Linux EFI/UEFI Development
[Prev Page][Next Page]
- [PATCH v5 2/5] mm: Ratelimited mirrored memory related warning messages
- From: Wupeng Ma <mawupeng1@xxxxxxxxxx>
- [PATCH v5 0/5] introduce mirrored memory support for arm64
- From: Wupeng Ma <mawupeng1@xxxxxxxxxx>
- [PATCH v5 4/5] arm64: mm: Only remove nomap flag for initrd
- From: Wupeng Ma <mawupeng1@xxxxxxxxxx>
- [PATCH v5 3/5] mm: Limit warning message in vmemmap_verify() to once
- From: Wupeng Ma <mawupeng1@xxxxxxxxxx>
- [PATCH v5 1/5] efi: arm64: Introduce ability to find mirrored memory ranges
- From: Wupeng Ma <mawupeng1@xxxxxxxxxx>
- Re: [PATCH v12 19/46] x86/kernel: Make the .bss..decrypted section shared in RMP table
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 5/6] mm: Only remove nomap flag for initrd
- From: mawupeng <mawupeng1@xxxxxxxxxx>
- Re: [PATCH v4 6/6] memblock: Disable mirror feature if kernelcore is not specified
- From: Kefeng Wang <wangkefeng.wang@xxxxxxxxxx>
- Re: [PATCH v4 6/6] memblock: Disable mirror feature if kernelcore is not specified
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v4 6/6] memblock: Disable mirror feature if kernelcore is not specified
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v4 4/6] mm: Limit warning message in vmemmap_verify() to once
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v4 6/6] memblock: Disable mirror feature if kernelcore is not specified
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v4 5/6] mm: Only remove nomap flag for initrd
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v4 2/6] arm64/mirror: arm64 enabling - find mirrored memory ranges
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v4 6/6] memblock: Disable mirror feature if kernelcore is not specified
- From: mawupeng <mawupeng1@xxxxxxxxxx>
- [PATCH v4 3/6] mm: Ratelimited mirrored memory related warning messages
- From: Wupeng Ma <mawupeng1@xxxxxxxxxx>
- [PATCH v4 6/6] memblock: Disable mirror feature if kernelcore is not specified
- From: Wupeng Ma <mawupeng1@xxxxxxxxxx>
- [PATCH v4 5/6] mm: Only remove nomap flag for initrd
- From: Wupeng Ma <mawupeng1@xxxxxxxxxx>
- [PATCH v4 1/6] efi: Make efi_find_mirror() public
- From: Wupeng Ma <mawupeng1@xxxxxxxxxx>
- [PATCH v4 4/6] mm: Limit warning message in vmemmap_verify() to once
- From: Wupeng Ma <mawupeng1@xxxxxxxxxx>
- [PATCH v4 2/6] arm64/mirror: arm64 enabling - find mirrored memory ranges
- From: Wupeng Ma <mawupeng1@xxxxxxxxxx>
- [PATCH v4 0/6] introduce mirrored memory support for arm64
- From: Wupeng Ma <mawupeng1@xxxxxxxxxx>
- [PATCH] efi/capsule-loader: Add write mutex to prevent uaf
- From: Hyunwoo Kim <imv4bel@xxxxxxxxx>
- Re: [PATCH v3 0/6] introduce mirrored memory support for arm64
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [efi:urgent] BUILD SUCCESS 05c800c26b21e089e22e1738ea28568a2be5bd61
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: Linux DRTM on UEFI platforms
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v3 6/6] efi: Disable mirror feature if kernelcore is not specified
- From: Kefeng Wang <wangkefeng.wang@xxxxxxxxxx>
- Re: [PATCH v3 0/6] introduce mirrored memory support for arm64
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v3 0/6] introduce mirrored memory support for arm64
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v3 6/6] efi: Disable mirror feature if kernelcore is not specified
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v3 2/6] arm64/mirror: arm64 enabling - find mirrored memory ranges
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v3 5/6] mm: Add mirror flag back on initrd memory
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v3 2/6] arm64/mirror: arm64 enabling - find mirrored memory ranges
- From: Kefeng Wang <wangkefeng.wang@xxxxxxxxxx>
- Re: [PATCH v3 4/6] mm: Demote warning message in vmemmap_verify() to debug level
- From: Kefeng Wang <wangkefeng.wang@xxxxxxxxxx>
- Re: [PATCH v3 2/6] arm64/mirror: arm64 enabling - find mirrored memory ranges
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v3 2/6] arm64/mirror: arm64 enabling - find mirrored memory ranges
- From: Kefeng Wang <wangkefeng.wang@xxxxxxxxxx>
- Re: [PATCH v3 3/6] mm: Ratelimited mirrored memory related warning messages
- From: Kefeng Wang <wangkefeng.wang@xxxxxxxxxx>
- Re: [PATCH v3 1/6] efi: Make efi_find_mirror() public
- From: Kefeng Wang <wangkefeng.wang@xxxxxxxxxx>
- Re: [PATCH] efi: sysfb_efi: remove unnecessary <asm/efi.h> include
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] efi: sysfb_efi: remove unnecessary <asm/efi.h> include
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH] efi/x86: libstub: Fix typo in __efi64_argmap* name
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] efi/x86: libstub: Fix typo in __efi64_argmap* name
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- Re: [PATCH] efi: random: wait for CRNG to become ready before refreshing the seed
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi: random: wait for CRNG to become ready before refreshing the seed
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v3 5/6] mm: Add mirror flag back on initrd memory
- From: mawupeng <mawupeng1@xxxxxxxxxx>
- Re: [PATCH v3 4/6] mm: Demote warning message in vmemmap_verify() to debug level
- From: mawupeng <mawupeng1@xxxxxxxxxx>
- [PATCH] efi: random: wait for CRNG to become ready before refreshing the seed
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v3 5/6] mm: Add mirror flag back on initrd memory
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v3 5/6] mm: Add mirror flag back on initrd memory
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v3 5/6] mm: Add mirror flag back on initrd memory
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v3 3/6] mm: Ratelimited mirrored memory related warning messages
- From: Anshuman Khandual <anshuman.khandual@xxxxxxx>
- Re: [PATCH v3 4/6] mm: Demote warning message in vmemmap_verify() to debug level
- From: Anshuman Khandual <anshuman.khandual@xxxxxxx>
- Re: [PATCH v3 3/6] mm: Ratelimited mirrored memory related warning messages
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v3 5/6] mm: Add mirror flag back on initrd memory
- From: mawupeng <mawupeng1@xxxxxxxxxx>
- Re: [PATCH v3 4/6] mm: Demote warning message in vmemmap_verify() to debug level
- From: mawupeng <mawupeng1@xxxxxxxxxx>
- Re: [PATCHv5 06/12] x86/boot/compressed: Handle unaccepted memory
- From: "Gupta, Pankaj" <pankaj.gupta@xxxxxxx>
- [PATCH] firmware/efi: Add write mutex to prevent uaf - revision
- From: Hyunwoo Kim <imv4bel@xxxxxxxxx>
- Re: [PATCHv5 06/12] x86/boot/compressed: Handle unaccepted memory
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- [PATCH] firmware/efi: Add write mutex to prevent uaf
- From: Hyunwoo Kim <imv4bel@xxxxxxxxx>
- Re: [PATCH v3 5/6] mm: Add mirror flag back on initrd memory
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v3 4/6] mm: Demote warning message in vmemmap_verify() to debug level
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v3 3/6] mm: Ratelimited mirrored memory related warning messages
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v3 5/6] mm: Add mirror flag back on initrd memory
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v3 3/6] mm: Ratelimited mirrored memory related warning messages
- From: Wupeng Ma <mawupeng1@xxxxxxxxxx>
- [PATCH v3 4/6] mm: Demote warning message in vmemmap_verify() to debug level
- From: Wupeng Ma <mawupeng1@xxxxxxxxxx>
- [PATCH v3 5/6] mm: Add mirror flag back on initrd memory
- From: Wupeng Ma <mawupeng1@xxxxxxxxxx>
- [PATCH v3 6/6] efi: Disable mirror feature if kernelcore is not specified
- From: Wupeng Ma <mawupeng1@xxxxxxxxxx>
- [PATCH v3 2/6] arm64/mirror: arm64 enabling - find mirrored memory ranges
- From: Wupeng Ma <mawupeng1@xxxxxxxxxx>
- [PATCH v3 1/6] efi: Make efi_find_mirror() public
- From: Wupeng Ma <mawupeng1@xxxxxxxxxx>
- [PATCH v3 0/6] introduce mirrored memory support for arm64
- From: Wupeng Ma <mawupeng1@xxxxxxxxxx>
- Re: [PATCH v3 4/5] mtd_blkdevs: add option to enable scanning for partitions
- From: Daniel Golle <daniel@xxxxxxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 04/40] x86/sev: Add the host SEV-SNP initialization support
- From: "Dr. David Alan Gilbert" <dgilbert@xxxxxxxxxx>
- Re: [GIT PULL] EFI updates for v5.19 #2
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH] efi: clean up Kconfig dependencies on CONFIG_EFI
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH v3 4/5] mtd_blkdevs: add option to enable scanning for partitions
- From: Miquel Raynal <miquel.raynal@xxxxxxxxxxx>
- Re: [PATCH V15 11/24] LoongArch: Add boot and setup routines
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH V15 11/24] LoongArch: Add boot and setup routines
- From: WANG Xuerui <kernel@xxxxxxxxxx>
- Re: Steps forward for the LoongArch UEFI bringup patch? (was: Re: [PATCH V14 11/24] LoongArch: Add boot and setup routines)
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH V15 11/24] LoongArch: Add boot and setup routines
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: Steps forward for the LoongArch UEFI bringup patch? (was: Re: [PATCH V14 11/24] LoongArch: Add boot and setup routines)
- From: WANG Xuerui <kernel@xxxxxxxxxx>
- Re: Steps forward for the LoongArch UEFI bringup patch? (was: Re: [PATCH V14 11/24] LoongArch: Add boot and setup routines)
- From: Xi Ruoyao <xry111@xxxxxxxxxxx>
- Re: [PATCH V15 11/24] LoongArch: Add boot and setup routines
- From: WANG Xuerui <kernel@xxxxxxxxxx>
- [GIT PULL] EFI updates for v5.19 #2
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH V15 11/24] LoongArch: Add boot and setup routines
- From: Huacai Chen <chenhuacai@xxxxxxxxxxx>
- Re: Steps forward for the LoongArch UEFI bringup patch? (was: Re: [PATCH V14 11/24] LoongArch: Add boot and setup routines)
- From: Huacai Chen <chenhuacai@xxxxxxxxx>
- Re: [PATCH 0/2] UEFI panic notification mechanism
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- Re: Steps forward for the LoongArch UEFI bringup patch? (was: Re: [PATCH V14 11/24] LoongArch: Add boot and setup routines)
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: Steps forward for the LoongArch UEFI bringup patch? (was: Re: [PATCH V14 11/24] LoongArch: Add boot and setup routines)
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCHv5 06/12] x86/boot/compressed: Handle unaccepted memory
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Steps forward for the LoongArch UEFI bringup patch? (was: Re: [PATCH V14 11/24] LoongArch: Add boot and setup routines)
- From: WANG Xuerui <kernel@xxxxxxxxxx>
- Re: [PATCHv5 06/12] x86/boot/compressed: Handle unaccepted memory
- From: "Gupta, Pankaj" <pankaj.gupta@xxxxxxx>
- [PATCH V14 11/24] LoongArch: Add boot and setup routines
- From: Huacai Chen <chenhuacai@xxxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 04/40] x86/sev: Add the host SEV-SNP initialization support
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxx>
- [PATCH V13 11/24] LoongArch: Add boot and setup routines
- From: Huacai Chen <chenhuacai@xxxxxxxxxxx>
- Re: [PATCHv6 10/15] x86/mm: Report unaccepted memory in /proc/meminfo
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH] LoongArch: Fix unsigned expression compared with zero
- From: Jiapeng Chong <jiapeng.chong@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 00/13] Introduce sv48 support without relocatable kernel
- From: Palmer Dabbelt <palmer@xxxxxxxxxxx>
- [efi:next] BUILD SUCCESS 75ed63d919400b803691a0c757ee23c6f767a625
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCHv5 06/12] x86/boot/compressed: Handle unaccepted memory
- From: "Gupta, Pankaj" <pankaj.gupta@xxxxxxx>
- Re: [PATCHv5 06/12] x86/boot/compressed: Handle unaccepted memory
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCHv5 06/12] x86/boot/compressed: Handle unaccepted memory
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCHv5 06/12] x86/boot/compressed: Handle unaccepted memory
- From: "Gupta, Pankaj" <pankaj.gupta@xxxxxxx>
- Re: [PATCHv6 03/15] efi/x86: Get full memory map in allocate_e820()
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCHv6 15/15] mm/vmstat: Add counter for memory accepting
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCHv6 03/15] efi/x86: Get full memory map in allocate_e820()
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCHv6 03/15] efi/x86: Get full memory map in allocate_e820()
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH V12 11/24] LoongArch: Add boot and setup routines
- From: "Jiaxun Yang" <jiaxun.yang@xxxxxxxxxxx>
- [PATCH V12 11/24] LoongArch: Add boot and setup routines
- From: Huacai Chen <chenhuacai@xxxxxxxxxxx>
- Re: [PATCHv6 15/15] mm/vmstat: Add counter for memory accepting
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCHv6 03/15] efi/x86: Get full memory map in allocate_e820()
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCHv6 02/15] mm: Add support for unaccepted memory
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCHv5 06/12] x86/boot/compressed: Handle unaccepted memory
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- [PATCH] efi: clean up Kconfig dependencies on CONFIG_EFI
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2] efi: EFI_DISABLE_RUNTIME should depend on EFI
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] riscv: read-only pages should not be writable
- From: Heinrich Schuchardt <heinrich.schuchardt@xxxxxxxxxxxxx>
- Re: [PATCH v2] efi: EFI_DISABLE_RUNTIME should depend on EFI
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] efi/x86: libstub: Make DXE calls mixed mode safe
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] riscv: read-only pages should not be writable
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] riscv: read-only pages should not be writable
- From: Heinrich Schuchardt <heinrich.schuchardt@xxxxxxxxxxxxx>
- Re: [PATCH 18/30] acpi: Disable APEI error injection if the kernel is locked down
- From: joeyli <jlee@xxxxxxxx>
- [PATCH] x86: Fix all occurences of "the the"
- From: Bo Liu <liubo03@xxxxxxxxxx>
- [PATCH V3 1/5] riscv: cpu_ops_sbi: Add 64bit hartid support on RV64
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V3 3/5] riscv: smp: Add 64bit hartid support on RV64
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V3 5/5] riscv/efi_stub: Add 64bit boot-hartid support on RV64
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V3 2/5] riscv: spinwait: Fix hartid variable type
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V3 4/5] riscv: cpu: Add 64bit hartid support on RV64
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V3 0/5] Support for 64bit hartid on RV64 platforms
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- Re: [PATCH V2 4/5] riscv: cpu: Support for 64bit hartid
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- Re: [PATCH V2 4/5] riscv: cpu: Support for 64bit hartid
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [PATCH V2 3/5] riscv: smp: Support for 64bit hartid
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [PATCH V2 2/5] riscv: spinwait: Fix hartid variable type
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [PATCH V2 1/5] riscv: cpu_ops_sbi: Support for 64bit hartid
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [PATCH 2/5] riscv: cpu_ops_spinwait: Support for 64bit hartid
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- Re: [PATCH 5/5] riscv/efi_stub: Support for 64bit boot-hartid
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V2 5/5] riscv/efi_stub: Support for 64bit boot-hartid
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V2 4/5] riscv: cpu: Support for 64bit hartid
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V2 3/5] riscv: smp: Support for 64bit hartid
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V2 2/5] riscv: spinwait: Fix hartid variable type
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V2 1/5] riscv: cpu_ops_sbi: Support for 64bit hartid
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V2 0/5] Support for 64bit hartid on RV64 platforms
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- Re: [PATCH 5/5] riscv/efi_stub: Support for 64bit boot-hartid
- From: Jessica Clarke <jrtc27@xxxxxxxxxx>
- Re: [PATCH 5/5] riscv/efi_stub: Support for 64bit boot-hartid
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [PATCH 5/5] riscv/efi_stub: Support for 64bit boot-hartid
- From: Jessica Clarke <jrtc27@xxxxxxxxxx>
- Re: [PATCH 5/5] riscv/efi_stub: Support for 64bit boot-hartid
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [PATCH 5/5] riscv/efi_stub: Support for 64bit boot-hartid
- From: Heinrich Schuchardt <heinrich.schuchardt@xxxxxxxxxxxxx>
- Re: [PATCH 3/5] riscv: smp: Support for 64bit hartid
- From: Heinrich Schuchardt <heinrich.schuchardt@xxxxxxxxxxxxx>
- Re: [PATCH 5/5] riscv/efi_stub: Support for 64bit boot-hartid
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 2/5] riscv: cpu_ops_spinwait: Support for 64bit hartid
- From: Heinrich Schuchardt <heinrich.schuchardt@xxxxxxxxxxxxx>
- Re: [PATCH 1/5] riscv: cpu_ops_sbi: Support for 64bit hartid
- From: Heinrich Schuchardt <heinrich.schuchardt@xxxxxxxxxxxxx>
- [PATCH 5/5] riscv/efi_stub: Support for 64bit boot-hartid
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH 4/5] riscv: cpu: Support for 64bit hartid
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH 3/5] riscv: smp: Support for 64bit hartid
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH 2/5] riscv: cpu_ops_spinwait: Support for 64bit hartid
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH 1/5] riscv: cpu_ops_sbi: Support for 64bit hartid
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH 0/5] Support for 64bit hartid on RV64 platforms
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- Re: Re: [PATCH V11 09/22] LoongArch: Add boot and setup routines
- From: 李超 <lichao@xxxxxxxxxxx>
- Re: [PATCH] LoongArch: take size of pointed value, not pointer
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] LoongArch: take size of pointed value, not pointer
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- Re: [PATCH V11 09/22] LoongArch: Add boot and setup routines
- From: Huacai Chen <chenhuacai@xxxxxxxxx>
- Re: [PATCH V11 09/22] LoongArch: Add boot and setup routines
- From: Xi Ruoyao <xry111@xxxxxxxxxxx>
- [PATCH v2] efi: EFI_DISABLE_RUNTIME should depend on EFI
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH] efi: EFI_DISABLE_RUNTIME should depend on EFI
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH] efi: EFI_DISABLE_RUNTIME should depend on EFI
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- [PATCH] efi: EFI_DISABLE_RUNTIME should depend on EFI
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH] LoongArch: take size of pointed value, not pointer
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- Re: [PATCH] LoongArch: Fix unsigned function returning negative constant
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- Re: [PATCH] LoongArch: take size of pointed value, not pointer
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- Re: [PATCH] LoongArch: Fix unsigned function returning negative constant
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- [PATCH] LoongArch: take size of pointed value, not pointer
- From: Haowen Bai <baihaowen@xxxxxxxxx>
- [PATCH] LoongArch: Fix unsigned function returning negative constant
- From: Haowen Bai <baihaowen@xxxxxxxxx>
- Re: [PATCH 0/2] Add support to relocate kernel image to mirrored region
- From: mawupeng <mawupeng1@xxxxxxxxxx>
- Re: [GIT PULL] EFI updates for v5.19
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH 0/2] Add support to relocate kernel image to mirrored region
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 0/2] Add support to relocate kernel image to mirrored region
- From: mawupeng <mawupeng1@xxxxxxxxxx>
- Re: [PATCH 0/2] Add support to relocate kernel image to mirrored region
- From: mawupeng <mawupeng1@xxxxxxxxxx>
- [efi:next] BUILD SUCCESS 3f68e69520d3d52d66a6ad872a75b7d8f2ea7665
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH V11 09/22] LoongArch: Add boot and setup routines
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH V11 09/22] LoongArch: Add boot and setup routines
- From: Huacai Chen <chenhuacai@xxxxxxxxx>
- Re: [PATCH V11 09/22] LoongArch: Add boot and setup routines
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH V11 09/22] LoongArch: Add boot and setup routines
- From: Huacai Chen <chenhuacai@xxxxxxxxx>
- Re: [PATCH V11 09/22] LoongArch: Add boot and setup routines
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH V11 09/22] LoongArch: Add boot and setup routines
- From: Huacai Chen <chenhuacai@xxxxxxxxx>
- [PATCH 2/2] efi-panic: Introduce the UEFI panic notification module
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- [PATCH 1/2] efi: Add a generic helper to convert strings to unicode
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- [PATCH 0/2] UEFI panic notification mechanism
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- Re: [PATCH V11 09/22] LoongArch: Add boot and setup routines
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH V11 09/22] LoongArch: Add boot and setup routines
- From: Huacai Chen <chenhuacai@xxxxxxxxx>
- Re: [PATCH V11 09/22] LoongArch: Add boot and setup routines
- From: Huacai Chen <chenhuacai@xxxxxxxxx>
- Re: [PATCH V11 09/22] LoongArch: Add boot and setup routines
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH V11 09/22] LoongArch: Add boot and setup routines
- From: Huacai Chen <chenhuacai@xxxxxxxxx>
- Re: [PATCH V11 09/22] LoongArch: Add boot and setup routines
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH V11 09/22] LoongArch: Add boot and setup routines
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [GIT PULL] EFI updates for v5.19
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 0/2] Add support to relocate kernel image to mirrored region
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 0/2] Add support to relocate kernel image to mirrored region
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH V4 1/1] riscv/efi_stub: Add support for RISCV_EFI_BOOT_PROTOCOL
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- Re: Linux DRTM on UEFI platforms
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: Linux DRTM on UEFI platforms
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V4 1/1] riscv/efi_stub: Add support for RISCV_EFI_BOOT_PROTOCOL
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [PATCHv6 02/15] mm: Add support for unaccepted memory
- From: "Gupta, Pankaj" <pankaj.gupta@xxxxxxx>
- Re: [PATCHv6 02/15] mm: Add support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] Add support to relocate kernel image to mirrored region
- From: mawupeng <mawupeng1@xxxxxxxxxx>
- Re: [PATCHv6 02/15] mm: Add support for unaccepted memory
- From: "Gupta, Pankaj" <pankaj.gupta@xxxxxxx>
- Re: [PATCH V5 1/1] riscv/efi_stub: Add support for RISCV_EFI_BOOT_PROTOCOL
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- Re: [PATCH V5 1/1] riscv/efi_stub: Add support for RISCV_EFI_BOOT_PROTOCOL
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH V4 1/1] riscv/efi_stub: Add support for RISCV_EFI_BOOT_PROTOCOL
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH V4 1/1] riscv/efi_stub: Add support for RISCV_EFI_BOOT_PROTOCOL
- From: Heinrich Schuchardt <heinrich.schuchardt@xxxxxxxxxxxxx>
- Re: [PATCH V4 1/1] riscv/efi_stub: Add support for RISCV_EFI_BOOT_PROTOCOL
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V5 1/1] riscv/efi_stub: Add support for RISCV_EFI_BOOT_PROTOCOL
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V5 0/1] RISCV_EFI_BOOT_PROTOCOL support in linux
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- Re: [PATCH V4 1/1] riscv/efi_stub: Add support for RISCV_EFI_BOOT_PROTOCOL
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v8 0/8] x86: Show in sysfs if a memory node is able to do encryption
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v8 0/8] x86: Show in sysfs if a memory node is able to do encryption
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH V11 09/22] LoongArch: Add boot and setup routines
- From: Huacai Chen <chenhuacai@xxxxxxxxx>
- Re: [PATCH V11 09/22] LoongArch: Add boot and setup routines
- From: WANG Xuerui <kernel@xxxxxxxxxx>
- [PATCH V4 0/1] RISCV_EFI_BOOT_PROTOCOL support in linux
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V4 1/1] riscv/efi_stub: Add support for RISCV_EFI_BOOT_PROTOCOL
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V11 09/22] LoongArch: Add boot and setup routines
- From: Huacai Chen <chenhuacai@xxxxxxxxxxx>
- Re: [PATCH v8 0/8] x86: Show in sysfs if a memory node is able to do encryption
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCHv6 02/15] mm: Add support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCHv6 02/15] mm: Add support for unaccepted memory
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- [PATCHv6 11/15] x86: Disable kexec if system has unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv6 06/15] x86/boot/compressed: Handle unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv6 13/15] x86/tdx: Refactor try_accept_one()
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv6 08/15] x86/mm: Provide helpers for unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv6 05/15] efi/x86: Implement support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv6 15/15] mm/vmstat: Add counter for memory accepting
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv6 14/15] x86/tdx: Add unaccepted memory support
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv6 10/15] x86/mm: Report unaccepted memory in /proc/meminfo
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv6 00/15] mm, x86/cc: Implement support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv6 04/15] x86/boot: Add infrastructure required for unaccepted memory support
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv6 02/15] mm: Add support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv6 09/15] x86/mm: Avoid load_unaligned_zeropad() stepping into unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv6 12/15] x86/tdx: Make _tdx_hypercall() and __tdx_module_call() available in boot stub
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv6 07/15] x86/mm: Reserve unaccepted memory bitmap
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv6 01/15] x86/boot: Centralize __pa()/__va() definitions
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv6 03/15] efi/x86: Get full memory map in allocate_e820()
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 0/8] x86: Show in sysfs if a memory node is able to do encryption
- From: Richard Hughes <hughsient@xxxxxxxxx>
- RE: [PATCHv5 06/12] x86/boot/compressed: Handle unaccepted memory
- From: "Xu, Min M" <min.m.xu@xxxxxxxxx>
- Re: [PATCH V10 09/22] LoongArch: Add boot and setup routines
- From: WANG Xuerui <kernel@xxxxxxxxxx>
- Re: [PATCH V10 09/22] LoongArch: Add boot and setup routines
- From: Huacai Chen <chenhuacai@xxxxxxxxx>
- Re: [PATCH V10 09/22] LoongArch: Add boot and setup routines
- From: WANG Xuerui <kernel@xxxxxxxxxx>
- [efi:next] BUILD SUCCESS a6cfe03c34bad8c7f51aba49a73403e348c51d1f
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH V10 09/22] LoongArch: Add boot and setup routines
- From: Huacai Chen <chenhuacai@xxxxxxxxxxx>
- Re: [PATCHv5 06/12] x86/boot/compressed: Handle unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCHv5 06/12] x86/boot/compressed: Handle unaccepted memory
- From: Borislav Petkov <bp@xxxxxxx>
- [syzbot] KASAN: use-after-free Read in anon_vma_interval_tree_remove
- From: syzbot <syzbot+dae32a647a56f4d153da@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCHv5 06/12] x86/boot/compressed: Handle unaccepted memory
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- [PATCH v3 5/5] mtd: ubi: block: add option to enable scanning for partitions
- From: Daniel Golle <daniel@xxxxxxxxxxxxxx>
- [PATCH v3 3/5] partitions/efi: add support for uImage.FIT sub-partitions
- From: Daniel Golle <daniel@xxxxxxxxxxxxxx>
- [PATCH v3 4/5] mtd_blkdevs: add option to enable scanning for partitions
- From: Daniel Golle <daniel@xxxxxxxxxxxxxx>
- [PATCH v3 2/5] block: add partition parser for U-Boot uImage.FIT
- From: Daniel Golle <daniel@xxxxxxxxxxxxxx>
- [PATCH v3 1/5] block: add new flag to add partitions read-only
- From: Daniel Golle <daniel@xxxxxxxxxxxxxx>
- [PATCH v3 0/5] partition parser for U-Boot's uImage.FIT
- From: Daniel Golle <daniel@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/5] block: add partition parser for U-Boot uImage.FIT
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 2/5] block: add partition parser for U-Boot uImage.FIT
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCHv5 10/12] x86/tdx: Unaccepted memory support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCHv5 08/12] x86/mm: Provide helpers for unaccepted memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCHv5 10/12] x86/tdx: Unaccepted memory support
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCHv5 08/12] x86/mm: Provide helpers for unaccepted memory
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCHv5 08/12] x86/mm: Provide helpers for unaccepted memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCHv5 06/12] x86/boot/compressed: Handle unaccepted memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v8 0/8] x86: Show in sysfs if a memory node is able to do encryption
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v8 0/8] x86: Show in sysfs if a memory node is able to do encryption
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v8 0/8] x86: Show in sysfs if a memory node is able to do encryption
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH v2 3/5] partitions/efi: add support for uImage.FIT sub-partitions
- From: Daniel Golle <daniel@xxxxxxxxxxxxxx>
- [PATCH v2 4/5] mtd_blkdevs: add option to enable scanning for partitions
- From: Daniel Golle <daniel@xxxxxxxxxxxxxx>
- [PATCH v2 5/5] mtd: ubi: block: add option to enable scanning for partitions
- From: Daniel Golle <daniel@xxxxxxxxxxxxxx>
- [PATCH v2 2/5] block: add partition parser for U-Boot uImage.FIT
- From: Daniel Golle <daniel@xxxxxxxxxxxxxx>
- [PATCH v2 1/5] block: add new flag to add partitions read-only
- From: Daniel Golle <daniel@xxxxxxxxxxxxxx>
- [PATCH v2 0/5] partition parser for U-Boot's uImage.FIT
- From: Daniel Golle <daniel@xxxxxxxxxxxxxx>
- Re: [PATCH 0/2] Add support to relocate kernel image to mirrored region
- From: mawupeng <mawupeng1@xxxxxxxxxx>
- Re: [PATCHv5 10/12] x86/tdx: Unaccepted memory support
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH v8 0/8] x86: Show in sysfs if a memory node is able to do encryption
- From: Boris Petkov <bp@xxxxxxxxx>
- Re: [PATCH v8 0/8] x86: Show in sysfs if a memory node is able to do encryption
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v8 0/8] x86: Show in sysfs if a memory node is able to do encryption
- From: Boris Petkov <bp@xxxxxxxxx>
- Re: [PATCH v8 0/8] x86: Show in sysfs if a memory node is able to do encryption
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v8 0/8] x86: Show in sysfs if a memory node is able to do encryption
- From: Boris Petkov <bp@xxxxxxxxx>
- Re: [PATCHv5 08/12] x86/mm: Provide helpers for unaccepted memory
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH v8 0/8] x86: Show in sysfs if a memory node is able to do encryption
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v8 0/8] x86: Show in sysfs if a memory node is able to do encryption
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCHv5 06/12] x86/boot/compressed: Handle unaccepted memory
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- RE: [PATCH v8 0/8] x86: Show in sysfs if a memory node is able to do encryption
- From: "Limonciello, Mario" <Mario.Limonciello@xxxxxxx>
- Re: [PATCH v8 0/8] x86: Show in sysfs if a memory node is able to do encryption
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] efi: stub: prefer mirrored memory for randomized allocations
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi: stub: prefer mirrored memory for randomized allocations
- From: Kefeng Wang <wangkefeng.wang@xxxxxxxxxx>
- Re: [PATCH] efi: stub: prefer mirrored memory for randomized allocations
- From: Kefeng Wang <wangkefeng.wang@xxxxxxxxxx>
- Re: [PATCHv5 02/12] mm: Add support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH] efi: stub: prefer mirrored memory for randomized allocations
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi: stub: prefer mirrored memory for randomized allocations
- From: Kefeng Wang <wangkefeng.wang@xxxxxxxxxx>
- Re: [PATCHv5 10/12] x86/tdx: Unaccepted memory support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v8 0/8] x86: Show in sysfs if a memory node is able to do encryption
- From: Martin Fernandez <martin.fernandez@xxxxxxxxxxxxx>
- Re: [PATCH v8 0/8] x86: Show in sysfs if a memory node is able to do encryption
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCHv5 08/12] x86/mm: Provide helpers for unaccepted memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCHv5 07/12] x86/mm: Reserve unaccepted memory bitmap
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCHv5 02/12] mm: Add support for unaccepted memory
- From: David Hildenbrand <david@xxxxxxxxxx>
- [efi:next] BUILD SUCCESS 736e0f2179d3005d994ab5addd282988de2e4615
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH] efi: stub: prefer mirrored memory for randomized allocations
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCHv5 06/12] x86/boot/compressed: Handle unaccepted memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCHv5 06/12] x86/boot/compressed: Handle unaccepted memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 0/2] Add support to relocate kernel image to mirrored region
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 5/5] mtd: ubi: block: add option to enable scanning for partitions
- From: Daniel Golle <daniel@xxxxxxxxxxxxxx>
- [PATCH 4/5] mtd_blkdevs: add option to enable scanning for partitions
- From: Daniel Golle <daniel@xxxxxxxxxxxxxx>
- [PATCH 3/5] partitions/efi: add support for uImage.FIT sub-partitions
- From: Daniel Golle <daniel@xxxxxxxxxxxxxx>
- [PATCH 2/5] block: add partition parser for U-Boot uImage.FIT
- From: Daniel Golle <daniel@xxxxxxxxxxxxxx>
- [PATCH 1/5] block: add new flag to add partitions read-only
- From: Daniel Golle <daniel@xxxxxxxxxxxxxx>
- [PATCH 0/5] partition parser for U-Boot's uImage.FIT
- From: Daniel Golle <daniel@xxxxxxxxxxxxxx>
- Re: [PATCHv5 05/12] efi/x86: Implement support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCHv5 04/12] x86/boot: Add infrastructure required for unaccepted memory support
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- [RFC PATCH 3/4] efi: stub: implement generic EFI zboot
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [RFC PATCH 4/4] arm64: efi: enable generic EFI compressed boot
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [RFC PATCH 2/4] efi: stub: split off printk() routines
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [RFC PATCH 1/4] efi: stub: add prototypes for load_image and start_image
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [RFC PATCH 0/4] efi: implement generic compressed boot support
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH V9 21/24] LoongArch: Add zboot (compressed kernel) support
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH V9 21/24] LoongArch: Add zboot (compressed kernel) support
- From: "Russell King (Oracle)" <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH V9 21/24] LoongArch: Add zboot (compressed kernel) support
- From: Huacai Chen <chenhuacai@xxxxxxxxx>
- Re: [PATCH V9 21/24] LoongArch: Add zboot (compressed kernel) support
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH V9 21/24] LoongArch: Add zboot (compressed kernel) support
- From: "Russell King (Oracle)" <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH V9 21/24] LoongArch: Add zboot (compressed kernel) support
- From: Huacai Chen <chenhuacai@xxxxxxxxx>
- Re: [PATCH V9 21/24] LoongArch: Add zboot (compressed kernel) support
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH V9 09/24] LoongArch: Add boot and setup routines
- From: Huacai Chen <chenhuacai@xxxxxxxxxxx>
- [PATCH v8 8/8] drivers/node: Show in sysfs node's crypto capabilities
- From: Martin Fernandez <martin.fernandez@xxxxxxxxxxxxx>
- [PATCH v8 6/8] x86/e820: Tag e820_entry with crypto capabilities
- From: Martin Fernandez <martin.fernandez@xxxxxxxxxxxxx>
- [PATCH v8 5/8] x86/e820: Refactor e820__range_remove
- From: Martin Fernandez <martin.fernandez@xxxxxxxxxxxxx>
- [PATCH v8 3/8] x86/e820: Add infrastructure to refactor e820__range_{update,remove}
- From: Martin Fernandez <martin.fernandez@xxxxxxxxxxxxx>
- [PATCH v8 2/8] mm/mmzone: Tag pg_data_t with crypto capabilities
- From: Martin Fernandez <martin.fernandez@xxxxxxxxxxxxx>
- [PATCH v8 4/8] x86/e820: Refactor __e820__range_update
- From: Martin Fernandez <martin.fernandez@xxxxxxxxxxxxx>
- [PATCH v8 7/8] x86/efi: Mark e820_entries as crypto capable from EFI memmap
- From: Martin Fernandez <martin.fernandez@xxxxxxxxxxxxx>
- [PATCH v8 1/8] mm/memblock: Tag memblocks with crypto capabilities
- From: Martin Fernandez <martin.fernandez@xxxxxxxxxxxxx>
- [PATCH v8 0/8] x86: Show in sysfs if a memory node is able to do encryption
- From: Martin Fernandez <martin.fernandez@xxxxxxxxxxxxx>
- Re: [PATCHv5 07/12] x86/mm: Reserve unaccepted memory bitmap
- From: Wander Lairson Costa <wander@xxxxxxxxxx>
- Re: [PATCHv5 06/12] x86/boot/compressed: Handle unaccepted memory
- From: Wander Lairson Costa <wander@xxxxxxxxxx>
- Re: [PATCHv5 04/12] x86/boot: Add infrastructure required for unaccepted memory support
- From: Wander Lairson Costa <wander@xxxxxxxxxx>
- Re: [PATCHv5 05/12] efi/x86: Implement support for unaccepted memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCHv5 02/12] mm: Add support for unaccepted memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCHv5 03/12] efi/x86: Get full memory map in allocate_e820()
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCHv5 03/12] efi/x86: Get full memory map in allocate_e820()
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCHv5 03/12] efi/x86: Get full memory map in allocate_e820()
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCHv5 06/12] x86/boot/compressed: Handle unaccepted memory
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: How to list keys used for kexec
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [PATCHv5 06/12] x86/boot/compressed: Handle unaccepted memory
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v7 5/8] x86/e820: Refactor e820__range_remove
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v7 5/8] x86/e820: Refactor e820__range_remove
- From: Martin Fernandez <martin.fernandez@xxxxxxxxxxxxx>
- Re: [RFC PATCH 4/5] mtd_blkdevs: scan partitions on mtdblock if FIT_PARTITION is set
- From: Daniel Golle <daniel@xxxxxxxxxxxxxx>
- Re: [PATCH v7 5/8] x86/e820: Refactor e820__range_remove
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC PATCH 4/5] mtd_blkdevs: scan partitions on mtdblock if FIT_PARTITION is set
- From: Daniel Golle <daniel@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 4/5] mtd_blkdevs: scan partitions on mtdblock if FIT_PARTITION is set
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v7 1/8] mm/memblock: Tag memblocks with crypto capabilities
- From: Daniel Gutson <daniel.gutson@xxxxxxxxxxxxx>
- Re: [PATCH v7 1/8] mm/memblock: Tag memblocks with crypto capabilities
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v7 8/8] drivers/node: Show in sysfs node's crypto capabilities
- From: Martin Fernandez <martin.fernandez@xxxxxxxxxxxxx>
- Re: [PATCH v7 1/8] mm/memblock: Tag memblocks with crypto capabilities
- From: Martin Fernandez <martin.fernandez@xxxxxxxxxxxxx>
- Re: How to list keys used for kexec
- From: Michal Suchánek <msuchanek@xxxxxxx>
- Re: [RFC PATCH 4/5] mtd_blkdevs: scan partitions on mtdblock if FIT_PARTITION is set
- From: Miquel Raynal <miquel.raynal@xxxxxxxxxxx>
- Re: [PATCH v3 07/13] riscv: Implement sv48 support
- From: Nick Kossifidis <mick@xxxxxxxxxxxx>
- Re: [PATCH v7 2/8] mm/mmzone: Tag pg_data_t with crypto capabilities
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v7 8/8] drivers/node: Show in sysfs node's crypto capabilities
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v7 1/8] mm/memblock: Tag memblocks with crypto capabilities
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: How to list keys used for kexec
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [PATCH v7 0/8] x86: Show in sysfs if a memory node is able to do encryption
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- [PATCH v7 6/8] x86/e820: Tag e820_entry with crypto capabilities
- From: Martin Fernandez <martin.fernandez@xxxxxxxxxxxxx>
- [PATCH v7 8/8] drivers/node: Show in sysfs node's crypto capabilities
- From: Martin Fernandez <martin.fernandez@xxxxxxxxxxxxx>
- [PATCH v7 7/8] x86/efi: Mark e820_entries as crypto capable from EFI memmap
- From: Martin Fernandez <martin.fernandez@xxxxxxxxxxxxx>
- [PATCH v7 4/8] x86/e820: Refactor __e820__range_update
- From: Martin Fernandez <martin.fernandez@xxxxxxxxxxxxx>
- [PATCH v7 5/8] x86/e820: Refactor e820__range_remove
- From: Martin Fernandez <martin.fernandez@xxxxxxxxxxxxx>
- [PATCH v7 3/8] x86/e820: Add infrastructure to refactor e820__range_{update,remove}
- From: Martin Fernandez <martin.fernandez@xxxxxxxxxxxxx>
- [PATCH v7 2/8] mm/mmzone: Tag pg_data_t with crypto capabilities
- From: Martin Fernandez <martin.fernandez@xxxxxxxxxxxxx>
- [PATCH v7 0/8] x86: Show in sysfs if a memory node is able to do encryption
- From: Martin Fernandez <martin.fernandez@xxxxxxxxxxxxx>
- [PATCH v7 1/8] mm/memblock: Tag memblocks with crypto capabilities
- From: Martin Fernandez <martin.fernandez@xxxxxxxxxxxxx>
- [RFC PATCH 1/5] block: add new flag to add partitions read-only
- From: Daniel Golle <daniel@xxxxxxxxxxxxxx>
- [RFC PATCH 0/5] partition parser for U-Boot's uImage.FIT
- From: Daniel Golle <daniel@xxxxxxxxxxxxxx>
- [RFC PATCH 5/5] mtd/ubi/block: scan for partitions in case FIT_PARTITION is set
- From: Daniel Golle <daniel@xxxxxxxxxxxxxx>
- [RFC PATCH 4/5] mtd_blkdevs: scan partitions on mtdblock if FIT_PARTITION is set
- From: Daniel Golle <daniel@xxxxxxxxxxxxxx>
- [RFC PATCH 3/5] partitions/efi: add support for uImage.FIT sub-partitions
- From: Daniel Golle <daniel@xxxxxxxxxxxxxx>
- [RFC PATCH 2/5] block: add partition parser for U-Boot uImage.FIT
- From: Daniel Golle <daniel@xxxxxxxxxxxxxx>
- Re: [PATCHv5 01/12] x86/boot/: Centralize __pa()/__va() definitions
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCHv5 01/12] x86/boot/: Centralize __pa()/__va() definitions
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCHv5 09/12] x86/tdx: Make _tdx_hypercall() and __tdx_module_call() available in boot stub
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv5 12/12] x86/mm: Report unaccepted memory in /proc/meminfo
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv5 07/12] x86/mm: Reserve unaccepted memory bitmap
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv5 11/12] mm/vmstat: Add counter for memory accepting
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv5 00/12] mm, x86/cc: Implement support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv5 06/12] x86/boot/compressed: Handle unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv5 01/12] x86/boot/: Centralize __pa()/__va() definitions
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv5 05/12] efi/x86: Implement support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv5 02/12] mm: Add support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv5 10/12] x86/tdx: Unaccepted memory support
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv5 08/12] x86/mm: Provide helpers for unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv5 03/12] efi/x86: Get full memory map in allocate_e820()
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv5 04/12] x86/boot: Add infrastructure required for unaccepted memory support
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 00/13] Introduce sv48 support without relocatable kernel
- From: Palmer Dabbelt <palmer@xxxxxxxxxxx>
- Re: [PATCHv4 3/8] efi/x86: Implement support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCHv4 3/8] efi/x86: Implement support for unaccepted memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCHv4 3/8] efi/x86: Implement support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCHv4 0/8] mm, x86/cc: Implement support for unaccepted memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCHv4 3/8] efi/x86: Implement support for unaccepted memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- [no subject]
- Re: [PATCH v2 7/9] mm: Calc the right pfn if page size is not 4K
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 7/9] mm: Calc the right pfn if page size is not 4K
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/9] introduce mirrored memory support for arm64
- From: mawupeng <mawupeng1@xxxxxxxxxx>
- Re: Supplies needed from INDIA, reply for details
- From: "GCAP Supplies" <www@xxxxxxxxxxxxxxx>
- Re: [PATCHv4 3/8] efi/x86: Implement support for unaccepted memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 7/9] mm: Calc the right pfn if page size is not 4K
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 0/9] introduce mirrored memory support for arm64
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCHv4 3/8] efi/x86: Implement support for unaccepted memory
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCHv4 3/8] efi/x86: Implement support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH v2 7/9] mm: Calc the right pfn if page size is not 4K
- From: Anshuman Khandual <anshuman.khandual@xxxxxxx>
- Re: [PATCH v2 7/9] mm: Calc the right pfn if page size is not 4K
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCHv4 3/8] efi/x86: Implement support for unaccepted memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH 2/2] arm64/boot: Add support to relocate kernel image to mirrored region without kaslr
- From: Wupeng Ma <mawupeng1@xxxxxxxxxx>
- [PATCH 0/2] Add support to relocate kernel image to mirrored region
- From: Wupeng Ma <mawupeng1@xxxxxxxxxx>
- [PATCH 1/2] arm64/boot/KASLR: Add support to relocate kernel image to mirrored region
- From: Wupeng Ma <mawupeng1@xxxxxxxxxx>
- Re: [PATCHv4 3/8] efi/x86: Implement support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCHv4 3/8] efi/x86: Implement support for unaccepted memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCHv4 3/8] efi/x86: Implement support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCHv4 3/8] efi/x86: Implement support for unaccepted memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCHv4 3/8] efi/x86: Implement support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH] x86/efi: Remove references of EFI earlyprintk from documentation
- From: Jonathan Corbet <corbet@xxxxxxx>
- Re: [PATCH v2 0/9] introduce mirrored memory support for arm64
- From: mawupeng <mawupeng1@xxxxxxxxxx>
- Re: [PATCHv4 3/8] efi/x86: Implement support for unaccepted memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- [efi:next] BUILD SUCCESS 21b68da7bf4a0f27837a652565a76b9c95e54793
- From: kernel test robot <lkp@xxxxxxxxx>
- How to list keys used for kexec
- From: Michal Suchánek <msuchanek@xxxxxxx>
- Re: [PATCHv4 3/8] efi/x86: Implement support for unaccepted memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 0/9] introduce mirrored memory support for arm64
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 9/9] ia64/efi: Code simplification in efi_init
- From: Wupeng Ma <mawupeng1@xxxxxxxxxx>
- [PATCH v2 8/9] efi: Disable mirror feature if kernelcore is not specified
- From: Wupeng Ma <mawupeng1@xxxxxxxxxx>
- [PATCH v2 6/9] mm: Demote warning message in vmemmap_verify() to debug level
- From: Wupeng Ma <mawupeng1@xxxxxxxxxx>
- [PATCH v2 7/9] mm: Calc the right pfn if page size is not 4K
- From: Wupeng Ma <mawupeng1@xxxxxxxxxx>
- [PATCH v2 5/9] mm: Ratelimited mirrored memory related warning messages
- From: Wupeng Ma <mawupeng1@xxxxxxxxxx>
- [PATCH v2 3/9] efi: Make efi_find_mirror() public
- From: Wupeng Ma <mawupeng1@xxxxxxxxxx>
- [PATCH v2 4/9] arm64/mirror: arm64 enabling - find mirrored memory ranges
- From: Wupeng Ma <mawupeng1@xxxxxxxxxx>
- [PATCH v2 2/9] arm64: efi: Add fake memory support
- From: Wupeng Ma <mawupeng1@xxxxxxxxxx>
- [PATCH v2 1/9] efi: Make efi_print_memmap() public
- From: Wupeng Ma <mawupeng1@xxxxxxxxxx>
- [PATCH v2 0/9] introduce mirrored memory support for arm64
- From: Wupeng Ma <mawupeng1@xxxxxxxxxx>
- Re: [PATCH 1/2] efi: remove use of list iterator variable after loop
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCHv4 1/8] mm: Add support for unaccepted memory
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH 1/2] efi: remove use of list iterator variable after loop
- From: Jakob Koschel <jakobkoschel@xxxxxxxxx>
- Re: [PATCH RFC v2 0/2] Handle UEFI NX-restricted page tables
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] x86: Set the NX-compatibility flag in the PE header
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: Increasing EFI_MMAP_NR_SLACK_SLOTS
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi: Add missing prototype for efi_capsule_setup_info
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2] efi: Allow to enable EFI runtime services by default on RT
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 2/2] efi: replace usage of found with dedicated list iterator variable
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 1/2] efi: remove use of list iterator variable after loop
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v10 0/4] Allow guest access to EFI confidential computing secret area
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCHv4 1/8] mm: Add support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCHv4 1/8] mm: Add support for unaccepted memory
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCHv4 1/8] mm: Add support for unaccepted memory
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCHv4 6/8] x86/mm: Provide helpers for unaccepted memory
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCHv4 1/8] mm: Add support for unaccepted memory
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCHv4 1/8] mm: Add support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCHv4 1/8] mm: Add support for unaccepted memory
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCHv4 1/8] mm: Add support for unaccepted memory
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCHv4 2/8] efi/x86: Get full memory map in allocate_e820()
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCHv4 1/8] mm: Add support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCHv4 1/8] mm: Add support for unaccepted memory
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCHv4 1/8] mm: Add support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCHv4 1/8] mm: Add support for unaccepted memory
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCHv4 2/8] efi/x86: Get full memory map in allocate_e820()
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH v10 0/4] Allow guest access to EFI confidential computing secret area
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- [PATCH v10 4/4] docs: security: Add secrets/coco documentation
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- [PATCH v10 1/4] efi: Save location of EFI confidential computing area
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- [PATCH v10 2/4] virt: Add efi_secret module to expose confidential computing secrets
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- [PATCH v10 3/4] efi: Register efi_secret platform device if EFI secret area is declared
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- Re: [PATCH v3 00/30] arm64: support WXN and entry with MMU enabled
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCHv4 1/8] mm: Add support for unaccepted memory
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v8 3/4] efi: Load efi_secret module if EFI secret area is populated
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- Re: [PATCH v8 3/4] efi: Load efi_secret module if EFI secret area is populated
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v9 0/4] Allow guest access to EFI confidential computing secret area
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- Re: [PATCH v9 0/4] Allow guest access to EFI confidential computing secret area
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v9 0/4] Allow guest access to EFI confidential computing secret area
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- Re: [PATCHv4 8/8] mm/vmstat: Add counter for memory accepting
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCHv4 1/8] mm: Add support for unaccepted memory
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v10 8/8] integrity: Only use machine keyring when uefi_check_trust_mok_keys is true
- From: Michal Suchánek <msuchanek@xxxxxxx>
- Re: [PATCH v10 8/8] integrity: Only use machine keyring when uefi_check_trust_mok_keys is true
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCHv4 1/8] mm: Add support for unaccepted memory
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v10 8/8] integrity: Only use machine keyring when uefi_check_trust_mok_keys is true
- From: Michal Suchánek <msuchanek@xxxxxxx>
- Re: [PATCH v10 8/8] integrity: Only use machine keyring when uefi_check_trust_mok_keys is true
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCHv4 1/8] mm: Add support for unaccepted memory
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCHv4 1/8] mm: Add support for unaccepted memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v10 8/8] integrity: Only use machine keyring when uefi_check_trust_mok_keys is true
- From: Michal Suchánek <msuchanek@xxxxxxx>
- Re: [PATCHv4 1/8] mm: Add support for unaccepted memory
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v3 29/30] efi/arm64: libstub: run image in place if randomized by the loader
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 30/30] arm64: efi/libstub: enter with the MMU on if executing in place
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 28/30] efi: libstub: pass image handle to handle_kernel_image()
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 26/30] arm64: head: avoid cache invalidation when entering with the MMU on
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 27/30] arm64: head: clean the ID map page to the PoC
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 25/30] arm64: head: record the MMU state at primary entry
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 24/30] arm64: mm: add support for WXN memory translation attribute
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 22/30] arm64: setup: drop early FDT pointer helpers
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 23/30] arm64: mm: move ro_after_init section into the data segment
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 21/30] arm64: head: remap the kernel text/inittext region read-only
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 02/30] arm64: mm: make vabits_actual a build time constant if possible
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 11/30] arm64: head: add helper function to remap regions in early page tables
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 05/30] arm64: head: simplify page table mapping macros (slightly)
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 19/30] arm64: kaslr: deal with init called with VA randomization enabled
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 20/30] arm64: head: relocate kernel only a single time if KASLR is enabled
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 18/30] arm64: head: record CPU boot mode after enabling the MMU
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 16/30] arm64: head: factor out TTBR1 assignment into a macro
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 15/30] arm64: idreg-override: use early FDT mapping in ID map
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 17/30] arm64: head: populate kernel page tables with MMU and caches on
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 14/30] arm64: head: create a temporary FDT mapping in the initial ID map
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 13/30] arm64: head: use relative references to the RELA and RELR tables
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 12/30] arm64: head: cover entire kernel image in initial ID map
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 10/30] arm64: mm: provide idmap pointer to cpu_replace_ttbr1()
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 09/30] arm64: head: pass ID map root table address to __enable_mmu()
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 07/30] arm64: head: split off idmap creation code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 08/30] arm64: kernel: drop unnecessary PoC cache clean+invalidate
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 06/30] arm64: head: switch to map_memory macro for the extended ID map
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 04/30] arm64: head: drop idmap_ptrs_per_pgd
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 03/30] arm64: head: move assignment of idmap_t0sz to C code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 01/30] arm64: head: move kimage_vaddr variable into C file
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 00/30] arm64: support WXN and entry with MMU enabled
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCHv4 1/8] mm: Add support for unaccepted memory
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCHv4 4/8] x86/boot/compressed: Handle unaccepted memory
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCHv4 1/8] mm: Add support for unaccepted memory
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCHv4 1/8] mm: Add support for unaccepted memory
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCHv4 0/8] mm, x86/cc: Implement support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCHv4 5/8] x86/mm: Reserve unaccepted memory bitmap
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCHv4 4/8] x86/boot/compressed: Handle unaccepted memory
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCHv4 3/8] efi/x86: Implement support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCHv4 1/8] mm: Add support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCHv4 1/8] mm: Add support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCHv4 6/8] x86/mm: Provide helpers for unaccepted memory
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCHv4 1/8] mm: Add support for unaccepted memory
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCHv4 1/8] mm: Add support for unaccepted memory
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCHv4 1/8] mm: Add support for unaccepted memory
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCHv4 7/8] x86/tdx: Unaccepted memory support
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCHv4 6/8] x86/mm: Provide helpers for unaccepted memory
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCHv4 5/8] x86/mm: Reserve unaccepted memory bitmap
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCHv4 4/8] x86/boot/compressed: Handle unaccepted memory
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCHv4 3/8] efi/x86: Implement support for unaccepted memory
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCHv4 0/8] mm, x86/cc: Implement support for unaccepted memory
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v7 0/3] EDAC/ghes: refactor memory error reporting to avoid code duplication
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2] fs: remove unnecessary conditional
- From: David Sterba <dsterba@xxxxxxx>
- [PATCH v2] fs: remove unnecessary conditional
- Re: [PATCH v12 29/46] x86/boot: Add Confidential Computing type to setup_data
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v12 29/46] x86/boot: Add Confidential Computing type to setup_data
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [PATCH v9 3/4] efi: Register efi_secret platform device if EFI secret area is declared
- From: Gerd Hoffmann <kraxel@xxxxxxxxxx>
- Re: [PATCH v9 2/4] virt: Add efi_secret module to expose confidential computing secrets
- From: Gerd Hoffmann <kraxel@xxxxxxxxxx>
- Re: [PATCH v7 1/3] efi/cper: add cper_mem_err_status_str to decode error description
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v12 29/46] x86/boot: Add Confidential Computing type to setup_data
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- [PATCH v12 2.1/46] KVM: SVM: Create a separate mapping for the SEV-ES save area
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCHv4 1/8] mm: Add support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv4 7/8] x86/tdx: Unaccepted memory support
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH] x86/efi: Remove references of EFI earlyprintk from documentation
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCHv4 2/8] efi/x86: Get full memory map in allocate_e820()
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv4 0/8] mm, x86/cc: Implement support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v12 22/46] x86/sev: Use SEV-SNP AP creation to start secondary CPUs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v12 22/46] x86/sev: Use SEV-SNP AP creation to start secondary CPUs
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v12 2.1/46] KVM: SVM: Create a separate mapping for the SEV-ES save area
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCHv4 6/8] x86/mm: Provide helpers for unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv4 4/8] x86/boot/compressed: Handle unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv4 3/8] efi/x86: Implement support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv4 8/8] mm/vmstat: Add counter for memory accepting
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH] x86/efi: Remove references of EFI earlyprintk from documentation
- From: Jonathan Corbet <corbet@xxxxxxx>
- [PATCHv4 5/8] x86/mm: Reserve unaccepted memory bitmap
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v12 22/46] x86/sev: Use SEV-SNP AP creation to start secondary CPUs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v11 00/45] Add AMD Secure Nested Paging (SEV-SNP) Guest Support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v7 1/3] efi/cper: add cper_mem_err_status_str to decode error description
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3 00/13] Introduce sv48 support without relocatable kernel
- From: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
- Re: [PATCH v2] efi: Allow to enable EFI runtime services by default on RT
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH v2] efi: Allow to enable EFI runtime services by default on RT
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH v2] efi: Allow to enable EFI runtime services by default on RT
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2] efi: Allow to enable EFI runtime services by default on RT
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH v2] efi: Allow to enable EFI runtime services by default on RT
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH v7 0/3] EDAC/ghes: refactor memory error reporting to avoid code duplication
- From: Shuai Xue <xueshuai@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 3/4] efi: Register efi_secret platform device if EFI secret area is declared
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- Re: [PATCH v2] efi: Allow to enable EFI runtime services by default on RT
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- [PATCH 1/2] efi: remove use of list iterator variable after loop
- From: Jakob Koschel <jakobkoschel@xxxxxxxxx>
- [PATCH 2/2] efi: replace usage of found with dedicated list iterator variable
- From: Jakob Koschel <jakobkoschel@xxxxxxxxx>
- [PATCH v9 1/4] efi: Save location of EFI confidential computing area
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- [PATCH v9 4/4] docs: security: Add secrets/coco documentation
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- [PATCH v9 3/4] efi: Register efi_secret platform device if EFI secret area is declared
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- [PATCH v9 2/4] virt: Add efi_secret module to expose confidential computing secrets
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- [PATCH v9 0/4] Allow guest access to EFI confidential computing secret area
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- Re: [PATCH v8 0/4] Allow guest access to EFI confidential computing secret area
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- Re: [PATCH v2] efi: Allow to enable EFI runtime services by default on RT
- From: "Ahmed S. Darwish" <a.darwish@xxxxxxxxxxxxx>
- Re: [PATCH v2] efi: Allow to enable EFI runtime services by default on RT
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH v2 00/18] arm64: efi: leave MMU and caches on at boot
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH v2 00/18] arm64: efi: leave MMU and caches on at boot
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [PATCH v2] efi: Allow to enable EFI runtime services by default on RT
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH] efi: Allow to enable EFI runtime services with PREEMPT_RT
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH] efi: Allow to enable EFI runtime services with PREEMPT_RT
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH] efi: Allow to enable EFI runtime services with PREEMPT_RT
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH] efi: Allow to enable EFI runtime services with PREEMPT_RT
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- [PATCH] efi: Allow to enable EFI runtime services with PREEMPT_RT
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: Linux DRTM on UEFI platforms
- From: Heinrich Schuchardt <heinrich.schuchardt@xxxxxxxxxxxxx>
- Re: [PATCH v8 0/4] Allow guest access to EFI confidential computing secret area
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [PATCH v8 3/4] efi: Load efi_secret module if EFI secret area is populated
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- Re: Linux DRTM on UEFI platforms
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: Linux DRTM on UEFI platforms
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- [no subject]
- [RFC PATCH v2 17/18] efi/arm64: libstub: run image in place if randomized by the loader
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [RFC PATCH v2 18/18] arm64: efi/libstub: enter with the MMU on if executing in place
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [RFC PATCH v2 16/18] efi: libstub: pass image handle to handle_kernel_image()
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [RFC PATCH v2 15/18] arm64: lds: move idmap_pg_dir out of .rodata
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [RFC PATCH v2 12/18] arm64: head: avoid cache invalidation when entering with the MMU on
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [RFC PATCH v2 14/18] arm64: head: clean the ID map page to the PoC
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [RFC PATCH v2 13/18] arm64: head: record CPU boot mode after enabling the MMU
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [RFC PATCH v2 11/18] arm64: mm: make vabits_actual a build time constant if possible
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [RFC PATCH v2 10/18] arm64: head: record the MMU state at primary entry
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [RFC PATCH v2 09/18] arm64: head: relocate kernel only a single time if KASLR is enabled
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [RFC PATCH v2 08/18] arm64: setup: defer R/O remapping of FDT
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [RFC PATCH v2 05/18] arm64: head: factor out TTBR1 assignment into a macro
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [RFC PATCH v2 04/18] arm64: head: cover entire kernel image in ID map
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [RFC PATCH v2 02/18] arm64: head: split off idmap creation code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [RFC PATCH v2 06/18] arm64: head: populate kernel page tables with MMU and caches on
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [RFC PATCH v2 03/18] arm64: kernel: drop unnecessary PoC cache clean+invalidate
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [RFC PATCH v2 07/18] arm64: kaslr: deal with init called with VA randomization enabled
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [RFC PATCH v2 01/18] arm64: head: drop idmap_ptrs_per_pgd
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [RFC PATCH v2 00/18] arm64: efi: leave MMU and caches on at boot
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: Linux DRTM on UEFI platforms
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: Linux DRTM on UEFI platforms
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: Linux DRTM on UEFI platforms
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: Linux DRTM on UEFI platforms
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: Linux DRTM on UEFI platforms
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: Linux DRTM on UEFI platforms
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: Linux DRTM on UEFI platforms
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: Linux DRTM on UEFI platforms
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v8 0/4] Allow guest access to EFI confidential computing secret area
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- Re: [PATCH v8 0/4] Allow guest access to EFI confidential computing secret area
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- [PATCH] x86: Set the NX-compatibility flag in the PE header
- From: Peter Jones <pjones@xxxxxxxxxx>
- Re: [PATCH RFC v2 0/2] Handle UEFI NX-restricted page tables
- From: Peter Jones <pjones@xxxxxxxxxx>
- Re: [PATCH v8 0/4] Allow guest access to EFI confidential computing secret area
- From: Borislav Petkov <bp@xxxxxxx>
- Linux DRTM on UEFI platforms
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v8 0/4] Allow guest access to EFI confidential computing secret area
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- Re: [PATCH 0/9] introduce mirrored memory support for arm64
- From: mawupeng <mawupeng1@xxxxxxxxxx>
- Re: [PATCH 0/9] introduce mirrored memory support for arm64
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 7/9] mm: Calc the right pfn if page size is not 4K
- From: mawupeng <mawupeng1@xxxxxxxxxx>
- Re: [PATCH 7/9] mm: Calc the right pfn if page size is not 4K
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH] Removing the unused TODO
- From: Dipankar Das <dipsonu10@xxxxxxxxxxx>
- [PATCH] Removing the unused TODO
- From: Dipankar Das <dipsonu10@xxxxxxxxxxx>
- [PATCH 8/9] efi: Disable mirror feature if kernelcore is not specified
- From: Wupeng Ma <mawupeng1@xxxxxxxxxx>
- [PATCH 9/9] ia64/efi: Code simplification in efi_init
- From: Wupeng Ma <mawupeng1@xxxxxxxxxx>
- [PATCH 7/9] mm: Calc the right pfn if page size is not 4K
- From: Wupeng Ma <mawupeng1@xxxxxxxxxx>
- [PATCH 6/9] mm: Demote warning message in vmemmap_verify() to debug level
- From: Wupeng Ma <mawupeng1@xxxxxxxxxx>
- [PATCH 5/9] mm: Ratelimited mirrored memory related warning messages
- From: Wupeng Ma <mawupeng1@xxxxxxxxxx>
- [PATCH 4/9] arm64/mirror: arm64 enabling - find mirrored memory ranges
- From: Wupeng Ma <mawupeng1@xxxxxxxxxx>
- [PATCH 3/9] efi: Make efi_find_mirror() public
- From: Wupeng Ma <mawupeng1@xxxxxxxxxx>
- [PATCH 2/9] arm64: efi: Add fake memory support
- From: Wupeng Ma <mawupeng1@xxxxxxxxxx>
- [PATCH 1/9] efi: Make efi_print_memmap() public
- From: Wupeng Ma <mawupeng1@xxxxxxxxxx>
- [PATCH 0/9] introduce mirrored memory support for arm64
- From: Wupeng Ma <mawupeng1@xxxxxxxxxx>
- Re: [PATCH v12 40/46] x86/sev: add sev=debug cmdline option to dump SNP CPUID table
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [PATCH RFC v2 0/2] Handle UEFI NX-restricted page tables
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH RFC v2 0/2] Handle UEFI NX-restricted page tables
- Re: [PATCH v8 0/4] Allow guest access to EFI confidential computing secret area
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [PATCH 1/1] riscv/efi_stub: Add support for RISCV_EFI_BOOT_PROTOCOL
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V3 1/1] riscv/efi_stub: Add support for RISCV_EFI_BOOT_PROTOCOL
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V3 0/1] RISCV_EFI_BOOT_PROTOCOL support in linux
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] riscv/efi_stub: Add support for RISCV_EFI_BOOT_PROTOCOL
- From: Heinrich Schuchardt <heinrich.schuchardt@xxxxxxxxxxxxx>
- [PATCH 1/1] riscv/efi_stub: Add support for RISCV_EFI_BOOT_PROTOCOL
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH 0/1] RISCV_EFI_BOOT_PROTOCOL support in linux
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH V2 1/1] riscv/efi_stub: Add support for RISCV_EFI_BOOT_PROTOCOL
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH V2 0/1] RISCV_EFI_BOOT_PROTOCOL support in linux
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH V2 0/1] RISCV_EFI_BOOT_PROTOCOL support in linux
- From: Palmer Dabbelt <palmer@xxxxxxxxxxx>
- Re: [RFC PATCH V2 1/1] riscv/efi_stub: Add support for RISCV_EFI_BOOT_PROTOCOL
- From: Palmer Dabbelt <palmer@xxxxxxxxxxx>
- Re: [PATCH v7 0/3] EDAC/ghes: refactor memory error reporting to avoid code duplication
- From: Shuai Xue <xueshuai@xxxxxxxxxxxxxxxxx>
- [PATCH 5.16 06/37] efi: fix return value of __setup handlers
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.15 06/32] efi: fix return value of __setup handlers
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.10 04/30] efi: fix return value of __setup handlers
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.19 47/57] efi: fix return value of __setup handlers
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.4 03/17] efi: fix return value of __setup handlers
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.14 15/22] efi: fix return value of __setup handlers
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V8 09/22] LoongArch: Add boot and setup routines
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH] x86/efi: Remove references of EFI earlyprintk from documentation
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxx>
[Index of Archives]
[Linux Kernel Development]
[Security]
[Linux ARM Kernel]
[Tools]
[Linux MIPS]
[Linux S390]
[Bugtraq]
[Share Photos]>
[Fedora ARM]