Linux EFI/UEFI Development
[Prev Page][Next Page]
- [RFC PATCH 2/6] efi / ras: CCIX Cache error reporting
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [RFC PATCH 0/6] CCIX Protocol Error reporting
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH for-4.9-stable] efi/libstub: Unify command line param parsing
- From: Rolf Eike Beer <eb@xxxxxxxxx>
- Re: [PATCH] efi: Fix TPM code build failure on ARM
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH for-4.9-stable] efi/libstub: Unify command line param parsing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: Building arm64 EFI stub with -fpie breaks build of 4.9.x (undefined reference to `__efistub__GLOBAL_OFFSET_TABLE_')
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: Building arm64 EFI stub with -fpie breaks build of 4.9.x (undefined reference to `__efistub__GLOBAL_OFFSET_TABLE_')
- From: Rolf Eike Beer <eb@xxxxxxxxx>
- Re: Building arm64 EFI stub with -fpie breaks build of 4.9.x (undefined reference to `__efistub__GLOBAL_OFFSET_TABLE_')
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: Building arm64 EFI stub with -fpie breaks build of 4.9.x (undefined reference to `__efistub__GLOBAL_OFFSET_TABLE_')
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: Building arm64 EFI stub with -fpie breaks build of 4.9.x (undefined reference to `__efistub__GLOBAL_OFFSET_TABLE_')
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: Building arm64 EFI stub with -fpie breaks build of 4.9.x (undefined reference to `__efistub__GLOBAL_OFFSET_TABLE_')
- From: Rolf Eike Beer <eb@xxxxxxxxx>
- Re: Building arm64 EFI stub with -fpie breaks build of 4.9.x (undefined reference to `__efistub__GLOBAL_OFFSET_TABLE_')
- From: Rolf Eike Beer <eb@xxxxxxxxx>
- Re: Building arm64 EFI stub with -fpie breaks build of 4.9.x (undefined reference to `__efistub__GLOBAL_OFFSET_TABLE_')
- From: Rolf Eike Beer <eb@xxxxxxxxx>
- Re: Building arm64 EFI stub with -fpie breaks build of 4.9.x (undefined reference to `__efistub__GLOBAL_OFFSET_TABLE_')
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: Building arm64 EFI stub with -fpie breaks build of 4.9.x (undefined reference to `__efistub__GLOBAL_OFFSET_TABLE_')
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- gicv3-its driver crashes in crash dump kernel
- From: Jonathan Richardson <jonathan.richardson@xxxxxxxxxxxx>
- Re: Building arm64 EFI stub with -fpie breaks build of 4.9.x (undefined reference to `__efistub__GLOBAL_OFFSET_TABLE_')
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: Building arm64 EFI stub with -fpie breaks build of 4.9.x (undefined reference to `__efistub__GLOBAL_OFFSET_TABLE_')
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/8] x86, efi: Reserve UEFI 2.8 Specific Purpose Memory for dax
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: Building arm64 EFI stub with -fpie breaks build of 4.9.x (undefined reference to `__efistub__GLOBAL_OFFSET_TABLE_')
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] efi: Fix TPM code build failure on ARM
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V2] tpm: Don't duplicate events from the final event log in the TCG2 log
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: Building arm64 EFI stub with -fpie breaks build of 4.9.x (undefined reference to `__efistub__GLOBAL_OFFSET_TABLE_')
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: Building arm64 EFI stub with -fpie breaks build of 4.9.x (undefined reference to `__efistub__GLOBAL_OFFSET_TABLE_')
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH 1/1] tpm: Don't dereference event after it's unmapped in __calc_tpm2_event_size
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/1] Fix crash in __calc_tpm2_event_size
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Don't duplicate events from the final event log in the TCG2 log
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Building arm64 EFI stub with -fpie breaks build of 4.9.x (undefined reference to `__efistub__GLOBAL_OFFSET_TABLE_')
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/1] tpm: Don't dereference event after it's unmapped in __calc_tpm2_event_size
- From: Chris Coulson <chris.coulson@xxxxxxxxxxxxx>
- [PATCH 0/1] Fix crash in __calc_tpm2_event_size
- From: Chris Coulson <chris.coulson@xxxxxxxxxxxxx>
- [PATCH] tpm: Don't duplicate events from the final event log in the TCG2 log
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: [PATCH v2 4/8] x86, efi: Reserve UEFI 2.8 Specific Purpose Memory for dax
- From: Mike Rapoport <rppt@xxxxxxxxxxxxx>
- Re: [GIT PULL] EFI fixes
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] EFI fixes
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH v2 4/8] x86, efi: Reserve UEFI 2.8 Specific Purpose Memory for dax
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [Bug 203761] New: efivar_ssdt_iter is subject to stack corruption when the input name_size is 0
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V7 0/4] Add support for crypto agile logs
- From: Joe Richey <joerichey@xxxxxxxxxx>
- [PATCH] x86/efi: fix a -Wtype-limits compilation warning
- From: Qian Cai <cai@xxxxxx>
- Re: [PATCH v2 4/8] x86, efi: Reserve UEFI 2.8 Specific Purpose Memory for dax
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 4/8] x86, efi: Reserve UEFI 2.8 Specific Purpose Memory for dax
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v2 1/8] acpi: Drop drivers/acpi/hmat/ directory
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [Bug 203761] New: efivar_ssdt_iter is subject to stack corruption when the input name_size is 0
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 4/8] x86, efi: Reserve UEFI 2.8 Specific Purpose Memory for dax
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V7 2/4] tpm: Reserve the TPM final events table
- From: Joe Richey <joerichey@xxxxxxxxxx>
- Re: [PATCH v2 1/8] acpi: Drop drivers/acpi/hmat/ directory
- From: "Rafael J. Wysocki" <rjw@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/8] efi: Enumerate EFI_MEMORY_SP
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 8/8] acpi/hmat: Register "specific purpose" memory as an "hmem" device
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v2 7/8] acpi/hmat: Register HMAT at device_initcall level
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v2 6/8] device-dax: Add a driver for "hmem" devices
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v2 5/8] lib/memregion: Uplevel the pmem "region" ida to a global allocator
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v2 4/8] x86, efi: Reserve UEFI 2.8 Specific Purpose Memory for dax
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v2 3/8] efi: Enumerate EFI_MEMORY_SP
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v2 2/8] acpi/hmat: Skip publishing target info for nodes with no online memory
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v2 1/8] acpi: Drop drivers/acpi/hmat/ directory
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v2 0/8] EFI Specific Purpose Memory Support
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH 5.1 289/405] efifb: Omit memory map check on legacy boot
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.0 260/346] efifb: Omit memory map check on legacy boot
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.19 223/276] efifb: Omit memory map check on legacy boot
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH] efifb: BGRT: Add check for new BGRT status field rotation bits
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH] efi/bgrt: Drop BGRT status field reserved bits check
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH] x86/efi: Free efi_pgd with free_pages()
- From: Lennart Glauer <mail@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86/efi: Free efi_pgd with free_pages()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V7 0/4] Add support for crypto agile logs
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH 1/2] efi/x86: Add missing error handling to old_memmap 1:1 mapping code
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 2/2] efi: Allow the number of EFI configuration tables entries to be zero
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [GIT PULL 0/2] EFI fixes for v5.2
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2] efi_64: Fix a missing-check bug in arch/x86/platform/efi/efi_64.c
- From: Gen Zhang <blackgod016574@xxxxxxxxx>
- Re: [PATCH v2] efi_64: Fix a missing-check bug in arch/x86/platform/efi/efi_64.c
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2] efi_64: Fix a missing-check bug in arch/x86/platform/efi/efi_64.c
- From: Gen Zhang <blackgod016574@xxxxxxxxx>
- Re: [PATCH V7 0/4] Add support for crypto agile logs
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v2] efi_64: Fix a missing-check bug in arch/x86/platform/efi/efi_64.c
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2] efi: Check the number of EFI configuration tables entries
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V7 0/4] Add support for crypto agile logs
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH 4.19 061/114] fbdev/efifb: Ignore framebuffer memmap entries that lack any memory types
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.0 076/139] fbdev/efifb: Ignore framebuffer memmap entries that lack any memory types
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.1 085/122] fbdev/efifb: Ignore framebuffer memmap entries that lack any memory types
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V7 0/4] Add support for crypto agile logs
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH V7 0/4] Add support for crypto agile logs
- From: Bartosz Szczepanek <bsz@xxxxxxxxxxxx>
- Re: [PATCH V7 0/4] Add support for crypto agile logs
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH V7 0/4] Add support for crypto agile logs
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v2] efi_64: Fix a missing-check bug in arch/x86/platform/efi/efi_64.c
- From: Gen Zhang <blackgod016574@xxxxxxxxx>
- Re: [PATCH v2] efi: Check the number of EFI configuration tables entries
- From: "Bradford, Robert" <robert.bradford@xxxxxxxxx>
- Re: [PATCH V7 0/4] Add support for crypto agile logs
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH V7 2/4] tpm: Reserve the TPM final events table
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V7 4/4] efi: Attempt to get the TCG2 event log in the boot stub
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH V7 0/4] Add support for crypto agile logs
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V7 3/4] tpm: Append the final event log to the TPM event log
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V7 4/4] efi: Attempt to get the TCG2 event log in the boot stub
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V7 2/4] tpm: Reserve the TPM final events table
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V7 1/4] tpm: Abstract crypto agile event size calculations
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: [PATCH V6 0/4] Add support for crypto agile TPM event logs
- From: Bartosz Szczepanek <bsz@xxxxxxxxxxxx>
- Re: [PATCH] x86/boot: provide KASAN compatible aliases for string routines
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH V6 4/4] efi: Attempt to get the TCG2 event log in the boot stub
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] x86/boot: provide KASAN compatible aliases for string routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH V6 2/4] tpm: Reserve the TPM final events table
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V6 4/4] efi: Attempt to get the TCG2 event log in the boot stub
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V6 3/4] tpm: Append the final event log to the TPM event log
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V6 1/4] tpm: Abstract crypto agile event size calculations
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V6 0/4] Add support for crypto agile TPM event logs
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: [PATCH] efi_64: Fix a missing-check bug in arch/x86/platform/efi/efi_64.c of Linux 5.1
- From: Gen Zhang <blackgod016574@xxxxxxxxx>
- Re: [PATCH] efi_64: Fix a missing-check bug in arch/x86/platform/efi/efi_64.c of Linux 5.1
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi_64: Fix a missing-check bug in arch/x86/platform/efi/efi_64.c of Linux 5.1
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [GIT PULL 0/1] EFI fix for v5.2
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 1/1] fbdev/efifb: ignore framebuffer memmap entries that lack any memory types
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] fbdev/efifb: ignore framebuffer memmap entries that lack any memory types
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 4.14 022/115] x86/reboot, efi: Use EFI reboot for Acer TravelMate X514-51T
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.14 083/115] x86/fpu: Dont export __kernel_fpu_{begin,end}()
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.19 037/113] x86/reboot, efi: Use EFI reboot for Acer TravelMate X514-51T
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.0 049/137] x86/reboot, efi: Use EFI reboot for Acer TravelMate X514-51T
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.9 16/51] x86/reboot, efi: Use EFI reboot for Acer TravelMate X514-51T
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Claudio Carvalho <cclaudio@xxxxxxxxxxxxx>
- Re: [PATCH] fbdev/efifb: ignore framebuffer memmap entries that lack any memory types
- From: James Hilliard <james.hilliard1@xxxxxxxxx>
- Re: [PATCH 2/2 v3] efi: print appropriate status message when loading certificates
- From: joeyli <jlee@xxxxxxxx>
- [PATCH AUTOSEL 5.0 42/99] x86/reboot, efi: Use EFI reboot for Acer TravelMate X514-51T
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 17/95] x86/reboot, efi: Use EFI reboot for Acer TravelMate X514-51T
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 84/95] x86/fpu: Don't export __kernel_fpu_{begin,end}()
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.9 12/25] x86/reboot, efi: Use EFI reboot for Acer TravelMate X514-51T
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 31/81] x86/reboot, efi: Use EFI reboot for Acer TravelMate X514-51T
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [GIT PULL] EFI changes for v5.2
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Bartosz Szczepanek <bsz@xxxxxxxxxxxx>
- [PATCH 4.19 20/99] efi: Fix debugobjects warning on efi_rts_work
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [GIT PULL] EFI changes for v5.2
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH 2/2 v3] efi: print appropriate status message when loading certificates
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] mm/pgtable: Drop pgtable_t variable from pte_fn_t functions
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH 2/2 v3] efi: print appropriate status message when loading certificates
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH 2/2 v3] efi: print appropriate status message when loading certificates
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 1/2 v2] efi: add a function to convert the status value to string
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH 2/2 v3] efi: print appropriate status message when loading certificates
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH 1/2 v2] efi: add a function to convert the status value to string
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 1/2 v2] efi: add a function to convert the status value to string
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH] mm/pgtable: Drop pgtable_t variable from pte_fn_t functions
- From: Martin Schwidefsky <schwidefsky@xxxxxxxxxx>
- Re: [PATCH] mm/pgtable: Drop pgtable_t variable from pte_fn_t functions
- From: Anshuman Khandual <anshuman.khandual@xxxxxxx>
- Re: [PATCH] mm/pgtable: Drop pgtable_t variable from pte_fn_t functions
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- [PATCH] mm/pgtable: Drop pgtable_t variable from pte_fn_t functions
- From: Anshuman Khandual <anshuman.khandual@xxxxxxx>
- Re: [PATCH 2/2 v3] efi: print appropriate status message when loading certificates
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 1/2 v2] efi: add a function to convert the status value to string
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Bartosz Szczepanek <barteks7r@xxxxxxxxx>
- [PATCH 2/2 v3] efi: print appropriate status message when loading certificates
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 1/2 v2] efi: add a function to convert the status value to string
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- Re: [PATCH 4.19 083/100] x86/fpu: Dont export __kernel_fpu_{begin,end}()
- From: Lukas Wunner <lukas@xxxxxxxxx>
- UEFI Fast Boot or Quick Boot for MS Windows also for Linux?
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- Re: [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Bartosz Szczepanek <bsz@xxxxxxxxxxxx>
- [PATCH 4.19 083/100] x86/fpu: Dont export __kernel_fpu_{begin,end}()
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: linux-next: Tree for Apr 26 (x86/efi)
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH] fbdev/efifb: ignore framebuffer memmap entries that lack any memory types
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] fbdev/efifb: ignore framebuffer memmap entries that lack any memory types
- From: James Hilliard <james.hilliard1@xxxxxxxxx>
- [PATCH] fbdev/efifb: ignore framebuffer memmap entries that lack any memory types
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 8/8] fbdev/efifb: honour UEFI memory map attributes when mapping the fb
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Black screen regression introduced in: efi: Refactor efi_memmap_init_early() into arch-neutral code
- From: Niklas Hambüchen <mail@xxxxxx>
- [PATCH v2 05/79] docs: arm64: convert docs to ReST and rename to .rst
- From: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
- [PATCH v2 60/79] docs: ia64: convert to ReST
- From: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
- Re: [PATCH 8/8] fbdev/efifb: honour UEFI memory map attributes when mapping the fb
- From: James Hilliard <james.hilliard1@xxxxxxxxx>
- Re: kexec reboot reset with efi_delete_dummy_variable
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: kexec reboot reset with efi_delete_dummy_variable
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- kexec reboot reset with efi_delete_dummy_variable
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: EFI reboot vs. ACPI reboot (was: Re: [tip:x86/urgent] x86/reboot, efi: Use EFI reboot for Acer TravelMate X514-51T)
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: EFI reboot vs. ACPI reboot (was: Re: [tip:x86/urgent] x86/reboot, efi: Use EFI reboot for Acer TravelMate X514-51T)
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: EFI reboot vs. ACPI reboot (was: Re: [tip:x86/urgent] x86/reboot, efi: Use EFI reboot for Acer TravelMate X514-51T)
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- RE: kexec crash on OVMF i386 + x86_64 kernel (Re: [PATCH v4] x86/boot: Use efi_setup_data for searching RSDP on kexec-ed kernel)
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- RE: EFI reboot vs. ACPI reboot (was: Re: [tip:x86/urgent] x86/reboot, efi: Use EFI reboot for Acer TravelMate X514-51T)
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- Re: EFI reboot vs. ACPI reboot (was: Re: [tip:x86/urgent] x86/reboot, efi: Use EFI reboot for Acer TravelMate X514-51T)
- Re: EFI reboot vs. ACPI reboot (was: Re: [tip:x86/urgent] x86/reboot, efi: Use EFI reboot for Acer TravelMate X514-51T)
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: EFI reboot vs. ACPI reboot (was: Re: [tip:x86/urgent] x86/reboot, efi: Use EFI reboot for Acer TravelMate X514-51T)
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: EFI reboot vs. ACPI reboot (was: Re: [tip:x86/urgent] x86/reboot, efi: Use EFI reboot for Acer TravelMate X514-51T)
- Re: EFI reboot vs. ACPI reboot (was: Re: [tip:x86/urgent] x86/reboot, efi: Use EFI reboot for Acer TravelMate X514-51T)
- From: Daniel Drake <drake@xxxxxxxxxxxx>
- Re: EFI reboot vs. ACPI reboot (was: Re: [tip:x86/urgent] x86/reboot, efi: Use EFI reboot for Acer TravelMate X514-51T)
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: kexec crash on OVMF i386 + x86_64 kernel (Re: [PATCH v4] x86/boot: Use efi_setup_data for searching RSDP on kexec-ed kernel)
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: EFI reboot vs. ACPI reboot (was: Re: [tip:x86/urgent] x86/reboot, efi: Use EFI reboot for Acer TravelMate X514-51T)
- From: Daniel Drake <drake@xxxxxxxxxxxx>
- [PATCH v2] efi: Check the number of EFI configuration tables entries
- From: Rob Bradford <robert.bradford@xxxxxxxxx>
- EFI reboot vs. ACPI reboot (was: Re: [tip:x86/urgent] x86/reboot, efi: Use EFI reboot for Acer TravelMate X514-51T)
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH] efi: Include tpm_eventlog.h after asm/efi.h to avoid memcpy breakage
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] TCG2 log support build fixes for non-x86_64
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] efi/arm: enable CP15 DMB instructions before cleaning the cache
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2] efi/arm: enable CP15 DMB instructions before cleaning the cache
- From: Russell King - ARM Linux admin <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] efi/arm: enable CP15 DMB instructions before cleaning the cache
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2] efi/arm: enable CP15 DMB instructions before cleaning the cache
- From: Russell King - ARM Linux admin <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] efi/arm: enable CP15 DMB instructions before cleaning the cache
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Claudio Carvalho <cclaudio@xxxxxxxxxxxxx>
- [PATCH v2] efi/arm: enable CP15 DMB instructions before cleaning the cache
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 3/3] powerpc: Add support to initialize ima policy rules
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v2 2/3] powerpc/powernv: detect the secure boot mode of the system
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v2 1/3] powerpc/powernv: Add support for OPAL_SECVAR_GET
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v2 0/3] powerpc: Enabling secure boot on powernv systems - Part 1
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- Re: [PATCH] efi/arm: enable CP15 DMB instructions before cleaning the cache
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v8 2/5] arm64: replace -pg with CC_FLAGS_FTRACE in efi Makefiles
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v8 2/5] arm64: replace -pg with CC_FLAGS_FTRACE in efi Makefiles
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH] efi/arm: enable CP15 DMB instructions before cleaning the cache
- From: Vladimir Murzin <vladimir.murzin@xxxxxxx>
- Re: [PATCH] efi/arm: enable CP15 DMB instructions before cleaning the cache
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH] efi/arm: enable CP15 DMB instructions before cleaning the cache
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Claudio Carvalho <cclaudio@xxxxxxxxxxxxx>
- Re: [PATCH] TCG2 log support build fixes for non-x86_64
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 1/2] efi: Fix cast to pointer from integer of different size in TPM log code
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH] efi: Check the number of EFI configuration tables entries
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 1/2] efi: Fix cast to pointer from integer of different size in TPM log code
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi: Include tpm_eventlog.h after asm/efi.h to avoid memcpy breakage
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi: Include tpm_eventlog.h after asm/efi.h to avoid memcpy breakage
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] TCG2 log support build fixes for non-x86_64
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] tpm: Fix builds on platforms that lack early_memremap()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] efi: Fix cast to pointer from integer of different size in TPM log code
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH] efi: Check the number of EFI configuration tables entries
- From: Rob Bradford <robert.bradford@xxxxxxxxx>
- [PATCH 4.9 67/91] efi/memattr: Dont bail on zero VA if it equals the regions PA
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.14 087/121] efi/memattr: Dont bail on zero VA if it equals the regions PA
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.14 089/121] efi/arm/arm64: Allow SetVirtualAddressMap() to be omitted
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.19 137/187] efi/arm/arm64: Allow SetVirtualAddressMap() to be omitted
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.0 126/246] efi: Fix build error due to enum collision between efi.h and ima.h
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.0 175/246] efi/memattr: Dont bail on zero VA if it equals the regions PA
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.0 180/246] efi/arm/arm64: Allow SetVirtualAddressMap() to be omitted
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.19 133/187] efi/memattr: Dont bail on zero VA if it equals the regions PA
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Claudio Carvalho <cclaudio@xxxxxxxxxxxxx>
- [PATCH] efi: Include tpm_eventlog.h after asm/efi.h to avoid memcpy breakage
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: Add support for TCG2 log format on UEFI systems
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] efi: Fix cast to pointer from integer of different size in TPM log code
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- RE: [PATCH 1/2] efi: Fix cast to pointer from integer of different size in TPM log code
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Claudio Carvalho <cclaudio@xxxxxxxxxxxxx>
- [PATCH 2/2] tpm: Fix builds on platforms that lack early_memremap()
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH 1/2] efi: Fix cast to pointer from integer of different size in TPM log code
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH] TCG2 log support build fixes for non-x86_64
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Claudio Carvalho <cclaudio@xxxxxxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- [PATCH 4/4] powerpc: Add support to initialize ima policy rules
- From: Claudio Carvalho <cclaudio@xxxxxxxxxxxxx>
- [PATCH 3/4] powerpc/powernv: Detect the secure boot mode of the system
- From: Claudio Carvalho <cclaudio@xxxxxxxxxxxxx>
- [PATCH 2/4] powerpc/powernv: Add support for OPAL secure variables
- From: Claudio Carvalho <cclaudio@xxxxxxxxxxxxx>
- [PATCH 1/4] powerpc/include: Override unneeded early ioremap functions
- From: Claudio Carvalho <cclaudio@xxxxxxxxxxxxx>
- [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Claudio Carvalho <cclaudio@xxxxxxxxxxxxx>
- Re: Add support for TCG2 log format on UEFI systems
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: Add support for TCG2 log format on UEFI systems
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Add support for TCG2 log format on UEFI systems
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: Add support for TCG2 log format on UEFI systems
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] efi/arm: enable CP15 DMB instructions before cleaning the cache
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH] efi/arm: enable CP15 DMB instructions before cleaning the cache
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi/arm: enable CP15 DMB instructions before cleaning the cache
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH 1/2] efi: add a function for transferring status to string
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH 1/2] efi: add a function for transferring status to string
- From: joeyli <jlee@xxxxxxxx>
- [PATCH] efi/arm: enable CP15 DMB instructions before cleaning the cache
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 2/2 v2] efi: print appropriate status message when loading certificates
- [tip:x86/urgent] x86/realmode: Make set_real_mode_mem() static inline
- From: tip-bot for Matteo Croce <tipbot@xxxxxxxxx>
- Re: [GIT PULL 0/5] EFI changes for v5.2
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- [GIT PULL 0/5] EFI changes for v5.2
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 1/5] efi/libstub: refactor cmd_stubcopy
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 2/5] efifb: omit memory map check on legacy boot
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 4/5] efi: Unify dmi setup code over architectures arm/arm64, ia64 and x86
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 5/5] efi/libstub/arm: omit unneeded stripping of ksymtab/kcrctab sections
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 3/5] efi/arm: Show SMBIOS bank/device location in cper and ghes error logs
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] x86: remove unused argument from set_real_mode_mem()
- From: Mukesh Ojha <mojha@xxxxxxxxxxxxxx>
- [PATCH] x86: remove unused argument from set_real_mode_mem()
- From: Matteo Croce <mcroce@xxxxxxxxxx>
- Re: [PATCH v2] efi: Unify dmi setup code over architectures arm/arm64, io64 and x86
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2] efi: Unify dmi setup code over architectures arm/arm64, io64 and x86
- From: Robert Richter <rrichter@xxxxxxxxxxx>
- [PATCH v2] efi: Unify dmi setup code over architectures arm/arm64, io64 and x86
- From: Robert Richter <rrichter@xxxxxxxxxxx>
- [RFC PATCH 29/68] vfs: Convert efivarfs to use the new mount API
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH AUTOSEL 5.0 110/262] efi: cper: Fix possible out-of-bounds access
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH 2/2 v2] efi: print appropriate status message when loading certificates
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH AUTOSEL 5.0 134/262] efi: Fix build error due to enum collision between efi.h and ima.h
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.0 186/262] efi/memattr: Don't bail on zero VA if it equals the region's PA
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.0 191/262] efi/arm/arm64: Allow SetVirtualAddressMap() to be omitted
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 075/192] efi: cper: Fix possible out-of-bounds access
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH 1/2] efi: add a function for transferring status to string
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH AUTOSEL 4.19 136/192] efi/memattr: Don't bail on zero VA if it equals the region's PA
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 140/192] efi/arm/arm64: Allow SetVirtualAddressMap() to be omitted
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH 1/2] efi: add a function for transferring status to string
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2] efi: Unify dmi setup code over architectures arm/arm64, io64 and x86
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 051/123] efi: cper: Fix possible out-of-bounds access
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 087/123] efi/memattr: Don't bail on zero VA if it equals the region's PA
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 089/123] efi/arm/arm64: Allow SetVirtualAddressMap() to be omitted
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.9 62/87] efi/memattr: Don't bail on zero VA if it equals the region's PA
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH] efi: Downgrade "EFI_MEMMAP is not enabled" message
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [PATCH] efi: Downgrade "EFI_MEMMAP is not enabled" message
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi: Downgrade "EFI_MEMMAP is not enabled" message
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [PATCH 1/2 v8] resource: add the new I/O resource descriptor 'IORES_DESC_RESERVED'
- From: Boris Petkov <bp@xxxxxxxxx>
- Re: [PATCH 1/2 v8] resource: add the new I/O resource descriptor 'IORES_DESC_RESERVED'
- From: lijiang <lijiang@xxxxxxxxxx>
- Re: [PATCH] efi/libstub: refactor cmd_stubcopy
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi/libstub: refactor cmd_stubcopy
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- Re: [PATCH 1/2 v8] resource: add the new I/O resource descriptor 'IORES_DESC_RESERVED'
- From: "Lendacky, Thomas" <Thomas.Lendacky@xxxxxxx>
- [PATCH 2/2 v2] efi: print appropriate status message when loading certificates
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 1/2] efi: add a function for transferring status to string
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 1/2] efi: add a function for transferring status to string
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- Re: [PATCH 2/2] efi: print appropriate status message when loading certificates
- Re: [PATCH 2/2] efi: print appropriate status message when loading certificates
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 2/2] efi: print appropriate status message when loading certificates
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 1/2] efi: add a function for transferring status to string
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- Re: [PATCH v2] efi: Unify dmi setup code over architectures arm/arm64, io64 and x86
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2] efi: Unify dmi setup code over architectures arm/arm64, io64 and x86
- From: Jean Delvare <jdelvare@xxxxxxx>
- Re: [PATCH v2] efi: Unify dmi setup code over architectures arm/arm64, io64 and x86
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2] efi: Unify dmi setup code over architectures arm/arm64, io64 and x86
- From: Robert Richter <rrichter@xxxxxxxxxxx>
- Re: [PATCH v2] efi: Unify dmi setup code over architectures arm/arm64, io64 and x86
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2] efi: Unify dmi setup code over architectures arm/arm64, io64 and x86
- From: Robert Richter <rrichter@xxxxxxxxxxx>
- Re: [PATCH v2] efi: Unify dmi setup code over architectures arm/arm64, io64 and x86
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2] efi: Unify dmi setup code over architectures arm/arm64, io64 and x86
- From: Robert Richter <rrichter@xxxxxxxxxxx>
- Re: [PATCH] efi: Unify dmi setup code over architectures arm/arm64, io64 and x86
- From: Robert Richter <rrichter@xxxxxxxxxxx>
- [PATCH] efi: Unify dmi setup code over architectures arm/arm64, io64 and x86
- From: Robert Richter <rrichter@xxxxxxxxxxx>
- [PATCH] efi/arm: Show SMBIOS bank/device location in cper and ghes error logs
- From: Robert Richter <rrichter@xxxxxxxxxxx>
- Re: [PATCH 1/2 v8] resource: add the new I/O resource descriptor 'IORES_DESC_RESERVED'
- From: lijiang <lijiang@xxxxxxxxxx>
- Re: Add support for TCG2 log format on UEFI systems
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Add support for TCG2 log format on UEFI systems
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- [PATCH 26/38] vfs: Convert efivarfs to fs_context
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: Add support for TCG2 log format on UEFI systems
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Please revert 7212e37cbdf9 from 4.4-stable
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH 3/3] x86/ima: retry detecting secure boot mode
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 3/3] x86/ima: retry detecting secure boot mode
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Please revert 7212e37cbdf9 from 4.4-stable
- From: Hedi Berriche <hedi.berriche@xxxxxxx>
- Re: [PATCH 3/3] x86/ima: retry detecting secure boot mode
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 3/3] x86/ima: retry detecting secure boot mode
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] x86/ima: retry detecting secure boot mode
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 3/3] x86/ima: retry detecting secure boot mode
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] x86/ima: retry detecting secure boot mode
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 3/3] x86/ima: retry detecting secure boot mode
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] x86/ima: retry detecting secure boot mode
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 3/3] x86/ima: retry detecting secure boot mode
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [GIT PULL] EFI changes for v5.1
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [GIT PULL] EFI changes for v5.1
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [GIT PULL] EFI changes for v5.1
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [GIT PULL] EFI changes for v5.1
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH] efi: Downgrade "EFI_MEMMAP is not enabled" message
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [PATCH] efi: Downgrade "EFI_MEMMAP is not enabled" message
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi: Downgrade "EFI_MEMMAP is not enabled" message
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [PATCH] efi: Downgrade "EFI_MEMMAP is not enabled" message
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi: Downgrade "EFI_MEMMAP is not enabled" message
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [PATCH] efi: Downgrade "EFI_MEMMAP is not enabled" message
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] efi: Downgrade "EFI_MEMMAP is not enabled" message
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [PATCH V4 2/4] tpm: Reserve the TPM final events table
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH V5 1/4] tpm: Abstract crypto agile event size calculations
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V5 3/4] tpm: Append the final event log to the TPM event log
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V5 4/4] efi: Attempt to get the TCG2 event log in the boot stub
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Add support for TCG2 log format on UEFI systems
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: [PATCH V4 2/4] tpm: Reserve the TPM final events table
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V4 2/4] tpm: Reserve the TPM final events table
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH V4 0/4] Add support for TCG2 event logs on EFI systems
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH V4 3/4] tpm: Append the final event log to the TPM event log
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V4 4/4] efi: Attempt to get the TCG2 event log in the boot stub
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V4 2/4] tpm: Reserve the TPM final events table
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V4 1/4] tpm: Abstract crypto agile event size calculations
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V4 0/4] Add support for TCG2 event logs on EFI systems
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH 4.20 22/32] arm64, mm, efi: Account for GICv3 LPI tables in static memblock reserve table
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.20 23/32] efi/arm: Revert "Defer persistent reservations until after paging_init()"
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: linux-next: Tree for Feb 20
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: linux-next: Tree for Feb 20
- From: Zhangshaokun <zhangshaokun@xxxxxxxxxxxxx>
- Re: linux-next: Tree for Feb 20
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: linux-next: Tree for Feb 20
- From: Zhangshaokun <zhangshaokun@xxxxxxxxxxxxx>
- Re: linux-next: Tree for Feb 20
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: linux-next: Tree for Feb 20
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: linux-next: Tree for Feb 20
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] Fix crash in cper_estatus_check()
- From: "Rafael J. Wysocki" <rjw@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] Fix crash in cper_estatus_check()
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 0/2] Fix crash in cper_estatus_check()
- From: "Rafael J. Wysocki" <rjw@xxxxxxxxxxxxx>
- [PATCH 4.14 53/62] x86/platform/UV: Use efi_runtime_lock to serialise BIOS calls
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.9 47/58] x86/platform/UV: Use efi_runtime_lock to serialise BIOS calls
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.19 74/85] x86/platform/UV: Use efi_runtime_lock to serialise BIOS calls
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.20 78/92] x86/platform/UV: Use efi_runtime_lock to serialise BIOS calls
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.4 135/143] x86/platform/UV: Use efi_runtime_lock to serialise BIOS calls
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] efi/libstub: refactor cmd_stubcopy
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] ima: fix build error redeclaration of enumerator
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH 1/1] efi: fix build error redeclaration of enumerator
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [GIT PULL 0/1] EFI updates for v5.1
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [tip:x86/uv] x86/platform/UV: Use efi_enabled() instead of test_bit()
- From: tip-bot for Hedi Berriche <tipbot@xxxxxxxxx>
- [tip:x86/uv] x86/platform/UV: Remove uv_bios_call_reentrant()
- From: tip-bot for Hedi Berriche <tipbot@xxxxxxxxx>
- [tip:x86/uv] x86/platform/UV: Remove unnecessary #ifdef CONFIG_EFI
- From: tip-bot for Hedi Berriche <tipbot@xxxxxxxxx>
- [tip:x86/urgent] x86/platform/UV: Use efi_runtime_lock to serialise BIOS calls
- From: tip-bot for Hedi Berriche <tipbot@xxxxxxxxx>
- [GIT PULL 0/2] EFI fixes for v5.0-rc
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 2/2] efi/arm: Revert "Defer persistent reservations until after paging_init()"
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 1/2] arm64: account for GICv3 LPI tables in static memblock reserve table
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 1/2] arm64: account for GICv3 LPI tables in static memblock reserve table
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH] efi/libstub: refactor cmd_stubcopy
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi/libstub: refactor cmd_stubcopy
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] ima: fix build error redeclaration of enumerator
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [Patch v3 0/4] Protect against concurrent calls into UV BIOS
- From: Mike Travis <mike.travis@xxxxxxx>
- Re: [Patch v3 0/4] Protect against concurrent calls into UV BIOS
- From: Dimitri Sivanich <sivanich@xxxxxxx>
- Re: [Patch v3 0/4] Protect against concurrent calls into UV BIOS
- From: Russ Anderson <rja@xxxxxxx>
- Re: [PATCH v3 1/2] ima: fix build error redeclaration of enumerator
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] arm64: account for GICv3 LPI tables in static memblock reserve table
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 1/2] arm64: account for GICv3 LPI tables in static memblock reserve table
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH 1/2] arm64: account for GICv3 LPI tables in static memblock reserve table
- From: Mike Rapoport <rppt@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] arm64: account for GICv3 LPI tables in static memblock reserve table
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 1/2] arm64: account for GICv3 LPI tables in static memblock reserve table
- From: Will Deacon <will.deacon@xxxxxxx>
- Re: [PATCH 1/2] arm64: account for GICv3 LPI tables in static memblock reserve table
- From: Mike Rapoport <rppt@xxxxxxxxxxxxx>
- Re: [Patch v3 0/4] Protect against concurrent calls into UV BIOS
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 2/2] efi: fix build error redeclaration of enumerator
- From: Anders Roxell <anders.roxell@xxxxxxxxxx>
- [PATCH v3 1/2] ima: fix build error redeclaration of enumerator
- From: Anders Roxell <anders.roxell@xxxxxxxxxx>
- [Patch v3 3/4] x86/platform/UV: use efi_enabled() instead of test_bit()
- From: Hedi Berriche <hedi.berriche@xxxxxxx>
- [Patch v3 2/4] x86/platform/UV: kill uv_bios_call_reentrant()
- From: Hedi Berriche <hedi.berriche@xxxxxxx>
- [Patch v3 1/4] x86/platform/UV: remove unnecessary #ifdef CONFIG_EFI
- From: Hedi Berriche <hedi.berriche@xxxxxxx>
- [Patch v3 4/4] x86/platform/UV: use efi_runtime_lock to serialise BIOS calls
- From: Hedi Berriche <hedi.berriche@xxxxxxx>
- [Patch v3 0/4] Protect against concurrent calls into UV BIOS
- From: Hedi Berriche <hedi.berriche@xxxxxxx>
- Re: [PATCH 4/5] efi/libstub/tpm: Retrieve TPM event log in 2.0 format
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 4/5] efi/libstub/tpm: Retrieve TPM event log in 2.0 format
- From: Bartosz Szczepanek <bsz@xxxxxxxxxxxx>
- [PATCH 1/2] arm64: account for GICv3 LPI tables in static memblock reserve table
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 2/2] efi/arm: Revert "Defer persistent reservations until after paging_init()"
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 0/2] efi/arm/gicv3: implement fix for memory reservation issue
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 4/5] efi/libstub/tpm: Retrieve TPM event log in 2.0 format
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/5] tpm: Use library version of calc_tpm2_event_size in sysfs code
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/5] tpm: Change calc_tpm2_event_size signature
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/5] tpm: Copy calc_tpm2_event_size() to TPM library
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/5] tpm: Copy calc_tpm2_event_size() to TPM library
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] efi: fix build error redeclaration of enumerator
- From: Anders Roxell <anders.roxell@xxxxxxxxxx>
- Re: [Patch v2 1/4] efi/x86: turn EFI runtime semaphore into a global lock
- From: Hedi Berriche <hedi.berriche@xxxxxxx>
- Re: [Patch v2 1/4] efi/x86: turn EFI runtime semaphore into a global lock
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [Patch v2 1/4] efi/x86: turn EFI runtime semaphore into a global lock
- From: Hedi Berriche <hedi.berriche@xxxxxxx>
- [PATCH v2 2/2] efi: fix build error redeclaration of enumerator
- From: Anders Roxell <anders.roxell@xxxxxxxxxx>
- [PATCH v2 1/2] ima: fix build error redeclaration of enumerator
- From: Anders Roxell <anders.roxell@xxxxxxxxxx>
- Re: [PATCH 1/2] ima: fix build error redeclaration of enumerator
- From: Anders Roxell <anders.roxell@xxxxxxxxxx>
- Re: [PATCH 1/2] ima: fix build error redeclaration of enumerator
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH 1/2] ima: fix build error redeclaration of enumerator
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH 2/2] efi: fix build error redeclaration of enumerator
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH 2/2] efi: fix build error redeclaration of enumerator
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 2/2] efi: fix build error redeclaration of enumerator
- From: Anders Roxell <anders.roxell@xxxxxxxxxx>
- [PATCH 1/2] ima: fix build error redeclaration of enumerator
- From: Anders Roxell <anders.roxell@xxxxxxxxxx>
- Re: [PATCH] efi/libstub: refactor cmd_stubcopy
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] efi/libstub: refactor cmd_stubcopy
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Masayoshi Mizuma <msys.mizuma@xxxxxxxxx>
- [PATCH 4.20 095/352] firmware/efi: Add NULL pointer checks in efivars API functions
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 0/5] Add support for TPM event log 2.0 on EFI/ARM
- [PATCH 1/5] tpm: Copy calc_tpm2_event_size() to TPM library
- [PATCH 2/5] tpm: Change calc_tpm2_event_size signature
- [PATCH 3/5] tpm: Use library version of calc_tpm2_event_size in sysfs code
- [PATCH 4/5] efi/libstub/tpm: Retrieve TPM event log in 2.0 format
- [PATCH 4.19 082/313] firmware/efi: Add NULL pointer checks in efivars API functions
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.14 054/205] firmware/efi: Add NULL pointer checks in efivars API functions
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.9 031/137] firmware/efi: Add NULL pointer checks in efivars API functions
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5/5] efi/arm: Retrieve TPM event log at efi_entry
- Re: [PATCH v8 2/5] arm64: replace -pg with CC_FLAGS_FTRACE in efi Makefiles
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: x86 kernel does not boot with this commit 4543fea0423b221d6
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- [PATCH] x86: defconfig: enable EFI stub, mixed mode and BGRT
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: x86 kernel does not boot with this commit 4543fea0423b221d6
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: x86 kernel does not boot with this commit 4543fea0423b221d6
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH] acpi: bgrt: parse BGRT to obtain BMP address before it gets clobbered
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Masayoshi Mizuma <msys.mizuma@xxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 02/10] x86/efi: Return error status if mapping EFI regions fail
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v8 2/5] arm64: replace -pg with CC_FLAGS_FTRACE in efi Makefiles
- From: duwe@xxxxxx (Torsten Duwe)
- Re: [Patch v2 1/4] efi/x86: turn EFI runtime semaphore into a global lock
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [Patch v2 1/4] efi/x86: turn EFI runtime semaphore into a global lock
- From: Hedi Berriche <hedi.berriche@xxxxxxx>
- Re: [Patch v2 1/4] efi/x86: turn EFI runtime semaphore into a global lock
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [Patch v2 3/4] x86/platform/UV: use efi_enabled() instead of test_bit()
- From: Hedi Berriche <hedi.berriche@xxxxxxx>
- [Patch v2 2/4] x86/platform/UV: kill uv_bios_call_reentrant() as it has no callers
- From: Hedi Berriche <hedi.berriche@xxxxxxx>
- [Patch v2 1/4] efi/x86: turn EFI runtime semaphore into a global lock
- From: Hedi Berriche <hedi.berriche@xxxxxxx>
- [Patch v2 4/4] x86/platform/UV: use efi_runtime_sem to serialise BIOS calls
- From: Hedi Berriche <hedi.berriche@xxxxxxx>
- [Patch v2 0/4] Protect against concurrent calls into UV BIOS
- From: Hedi Berriche <hedi.berriche@xxxxxxx>
- Re: [PATCH 10/10] acpi: bgrt: parse BGRT to obtain BMP address before it gets clobbered
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: x86 kernel does not boot with this commit 4543fea0423b221d6
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: [PATCH 10/10] acpi: bgrt: parse BGRT to obtain BMP address before it gets clobbered
- From: "Ghannam, Yazen" <Yazen.Ghannam@xxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Masayoshi Mizuma <msys.mizuma@xxxxxxxxx>
- Re: x86 kernel does not boot with this commit 4543fea0423b221d6
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH -next] efi/arm64: return zero from ptdump_init()
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: x86 kernel does not boot with this commit 4543fea0423b221d6
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: [PATCH 02/10] x86/efi: Return error status if mapping EFI regions fail
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH -next] efi/arm64: return zero from ptdump_init()
- From: Qian Cai <cai@xxxxxx>
- Re: [PATCH] efi/arm: Don't expect a return value of ptdump_debugfs_register
- From: Will Deacon <will.deacon@xxxxxxx>
- Re: [PATCH] firmware: efi: arm-runtime: fix build error void value not ignored
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] firmware: efi: arm-runtime: fix build error void value not ignored
- From: Anders Roxell <anders.roxell@xxxxxxxxxx>
- Re: [PATCH 02/10] x86/efi: Return error status if mapping EFI regions fail
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 02/10] x86/efi: Return error status if mapping EFI regions fail
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH 02/10] x86/efi: Return error status if mapping EFI regions fail
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- [PATCH 3.16 004/305] x86/mm: Simplify p[g4um]d_page() macros
- From: Ben Hutchings <ben@xxxxxxxxxxxxxxx>
- [PATCH 1/1] efi/arm64: add a terminator for ptdump marker
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [GIT PULL 0/1] EFI fix for v5.0
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [GIT PULL 00/10] EFI changes for v5.1
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 02/10] x86/efi: Return error status if mapping EFI regions fail
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 04/10] efi: use 32-bit alignment for efi_guid_t
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 05/10] efi/fdt: More cleanups
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 08/10] x86: make ARCH_USE_MEMREMAP_PROT a generic Kconfig symbol
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 03/10] efi: memattr: don't bail on zero VA if it equals the region's PA
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 09/10] efi: x86: convert x86 EFI earlyprintk into generic earlycon implementation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 10/10] acpi: bgrt: parse BGRT to obtain BMP address before it gets clobbered
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 07/10] efi: arm/arm64: allow SetVirtualAddressMap() to be omitted
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 06/10] efi: replace GPL license boilerplate with SPDX headers
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 01/10] x86/efi: Mark can_free_region() as an __init function
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [efi:next 10/10] drivers/firmware/efi/efi-bgrt.c:110:3: warning: format '%lu' expects argument of type 'long unsigned int', but argument 2 has type 'size_t'
- From: kbuild test robot <lkp@xxxxxxxxx>
- [efi:next 10/10] drivers/firmware//efi/efi-bgrt.c:110:10: warning: format '%lu' expects argument of type 'long unsigned int', but argument 2 has type 'size_t' {aka 'unsigned int'}
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH] efi/arm: Don't expect a return value of ptdump_debugfs_register
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] efi/arm: Don't expect a return value of ptdump_debugfs_register
- From: Nathan Chancellor <natechancellor@xxxxxxxxx>
- [efi:next 8/8] drivers/firmware//efi/efi-bgrt.c:109:22: note: in expansion of macro 'min'
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH] efi: arm/arm64: allow SetVirtualAddressMap() to be omitted
- From: Lee Jones <lee.jones@xxxxxxxxxx>
- [efi:next 8/8] drivers/firmware/efi/efi-bgrt.c:109:73: warning: comparison of distinct pointer types lacks a cast
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH v10 11/25] efi: Let architectures decide the flags that should be saved/restored
- From: Julien Thierry <julien.thierry@xxxxxxx>
- [PATCH v3 2/2] efi: x86: convert x86 EFI earlyprintk into generic earlycon implementation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 1/2] x86: make ARCH_USE_MEMREMAP_PROT a generic Kconfig symbol
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 0/2] efi: arm: add support for earlycon on EFI framebuffer
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi: arm/arm64: allow SetVirtualAddressMap() to be omitted
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi: arm/arm64: allow SetVirtualAddressMap() to be omitted
- From: Will Deacon <will.deacon@xxxxxxx>
- Re: [PATCH v2 0/2] Fix crash in cper_estatus_check()
- From: Tyler Baicar <baicar.tyler@xxxxxxxxx>
- Re: [PATCH] EFI: Expose GOP mode number through sysfs and add documentation.
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi/arm64: add a terminator for ptdump marker
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] EFI: Expose GOP mode number through sysfs and add documentation.
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v7 20/28] x86/asm: make some functions local
- From: Jiri Slaby <jslaby@xxxxxxx>
- [PATCH v7 27/28] x86_32/asm: change all ENTRY+ENDPROC to SYM_FUNC_*
- From: Jiri Slaby <jslaby@xxxxxxx>
- Re: [PATCH] efi: arm/arm64: allow SetVirtualAddressMap() to be omitted
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [efi:next 7/7] arch/x86/include/asm/pgtable_types.h:193:27: warning: conversion from 'long long unsigned int' to 'long unsigned int' changes value from '9223372036854776163' to '355'
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 1/2] acpi: bgrt: Fix the way the BGRT status field is used.
- From: Josh Triplett <josh@xxxxxxxxxxxxxxxx>
- Re: [PATCH] efi: arm/arm64: allow SetVirtualAddressMap() to be omitted
- From: Bjorn Andersson <bjorn.andersson@xxxxxxxxxx>
- Re: [PATCH 1/2] acpi: bgrt: Fix the way the BGRT status field is used.
- From: Môshe van der Sterre <me@xxxxxxxx>
- Re: [PATCH 1/2] acpi: bgrt: Fix the way the BGRT status field is used.
- From: Peter Jones <pjones@xxxxxxxxxx>
- Re: [PATCH 1/2] acpi: bgrt: Fix the way the BGRT status field is used.
- From: Môshe van der Sterre <me@xxxxxxxx>
- [PATCH] EFI: Expose GOP mode number through sysfs and add documentation.
- From: Peter Jones <pjones@xxxxxxxxxx>
- Re: [PATCH 2/2] efi: Add efifb sysfs information to the sysfs documentation
- From: Peter Jones <pjones@xxxxxxxxxx>
- [PATCH 2/2] efi: Add efifb sysfs information to the sysfs documentation
- From: Peter Jones <pjones@xxxxxxxxxx>
- [PATCH 1/2] acpi: bgrt: Fix the way the BGRT status field is used.
- From: Peter Jones <pjones@xxxxxxxxxx>
- [PATCH] efi/arm64: add a terminator for ptdump marker
- From: Qian Cai <cai@xxxxxx>
- Re: [PATCH] acpi: bgrt: parse BGRT to obtain BMP address before it gets clobbered
- From: Peter Jones <pjones@xxxxxxxxxx>
- [PATCH v2] acpi: bgrt: parse BGRT to obtain BMP address before it gets clobbered
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] acpi: bgrt: parse BGRT to obtain BMP address before it gets clobbered
- From: Peter Jones <pjones@xxxxxxxxxx>
- Re: [PATCH] acpi: bgrt: parse BGRT to obtain BMP address before it gets clobbered
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- [PATCH] efi: let kmemleak ignore false positives
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] acpi: bgrt: parse BGRT to obtain BMP address before it gets clobbered
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 2/2] efi: x86: convert x86 EFI earlyprintk into generic earlycon implementation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] x86/efi: Mark can_free_region() as an __init function
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] x86/efi: Return error status if mapping EFI regions fail
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 2/2] efi: x86: convert x86 EFI earlyprintk into generic earlycon implementation
- From: Alexander Graf <agraf@xxxxxxx>
- Re: [PATCH v2 2/2] efi: x86: convert x86 EFI earlyprintk into generic earlycon implementation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 2/2] efi: x86: convert x86 EFI earlyprintk into generic earlycon implementation
- From: Alexander Graf <agraf@xxxxxxx>
- [PATCH v2 2/2] efi: x86: convert x86 EFI earlyprintk into generic earlycon implementation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 1/2] x86: make ARCH_USE_MEMREMAP_PROT a generic Kconfig symbol
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 0/2] efi: arm: add support for earlycon on EFI framebuffer
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi: arm/arm64: allow SetVirtualAddressMap() to be omitted
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi: arm/arm64: allow SetVirtualAddressMap() to be omitted
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- [PATCH AUTOSEL 4.20 102/304] firmware/efi: Add NULL pointer checks in efivars API functions
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 088/258] firmware/efi: Add NULL pointer checks in efivars API functions
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 057/170] firmware/efi: Add NULL pointer checks in efivars API functions
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.9 033/107] firmware/efi: Add NULL pointer checks in efivars API functions
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH 2/2] efi/cper: Avoid possible OOB when checking generic data block
- From: Ross Lagerwall <ross.lagerwall@xxxxxxxxxx>
- [PATCH v2 0/2] Fix crash in cper_estatus_check()
- From: Ross Lagerwall <ross.lagerwall@xxxxxxxxxx>
- [PATCH v2 1/2] acpi/apei: Fix possible out-of-bounds access to BERT region
- From: Ross Lagerwall <ross.lagerwall@xxxxxxxxxx>
- [PATCH v2 2/2] efi/cper: Fix possible out-of-bounds access
- From: Ross Lagerwall <ross.lagerwall@xxxxxxxxxx>
- Re: [PATCH v9 11/26] efi: Let architectures decide the flags that should be saved/restored
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH] efi: arm/arm64: allow SetVirtualAddressMap() to be omitted
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi: arm/arm64: allow SetVirtualAddressMap() to be omitted
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi: arm/arm64: allow SetVirtualAddressMap() to be omitted
- From: Heinrich Schuchardt <xypron.glpk@xxxxxx>
- Re: [PATCH 3/3] x86/platform/UV: use efi_runtime_sem to serialise BIOS calls
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 2/3] x86/platform/UV: kill uv_bios_call_reentrant() as it has no callers
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 1/3] efi/x86: turn EFI runtime semaphore into a global lock
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi: arm/arm64: allow SetVirtualAddressMap() to be omitted
- From: Alexander Graf <agraf@xxxxxxx>
- Re: [PATCH] efi: arm/arm64: allow SetVirtualAddressMap() to be omitted
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi: arm/arm64: allow SetVirtualAddressMap() to be omitted
- From: Heinrich Schuchardt <xypron.glpk@xxxxxx>
- [PATCH] efi: arm/arm64: allow SetVirtualAddressMap() to be omitted
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 2/2] efi: arm64: Enable earlycon for the GOP framebuffer
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 1/2] efi: x86: move EFI earlyprintk code to shared location
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 0/2] efi: arm: add support for earlycon on EFI framebuffer
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 1/2 v8] resource: add the new I/O resource descriptor 'IORES_DESC_RESERVED'
- From: lijiang <lijiang@xxxxxxxxxx>
- [PATCH 4.19 038/106] efi/libstub: Disable some warnings for x86{,_64}
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.20 050/127] efi/libstub: Disable some warnings for x86{,_64}
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] efi/cper: Avoid possible OOB when checking generic data block
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] acpi: bgrt: parse BGRT to obtain BMP address before it gets clobbered
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v9 11/26] efi: Let architectures decide the flags that should be saved/restored
- From: Julien Thierry <julien.thierry@xxxxxxx>
- Re: [PATCH] acpi: bgrt: parse BGRT to obtain BMP address before it gets clobbered
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH] acpi: bgrt: parse BGRT to obtain BMP address before it gets clobbered
- From: Lorenzo Pieralisi <lorenzo.pieralisi@xxxxxxx>
- Re: [PATCH] acpi: bgrt: parse BGRT to obtain BMP address before it gets clobbered
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] acpi: bgrt: parse BGRT to obtain BMP address before it gets clobbered
- From: Lorenzo Pieralisi <lorenzo.pieralisi@xxxxxxx>
- [PATCH 2/2] efi/cper: Avoid possible OOB when checking generic data block
- From: Ross Lagerwall <ross.lagerwall@xxxxxxxxxx>
- [PATCH 1/2] acpi/apei: Avoid possible OOB when accessing BERT region
- From: Ross Lagerwall <ross.lagerwall@xxxxxxxxxx>
- [PATCH 0/2] Fix crash in cper_estatus_check()
- From: Ross Lagerwall <ross.lagerwall@xxxxxxxxxx>
- [PATCH] acpi: bgrt: parse BGRT to obtain BMP address before it gets clobbered
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH] arm64: efi: fix chicken-and-egg problem in memreserve code
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH] arm64: efi: fix chicken-and-egg problem in memreserve code
- From: James Morse <james.morse@xxxxxxx>
- Re: [PATCH v9 11/26] efi: Let architectures decide the flags that should be saved/restored
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v9 11/26] efi: Let architectures decide the flags that should be saved/restored
- From: Julien Thierry <julien.thierry@xxxxxxx>
- [RFC PATCH] arm64: efi: fix chicken-and-egg problem in memreserve code
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 1/3] efi/x86: turn EFI runtime semaphore into a global lock
- From: Hedi Berriche <hedi.berriche@xxxxxxx>
- Re: [PATCH 1/3] efi/x86: turn EFI runtime semaphore into a global lock
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] x86/platform/UV: use efi_runtime_sem to serialise BIOS calls
- From: Hedi Berriche <hedi.berriche@xxxxxxx>
- Re: [GIT PULL] EFI fix
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [GIT PULL] EFI fix
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [GIT PULL] EFI fix
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] EFI fix
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] EFI fix
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [GIT PULL] EFI fix
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH 3/3] x86/platform/UV: use efi_runtime_sem to serialise BIOS calls
- From: Bhupesh Sharma <bhsharma@xxxxxxxxxx>
- [PATCH 0/3] Protect against concurrent calls into UV BIOS
- From: Hedi Berriche <hedi.berriche@xxxxxxx>
- [PATCH 1/3] efi/x86: turn EFI runtime semaphore into a global lock
- From: Hedi Berriche <hedi.berriche@xxxxxxx>
- [PATCH 2/3] x86/platform/UV: kill uv_bios_call_reentrant() as it has no callers
- From: Hedi Berriche <hedi.berriche@xxxxxxx>
- [PATCH 3/3] x86/platform/UV: use efi_runtime_sem to serialise BIOS calls
- From: Hedi Berriche <hedi.berriche@xxxxxxx>
- [PATCH AUTOSEL 4.20 041/117] efi/libstub: Disable some warnings for x86{,_64}
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 32/97] efi/libstub: Disable some warnings for x86{,_64}
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH] efi: use 32-bit alignment for efi_guid_t
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi: use 32-bit alignment for efi_guid_t
- From: Leif Lindholm <leif.lindholm@xxxxxxxxxx>
- [PATCH] efi: use 32-bit alignment for efi_guid_t
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 1/2 v8] resource: add the new I/O resource descriptor 'IORES_DESC_RESERVED'
- From: lijiang <lijiang@xxxxxxxxxx>
- Re: [PATCH -mmotm] efi: drop kmemleak_ignore() for page allocator
- From: Qian Cai <cai@xxxxxx>
- Re: [PATCH -mmotm] efi: drop kmemleak_ignore() for page allocator
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: [PATCH] x86/efi: Don't unmap EFI boot services code/data regions for EFI_OLD_MEMMAP and EFI_MIXED_MODE
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH] x86/efi: Mark can_free_region() as an __init function
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH -mmotm] efi: drop kmemleak_ignore() for page allocator
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: Uefi runtime property in device tree
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: Uefi runtime property in device tree
- From: Pankaj Bansal <pankaj.bansal@xxxxxxx>
- Re: [GIT PULL] EFI changes for v4.21
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH -mmotm] efi: drop kmemleak_ignore() for page allocator
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH -mmotm] efi: drop kmemleak_ignore() for page allocator
- From: Qian Cai <cai@xxxxxx>
- Re: Uefi runtime property in device tree
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH -mmotm] efi: drop kmemleak_ignore() for page allocator
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Uefi runtime property in device tree
- From: Pankaj Bansal <pankaj.bansal@xxxxxxx>
- RE: [PATCH] efi: memattr: don't bail on zero VA if it equals the region's PA
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH -mmotm] efi: drop kmemleak_ignore() for page allocator
- From: Qian Cai <cai@xxxxxx>
- Re: [PATCH] x86/efi: Don't unmap EFI boot services code/data regions for EFI_OLD_MEMMAP and EFI_MIXED_MODE
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- [GIT PULL] EFI changes for v4.21
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH] efi: memattr: don't bail on zero VA if it equals the region's PA
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] efi: memattr: don't bail on zero VA if it equals the region's PA
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] x86/efi: Don't unmap EFI boot services code/data regions for EFI_OLD_MEMMAP and EFI_MIXED_MODE
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: [PATCH] x86/efi: Don't unmap EFI boot services code/data regions for EFI_OLD_MEMMAP and EFI_MIXED_MODE
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH] x86/efi: Don't unmap EFI boot services code/data regions for EFI_OLD_MEMMAP and EFI_MIXED_MODE
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH] x86/efi: Don't unmap EFI boot services code/data regions for EFI_OLD_MEMMAP and EFI_MIXED_MODE
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] x86/efi: Don't unmap EFI boot services code/data regions for EFI_OLD_MEMMAP and EFI_MIXED_MODE
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH V2 0/3] Fix EFI memory map leaks
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] pstore: Convert buf_lock to semaphore
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH efi-urgent] Revert "efi: Align 'efi_guid_t' to 64 bits"
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH efi-urgent] Revert "efi: Align 'efi_guid_t' to 64 bits"
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH efi-urgent] Revert "efi: Align 'efi_guid_t' to 64 bits"
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 3.18 14/31] x86/earlyprintk/efi: Fix infinite loop on some screen widths
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.4 21/40] x86/earlyprintk/efi: Fix infinite loop on some screen widths
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.9 34/61] x86/earlyprintk/efi: Fix infinite loop on some screen widths
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.14 40/72] x86/earlyprintk/efi: Fix infinite loop on some screen widths
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.19 13/67] x86/earlyprintk/efi: Fix infinite loop on some screen widths
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] efi: efi_guid_t must be 64-bit aligned
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH 2/2] efi: efi_guid_t must be 64-bit aligned
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [GIT PULL 0/2] Final EFI fixes for v4.20
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 2/2] efi: efi_guid_t must be 64-bit aligned
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 1/2] efi: let kmemleak ignore false positives
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 1/1] efi: efi_guid_t must be 64-bit aligned
- From: Heinrich Schuchardt <xypron.glpk@xxxxxx>
- [PATCH AUTOSEL 4.19 11/73] x86/earlyprintk/efi: Fix infinite loop on some screen widths
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 05/41] x86/earlyprintk/efi: Fix infinite loop on some screen widths
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.9 04/34] x86/earlyprintk/efi: Fix infinite loop on some screen widths
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.4 04/23] x86/earlyprintk/efi: Fix infinite loop on some screen widths
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 3.18 03/16] x86/earlyprintk/efi: Fix infinite loop on some screen widths
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v2 7/7] ima: Support platform keyring for kernel appraisal
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v2 7/7] ima: Support platform keyring for kernel appraisal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/7] integrity: Load certs to the platform keyring
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/7] integrity: Define a trusted platform keyring
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v2a 5/7] efi: Import certificates from UEFI Secure Boot
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- Re: [PATCH v2 7/7] ima: Support platform keyring for kernel appraisal
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v2 5/7] efi: Import certificates from UEFI Secure Boot
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- Re: [PATCH 1/2 v8] resource: add the new I/O resource descriptor 'IORES_DESC_RESERVED'
- From: lijiang <lijiang@xxxxxxxxxx>
- Re: [PATCH v2 7/7] ima: Support platform keyring for kernel appraisal
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v2 6/7] efi: Allow the "db" UEFI variable to be suppressed
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v2 5/7] efi: Import certificates from UEFI Secure Boot
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v2 3/7] efi: Add EFI signature data types
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v2 2/7] integrity: Load certs to the platform keyring
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v2 1/7] integrity: Define a trusted platform keyring
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH 4.19 104/118] x86/efi: Allocate e820 buffer before calling efi_exit_boot_service
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] drivers: firmware: efi: install new fdt in configuration table
- From: Leif Lindholm <leif.lindholm@xxxxxxxxxx>
- RE: [PATCH v2 2/2] drivers: firmware: efi: install new fdt in configuration table
- From: Pankaj Bansal <pankaj.bansal@xxxxxxx>
- Re: [PATCH v2 2/2] drivers: firmware: efi: install new fdt in configuration table
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: [PATCH v2 2/2] drivers: firmware: efi: install new fdt in configuration table
- From: Pankaj Bansal <pankaj.bansal@xxxxxxx>
- Re: [PATCH v2 2/2] drivers: firmware: efi: install new fdt in configuration table
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: [PATCH v2 2/2] drivers: firmware: efi: install new fdt in configuration table
- From: Pankaj Bansal <pankaj.bansal@xxxxxxx>
- Re: [PATCH v2 2/2] drivers: firmware: efi: install new fdt in configuration table
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: [PATCH v2 2/2] drivers: firmware: efi: install new fdt in configuration table
- From: Pankaj Bansal <pankaj.bansal@xxxxxxx>
- Re: [PATCH v2 2/2] drivers: firmware: efi: install new fdt in configuration table
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: [PATCH v2 2/2] drivers: firmware: efi: install new fdt in configuration table
- From: Pankaj Bansal <pankaj.bansal@xxxxxxx>
- Re: [PATCH v2 2/2] drivers: firmware: efi: install new fdt in configuration table
- From: Bhupesh Sharma <bhsharma@xxxxxxxxxx>
- RE: [PATCH v2 2/2] drivers: firmware: efi: install new fdt in configuration table
- From: Pankaj Bansal <pankaj.bansal@xxxxxxx>
- Re: [PATCH v2 2/2] drivers: firmware: efi: install new fdt in configuration table
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[Index of Archives]
[Linux Kernel Development]
[Security]
[Linux ARM Kernel]
[Tools]
[Linux MIPS]
[Linux S390]
[Bugtraq]
[Share Photos]>
[Fedora ARM]