Linux EFI Development - Date Index
[Prev Page][Next Page]
- [PATCH v1 7/8] efi: Use recently introduced uuid_le_cmp_p{p}() helpers, (continued)
- [PATCH v3 25/29] x86: assembly, make some functions local, Jiri Slaby
- [PATCH v3 27/29] x86_32: assembly, change all ENTRY to SYM_FUNC_START, Jiri Slaby
- [PATCH v2 0/3] efi: add support for non-standard capsule headers,
Jan Kiszka
- [PATCH 4.10 22/69] x86/efi: Dont try to reserve runtime regions, Greg Kroah-Hartman
- [PATCH 4.10 31/69] efi/libstub: Skip GOP with PIXEL_BLT_ONLY format, Greg Kroah-Hartman
- [PATCH 4.10 32/69] efi/fb: Avoid reconfiguration of BAR that covers the framebuffer, Greg Kroah-Hartman
- [PATCH 4.9 16/69] x86/efi: Dont try to reserve runtime regions, Greg Kroah-Hartman
- [PATCH 4.9 25/69] efi/fb: Avoid reconfiguration of BAR that covers the framebuffer, Greg Kroah-Hartman
- [PATCH 4.9 24/69] efi/libstub: Skip GOP with PIXEL_BLT_ONLY format, Greg Kroah-Hartman
- [PATCH V15 00/11] Add UEFI 2.6 and ACPI 6.1 updates for RAS on ARM64,
Tyler Baicar
- [PATCH V15 11/11] arm/arm64: KVM: add guest SEA support, Tyler Baicar
- [PATCH V15 10/11] trace, ras: add ARM processor error trace event, Tyler Baicar
- [PATCH V15 09/11] ras: acpi / apei: generate trace event for unrecognized CPER section, Tyler Baicar
- [PATCH V15 07/11] acpi: apei: panic OS with fatal error status block, Tyler Baicar
- [PATCH V15 05/11] arm64: exception: handle Synchronous External Abort, Tyler Baicar
- [PATCH V15 08/11] efi: print unrecognized CPER section, Tyler Baicar
- [PATCH V15 06/11] acpi: apei: handle SEA notification type for ARMv8, Tyler Baicar
- [PATCH V15 01/11] acpi: apei: read ack upon ghes record consumption, Tyler Baicar
- [PATCH V15 04/11] efi: parse ARM processor error, Tyler Baicar
- [PATCH V15 02/11] ras: acpi/apei: cper: add support for generic data v3 structure, Tyler Baicar
- [PATCH V15 03/11] cper: add timestamp print to CPER status printing, Tyler Baicar
- [PATCH v5 00/32] x86: Secure Memory Encryption (AMD),
Tom Lendacky
- [PATCH v5 03/32] x86, mpparse, x86/acpi, x86/PCI, SFI: Use memremap for RAM mappings, Tom Lendacky
- [PATCH v5 06/32] x86/mm: Add Secure Memory Encryption (SME) support, Tom Lendacky
- [PATCH v5 05/32] x86/CPU/AMD: Handle SME reduction in physical address size, Tom Lendacky
- [PATCH v5 04/32] x86/CPU/AMD: Add the Secure Memory Encryption CPU feature, Tom Lendacky
- [PATCH v5 02/32] x86/mm/pat: Set write-protect cache mode for full PAT support, Tom Lendacky
- [PATCH v5 01/32] x86: Documentation for AMD Secure Memory Encryption (SME), Tom Lendacky
- <Possible follow-ups>
- [PATCH v5 00/32] x86: Secure Memory Encryption (AMD), Tom Lendacky
- [PATCH v5 04/32] x86/CPU/AMD: Add the Secure Memory Encryption CPU feature, Tom Lendacky
- [PATCH v5 05/32] x86/CPU/AMD: Handle SME reduction in physical address size, Tom Lendacky
- [PATCH v5 12/32] x86/mm: Insure that boot memory areas are mapped properly, Tom Lendacky
- [PATCH v5 15/32] efi: Update efi_mem_type() to return an error rather than 0, Tom Lendacky
- [PATCH v5 16/32] x86/efi: Update EFI pagetable creation to work with SME, Tom Lendacky
- [PATCH v5 21/32] x86, realmode: Decrypt trampoline area if memory encryption is active, Tom Lendacky
- [PATCH v5 25/32] x86, realmode: Check for memory encryption on the APs, Tom Lendacky
- [PATCH v5 24/32] iommu/amd: Disable AMD IOMMU if memory encryption is active, Tom Lendacky
- [PATCH v5 27/32] kvm: x86: svm: Enable Secure Memory Encryption within KVM, Tom Lendacky
- [PATCH v5 28/32] x86/mm, kexec: Allow kexec to be used with SME, Tom Lendacky
- [PATCH v5 29/32] x86/mm: Add support to encrypt the kernel in-place, Tom Lendacky
- [PATCH v5 31/32] x86: Add sysfs support for Secure Memory Encryption, Tom Lendacky
- [PATCH v5 30/32] x86/boot: Add early cmdline parsing for options with arguments, Tom Lendacky
- [PATCH v5 26/32] x86, drm, fbdev: Do not specify encrypted memory for video mappings, Tom Lendacky
- [PATCH v5 32/32] x86/mm: Add support to make use of Secure Memory Encryption, Tom Lendacky
- [PATCH v5 23/32] swiotlb: Add warnings for use of bounce buffers with SME, Tom Lendacky
- [PATCH v5 22/32] x86, swiotlb: DMA support for memory encryption, Tom Lendacky
- [PATCH v5 17/32] x86/mm: Add support to access boot related data in the clear, Tom Lendacky
- [PATCH v5 19/32] x86/mm: Add support to access persistent memory in the clear, Tom Lendacky
- [PATCH v5 20/32] x86/mm: Add support for changing the memory encryption attribute, Tom Lendacky
- [PATCH v5 18/32] x86, mpparse: Use memremap to map the mpf and mpc data, Tom Lendacky
- [PATCH v5 13/32] x86/boot/e820: Add support to determine the E820 type of an address, Tom Lendacky
- [PATCH v5 11/32] x86/mm: Add support for early encrypt/decrypt of memory, Tom Lendacky
- [PATCH v5 14/32] efi: Add an EFI table address match function, Tom Lendacky
- [PATCH v5 10/32] x86/mm: Extend early_memremap() support with additional attrs, Tom Lendacky
- [PATCH v5 08/32] x86/mm: Simplify p[g4um]d_page() macros, Tom Lendacky
- [PATCH v5 07/32] x86/mm: Add support to enable SME in early boot processing, Tom Lendacky
- [PATCH v5 09/32] x86/mm: Provide general kernel support for memory encryption, Tom Lendacky
- [PATCH v5 06/32] x86/mm: Add Secure Memory Encryption (SME) support, Tom Lendacky
- [PATCH v5 03/32] x86, mpparse, x86/acpi, x86/PCI, SFI: Use memremap for RAM mappings, Tom Lendacky
- [PATCH v5 02/32] x86/mm/pat: Set write-protect cache mode for full PAT support, Tom Lendacky
- [PATCH v5 01/32] x86: Documentation for AMD Secure Memory Encryption (SME), Tom Lendacky
- [GIT PULL] EFI fixup for v4.12 queue,
Ard Biesheuvel
- [PATCH v2] efi: Config options to assign versions in the PE-COFF header,
Gary Lin
- [RFC PATCH] x86: Config options to assign versions in the PE-COFF header,
Gary Lin
- [PATCH] efifb: arm/arm64: validate fb BAR instead of claiming it, Ard Biesheuvel
- [PATCH] efi/libstub: arm/arm64: don't use TASK_SIZE when randomising the RT space,
Ard Biesheuvel
- Re: [PATCH] arm64: xen: Implement EFI reset_system callback,
Mark Rutland
- [PATCH 1/5] efi: Move the x86 secure boot switch to generic code,
David Howells
- [PATCH 4.9 58/72] x86/mm/KASLR: Exclude EFI region from KASLR VA space randomization, Greg Kroah-Hartman
- [PATCH 4.10 65/81] x86/mm/KASLR: Exclude EFI region from KASLR VA space randomization, Greg Kroah-Hartman
- [PATCH 00/24] Kernel lockdown,
David Howells
- [PATCH 01/24] efi: Add EFI_SECURE_BOOT bit, David Howells
- [PATCH 02/24] Add the ability to lock down access to the running kernel image, David Howells
- [PATCH 05/24] Restrict /dev/mem and /dev/kmem when the kernel is locked down, David Howells
- [PATCH 08/24] Copy secure_boot flag in boot params across kexec reboot, David Howells
- [PATCH 07/24] kexec: Disable at runtime if the kernel is locked down, David Howells
- [PATCH 03/24] efi: Lock down the kernel if booted in secure boot mode, David Howells
- [PATCH 06/24] Add a sysrq option to exit secure boot mode, David Howells
- [PATCH 04/24] Enforce module signatures if the kernel is locked down, David Howells
- Re: [PATCH 00/24] Kernel lockdown, Justin Forbes
- <Possible follow-ups>
- [PATCH 00/24] Kernel lockdown, David Howells
- [PATCH 02/24] Add the ability to lock down access to the running kernel image, David Howells
- [PATCH 01/24] efi: Add EFI_SECURE_BOOT bit, David Howells
- [PATCH 04/24] Enforce module signatures if the kernel is locked down, David Howells
- [PATCH 03/24] efi: Lock down the kernel if booted in secure boot mode, David Howells
- [PATCH 09/24] kexec_file: Disable at runtime if securelevel has been set, David Howells
- [PATCH 17/24] acpi: Ignore acpi_rsdp kernel param when the kernel has been locked down, David Howells
- [PATCH 16/24] ACPI: Limit access to custom_method when the kernel is locked down, David Howells
- [PATCH 19/24] acpi: Disable APEI error injection if the kernel is locked down, David Howells
- [PATCH 18/24] acpi: Disable ACPI table override if the kernel is locked down, David Howells
- [PATCH 15/24] asus-wmi: Restrict debugfs interface when the kernel is locked down, David Howells
- [PATCH 11/24] uswsusp: Disable when the kernel is locked down, David Howells
- [PATCH 12/24] PCI: Lock down BAR access when the kernel is locked down, David Howells
- [PATCH 14/24] x86: Restrict MSR access when the kernel is locked down, David Howells
- [PATCH 05/24] Restrict /dev/mem and /dev/kmem when the kernel is locked down, David Howells
- [PATCH 06/24] Add a sysrq option to exit secure boot mode, David Howells
- [PATCH 08/24] Copy secure_boot flag in boot params across kexec reboot, David Howells
- [PATCH 13/24] x86: Lock down IO port access when the kernel is locked down, David Howells
- [PATCH 10/24] hibernate: Disable when the kernel is locked down, David Howells
- [PATCH 07/24] kexec: Disable at runtime if the kernel is locked down, David Howells
- Re: [PATCH 00/24] Kernel lockdown, David Howells
- Re: [PATCH 00/24] Kernel lockdown, James Morris
- Re: [PATCH 00/24] Kernel lockdown, David Howells
- [PATCH 00/24] Kernel lockdown, David Howells
- [PATCH 01/24] efi: Add EFI_SECURE_BOOT bit, David Howells
- [PATCH 02/24] Add the ability to lock down access to the running kernel image, David Howells
- [PATCH 03/24] efi: Lock down the kernel if booted in secure boot mode, David Howells
- [PATCH 05/24] Restrict /dev/mem and /dev/kmem when the kernel is locked down, David Howells
- [PATCH 06/24] Add a sysrq option to exit secure boot mode, David Howells
- [PATCH 07/24] kexec: Disable at runtime if the kernel is locked down, David Howells
- [PATCH 10/24] hibernate: Disable when the kernel is locked down, David Howells
- [PATCH 13/24] x86: Lock down IO port access when the kernel is locked down, David Howells
- [PATCH 21/24] scsi: Lock down the eata driver, David Howells
- [PATCH 23/24] Lock down TIOCSSERIAL, David Howells
- [PATCH 22/24] Prohibit PCMCIA CIS storage when the kernel is locked down, David Howells
- [PATCH 24/24] Lock down module params that specify hardware parameters (eg. ioport), David Howells
- [PATCH 20/24] bpf: Restrict kernel image access functions when the kernel is locked down, David Howells
- [PATCH 19/24] acpi: Disable APEI error injection if the kernel is locked down, David Howells
- [PATCH 08/24] Copy secure_boot flag in boot params across kexec reboot, David Howells
- [PATCH 11/24] uswsusp: Disable when the kernel is locked down, David Howells
- [PATCH 12/24] PCI: Lock down BAR access when the kernel is locked down, David Howells
- [PATCH 15/24] asus-wmi: Restrict debugfs interface when the kernel is locked down, David Howells
- [PATCH 16/24] ACPI: Limit access to custom_method when the kernel is locked down, David Howells
- [PATCH 18/24] acpi: Disable ACPI table override if the kernel is locked down, David Howells
- [PATCH 17/24] acpi: Ignore acpi_rsdp kernel param when the kernel has been locked down, David Howells
- [PATCH 14/24] x86: Restrict MSR access when the kernel is locked down, David Howells
- [PATCH 09/24] kexec_file: Disable at runtime if securelevel has been set, David Howells
- [PATCH 04/24] Enforce module signatures if the kernel is locked down, David Howells
- Re: [PATCH 00/24] Kernel lockdown, Austin S. Hemmelgarn
- Why kernel lockdown?, David Howells
- [PATCH 0/8] efi: add support for non-standard capsule headers,
Ard Biesheuvel
- [PATCH 1/8] efi/capsule: Fix return code on failing kmap/vmap, Ard Biesheuvel
- [PATCH 2/8] efi/capsule: Remove pr_debug on ENOMEM or EFAULT, Ard Biesheuvel
- [PATCH 3/8] efi/capsule: Clean up pr_err/info messages, Ard Biesheuvel
- [PATCH 6/8] efi/capsule-loader: indirect calls to efi_capsule_setup_info via weak alias, Ard Biesheuvel
- [PATCH 4/8] efi/capsule: Adjust return type of efi_capsule_setup_info, Ard Biesheuvel
- [PATCH 5/8] efi/capsule-loader: use cached copy of capsule header, Ard Biesheuvel
- [PATCH 8/8] efi/capsule: Add support for Quark security header, Ard Biesheuvel
- [PATCH 7/8] efi/capsule-loader: use page addresses rather than struct page pointers, Ard Biesheuvel
- Re: [PATCH 0/8] efi: add support for non-standard capsule headers, Jan Kiszka
- Re: [PATCH 0/8] efi: add support for non-standard capsule headers, Bryan O'Donoghue
- [GIT PULL 00/12] EFI updates for v4.12,
Ard Biesheuvel
- [PATCH 1/2] efi/libstub: Skip GOP with PIXEL_BLT_ONLY format, Ard Biesheuvel
- [PATCH 2/2] efifb: Avoid reconfiguration of BAR that covers the framebuffer, Ard Biesheuvel
- [PATCH 09/12] efi/libstub: Fix harmless command line parsing bug, Ard Biesheuvel
- [PATCH 07/12] x86/efi: Clean up a minor mistake in code comment, Ard Biesheuvel
- [PATCH 08/12] efi/arm32-stub: Allow boottime allocations in the vmlinux region, Ard Biesheuvel
- [PATCH 05/12] efi: bgrt: Enable ACPI BGRT handling on arm64, Ard Biesheuvel
- [PATCH 02/12] efi: arm-stub: Correct FDT and initrd allocation rules for arm64, Ard Biesheuvel
- [PATCH 03/12] efi: arm-stub: Round up FDT allocation to mapping size, Ard Biesheuvel
- [PATCH 04/12] x86/efi-bgrt: Move efi-bgrt handling out of arch/x86, Ard Biesheuvel
- [PATCH 06/12] pstore: return error code (if any) from efi_pstore_write, Ard Biesheuvel
- [PATCH 01/12] x86/efi: Clean up efi CR3 save/restore, Ard Biesheuvel
- Re: [GIT PULL 00/12] EFI updates for v4.12, Ard Biesheuvel
- [PATCH 10/12] efi/libstub: Unify command line param parsing, Ard Biesheuvel
- [GIT PULL 0/2] EFI fixes for v4.11,
Ard Biesheuvel
[PATCH v35 14/14] efi/libstub/arm*: Set default address and size cells values for an empty dtb, AKASHI Takahiro
[PATCH V14 00/10] Add UEFI 2.6 and ACPI 6.1 updates for RAS on ARM64,
Tyler Baicar
- [PATCH V14 05/10] acpi: apei: handle SEA notification type for ARMv8, Tyler Baicar
- [PATCH V14 08/10] ras: acpi / apei: generate trace event for unrecognized CPER section, Tyler Baicar
- [PATCH V14 09/10] trace, ras: add ARM processor error trace event, Tyler Baicar
- [PATCH V14 07/10] efi: print unrecognized CPER section, Tyler Baicar
- [PATCH V14 10/10] arm/arm64: KVM: add guest SEA support, Tyler Baicar
- [PATCH V14 04/10] arm64: exception: handle Synchronous External Abort, Tyler Baicar
- [PATCH V14 06/10] acpi: apei: panic OS with fatal error status block, Tyler Baicar
- [PATCH V14 03/10] efi: parse ARM processor error, Tyler Baicar
- [PATCH V14 01/10] acpi: apei: read ack upon ghes record consumption, Tyler Baicar
- [PATCH V14 02/10] ras: acpi/apei: cper: generic error data entry v3 per ACPI 6.1, Tyler Baicar
- Re: [PATCH V14 00/10] Add UEFI 2.6 and ACPI 6.1 updates for RAS on ARM64, Catalin Marinas
[PATCH v34 14/14] efi/libstub/arm*: Set default address and size cells values for an empty dtb,
AKASHI Takahiro
[PATCH v2 0/4] efi: libstub enhancements for cmdline parsing and kaslr,
Ard Biesheuvel
[efi:next 11/13] drivers/firmware/efi/libstub/efi-stub-helper.c:421:40: error: 'CONFIG_CMDLINE' undeclared, kbuild test robot
[PATCH v2 0/7] efi: Enhance capsule loader to support signed Quark images,
Jan Kiszka
[PATCH 0/4] efi: libstub enhancements for cmdline parsing and kaslr,
Ard Biesheuvel
[PATCH v2] efi/arm32-stub: allow boottime allocations in the vmlinux region, Ard Biesheuvel
[PATCH v2] x86/efi: Clean up a minor mistake in code comment,
Baoquan He
[PATCH v2] x86/mm/KASLR: EFI region is mistakenly included into KASLR VA space for randomization,
Baoquan He
Re: [PATCH v1 RESEND 1/2] x86/mm/KASLR: EFI region is mistakenly included into KASLR VA space for randomization, Dave Young
[PATCH v1 RESEND 2/2] x86/efi: Clean up a minor mistake in code comment,
Baoquan He
[PATCH 4/7] x86/boot/32: Defer resyncing initial_page_table until percpu is set up,
Andy Lutomirski
[PATCH 3/7] x86/efi/32: Fix EFI on systems where the percpu GDT is virtually mapped, Andy Lutomirski
[PATCH v3] efifb: avoid reconfiguration of BAR that covers the framebuffer,
Ard Biesheuvel
[PATCH V13 00/10] Add UEFI 2.6 and ACPI 6.1 updates for RAS on ARM64,
Tyler Baicar
- [PATCH V13 04/10] arm64: exception: handle Synchronous External Abort, Tyler Baicar
- [PATCH V13 06/10] acpi: apei: panic OS with fatal error status block, Tyler Baicar
- [PATCH V13 07/10] efi: print unrecognized CPER section, Tyler Baicar
- [PATCH V13 09/10] trace, ras: add ARM processor error trace event, Tyler Baicar
- [PATCH V13 10/10] arm/arm64: KVM: add guest SEA support, Tyler Baicar
- [PATCH V13 08/10] ras: acpi / apei: generate trace event for unrecognized CPER section, Tyler Baicar
- [PATCH V13 05/10] acpi: apei: handle SEA notification type for ARMv8, Tyler Baicar
- [PATCH V13 02/10] ras: acpi/apei: cper: generic error data entry v3 per ACPI 6.1, Tyler Baicar
- [PATCH V13 03/10] efi: parse ARM processor error, Tyler Baicar
- [PATCH V13 01/10] acpi: apei: read ack upon ghes record consumption, Tyler Baicar
[PATCH v2] efifb: avoid reconfiguration of BAR that covers the framebuffer,
Ard Biesheuvel
[PATCH] efifb: avoid reconfiguration of BAR that covers the framebuffer,
Ard Biesheuvel
[PATCH] efi/libstub: arm/arm64: make debug prints dependent on efi=debug,
Ard Biesheuvel
[GIT PULL] UEFI fix for v4.11-rc,
Ard Biesheuvel
[PATCH 4.9 18/44] efi/arm: Fix boot crash with CONFIG_CPUMASK_OFFSTACK=y, Greg Kroah-Hartman
[PATCH 4.10 19/48] efi/arm: Fix boot crash with CONFIG_CPUMASK_OFFSTACK=y, Greg Kroah-Hartman
[PATCH] efi/arm32-stub: allow boottime allocations in the vmlinux region,
Ard Biesheuvel
[PATCH] efi/libstub: skip GOP with PIXEL_BLT_ONLY format,
Ard Biesheuvel
[PATCH v33 14/14] efi/libstub/arm*: Set default address and size cells values for an empty dtb, AKASHI Takahiro
[PATCH v7 1/3] x86/mm: Adapt MODULES_END based on Fixmap section size,
Thomas Garnier
[PATCH v7 2/3] x86: Remap GDT tables in the Fixmap section, Thomas Garnier
Re: [PATCH v7 1/3] x86/mm: Adapt MODULES_END based on Fixmap section size, Boris Ostrovsky
Re: [PATCH v7 1/3] x86/mm: Adapt MODULES_END based on Fixmap section size, Ingo Molnar
[PATCH] pstore: return error code (if any) from efi_pstore_write,
Kalugin, Evgeny
Re: kexec regression since 4.9 caused by efi,
Dave Young
[PATCH 1/2] x86/efi: Correct a tiny mistake in code comment,
Baoquan He
[Index of Archives]
[Linux Kernel Development]
[Security]
[Linux ARM Kernel]
[Tools]
[Linux MIPS]
[Linux S390]
[Bugtraq]
[Share Photos]>
[Fedora ARM]