Linux EFI Development - Date Index
[Prev Page][Next Page]
- [PATCH 1/2] efi: register efivars with efi or gsmi from module_init,
Tom Gundersen
- [PATCH v4] efi: split efisubsystem from efivars,
Tom Gundersen
- [RFE PATCH 0/2] x86, rtc, ntp, Enable full rtc synchronization,
Prarit Bhargava
- [PATCH] efi: Clear EFI_RUNTIME_SERVICES rather than EFI_BOOT by "noefi" boot parameter,
Satoru Takeuchi
- [PATCH] x86, efi: remove duplicate code in setup_arch() by using, efi_is_native(),
Satoru Takeuchi
- [PATCH v2] x86/platform/efi/efi_64.c: fix a possible hang in efi_ioremap when init_memory_mapping fails., T Makphaibulchoke
- [PATCH v6 -next 2/2]efi_pstore: Introducing workqueue updating sysfs entries, Seiji Aguchi
- [PATCH v6 -next 1/2] efivars: Disable external interrupt while holding efivars->lock, Seiji Aguchi
- [PATCH v6 -next 0/2] make efivars/efi_pstore interrupt-safe,
Seiji Aguchi
- [PATCH 0/2] efivarfs patch queue,
Matt Fleming
- [RFC][PATCH 0/7] Chainsaw efivars.c,
Matt Fleming
- [PATCH] x86: Lock down MSR writing in secure boot,
Kees Cook
- Re: [PATCH] x86: Lock down MSR writing in secure boot, H. Peter Anvin
- Re: [PATCH] x86: Lock down MSR writing in secure boot, Kees Cook
- Re: [PATCH] x86: Lock down MSR writing in secure boot, H. Peter Anvin
- Re: [PATCH] x86: Lock down MSR writing in secure boot, Kees Cook
- Re: [PATCH] x86: Lock down MSR writing in secure boot, H. Peter Anvin
- Re: [PATCH] x86: Lock down MSR writing in secure boot, Kees Cook
- Re: [PATCH] x86: Lock down MSR writing in secure boot, Matthew Garrett
- Re: [PATCH] x86: Lock down MSR writing in secure boot, Kees Cook
- Re: [PATCH] x86: Lock down MSR writing in secure boot, Matthew Garrett
- Re: [PATCH] x86: Lock down MSR writing in secure boot, H. Peter Anvin
- Re: [PATCH] x86: Lock down MSR writing in secure boot, Borislav Petkov
- Re: [PATCH] x86: Lock down MSR writing in secure boot, Matthew Garrett
- Re: [PATCH] x86: Lock down MSR writing in secure boot, H. Peter Anvin
- Re: [PATCH] x86: Lock down MSR writing in secure boot, Matthew Garrett
- Re: [PATCH] x86: Lock down MSR writing in secure boot, Kees Cook
- Re: [PATCH] x86: Lock down MSR writing in secure boot, Borislav Petkov
- Re: [PATCH] x86: Lock down MSR writing in secure boot, Kees Cook
- Re: [PATCH] x86: Lock down MSR writing in secure boot, Matthew Garrett
- Re: [PATCH] x86: Lock down MSR writing in secure boot, H. Peter Anvin
- Re: [PATCH] x86: Lock down MSR writing in secure boot, Matthew Garrett
- Re: [PATCH] x86: Lock down MSR writing in secure boot, H. Peter Anvin
- Re: [PATCH] x86: Lock down MSR writing in secure boot, Matthew Garrett
- Re: [PATCH] x86: Lock down MSR writing in secure boot, H. Peter Anvin
- Re: [PATCH] x86: Lock down MSR writing in secure boot, Matthew Garrett
- Re: [PATCH] x86: Lock down MSR writing in secure boot, H. Peter Anvin
- Re: [PATCH] x86: Lock down MSR writing in secure boot, Matthew Garrett
- Re: [PATCH] x86: Lock down MSR writing in secure boot, Casey Schaufler
- Re: [PATCH] x86: Lock down MSR writing in secure boot, Matthew Garrett
- Re: [PATCH] x86: Lock down MSR writing in secure boot, H. Peter Anvin
- Re: [PATCH] x86: Lock down MSR writing in secure boot, Matthew Garrett
- Re: [PATCH] x86: Lock down MSR writing in secure boot, H. Peter Anvin
- Re: [PATCH] x86: Lock down MSR writing in secure boot, Casey Schaufler
- Re: [PATCH] x86: Lock down MSR writing in secure boot, H. Peter Anvin
- Re: [PATCH] x86: Lock down MSR writing in secure boot, Casey Schaufler
- Re: [PATCH] x86: Lock down MSR writing in secure boot, Matthew Garrett
- Re: [PATCH] x86: Lock down MSR writing in secure boot, H. Peter Anvin
- Re: [PATCH] x86: Lock down MSR writing in secure boot, Matthew Garrett
- Re: [PATCH] x86: Lock down MSR writing in secure boot, Casey Schaufler
- Re: [PATCH] x86: Lock down MSR writing in secure boot, Paolo Bonzini
- Re: [PATCH] x86: Lock down MSR writing in secure boot, Matthew Garrett
- CONFIG_GOOGLE_SMI and efivars,
Matt Fleming
- [PATCH] x86, efi: remove attribute check from setup_efi_pci,
Maarten Lankhorst
- [PATCH] ia64/mm: fix a bad_page bug when crash kernel booting,
Xishi Qiu
- [PATCH 0/2] Secure Boot: More controversial changes,
Matthew Garrett
- [PATCH 00/15] Secure boot policy support,
Matthew Garrett
- [PATCH 09/15] Restrict /dev/mem and /dev/kmem in secure boot setups, Matthew Garrett
- [PATCH 08/15] asus-wmi: Restrict debugfs interface, Matthew Garrett
- [PATCH 05/15] PCI: Lock down BAR access in secure boot environments, Matthew Garrett
- [PATCH 06/15] x86: Lock down IO port access in secure boot environments, Matthew Garrett
- [PATCH 07/15] ACPI: Limit access to custom_method, Matthew Garrett
- [PATCH 04/15] efi: Enable secure boot lockdown automatically when enabled in firmware, Matthew Garrett
- [PATCH 01/15] Secure boot: Add new capability, Matthew Garrett
- [PATCH 02/15] SELinux: define mapping for new Secure Boot capability, Matthew Garrett
- [PATCH 03/15] Secure boot: Add a dummy kernel parameter that will switch on Secure Boot mode, Matthew Garrett
- [PATCH 15/15] MODSIGN: Always enforce module signing in a Secure Boot environment, Matthew Garrett
- [PATCH 10/15] acpi: Ignore acpi_rsdp kernel parameter in a secure boot environment, Matthew Garrett
- [PATCH 12/15] Add an EFI signature blob parser and key loader., Matthew Garrett
- [PATCH 11/15] Add EFI signature data types, Matthew Garrett
- [PATCH 14/15] MODSIGN: Import certificates from UEFI Secure Boot, Matthew Garrett
- [PATCH 13/15] MODSIGN: Add module certificate blacklist keyring, Matthew Garrett
- Re: [PATCH 00/15] Secure boot policy support, Yves-Alexis Perez
- [PATCH v2] efi: split efisubsystem from efivars, Tom Gundersen
- [RFC,PATCH] efivarfs: Don't delete efivar_entry structures on unlink,
Jeremy Kerr
- [PATCH] efivarfs: drop_nlink on the correct inode in efivarfs_unlink,
Jeremy Kerr
- [PATCH] efi: split efisubsystem from efivars,
Tom Gundersen
- [RFC] efivars write(2) races,
Al Viro
- [PATCH] efivars: allow module autoloading when mounting efivarfs,
Tom Gundersen
- [PATCH v5 -next 0/2] make efivars/efi_pstore interrupt-safe,
Seiji Aguchi
- [PATCH v5 -next 2/2]efi_pstore: Introducing workqueue updating sysfs entries,
Seiji Aguchi
- [PATCH v5 -next 1/2]efivars: Disable external interrupt while holding efivars->lock,
Seiji Aguchi
- [PATCH 0/2] EFI facilities,
Matt Fleming
- Fwd: 2TB USB hard drive for backing up,
Ellwood Blues
- [PATCH v2] fix setup_efi_pci(),
Jan Beulich
- [GIT PULL] EFI fixes for v3.8,
Matt Fleming
- [PATCH] selftests: Add tests for efivarfs,
Jeremy Kerr
- Re: [PATCH] fix setup_efi_pci(),
Matt Fleming
- [PATCH] efivarfs: Never return ENOENT from firmware, Matt Fleming
- [PATCH] efivarfs: Delete dentry from dcache in efivarfs_file_write(),
Matt Fleming
- [PATCH 1/6] x86, efi: Fix display detection in EFI boot stub,
David Woodhouse
- [PATCH 2/6] x86, efi: Fix 32-bit EFI handover protocol entry point, David Woodhouse
- [PATCH 4/6] x86, efi: Add loadflags for EFI handover support in 32-bit and 64-bit mode, David Woodhouse
- [PATCH 5/6] x86, boot: Lead us not into temptation, David Woodhouse
- [PATCH 6/6] x86, boot: Deliver us from evil, David Woodhouse
- [PATCH 3/6] x86, efi: Fix PCI ROM handing in EFI boot stub, in 32-bit mode, David Woodhouse
- [PATCH v2] efi, x86: Pass a proper identity mapping in efi_call_phys_prelog,
Nathan Zimmer
- Re: [PATCH] Specify ELF ABI for EFI handover protocol, Matt Fleming
- Re: [PATCH] Fix efifb initialisation when the only GOP device implements ConOut.,
Matt Fleming
- Re: [RFC PATCH 1/2] efi: Make 'efi_enabled' a function to,
Guo Chao
- [RFC PATCH 0/2] EFI facilities bitfield,
Matt Fleming
- BUG: unable to handle kernel paging request at 000000effd870020,
Nathan Zimmer
- Revisiting EFI boot stub config file support,
Shea Levy
- [PATCH 1/3] rtc-efi: register rtc-efi device when EFI enabled,
Lee, Chun-Yi
[PATCH] arch: x86: boot: compressed: eboot: fix cast warnings on 32b platforms,
Stefan Hasko
[PATCH] x86, efi: correct precedence of operators in setup_efi_pci, Sasha Levin
[patch] x86, efi: precedence error in setup_efi_pci(),
Dan Carpenter
Heads up on EFI error status change, James Bottomley
EFI pstore: BUG: scheduling while atomic, and possible circular locking dependency,
Lingzhu Xiang
[GIT PULL] EFI changes for v3.7 - part 2, Matt Fleming
[GIT PULL] EFI changes for v3.8 - part 2, Matt Fleming
[PATCH v6 7/7] efi_pstore: Add a format check for an existing variable name at erasing time, Seiji Aguchi
[PATCH v6 6/7] efi_pstore: Add a format check for an existing variable name at reading time, Seiji Aguchi
[PATCH v6 5/7] efi_pstore: Add a sequence counter to a variable name, Seiji Aguchi
[PATCH v6 4/7] efi_pstore: Add ctime to argument of erase callback, Seiji Aguchi
[PATCH v6 3/7] efi_pstore: Remove a logic erasing entries from a write callback to hold multiple logs, Seiji Aguchi
[PATCH v6 2/7] efi_pstore: Add a logic erasing entries to an erase callback, Seiji Aguchi
[PATCH v6 1/7] efi_pstore: Check remaining space with QueryVariableInfo() before writing data, Seiji Aguchi
[PATCH v6 0/7] efi_pstore: multiple event logging support, Seiji Aguchi
[GIT PULL] EFI changes for v3.8,
Matt Fleming
[PATCH v5 7/7] efi_pstore: Add a format check for an existing variable name at erasing time, Seiji Aguchi
[PATCH v5 6/7] efi_pstore: Add a format check for an existing variable name at reading time, Seiji Aguchi
[PATCH v5 5/7] efi_pstore: Add a sequence counter to a variable name, Seiji Aguchi
[PATCH v5 4/7] efi_pstore: Add ctime to argument of erase callback, Seiji Aguchi
[PATCH v5 1/7] efi_pstore: Check remaining space with QueryVariableInfo() before writing data, Seiji Aguchi
[PATCH v5 3/7] efi_pstore: Remove a logic erasing entries from a write callback to hold multiple logs, Seiji Aguchi
[PATCH v5 2/7] efi_pstore: Add a logic erasing entries to an erase callback, Seiji Aguchi
[PATCH v5 0/7] efi_pstore: multiple event logging support,
Seiji Aguchi
Do not allow MSR or Embedded Controller writes from userspace in secure boot case,
Thomas Renninger
[PATCH] x86/EFI: check table header length in efi_bgrt_init(),
Jan Beulich
[PATCH] x86/EFI: additional checks in efi_bgrt_init(),
Jan Beulich
[PATCH] samsung-laptop: Disable if CONFIG_EFI=y,
Matt Fleming
[RESEND][PATCH v4 7/7] Add a format check for an existing variable name at erasing time, Seiji Aguchi
[RESEND][PATCH v4 6/7] efi_pstore: Add a format check for an existing variable name at reading time, Seiji Aguchi
[RESEND][PATCH v4 5/7] efi_pstore: Add a sequence counter to a variable name, Seiji Aguchi
[RESEND][PATCH v4 4/7] efi_pstore: Add ctime to argument of erase callback, Seiji Aguchi
[RESEND][PATCH v4 3/7] efi_pstore: Remove a logic erasing entries from a write callback to hold multiple logs, Seiji Aguchi
[RESEND][PATCH v4 2/7] efi_pstore: Add a logic erasing entries to an erase callback, Seiji Aguchi
[RESEND][PATCH v4 1/7] efi_pstore: Check remaining space with QueryVariableInfo() before writing data, Seiji Aguchi
[RESEND][PATCH v4 0/7] efi_pstore: multiple event logging support,
Seiji Aguchi
[PATCH v4 7/7] efi_pstore: Add a format check for an existing variable name at erasing time, Seiji Aguchi
[PATCH v4 6/7] efi_pstore: Add a format check for an existing variable name at reading time, Seiji Aguchi
[PATCH v4 5/7] efi_pstore: Add a sequence counter to a variable name,
Seiji Aguchi
[PATCH v4 4/7] efi_pstore: Add ctime to argument of erase callback, Seiji Aguchi
[PATCH v4 3/7] efi_pstore: Remove a logic erasing entries from a write callback to hold multiple logs, Seiji Aguchi
[PATCH v4 2/7] efi_pstore: Add a logic erasing entries to an erase callback, Seiji Aguchi
[PATCH v4 1/7] efi_pstore: Check remaining space with QueryVariableInfo() before writing data, Seiji Aguchi
[PATCH v4 0/7] efi_pstore: multiple event logging support, Seiji Aguchi
[PATCH] efi: fix always unregister kset of efivars in register_efivars,
Lee, Chun-Yi
[PATCH v3 7/7] Add a format check for an existing variable name at erasing time,
Seiji Aguchi
[PATCH v3 6/7] efi_pstore: Add a format check for an existing variable name at reading time,
Seiji Aguchi
[PATCH v3 5/7] efi_pstore: Add a sequence counter to a variable name, Seiji Aguchi
[PATCH v3 4/7] efi_pstore: Add ctime to argument of erase callback, Seiji Aguchi
[PATCH v3 3/7] efi_pstore: Remove a logic erasing entries from a write callback to hold multiple logs, Seiji Aguchi
[PATCH v3 2/7] efi_pstore: Add a logic erasing entries to an erase callback, Seiji Aguchi
[PATCH v3 1/7] efi_pstore: Check remaining space with QueryVariableInfo() before writing data, Seiji Aguchi
[PATCH v3 0/7] efi_pstore: multiple event logging support, Seiji Aguchi
[GIT PULL] EFI fixes for v3.7,
Matt Fleming
[PATCH 00/20] EFI changes for v3.8,
Matt Fleming
- [PATCH 01/20] efi: Add support for a UEFI variable filesystem, Matt Fleming
- [PATCH 02/20] efi: Handle deletions and size changes in efivarfs_write_file, Matt Fleming
- [PATCH 03/20] efi: add efivars kobject to efi sysfs folder, Matt Fleming
- [PATCH 04/20] efivarfs: Add documentation for the EFI variable filesystem, Matt Fleming
- [PATCH 05/20] x86, mm: Include the entire kernel memory map in trampoline_pgd, Matt Fleming
- [PATCH 06/20] x86, efi: 1:1 pagetable mapping for virtual EFI calls, Matt Fleming
- [PATCH 07/20] x86/kernel: remove tboot 1:1 page table creation code, Matt Fleming
- [PATCH 08/20] x86-64/efi: Use EFI to deal with platform wall clock (again), Matt Fleming
- [PATCH 09/20] efivarfs: efivarfs_file_read ensure we free data in error paths, Matt Fleming
- [PATCH 10/20] efivarfs: efivarfs_create() ensure we drop our reference on inode on error, Matt Fleming
- [PATCH 11/20] efivarfs: efivarfs_fill_super() fix inode reference counts, Matt Fleming
- [PATCH 12/20] efivarfs: efivarfs_fill_super() ensure we free our temporary name, Matt Fleming
- [PATCH 13/20] efivarfs: efivarfs_fill_super() ensure we clean up correctly on error, Matt Fleming
- [PATCH 14/20] efivarfs: Implement exclusive access for {get,set}_variable, Matt Fleming
- [PATCH 15/20] efi: Clarify GUID length calculations, Matt Fleming
- [PATCH 16/20] efivarfs: Return an error if we fail to read a variable, Matt Fleming
- [PATCH 17/20] efivarfs: Replace magic number with sizeof(attributes), Matt Fleming
- [PATCH 18/20] efivarfs: Add unique magic number, Matt Fleming
- [PATCH 19/20] efivarfs: Make 'datasize' unsigned long, Matt Fleming
- [PATCH 20/20] efivarfs: Return a consistent error when efivarfs_get_inode() fails, Matt Fleming
- [PATCH 21/20] efivarfs: Fix return value of efivarfs_file_write(), Matt Fleming
Re: [PATCH v3] x86: efi: Turn off efi_enabled after setup on mixed fw/kernel,
Matt Fleming
[PATCH] systemd: mount the EFI variable filesystem,
Lee, Chun-Yi
[PATCH v2 2/5] efi_pstore: Add a logic erasing entries to an erase callback, Seiji Aguchi
[PATCH v2 5/5] efi_pstore: Add a sequence counter to a variable name, Seiji Aguchi
[PATCH v2 4/5] efi_pstore: Add ctime to argument of erase callback, Seiji Aguchi
[PATCH v2 3/5] efi_pstore: Remove a logic erasing entries from a write callback to hold multiple logs,
Seiji Aguchi
[PATCH 2/5] efi_pstore: Add a logic erasing entries to an erase callback, Seiji Aguchi
[PATCH v2 1/5] efi_pstore: Check remaining space with QueryVariableInfo() before writing data,
Seiji Aguchi
[PATCH v2 0/5] efi_pstore: multiple event logging support, Seiji Aguchi
[PATCH] Add syste-firmware-efi-efivars.mount for support automount EFI variable filesystem,
Lee, Chun-Yi
[PATCH] x86/efi: Fix oops caused by incorrect set_memory_uc() usage, Matt Fleming
[PATCH] efi: Clarify GUID length calculations,
Jeremy Kerr
Re: [PATCH] efi: Build EFI stub with EFI-appropriate options,
Daniel Vacek
[PATCH] efivarfs: Implement exclusive access for {get,set}_variable,
Jeremy Kerr
[PATCH] x86, boot: Explicitly include autoconf.h for hostprogs,
Matt Fleming
Re: boot failure on i7-3317u in Samsung 900x3c,
Matt Fleming
Git Trees for EFI Development,
Shea Levy
[RFC][PATCH 2/2] efi_pstore: add a sequence counter to a variable name,
Seiji Aguchi
[RFC][PATCH 1/2] efi_pstore: hold multiple logs,
Seiji Aguchi
[RFC][PATCH 0/2] efi_pstore: multiple event logging support, Seiji Aguchi
[PATCH v2 0/3] x86/efi: Identity mapping pagetable,
Matt Fleming
[PATCH 1/3] efi: Add support for a UEFI variable filesystem,
Jeremy Kerr
List Archive,
Shea Levy
[PATCH] efi: add efivars kobject to efi sysfs folder,
Lee, Chun-Yi
[PATCH 0/3] x86/efi: Identity mapping pagetable,
Matt Fleming
[PATCH] MAINTAINERS: Add EFI maintainer entry,
Matt Fleming
[RFC] Second attempt at kernel secure boot support,
Matthew Garrett
- [PATCH V2 01/10] Secure boot: Add new capability, Matthew Garrett
- [PATCH V2 09/10] acpi: Ignore acpi_rsdp kernel parameter in a secure boot environment, Matthew Garrett
- [PATCH V2 07/10] Secure boot: Add a dummy kernel parameter that will switch on Secure Boot mode, Matthew Garrett
- [PATCH V2 08/10] efi: Enable secure boot lockdown automatically when enabled in firmware, Matthew Garrett
- [PATCH V2 06/10] Restrict /dev/mem and /dev/kmem in secure boot setups, Matthew Garrett
- [PATCH V2 04/10] ACPI: Limit access to custom_method, Matthew Garrett
- [PATCH V2 05/10] asus-wmi: Restrict debugfs interface, Matthew Garrett
- [PATCH V2 03/10] x86: Lock down IO port access in secure boot environments, Matthew Garrett
- [PATCH V2 02/10] PCI: Lock down BAR access in secure boot environments, Matthew Garrett
- [PATCH V2 10/10] SELinux: define mapping for new Secure Boot capability, Matthew Garrett
- Re: [RFC] Second attempt at kernel secure boot support, Eric W. Biederman
- Re: [RFC] Second attempt at kernel secure boot support, Jiri Kosina
[Index of Archives]
[Linux Kernel Development]
[Security]
[Linux ARM Kernel]
[Tools]
[Linux MIPS]
[Linux S390]
[Bugtraq]
[Share Photos]>
[Fedora ARM]