Linux EFI/UEFI Development
[Prev Page][Next Page]
- [PATCH v3 3/5] efi/cper: Add a new helper function to print bitmasks
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- Re: [PATCH v2] ARM: Add support for STACKLEAK gcc plugin
- From: Jinjie Ruan <ruanjinjie@xxxxxxxxxx>
- Re: [PATCH v2] ARM: Add support for STACKLEAK gcc plugin
- From: "Russell King (Oracle)" <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] x86: Make 5-level paging support unconditional for x86-64
- From: Shivank Garg <shivankg@xxxxxxx>
- Re: [PATCH 0/3] x86: Make 5-level paging support unconditional for x86-64
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] x86: Make 5-level paging support unconditional for x86-64
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] x86: Make 5-level paging support unconditional for x86-64
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] x86: Make 5-level paging support unconditional for x86-64
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] x86: Make 5-level paging support unconditional for x86-64
- From: Shivank Garg <shivankg@xxxxxxx>
- Re: [PATCH 3/6] Change the symbols order when --ffuntion-sections is enabled
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH 3/6] Change the symbols order when --ffuntion-sections is enabled
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 3/6] Change the symbols order when --ffuntion-sections is enabled
- From: Rong Xu <xur@xxxxxxxxxx>
- Re: [PATCH 0/6] Add AutoFDO and Propeller support for Clang build
- From: Rong Xu <xur@xxxxxxxxxx>
- Re: [PATCH 6/6] Add Propeller configuration for kernel build.
- From: Rong Xu <xur@xxxxxxxxxx>
- Re: [PATCH v2] ARM: Add support for STACKLEAK gcc plugin
- From: Jinjie Ruan <ruanjinjie@xxxxxxxxxx>
- Re: [PATCH v2] ARM: Add support for STACKLEAK gcc plugin
- From: "Russell King (Oracle)" <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH 6/6] Add Propeller configuration for kernel build.
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 3/6] Change the symbols order when --ffuntion-sections is enabled
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 2/6] objtool: Fix unreachable instruction warnings for weak funcitons
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 0/6] Add AutoFDO and Propeller support for Clang build
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH 6/6] Add Propeller configuration for kernel build.
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 6/6] Add Propeller configuration for kernel build.
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- [PATCH 6/6] Add Propeller configuration for kernel build.
- From: Rong Xu <xur@xxxxxxxxxx>
- [PATCH 5/6] AutoFDO: Enable machine function split optimization for AutoFDO
- From: Rong Xu <xur@xxxxxxxxxx>
- [PATCH 4/6] AutoFDO: Enable -ffunction-sections for the AutoFDO build
- From: Rong Xu <xur@xxxxxxxxxx>
- [PATCH 3/6] Change the symbols order when --ffuntion-sections is enabled
- From: Rong Xu <xur@xxxxxxxxxx>
- [PATCH 2/6] objtool: Fix unreachable instruction warnings for weak funcitons
- From: Rong Xu <xur@xxxxxxxxxx>
- [PATCH 1/6] Add AutoFDO support for Clang build
- From: Rong Xu <xur@xxxxxxxxxx>
- [PATCH 0/6] Add AutoFDO and Propeller support for Clang build
- From: Rong Xu <xur@xxxxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Orlando Chamberlain <orlandoch.dev@xxxxxxxxx>
- Re: [PATCH] loongarch/reset: use general efi poweroff
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] loongarch/reset: use general efi poweroff
- From: Miao Wang via B4 Relay <devnull+shankerwangmiao.gmail.com@xxxxxxxxxx>
- Re: [GIT PULL] EFI fixes for v6.11 #1
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v2] riscv: enable HAVE_ARCH_STACKLEAK
- From: patchwork-bot+linux-riscv@xxxxxxxxxx
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [GIT PULL] EFI fixes for v6.11 #1
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH v3 2/2] x86/mm/ident_map: Use gbpages only where full GB page should be mapped.
- From: Steve Wahl <steve.wahl@xxxxxxx>
- RE: [Patch] Do not clear BSS region in x86 stub
- From: "Shao, Marshall" <Marshall.Shao@xxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [Patch] Do not clear BSS region in x86 stub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- RE: [Patch] Do not clear BSS region in x86 stub
- From: "Shao, Marshall" <Marshall.Shao@xxxxxxxx>
- Re: [Patch] Do not clear BSS region in x86 stub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [efi:urgent] BUILD SUCCESS ae835a96d72cd025421910edb0e8faf706998727
- From: kernel test robot <lkp@xxxxxxxxx>
- RE: [Patch] Do not clear BSS region in x86 stub
- From: "Shao, Marshall" <Marshall.Shao@xxxxxxxx>
- Re: [PATCH v2] ARM: Add support for STACKLEAK gcc plugin
- From: Jinjie Ruan <ruanjinjie@xxxxxxxxxx>
- Re: [Patch] Do not clear BSS region in x86 stub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- RE: [Patch] Do not clear BSS region in x86 stub
- From: "Shao, Marshall" <Marshall.Shao@xxxxxxxx>
- RE: [Patch] Do not clear BSS region in x86 stub
- From: "Shao, Marshall" <Marshall.Shao@xxxxxxxx>
- Re: [RFC 3/7] efi/emulator: Initial rountines to emulate EFI boot time service
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- Re: [RFC 1/7] efi/libstub: Ask efi_random_alloc() to skip unusable memory
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- Re: [RFC 0/7] UEFI emulator for kexec
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- [PATCH] x86/efistub: Revert to heap allocated boot_params for PE entrypoint
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [RFC 1/7] efi/libstub: Ask efi_random_alloc() to skip unusable memory
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [efi:urgent] BUILD SUCCESS ee8b8f5d83eb2c9caaebcf633310905ee76856e9
- From: kernel test robot <lkp@xxxxxxxxx>
- [RFC 6/7] arm64: kexec: Prepare page table for emulator
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- [RFC 5/7] arm64: mm: Change to prototype of
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- [RFC 4/7] efi/emulator: Turn on mmu for arm64
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- [RFC 3/7] efi/emulator: Initial rountines to emulate EFI boot time service
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- [RFC 2/7] debug/libstub: cheats to step around some boot service
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- [RFC 1/7] efi/libstub: Ask efi_random_alloc() to skip unusable memory
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- [RFC 0/7] UEFI emulator for kexec
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- Re: [Patch] Do not clear BSS region in x86 stub
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH v3 1/2] x86/kexec: Add EFI config table identity mapping for kexec kernel
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 1/2] x86/kexec: Add EFI config table identity mapping for kexec kernel
- From: Steve Wahl <steve.wahl@xxxxxxx>
- [PATCH v3 0/2] Resolve problems with kexec identity mapping
- From: Steve Wahl <steve.wahl@xxxxxxx>
- [PATCH v3 2/2] x86/mm/ident_map: Use gbpages only where full GB page should be mapped.
- From: Steve Wahl <steve.wahl@xxxxxxx>
- Re: [PATCH] efi/libstub: Fixed an issue with screen_info not being initialized
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Sharpened Blade <sharpenedblade@xxxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [Patch] Do not clear BSS region in x86 stub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [Patch] Do not clear BSS region in x86 stub
- From: "Shao, Marshall" <Marshall.Shao@xxxxxxxx>
- Re: [Patch] Do not clear BSS region in x86 stub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [Patch] Do not clear BSS region in x86 stub
- From: "Shao, Marshall" <Marshall.Shao@xxxxxxxx>
- [PATCH] efi/libstub: Fixed an issue with screen_info not being initialized
- From: Qiang Ma <maqianga@xxxxxxxxxxxxx>
- Re: [GIT PULL] EFI updates for v6.11
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v2 1/2] x86/kexec: Add EFI config table identity mapping for kexec kernel
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [GIT PULL] EFI updates for v6.11
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH v2 1/2] x86/kexec: Add EFI config table identity mapping for kexec kernel
- From: Steve Wahl <steve.wahl@xxxxxxx>
- [PATCH v2 2/2] x86/mm/ident_map: Use gbpages only where full GB page should be mapped.
- From: Steve Wahl <steve.wahl@xxxxxxx>
- [PATCH v2 0/2] Resolve problems with kexec identity mapping
- From: Steve Wahl <steve.wahl@xxxxxxx>
- [efi:next] BUILD SUCCESS 4a2ebb082297f41803742729642961532e54079e
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 0/2] efi: Replace efi_memory_attributes_table_t 0-sized array with flexible array
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 2/2] efi: Replace efi_memory_attributes_table_t 0-sized array with flexible array
- From: Kees Cook <kees@xxxxxxxxxx>
- [PATCH v2 1/2] efi: Rename efi_early_memdesc_ptr() to efi_memdesc_ptr()
- From: Kees Cook <kees@xxxxxxxxxx>
- [PATCH v2 0/2] efi: Replace efi_memory_attributes_table_t 0-sized array with flexible array
- From: Kees Cook <kees@xxxxxxxxxx>
- Re: [PATCH v2 3/5] efi/cper: Add a new helper function to print bitmasks
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v4 03/16] x86/alternatives: Disable LASS when patching kernel alternatives
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v4 07/16] x86/cpu: Defer CR pinning setup until after EFI initialization
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 03/16] x86/alternatives: Disable LASS when patching kernel alternatives
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 03/16] x86/alternatives: Disable LASS when patching kernel alternatives
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v4 03/16] x86/alternatives: Disable LASS when patching kernel alternatives
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v4 02/16] x86/asm: Introduce inline memcpy and memset
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v4 07/16] x86/cpu: Defer CR pinning setup until after EFI initialization
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v2 1/5] RAS: Report all ARM processor CPER information to userspace
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH v2 0/5] Fix issues with ARM Processor CPER records
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH v2 4/5] efi/cper: align ARM CPER type with UEFI 2.9A/2.10 specs
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH v2 5/5] docs: efi: add CPER functions to driver-api
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH v2 2/5] efi/cper: Adjust infopfx size to accept an extra space
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH v2 3/5] efi/cper: Add a new helper function to print bitmasks
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- Re: [PATCH] efi: Replace efi_memory_attributes_table_t 0-sized array with flexible array
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 1/6] RAS: ACPI: APEI: add conditional compilation to ARM error report functions
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- Re: [PATCH v4 03/16] x86/alternatives: Disable LASS when patching kernel alternatives
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] efi: Replace efi_memory_attributes_table_t 0-sized array with flexible array
- From: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
- Re: [PATCH] efi: Replace efi_memory_attributes_table_t 0-sized array with flexible array
- From: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
- Re: [PATCH v4 03/16] x86/alternatives: Disable LASS when patching kernel alternatives
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH] efi: Replace efi_memory_attributes_table_t 0-sized array with flexible array
- From: Kees Cook <kees@xxxxxxxxxx>
- Re: [PATCH v4 03/16] x86/alternatives: Disable LASS when patching kernel alternatives
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 05/16] x86/cpu: Remove redundant comment during feature setup
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v4 03/16] x86/alternatives: Disable LASS when patching kernel alternatives
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH v4 16/16] x86/cpu: Make LAM depend on LASS
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v4 15/16] efi: Disable LASS around set_virtual_address_map call
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v4 14/16] x86/traps: Communicate a LASS violation in #GP message
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v4 13/16] x86/cpu: Set LASS CR4 bit as pinning sensitive
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v4 12/16] x86/vsyscall: Document the fact that vsyscall=emulate disables LASS
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v4 11/16] x86/vsyscall: Disable LASS if vsyscall mode is set to EMULATE
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v4 10/16] x86/vsyscall: Add vsyscall emulation for #GP
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v4 09/16] x86/traps: Consolidate user fixups in exc_general_protection()
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v4 08/16] x86/vsyscall: Reorganize the #PF emulation code
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v4 07/16] x86/cpu: Defer CR pinning setup until after EFI initialization
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v4 06/16] init/main.c: Move EFI runtime service initialization to x86/cpu
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v4 05/16] x86/cpu: Remove redundant comment during feature setup
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v4 04/16] x86/cpu: Enable LASS during CPU initialization
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v4 03/16] x86/alternatives: Disable LASS when patching kernel alternatives
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v4 02/16] x86/asm: Introduce inline memcpy and memset
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v4 01/16] x86/cpu: Enumerate the LASS feature bits
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v4 00/16] Enable Linear Address Space Separation support
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH] arm64/efistub: Clean up KASLR logic
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [PATCH AUTOSEL 6.1 07/29] efi: pstore: Return proper errors on UEFI failures
- From: Pavel Machek <pavel@xxxxxxx>
- [efi:next] BUILD SUCCESS ebf5a79acf9a2970e93d30a9e97b08913ef15711
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 5/6] efi/cper: align ARM CPER type with UEFI 2.9A/2.10 specs
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH 6/6] docs: efi: add CPER functions to driver-api
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH 4/6] efi/cper: Add a new helper function to print bitmasks
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH 2/6] RAS: Report all ARM processor CPER information to userspace
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH 1/6] RAS: ACPI: APEI: add conditional compilation to ARM error report functions
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH 1/6] RAS: ACPI: APEI: add conditional compilation to ARM error report functions
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 1/6] RAS: ACPI: APEI: add conditional compilation to ARM error report functions
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- Re: [PATCH 1/6] RAS: ACPI: APEI: add conditional compilation to ARM error report functions
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH 2/6] RAS: Report all ARM processor CPER information to userspace
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH 0/6] Fix issues with ARM Processor CPER records
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH 3/6] efi/cper: Adjust infopfx size to accept an extra space
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH 5/6] efi/cper: align ARM CPER type with UEFI 2.9A/2.10 specs
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH 6/6] docs: efi: add CPER functions to driver-api
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH 4/6] efi/cper: Add a new helper function to print bitmasks
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH 1/6] RAS: ACPI: APEI: add conditional compilation to ARM error report functions
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [efi:next] BUILD SUCCESS f06ecac98e56e2d6c8cb04da732dc6709f7e3fef
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH 1/2] x86/efistub: Avoid returning EFI_SUCCESS on error
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH 2/2] x86/efistub: Drop redundant clearing of BSS
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [efi:next] BUILD SUCCESS d68cc8abc357c05ca1567458965f009add8bab69
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 1/2] ACPI: PRM: Add PRM handler direct call support
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: (subset) [PATCH 0/14] New uid & gid mount option parsing helpers
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [PATCH] efistub/smbios: Simplify SMBIOS enumeration API
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [RFC PATCH] x86/efi: Drop support for fake EFI memory maps
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH] x86/efi: Drop support for fake EFI memory maps
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [RFC PATCH] x86/efi: Drop support for fake EFI memory maps
- From: Tony Luck <tony.luck@xxxxxxxxx>
- Re: [RFC PATCH] x86/efi: Drop support for fake EFI memory maps
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH v5 2/4] efi/cper: Add a new helper function to print bitmasks
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH v3 2/2] x86/efistub: Call Apple set_os protocol on dual GPU Intel Macs
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH v3 1/2] efistub/x86: Enable SMBIOS protocol handling for x86
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [PATCH v2] efi: libstub: add support for the apple_set_os protocol
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [RFC PATCH] x86/efi: Drop support for fake EFI memory maps
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2] efi: libstub: add support for the apple_set_os protocol
- From: Orlando Chamberlain <orlandoch.dev@xxxxxxxxx>
- Re: [RFC PATCH] x86/efi: Drop support for fake EFI memory maps
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2] efi: libstub: add support for the apple_set_os protocol
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH 01/14] fs_parse: add uid & gid option option parsing helpers
- From: Jan Kara <jack@xxxxxxx>
- Re: [PATCH v2] efi: libstub: add support for the apple_set_os protocol
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH v2] efi: libstub: add support for the apple_set_os protocol
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH v2] efi: libstub: add support for the apple_set_os protocol
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH v2] efi: libstub: add support for the apple_set_os protocol
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH v2] efi: libstub: add support for the apple_set_os protocol
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2] efi: libstub: add support for the apple_set_os protocol
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH v2] efi: libstub: add support for the apple_set_os protocol
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH v2] efi: libstub: add support for the apple_set_os protocol
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH v2] efi: libstub: add support for the apple_set_os protocol
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2] efi: libstub: add support for the apple_set_os protocol
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH v2] efi: libstub: add support for the apple_set_os protocol
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH v2] efi: libstub: add support for the apple_set_os protocol
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2] efi: libstub: add support for the apple_set_os protocol
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH v2] efi: libstub: add support for the apple_set_os protocol
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2] efi: libstub: add support for the apple_set_os protocol
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH v2] efi: libstub: add support for the apple_set_os protocol
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2] efi: libstub: add support for the apple_set_os protocol
- From: Orlando Chamberlain <orlandoch.dev@xxxxxxxxx>
- [PATCH v2] efi: libstub: add support for the apple_set_os protocol
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH] efi: libstub: add support for the apple_set_os protocol
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH] efi: libstub: add support for the apple_set_os protocol
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi: libstub: add support for the apple_set_os protocol
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH] efi: libstub: add support for the apple_set_os protocol
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH] efi: libstub: add support for the apple_set_os protocol
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi: libstub: add support for the apple_set_os protocol
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH] efi: libstub: add support for the apple_set_os protocol
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH] efi: libstub: add support for the apple_set_os protocol
- From: Orlando Chamberlain <orlandoch.dev@xxxxxxxxx>
- Re: [PATCH] efi: libstub: add support for the apple_set_os protocol
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH] efi: libstub: add support for the apple_set_os protocol
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH] efi: libstub: add support for the apple_set_os protocol
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH] efi: libstub: add support for the apple_set_os protocol
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH] efi: libstub: add support for the apple_set_os protocol
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH] efi: libstub: add support for the apple_set_os protocol
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH v5 3/4] efi/cper: align ARM CPER type with UEFI 2.9A/2.10 specs
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: Regression: drivers/firmware/efi/libstub/zboot.lds DISCARD
- From: Tj <tj.iam.tj@xxxxxxxxx>
- Re: Regression: drivers/firmware/efi/libstub/zboot.lds DISCARD
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [efi:next] BUILD SUCCESS 2e15194fbc85dd07f117e51de2d6485ea069d950
- From: kernel test robot <lkp@xxxxxxxxx>
- Regression: drivers/firmware/efi/libstub/zboot.lds DISCARD
- From: Tj <tj.iam.tj@xxxxxxxxx>
- Re: [PATCH 01/14] fs_parse: add uid & gid option option parsing helpers
- From: Eric Sandeen <sandeen@xxxxxxxxxxx>
- Re: [PATCH 01/14] fs_parse: add uid & gid option option parsing helpers
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH 0/14] New uid & gid mount option parsing helpers
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH 01/14] fs_parse: add uid & gid option option parsing helpers
- From: Jan Kara <jack@xxxxxxx>
- [PATCH 04/14] efivarfs: Convert to new uid/gid option parsing helpers
- From: Eric Sandeen <sandeen@xxxxxxxxxx>
- [PATCH 01/14] fs_parse: add uid & gid option option parsing helpers
- From: Eric Sandeen <sandeen@xxxxxxxxxx>
- [PATCH 0/14] New uid & gid mount option parsing helpers
- From: Eric Sandeen <sandeen@xxxxxxxxxx>
- Re: [PATCH v2] riscv: dmi: Add SMBIOS/DMI support
- From: patchwork-bot+linux-riscv@xxxxxxxxxx
- Re: [PATCH v3] riscv: dmi: Add SMBIOS/DMI support
- From: patchwork-bot+linux-riscv@xxxxxxxxxx
- Re: [PATCH v2] ARM: Add support for STACKLEAK gcc plugin
- From: Kees Cook <kees@xxxxxxxxxx>
- Re: [PATCH v5 3/4] efi/cper: align ARM CPER type with UEFI 2.9A/2.10 specs
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 1/2] ACPI: PRM: Add PRM handler direct call support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2] ARM: Add support for STACKLEAK gcc plugin
- From: Jinjie Ruan <ruanjinjie@xxxxxxxxxx>
- Re: [PATCH v2] riscv: dmi: Add SMBIOS/DMI support
- From: Haibo Xu <xiaobo55x@xxxxxxxxx>
- Re: [PATCH v2] riscv: dmi: Add SMBIOS/DMI support
- From: Palmer Dabbelt <palmer@xxxxxxxxxxx>
- Re: [PATCH] x86/64/mm: Make 5-level paging support unconditional
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH] x86/64/mm: Make 5-level paging support unconditional
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH] x86/64/mm: Make 5-level paging support unconditional
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] x86/64/mm: Make 5-level paging support unconditional
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 3/4] acpi/ghes, cxl/pci: Trace FW-First CXL Protocol Errors
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- [PATCH v5 3/4] efi/cper: align ARM CPER type with UEFI 2.9A/2.10 specs
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH v5 0/4] fix CPER issues related to UEFI 2.9A Errata
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH v5 2/4] efi/cper: Add a new helper function to print bitmasks
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH v5 4/4] docs: efi: add CPER functions to driver-api
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH v5 1/4] efi/cper: Adjust infopfx size to accept an extra space
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- Re: [PATCH v2] ARM: Add support for STACKLEAK gcc plugin
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- Re: [PATCH v2] riscv: enable HAVE_ARCH_STACKLEAK
- From: Charlie Jenkins <charlie@xxxxxxxxxxxx>
- [PATCH v2] ARM: Add support for STACKLEAK gcc plugin
- From: Jinjie Ruan <ruanjinjie@xxxxxxxxxx>
- [PATCH v2] riscv: enable HAVE_ARCH_STACKLEAK
- From: Jisheng Zhang <jszhang@xxxxxxxxxx>
- Re: [PATCH] riscv: enable HAVE_ARCH_STACKLEAK
- From: Jisheng Zhang <jszhang@xxxxxxxxxx>
- Re: [PATCH] riscv: enable HAVE_ARCH_STACKLEAK
- From: Charlie Jenkins <charlie@xxxxxxxxxxxx>
- Re: [PATCH] riscv: enable HAVE_ARCH_STACKLEAK
- From: Charlie Jenkins <charlie@xxxxxxxxxxxx>
- Re: [PATCH] riscv: enable HAVE_ARCH_STACKLEAK
- From: Jisheng Zhang <jszhang@xxxxxxxxxx>
- Re: [PATCH] riscv: enable HAVE_ARCH_STACKLEAK
- From: Charlie Jenkins <charlie@xxxxxxxxxxxx>
- [PATCH 1/3] x86/64/mm: Always use dynamic memory layout
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCH 2/3] x86/64/mm: Make SPARSEMEM_VMEMMAP the only memory model
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCH 0/3] x86: Make 5-level paging support unconditional for x86-64
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCH 3/3] x86/64/mm: Make 5-level paging support unconditional
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/3] Fix CPER issues related to UEFI 2.9A Errata
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- Re: [PATCH] ARM: Add support for STACKLEAK gcc plugin
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v4 3/3] efi/cper: align ARM CPER type with UEFI 2.9A/2.10 specs
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- Re: [PATCH v4 2/3] efi/cper: Add a new helper function to print bitmasks
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- Re: [PATCH v4 3/3] efi/cper: align ARM CPER type with UEFI 2.9A/2.10 specs
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v4 2/3] efi/cper: Add a new helper function to print bitmasks
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v4 2/3] efi/cper: Add a new helper function to print bitmasks
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v4 1/3] efi/cper: Adjust infopfx size to accept an extra space
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v4 0/3] Fix CPER issues related to UEFI 2.9A Errata
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] ARM: Add support for STACKLEAK gcc plugin
- From: Jinjie Ruan <ruanjinjie@xxxxxxxxxx>
- Re: [RFC PATCH v2 0/8] Clavis LSM
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH] ARM: Add support for STACKLEAK gcc plugin
- From: Kees Cook <kees@xxxxxxxxxx>
- [PATCH v4 2/3] efi/cper: Add a new helper function to print bitmasks
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- RE: [PATCH v4 2/3] efi/cper: Add a new helper function to print bitmasks
- From: "Luck, Tony" <tony.luck@xxxxxxxxx>
- [PATCH v4 3/3] efi/cper: align ARM CPER type with UEFI 2.9A/2.10 specs
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH v4 0/3] Fix CPER issues related to UEFI 2.9A Errata
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH v4 1/3] efi/cper: Adjust infopfx size to accept an extra space
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- Re: [PATCH v9 04/19] x86: Secure Launch Resource Table header file
- From: ross.philipson@xxxxxxxxxx
- [PATCH] ARM: Add support for STACKLEAK gcc plugin
- From: Jinjie Ruan <ruanjinjie@xxxxxxxxxx>
- [PATCH v3 3/3] efi/cper: align ARM CPER type with UEFI 2.9A/2.10 specs
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH v3 2/3] efi/cper: Add a new helper function to print bitmasks
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH v3 1/3] efi/cper: Adjust infopfx size to accept an extra space
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH v3 0/3] Fix CPER issues related to UEFI 2.9A Errata
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [RFC PATCH] x86/efi: Drop support for fake EFI memory maps
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [PATCH v9 04/19] x86: Secure Launch Resource Table header file
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [no subject]
- Re: [RFC PATCH v2 0/8] Clavis LSM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] efi/cper: align ARM CPER type with UEFI 2.9A/2.10 specs
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v2] efi/cper: align ARM CPER type with UEFI 2.9A/2.10 specs
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [RFC] efi/cper: align ARM CPER type with UEFI 2.9A/2.10 specs
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- Re: [GIT PULL] EFI fixes for v6.10 #3
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] EFI fixes for v6.10 #3
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH AUTOSEL 6.1 06/29] efi/libstub: zboot.lds: Discard .discard sections
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.1 07/29] efi: pstore: Return proper errors on UEFI failures
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH AUTOSEL 6.9 07/44] efi: pstore: Return proper errors on UEFI failures
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH AUTOSEL 6.6 07/35] efi: pstore: Return proper errors on UEFI failures
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.6 06/35] efi/libstub: zboot.lds: Discard .discard sections
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.9 07/44] efi: pstore: Return proper errors on UEFI failures
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.9 06/44] efi/libstub: zboot.lds: Discard .discard sections
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH AUTOSEL 6.1 07/29] efi: pstore: Return proper errors on UEFI failures
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- [PATCH AUTOSEL 6.1 06/29] efi/libstub: zboot.lds: Discard .discard sections
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.6 06/35] efi/libstub: zboot.lds: Discard .discard sections
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.1 07/29] efi: pstore: Return proper errors on UEFI failures
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH AUTOSEL 6.6 07/35] efi: pstore: Return proper errors on UEFI failures
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH AUTOSEL 6.6 07/35] efi: pstore: Return proper errors on UEFI failures
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH AUTOSEL 6.9 07/44] efi: pstore: Return proper errors on UEFI failures
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH AUTOSEL 6.9 06/44] efi/libstub: zboot.lds: Discard .discard sections
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.9 07/44] efi: pstore: Return proper errors on UEFI failures
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH] riscv: enable HAVE_ARCH_STACKLEAK
- From: Jisheng Zhang <jszhang@xxxxxxxxxx>
- [RFC PATCH] x86: efi: Reserve all boot services regions to avoid memory reservation conflicts
- From: Li Huafei <lihuafei1@xxxxxxxxxx>
- [efi:urgent] BUILD SUCCESS 46e27b9961d8712bc89234444ede314cec0e8bae
- From: kernel test robot <lkp@xxxxxxxxx>
- [efi:urgent] BUILD SUCCESS f1d4f28feb2cc93528083d94503742289ea3ecc6
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: EFI mixed mode boot failure
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: EFI mixed mode boot failure
- From: Nicholas Bishop <nicholasbishop@xxxxxxxxxx>
- Re: [PATCH v3] x86/efi: Free EFI memory map only when installing a new one.
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v3] x86/efi: Free EFI memory map only when installing a new one.
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH 3/4] acpi/ghes, cxl/pci: Trace FW-First CXL Protocol Errors
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- Re: [PATCH] arm64/efi: Fix kmemleak false positive in arm64_efi_rt_init()
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH] arm64/efi: Fix kmemleak false positive in arm64_efi_rt_init()
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] arm64/efi: Fix kmemleak false positive in arm64_efi_rt_init()
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [PATCH v3] x86/efi: Free EFI memory map only when installing a new one.
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3] x86/efi: Free EFI memory map only when installing a new one.
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3] riscv: dmi: Add SMBIOS/DMI support
- From: Haibo Xu <haibo1.xu@xxxxxxxxx>
- [PATCH v2] x86/boot: Don't add the EFI stub to targets, again
- From: Benjamin Segall <bsegall@xxxxxxxxxx>
- Re: EFI mixed mode boot failure
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: EFI mixed mode boot failure
- From: Nicholas Bishop <nicholasbishop@xxxxxxxxxx>
- [PATCH v3] x86/efi: Free EFI memory map only when installing a new one.
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [PATCH v2] x86/efi: Free EFI memory map only when installing a new one.
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2] x86/efi: Free EFI memory map only when installing a new one.
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [PATCH] x86/efi: Free EFI memory map only when installing a new one.
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] x86/efi: Free EFI memory map only when installing a new one.
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH 3/4] acpi/ghes, cxl/pci: Trace FW-First CXL Protocol Errors
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH] efi/x86: Clear BSS when entering in mixed mode via compat entrypoint
- From: Nicholas Bishop <nicholasbishop@xxxxxxxxxx>
- Re: [RFC PATCH v2 8/8] clavis: Introduce new LSM called clavis
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v2] efi/arm: Disable LPAE PAN when calling EFI runtime services
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [PATCH] efi/arm: Disable LPAE PAN when calling EFI runtime services
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi/arm: Disable LPAE PAN when calling EFI runtime services
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- Re: [RFC PATCH v2 8/8] clavis: Introduce new LSM called clavis
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH] efi/x86: Clear BSS when entering in mixed mode via compat entrypoint
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: EFI mixed mode boot failure
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 2/4] acpi/ghes, efi/cper: Recognize and process CXL Protocol Errors.
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- Re: [PATCH 1/4] efi/cper, cxl: Make definitions and structures global
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- Re: EFI mixed mode boot failure
- From: Nicholas Bishop <nicholasbishop@xxxxxxxxxx>
- Re: EFI mixed mode boot failure
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- EFI mixed mode boot failure
- From: Nicholas Bishop <nicholasbishop@xxxxxxxxxx>
- Re: [PATCH] x86/efi: Free EFI memory map only when installing a new one.
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH] x86/efi: Free EFI memory map only when installing a new one.
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH] efi/arm: Disable LPAE PAN when calling EFI runtime services
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [PATCH] x86/boot: Don't add the EFI stub to targets, again
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 4/4] cxl/pci: Define a common function get_cxl_dev()
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH 2/4] acpi/ghes, efi/cper: Recognize and process CXL Protocol Errors.
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH 1/4] efi/cper, cxl: Make definitions and structures global
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH] x86/boot: Don't add the EFI stub to targets, again
- From: Benjamin Segall <bsegall@xxxxxxxxxx>
- Re: [GIT PULL] EFI fixes for v6.10 #2
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v9 04/19] x86: Secure Launch Resource Table header file
- From: ross.philipson@xxxxxxxxxx
- [GIT PULL] EFI fixes for v6.10 #2
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [efi:urgent] BUILD SUCCESS 99280413a5b785f22d91e8a8a66dc38f4a214495
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v9 04/19] x86: Secure Launch Resource Table header file
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 0/8] Clavis LSM
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [RFC PATCH v2 1/8] certs: Introduce ability to link to a system key
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v9 04/19] x86: Secure Launch Resource Table header file
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH] efi: Add missing __nocfi annotations to runtime wrappers
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- Re: [PATCH] efi: Add missing __nocfi annotations to runtime wrappers
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH v9 04/19] x86: Secure Launch Resource Table header file
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 04/19] x86: Secure Launch Resource Table header file
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v9 04/19] x86: Secure Launch Resource Table header file
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 04/19] x86: Secure Launch Resource Table header file
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 16/19] tpm: Add ability to set the preferred locality the TPM chip uses
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v9 04/19] x86: Secure Launch Resource Table header file
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v9 16/19] tpm: Add ability to set the preferred locality the TPM chip uses
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 10/19] x86: Secure Launch SMP bringup support
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 09/19] x86: Secure Launch kernel late boot stub
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 08/19] x86: Secure Launch kernel early boot stub
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 04/19] x86: Secure Launch Resource Table header file
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 16/19] tpm: Add ability to set the preferred locality the TPM chip uses
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v9 10/19] x86: Secure Launch SMP bringup support
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH] efi: Add missing __nocfi annotations to runtime wrappers
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v9 09/19] x86: Secure Launch kernel late boot stub
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v9 09/19] x86: Secure Launch kernel late boot stub
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v9 08/19] x86: Secure Launch kernel early boot stub
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v9 08/19] x86: Secure Launch kernel early boot stub
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH] efi: Add missing __nocfi annotations to runtime wrappers
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v9 08/19] x86: Secure Launch kernel early boot stub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v9 05/19] x86: Secure Launch main header file
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v9 04/19] x86: Secure Launch Resource Table header file
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v9 01/19] x86/boot: Place kernel_info at a fixed offset
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v9 17/19] tpm: Add sysfs interface to allow setting and querying the preferred locality
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 16/19] tpm: Add ability to set the preferred locality the TPM chip uses
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 14/19] tpm: Ensure tpm is in known state at startup
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 13/19] tpm: Protect against locality counter underflow
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 10/19] x86: Secure Launch SMP bringup support
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 09/19] x86: Secure Launch kernel late boot stub
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 09/19] x86: Secure Launch kernel late boot stub
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 08/19] x86: Secure Launch kernel early boot stub
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 7/8] efi: pstore: Follow convention for the efi-pstore backend name
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 05/19] x86: Secure Launch main header file
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 04/19] x86: Secure Launch Resource Table header file
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 01/19] x86/boot: Place kernel_info at a fixed offset
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 1/8] certs: Introduce ability to link to a system key
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 0/8] Clavis LSM
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 08/19] x86: Secure Launch kernel early boot stub
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v9 08/19] x86: Secure Launch kernel early boot stub
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v9 08/19] x86: Secure Launch kernel early boot stub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v9 08/19] x86: Secure Launch kernel early boot stub
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v9 19/19] x86: EFI stub DRTM launch support for Secure Launch
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v9 08/19] x86: Secure Launch kernel early boot stub
- From: ross.philipson@xxxxxxxxxx
- [PATCH] efi: Add missing __nocfi annotations to runtime wrappers
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [PATCH 7/8] efi: pstore: Follow convention for the efi-pstore backend name
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v9 08/19] x86: Secure Launch kernel early boot stub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- Re: [PATCH v9 08/19] x86: Secure Launch kernel early boot stub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v9 08/19] x86: Secure Launch kernel early boot stub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v9 19/19] x86: EFI stub DRTM launch support for Secure Launch
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v9 08/19] x86: Secure Launch kernel early boot stub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v9 18/19] x86: Secure Launch late initcall platform module
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 16/19] tpm: Add ability to set the preferred locality the TPM chip uses
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 15/19] tpm: Make locality requests return consistent values
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 14/19] tpm: Ensure tpm is in known state at startup
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 11/19] kexec: Secure Launch kexec SEXIT support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 13/19] tpm: Protect against locality counter underflow
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 09/19] x86: Secure Launch kernel late boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 17/19] tpm: Add sysfs interface to allow setting and querying the preferred locality
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 12/19] reboot: Secure Launch SEXIT support on reboot paths
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 10/19] x86: Secure Launch SMP bringup support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 07/19] x86: Add early SHA-256 support for Secure Launch early measurements
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 02/19] Documentation/x86: Secure Launch kernel documentation
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 05/19] x86: Secure Launch main header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 08/19] x86: Secure Launch kernel early boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 01/19] x86/boot: Place kernel_info at a fixed offset
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 00/19] x86: Trenchboot secure dynamic launch Linux kernel support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 04/19] x86: Secure Launch Resource Table header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 19/19] x86: EFI stub DRTM launch support for Secure Launch
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 03/19] x86: Secure Launch Kconfig
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [RFC PATCH v2 8/8] clavis: Introduce new LSM called clavis
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC PATCH v2 7/8] clavis: Introduce a new key type called clavis_key_acl
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC PATCH v2 0/8] Clavis LSM
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC PATCH v2 6/8] keys: Add ability to track intended usage of the public key
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC PATCH v2 3/8] efi: Make clavis boot param persist across kexec
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC PATCH v2 5/8] keys: Add new verification type (VERIFYING_CLAVIS_SIGNATURE)
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC PATCH v2 2/8] clavis: Introduce a new system keyring called clavis
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC PATCH v2 1/8] certs: Introduce ability to link to a system key
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC PATCH v2 4/8] clavis: Prevent clavis boot param from changing during kexec
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v2] riscv: dmi: Add SMBIOS/DMI support
- From: Haibo Xu <xiaobo55x@xxxxxxxxx>
- [efi:next] BUILD SUCCESS 7c23b186ab892088f76a3ad9dbff1685ffe2e832
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 2/4] acpi/ghes, efi/cper: Recognize and process CXL Protocol Errors.
- From: Dave Jiang <dave.jiang@xxxxxxxxx>
- Re: [PATCH 4/4] cxl/pci: Define a common function get_cxl_dev()
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- Re: [PATCH 3/4] acpi/ghes, cxl/pci: Trace FW-First CXL Protocol Errors
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- Re: [PATCH 3/4] acpi/ghes, cxl/pci: Trace FW-First CXL Protocol Errors
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- Re: [PATCH 2/4] acpi/ghes, efi/cper: Recognize and process CXL Protocol Errors.
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- Re: [PATCH 2/4] acpi/ghes, efi/cper: Recognize and process CXL Protocol Errors.
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- Re: [PATCH] sysfs: Unbreak the build around sysfs_bin_attr_simple_read()
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH] sysfs: Unbreak the build around sysfs_bin_attr_simple_read()
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- [PATCH] sysfs: Unbreak the build around sysfs_bin_attr_simple_read()
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH] efi: pstore: Return proper errors on UEFI failures
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 2/2] treewide: Use sysfs_bin_attr_simple_read() helper
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/4] acpi/ghes, cxl/pci: Trace FW-First CXL Protocol Errors
- From: Alison Schofield <alison.schofield@xxxxxxxxx>
- Re: [PATCH 2/2] treewide: Use sysfs_bin_attr_simple_read() helper
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH] efi/libstub: zboot.lds: Discard .discard sections
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- Re: [PATCH 4/4] cxl/pci: Define a common function get_cxl_dev()
- From: Alison Schofield <alison.schofield@xxxxxxxxx>
- Re: [PATCH 3/4] acpi/ghes, cxl/pci: Trace FW-First CXL Protocol Errors
- From: Alison Schofield <alison.schofield@xxxxxxxxx>
- Re: [PATCH 2/4] acpi/ghes, efi/cper: Recognize and process CXL Protocol Errors.
- From: Alison Schofield <alison.schofield@xxxxxxxxx>
- Re: [PATCH 1/4] efi/cper, cxl: Make definitions and structures global
- From: Alison Schofield <alison.schofield@xxxxxxxxx>
- Re: [PATCH 4/4] cxl/pci: Define a common function get_cxl_dev()
- From: Dave Jiang <dave.jiang@xxxxxxxxx>
- Re: [PATCH 3/4] acpi/ghes, cxl/pci: Trace FW-First CXL Protocol Errors
- From: Dave Jiang <dave.jiang@xxxxxxxxx>
- Re: [PATCH 2/4] acpi/ghes, efi/cper: Recognize and process CXL Protocol Errors.
- From: Dave Jiang <dave.jiang@xxxxxxxxx>
- Re: [PATCH] efi/libstub: zboot.lds: Discard .discard sections
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] efi/libstub: zboot.lds: Discard .discard sections
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH 1/4] efi/cper, cxl: Make definitions and structures global
- From: Dave Jiang <dave.jiang@xxxxxxxxx>
- [PATCH 4/4] cxl/pci: Define a common function get_cxl_dev()
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- [PATCH 3/4] acpi/ghes, cxl/pci: Trace FW-First CXL Protocol Errors
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- [PATCH 1/4] efi/cper, cxl: Make definitions and structures global
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- [PATCH 2/4] acpi/ghes, efi/cper: Recognize and process CXL Protocol Errors.
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- [PATCH 0/4] acpi/ghes, cper, cxl: Trace FW-First CXL Protocol Errors
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- Re: [GIT PULL] EFI fixes for v6.10 #1
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] EFI fixes for v6.10 #1
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [PATCH] efi: pstore: Return proper errors on UEFI failures
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH] efi: pstore: Return proper errors on UEFI failures
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- From Financial Crimes Enforcement Network
- From: "Financial Crimes Enforcement Network" <bill@xxxxxxxxxxxxxxxxxxx>
- [efi:next] BUILD SUCCESS 15aa8fb852f995dd234a57f12dfb989044968bb6
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] x86/efistub: Omit physical KASLR when memory reservations exist
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] x86/efistub: Omit physical KASLR when memory reservations exist
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] x86/efistub: Omit physical KASLR when memory reservations exist
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 0/4] acpi/ghes, cper, cxl: Trace FW-First CXL Protocol Errors
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- Re: [PATCH] x86/efistub: Omit physical KASLR when memory reservations exist
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] x86/efistub: Omit physical KASLR when memory reservations exist
- From: "Chaney, Ben" <bchaney@xxxxxxxxxx>
- Re: Regression in 6.1.81: Missing memory in pmem device
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: Regression in 6.1.81: Missing memory in pmem device
- From: "Chaney, Ben" <bchaney@xxxxxxxxxx>
- [PATCH] x86/efistub: Omit physical KASLR when memory reservations exist
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: Regression in 6.1.81: Missing memory in pmem device
- From: Kees Cook <kees@xxxxxxxxxx>
- Regression in 6.1.81: Missing memory in pmem device
- From: "Chaney, Ben" <bchaney@xxxxxxxxxx>
- Re: Regression in 6.1.81: Missing memory in pmem device
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [GIT PULL] EFI updates for v6.10
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH 01/12] mm, arm64: Rename ARM64_CONTPTE to THP_CONTPTE
- From: Barry Song <21cnbao@xxxxxxxxx>
- [GIT PULL] EFI updates for v6.10
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [PATCH 01/12] mm, arm64: Rename ARM64_CONTPTE to THP_CONTPTE
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- Re: [PATCH 01/12] mm, arm64: Rename ARM64_CONTPTE to THP_CONTPTE
- From: Barry Song <21cnbao@xxxxxxxxx>
- [PATCH 12/12] mm, riscv, arm64: Use common get_and_clear_full_ptes()/clear_full_ptes() functions
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH 11/12] mm, riscv, arm64: Use common ptep_set_wrprotect()/wrprotect_ptes() functions
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH 10/12] mm, riscv, arm64: Use common ptep_set_access_flags() function
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH 09/12] mm, riscv, arm64: Use common ptep_clear_flush_young() function
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH 08/12] mm, riscv, arm64: Use common ptep_test_and_clear_young() function
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH 07/12] mm, riscv, arm64: Use common ptep_get_and_clear() function
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH 06/12] mm, riscv, arm64: Use common pte_clear() function
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH 05/12] mm, riscv, arm64: Use common set_pte() function
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH 04/12] mm, riscv, arm64: Use common ptep_get_lockless() function
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH 03/12] mm, riscv, arm64: Use common set_ptes() function
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH 02/12] mm, riscv, arm64: Use common ptep_get() function
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH 01/12] mm, arm64: Rename ARM64_CONTPTE to THP_CONTPTE
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH 00/12] Make riscv use THP contpte support for arm64
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- Re: [PATCH v2 0/4] acpi/ghes, cper, cxl: Trace FW-First CXL Protocol Errors
- From: "Fabio M. De Francesco" <fabio.m.de.francesco@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] efi/unaccepted: touch soft lockup during memory accept
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [GIT PULL] EFI fix for v6.9 (#1)
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v2] efi/unaccepted: touch soft lockup during memory accept
- From: Chen Yu <yu.c.chen@xxxxxxxxx>
- Re: [PATCH v2] efi/unaccepted: touch soft lockup during memory accept
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- [GIT PULL] EFI fix for v6.9 (#1)
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [PATCH v2] efi/unaccepted: touch soft lockup during memory accept
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v4 1/2] acpi/ghes: Process CXL Component Events
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH v4 2/2] cxl/pci: Process CPER events
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- Re: [PATCH v4 1/2] acpi/ghes: Process CXL Component Events
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- Re: [PATCH] x86/efi: mark racy access on efi_rts_work.efi_rts_id
- From: linke li <lilinke99@xxxxxx>
- RE: [PATCH v4 1/2] acpi/ghes: Process CXL Component Events
- From: "Luck, Tony" <tony.luck@xxxxxxxxx>
- Re: [PATCH v4 1/2] acpi/ghes: Process CXL Component Events
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH v4 1/2] acpi/ghes: Process CXL Component Events
- From: Tony Luck <tony.luck@xxxxxxxxx>
- [efi:next] BUILD SUCCESS 4b2543f7e1e6b91cfc8dd1696e3cdf01c3ac8974
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v4 1/2] acpi/ghes: Process CXL Component Events
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH v4 2/2] cxl/pci: Process CPER events
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v4 1/2] acpi/ghes: Process CXL Component Events
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v2] efi: libstub: only free priv.runtime_map when allocated
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] x86/efi: mark racy access on efi_rts_work.efi_rts_id
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2] riscv: dmi: Add SMBIOS/DMI support
- From: Haibo Xu <xiaobo55x@xxxxxxxxx>
- [PATCH] x86/efi: mark racy access on efi_rts_work.efi_rts_id
- From: linke li <lilinke99@xxxxxx>
- [PATCH v4 2/2] cxl/pci: Process CPER events
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- [PATCH v4 1/2] acpi/ghes: Process CXL Component Events
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- [PATCH v4 0/2] efi/cxl-cper: Report CXL CPER events through tracing
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH v3 1/2] acpi/ghes: Process CXL Component Events
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH v3 2/2] cxl/pci: Process CPER events
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v3 1/2] acpi/ghes: Process CXL Component Events
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v3 2/2] cxl/pci: Process CPER events
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- [PATCH v3 1/2] acpi/ghes: Process CXL Component Events
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- [PATCH v3 0/2] efi/cxl-cper: Report CXL CPER events through tracing
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: Mikko Rapeli <mikko.rapeli@xxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [efi:urgent] BUILD SUCCESS 1c5a1627f48105cbab81d25ec2f72232bfaa8185
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: Lennart Poettering <mzxreary@xxxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: Mikko Rapeli <mikko.rapeli@xxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: Lennart Poettering <mzxreary@xxxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: Lennart Poettering <mzxreary@xxxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: Lennart Poettering <mzxreary@xxxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: Mikko Rapeli <mikko.rapeli@xxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2] efi/unaccepted: touch soft lockup during memory accept
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2] efi: libstub: only free priv.runtime_map when allocated
- From: Hagar Hemdan <hagarhem@xxxxxxxxxx>
- [PATCH] efi: libstub: only free priv.runtime_map when allocated
- From: Hagar Hemdan <hagarhem@xxxxxxxxxx>
- RE: [PATCH v2 1/3] acpi/ghes: Process CXL Component Events
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- RE: [PATCH v2 3/3] ras/events: Trace CXL CPER events without CXL stack
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- RE: [PATCH v2 1/3] acpi/ghes: Process CXL Component Events
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- RE: [PATCH v2 3/3] ras/events: Trace CXL CPER events without CXL stack
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- RE: [PATCH v2 1/3] acpi/ghes: Process CXL Component Events
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v2 3/3] ras/events: Trace CXL CPER events without CXL stack
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- [PATCH v2 2/3] cxl/pci: Process CPER events
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- [PATCH v2 1/3] acpi/ghes: Process CXL Component Events
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- [PATCH v2 0/3] efi/cxl-cper: Report CXL CPER events through tracing
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: Mikko Rapeli <mikko.rapeli@xxxxxxxxxx>
- Re: [PATCH v2] efi/unaccepted: touch soft lockup during memory accept
- From: Chen Yu <yu.c.chen@xxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: Mikko Rapeli <mikko.rapeli@xxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] efi: expose TPM event log to userspace via sysfs
- From: Mikko Rapeli <mikko.rapeli@xxxxxxxxxx>
- Re: (subset) [PATCH 00/34] address all -Wunused-const warnings
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- [syzbot] [efi?] BUG: soft lockup in sync_hw_clock
- From: syzbot <syzbot+b3dc5d82ebb394dabe43@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [efi:next] BUILD SUCCESS cda30c6542c8bb445bc84f6616cac8d012547f0a
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] efivarfs: Iterate variables with increasing name buffer sizes
- From: Tim Schumacher <timschumi@xxxxxx>
- Re: [PATCH 0/2] Deduplicate bin_attribute simple read() callbacks
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH 0/2] Deduplicate bin_attribute simple read() callbacks
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] sysfs: Add sysfs_bin_attr_simple_read() helper
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Regression: ef/x86: Remove EfiMemoryMappedIO from E820 map
- [PATCH v2] efi/unaccepted: touch soft lockup during memory accept
- From: Chen Yu <yu.c.chen@xxxxxxxxx>
- Re: [PATCH] efi/unaccepted: touch soft lockup during memory accept
- From: Chen Yu <yu.c.chen@xxxxxxxxx>
- Re: [PATCH] efi/unaccepted: touch soft lockup during memory accept
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCH] efi/unaccepted: touch soft lockup during memory accept
- From: Chen Yu <yu.c.chen@xxxxxxxxx>
- Re: (subset) [PATCH 00/34] address all -Wunused-const warnings
- From: Sebastian Reichel <sebastian.reichel@xxxxxxxxxxxxx>
- Re: [PATCH 0/2] Deduplicate bin_attribute simple read() callbacks
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- Re: [PATCH 2/2] treewide: Use sysfs_bin_attr_simple_read() helper
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] treewide: Use sysfs_bin_attr_simple_read() helper
- From: Zhi Wang <zhiwang@xxxxxxxxxx>
- Re: [PATCH 0/2] Deduplicate bin_attribute simple read() callbacks
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 2/2] treewide: Use sysfs_bin_attr_simple_read() helper
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH 1/2] sysfs: Add sysfs_bin_attr_simple_read() helper
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH 0/2] Deduplicate bin_attribute simple read() callbacks
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH 00/34] address all -Wunused-const warnings
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH RFC 1/8] certs: Introduce ability to link to a system key
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH RFC 1/8] certs: Introduce ability to link to a system key
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 06/15] x86: Add early SHA support for Secure Launch early measurements
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 06/15] x86: Add early SHA support for Secure Launch early measurements
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v8 06/15] x86: Add early SHA support for Secure Launch early measurements
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v8 06/15] x86: Add early SHA support for Secure Launch early measurements
- From: "Andy Lutomirski" <luto@xxxxxxxxxx>
- Re: [PATCH 10/34] efi: sysfb: don't build when EFI is disabled
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH 10/34] efi: sysfb: don't build when EFI is disabled
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 10/34] efi: sysfb: don't build when EFI is disabled
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 00/34] address all -Wunused-const warnings
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: x86_64 32-bit EFI mixed mode boot broken
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: x86_64 32-bit EFI mixed mode boot broken
- From: Clayton Craft <clayton@xxxxxxxxxxxxx>
- Re: [PATCH v8 04/15] x86: Secure Launch Resource Table header file
- From: ross.philipson@xxxxxxxxxx
- [PATCH 6.1 192/272] efi/libstub: fix efi_random_alloc() to allocate memory at alloc_min or higher address
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 6.6 300/396] efi/libstub: fix efi_random_alloc() to allocate memory at alloc_min or higher address
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 6.7 314/432] efi/libstub: fix efi_random_alloc() to allocate memory at alloc_min or higher address
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 6.8 267/399] efi/libstub: fix efi_random_alloc() to allocate memory at alloc_min or higher address
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [efi:next] BUILD SUCCESS bf87a149828e6a10437ef96036af0d2706d4cbc6
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v8 04/15] x86: Secure Launch Resource Table header file
- From: Kim Phillips <kim.phillips@xxxxxxx>
- Re: [PATCH 1/3] efi: pstore: Request at most 512 bytes for variable names
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- Re: [GIT PULL] EFI fixes for v6.9 #3
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] EFI fixes for v6.9 #3
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [PATCH 5.15-] efivars: Request at most 512 bytes for variable names
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/4] efi: Clear up misconceptions about a maximum variable name size
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 1/3] efi: pstore: Request at most 512 bytes for variable names
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [efi:urgent] BUILD SUCCESS decd347c2a75d32984beb8807d470b763a53b542
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v2 4/4] efi: Clear up misconceptions about a maximum variable name size
- From: Tim Schumacher <timschumi@xxxxxx>
- [PATCH v2 2/4] Documentation: Mark the 'efivars' sysfs interface as removed
- From: Tim Schumacher <timschumi@xxxxxx>
- [PATCH v2 3/4] efivarfs: Remove unused internal struct members
- From: Tim Schumacher <timschumi@xxxxxx>
- [PATCH v2 1/4] efi: pstore: Request at most 512 bytes for variable names
- From: Tim Schumacher <timschumi@xxxxxx>
- [PATCH] x86/efistub: Reinstate soft limit for initrd loading
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [PATCH] efi/libstub: Cast away type warning in use of max()
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi/libstub: Cast away type warning in use of max()
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH] efi/libstub: Cast away type warning in use of max()
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi/libstub: Cast away type warning in use of max()
- From: Lukas Wunner <lukas@xxxxxxxxx>
- FAILED: Patch "x86/efistub: Clear decompressor BSS in native EFI entrypoint" failed to apply to 4.19-stable tree
- From: Sasha Levin <sashal@xxxxxxxxxx>
- FAILED: Patch "x86/efistub: Clear decompressor BSS in native EFI entrypoint" failed to apply to 5.4-stable tree
- From: Sasha Levin <sashal@xxxxxxxxxx>
- FAILED: Patch "x86/efistub: Clear decompressor BSS in native EFI entrypoint" failed to apply to 5.10-stable tree
- From: Sasha Levin <sashal@xxxxxxxxxx>
- FAILED: Patch "x86/efistub: Clear decompressor BSS in native EFI entrypoint" failed to apply to 5.15-stable tree
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [efi:urgent] BUILD SUCCESS 07263d8a5a2cea66a3f10d930fea60ce49c7dc3b
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH] efi/libstub: Cast away type warning in use of max()
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [PATCH] x86/efistub: Add missing boot_params for mixed mode compat entry
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] x86/efistub: Add missing boot_params for mixed mode compat entry
- From: Clayton Craft <clayton@xxxxxxxxxxxxx>
- Re: [PATCH] x86/efistub: Add missing boot_params for mixed mode compat entry
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] x86/efistub: Add missing boot_params for mixed mode compat entry
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [efi:next] BUILD SUCCESS bada36a9fa965a2d15ad28b95da926a98fcc6ade
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH] x86/efistub: Add missing boot_params for mixed mode compat entry
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [PATCH] efi/libstub: fix efi_random_alloc() to allocate memory at alloc_min or higher address
- From: KONDO KAZUMA(近藤 和真) <kazuma-kondo@xxxxxxx>
- Re: [GIT PULL] EFI fixes for v6.9 #2
- From: pr-tracker-bot@xxxxxxxxxx
- Re: x86_64 32-bit EFI mixed mode boot broken
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [GIT PULL] EFI fixes for v6.9 #2
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: x86_64 32-bit EFI mixed mode boot broken
- From: "Clayton Craft" <clayton@xxxxxxxxxxxxx>
- Re: x86_64 32-bit EFI mixed mode boot broken
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: x86_64 32-bit EFI mixed mode boot broken
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: x86_64 32-bit EFI mixed mode boot broken
- From: "Clayton Craft" <clayton@xxxxxxxxxxxxx>
- [efi:next] BUILD SUCCESS 8e6edb6d7924df5fb154b8b0a03ffef87d84b2d5
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: x86_64 32-bit EFI mixed mode boot broken
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: x86_64 32-bit EFI mixed mode boot broken
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2] efi: fix panic in kdump kernel
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
[Index of Archives]
[Linux Kernel Development]
[Security]
[Linux ARM Kernel]
[Tools]
[Linux MIPS]
[Linux S390]
[Bugtraq]
[Share Photos]>
[Fedora ARM]