Linux EFI Development - Date Index
[Prev Page][Next Page]
- Re: [PATCH 5/9] efi/arm*: libstub: Invoke EFI_RNG_PROTOCOL to seed the UEFI RNG table, (continued)
[PATCH 4/9] efi/libstub: Add random.c to ARM build, Matt Fleming
[PATCH 1/9] efi/libstub: Fix allocation size calculations, Matt Fleming
[PATCH 2/9] MAINTAINERS: Add ARM and arm64 EFI specific files to EFI subsystem, Matt Fleming
[RFC PATCH v3 00/20] x86: Secure Memory Encryption (AMD),
Tom Lendacky
- [RFC PATCH v3 10/20] Add support to access boot related data in the clear, Tom Lendacky
- [RFC PATCH v3 16/20] x86: Do not specify encrypted memory for video mappings, Tom Lendacky
- [RFC PATCH v3 02/20] x86: Set the write-protect cache mode for full PAT support, Tom Lendacky
- [RFC PATCH v3 01/20] x86: Documentation for AMD Secure Memory Encryption (SME), Tom Lendacky
- [RFC PATCH v3 03/20] x86: Add the Secure Memory Encryption cpu feature, Tom Lendacky
- [RFC PATCH v3 07/20] x86: Provide general kernel support for memory encryption, Tom Lendacky
- [RFC PATCH v3 06/20] x86: Add support to enable SME during early boot processing, Tom Lendacky
- [RFC PATCH v3 05/20] x86: Add Secure Memory Encryption (SME) support, Tom Lendacky
- [RFC PATCH v3 14/20] iommu/amd: Disable AMD IOMMU if memory encryption is active, Tom Lendacky
- [RFC PATCH v3 12/20] x86: Decrypt trampoline area if memory encryption is active, Tom Lendacky
- [RFC PATCH v3 17/20] x86/kvm: Enable Secure Memory Encryption of nested page tables, Tom Lendacky
- [RFC PATCH v3 18/20] x86: Access the setup data through debugfs un-encrypted, Tom Lendacky
- [RFC PATCH v3 19/20] x86: Add support to make use of Secure Memory Encryption, Tom Lendacky
- [RFC PATCH v3 20/20] x86: Add support to make use of Secure Memory Encryption, Tom Lendacky
- [RFC PATCH v3 13/20] x86: DMA support for memory encryption, Tom Lendacky
- [RFC PATCH v3 15/20] x86: Check for memory encryption on the APs, Tom Lendacky
- [RFC PATCH v3 08/20] x86: Add support for early encryption/decryption of memory, Tom Lendacky
- [RFC PATCH v3 09/20] x86: Insure that boot memory areas are mapped properly, Tom Lendacky
- [RFC PATCH v3 11/20] x86: Add support for changing memory encryption attribute, Tom Lendacky
- [RFC PATCH v3 04/20] x86: Handle reduction in physical address size with SME, Tom Lendacky
[PATCH 0/2] Honey, I shrunk the EFI stub,
Lukas Wunner
[PATCH v4 0/4] Apple device properties,
Lukas Wunner
[PATCH] x86/efi: Fix EFI memmap pointer size warning,
Borislav Petkov
[PATCH v3 0/3] Apple device properties,
Lukas Wunner
[PATCH] EFI loader: remove pointless "if" statement, Eugene Korenevsky
[PATCH v2] EFI loader: remove redundant code,
Eugene Korenevsky
[PATCH] EFI loader: remove dead code,
Eugene Korenevsky
[PATCHv4 0/4] WX checking for arm64,
Laura Abbott
[PATCH 4.8 104/140] x86/platform/UV: Fix support for EFI_OLD_MEMMAP after BIOS callback updates, Greg Kroah-Hartman
[PATCH] efi: Add SHIM and image security database GUID definitions,
Josh Boyer
[PATCH v3] Fix allocation size calculations,
Roy Franz
[PATCH v2] Fix allocation size calculations,
Roy Franz
[PATCH] Fix allocation size calculations,
Roy Franz
[PATCH V4 00/10] Add UEFI 2.6 and ACPI 6.1 updates for RAS on ARM64,
Tyler Baicar
- [PATCH V4 02/10] ras: acpi/apei: cper: generic error data entry v3 per ACPI 6.1, Tyler Baicar
- [PATCH V4 03/10] efi: parse ARMv8 processor error, Tyler Baicar
- [PATCH V4 10/10] arm64: KVM: add guest SEA support, Tyler Baicar
- [PATCH V4 08/10] ras: acpi / apei: generate trace event for unrecognized CPER section, Tyler Baicar
- [PATCH V4 09/10] trace, ras: add ARM processor error trace event, Tyler Baicar
- [PATCH V4 05/10] acpi: apei: handle SEA notification type for ARMv8, Tyler Baicar
- [PATCH V4 06/10] acpi: apei: panic OS with fatal error status block, Tyler Baicar
- [PATCH V4 07/10] efi: print unrecognized CPER section, Tyler Baicar
- [PATCH V4 04/10] arm64: exception: handle Synchronous External Abort, Tyler Baicar
- [PATCH V4 01/10] acpi: apei: read ack upon ghes record consumption, Tyler Baicar
Re: [tip:x86/asm] x86/mm/64: Enable vmapped stacks (CONFIG_HAVE_ARCH_VMAP_STACK=y),
Matt Fleming
[PATCH v2 0/3] efi: add support for seeding the kernel RNG from UEFI,
Ard Biesheuvel
4.9-rc1 boot regression, ambiguous bisect result,
Dan Williams
[REGRESSION] EFI mixed mode patch triggers boot failure,
Laura Abbott
[RFC PATCH 0/2] efi/arm64: add vmlinux link to PE/COFF debug table,
Ard Biesheuvel
[PATCHv3 0/4] WX checking for arm64,
Laura Abbott
[GIT PULL] urgent EFI fix for v4.9,
Ard Biesheuvel
[GIT PULL 0/8] EFI changes for v4.10,
Matt Fleming
- [PATCH 6/8] efi/efi_test: Use memdup_user() as a cleanup, Matt Fleming
- [PATCH 2/8] efi: Remove unused including <linux/version.h>, Matt Fleming
- [PATCH 1/8] MAINTAINERS: add myself as EFI maintainer, Matt Fleming
- [PATCH 5/8] efi/efi_test: Fix the uninitialized value rv, Matt Fleming
- [PATCH 4/8] efi/efi_test: Fix the uninitialized value datasize, Matt Fleming
- [PATCH 3/8] efi/arm*: efi_init() error handling fix, Matt Fleming
- [PATCH 7/8] efifb: show framebuffer layout as device attributes, Matt Fleming
- [PATCH 8/8] efi: efivar_ssdt_load: Don't return success on allocation failure, Matt Fleming
- Re: [GIT PULL 0/8] EFI changes for v4.10, Ingo Molnar
- Re: [GIT PULL 0/8] EFI changes for v4.10, Lukas Wunner
[PATCH v2 0/3] Apple device properties,
Lukas Wunner
[PATCH] partitions/efi: Ignore errors when alternate GPT is not at the end of disk,
Hannes Reinecke
[patch] efi: fix an error code,
Dan Carpenter
[PATCH V3 00/10] Add UEFI 2.6 and ACPI 6.1 updates for RAS on ARM64,
Tyler Baicar
- [PATCH V3 01/10] acpi: apei: read ack upon ghes record consumption, Tyler Baicar
- [PATCH V3 02/10] ras: acpi/apei: cper: generic error data entry v3 per ACPI 6.1, Tyler Baicar
- [PATCH V3 03/10] efi: parse ARMv8 processor error, Tyler Baicar
- [PATCH V3 05/10] acpi: apei: handle SEA notification type for ARMv8, Tyler Baicar
- [PATCH V3 06/10] acpi: apei: panic OS with fatal error status block, Tyler Baicar
- [PATCH V3 07/10] efi: print unrecognized CPER section, Tyler Baicar
- [PATCH V3 10/10] arm64: KVM: add guest SEA support, Tyler Baicar
- [PATCH V3 09/10] trace, ras: add ARM processor error trace event, Tyler Baicar
- [PATCH V3 08/10] ras: acpi / apei: generate trace event for unrecognized CPER section, Tyler Baicar
- [PATCH V3 04/10] arm64: exception: handle Synchronous External Abort, Tyler Baicar
[PATCH 0/2] efi: add support for seeding the kernel RNG from UEFI,
Ard Biesheuvel
[PATCH] arm64: mm: Fix memmap to be initialized for the entire section,
Robert Richter
arm64: kernel BUG at mm/page_alloc.c:1844!,
Robert Richter
[PATCH 1/3 V2] efi/efi_test: use memdup_user() as a cleanup,
Ivan Hu
[PATCH] efifb: show framebuffer layout as device attributes,
Peter Jones
[PATCH] efi/arm: fix absolute relocation detection for older toolchains,
Ard Biesheuvel
[PATCH 0/3] efi_test: fix Coccinelle warning and CoverityScan issues,
Ivan Hu
[RFC PATCH 0/3] efi: MMC proxy support for the UEFI varstore,
Ard Biesheuvel
[PATCH 1/2] MAINTAINERS: add myself as EFI maintainer,
Ard Biesheuvel
EFI co-maintainer,
Matt Fleming
[GIT PULL] EFI fix for v4.9 queue,
Matt Fleming
[PATCH -next v2] arm*/efi: efi_init error handling fix,
Yisheng Xie
Cannot load linux after recent efi-related changes,
Mike Krinkin
Re: [tip regression] efi: Allow drivers to reserve boot services forever == toxic,
Matt Fleming
[PATCH -next] efi: Remove unused including <linux/version.h>,
Wei Yongjun
[PATCH] x86/efi: Add necessary checks before iterating over efi.memmap,
Chao Gao
[GIT PULL 00/29] EFI changes for v4.9,
Matt Fleming
- [PATCH 09/29] efi/runtime-map: Use efi.memmap directly instead of a copy, Matt Fleming
- [PATCH 15/29] efi: Don't use spinlocks for efi vars, Matt Fleming
- [PATCH 24/29] x86/efi: Defer efi_esrt_init until after memblock_x86_fill, Matt Fleming
- [PATCH 26/29] efi/arm64: Treat regions with WT/WC set but WB cleared as memory, Matt Fleming
- [PATCH 29/29] x86/efi: Allow invocation of arbitrary boot services, Matt Fleming
- [PATCH 28/29] x86/efi: Optimize away setup_gop32/64 if unused, Matt Fleming
- [PATCH 23/29] efi/arm64: Add debugfs node to dump UEFI runtime page tables, Matt Fleming
- [PATCH 27/29] x86/efi: Use kmalloc_array() in efi_call_phys_prolog(), Matt Fleming
- [PATCH 25/29] efi: Add efi_test driver for exporting UEFI runtime service interfaces, Matt Fleming
- [PATCH 22/29] x86/efi: Remove unused find_bits() function, Matt Fleming
- [PATCH 18/29] firmware-gsmi: Delete an unnecessary check before the function call "dma_pool_destroy", Matt Fleming
- [PATCH 20/29] x86/efi: Map in physical addresses in efi_map_region_fixed, Matt Fleming
- [PATCH 17/29] x86/efi: Initialize status to ensure garbage is not returned on small size, Matt Fleming
- [PATCH 19/29] lib/ucs2_string: Speed up ucs2_utf8size(), Matt Fleming
- [PATCH 21/29] fs/efivarfs: Fix double kfree() in error path, Matt Fleming
- [PATCH 16/29] efi: Replace runtime services spinlock with semaphore, Matt Fleming
- [PATCH 13/29] efi/arm*: esrt: Add missing call to efi_esrt_init(), Matt Fleming
- [PATCH 12/29] efi/esrt: Use memremap not ioremap to access ESRT table in memory, Matt Fleming
- [PATCH 11/29] x86/efi-bgrt: Use efi_mem_reserve() to avoid copying image data, Matt Fleming
- [PATCH 10/29] efi/esrt: Use efi_mem_reserve() and avoid a kmalloc(), Matt Fleming
- [PATCH 14/29] efi: Use a file local lock for efivars, Matt Fleming
- [PATCH 07/29] efi: Add efi_memmap_install() for installing new EFI memory maps, Matt Fleming
- [PATCH 08/29] efi: Allow drivers to reserve boot services forever, Matt Fleming
- [PATCH 06/29] efi: Split out EFI memory map functions into new file, Matt Fleming
- [PATCH 05/29] efi/fake_mem: Refactor main two code chunks into functions, Matt Fleming
- [PATCH 04/29] efi: Add efi_memmap_init_late() for permanent EFI memmap, Matt Fleming
- [PATCH 03/29] efi: Refactor efi_memmap_init_early() into arch-neutral code, Matt Fleming
- [PATCH 02/29] x86/efi: Consolidate region mapping logic, Matt Fleming
- [PATCH 01/29] x86/efi: Test for EFI_MEMMAP functionality when iterating EFI memmap, Matt Fleming
- Re: [GIT PULL 00/29] EFI changes for v4.9, Matt Fleming
- Re: [GIT PULL 00/29] EFI changes for v4.9, Ingo Molnar
[PATCH] efi: Use LocateHandleBuffer instead of LocateHandle,
Lukas Wunner
[PATCH v2 0/4] Apple device properties,
Lukas Wunner
[efi:next 25/27] drivers/firmware/efi/test/efi_test.c:269:8-15: WARNING opportunity for memdup_user,
kbuild test robot
[PATCH 4.7 011/143] efi/capsule: Allocate whole capsule into virtual memory, Greg Kroah-Hartman
[PATCH 4.7 003/143] x86/platform/uv: Skip UV runtime services mapping in the efi_runtime_disabled case, Greg Kroah-Hartman
[GIT PULL v2 0/6] EFI urgent fixes,
Matt Fleming
Cannot get EFI Pstore to work but there is no indication of what is wrong, Maciej Piechotka
Re: [PATCH] arm64/efi: efi_init error handling fix,
Will Deacon
[PATCH V5 0/4] Handle EFI_INVALID_PARAMETER from ExitBootServices,
Jeffrey Hugo
[PATCH v2] efi: arm64: treat regions with WT/WC set but WB cleared as memory,
Ard Biesheuvel
[PATCH] x86/efi: Use kmalloc_array() in efi_call_phys_prolog(),
SF Markus Elfring
[PATCH V4] efi: add efi_test driver for exporting UEFI runtime service interfaces,
Ivan Hu
[PATCH] efi: arm64: treat regions with WT/WC set but WB cleared as memory,
Ard Biesheuvel
Re: [PATCH v24 5/9] arm64: kdump: add kdump support,
Dave Young
[PATCH] efi: fix the wrong check for the offset of subnode,
Shawn Lin
[PATCH 1/2] efi: don't call the system table version the runtime services version,
Peter Jones
[RFC PATCH v1 00/28] x86: Secure Encrypted Virtualization (AMD),
Brijesh Singh
- [RFC PATCH v1 23/28] KVM: SVM: add SEV launch update command, Brijesh Singh
- [RFC PATCH v1 24/28] KVM: SVM: add SEV_LAUNCH_FINISH command, Brijesh Singh
- [RFC PATCH v1 27/28] KVM: SVM: add KVM_SEV_DEBUG_ENCRYPT command, Brijesh Singh
- [RFC PATCH v1 28/28] KVM: SVM: add command to query SEV API version, Brijesh Singh
- [RFC PATCH v1 03/28] kvm: svm: Use the hardware provided GPA instead of page walk, Brijesh Singh
- [RFC PATCH v1 01/28] kvm: svm: Add support for additional SVM NPF error codes, Brijesh Singh
- [RFC PATCH v1 09/28] x86/efi: Access EFI data as encrypted when SEV is active, Brijesh Singh
- [RFC PATCH v1 07/28] x86: Do not encrypt memory areas if SEV is enabled, Brijesh Singh
- [RFC PATCH v1 18/28] crypto: add AMD Platform Security Processor driver, Brijesh Singh
- [RFC PATCH v1 17/28] KVM: SVM: Enable SEV by setting the SEV_ENABLE cpu feature, Brijesh Singh
- [RFC PATCH v1 21/28] KVM: introduce KVM_SEV_ISSUE_CMD ioctl, Brijesh Singh
- [RFC PATCH v1 22/28] KVM: SVM: add SEV launch start command, Brijesh Singh
- [RFC PATCH v1 25/28] KVM: SVM: add KVM_SEV_GUEST_STATUS command, Brijesh Singh
- [RFC PATCH v1 12/28] x86: DMA support for SEV memory encryption, Brijesh Singh
- [RFC PATCH v1 04/28] x86: Secure Encrypted Virtualization (SEV) support, Brijesh Singh
- [RFC PATCH v1 02/28] kvm: svm: Add kvm_fast_pio_in support, Brijesh Singh
- [RFC PATCH v1 13/28] iommu/amd: AMD IOMMU support for SEV, Brijesh Singh
- [RFC PATCH v1 08/28] Access BOOT related data encrypted with SEV active, Brijesh Singh
- [RFC PATCH v1 06/28] KVM: SVM: Add SEV feature definitions to KVM, Brijesh Singh
- [RFC PATCH v1 14/28] x86: Don't set the SME MSR bit when SEV is active, Brijesh Singh
- [RFC PATCH v1 16/28] x86: Add support to determine if running with SEV enabled, Brijesh Singh
- [RFC PATCH v1 11/28] x86: Don't decrypt trampoline area if SEV is active, Brijesh Singh
- [RFC PATCH v1 10/28] x86: Change early_ioremap to early_memremap for BOOT data, Brijesh Singh
- [RFC PATCH v1 15/28] x86: Unroll string I/O when SEV is active, Brijesh Singh
- [RFC PATCH v1 20/28] KVM: SVM: prepare for SEV guest management API support, Brijesh Singh
- [RFC PATCH v1 19/28] KVM: SVM: prepare to reserve asid for SEV guest, Brijesh Singh
- [RFC PATCH v1 26/28] KVM: SVM: add KVM_SEV_DEBUG_DECRYPT command, Brijesh Singh
- [RFC PATCH v1 05/28] KVM: SVM: prepare for new bit definition in nested_ctl, Brijesh Singh
- Re: [RFC PATCH v1 00/28] x86: Secure Encrypted Virtualization (AMD), Paolo Bonzini
[RFC PATCH v2 00/20] x86: Secure Memory Encryption (AMD),
Tom Lendacky
- [RFC PATCH v2 16/20] x86: Check for memory encryption on the APs, Tom Lendacky
- [RFC PATCH v2 04/20] x86: Secure Memory Encryption (SME) support, Tom Lendacky
- [RFC PATCH v2 05/20] x86: Add the Secure Memory Encryption cpu feature, Tom Lendacky
- [RFC PATCH v2 09/20] x86: Add support for early encryption/decryption of memory, Tom Lendacky
- [RFC PATCH v2 11/20] mm: Access BOOT related data in the clear, Tom Lendacky
- [RFC PATCH v2 14/20] x86: DMA support for memory encryption, Tom Lendacky
- [RFC PATCH v2 15/20] iommu/amd: AMD IOMMU support for memory encryption, Tom Lendacky
- [RFC PATCH v2 10/20] x86: Insure that memory areas are encrypted when possible, Tom Lendacky
- [RFC PATCH v2 20/20] x86: Add support to make use of Secure Memory Encryption, Tom Lendacky
- [RFC PATCH v2 07/20] x86: Provide general kernel support for memory encryption, Tom Lendacky
- [RFC PATCH v2 06/20] x86: Handle reduction in physical address size with SME, Tom Lendacky
- [RFC PATCH v2 01/20] x86: Documentation for AMD Secure Memory Encryption (SME), Tom Lendacky
- [RFC PATCH v2 08/20] x86: Extend the early_memmap support with additional attrs, Tom Lendacky
- [RFC PATCH v2 02/20] x86: Set the write-protect cache mode for full PAT support, Tom Lendacky
- [RFC PATCH v2 12/20] x86: Add support for changing memory encryption attribute, Tom Lendacky
- [RFC PATCH v2 03/20] x86: Secure Memory Encryption (SME) build enablement, Tom Lendacky
- [RFC PATCH v2 17/20] x86: Do not specify encrypted memory for VGA mapping, Tom Lendacky
- [RFC PATCH v2 13/20] x86: Decrypt trampoline area if memory encryption is active, Tom Lendacky
[Index of Archives]
[Linux Kernel Development]
[Security]
[Linux ARM Kernel]
[Tools]
[Linux MIPS]
[Linux S390]
[Bugtraq]
[Share Photos]>
[Fedora ARM]