Linux EFI Development - Date Index
[Prev Page][Next Page]
- [PATCH V16 11/11] arm/arm64: KVM: add guest SEA support, (continued)
- [PATCH V16 11/11] arm/arm64: KVM: add guest SEA support, Tyler Baicar
- [PATCH V16 10/11] trace, ras: add ARM processor error trace event, Tyler Baicar
- [PATCH V16 08/11] efi: print unrecognized CPER section, Tyler Baicar
- [PATCH V16 07/11] acpi: apei: panic OS with fatal error status block, Tyler Baicar
- [PATCH V16 06/11] acpi: apei: handle SEA notification type for ARMv8, Tyler Baicar
- [PATCH V16 03/11] cper: add timestamp print to CPER status printing, Tyler Baicar
- [PATCH V16 05/11] arm64: exception: handle Synchronous External Abort, Tyler Baicar
- [PATCH V16 01/11] acpi: apei: read ack upon ghes record consumption, Tyler Baicar
- [PATCH V16 02/11] ras: acpi/apei: cper: add support for generic data v3 structure, Tyler Baicar
- Re: [PATCH 4.11 00/28] 4.11.1-stable review,
Matt Fleming
[PATCH v3] x86/efi: Correct ident mapping of efi old_map when kalsr enabled,
Baoquan He
[PATCH] efi-pstore: Fix read iter after pstore API refactor,
Kees Cook
[PATCH V2] x86/efi: Add EFI_PGT_DUMP support for x86_32, kexec,
Sai Praneeth Prakhya
[PATCH] efi: remove duplicate 'const' specifiers,
Arnd Bergmann
[PATCH] x86/efi: Add EFI_PGT_DUMP support for x86_32, kexec and efi=old_map,
Sai Praneeth Prakhya
[PATCH] efi/libstub: Indicate clang the relocation mode for arm64,
Matthias Kaehlcke
[PATCH] x86/boot/32: Fix UP boot on Quark and possibly other platforms, Andy Lutomirski
[PATCH] x86/efi: Fix kexec kernel panic when efi=old_map is enabled,
Sai Praneeth Prakhya
[PATCH] efi: don't issue error message when booted under xen,
Juergen Gross
Re: [PATCH] rtc: rtc-efi: Add an enable parameter and make it false for X86 by default, Matt Fleming
[PATCH] efi/cper: Fix endianness of PCI class code,
Lukas Wunner
Re: [PATCH v3 1/3] arm64: kvm: support kvmtool to detect RAS extension feature,
gengdongjiu
Re: [PATCH v3 3/3] arm/arm64: signal SIBGUS and inject SEA Error,
gengdongjiu
[GIT PULL] Hardware module parameter annotation for secure boot, David Howells
[GIT PULL] EFI changes for v4.12, Ingo Molnar
Linux 11-rc1 to rc8 boot problem, Paweł S
[PATCH 1/2] efi/efi_test: use memdup_user,
Geliang Tang
[PATCH v2] x86/efi: Correct ident mapping of efi old_map when kalsr enabled,
Baoquan He
[PATCH 1/2] x86/efi: Correct ident mapping of efi old_map when kalsr enabled,
Baoquan He
[PATCH 1/1 linux-next] efi/capsule: kmap() can't fail,
Fabian Frederick
[PATCH 0/3 v2] xen: Implement EFI reset_system callback,
Julien Grall
[PATCH] efi/reboot: Fall back to original power-off method if EFI_RESET_SHUTDOWN returns,
Hans de Goede
[PATCH v1 1/8] lib/uuid: Introduce uuid_{be|le}_cmp_p{p}() helpers,
Andy Shevchenko
[PATCH v3 25/29] x86: assembly, make some functions local, Jiri Slaby
[PATCH v3 27/29] x86_32: assembly, change all ENTRY to SYM_FUNC_START, Jiri Slaby
[PATCH v2 0/3] efi: add support for non-standard capsule headers,
Jan Kiszka
[PATCH 4.10 22/69] x86/efi: Dont try to reserve runtime regions, Greg Kroah-Hartman
[PATCH 4.10 31/69] efi/libstub: Skip GOP with PIXEL_BLT_ONLY format, Greg Kroah-Hartman
[PATCH 4.10 32/69] efi/fb: Avoid reconfiguration of BAR that covers the framebuffer, Greg Kroah-Hartman
[PATCH 4.9 16/69] x86/efi: Dont try to reserve runtime regions, Greg Kroah-Hartman
[PATCH 4.9 25/69] efi/fb: Avoid reconfiguration of BAR that covers the framebuffer, Greg Kroah-Hartman
[PATCH 4.9 24/69] efi/libstub: Skip GOP with PIXEL_BLT_ONLY format, Greg Kroah-Hartman
[PATCH V15 00/11] Add UEFI 2.6 and ACPI 6.1 updates for RAS on ARM64,
Tyler Baicar
- [PATCH V15 11/11] arm/arm64: KVM: add guest SEA support, Tyler Baicar
- [PATCH V15 10/11] trace, ras: add ARM processor error trace event, Tyler Baicar
- [PATCH V15 09/11] ras: acpi / apei: generate trace event for unrecognized CPER section, Tyler Baicar
- [PATCH V15 07/11] acpi: apei: panic OS with fatal error status block, Tyler Baicar
- [PATCH V15 05/11] arm64: exception: handle Synchronous External Abort, Tyler Baicar
- [PATCH V15 08/11] efi: print unrecognized CPER section, Tyler Baicar
- [PATCH V15 06/11] acpi: apei: handle SEA notification type for ARMv8, Tyler Baicar
- [PATCH V15 01/11] acpi: apei: read ack upon ghes record consumption, Tyler Baicar
- [PATCH V15 04/11] efi: parse ARM processor error, Tyler Baicar
- [PATCH V15 02/11] ras: acpi/apei: cper: add support for generic data v3 structure, Tyler Baicar
- [PATCH V15 03/11] cper: add timestamp print to CPER status printing, Tyler Baicar
[PATCH v5 00/32] x86: Secure Memory Encryption (AMD),
Tom Lendacky
- [PATCH v5 03/32] x86, mpparse, x86/acpi, x86/PCI, SFI: Use memremap for RAM mappings, Tom Lendacky
- [PATCH v5 06/32] x86/mm: Add Secure Memory Encryption (SME) support, Tom Lendacky
- [PATCH v5 05/32] x86/CPU/AMD: Handle SME reduction in physical address size, Tom Lendacky
- [PATCH v5 04/32] x86/CPU/AMD: Add the Secure Memory Encryption CPU feature, Tom Lendacky
- [PATCH v5 02/32] x86/mm/pat: Set write-protect cache mode for full PAT support, Tom Lendacky
- [PATCH v5 01/32] x86: Documentation for AMD Secure Memory Encryption (SME), Tom Lendacky
- <Possible follow-ups>
- [PATCH v5 00/32] x86: Secure Memory Encryption (AMD), Tom Lendacky
- [PATCH v5 04/32] x86/CPU/AMD: Add the Secure Memory Encryption CPU feature, Tom Lendacky
- [PATCH v5 05/32] x86/CPU/AMD: Handle SME reduction in physical address size, Tom Lendacky
- [PATCH v5 12/32] x86/mm: Insure that boot memory areas are mapped properly, Tom Lendacky
- [PATCH v5 15/32] efi: Update efi_mem_type() to return an error rather than 0, Tom Lendacky
- [PATCH v5 16/32] x86/efi: Update EFI pagetable creation to work with SME, Tom Lendacky
- [PATCH v5 21/32] x86, realmode: Decrypt trampoline area if memory encryption is active, Tom Lendacky
- [PATCH v5 25/32] x86, realmode: Check for memory encryption on the APs, Tom Lendacky
- [PATCH v5 24/32] iommu/amd: Disable AMD IOMMU if memory encryption is active, Tom Lendacky
- [PATCH v5 27/32] kvm: x86: svm: Enable Secure Memory Encryption within KVM, Tom Lendacky
- [PATCH v5 28/32] x86/mm, kexec: Allow kexec to be used with SME, Tom Lendacky
- [PATCH v5 29/32] x86/mm: Add support to encrypt the kernel in-place, Tom Lendacky
- [PATCH v5 31/32] x86: Add sysfs support for Secure Memory Encryption, Tom Lendacky
- [PATCH v5 30/32] x86/boot: Add early cmdline parsing for options with arguments, Tom Lendacky
- [PATCH v5 26/32] x86, drm, fbdev: Do not specify encrypted memory for video mappings, Tom Lendacky
- [PATCH v5 32/32] x86/mm: Add support to make use of Secure Memory Encryption, Tom Lendacky
- [PATCH v5 23/32] swiotlb: Add warnings for use of bounce buffers with SME, Tom Lendacky
- [PATCH v5 22/32] x86, swiotlb: DMA support for memory encryption, Tom Lendacky
- [PATCH v5 17/32] x86/mm: Add support to access boot related data in the clear, Tom Lendacky
- [PATCH v5 19/32] x86/mm: Add support to access persistent memory in the clear, Tom Lendacky
- [PATCH v5 20/32] x86/mm: Add support for changing the memory encryption attribute, Tom Lendacky
- [PATCH v5 18/32] x86, mpparse: Use memremap to map the mpf and mpc data, Tom Lendacky
- [PATCH v5 13/32] x86/boot/e820: Add support to determine the E820 type of an address, Tom Lendacky
- [PATCH v5 11/32] x86/mm: Add support for early encrypt/decrypt of memory, Tom Lendacky
- [PATCH v5 14/32] efi: Add an EFI table address match function, Tom Lendacky
- [PATCH v5 10/32] x86/mm: Extend early_memremap() support with additional attrs, Tom Lendacky
- [PATCH v5 08/32] x86/mm: Simplify p[g4um]d_page() macros, Tom Lendacky
- [PATCH v5 07/32] x86/mm: Add support to enable SME in early boot processing, Tom Lendacky
- [PATCH v5 09/32] x86/mm: Provide general kernel support for memory encryption, Tom Lendacky
- [PATCH v5 06/32] x86/mm: Add Secure Memory Encryption (SME) support, Tom Lendacky
- [PATCH v5 03/32] x86, mpparse, x86/acpi, x86/PCI, SFI: Use memremap for RAM mappings, Tom Lendacky
- [PATCH v5 02/32] x86/mm/pat: Set write-protect cache mode for full PAT support, Tom Lendacky
- [PATCH v5 01/32] x86: Documentation for AMD Secure Memory Encryption (SME), Tom Lendacky
[GIT PULL] EFI fixup for v4.12 queue,
Ard Biesheuvel
[PATCH v2] efi: Config options to assign versions in the PE-COFF header,
Gary Lin
[RFC PATCH] x86: Config options to assign versions in the PE-COFF header,
Gary Lin
[PATCH] efifb: arm/arm64: validate fb BAR instead of claiming it, Ard Biesheuvel
[PATCH] efi/libstub: arm/arm64: don't use TASK_SIZE when randomising the RT space,
Ard Biesheuvel
Re: [PATCH] arm64: xen: Implement EFI reset_system callback,
Mark Rutland
[PATCH 1/5] efi: Move the x86 secure boot switch to generic code,
David Howells
[PATCH 4.9 58/72] x86/mm/KASLR: Exclude EFI region from KASLR VA space randomization, Greg Kroah-Hartman
[PATCH 4.10 65/81] x86/mm/KASLR: Exclude EFI region from KASLR VA space randomization, Greg Kroah-Hartman
[PATCH 00/24] Kernel lockdown,
David Howells
- [PATCH 01/24] efi: Add EFI_SECURE_BOOT bit, David Howells
- [PATCH 02/24] Add the ability to lock down access to the running kernel image, David Howells
- [PATCH 05/24] Restrict /dev/mem and /dev/kmem when the kernel is locked down, David Howells
- [PATCH 08/24] Copy secure_boot flag in boot params across kexec reboot, David Howells
- [PATCH 07/24] kexec: Disable at runtime if the kernel is locked down, David Howells
- [PATCH 03/24] efi: Lock down the kernel if booted in secure boot mode, David Howells
- [PATCH 06/24] Add a sysrq option to exit secure boot mode, David Howells
- [PATCH 04/24] Enforce module signatures if the kernel is locked down, David Howells
- Re: [PATCH 00/24] Kernel lockdown, Justin Forbes
- <Possible follow-ups>
- [PATCH 00/24] Kernel lockdown, David Howells
- [PATCH 02/24] Add the ability to lock down access to the running kernel image, David Howells
- [PATCH 01/24] efi: Add EFI_SECURE_BOOT bit, David Howells
- [PATCH 04/24] Enforce module signatures if the kernel is locked down, David Howells
- [PATCH 03/24] efi: Lock down the kernel if booted in secure boot mode, David Howells
- [PATCH 09/24] kexec_file: Disable at runtime if securelevel has been set, David Howells
- [PATCH 17/24] acpi: Ignore acpi_rsdp kernel param when the kernel has been locked down, David Howells
- [PATCH 16/24] ACPI: Limit access to custom_method when the kernel is locked down, David Howells
- [PATCH 19/24] acpi: Disable APEI error injection if the kernel is locked down, David Howells
- [PATCH 18/24] acpi: Disable ACPI table override if the kernel is locked down, David Howells
- [PATCH 15/24] asus-wmi: Restrict debugfs interface when the kernel is locked down, David Howells
- [PATCH 11/24] uswsusp: Disable when the kernel is locked down, David Howells
- [PATCH 12/24] PCI: Lock down BAR access when the kernel is locked down, David Howells
- [PATCH 14/24] x86: Restrict MSR access when the kernel is locked down, David Howells
- [PATCH 05/24] Restrict /dev/mem and /dev/kmem when the kernel is locked down, David Howells
- [PATCH 06/24] Add a sysrq option to exit secure boot mode, David Howells
- [PATCH 08/24] Copy secure_boot flag in boot params across kexec reboot, David Howells
- [PATCH 13/24] x86: Lock down IO port access when the kernel is locked down, David Howells
- [PATCH 10/24] hibernate: Disable when the kernel is locked down, David Howells
- [PATCH 07/24] kexec: Disable at runtime if the kernel is locked down, David Howells
- Re: [PATCH 00/24] Kernel lockdown, David Howells
- Re: [PATCH 00/24] Kernel lockdown, James Morris
- Re: [PATCH 00/24] Kernel lockdown, David Howells
- [PATCH 00/24] Kernel lockdown, David Howells
- [PATCH 01/24] efi: Add EFI_SECURE_BOOT bit, David Howells
- [PATCH 02/24] Add the ability to lock down access to the running kernel image, David Howells
- [PATCH 03/24] efi: Lock down the kernel if booted in secure boot mode, David Howells
- [PATCH 05/24] Restrict /dev/mem and /dev/kmem when the kernel is locked down, David Howells
- [PATCH 06/24] Add a sysrq option to exit secure boot mode, David Howells
- [PATCH 07/24] kexec: Disable at runtime if the kernel is locked down, David Howells
- [PATCH 10/24] hibernate: Disable when the kernel is locked down, David Howells
- [PATCH 13/24] x86: Lock down IO port access when the kernel is locked down, David Howells
- [PATCH 21/24] scsi: Lock down the eata driver, David Howells
- [PATCH 23/24] Lock down TIOCSSERIAL, David Howells
- [PATCH 22/24] Prohibit PCMCIA CIS storage when the kernel is locked down, David Howells
- [PATCH 24/24] Lock down module params that specify hardware parameters (eg. ioport), David Howells
- [PATCH 20/24] bpf: Restrict kernel image access functions when the kernel is locked down, David Howells
- [PATCH 19/24] acpi: Disable APEI error injection if the kernel is locked down, David Howells
- [PATCH 08/24] Copy secure_boot flag in boot params across kexec reboot, David Howells
- [PATCH 11/24] uswsusp: Disable when the kernel is locked down, David Howells
- [PATCH 12/24] PCI: Lock down BAR access when the kernel is locked down, David Howells
- [PATCH 15/24] asus-wmi: Restrict debugfs interface when the kernel is locked down, David Howells
- [PATCH 16/24] ACPI: Limit access to custom_method when the kernel is locked down, David Howells
- [PATCH 18/24] acpi: Disable ACPI table override if the kernel is locked down, David Howells
- [PATCH 17/24] acpi: Ignore acpi_rsdp kernel param when the kernel has been locked down, David Howells
- [PATCH 14/24] x86: Restrict MSR access when the kernel is locked down, David Howells
- [PATCH 09/24] kexec_file: Disable at runtime if securelevel has been set, David Howells
- [PATCH 04/24] Enforce module signatures if the kernel is locked down, David Howells
- Re: [PATCH 00/24] Kernel lockdown, Austin S. Hemmelgarn
- Why kernel lockdown?, David Howells
[PATCH 0/8] efi: add support for non-standard capsule headers,
Ard Biesheuvel
- [PATCH 1/8] efi/capsule: Fix return code on failing kmap/vmap, Ard Biesheuvel
- [PATCH 2/8] efi/capsule: Remove pr_debug on ENOMEM or EFAULT, Ard Biesheuvel
- [PATCH 3/8] efi/capsule: Clean up pr_err/info messages, Ard Biesheuvel
- [PATCH 6/8] efi/capsule-loader: indirect calls to efi_capsule_setup_info via weak alias, Ard Biesheuvel
- [PATCH 4/8] efi/capsule: Adjust return type of efi_capsule_setup_info, Ard Biesheuvel
- [PATCH 5/8] efi/capsule-loader: use cached copy of capsule header, Ard Biesheuvel
- [PATCH 8/8] efi/capsule: Add support for Quark security header, Ard Biesheuvel
- [PATCH 7/8] efi/capsule-loader: use page addresses rather than struct page pointers, Ard Biesheuvel
- Re: [PATCH 0/8] efi: add support for non-standard capsule headers, Jan Kiszka
- Re: [PATCH 0/8] efi: add support for non-standard capsule headers, Bryan O'Donoghue
[GIT PULL 00/12] EFI updates for v4.12,
Ard Biesheuvel
- [PATCH 1/2] efi/libstub: Skip GOP with PIXEL_BLT_ONLY format, Ard Biesheuvel
- [PATCH 2/2] efifb: Avoid reconfiguration of BAR that covers the framebuffer, Ard Biesheuvel
- [PATCH 09/12] efi/libstub: Fix harmless command line parsing bug, Ard Biesheuvel
- [PATCH 07/12] x86/efi: Clean up a minor mistake in code comment, Ard Biesheuvel
- [PATCH 08/12] efi/arm32-stub: Allow boottime allocations in the vmlinux region, Ard Biesheuvel
- [PATCH 05/12] efi: bgrt: Enable ACPI BGRT handling on arm64, Ard Biesheuvel
- [PATCH 02/12] efi: arm-stub: Correct FDT and initrd allocation rules for arm64, Ard Biesheuvel
- [PATCH 03/12] efi: arm-stub: Round up FDT allocation to mapping size, Ard Biesheuvel
- [PATCH 04/12] x86/efi-bgrt: Move efi-bgrt handling out of arch/x86, Ard Biesheuvel
- [PATCH 06/12] pstore: return error code (if any) from efi_pstore_write, Ard Biesheuvel
- [PATCH 01/12] x86/efi: Clean up efi CR3 save/restore, Ard Biesheuvel
- Re: [GIT PULL 00/12] EFI updates for v4.12, Ard Biesheuvel
- [PATCH 10/12] efi/libstub: Unify command line param parsing, Ard Biesheuvel
[GIT PULL 0/2] EFI fixes for v4.11,
Ard Biesheuvel
[PATCH v35 14/14] efi/libstub/arm*: Set default address and size cells values for an empty dtb, AKASHI Takahiro
[PATCH V14 00/10] Add UEFI 2.6 and ACPI 6.1 updates for RAS on ARM64,
Tyler Baicar
- [PATCH V14 05/10] acpi: apei: handle SEA notification type for ARMv8, Tyler Baicar
- [PATCH V14 08/10] ras: acpi / apei: generate trace event for unrecognized CPER section, Tyler Baicar
- [PATCH V14 09/10] trace, ras: add ARM processor error trace event, Tyler Baicar
- [PATCH V14 07/10] efi: print unrecognized CPER section, Tyler Baicar
- [PATCH V14 10/10] arm/arm64: KVM: add guest SEA support, Tyler Baicar
- [PATCH V14 04/10] arm64: exception: handle Synchronous External Abort, Tyler Baicar
- [PATCH V14 06/10] acpi: apei: panic OS with fatal error status block, Tyler Baicar
- [PATCH V14 03/10] efi: parse ARM processor error, Tyler Baicar
- [PATCH V14 01/10] acpi: apei: read ack upon ghes record consumption, Tyler Baicar
- [PATCH V14 02/10] ras: acpi/apei: cper: generic error data entry v3 per ACPI 6.1, Tyler Baicar
- Re: [PATCH V14 00/10] Add UEFI 2.6 and ACPI 6.1 updates for RAS on ARM64, Catalin Marinas
[PATCH v34 14/14] efi/libstub/arm*: Set default address and size cells values for an empty dtb,
AKASHI Takahiro
[PATCH v2 0/4] efi: libstub enhancements for cmdline parsing and kaslr,
Ard Biesheuvel
[efi:next 11/13] drivers/firmware/efi/libstub/efi-stub-helper.c:421:40: error: 'CONFIG_CMDLINE' undeclared, kbuild test robot
[PATCH v2 0/7] efi: Enhance capsule loader to support signed Quark images,
Jan Kiszka
[PATCH 0/4] efi: libstub enhancements for cmdline parsing and kaslr,
Ard Biesheuvel
[PATCH v2] efi/arm32-stub: allow boottime allocations in the vmlinux region, Ard Biesheuvel
[PATCH v2] x86/efi: Clean up a minor mistake in code comment,
Baoquan He
[PATCH v2] x86/mm/KASLR: EFI region is mistakenly included into KASLR VA space for randomization,
Baoquan He
[Index of Archives]
[Linux Kernel Development]
[Security]
[Linux ARM Kernel]
[Tools]
[Linux MIPS]
[Linux S390]
[Bugtraq]
[Share Photos]>
[Fedora ARM]