Linux EFI/UEFI Development
[Prev Page][Next Page]
- [PATCH Part1 RFC v4 23/36] KVM: x86: move lookup of indexed CPUID leafs to helper
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 30/36] x86/sev: enable SEV-SNP-validated CPUID in #VC handlers
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 22/36] x86/sev: move MSR-based VMGEXITs for CPUID to helper
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 29/36] x86/compressed/64: add identity mapping for Confidential Computing blob
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 35/36] virt: sevguest: Add support to derive key
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 21/36] x86/head/64: set up a startup %gs for stack protector
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 20/36] x86/sev: Use SEV-SNP AP creation to start secondary CPUs
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 16/36] KVM: SVM: define new SEV_FEATURES field in the VMCB Save State Area
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 26/36] x86/compressed/64: enable SEV-SNP-validated CPUID in #VC handler
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 27/36] x86/boot: add a pointer to Confidential Computing blob in bootparams
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 28/36] x86/compressed/64: store Confidential Computing blob address in bootparams
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 19/36] KVM: SVM: Update the SEV-ES save area mapping
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 18/36] KVM: SVM: Create a separate mapping for the GHCB save area
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 15/36] x86/mm: Add support to validate memory when changing C-bit
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 25/36] x86/boot: Add Confidential Computing type to setup_data
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 17/36] KVM: SVM: Create a separate mapping for the SEV-ES save area
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 14/36] x86/kernel: Validate rom memory before accessing when SEV-SNP is active
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 12/36] x86/sev: Add helper for validating pages in early enc attribute changes
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 13/36] x86/kernel: Make the bss.decrypted section shared in RMP table
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 11/36] x86/sev: Register GHCB memory when SEV-SNP is active
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 10/36] x86/compressed: Register GHCB memory when SEV-SNP is active
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 09/36] x86/compressed: Add helper for validating pages in the decompression stage
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 08/36] x86/sev: check the vmpl level
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 07/36] x86/sev: Add a helper for the PVALIDATE instruction
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 06/36] x86/sev: check SEV-SNP features support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 04/36] x86/mm: Add sev_feature_enabled() helper
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 05/36] x86/sev: Define the Linux specific guest termination reasons
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 03/36] x86/sev: Add support for hypervisor feature VMGEXIT
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 02/36] x86/sev: Save the negotiated GHCB version
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 01/36] x86/sev: shorten GHCB terminate macro names
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 00/36] Add AMD Secure Nested Paging (SEV-SNP) Guest Support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH 1/1] RISC-V: load initrd wherever it fits into memory
- From: Andreas Schwab <schwab@xxxxxxxxxxxxxx>
- Re: [PATCH Part1 RFC v3 22/22] virt: Add SEV-SNP guest driver
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v3 22/22] virt: Add SEV-SNP guest driver
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 1/1] RISC-V: load initrd wherever it fits into memory
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- [PATCH] efi/libstub: Fix the efi_load_initrd function description
- From: Atish Patra <atish.patra@xxxxxxx>
- Re: [PATCH Part1 RFC v3 22/22] virt: Add SEV-SNP guest driver
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH 1/3] x86/setup: always reserve the first 1M of RAM
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH Part1 RFC v3 22/22] virt: Add SEV-SNP guest driver
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 1/3] x86/setup: always reserve the first 1M of RAM
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH Part1 RFC v3 22/22] virt: Add SEV-SNP guest driver
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v3 22/22] virt: Add SEV-SNP guest driver
- From: Borislav Petkov <bp@xxxxxxxxx>
- [RFC PATCH] efi/mokvar: Reserve the table only if it is in boot services data
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 1/1] RISC-V: load initrd wherever it fits into memory
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v3 3/5] mm: x86: Invoke hypercall when page encryption status is changed
- From: Ashish Kalra <ashish.kalra@xxxxxxx>
- Re: [PATCH 1/1] RISC-V: load initrd wherever it fits into memory
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 3/3] virt: Add sev_secret module to expose confidential computing secrets
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [RFC PATCH v2 0/3] Allow access to confidential computing secret area
- From: Borislav Petkov <bp@xxxxxxx>
- [PATCH 1/1] RISC-V: load initrd wherever it fits into memory
- From: Heinrich Schuchardt <xypron.glpk@xxxxxx>
- Re: [RFC PATCH v2 3/3] virt: Add sev_secret module to expose confidential computing secrets
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- Re: [RFC PATCH v2 0/3] Allow access to confidential computing secret area
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- Re: [RFC PATCH v2 2/3] efi: Reserve confidential computing secret area
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- Re: [RFC PATCH v2 2/3] efi: Reserve confidential computing secret area
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [GIT PULL] EFI changes for v5.14
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [RFC PATCH v2 3/3] virt: Add sev_secret module to expose confidential computing secrets
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [RFC PATCH v2 0/3] Allow access to confidential computing secret area
- From: Borislav Petkov <bp@xxxxxxx>
- [RFC PATCH v2 3/3] virt: Add sev_secret module to expose confidential computing secrets
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- [RFC PATCH v2 2/3] efi: Reserve confidential computing secret area
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- [RFC PATCH v2 1/3] efi/libstub: Copy confidential computing secret area
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- [RFC PATCH v2 0/3] Allow access to confidential computing secret area
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- Re: [PATCH Part1 RFC v3 20/22] x86/boot: Add Confidential Computing address to setup_header
- From: Borislav Petkov <bp@xxxxxxxxx>
- [GIT PULL] EFI changes for v5.14
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- RE: [PATCH v10 3/7] arm64: hyperv: Add Hyper-V clocksource/clockevent support
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH Part1 RFC v3 20/22] x86/boot: Add Confidential Computing address to setup_header
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH Part1 RFC v3 20/22] x86/boot: Add Confidential Computing address to setup_header
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v3 20/22] x86/boot: Add Confidential Computing address to setup_header
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v3 20/22] x86/boot: Add Confidential Computing address to setup_header
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3 2/2] drivers/firmware: consolidate EFI framebuffer setup for all arches
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH v3 2/2] drivers/firmware: consolidate EFI framebuffer setup for all arches
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- [PATCH v3 1/2] drivers/firmware: move x86 Generic System Framebuffers support
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- [PATCH v3 0/2] allow simple{fb,drm} drivers to be used on non-x86 EFI platforms
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH Part1 RFC v3 20/22] x86/boot: Add Confidential Computing address to setup_header
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH Part1 RFC v3 20/22] x86/boot: Add Confidential Computing address to setup_header
- From: "Kuppuswamy, Sathyanarayanan" <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH Part1 RFC v3 20/22] x86/boot: Add Confidential Computing address to setup_header
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v3 20/22] x86/boot: Add Confidential Computing address to setup_header
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH Part1 RFC v3 20/22] x86/boot: Add Confidential Computing address to setup_header
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH Part1 RFC v3 20/22] x86/boot: Add Confidential Computing address to setup_header
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v3 20/22] x86/boot: Add Confidential Computing address to setup_header
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v2 2/2] drivers/firmware: consolidate EFI framebuffer setup for all arches
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH Part1 RFC v3 20/22] x86/boot: Add Confidential Computing address to setup_header
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 2/2] drivers/firmware: consolidate EFI framebuffer setup for all arches
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- Re: [PATCH v10 3/7] arm64: hyperv: Add Hyper-V clocksource/clockevent support
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v10 3/7] arm64: hyperv: Add Hyper-V clocksource/clockevent support
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v3] lockdown,selinux: fix wrong subject in some SELinux lockdown checks
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH v3] lockdown,selinux: fix wrong subject in some SELinux lockdown checks
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v3] lockdown,selinux: fix wrong subject in some SELinux lockdown checks
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH Part1 RFC v3 20/22] x86/boot: Add Confidential Computing address to setup_header
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v3 21/22] x86/sev: Register SNP guest request platform device
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v3 20/22] x86/boot: Add Confidential Computing address to setup_header
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v3 21/22] x86/sev: Register SNP guest request platform device
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v3 20/22] x86/boot: Add Confidential Computing address to setup_header
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v3 06/22] x86/sev: check SEV-SNP features support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3] lockdown,selinux: fix wrong subject in some SELinux lockdown checks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH Part1 RFC v3 06/22] x86/sev: check SEV-SNP features support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- RE: [PATCH v10 3/7] arm64: hyperv: Add Hyper-V clocksource/clockevent support
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH Part1 RFC v3 19/22] x86/sev-snp: SEV-SNP AP creation support
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH Part1 RFC v3 11/22] x86/sev: Add helper for validating pages in early enc attribute changes
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v3 11/22] x86/sev: Add helper for validating pages in early enc attribute changes
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: x86 UEFI stub builtin cpio rootfs.
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH Part1 RFC v3 11/22] x86/sev: Add helper for validating pages in early enc attribute changes
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v3 19/22] x86/sev-snp: SEV-SNP AP creation support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v3 11/22] x86/sev: Add helper for validating pages in early enc attribute changes
- From: "Dr. David Alan Gilbert" <dgilbert@xxxxxxxxxx>
- Re: [PATCH Part1 RFC v3 11/22] x86/sev: Add helper for validating pages in early enc attribute changes
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v3 11/22] x86/sev: Add helper for validating pages in early enc attribute changes
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v3 11/22] x86/sev: Add helper for validating pages in early enc attribute changes
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v3 11/22] x86/sev: Add helper for validating pages in early enc attribute changes
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v3 08/22] x86/compressed: Add helper for validating pages in the decompression stage
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v3 11/22] x86/sev: Add helper for validating pages in early enc attribute changes
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH v3] lockdown,selinux: fix wrong subject in some SELinux lockdown checks
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- x86 UEFI stub builtin cpio rootfs.
- From: Christian Melki <christian.melki@xxxxxxxxxx>
- [PATCH 4/4] efi/libstub: measure loaded initrd info into the TPM
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- [PATCH 3/4] efi/libstub: consolidate initrd handling across architectures
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- [PATCH 2/4] efi/libstub: x86/mixed: increase supported argument count
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- [PATCH 1/4] efi/libstub: add prototype of efi_tcg2_protocol::hash_log_extend_event()
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- [PATCH 0/4] efi/libstub: measurement initrd data loaded by the EFI stub
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH Part1 RFC v3 11/22] x86/sev: Add helper for validating pages in early enc attribute changes
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v3 21/22] x86/sev: Register SNP guest request platform device
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v3 16/22] KVM: SVM: Create a separate mapping for the SEV-ES save area
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v3 16/22] KVM: SVM: Create a separate mapping for the SEV-ES save area
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH Part1 RFC v3 14/22] x86/mm: Add support to validate memory when changing C-bit
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v3 11/22] x86/sev: Add helper for validating pages in early enc attribute changes
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v3 21/22] x86/sev: Register SNP guest request platform device
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v1 0/2] firmware: dmi_scan: Make it work in kexec'ed kernel
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH Part1 RFC v3 21/22] x86/sev: Register SNP guest request platform device
- From: "Dr. David Alan Gilbert" <dgilbert@xxxxxxxxxx>
- Re: [PATCH Part1 RFC v3 21/22] x86/sev: Register SNP guest request platform device
- From: "Dr. David Alan Gilbert" <dgilbert@xxxxxxxxxx>
- Re: [PATCH v1 0/2] firmware: dmi_scan: Make it work in kexec'ed kernel
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH v1 0/2] firmware: dmi_scan: Make it work in kexec'ed kernel
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH Part1 RFC v3 21/22] x86/sev: Register SNP guest request platform device
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v3 14/22] x86/mm: Add support to validate memory when changing C-bit
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v3 11/22] x86/sev: Add helper for validating pages in early enc attribute changes
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v3 10/22] x86/sev: Register GHCB memory when SEV-SNP is active
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v3 09/22] x86/compressed: Register GHCB memory when SEV-SNP is active
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v3 16/22] KVM: SVM: Create a separate mapping for the SEV-ES save area
- From: Borislav Petkov <bp@xxxxxxxxx>
- RE: [PATCH v10 3/7] arm64: hyperv: Add Hyper-V clocksource/clockevent support
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v1 0/2] firmware: dmi_scan: Make it work in kexec'ed kernel
- From: Dave Young <dyoung@xxxxxxxxxx>
- [PATCH v4 4/5] EFI: Introduce the new AMD Memory Encryption GUID.
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- Re: [PATCH Part1 RFC v3 21/22] x86/sev: Register SNP guest request platform device
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH Part1 RFC v3 14/22] x86/mm: Add support to validate memory when changing C-bit
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3 5/5] x86/kvm: Add guest support for detecting and enabling SEV Live Migration feature.
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3 3/5] mm: x86: Invoke hypercall when page encryption status is changed
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3 1/5] KVM: X86: Introduce KVM_HC_MAP_GPA_RANGE hypercall
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v10 3/7] arm64: hyperv: Add Hyper-V clocksource/clockevent support
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH Part1 RFC v3 12/22] x86/kernel: Make the bss.decrypted section shared in RMP table
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v3 11/22] x86/sev: Add helper for validating pages in early enc attribute changes
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3 4/5] EFI: Introduce the new AMD Memory Encryption GUID.
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH Part1 RFC v3 10/22] x86/sev: Register GHCB memory when SEV-SNP is active
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v3 21/22] x86/sev: Register SNP guest request platform device
- From: "Dr. David Alan Gilbert" <dgilbert@xxxxxxxxxx>
- Re: [PATCH Part1 RFC v3 09/22] x86/compressed: Register GHCB memory when SEV-SNP is active
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 0/2] firmware: dmi_scan: Make it work in kexec'ed kernel
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [RFC PATCH 0/3] Allow access to confidential computing secret area
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- [PATCH v3 5/5] x86/kvm: Add guest support for detecting and enabling SEV Live Migration feature.
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v3 4/5] EFI: Introduce the new AMD Memory Encryption GUID.
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v3 3/5] mm: x86: Invoke hypercall when page encryption status is changed
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v3 2/5] KVM: x86: invert KVM_HYPERCALL to default to VMMCALL
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v3 1/5] KVM: X86: Introduce KVM_HC_MAP_GPA_RANGE hypercall
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v3 0/5] Add Guest API & Guest Kernel support for SEV live migration.
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- Re: [PATCH Part1 RFC v3 03/22] x86/sev: Save the negotiated GHCB version
- From: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
- Re: [PATCH Part1 RFC v3 02/22] x86/sev: Define the Linux specific guest termination reasons
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v3 02/22] x86/sev: Define the Linux specific guest termination reasons
- From: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
- Re: [PATCH Part1 RFC v3 08/22] x86/compressed: Add helper for validating pages in the decompression stage
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v3 01/22] x86/sev: shorten GHCB terminate macro names
- From: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
- RE: [PATCH v10 3/7] arm64: hyperv: Add Hyper-V clocksource/clockevent support
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v1 0/2] firmware: dmi_scan: Make it work in kexec'ed kernel
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH v1 0/2] firmware: dmi_scan: Make it work in kexec'ed kernel
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH Part1 RFC v3 08/22] x86/compressed: Add helper for validating pages in the decompression stage
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v3 00/22] Add AMD Secure Nested Paging (SEV-SNP) Guest Support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v3 00/22] Add AMD Secure Nested Paging (SEV-SNP) Guest Support
- From: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
- Re: [PATCH v1 0/2] firmware: dmi_scan: Make it work in kexec'ed kernel
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/2] firmware: dmi_scan: Make it work in kexec'ed kernel
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH Part1 RFC v3 06/22] x86/sev: check SEV-SNP features support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v3 07/22] x86/sev: Add a helper for the PVALIDATE instruction
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v3 05/22] x86/sev: Add support for hypervisor feature VMGEXIT
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v3 06/22] x86/sev: check SEV-SNP features support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v3 05/22] x86/sev: Add support for hypervisor feature VMGEXIT
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v3 04/22] x86/mm: Add sev_feature_enabled() helper
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 0/2] firmware: dmi_scan: Make it work in kexec'ed kernel
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH v2 1/2] drivers/firmware: move x86 Generic System Framebuffers support
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH Part1 RFC v3 21/22] x86/sev: Register SNP guest request platform device
- From: Sergio Lopez <slp@xxxxxxxxxx>
- Re: [PATCH v2 0/2] allow simple{fb,drm} drivers to be used on non-x86 EFI platforms
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH v2 0/2] allow simple{fb,drm} drivers to be used on non-x86 EFI platforms
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v3 03/22] x86/sev: Save the negotiated GHCB version
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 1/3] x86/setup: always reserve the first 1M of RAM
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH Part1 RFC v3 19/22] x86/sev-snp: SEV-SNP AP creation support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v3 15/22] KVM: SVM: define new SEV_FEATURES field in the VMCB Save State Area
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v3 16/22] KVM: SVM: Create a separate mapping for the SEV-ES save area
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v3 14/22] x86/mm: Add support to validate memory when changing C-bit
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v3 09/22] x86/compressed: Register GHCB memory when SEV-SNP is active
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v3 22/22] virt: Add SEV-SNP guest driver
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v3 13/22] x86/kernel: Validate rom memory before accessing when SEV-SNP is active
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v3 08/22] x86/compressed: Add helper for validating pages in the decompression stage
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v3 21/22] x86/sev: Register SNP guest request platform device
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v3 18/22] KVM: SVM: Update the SEV-ES save area mapping
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v3 12/22] x86/kernel: Make the bss.decrypted section shared in RMP table
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v3 07/22] x86/sev: Add a helper for the PVALIDATE instruction
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v3 20/22] x86/boot: Add Confidential Computing address to setup_header
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v3 11/22] x86/sev: Add helper for validating pages in early enc attribute changes
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v3 17/22] KVM: SVM: Create a separate mapping for the GHCB save area
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v3 10/22] x86/sev: Register GHCB memory when SEV-SNP is active
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v3 06/22] x86/sev: check SEV-SNP features support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v3 05/22] x86/sev: Add support for hypervisor feature VMGEXIT
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v3 04/22] x86/mm: Add sev_feature_enabled() helper
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v3 03/22] x86/sev: Save the negotiated GHCB version
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v3 02/22] x86/sev: Define the Linux specific guest termination reasons
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v3 01/22] x86/sev: shorten GHCB terminate macro names
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v3 00/22] Add AMD Secure Nested Paging (SEV-SNP) Guest Support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v1 2/2] firmware: dmi_scan: Pass dmi_entry_point to kexec'ed kernel
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH v1 0/2] firmware: dmi_scan: Make it work in kexec'ed kernel
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/2] firmware: dmi_scan: Make it work in kexec'ed kernel
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH v1 2/2] firmware: dmi_scan: Pass dmi_entry_point to kexec'ed kernel
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH 0/3] x86/setup: always resrve the first 1M of RAM
- From: Hugh Dickins <hughd@xxxxxxxxxx>
- Re: [PATCH 1/3] x86/setup: always reserve the first 1M of RAM
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v2 2/2] drivers/firmware: consolidate EFI framebuffer setup for all arches
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- [PATCH v2 1/2] drivers/firmware: move x86 Generic System Framebuffers support
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- [PATCH v2 0/2] allow simple{fb,drm} drivers to be used on non-x86 EFI platforms
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH 1/3] x86/setup: always reserve the first 1M of RAM
- From: Baoquan He <bhe@xxxxxxxxxx>
- [PATCH 3/3] x86/crash: remove crash_reserve_low_1M()
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH 2/3] x86/setup: remove CONFIG_X86_RESERVE_LOW and reservelow options
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH 1/3] x86/setup: always reserve the first 1M of RAM
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH 0/3] x86/setup: always resrve the first 1M of RAM
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v2] x86/efi: unconditionally hold the whole low-1MB memory regions
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2] x86/efi: unconditionally hold the whole low-1MB memory regions
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v2] x86/efi: unconditionally hold the whole low-1MB memory regions
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v2] x86/efi: unconditionally hold the whole low-1MB memory regions
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2] x86/efi: unconditionally hold the whole low-1MB memory regions
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v2] x86/efi: unconditionally hold the whole low-1MB memory regions
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH v2] x86/efi: unconditionally hold the whole low-1MB memory regions
- From: Lianbo Jiang <lijiang@xxxxxxxxxx>
- Re: [PATCH 2/2] drivers/firmware: consolidate EFI framebuffer setup for all arches
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [RFC PATCH 0/3] Allow access to confidential computing secret area
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [RFC PATCH 0/3] Allow access to confidential computing secret area
- From: Andi Kleen <ak@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/3] Allow access to confidential computing secret area
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [RFC PATCH 0/3] Allow access to confidential computing secret area
- From: "Dr. David Alan Gilbert" <dgilbert@xxxxxxxxxx>
- Re: [PATCH 0/2] allow the sysfb support to be used in non-x86 arches
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH 0/2] allow the sysfb support to be used in non-x86 arches
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] x86/efi: Do not release sub-1MB memory regions when the crashkernel option is specified
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [GIT PULL] EFI updates for v5.14
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [GIT PULL] EFI fixes for v5.13-rc
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- [GIT PULL] EFI updates for v5.14
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [GIT PULL] EFI fixes for v5.13-rc
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [efi:next] BUILD SUCCESS bb11580f61b6c4ba5c35706abd927c8ac8c32852
- From: kernel test robot <lkp@xxxxxxxxx>
- [efi:urgent] BUILD SUCCESS 942859d969de7f6f7f2659a79237a758b42782da
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] x86/efi: Log 32/64-bit mismatch with kernel as an error
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 2/2] drivers/firmware: consolidate EFI framebuffer setup for all arches
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 2/2] drivers/firmware: consolidate EFI framebuffer setup for all arches
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- [PATCH 1/2] drivers/firmware: move x86 Generic System Framebuffers support
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- [PATCH 0/2] allow the sysfb support to be used in non-x86 arches
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [RFC PATCH 0/3] Allow access to confidential computing secret area
- From: Andi Kleen <ak@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/3] Allow access to confidential computing secret area
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [RFC PATCH 0/3] Allow access to confidential computing secret area
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [RFC PATCH 0/3] Allow access to confidential computing secret area
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [RFC PATCH 0/3] Allow access to confidential computing secret area
- From: Andi Kleen <ak@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/3] Allow access to confidential computing secret area
- From: "Dr. David Alan Gilbert" <dgilbert@xxxxxxxxxx>
- Re: [RFC PATCH 0/3] Allow access to confidential computing secret area
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- Re: [PATCH] arm64: efi: add check for broken efi poweroff
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] arm64: efi: add check for broken efi poweroff
- From: Shawn Guo <shawn.guo@xxxxxxxxxx>
- Re: [PATCH v10 3/7] arm64: hyperv: Add Hyper-V clocksource/clockevent support
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH] arm64: efi: add check for broken efi poweroff
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- RE: [PATCH v10 3/7] arm64: hyperv: Add Hyper-V clocksource/clockevent support
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v10 2/7] arm64: hyperv: Add Hyper-V hypercall and register access utilities
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v10 3/7] arm64: hyperv: Add Hyper-V clocksource/clockevent support
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v10 2/7] arm64: hyperv: Add Hyper-V hypercall and register access utilities
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH] arm64: efi: add check for broken efi poweroff
- From: Shawn Guo <shawn.guo@xxxxxxxxxx>
- [PATCH] x86/efi: Log 32/64-bit mismatch with kernel as an error
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- RE: [PATCH v10 3/7] arm64: hyperv: Add Hyper-V clocksource/clockevent support
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v10 2/7] arm64: hyperv: Add Hyper-V hypercall and register access utilities
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- Re: [RFC PATCH 0/3] Allow access to confidential computing secret area
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v10 2/7] arm64: hyperv: Add Hyper-V hypercall and register access utilities
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v10 3/7] arm64: hyperv: Add Hyper-V clocksource/clockevent support
- From: Mark Rutland <mark.rutland@xxxxxxx>
- RE: [PATCH v6 2/2] eif/capsule-pstore: Add capsule pstore backend
- From: Qiuxu Zhuo <qiuxu.zhuo@xxxxxxxxx>
- Re: [PATCH v10 5/7] arm64: hyperv: Initialize hypervisor on boot
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH v10 0/7] Enable Linux guests on Hyper-V on ARM64
- From: Sudeep Holla <sudeep.holla@xxxxxxx>
- [RFC PATCH 3/3] virt: Add sev_secret module to expose confidential computing secrets
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- [RFC PATCH 0/3] Allow access to confidential computing secret area
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- [RFC PATCH 2/3] efi: Reserve confidential computing secret area
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- [RFC PATCH 1/3] efi/libstub: Copy confidential computing secret area
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] EFI: Introduce the new AMD Memory Encryption GUID.
- From: Ashish Kalra <ashish.kalra@xxxxxxx>
- Re: [RFC PATCH v5 17/28] dyndbg: prevent build bugs via -DNO_DYNAMIC_DEBUG_TABLE
- From: jim.cromie@xxxxxxxxx
- [PATCH v10 7/7] Drivers: hv: Enable Hyper-V code to be built on ARM64
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v10 6/7] arm64: efi: Export screen_info
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v10 5/7] arm64: hyperv: Initialize hypervisor on boot
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v10 3/7] arm64: hyperv: Add Hyper-V clocksource/clockevent support
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v10 4/7] arm64: hyperv: Add kexec and panic handlers
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v10 1/7] asm-generic: hyperv: Fix incorrect architecture dependencies
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v10 2/7] arm64: hyperv: Add Hyper-V hypercall and register access utilities
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v10 0/7] Enable Linux guests on Hyper-V on ARM64
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- Re: [RFC PATCH v5 17/28] dyndbg: prevent build bugs via -DNO_DYNAMIC_DEBUG_TABLE
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 3/4] EFI: Introduce the new AMD Memory Encryption GUID.
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 3/4] EFI: Introduce the new AMD Memory Encryption GUID.
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: efivarfs fails with `No such device` when EFI runtime is missing
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: efivarfs fails with `No such device` when EFI runtime is missing
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- efivarfs fails with `No such device` when EFI runtime is missing
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- [RFC PATCH v5 17/28] dyndbg: prevent build bugs via -DNO_DYNAMIC_DEBUG_TABLE
- From: Jim Cromie <jim.cromie@xxxxxxxxx>
- Re: [PATCH] efi: cper: fix snprintf() use in cper_dimm_err_location()
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi/libstub: prevent read overflow in find_file_option()
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [RFC PATCH 4/4] efi/libstub: measure loaded initrd info into the TPM
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- [RFC PATCH 3/4] efi/libstub: consolidate initrd handling across architectures
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- [RFC PATCH 2/4] efi/libstub: x86/mixed: increase supported argument count
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- [RFC PATCH 1/4] efi/libstub: add prototype of efi_tcg2_protocol::hash_log_extend_event()
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- [RFC PATCH 0/4] efi/libstub: measurement initrd data loaded by the EFI stub
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH] efi: Allow EFI_MEMORY_XP and EFI_MEMORY_RO both to be cleared
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] builddeb: Support signing kernels with a Machine Owner Key
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] builddeb: Support signing kernels with a Machine Owner Key
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH] builddeb: Support signing kernels with a Machine Owner Key
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] builddeb: Support signing kernels with a Machine Owner Key
- From: "Matthew Wilcox (Oracle)" <willy@xxxxxxxxxxxxx>
- Re: [PATCH] RISC-V: Relocate the kernel relative to a DRAM base.
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] efi: Allow EFI_MEMORY_XP and EFI_MEMORY_RO both to be cleared
- From: Heiner Kallweit <hkallweit1@xxxxxxxxx>
- Re: Still required that EFI_MEMORY_XP and EFI_MEMORY_RO must not both be cleared?
- From: Heiner Kallweit <hkallweit1@xxxxxxxxx>
- Re: Still required that EFI_MEMORY_XP and EFI_MEMORY_RO must not both be cleared?
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Still required that EFI_MEMORY_XP and EFI_MEMORY_RO must not both be cleared?
- From: Heiner Kallweit <hkallweit1@xxxxxxxxx>
- Re: [PATCH] RISC-V: Relocate the kernel relative to a DRAM base.
- From: Nikita Ermakov <arei@xxxxxxxxxxxx>
- Re: [PATCH] RISC-V: Relocate the kernel relative to a DRAM base.
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] RISC-V: Relocate the kernel relative to a DRAM base.
- From: Nikita Ermakov <arei@xxxxxxxxxxxx>
- [PATCH] efi/libstub: prevent read overflow in find_file_option()
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- [PATCH] efi: cper: fix snprintf() use in cper_dimm_err_location()
- From: Rasmus Villemoes <linux@xxxxxxxxxxxxxxxxxx>
- [PATCH] efi: cper: fix scnprintf() use in cper_mem_err_location()
- From: Rasmus Villemoes <linux@xxxxxxxxxxxxxxxxxx>
- [PATCH 5/8] drivers: firmware: efi: libstub: enable generic commandline
- From: Daniel Walker <danielwa@xxxxxxxxx>
- [PATCH 0/8] generic command line v4
- From: Daniel Walker <danielwa@xxxxxxxxx>
- Re: [PATCH] x86/efi: Do not release sub-1MB memory regions when the crashkernel option is specified
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH] x86/efi: Do not release sub-1MB memory regions when the crashkernel option is specified
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH] x86/efi: Do not release sub-1MB memory regions when the crashkernel option is specified
- From: lijiang <lijiang@xxxxxxxxxx>
- Re: [PATCH] x86/efi: Do not release sub-1MB memory regions when the crashkernel option is specified
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH] x86/efi: Do not release sub-1MB memory regions when the crashkernel option is specified
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH] x86/efi: Do not release sub-1MB memory regions when the crashkernel option is specified
- From: Baoquan He <bhe@xxxxxxxxxx>
- [efi:next] BUILD SUCCESS 3a457dd105315386bc85f0af2bf08944cd7fc0dd
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 1/1] efi/dev-path-parser: Switch to use for_each_acpi_dev_match()
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] x86/efi: Do not release sub-1MB memory regions when the crashkernel option is specified
- From: lijiang <lijiang@xxxxxxxxxx>
- Re: [PATCH] x86/efi: Do not release sub-1MB memory regions when the crashkernel option is specified
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH v2 5/8] linux/arm: account for COFF headers appearing at unexpected offsets
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 5/8] linux/arm: account for COFF headers appearing at unexpected offsets
- From: Heinrich Schuchardt <xypron.glpk@xxxxxx>
- Re: [PATCH v2 3/8] efi: move MS-DOS stub out of generic PE header definition
- From: Heinrich Schuchardt <xypron.glpk@xxxxxx>
- Re: [PATCH v2 5/8] linux/arm: account for COFF headers appearing at unexpected offsets
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 3/8] efi: move MS-DOS stub out of generic PE header definition
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 5/8] linux/arm: account for COFF headers appearing at unexpected offsets
- From: Heinrich Schuchardt <xypron.glpk@xxxxxx>
- Re: [PATCH v2 3/8] efi: move MS-DOS stub out of generic PE header definition
- From: Heinrich Schuchardt <xypron.glpk@xxxxxx>
- [PATCH] x86/efi: Do not release sub-1MB memory regions when the crashkernel option is specified
- From: Lianbo Jiang <lijiang@xxxxxxxxxx>
- Re: [PATCH 6/8] drivers: firmware: efi: libstub: enable generic commandline
- From: Daniel Walker <danielwa@xxxxxxxxx>
- RE: [PATCH v9 0/7] Enable Linux guests on Hyper-V on ARM64
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v2 1/1] efi/dev-path-parser: Switch to use for_each_acpi_dev_match()
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- [PATCH v1 1/1] efi/dev-path-parser: Switch to use for_each_acpi_dev_match()
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH 6/8] drivers: firmware: efi: libstub: enable generic commandline
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- [efitools PATCH 1/1] Make.rules: enable building on riscv64
- From: Heinrich Schuchardt <xypron.glpk@xxxxxx>
- Re: [PATCH 6/8] drivers: firmware: efi: libstub: enable generic commandline
- From: Daniel Walker <danielwa@xxxxxxxxx>
- Re: [PATCH 6/8] drivers: firmware: efi: libstub: enable generic commandline
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 6/8] drivers: firmware: efi: libstub: enable generic commandline
- From: Daniel Walker <danielwa@xxxxxxxxx>
- Re: [PATCH v1 3/3] partitions/efi: Support gpt_sector parameter needed by NVIDIA Tegra devices
- From: Dmitry Osipenko <digetx@xxxxxxxxx>
- Re: [PATCH v1 3/3] partitions/efi: Support gpt_sector parameter needed by NVIDIA Tegra devices
- From: Davidlohr Bueso <dave@xxxxxxxxxxxx>
- Re: [PATCH v1 3/3] partitions/efi: Support gpt_sector parameter needed by NVIDIA Tegra devices
- From: Dmitry Osipenko <digetx@xxxxxxxxx>
- Re: [PATCH v1 3/3] partitions/efi: Support gpt_sector parameter needed by NVIDIA Tegra devices
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- [efi:next 7/8] drivers/firmware/google/gsmi.c:477:18: error: initialization of 'efi_status_t (*)(const efi_char16_t *, const efi_guid_t *, u32 *, long unsigned int *, void *)' {aka 'long unsigned int (*)(const short unsigned int *, const struct <anonymous> *, unsigned i...
- From: kernel test robot <lkp@xxxxxxxxx>
- [efi:next 7/8] drivers/firmware/google/gsmi.c:477:18: error: incompatible function pointer types initializing 'efi_get_variable_t *' (aka 'unsigned long (*)(const unsigned short *, const guid_t *, unsigned int *, unsigned long *, void *)') with an expression of type 'ef...
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v2] ia64: fix EFI_DEBUG build
- From: Sergei Trofimovich <slyfox@xxxxxxxxxx>
- [PATCH v1 3/3] partitions/efi: Support gpt_sector parameter needed by NVIDIA Tegra devices
- From: Dmitry Osipenko <digetx@xxxxxxxxx>
- [PATCH v1 0/3] Support EFI partition on NVIDIA Tegra devices
- From: Dmitry Osipenko <digetx@xxxxxxxxx>
- [PATCH v1 1/3] mmc: core: Add raw_boot_mult field to mmc_ext_csd
- From: Dmitry Osipenko <digetx@xxxxxxxxx>
- [PATCH v1 2/3] mmc: block: Add mmc_bdev_to_card() helper
- From: Dmitry Osipenko <digetx@xxxxxxxxx>
- [efi:next] BUILD REGRESSION 66d988c324a018de02a0924232c68618b6433e80
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] efi/fdt: fix panic when no valid fdt found
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 1/3] x86: Propagate $(CLANG_FLAGS) to $(REALMODE_FLAGS)
- From: John Millikin <john@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] Fix cross compiling x86 with clang
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 1/3] x86: Propagate $(CLANG_FLAGS) to $(REALMODE_FLAGS)
- From: Sedat Dilek <sedat.dilek@xxxxxxxxx>
- [PATCH 3/3] efi/libstub: Add $(CLANG_FLAGS) to x86 flags
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- [PATCH 2/3] x86/boot: Add $(CLANG_FLAGS) to compressed KBUILD_CFLAGS
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- [PATCH 1/3] x86: Propagate $(CLANG_FLAGS) to $(REALMODE_FLAGS)
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- [PATCH 0/3] Fix cross compiling x86 with clang
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- RE: [PATCH v9 1/7] smccc: Add HVC call variant with result registers other than 0 thru 3
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v9 1/7] smccc: Add HVC call variant with result registers other than 0 thru 3
- From: Mark Rutland <mark.rutland@xxxxxxx>
- RE: [PATCH v9 1/7] smccc: Add HVC call variant with result registers other than 0 thru 3
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v9 1/7] smccc: Add HVC call variant with result registers other than 0 thru 3
- From: Mark Rutland <mark.rutland@xxxxxxx>
- RE: [PATCH v9 0/7] Enable Linux guests on Hyper-V on ARM64
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH] efi/fdt: fix panic when no valid fdt found
- From: Changbin Du <changbin.du@xxxxxxxxx>
- Re: [PATCH v2 0/7] Generic Command Line changes
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH] ia64: fix EFI_DEBUG build
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] ia64: fix EFI_DEBUG build
- From: Sergei Trofimovich <slyfox@xxxxxxxxxx>
- Re: [PATCH] ia64: fix EFI_DEBUG build
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] ia64: fix EFI_DEBUG build
- From: Sergei Trofimovich <slyfox@xxxxxxxxxx>
- [efi:next 4/6] drivers/firmware/google/gsmi.c:477:18: error: initialization of 'efi_status_t efi_char16_t const efi_guid_t u32 long unsigned int void {aka 'long unsigned int short unsigned int const struct <anonymous> unsigned i...
- From: kernel test robot <lkp@xxxxxxxxx>
- [efi:urgent] BUILD SUCCESS fb98cc0b3af2ba4d87301dff2b381b12eee35d7d
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [GIT PULL] More EFI fixes for v5.12-rc
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- [GIT PULL] More EFI fixes for v5.12-rc
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [efi:urgent] BUILD SUCCESS 70b3fcb4df36c4e4f5b99692d5a68adf9ffe7e78
- From: kernel test robot <lkp@xxxxxxxxx>
- [efi:next] BUILD SUCCESS d272258400e00e203ef6d9ba5b8620d5582889b2
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2] efi: use 32-bit alignment for efi_guid_t literals
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH v2] efi: use 32-bit alignment for efi_guid_t literals
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- [PATCH v2] efi: use 32-bit alignment for efi_guid_t literals
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] firmware/efi: Fix a use after bug in efi_mem_reserve_persistent
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi: use 32-bit alignment for efi_guid_t literals
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [efi:next] BUILD SUCCESS 3cfafc4b8f12ebf4b9b6bd85f41353012c5441f3
- From: kernel test robot <lkp@xxxxxxxxx>
- [efi:next 3/6] arch/x86/boot/compressed/acpi.c:58:41: sparse: sparse: cast truncates bits from constant value (eb9d2d30 becomes 30)
- From: kernel test robot <lkp@xxxxxxxxx>
- [efi:urgent] BUILD SUCCESS 31bc510eb86b1a10c12281ce823d22aeb3c6275f
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [RFC] efi: variable name size limit in efivar_init()
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC] efi: variable name size limit in efivar_init()
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [RFC] efi: variable name size limit in efivar_init()
- From: Heinrich Schuchardt <xypron.glpk@xxxxxx>
- Re: [PATCH] efi: stub: override RT_PROP table supported mask based on EFI variable
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi: stub: override RT_PROP table supported mask based on EFI variable
- From: Shawn Guo <shawn.guo@xxxxxxxxxx>
- [efi:urgent] BUILD SUCCESS 854941b1caf5432705e5f3b3afbcea20107a5dc7
- From: kernel test robot <lkp@xxxxxxxxx>
- [efi:next 3/4] arch/x86/platform/efi/efi_64.c:163:23: error: passing 'const void to parameter of type 'volatile void discards qualifiers
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] efi: stub: override RT_PROP table supported mask based on EFI variable
- From: Heinrich Schuchardt <xypron.glpk@xxxxxx>
- Re: [PATCH] efi: stub: override RT_PROP table supported mask based on EFI variable
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi: stub: override RT_PROP table supported mask based on EFI variable
- From: Heinrich Schuchardt <xypron.glpk@xxxxxx>
- Re: [PATCH] efi: stub: override RT_PROP table supported mask based on EFI variable
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi: stub: override RT_PROP table supported mask based on EFI variable
- From: Heinrich Schuchardt <xypron.glpk@xxxxxx>
- Re: [PATCH] efi: stub: override RT_PROP table supported mask based on EFI variable
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi: stub: override RT_PROP table supported mask based on EFI variable
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH] efi: stub: override RT_PROP table supported mask based on EFI variable
- From: Shawn Guo <shawn.guo@xxxxxxxxxx>
- Re: [PATCH] efi: stub: override RT_PROP table supported mask based on EFI variable
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH] efi: stub: override RT_PROP table supported mask based on EFI variable
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi: stub: override RT_PROP table supported mask based on EFI variable
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH] efi: stub: override RT_PROP table supported mask based on EFI variable
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi: stub: override RT_PROP table supported mask based on EFI variable
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi: stub: override RT_PROP table supported mask based on EFI variable
- From: Shawn Guo <shawn.guo@xxxxxxxxxx>
- Re: [PATCH] efi: stub: override RT_PROP table supported mask based on EFI variable
- From: Heinrich Schuchardt <xypron.glpk@xxxxxx>
- RE: [PATCH v9 2/7] arm64: hyperv: Add Hyper-V hypercall and register access utilities
- From: Sunil Muthuswamy <sunilmut@xxxxxxxxxxxxx>
- RE: [PATCH v9 5/7] arm64: hyperv: Initialize hypervisor on boot
- From: Sunil Muthuswamy <sunilmut@xxxxxxxxxxxxx>
- Re: [PATCH] efi: stub: override RT_PROP table supported mask based on EFI variable
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi: stub: override RT_PROP table supported mask based on EFI variable
- From: Shawn Guo <shawn.guo@xxxxxxxxxx>
- Re: [GIT PULL] efi/urgent for v5.12-rc3
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] efi/urgent for v5.12-rc3
- From: Borislav Petkov <bp@xxxxxxx>
- [efi:next 2/4] arch/ia64/kernel/efi.c:61:10: sparse: sparse: cast truncates bits from constant value (43ea58dc becomes dc)
- From: kernel test robot <lkp@xxxxxxxxx>
- [efi:next] BUILD SUCCESS WITH WARNING e233b65935c946ba420ba1b5a42f9b5625861da8
- From: kernel test robot <lkp@xxxxxxxxx>
- [efi:next 3/4] arch/x86/platform/efi/efi_64.c:163:23: warning: passing argument 1 of 'virt_to_phys' discards 'const' qualifier from pointer target type
- From: kernel test robot <lkp@xxxxxxxxx>
- [efi:urgent] BUILD SUCCESS db9b21d7497cac1f4ff45af10f24d03f9194ebee
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 1/8] linux/arm: fix ARM Linux header layout
- From: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
- Re: [PATCH] efi: use 32-bit alignment for efi_guid_t literals
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH V2] arm64/mm: Fix __enable_mmu() for new TGRAN range values
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH] firmware/efi: Fix a use after bug in efi_mem_reserve_persistent
- From: Lv Yunlong <lyl2019@xxxxxxxxxxxxxxxx>
- Re: [PATCH] efi: use 32-bit alignment for efi_guid_t literals
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] efi: use 32-bit alignment for efi_guid_t literals
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH V2] arm64/mm: Fix __enable_mmu() for new TGRAN range values
- From: Anshuman Khandual <anshuman.khandual@xxxxxxx>
- Re: [PATCH] efi: stub: override RT_PROP table supported mask based on EFI variable
- From: Rob Clark <robdclark@xxxxxxxxx>
- Re: [PATCH] efi: stub: override RT_PROP table supported mask based on EFI variable
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi: stub: override RT_PROP table supported mask based on EFI variable
- From: Rob Clark <robdclark@xxxxxxxxx>
- Re: [PATCH] arm64/mm: Fix __enable_mmu() for new TGRAN range values
- From: Anshuman Khandual <anshuman.khandual@xxxxxxx>
- Re: [PATCH] arm64/mm: Fix __enable_mmu() for new TGRAN range values
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH] efi: stub: override RT_PROP table supported mask based on EFI variable
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 7/7] CMDLINE: x86: convert to generic builtin command line
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi: stub: override RT_PROP table supported mask based on EFI variable
- From: Shawn Guo <shawn.guo@xxxxxxxxxx>
- Re: [PATCH v2 0/7] Generic Command Line changes
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH v2 7/7] CMDLINE: x86: convert to generic builtin command line
- From: Daniel Walker <danielwa@xxxxxxxxx>
- [PATCH v2 0/7] Generic Command Line changes
- From: Daniel Walker <danielwa@xxxxxxxxx>
- [PATCH v2 0/7] Generic Command Line changes
- From: Daniel Walker <danielwa@xxxxxxxxx>
- [PATCH v9 7/7] Drivers: hv: Enable Hyper-V code to be built on ARM64
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v9 3/7] arm64: hyperv: Add Hyper-V clocksource/clockevent support
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v9 0/7] Enable Linux guests on Hyper-V on ARM64
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v9 5/7] arm64: hyperv: Initialize hypervisor on boot
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v9 6/7] arm64: efi: Export screen_info
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v9 4/7] arm64: hyperv: Add kexec and panic handlers
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v9 2/7] arm64: hyperv: Add Hyper-V hypercall and register access utilities
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v9 1/7] smccc: Add HVC call variant with result registers other than 0 thru 3
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH] arm64/mm: Fix __enable_mmu() for new TGRAN range values
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH] arm64/mm: Fix __enable_mmu() for new TGRAN range values
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH] efi: stub: override RT_PROP table supported mask based on EFI variable
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] arm64/mm: Fix __enable_mmu() for new TGRAN range values
- From: Will Deacon <will@xxxxxxxxxx>
- [efi:next] BUILD SUCCESS af6e3e61fe5623a7890807b0b13004ecb876fa1f
- From: kernel test robot <lkp@xxxxxxxxx>
- [efi:urgent] BUILD SUCCESS 9e9888a0fe97b9501a40f717225d2bef7100a2c1
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] efi: memmap insertion should adjust the vaddr as well
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi/apple-properties: Handle device properties with software node API
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [efi:next] BUILD SUCCESS 4e6f211fadf42a9f1a36c7058e6853bf594b433a
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] arm64/mm: Fix __enable_mmu() for new TGRAN range values
- From: Anshuman Khandual <anshuman.khandual@xxxxxxx>
- Re: [PATCH] efi: stub: override RT_PROP table supported mask based on EFI variable
- From: Shawn Guo <shawn.guo@xxxxxxxxxx>
- [GIT PULL] EFI fix for v5.12-rc2
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] efi: stub: override RT_PROP table supported mask based on EFI variable
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 0/1] use RT_PROPERTIES table to implement efi=novamap
- From: Shawn Guo <shawn.guo@xxxxxxxxxx>
- Re: [PATCH 1/1] efi: stub: omit SetVirtualAddressMap() if marked unsupported in RT_PROP table
- From: Shawn Guo <shawn.guo@xxxxxxxxxx>
- RE: [PATCH v8 4/6] arm64: hyperv: Initialize hypervisor on boot
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v8 1/6] arm64: hyperv: Add Hyper-V hypercall and register access utilities
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v8 1/6] arm64: hyperv: Add Hyper-V hypercall and register access utilities
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v8 1/6] arm64: hyperv: Add Hyper-V hypercall and register access utilities
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH] arm64/mm: Fix __enable_mmu() for new TGRAN range values
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [PATCH] arm64/mm: Fix __enable_mmu() for new TGRAN range values
- From: Anshuman Khandual <anshuman.khandual@xxxxxxx>
- Re: [PATCH 0/1] use RT_PROPERTIES table to implement efi=novamap
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 0/1] use RT_PROPERTIES table to implement efi=novamap
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 1/1] efi: stub: omit SetVirtualAddressMap() if marked unsupported in RT_PROP table
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] arm64: efi: add check for broken efi poweroff
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] arm64: efi: add check for broken efi poweroff
- From: Shawn Guo <shawn.guo@xxxxxxxxxx>
- Re: [PATCH] arm64: efi: add check for broken efi poweroff
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] arm64: efi: add check for broken efi poweroff
- From: Shawn Guo <shawn.guo@xxxxxxxxxx>
- Re: [PATCH] arm64: efi: add check for broken efi poweroff
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] arm64: efi: add check for broken efi poweroff
- From: Shawn Guo <shawn.guo@xxxxxxxxxx>
- Re: [PATCH] efi/apple-properties: Handle device properties with software node API
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH] efi/apple-properties: Handle device properties with software node API
- From: Heikki Krogerus <heikki.krogerus@xxxxxxxxxxxxxxx>
- Re: [PATCH] efi/apple-properties: Handle device properties with software node API
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 5/5] CMDLINE: x86: convert to generic builtin command line
- From: Daniel Walker <danielwa@xxxxxxxxx>
- RE: [PATCH v8 3/6] arm64: hyperv: Add kexec and panic handlers
- From: Sunil Muthuswamy <sunilmut@xxxxxxxxxxxxx>
- RE: [PATCH v8 4/6] arm64: hyperv: Initialize hypervisor on boot
- From: Sunil Muthuswamy <sunilmut@xxxxxxxxxxxxx>
- RE: [PATCH v8 2/6] arm64: hyperv: Add Hyper-V clocksource/clockevent support
- From: Sunil Muthuswamy <sunilmut@xxxxxxxxxxxxx>
- RE: [PATCH v8 6/6] Drivers: hv: Enable Hyper-V code to be built on ARM64
- From: Sunil Muthuswamy <sunilmut@xxxxxxxxxxxxx>
- RE: [PATCH v8 1/6] arm64: hyperv: Add Hyper-V hypercall and register access utilities
- From: Sunil Muthuswamy <sunilmut@xxxxxxxxxxxxx>
- RE: [PATCH v8 1/6] arm64: hyperv: Add Hyper-V hypercall and register access utilities
- From: Sunil Muthuswamy <sunilmut@xxxxxxxxxxxxx>
- Re: [PATCH] drivers: firmware: efi: fix Kconfig dependency on CRYPTO
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] drivers: firmware: efi: fix Kconfig dependency on CRYPTO
- From: Julian Braha <julianbraha@xxxxxxxxx>
- [PATCH] efi: memmap insertion should adjust the vaddr as well
- From: Kairui Song <kasong@xxxxxxxxxx>
- Re: [PATCH v8 1/6] arm64: hyperv: Add Hyper-V hypercall and register access utilities
- From: Boqun Feng <boqun.feng@xxxxxxxxx>
- Re: [PATCH v8 1/6] arm64: hyperv: Add Hyper-V hypercall and register access utilities
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [GIT PULL] EFI updates for v5.12
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH 1/1] efi/efivars: ConInDev, ConOutDev, ConErrDev are volatile
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] drivers: firmware: fix kconfig dependency on CRYPTO
- From: Julian Braha <julianbraha@xxxxxxxxx>
- Re: [PATCH v8 2/6] arm64: hyperv: Add Hyper-V clocksource/clockevent support
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v8 2/6] arm64: hyperv: Add Hyper-V clocksource/clockevent support
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v8 6/6] Drivers: hv: Enable Hyper-V code to be built on ARM64
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v8 5/6] arm64: efi: Export screen_info
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v8 2/6] arm64: hyperv: Add Hyper-V clocksource/clockevent support
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v8 4/6] arm64: hyperv: Initialize hypervisor on boot
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v8 3/6] arm64: hyperv: Add kexec and panic handlers
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v8 1/6] arm64: hyperv: Add Hyper-V hypercall and register access utilities
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v8 0/6] Enable Linux guests on Hyper-V on ARM64
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH 1/1] efi/efivars: ConInDev, ConOutDev, ConErrDev are volatile
- From: Heinrich Schuchardt <xypron.glpk@xxxxxx>
- [GIT PULL] EFI updates for v5.12
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [PATCH v2 14/14] x86/fault, x86/efi: Fix and rename efi_recover_from_page_fault()
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 14/14] x86/fault, x86/efi: Fix and rename efi_recover_from_page_fault()
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [RFC PATCH 12/17] gcc-plugins: objtool: Add plugin to detect switch table on arm64
- From: Daniel Kiss <Daniel.Kiss@xxxxxxx>
- Re: [PATCH] docs: update EFI stub description
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- [PATCH AUTOSEL 5.10 36/36] x86/efi: Remove EFI PGD build time checks
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH] docs: update EFI stub description
- From: Heinrich Schuchardt <xypron.glpk@xxxxxx>
- Re: [PATCH] x86/efi: Remove EFI PGD build time checks
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH] x86/efi: Remove EFI PGD build time checks
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH] x86: efi: avoid BUILD_BUG_ON() for non-constant p4d_index
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH] x86: efi: avoid BUILD_BUG_ON() for non-constant p4d_index
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH] x86/efi: Remove EFI PGD build time checks
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] x86/efi: Remove EFI PGD build time checks
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] x86: efi: avoid BUILD_BUG_ON() for non-constant p4d_index
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] x86: efi: avoid BUILD_BUG_ON() for non-constant p4d_index
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH] x86: efi: avoid BUILD_BUG_ON() for non-constant p4d_index
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] x86: efi: avoid BUILD_BUG_ON() for non-constant p4d_index
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH] x86: efi: avoid BUILD_BUG_ON() for non-constant p4d_index
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH] x86: efi: avoid BUILD_BUG_ON() for non-constant p4d_index
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] x86: efi: avoid BUILD_BUG_ON() for non-constant p4d_index
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 1/3] printk: use CONFIG_CONSOLE_LOGLEVEL_* directly
- From: Petr Mladek <pmladek@xxxxxxxx>
- Re: [PATCH] efi: ia64: move IA64-only declarations to new asm/efi.h header
- From: John Paul Adrian Glaubitz <glaubitz@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] efi: ia64: move IA64-only declarations to new asm/efi.h header
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi: ia64: move IA64-only declarations to new asm/efi.h header
- From: John Paul Adrian Glaubitz <glaubitz@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] efi: ia64: move IA64-only declarations to new asm/efi.h header
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi: ia64: move IA64-only declarations to new asm/efi.h header
- From: John Paul Adrian Glaubitz <glaubitz@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] efi: ia64: move IA64-only declarations to new asm/efi.h header
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi: ia64: move IA64-only declarations to new asm/efi.h header
- From: John Paul Adrian Glaubitz <glaubitz@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] printk: use CONFIG_CONSOLE_LOGLEVEL_* directly
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH] x86: efi: avoid BUILD_BUG_ON() for non-constant p4d_index
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] x86: efi: avoid BUILD_BUG_ON() for non-constant p4d_index
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH 1/3] printk: use CONFIG_CONSOLE_LOGLEVEL_* directly
- From: Petr Mladek <pmladek@xxxxxxxx>
- Re: [RFC PATCH 12/17] gcc-plugins: objtool: Add plugin to detect switch table on arm64
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [RFC PATCH 12/17] gcc-plugins: objtool: Add plugin to detect switch table on arm64
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [RFC PATCH 12/17] gcc-plugins: objtool: Add plugin to detect switch table on arm64
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [RFC PATCH 12/17] gcc-plugins: objtool: Add plugin to detect switch table on arm64
- From: Julien Thierry <jthierry@xxxxxxxxxx>
- Re: [RFC PATCH 00/12] Introduce sv48 support without relocable kernel
- From: Palmer Dabbelt <palmer@xxxxxxxxxxx>
- Re: [RFC PATCH 12/17] gcc-plugins: objtool: Add plugin to detect switch table on arm64
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [RFC PATCH 12/17] gcc-plugins: objtool: Add plugin to detect switch table on arm64
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [RFC PATCH 12/17] gcc-plugins: objtool: Add plugin to detect switch table on arm64
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH 1/3] printk: use CONFIG_CONSOLE_LOGLEVEL_* directly
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [RFC PATCH 12/17] gcc-plugins: objtool: Add plugin to detect switch table on arm64
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [RFC PATCH 12/17] gcc-plugins: objtool: Add plugin to detect switch table on arm64
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- RE: [RFC PATCH 12/17] gcc-plugins: objtool: Add plugin to detect switch table on arm64
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH 1/3] printk: use CONFIG_CONSOLE_LOGLEVEL_* directly
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] printk: use CONFIG_CONSOLE_LOGLEVEL_* directly
- From: Sergey Senozhatsky <sergey.senozhatsky@xxxxxxxxx>
- Re: [RFC PATCH 12/17] gcc-plugins: objtool: Add plugin to detect switch table on arm64
- From: Julien Thierry <jthierry@xxxxxxxxxx>
- Re: [PATCH 1/3] printk: use CONFIG_CONSOLE_LOGLEVEL_* directly
- From: John Ogness <john.ogness@xxxxxxxxxxxxx>
- [PATCH 1/3] printk: use CONFIG_CONSOLE_LOGLEVEL_* directly
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [RFC PATCH 12/17] gcc-plugins: objtool: Add plugin to detect switch table on arm64
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [RFC PATCH 12/17] gcc-plugins: objtool: Add plugin to detect switch table on arm64
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [RFC PATCH 12/17] gcc-plugins: objtool: Add plugin to detect switch table on arm64
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- [GIT PULL] efi/urgent for v5.11-rc6
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [RFC PATCH 00/12] Introduce sv48 support without relocable kernel
- From: Alex Ghiti <alex@xxxxxxxx>
- Re: [RFC PATCH 12/17] gcc-plugins: objtool: Add plugin to detect switch table on arm64
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [RFC PATCH 00/17] objtool: add base support for arm64
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 12/17] gcc-plugins: objtool: Add plugin to detect switch table on arm64
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [RFC PATCH 12/17] gcc-plugins: objtool: Add plugin to detect switch table on arm64
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [GIT PULL] EFI changes for v5.12
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [GIT PULL] EFI fix for v5.11
- From: Borislav Petkov <bp@xxxxxxxxx>
- [GIT PULL] EFI fix for v5.11
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [GIT PULL] EFI changes for v5.12
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH 00/17] objtool: add base support for arm64
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [RFC PATCH 00/17] objtool: add base support for arm64
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 00/17] objtool: add base support for arm64
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH 00/17] objtool: add base support for arm64
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 00/17] objtool: add base support for arm64
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 00/17] objtool: add base support for arm64
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH 00/17] objtool: add base support for arm64
- From: Mark Brown <broonie@xxxxxxxxxx>
- [efi:next] BUILD SUCCESS 1c761ee9da1ac6ba7e40d14457fac94c87eaff35
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [RFC PATCH 00/17] objtool: add base support for arm64
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [RFC PATCH 00/17] objtool: add base support for arm64
- From: Julien Thierry <jthierry@xxxxxxxxxx>
- Re: [RFC PATCH 00/17] objtool: add base support for arm64
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [RFC PATCH 00/17] objtool: add base support for arm64
- From: Julien Thierry <jthierry@xxxxxxxxxx>
- Re: [RFC PATCH 00/17] objtool: add base support for arm64
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH 00/17] objtool: add base support for arm64
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [RFC PATCH 00/17] objtool: add base support for arm64
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH 00/17] objtool: add base support for arm64
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [RFC PATCH 16/17] objtool: arm64: Ignore replacement section for alternative callback
- From: Julien Thierry <jthierry@xxxxxxxxxx>
- [RFC PATCH 11/17] efi: libstub: Ignore relocations for .discard sections
- From: Julien Thierry <jthierry@xxxxxxxxxx>
- [RFC PATCH 10/17] objtool: arm64: Accept padding in code sections
- From: Julien Thierry <jthierry@xxxxxxxxxx>
- [RFC PATCH 08/17] objtool: arm64: Decode load/store instructions
- From: Julien Thierry <jthierry@xxxxxxxxxx>
- [RFC PATCH 07/17] objtool: arm64: Decode other system instructions
- From: Julien Thierry <jthierry@xxxxxxxxxx>
- [RFC PATCH 06/17] objtool: arm64: Decode jump and call related instructions
- From: Julien Thierry <jthierry@xxxxxxxxxx>
- [RFC PATCH 05/17] objtool: arm64: Decode add/sub instructions
- From: Julien Thierry <jthierry@xxxxxxxxxx>
- [RFC PATCH 04/17] objtool: arm64: Add base definition for arm64 backend
- From: Julien Thierry <jthierry@xxxxxxxxxx>
- [RFC PATCH 02/17] tools: arm64: Make aarch64 instruction decoder available to tools
- From: Julien Thierry <jthierry@xxxxxxxxxx>
- [RFC PATCH 01/17] tools: Add some generic functions and headers
- From: Julien Thierry <jthierry@xxxxxxxxxx>
- [RFC PATCH 15/17] objtool: arm64: Handle supported relocations in alternatives
- From: Julien Thierry <jthierry@xxxxxxxxxx>
- [RFC PATCH 13/17] objtool: arm64: Implement functions to add switch tables alternatives
- From: Julien Thierry <jthierry@xxxxxxxxxx>
- [RFC PATCH 17/17] objtool: arm64: Enable stack validation for arm64
- From: Julien Thierry <jthierry@xxxxxxxxxx>
- [RFC PATCH 12/17] gcc-plugins: objtool: Add plugin to detect switch table on arm64
- From: Julien Thierry <jthierry@xxxxxxxxxx>
- [RFC PATCH 14/17] objtool: arm64: Cache section with switch table information
- From: Julien Thierry <jthierry@xxxxxxxxxx>
- [RFC PATCH 09/17] objtool: arm64: Decode LDR instructions
- From: Julien Thierry <jthierry@xxxxxxxxxx>
- [RFC PATCH 00/17] objtool: add base support for arm64
- From: Julien Thierry <jthierry@xxxxxxxxxx>
- [RFC PATCH 03/17] tools: bug: Remove duplicate definition
- From: Julien Thierry <jthierry@xxxxxxxxxx>
- Re: [PATCH v2] efi/arm64: Update debug prints to reflect other entropy sources
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2] efi/arm64: Update debug prints to reflect other entropy sources
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH] efi/arm64: Update debug prints to reflect other entropy sources
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH] x86: efi: avoid BUILD_BUG_ON() for non-constant p4d_index
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] x86: efi: avoid BUILD_BUG_ON() for non-constant p4d_index
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH] x86: efi: avoid BUILD_BUG_ON() for non-constant p4d_index
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH] x86: efi: avoid BUILD_BUG_ON() for non-constant p4d_index
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi/arm64: Update debug prints to reflect other entropy sources
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [efi:next] BUILD SUCCESS 514b1a8477d25a157f65bf52a443f8ffcc2eb54e
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH] efi/arm64: Update debug prints to reflect other entropy sources
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH 1/2] efi: x86: move mixed mode stack PA variable out of 'efi_scratch'
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 2/2] efi: x86: clean up previous struct mm switching
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [efi:next] BUILD SUCCESS c90dd16f9fe2eb1d749d41d144695ee188bfce01
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] x86: efi: avoid BUILD_BUG_ON() for non-constant p4d_index
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH] x86: efi: avoid BUILD_BUG_ON() for non-constant p4d_index
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH] efi: ia64: move IA64-only declarations to new asm/efi.h header
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] x86: efi: avoid BUILD_BUG_ON() for non-constant p4d_index
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] x86: efi: avoid BUILD_BUG_ON() for non-constant p4d_index
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH] x86: efi: avoid BUILD_BUG_ON() for non-constant p4d_index
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH] x86: efi: avoid BUILD_BUG_ON() for non-constant p4d_index
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH] x86: efi: avoid BUILD_BUG_ON() for non-constant p4d_index
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCH] x86: efi: avoid BUILD_BUG_ON() for non-constant p4d_index
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] x86: efi: avoid BUILD_BUG_ON() for non-constant p4d_index
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH] x86: efi: avoid BUILD_BUG_ON() for non-constant p4d_index
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH] x86: efi: avoid BUILD_BUG_ON() for non-constant p4d_index
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] x86: efi: avoid BUILD_BUG_ON() for non-constant p4d_index
- From: Nathan Chancellor <natechancellor@xxxxxxxxx>
- Re: [PATCH] x86: efi: avoid BUILD_BUG_ON() for non-constant p4d_index
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH 1/1] efi/efi_test: read Revision
- From: Heinrich Schuchardt <xypron.glpk@xxxxxx>
- Re: [PATCH] certs: Add EFI_CERT_X509_GUID support for dbx entries
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] x86: efi: avoid BUILD_BUG_ON() for non-constant p4d_index
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] certs: Add EFI_CERT_X509_GUID support for dbx entries
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] certs: Add EFI_CERT_X509_GUID support for dbx entries
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] x86: efi: avoid BUILD_BUG_ON() for non-constant p4d_index
- From: Nathan Chancellor <natechancellor@xxxxxxxxx>
- [PATCH] x86: efi: avoid BUILD_BUG_ON() for non-constant p4d_index
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCH v2 16/17] driver core: Refactor fw_devlink feature
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- Re: [RFC PATCH 01/12] riscv: Move kernel mapping outside of linear mapping
- From: Alex Ghiti <alex@xxxxxxxx>
- Re: [RFC PATCH 01/12] riscv: Move kernel mapping outside of linear mapping
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 04/12] riscv: Allow to dynamically define VA_BITS
- From: Alex Ghiti <alex@xxxxxxxx>
- Re: [RFC PATCH 01/12] riscv: Move kernel mapping outside of linear mapping
- From: Alex Ghiti <alex@xxxxxxxx>
- Re: [PATCH v2 16/17] driver core: Refactor fw_devlink feature
- From: Michael Walle <michael@xxxxxxxx>
- Re: [PATCH v2 16/17] driver core: Refactor fw_devlink feature
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- Re: [RFC PATCH 04/12] riscv: Allow to dynamically define VA_BITS
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 02/12] riscv: Protect the kernel linear mapping
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 01/12] riscv: Move kernel mapping outside of linear mapping
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- [RFC PATCH 02/12] riscv: Protect the kernel linear mapping
- From: Alexandre Ghiti <alex@xxxxxxxx>
- [RFC PATCH 12/12] riscv: Improve virtual kernel memory layout dump
- From: Alexandre Ghiti <alex@xxxxxxxx>
- [RFC PATCH 11/12] riscv: Explicit comment about user virtual address space size
- From: Alexandre Ghiti <alex@xxxxxxxx>
- [RFC PATCH 10/12] riscv: Use pgtable_l4_enabled to output mmu type in cpuinfo
- From: Alexandre Ghiti <alex@xxxxxxxx>
- [RFC PATCH 09/12] riscv: Allow user to downgrade to sv39 when hw supports sv48
- From: Alexandre Ghiti <alex@xxxxxxxx>
- [RFC PATCH 08/12] riscv: Implement sv48 support
- From: Alexandre Ghiti <alex@xxxxxxxx>
- [RFC PATCH 07/12] asm-generic: Prepare for riscv use of pud_alloc_one and pud_free
- From: Alexandre Ghiti <alex@xxxxxxxx>
- [RFC PATCH 06/12] riscv: Prepare ptdump for vm layout dynamic addresses
- From: Alexandre Ghiti <alex@xxxxxxxx>
- [RFC PATCH 05/12] riscv: Simplify MAXPHYSMEM config
- From: Alexandre Ghiti <alex@xxxxxxxx>
- [RFC PATCH 04/12] riscv: Allow to dynamically define VA_BITS
- From: Alexandre Ghiti <alex@xxxxxxxx>
- [RFC PATCH 03/12] riscv: Get rid of compile time logic with MAX_EARLY_MAPPING_SIZE
- From: Alexandre Ghiti <alex@xxxxxxxx>
- [RFC PATCH 01/12] riscv: Move kernel mapping outside of linear mapping
- From: Alexandre Ghiti <alex@xxxxxxxx>
- [RFC PATCH 00/12] Introduce sv48 support without relocable kernel
- From: Alexandre Ghiti <alex@xxxxxxxx>
- [efi:urgent] BUILD SUCCESS 355845b738e76445c8522802552146d96cb4afa7
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2] efi/apple-properties: Reinstate support for boolean properties
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2] efi/apple-properties: Reinstate support for boolean properties
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH 1/1] efi/efi_test: read RuntimeServicesSupported
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 16/17] driver core: Refactor fw_devlink feature
- From: Michael Walle <michael@xxxxxxxx>
- Re: [PATCH] efi/apple-properties: Reinstate support for boolean properties
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- [PATCH] efi/apple-properties: Reinstate support for boolean properties
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH 1/1] efi/efi_test: read RuntimeServicesSupported
- From: Heinrich Schuchardt <xypron.glpk@xxxxxx>
[Index of Archives]
[Linux Kernel Development]
[Security]
[Linux ARM Kernel]
[Tools]
[Linux MIPS]
[Linux S390]
[Bugtraq]
[Share Photos]>
[Fedora ARM]