Linux EFI/UEFI Development
[Prev Page][Next Page]
- [RFC PATCH 25/28] x86: Use PIE codegen for the core kernel
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [RFC PATCH 28/28] x86/tools: Drop x86_64 support from 'relocs' tool
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [RFC PATCH 27/28] x86/kernel: Switch to PIE linking for the core kernel
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [RFC PATCH 26/28] x86/boot: Implement support for ELF RELA/RELR relocations
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [RFC PATCH 24/28] tools/objtool: Treat indirect ftrace calls as direct calls
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [RFC PATCH 23/28] tools/objtool: Mark generated sections as writable
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [RFC PATCH 22/28] asm-generic: Treat PIC .data.rel.ro sections as .rodata
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [RFC PATCH 21/28] x86/head: Use PIC-compatible symbol references in startup code
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [RFC PATCH 20/28] x64/acpi: Use PIC-compatible references in wakeup_64.S
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [RFC PATCH 19/28] x86/boot/64: Avoid intentional absolute symbol references in .head.text
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [RFC PATCH 18/28] x86/boot/64: Determine VA/PA offset before entering C code
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [RFC PATCH 17/28] x86/hibernate: Prefer RIP-relative accesses
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [RFC PATCH 16/28] x86/entry_64: Use RIP-relative addressing
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [RFC PATCH 15/28] x86/sync_core: Use RIP-relative addressing
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [RFC PATCH 13/28] x86/kvm: Use RIP-relative addressing
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [RFC PATCH 12/28] x86/pm-trace: Use RIP-relative accesses for .tracedata
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [RFC PATCH 11/28] x86/pvh: Avoid absolute symbol references in .head.text
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [RFC PATCH 10/28] x86/xen: Avoid relocatable quantities in Xen ELF notes
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [RFC PATCH 09/28] x86/tools: Remove special relocation handling for per-CPU variables
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [RFC PATCH 08/28] scripts/kallsyms: Remove support for absolute per-CPU variables
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [RFC PATCH 07/28] scripts/kallsyms: Avoid 0x0 as the relative base
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [RFC PATCH 06/28] x86/percpu: Get rid of absolute per-CPU variable placement
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [RFC PATCH 05/28] x86: Define the stack protector guard symbol explicitly
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [RFC PATCH 04/28] x86/boot: Permit GOTPCREL relocations for x86_64 builds
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [RFC PATCH 03/28] x86/tools: Use mmap() to simplify relocs host tool
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [RFC PATCH 02/28] Documentation: Bump minimum GCC version to 8.1
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [RFC PATCH 01/28] x86/pvh: Call C code via the kernel virtual mapping
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [RFC PATCH 00/28] x86: Rely on toolchain for relocatable code
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [syzbot] [ntfs3?] kernel panic: corrupted stack end in kernel_init (2)
- From: syzbot <syzbot+ec17b78de14721dd3bdc@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] tpm: fix signed/unsigned bug when checking event logs
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 6/6] Add Propeller configuration for kernel build.
- From: Maksim Panchenko <max4bolt@xxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- Re: [PATCH v2 2/4] tpm: do not ignore memblock_reserve return value
- From: Usama Arif <usamaarif642@xxxxxxxxx>
- Re: [PATCH v2 2/4] tpm: do not ignore memblock_reserve return value
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- [efi:next] BUILD SUCCESS 04736f7d1945722117def1462fd3602c72c02272
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v2 4/4] libstub,tpm: do not ignore failure case when reading final event log
- From: Gregory Price <gourry@xxxxxxxxxx>
- [PATCH v2 3/4] tpm: fix unsigned/signed mismatch errors related to __calc_tpm2_event_size
- From: Gregory Price <gourry@xxxxxxxxxx>
- [PATCH v2 2/4] tpm: do not ignore memblock_reserve return value
- From: Gregory Price <gourry@xxxxxxxxxx>
- [PATCH v2 1/4] tpm: fix signed/unsigned bug when checking event logs
- From: Gregory Price <gourry@xxxxxxxxxx>
- [PATCH v2 0/4] libstub,tpm: fix small bugs and improve error reporting
- From: Gregory Price <gourry@xxxxxxxxxx>
- Re: [PATCH 3/6] libstub,tpm: provide indication of failure when getting event log
- From: Gregory Price <gourry@xxxxxxxxxx>
- Re: "No EFI environment detected" debug message not logged
- From: ofthecentury <ofthecentury@xxxxxxxxx>
- [PATCH v11 02/20] x86: Secure Launch Kconfig
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v11 00/20] x86: Trenchboot secure dynamic launch Linux kernel support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v11 20/20] x86/efi: EFI stub DRTM launch support for Secure Launch
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v11 19/20] x86: Secure Launch late initcall platform module
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v11 18/20] tpm: Add sysfs interface to allow setting and querying the default locality
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v11 17/20] tpm: Add ability to set the default locality the TPM chip uses
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v11 16/20] tpm: Make locality requests return consistent values
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v11 15/20] tpm: Ensure tpm is in known state at startup
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v11 14/20] tpm: Protect against locality counter underflow
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v11 13/20] x86/reboot: Secure Launch SEXIT support on reboot paths
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v11 12/20] kexec: Secure Launch kexec SEXIT support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v11 11/20] x86: Secure Launch SMP bringup support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v11 10/20] x86: Secure Launch kernel late boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v11 09/20] x86: Secure Launch kernel early boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v11 08/20] x86/boot: Place TXT MLE header in the kernel_info section
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v11 07/20] x86/msr: Add variable MTRR base/mask and x2apic ID registers
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v11 06/20] x86: Add early SHA-256 support for Secure Launch early measurements
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v11 05/20] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v11 04/20] x86: Secure Launch main header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v11 01/20] Documentation/x86: Secure Launch kernel documentation
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v11 03/20] x86: Secure Launch Resource Table header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: "No EFI environment detected" debug message not logged
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- "No EFI environment detected" debug message not logged
- From: ofthecentury <ofthecentury@xxxxxxxxx>
- Re: [PATCH 6/6] libstub,tpm: do not ignore failure case when reading final event log
- From: Gregory Price <gourry@xxxxxxxxxx>
- Re: No more /sys/bus/platform/drivers/efi-framebuffer since simpledrm?
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- Re: [PATCH 6/6] libstub,tpm: do not ignore failure case when reading final event log
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 6/6] libstub,tpm: do not ignore failure case when reading final event log
- From: Gregory Price <gourry@xxxxxxxxxx>
- Re: [PATCH 6/6] libstub,tpm: do not ignore failure case when reading final event log
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH -next] efi: Remove redundant null pointer checks in efi_debugfs_init()
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 4/6] tpm: sanity check the log version before using it
- From: Gregory Price <gourry@xxxxxxxxxx>
- Re: No more /sys/bus/platform/drivers/efi-framebuffer since simpledrm?
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 4/6] tpm: sanity check the log version before using it
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 4/6] tpm: sanity check the log version before using it
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 4/6] tpm: sanity check the log version before using it
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH 3/6] libstub,tpm: provide indication of failure when getting event log
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH 2/6] tpm: do not ignore memblock_reserve return value
- From: Gregory Price <gourry@xxxxxxxxxx>
- Re: [PATCH 3/6] libstub,tpm: provide indication of failure when getting event log
- From: Gregory Price <gourry@xxxxxxxxxx>
- Re: [PATCH 4/6] tpm: sanity check the log version before using it
- From: Gregory Price <gourry@xxxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Breno Leitao <leitao@xxxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Usama Arif <usamaarif642@xxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Usama Arif <usamaarif642@xxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH] efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption
- From: Breno Leitao <leitao@xxxxxxxxxx>
- Re: [PATCH 2/6] tpm: do not ignore memblock_reserve return value
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH 3/6] libstub,tpm: provide indication of failure when getting event log
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH 4/6] tpm: sanity check the log version before using it
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH] efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Usama Arif <usamaarif642@xxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Breno Leitao <leitao@xxxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Usama Arif <usamaarif642@xxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [no subject]
- [no subject]
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Breno Leitao <leitao@xxxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Usama Arif <usamaarif642@xxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Usama Arif <usamaarif642@xxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Usama Arif <usamaarif642@xxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: EFI table being corrupted during Kexec
- From: Usama Arif <usamaarif642@xxxxxxxxx>
- [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Usama Arif <usamaarif642@xxxxxxxxx>
- Re: [edk2-devel] EFI table being corrupted during Kexec
- From: Gerd Hoffmann <kraxel@xxxxxxxxxx>
- Re: EFI table being corrupted during Kexec
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- Re: [edk2-devel] EFI table being corrupted during Kexec
- From: "Andrew (EFI) Fish" <afish@xxxxxxxxx>
- Re: EFI table being corrupted during Kexec
- From: Gregory Price <gourry@xxxxxxxxxx>
- Re: EFI table being corrupted during Kexec
- From: Breno Leitao <leitao@xxxxxxxxxx>
- Re: EFI table being corrupted during Kexec
- From: Usama Arif <usamaarif642@xxxxxxxxx>
- [PATCH] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Usama Arif <usamaarif642@xxxxxxxxx>
- Re: EFI table being corrupted during Kexec
- From: Breno Leitao <leitao@xxxxxxxxxx>
- Re: EFI table being corrupted during Kexec
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- EFI table being corrupted during Kexec
- From: Breno Leitao <leitao@xxxxxxxxxx>
- Re: [RFCv2 0/9] UEFI emulator for kexec
- From: Lennart Poettering <mzxreary@xxxxxxxxxxx>
- Re: [RFCv2 0/9] UEFI emulator for kexec
- From: Lennart Poettering <mzxreary@xxxxxxxxxxx>
- Re: [RFCv2 0/9] UEFI emulator for kexec
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [no subject]
- Re: [RFCv2 0/9] UEFI emulator for kexec
- From: Jan Hendrik Farr <kernel@xxxxxxxx>
- Re: [RFCv2 0/9] UEFI emulator for kexec
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFCv2 0/9] UEFI emulator for kexec
- From: Philipp Rudo <prudo@xxxxxxxxxx>
- Re: [RFCv2 0/9] UEFI emulator for kexec
- From: Philipp Rudo <prudo@xxxxxxxxxx>
- Re: [RFCv2 0/9] UEFI emulator for kexec
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- Re: [RFCv2 0/9] UEFI emulator for kexec
- From: Jan Hendrik Farr <kernel@xxxxxxxx>
- Re: [RFCv2 0/9] UEFI emulator for kexec
- From: Lennart Poettering <mzxreary@xxxxxxxxxxx>
- Re: [PATCH 6.6 4/4] riscv: Use accessors to page table entries instead of direct dereference
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [RFCv2 0/9] UEFI emulator for kexec
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFCv2 0/9] UEFI emulator for kexec
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFCv2 0/9] UEFI emulator for kexec
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH 6/6] libstub,tpm: do not ignore failure case when reading final event log
- From: Gregory Price <gourry@xxxxxxxxxx>
- [PATCH 5/6] tpm: fix unsigned/signed mismatch errors related to __calc_tpm2_event_size
- From: Gregory Price <gourry@xxxxxxxxxx>
- [PATCH 4/6] tpm: sanity check the log version before using it
- From: Gregory Price <gourry@xxxxxxxxxx>
- [PATCH 3/6] libstub,tpm: provide indication of failure when getting event log
- From: Gregory Price <gourry@xxxxxxxxxx>
- [PATCH 2/6] tpm: do not ignore memblock_reserve return value
- From: Gregory Price <gourry@xxxxxxxxxx>
- [PATCH 1/6] tpm: fix signed/unsigned bug when checking event logs
- From: Gregory Price <gourry@xxxxxxxxxx>
- [PATCH 0/6] libstub,tpm: fix small bugs and improve error reporting
- From: Gregory Price <gourry@xxxxxxxxxx>
- Re: [RFCv2 0/9] UEFI emulator for kexec
- From: Philipp Rudo <prudo@xxxxxxxxxx>
- [PATCH 6.6 4/4] riscv: Use accessors to page table entries instead of direct dereference
- From: WangYuli <wangyuli@xxxxxxxxxxxxx>
- [PATCH 6.6 3/4] riscv: mm: Only compile pgtable.c if MMU
- From: WangYuli <wangyuli@xxxxxxxxxxxxx>
- [PATCH 6.6 2/4] mm: Introduce pudp/p4dp/pgdp_get() functions
- From: WangYuli <wangyuli@xxxxxxxxxxxxx>
- [PATCH 6.6 1/4] riscv: Use WRITE_ONCE() when setting page table entries
- From: WangYuli <wangyuli@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] Enable measuring the kernel's Source-based Code Coverage and MC/DC with Clang
- From: Wentao Zhang <wentaoz5@xxxxxxxxxxxx>
- Re: FW: [EXTERNAL] Re: [PATCH v2 0/4] Enable measuring the kernel's Source-based Code Coverage and MC/DC with Clang
- From: Steve VanderLeest <steven.h.vanderleest@xxxxxxxxx>
- Re: [PATCH v2 0/4] Enable measuring the kernel's Source-based Code Coverage and MC/DC with Clang
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- No more /sys/bus/platform/drivers/efi-framebuffer since simpledrm?
- From: Richard Hughes <richard@xxxxxxxxxxx>
- [PATCH v2 4/4] x86: enable llvm-cov support
- From: Wentao Zhang <wentaoz5@xxxxxxxxxxxx>
- [PATCH v2 3/4] x86: disable llvm-cov instrumentation
- From: Wentao Zhang <wentaoz5@xxxxxxxxxxxx>
- [PATCH v2 2/4] llvm-cov: add Clang's MC/DC support
- From: Wentao Zhang <wentaoz5@xxxxxxxxxxxx>
- [PATCH v2 1/4] llvm-cov: add Clang's Source-based Code Coverage support
- From: Wentao Zhang <wentaoz5@xxxxxxxxxxxx>
- [PATCH v2 0/4] Enable measuring the kernel's Source-based Code Coverage and MC/DC with Clang
- From: Wentao Zhang <wentaoz5@xxxxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/5] efi/cper: align ARM CPER type with UEFI 2.9A/2.10 specs
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH v3 4/5] efi/cper: align ARM CPER type with UEFI 2.9A/2.10 specs
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH v3 0/5] Fix issues with ARM Processor CPER records
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH v3 3/5] efi/cper: Add a new helper function to print bitmasks
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH v3 2/5] efi/cper: Adjust infopfx size to accept an extra space
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH v3 5/5] docs: efi: add CPER functions to driver-api
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- Re: [PATCH v2 3/5] efi/cper: Add a new helper function to print bitmasks
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- Re: [PATCH v2 4/5] efi/cper: align ARM CPER type with UEFI 2.9A/2.10 specs
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH -next] efi: Remove redundant null pointer checks in efi_debugfs_init()
- From: Li Zetao <lizetao1@xxxxxxxxxx>
- Re: [PATCH v2 4/5] efi/cper: align ARM CPER type with UEFI 2.9A/2.10 specs
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 3/5] efi/cper: Add a new helper function to print bitmasks
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 1/5] RAS: Report all ARM processor CPER information to userspace
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFCv2 0/9] UEFI emulator for kexec
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- Re: [PATCH v2 1/5] RAS: Report all ARM processor CPER information to userspace
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- Re: [PATCH] efi: reserve memory for tpm_log only if TPM final events table is valid
- From: Usama Arif <usamaarif642@xxxxxxxxx>
- Re: [PATCH] efi: reserve memory for tpm_log only if TPM final events table is valid
- From: Gregory Price <gourry@xxxxxxxxxx>
- Re: [PATCH] efi: reserve memory for tpm_log only if TPM final events table is valid
- From: Gregory Price <gourry@xxxxxxxxxx>
- Re: [PATCH] efi: reserve memory for tpm_log only if TPM final events table is valid
- From: Usama Arif <usamaarif642@xxxxxxxxx>
- Re: [PATCH] efi: reserve memory for tpm_log only if TPM final events table is valid
- From: Usama Arif <usamaarif642@xxxxxxxxx>
- Re: [PATCH 2/2] tpm: do not ignore memblock_reserve return value
- From: Gregory Price <gourry@xxxxxxxxxx>
- Re: [PATCH] efi: reserve memory for tpm_log only if TPM final events table is valid
- From: Gregory Price <gourry@xxxxxxxxxx>
- Re: [PATCH 2/2] tpm: do not ignore memblock_reserve return value
- From: Usama Arif <usamaarif642@xxxxxxxxx>
- [PATCH] efi: reserve memory for tpm_log only if TPM final events table is valid
- From: Usama Arif <usamaarif642@xxxxxxxxx>
- [PATCH 2/2] tpm: do not ignore memblock_reserve return value
- From: Gregory Price <gourry@xxxxxxxxxx>
- [PATCH 1/2] tpm: fix signed/unsigned bug when checking event logs
- From: Gregory Price <gourry@xxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v10 20/20] x86/efi: EFI stub DRTM launch support for Secure Launch
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v2 1/5] RAS: Report all ARM processor CPER information to userspace
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v8 01/15] x86/boot: Place kernel_info at a fixed offset
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 20/20] x86/efi: EFI stub DRTM launch support for Secure Launch
- From: Jonathan McDowell <noodles@xxxxxxxx>
- Re: [PATCH v10 20/20] x86/efi: EFI stub DRTM launch support for Secure Launch
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v10 20/20] x86/efi: EFI stub DRTM launch support for Secure Launch
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v8 01/15] x86/boot: Place kernel_info at a fixed offset
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v10 20/20] x86/efi: EFI stub DRTM launch support for Secure Launch
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v10 20/20] x86/efi: EFI stub DRTM launch support for Secure Launch
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [RFCv2 0/9] UEFI emulator for kexec
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFCv2 1/9] efi/libstub: Ask efi_random_alloc() to skip unusable memory
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [efi:next] BUILD SUCCESS d7171eb494353e03f3cde1a6f665e19c243c98e8
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v10 20/20] x86/efi: EFI stub DRTM launch support for Secure Launch
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v10 20/20] x86/efi: EFI stub DRTM launch support for Secure Launch
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v10 08/20] x86/boot: Place TXT MLE header in the kernel_info section
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v10 20/20] x86/efi: EFI stub DRTM launch support for Secure Launch
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi/cper: Print correctable AER information
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH -next] efi: Remove unused declaration efi_initialize_iomem_resources()
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v10 04/20] x86: Secure Launch main header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v10 00/20] x86: Trenchboot secure dynamic launch Linux kernel support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v10 20/20] x86/efi: EFI stub DRTM launch support for Secure Launch
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v10 19/20] x86: Secure Launch late initcall platform module
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v10 18/20] tpm: Add sysfs interface to allow setting and querying the default locality
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v10 17/20] tpm: Add ability to set the default locality the TPM chip uses
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v10 16/20] tpm: Make locality requests return consistent values
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v10 15/20] tpm: Ensure tpm is in known state at startup
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v10 14/20] tpm: Protect against locality counter underflow
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v10 13/20] x86/reboot: Secure Launch SEXIT support on reboot paths
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v10 12/20] kexec: Secure Launch kexec SEXIT support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v10 09/20] x86: Secure Launch kernel early boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v10 11/20] x86: Secure Launch SMP bringup support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v10 10/20] x86: Secure Launch kernel late boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v10 08/20] x86/boot: Place TXT MLE header in the kernel_info section
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v10 01/20] Documentation/x86: Secure Launch kernel documentation
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v10 07/20] x86/msr: Add variable MTRR base/mask and x2apic ID registers
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v10 06/20] x86: Add early SHA-256 support for Secure Launch early measurements
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v10 05/20] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v10 03/20] x86: Secure Launch Resource Table header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v10 02/20] x86: Secure Launch Kconfig
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [RFCv2 0/9] UEFI emulator for kexec
- From: Lennart Poettering <mzxreary@xxxxxxxxxxx>
- Re: [RFC PATCH 2/3] kbuild, llvm-cov: disable instrumentation in odd or sensitive code
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [RFC PATCH 1/3] llvm-cov: add Clang's Source-based Code Coverage support
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- [RFC PATCH 3/3] llvm-cov: add Clang's MC/DC support
- From: Wentao Zhang <wentaoz5@xxxxxxxxxxxx>
- [RFC PATCH 2/3] kbuild, llvm-cov: disable instrumentation in odd or sensitive code
- From: Wentao Zhang <wentaoz5@xxxxxxxxxxxx>
- [RFC PATCH 1/3] llvm-cov: add Clang's Source-based Code Coverage support
- From: Wentao Zhang <wentaoz5@xxxxxxxxxxxx>
- [RFC PATCH 0/3] Enable measuring the kernel's Source-based Code Coverage and MC/DC with Clang
- From: Wentao Zhang <wentaoz5@xxxxxxxxxxxx>
- [PATCH] efi/cper: Print correctable AER information
- From: Avadhut Naik <avadhut.naik@xxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFCv2 0/9] UEFI emulator for kexec
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- Re: [RFCv2 0/9] UEFI emulator for kexec
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [RFCv2 0/9] UEFI emulator for kexec
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [RFCv2 0/9] UEFI emulator for kexec
- From: Lennart Poettering <mzxreary@xxxxxxxxxxx>
- Re: [RFCv2 0/9] UEFI emulator for kexec
- From: Jan Hendrik Farr <kernel@xxxxxxxx>
- Re: [RFCv2 0/9] UEFI emulator for kexec
- From: "Jan Hendrik Farr" <kernel@xxxxxxxx>
- Re: [RFCv2 0/9] UEFI emulator for kexec
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- Re: [RFCv2 0/9] UEFI emulator for kexec
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- Re: [RFCv2 0/9] UEFI emulator for kexec
- From: Lennart Poettering <mzxreary@xxxxxxxxxxx>
- Re: [RFCv2 0/9] UEFI emulator for kexec
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [RFCv2 0/9] UEFI emulator for kexec
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- Re: [RFCv2 0/9] UEFI emulator for kexec
- From: Lennart Poettering <mzxreary@xxxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFCv2 1/9] efi/libstub: Ask efi_random_alloc() to skip unusable memory
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFCv2 1/9] efi/libstub: Ask efi_random_alloc() to skip unusable memory
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [RFCv2 9/9] arm64: kexec: Enable kexec_pe_image
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- [RFCv2 8/9] arm64: kexec: Prepare page table for emulator
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- [RFCv2 7/9] arm64: mm: Change to prototype of
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- [RFCv2 6/9] arm64: kexec: Introduce a new member param_mem to kimage_arch
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- [RFCv2 5/9] kexec: Introduce kexec_pe_image to parse and load PE file
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- [RFCv2 4/9] efi/emulator: Turn on mmu for arm64
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- [RFCv2 3/9] efi/emulator: Initial rountines to emulate EFI boot time service
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- [RFCv2 2/9] efi/libstub: Complete efi_simple_text_output_protocol
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- [RFCv2 1/9] efi/libstub: Ask efi_random_alloc() to skip unusable memory
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- [RFCv2 0/9] UEFI emulator for kexec
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 14/19] tpm: Ensure tpm is in known state at startup
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v9 13/19] tpm: Protect against locality counter underflow
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 09/19] x86: Secure Launch kernel late boot stub
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 09/19] x86: Secure Launch kernel late boot stub
- From: ross.philipson@xxxxxxxxxx
- [PATCH -next] efi: Remove unused declaration efi_initialize_iomem_resources()
- From: Yue Haibing <yuehaibing@xxxxxxxxxx>
- Re: [PATCH] loongarch/efi: enable general efi poweroff
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- [PATCH] loongarch/efi: enable general efi poweroff
- From: Miao Wang via B4 Relay <devnull+shankerwangmiao.gmail.com@xxxxxxxxxx>
- [PATCH v3 5/5] docs: efi: add CPER functions to driver-api
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH v3 4/5] efi/cper: align ARM CPER type with UEFI 2.9A/2.10 specs
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH v3 0/5] Fix issues with ARM Processor CPER records
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH v3 2/5] efi/cper: Adjust infopfx size to accept an extra space
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH v3 3/5] efi/cper: Add a new helper function to print bitmasks
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- Re: [PATCH v2] ARM: Add support for STACKLEAK gcc plugin
- From: Jinjie Ruan <ruanjinjie@xxxxxxxxxx>
- Re: [PATCH v2] ARM: Add support for STACKLEAK gcc plugin
- From: "Russell King (Oracle)" <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] x86: Make 5-level paging support unconditional for x86-64
- From: Shivank Garg <shivankg@xxxxxxx>
- Re: [PATCH 0/3] x86: Make 5-level paging support unconditional for x86-64
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] x86: Make 5-level paging support unconditional for x86-64
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] x86: Make 5-level paging support unconditional for x86-64
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] x86: Make 5-level paging support unconditional for x86-64
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] x86: Make 5-level paging support unconditional for x86-64
- From: Shivank Garg <shivankg@xxxxxxx>
- Re: [PATCH 3/6] Change the symbols order when --ffuntion-sections is enabled
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH 3/6] Change the symbols order when --ffuntion-sections is enabled
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 3/6] Change the symbols order when --ffuntion-sections is enabled
- From: Rong Xu <xur@xxxxxxxxxx>
- Re: [PATCH 0/6] Add AutoFDO and Propeller support for Clang build
- From: Rong Xu <xur@xxxxxxxxxx>
- Re: [PATCH 6/6] Add Propeller configuration for kernel build.
- From: Rong Xu <xur@xxxxxxxxxx>
- Re: [PATCH v2] ARM: Add support for STACKLEAK gcc plugin
- From: Jinjie Ruan <ruanjinjie@xxxxxxxxxx>
- Re: [PATCH v2] ARM: Add support for STACKLEAK gcc plugin
- From: "Russell King (Oracle)" <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH 6/6] Add Propeller configuration for kernel build.
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 3/6] Change the symbols order when --ffuntion-sections is enabled
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 2/6] objtool: Fix unreachable instruction warnings for weak funcitons
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 0/6] Add AutoFDO and Propeller support for Clang build
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH 6/6] Add Propeller configuration for kernel build.
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 6/6] Add Propeller configuration for kernel build.
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- [PATCH 6/6] Add Propeller configuration for kernel build.
- From: Rong Xu <xur@xxxxxxxxxx>
- [PATCH 5/6] AutoFDO: Enable machine function split optimization for AutoFDO
- From: Rong Xu <xur@xxxxxxxxxx>
- [PATCH 4/6] AutoFDO: Enable -ffunction-sections for the AutoFDO build
- From: Rong Xu <xur@xxxxxxxxxx>
- [PATCH 3/6] Change the symbols order when --ffuntion-sections is enabled
- From: Rong Xu <xur@xxxxxxxxxx>
- [PATCH 2/6] objtool: Fix unreachable instruction warnings for weak funcitons
- From: Rong Xu <xur@xxxxxxxxxx>
- [PATCH 1/6] Add AutoFDO support for Clang build
- From: Rong Xu <xur@xxxxxxxxxx>
- [PATCH 0/6] Add AutoFDO and Propeller support for Clang build
- From: Rong Xu <xur@xxxxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Orlando Chamberlain <orlandoch.dev@xxxxxxxxx>
- Re: [PATCH] loongarch/reset: use general efi poweroff
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] loongarch/reset: use general efi poweroff
- From: Miao Wang via B4 Relay <devnull+shankerwangmiao.gmail.com@xxxxxxxxxx>
- Re: [GIT PULL] EFI fixes for v6.11 #1
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v2] riscv: enable HAVE_ARCH_STACKLEAK
- From: patchwork-bot+linux-riscv@xxxxxxxxxx
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [GIT PULL] EFI fixes for v6.11 #1
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH v3 2/2] x86/mm/ident_map: Use gbpages only where full GB page should be mapped.
- From: Steve Wahl <steve.wahl@xxxxxxx>
- RE: [Patch] Do not clear BSS region in x86 stub
- From: "Shao, Marshall" <Marshall.Shao@xxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [Patch] Do not clear BSS region in x86 stub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- RE: [Patch] Do not clear BSS region in x86 stub
- From: "Shao, Marshall" <Marshall.Shao@xxxxxxxx>
- Re: [Patch] Do not clear BSS region in x86 stub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [efi:urgent] BUILD SUCCESS ae835a96d72cd025421910edb0e8faf706998727
- From: kernel test robot <lkp@xxxxxxxxx>
- RE: [Patch] Do not clear BSS region in x86 stub
- From: "Shao, Marshall" <Marshall.Shao@xxxxxxxx>
- Re: [PATCH v2] ARM: Add support for STACKLEAK gcc plugin
- From: Jinjie Ruan <ruanjinjie@xxxxxxxxxx>
- Re: [Patch] Do not clear BSS region in x86 stub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- RE: [Patch] Do not clear BSS region in x86 stub
- From: "Shao, Marshall" <Marshall.Shao@xxxxxxxx>
- RE: [Patch] Do not clear BSS region in x86 stub
- From: "Shao, Marshall" <Marshall.Shao@xxxxxxxx>
- Re: [RFC 3/7] efi/emulator: Initial rountines to emulate EFI boot time service
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- Re: [RFC 1/7] efi/libstub: Ask efi_random_alloc() to skip unusable memory
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- Re: [RFC 0/7] UEFI emulator for kexec
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- [PATCH] x86/efistub: Revert to heap allocated boot_params for PE entrypoint
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [RFC 1/7] efi/libstub: Ask efi_random_alloc() to skip unusable memory
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [efi:urgent] BUILD SUCCESS ee8b8f5d83eb2c9caaebcf633310905ee76856e9
- From: kernel test robot <lkp@xxxxxxxxx>
- [RFC 6/7] arm64: kexec: Prepare page table for emulator
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- [RFC 5/7] arm64: mm: Change to prototype of
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- [RFC 4/7] efi/emulator: Turn on mmu for arm64
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- [RFC 3/7] efi/emulator: Initial rountines to emulate EFI boot time service
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- [RFC 2/7] debug/libstub: cheats to step around some boot service
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- [RFC 1/7] efi/libstub: Ask efi_random_alloc() to skip unusable memory
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- [RFC 0/7] UEFI emulator for kexec
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- Re: [Patch] Do not clear BSS region in x86 stub
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH v3 1/2] x86/kexec: Add EFI config table identity mapping for kexec kernel
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 1/2] x86/kexec: Add EFI config table identity mapping for kexec kernel
- From: Steve Wahl <steve.wahl@xxxxxxx>
- [PATCH v3 0/2] Resolve problems with kexec identity mapping
- From: Steve Wahl <steve.wahl@xxxxxxx>
- [PATCH v3 2/2] x86/mm/ident_map: Use gbpages only where full GB page should be mapped.
- From: Steve Wahl <steve.wahl@xxxxxxx>
- Re: [PATCH] efi/libstub: Fixed an issue with screen_info not being initialized
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Sharpened Blade <sharpenedblade@xxxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [Patch] Do not clear BSS region in x86 stub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [Patch] Do not clear BSS region in x86 stub
- From: "Shao, Marshall" <Marshall.Shao@xxxxxxxx>
- Re: [Patch] Do not clear BSS region in x86 stub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [Patch] Do not clear BSS region in x86 stub
- From: "Shao, Marshall" <Marshall.Shao@xxxxxxxx>
- [PATCH] efi/libstub: Fixed an issue with screen_info not being initialized
- From: Qiang Ma <maqianga@xxxxxxxxxxxxx>
- Re: [GIT PULL] EFI updates for v6.11
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v2 1/2] x86/kexec: Add EFI config table identity mapping for kexec kernel
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [GIT PULL] EFI updates for v6.11
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH v2 1/2] x86/kexec: Add EFI config table identity mapping for kexec kernel
- From: Steve Wahl <steve.wahl@xxxxxxx>
- [PATCH v2 2/2] x86/mm/ident_map: Use gbpages only where full GB page should be mapped.
- From: Steve Wahl <steve.wahl@xxxxxxx>
- [PATCH v2 0/2] Resolve problems with kexec identity mapping
- From: Steve Wahl <steve.wahl@xxxxxxx>
- [efi:next] BUILD SUCCESS 4a2ebb082297f41803742729642961532e54079e
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 0/2] efi: Replace efi_memory_attributes_table_t 0-sized array with flexible array
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 2/2] efi: Replace efi_memory_attributes_table_t 0-sized array with flexible array
- From: Kees Cook <kees@xxxxxxxxxx>
- [PATCH v2 1/2] efi: Rename efi_early_memdesc_ptr() to efi_memdesc_ptr()
- From: Kees Cook <kees@xxxxxxxxxx>
- [PATCH v2 0/2] efi: Replace efi_memory_attributes_table_t 0-sized array with flexible array
- From: Kees Cook <kees@xxxxxxxxxx>
- Re: [PATCH v2 3/5] efi/cper: Add a new helper function to print bitmasks
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v4 03/16] x86/alternatives: Disable LASS when patching kernel alternatives
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v4 07/16] x86/cpu: Defer CR pinning setup until after EFI initialization
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 03/16] x86/alternatives: Disable LASS when patching kernel alternatives
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 03/16] x86/alternatives: Disable LASS when patching kernel alternatives
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v4 03/16] x86/alternatives: Disable LASS when patching kernel alternatives
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v4 02/16] x86/asm: Introduce inline memcpy and memset
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v4 07/16] x86/cpu: Defer CR pinning setup until after EFI initialization
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v2 1/5] RAS: Report all ARM processor CPER information to userspace
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH v2 0/5] Fix issues with ARM Processor CPER records
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH v2 4/5] efi/cper: align ARM CPER type with UEFI 2.9A/2.10 specs
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH v2 5/5] docs: efi: add CPER functions to driver-api
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH v2 2/5] efi/cper: Adjust infopfx size to accept an extra space
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH v2 3/5] efi/cper: Add a new helper function to print bitmasks
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- Re: [PATCH] efi: Replace efi_memory_attributes_table_t 0-sized array with flexible array
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 1/6] RAS: ACPI: APEI: add conditional compilation to ARM error report functions
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- Re: [PATCH v4 03/16] x86/alternatives: Disable LASS when patching kernel alternatives
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] efi: Replace efi_memory_attributes_table_t 0-sized array with flexible array
- From: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
- Re: [PATCH] efi: Replace efi_memory_attributes_table_t 0-sized array with flexible array
- From: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
- Re: [PATCH v4 03/16] x86/alternatives: Disable LASS when patching kernel alternatives
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH] efi: Replace efi_memory_attributes_table_t 0-sized array with flexible array
- From: Kees Cook <kees@xxxxxxxxxx>
- Re: [PATCH v4 03/16] x86/alternatives: Disable LASS when patching kernel alternatives
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 05/16] x86/cpu: Remove redundant comment during feature setup
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v4 03/16] x86/alternatives: Disable LASS when patching kernel alternatives
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH v4 16/16] x86/cpu: Make LAM depend on LASS
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v4 15/16] efi: Disable LASS around set_virtual_address_map call
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v4 14/16] x86/traps: Communicate a LASS violation in #GP message
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v4 13/16] x86/cpu: Set LASS CR4 bit as pinning sensitive
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v4 12/16] x86/vsyscall: Document the fact that vsyscall=emulate disables LASS
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v4 11/16] x86/vsyscall: Disable LASS if vsyscall mode is set to EMULATE
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v4 10/16] x86/vsyscall: Add vsyscall emulation for #GP
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v4 09/16] x86/traps: Consolidate user fixups in exc_general_protection()
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v4 08/16] x86/vsyscall: Reorganize the #PF emulation code
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v4 07/16] x86/cpu: Defer CR pinning setup until after EFI initialization
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v4 06/16] init/main.c: Move EFI runtime service initialization to x86/cpu
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v4 05/16] x86/cpu: Remove redundant comment during feature setup
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v4 04/16] x86/cpu: Enable LASS during CPU initialization
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v4 03/16] x86/alternatives: Disable LASS when patching kernel alternatives
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v4 02/16] x86/asm: Introduce inline memcpy and memset
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v4 01/16] x86/cpu: Enumerate the LASS feature bits
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v4 00/16] Enable Linear Address Space Separation support
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH] arm64/efistub: Clean up KASLR logic
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [PATCH AUTOSEL 6.1 07/29] efi: pstore: Return proper errors on UEFI failures
- From: Pavel Machek <pavel@xxxxxxx>
- [efi:next] BUILD SUCCESS ebf5a79acf9a2970e93d30a9e97b08913ef15711
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 5/6] efi/cper: align ARM CPER type with UEFI 2.9A/2.10 specs
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH 6/6] docs: efi: add CPER functions to driver-api
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH 4/6] efi/cper: Add a new helper function to print bitmasks
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH 2/6] RAS: Report all ARM processor CPER information to userspace
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH 1/6] RAS: ACPI: APEI: add conditional compilation to ARM error report functions
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH 1/6] RAS: ACPI: APEI: add conditional compilation to ARM error report functions
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 1/6] RAS: ACPI: APEI: add conditional compilation to ARM error report functions
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- Re: [PATCH 1/6] RAS: ACPI: APEI: add conditional compilation to ARM error report functions
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH 2/6] RAS: Report all ARM processor CPER information to userspace
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH 0/6] Fix issues with ARM Processor CPER records
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH 3/6] efi/cper: Adjust infopfx size to accept an extra space
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH 5/6] efi/cper: align ARM CPER type with UEFI 2.9A/2.10 specs
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH 6/6] docs: efi: add CPER functions to driver-api
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH 4/6] efi/cper: Add a new helper function to print bitmasks
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH 1/6] RAS: ACPI: APEI: add conditional compilation to ARM error report functions
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [efi:next] BUILD SUCCESS f06ecac98e56e2d6c8cb04da732dc6709f7e3fef
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH 1/2] x86/efistub: Avoid returning EFI_SUCCESS on error
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH 2/2] x86/efistub: Drop redundant clearing of BSS
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [efi:next] BUILD SUCCESS d68cc8abc357c05ca1567458965f009add8bab69
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 1/2] ACPI: PRM: Add PRM handler direct call support
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: (subset) [PATCH 0/14] New uid & gid mount option parsing helpers
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [PATCH] efistub/smbios: Simplify SMBIOS enumeration API
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [RFC PATCH] x86/efi: Drop support for fake EFI memory maps
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH] x86/efi: Drop support for fake EFI memory maps
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [RFC PATCH] x86/efi: Drop support for fake EFI memory maps
- From: Tony Luck <tony.luck@xxxxxxxxx>
- Re: [RFC PATCH] x86/efi: Drop support for fake EFI memory maps
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH v5 2/4] efi/cper: Add a new helper function to print bitmasks
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH v3 2/2] x86/efistub: Call Apple set_os protocol on dual GPU Intel Macs
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH v3 1/2] efistub/x86: Enable SMBIOS protocol handling for x86
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH v3 0/2] efi/x86: Call set_os() protocol on dual GPU Macs
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [PATCH v2] efi: libstub: add support for the apple_set_os protocol
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [RFC PATCH] x86/efi: Drop support for fake EFI memory maps
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2] efi: libstub: add support for the apple_set_os protocol
- From: Orlando Chamberlain <orlandoch.dev@xxxxxxxxx>
- Re: [RFC PATCH] x86/efi: Drop support for fake EFI memory maps
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2] efi: libstub: add support for the apple_set_os protocol
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH 01/14] fs_parse: add uid & gid option option parsing helpers
- From: Jan Kara <jack@xxxxxxx>
- Re: [PATCH v2] efi: libstub: add support for the apple_set_os protocol
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH v2] efi: libstub: add support for the apple_set_os protocol
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH v2] efi: libstub: add support for the apple_set_os protocol
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH v2] efi: libstub: add support for the apple_set_os protocol
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH v2] efi: libstub: add support for the apple_set_os protocol
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2] efi: libstub: add support for the apple_set_os protocol
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH v2] efi: libstub: add support for the apple_set_os protocol
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH v2] efi: libstub: add support for the apple_set_os protocol
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH v2] efi: libstub: add support for the apple_set_os protocol
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2] efi: libstub: add support for the apple_set_os protocol
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH v2] efi: libstub: add support for the apple_set_os protocol
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH v2] efi: libstub: add support for the apple_set_os protocol
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2] efi: libstub: add support for the apple_set_os protocol
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH v2] efi: libstub: add support for the apple_set_os protocol
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2] efi: libstub: add support for the apple_set_os protocol
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH v2] efi: libstub: add support for the apple_set_os protocol
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2] efi: libstub: add support for the apple_set_os protocol
- From: Orlando Chamberlain <orlandoch.dev@xxxxxxxxx>
- [PATCH v2] efi: libstub: add support for the apple_set_os protocol
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH] efi: libstub: add support for the apple_set_os protocol
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH] efi: libstub: add support for the apple_set_os protocol
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi: libstub: add support for the apple_set_os protocol
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH] efi: libstub: add support for the apple_set_os protocol
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH] efi: libstub: add support for the apple_set_os protocol
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi: libstub: add support for the apple_set_os protocol
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH] efi: libstub: add support for the apple_set_os protocol
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH] efi: libstub: add support for the apple_set_os protocol
- From: Orlando Chamberlain <orlandoch.dev@xxxxxxxxx>
- Re: [PATCH] efi: libstub: add support for the apple_set_os protocol
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH] efi: libstub: add support for the apple_set_os protocol
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH] efi: libstub: add support for the apple_set_os protocol
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH] efi: libstub: add support for the apple_set_os protocol
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH] efi: libstub: add support for the apple_set_os protocol
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH] efi: libstub: add support for the apple_set_os protocol
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH v5 3/4] efi/cper: align ARM CPER type with UEFI 2.9A/2.10 specs
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: Regression: drivers/firmware/efi/libstub/zboot.lds DISCARD
- From: Tj <tj.iam.tj@xxxxxxxxx>
- Re: Regression: drivers/firmware/efi/libstub/zboot.lds DISCARD
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [efi:next] BUILD SUCCESS 2e15194fbc85dd07f117e51de2d6485ea069d950
- From: kernel test robot <lkp@xxxxxxxxx>
- Regression: drivers/firmware/efi/libstub/zboot.lds DISCARD
- From: Tj <tj.iam.tj@xxxxxxxxx>
- Re: [PATCH 01/14] fs_parse: add uid & gid option option parsing helpers
- From: Eric Sandeen <sandeen@xxxxxxxxxxx>
- Re: [PATCH 01/14] fs_parse: add uid & gid option option parsing helpers
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH 0/14] New uid & gid mount option parsing helpers
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH 01/14] fs_parse: add uid & gid option option parsing helpers
- From: Jan Kara <jack@xxxxxxx>
- [PATCH 04/14] efivarfs: Convert to new uid/gid option parsing helpers
- From: Eric Sandeen <sandeen@xxxxxxxxxx>
- [PATCH 01/14] fs_parse: add uid & gid option option parsing helpers
- From: Eric Sandeen <sandeen@xxxxxxxxxx>
- [PATCH 0/14] New uid & gid mount option parsing helpers
- From: Eric Sandeen <sandeen@xxxxxxxxxx>
- Re: [PATCH v2] riscv: dmi: Add SMBIOS/DMI support
- From: patchwork-bot+linux-riscv@xxxxxxxxxx
- Re: [PATCH v3] riscv: dmi: Add SMBIOS/DMI support
- From: patchwork-bot+linux-riscv@xxxxxxxxxx
- Re: [PATCH v2] ARM: Add support for STACKLEAK gcc plugin
- From: Kees Cook <kees@xxxxxxxxxx>
- Re: [PATCH v5 3/4] efi/cper: align ARM CPER type with UEFI 2.9A/2.10 specs
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 1/2] ACPI: PRM: Add PRM handler direct call support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2] ARM: Add support for STACKLEAK gcc plugin
- From: Jinjie Ruan <ruanjinjie@xxxxxxxxxx>
- Re: [PATCH v2] riscv: dmi: Add SMBIOS/DMI support
- From: Haibo Xu <xiaobo55x@xxxxxxxxx>
- Re: [PATCH v2] riscv: dmi: Add SMBIOS/DMI support
- From: Palmer Dabbelt <palmer@xxxxxxxxxxx>
- Re: [PATCH] x86/64/mm: Make 5-level paging support unconditional
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH] x86/64/mm: Make 5-level paging support unconditional
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH] x86/64/mm: Make 5-level paging support unconditional
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] x86/64/mm: Make 5-level paging support unconditional
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 3/4] acpi/ghes, cxl/pci: Trace FW-First CXL Protocol Errors
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- [PATCH v5 3/4] efi/cper: align ARM CPER type with UEFI 2.9A/2.10 specs
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH v5 0/4] fix CPER issues related to UEFI 2.9A Errata
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH v5 2/4] efi/cper: Add a new helper function to print bitmasks
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH v5 4/4] docs: efi: add CPER functions to driver-api
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH v5 1/4] efi/cper: Adjust infopfx size to accept an extra space
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- Re: [PATCH v2] ARM: Add support for STACKLEAK gcc plugin
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- Re: [PATCH v2] riscv: enable HAVE_ARCH_STACKLEAK
- From: Charlie Jenkins <charlie@xxxxxxxxxxxx>
- [PATCH v2] ARM: Add support for STACKLEAK gcc plugin
- From: Jinjie Ruan <ruanjinjie@xxxxxxxxxx>
- [PATCH v2] riscv: enable HAVE_ARCH_STACKLEAK
- From: Jisheng Zhang <jszhang@xxxxxxxxxx>
- Re: [PATCH] riscv: enable HAVE_ARCH_STACKLEAK
- From: Jisheng Zhang <jszhang@xxxxxxxxxx>
- Re: [PATCH] riscv: enable HAVE_ARCH_STACKLEAK
- From: Charlie Jenkins <charlie@xxxxxxxxxxxx>
- Re: [PATCH] riscv: enable HAVE_ARCH_STACKLEAK
- From: Charlie Jenkins <charlie@xxxxxxxxxxxx>
- Re: [PATCH] riscv: enable HAVE_ARCH_STACKLEAK
- From: Jisheng Zhang <jszhang@xxxxxxxxxx>
- Re: [PATCH] riscv: enable HAVE_ARCH_STACKLEAK
- From: Charlie Jenkins <charlie@xxxxxxxxxxxx>
- [PATCH 1/3] x86/64/mm: Always use dynamic memory layout
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCH 2/3] x86/64/mm: Make SPARSEMEM_VMEMMAP the only memory model
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCH 0/3] x86: Make 5-level paging support unconditional for x86-64
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCH 3/3] x86/64/mm: Make 5-level paging support unconditional
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/3] Fix CPER issues related to UEFI 2.9A Errata
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- Re: [PATCH] ARM: Add support for STACKLEAK gcc plugin
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v4 3/3] efi/cper: align ARM CPER type with UEFI 2.9A/2.10 specs
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- Re: [PATCH v4 2/3] efi/cper: Add a new helper function to print bitmasks
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- Re: [PATCH v4 3/3] efi/cper: align ARM CPER type with UEFI 2.9A/2.10 specs
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v4 2/3] efi/cper: Add a new helper function to print bitmasks
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v4 2/3] efi/cper: Add a new helper function to print bitmasks
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v4 1/3] efi/cper: Adjust infopfx size to accept an extra space
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v4 0/3] Fix CPER issues related to UEFI 2.9A Errata
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] ARM: Add support for STACKLEAK gcc plugin
- From: Jinjie Ruan <ruanjinjie@xxxxxxxxxx>
- Re: [RFC PATCH v2 0/8] Clavis LSM
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH] ARM: Add support for STACKLEAK gcc plugin
- From: Kees Cook <kees@xxxxxxxxxx>
- [PATCH v4 2/3] efi/cper: Add a new helper function to print bitmasks
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- RE: [PATCH v4 2/3] efi/cper: Add a new helper function to print bitmasks
- From: "Luck, Tony" <tony.luck@xxxxxxxxx>
- [PATCH v4 3/3] efi/cper: align ARM CPER type with UEFI 2.9A/2.10 specs
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH v4 0/3] Fix CPER issues related to UEFI 2.9A Errata
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH v4 1/3] efi/cper: Adjust infopfx size to accept an extra space
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- Re: [PATCH v9 04/19] x86: Secure Launch Resource Table header file
- From: ross.philipson@xxxxxxxxxx
- [PATCH] ARM: Add support for STACKLEAK gcc plugin
- From: Jinjie Ruan <ruanjinjie@xxxxxxxxxx>
- [PATCH v3 3/3] efi/cper: align ARM CPER type with UEFI 2.9A/2.10 specs
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH v3 2/3] efi/cper: Add a new helper function to print bitmasks
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH v3 1/3] efi/cper: Adjust infopfx size to accept an extra space
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH v3 0/3] Fix CPER issues related to UEFI 2.9A Errata
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [RFC PATCH] x86/efi: Drop support for fake EFI memory maps
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [PATCH v9 04/19] x86: Secure Launch Resource Table header file
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [no subject]
- Re: [RFC PATCH v2 0/8] Clavis LSM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] efi/cper: align ARM CPER type with UEFI 2.9A/2.10 specs
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v2] efi/cper: align ARM CPER type with UEFI 2.9A/2.10 specs
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [RFC] efi/cper: align ARM CPER type with UEFI 2.9A/2.10 specs
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- Re: [GIT PULL] EFI fixes for v6.10 #3
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] EFI fixes for v6.10 #3
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH AUTOSEL 6.1 06/29] efi/libstub: zboot.lds: Discard .discard sections
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.1 07/29] efi: pstore: Return proper errors on UEFI failures
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH AUTOSEL 6.9 07/44] efi: pstore: Return proper errors on UEFI failures
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH AUTOSEL 6.6 07/35] efi: pstore: Return proper errors on UEFI failures
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.6 06/35] efi/libstub: zboot.lds: Discard .discard sections
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.9 07/44] efi: pstore: Return proper errors on UEFI failures
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.9 06/44] efi/libstub: zboot.lds: Discard .discard sections
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH AUTOSEL 6.1 07/29] efi: pstore: Return proper errors on UEFI failures
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- [PATCH AUTOSEL 6.1 06/29] efi/libstub: zboot.lds: Discard .discard sections
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.6 06/35] efi/libstub: zboot.lds: Discard .discard sections
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.1 07/29] efi: pstore: Return proper errors on UEFI failures
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH AUTOSEL 6.6 07/35] efi: pstore: Return proper errors on UEFI failures
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH AUTOSEL 6.6 07/35] efi: pstore: Return proper errors on UEFI failures
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH AUTOSEL 6.9 07/44] efi: pstore: Return proper errors on UEFI failures
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH AUTOSEL 6.9 06/44] efi/libstub: zboot.lds: Discard .discard sections
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.9 07/44] efi: pstore: Return proper errors on UEFI failures
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH] riscv: enable HAVE_ARCH_STACKLEAK
- From: Jisheng Zhang <jszhang@xxxxxxxxxx>
- [RFC PATCH] x86: efi: Reserve all boot services regions to avoid memory reservation conflicts
- From: Li Huafei <lihuafei1@xxxxxxxxxx>
- [efi:urgent] BUILD SUCCESS 46e27b9961d8712bc89234444ede314cec0e8bae
- From: kernel test robot <lkp@xxxxxxxxx>
- [efi:urgent] BUILD SUCCESS f1d4f28feb2cc93528083d94503742289ea3ecc6
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: EFI mixed mode boot failure
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: EFI mixed mode boot failure
- From: Nicholas Bishop <nicholasbishop@xxxxxxxxxx>
- Re: [PATCH v3] x86/efi: Free EFI memory map only when installing a new one.
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v3] x86/efi: Free EFI memory map only when installing a new one.
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH 3/4] acpi/ghes, cxl/pci: Trace FW-First CXL Protocol Errors
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- Re: [PATCH] arm64/efi: Fix kmemleak false positive in arm64_efi_rt_init()
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH] arm64/efi: Fix kmemleak false positive in arm64_efi_rt_init()
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] arm64/efi: Fix kmemleak false positive in arm64_efi_rt_init()
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [PATCH v3] x86/efi: Free EFI memory map only when installing a new one.
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3] x86/efi: Free EFI memory map only when installing a new one.
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3] riscv: dmi: Add SMBIOS/DMI support
- From: Haibo Xu <haibo1.xu@xxxxxxxxx>
- [PATCH v2] x86/boot: Don't add the EFI stub to targets, again
- From: Benjamin Segall <bsegall@xxxxxxxxxx>
- Re: EFI mixed mode boot failure
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: EFI mixed mode boot failure
- From: Nicholas Bishop <nicholasbishop@xxxxxxxxxx>
- [PATCH v3] x86/efi: Free EFI memory map only when installing a new one.
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [PATCH v2] x86/efi: Free EFI memory map only when installing a new one.
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2] x86/efi: Free EFI memory map only when installing a new one.
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [PATCH] x86/efi: Free EFI memory map only when installing a new one.
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] x86/efi: Free EFI memory map only when installing a new one.
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH 3/4] acpi/ghes, cxl/pci: Trace FW-First CXL Protocol Errors
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH] efi/x86: Clear BSS when entering in mixed mode via compat entrypoint
- From: Nicholas Bishop <nicholasbishop@xxxxxxxxxx>
- Re: [RFC PATCH v2 8/8] clavis: Introduce new LSM called clavis
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v2] efi/arm: Disable LPAE PAN when calling EFI runtime services
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [PATCH] efi/arm: Disable LPAE PAN when calling EFI runtime services
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi/arm: Disable LPAE PAN when calling EFI runtime services
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- Re: [RFC PATCH v2 8/8] clavis: Introduce new LSM called clavis
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH] efi/x86: Clear BSS when entering in mixed mode via compat entrypoint
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: EFI mixed mode boot failure
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 2/4] acpi/ghes, efi/cper: Recognize and process CXL Protocol Errors.
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- Re: [PATCH 1/4] efi/cper, cxl: Make definitions and structures global
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- Re: EFI mixed mode boot failure
- From: Nicholas Bishop <nicholasbishop@xxxxxxxxxx>
- Re: EFI mixed mode boot failure
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- EFI mixed mode boot failure
- From: Nicholas Bishop <nicholasbishop@xxxxxxxxxx>
- Re: [PATCH] x86/efi: Free EFI memory map only when installing a new one.
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH] x86/efi: Free EFI memory map only when installing a new one.
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH] efi/arm: Disable LPAE PAN when calling EFI runtime services
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [PATCH] x86/boot: Don't add the EFI stub to targets, again
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 4/4] cxl/pci: Define a common function get_cxl_dev()
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH 2/4] acpi/ghes, efi/cper: Recognize and process CXL Protocol Errors.
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH 1/4] efi/cper, cxl: Make definitions and structures global
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH] x86/boot: Don't add the EFI stub to targets, again
- From: Benjamin Segall <bsegall@xxxxxxxxxx>
- Re: [GIT PULL] EFI fixes for v6.10 #2
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v9 04/19] x86: Secure Launch Resource Table header file
- From: ross.philipson@xxxxxxxxxx
- [GIT PULL] EFI fixes for v6.10 #2
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [efi:urgent] BUILD SUCCESS 99280413a5b785f22d91e8a8a66dc38f4a214495
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v9 04/19] x86: Secure Launch Resource Table header file
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 0/8] Clavis LSM
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [RFC PATCH v2 1/8] certs: Introduce ability to link to a system key
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v9 04/19] x86: Secure Launch Resource Table header file
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH] efi: Add missing __nocfi annotations to runtime wrappers
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- Re: [PATCH] efi: Add missing __nocfi annotations to runtime wrappers
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH v9 04/19] x86: Secure Launch Resource Table header file
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 04/19] x86: Secure Launch Resource Table header file
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v9 04/19] x86: Secure Launch Resource Table header file
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 04/19] x86: Secure Launch Resource Table header file
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 16/19] tpm: Add ability to set the preferred locality the TPM chip uses
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v9 04/19] x86: Secure Launch Resource Table header file
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v9 16/19] tpm: Add ability to set the preferred locality the TPM chip uses
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 10/19] x86: Secure Launch SMP bringup support
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 09/19] x86: Secure Launch kernel late boot stub
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
[Index of Archives]
[Linux Kernel Development]
[Security]
[Linux ARM Kernel]
[Tools]
[Linux MIPS]
[Linux S390]
[Bugtraq]
[Share Photos]>
[Fedora ARM]