Linux EFI/UEFI Development
[Prev Page][Next Page]
- Re: [PATCH] efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption
- From: Usama Arif <usamaarif642@xxxxxxxxx>
- Re: [PATCH] efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption
- From: Gregory Price <gourry@xxxxxxxxxx>
- Re: [PATCH v5 05/16] x86/cpu: Defer CR pinning setup until after EFI initialization
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 03/16] x86/alternatives: Disable LASS when patching kernel alternatives
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 04/16] init/main.c: Move EFI runtime service initialization to x86/cpu
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v5 00/16] Enable Linear Address Space Separation support
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- Re: [PATCH] efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption
- From: Jiri Slaby <jirislaby@xxxxxxxxxx>
- Re: [PATCH v5 05/16] x86/cpu: Defer CR pinning setup until after EFI initialization
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH v5 11/16] x86/vsyscall: Document the fact that vsyscall=emulate disables LASS
- From: Sohil Mehta <sohil.mehta@xxxxxxxxx>
- RE: [PATCH v5 05/16] x86/cpu: Defer CR pinning setup until after EFI initialization
- From: "Luck, Tony" <tony.luck@xxxxxxxxx>
- Re: [PATCH v5 05/16] x86/cpu: Defer CR pinning setup until after EFI initialization
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH v5 05/16] x86/cpu: Defer CR pinning setup until after EFI initialization
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH v5 05/16] x86/cpu: Defer CR pinning setup until after EFI initialization
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- RE: [PATCH v5 05/16] x86/cpu: Defer CR pinning setup until after EFI initialization
- From: "Luck, Tony" <tony.luck@xxxxxxxxx>
- Re: [PATCH v5 05/16] x86/cpu: Defer CR pinning setup until after EFI initialization
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v5 04/16] init/main.c: Move EFI runtime service initialization to x86/cpu
- From: Sohil Mehta <sohil.mehta@xxxxxxxxx>
- RE: [PATCH v5 05/16] x86/cpu: Defer CR pinning setup until after EFI initialization
- From: "Luck, Tony" <tony.luck@xxxxxxxxx>
- Re: [PATCH v5 05/16] x86/cpu: Defer CR pinning setup until after EFI initialization
- From: Sohil Mehta <sohil.mehta@xxxxxxxxx>
- Re: [PATCH v5 01/16] x86/cpu: Enumerate the LASS feature bits
- From: Sohil Mehta <sohil.mehta@xxxxxxxxx>
- Re: [PATCH v5 03/16] x86/alternatives: Disable LASS when patching kernel alternatives
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v5 00/16] Enable Linear Address Space Separation support
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH v5 06/16] efi: Disable LASS around set_virtual_address_map call
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 01/16] x86/cpu: Enumerate the LASS feature bits
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 03/16] x86/alternatives: Disable LASS when patching kernel alternatives
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v5 16/16] Revert "x86/lam: Disable ADDRESS_MASKING in most cases"
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 16/16] Revert "x86/lam: Disable ADDRESS_MASKING in most cases"
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH v5 03/16] x86/alternatives: Disable LASS when patching kernel alternatives
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH v5 16/16] Revert "x86/lam: Disable ADDRESS_MASKING in most cases"
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v5 15/16] x86/cpu: Enable LASS during CPU initialization
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v5 14/16] x86/cpu: Make LAM depend on LASS
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v5 13/16] x86/traps: Communicate a LASS violation in #GP message
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v5 12/16] x86/cpu: Set LASS CR4 bit as pinning sensitive
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v5 11/16] x86/vsyscall: Document the fact that vsyscall=emulate disables LASS
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v5 10/16] x86/vsyscall: Disable LASS if vsyscall mode is set to EMULATE
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v5 09/16] x86/vsyscall: Add vsyscall emulation for #GP
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v5 08/16] x86/traps: Consolidate user fixups in exc_general_protection()
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v5 07/16] x86/vsyscall: Reorganize the #PF emulation code
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v5 06/16] efi: Disable LASS around set_virtual_address_map call
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v5 05/16] x86/cpu: Defer CR pinning setup until after EFI initialization
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v5 04/16] init/main.c: Move EFI runtime service initialization to x86/cpu
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v5 03/16] x86/alternatives: Disable LASS when patching kernel alternatives
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v5 02/16] x86/asm: Introduce inline memcpy and memset
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v5 01/16] x86/cpu: Enumerate the LASS feature bits
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v5 00/16] Enable Linear Address Space Separation support
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v2] efi: sysfb_efi: Fix unused const variable 'efifb_fwnode_ops'
- From: Zeng Heng <zengheng4@xxxxxxxxxx>
- Re: [PATCH] efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption
- From: Usama Arif <usamaarif642@xxxxxxxxx>
- Re: [PATCH] efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption
- From: Jiri Slaby <jirislaby@xxxxxxxxxx>
- Re: [PATCH] efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption
- From: Jiri Slaby <jirislaby@xxxxxxxxxx>
- Re: [PATCH] drivers/firmware: Fix unused const variable 'efifb_fwnode_ops'
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [RFC PATCH v3 08/13] clavis: Introduce new LSM called clavis
- Re: [PATCH] efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption
- From: Jiri Slaby <jirislaby@xxxxxxxxxx>
- [PATCH] drivers/firmware: Fix unused const variable 'efifb_fwnode_ops'
- From: Zeng Heng <zengheng4@xxxxxxxxxx>
- Re: [RFC PATCH v3 08/13] clavis: Introduce new LSM called clavis
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [RFC PATCH v3 08/13] clavis: Introduce new LSM called clavis
- Re: [PATCH V10] acpi/prmt: find block with specific type
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- Re: [RFC PATCH v3 05/13] clavis: Introduce a new key type called clavis_key_acl
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [RFC PATCH v3 05/13] clavis: Introduce a new key type called clavis_key_acl
- From: Ben Boeckel <me@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 05/13] clavis: Introduce a new key type called clavis_key_acl
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [RFC PATCH v3 05/13] clavis: Introduce a new key type called clavis_key_acl
- From: Ben Boeckel <me@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 04/13] keys: Add new verification type (VERIFYING_CLAVIS_SIGNATURE)
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v3 04/13] keys: Add new verification type (VERIFYING_CLAVIS_SIGNATURE)
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [RFC PATCH v3 03/13] clavis: Introduce a new system keyring called clavis
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v3 03/13] clavis: Introduce a new system keyring called clavis
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [RFC PATCH v3 06/13] clavis: Populate clavis keyring acl with kernel module signature
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v3 04/13] keys: Add new verification type (VERIFYING_CLAVIS_SIGNATURE)
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v3 01/13] certs: Remove CONFIG_INTEGRITY_PLATFORM_KEYRING check
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [RFC PATCH v3 02/13] certs: Introduce ability to link to a system key
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [RFC PATCH v3 03/13] clavis: Introduce a new system keyring called clavis
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v3 02/13] certs: Introduce ability to link to a system key
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v3 01/13] certs: Remove CONFIG_INTEGRITY_PLATFORM_KEYRING check
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [RFC PATCH v3 01/13] certs: Remove CONFIG_INTEGRITY_PLATFORM_KEYRING check
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC PATCH v3 07/13] keys: Add ability to track intended usage of the public key
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC PATCH v3 08/13] clavis: Introduce new LSM called clavis
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC PATCH v3 13/13] clavis: Kunit support
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC PATCH v3 09/13] clavis: Allow user to define acl at build time
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC PATCH v3 02/13] certs: Introduce ability to link to a system key
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC PATCH v3 04/13] keys: Add new verification type (VERIFYING_CLAVIS_SIGNATURE)
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC PATCH v3 11/13] clavis: Prevent boot param change during kexec
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC PATCH v3 05/13] clavis: Introduce a new key type called clavis_key_acl
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC PATCH v3 06/13] clavis: Populate clavis keyring acl with kernel module signature
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC PATCH v3 12/13] clavis: Add function redirection for Kunit support
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC PATCH v3 10/13] efi: Make clavis boot param persist across kexec
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC PATCH v3 03/13] clavis: Introduce a new system keyring called clavis
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC PATCH v3 00/13] Clavis LSM
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [efi:next] BUILD SUCCESS 63971b0f51faff0ff844a85d297e27861555c328
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [RFC PATCH v1 57/57] arm64: Enable boot-time page size selection
- From: Zi Yan <ziy@xxxxxxxxxx>
- Re: [RFC PATCH v1 57/57] arm64: Enable boot-time page size selection
- From: Ryan Roberts <ryan.roberts@xxxxxxx>
- [no subject]
- Re: [RFC PATCH v1 57/57] arm64: Enable boot-time page size selection
- From: Zi Yan <ziy@xxxxxxxxxx>
- Re: [RFC PATCH v1 57/57] arm64: Enable boot-time page size selection
- From: Ryan Roberts <ryan.roberts@xxxxxxx>
- Re: [RFC PATCH v1 57/57] arm64: Enable boot-time page size selection
- From: Ryan Roberts <ryan.roberts@xxxxxxx>
- Re: [PATCH v2 0/4] libstub,tpm: fix small bugs and improve error reporting
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi/libstub: measure initrd to PCR9 independent of source
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 4/4] efi/libstub: Take command line overrides into account for loaded files
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH 3/4] efi/libstub: Fix command line fallback handling when loading files
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH 2/4] efi/libstub: Parse builtin command line after bootloader provided one
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH 1/4] efi/libstub: Free correct pointer on failure
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH 0/4] efi/libstub: Clean up command line handling
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- RE: [RFC PATCH v1 57/57] arm64: Enable boot-time page size selection
- From: Michael Kelley <mhklinux@xxxxxxxxxxx>
- Re: [RFC PATCH v1 57/57] arm64: Enable boot-time page size selection
- From: Zi Yan <ziy@xxxxxxxxxx>
- Re: [PATCH 3/3] efi/libstub: consider CONFIG_CMDLINE for initrd= and dtb= options
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 3/3] efi/libstub: consider CONFIG_CMDLINE for initrd= and dtb= options
- From: kernel test robot <lkp@xxxxxxxxx>
- [RFC PATCH v1 57/57] arm64: Enable boot-time page size selection
- From: Ryan Roberts <ryan.roberts@xxxxxxx>
- [RFC PATCH v1 56/57] arm64: Determine THREAD_SIZE at boot-time
- From: Ryan Roberts <ryan.roberts@xxxxxxx>
- Re: [PATCH v3 0/5] Fix issues with ARM Processor CPER records
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 0/2] efi/libstub: fix efi_parse_options() ignoring the default command line
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 0/2] efi/libstub: fix efi_parse_options() ignoring the default command line
- From: Jonathan Marek <jonathan@xxxxxxxx>
- Re: [PATCH v2 0/2] efi/libstub: fix efi_parse_options() ignoring the default command line
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 2/2] efi/libstub: remove unnecessary cmd_line_len from efi_convert_cmdline()
- From: Jonathan Marek <jonathan@xxxxxxxx>
- [PATCH v2 1/2] efi/libstub: fix efi_parse_options() ignoring the default command line
- From: Jonathan Marek <jonathan@xxxxxxxx>
- [PATCH v2 0/2] efi/libstub: fix efi_parse_options() ignoring the default command line
- From: Jonathan Marek <jonathan@xxxxxxxx>
- [PATCH V10] acpi/prmt: find block with specific type
- From: KobaK <kobak@xxxxxxxxxx>
- Re: [PATCH V9] acpi/prmt: find block with specific type
- From: Koba Ko <kobak@xxxxxxxxxx>
- Re: [PATCH V9] acpi/prmt: find block with specific type
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH V9] acpi/prmt: find block with specific type
- From: KobaK <kobak@xxxxxxxxxx>
- Re: [PATCH V8] acpi/prmt: find block with specific type
- From: Koba Ko <kobak@xxxxxxxxxx>
- Re: [PATCH V8] acpi/prmt: find block with specific type
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH V8] acpi/prmt: find block with specific type
- From: KobaK <kobak@xxxxxxxxxx>
- Re: [PATCH V7] acpi/prmt: find block with specific type
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH V7] acpi/prmt: find block with specific type
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 3/3] efi/libstub: consider CONFIG_CMDLINE for initrd= and dtb= options
- From: Jonathan Marek <jonathan@xxxxxxxx>
- Re: [PATCH 3/3] efi/libstub: consider CONFIG_CMDLINE for initrd= and dtb= options
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 3/3] efi/libstub: consider CONFIG_CMDLINE for initrd= and dtb= options
- From: Jonathan Marek <jonathan@xxxxxxxx>
- Re: [PATCH 3/3] efi/libstub: consider CONFIG_CMDLINE for initrd= and dtb= options
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 1/3] efi/libstub: fix efi_parse_options() ignoring the default command line
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 3/3] efi/libstub: consider CONFIG_CMDLINE for initrd= and dtb= options
- From: Jonathan Marek <jonathan@xxxxxxxx>
- Re: [PATCH 1/3] efi/libstub: fix efi_parse_options() ignoring the default command line
- From: Jonathan Marek <jonathan@xxxxxxxx>
- Re: [PATCH 3/3] efi/libstub: consider CONFIG_CMDLINE for initrd= and dtb= options
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 2/3] efi/libstub: remove uneccessary cmdline_size init/check
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 1/3] efi/libstub: fix efi_parse_options() ignoring the default command line
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 3/3] efi/libstub: consider CONFIG_CMDLINE for initrd= and dtb= options
- From: Jonathan Marek <jonathan@xxxxxxxx>
- [PATCH 2/3] efi/libstub: remove uneccessary cmdline_size init/check
- From: Jonathan Marek <jonathan@xxxxxxxx>
- [PATCH 1/3] efi/libstub: fix efi_parse_options() ignoring the default command line
- From: Jonathan Marek <jonathan@xxxxxxxx>
- Re: [PATCH v3 0/5] Fix issues with ARM Processor CPER records
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: Possible overflow of TPM log
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Possible overflow of TPM log
- From: Usama Arif <usamaarif642@xxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Jonathan McDowell <noodles@xxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Breno Leitao <leitao@xxxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Jonathan McDowell <noodles@xxxxxxxx>
- Re: [PATCH V7] acpi/prmt: find block with specific type
- From: Koba Ko <kobak@xxxxxxxxxx>
- Re: [PATCH V7] acpi/prmt: find block with specific type
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH V7] acpi/prmt: find block with specific type
- From: KobaK <kobak@xxxxxxxxxx>
- Re: [PATCH v2 0/4] Enable measuring the kernel's Source-based Code Coverage and MC/DC with Clang
- From: Wentao Zhang <wentaoz5@xxxxxxxxxxxx>
- Re: [RFC PATCH 05/28] x86: Define the stack protector guard symbol explicitly
- From: Brian Gerst <brgerst@xxxxxxxxx>
- Re: [RFCv2 0/9] UEFI emulator for kexec
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- Re: [PATCH 2/2 V6] acpi/prmt: refactor acpi_platformrt_space_handler to drop gotos
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 1/2 V6] acpi/prmt: find block with specific type
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 1/2 V6] acpi/prmt: find block with specific type
- From: "Zhang, Rui" <rui.zhang@xxxxxxxxx>
- Re: [PATCH 2/2 V6] acpi/prmt: refactor acpi_platformrt_space_handler to drop gotos
- From: "Zhang, Rui" <rui.zhang@xxxxxxxxx>
- Re: [RFC PATCH 25/28] x86: Use PIE codegen for the core kernel
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [RFC PATCH 25/28] x86: Use PIE codegen for the core kernel
- From: Uros Bizjak <ubizjak@xxxxxxxxx>
- RE: [RFC PATCH 25/28] x86: Use PIE codegen for the core kernel
- From: David Laight <David.Laight@xxxxxxxxxx>
- [PATCH 2/2 V6] acpi/prmt: refactor acpi_platformrt_space_handler to drop gotos
- From: KobaK <kobak@xxxxxxxxxx>
- [PATCH 1/2 V6] acpi/prmt: find block with specific type
- From: KobaK <kobak@xxxxxxxxxx>
- Re: [RFC PATCH 25/28] x86: Use PIE codegen for the core kernel
- From: Uros Bizjak <ubizjak@xxxxxxxxx>
- Re: [RFC PATCH 25/28] x86: Use PIE codegen for the core kernel
- From: Uros Bizjak <ubizjak@xxxxxxxxx>
- Re: [RFC PATCH 25/28] x86: Use PIE codegen for the core kernel
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 25/28] x86: Use PIE codegen for the core kernel
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [RFC PATCH 25/28] x86: Use PIE codegen for the core kernel
- From: Uros Bizjak <ubizjak@xxxxxxxxx>
- Re: [RFC PATCH 25/28] x86: Use PIE codegen for the core kernel
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [RFC PATCH 05/28] x86: Define the stack protector guard symbol explicitly
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH 05/28] x86: Define the stack protector guard symbol explicitly
- From: Uros Bizjak <ubizjak@xxxxxxxxx>
- Re: [PATCH v2 0/4] Enable measuring the kernel's Source-based Code Coverage and MC/DC with Clang
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH v2 3/4] acpi/ghes, efi/cper: Recognize and process CXL Protocol Errors.
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v2 4/4] acpi/ghes, cxl/pci: Trace FW-First CXL Protocol Errors
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- Re: [PATCH v2 4/4] acpi/ghes, cxl/pci: Trace FW-First CXL Protocol Errors
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- Re: [PATCH v2 3/4] acpi/ghes, efi/cper: Recognize and process CXL Protocol Errors.
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- Re: [PATCH v2 3/4] acpi/ghes, efi/cper: Recognize and process CXL Protocol Errors.
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- Re: [PATCH v2 2/4] cxl/pci: Define a common function get_cxl_devstate()
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- Re: [RFC PATCH 25/28] x86: Use PIE codegen for the core kernel
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 1/4] efi/cper, cxl: Make definitions and structures global
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH V5] acpi/prmt: find block with specific type
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH V5] acpi/prmt: find block with specific type
- From: Koba Ko <kobak@xxxxxxxxxx>
- Re: [PATCH V5] acpi/prmt: find block with specific type
- From: Koba Ko <kobak@xxxxxxxxxx>
- Re: [PATCH v2 2/4] llvm-cov: add Clang's MC/DC support
- From: Wentao Zhang <wentaoz5@xxxxxxxxxxxx>
- Re: [PATCH v2 4/4] acpi/ghes, cxl/pci: Trace FW-First CXL Protocol Errors
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v2 3/4] acpi/ghes, efi/cper: Recognize and process CXL Protocol Errors.
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v2 2/4] cxl/pci: Define a common function get_cxl_devstate()
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v2 1/4] efi/cper, cxl: Make definitions and structures global
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH V5] acpi/prmt: find block with specific type
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH 25/28] x86: Use PIE codegen for the core kernel
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] efi/libstub: measure initrd to PCR9 independent of source
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH V5] acpi/prmt: find block with specific type
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- Re: [PATCH] efi/libstub: measure initrd to PCR9 independent of source
- From: Jeremy Linton <jeremy.linton@xxxxxxx>
- Re: [PATCH] efi/libstub: measure initrd to PCR9 independent of source
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH] efi/libstub: measure initrd to PCR9 independent of source
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi/libstub: measure initrd to PCR9 independent of source
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH] efi/libstub: measure initrd to PCR9 independent of source
- From: Jeremy Linton <jeremy.linton@xxxxxxx>
- Re: [RFC PATCH 25/28] x86: Use PIE codegen for the core kernel
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 0/4] Enable measuring the kernel's Source-based Code Coverage and MC/DC with Clang
- From: Wentao Zhang <wentaoz5@xxxxxxxxxxxx>
- Re: [PATCH v2 0/4] Enable measuring the kernel's Source-based Code Coverage and MC/DC with Clang
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH v2 4/4] x86: enable llvm-cov support
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH v2 3/4] x86: disable llvm-cov instrumentation
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH v2 2/4] llvm-cov: add Clang's MC/DC support
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- [no subject]
- Re: [PATCH v2 1/4] llvm-cov: add Clang's Source-based Code Coverage support
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [RFC PATCH 25/28] x86: Use PIE codegen for the core kernel
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH v2 3/4] acpi/ghes, efi/cper: Recognize and process CXL Protocol Errors.
- From: Fan Ni <nifan.cxl@xxxxxxxxx>
- Re: [PATCH v2 4/4] acpi/ghes, cxl/pci: Trace FW-First CXL Protocol Errors
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH v2 3/4] acpi/ghes, efi/cper: Recognize and process CXL Protocol Errors.
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH v2 2/4] cxl/pci: Define a common function get_cxl_devstate()
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [RFC PATCH 24/28] tools/objtool: Treat indirect ftrace calls as direct calls
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi/libstub: measure initrd to PCR9 independent of source
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [RFC PATCH 24/28] tools/objtool: Treat indirect ftrace calls as direct calls
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [RFC PATCH 04/28] x86/boot: Permit GOTPCREL relocations for x86_64 builds
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi/libstub: measure initrd to PCR9 independent of source
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH 04/28] x86/boot: Permit GOTPCREL relocations for x86_64 builds
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- [PATCH] efi/libstub: measure initrd to PCR9 independent of source
- From: Jeremy Linton <jeremy.linton@xxxxxxx>
- [PATCH v2 4/4] acpi/ghes, cxl/pci: Trace FW-First CXL Protocol Errors
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- [PATCH v2 2/4] cxl/pci: Define a common function get_cxl_devstate()
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- [PATCH v2 3/4] acpi/ghes, efi/cper: Recognize and process CXL Protocol Errors.
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- [PATCH v2 1/4] efi/cper, cxl: Make definitions and structures global
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- [PATCH v2 0/4] acpi/ghes, cper, cxl: Trace FW-First CXL Protocol Errors
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- Re: [PATCH 6/6] Add Propeller configuration for kernel build.
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH 6/6] Add Propeller configuration for kernel build.
- From: Rong Xu <xur@xxxxxxxxxx>
- Re: [PATCH 6/6] Add Propeller configuration for kernel build.
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH 6/6] Add Propeller configuration for kernel build.
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH 6/6] Add Propeller configuration for kernel build.
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [RFC PATCH 05/28] x86: Define the stack protector guard symbol explicitly
- From: Brian Gerst <brgerst@xxxxxxxxx>
- Re: [PATCH 6/6] Add Propeller configuration for kernel build.
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [RFC PATCH 02/28] Documentation: Bump minimum GCC version to 8.1
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [RFC PATCH 02/28] Documentation: Bump minimum GCC version to 8.1
- From: Miguel Ojeda <miguel.ojeda.sandonis@xxxxxxxxx>
- Re: [GIT PULL] EFI updates for v6.12
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] EFI updates for v6.12
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [RFC PATCH 27/28] x86/kernel: Switch to PIE linking for the core kernel
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH 11/28] x86/pvh: Avoid absolute symbol references in .head.text
- From: Jason Andryuk <jason.andryuk@xxxxxxx>
- Re: [RFC PATCH 11/28] x86/pvh: Avoid absolute symbol references in .head.text
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH 01/28] x86/pvh: Call C code via the kernel virtual mapping
- From: Jason Andryuk <jason.andryuk@xxxxxxx>
- Re: [RFC PATCH 11/28] x86/pvh: Avoid absolute symbol references in .head.text
- From: Jason Andryuk <jason.andryuk@xxxxxxx>
- Re: [RFC PATCH 27/28] x86/kernel: Switch to PIE linking for the core kernel
- From: Vegard Nossum <vegard.nossum@xxxxxxxxxx>
- Re: [RFC PATCH 27/28] x86/kernel: Switch to PIE linking for the core kernel
- From: Uros Bizjak <ubizjak@xxxxxxxxx>
- Re: [RFC PATCH 27/28] x86/kernel: Switch to PIE linking for the core kernel
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH 27/28] x86/kernel: Switch to PIE linking for the core kernel
- From: Uros Bizjak <ubizjak@xxxxxxxxx>
- Re: [RFC PATCH 27/28] x86/kernel: Switch to PIE linking for the core kernel
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH 27/28] x86/kernel: Switch to PIE linking for the core kernel
- From: Uros Bizjak <ubizjak@xxxxxxxxx>
- Re: [RFC PATCH 05/28] x86: Define the stack protector guard symbol explicitly
- From: Uros Bizjak <ubizjak@xxxxxxxxx>
- Re: [RFC PATCH 06/28] x86/percpu: Get rid of absolute per-CPU variable placement
- From: "Christoph Lameter (Ampere)" <cl@xxxxxxxxxx>
- Re: [RFC PATCH 05/28] x86: Define the stack protector guard symbol explicitly
- From: Ian Rogers <irogers@xxxxxxxxxx>
- Re: [RFC PATCH 05/28] x86: Define the stack protector guard symbol explicitly
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH 14/28] x86/rethook: Use RIP-relative reference for return address
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 14/28] x86/rethook: Use RIP-relative reference for return address
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [RFC PATCH 14/28] x86/rethook: Use RIP-relative reference for return address
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [RFC PATCH 02/28] Documentation: Bump minimum GCC version to 8.1
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [RFC PATCH 05/28] x86: Define the stack protector guard symbol explicitly
- From: Ian Rogers <irogers@xxxxxxxxxx>
- [RFC PATCH 25/28] x86: Use PIE codegen for the core kernel
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [RFC PATCH 28/28] x86/tools: Drop x86_64 support from 'relocs' tool
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [RFC PATCH 27/28] x86/kernel: Switch to PIE linking for the core kernel
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [RFC PATCH 26/28] x86/boot: Implement support for ELF RELA/RELR relocations
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [RFC PATCH 24/28] tools/objtool: Treat indirect ftrace calls as direct calls
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [RFC PATCH 23/28] tools/objtool: Mark generated sections as writable
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [RFC PATCH 22/28] asm-generic: Treat PIC .data.rel.ro sections as .rodata
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [RFC PATCH 21/28] x86/head: Use PIC-compatible symbol references in startup code
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [RFC PATCH 20/28] x64/acpi: Use PIC-compatible references in wakeup_64.S
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [RFC PATCH 19/28] x86/boot/64: Avoid intentional absolute symbol references in .head.text
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [RFC PATCH 18/28] x86/boot/64: Determine VA/PA offset before entering C code
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [RFC PATCH 17/28] x86/hibernate: Prefer RIP-relative accesses
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [RFC PATCH 16/28] x86/entry_64: Use RIP-relative addressing
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [RFC PATCH 15/28] x86/sync_core: Use RIP-relative addressing
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [RFC PATCH 13/28] x86/kvm: Use RIP-relative addressing
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [RFC PATCH 12/28] x86/pm-trace: Use RIP-relative accesses for .tracedata
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [RFC PATCH 11/28] x86/pvh: Avoid absolute symbol references in .head.text
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [RFC PATCH 10/28] x86/xen: Avoid relocatable quantities in Xen ELF notes
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [RFC PATCH 09/28] x86/tools: Remove special relocation handling for per-CPU variables
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [RFC PATCH 08/28] scripts/kallsyms: Remove support for absolute per-CPU variables
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [RFC PATCH 07/28] scripts/kallsyms: Avoid 0x0 as the relative base
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [RFC PATCH 06/28] x86/percpu: Get rid of absolute per-CPU variable placement
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [RFC PATCH 05/28] x86: Define the stack protector guard symbol explicitly
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [RFC PATCH 04/28] x86/boot: Permit GOTPCREL relocations for x86_64 builds
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [RFC PATCH 03/28] x86/tools: Use mmap() to simplify relocs host tool
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [RFC PATCH 02/28] Documentation: Bump minimum GCC version to 8.1
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [RFC PATCH 01/28] x86/pvh: Call C code via the kernel virtual mapping
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [RFC PATCH 00/28] x86: Rely on toolchain for relocatable code
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [syzbot] [ntfs3?] kernel panic: corrupted stack end in kernel_init (2)
- From: syzbot <syzbot+ec17b78de14721dd3bdc@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] tpm: fix signed/unsigned bug when checking event logs
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 6/6] Add Propeller configuration for kernel build.
- From: Maksim Panchenko <max4bolt@xxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- Re: [PATCH v2 2/4] tpm: do not ignore memblock_reserve return value
- From: Usama Arif <usamaarif642@xxxxxxxxx>
- Re: [PATCH v2 2/4] tpm: do not ignore memblock_reserve return value
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- [efi:next] BUILD SUCCESS 04736f7d1945722117def1462fd3602c72c02272
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v2 4/4] libstub,tpm: do not ignore failure case when reading final event log
- From: Gregory Price <gourry@xxxxxxxxxx>
- [PATCH v2 3/4] tpm: fix unsigned/signed mismatch errors related to __calc_tpm2_event_size
- From: Gregory Price <gourry@xxxxxxxxxx>
- [PATCH v2 2/4] tpm: do not ignore memblock_reserve return value
- From: Gregory Price <gourry@xxxxxxxxxx>
- [PATCH v2 1/4] tpm: fix signed/unsigned bug when checking event logs
- From: Gregory Price <gourry@xxxxxxxxxx>
- [PATCH v2 0/4] libstub,tpm: fix small bugs and improve error reporting
- From: Gregory Price <gourry@xxxxxxxxxx>
- Re: [PATCH 3/6] libstub,tpm: provide indication of failure when getting event log
- From: Gregory Price <gourry@xxxxxxxxxx>
- Re: "No EFI environment detected" debug message not logged
- From: ofthecentury <ofthecentury@xxxxxxxxx>
- [PATCH v11 02/20] x86: Secure Launch Kconfig
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v11 00/20] x86: Trenchboot secure dynamic launch Linux kernel support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v11 20/20] x86/efi: EFI stub DRTM launch support for Secure Launch
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v11 19/20] x86: Secure Launch late initcall platform module
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v11 18/20] tpm: Add sysfs interface to allow setting and querying the default locality
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v11 17/20] tpm: Add ability to set the default locality the TPM chip uses
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v11 16/20] tpm: Make locality requests return consistent values
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v11 15/20] tpm: Ensure tpm is in known state at startup
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v11 14/20] tpm: Protect against locality counter underflow
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v11 13/20] x86/reboot: Secure Launch SEXIT support on reboot paths
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v11 12/20] kexec: Secure Launch kexec SEXIT support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v11 11/20] x86: Secure Launch SMP bringup support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v11 10/20] x86: Secure Launch kernel late boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v11 09/20] x86: Secure Launch kernel early boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v11 08/20] x86/boot: Place TXT MLE header in the kernel_info section
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v11 07/20] x86/msr: Add variable MTRR base/mask and x2apic ID registers
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v11 06/20] x86: Add early SHA-256 support for Secure Launch early measurements
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v11 05/20] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v11 04/20] x86: Secure Launch main header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v11 01/20] Documentation/x86: Secure Launch kernel documentation
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v11 03/20] x86: Secure Launch Resource Table header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: "No EFI environment detected" debug message not logged
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- "No EFI environment detected" debug message not logged
- From: ofthecentury <ofthecentury@xxxxxxxxx>
- Re: [PATCH 6/6] libstub,tpm: do not ignore failure case when reading final event log
- From: Gregory Price <gourry@xxxxxxxxxx>
- Re: No more /sys/bus/platform/drivers/efi-framebuffer since simpledrm?
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- Re: [PATCH 6/6] libstub,tpm: do not ignore failure case when reading final event log
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 6/6] libstub,tpm: do not ignore failure case when reading final event log
- From: Gregory Price <gourry@xxxxxxxxxx>
- Re: [PATCH 6/6] libstub,tpm: do not ignore failure case when reading final event log
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH -next] efi: Remove redundant null pointer checks in efi_debugfs_init()
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 4/6] tpm: sanity check the log version before using it
- From: Gregory Price <gourry@xxxxxxxxxx>
- Re: No more /sys/bus/platform/drivers/efi-framebuffer since simpledrm?
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 4/6] tpm: sanity check the log version before using it
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 4/6] tpm: sanity check the log version before using it
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 4/6] tpm: sanity check the log version before using it
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH 3/6] libstub,tpm: provide indication of failure when getting event log
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH 2/6] tpm: do not ignore memblock_reserve return value
- From: Gregory Price <gourry@xxxxxxxxxx>
- Re: [PATCH 3/6] libstub,tpm: provide indication of failure when getting event log
- From: Gregory Price <gourry@xxxxxxxxxx>
- Re: [PATCH 4/6] tpm: sanity check the log version before using it
- From: Gregory Price <gourry@xxxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Breno Leitao <leitao@xxxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Usama Arif <usamaarif642@xxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Usama Arif <usamaarif642@xxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH] efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption
- From: Breno Leitao <leitao@xxxxxxxxxx>
- Re: [PATCH 2/6] tpm: do not ignore memblock_reserve return value
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH 3/6] libstub,tpm: provide indication of failure when getting event log
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH 4/6] tpm: sanity check the log version before using it
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH] efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Usama Arif <usamaarif642@xxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Breno Leitao <leitao@xxxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Usama Arif <usamaarif642@xxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [no subject]
- [no subject]
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Breno Leitao <leitao@xxxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Usama Arif <usamaarif642@xxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Usama Arif <usamaarif642@xxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Usama Arif <usamaarif642@xxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: EFI table being corrupted during Kexec
- From: Usama Arif <usamaarif642@xxxxxxxxx>
- [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Usama Arif <usamaarif642@xxxxxxxxx>
- Re: [edk2-devel] EFI table being corrupted during Kexec
- From: Gerd Hoffmann <kraxel@xxxxxxxxxx>
- Re: EFI table being corrupted during Kexec
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- Re: [edk2-devel] EFI table being corrupted during Kexec
- From: "Andrew (EFI) Fish" <afish@xxxxxxxxx>
- Re: EFI table being corrupted during Kexec
- From: Gregory Price <gourry@xxxxxxxxxx>
- Re: EFI table being corrupted during Kexec
- From: Breno Leitao <leitao@xxxxxxxxxx>
- Re: EFI table being corrupted during Kexec
- From: Usama Arif <usamaarif642@xxxxxxxxx>
- [PATCH] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Usama Arif <usamaarif642@xxxxxxxxx>
- Re: EFI table being corrupted during Kexec
- From: Breno Leitao <leitao@xxxxxxxxxx>
- Re: EFI table being corrupted during Kexec
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- EFI table being corrupted during Kexec
- From: Breno Leitao <leitao@xxxxxxxxxx>
- Re: [RFCv2 0/9] UEFI emulator for kexec
- From: Lennart Poettering <mzxreary@xxxxxxxxxxx>
- Re: [RFCv2 0/9] UEFI emulator for kexec
- From: Lennart Poettering <mzxreary@xxxxxxxxxxx>
- Re: [RFCv2 0/9] UEFI emulator for kexec
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [no subject]
- Re: [RFCv2 0/9] UEFI emulator for kexec
- From: Jan Hendrik Farr <kernel@xxxxxxxx>
- Re: [RFCv2 0/9] UEFI emulator for kexec
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFCv2 0/9] UEFI emulator for kexec
- From: Philipp Rudo <prudo@xxxxxxxxxx>
- Re: [RFCv2 0/9] UEFI emulator for kexec
- From: Philipp Rudo <prudo@xxxxxxxxxx>
- Re: [RFCv2 0/9] UEFI emulator for kexec
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- Re: [RFCv2 0/9] UEFI emulator for kexec
- From: Jan Hendrik Farr <kernel@xxxxxxxx>
- Re: [RFCv2 0/9] UEFI emulator for kexec
- From: Lennart Poettering <mzxreary@xxxxxxxxxxx>
- Re: [PATCH 6.6 4/4] riscv: Use accessors to page table entries instead of direct dereference
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [RFCv2 0/9] UEFI emulator for kexec
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFCv2 0/9] UEFI emulator for kexec
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFCv2 0/9] UEFI emulator for kexec
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH 6/6] libstub,tpm: do not ignore failure case when reading final event log
- From: Gregory Price <gourry@xxxxxxxxxx>
- [PATCH 5/6] tpm: fix unsigned/signed mismatch errors related to __calc_tpm2_event_size
- From: Gregory Price <gourry@xxxxxxxxxx>
- [PATCH 4/6] tpm: sanity check the log version before using it
- From: Gregory Price <gourry@xxxxxxxxxx>
- [PATCH 3/6] libstub,tpm: provide indication of failure when getting event log
- From: Gregory Price <gourry@xxxxxxxxxx>
- [PATCH 2/6] tpm: do not ignore memblock_reserve return value
- From: Gregory Price <gourry@xxxxxxxxxx>
- [PATCH 1/6] tpm: fix signed/unsigned bug when checking event logs
- From: Gregory Price <gourry@xxxxxxxxxx>
- [PATCH 0/6] libstub,tpm: fix small bugs and improve error reporting
- From: Gregory Price <gourry@xxxxxxxxxx>
- Re: [RFCv2 0/9] UEFI emulator for kexec
- From: Philipp Rudo <prudo@xxxxxxxxxx>
- [PATCH 6.6 4/4] riscv: Use accessors to page table entries instead of direct dereference
- From: WangYuli <wangyuli@xxxxxxxxxxxxx>
- [PATCH 6.6 3/4] riscv: mm: Only compile pgtable.c if MMU
- From: WangYuli <wangyuli@xxxxxxxxxxxxx>
- [PATCH 6.6 2/4] mm: Introduce pudp/p4dp/pgdp_get() functions
- From: WangYuli <wangyuli@xxxxxxxxxxxxx>
- [PATCH 6.6 1/4] riscv: Use WRITE_ONCE() when setting page table entries
- From: WangYuli <wangyuli@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] Enable measuring the kernel's Source-based Code Coverage and MC/DC with Clang
- From: Wentao Zhang <wentaoz5@xxxxxxxxxxxx>
- Re: FW: [EXTERNAL] Re: [PATCH v2 0/4] Enable measuring the kernel's Source-based Code Coverage and MC/DC with Clang
- From: Steve VanderLeest <steven.h.vanderleest@xxxxxxxxx>
- Re: [PATCH v2 0/4] Enable measuring the kernel's Source-based Code Coverage and MC/DC with Clang
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- No more /sys/bus/platform/drivers/efi-framebuffer since simpledrm?
- From: Richard Hughes <richard@xxxxxxxxxxx>
- [PATCH v2 4/4] x86: enable llvm-cov support
- From: Wentao Zhang <wentaoz5@xxxxxxxxxxxx>
- [PATCH v2 3/4] x86: disable llvm-cov instrumentation
- From: Wentao Zhang <wentaoz5@xxxxxxxxxxxx>
- [PATCH v2 2/4] llvm-cov: add Clang's MC/DC support
- From: Wentao Zhang <wentaoz5@xxxxxxxxxxxx>
- [PATCH v2 1/4] llvm-cov: add Clang's Source-based Code Coverage support
- From: Wentao Zhang <wentaoz5@xxxxxxxxxxxx>
- [PATCH v2 0/4] Enable measuring the kernel's Source-based Code Coverage and MC/DC with Clang
- From: Wentao Zhang <wentaoz5@xxxxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/5] efi/cper: align ARM CPER type with UEFI 2.9A/2.10 specs
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH v3 4/5] efi/cper: align ARM CPER type with UEFI 2.9A/2.10 specs
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH v3 0/5] Fix issues with ARM Processor CPER records
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH v3 3/5] efi/cper: Add a new helper function to print bitmasks
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH v3 2/5] efi/cper: Adjust infopfx size to accept an extra space
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH v3 5/5] docs: efi: add CPER functions to driver-api
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- Re: [PATCH v2 3/5] efi/cper: Add a new helper function to print bitmasks
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- Re: [PATCH v2 4/5] efi/cper: align ARM CPER type with UEFI 2.9A/2.10 specs
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH -next] efi: Remove redundant null pointer checks in efi_debugfs_init()
- From: Li Zetao <lizetao1@xxxxxxxxxx>
- Re: [PATCH v2 4/5] efi/cper: align ARM CPER type with UEFI 2.9A/2.10 specs
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 3/5] efi/cper: Add a new helper function to print bitmasks
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 1/5] RAS: Report all ARM processor CPER information to userspace
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFCv2 0/9] UEFI emulator for kexec
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- Re: [PATCH v2 1/5] RAS: Report all ARM processor CPER information to userspace
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- Re: [PATCH] efi: reserve memory for tpm_log only if TPM final events table is valid
- From: Usama Arif <usamaarif642@xxxxxxxxx>
- Re: [PATCH] efi: reserve memory for tpm_log only if TPM final events table is valid
- From: Gregory Price <gourry@xxxxxxxxxx>
- Re: [PATCH] efi: reserve memory for tpm_log only if TPM final events table is valid
- From: Gregory Price <gourry@xxxxxxxxxx>
- Re: [PATCH] efi: reserve memory for tpm_log only if TPM final events table is valid
- From: Usama Arif <usamaarif642@xxxxxxxxx>
- Re: [PATCH] efi: reserve memory for tpm_log only if TPM final events table is valid
- From: Usama Arif <usamaarif642@xxxxxxxxx>
- Re: [PATCH 2/2] tpm: do not ignore memblock_reserve return value
- From: Gregory Price <gourry@xxxxxxxxxx>
- Re: [PATCH] efi: reserve memory for tpm_log only if TPM final events table is valid
- From: Gregory Price <gourry@xxxxxxxxxx>
- Re: [PATCH 2/2] tpm: do not ignore memblock_reserve return value
- From: Usama Arif <usamaarif642@xxxxxxxxx>
- [PATCH] efi: reserve memory for tpm_log only if TPM final events table is valid
- From: Usama Arif <usamaarif642@xxxxxxxxx>
- [PATCH 2/2] tpm: do not ignore memblock_reserve return value
- From: Gregory Price <gourry@xxxxxxxxxx>
- [PATCH 1/2] tpm: fix signed/unsigned bug when checking event logs
- From: Gregory Price <gourry@xxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v10 20/20] x86/efi: EFI stub DRTM launch support for Secure Launch
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v2 1/5] RAS: Report all ARM processor CPER information to userspace
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v8 01/15] x86/boot: Place kernel_info at a fixed offset
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 20/20] x86/efi: EFI stub DRTM launch support for Secure Launch
- From: Jonathan McDowell <noodles@xxxxxxxx>
- Re: [PATCH v10 20/20] x86/efi: EFI stub DRTM launch support for Secure Launch
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v10 20/20] x86/efi: EFI stub DRTM launch support for Secure Launch
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v8 01/15] x86/boot: Place kernel_info at a fixed offset
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v10 20/20] x86/efi: EFI stub DRTM launch support for Secure Launch
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v10 20/20] x86/efi: EFI stub DRTM launch support for Secure Launch
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [RFCv2 0/9] UEFI emulator for kexec
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFCv2 1/9] efi/libstub: Ask efi_random_alloc() to skip unusable memory
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [efi:next] BUILD SUCCESS d7171eb494353e03f3cde1a6f665e19c243c98e8
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v10 20/20] x86/efi: EFI stub DRTM launch support for Secure Launch
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v10 20/20] x86/efi: EFI stub DRTM launch support for Secure Launch
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v10 08/20] x86/boot: Place TXT MLE header in the kernel_info section
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v10 20/20] x86/efi: EFI stub DRTM launch support for Secure Launch
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi/cper: Print correctable AER information
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH -next] efi: Remove unused declaration efi_initialize_iomem_resources()
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v10 04/20] x86: Secure Launch main header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v10 00/20] x86: Trenchboot secure dynamic launch Linux kernel support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v10 20/20] x86/efi: EFI stub DRTM launch support for Secure Launch
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v10 19/20] x86: Secure Launch late initcall platform module
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v10 18/20] tpm: Add sysfs interface to allow setting and querying the default locality
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v10 17/20] tpm: Add ability to set the default locality the TPM chip uses
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v10 16/20] tpm: Make locality requests return consistent values
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v10 15/20] tpm: Ensure tpm is in known state at startup
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v10 14/20] tpm: Protect against locality counter underflow
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v10 13/20] x86/reboot: Secure Launch SEXIT support on reboot paths
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v10 12/20] kexec: Secure Launch kexec SEXIT support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v10 09/20] x86: Secure Launch kernel early boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v10 11/20] x86: Secure Launch SMP bringup support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v10 10/20] x86: Secure Launch kernel late boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v10 08/20] x86/boot: Place TXT MLE header in the kernel_info section
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v10 01/20] Documentation/x86: Secure Launch kernel documentation
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v10 07/20] x86/msr: Add variable MTRR base/mask and x2apic ID registers
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v10 06/20] x86: Add early SHA-256 support for Secure Launch early measurements
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v10 05/20] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v10 03/20] x86: Secure Launch Resource Table header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v10 02/20] x86: Secure Launch Kconfig
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [RFCv2 0/9] UEFI emulator for kexec
- From: Lennart Poettering <mzxreary@xxxxxxxxxxx>
- Re: [RFC PATCH 2/3] kbuild, llvm-cov: disable instrumentation in odd or sensitive code
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [RFC PATCH 1/3] llvm-cov: add Clang's Source-based Code Coverage support
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- [RFC PATCH 3/3] llvm-cov: add Clang's MC/DC support
- From: Wentao Zhang <wentaoz5@xxxxxxxxxxxx>
- [RFC PATCH 2/3] kbuild, llvm-cov: disable instrumentation in odd or sensitive code
- From: Wentao Zhang <wentaoz5@xxxxxxxxxxxx>
- [RFC PATCH 1/3] llvm-cov: add Clang's Source-based Code Coverage support
- From: Wentao Zhang <wentaoz5@xxxxxxxxxxxx>
- [RFC PATCH 0/3] Enable measuring the kernel's Source-based Code Coverage and MC/DC with Clang
- From: Wentao Zhang <wentaoz5@xxxxxxxxxxxx>
- [PATCH] efi/cper: Print correctable AER information
- From: Avadhut Naik <avadhut.naik@xxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFCv2 0/9] UEFI emulator for kexec
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- Re: [RFCv2 0/9] UEFI emulator for kexec
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [RFCv2 0/9] UEFI emulator for kexec
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [RFCv2 0/9] UEFI emulator for kexec
- From: Lennart Poettering <mzxreary@xxxxxxxxxxx>
- Re: [RFCv2 0/9] UEFI emulator for kexec
- From: Jan Hendrik Farr <kernel@xxxxxxxx>
- Re: [RFCv2 0/9] UEFI emulator for kexec
- From: "Jan Hendrik Farr" <kernel@xxxxxxxx>
- Re: [RFCv2 0/9] UEFI emulator for kexec
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- Re: [RFCv2 0/9] UEFI emulator for kexec
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- Re: [RFCv2 0/9] UEFI emulator for kexec
- From: Lennart Poettering <mzxreary@xxxxxxxxxxx>
- Re: [RFCv2 0/9] UEFI emulator for kexec
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [RFCv2 0/9] UEFI emulator for kexec
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- Re: [RFCv2 0/9] UEFI emulator for kexec
- From: Lennart Poettering <mzxreary@xxxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFCv2 1/9] efi/libstub: Ask efi_random_alloc() to skip unusable memory
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFCv2 1/9] efi/libstub: Ask efi_random_alloc() to skip unusable memory
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [RFCv2 9/9] arm64: kexec: Enable kexec_pe_image
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- [RFCv2 8/9] arm64: kexec: Prepare page table for emulator
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- [RFCv2 7/9] arm64: mm: Change to prototype of
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- [RFCv2 6/9] arm64: kexec: Introduce a new member param_mem to kimage_arch
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- [RFCv2 5/9] kexec: Introduce kexec_pe_image to parse and load PE file
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- [RFCv2 4/9] efi/emulator: Turn on mmu for arm64
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- [RFCv2 3/9] efi/emulator: Initial rountines to emulate EFI boot time service
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- [RFCv2 2/9] efi/libstub: Complete efi_simple_text_output_protocol
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- [RFCv2 1/9] efi/libstub: Ask efi_random_alloc() to skip unusable memory
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- [RFCv2 0/9] UEFI emulator for kexec
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 14/19] tpm: Ensure tpm is in known state at startup
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v9 13/19] tpm: Protect against locality counter underflow
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 09/19] x86: Secure Launch kernel late boot stub
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 09/19] x86: Secure Launch kernel late boot stub
- From: ross.philipson@xxxxxxxxxx
- [PATCH -next] efi: Remove unused declaration efi_initialize_iomem_resources()
- From: Yue Haibing <yuehaibing@xxxxxxxxxx>
- Re: [PATCH] loongarch/efi: enable general efi poweroff
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- [PATCH] loongarch/efi: enable general efi poweroff
- From: Miao Wang via B4 Relay <devnull+shankerwangmiao.gmail.com@xxxxxxxxxx>
- [PATCH v3 5/5] docs: efi: add CPER functions to driver-api
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH v3 4/5] efi/cper: align ARM CPER type with UEFI 2.9A/2.10 specs
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH v3 0/5] Fix issues with ARM Processor CPER records
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH v3 2/5] efi/cper: Adjust infopfx size to accept an extra space
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH v3 3/5] efi/cper: Add a new helper function to print bitmasks
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- Re: [PATCH v2] ARM: Add support for STACKLEAK gcc plugin
- From: Jinjie Ruan <ruanjinjie@xxxxxxxxxx>
- Re: [PATCH v2] ARM: Add support for STACKLEAK gcc plugin
- From: "Russell King (Oracle)" <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] x86: Make 5-level paging support unconditional for x86-64
- From: Shivank Garg <shivankg@xxxxxxx>
- Re: [PATCH 0/3] x86: Make 5-level paging support unconditional for x86-64
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] x86: Make 5-level paging support unconditional for x86-64
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] x86: Make 5-level paging support unconditional for x86-64
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] x86: Make 5-level paging support unconditional for x86-64
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] x86: Make 5-level paging support unconditional for x86-64
- From: Shivank Garg <shivankg@xxxxxxx>
- Re: [PATCH 3/6] Change the symbols order when --ffuntion-sections is enabled
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH 3/6] Change the symbols order when --ffuntion-sections is enabled
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 3/6] Change the symbols order when --ffuntion-sections is enabled
- From: Rong Xu <xur@xxxxxxxxxx>
- Re: [PATCH 0/6] Add AutoFDO and Propeller support for Clang build
- From: Rong Xu <xur@xxxxxxxxxx>
- Re: [PATCH 6/6] Add Propeller configuration for kernel build.
- From: Rong Xu <xur@xxxxxxxxxx>
- Re: [PATCH v2] ARM: Add support for STACKLEAK gcc plugin
- From: Jinjie Ruan <ruanjinjie@xxxxxxxxxx>
- Re: [PATCH v2] ARM: Add support for STACKLEAK gcc plugin
- From: "Russell King (Oracle)" <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH 6/6] Add Propeller configuration for kernel build.
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 3/6] Change the symbols order when --ffuntion-sections is enabled
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 2/6] objtool: Fix unreachable instruction warnings for weak funcitons
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 0/6] Add AutoFDO and Propeller support for Clang build
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH 6/6] Add Propeller configuration for kernel build.
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 6/6] Add Propeller configuration for kernel build.
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- [PATCH 6/6] Add Propeller configuration for kernel build.
- From: Rong Xu <xur@xxxxxxxxxx>
- [PATCH 5/6] AutoFDO: Enable machine function split optimization for AutoFDO
- From: Rong Xu <xur@xxxxxxxxxx>
- [PATCH 4/6] AutoFDO: Enable -ffunction-sections for the AutoFDO build
- From: Rong Xu <xur@xxxxxxxxxx>
- [PATCH 3/6] Change the symbols order when --ffuntion-sections is enabled
- From: Rong Xu <xur@xxxxxxxxxx>
- [PATCH 2/6] objtool: Fix unreachable instruction warnings for weak funcitons
- From: Rong Xu <xur@xxxxxxxxxx>
- [PATCH 1/6] Add AutoFDO support for Clang build
- From: Rong Xu <xur@xxxxxxxxxx>
- [PATCH 0/6] Add AutoFDO and Propeller support for Clang build
- From: Rong Xu <xur@xxxxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Orlando Chamberlain <orlandoch.dev@xxxxxxxxx>
- Re: [PATCH] loongarch/reset: use general efi poweroff
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] loongarch/reset: use general efi poweroff
- From: Miao Wang via B4 Relay <devnull+shankerwangmiao.gmail.com@xxxxxxxxxx>
- Re: [GIT PULL] EFI fixes for v6.11 #1
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v2] riscv: enable HAVE_ARCH_STACKLEAK
- From: patchwork-bot+linux-riscv@xxxxxxxxxx
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [GIT PULL] EFI fixes for v6.11 #1
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH v3 2/2] x86/mm/ident_map: Use gbpages only where full GB page should be mapped.
- From: Steve Wahl <steve.wahl@xxxxxxx>
- RE: [Patch] Do not clear BSS region in x86 stub
- From: "Shao, Marshall" <Marshall.Shao@xxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [Patch] Do not clear BSS region in x86 stub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- RE: [Patch] Do not clear BSS region in x86 stub
- From: "Shao, Marshall" <Marshall.Shao@xxxxxxxx>
- Re: [Patch] Do not clear BSS region in x86 stub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [efi:urgent] BUILD SUCCESS ae835a96d72cd025421910edb0e8faf706998727
- From: kernel test robot <lkp@xxxxxxxxx>
- RE: [Patch] Do not clear BSS region in x86 stub
- From: "Shao, Marshall" <Marshall.Shao@xxxxxxxx>
- Re: [PATCH v2] ARM: Add support for STACKLEAK gcc plugin
- From: Jinjie Ruan <ruanjinjie@xxxxxxxxxx>
- Re: [Patch] Do not clear BSS region in x86 stub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- RE: [Patch] Do not clear BSS region in x86 stub
- From: "Shao, Marshall" <Marshall.Shao@xxxxxxxx>
- RE: [Patch] Do not clear BSS region in x86 stub
- From: "Shao, Marshall" <Marshall.Shao@xxxxxxxx>
- Re: [RFC 3/7] efi/emulator: Initial rountines to emulate EFI boot time service
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- Re: [RFC 1/7] efi/libstub: Ask efi_random_alloc() to skip unusable memory
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- Re: [RFC 0/7] UEFI emulator for kexec
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- [PATCH] x86/efistub: Revert to heap allocated boot_params for PE entrypoint
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [RFC 1/7] efi/libstub: Ask efi_random_alloc() to skip unusable memory
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [efi:urgent] BUILD SUCCESS ee8b8f5d83eb2c9caaebcf633310905ee76856e9
- From: kernel test robot <lkp@xxxxxxxxx>
- [RFC 6/7] arm64: kexec: Prepare page table for emulator
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- [RFC 5/7] arm64: mm: Change to prototype of
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- [RFC 4/7] efi/emulator: Turn on mmu for arm64
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- [RFC 3/7] efi/emulator: Initial rountines to emulate EFI boot time service
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- [RFC 2/7] debug/libstub: cheats to step around some boot service
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- [RFC 1/7] efi/libstub: Ask efi_random_alloc() to skip unusable memory
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- [RFC 0/7] UEFI emulator for kexec
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- Re: [Patch] Do not clear BSS region in x86 stub
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH v3 1/2] x86/kexec: Add EFI config table identity mapping for kexec kernel
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 1/2] x86/kexec: Add EFI config table identity mapping for kexec kernel
- From: Steve Wahl <steve.wahl@xxxxxxx>
- [PATCH v3 0/2] Resolve problems with kexec identity mapping
- From: Steve Wahl <steve.wahl@xxxxxxx>
- [PATCH v3 2/2] x86/mm/ident_map: Use gbpages only where full GB page should be mapped.
- From: Steve Wahl <steve.wahl@xxxxxxx>
- Re: [PATCH] efi/libstub: Fixed an issue with screen_info not being initialized
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Sharpened Blade <sharpenedblade@xxxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [Patch] Do not clear BSS region in x86 stub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [Patch] Do not clear BSS region in x86 stub
- From: "Shao, Marshall" <Marshall.Shao@xxxxxxxx>
- Re: [Patch] Do not clear BSS region in x86 stub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [Patch] Do not clear BSS region in x86 stub
- From: "Shao, Marshall" <Marshall.Shao@xxxxxxxx>
- [PATCH] efi/libstub: Fixed an issue with screen_info not being initialized
- From: Qiang Ma <maqianga@xxxxxxxxxxxxx>
- Re: [GIT PULL] EFI updates for v6.11
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v2 1/2] x86/kexec: Add EFI config table identity mapping for kexec kernel
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [GIT PULL] EFI updates for v6.11
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH v2 1/2] x86/kexec: Add EFI config table identity mapping for kexec kernel
- From: Steve Wahl <steve.wahl@xxxxxxx>
- [PATCH v2 2/2] x86/mm/ident_map: Use gbpages only where full GB page should be mapped.
- From: Steve Wahl <steve.wahl@xxxxxxx>
- [PATCH v2 0/2] Resolve problems with kexec identity mapping
- From: Steve Wahl <steve.wahl@xxxxxxx>
- [efi:next] BUILD SUCCESS 4a2ebb082297f41803742729642961532e54079e
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 0/2] efi: Replace efi_memory_attributes_table_t 0-sized array with flexible array
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 2/2] efi: Replace efi_memory_attributes_table_t 0-sized array with flexible array
- From: Kees Cook <kees@xxxxxxxxxx>
- [PATCH v2 1/2] efi: Rename efi_early_memdesc_ptr() to efi_memdesc_ptr()
- From: Kees Cook <kees@xxxxxxxxxx>
- [PATCH v2 0/2] efi: Replace efi_memory_attributes_table_t 0-sized array with flexible array
- From: Kees Cook <kees@xxxxxxxxxx>
- Re: [PATCH v2 3/5] efi/cper: Add a new helper function to print bitmasks
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v4 03/16] x86/alternatives: Disable LASS when patching kernel alternatives
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v4 07/16] x86/cpu: Defer CR pinning setup until after EFI initialization
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 03/16] x86/alternatives: Disable LASS when patching kernel alternatives
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 03/16] x86/alternatives: Disable LASS when patching kernel alternatives
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v4 03/16] x86/alternatives: Disable LASS when patching kernel alternatives
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v4 02/16] x86/asm: Introduce inline memcpy and memset
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v4 07/16] x86/cpu: Defer CR pinning setup until after EFI initialization
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v2 1/5] RAS: Report all ARM processor CPER information to userspace
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH v2 0/5] Fix issues with ARM Processor CPER records
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH v2 4/5] efi/cper: align ARM CPER type with UEFI 2.9A/2.10 specs
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH v2 5/5] docs: efi: add CPER functions to driver-api
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH v2 2/5] efi/cper: Adjust infopfx size to accept an extra space
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH v2 3/5] efi/cper: Add a new helper function to print bitmasks
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- Re: [PATCH] efi: Replace efi_memory_attributes_table_t 0-sized array with flexible array
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 1/6] RAS: ACPI: APEI: add conditional compilation to ARM error report functions
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- Re: [PATCH v4 03/16] x86/alternatives: Disable LASS when patching kernel alternatives
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] efi: Replace efi_memory_attributes_table_t 0-sized array with flexible array
- From: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
- Re: [PATCH] efi: Replace efi_memory_attributes_table_t 0-sized array with flexible array
- From: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
- Re: [PATCH v4 03/16] x86/alternatives: Disable LASS when patching kernel alternatives
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH] efi: Replace efi_memory_attributes_table_t 0-sized array with flexible array
- From: Kees Cook <kees@xxxxxxxxxx>
- Re: [PATCH v4 03/16] x86/alternatives: Disable LASS when patching kernel alternatives
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 05/16] x86/cpu: Remove redundant comment during feature setup
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v4 03/16] x86/alternatives: Disable LASS when patching kernel alternatives
- From: Borislav Petkov <bp@xxxxxxxxx>
[Index of Archives]
[Linux Kernel Development]
[Security]
[Linux ARM Kernel]
[Tools]
[Linux MIPS]
[Linux S390]
[Bugtraq]
[Share Photos]>
[Fedora ARM]