Linux EFI Development - Date Index
[Prev Page][Next Page]
- Re: [PATCH -v2] EFI: Runtime services virtual mapping, (continued)
- [PATCH V5 00/18] ARM EFI stub common code,
Roy Franz
- [PATCH 01/18] EFI stub documentation updates, Roy Franz
- [PATCH 06/18] Enforce minimum alignment of 1 page on allocations., Roy Franz
- [PATCH 18/18] resolve warnings found on ARM compile, Roy Franz
- [PATCH 17/18] Fix types in EFI calls to match EFI function definitions., Roy Franz
- [PATCH 16/18] Renames in handle_cmdline_files() to complete generalization., Roy Franz
- [PATCH 12/18] generalize efi_get_memory_map(), Roy Franz
- [PATCH 15/18] Generalize handle_ramdisks() and rename to handle_cmdline_files()., Roy Franz
- [PATCH 14/18] Allow efi_free() to be called with size of 0, and do nothing in that case., Roy Franz
- [PATCH 13/18] use efi_get_memory_map() to get final map for x86, Roy Franz
- [PATCH 11/18] Rename __get_map() to efi_get_memory_map(), Roy Franz
- [PATCH 09/18] Move unicode to ASCII conversion to shared function., Roy Franz
- [PATCH 07/18] Move relocate_kernel() to shared file., Roy Franz
- [PATCH 08/18] Generalize relocate_kernel() for use by other architectures., Roy Franz
- [PATCH 05/18] Rename memory allocation/free functions, Roy Franz
- [PATCH 04/18] Add system table pointer argument to shared functions., Roy Franz
- [PATCH 03/18] Move common EFI stub code from x86 arch code to common location, Roy Franz
- [PATCH 02/18] Add proper definitions for some EFI function pointers., Roy Franz
- [PATCH 10/18] Do proper conversion from UTF-16 to UTF-8, Roy Franz
- Re: [PATCH V5 00/18] ARM EFI stub common code, Matt Fleming
- [PATCH 00/11] EFI runtime services virtual mapping,
Borislav Petkov
- [PATCH 01/11] efi: Simplify EFI_DEBUG, Borislav Petkov
- [PATCH 10/11] x86, cpa: Map in an arbitrary pgd, Borislav Petkov
- [PATCH 07/11] x86, pageattr: Add a PTE pagetable populating function, Borislav Petkov
- [PATCH 06/11] x86, pageattr: Add a PMD pagetable populating function, Borislav Petkov
- [PATCH 11/11] EFI: Runtime services virtual mapping, Borislav Petkov
- [PATCH 02/11] efi: Remove EFI_PAGE_SHIFT and EFI_PAGE_SIZE, Borislav Petkov
- [PATCH 09/11] x86, pageattr: Add last levels of error path, Borislav Petkov
- [PATCH 03/11] x86, pageattr: Lookup address in an arbitrary PGD, Borislav Petkov
- [PATCH 05/11] x86, pageattr: Add a PUD pagetable populating function, Borislav Petkov
- [PATCH 08/11] x86, pageattr: Add a PUD error unwinding path, Borislav Petkov
- [PATCH 04/11] x86, pageattr: Add a PGD pagetable populating function, Borislav Petkov
- Re: [PATCH 00/11] EFI runtime services virtual mapping, Dave Young
- Re: [PATCH 00/11] EFI runtime services virtual mapping, Borislav Petkov
- [PATCH] x86 efi: bugfix interrupt disabling sequence,
Bart Kuivenhoven
- [PATCH V4 00/17] ARM EFI stub common code,
Roy Franz
- [PATCH 01/17] EFI stub documentation updates, Roy Franz
- [PATCH 07/17] Move relocate_kernel() to shared file., Roy Franz
- [PATCH 13/17] Allow efi_free() to be called with size of 0, and do nothing in that case., Roy Franz
- [PATCH 17/17] resolve warnings found on ARM compile, Roy Franz
- [PATCH 16/17] Fix types in EFI calls to match EFI function definitions., Roy Franz
- [PATCH 15/17] Renames in handle_cmdline_files() to complete generalization., Roy Franz
- [PATCH 14/17] Generalize handle_ramdisks() and rename to handle_cmdline_files()., Roy Franz
- [PATCH 12/17] use efi_get_memory_map() to get final map for x86, Roy Franz
- [PATCH 10/17] Rename __get_map() to efi_get_memory_map(), Roy Franz
- [PATCH 11/17] generalize efi_get_memory_map(), Roy Franz
- [PATCH 06/17] Enforce minimum alignment of 1 page on allocations., Roy Franz
- [PATCH 09/17] Move unicode to ASCII conversion to shared function., Roy Franz
- [PATCH 08/17] Generalize relocate_kernel() for use by other architectures., Roy Franz
- [PATCH 05/17] Rename memory allocation/free functions, Roy Franz
- [PATCH 02/17] Add proper definitions for some EFI function pointers., Roy Franz
- [PATCH 04/17] Add system table pointer argument to shared functions., Roy Franz
- [PATCH 03/17] Move common EFI stub code from x86 arch code to common location, Roy Franz
- Re: [PATCH V4 00/17] ARM EFI stub common code, Matt Fleming
- Re: [PATCH V4 00/17] ARM EFI stub common code, H. Peter Anvin
- [RFC V4 PATCH 00/15] Signature verification of hibernate snapshot,
Lee, Chun-Yi
- [PATCH V4 15/15] Hibernate: adapt to UEFI secure boot with signature check, Lee, Chun-Yi
- [PATCH V4 14/15] Hibernate: notify bootloader regenerate key-pair for snapshot verification, Lee, Chun-Yi
- [PATCH V4 13/15] Hibernate: introduced SNAPSHOT_SIG_HASH config for select hash algorithm, Lee, Chun-Yi
- [PATCH V4 12/15] Hibernate: show the verification time for monitor performance, Lee, Chun-Yi
- [PATCH V4 11/15] Hibernate: taint kernel when signature check fail, Lee, Chun-Yi
- [PATCH 10/15] Hibernate: Avoid S4 sign key data included in snapshot image, Lee, Chun-Yi
- [PATCH V4 09/15] Hibernate: generate and verify signature of snapshot, Lee, Chun-Yi
- [PATCH V4 08/15] Hibernate: introduced RSA key-pair to verify signature of snapshot, Lee, Chun-Yi
- [PATCH V4 07/15] asymmetric keys: explicitly add the leading zero byte to encoded message, Lee, Chun-Yi
- [PATCH V4 06/15] asymmetric keys: support parsing PKCS #8 private key information, Lee, Chun-Yi
- [PATCH V4 05/15] asymmetric keys: implement RSASP1, Lee, Chun-Yi
- [PATCH V4 04/15] asymmetric keys: implement OS2IP in rsa, Lee, Chun-Yi
- [PATCH V4 02/15] asymmetric keys: implement EMSA_PKCS1-v1_5-ENCODE in rsa, Lee, Chun-Yi
- [PATCH V4 01/15] asymmetric keys: add interface and skeleton for implement signature generation, Lee, Chun-Yi
- [PATCH V4 03/15] asymmetric keys: separate the length checking of octet string from RSA_I2OSP, Lee, Chun-Yi
- Re: [RFC V4 PATCH 00/15] Signature verification of hibernate snapshot, David Howells
- Re: [RFC V4 PATCH 00/15] Signature verification of hibernate snapshot, Rafael J. Wysocki
- access efi variables,
Arend van Spriel
- [PATCH] EFI: use nr_tables param directly in efi_config_init,
Dave Young
- [PATCH 00/12] One more attempt at useful kernel lockdown,
Matthew Garrett
- [PATCH 03/12] PCI: Lock down BAR access when securelevel is enabled, Matthew Garrett
- [PATCH 05/12] Restrict /dev/mem and /dev/kmem when securelevel is set., Matthew Garrett
- [PATCH 08/12] kexec: Disable at runtime if securelevel has been set., Matthew Garrett
- [PATCH 01/12] Add BSD-style securelevel support, Matthew Garrett
- [PATCH 07/12] acpi: Ignore acpi_rsdp kernel parameter when securelevel is set, Matthew Garrett
- [PATCH 09/12] uswsusp: Disable when securelevel is set, Matthew Garrett
- [PATCH 04/12] x86: Lock down IO port access when securelevel is enabled, Matthew Garrett
- [PATCH 06/12] acpi: Limit access to custom_method if securelevel is set, Matthew Garrett
- [PATCH 02/12] Enforce module signatures when securelevel is greater than 0, Matthew Garrett
- [PATCH 11/12] asus-wmi: Restrict debugfs interface when securelevel is set, Matthew Garrett
- [PATCH 12/12] Add option to automatically set securelevel when in Secure Boot mode, Matthew Garrett
- [PATCH 10/12] x86: Restrict MSR access when securelevel is set, Matthew Garrett
- Re: [PATCH 00/12] One more attempt at useful kernel lockdown, Valdis . Kletnieks
- Re: [PATCH 00/12] One more attempt at useful kernel lockdown, Mimi Zohar
- [PATCH v4 0/3] Make commonly useful UEFI functions common,
Leif Lindholm
- [no subject],
Matthew Garrett
- [PATCH V3 07/11] acpi: Ignore acpi_rsdp kernel parameter when module loading is restricted, Matthew Garrett
- [PATCH V3 08/11] kexec: Disable at runtime if the kernel enforces module loading restrictions, Matthew Garrett
- [PATCH V3 09/11] uswsusp: Disable when module loading is restricted, Matthew Garrett
- [PATCH V3 06/11] Restrict /dev/mem and /dev/kmem when module loading is restricted, Matthew Garrett
- [PATCH V3 05/11] asus-wmi: Restrict debugfs interface when module loading is restricted, Matthew Garrett
- [PATCH V3 04/11] ACPI: Limit access to custom_method, Matthew Garrett
- [PATCH V3 02/11] PCI: Lock down BAR access when module security is enabled, Matthew Garrett
- [PATCH V3 03/11] x86: Lock down IO port access when module security is enabled, Matthew Garrett
- [PATCH V3 01/11] Add secure_modules() call, Matthew Garrett
- [PATCH V3 11/11] Add option to automatically enforce module signatures when in Secure Boot mode, Matthew Garrett
- [PATCH V3 10/11] x86: Restrict MSR access when module loading is restricted, Matthew Garrett
- Re:, Kees Cook
- [PATCH] efivars: Mark local function as static,
Bojan Prtvar
- EFI mode after running kexec,
Greg KH
- [PATCH] x86: EFI stub support for large memory maps,
Linn Crosetto
- [RFC PATCH 00/18 v3] Signature verification of hibernate snapshot,
Lee, Chun-Yi
- [PATCH 01/18] asymmetric keys: add interface and skeleton for implement signature generation, Lee, Chun-Yi
- [PATCH 03/18] asymmetric keys: separate the length checking of octet string from RSA_I2OSP, Lee, Chun-Yi
- [PATCH 08/18] Secure boot: Add new capability, Lee, Chun-Yi
- [PATCH 18/18] Hibernate: notify bootloader regenerate key-pair for snapshot verification, Lee, Chun-Yi
- [PATCH 17/18] Hibernate: introduced SNAPSHOT_SIG_HASH config for select hash algorithm, Lee, Chun-Yi
- [PATCH 16/18] Hibernate: show the verification time for monitor performance, Lee, Chun-Yi
- [PATCH 15/18] Hibernate: adapt to UEFI secure boot with signature check, Lee, Chun-Yi
- [PATCH 14/18] Hibernate: applied SNAPSHOT_VERIFICATION config to switch signature check, Lee, Chun-Yi
- [PATCH 13/18] Hibernate: Avoid S4 sign key data included in snapshot image, Lee, Chun-Yi
- [PATCH 12/18] Hibernate: generate and verify signature of snapshot, Lee, Chun-Yi
- [PATCH 11/18] Hibernate: introduced RSA key-pair to verify signature of snapshot, Lee, Chun-Yi
- [PATCH 10/18] efi: Enable secure boot lockdown automatically when enabled in firmware, Lee, Chun-Yi
- [PATCH 09/18] Secure boot: Add a dummy kernel parameter that will switch on Secure Boot mode, Lee, Chun-Yi
- [PATCH 07/18] asymmetric keys: explicitly add the leading zero byte to encoded message, Lee, Chun-Yi
- [PATCH 06/18] asymmetric keys: support parsing PKCS #8 private key information, Lee, Chun-Yi
- [PATCH 05/18] asymmetric keys: implement RSASP1, Lee, Chun-Yi
- [PATCH 04/18] asymmetric keys: implement OS2IP in rsa, Lee, Chun-Yi
- [PATCH 02/18] asymmetric keys: implement EMSA_PKCS1-v1_5-ENCODE in rsa, Lee, Chun-Yi
- Re: [RFC PATCH 00/18 v3] Signature verification of hibernate snapshot, Florian Weimer
- [PATCH 00/18 v3] Signature verification of hibernate snapshot,
Lee, Chun-Yi
- [RFC][PATCH] efivars,efi-pstore: Hold off deletion of sysfs entry until the scan is completed, Seiji Aguchi
- [RFC PATCH 0/4] EFI boot stub memory map fix,
Linn Crosetto
- [PATCH 0/10] Add additional security checks when module loading is restricted,
Matthew Garrett
- [PATCH V2 06/10] Restrict /dev/mem and /dev/kmem when module loading is restricted, Matthew Garrett
- [PATCH V2 09/10] x86: Restrict MSR access when module loading is restricted, Matthew Garrett
- [PATCH V2 08/10] kexec: Disable at runtime if the kernel enforces module loading restrictions, Matthew Garrett
- [PATCH V2 05/10] asus-wmi: Restrict debugfs interface when module loading is restricted, Matthew Garrett
- [PATCH V2 07/10] acpi: Ignore acpi_rsdp kernel parameter when module loading is restricted, Matthew Garrett
- [PATCH V2 04/10] ACPI: Limit access to custom_method, Matthew Garrett
- [PATCH V2 03/10] x86: Lock down IO port access when module security is enabled, Matthew Garrett
- [PATCH V2 01/10] Add secure_modules() call, Matthew Garrett
- [PATCH V2 02/10] PCI: Lock down BAR access when module security is enabled, Matthew Garrett
- Re: [PATCH 0/10] Add additional security checks when module loading is restricted, Kees Cook
- [PATCH V2 10/10] Add option to automatically enforce module signatures when in Secure Boot mode, Matthew Garrett
- Re: [PATCH 0/10] Add additional security checks when module loading is restricted, Lenny Szubowicz
- [PATCH 01/10] Add secure_modules() call,
Matthew Garrett
- UEFI Plugfest 2013 -- New Orleans,
John W. Linville
- [PATCH V3 RFC 00/16] EFI stub for ARM,
Roy Franz
- [PATCH 16/16] Add config EFI_STUB for ARM to Kconfig, Roy Franz
- [PATCH 11/16] Add proper definitions for some EFI function pointers., Roy Franz
- [PATCH 13/16] resolve warnings found on ARM compile, Roy Franz
- [PATCH 10/16] Move EFI_READ_CHUNK_SIZE define to shared location., Roy Franz
- [PATCH 09/16] Renames in handle_cmdline_files() to complete generalization., Roy Franz
- [PATCH 07/16] Allow efi_free() to be called with size of 0, and do nothing in that case., Roy Franz
- [PATCH 08/16] Generalize handle_ramdisks() and rename to handle_cmdline_files()., Roy Franz
- [PATCH 06/16] Enforce minimum alignment of 1 page on allocations. The efi_high_alloc() and efi_low_alloc() functions use the EFI_ALLOCATE_ADDRESS option to the EFI function allocate_pages(), which requires a minimum of page alignment, and rejects all other requests., Roy Franz
- [PATCH 02/16] Add system pointer argument to shared EFI stub related functions so they no longer use global system table pointer as they did when part of eboot.c. This code is now shared, so using a global variable as part of the interface is not that nice. Also, by avoiding any global variables in the ARM EFI stub, this allows the code to be position independent without requiring GOT fixups., Roy Franz
- [PATCH 03/16] Rename memory allocation/free functions, Roy Franz
- [PATCH 01/16] Move common EFI stub code from x86 arch code to common location, Roy Franz
- Re: [PATCH V3 RFC 00/16] EFI stub for ARM, Mark Salter
- Re: [PATCH V3 RFC 00/16] EFI stub for ARM, Roy Franz
RFC: default CONFIG_EFI_STUB=y,
H. Peter Anvin
[PATCH v3 0/5] Make commonly useful UEFI functions common,
Leif Lindholm
[PATCH V2 00/17] EFI stub for ARM,
Roy Franz
- [PATCH 16/17] Add EFI stub for ARM, Roy Franz
- [PATCH 17/17] Add config EFI_STUB for ARM to Kconfig, Roy Franz
- [PATCH 12/17] Add proper definitions for some EFI function pointers., Roy Franz
- [PATCH 15/17] Add strstr to compressed string.c for ARM., Roy Franz
- [PATCH 13/17] Fix types in EFI calls to match EFI function definitions., Roy Franz
- [PATCH 14/17] resolve warnings found on ARM compile, Roy Franz
- [PATCH 04/17] Rename memory allocation/free functions, Roy Franz
- [PATCH 10/17] Renames in handle_cmdline_files() to complete generalization., Roy Franz
- [PATCH 05/17] Add minimum address parameter to efi_low_alloc(), Roy Franz
- [PATCH 09/17] Generalize handle_ramdisks() and rename to handle_cmdline_files()., Roy Franz
- [PATCH 07/17] Enforce minimum alignment of 1 page on allocations. The efi_high_alloc() and efi_low_alloc() functions use the EFI_ALLOCATE_ADDRESS option to the EFI function allocate_pages(), which requires a minimum of page alignment, and rejects all other requests., Roy Franz
- [PATCH 08/17] Allow efi_free() to be called with size of 0, and do nothing in that case., Roy Franz
- [PATCH 06/17] rename __get_map() to efi_get_memory_map(), add parameter to optionally return mmap key. The mmap key is required to exit EFI boot services, and allows efi_get_memory_map() to be used for getting final memory map., Roy Franz
- [PATCH 02/17] Move common EFI stub code from x86 arch code to common location, Roy Franz
- [PATCH 03/17] Add system pointer argument to shared EFI stub related functions so they no longer use global system table pointer as they did when part of eboot.c., Roy Franz
- [PATCH 11/17] Move EFI_READ_CHUNK_SIZE define to shared location., Roy Franz
- [PATCH 01/17] EFI stub documentation updates, Roy Franz
- Re: [PATCH V2 00/17] EFI stub for ARM, Matt Fleming
EFI stub boots only with setup_efi_pc() commented,
Clea F. Rees
[PATCH 0/7] RFC: EFI stub for ARM,
Roy Franz
[Index of Archives]
[Linux Kernel Development]
[Security]
[Linux ARM Kernel]
[Tools]
[Linux MIPS]
[Linux S390]
[Bugtraq]
[Share Photos]>
[Fedora ARM]