Kexec
[Prev Page][Next Page]
- Re: [PATCH] x86: Always to to fill acpi_rsdp_addr in boot params
- Re: [PATCH 1/3] arm64: kdump: support reserving crashkernel above 4G
- Re: [PATCH 2/3] arm64: kdump: support more than one crash kernel regions
- Re: [PATCH v3] x86/boot: Use efi_setup_data for searching RSDP on kexec-ed kernel
- Re: [PATCH v3] x86/boot: Use efi_setup_data for searching RSDP on kexec-ed kernel
- Re: [PATCH v2] x86/boot: Use efi_setup_data for searching RSDP on kexec-ed kernel
- Re: [PATCH v3] x86/boot: Use efi_setup_data for searching RSDP on kexec-ed kernel
- Re: [PATCH v2] x86/boot: Use efi_setup_data for searching RSDP on kexec-ed kernel
- [PATCH 5.0 163/246] x86/kexec: Fill in acpi_rsdp_addr from the first kernel
- Re: [PATCH v2] x86/boot: Use efi_setup_data for searching RSDP on kexec-ed kernel
- Re: [PATCH v2] x86/boot: Use efi_setup_data for searching RSDP on kexec-ed kernel
- Re: [PATCH v3] x86/boot: Use efi_setup_data for searching RSDP on kexec-ed kernel
- Re: [PATCH] x86: Always to to fill acpi_rsdp_addr in boot params
- Re: [PATCH v2] x86/boot: Use efi_setup_data for searching RSDP on kexec-ed kernel
- Re: [PATCH v2] x86/boot: Use efi_setup_data for searching RSDP on kexec-ed kernel
- Re: [PATCH v2] x86/boot: Use efi_setup_data for searching RSDP on kexec-ed kernel
- Re: [PATCH v2] x86/boot: Use efi_setup_data for searching RSDP on kexec-ed kernel
- Re: [PATCH v2] x86/boot: Use efi_setup_data for searching RSDP on kexec-ed kernel
- Re: [PATCH v2] x86/boot: Use efi_setup_data for searching RSDP on kexec-ed kernel
- Re: [PATCH v2] x86/boot: Use efi_setup_data for searching RSDP on kexec-ed kernel
- Re: [PATCH v2] x86/boot: Use efi_setup_data for searching RSDP on kexec-ed kernel
- [PATCH V32 07/27] kexec_file: Restrict at runtime if the kernel is locked down
- [PATCH V32 05/27] Copy secure_boot flag in boot params across kexec reboot
- [PATCH V32 04/27] kexec_load: Disable at runtime if the kernel is locked down
- [PATCH V32 06/27] kexec_file: split KEXEC_VERIFY_SIG into KEXEC_SIG and KEXEC_SIG_FORCE
- Re: [PATCH v3 1/3] arm64, vmcoreinfo : Append 'PTRS_PER_PGD' to vmcoreinfo
- Re: [PATCH v2] x86/boot: Use efi_setup_data for searching RSDP on kexec-ed kernel
- [PATCH] selftests/kexec: update get_secureboot_mode
- Re: [PATCH 2/3] arm64: kdump: support more than one crash kernel regions
- Re: [PATCH 2/9] arm64: mm: Flip kernel VA space
- Re: [PATCH 2/3] arm64: kdump: support more than one crash kernel regions
- Re: [PATCH 8/9] arm64: mm: Logic to make offset_ttbr1 conditional
- Re: [PATCH v2] x86/boot: Use efi_setup_data for searching RSDP on kexec-ed kernel
- Re: [PATCH v2] x86/boot: Use efi_setup_data for searching RSDP on kexec-ed kernel
- Re: [PATCH v2] x86/boot: Use efi_setup_data for searching RSDP on kexec-ed kernel
- Re: [PATCH v2] x86/boot: Use efi_setup_data for searching RSDP on kexec-ed kernel
- Re: [PATCH v2] x86/boot: Use efi_setup_data for searching RSDP on kexec-ed kernel
- Re: [PATCH v2] x86/boot: Use efi_setup_data for searching RSDP on kexec-ed kernel
- Re: [PATCH v2] x86/boot: Use efi_setup_data for searching RSDP on kexec-ed kernel
- Re: [PATCH v2] x86/boot: Use efi_setup_data for searching RSDP on kexec-ed kernel
- Re: [PATCH v2] x86/boot: Use efi_setup_data for searching RSDP on kexec-ed kernel
- Re: [PATCH v2] x86/boot: Use efi_setup_data for searching RSDP on kexec-ed kernel
- Re: [PATCH v2] x86/boot: Use efi_setup_data for searching RSDP on kexec-ed kernel
- Re: [PATCH v2] x86/boot: Use efi_setup_data for searching RSDP on kexec-ed kernel
- Re: [PATCH v2] x86/boot: Use efi_setup_data for searching RSDP on kexec-ed kernel
- Re: [PATCH v2] x86/boot: Use efi_setup_data for searching RSDP on kexec-ed kernel
- [PATCH 3/3] kdump: update Documentation about crashkernel on arm64
- [PATCH 1/3] arm64: kdump: support reserving crashkernel above 4G
- [PATCH 2/3] arm64: kdump: support more than one crash kernel regions
- [PATCH 0/3] support reserving crashkernel above 4G on arm64 kdump
- [PATCH] arm64: support more than one crash kernel regions
- Re: [PATCH v3 1/3] arm64, vmcoreinfo : Append 'PTRS_PER_PGD' to vmcoreinfo
- Re: [PATCH v3 1/3] arm64, vmcoreinfo : Append 'PTRS_PER_PGD' to vmcoreinfo
- Re: [PATCH 1/2 RESEND v10] x86/mm, resource: add a new I/O resource descriptor 'IORES_DESC_RESERVED'
- Re: [PATCH v2] x86/boot: Use efi_setup_data for searching RSDP on kexec-ed kernel
- Re: [PATCH 1/2 RESEND v10] x86/mm, resource: add a new I/O resource descriptor 'IORES_DESC_RESERVED'
- Re: [PATCH 1/3 v2] x86/kexec: Do not map the kexec area as decrypted when SEV is active
- [PATCH v3] x86/boot: Use efi_setup_data for searching RSDP on kexec-ed kernel
- Re: [PATCH v2] x86/boot: Use efi_setup_data for searching RSDP on kexec-ed kernel
- Re: [PATCH v2] x86/boot: Use efi_setup_data for searching RSDP on kexec-ed kernel
- Re: [PATCH v2] x86/boot: Use efi_setup_data for searching RSDP on kexec-ed kernel
- Re: [PATCH 1/2 RESEND v10] x86/mm, resource: add a new I/O resource descriptor 'IORES_DESC_RESERVED'
- Re: [PATCH v2] x86/boot: Use efi_setup_data for searching RSDP on kexec-ed kernel
- [PATCH v2] x86/boot: Use efi_setup_data for searching RSDP on kexec-ed kernel
- [PATCH 2/2 RESEND v10] x86/kexec_file: add reserved e820 ranges to kdump kernel e820 table
- [PATCH 1/2 RESEND v10] x86/mm, resource: add a new I/O resource descriptor 'IORES_DESC_RESERVED'
- [PATCH 0/2 RESEND v10] add reserved e820 ranges to the kdump kernel e820 table
- Re: [PATCH 1/2 v10] x86/mm, resource: add a new I/O resource descriptor 'IORES_DESC_RESERVED'
- Re: [PATCH 1/2 v10] x86/mm, resource: add a new I/O resource descriptor 'IORES_DESC_RESERVED'
- Re: [PATCH v2] x86/boot: Use EFI setup data if provided
- Re: [PATCH v2] x86/boot: Use EFI setup data if provided
- Re: [PATCH v2] x86/boot: Use EFI setup data if provided
- Re: [PATCH] x86/boot: Use efi_setup_data for searching RSDP on kexec-ed kernel
- Re: [PATCH] x86/boot: Use efi_setup_data for searching RSDP on kexec-ed kernel
- Re: [PATCH] x86/boot: Use efi_setup_data for searching RSDP on kexec-ed kernel
- Re: [PATCH v2] x86/boot: Use EFI setup data if provided
- Re: [PATCH v2] x86/boot: Use EFI setup data if provided
- Re: [PATCH] x86/boot: Use efi_setup_data for searching RSDP on kexec-ed kernel
- Re: [PATCH v2] x86/boot: Use EFI setup data if provided
- Re: [PATCH] x86/boot: Use efi_setup_data for searching RSDP on kexec-ed kernel
- Re: [PATCH] x86/boot: Use efi_setup_data for searching RSDP on kexec-ed kernel
- [PATCH] x86/boot: Use efi_setup_data for searching RSDP on kexec-ed kernel
- [PATCH 2/2 v10] x86/kexec_file: add reserved e820 ranges to kdump kernel e820 table
- [PATCH 1/2 v10] x86/mm, resource: add a new I/O resource descriptor 'IORES_DESC_RESERVED'
- [PATCH 0/2 v10] add reserved e820 ranges to the kdump kernel e820 table
- Re: [PATCH v2] x86/boot: Use EFI setup data if provided
- Re: [PATCH v2] x86/boot: Use EFI setup data if provided
- Re: [PATCH v2] x86/boot: Use EFI setup data if provided
- Re: [PATCH v2] x86/boot: Use EFI setup data if provided
- Re: [PATCH v2] x86/boot: Use EFI setup data if provided
- Re: [PATCH v2] x86/boot: Use EFI setup data if provided
- Re: [PATCH 2/3 v9] resource: add the new I/O resource descriptor 'IORES_DESC_RESERVED'
- Re: [PATCH v3 1/3] arm64, vmcoreinfo : Append 'PTRS_PER_PGD' to vmcoreinfo
- Re: [PATCH] x86: Always to to fill acpi_rsdp_addr in boot params
- [PATCH] x86: Always to to fill acpi_rsdp_addr in boot params
- Re: [PATCH v2] x86/boot: Use EFI setup data if provided
- Re: [PATCH v2] x86/boot: Use EFI setup data if provided
- Re: [PATCH v2] x86/boot: Use EFI setup data if provided
- Re: [PATCH v2] x86/boot: Use EFI setup data if provided
- [PATCH AUTOSEL 5.0 173/262] x86/kexec: Fill in acpi_rsdp_addr from the first kernel
- RE: [PATCH v3 1/3] arm64, vmcoreinfo : Append 'PTRS_PER_PGD' to vmcoreinfo
- Re: [PATCH v2] x86/boot: Use EFI setup data if provided
- Re: [PATCH v5 9/9] selftests/kexec: make kexec_load test independent of IMA being enabled
- Re: [PATCH v5 1/9] selftests/kexec: move the IMA kexec_load selftest to selftests/kexec
- Re: [PATCH v5 8/9] selftests/kexec: check kexec_load and kexec_file_load are enabled
- [PATCH 3/3 v2] kdump, proc/vmcore: Enable kdumping encrypted memory when SEV was active
- [PATCH 2/3 v2] x86/kexec: Set the C-bit in the identity map page table when SEV is active
- [PATCH 1/3 v2] x86/kexec: Do not map the kexec area as decrypted when SEV is active
- [PATCH 0/3 v2] Add kdump support for the SEV enabled guest
- Re: [PATCH v2] x86/boot: Use EFI setup data if provided
- [PATCH V31 04/25] kexec_load: Disable at runtime if the kernel is locked down
- [PATCH V31 06/25] kexec_file: split KEXEC_VERIFY_SIG into KEXEC_SIG and KEXEC_SIG_FORCE
- [PATCH V31 07/25] kexec_file: Restrict at runtime if the kernel is locked down
- [PATCH V31 05/25] Copy secure_boot flag in boot params across kexec reboot
- Re: [PATCH v3 1/3] arm64, vmcoreinfo : Append 'PTRS_PER_PGD' to vmcoreinfo
- Re: [PATCH v2] x86/boot: Use EFI setup data if provided
- Re: [PATCH v4a 1/2] selftests/kexec: make tests independent of IMA being enabled
- [PATCH v5 9/9] selftests/kexec: make kexec_load test independent of IMA being enabled
- [PATCH v5 8/9] selftests/kexec: check kexec_load and kexec_file_load are enabled
- [PATCH v5 4/9] selftests/kexec: define common logging functions
- [PATCH v5 0/9] selftests/kexec: add kexec tests
- [PATCH v5 1/9] selftests/kexec: move the IMA kexec_load selftest to selftests/kexec
- [PATCH v5 6/9] selftests/kexec: kexec_file_load syscall test
- [PATCH v5 5/9] kselftest/kexec: define "require_root_privileges"
- [PATCH v5 3/9] selftests/kexec: define a set of common functions
- [PATCH v5 7/9] selftests/kexec: Add missing '=y' to config options
- [PATCH v5 2/9] selftests/kexec: cleanup the kexec selftest
- Re: [PATCH v2] x86/boot: Use EFI setup data if provided
- Re: [PATCH 1/3] kexec: Do not map the kexec area as decrypted when SEV is active
- Re: [PATCH 1/2 v8] resource: add the new I/O resource descriptor 'IORES_DESC_RESERVED'
- Re: [PATCH 1/2 v8] resource: add the new I/O resource descriptor 'IORES_DESC_RESERVED'
- Re: [PATCH v4a 1/2] selftests/kexec: make tests independent of IMA being enabled
- [PATCH] include/kcore: Remove left-over instances of 'kclist_add_remap()'
- Re: [PATCH 1/3] kexec: Do not map the kexec area as decrypted when SEV is active
- Re: [PATCH v2] x86/boot: Use EFI setup data if provided
- [PATCH 07/27] kexec_file: Restrict at runtime if the kernel is locked down
- [PATCH 06/27] kexec_file: split KEXEC_VERIFY_SIG into KEXEC_SIG and KEXEC_SIG_FORCE
- [PATCH 05/27] Copy secure_boot flag in boot params across kexec reboot
- [PATCH 04/27] kexec_load: Disable at runtime if the kernel is locked down
- Re: [PATCH v4a 1/2] selftests/kexec: make tests independent of IMA being enabled
- Re: [PATCH 1/3] kexec: Do not map the kexec area as decrypted when SEV is active
- Re: [PATCH 1/2 v8] resource: add the new I/O resource descriptor 'IORES_DESC_RESERVED'
- Re: [PATCH 1/3] kexec: Do not map the kexec area as decrypted when SEV is active
- Re: [PATCH 1/3] kexec: Do not map the kexec area as decrypted when SEV is active
- Re: [PATCH 1/3] kexec: Do not map the kexec area as decrypted when SEV is active
- Re: [PATCH v2] x86/boot: Use EFI setup data if provided
- Re: [PATCH 2/3 v9] resource: add the new I/O resource descriptor 'IORES_DESC_RESERVED'
- Re: [PATCH v2] x86/boot: Use EFI setup data if provided
- Re: [PATCH 1/3 v9] x86/mm: Change the examination condition to avoid confusion
- Re: [PATCH v2] x86/boot: Use EFI setup data if provided
- Re: [PATCH v2] x86/boot: Use EFI setup data if provided
- Re: [PATCH v2] x86/boot: Use EFI setup data if provided
- Re: [PATCH v2] x86/boot: Use EFI setup data if provided
- [PATCH v2] x86/boot: Don't try to search RSDP from EFI when kexec-booted
- Re: [PATCH 1/3 v9] x86/mm: Change the examination condition to avoid confusion
- Re: [PATCH v2] x86/boot: Use EFI setup data if provided
- [PATCH v2] x86/boot: Use EFI setup data if provided
- Re: [PATCH v4a 1/2] selftests/kexec: make tests independent of IMA being enabled
- Re: [PATCH] x86/boot: Use EFI setup data if provided
- Re: [PATCH 2/3 v9] resource: add the new I/O resource descriptor 'IORES_DESC_RESERVED'
- Re: [PATCH] x86/boot: Use EFI setup data if provided
- Re: [PATCH] x86/boot: Use EFI setup data if provided
- Re: [PATCH 1/3 v9] x86/mm: Change the examination condition to avoid confusion
- Re: [PATCH 1/3] kexec: Do not map the kexec area as decrypted when SEV is active
- Re: [PATCH] x86/boot: Use EFI setup data if provided
- Re: [PATCH] x86/boot: Use EFI setup data if provided
- Re: [PATCH 1/3 v9] x86/mm: Change the examination condition to avoid confusion
- Re: [PATCH 1/3] kexec: Do not map the kexec area as decrypted when SEV is active
- Re: [PATCH] x86/boot: Use EFI setup data if provided
- Re: [PATCH 1/3] kexec: Do not map the kexec area as decrypted when SEV is active
- [PATCH v4a 2/2] selftests/kexec: testing CONFIG_KEXEC_BZIMAGE_VERIFY_SIG is not enough
- [PATCH v4a 1/2] selftests/kexec: make tests independent of IMA being enabled
- Re: [PATCH 2/3 v9] resource: add the new I/O resource descriptor 'IORES_DESC_RESERVED'
- Re: [PATCH 1/3 v9] x86/mm: Change the examination condition to avoid confusion
- [PATCH 4.4 098/230] x86/kexec: Dont setup EFI info if EFI runtime is not enabled
- [PATCH 3.18 068/134] x86/kexec: Dont setup EFI info if EFI runtime is not enabled
- Re: [PATCHv7] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- [PATCH] kexec: fix the check in crash_save_cpu
- [PATCH 3/3 v9] x86/kexec_file: add reserved e820 ranges to kdump kernel e820 table
- [PATCH 2/3 v9] resource: add the new I/O resource descriptor 'IORES_DESC_RESERVED'
- [PATCH 1/3 v9] x86/mm: Change the examination condition to avoid confusion
- [PATCH 0/3 v9] add reserved e820 ranges to the kdump kernel e820 table
- Re: [PATCH v4 0/8] selftests/kexec: add kexec tests
- Re: [PATCH v4 0/8] selftests/kexec: add kexec tests
- [PATCH v3 3/3] Documentation/vmcoreinfo: Add documentation for 'MAX_PHYSMEM_BITS'
- [PATCH v3 2/3] crash_core, vmcoreinfo: Append 'MAX_PHYSMEM_BITS' to vmcoreinfo
- [PATCH v3 1/3] arm64, vmcoreinfo : Append 'PTRS_PER_PGD' to vmcoreinfo
- [PATCH v3 0/3] Append new variables to vmcoreinfo (PTRS_PER_PGD for arm64 and MAX_PHYSMEM_BITS for all archs)
- Re: [PATCH] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- [PATCH] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- [RFC] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- Re: [RFC] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- Re: [PATCH 1/2 v8] resource: add the new I/O resource descriptor 'IORES_DESC_RESERVED'
- Re: [PATCH 0/3] Add kdump support for the SEV enabled guest
- [PATCH 3/3] kdump, proc/vmcore: Enable kdumping encrypted memory when SEV was active
- [PATCH 2/3] kexec: Set the C-bit in the identity map page table when SEV is active
- [PATCH 1/3] kexec: Do not map the kexec area as decrypted when SEV is active
- [PATCH 0/3] Add kdump support for the SEV enabled guest
- Re: [PATCH v4 0/8] selftests/kexec: add kexec tests
- [PATCH] kexec/x86: Unconditionally add the acpi_rsdp command line
- [PATCH v4 8/8] selftests/kexec: check kexec_load and kexec_file_load are enabled
- [PATCH v4 7/8] selftests/kexec: Add missing '=y' to config options
- [PATCH v4 6/8] selftests/kexec: kexec_file_load syscall test
- [PATCH v4 5/8] kselftest/kexec: define "require_root_privileges"
- [PATCH v4 4/8] selftests/kexec: define common logging functions
- [PATCH v4 3/8] selftests/kexec: define a set of common functions
- [PATCH v4 2/8] selftests/kexec: cleanup the kexec selftest
- [PATCH v4 1/8] selftests/kexec: move the IMA kexec_load selftest to selftests/kexec
- [PATCH v4 0/8] selftests/kexec: add kexec tests
- Re: [PATCH v2 2/2] crash_core, vmcoreinfo: Append 'MAX_PHYSMEM_BITS' to vmcoreinfo
- RE: [PATCH v2 2/2] crash_core, vmcoreinfo: Append 'MAX_PHYSMEM_BITS' to vmcoreinfo
- [PATCH 4.9 58/96] x86/kexec: Dont setup EFI info if EFI runtime is not enabled
- [PATCH 4.14 079/135] x86/kexec: Dont setup EFI info if EFI runtime is not enabled
- [PATCH 4.19 052/149] x86/kexec: Dont setup EFI info if EFI runtime is not enabled
- [PATCH 4.20 060/171] x86/kexec: Dont setup EFI info if EFI runtime is not enabled
- Re: [PATCH v3 5/7] selftests/ima: kexec_file_load syscall test
- Re: [PATCH v2 0/2] Append new variables to vmcoreinfo (PTRS_PER_PGD for arm64 and MAX_PHYSMEM_BITS for all archs)
- Re: [PATCH v3 5/7] selftests/ima: kexec_file_load syscall test
- Re: [PATCH v3] Remove the memory encryption mask to obtain the true physical address
- Re: [PATCH v3 0/7] selftests/ima: add kexec and kernel module tests
- Re: [PATCH v3 2/7] selftests/ima: define a set of common functions
- RE: [PATCH v3] Remove the memory encryption mask to obtain the true physical address
- Re: [PATCH 3/3] x86/ima: retry detecting secure boot mode
- Re: [PATCH 3/3] x86/ima: retry detecting secure boot mode
- RE: [PATCH v2] makedumpfile: exclude pages that are logically offline
- [PATCH v3 7/7] selftests/ima: Add missing '=y' to config options
- [PATCH v3 6/7] selftests/ima: loading kernel modules
- [PATCH v3 5/7] selftests/ima: kexec_file_load syscall test
- [PATCH v3 3/7] selftests/ima: define common logging functions
- [PATCH v3 4/7] kselftest/ima: define "require_root_privileges"
- [PATCH v3 2/7] selftests/ima: define a set of common functions
- [PATCH v3 1/7] selftests/ima: cleanup the kexec selftest
- [PATCH v3 0/7] selftests/ima: add kexec and kernel module tests
- Re: [PATCH v2 3/8] kexec: export PG_offline to VMCOREINFO
- Re: [PATCH v2 3/8] kexec: export PG_offline to VMCOREINFO
- Re: [PATCH v2 0/2] Append new variables to vmcoreinfo (PTRS_PER_PGD for arm64 and MAX_PHYSMEM_BITS for all archs)
- Re: [PATCH v2 3/8] kexec: export PG_offline to VMCOREINFO
- [PATCH v3 3/3] makedumpfile/arm64: Add support for ARMv8.2-LVA (52-bit user-space VA support)
- [PATCH v3 2/3] makedumpfile/arm64: Add support for ARMv8.2-LPA (52-bit PA support)
- [PATCH v3 1/3] tree-wide: Retrieve 'MAX_PHYSMEM_BITS' from vmcoreinfo (if available)
- [PATCH v3 0/3] makedumpfile/arm64: Add support for ARMv8.2 extensions
- [PATCH v2 2/2] crash_core, vmcoreinfo: Append 'MAX_PHYSMEM_BITS' to vmcoreinfo
- [PATCH v2 1/2] arm64, vmcoreinfo : Append 'PTRS_PER_PGD' to vmcoreinfo
- [PATCH v2 0/2] Append new variables to vmcoreinfo (PTRS_PER_PGD for arm64 and MAX_PHYSMEM_BITS for all archs)
- Re: [PATCH 3/3] x86/ima: retry detecting secure boot mode
- Re: [PATCH 3/3] x86/ima: retry detecting secure boot mode
- Re: [PATCH 3/3] x86/ima: retry detecting secure boot mode
- Re: [PATCH 2/3] scripts/ima: define a set of common functions
- Re: [PATCH 3/3] x86/ima: retry detecting secure boot mode
- Re: [PATCH 2/3] scripts/ima: define a set of common functions
- Re: [PATCH 3/3] x86/ima: retry detecting secure boot mode
- Re: [PATCH 3/3] x86/ima: retry detecting secure boot mode
- Re: [PATCH 3/3] x86/ima: retry detecting secure boot mode
- Re: [PATCH 3/3] x86/ima: retry detecting secure boot mode
- machine_kexec() stuck at load_segments() in arch/x86/kernel/machine_kexec_64.c
- Re: [PATCH v2] makedumpfile: exclude pages that are logically offline
- Re: [PATCH v2] x86: Introduce a new option --reuse-video-type
- Re: [PATCH v2] x86: Introduce a new option --reuse-video-type
- [PATCH v2] x86: Introduce a new option --reuse-video-type
- Re: [PATCH] x86: Introdudce a new option --force-vga
- Re: [PATCH] x86: Introdudce a new option --force-vga
- Re: [PATCH] x86: Introdudce a new option --force-vga
- [ANNOUNCE] kexec-tools 2.0.19
- Re: [PATCH v2 0/8] mm/kdump: allow to exclude pages that are logically offline
- Re: [PATCH] x86: Introdudce a new option --force-vga
- Re: [PATCH v2 0/8] mm/kdump: allow to exclude pages that are logically offline
- Re: [PATCH] arm64, vmcoreinfo : Append 'MAX_USER_VA_BITS' and 'MAX_PHYSMEM_BITS' to vmcoreinfo
- Re: [PATCHv7] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- Re: [PATCHv7] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- RE: [PATCH] makedumpfile: fixing possible memory leaks seen in static analysis
- Re: [PATCH v2 0/8] mm/kdump: allow to exclude pages that are logically offline
- Re: [PATCH v2 0/8] mm/kdump: allow to exclude pages that are logically offline
- Re: [PATCH 2/3] scripts/ima: define a set of common functions
- Re: [PATCH 2/3] scripts/ima: define a set of common functions
- [PATCH] x86: Introdudce a new option --force-vga
- Re: [PATCH v2 0/8] mm/kdump: allow to exclude pages that are logically offline
- Re: [PATCH v2 1/2] makedumpfile/arm64: Add support for ARMv8.2-LPA (52-bit PA support)
- [ANNOUNCE] kexec-tools 2.0.19-rc1
- Re: [PATCHv7] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- Re: [PATCHv7] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- Re: [PATCHv7] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- Re: [PATCHv7] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- Re: [PATCHv7] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- Re: [PATCHv7] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- [PATCH AUTOSEL 3.18 15/18] x86/kexec: Don't setup EFI info if EFI runtime is not enabled
- [PATCH AUTOSEL 4.4 20/26] x86/kexec: Don't setup EFI info if EFI runtime is not enabled
- [PATCH AUTOSEL 4.9 26/32] x86/kexec: Don't setup EFI info if EFI runtime is not enabled
- [PATCH AUTOSEL 4.14 38/45] x86/kexec: Don't setup EFI info if EFI runtime is not enabled
- [PATCH AUTOSEL 4.19 57/65] x86/kexec: Don't setup EFI info if EFI runtime is not enabled
- [PATCH AUTOSEL 4.20 63/72] x86/kexec: Don't setup EFI info if EFI runtime is not enabled
- RE: [PATCH v2 1/2] makedumpfile/arm64: Add support for ARMv8.2-LPA (52-bit PA support)
- Re: [PATCHv7] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- Re: [PATCHv7] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- Re: [PATCH] makedumpfile/arm64: Add support for ARMv8.2-LVA (52-bit user-space VA support)
- Re: [PATCH v2 1/2] makedumpfile/arm64: Add support for ARMv8.2-LPA (52-bit PA support)
- Re: [PATCHv7] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- RE: [PATCH] arm64, vmcoreinfo : Append 'MAX_USER_VA_BITS' and 'MAX_PHYSMEM_BITS' to vmcoreinfo
- Re: [PATCHv7] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- Re: [PATCH] arm64, vmcoreinfo : Append 'MAX_USER_VA_BITS' and 'MAX_PHYSMEM_BITS' to vmcoreinfo
- Re: [PATCH] arm64, vmcoreinfo : Append 'MAX_USER_VA_BITS' and 'MAX_PHYSMEM_BITS' to vmcoreinfo
- Re: [PATCH] arm64, vmcoreinfo : Append 'MAX_USER_VA_BITS' and 'MAX_PHYSMEM_BITS' to vmcoreinfo
- RE: [PATCH v2 1/2] makedumpfile/arm64: Add support for ARMv8.2-LPA (52-bit PA support)
- Re: [PATCHv7] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- Re: [PATCHv7] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- Re: [PATCHv7] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- Re: [PATCHv7] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- RE: [PATCH] arm64, vmcoreinfo : Append 'MAX_USER_VA_BITS' and 'MAX_PHYSMEM_BITS' to vmcoreinfo
- Re: [PATCH] arm64, vmcoreinfo : Append 'MAX_USER_VA_BITS' and 'MAX_PHYSMEM_BITS' to vmcoreinfo
- Re: [PATCHv7] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- Re: [PATCH] makedumpfile/arm64: Add support for ARMv8.2-LPA (52-bit PA support)
- [PATCH v2 2/2] makedumpfile/arm64: Add support for ARMv8.2-LVA (52-bit user-space VA support)
- [PATCH v2 1/2] makedumpfile/arm64: Add support for ARMv8.2-LPA (52-bit PA support)
- [PATCH v2 0/2] makedumpfile/arm64: Add support for ARMv8.2 extensions
- Re: [PATCH] arm64, vmcoreinfo : Append 'MAX_USER_VA_BITS' and 'MAX_PHYSMEM_BITS' to vmcoreinfo
- Re: [PATCH] arm64, vmcoreinfo : Append 'MAX_USER_VA_BITS' and 'MAX_PHYSMEM_BITS' to vmcoreinfo
- Re: [PATCHv7] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- RE: [PATCH] makedumpfile: fix a typo for checking the file pointer for null.
- [PATCH] makedumpfile: fixing possible memory leaks seen in static analysis
- [PATCH] makedumpfile: fix a typo for checking the file pointer for null.
- Re: [PATCH] arm64, vmcoreinfo : Append 'MAX_USER_VA_BITS' and 'MAX_PHYSMEM_BITS' to vmcoreinfo
- RE: [PATCH] makedumpfile/arm64: Add support for ARMv8.2-LPA (52-bit PA support)
- Re: [PATCH] makedumpfile/arm64: Add support for ARMv8.2-LPA (52-bit PA support)
- RE: [PATCH] arm64, vmcoreinfo : Append 'MAX_USER_VA_BITS' and 'MAX_PHYSMEM_BITS' to vmcoreinfo
- Re: [PATCH] arm64, vmcoreinfo : Append 'MAX_USER_VA_BITS' and 'MAX_PHYSMEM_BITS' to vmcoreinfo
- Re: [PATCH] arm64, vmcoreinfo : Append 'MAX_USER_VA_BITS' and 'MAX_PHYSMEM_BITS' to vmcoreinfo
- [ANNOUNCE] kexec-tools v2.0.19 preparation
- RE: [PATCH] arm64, vmcoreinfo : Append 'MAX_USER_VA_BITS' and 'MAX_PHYSMEM_BITS' to vmcoreinfo
- RE: [PATCH] makedumpfile/arm64: Add support for ARMv8.2-LPA (52-bit PA support)
- Re: [PATCH] arm64, vmcoreinfo : Append 'MAX_USER_VA_BITS' and 'MAX_PHYSMEM_BITS' to vmcoreinfo
- Re: [PATCH] makedumpfile/arm64: Add support for ARMv8.2-LPA (52-bit PA support)
- RE: [PATCH] makedumpfile/arm64: Add support for ARMv8.2-LPA (52-bit PA support)
- Re: [PATCH] arm64, vmcoreinfo : Append 'MAX_USER_VA_BITS' and 'MAX_PHYSMEM_BITS' to vmcoreinfo
- Re: [PATCH] arm64, vmcoreinfo : Append 'MAX_USER_VA_BITS' and 'MAX_PHYSMEM_BITS' to vmcoreinfo
- Re: [PATCH] makedumpfile/arm64: Add support for ARMv8.2-LPA (52-bit PA support)
- Re: [PATCHv7] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- Re: [PATCH] arm64, vmcoreinfo : Append 'MAX_USER_VA_BITS' and 'MAX_PHYSMEM_BITS' to vmcoreinfo
- Re: [PATCH] arm64, vmcoreinfo : Append 'MAX_USER_VA_BITS' and 'MAX_PHYSMEM_BITS' to vmcoreinfo
- RE: [PATCH] makedumpfile/arm64: Add support for ARMv8.2-LVA (52-bit user-space VA support)
- Re: [PATCHv7] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- [PATCH v2 1/3] x86/boot: Add xloadflags bits for 5-level kernel checking
- Re: [PATCH RESEND 1/3] x86/boot: Add bit fields into xloadflags for 5-level kernel checking
- Re: [PATCH v3] Remove the memory encryption mask to obtain the true physical address
- RE: [PATCH] makedumpfile/arm64: Add support for ARMv8.2-LPA (52-bit PA support)
- [PATCH] makedumpfile/arm64: Add support for ARMv8.2-LVA (52-bit user-space VA support)
- Re: [PATCH] makedumpfile/arm64: Add support for ARMv8.2-LPA (52-bit PA support)
- Re: [PATCHv7] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- Re: [PATCH] arm64: wipe old initrd addresses when patching the DTB
- Re: [PATCH] purgatory: Use standalond CFLAGS
- Re: [PATCHv7] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- Re: [PATCHv7] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- Re: [PATCH] integrity, KEYS: Fix build break with set_platform_trusted_keys
- [PATCH] x86, kexec_file_load: fill in acpi_rsdp_addr boot param unconditionally
- RE: [PATCH v3] Remove the memory encryption mask to obtain the true physical address
- Re: [PATCH] arm64, vmcoreinfo : Append 'MAX_USER_VA_BITS' and 'MAX_PHYSMEM_BITS' to vmcoreinfo
- Re: [PATCH 1/2] arm64: Expose address bits (physical/virtual) via cpuinfo
- RE: [PATCH] arm64, vmcoreinfo : Append 'MAX_USER_VA_BITS' and 'MAX_PHYSMEM_BITS' to vmcoreinfo
- Re: [PATCH] arm64, vmcoreinfo : Append 'MAX_USER_VA_BITS' and 'MAX_PHYSMEM_BITS' to vmcoreinfo
- Re: [PATCH] arm64, vmcoreinfo : Append 'MAX_USER_VA_BITS' and 'MAX_PHYSMEM_BITS' to vmcoreinfo
- Re: [PATCH 3/3] selftests/ima: kexec_file_load syscall test
- Re: [PATCH 3/3] selftests/ima: kexec_file_load syscall test
- Re: [PATCH 2/3] scripts/ima: define a set of common functions
- Re: [PATCH 1/3] selftest/ima: cleanup the kexec selftest
- [PATCH] integrity, KEYS: Fix build break with set_platform_trusted_keys
- [PATCH] arm64: wipe old initrd addresses when patching the DTB
- From: Jean-Philippe Brucker
- Re: [PATCHv7] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- Re: [PATCHv7] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- [PATCH 3/3] selftests/ima: kexec_file_load syscall test
- [PATCH 2/3] scripts/ima: define a set of common functions
- [PATCH 1/3] selftest/ima: cleanup the kexec selftest
- [PATCH 0/3] selftest/ima: add kexec_file_load test
- Re: [PATCH] arm64, vmcoreinfo : Append 'MAX_USER_VA_BITS' and 'MAX_PHYSMEM_BITS' to vmcoreinfo
- Re: [PATCHv7] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- Re: [PATCHv7] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- Re: [PATCH] arm64, vmcoreinfo : Append 'MAX_USER_VA_BITS' and 'MAX_PHYSMEM_BITS' to vmcoreinfo
- Re: [PATCHv7] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- Re: [PATCHv7] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- Re: [PATCH] arm64, vmcoreinfo : Append 'MAX_USER_VA_BITS' and 'MAX_PHYSMEM_BITS' to vmcoreinfo
- Re: [PATCH] arm64, vmcoreinfo : Append 'MAX_USER_VA_BITS' and 'MAX_PHYSMEM_BITS' to vmcoreinfo
- Re: [PATCH 2/2] arm64: Expose PARange via ID_AA64MMFR0_EL1 and VARange via ID_AA64MMFR2_EL1
- Re: [PATCH 1/2] arm64: Expose address bits (physical/virtual) via cpuinfo
- Re: [PATCH] arm64, vmcoreinfo : Append 'MAX_USER_VA_BITS' and 'MAX_PHYSMEM_BITS' to vmcoreinfo
- [PATCH] arm64, vmcoreinfo : Append 'MAX_USER_VA_BITS' and 'MAX_PHYSMEM_BITS' to vmcoreinfo
- [PATCH v3] Remove the memory encryption mask to obtain the true physical address
- Re: [PATCH RESEND 1/3] x86/boot: Add bit fields into xloadflags for 5-level kernel checking
- RE: [PATCH v2] makedumpfile: honor the CFLAGS from environment variables
- Re: [Xen-devel] [RFC v1 0/8] Prototype for kexec signature verification within Xen
- Re: [Xen-devel] [RFC v1 1/8] kexec: add kexec_file_load to libxenctrl
- Re: [PATCH 2/2] arm64: Expose PARange via ID_AA64MMFR0_EL1 and VARange via ID_AA64MMFR2_EL1
- Re: [PATCH 1/2] arm64: Expose address bits (physical/virtual) via cpuinfo
- Re: [PATCH v2] Remove the memory encryption mask to obtain the true physical address
- Re: [PATCH v2] Remove the memory encryption mask to obtain the true physical address
- Re: [PATCHv7] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- Re: [PATCHv7] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- [PATCH v2] makedumpfile: honor the CFLAGS from environment variables
- Re: [PATCH] makedumpfile: honor the CFLAGS from environment variables
- RE: [PATCH] makedumpfile: honor the CFLAGS from environment variables
- RE: [PATCH] makedumpfile: honor the CFLAGS from environment variables
- [PATCH 2/2] arm64: Expose PARange via ID_AA64MMFR0_EL1 and VARange via ID_AA64MMFR2_EL1
- [PATCH 1/2] arm64: Expose address bits (physical/virtual) via cpuinfo
- [PATCH 0/2] arm64: Expose physical and virtual address capabilities to user-space
- Re: [PATCH v2] Remove the memory encryption mask to obtain the true physical address
- RE: [PATCH v2] Remove the memory encryption mask to obtain the true physical address
- Re: [PATCH v2] Remove the memory encryption mask to obtain the true physical address
- Re: [PATCH v2] x86: Handle 64bit framebuffer memory address properly
- Re: [PATCH] makedumpfile: honor the CFLAGS from environment variables
- Re: [PATCH] purgatory: Use standalond CFLAGS
- Re: [PATCH v2] x86: Handle 64bit framebuffer memory address properly
- [PATCH] purgatory: Use standalond CFLAGS
- [PATCH] makedumpfile: honor the CFLAGS from environment variables
- Re: multiboot patches from august 2018
- Re: [PATCHv7] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- Re: [PATCHv7] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- [PATCH v2] Remove the memory encryption mask to obtain the true physical address
- Re: [PATCH 2/2] Remove the memory encryption mask to obtain the true physical address
- Re: [PATCH 2/2] Remove the memory encryption mask to obtain the true physical address
- Re: [PATCH 2/2] Remove the memory encryption mask to obtain the true physical address
- Re: [PATCHv7] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- Re: [PATCHv7] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- Re: [PATCH RESEND 0/3] Add restrictions for kexec/kdump jumping between 5-level and 4-level kernel
- Re: [PATCH 1/2 v8] resource: add the new I/O resource descriptor 'IORES_DESC_RESERVED'
- Re: [PATCHv7] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- Re: [PATCH 2/2] Remove the memory encryption mask to obtain the true physical address
- Re: [PATCH 2/2] Remove the memory encryption mask to obtain the true physical address
- Re: [PATCH 2/2] Remove the memory encryption mask to obtain the true physical address
- Re: [PATCH v3 1/3] x86, kexec_file_load: Don't setup EFI info if EFI runtime is not enabled
- [PATCH RESEND 3/3] x86/kdump/64: Change the upper limit of crashkernel reservation
- [PATCH RESEND 2/3] x86/kexec/64: Error out if try to jump to old 4-level kernel from 5-level kernel
- [PATCH RESEND 1/3] x86/boot: Add bit fields into xloadflags for 5-level kernel checking
- [PATCH RESEND 0/3] Add restrictions for kexec/kdump jumping between 5-level and 4-level kernel
- RE: [PATCH 2/2] Remove the memory encryption mask to obtain the true physical address
- Re: [PATCH 1/2] Makedumpfile: add a new variable 'sme_mask' to number_table
- RE: [PATCH 2/2] Remove the memory encryption mask to obtain the true physical address
- RE: [PATCH 1/2] Makedumpfile: add a new variable 'sme_mask' to number_table
- Re: [PATCH v5 0/2] let kexec_file_load use platform keyring to verify the kernel image
- Re: [PATCH v5 2/2] kexec, KEYS: Make use of platform keyring for signature verify
- Re: [PATCH v5 2/2] kexec, KEYS: Make use of platform keyring for signature verify
- Re: [PATCH v5 1/2] integrity, KEYS: add a reference to platform keyring
- Re: [PATCH v2 2/2] x86, kexec_file_load: make it work with efi=noruntime or efi=old_map
- [PATCH 2/2] Remove the memory encryption mask to obtain the true physical address
- [PATCH 1/2] Makedumpfile: add a new variable 'sme_mask' to number_table
- [PATCH 0/2] makedumpfile needs to remove the memory encryption
- Re: [PATCH v2 2/2] x86, kexec_file_load: make it work with efi=noruntime or efi=old_map
- Re: [PATCH v2] x86: Handle 64bit framebuffer memory address properly
- multiboot patches from august 2018
- Re: [PATCH v5 0/2] let kexec_file_load use platform keyring to verify the kernel image
- [PATCH v5 2/2] kexec, KEYS: Make use of platform keyring for signature verify
- [PATCH v5 1/2] integrity, KEYS: add a reference to platform keyring
- [PATCH v5 0/2] let kexec_file_load use platform keyring to verify the kernel image
- Re: [PATCH v2 2/2] x86, kexec_file_load: make it work with efi=noruntime or efi=old_map
- Re: [PATCH v4 0/2] let kexec_file_load use platform keyring to verify the kernel image
- Re: [PATCH v2 2/2] x86, kexec_file_load: make it work with efi=noruntime or efi=old_map
- Re: [PATCH v2 2/2] x86, kexec_file_load: make it work with efi=noruntime or efi=old_map
- Re: [PATCHv7] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- [PATCHv7] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- Re: [PATCHv7] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- Re: [PATCH v2 2/2] x86, kexec_file_load: make it work with efi=noruntime or efi=old_map
- Re: [PATCHv7] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- Re: [PATCH v4 1/2] integrity, KEYS: add a reference to platform keyring
- Re: [PATCH v4 1/2] integrity, KEYS: add a reference to platform keyring
- Re: [PATCH v4 0/2] let kexec_file_load use platform keyring to verify the kernel image
- Re: [PATCH v4 0/2] let kexec_file_load use platform keyring to verify the kernel image
- Re: [PATCH v4 0/2] let kexec_file_load use platform keyring to verify the kernel image
- Re: [PATCH v4 0/2] let kexec_file_load use platform keyring to verify the kernel image
- Re: [PATCH v4 0/2] let kexec_file_load use platform keyring to verify the kernel image
- Re: [PATCH v4 0/2] let kexec_file_load use platform keyring to verify the kernel image
- Re: [PATCH v3 2/3] acpi: store acpi_rsdp address for later kexec usage
- Re: [PATCH v3 2/3] acpi: store acpi_rsdp address for later kexec usage
- [PATCH v3 3/3] x86, kexec_file_load: make it work with efi=noruntime or efi=old_map
- [PATCH v3 2/3] acpi: store acpi_rsdp address for later kexec usage
- [PATCH v3 1/3] x86, kexec_file_load: Don't setup EFI info if EFI runtime is not enabled
- [PATCH v3 0/3] make kexec work with efi=noruntime or efi=old_map
- Re: [PATCH v2 2/2] x86, kexec_file_load: make it work with efi=noruntime or efi=old_map
- Re: [PATCH v2 2/2] x86, kexec_file_load: make it work with efi=noruntime or efi=old_map
- [PATCH v4 2/2] kexec, KEYS: Make use of platform keyring for signature verify
- [PATCH v4 1/2] integrity, KEYS: add a reference to platform keyring
- [PATCH v4 0/2] let kexec_file_load use platform keyring to verify the kernel image
- Re: [PATCH v2 2/2] x86, kexec_file_load: make it work with efi=noruntime or efi=old_map
- Re: [PATCHv7] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- Re: [PATCH v3 0/2] let kexec_file_load use platform keyring to verify the kernel image
- Re: [PATCH v3 0/2] let kexec_file_load use platform keyring to verify the kernel image
- Re: [PATCH v3 0/2] let kexec_file_load use platform keyring to verify the kernel image
- Re: [PATCH v3 0/2] let kexec_file_load use platform keyring to verify the kernel image
- Re: [PATCH v3 0/2] let kexec_file_load use platform keyring to verify the kernel image
- Re: [PATCH v3 2/2] kexec, KEYS: Make use of platform keyring for signature verify
- Re: [PATCH v3 1/2] integrity, KEYS: add a reference to platform keyring
- Re: [RFC v1] kexec: Prototype for signature verification within Xen
- Re: [PATCH v2 2/2] x86, kexec_file_load: make it work with efi=noruntime or efi=old_map
- Re: [PATCH v2 2/2] x86, kexec_file_load: make it work with efi=noruntime or efi=old_map
- Re: [PATCH v2 2/2] x86, kexec_file_load: make it work with efi=noruntime or efi=old_map
- Re: [PATCH v2 2/2] x86, kexec_file_load: make it work with efi=noruntime or efi=old_map
- [RFC v1 6/8] kexec: support files for PECOFF Authenticode signature verification
- Re: [PATCH v2 2/2] x86, kexec_file_load: make it work with efi=noruntime or efi=old_map
- Re: [PATCH v2 2/2] x86, kexec_file_load: make it work with efi=noruntime or efi=old_map
- Re: [PATCH v2 2/2] x86, kexec_file_load: make it work with efi=noruntime or efi=old_map
- [PATCH v3 2/2] kexec, KEYS: Make use of platform keyring for signature verify
- [PATCH v3 1/2] integrity, KEYS: add a reference to platform keyring
- [PATCH v3 0/2] let kexec_file_load use platform keyring to verify the kernel image
- Re: [PATCH v2 2/2] x86, kexec_file_load: make it work with efi=noruntime or efi=old_map
- Re: [PATCH v2 2/2] x86, kexec_file_load: make it work with efi=noruntime or efi=old_map
- Re: [PATCH v2 2/2] x86, kexec_file_load: make it work with efi=noruntime or efi=old_map
- Re: [PATCH v2 2/2] x86, kexec_file_load: make it work with efi=noruntime or efi=old_map
- Re: [PATCH v2 2/2] x86, kexec_file_load: make it work with efi=noruntime or efi=old_map
- Re: [PATCH v2 2/2] x86, kexec_file_load: make it work with efi=noruntime or efi=old_map
- Re: [RFC PATCH v2 2/2] kexec, KEYS: Make use of platform keyring for signature verify
- kexec: relocate_kernel fails
- From: Tschigirinski Jewgeni
- Re: [RFC PATCH v2 1/2] integrity, KEYS: add a reference to platform keyring
- Re: [RFC PATCH v2 1/2] integrity, KEYS: add a reference to platform keyring
- Re: [RFC PATCH v2 2/2] kexec, KEYS: Make use of platform keyring for signature verify
- Re: [RFC v1] kexec: Prototype for signature verification within Xen
- Re: [RFC PATCH v2 1/2] integrity, KEYS: add a reference to platform keyring
- Re: [RFC PATCH 2/2] kexec, KEYS: Make use of platform keyring for signature verify
- Re: [PATCH] arm64: add kexec_file_load support
- Re: [RFC v1] kexec: Prototype for signature verification within Xen
- Re: [PATCH 1/2 v6] kdump: add the vmcoreinfo documentation
- Re: [PATCH 1/2 v6] kdump: add the vmcoreinfo documentation
- [PATCH v2 2/2] x86, kexec_file_load: make it work with efi=noruntime or efi=old_map
- [PATCH v2 1/2] x86, kexec_file_load: Don't setup EFI info if EFI runtime is not enabled
- [PATCH 0/2] make kexec work with efi=noruntime or efi=old_map
- [RFC PATCH v2 2/2] kexec, KEYS: Make use of platform keyring for signature verify
- [RFC PATCH v2 1/2] integrity, KEYS: add a reference to platform keyring
- [RFC PATCH v2 0/2] let kexec_file_load use platform keyring to verify the kernel image
- Re: [PATCH 1/2 v6] kdump: add the vmcoreinfo documentation
- [PATCHv7] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- Re: [PATCHv6] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- Re: [PATCH V2] x86/kexec: fix a kexec_file_load failure
- Re: [RFC PATCH 2/2] kexec, KEYS: Make use of platform keyring for signature verify
- Re: [RFC PATCH 2/2] kexec, KEYS: Make use of platform keyring for signature verify
- Re: [PATCH 1/2 v6] kdump: add the vmcoreinfo documentation
- Re: [PATCH 1/2 v6] kdump: add the vmcoreinfo documentation
- Re: [PATCH 1/2 v6] kdump: add the vmcoreinfo documentation
- Re: [PATCH 1/2 v6] kdump: add the vmcoreinfo documentation
- Re: [PATCH 1/2 v6] kdump: add the vmcoreinfo documentation
- Re: [PATCH 1/2 v6] kdump: add the vmcoreinfo documentation
- [RFC v1] kexec: Prototype for signature verification within Xen
- [RFC v1 1/8] kexec: add kexec_file_load to libxenctrl
- [RFC v1 7/8] kexec: Xen compatible makefile for OpenSSL
- [RFC v1 5/8] kexec: changes to facilitate compiling OpenSSL within Xen
- [RFC v1 8/8] kexec: include OpenSSL build in xen.spec
- [RFC v1 2/8] kexec: implement kexec_file_load() for PECOFF+Authenticode files
- [RFC v1 4/8] kexec: xen/common/Makefile: include building of OpenSSL
- [RFC v1 3/8] kexec: new file openssl-1.1.0i.patch
- [RFC v1 0/8] Prototype for kexec signature verification within Xen
- Re: [PATCH 1/2 v6] kdump: add the vmcoreinfo documentation
- Re: [PATCH 1/2 v6] kdump: add the vmcoreinfo documentation
- Re: [PATCH 1/2 v6] kdump: add the vmcoreinfo documentation
- Re: [PATCH] arm64: add kexec_file_load support
- Re: [PATCH 1/2 v6] kdump: add the vmcoreinfo documentation
- RE: [PATCH 1/2 v6] kdump: add the vmcoreinfo documentation
- Re: [RFC PATCH 2/2] kexec, KEYS: Make use of platform keyring for signature verify
- Re: [PATCH 1/2 v6] kdump: add the vmcoreinfo documentation
- Re: [PATCH 1/2 v6] kdump: add the vmcoreinfo documentation
- Re: [PATCH 1/2 v6] kdump: add the vmcoreinfo documentation
- Re: [PATCHv6] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- Re: [RFC PATCH 2/2] kexec, KEYS: Make use of platform keyring for signature verify
- [PATCHv6] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- Re: [PATCH 1/2 v6] kdump: add the vmcoreinfo documentation
- Re: [PATCH v2 0/3] arm64: handle "reserved" entries in /proc/iomem
- Re: [RFC PATCH 2/2] kexec, KEYS: Make use of platform keyring for signature verify
- Re: [RFC PATCH 2/2] kexec, KEYS: Make use of platform keyring for signature verify
- Re: [PATCH] arm64: kexec_file: return successfully even if kaslr-seed doesn't exist
- Re: [PATCH 1/2 v6] kdump: add the vmcoreinfo documentation
- Re: [RFC PATCH 2/2] kexec, KEYS: Make use of platform keyring for signature verify
- Re: [PATCH 1/2 v6] kdump: add the vmcoreinfo documentation
- [PATCH v2 3/3] arm64: kdump: deal with a lot of resource entries in /proc/iomem
- [PATCH v2 2/3] arm64: kexec: allocate memory space avoiding reserved regions
- [PATCH v2 1/3] kexec: add variant helper functions for handling memory regions
- [PATCH v2 0/3] arm64: handle "reserved" entries in /proc/iomem
- [PATCH] arm64: add kexec_file_load support
- [PATCH] arm64: kexec_file: return successfully even if kaslr-seed doesn't exist
- Re: [PATCHv5] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- Re: [PATCHv5] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- Re: [PATCH v2] arm64: invalidate TLB just before turning MMU on
- [PATCH 2/2 v6] kdump, vmcoreinfo: Export the value of sme mask to vmcoreinfo
- [PATCH 1/2 v6] kdump: add the vmcoreinfo documentation
- [PATCH 0/2 v6] kdump, vmcoreinfo: Export the value of sme mask to vmcoreinfo
- Re: [PATCHv5] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- Re: [RFC PATCH 1/2] integrity, KEYS: add a reference to platform keyring
- [RFC PATCH 2/2] kexec, KEYS: Make use of platform keyring for signature verify
- [RFC PATCH 1/2] integrity, KEYS: add a reference to platform keyring
- [RFC PATCH 0/2] let kexec_file_load use platform keyring to verify the kernel image
- Re: [PATCHv5] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- Re: [RFC PATCH 1/1] KEYS, integrity: Link .platform keyring to .secondary_trusted_keys
- Re: [PATCHv5] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- Re: [PATCH v2 0/2] kexec-tools/arm64: Add support to read PHYS_OFFSET from kcore
- Re: [PATCH v3 0/4] kexec/arm64: Fix issue with 'kexec load' and 'kdump' when --dtb option is used
- Re: [PATCH 1/2] x86, kexec_file_load: Don't setup EFI info if EFI runtime is not enabled
- Re: [PATCH 2/2] x86, kexec_file_load: make it work with efi=noruntime or efi=oldmap
- Re: [RFC PATCH 1/1] KEYS, integrity: Link .platform keyring to .secondary_trusted_keys
- Re: [RFC PATCH 1/1] KEYS, integrity: Link .platform keyring to .secondary_trusted_keys
- Re: [PATCHv5] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- Re: [PATCH V2] x86/kexec: fix a kexec_file_load failure
- Re: [PATCHv5] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- Re: [PATCH V2] x86/kexec: fix a kexec_file_load failure
- Re: [PATCHv3 1/2] mm/memblock: extend the limit inferior of bottom-up after parsing hotplug attr
- Re: [PATCH V2] x86/kexec: fix a kexec_file_load failure
- Re: [PATCHv5] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- Re: [PATCH V2] x86/kexec: fix a kexec_file_load failure
- Re: [PATCH V2] x86/kexec: fix a kexec_file_load failure
- Re: [PATCH v2 0/2] kexec-tools/arm64: Add support to read PHYS_OFFSET from kcore
- Re: [PATCH 2/2 v5] kdump, vmcoreinfo: Export the value of sme mask to vmcoreinfo
- Re: [PATCH 1/2 v5] kdump: add the vmcoreinfo documentation
- Re: [PATCHv3 1/2] mm/memblock: extend the limit inferior of bottom-up after parsing hotplug attr
- [PATCHv5] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- Re: [PATCHv4] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- RE: [PATCH 1/2 v5] kdump: add the vmcoreinfo documentation
- Re: [PATCH 1/2 v8] resource: add the new I/O resource descriptor 'IORES_DESC_RESERVED'
- Re: [PATCH 2/2 v5] kdump, vmcoreinfo: Export the value of sme mask to vmcoreinfo
- [PATCH 2/2 v5] kdump, vmcoreinfo: Export the value of sme mask to vmcoreinfo
- [PATCH 1/2 v5] kdump: add the vmcoreinfo documentation
- [PATCH 0/2 v5] kdump, vmcoreinfo: Export the value of sme mask to vmcoreinfo
- Re: [PATCHv3 1/2] mm/memblock: extend the limit inferior of bottom-up after parsing hotplug attr
- Re: [PATCHv3 1/2] mm/memblock: extend the limit inferior of bottom-up after parsing hotplug attr
- Re: [PATCHv3 1/2] mm/memblock: extend the limit inferior of bottom-up after parsing hotplug attr
- RE: [PATCH 1/2 v4] kdump: add the vmcoreinfo documentation
- Re: [PATCHv3 1/2] mm/memblock: extend the limit inferior of bottom-up after parsing hotplug attr
- Re: [PATCHv4] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- [PATCHv4] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- Re: [PATCHv3 1/2] mm/memblock: extend the limit inferior of bottom-up after parsing hotplug attr
- Re: [PATCH 1/2 v4] kdump: add the vmcoreinfo documentation
- Re: [PATCH v3 0/4] kexec/arm64: Fix issue with 'kexec load' and 'kdump' when --dtb option is used
- RE: [PATCH 1/2 v4] kdump: add the vmcoreinfo documentation
- Re: [PATCHv3 1/2] mm/memblock: extend the limit inferior of bottom-up after parsing hotplug attr
- Re: [PATCH v3 0/4] kexec/arm64: Fix issue with 'kexec load' and 'kdump' when --dtb option is used
- Re: [PATCHv3 1/2] mm/memblock: extend the limit inferior of bottom-up after parsing hotplug attr
- Re: [PATCHv3 2/2] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- Re: [PATCHv3 1/2] mm/memblock: extend the limit inferior of bottom-up after parsing hotplug attr
- Re: [PATCHv3 0/2] mm/memblock: reuse memblock bottom-up allocation style
- [PATCHv3 2/2] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- [PATCHv3 1/2] mm/memblock: extend the limit inferior of bottom-up after parsing hotplug attr
- [PATCHv3 0/2] mm/memblock: reuse memblock bottom-up allocation style
- [PATCH V2] x86/kexec: fix a kexec_file_load failure
- Re: [PATCH] x86/kexec: fix a kexec_file_load failure
- [PATCH] x86/kexec: fix a kexec_file_load failure
- Re: [PATCHv2] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- Re: [PATCHv2] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- Re: [PATCH 1/2 v3] kdump: add the vmcoreinfo documentation
- Re: [PATCH v3 0/4] kexec/arm64: Fix issue with 'kexec load' and 'kdump' when --dtb option is used
- Re: [PATCH 1/2 v3] kdump: add the vmcoreinfo documentation
- Re: [PATCH 0/2 v4] kdump, vmcoreinfo: Export the value of sme mask to vmcoreinfo
- Re: [PATCH 1/2 v3] kdump: add the vmcoreinfo documentation
- Re: [PATCH] Disable GCC stack protector for purgatory
- Re: [PATCHv2] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- Re: [PATCHv2] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- [PATCH] Disable GCC stack protector for purgatory
- Re: [PATCHv2] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- Re: [PATCHv2] x86/kdump: bugfix, make the behavior of crashkernel=X consistent with kaslr
- [PATCH v2 1/2] util_lib: Add functionality to read elf notes
- [PATCH v2 2/2] arm64: Add support to read PHYS_OFFSET from 'kcore' - pt_note or pt_load (if available)
- [PATCH v2 0/2] kexec-tools/arm64: Add support to read PHYS_OFFSET from kcore
- [PATCH 2/2 v4] kdump, vmcoreinfo: Export the value of sme mask to vmcoreinfo
- [PATCH 0/2 v4] kdump, vmcoreinfo: Export the value of sme mask to vmcoreinfo
- [PATCH 1/2 v4] kdump: add the vmcoreinfo documentation
- Re: [PATCH 1/2 v3] kdump: add the vmcoreinfo documentation
- Re: [PATCH 2/2 v3] kdump, vmcoreinfo: Export the value of sme mask to vmcoreinfo
- Re: [PATCH 1/2 v3] kdump: add the vmcoreinfo documentation
- Re: [PATCH 2/2 v3] kdump, vmcoreinfo: Export the value of sme mask to vmcoreinfo
- Re: [PATCH 1/2 v3] kdump: add the vmcoreinfo documentation
- Re: [PATCH 1/2 v3] kdump: add the vmcoreinfo documentation
- Re: [PATCH 0/2 v3] kdump, vmcoreinfo: Export the value of sme mask to vmcoreinfo
- Re: [PATCH 1/2 v3] kdump: add the vmcoreinfo documentation
- [PATCH v3 4/4] kexec/dt-ops.c: Fix '/chosen' v/s 'chosen' node being passed to fdt helper functions
- [PATCH v3 3/4] kexec/dt-ops.c: Fix adding '/chosen' node for cases where it is not available in dtb passed via --dtb option
- [PATCH v3 2/4] kexec/kexec-arm64.c: Add error handling check against return value of 'set_bootargs()'
- [PATCH v3 1/4] kexec/dt-ops.c: Fix check against 'fdt_add_subnode' return value
- [PATCH v3 0/4] kexec/arm64: Fix issue with 'kexec load' and 'kdump' when --dtb option is used
- [PATCH 2/2 v3] kdump, vmcoreinfo: Export the value of sme mask to vmcoreinfo
[Index of Archives]
[LM Sensors]
[Linux Sound]
[ALSA Users]
[ALSA Devel]
[Linux Audio Users]
[Linux Media]
[Kernel]
[Gimp]
[Yosemite News]
[Linux Media]