Linux EFI/UEFI Development
[Prev Page][Next Page]
- Re: [PATCH v4 00/10] Add Kernel Concurrency Sanitizer (KCSAN)
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH v4 00/10] Add Kernel Concurrency Sanitizer (KCSAN)
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [PATCH v4 00/10] Add Kernel Concurrency Sanitizer (KCSAN)
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH v4 00/10] Add Kernel Concurrency Sanitizer (KCSAN)
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: PROBLEM: error and warning from 5.4.0-rc7
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v4 00/10] Add Kernel Concurrency Sanitizer (KCSAN)
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH v4 00/10] Add Kernel Concurrency Sanitizer (KCSAN)
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [PATCH v4 00/10] Add Kernel Concurrency Sanitizer (KCSAN)
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH v3] efi/earlycon: Remap entire framebuffer after page initialization
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v8 1/8] efi: Export boot-services code and data as debugfs-blobs
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v8 7/8] platform/x86: touchscreen_dmi: Add EFI embedded firmware info support
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v8 5/8] Input: silead - Switch to firmware_request_platform for retreiving the fw
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v8 8/8] platform/x86: touchscreen_dmi: Add info for the Chuwi Vi8 Plus tablet
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v8 6/8] Input: icn8505 - Switch to firmware_request_platform for retreiving the fw
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v8 4/8] firmware: Add new platform fallback mechanism and firmware_request_platform()
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v8 3/8] firmware: Rename FW_OPT_NOFALLBACK to FW_OPT_NOFALLBACK_SYSFS
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v8 2/8] efi: Add embedded peripheral firmware support
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v8 0/8] efi/firmware/platform-x86: Add EFI embedded fw support
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v3] efi/earlycon: Remap entire framebuffer after page initialization
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] efi/earlycon: Remap entire framebuffer after page initialization
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2] efi/earlycon: Remap entire framebuffer after page initialization
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 2/8] efi: Add embedded peripheral firmware support
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v4 00/10] Add Kernel Concurrency Sanitizer (KCSAN)
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [PATCH v4 08/10] asm-generic, kcsan: Add KCSAN instrumentation for bitops
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [PATCH v4 2/6] efi / ras: CCIX Cache error reporting
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v4 00/10] Add Kernel Concurrency Sanitizer (KCSAN)
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH v7 2/8] efi: Add embedded peripheral firmware support
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH v4 00/10] Add Kernel Concurrency Sanitizer (KCSAN)
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [PATCH v7 2/8] efi: Add embedded peripheral firmware support
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v7 3/8] firmware: Rename FW_OPT_NOFALLBACK to FW_OPT_NOFALLBACK_SYSFS
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v7 2/8] efi: Add embedded peripheral firmware support
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v4 00/10] Add Kernel Concurrency Sanitizer (KCSAN)
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH v3 0/9] Add Kernel Concurrency Sanitizer (KCSAN)
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH v7 2/8] efi: Add embedded peripheral firmware support
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH v3 0/9] Add Kernel Concurrency Sanitizer (KCSAN)
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v4 00/10] Add Kernel Concurrency Sanitizer (KCSAN)
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v4 02/10] include/linux/compiler.h: Introduce data_race(expr) macro
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v4 04/10] objtool, kcsan: Add KCSAN runtime functions to whitelist
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v4 08/10] asm-generic, kcsan: Add KCSAN instrumentation for bitops
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v4 09/10] locking/atomics, kcsan: Add KCSAN instrumentation
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v4 10/10] x86, kcsan: Enable KCSAN for x86
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v4 07/10] seqlock: Require WRITE_ONCE surrounding raw_seqcount_barrier
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v4 06/10] seqlock, kcsan: Add annotations for KCSAN
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v4 05/10] build, kcsan: Add KCSAN build exceptions
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v4 03/10] kcsan: Add Documentation entry in dev-tools
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v4 01/10] kcsan: Add Kernel Concurrency Sanitizer infrastructure
- From: Marco Elver <elver@xxxxxxxxxx>
- [RFC PATCH v2] efi: arm64: Introduce /sys/firmware/efi/memreserve to tell the persistent pages
- From: Masayoshi Mizuma <msys.mizuma@xxxxxxxxx>
- [PATCH v5 6/6] efi / ras: CCIX Agent internal error reporting
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v5 4/6] efi / ras: CCIX Port error reporting
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v5 5/6] efi / ras: CCIX Link error reporting
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v5 3/6] efi / ras: CCIX Address Translation Cache error reporting
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v5 2/6] efi / ras: CCIX Cache error reporting
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v5 1/6] efi / ras: CCIX Memory error reporting
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v5 0/6] CCIX Protocol error reporting.
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v4 2/6] efi / ras: CCIX Cache error reporting
- From: Jonathan Cameron <jonathan.cameron@xxxxxxxxxx>
- Re: [PATCH v4 1/6] efi / ras: CCIX Memory error reporting
- From: Jonathan Cameron <jonathan.cameron@xxxxxxxxxx>
- Re: [PATCH v7 4/8] firmware: Add new platform fallback mechanism and firmware_request_platform()
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v7 1/8] efi: Export boot-services code and data as debugfs-blobs
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v7 2/8] efi: Add embedded peripheral firmware support
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH] sysfs: Fixes __BIN_ATTR_WO() macro
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] sysfs: Fixes __BIN_ATTR_WO() macro
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- Re: [PATCH v10 6/9] certs: add wrapper function to check blacklisted binary hash
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- Re: [PATCH v10 4/9] powerpc/ima: define trusted boot policy
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- Re: [PATCH v10 8/9] powerpc/ima: update ima arch policy to check for blacklist
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- Re: [PATCH v9 1/4] powerpc/powernv: Add OPAL API interface to access secure variable
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- Re: [PATCH v10a 3/9] powerpc: detect the trusted boot state of the system
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- Re: [PATCH v10 7/9] ima: check against blacklisted hashes for files with modsig
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- Re: [PATCH v10a 1/9] powerpc: detect the secure boot mode of the system
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v10 9/9] powerpc/ima: indicate kernel modules appended signatures are enforced
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- Re: [PATCH v10 5/9] ima: make process_buffer_measurement() generic
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- Re: [PATCH v10 2/9] powerpc/ima: add support to initialize ima policy rules
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- Re: [PATCH v4 3/6] efi / ras: CCIX Address Translation Cache error reporting
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- Re: [PATCH v4 2/6] efi / ras: CCIX Cache error reporting
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- Re: [PATCH v4 1/6] efi / ras: CCIX Memory error reporting
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH] efi: sanity check in case memermap() at efi_mem_reserve_persistent() returns NULL
- From: Masayoshi Mizuma <msys.mizuma@xxxxxxxxx>
- Re: [RFC PATCH] efi: arm64: Introduce /sys/firmware/efi/memreserve to tell the persistent pages
- From: Masayoshi Mizuma <msys.mizuma@xxxxxxxxx>
- [PATCH v4 5/6] efi / ras: CCIX Link error reporting
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v4 6/6] efi / ras: CCIX Agent internal error reporting
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v4 4/6] efi / ras: CCIX Port error reporting
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v4 1/6] efi / ras: CCIX Memory error reporting
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v4 3/6] efi / ras: CCIX Address Translation Cache error reporting
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v4 2/6] efi / ras: CCIX Cache error reporting
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v4 0/6] CCIX Protocol error reporting.
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v3 3/6] efi / ras: CCIX Address Translation Cache error reporting
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v3 2/6] efi / ras: CCIX Cache error reporting
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v3 2/6] efi / ras: CCIX Cache error reporting
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v3 1/6] efi / ras: CCIX Memory error reporting
- From: kbuild test robot <lkp@xxxxxxxxx>
- RE: [RFC PATCH] efi: arm64: Introduce /sys/firmware/efi/memreserve to tell the persistent pages
- From: "d.hatayama@xxxxxxxxxxx" <d.hatayama@xxxxxxxxxxx>
- Re: [PATCH v3 1/6] efi / ras: CCIX Memory error reporting
- From: kbuild test robot <lkp@xxxxxxxxx>
- [tip: x86/boot] x86/boot: Introduce kernel_info.setup_type_max
- From: "tip-bot2 for Daniel Kiper" <tip-bot2@xxxxxxxxxxxxx>
- [tip: x86/boot] x86/boot: Introduce setup_indirect
- From: "tip-bot2 for Daniel Kiper" <tip-bot2@xxxxxxxxxxxxx>
- [tip: x86/boot] x86/boot: Introduce kernel_info
- From: "tip-bot2 for Daniel Kiper" <tip-bot2@xxxxxxxxxxxxx>
- [PATCH v3 0/6] CCIX Protocol error reporting.
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v3 6/6] efi / ras: CCIX Agent internal error reporting
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v3 3/6] efi / ras: CCIX Address Translation Cache error reporting
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v3 1/6] efi / ras: CCIX Memory error reporting
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v3 2/6] efi / ras: CCIX Cache error reporting
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v3 5/6] efi / ras: CCIX Link error reporting
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v3 4/6] efi / ras: CCIX Port error reporting
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [RFC PATCH] efi: arm64: Introduce /sys/firmware/efi/memreserve to tell the persistent pages
- From: Masayoshi Mizuma <msys.mizuma@xxxxxxxxx>
- Re: [PATCH v1] efi/earlycon: Remap entire framebuffer after page initialization
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- [PATCH v2] efi/earlycon: Remap entire framebuffer after page initialization
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- [PATCH v6 1/3] x86/boot: Introduce the kernel_info
- From: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
- [PATCH v6 2/3] x86/boot: Introduce the kernel_info.setup_type_max
- From: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
- [PATCH v6 0/3] x86/boot: Introduce the kernel_info et consortes
- From: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
- [PATCH v6 3/3] x86/boot: Introduce the setup_indirect
- From: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
- Re: [PATCH v1] efi/earlycon: Remap entire framebuffer after page initialization
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v1] efi/earlycon: Remap entire framebuffer after page initialization
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH v1] efi/earlycon: Remap entire framebuffer after page initialization
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 0/4] powerpc: expose secure variables to the kernel and userspace
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v9 0/4] powerpc: expose secure variables to the kernel and userspace
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: Linux 5.3.8: gsmi: failed to allocate name buffer. BUG: kernel NULL pointer dereference
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Linux 5.3.8: gsmi: failed to allocate name buffer. BUG: kernel NULL pointer dereference
- From: Kyle K <kylek389@xxxxxxxxx>
- [PATCH 5.3 176/193] efi: libstub/arm: Account for firmware reserved memory at the base of RAM
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.3 177/193] x86, efi: Never relocate kernel below lowest acceptable address
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.3 175/193] efi/tpm: Return -EINVAL when determining tpm final events log size fails
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1] efi/earlycon: Remap entire framebuffer after page initialization
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v1] efi/earlycon: Remap entire framebuffer after page initialization
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH] efi: Fix comment for efi_mem_type() wrt absent physical addresses
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi: Fix comment for efi_mem_type() wrt absent physical addresses
- From: Anshuman Khandual <anshuman.khandual@xxxxxxx>
- [PATCH] efi: Fix comment for efi_mem_type() wrt absent physical addresses
- From: Anshuman Khandual <anshuman.khandual@xxxxxxx>
- [PATCH v9 1/4] powerpc/powernv: Add OPAL API interface to access secure variable
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v9 4/4] powerpc: load firmware trusted keys/hashes into kernel keyring
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v9 3/4] x86/efi: move common keyring handler functions to new file
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v9 2/4] powerpc: expose secure variables to userspace via sysfs
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v9 0/4] powerpc: expose secure variables to the kernel and userspace
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- Re: [PATCH AUTOSEL 4.19 133/191] efi: honour memory reservations passed via a linux specific config table
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH AUTOSEL 4.19 133/191] efi: honour memory reservations passed via a linux specific config table
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH AUTOSEL 4.19 133/191] efi: honour memory reservations passed via a linux specific config table
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH AUTOSEL 4.19 133/191] efi: honour memory reservations passed via a linux specific config table
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH AUTOSEL 4.19 133/191] efi: honour memory reservations passed via a linux specific config table
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH AUTOSEL 4.19 135/191] efi/x86: Handle page faults occurring while running EFI runtime services
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH AUTOSEL 4.19 134/191] efi: Make efi_rts_work accessible to efi page fault handler
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH AUTOSEL 4.19 133/191] efi: honour memory reservations passed via a linux specific config table
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 135/191] efi/x86: Handle page faults occurring while running EFI runtime services
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 134/191] efi: Make efi_rts_work accessible to efi page fault handler
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 133/191] efi: honour memory reservations passed via a linux specific config table
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 191/191] x86/efi: fix a -Wtype-limits compilation warning
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH v8 4/4] powerpc: load firmware trusted keys/hashes into kernel keyring
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v8 3/4] x86/efi: move common keyring handler functions to new file
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v8 2/4] powerpc: expose secure variables to userspace via sysfs
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v8 1/4] powerpc/powernv: Add OPAL API interface to access secure variable
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v8 0/4] powerpc: expose secure variables to the kernel and userspace
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/9] kcsan: Add Kernel Concurrency Sanitizer infrastructure
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [PATCH v5 2/3] x86/boot: Introduce the kernel_info.setup_type_max
- From: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
- Re: [PATCH v5 2/3] x86/boot: Introduce the kernel_info.setup_type_max
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v5 2/3] x86/boot: Introduce the kernel_info.setup_type_max
- From: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
- Re: [PATCH v5 3/3] x86/boot: Introduce the setup_indirect
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v5 2/3] x86/boot: Introduce the kernel_info.setup_type_max
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v5 2/3] x86/boot: Introduce the kernel_info.setup_type_max
- From: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
- Re: [PATCH v5 2/3] x86/boot: Introduce the kernel_info.setup_type_max
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v7 4/4] powerpc: load firmware trusted keys/hashes into kernel keyring
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v3 1/9] kcsan: Add Kernel Concurrency Sanitizer infrastructure
- From: Bhupesh Sharma <bhsharma@xxxxxxxxxx>
- Re: [PATCH v3 1/9] kcsan: Add Kernel Concurrency Sanitizer infrastructure
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH 4/4] efi: libstub/tpm: enable tpm eventlog function for ARM platforms
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 3/4] x86: efi/random: Invoke EFI_RNG_PROTOCOL to seed the UEFI RNG table
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 2/4] efi/random: use arch-independent efi_call_proto()
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 1/4] MAINTAINERS: update Ard's email address to @kernel.org
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [GIT PULL 0/4] EFI updates for v5.5
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v8 00/12] EFI Specific Purpose Memory Support
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- Re: [PATCH v8 00/12] EFI Specific Purpose Memory Support
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v8 00/12] EFI Specific Purpose Memory Support
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- Re: [PATCH v5 0/3] x86/boot: Introduce the kernel_info et consortes
- From: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
- Re: [PATCH V2] EFI/stub: tpm: enable tpm eventlog function for ARM64 platform
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 18/30] acpi: Disable APEI error injection if the kernel is locked down
- From: Joey Lee <JLee@xxxxxxxx>
- [PATCH V2] EFI/stub: tpm: enable tpm eventlog function for ARM64 platform
- From: Xinwei Kong <kong.kongxinwei@xxxxxxxxxxxxx>
- Re: [PATCH] EFI/stub: tpm: enable tpm eventlog function for ARM64 platform
- From: kongxinwei <kong.kongxinwei@xxxxxxxxxxxxx>
- Re: [PATCH v7 2/4] powerpc: expose secure variables to userspace via sysfs
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 1/4] powerpc/powernv: Add OPAL API interface to access secure variable
- From: Eric Richter <erichte@xxxxxxxxxxxxx>
- [PATCH v7 4/4] powerpc: load firmware trusted keys/hashes into kernel keyring
- From: Eric Richter <erichte@xxxxxxxxxxxxx>
- [PATCH v7 3/4] x86/efi: move common keyring handler functions to new file
- From: Eric Richter <erichte@xxxxxxxxxxxxx>
- [PATCH v7 2/4] powerpc: expose secure variables to userspace via sysfs
- From: Eric Richter <erichte@xxxxxxxxxxxxx>
- [PATCH v7 0/4] powerpc: expose secure variables to the kernel and userspace
- From: Eric Richter <erichte@xxxxxxxxxxxxx>
- Re: [PATCH] efi: Return EFI_RESERVED_TYPE in efi_mem_type() for absent addresses
- From: Anshuman Khandual <anshuman.khandual@xxxxxxx>
- [PATCH v8 12/12] acpi/numa/hmat: Register "soft reserved" memory as an "hmem" device
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v8 11/12] acpi/numa/hmat: Register HMAT at device_initcall level
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v8 09/12] dax: Fix alloc_dax_region() compile warning
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v8 10/12] device-dax: Add a driver for "hmem" devices
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v8 07/12] x86/efi: Add efi_fake_mem support for EFI_MEMORY_SP
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v8 08/12] lib: Uplevel the pmem "region" ida to a global allocator
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v8 06/12] arm/efi: EFI soft reservation to memblock
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v8 05/12] x86/efi: EFI soft reservation to E820 enumeration
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v8 04/12] efi: Common enable/disable infrastructure for EFI soft reservation
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v8 03/12] x86/efi: Push EFI_MEMMAP check into leaf routines
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v8 02/12] efi: Enumerate EFI_MEMORY_SP
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v8 01/12] acpi/numa: Establish a new drivers/acpi/numa/ directory
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v8 00/12] EFI Specific Purpose Memory Support
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v3 1/9] kcsan: Add Kernel Concurrency Sanitizer infrastructure
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v3 1/9] kcsan: Add Kernel Concurrency Sanitizer infrastructure
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v5 0/3] x86/boot: Introduce the kernel_info et consortes
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3 1/9] kcsan: Add Kernel Concurrency Sanitizer infrastructure
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [PATCH v5 0/3] x86/boot: Introduce the kernel_info et consortes
- Re: [PATCH v5 0/3] x86/boot: Introduce the kernel_info et consortes
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] efi: Return EFI_RESERVED_TYPE in efi_mem_type() for absent addresses
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] EFI/stub: tpm: enable tpm eventlog function for ARM64 platform
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] EFI/stub: tpm: enable tpm eventlog function for ARM64 platform
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 0/2] x86, efi/random: invoke EFI_RNG_PROTOCOL in the x86 EFI stub
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v3 1/9] kcsan: Add Kernel Concurrency Sanitizer infrastructure
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [PATCH v3 1/9] kcsan: Add Kernel Concurrency Sanitizer infrastructure
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- [PATCH 1/2] efi/random: use arch-independent efi_call_proto()
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] x86: efi/random: Invoke EFI_RNG_PROTOCOL to seed the UEFI RNG table
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 0/2] x86, efi/random: invoke EFI_RNG_PROTOCOL in the x86 EFI stub
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 2/4] powerpc: expose secure variables to userspace via sysfs
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 1/4] powerpc/powernv: Add OPAL API interface to access secure variable
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v10a 3/9] powerpc: detect the trusted boot state of the system
- From: Eric Richter <erichte@xxxxxxxxxxxxx>
- [PATCH v10a 1/9] powerpc: detect the secure boot mode of the system
- From: Eric Richter <erichte@xxxxxxxxxxxxx>
- Re: [PATCH v5 0/3] x86/boot: Introduce the kernel_info et consortes
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- [PATCH] efi: Return EFI_RESERVED_TYPE in efi_mem_type() for absent addresses
- From: Anshuman Khandual <anshuman.khandual@xxxxxxx>
- Re: [PATCH v3 0/9] Add Kernel Concurrency Sanitizer (KCSAN)
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [PATCH v3 5/9] seqlock, kcsan: Add annotations for KCSAN
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [PATCH v3 0/9] Add Kernel Concurrency Sanitizer (KCSAN)
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH v3 5/9] seqlock, kcsan: Add annotations for KCSAN
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v3 0/9] Add Kernel Concurrency Sanitizer (KCSAN)
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH] EFI/stub: tpm: enable tpm eventlog function for ARM64 platform
- From: Xinwei Kong <kong.kongxinwei@xxxxxxxxxxxxx>
- [PATCH v6 3/4] x86/efi: move common keyring handler functions to new file
- From: Eric Richter <erichte@xxxxxxxxxxxxx>
- [PATCH v6 4/4] powerpc: load firmware trusted keys/hashes into kernel keyring
- From: Eric Richter <erichte@xxxxxxxxxxxxx>
- [PATCH v6 2/4] powerpc: expose secure variables to userspace via sysfs
- From: Eric Richter <erichte@xxxxxxxxxxxxx>
- [PATCH v6 1/4] powerpc/powernv: Add OPAL API interface to access secure variable
- From: Eric Richter <erichte@xxxxxxxxxxxxx>
- [PATCH v6 0/4] powerpc: expose secure variables to the kernel and userspace
- From: Eric Richter <erichte@xxxxxxxxxxxxx>
- Re: [PATCH v10 1/9] powerpc: detect the secure boot mode of the system
- From: Eric Richter <erichte@xxxxxxxxxxxxx>
- [PATCH 4.4 16/46] efi/x86: Do not clean dummy variable in kexec path
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.9 21/62] efi/cper: Fix endianness of PCIe class code
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.14 42/95] efi/x86: Do not clean dummy variable in kexec path
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.19 081/149] efi/cper: Fix endianness of PCIe class code
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.3 052/163] efi/x86: Do not clean dummy variable in kexec path
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.3 051/163] efi/cper: Fix endianness of PCIe class code
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.19 082/149] efi/x86: Do not clean dummy variable in kexec path
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.14 41/95] efi/cper: Fix endianness of PCIe class code
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.9 22/62] efi/x86: Do not clean dummy variable in kexec path
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.4 15/46] efi/cper: Fix endianness of PCIe class code
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] Add Kernel Concurrency Sanitizer (KCSAN)
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH v3 0/9] Add Kernel Concurrency Sanitizer (KCSAN)
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [PATCH v3 0/9] Add Kernel Concurrency Sanitizer (KCSAN)
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH v4 2/3] x86/boot: Introduce the kernel_info.setup_type_max
- From: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
- [PATCH v5 0/3] x86/boot: Introduce the kernel_info et consortes
- From: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
- [PATCH v5 2/3] x86/boot: Introduce the kernel_info.setup_type_max
- From: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
- [PATCH v5 3/3] x86/boot: Introduce the setup_indirect
- From: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
- [PATCH v5 1/3] x86/boot: Introduce the kernel_info
- From: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
- [PATCH v3 4/9] build, kcsan: Add KCSAN build exceptions
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v3 9/9] x86, kcsan: Enable KCSAN for x86
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v3 8/9] locking/atomics, kcsan: Add KCSAN instrumentation
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v3 7/9] asm-generic, kcsan: Add KCSAN instrumentation for bitops
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v3 6/9] seqlock: Require WRITE_ONCE surrounding raw_seqcount_barrier
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v3 5/9] seqlock, kcsan: Add annotations for KCSAN
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v3 3/9] objtool, kcsan: Add KCSAN runtime functions to whitelist
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v3 2/9] kcsan: Add Documentation entry in dev-tools
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v3 1/9] kcsan: Add Kernel Concurrency Sanitizer infrastructure
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v3 0/9] Add Kernel Concurrency Sanitizer (KCSAN)
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: x86/boot: add ramoops.mem_size=1048576 boot parameter cause can't boot
- From: youling 257 <youling257@xxxxxxxxx>
- Re: x86/boot: add ramoops.mem_size=1048576 boot parameter cause can't boot
- From: youling 257 <youling257@xxxxxxxxx>
- Re: x86/boot: add ramoops.mem_size=1048576 boot parameter cause can't boot
- From: youling 257 <youling257@xxxxxxxxx>
- Re: [PATCH v4 2/3] x86/boot: Introduce the kernel_info.setup_type_max
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [GIT PULL] EFI fixes
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] EFI fixes
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH v10 5/9] ima: make process_buffer_measurement() generic
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 5/9] ima: make process_buffer_measurement() generic
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- RE: efistub: EFI_RNG_PROTOCOL on Dell Inc. Latitude 7390
- From: <Mario.Limonciello@xxxxxxxx>
- Re: [PATCH v2 3/6] efi/random: treat EFI_RNG_PROTOCOL output as bootloader randomness
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: efistub: EFI_RNG_PROTOCOL on Dell Inc. Latitude 7390
- From: <Mario.Limonciello@xxxxxxxx>
- [tip: efi/urgent] x86, efi: Never relocate kernel below lowest acceptable address
- From: "tip-bot2 for Kairui Song" <tip-bot2@xxxxxxxxxxxxx>
- [tip: efi/urgent] efi: libstub/arm: Account for firmware reserved memory at the base of RAM
- From: "tip-bot2 for Ard Biesheuvel" <tip-bot2@xxxxxxxxxxxxx>
- [tip: efi/urgent] efi/random: Treat EFI_RNG_PROTOCOL output as bootloader randomness
- From: "tip-bot2 for Dominik Brodowski" <tip-bot2@xxxxxxxxxxxxx>
- [tip: efi/urgent] efi/tpm: Return -EINVAL when determining tpm final events log size fails
- From: "tip-bot2 for Jerry Snitselaar" <tip-bot2@xxxxxxxxxxxxx>
- [tip: efi/urgent] efi/efi_test: Lock down /dev/efi_test and require CAP_SYS_ADMIN
- From: "tip-bot2 for Javier Martinez Canillas" <tip-bot2@xxxxxxxxxxxxx>
- [tip: efi/urgent] efi: Make CONFIG_EFI_RCI2_TABLE selectable on x86 only
- From: "tip-bot2 for Narendra K" <tip-bot2@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/6] efi/random: treat EFI_RNG_PROTOCOL output as bootloader randomness
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH v2 3/6] efi/random: treat EFI_RNG_PROTOCOL output as bootloader randomness
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v10 3/9] powerpc: detect the trusted boot state of the system
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v10 5/9] ima: make process_buffer_measurement() generic
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v10 8/9] powerpc/ima: update ima arch policy to check for blacklist
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v10 0/9] powerpc: Enabling IMA arch specific secure boot policies
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RFC PATCH v10 9/9] powerpc/ima: indicate kernel modules appended signatures are enforced
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v10 7/9] ima: check against blacklisted hashes for files with modsig
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v10 6/9] certs: add wrapper function to check blacklisted binary hash
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v10 4/9] powerpc/ima: define trusted boot policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v10 2/9] powerpc/ima: add support to initialize ima policy rules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v10 1/9] powerpc: detect the secure boot mode of the system
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v9 5/8] ima: make process_buffer_measurement() generic
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v9 5/8] ima: make process_buffer_measurement() generic
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [ARK INTERNAL PATCHv2 2/5] efi: Add an EFI_SECURE_BOOT flag to indicate secure boot mode
- From: Jeremy Cline <jcline@xxxxxxxxxx>
- Re: [PATCH v2 3/6] efi/random: treat EFI_RNG_PROTOCOL output as bootloader randomness
- From: Bhupesh Sharma <bhsharma@xxxxxxxxxx>
- [PATCH v2 6/6] efi/efi_test: lock down /dev/efi_test and require CAP_SYS_ADMIN
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 5/6] x86, efi: never relocate kernel below lowest acceptable address
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 3/6] efi/random: treat EFI_RNG_PROTOCOL output as bootloader randomness
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 4/6] efi: libstub/arm: account for firmware reserved memory at the base of RAM
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 2/6] efi/tpm: return -EINVAL when determining tpm final events log size fails
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 1/6] efi: Make CONFIG_EFI_RCI2_TABLE selectable on x86 only
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [GIT PULL v2 0/6] EFI fixes for v5.4
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v7 01/12] acpi/numa: Establish a new drivers/acpi/numa/ directory
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v9 2/8] powerpc/ima: add support to initialize ima policy rules
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v7 01/12] acpi/numa: Establish a new drivers/acpi/numa/ directory
- From: "Rafael J. Wysocki" <rjw@xxxxxxxxxxxxx>
- Re: [PATCH v9 0/8] powerpc: Enabling IMA arch specific secure boot policies
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: efistub: EFI_RNG_PROTOCOL on Dell Inc. Latitude 7390
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v9 2/8] powerpc/ima: add support to initialize ima policy rules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: efistub: EFI_RNG_PROTOCOL on Dell Inc. Latitude 7390
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- Re: efistub: EFI_RNG_PROTOCOL on Dell Inc. Latitude 7390
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: efistub: EFI_RNG_PROTOCOL on Dell Inc. Latitude 7390
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: efistub: EFI_RNG_PROTOCOL on Dell Inc. Latitude 7390
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- Re: efistub: EFI_RNG_PROTOCOL on Dell Inc. Latitude 7390
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- efistub: EFI_RNG_PROTOCOL on Dell Inc. Latitude 7390
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 5/8] ima: make process_buffer_measurement() generic
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v9 2/8] powerpc/ima: add support to initialize ima policy rules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v9 2/8] powerpc/ima: add support to initialize ima policy rules
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 7/8] ima: check against blacklisted hashes for files with modsig
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 5/8] ima: make process_buffer_measurement() generic
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 5/8] ima: make process_buffer_measurement() generic
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 2/8] powerpc/ima: add support to initialize ima policy rules
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 3/8] powerpc: detect the trusted boot state of the system
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 1/8] powerpc: detect the secure boot mode of the system
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/4] powerpc: load firmware trusted keys/hashes into kernel keyring
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/4] powerpc: expose secure variables to userspace via sysfs
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/4] powerpc/powernv: Add OPAL API interface to access secure variable
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 4/4] powerpc: load firmware trusted keys/hashes into kernel keyring
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v5 3/4] x86/efi: move common keyring handler functions to new file
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v5 2/4] powerpc: expose secure variables to userspace via sysfs
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v5 1/4] powerpc/powernv: Add OPAL API interface to access secure variable
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v5 0/4] powerpc: expose secure variables to the kernel and userspace
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- Re: [PATCH] Cleanup: replace prefered with preferred
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 7/8] ima: check against blacklisted hashes for files with modsig
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 4/8] powerpc/ima: define trusted boot policy
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 3/8] powerpc: detect the trusted boot state of the system
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 2/8] powerpc/ima: add support to initialize ima policy rules
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Cleanup: replace prefered with preferred
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 1/8] powerpc: detect the secure boot mode of the system
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/8] seqlock, kcsan: Add annotations for KCSAN
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [PATCH v2 4/8] seqlock, kcsan: Add annotations for KCSAN
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v9 5/8] ima: make process_buffer_measurement() generic
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/8] seqlock, kcsan: Add annotations for KCSAN
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [PATCH v2 4/8] seqlock, kcsan: Add annotations for KCSAN
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH] Cleanup: replace prefered with preferred
- From: Jani Nikula <jani.nikula@xxxxxxxxxxxxxxx>
- [PATCH v4 3/3] x86/boot: Introduce the setup_indirect
- From: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
- [PATCH v4 0/3] x86/boot: Introduce the kernel_info et consortes
- From: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
- [PATCH v4 1/3] x86/boot: Introduce the kernel_info
- From: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
- [PATCH v4 2/3] x86/boot: Introduce the kernel_info.setup_type_max
- From: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
- Re: [PATCH v2 1/8] kcsan: Add Kernel Concurrency Sanitizer infrastructure
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v9 8/8] powerpc/ima: update ima arch policy to check for blacklist
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v9 7/8] ima: check against blacklisted hashes for files with modsig
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v9 6/8] certs: add wrapper function to check blacklisted binary hash
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v9 5/8] ima: make process_buffer_measurement() generic
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v9 4/8] powerpc/ima: define trusted boot policy
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v9 3/8] powerpc: detect the trusted boot state of the system
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v9 2/8] powerpc/ima: add support to initialize ima policy rules
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v9 1/8] powerpc: detect the secure boot mode of the system
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v9 0/8] powerpc: Enabling IMA arch specific secure boot policies
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/3] x86/boot: Introduce the kernel_info et consortes
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- [PATCH 4/5] efi: libstub/arm: account for firmware reserved memory at the base of RAM
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 5/5] x86, efi: never relocate kernel below lowest acceptable address
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 3/5] efi/random: treat EFI_RNG_PROTOCOL output as bootloader randomness
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 1/5] efi: Make CONFIG_EFI_RCI2_TABLE selectable on x86 only
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 2/5] efi/tpm: return -EINVAL when determining tpm final events log size fails
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [GIT PULL 0/5] EFI fixes for v5.4
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 1/8] kcsan: Add Kernel Concurrency Sanitizer infrastructure
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH] Cleanup: replace prefered with preferred
- From: Mark Salyzyn <salyzyn@xxxxxxxxxxx>
- Re: [PATCH v2 1/8] kcsan: Add Kernel Concurrency Sanitizer infrastructure
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH v2 1/8] kcsan: Add Kernel Concurrency Sanitizer infrastructure
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH] Cleanup: replace prefered with preferred
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/8] kcsan: Add Kernel Concurrency Sanitizer infrastructure
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH v2 1/8] kcsan: Add Kernel Concurrency Sanitizer infrastructure
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH v2 1/8] kcsan: Add Kernel Concurrency Sanitizer infrastructure
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH] Cleanup: replace prefered with preferred
- From: Laurent Pinchart <laurent.pinchart@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/8] kcsan: Add Kernel Concurrency Sanitizer infrastructure
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH v2 1/8] kcsan: Add Kernel Concurrency Sanitizer infrastructure
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH v2 1/8] kcsan: Add Kernel Concurrency Sanitizer infrastructure
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH v2 1/8] kcsan: Add Kernel Concurrency Sanitizer infrastructure
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH v4] x86, efi: never relocate kernel below lowest acceptable address
- From: Kairui Song <kasong@xxxxxxxxxx>
- Re: [PATCH v8 3/8] powerpc: detect the trusted boot state of the system
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v8 1/8] powerpc: detect the secure boot mode of the system
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v2 7/8] locking/atomics, kcsan: Add KCSAN instrumentation
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [PATCH v2 1/8] kcsan: Add Kernel Concurrency Sanitizer infrastructure
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [PATCH v2 1/8] kcsan: Add Kernel Concurrency Sanitizer infrastructure
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [PATCH v7 01/12] acpi/numa: Establish a new drivers/acpi/numa/ directory
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v2 1/8] kcsan: Add Kernel Concurrency Sanitizer infrastructure
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH v2 1/8] kcsan: Add Kernel Concurrency Sanitizer infrastructure
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v2 8/8] x86, kcsan: Enable KCSAN for x86
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [PATCH v2 8/8] x86, kcsan: Enable KCSAN for x86
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v2 7/8] locking/atomics, kcsan: Add KCSAN instrumentation
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v4] x86, efi: never relocate kernel below lowest acceptable address
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v7 01/12] acpi/numa: Establish a new drivers/acpi/numa/ directory
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- Re: [PATCH v4] x86, efi: never relocate kernel below lowest acceptable address
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v4] x86, efi: never relocate kernel below lowest acceptable address
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 1/8] kcsan: Add Kernel Concurrency Sanitizer infrastructure
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [PATCH v2 2/8] objtool, kcsan: Add KCSAN runtime functions to whitelist
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [PATCH v2 2/8] objtool, kcsan: Add KCSAN runtime functions to whitelist
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH v2 1/8] kcsan: Add Kernel Concurrency Sanitizer infrastructure
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- Re: [PATCH v8 7/8] ima: check against blacklisted hashes for files with modsig
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- Re: [PATCH v8 7/8] ima: check against blacklisted hashes for files with modsig
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 3/8] powerpc: detect the trusted boot state of the system
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 5/8] ima: make process_buffer_measurement() generic
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 7/8] ima: check against blacklisted hashes for files with modsig
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 4/8] powerpc/ima: add measurement rules to ima arch specific policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 2/8] powerpc/ima: add support to initialize ima policy rules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 7/8] ima: check against blacklisted hashes for files with modsig
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 4/8] powerpc/ima: add measurement rules to ima arch specific policy
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v8 8/8] powerpc/ima: update ima arch policy to check for blacklist
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v8 7/8] ima: check against blacklisted hashes for files with modsig
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v8 6/8] certs: add wrapper function to check blacklisted binary hash
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v8 5/8] ima: make process_buffer_measurement() generic
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v8 4/8] powerpc/ima: add measurement rules to ima arch specific policy
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v8 3/8] powerpc: detect the trusted boot state of the system
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v8 1/8] powerpc: detect the secure boot mode of the system
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v8 2/8] powerpc/ima: add support to initialize ima policy rules
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v8 0/8] powerpc: Enabling IMA arch specific secure boot policies
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH AUTOSEL 5.3 48/89] efi/cper: Fix endianness of PCIe class code
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.3 49/89] efi/x86: Do not clean dummy variable in kexec path
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 075/100] efi/cper: Fix endianness of PCIe class code
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 076/100] efi/x86: Do not clean dummy variable in kexec path
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 38/56] efi/x86: Do not clean dummy variable in kexec path
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.9 17/29] efi/cper: Fix endianness of PCIe class code
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.4 12/21] efi/cper: Fix endianness of PCIe class code
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.4 13/21] efi/x86: Do not clean dummy variable in kexec path
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.9 18/29] efi/x86: Do not clean dummy variable in kexec path
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 37/56] efi/cper: Fix endianness of PCIe class code
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [tip: x86/asm] x86/asm: Make some functions local
- From: "tip-bot2 for Jiri Slaby" <tip-bot2@xxxxxxxxxxxxx>
- [tip: x86/asm] x86/asm/32: Change all ENTRY+ENDPROC to SYM_FUNC_*
- From: "tip-bot2 for Jiri Slaby" <tip-bot2@xxxxxxxxxxxxx>
- Re: [PATCH v7 01/12] acpi/numa: Establish a new drivers/acpi/numa/ directory
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- Re: [PATCH v9 24/28] x86_64/asm: Change all ENTRY+ENDPROC to SYM_FUNC_*
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 12/12] acpi/numa/hmat: Register "soft reserved" memory as an "hmem" device
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- Re: [PATCH v7 11/12] acpi/numa/hmat: Register HMAT at device_initcall level
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- Re: [PATCH 0/8] Add Kernel Concurrency Sanitizer (KCSAN)
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v2 6/8] asm-generic, kcsan: Add KCSAN instrumentation for bitops
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v2 5/8] seqlock: Require WRITE_ONCE surrounding raw_seqcount_barrier
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v2 8/8] x86, kcsan: Enable KCSAN for x86
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v2 7/8] locking/atomics, kcsan: Add KCSAN instrumentation
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v2 4/8] seqlock, kcsan: Add annotations for KCSAN
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v2 3/8] build, kcsan: Add KCSAN build exceptions
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v2 2/8] objtool, kcsan: Add KCSAN runtime functions to whitelist
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v2 1/8] kcsan: Add Kernel Concurrency Sanitizer infrastructure
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v2 0/8] Add Kernel Concurrency Sanitizer (KCSAN)
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [PATCH v7 2/8] powerpc: add support to initialize ima policy rules
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v4] x86, efi: never relocate kernel below lowest acceptable address
- From: Kairui Song <kasong@xxxxxxxxxx>
- Re: [PATCH 1/8] kcsan: Add Kernel Concurrency Sanitizer infrastructure
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [PATCH 1/8] kcsan: Add Kernel Concurrency Sanitizer infrastructure
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 1/8] kcsan: Add Kernel Concurrency Sanitizer infrastructure
- From: Boqun Feng <boqun.feng@xxxxxxxxx>
- Re: [PATCH v3] x86, efi: never relocate kernel below lowest acceptable address
- From: Joe Perches <joe@xxxxxxxxxxx>
- [PATCH 4.9 76/92] efivar/ssdt: Dont iterate over EFI vars if no SSDT override was specified
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.14 43/65] efivar/ssdt: Dont iterate over EFI vars if no SSDT override was specified
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.19 49/81] efivar/ssdt: Dont iterate over EFI vars if no SSDT override was specified
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.3 063/112] efi/tpm: Dont access event->count when it isnt mapped
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.3 064/112] efi/tpm: Dont traverse an event log with no events
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.3 065/112] efi/tpm: Only set efi_tpm_final_log_size after successful event log parsing
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.3 111/112] efi/tpm: Fix sanity check of unsigned tbl_size being less than zero
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.3 062/112] efivar/ssdt: Dont iterate over EFI vars if no SSDT override was specified
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/8] kcsan: Add Kernel Concurrency Sanitizer infrastructure
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [PATCH 1/8] kcsan: Add Kernel Concurrency Sanitizer infrastructure
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3] x86, efi: never relocate kernel below lowest acceptable address
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH 8/8] x86, kcsan: Enable KCSAN for x86
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [PATCH v3] x86, efi: never relocate kernel below lowest acceptable address
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 8/8] x86, kcsan: Enable KCSAN for x86
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 1/8] kcsan: Add Kernel Concurrency Sanitizer infrastructure
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [PATCH v3] x86, efi: never relocate kernel below lowest acceptable address
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v7 00/12] EFI Specific Purpose Memory Support
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v3] x86, efi: never relocate kernel below lowest acceptable address
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH v3] x86, efi: never relocate kernel below lowest acceptable address
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/8] kcsan: Add Kernel Concurrency Sanitizer infrastructure
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH 1/8] kcsan: Add Kernel Concurrency Sanitizer infrastructure
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [PATCH v7 0/8] efi/firmware/platform-x86: Add EFI embedded fw support
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH 1/8] kcsan: Add Kernel Concurrency Sanitizer infrastructure
- From: Andrey Konovalov <andreyknvl@xxxxxxxxxx>
- Re: [PATCH 7/8] locking/atomics, kcsan: Add KCSAN instrumentation
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [PATCH 7/8] locking/atomics, kcsan: Add KCSAN instrumentation
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v3 0/3] x86/boot: Introduce the kernel_info et consortes
- From: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
- Re: [PATCH] efi/tpm: return -EINVAL when determining tpm final events log size fails
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/8] kcsan: Add Kernel Concurrency Sanitizer infrastructure
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [PATCH 1/8] kcsan: Add Kernel Concurrency Sanitizer infrastructure
- From: Boqun Feng <boqun.feng@xxxxxxxxx>
- [PATCH 3/8] build, kcsan: Add KCSAN build exceptions
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH 7/8] locking/atomics, kcsan: Add KCSAN instrumentation
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH 8/8] x86, kcsan: Enable KCSAN for x86
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH 6/8] asm-generic, kcsan: Add KCSAN instrumentation for bitops
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH 5/8] seqlock: Require WRITE_ONCE surrounding raw_seqcount_barrier
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH 4/8] seqlock, kcsan: Add annotations for KCSAN
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH 2/8] objtool, kcsan: Add KCSAN runtime functions to whitelist
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH 1/8] kcsan: Add Kernel Concurrency Sanitizer infrastructure
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH 0/8] Add Kernel Concurrency Sanitizer (KCSAN)
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [PATCH v9 24/28] x86_64/asm: Change all ENTRY+ENDPROC to SYM_FUNC_*
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v7 00/12] EFI Specific Purpose Memory Support
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v7 12/12] acpi/numa/hmat: Register "soft reserved" memory as an "hmem" device
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v7 11/12] acpi/numa/hmat: Register HMAT at device_initcall level
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v7 10/12] device-dax: Add a driver for "hmem" devices
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v7 09/12] dax: Fix alloc_dax_region() compile warning
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v7 08/12] lib: Uplevel the pmem "region" ida to a global allocator
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v7 07/12] x86/efi: Add efi_fake_mem support for EFI_MEMORY_SP
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v7 06/12] arm/efi: EFI soft reservation to memblock
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v7 05/12] x86/efi: EFI soft reservation to E820 enumeration
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v7 04/12] efi: Common enable/disable infrastructure for EFI soft reservation
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v7 03/12] x86/efi: Push EFI_MEMMAP check into leaf routines
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v7 02/12] efi: Enumerate EFI_MEMORY_SP
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v7 01/12] acpi/numa: Establish a new drivers/acpi/numa/ directory
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v7 00/12] EFI Specific Purpose Memory Support
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v7 1/8] powerpc: detect the secure boot mode of the system
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v7 2/8] powerpc: add support to initialize ima policy rules
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v7 4/8] powerpc/ima: add measurement rules to ima arch specific policy
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v7 3/8] powerpc: detect the trusted boot state of the system
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v7 2/8] powerpc: add support to initialize ima policy rules
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v4 2/4] powerpc: expose secure variables to userspace via sysfs
- From: "Oliver O'Halloran" <oohall@xxxxxxxxx>
- Re: [PATCH v4 1/4] powerpc/powernv: Add OPAL API interface to access secure variable
- From: "Oliver O'Halloran" <oohall@xxxxxxxxx>
- RE: [PATCH] efi: libstub/arm: account for firmware reserved memory at the base of RAM
- From: Guillaume Gardet <Guillaume.Gardet@xxxxxxx>
- Re: [PATCH v3] x86, efi: never relocate kernel below lowest acceptable address
- From: Kairui Song <kasong@xxxxxxxxxx>
- Re: [PATCH] efi: libstub/arm: account for firmware reserved memory at the base of RAM
- From: Chester Lin <clin@xxxxxxxx>
- Re: [PATCH v3] x86, efi: never relocate kernel below lowest acceptable address
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3] x86, efi: never relocate kernel below lowest acceptable address
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH] efi/tpm: return -EINVAL when determining tpm final events log size fails
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- [PATCH] efi: libstub/arm: account for firmware reserved memory at the base of RAM
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v7 0/8] efi/firmware/platform-x86: Add EFI embedded fw support
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 0/8] efi/firmware/platform-x86: Add EFI embedded fw support
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH v3] x86, efi: never relocate kernel below lowest acceptable address
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1] Ask user input only when CONFIG_X86 or CONFIG_COMPILE_TEST is set to y
- From: <Narendra.K@xxxxxxxx>
- Re: [PATCH v7 0/8] efi/firmware/platform-x86: Add EFI embedded fw support
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 0/8] efi/firmware/platform-x86: Add EFI embedded fw support
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH v7 1/8] efi: Export boot-services code and data as debugfs-blobs
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH v1] Ask user input only when CONFIG_X86 or CONFIG_COMPILE_TEST is set to y
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v1] Ask user input only when CONFIG_X86 or CONFIG_COMPILE_TEST is set to y
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH v1] Ask user input only when CONFIG_X86 or CONFIG_COMPILE_TEST is set to y
- From: <Narendra.K@xxxxxxxx>
- Re: [PATCH] Ask user input only when CONFIG_X86 or CONFIG_COMPILE_TEST is set to y
- From: <Narendra.K@xxxxxxxx>
- [PATCH v1] Ask user input only when CONFIG_X86 or CONFIG_COMPILE_TEST is set to y
- From: <Narendra.K@xxxxxxxx>
- Re: [GIT PULL] EFI fixes
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH] Ask user input only when CONFIG_X86 or CONFIG_COMPILE_TEST is set to y
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [GIT PULL] EFI fixes
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH v2] x86, efi: never relocate kernel below lowest acceptable address
- From: Kairui Song <kasong@xxxxxxxxxx>
- [PATCH v3] x86, efi: never relocate kernel below lowest acceptable address
- From: Kairui Song <kasong@xxxxxxxxxx>
- Re: [PATCH v3 1/3] x86/boot: Introduce the kernel_info
- From: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx>
- Re: [PATCH v7 0/8] efi/firmware/platform-x86: Add EFI embedded fw support
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 0/8] efi/firmware/platform-x86: Add EFI embedded fw support
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH v7 4/8] firmware: Add new platform fallback mechanism and firmware_request_platform()
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH v7 4/8] firmware: Add new platform fallback mechanism and firmware_request_platform()
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH v7 3/8] firmware: Rename FW_OPT_NOFALLBACK to FW_OPT_NOFALLBACK_SYSFS
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH v7 2/8] efi: Add embedded peripheral firmware support
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH v6 05/12] x86/efi: EFI soft reservation to E820 enumeration
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v6 05/12] x86/efi: EFI soft reservation to E820 enumeration
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v7 0/8] efi/firmware/platform-x86: Add EFI embedded fw support
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v7 0/8] efi/firmware/platform-x86: Add EFI embedded fw support
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH v2] x86, efi: never relocate kernel below lowest acceptable address
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v7 7/8] ima: check against blacklisted hashes for files with modsig
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 8/8] powerpc/ima: update ima arch policy to check for blacklist
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 6/8] certs: add wrapper function to check blacklisted binary hash
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 5/8] ima: make process_buffer_measurement() generic
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 2/8] powerpc: add support to initialize ima policy rules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] Ask user input only when CONFIG_X86 or CONFIG_COMPILE_TEST is set to y
- From: <Narendra.K@xxxxxxxx>
- [PATCH v9 20/28] x86/asm: Make some functions local
- From: Jiri Slaby <jslaby@xxxxxxx>
- [PATCH v9 24/28] x86_64/asm: Change all ENTRY+ENDPROC to SYM_FUNC_*
- From: Jiri Slaby <jslaby@xxxxxxx>
- [PATCH v9 27/28] x86_32/asm: Change all ENTRY+ENDPROC to SYM_FUNC_*
- From: Jiri Slaby <jslaby@xxxxxxx>
- Re: [PATCH v2] x86, efi: never relocate kernel below lowest acceptable address
- From: Kairui Song <kasong@xxxxxxxxxx>
- Re: [PATCH] Ask user input only when CONFIG_X86 or CONFIG_COMPILE_TEST is set to y
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH] Ask user input only when CONFIG_X86 or CONFIG_COMPILE_TEST is set to y
- From: <Narendra.K@xxxxxxxx>
- Re: [PATCH v6 05/12] x86/efi: EFI soft reservation to E820 enumeration
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v6 05/12] x86/efi: EFI soft reservation to E820 enumeration
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v7 6/8] Input: icn8505 - Switch to firmware_request_platform for retreiving the fw
- From: Dmitry Torokhov <dmitry.torokhov@xxxxxxxxx>
- Re: [PATCH v7 5/8] Input: silead - Switch to firmware_request_platform for retreiving the fw
- From: Dmitry Torokhov <dmitry.torokhov@xxxxxxxxx>
- Re: [PATCH] Ask user input only when CONFIG_X86 or CONFIG_COMPILE_TEST is set to y
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH v6 05/12] x86/efi: EFI soft reservation to E820 enumeration
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v6 05/12] x86/efi: EFI soft reservation to E820 enumeration
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH] Ask user input only when CONFIG_X86 or CONFIG_COMPILE_TEST is set to y
- From: <Narendra.K@xxxxxxxx>
- Re: [PATCH v3 1/3] x86/boot: Introduce the kernel_info
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/3] x86/boot: Introduce the kernel_info
- From: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
- Re: [PATCH v6 07/12] x86/efi: Add efi_fake_mem support for EFI_MEMORY_SP
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v6 06/12] arm/efi: EFI soft reservation to memblock
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v6 05/12] x86/efi: EFI soft reservation to E820 enumeration
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v6 04/12] efi: Common enable/disable infrastructure for EFI soft reservation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v3 1/3] x86/boot: Introduce the kernel_info
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH v6 12/12] acpi/numa/hmat: Register "soft reserved" memory as an "hmem" device
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v6 03/12] x86/efi: Push EFI_MEMMAP check into leaf routines
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v6 11/12] acpi/numa/hmat: Register HMAT at device_initcall level
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v6 10/12] device-dax: Add a driver for "hmem" devices
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v6 09/12] dax: Fix alloc_dax_region() compile warning
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v6 08/12] lib: Uplevel the pmem "region" ida to a global allocator
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v6 07/12] x86/efi: Add efi_fake_mem support for EFI_MEMORY_SP
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v6 06/12] arm/efi: EFI soft reservation to memblock
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v6 04/12] efi: Common enable/disable infrastructure for EFI soft reservation
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v6 05/12] x86/efi: EFI soft reservation to E820 enumeration
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v6 02/12] efi: Enumerate EFI_MEMORY_SP
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v6 01/12] acpi/numa: Establish a new drivers/acpi/numa/ directory
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v6 00/12] EFI Specific Purpose Memory Support
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH] Ask user input only when CONFIG_X86 or CONFIG_COMPILE_TEST is set to y
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v7 1/8] efi: Export boot-services code and data as debugfs-blobs
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v7 1/8] efi: Export boot-services code and data as debugfs-blobs
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v7 1/8] efi: Export boot-services code and data as debugfs-blobs
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v7 1/8] efi: Export boot-services code and data as debugfs-blobs
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [RFC PATCH] arch/x86: efistub: Invoke EFI_RNG_PROTOCOL to seed the UEFI RNG table
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v7 1/8] efi: Export boot-services code and data as debugfs-blobs
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2] efi/efi_test: lock down /dev/efi_test and require CAP_SYS_ADMIN
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 0/3] x86/boot: Introduce the kernel_info et consortes
- From: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
- [PATCH v3 3/3] x86/boot: Introduce the setup_indirect
- From: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
- [PATCH v3 1/3] x86/boot: Introduce the kernel_info
- From: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
- [PATCH v3 2/3] x86/boot: Introduce the kernel_info.setup_type_max
- From: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
- Re: [PATCH v2] efi/efi_test: lock down /dev/efi_test and require CAP_SYS_ADMIN
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v2] efi/efi_test: lock down /dev/efi_test and require CAP_SYS_ADMIN
- From: Laszlo Ersek <lersek@xxxxxxxxxx>
- Re: [PATCH][next] efi/tpm: fix sanity check of unsigned tbl_size being less than zero
- From: Colin Ian King <colin.king@xxxxxxxxxxxxx>
- Re: [PATCH][next] efi/tpm: fix sanity check of unsigned tbl_size being less than zero
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH][next] efi/tpm: fix sanity check of unsigned tbl_size being less than zero
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v6 3/9] powerpc: add support to initialize ima policy rules
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH][next] efi/tpm: fix sanity check of unsigned tbl_size being less than zero
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- [tip: efi/urgent] efi/tpm: Fix sanity check of unsigned tbl_size being less than zero
- From: "tip-bot2 for Colin Ian King" <tip-bot2@xxxxxxxxxxxxx>
- Re: [PATCH v7 0/8] efi/firmware/platform-x86: Add EFI embedded fw support
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- [PATCH v2] efi/efi_test: lock down /dev/efi_test and require CAP_SYS_ADMIN
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- [PATCH][next] efi/tpm: fix sanity check of unsigned tbl_size being less than zero
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- Re: [PATCH v7 0/8] efi/firmware/platform-x86: Add EFI embedded fw support
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v7 8/8] powerpc/ima: update ima arch policy to check for blacklist
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v7 7/8] ima: check against blacklisted hashes for files with modsig
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v7 6/8] certs: add wrapper function to check blacklisted binary hash
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v7 5/8] ima: make process_buffer_measurement() generic
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v7 4/8] powerpc/ima: add measurement rules to ima arch specific policy
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v7 3/8] powerpc: detect the trusted boot state of the system
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v7 2/8] powerpc: add support to initialize ima policy rules
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v7 1/8] powerpc: detect the secure boot mode of the system
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v7 0/8] powerpc: Enabling IMA arch specific secure boot policies
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [tip: efi/urgent] efi/cper: Fix endianness of PCIe class code
- From: "tip-bot2 for Lukas Wunner" <tip-bot2@xxxxxxxxxxxxx>
- [tip: efi/urgent] efi: Make unexported efi_rci2_sysfs_init() static
- From: "tip-bot2 for Ben Dooks" <tip-bot2@xxxxxxxxxxxxx>
- [tip: efi/urgent] efivar/ssdt: Don't iterate over EFI vars if no SSDT override was specified
- From: "tip-bot2 for Ard Biesheuvel" <tip-bot2@xxxxxxxxxxxxx>
- [tip: efi/urgent] efi/tpm: Only set 'efi_tpm_final_log_size' after successful event log parsing
- From: "tip-bot2 for Jerry Snitselaar" <tip-bot2@xxxxxxxxxxxxx>
- [tip: efi/urgent] efi/x86: Do not clean dummy variable in kexec path
- From: "tip-bot2 for Dave Young" <tip-bot2@xxxxxxxxxxxxx>
- [tip: efi/urgent] efi/tpm: Don't access event->count when it isn't mapped
- From: "tip-bot2 for Peter Jones" <tip-bot2@xxxxxxxxxxxxx>
- [tip: efi/urgent] efi/tpm: Don't traverse an event log with no events
- From: "tip-bot2 for Peter Jones" <tip-bot2@xxxxxxxxxxxxx>
- Re: [PATCH v7 0/8] efi/firmware/platform-x86: Add EFI embedded fw support
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- [RFC PATCH] arch/x86: efistub: Invoke EFI_RNG_PROTOCOL to seed the UEFI RNG table
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 4/8] firmware: Add new platform fallback mechanism and firmware_request_platform()
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v7 7/8] platform/x86: touchscreen_dmi: Add EFI embedded firmware info support
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v7 7/8] platform/x86: touchscreen_dmi: Add EFI embedded firmware info support
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v7 4/8] firmware: Add new platform fallback mechanism and firmware_request_platform()
- From: Dmitry Torokhov <dmitry.torokhov@xxxxxxxxx>
- Re: [PATCH v7 4/8] firmware: Add new platform fallback mechanism and firmware_request_platform()
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v7 4/8] firmware: Add new platform fallback mechanism and firmware_request_platform()
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH v7 8/8] platform/x86: touchscreen_dmi: Add info for the Chuwi Vi8 Plus tablet
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v7 7/8] platform/x86: touchscreen_dmi: Add EFI embedded firmware info support
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v7 6/8] Input: icn8505 - Switch to firmware_request_platform for retreiving the fw
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v7 5/8] Input: silead - Switch to firmware_request_platform for retreiving the fw
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v7 4/8] firmware: Add new platform fallback mechanism and firmware_request_platform()
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v7 3/8] firmware: Rename FW_OPT_NOFALLBACK to FW_OPT_NOFALLBACK_SYSFS
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v7 2/8] efi: Add embedded peripheral firmware support
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v7 1/8] efi: Export boot-services code and data as debugfs-blobs
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v7 0/8] efi/firmware/platform-x86: Add EFI embedded fw support
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v5 00/10] EFI Specific Purpose Memory Support
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH] efi/efi_test: require CAP_SYS_ADMIN to open the chardev
- From: Laszlo Ersek <lersek@xxxxxxxxxx>
- [PATCH] efi/efi_test: require CAP_SYS_ADMIN to open the chardev
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH v6 6/9] ima: make process_buffer_measurement() non static
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 3/9] powerpc: add support to initialize ima policy rules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 8/9] ima: deprecate permit_directio, instead use appraise_flag
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 7/9] ima: check against blacklisted hashes for files with modsig
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 4/5] efi: Export Runtime Configuration Interface table to sysfs
- From: <Narendra.K@xxxxxxxx>
- [PATCH] Ask user input only when CONFIG_X86 or CONFIG_COMPILE_TEST is set to y
- From: <Narendra.K@xxxxxxxx>
- [PATCH 3/7] efi/tpm: Don't access event->count when it isn't mapped.
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 5/7] efi/tpm: only set efi_tpm_final_log_size after successful event log parsing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 4/7] efi/tpm: don't traverse an event log with no events
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 2/7] efivar/ssdt: don't iterate over EFI vars if no SSDT override was specified
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 1/7] efi: cper: Fix endianness of PCIe class code
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 6/7] efi: make unexported efi_rci2_sysfs_init static
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 7/7] efi/x86: do not clean dummy variable in kexec path
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [GIT PULL 0/7] EFI fixes for v5.4
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 4/5] efi: Export Runtime Configuration Interface table to sysfs
- From: <Narendra.K@xxxxxxxx>
- Re: 5.3.1: x86: efi stub seems to fail to load initrd file
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v6 3/9] powerpc: add support to initialize ima policy rules
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v4 4/4] powerpc: load firmware trusted keys/hashes into kernel keyring
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v4 2/4] powerpc: expose secure variables to userspace via sysfs
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v4 3/4] x86/efi: move common keyring handler functions to new file
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v4 1/4] powerpc/powernv: Add OPAL API interface to access secure variable
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v4 0/4] powerpc: expose secure variables to the kernel and userspace
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH] sysfs: Fixes __BIN_ATTR_WO() macro
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- 5.3.1: x86: efi stub seems to fail to load initrd file
- From: Thomas Meyer <thomas@xxxxxxxx>
- Re: [PATCH] sysfs: add BIN_ATTR_WO() macro
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/5] efi: Export Runtime Configuration Interface table to sysfs
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH] sysfs: add BIN_ATTR_WO() macro
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] sysfs: add BIN_ATTR_WO() macro
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/5] efi: Export Runtime Configuration Interface table to sysfs
- From: <Narendra.K@xxxxxxxx>
- Re: [PATCH v6 1/9] dt-bindings: ibm,secureboot: secure boot specific properties for PowerNV
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 3/9] powerpc: add support to initialize ima policy rules
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 1/9] dt-bindings: ibm,secureboot: secure boot specific properties for PowerNV
- From: Rob Herring <robh@xxxxxxxxxx>
- RE: [PATCH 4/5] efi: Export Runtime Configuration Interface table to sysfs
- From: <Mario.Limonciello@xxxxxxxx>
- Re: [PATCH 4/5] efi: Export Runtime Configuration Interface table to sysfs
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 4/5] efi: Export Runtime Configuration Interface table to sysfs
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH 4/5] efi: Export Runtime Configuration Interface table to sysfs
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[Index of Archives]
[Linux Kernel Development]
[Security]
[Linux ARM Kernel]
[Tools]
[Linux MIPS]
[Linux S390]
[Bugtraq]
[Share Photos]>
[Fedora ARM]