple-properties: Convert to be a property provider,
Andy Shevchenko
[PATCH 3.16 061/254] efi: Move some sysfs files to be read-only by root, Ben Hutchings
[PATCH v1] efi/apple-properties: Use memremap() instead of ioremap(),
Andy Shevchenko
Re: 91f606a8fa ("x86/mm: Replace compile-time checks for 5-level .."): BUG: kernel reboot-without-warning in boot stage, Kirill A. Shutemov
[RFC PATCH v1] efi/apple-properties: Assume 32-bit values only for now,
Andy Shevchenko
[PATCH v2 0/8] Decode IA32/X64 CPER,
Yazen Ghannam
- [PATCH v2 7/8] efi: Decode IA32/X64 MS Check structure, Yazen Ghannam
- [PATCH v2 6/8] efi: Decode additional IA32/X64 Bus Check fields, Yazen Ghannam
- [PATCH v2 4/8] efi: Decode UEFI-defined IA32/X64 Error Structure GUIDs, Yazen Ghannam
- [PATCH v2 8/8] efi: Decode IA32/X64 Context Info structure, Yazen Ghannam
- [PATCH v2 5/8] efi: Decode IA32/X64 Cache, TLB, and Bus Check structures, Yazen Ghannam
- [PATCH v2 3/8] efi: Decode IA32/X64 Processor Error Info Structure, Yazen Ghannam
- [PATCH v2 2/8] efi: Decode IA32/X64 Processor Error Section, Yazen Ghannam
- [PATCH v2 1/8] efi: Fix IA32/X64 Processor Error Record definition, Yazen Ghannam
- Re: [PATCH v2 0/8] Decode IA32/X64 CPER, Borislav Petkov
[PATCH V1 0/3] Use efi_rts_workqueue to invoke EFI Runtime Services,
Sai Praneeth Prakhya
[PATCH 3.18 53/58] mm/early_ioremap: Fix boot hang with earlyprintk=efi,keep, Greg Kroah-Hartman
[PATCH 4.4 058/193] mm/early_ioremap: Fix boot hang with earlyprintk=efi,keep, Greg Kroah-Hartman
[PATCH 0/8] Decode IA32/X64 CPER,
Yazen Ghannam
- [PATCH 8/8] efi: Decode IA32/X64 Context Info structure, Yazen Ghannam
- [PATCH 5/8] efi: Decode IA32/X64 Cache, TLB, and Bus Check structures, Yazen Ghannam
- [PATCH 7/8] efi: Decode IA32/X64 MS Check structure, Yazen Ghannam
- [PATCH 4/8] efi: Decode UEFI-defined IA32/X64 Error Structure GUIDs, Yazen Ghannam
- [PATCH 6/8] efi: Decode additional IA32/X64 Bus Check fields, Yazen Ghannam
- [PATCH 3/8] efi: Decode IA32/X64 Processor Error Info Structure, Yazen Ghannam
- [PATCH 1/8] efi: Fix IA32/X64 Processor Error Record definition, Yazen Ghannam
- [PATCH 2/8] efi: Decode IA32/X64 Processor Error Section, Yazen Ghannam
- Re: [PATCH 0/8] Decode IA32/X64 CPER, Ard Biesheuvel
[PATCH 4.9 082/145] mm/early_ioremap: Fix boot hang with earlyprintk=efi,keep, Greg Kroah-Hartman
[PATCH 0/2] ESRT fixes for relocatable kexec'd kernel,
Tyler Baicar
[PATCH 4.14 147/159] mm/early_ioremap: Fix boot hang with earlyprintk=efi,keep, Greg Kroah-Hartman
[PATCH 0/2] efivars: reading variables can generate SMIs,
Joe Konno
Re: [PATCH 0/2] efivars: reading variables can generate SMIs, Ard Biesheuvel
Read-protected UEFI variables,
Benjamin Drung
[PATCH] efi/apple-properties: Delete an error message for a failed memory allocation in unmarshal_devices(),
SF Markus Elfring
[PATCH] efi: Delete an error message for a failed memory allocation in efivar_init(), SF Markus Elfring
[PATCH AUTOSEL for 4.14 082/110] x86/efi: Fix kernel param add_efi_memmap regression, Sasha Levin
[PATCH 4.14 156/156] x86/efi: Clarify that reset attack mitigation needs appropriate userspace, Greg Kroah-Hartman
[PATCH 4.15 55/55] x86/efi: Clarify that reset attack mitigation needs appropriate userspace, Greg Kroah-Hartman
[PATCH] x86/debugfs: Add the EFI pagetable to the debugfs 'page_tables' directory,
Andy Lutomirski
[GIT PULL] EFI changes for v4.16, Ingo Molnar
[PATCH AUTOSEL for 4.14 094/100] mm/early_ioremap: Fix boot hang with earlyprintk=efi,keep, Sasha Levin
[PATCH AUTOSEL for 4.9 45/49] mm/early_ioremap: Fix boot hang with earlyprintk=efi,keep, Sasha Levin
[PATCH AUTOSEL for 4.4 33/36] mm/early_ioremap: Fix boot hang with earlyprintk=efi,keep, Sasha Levin
[PATCH AUTOSEL for 3.18 22/25] mm/early_ioremap: Fix boot hang with earlyprintk=efi,keep, Sasha Levin
[PATCH 0/4] efi/arm64: unmap the kernel during runtime service calls,
Ard Biesheuvel
[PATCH] x86: efi: Replace GFP_ATOMIC with GFP_KERNEL in efi_query_variable_store,
Jia-Ju Bai
[PATCH] x86/efi: Fix trailing semicolons,
Luis de Bethencourt
[PATCH v1] efi/apple-properties: Device core takes care of empty properties,
Andy Shevchenko
[PATCH] efi: arm: stop printing addresses of virtual mappings,
Ard Biesheuvel
[PATCH V4 1/3] efi: Use efi_mm in x86 as well as ARM, Sai Praneeth Prakhya
[PATCH V4 3/3] x86/efi: Use efi_switch_mm() rather than manually twiddling with %cr3, Sai Praneeth Prakhya
[PATCH V4 2/3] x86/efi: Replace efi_pgd with efi_mm.pgd, Sai Praneeth Prakhya
[PATCH V4 0/3] Use mm_struct and switch_mm() instead of manually,
Sai Praneeth Prakhya
[PATCH] efi: arm64: Check whether x18 is preserved by runtime services calls, Ard Biesheuvel
[PATCH] efi/arm*: Only register page tables when they exist,
Mark Rutland
[PATCH 4.14 090/118] x86/pti: Unbreak EFI old_memmap, Greg Kroah-Hartman
[PATCH 0/4] x86/xen/efi: Initialize UEFI secure boot state during dom0 boot,
Daniel Kiper
[PATCH] efi: Clarify that reset attack mitigation needs appropriate userspace,
Matthew Garrett
[PATCH 4.14 13/38] efi/capsule-loader: Reinstate virtual capsule mapping, Greg Kroah-Hartman
[PATCH] PTI: unbreak EFI old_memmap, Jiri Kosina
[PATCH] MAINTAINERS: Add Ard Biesheuvel to EFI test driver and efivarfs, Ard Biesheuvel
[PATCH] MAINTAINERS: Remove Matt Fleming as EFI co-maintainer,
Matt Fleming
[GIT PULL 0/5] EFI updates for v4.16,
Ard Biesheuvel
[GIT PULL 0/2] EFI fixes for v4.15,
Ard Biesheuvel
[PATCH] module: allow symbol exports to be disabled, Ard Biesheuvel
[RFT PATCH] efi: capsule-loader: reinstate virtual capsule mapping,
Ard Biesheuvel
BUG: EFI capsule loader fails as of 4.13, the capsule is not passed in contiguous virtual memory, Richard Ruigrok
EFI crash with PCID on,
Andy Lutomirski
[PATCH 0/2] Make capsules in a contiguous virtual space,
Ge Song
[PATCH 1/2] Revert "efi/capsule-loader: Use page addresses rather than struct page pointers", Ge Song
[PATCH 2/2] efi/capsule-loader: Request a contiguous virtual space for capsules, Ge Song
[PATCH 3/3] x86/efi: Use efi_switch_mm() rather than manually twiddling with %cr3, Sai Praneeth Prakhya
[PATCH 2/3] x86/efi: Replace efi_pgd with efi_mm.pgd, Sai Praneeth Prakhya
[PATCH 1/3] efi: Use efi_mm in x86 as well as ARM, Sai Praneeth Prakhya
[PATCH V2] x86/efi: fix kernel param add_efi_memmap regression,
Dave Young
[PATCH 1/2] kconfig: use bool instead of boolean for type definition attributes, again,
Masahiro Yamada
[PATCH 4.4 013/105] efi: Move some sysfs files to be read-only by root, Greg Kroah-Hartman
[PATCH 4.4 103/105] Revert "x86/mm/pat: Ensure cpa->pfn only contains page frame numbers",
Greg Kroah-Hartman
[PATCH 4.4 102/105] Revert "x86/efi: Hoist page table switching code into efi_call_virt()", Greg Kroah-Hartman
[PATCH 4.4 101/105] Revert "x86/efi: Build our own page table structures", Greg Kroah-Hartman
[PATCH 3.18 11/64] efi: Move some sysfs files to be read-only by root, Greg Kroah-Hartman
Booting LiveCD image from EFI PXE?, Locane
[PATCH V3 0/2] CPER ARM error information parsing,
Tyler Baicar
[PATCH 4.14 038/164] efi: Move some sysfs files to be read-only by root, Greg Kroah-Hartman
[PATCH 4.14 039/164] efi/esrt: Use memunmap() instead of kfree() to free the remapping, Greg Kroah-Hartman
[PATCH 4.9 017/148] efi/esrt: Use memunmap() instead of kfree() to free the remapping, Greg Kroah-Hartman
[PATCH 4.9 016/148] efi: Move some sysfs files to be read-only by root, Greg Kroah-Hartman
[PATCH v5 1/2] arm64: Define cputype macros for Falkor CPU,
Shanker Donthineni
[PATCH 41/45] arch/x86: remove duplicate includes,
Pravin Shedge
[RESEND PATCH v4 1/2] arm64: Define cputype macros for Falkor CPU,
Shanker Donthineni
[PATCH] efi: make EFI a menuconfig to ease disabling it all,
Vincent Legoll
[PATCH resend] fix boot hang with earlyprintk=efi,keep, Dave Young
[PATCH V2 0/2] CPER ARM error information parsing,
Tyler Baicar
[GIT PULL 0/3] EFI fixes for v4.15,
Ard Biesheuvel
[PATCH] efi: move some sysfs files to be read-only by root,
Greg Kroah-Hartman
[RFC v3 PATCH 0/2] Introduce Security Version to EFI Stub,
Gary Lin
[PATCH] efi: add comment to avoid future expanding of sysfs systab,
Dave Young
[PATCH 4.4 03/27] x86/mm/pat: Ensure cpa->pfn only contains page frame numbers, Greg Kroah-Hartman
[PATCH 4.4 05/27] x86/efi: Build our own page table structures,
Greg Kroah-Hartman
[PATCH 4.4 04/27] x86/efi: Hoist page table switching code into efi_call_virt(), Greg Kroah-Hartman
[PATCH] fix system_state checking in early_ioremap,
Dave Young
[PATCH v5 19/27] x86: assembly, make some functions local, Jiri Slaby
[PATCH v5 26/27] x86_32: assembly, change all ENTRY+ENDPROC to SYM_FUNC_*, Jiri Slaby
[PATCH v5 23/27] x86_64: assembly, change all ENTRY+ENDPROC to SYM_FUNC_*, Jiri Slaby
[PATCH] x86: move parse_early_param to earlier code for add_efi_memmap,
Dave Young
Re: [GIT PULL] hash addresses printed with %p,
Linus Torvalds
[PATCH 0/4] Using the hash in MOKx to blacklist kernel module,
Lee, Chun-Yi
[PATCH] efi: Use PTR_ERR_OR_ZERO(),
Vasyl Gomonovych
[PATCH v4 0/2] Implement a software workaround for Falkor erratum 1041,
Shanker Donthineni
[PATCH v3 0/2] Implement a software workaround for Falkor erratum 1041,
Shanker Donthineni
[PATCH v2 0/2] Implement a software workaround for Falkor erratum 1041,
Shanker Donthineni
arm64 crashkernel fails to boot on acpi-only machines due to ACPI regions being no longer mapped as NOMAP,
Bhupesh Sharma
[PATCH 00/30] security, efi: Add kernel lockdown,
David Howells
- [PATCH 02/30] Add a SysRq option to lift kernel lockdown, David Howells
- [PATCH 04/30] Enforce module signatures if the kernel is locked down, David Howells
- [PATCH 09/30] hibernate: Disable when the kernel is locked down, David Howells
- [PATCH 30/30] efi: Lock down the kernel if booted in secure boot mode, David Howells
- [PATCH 29/30] efi: Add an EFI_SECURE_BOOT flag to indicate secure boot mode, David Howells
- [PATCH 28/30] bpf: Restrict kernel image access functions when the kernel is locked down, David Howells
- [PATCH 27/30] Lock down kprobes, David Howells
- [PATCH 26/30] Lock down ftrace, David Howells
- [PATCH 25/30] Lock down /proc/kcore, David Howells
- [PATCH 23/30] x86/mmiotrace: Lock down the testmmiotrace module, David Howells
- [PATCH 24/30] debugfs: Disallow use of debugfs files when the kernel is locked down, David Howells
- [PATCH 22/30] Lock down module params that specify hardware parameters (eg. ioport), David Howells
- [PATCH 20/30] Prohibit PCMCIA CIS storage when the kernel is locked down, David Howells
- [PATCH 21/30] Lock down TIOCSSERIAL, David Howells
- [PATCH 18/30] acpi: Disable APEI error injection if the kernel is locked down, David Howells
- [PATCH 19/30] scsi: Lock down the eata driver, David Howells
- [PATCH 17/30] acpi: Disable ACPI table override if the kernel is locked down, David Howells
- [PATCH 16/30] acpi: Ignore acpi_rsdp kernel param when the kernel has been locked down, David Howells
- [PATCH 14/30] asus-wmi: Restrict debugfs interface when the kernel is locked down, David Howells
- [PATCH 15/30] ACPI: Limit access to custom_method when the kernel is locked down, David Howells
- [PATCH 12/30] x86: Lock down IO port access when the kernel is locked down, David Howells
- [PATCH 13/30] x86/msr: Restrict MSR access when the kernel is locked down, David Howells
- [PATCH 08/30] kexec_file: Restrict at runtime if the kernel is locked down, David Howells
- [PATCH 10/30] uswsusp: Disable when the kernel is locked down, David Howells
- [PATCH 11/30] PCI: Lock down BAR access when the kernel is locked down, David Howells
- [PATCH 07/30] Copy secure_boot flag in boot params across kexec reboot, David Howells
- [PATCH 03/30] ima: require secure_boot rules in lockdown mode, David Howells
- [PATCH 05/30] Restrict /dev/{mem, kmem, port} when the kernel is locked down, David Howells
- [PATCH 06/30] kexec: Disable at runtime if the kernel is locked down, David Howells
- [PATCH 01/30] Add the ability to lock down access to the running kernel image, David Howells
- Re: [PATCH 04/30] Enforce module signatures if the kernel is locked down, David Howells
- Re: [PATCH 08/30] kexec_file: Restrict at runtime if the kernel is locked down, David Howells
- Re: [PATCH 08/30] kexec_file: Restrict at runtime if the kernel is locked down, David Howells
- Re: [PATCH 00/30] security, efi: Add kernel lockdown, Andrew Morton
[PATCH 0/3] Implement a software workaround for Falkor erratum 1041,
Shanker Donthineni
efi/esrt: use memunmap rather kfree to free the remapping,
Pan Bian
[PATCH] efi: setting secure boot flag in EFI stub when the sentinel is tainted., Lee, Chun-Yi
[GIT PULL] Kernel lockdown for secure boot,
David Howells
[Index of Archives]
[Linux Kernel Development]
[Security]
[Linux ARM Kernel]
[Tools]
[Linux MIPS]
[Linux S390]
[Bugtraq]
[Share Photos]>
[Fedora ARM]