Linux EFI/UEFI Development
[Prev Page][Next Page]
- Re: [RFC PATCH] efi/x86: limit EFI old memory map to SGI UV1 machines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH] efi/x86: limit EFI old memory map to SGI UV1 machines
- From: Russ Anderson <rja@xxxxxxx>
- Re: [PATCH v2 13/21] efi/libstub/x86: drop __efi_early() export of efi_config struct
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH] efi/x86: limit EFI old memory map to SGI UV1 machines
- From: Dimitri Sivanich <sivanich@xxxxxxx>
- Re: [PATCH v2 13/21] efi/libstub/x86: drop __efi_early() export of efi_config struct
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 13/21] efi/libstub/x86: drop __efi_early() export of efi_config struct
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH v2 21/21] efi: Allow disabling PCI busmastering on bridges during boot
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 13/21] efi/libstub/x86: drop __efi_early() export of efi_config struct
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH] efi/x86: limit EFI old memory map to SGI UV1 machines
- From: Russ Anderson <rja@xxxxxxx>
- Re: [RFC PATCH] efi/x86: limit EFI old memory map to SGI UV1 machines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 21/21] efi: Allow disabling PCI busmastering on bridges during boot
- From: Laszlo Ersek <lersek@xxxxxxxxxx>
- Re: [PATCH v2 13/21] efi/libstub/x86: drop __efi_early() export of efi_config struct
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- [efi:next 19/20] arch/x86/platform/uv/bios_uv.c:366:1: error: stray '`' in program
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v3 2/4] efi: Add tracking for dynamically allocated memmaps
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 13/21] efi/libstub/x86: drop __efi_early() export of efi_config struct
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 4/4] efi: Fix handling of multiple efi_fake_mem= entries
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v3 3/4] efi: Fix efi_memmap_alloc() leaks
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v3 2/4] efi: Add tracking for dynamically allocated memmaps
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v3 1/4] efi: Add a flags parameter to efi_memory_map
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v3 0/4] efi: Fix handling of multiple efi_fake_mem= entries
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v2 4/4] efi: Fix handling of multiple efi_fake_mem= entries
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH v2 13/21] efi/libstub/x86: drop __efi_early() export of efi_config struct
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH v2 4/4] efi: Fix handling of multiple efi_fake_mem= entries
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v2 13/21] efi/libstub/x86: drop __efi_early() export of efi_config struct
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 4/4] efi: Fix handling of multiple efi_fake_mem= entries
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH v2 4/4] efi: Fix handling of multiple efi_fake_mem= entries
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH v2 4/4] efi: Fix handling of multiple efi_fake_mem= entries
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v2 3/4] efi: Fix efi_memmap_alloc() leaks
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v2 4/4] efi: Fix handling of multiple efi_fake_mem= entries
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH v2 3/4] efi: Fix efi_memmap_alloc() leaks
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH] efi: Fix handling of multiple contiguous efi_fake_mem= entries
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [RFC PATCH] efi/x86: limit EFI old memory map to SGI UV1 machines
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH v2 13/21] efi/libstub/x86: drop __efi_early() export of efi_config struct
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [RFC PATCH] efi/x86: limit EFI old memory map to SGI UV1 machines
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- [PATCH 2/2] efi/x86: Allow translating 64-bit arguments for mixed mode calls
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- [PATCH 1/2] efi/x86: Check number of arguments to variadic functions
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH] efi: Fix handling of multiple contiguous efi_fake_mem= entries
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v2 4/4] efi: Fix handling of multiple efi_fake_mem= entries
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v2 3/4] efi: Fix efi_memmap_alloc() leaks
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v2 2/4] efi: Add tracking for dynamically allocated memmaps
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v2 1/4] efi: Add a flags parameter to efi_memory_map
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v2 0/4] efi: Fix handling of multiple efi_fake_mem= entries
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH] efi: Fix handling of multiple contiguous efi_fake_mem= entries
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [RFC PATCH efi] efi/x86: efi_old_memmap_phys_prolog() can be static
- From: kbuild test robot <lkp@xxxxxxxxx>
- [efi:next 5/13] arch/x86/platform/efi/efi_64.c:77:7: sparse: sparse: symbol 'efi_old_memmap_phys_prolog' was not declared. Should it be static?
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 18/21] efi/libstub: use 'func' not 'f' as macro parameter
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH v2 18/21] efi/libstub: use 'func' not 'f' as macro parameter
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 18/21] efi/libstub: use 'func' not 'f' as macro parameter
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- [PATCH v3] efi: Allow disabling PCI busmastering on bridges during boot
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH] efi/x86: limit EFI old memory map to SGI UV1 machines
- From: Borislav Petkov <bp@xxxxxxxxx>
- [efi:next 9/13] arch/x86//platform/efi/efi_64.c:1029:10: error: implicit declaration of function 'efi_thunk_set_virtual_address_map'; did you mean 'efi_set_virtual_address_map'?
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [RFC PATCH] efi/x86: limit EFI old memory map to SGI UV1 machines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH 1/2] efi/x86: Check number of arguments to variadic functions
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi: Fix handling of multiple contiguous efi_fake_mem= entries
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [RFC PATCH 1/2] efi/x86: Check number of arguments to variadic functions
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] x86/efi: update e820 about reserved EFI boot services data to fix kexec breakage
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH] efi: Fix handling of multiple contiguous efi_fake_mem= entries
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [RFC PATCH 1/2] efi/x86: Check number of arguments to variadic functions
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- [RFC PATCH 2/2] efi/x86: Allow translating 64-bit arguments for mixed mode calls
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- [RFC PATCH 1/2] efi/x86: Check number of arguments to variadic functions
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- [PATCH v2 14/14] efi/x86: remove unreachable code in kexec_enter_virtual_mode()
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 13/14] efi/x86: don't panic or BUG() on non-critical error conditions
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 12/14] efi/x86: clean up efi_systab_init() routine for legibility
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 10/14] efi/x86: simplify mixed mode call wrapper
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 11/14] efi/x86: drop two near identical versions of efi_runtime_init()
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 09/14] efi/x86: simplify 64-bit EFI firmware call wrapper
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 07/14] efi/x86: split SetVirtualAddresMap() wrappers into 32 and 64 bit versions
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 08/14] efi/x86: simplify i386 efi_call_phys() firmware call wrapper
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 06/14] efi/x86: split off some old memmap handling into separate routines
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 05/14] efi/x86: avoid redundant cast of EFI firmware service pointer
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 04/14] efi/x86: map the entire EFI vendor string before copying it
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 03/14] efi/x86: re-disable RT services for 32-bit kernels running on 64-bit EFI
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 02/14] efi/libstub: use correct system table pointer in mixed mode efi_free()
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 01/14] efi/libstub: fix boot argument handling in mixed mode entry code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 00/14] efi: more fixes and general cleanups for v5.6
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] x86/efi: update e820 about reserved EFI boot services data to fix kexec breakage
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH] x86/efi: update e820 about reserved EFI boot services data to fix kexec breakage
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH] x86/efi: update e820 about reserved EFI boot services data to fix kexec breakage
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH] x86/efi: update e820 about reserved EFI boot services data to fix kexec breakage
- From: Dave Young <dyoung@xxxxxxxxxx>
- [PATCH 5.4 393/434] efi/memreserve: Register reservations as reserved in /proc/iomem
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86/efi: update e820 about reserved EFI boot services data to fix kexec breakage
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH] x86/efi: update e820 about reserved EFI boot services data to fix kexec breakage
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH] x86/efi: update e820 about reserved EFI boot services data to fix kexec breakage
- From: Dan Williams <dan.j.williams.korg@xxxxxxxxx>
- [PATCH 7/7] efi/x86: clean up efi_systab_init() routine for legibility
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 6/7] efi/x86: merge two near identical versions of efi_runtime_init()
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 5/7] efi/x86: avoid redundant cast of EFI firmware service pointer
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 4/7] efi/x86: map the entire EFI vendor string before copying it
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 3/7] efi/x86: re-disable RT services for 32-bit kernels running on 64-bit EFI
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 2/7] efi/libstub: use correct system table pointer in mixed mode efi_free()
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 1/7] efi/libstub: fix boot argument handling in mixed mode entry code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 0/7] efi: more fixes and general cleanups for v5.6
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 1/3] efi/x86: simplify 64-bit EFI firmware call wrapper
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 1/3] efi/x86: simplify 64-bit EFI firmware call wrapper
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH 1/3] efi/x86: simplify 64-bit EFI firmware call wrapper
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 1/3] efi/x86: simplify 64-bit EFI firmware call wrapper
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH 1/3] efi/x86: simplify 64-bit EFI firmware call wrapper
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH 1/3] efi/x86: simplify 64-bit EFI firmware call wrapper
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH 1/3] efi/x86: simplify 64-bit EFI firmware call wrapper
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH 1/3] efi/x86: simplify 64-bit EFI firmware call wrapper
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v2 13/21] efi/libstub/x86: drop __efi_early() export of efi_config struct
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 13/21] efi/libstub/x86: drop __efi_early() export of efi_config struct
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH AUTOSEL 4.9 05/38] efi/gop: Return EFI_SUCCESS if a usable GOP was found
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.9 04/38] efi/gop: Return EFI_NOT_FOUND if there are no usable GOPs
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.9 06/38] efi/gop: Fix memory leak in __gop_query32/64()
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH 1/3] efi/x86: simplify 64-bit EFI firmware call wrapper
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 1/3] efi/x86: simplify 64-bit EFI firmware call wrapper
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- [PATCH AUTOSEL 4.14 06/57] x86/efi: Update e820 with reserved EFI boot services data to fix kexec breakage
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 08/57] efi/gop: Return EFI_NOT_FOUND if there are no usable GOPs
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 09/57] efi/gop: Return EFI_SUCCESS if a usable GOP was found
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 10/57] efi/gop: Fix memory leak in __gop_query32/64()
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.4 022/187] x86/efi: Update e820 with reserved EFI boot services data to fix kexec breakage
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.4 026/187] efi/gop: Return EFI_NOT_FOUND if there are no usable GOPs
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.4 027/187] efi/gop: Return EFI_SUCCESS if a usable GOP was found
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.4 028/187] efi/gop: Fix memory leak in __gop_query32/64()
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.4 029/187] efi/earlycon: Remap entire framebuffer after page initialization
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.4 059/187] efi: Don't attempt to map RCI2 config table if it doesn't exist
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH 1/3] efi/x86: simplify 64-bit EFI firmware call wrapper
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- [PATCH AUTOSEL 4.19 10/84] x86/efi: Update e820 with reserved EFI boot services data to fix kexec breakage
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 14/84] efi/gop: Return EFI_SUCCESS if a usable GOP was found
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 13/84] efi/gop: Return EFI_NOT_FOUND if there are no usable GOPs
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 15/84] efi/gop: Fix memory leak in __gop_query32/64()
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH 3/3] efi/x86: avoid RWX mappings for all of DRAM
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 2/3] efi/x86: don't map the entire kernel text RW for mixed mode
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 1/3] x86/mm: fix NX bit clearing issue in kernel_map_pages_in_pgd
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 0/3] efi/x86: righten memory protections at runtime
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 3/3] efi/x86: simplify mixed mode call wrapper
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH 3/3] efi/x86: simplify mixed mode call wrapper
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 3/3] efi/x86: simplify mixed mode call wrapper
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 3/3] efi/x86: simplify mixed mode call wrapper
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH 3/3] efi/x86: simplify mixed mode call wrapper
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH 1/3] efi/x86: simplify 64-bit EFI firmware call wrapper
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH 3/3] efi/x86: simplify mixed mode call wrapper
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 2/3] efi/x86: simplify i386 efi_call_phys() firmware call wrapper
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 1/3] efi/x86: simplify 64-bit EFI firmware call wrapper
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 0/3] efi/x86: clean up and simplify runtime call wrappers
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [RFC PATCH] efi/x86: limit EFI old memory map to SGI UV1 machines
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2] efi: arm: defer probe of PCIe backed efifb on DT systems
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 13/21] efi/libstub/x86: drop __efi_early() export of efi_config struct
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [tip: efi/urgent] efi/earlycon: Fix write-combine mapping on x86
- From: "tip-bot2 for Arvind Sankar" <tip-bot2@xxxxxxxxxxxxx>
- [tip: efi/urgent] x86/efistub: Disable paging at mixed mode entry
- From: "tip-bot2 for Ard Biesheuvel" <tip-bot2@xxxxxxxxxxxxx>
- [tip: efi/urgent] efi/libstub/random: Initialize pointer variables to zero for mixed mode
- From: "tip-bot2 for Hans de Goede" <tip-bot2@xxxxxxxxxxxxx>
- Re: [GIT PULL 00/25] EFI updates for v5.6
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [GIT PULL 0/3] EFI fixes for v5.5
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH v2 13/21] efi/libstub/x86: drop __efi_early() export of efi_config struct
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH 01/25] efi/gop: Remove bogus packed attribute from GOP structures
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 06/25] efi/x86: rename efi_is_native() to efi_is_mixed()
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 03/25] efi/gop: Convert GOP structures to typedef and cleanup some types
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 08/25] efi/libstub: extend native protocol definitions with mixed_mode aliases
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 10/25] efi/libstub: drop explicit 32/64-bit protocol definitions
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 09/25] efi/libstub: distinguish between native/mixed not 32/64 bit
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 07/25] efi/libstub: use a helper to iterate over a EFI handle array
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 11/25] efi/libstub: use stricter typing for firmware function pointers
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 16/25] efi/libstub: unify the efi_char16_printk implementations
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 19/25] efi/libstub: remove 'sys_table_arg' from all function prototypes
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 15/25] efi/libstub: get rid of 'sys_table_arg' macro parameter
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 14/25] efi/libstub: avoid protocol wrapper for file I/O routines
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 12/25] efi/libstub: annotate firmware routines as __efiapi
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 17/25] efi/libstub/x86: drop __efi_early() export and efi_config struct
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 21/25] efi/libstub: drop protocol argument from efi_call_proto() macro
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 25/25] efi/libstub/x86: avoid globals to store context during mixed mode calls
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 24/25] efi/libstub: tidy up types and names of global cmdline variables
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 23/25] efi/libstub: rename efi_call_early/_runtime macros to be more intuitive
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 22/25] efi/libstub: drop 'table' argument from efi_table_attr() macro
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 20/25] efi/libstub/x86: work around page freeing issue in mixed mode
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 18/25] efi/libstub: drop sys_table_arg from printk routines
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 13/25] efi/libstub/x86: avoid thunking for native firmware calls
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 05/25] efi/libstub: remove unused __efi_call_early() macro
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 04/25] efi/gop: Unify 32/64-bit functions
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 02/25] efi/gop: Remove unused typedef
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [GIT PULL 00/25] EFI updates for v5.6
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 3/3] x86/efistub: disable paging at mixed mode entry
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 2/3] efi/libstub/random: Initialize pointer variables to zero for mixed mode
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 1/3] efi/earlycon: Fix write-combine mapping on x86
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [GIT PULL 0/3] EFI fixes for v5.5
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2] partitions/efi: Fix partition name parsing in GUID partition entry
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2] partitions/efi: Fix partition name parsing in GUID partition entry
- From: Nikolai Merinov <n.merinov@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86/efistub: disable paging at mixed mode entry
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH] x86/efistub: disable paging at mixed mode entry
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] x86/efistub: disable paging at mixed mode entry
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH] x86/efistub: disable paging at mixed mode entry
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2] efi: arm: defer probe of PCIe backed efifb on DT systems
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- Re: [PATCH] x86/efistub: disable paging at mixed mode entry
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v2 21/21] efi: Allow disabling PCI busmastering on bridges during boot
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v2 21/21] efi: Allow disabling PCI busmastering on bridges during boot
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH v2 21/21] efi: Allow disabling PCI busmastering on bridges during boot
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 21/21] efi: Allow disabling PCI busmastering on bridges during boot
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- [PATCH] x86/efistub: disable paging at mixed mode entry
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 21/21] efi: Allow disabling PCI busmastering on bridges during boot
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 10/21] efi/libstub/x86: avoid thunking for native firmware calls
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 10/21] efi/libstub/x86: avoid thunking for native firmware calls
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v2 10/21] efi/libstub/x86: avoid thunking for native firmware calls
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 10/21] efi/libstub/x86: avoid thunking for native firmware calls
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH v2 10/21] efi/libstub/x86: avoid thunking for native firmware calls
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 10/21] efi/libstub/x86: avoid thunking for native firmware calls
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v2 10/21] efi/libstub/x86: avoid thunking for native firmware calls
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 10/21] efi/libstub/x86: avoid thunking for native firmware calls
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 21/21] efi: Allow disabling PCI busmastering on bridges during boot
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH v2 21/21] efi: Allow disabling PCI busmastering on bridges during boot
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v2 10/21] efi/libstub/x86: avoid thunking for native firmware calls
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v2 21/21] efi: Allow disabling PCI busmastering on bridges during boot
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 21/21] efi: Allow disabling PCI busmastering on bridges during boot
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v2 21/21] efi: Allow disabling PCI busmastering on bridges during boot
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH v2 21/21] efi: Allow disabling PCI busmastering on bridges during boot
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 21/21] efi: Allow disabling PCI busmastering on bridges during boot
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v2 21/21] efi: Allow disabling PCI busmastering on bridges during boot
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 21/21] efi: Allow disabling PCI busmastering on bridges during boot
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v2 21/21] efi: Allow disabling PCI busmastering on bridges during boot
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v2 00/21] efi/x86: confine type unsafe casting to mixed mode
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 21/21] efi: Allow disabling PCI busmastering on bridges during boot
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 00/21] efi/x86: confine type unsafe casting to mixed mode
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v2 21/21] efi: Allow disabling PCI busmastering on bridges during boot
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v2 21/21] efi: Allow disabling PCI busmastering on bridges during boot
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 20/21] efi/libstub: import type definitions for creating and signalling events
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 19/21] efi/libstub: tidy up types and names of global cmdline variables
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 18/21] efi/libstub: use 'func' not 'f' as macro parameter
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 17/21] efi/libstub: drop 'table' argument from efi_table_attr() macro
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 16/21] efi/libstub: drop protocol argument from efi_call_proto() macro
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 15/21] efi/libstub: remove 'sys_table_arg' from all function prototypes
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 14/21] efi/libstub: drop sys_table_arg from printk routines
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 13/21] efi/libstub/x86: drop __efi_early() export of efi_config struct
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 12/21] efi/libstub: unify the efi_char16_printk implementations
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 11/21] efi/libstub: get rid of 'sys_table_arg' macro parameter
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 10/21] efi/libstub/x86: avoid thunking for native firmware calls
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 09/21] efi/libstub: annotate firmware routines as __efiapi
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 08/21] efi/libstub: use stricter typing for firmware function pointers
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 07/21] efi/libstub: drop explicit 32/64-bit protocol definitions
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 06/21] efi/libstub/x86: use mixed mode helpers to populate efi_config
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 05/21] efi/libstub: distinguish between native/mixed not 32/64 bit
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 04/21] efi/libstub: extend native protocol definitions with mixed_mode aliases
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 03/21] efi/libstub: use a helper to iterate over a EFI handle array
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 02/21] efi/x86: rename efi_is_native() to efi_is_mixed()
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 01/21] efi/libstub: remove unused __efi_call_early() macro
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 00/21] efi/x86: confine type unsafe casting to mixed mode
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi: arm: defer probe of PCIe backed efifb on DT systems
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi: arm: defer probe of PCIe backed efifb on DT systems
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- Re: [GIT PULL] EFI fixes
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH 09/10] efi/libstub: annotate firmware routines as __efiapi
- From: Brian Gerst <brgerst@xxxxxxxxx>
- [GIT PULL] EFI fixes
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH 10/10] efi/libstub/x86: avoid thunking for native firmware calls
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 10/10] efi/libstub/x86: avoid thunking for native firmware calls
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH 05/10] efi/libstub: distinguish between native/mixed not 32/64 bit
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH 05/10] efi/libstub: distinguish between native/mixed not 32/64 bit
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 05/10] efi/libstub: distinguish between native/mixed not 32/64 bit
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH 05/10] efi/libstub: distinguish between native/mixed not 32/64 bit
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 05/10] efi/libstub: distinguish between native/mixed not 32/64 bit
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH 03/10] efi/libstub: use a helper to iterate over a EFI handle array
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH 03/10] efi/libstub: use a helper to iterate over a EFI handle array
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH 03/10] efi/libstub: use a helper to iterate over a EFI handle array
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 03/10] efi/libstub: use a helper to iterate over a EFI handle array
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 03/10] efi/libstub: use a helper to iterate over a EFI handle array
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH 05/10] efi/libstub: distinguish between native/mixed not 32/64 bit
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 05/10] efi/libstub: distinguish between native/mixed not 32/64 bit
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH 05/10] efi/libstub: distinguish between native/mixed not 32/64 bit
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 05/10] efi/libstub: distinguish between native/mixed not 32/64 bit
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH 05/10] efi/libstub: distinguish between native/mixed not 32/64 bit
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- [PATCH 10/10] efi/libstub/x86: avoid thunking for native firmware calls
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 09/10] efi/libstub: annotate firmware routines as __efiapi
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 08/10] efi/libstub: use stricter typing for firmware function pointers
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 07/10] efi/libstub: drop explicit 64-bit protocol definitions
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 06/10] efi/libstub/x86: use mixed mode helpers to populate efi_config
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 04/10] efi/libstub: add missing apple_properties_protocol_t definition
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 03/10] efi/libstub: use a helper to iterate over a EFI handle array
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 01/10] efi/libstub: remove unused __efi_call_early() macro
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 05/10] efi/libstub: distinguish between native/mixed not 32/64 bit
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 02/10] efi/x86: rename efi_is_native() to efi_is_mixed()
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 00/10] efi/x86: confine type unsafe casting to mixed mode
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi/libstub: disable file loading and page deallocation in mixed mode
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi/libstub: disable file loading and page deallocation in mixed mode
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH V2] efi: Allow disabling PCI busmastering on bridges during boot
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: [PATCH] [EFI,PCI] Allow disabling PCI busmastering on bridges during boot
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH] efi/libstub: disable file loading and page deallocation in mixed mode
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi/libstub: disable file loading and page deallocation in mixed mode
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi/libstub: disable file loading and page deallocation in mixed mode
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH] efi/libstub: disable file loading and page deallocation in mixed mode
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v5 1/6] efi / ras: CCIX Memory error reporting
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v5 6/6] efi / ras: CCIX Agent internal error reporting
- From: Mauro Carvalho Chehab <mchehab@xxxxxxxxxx>
- Re: [PATCH v5 2/6] efi / ras: CCIX Cache error reporting
- From: Mauro Carvalho Chehab <mchehab@xxxxxxxxxx>
- Re: [PATCH v5 1/6] efi / ras: CCIX Memory error reporting
- From: Mauro Carvalho Chehab <mchehab@xxxxxxxxxx>
- Re: [PATCH] efi/libstub: disable file loading and page deallocation in mixed mode
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH 2/2] efi: show error messages only when loading certificates is failed
- From: Joey Lee <JLee@xxxxxxxx>
- Re: [PATCH 1/2 v2] efi: add a function to convert the status code to a string
- From: Joey Lee <JLee@xxxxxxxx>
- Re: efi/gop: do we need to check ConOut any more?
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 2/2] efi: show error messages only when loading certificates is failed
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 1/2 v2] efi: add a function to convert the status code to a string
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 2/2] efi: show error messages only when loading certificates is failed
- From: Joey Lee <JLee@xxxxxxxx>
- [PATCH] efi/libstub: disable file loading and page deallocation in mixed mode
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 2/2] efi: show error messages only when loading certificates is failed
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 2/2] efi: show error messages only when loading certificates is failed
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 1/2 v2] efi: add a function to convert the status code to a string
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 0/2 v2] efi: cosmetic patches for the error messages when
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- Re: [PATCH 5.5 regression fix 2/2] efi/libstub/helper: Initialize pointer variables to zero for mixed mode
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH 0/5] efi/gop: Merge 32/64-bit code
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [RFC PATCH 3/5] efi/gop: Convert GOP structures to typedef and cleanup some types
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH 3/5] efi/gop: Convert GOP structures to typedef and cleanup some types
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [RFC PATCH 0/5] efi/gop: Merge 32/64-bit code
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH 3/5] efi/gop: Convert GOP structures to typedef and cleanup some types
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH 0/5] efi/gop: Merge 32/64-bit code
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- efi/gop: do we need to check ConOut any more?
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [RFC PATCH 0/5] efi/gop: Merge 32/64-bit code
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH 1/5] efi/gop: Remove bogus packed attribute from GOP structures
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 5/5] efi/gop: Check that the framebuffer will be accessible
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- [RFC PATCH 4/5] efi/gop: Unify 32/64-bit functions
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- [RFC PATCH 3/5] efi/gop: Convert GOP structures to typedef and cleanup some types
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- [RFC PATCH 2/5] efi/gop: Remove unused typedef
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- [RFC PATCH 1/5] efi/gop: Remove bogus packed attribute from GOP structures
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- [RFC PATCH 0/5] efi/gop: Merge 32/64-bit code
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH] efi/earlycon: Fix write-combine mapping on x86
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi/earlycon: Fix write-combine mapping on x86
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH] [EFI,PCI] Allow disabling PCI busmastering on bridges during boot
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 1/2] efi: add a function for transferring status to string
- From: Joey Lee <JLee@xxxxxxxx>
- Re: [PATCH 5.5 regression fix 2/2] efi/libstub/helper: Initialize pointer variables to zero for mixed mode
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 5.5 regression fix 2/2] efi/libstub/helper: Initialize pointer variables to zero for mixed mode
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH 5.5 regression fix 2/2] efi/libstub/helper: Initialize pointer variables to zero for mixed mode
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH 5.5 regression fix 0/2] efi/libstub: Fix mixed-mode crash at boot
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 5.5 regression fix 2/2] efi/libstub/helper: Initialize pointer variables to zero for mixed mode
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 1/2] efi: add a function for transferring status to string
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 5.5 regression fix 1/2] efi/libstub/random: Initialize pointer variables to zero for mixed mode
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 5.5 regression fix 1/2] efi/libstub/random: Initialize pointer variables to zero for mixed mode
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH 5.5 regression fix 2/2] efi/libstub/helper: Initialize pointer variables to zero for mixed mode
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH 5.5 regression fix 0/2] efi/libstub: Fix mixed-mode crash at boot
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH 2/2] efi: show error messages only when loading certificates is failed
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 1/2] efi: add a function for transferring status to string
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 0/2] efi: cosmetic patches for the error messages when loading certificates
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- Re: [PATCH] efi/earlycon: Fix write-combine mapping on x86
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH] efi/earlycon: Fix write-combine mapping on x86
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi/earlycon: Fix write-combine mapping on x86
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH] efi/earlycon: Fix write-combine mapping on x86
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH 6/6] efi/earlycon: Remap entire framebuffer after page initialization
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH] efi/earlycon: Fix write-combine mapping on x86
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH] efi/earlycon: Fix write-combine mapping on x86
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 6/6] efi/earlycon: Remap entire framebuffer after page initialization
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi/earlycon: Fix write-combine mapping on x86
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH] efi/earlycon: Fix write-combine mapping on x86
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] efi/earlycon: Fix write-combine mapping on x86
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH 6/6] efi/earlycon: Remap entire framebuffer after page initialization
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- [PATCH v10 03/10] firmware: Rename FW_OPT_NOFALLBACK to FW_OPT_NOFALLBACK_SYSFS
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v10 06/10] selftests: firmware: Add firmware_request_platform tests
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v10 04/10] firmware: Add new platform fallback mechanism and firmware_request_platform()
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v10 10/10] platform/x86: touchscreen_dmi: Add info for the Chuwi Vi8 Plus tablet
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v10 07/10] Input: silead - Switch to firmware_request_platform for retreiving the fw
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v10 09/10] platform/x86: touchscreen_dmi: Add EFI embedded firmware info support
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v10 08/10] Input: icn8505 - Switch to firmware_request_platform for retreiving the fw
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v10 05/10] test_firmware: add support for firmware_request_platform
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v10 02/10] efi: Add embedded peripheral firmware support
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v10 01/10] efi: Export boot-services code and data as debugfs-blobs
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v10 00/10] efi/firmware/platform-x86: Add EFI embedded fw support
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [tip: efi/urgent] efi: Don't attempt to map RCI2 config table if it doesn't exist
- From: "tip-bot2 for Ard Biesheuvel" <tip-bot2@xxxxxxxxxxxxx>
- [PATCH 1/1] efi: don't attempt to map RCI2 config table if it doesn't exist
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [GIT PULL 0/1] EFI fix for v5.5
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: PROBLEM: Kernel 5.4.2 Oops: ARCH=i386, Intel n270 CPU, CONFIG_EFI_RCI2=y, CONFIG_HIHGMEM64G=y
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v10 0/9] powerpc: Enabling IMA arch specific secure boot policies
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 0/9] powerpc: Enabling IMA arch specific secure boot policies
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 6/6] efi/earlycon: Remap entire framebuffer after page initialization
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 6/6] efi/earlycon: Remap entire framebuffer after page initialization
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- [tip: efi/urgent] efi/gop: Fix memory leak in __gop_query32/64()
- From: "tip-bot2 for Arvind Sankar" <tip-bot2@xxxxxxxxxxxxx>
- [tip: efi/urgent] efi/earlycon: Remap entire framebuffer after page initialization
- From: "tip-bot2 for Andy Shevchenko" <tip-bot2@xxxxxxxxxxxxx>
- [tip: efi/urgent] efi/memreserve: Register reservations as 'reserved' in /proc/iomem
- From: "tip-bot2 for Ard Biesheuvel" <tip-bot2@xxxxxxxxxxxxx>
- [tip: efi/urgent] efi/gop: Return EFI_NOT_FOUND if there are no usable GOPs
- From: "tip-bot2 for Arvind Sankar" <tip-bot2@xxxxxxxxxxxxx>
- [tip: efi/urgent] efi: Fix efi_loaded_image_t::unload type
- From: "tip-bot2 for Arvind Sankar" <tip-bot2@xxxxxxxxxxxxx>
- [tip: efi/urgent] efi/gop: Return EFI_SUCCESS if a usable GOP was found
- From: "tip-bot2 for Arvind Sankar" <tip-bot2@xxxxxxxxxxxxx>
- [efi:next 4/4] arch/x86//platform/efi/efi.c:598:11: warning: 'return' with a value, in function returning void
- From: kbuild test robot <lkp@xxxxxxxxx>
- [efi:next 1/4] drivers/firmware//efi/libstub/tpm.c:23:0: warning: "get_efi_var" redefined
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH 3/6] efi/gop: Return EFI_SUCCESS if a usable GOP was found
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 2/6] efi/gop: Return EFI_NOT_FOUND if there are no usable GOPs
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 4/6] efi/gop: Fix memory leak from __gop_query32/64
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 5/6] efi: fix type of unload field in efi_loaded_image_t
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 6/6] efi/earlycon: Remap entire framebuffer after page initialization
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 1/6] efi/memreserve: register reservations as 'reserved' in /proc/iomem
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [GIT PULL 0/6] EFI fixes for v5.5
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] x86/efi: update e820 about reserved EFI boot services data to fix kexec breakage
- From: Michael Weiser <michael@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4] efi/earlycon: Remap entire framebuffer after page initialization
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v4] efi/earlycon: Remap entire framebuffer after page initialization
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH v4] efi/earlycon: Remap entire framebuffer after page initialization
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v4] efi/earlycon: Remap entire framebuffer after page initialization
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- [PATCH v9 10/10] platform/x86: touchscreen_dmi: Add info for the Chuwi Vi8 Plus tablet
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v9 09/10] platform/x86: touchscreen_dmi: Add EFI embedded firmware info support
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v9 08/10] Input: icn8505 - Switch to firmware_request_platform for retreiving the fw
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v9 07/10] Input: silead - Switch to firmware_request_platform for retreiving the fw
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v9 06/10] selftests: firmware: Add firmware_request_platform tests
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v9 05/10] test_firmware: add support for firmware_request_platform
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v9 04/10] firmware: Add new platform fallback mechanism and firmware_request_platform()
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v9 03/10] firmware: Rename FW_OPT_NOFALLBACK to FW_OPT_NOFALLBACK_SYSFS
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v9 02/10] efi: Add embedded peripheral firmware support
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v9 01/10] efi: Export boot-services code and data as debugfs-blobs
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v9 00/10] efi/firmware/platform-x86: Add EFI embedded fw support
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v4] efi/earlycon: Remap entire framebuffer after page initialization
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v4] efi/earlycon: Remap entire framebuffer after page initialization
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4] efi/earlycon: Remap entire framebuffer after page initialization
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] [EFI,PCI] Allow disabling PCI busmastering on bridges during boot
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 0/3] Fix a couple of bugs in efi/gop.c
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] x86/efi: update e820 about reserved EFI boot services data to fix kexec breakage
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH] efi/memreserve: register reservations as 'reserved' in /proc/iomem
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi/memreserve: register reservations as 'reserved' in /proc/iomem
- From: Bhupesh SHARMA <bhupesh.linux@xxxxxxxxx>
- Re: [PATCH] [EFI,PCI] Allow disabling PCI busmastering on bridges during boot
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH] [EFI,PCI] Allow disabling PCI busmastering on bridges during boot
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH] [EFI,PCI] Allow disabling PCI busmastering on bridges during boot
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH] efi/memreserve: register reservations as 'reserved' in /proc/iomem
- From: Masayoshi Mizuma <msys.mizuma@xxxxxxxxx>
- Re: [PATCH] efi/memreserve: register reservations as 'reserved' in /proc/iomem
- From: James Morse <james.morse@xxxxxxx>
- [PATCH v2 2/3] efi/gop: Return EFI_SUCCESS if a usable GOP was found
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- [PATCH v2 3/3] efi/gop: Fix memory leak from __gop_query32/64
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- [PATCH v2 1/3] efi/gop: Return EFI_NOT_FOUND if there are no usable GOP's
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- [PATCH v2 0/3] Fix a couple of bugs in efi/gop.c
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH] efi/memreserve: register reservations as 'reserved' in /proc/iomem
- From: Masayoshi Mizuma <msys.mizuma@xxxxxxxxx>
- Re: [PATCH 1/2] efi/gop: Fix return value of setup_gop32/64
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH 2/2] efi/gop: Fix memory leak in __gop_query32/64
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH 2/2] efi/gop: Fix memory leak in __gop_query32/64
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 1/2] efi/gop: Fix return value of setup_gop32/64
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 2/2] efi/gop: Fix memory leak in __gop_query32/64
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH 1/2] efi/gop: Fix return value of setup_gop32/64
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH 2/2] efi/gop: Fix memory leak in __gop_query32/64
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 1/2] efi/gop: Fix return value of setup_gop32/64
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] efi/memreserve: register reservations as 'reserved' in /proc/iomem
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] x86/efi: update e820 about reserved EFI boot services data to fix kexec breakage
- From: Michael Weiser <michael@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86/efi: update e820 about reserved EFI boot services data to fix kexec breakage
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [tip: x86/urgent] x86/efi: Update e820 with reserved EFI boot services data to fix kexec breakage
- From: "tip-bot2 for Dave Young" <tip-bot2@xxxxxxxxxxxxx>
- Re: [PATCH] x86/efi: update e820 about reserved EFI boot services data to fix kexec breakage
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH] x86/efi: update e820 about reserved EFI boot services data to fix kexec breakage
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH v2 0/2] efi: arm64: Introduce /proc/efi/memreserve to tell the persistent pages
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: [PATCH v2 2/2] efi: arm64: Introduce /proc/efi/memreserve to tell the persistent pages
- From: "d.hatayama@xxxxxxxxxxx" <d.hatayama@xxxxxxxxxxx>
- Re: [PATCH] x86/efi: update e820 about reserved EFI boot services data to fix kexec breakage
- From: Dave Young <dyoung@xxxxxxxxxx>
- [PATCH] x86/efi: update e820 about reserved EFI boot services data to fix kexec breakage
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH] [EFI,PCI] Allow disabling PCI busmastering on bridges during boot
- From: Laszlo Ersek <lersek@xxxxxxxxxx>
- Re: kexec_file overwrites reserved EFI ESRT memory
- From: Dave Young <dyoung@xxxxxxxxxx>
- [PATCH 2/2] efi/gop: Fix memory leak in __gop_query32/64
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- [PATCH 1/2] efi/gop: Fix return value of setup_gop32/64
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: kexec_file overwrites reserved EFI ESRT memory
- From: Michael Weiser <michael@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 1/2] efi: add /proc/efi directory
- From: Masayoshi Mizuma <msys.mizuma@xxxxxxxxx>
- [PATCH v2 2/2] efi: arm64: Introduce /proc/efi/memreserve to tell the persistent pages
- From: Masayoshi Mizuma <msys.mizuma@xxxxxxxxx>
- [PATCH v2 0/2] efi: arm64: Introduce /proc/efi/memreserve to tell the persistent pages
- From: Masayoshi Mizuma <msys.mizuma@xxxxxxxxx>
- Re: [PATCH] [EFI,PCI] Allow disabling PCI busmastering on bridges during boot
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH] [EFI,PCI] Allow disabling PCI busmastering on bridges during boot
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH] [EFI,PCI] Allow disabling PCI busmastering on bridges during boot
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH] [EFI,PCI] Allow disabling PCI busmastering on bridges during boot
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH] efi: fix type of unload field in efi_loaded_image_t
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH] [EFI,PCI] Allow disabling PCI busmastering on bridges during boot
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] [EFI,PCI] Allow disabling PCI busmastering on bridges during boot
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH] [EFI,PCI] Allow disabling PCI busmastering on bridges during boot
- From: Laszlo Ersek <lersek@xxxxxxxxxx>
- Re: [PATCH] efi: fix type of unload field in efi_loaded_image_t
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 2/2] efi: move handling of properties table to x86 specific code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 1/2] efi/arm64: use 1:1 mapping of RT services if property table exists
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 0/2] efi: simplify property table handling on ARM
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: kexec_file overwrites reserved EFI ESRT memory
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: kexec_file overwrites reserved EFI ESRT memory
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH] [EFI,PCI] Allow disabling PCI busmastering on bridges during boot
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: kexec_file overwrites reserved EFI ESRT memory
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi: arm64: Introduce /sys/firmware/efi/memreserve to tell the persistent pages
- From: Masayoshi Mizuma <msys.mizuma@xxxxxxxxx>
- Re: [PATCH] [EFI,PCI] Allow disabling PCI busmastering on bridges during boot
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- [PATCH] [EFI,PCI] Allow disabling PCI busmastering on bridges during boot
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: kexec_file overwrites reserved EFI ESRT memory
- From: Michael Weiser <michael@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] efi/fdt: install new fdt config table
- From: Rob Clark <robdclark@xxxxxxxxx>
- Re: [PATCH] efi/fdt: install new fdt config table
- From: Leif Lindholm <leif.lindholm@xxxxxxxxxx>
- Re: [PATCH] efi/fdt: install new fdt config table
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: kexec_file overwrites reserved EFI ESRT memory
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: kexec_file overwrites reserved EFI ESRT memory
- From: Dave Young <dyoung@xxxxxxxxxx>
- [PATCH] efi: fix type of unload field in efi_loaded_image_t
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- [PATCH] efi/fdt: install new fdt config table
- From: Rob Clark <robdclark@xxxxxxxxx>
- Re: kexec_file overwrites reserved EFI ESRT memory
- From: Michael Weiser <michael@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] efi: arm64: Introduce /sys/firmware/efi/memreserve to tell the persistent pages
- From: Matthias Brugger <matthias.bgg@xxxxxxxxx>
- Re: [PATCH] efi: arm: defer probe of PCIe backed efifb on DT systems
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi: arm: defer probe of PCIe backed efifb on DT systems
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- Re: [PATCH v2 11/12] ACPI/sleep: Convert acpi_wakeup_address into a function
- From: Pavel Machek <pavel@xxxxxxx>
- Re: [PATCH v2 00/12] treewide: break dependencies on x86's RM header
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH v2 00/12] treewide: break dependencies on x86's RM header
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- Re: [PATCH v2 00/12] treewide: break dependencies on x86's RM header
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [GIT PULL] ACPI updates for v5.5-rc1
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [GIT PULL] EFI updates for v5.5
- From: pr-tracker-bot@xxxxxxxxxx
- [PATCH v2 00/12] treewide: break dependencies on x86's RM header
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- [PATCH v2 03/12] x86/ftrace: Explicitly include vmalloc.h for set_vm_flush_reset_perms()
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- [PATCH v2 02/12] x86/boot: Explicitly include realmode.h to handle RM reservations
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- [PATCH v2 01/12] x86/efi: Explicitly include realmode.h to handle RM trampoline quirk
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- [PATCH v2 06/12] efi/capsule-loader: Explicitly include linux/io.h for page_to_phys()
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- [PATCH v2 05/12] perf/x86/intel: Explicitly include asm/io.h to use virt_to_phys()
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- [PATCH v2 04/12] x86/kprobes: Explicitly include vmalloc.h for set_vm_flush_reset_perms()
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- [PATCH v2 10/12] x86/ACPI/sleep: Remove an unnecessary include of asm/realmode.h
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- [PATCH v2 07/12] virt: vbox: Explicitly include linux/io.h to pick up various defs
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- [PATCH v2 08/12] vmw_balloon: Explicitly include linux/io.h for virt_to_phys()
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- [PATCH v2 12/12] x86/ACPI/sleep: Move acpi_get_wakeup_address() into sleep.c, remove <asm/realmode.h> from <asm/acpi.h>
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- [PATCH v2 11/12] ACPI/sleep: Convert acpi_wakeup_address into a function
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- [PATCH v2 09/12] ASoC: Intel: Skylake: Explicitly include linux/io.h for virt_to_phys()
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- [PATCH] efi: arm: defer probe of PCIe backed efifb on DT systems
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [GIT PULL] ACPI updates for v5.5-rc1
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- Re: [PATCH 11/12] ACPI/sleep: Convert acpi_wakeup_address into a function
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH 11/12] ACPI/sleep: Convert acpi_wakeup_address into a function
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- [PATCH] efi: arm64: Introduce /sys/firmware/efi/memreserve to tell the persistent pages
- From: Masayoshi Mizuma <msys.mizuma@xxxxxxxxx>
- Re: [PATCH 11/12] ACPI/sleep: Convert acpi_wakeup_address into a function
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- [GIT PULL] EFI updates for v5.5
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH 11/12] ACPI/sleep: Convert acpi_wakeup_address into a function
- From: Pavel Machek <pavel@xxxxxx>
- Re: kexec_file overwrites reserved EFI ESRT memory
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: kexec_file overwrites reserved EFI ESRT memory
- From: Michael Weiser <michael@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 04/12] x86/kprobes: Explicitly include vmalloc.h for set_vm_flush_reset_perms()
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH 03/12] x86/ftrace: Explicitly include vmalloc.h for set_vm_flush_reset_perms()
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [RFC PATCH v2] efi: arm64: Introduce /sys/firmware/efi/memreserve to tell the persistent pages
- From: Masayoshi Mizuma <msys.mizuma@xxxxxxxxx>
- Re: [PATCH v4 00/10] Add Kernel Concurrency Sanitizer (KCSAN)
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH] firmware/efi: Fix Kconfig indentation
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH 12/12] x86/ACPI/sleep: Move acpi_wakeup_address() definition into sleep.c
- From: "Rafael J. Wysocki" <rjw@xxxxxxxxxxxxx>
- Re: [PATCH 10/12] x86/ACPI/sleep: Remove an unnecessary include of asm/realmode.h
- From: "Rafael J. Wysocki" <rjw@xxxxxxxxxxxxx>
- Re: [PATCH 11/12] ACPI/sleep: Convert acpi_wakeup_address into a function
- From: "Rafael J. Wysocki" <rjw@xxxxxxxxxxxxx>
- Re: [PATCH v4 01/10] kcsan: Add Kernel Concurrency Sanitizer infrastructure
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [PATCH v4 00/10] Add Kernel Concurrency Sanitizer (KCSAN)
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [PATCH v4 01/10] kcsan: Add Kernel Concurrency Sanitizer infrastructure
- From: Qian Cai <cai@xxxxxx>
- Re: [PATCH v4 00/10] Add Kernel Concurrency Sanitizer (KCSAN)
- From: Qian Cai <cai@xxxxxx>
- Re: [PATCH v4 01/10] kcsan: Add Kernel Concurrency Sanitizer infrastructure
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [PATCH v4 00/10] Add Kernel Concurrency Sanitizer (KCSAN)
- From: Qian Cai <cai@xxxxxx>
- Re: [PATCH v8 4/8] firmware: Add new platform fallback mechanism and firmware_request_platform()
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH v4 01/10] kcsan: Add Kernel Concurrency Sanitizer infrastructure
- From: Qian Cai <cai@xxxxxx>
- Re: [PATCH v8 4/8] firmware: Add new platform fallback mechanism and firmware_request_platform()
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH] x86/platform/intel/quark: Explicitly include linux/io.h for virt_to_phys()
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH 00/12] treewide: break dependencies on x86's RM header
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 00/12] treewide: break dependencies on x86's RM header
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH 00/12] treewide: break dependencies on x86's RM header
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] x86/platform/intel/quark: Explicitly include linux/io.h for virt_to_phys()
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH 09/12] ASoC: Intel: Skylake: Explicitly include linux/io.h for virt_to_phys()
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH 00/12] treewide: break dependencies on x86's RM header
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- RE: [PATCH 0/1] Temporary fix for data abort on armv6z EFI boot
- From: Guillaume Gardet <Guillaume.Gardet@xxxxxxx>
- Re: [PATCH 0/1] Temporary fix for data abort on armv6z EFI boot
- From: Heinrich Schuchardt <xypron.glpk@xxxxxx>
- Re: [PATCH 0/1] Temporary fix for data abort on armv6z EFI boot
- From: Heinrich Schuchardt <xypron.glpk@xxxxxx>
- [PATCH 01/12] x86/efi: Explicitly include realmode.h to handle RM trampoline quirk
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- [PATCH 00/12] treewide: break dependencies on x86's RM header
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- [PATCH 05/12] perf/x86/intel: Explicitly include asm/io.h to use virt_to_phys()
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- [PATCH 04/12] x86/kprobes: Explicitly include vmalloc.h for set_vm_flush_reset_perms()
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- [PATCH 03/12] x86/ftrace: Explicitly include vmalloc.h for set_vm_flush_reset_perms()
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- [PATCH 02/12] x86/boot: Explicitly include realmode.h to handle RM reservations
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- [PATCH 06/12] efi/capsule-loader: Explicitly include linux/io.h for page_to_phys()
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- [PATCH 08/12] vmw_balloon: Explicitly include linux/io.h for virt_to_phys()
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- [PATCH 09/12] ASoC: Intel: Skylake: Explicitly include linux/io.h for virt_to_phys()
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- [PATCH 07/12] virt: vbox: Explicitly include linux/io.h to pick up various defs
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- [PATCH 10/12] x86/ACPI/sleep: Remove an unnecessary include of asm/realmode.h
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- [PATCH 11/12] ACPI/sleep: Convert acpi_wakeup_address into a function
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- [PATCH 12/12] x86/ACPI/sleep: Move acpi_wakeup_address() definition into sleep.c
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- Re: [PATCH v8 4/8] firmware: Add new platform fallback mechanism and firmware_request_platform()
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH v8 3/8] firmware: Rename FW_OPT_NOFALLBACK to FW_OPT_NOFALLBACK_SYSFS
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH 0/1] Temporary fix for data abort on armv6z EFI boot
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 0/1] Temporary fix for data abort on armv6z EFI boot
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH 0/1] Temporary fix for data abort on armv6z EFI boot
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 0/1] Temporary fix for data abort on armv6z EFI boot
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH 0/1] Temporary fix for data abort on armv6z EFI boot
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 1/1] efi/libstub: Workaround for data abort on armv6z architecture
- From: Cristian Ciocaltea <cristian.ciocaltea@xxxxxxxxx>
- [PATCH 0/1] Temporary fix for data abort on armv6z EFI boot
- From: Cristian Ciocaltea <cristian.ciocaltea@xxxxxxxxx>
- Re: [PATCH v3] efi/earlycon: Remap entire framebuffer after page initialization
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v3] efi/earlycon: Remap entire framebuffer after page initialization
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 00/10] Add Kernel Concurrency Sanitizer (KCSAN)
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH v4 00/10] Add Kernel Concurrency Sanitizer (KCSAN)
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [PATCH v4 00/10] Add Kernel Concurrency Sanitizer (KCSAN)
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH v4 00/10] Add Kernel Concurrency Sanitizer (KCSAN)
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: PROBLEM: error and warning from 5.4.0-rc7
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v4 00/10] Add Kernel Concurrency Sanitizer (KCSAN)
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH v4 00/10] Add Kernel Concurrency Sanitizer (KCSAN)
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [PATCH v4 00/10] Add Kernel Concurrency Sanitizer (KCSAN)
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH v3] efi/earlycon: Remap entire framebuffer after page initialization
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v8 1/8] efi: Export boot-services code and data as debugfs-blobs
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v8 7/8] platform/x86: touchscreen_dmi: Add EFI embedded firmware info support
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v8 5/8] Input: silead - Switch to firmware_request_platform for retreiving the fw
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v8 8/8] platform/x86: touchscreen_dmi: Add info for the Chuwi Vi8 Plus tablet
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v8 6/8] Input: icn8505 - Switch to firmware_request_platform for retreiving the fw
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v8 4/8] firmware: Add new platform fallback mechanism and firmware_request_platform()
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v8 3/8] firmware: Rename FW_OPT_NOFALLBACK to FW_OPT_NOFALLBACK_SYSFS
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v8 2/8] efi: Add embedded peripheral firmware support
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v8 0/8] efi/firmware/platform-x86: Add EFI embedded fw support
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v3] efi/earlycon: Remap entire framebuffer after page initialization
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] efi/earlycon: Remap entire framebuffer after page initialization
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2] efi/earlycon: Remap entire framebuffer after page initialization
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 2/8] efi: Add embedded peripheral firmware support
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v4 00/10] Add Kernel Concurrency Sanitizer (KCSAN)
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [PATCH v4 08/10] asm-generic, kcsan: Add KCSAN instrumentation for bitops
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [PATCH v4 2/6] efi / ras: CCIX Cache error reporting
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v4 00/10] Add Kernel Concurrency Sanitizer (KCSAN)
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH v7 2/8] efi: Add embedded peripheral firmware support
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH v4 00/10] Add Kernel Concurrency Sanitizer (KCSAN)
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [PATCH v7 2/8] efi: Add embedded peripheral firmware support
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v7 3/8] firmware: Rename FW_OPT_NOFALLBACK to FW_OPT_NOFALLBACK_SYSFS
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v7 2/8] efi: Add embedded peripheral firmware support
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v4 00/10] Add Kernel Concurrency Sanitizer (KCSAN)
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH v3 0/9] Add Kernel Concurrency Sanitizer (KCSAN)
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH v7 2/8] efi: Add embedded peripheral firmware support
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH v3 0/9] Add Kernel Concurrency Sanitizer (KCSAN)
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v4 00/10] Add Kernel Concurrency Sanitizer (KCSAN)
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v4 02/10] include/linux/compiler.h: Introduce data_race(expr) macro
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v4 04/10] objtool, kcsan: Add KCSAN runtime functions to whitelist
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v4 08/10] asm-generic, kcsan: Add KCSAN instrumentation for bitops
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v4 09/10] locking/atomics, kcsan: Add KCSAN instrumentation
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v4 10/10] x86, kcsan: Enable KCSAN for x86
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v4 07/10] seqlock: Require WRITE_ONCE surrounding raw_seqcount_barrier
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v4 06/10] seqlock, kcsan: Add annotations for KCSAN
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v4 05/10] build, kcsan: Add KCSAN build exceptions
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v4 03/10] kcsan: Add Documentation entry in dev-tools
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v4 01/10] kcsan: Add Kernel Concurrency Sanitizer infrastructure
- From: Marco Elver <elver@xxxxxxxxxx>
- [RFC PATCH v2] efi: arm64: Introduce /sys/firmware/efi/memreserve to tell the persistent pages
- From: Masayoshi Mizuma <msys.mizuma@xxxxxxxxx>
- [PATCH v5 6/6] efi / ras: CCIX Agent internal error reporting
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v5 4/6] efi / ras: CCIX Port error reporting
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v5 5/6] efi / ras: CCIX Link error reporting
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v5 3/6] efi / ras: CCIX Address Translation Cache error reporting
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v5 2/6] efi / ras: CCIX Cache error reporting
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v5 1/6] efi / ras: CCIX Memory error reporting
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v5 0/6] CCIX Protocol error reporting.
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v4 2/6] efi / ras: CCIX Cache error reporting
- From: Jonathan Cameron <jonathan.cameron@xxxxxxxxxx>
- Re: [PATCH v4 1/6] efi / ras: CCIX Memory error reporting
- From: Jonathan Cameron <jonathan.cameron@xxxxxxxxxx>
- Re: [PATCH v7 4/8] firmware: Add new platform fallback mechanism and firmware_request_platform()
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v7 1/8] efi: Export boot-services code and data as debugfs-blobs
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v7 2/8] efi: Add embedded peripheral firmware support
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH] sysfs: Fixes __BIN_ATTR_WO() macro
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] sysfs: Fixes __BIN_ATTR_WO() macro
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- Re: [PATCH v10 6/9] certs: add wrapper function to check blacklisted binary hash
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- Re: [PATCH v10 4/9] powerpc/ima: define trusted boot policy
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- Re: [PATCH v10 8/9] powerpc/ima: update ima arch policy to check for blacklist
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- Re: [PATCH v9 1/4] powerpc/powernv: Add OPAL API interface to access secure variable
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- Re: [PATCH v10a 3/9] powerpc: detect the trusted boot state of the system
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- Re: [PATCH v10 7/9] ima: check against blacklisted hashes for files with modsig
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- Re: [PATCH v10a 1/9] powerpc: detect the secure boot mode of the system
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v10 9/9] powerpc/ima: indicate kernel modules appended signatures are enforced
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- Re: [PATCH v10 5/9] ima: make process_buffer_measurement() generic
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- Re: [PATCH v10 2/9] powerpc/ima: add support to initialize ima policy rules
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- Re: [PATCH v4 3/6] efi / ras: CCIX Address Translation Cache error reporting
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- Re: [PATCH v4 2/6] efi / ras: CCIX Cache error reporting
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- Re: [PATCH v4 1/6] efi / ras: CCIX Memory error reporting
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH] efi: sanity check in case memermap() at efi_mem_reserve_persistent() returns NULL
- From: Masayoshi Mizuma <msys.mizuma@xxxxxxxxx>
- Re: [RFC PATCH] efi: arm64: Introduce /sys/firmware/efi/memreserve to tell the persistent pages
- From: Masayoshi Mizuma <msys.mizuma@xxxxxxxxx>
- [PATCH v4 5/6] efi / ras: CCIX Link error reporting
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v4 6/6] efi / ras: CCIX Agent internal error reporting
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v4 4/6] efi / ras: CCIX Port error reporting
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v4 1/6] efi / ras: CCIX Memory error reporting
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v4 3/6] efi / ras: CCIX Address Translation Cache error reporting
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v4 2/6] efi / ras: CCIX Cache error reporting
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v4 0/6] CCIX Protocol error reporting.
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v3 3/6] efi / ras: CCIX Address Translation Cache error reporting
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v3 2/6] efi / ras: CCIX Cache error reporting
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v3 2/6] efi / ras: CCIX Cache error reporting
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v3 1/6] efi / ras: CCIX Memory error reporting
- From: kbuild test robot <lkp@xxxxxxxxx>
- RE: [RFC PATCH] efi: arm64: Introduce /sys/firmware/efi/memreserve to tell the persistent pages
- From: "d.hatayama@xxxxxxxxxxx" <d.hatayama@xxxxxxxxxxx>
- Re: [PATCH v3 1/6] efi / ras: CCIX Memory error reporting
- From: kbuild test robot <lkp@xxxxxxxxx>
- [tip: x86/boot] x86/boot: Introduce kernel_info.setup_type_max
- From: "tip-bot2 for Daniel Kiper" <tip-bot2@xxxxxxxxxxxxx>
- [tip: x86/boot] x86/boot: Introduce setup_indirect
- From: "tip-bot2 for Daniel Kiper" <tip-bot2@xxxxxxxxxxxxx>
- [tip: x86/boot] x86/boot: Introduce kernel_info
- From: "tip-bot2 for Daniel Kiper" <tip-bot2@xxxxxxxxxxxxx>
- [PATCH v3 0/6] CCIX Protocol error reporting.
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v3 6/6] efi / ras: CCIX Agent internal error reporting
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v3 3/6] efi / ras: CCIX Address Translation Cache error reporting
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v3 1/6] efi / ras: CCIX Memory error reporting
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v3 2/6] efi / ras: CCIX Cache error reporting
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v3 5/6] efi / ras: CCIX Link error reporting
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v3 4/6] efi / ras: CCIX Port error reporting
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [RFC PATCH] efi: arm64: Introduce /sys/firmware/efi/memreserve to tell the persistent pages
- From: Masayoshi Mizuma <msys.mizuma@xxxxxxxxx>
- Re: [PATCH v1] efi/earlycon: Remap entire framebuffer after page initialization
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- [PATCH v2] efi/earlycon: Remap entire framebuffer after page initialization
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- [PATCH v6 1/3] x86/boot: Introduce the kernel_info
- From: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
- [PATCH v6 2/3] x86/boot: Introduce the kernel_info.setup_type_max
- From: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
- [PATCH v6 0/3] x86/boot: Introduce the kernel_info et consortes
- From: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
- [PATCH v6 3/3] x86/boot: Introduce the setup_indirect
- From: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
- Re: [PATCH v1] efi/earlycon: Remap entire framebuffer after page initialization
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v1] efi/earlycon: Remap entire framebuffer after page initialization
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH v1] efi/earlycon: Remap entire framebuffer after page initialization
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 0/4] powerpc: expose secure variables to the kernel and userspace
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v9 0/4] powerpc: expose secure variables to the kernel and userspace
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: Linux 5.3.8: gsmi: failed to allocate name buffer. BUG: kernel NULL pointer dereference
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Linux 5.3.8: gsmi: failed to allocate name buffer. BUG: kernel NULL pointer dereference
- From: Kyle K <kylek389@xxxxxxxxx>
- [PATCH 5.3 176/193] efi: libstub/arm: Account for firmware reserved memory at the base of RAM
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.3 177/193] x86, efi: Never relocate kernel below lowest acceptable address
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.3 175/193] efi/tpm: Return -EINVAL when determining tpm final events log size fails
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1] efi/earlycon: Remap entire framebuffer after page initialization
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v1] efi/earlycon: Remap entire framebuffer after page initialization
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH] efi: Fix comment for efi_mem_type() wrt absent physical addresses
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi: Fix comment for efi_mem_type() wrt absent physical addresses
- From: Anshuman Khandual <anshuman.khandual@xxxxxxx>
- [PATCH] efi: Fix comment for efi_mem_type() wrt absent physical addresses
- From: Anshuman Khandual <anshuman.khandual@xxxxxxx>
- [PATCH v9 1/4] powerpc/powernv: Add OPAL API interface to access secure variable
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v9 4/4] powerpc: load firmware trusted keys/hashes into kernel keyring
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v9 3/4] x86/efi: move common keyring handler functions to new file
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v9 2/4] powerpc: expose secure variables to userspace via sysfs
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v9 0/4] powerpc: expose secure variables to the kernel and userspace
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
[Index of Archives]
[Linux Kernel Development]
[Security]
[Linux ARM Kernel]
[Tools]
[Linux MIPS]
[Linux S390]
[Bugtraq]
[Share Photos]>
[Fedora ARM]