Linux EFI Development - Date Index
[Prev Page][Next Page]
- Re: Patch "efi: Build EFI stub with EFI-appropriate options" has been added to the 3.6-stable tree, (continued)
Re: Patch "efi: Build EFI stub with EFI-appropriate options" has been added to the 3.6-stable tree, Matt Fleming
Re: efi: be more paranoid about available space when creating variables,
Fleming, Matt
[PATCH] efivars: Fix check for CONFIG_EFI_VARS_PSTORE_DEFAULT_DISABLE,
Ben Hutchings
[GIT PULL] EFI changes for v3.9-rc3, Matt Fleming
Re: [PATCH 06/12] x86: Require CAP_COMPROMISE_KERNEL for IO port access, Matthew Garrett
[PATCH] efivar: Disable get_next_variable when firmware is broken,
Seiji Aguchi
efivarfs: Bad directory entry when variable has / in name,
shea
[PATCH 01/12] Security: Add CAP_COMPROMISE_KERNEL,
Matthew Garrett
- [PATCH 10/12] acpi: Ignore acpi_rsdp kernel parameter in a secure boot environment, Matthew Garrett
- [PATCH 09/12] Require CAP_COMPROMISE_KERNEL for /dev/mem and /dev/kmem access, Matthew Garrett
- [PATCH 08/12] asus-wmi: Restrict debugfs interface, Matthew Garrett
- [PATCH 07/12] ACPI: Limit access to custom_method, Matthew Garrett
- [PATCH 06/12] x86: Require CAP_COMPROMISE_KERNEL for IO port access, Matthew Garrett
- [PATCH 03/12] Secure boot: Add a dummy kernel parameter that will switch on Secure Boot mode, Matthew Garrett
- [PATCH 05/12] PCI: Require CAP_COMPROMISE_KERNEL for PCI BAR access, Matthew Garrett
- [PATCH 02/12] SELinux: define mapping for CAP_COMPROMISE_KERNEL, Matthew Garrett
- [PATCH 04/12] efi: Enable secure boot lockdown automatically when enabled in firmware, Matthew Garrett
- [PATCH 11/12] x86: Require CAP_COMPROMISE_KERNEL for MSR writing, Matthew Garrett
- [PATCH 12/12] kexec: Require CAP_SYS_COMPROMISE_KERNEL, Matthew Garrett
- Re: [PATCH 01/12] Security: Add CAP_COMPROMISE_KERNEL, James Morris
- Re: [PATCH 01/12] Security: Add CAP_COMPROMISE_KERNEL, Yves-Alexis Perez
- Re: [PATCH 01/12] Security: Add CAP_COMPROMISE_KERNEL, H. Peter Anvin
- <Possible follow-ups>
- Re: [PATCH 01/12] Security: Add CAP_COMPROMISE_KERNEL, Matthew Garrett
- Re: [PATCH 01/12] Security: Add CAP_COMPROMISE_KERNEL, Matthew Garrett
- Re: [PATCH 01/12] Security: Add CAP_COMPROMISE_KERNEL, Matthew Garrett
- Re: [PATCH 01/12] Security: Add CAP_COMPROMISE_KERNEL, Matthew Garrett
[PATCH] x86/efi: pull NV+BS variables out before we exit boot services,
James Bottomley
Curious crash with secure variables,
James Bottomley
re: EFI: Stash ROMs if they're not in the PCI BAR,
Dan Carpenter
[PATCH] efivars: allow efi pstore variable when validate filename,
Lee, Chun-Yi
[PATCH] efivars: Allow disabling use as a pstore backend,
Seth Forshee
[PATCH] efivarfs: loosen restriction on valid names,
Maarten Lankhorst
Problem mounting efivarfs in 3.9,
Seth Forshee
[GIT PULL] EFI changes for v3.9-rc2, Matt Fleming
efivarfs: guid part of filenames are case-insensitive is broken,
Joseph Yasi
[PATCH] efi: be more paranoid about available space when creating variables,
Matthew Garrett
sysfs: cannot create duplicate filename,
Andre Heider
Re: EFI runtime and kexec,
H. Peter Anvin
[PATCH] efivarfs: fix abnormal GUID in variable name by using strcpy to replace null with dash,
Lee, Chun-Yi
[PATCH] efivars: Make efivarfs autoloading on mount request,
James Bottomley
[PATCH v5] efi: split efisubsystem from efivars,
Tom Gundersen
[PATCH -next] efivarfs: convert to use simple_open(),
Wei Yongjun
[PATCH] x86, efi: Mark disable_runtime as __initdata,
Matt Fleming
[PATCH v2] x86, efi: Make "noefi" really disable EFI runtime serivces, Matt Fleming
[PATCH] x86, efi: Make "noefi" really disable EFI runtime serivces,
Matt Fleming
[PATCH 1/2] efi: register efivars with efi or gsmi from module_init,
Tom Gundersen
[PATCH v4] efi: split efisubsystem from efivars,
Tom Gundersen
[RFE PATCH 0/2] x86, rtc, ntp, Enable full rtc synchronization,
Prarit Bhargava
[PATCH] efi: Clear EFI_RUNTIME_SERVICES rather than EFI_BOOT by "noefi" boot parameter,
Satoru Takeuchi
[PATCH] x86, efi: remove duplicate code in setup_arch() by using, efi_is_native(),
Satoru Takeuchi
[PATCH v2] x86/platform/efi/efi_64.c: fix a possible hang in efi_ioremap when init_memory_mapping fails., T Makphaibulchoke
[PATCH v6 -next 2/2]efi_pstore: Introducing workqueue updating sysfs entries, Seiji Aguchi
[PATCH v6 -next 1/2] efivars: Disable external interrupt while holding efivars->lock, Seiji Aguchi
[PATCH v6 -next 0/2] make efivars/efi_pstore interrupt-safe,
Seiji Aguchi
[PATCH 0/2] efivarfs patch queue,
Matt Fleming
[RFC][PATCH 0/7] Chainsaw efivars.c,
Matt Fleming
[PATCH] x86: Lock down MSR writing in secure boot,
Kees Cook
- Re: [PATCH] x86: Lock down MSR writing in secure boot, H. Peter Anvin
- Re: [PATCH] x86: Lock down MSR writing in secure boot, Kees Cook
- Re: [PATCH] x86: Lock down MSR writing in secure boot, H. Peter Anvin
- Re: [PATCH] x86: Lock down MSR writing in secure boot, Kees Cook
- Re: [PATCH] x86: Lock down MSR writing in secure boot, H. Peter Anvin
- Re: [PATCH] x86: Lock down MSR writing in secure boot, Kees Cook
- Re: [PATCH] x86: Lock down MSR writing in secure boot, Matthew Garrett
- Re: [PATCH] x86: Lock down MSR writing in secure boot, Kees Cook
- Re: [PATCH] x86: Lock down MSR writing in secure boot, Matthew Garrett
- Re: [PATCH] x86: Lock down MSR writing in secure boot, H. Peter Anvin
- Re: [PATCH] x86: Lock down MSR writing in secure boot, Borislav Petkov
- Re: [PATCH] x86: Lock down MSR writing in secure boot, Matthew Garrett
- Re: [PATCH] x86: Lock down MSR writing in secure boot, H. Peter Anvin
- Re: [PATCH] x86: Lock down MSR writing in secure boot, Matthew Garrett
- Re: [PATCH] x86: Lock down MSR writing in secure boot, Kees Cook
- Re: [PATCH] x86: Lock down MSR writing in secure boot, Borislav Petkov
- Re: [PATCH] x86: Lock down MSR writing in secure boot, Kees Cook
- Re: [PATCH] x86: Lock down MSR writing in secure boot, Matthew Garrett
- Re: [PATCH] x86: Lock down MSR writing in secure boot, H. Peter Anvin
- Re: [PATCH] x86: Lock down MSR writing in secure boot, Matthew Garrett
- Re: [PATCH] x86: Lock down MSR writing in secure boot, H. Peter Anvin
- Re: [PATCH] x86: Lock down MSR writing in secure boot, Matthew Garrett
- Re: [PATCH] x86: Lock down MSR writing in secure boot, H. Peter Anvin
- Re: [PATCH] x86: Lock down MSR writing in secure boot, Matthew Garrett
- Re: [PATCH] x86: Lock down MSR writing in secure boot, H. Peter Anvin
- Re: [PATCH] x86: Lock down MSR writing in secure boot, Matthew Garrett
- Re: [PATCH] x86: Lock down MSR writing in secure boot, Casey Schaufler
- Re: [PATCH] x86: Lock down MSR writing in secure boot, Matthew Garrett
- Re: [PATCH] x86: Lock down MSR writing in secure boot, H. Peter Anvin
- Re: [PATCH] x86: Lock down MSR writing in secure boot, Matthew Garrett
- Re: [PATCH] x86: Lock down MSR writing in secure boot, H. Peter Anvin
- Re: [PATCH] x86: Lock down MSR writing in secure boot, Casey Schaufler
- Re: [PATCH] x86: Lock down MSR writing in secure boot, H. Peter Anvin
- Re: [PATCH] x86: Lock down MSR writing in secure boot, Casey Schaufler
- Re: [PATCH] x86: Lock down MSR writing in secure boot, Matthew Garrett
- Re: [PATCH] x86: Lock down MSR writing in secure boot, H. Peter Anvin
- Re: [PATCH] x86: Lock down MSR writing in secure boot, Matthew Garrett
- Re: [PATCH] x86: Lock down MSR writing in secure boot, Casey Schaufler
- Re: [PATCH] x86: Lock down MSR writing in secure boot, Paolo Bonzini
- Re: [PATCH] x86: Lock down MSR writing in secure boot, Matthew Garrett
CONFIG_GOOGLE_SMI and efivars,
Matt Fleming
[PATCH] x86, efi: remove attribute check from setup_efi_pci,
Maarten Lankhorst
[PATCH] ia64/mm: fix a bad_page bug when crash kernel booting,
Xishi Qiu
[PATCH 0/2] Secure Boot: More controversial changes,
Matthew Garrett
[PATCH 00/15] Secure boot policy support,
Matthew Garrett
- [PATCH 09/15] Restrict /dev/mem and /dev/kmem in secure boot setups, Matthew Garrett
- [PATCH 08/15] asus-wmi: Restrict debugfs interface, Matthew Garrett
- [PATCH 05/15] PCI: Lock down BAR access in secure boot environments, Matthew Garrett
- [PATCH 06/15] x86: Lock down IO port access in secure boot environments, Matthew Garrett
- [PATCH 07/15] ACPI: Limit access to custom_method, Matthew Garrett
- [PATCH 04/15] efi: Enable secure boot lockdown automatically when enabled in firmware, Matthew Garrett
- [PATCH 01/15] Secure boot: Add new capability, Matthew Garrett
- [PATCH 02/15] SELinux: define mapping for new Secure Boot capability, Matthew Garrett
- [PATCH 03/15] Secure boot: Add a dummy kernel parameter that will switch on Secure Boot mode, Matthew Garrett
- [PATCH 15/15] MODSIGN: Always enforce module signing in a Secure Boot environment, Matthew Garrett
- [PATCH 10/15] acpi: Ignore acpi_rsdp kernel parameter in a secure boot environment, Matthew Garrett
- [PATCH 12/15] Add an EFI signature blob parser and key loader., Matthew Garrett
- [PATCH 11/15] Add EFI signature data types, Matthew Garrett
- [PATCH 14/15] MODSIGN: Import certificates from UEFI Secure Boot, Matthew Garrett
- [PATCH 13/15] MODSIGN: Add module certificate blacklist keyring, Matthew Garrett
- Re: [PATCH 00/15] Secure boot policy support, Yves-Alexis Perez
[PATCH v2] efi: split efisubsystem from efivars, Tom Gundersen
[RFC,PATCH] efivarfs: Don't delete efivar_entry structures on unlink,
Jeremy Kerr
[PATCH] efivarfs: drop_nlink on the correct inode in efivarfs_unlink,
Jeremy Kerr
[PATCH] efi: split efisubsystem from efivars,
Tom Gundersen
[RFC] efivars write(2) races,
Al Viro
[PATCH] efivars: allow module autoloading when mounting efivarfs,
Tom Gundersen
[PATCH v5 -next 0/2] make efivars/efi_pstore interrupt-safe,
Seiji Aguchi
[PATCH v5 -next 2/2]efi_pstore: Introducing workqueue updating sysfs entries,
Seiji Aguchi
[PATCH v5 -next 1/2]efivars: Disable external interrupt while holding efivars->lock,
Seiji Aguchi
[PATCH 0/2] EFI facilities,
Matt Fleming
Fwd: 2TB USB hard drive for backing up,
Ellwood Blues
[PATCH v2] fix setup_efi_pci(),
Jan Beulich
[GIT PULL] EFI fixes for v3.8,
Matt Fleming
[PATCH] selftests: Add tests for efivarfs,
Jeremy Kerr
Re: [PATCH] fix setup_efi_pci(),
Matt Fleming
[PATCH] efivarfs: Never return ENOENT from firmware, Matt Fleming
[PATCH] efivarfs: Delete dentry from dcache in efivarfs_file_write(),
Matt Fleming
[PATCH 1/6] x86, efi: Fix display detection in EFI boot stub,
David Woodhouse
- [PATCH 2/6] x86, efi: Fix 32-bit EFI handover protocol entry point, David Woodhouse
- [PATCH 4/6] x86, efi: Add loadflags for EFI handover support in 32-bit and 64-bit mode, David Woodhouse
- [PATCH 5/6] x86, boot: Lead us not into temptation, David Woodhouse
- [PATCH 6/6] x86, boot: Deliver us from evil, David Woodhouse
- [PATCH 3/6] x86, efi: Fix PCI ROM handing in EFI boot stub, in 32-bit mode, David Woodhouse
[PATCH v2] efi, x86: Pass a proper identity mapping in efi_call_phys_prelog,
Nathan Zimmer
Re: [PATCH] Specify ELF ABI for EFI handover protocol, Matt Fleming
Re: [PATCH] Fix efifb initialisation when the only GOP device implements ConOut.,
Matt Fleming
Re: [RFC PATCH 1/2] efi: Make 'efi_enabled' a function to,
Guo Chao
[RFC PATCH 0/2] EFI facilities bitfield,
Matt Fleming
BUG: unable to handle kernel paging request at 000000effd870020,
Nathan Zimmer
Revisiting EFI boot stub config file support,
Shea Levy
[PATCH 1/3] rtc-efi: register rtc-efi device when EFI enabled,
Lee, Chun-Yi
[PATCH] arch: x86: boot: compressed: eboot: fix cast warnings on 32b platforms,
Stefan Hasko
[PATCH] x86, efi: correct precedence of operators in setup_efi_pci, Sasha Levin
[patch] x86, efi: precedence error in setup_efi_pci(),
Dan Carpenter
Heads up on EFI error status change, James Bottomley
EFI pstore: BUG: scheduling while atomic, and possible circular locking dependency,
Lingzhu Xiang
[GIT PULL] EFI changes for v3.7 - part 2, Matt Fleming
[GIT PULL] EFI changes for v3.8 - part 2, Matt Fleming
[PATCH v6 7/7] efi_pstore: Add a format check for an existing variable name at erasing time, Seiji Aguchi
[PATCH v6 6/7] efi_pstore: Add a format check for an existing variable name at reading time, Seiji Aguchi
[PATCH v6 5/7] efi_pstore: Add a sequence counter to a variable name, Seiji Aguchi
[PATCH v6 4/7] efi_pstore: Add ctime to argument of erase callback, Seiji Aguchi
[PATCH v6 3/7] efi_pstore: Remove a logic erasing entries from a write callback to hold multiple logs, Seiji Aguchi
[PATCH v6 2/7] efi_pstore: Add a logic erasing entries to an erase callback, Seiji Aguchi
[PATCH v6 1/7] efi_pstore: Check remaining space with QueryVariableInfo() before writing data, Seiji Aguchi
[PATCH v6 0/7] efi_pstore: multiple event logging support, Seiji Aguchi
[GIT PULL] EFI changes for v3.8,
Matt Fleming
[PATCH v5 7/7] efi_pstore: Add a format check for an existing variable name at erasing time, Seiji Aguchi
[PATCH v5 6/7] efi_pstore: Add a format check for an existing variable name at reading time, Seiji Aguchi
[PATCH v5 5/7] efi_pstore: Add a sequence counter to a variable name, Seiji Aguchi
[PATCH v5 4/7] efi_pstore: Add ctime to argument of erase callback, Seiji Aguchi
[PATCH v5 1/7] efi_pstore: Check remaining space with QueryVariableInfo() before writing data, Seiji Aguchi
[PATCH v5 3/7] efi_pstore: Remove a logic erasing entries from a write callback to hold multiple logs, Seiji Aguchi
[PATCH v5 2/7] efi_pstore: Add a logic erasing entries to an erase callback, Seiji Aguchi
[PATCH v5 0/7] efi_pstore: multiple event logging support,
Seiji Aguchi
Do not allow MSR or Embedded Controller writes from userspace in secure boot case,
Thomas Renninger
[PATCH] x86/EFI: check table header length in efi_bgrt_init(),
Jan Beulich
[PATCH] x86/EFI: additional checks in efi_bgrt_init(),
Jan Beulich
[PATCH] samsung-laptop: Disable if CONFIG_EFI=y,
Matt Fleming
[RESEND][PATCH v4 7/7] Add a format check for an existing variable name at erasing time, Seiji Aguchi
[RESEND][PATCH v4 6/7] efi_pstore: Add a format check for an existing variable name at reading time, Seiji Aguchi
[RESEND][PATCH v4 5/7] efi_pstore: Add a sequence counter to a variable name, Seiji Aguchi
[RESEND][PATCH v4 4/7] efi_pstore: Add ctime to argument of erase callback, Seiji Aguchi
[RESEND][PATCH v4 3/7] efi_pstore: Remove a logic erasing entries from a write callback to hold multiple logs, Seiji Aguchi
[RESEND][PATCH v4 2/7] efi_pstore: Add a logic erasing entries to an erase callback, Seiji Aguchi
[RESEND][PATCH v4 1/7] efi_pstore: Check remaining space with QueryVariableInfo() before writing data, Seiji Aguchi
[RESEND][PATCH v4 0/7] efi_pstore: multiple event logging support,
Seiji Aguchi
[PATCH v4 7/7] efi_pstore: Add a format check for an existing variable name at erasing time, Seiji Aguchi
[PATCH v4 6/7] efi_pstore: Add a format check for an existing variable name at reading time, Seiji Aguchi
[PATCH v4 5/7] efi_pstore: Add a sequence counter to a variable name,
Seiji Aguchi
[PATCH v4 4/7] efi_pstore: Add ctime to argument of erase callback, Seiji Aguchi
[PATCH v4 3/7] efi_pstore: Remove a logic erasing entries from a write callback to hold multiple logs, Seiji Aguchi
[PATCH v4 2/7] efi_pstore: Add a logic erasing entries to an erase callback, Seiji Aguchi
[PATCH v4 1/7] efi_pstore: Check remaining space with QueryVariableInfo() before writing data, Seiji Aguchi
[PATCH v4 0/7] efi_pstore: multiple event logging support, Seiji Aguchi
[PATCH] efi: fix always unregister kset of efivars in register_efivars,
Lee, Chun-Yi
[PATCH v3 7/7] Add a format check for an existing variable name at erasing time,
Seiji Aguchi
[PATCH v3 6/7] efi_pstore: Add a format check for an existing variable name at reading time,
Seiji Aguchi
[PATCH v3 5/7] efi_pstore: Add a sequence counter to a variable name, Seiji Aguchi
[PATCH v3 4/7] efi_pstore: Add ctime to argument of erase callback, Seiji Aguchi
[PATCH v3 3/7] efi_pstore: Remove a logic erasing entries from a write callback to hold multiple logs, Seiji Aguchi
[PATCH v3 2/7] efi_pstore: Add a logic erasing entries to an erase callback, Seiji Aguchi
[PATCH v3 1/7] efi_pstore: Check remaining space with QueryVariableInfo() before writing data, Seiji Aguchi
[PATCH v3 0/7] efi_pstore: multiple event logging support, Seiji Aguchi
[GIT PULL] EFI fixes for v3.7,
Matt Fleming
[PATCH 00/20] EFI changes for v3.8,
Matt Fleming
[Index of Archives]
[Linux Kernel Development]
[Security]
[Linux ARM Kernel]
[Tools]
[Linux MIPS]
[Linux S390]
[Bugtraq]
[Share Photos]>
[Fedora ARM]