Linux EFI/UEFI Development
[Prev Page][Next Page]
- Re: [PATCH v2 1/4] powerpc/powernv: Add OPAL API interface to access secure variable
- From: "Oliver O'Halloran" <oohall@xxxxxxxxx>
- Re: [PATCH v2 2/4] powerpc: expose secure variables to userspace via sysfs
- From: "Oliver O'Halloran" <oohall@xxxxxxxxx>
- Re: [PATCH v2 1/4] powerpc/powernv: Add OPAL API interface to access secure variable
- From: "Oliver O'Halloran" <oohall@xxxxxxxxx>
- Re: [PATCH v2 4/4] powerpc: load firmware trusted keys into kernel keyring
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] x86/efi: move common keyring handler functions to new file
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/4] powerpc: expose secure variables to userspace via sysfs
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 4/4] powerpc: load firmware trusted keys into kernel keyring
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v2 2/4] powerpc: expose secure variables to userspace via sysfs
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v2 3/4] x86/efi: move common keyring handler functions to new file
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v2 0/4] powerpc: expose secure variables to the kernel and userspace
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v2 1/4] powerpc/powernv: Add OPAL API interface to access secure variable
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- Re: [PATCH] efi/arm: fix allocation failure when reserving the kernel base
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi/arm: fix allocation failure when reserving the kernel base
- From: Mike Rapoport <rppt@xxxxxxxxxxxxx>
- Re: [PATCH] efi/arm: fix allocation failure when reserving the kernel base
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi/arm: fix allocation failure when reserving the kernel base
- From: Chester Lin <clin@xxxxxxxx>
- Re: [PATCH] efi/arm: fix allocation failure when reserving the kernel base
- From: Mike Rapoport <rppt@xxxxxxxxxxxxx>
- Re: [PATCH] efi/arm: fix allocation failure when reserving the kernel base
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi/arm: fix allocation failure when reserving the kernel base
- From: Chester Lin <clin@xxxxxxxx>
- [PATCH 0/6 V2] CCIX Protocol error reporting.
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH 6/6 V2] efi / ras: CCIX Agent internal error reporting
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH 5/6 V2] efi / ras: CCIX Link error reporting
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH 4/6 V2] efi / ras: CCIX Port error reporting
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH 3/6 V2] efi / ras: CCIX Address Translation Cache error reporting
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH 2/6 V2] efi / ras: CCIX Cache error reporting
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH 1/6 V2] efi / ras: CCIX Memory error reporting
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH] efi/arm: fix allocation failure when reserving the kernel base
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi/arm: fix allocation failure when reserving the kernel base
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi/arm: fix allocation failure when reserving the kernel base
- From: Russell King - ARM Linux admin <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH] efi/arm: fix allocation failure when reserving the kernel base
- From: Russell King - ARM Linux admin <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH] efi/arm: fix allocation failure when reserving the kernel base
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi/arm: fix allocation failure when reserving the kernel base
- From: Chester Lin <clin@xxxxxxxx>
- Re: [PATCH] efi/arm: fix allocation failure when reserving the kernel base
- From: Mike Rapoport <rppt@xxxxxxxxxxxxx>
- Re: [PATCH] efi/arm: fix allocation failure when reserving the kernel base
- From: Chester Lin <clin@xxxxxxxx>
- [PATCH V40 28/29] efi: Restrict efivar_ssdt_load when the kernel is locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: [PATCH] efi/arm: fix allocation failure when reserving the kernel base
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi/arm: fix allocation failure when reserving the kernel base
- From: Chester Lin <clin@xxxxxxxx>
- [PATCH 2/2] efi: Disable runtime services on RT
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- [PATCH 1/2] efi: Allow efi=runtime
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- [PATCH 0/2] efi: Allow to auto-disable it on RT
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Early EFI-related boot freeze in parse_setup_data()
- From: Daniel Drake <drake@xxxxxxxxxxxx>
- Re: [PATCH] efi/arm: fix allocation failure when reserving the kernel base
- From: Mike Rapoport <rppt@xxxxxxxxxxxxx>
- Re: arm64/efistub boot error with CONFIG_GCC_PLUGIN_STACKLEAK
- From: skodde <skodde@xxxxxxxxx>
- Re: [PATCH] efi/arm: fix allocation failure when reserving the kernel base
- From: Chester Lin <clin@xxxxxxxx>
- Re: [PATCH] efi/arm: fix allocation failure when reserving the kernel base
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: arm64/efistub boot error with CONFIG_GCC_PLUGIN_STACKLEAK
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: arm64/efistub boot error with CONFIG_GCC_PLUGIN_STACKLEAK
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: arm64/efistub boot error with CONFIG_GCC_PLUGIN_STACKLEAK
- From: Mark Rutland <mark.rutland@xxxxxxx>
- arm64/efistub boot error with CONFIG_GCC_PLUGIN_STACKLEAK
- From: skodde <skodde@xxxxxxxxx>
- Re: [PATCH] efi/arm: fix allocation failure when reserving the kernel base
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: [PATCH] efi/arm: fix allocation failure when reserving the kernel base
- From: Guillaume Gardet <Guillaume.Gardet@xxxxxxx>
- [PATCH 1/5] efi: x86: move efi_is_table_address() into arch/x86
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 2/5] efi/x86: move UV_SYSTAB handling into arch/x86
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 5/5] efi: cper: print AER info of PCIe fatal error
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 4/5] efi: Export Runtime Configuration Interface table to sysfs
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 3/5] efi: ia64: move SAL systab handling out of generic EFI code
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [GIT PULL 0/5] EFI updates for v5.4
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 1/1] efi-stub: Fix get_efi_config_table on mixed-mode setups
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [GIT PULL 0/1] EFI fix for v5.3-rc4
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 1/1] efi: cper: print AER info of PCIe fatal error
- From: tanxiaofei <tanxiaofei@xxxxxxxxxx>
- Re: [PATCH v1] Export Runtime Configuration Interface table to sysfs
- From: <Narendra.K@xxxxxxxx>
- Re: [PATCH 5.3 regression fix] efi-stub: Fix get_efi_config_table on mixed-mode setups
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v8 20/28] x86/asm: make some functions local
- From: Jiri Slaby <jslaby@xxxxxxx>
- [PATCH v8 27/28] x86_32/asm: change all ENTRY+ENDPROC to SYM_FUNC_*
- From: Jiri Slaby <jslaby@xxxxxxx>
- [PATCH v8 24/28] x86_64/asm: change all ENTRY+ENDPROC to SYM_FUNC_*
- From: Jiri Slaby <jslaby@xxxxxxx>
- Re: [PATCH v1] Export Runtime Configuration Interface table to sysfs
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] do not clean dummy variable in kexec path
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH 5.3 regression fix] efi-stub: Fix get_efi_config_table on mixed-mode setups
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH V38 28/29] efi: Restrict efivar_ssdt_load when the kernel is locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: [PATCH 5.3 regression fix] efi-stub: Fix get_efi_config_table on mixed-mode setups
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- [PATCH 5.3 regression fix] efi-stub: Fix get_efi_config_table on mixed-mode setups
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: 5.3 boot regression caused by 5.3 TPM changes
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: 5.3 boot regression caused by 5.3 TPM changes
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: 5.3 boot regression caused by 5.3 TPM changes
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: 5.3 boot regression caused by 5.3 TPM changes
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v1] Export Runtime Configuration Interface table to sysfs
- From: <Narendra.K@xxxxxxxx>
- [PATCH AUTOSEL 5.2 36/59] arm64/efi: fix variable 'si' set but not used
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 20/32] arm64/efi: fix variable 'si' set but not used
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.9 11/17] arm64/efi: fix variable 'si' set but not used
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 16/25] arm64/efi: fix variable 'si' set but not used
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: 5.3 boot regression caused by 5.3 TPM changes
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [RFC PATCH 0/6] CCIX Protocol Error reporting
- From: Jonathan Cameron <jonathan.cameron@xxxxxxxxxx>
- Re: [PATCH] do not clean dummy variable in kexec path
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH] do not clean dummy variable in kexec path
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH] do not clean dummy variable in kexec path
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: 5.3 boot regression caused by 5.3 TPM changes
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] do not clean dummy variable in kexec path
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] arm64/efi: fix variable 'si' set but not used
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH] do not clean dummy variable in kexec path
- From: Dave Young <dyoung@xxxxxxxxxx>
- [PATCH 2/2] ia64: Replace strncmp with str_has_prefix
- From: Chuhong Yuan <hslester96@xxxxxxxxx>
- Re: 5.3 boot regression caused by 5.3 TPM changes
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: 5.3 boot regression caused by 5.3 TPM changes
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- 5.3 boot regression caused by 5.3 TPM changes
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH] efi/arm: fix allocation failure when reserving the kernel base
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: Building arm64 EFI stub with -fpie breaks build of 4.9.x (undefined reference to `__efistub__GLOBAL_OFFSET_TABLE_')
- From: Rolf Eike Beer <eb@xxxxxxxxx>
- Re: Building arm64 EFI stub with -fpie breaks build of 4.9.x (undefined reference to `__efistub__GLOBAL_OFFSET_TABLE_')
- From: Nathan Chancellor <natechancellor@xxxxxxxxx>
- Re: Building arm64 EFI stub with -fpie breaks build of 4.9.x (undefined reference to `__efistub__GLOBAL_OFFSET_TABLE_')
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH] efi/arm: fix allocation failure when reserving the kernel base
- From: Chester Lin <clin@xxxxxxxx>
- [PATCH V37 28/29] efi: Restrict efivar_ssdt_load when the kernel is locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: [PATCH] arm64/efi: fix variable 'si' set but not used
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH] arm64/efi: fix variable 'si' set but not used
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH] arm64/efi: fix variable 'si' set but not used
- From: Qian Cai <cai@xxxxxx>
- [PATCH v2 1/1] efi: cper: print AER info of PCIe fatal error
- From: Xiaofei Tan <tanxiaofei@xxxxxxxxxx>
- Re: [PATCH 1/1] efi: cper: print AER info of PCIe fatal error
- From: tanxiaofei <tanxiaofei@xxxxxxxxxx>
- Re: [PATCH 1/1] efi: cper: print AER info of PCIe fatal error
- From: James Morse <james.morse@xxxxxxx>
- Re: [PATCH 2/2] powerpc: expose secure variables via sysfs
- From: "Oliver O'Halloran" <oohall@xxxxxxxxx>
- Re: Why does memblock only refer to E820 table and not EFI Memory Map?
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- Re: Why does memblock only refer to E820 table and not EFI Memory Map?
- From: Ricardo Neri <ricardo.neri-calderon@xxxxxxxxxxxxxxx>
- RE: Why does memblock only refer to E820 table and not EFI Memory Map?
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH 2/2] powerpc: expose secure variables via sysfs
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: Why does memblock only refer to E820 table and not EFI Memory Map?
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH 2/2] powerpc: expose secure variables via sysfs
- From: "Oliver O'Halloran" <oohall@xxxxxxxxx>
- [PATCH] x86/sysfb_efi: Add quirks for some devices with swapped width and height
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Why does memblock only refer to E820 table and not EFI Memory Map?
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V36 28/29] efi: Restrict efivar_ssdt_load when the kernel is locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH] x86/efi: Remove unused variables
- From: Zhenzhong Duan <zhenzhong.duan@xxxxxxxxxx>
- [PATCH V35 28/29] efi: Restrict efivar_ssdt_load when the kernel is locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH 1/1] efi: cper: print AER info of PCIe fatal error
- From: Xiaofei Tan <tanxiaofei@xxxxxxxxxx>
- RE: [PATCH v1] Export Runtime Configuration Interface table to sysfs
- From: <Mario.Limonciello@xxxxxxxx>
- [PATCH v1] Export Runtime Configuration Interface table to sysfs
- From: <Narendra.K@xxxxxxxx>
- Re: [PATCH v0] Export Runtime Configuration Interface table to sysfs
- From: <Narendra.K@xxxxxxxx>
- Re: [PATCH 2/2] powerpc: expose secure variables via sysfs
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- [PATCH 1/3] ARM: fix kasan link failures
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 2/4] efi/libstub: detect panel-id
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 2/4] efi/libstub: detect panel-id
- From: Rob Clark <robdclark@xxxxxxxxx>
- Re: [PATCH 2/4] efi/libstub: detect panel-id
- From: Leif Lindholm <leif.lindholm@xxxxxxxxxx>
- Re: [RFC PATCH 0/6] CCIX Protocol Error reporting
- From: Jonathan Cameron <jonathan.cameron@xxxxxxxxxx>
- Re: [RFC PATCH 0/6] CCIX Protocol Error reporting
- From: James Morse <james.morse@xxxxxxx>
- [PATCH AUTOSEL 5.1 07/39] efi/bgrt: Drop BGRT status field reserved bits check
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.1 14/39] x86/efi: fix a -Wtype-limits compilation warning
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 03/26] efi/bgrt: Drop BGRT status field reserved bits check
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 02/13] efi/bgrt: Drop BGRT status field reserved bits check
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH 2/4] efi/libstub: detect panel-id
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 2/4] efi/libstub: detect panel-id
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 2/4] efi/libstub: detect panel-id
- From: Rob Clark <robdclark@xxxxxxxxx>
- Re: [PATCH 2/4] efi/libstub: detect panel-id
- From: Leif Lindholm <leif.lindholm@xxxxxxxxxx>
- Re: [PATCH 2/4] efi/libstub: detect panel-id
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 2/4] efi/libstub: detect panel-id
- From: Rob Clark <robdclark@xxxxxxxxx>
- Re: [PATCH 2/4] efi/libstub: detect panel-id
- From: Rob Clark <robdclark@xxxxxxxxx>
- Re: [PATCH v0] Export Runtime Configuration Interface table to sysfs
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 0/4] drm+dt+efi: support devices with multiple possible panels
- From: Rob Clark <robdclark@xxxxxxxxx>
- Re: [PATCH v2 4/4] vfs: don't allow most setxattr to immutable files
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [efi:next 2/3] arch/x86/platform/efi/efi.c:77:3: error: 'uv_systab_phys' undeclared here (not in a function); did you mean 'uv_system_init'?
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v6 0/4] vfs: make immutable files actually immutable
- From: Boaz Harrosh <boaz@xxxxxxxxxxxxx>
- [PATCH v2 4/4] vfs: don't allow most setxattr to immutable files
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- Re: [PATCH 0/4] drm+dt+efi: support devices with multiple possible panels
- From: Rob Clark <robdclark@xxxxxxxxx>
- Re: [PATCH 0/4] drm+dt+efi: support devices with multiple possible panels
- From: Laurent Pinchart <laurent.pinchart@xxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] drm+dt+efi: support devices with multiple possible panels
- From: Rob Clark <robdclark@xxxxxxxxx>
- Re: [PATCH 0/4] drm+dt+efi: support devices with multiple possible panels
- From: Laurent Pinchart <laurent.pinchart@xxxxxxxxxxxxxxxx>
- [PATCH 2/4] efi/libstub: detect panel-id
- From: Rob Clark <robdclark@xxxxxxxxx>
- [PATCH 0/4] drm+dt+efi: support devices with multiple possible panels
- From: Rob Clark <robdclark@xxxxxxxxx>
- Re: [4.19.y PATCH 1/3] efi/x86/Add missing error handling to old_memmap 1:1 mapping code
- From: "Srivatsa S. Bhat" <srivatsa@xxxxxxxxxxxxx>
- Re: [4.19.y PATCH 1/3] efi/x86/Add missing error handling to old_memmap 1:1 mapping code
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 5/5] vfs: only allow FSSETXATTR to set DAX flag on files and dirs
- From: Jan Kara <jack@xxxxxxx>
- Re: [GIT PULL] EFI fixes
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v0] Export Runtime Configuration Interface table to sysfs
- From: <Narendra.K@xxxxxxxx>
- [PATCH v0] Export Runtime Configuration Interface table to sysfs
- From: <Narendra.K@xxxxxxxx>
- Re: [4.19.y PATCH 1/3] efi/x86/Add missing error handling to old_memmap 1:1 mapping code
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [4.19.y PATCH 1/3] efi/x86/Add missing error handling to old_memmap 1:1 mapping code
- From: Gen Zhang <blackgod016574@xxxxxxxxx>
- Re: [4.19.y PATCH 1/3] efi/x86/Add missing error handling to old_memmap 1:1 mapping code
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [GIT PULL] EFI fixes
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH 4/4] vfs: don't allow most setxattr to immutable files
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [4.19.y PATCH 1/3] efi/x86/Add missing error handling to old_memmap 1:1 mapping code
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [4.19.y PATCH 0/3] Backported fixes for 4.19 stable tree
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [4.19.y PATCH 0/3] Backported fixes for 4.19 stable tree
- From: "Srivatsa S. Bhat" <srivatsa@xxxxxxxxxxxxx>
- [4.19.y PATCH 1/3] efi/x86/Add missing error handling to old_memmap 1:1 mapping code
- From: "Srivatsa S. Bhat" <srivatsa@xxxxxxxxxxxxx>
- [PATCH 3/4] vfs: flush and wait for io when setting the immutable flag via FSSETXATTR
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH v4 0/5] vfs: clean up SETFLAGS and FSSETXATTR option processing
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH 2/4] vfs: flush and wait for io when setting the immutable flag via SETFLAGS
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH 4/4] vfs: don't allow most setxattr to immutable files
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH 1/4] mm/fs: don't allow writes to immutable files
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH 3/5] vfs: teach vfs_ioc_fssetxattr_check to check project id info
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH 2/5] vfs: create a generic checking function for FS_IOC_FSSETXATTR
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH v6 0/4] vfs: make immutable files actually immutable
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH 1/5] vfs: create a generic checking and prep function for FS_IOC_SETFLAGS
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH 5/5] vfs: only allow FSSETXATTR to set DAX flag on files and dirs
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH 4/5] vfs: teach vfs_ioc_fssetxattr_check to check extent size hints
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- Re: [PATCH 28/39] docs: admin-guide: add a series of orphaned documents
- From: Bartlomiej Zolnierkiewicz <b.zolnierkie@xxxxxxxxxxx>
- Re: [PATCH 28/39] docs: admin-guide: add a series of orphaned documents
- From: Alexandre Belloni <alexandre.belloni@xxxxxxxxxxx>
- [PATCH 28/39] docs: admin-guide: add a series of orphaned documents
- From: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
- [PATCH 23/43] docs: ia64: convert to ReST
- From: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
- Re: [PATCH 2/5] vfs: create a generic checking function for FS_IOC_FSSETXATTR
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- Re: [PATCH 5/5] vfs: don't allow writes to swap files
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- Re: [PATCH 2/5] vfs: create a generic checking function for FS_IOC_FSSETXATTR
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH 2/5] vfs: create a generic checking function for FS_IOC_FSSETXATTR
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- Re: [PATCH 1/5] vfs: create a generic checking and prep function for FS_IOC_SETFLAGS
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- Re: [RFC PATCH] Export Runtime Configuration Interface table to sysfs
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [Cluster-devel] [PATCH 1/5] vfs: create a generic checking and prep function for FS_IOC_SETFLAGS
- From: Bob Peterson <rpeterso@xxxxxxxxxx>
- Re: [RFC PATCH] Export Runtime Configuration Interface table to sysfs
- From: <Narendra.K@xxxxxxxx>
- Re: [PATCH 2/5] vfs: create a generic checking function for FS_IOC_FSSETXATTR
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/5] vfs: create a generic checking and prep function for FS_IOC_SETFLAGS
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 5/5] vfs: don't allow writes to swap files
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- [PATCH 5/5] vfs: don't allow writes to swap files
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH 3/5] vfs: flush and wait for io when setting the immutable flag via FSSETXATTR
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH 2/5] vfs: flush and wait for io when setting the immutable flag via SETFLAGS
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH 4/5] vfs: don't allow most setxattr to immutable files
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH v5 0/5] vfs: make immutable files actually immutable
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH 1/5] mm/fs: don't allow writes to immutable files
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH 5/5] vfs: only allow FSSETXATTR to set DAX flag on files and dirs
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH 4/5] vfs: teach vfs_ioc_fssetxattr_check to check extent size hints
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH 2/5] vfs: create a generic checking function for FS_IOC_FSSETXATTR
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH 1/5] vfs: create a generic checking and prep function for FS_IOC_SETFLAGS
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH 3/5] vfs: teach vfs_ioc_fssetxattr_check to check project id info
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH v3 0/5] vfs: clean up SETFLAGS and FSSETXATTR option processing
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- Re: [PATCH v4 0/7] vfs: make immutable files actually immutable
- From: Andreas Dilger <adilger@xxxxxxxxx>
- Re: [PATCH 1/4] vfs: create a generic checking function for FS_IOC_SETFLAGS
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- Re: [PATCH v4 0/7] vfs: make immutable files actually immutable
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- Re: [PATCH 2/4] vfs: create a generic checking function for FS_IOC_FSSETXATTR
- From: David Sterba <dsterba@xxxxxxx>
- Re: [PATCH 2/4] vfs: create a generic checking function for FS_IOC_FSSETXATTR
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- Re: [PATCH 1/4] vfs: create a generic checking function for FS_IOC_SETFLAGS
- From: David Sterba <dsterba@xxxxxxx>
- Re: [PATCH 2/4] vfs: create a generic checking function for FS_IOC_FSSETXATTR
- From: David Sterba <dsterba@xxxxxxx>
- Re: [PATCH V34 28/29] efi: Restrict efivar_ssdt_load when the kernel is locked down
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH] Export Runtime Configuration Interface table to sysfs
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH] Export Runtime Configuration Interface table to sysfs
- From: <Narendra.K@xxxxxxxx>
- Re: [RFC PATCH 0/6] CCIX Protocol Error reporting
- From: Jonathan Cameron <jonathan.cameron@xxxxxxxxxx>
- Re: [PATCH 4/4] vfs: teach vfs_ioc_fssetxattr_check to check extent size hints
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH 3/4] fs: teach vfs_ioc_fssetxattr_check to check project id info
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH 2/4] vfs: create a generic checking function for FS_IOC_FSSETXATTR
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH 1/4] vfs: create a generic checking function for FS_IOC_SETFLAGS
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v4 0/7] vfs: make immutable files actually immutable
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [Ocfs2-devel] [PATCH 2/7] vfs: flush and wait for io when setting the immutable flag via SETFLAGS
- From: Jan Kara <jack@xxxxxxx>
- Re: [Ocfs2-devel] [PATCH 2/7] vfs: flush and wait for io when setting the immutable flag via SETFLAGS
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- Re: [PATCH 2/7] vfs: flush and wait for io when setting the immutable flag via SETFLAGS
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- Re: [PATCH 2/7] vfs: flush and wait for io when setting the immutable flag via SETFLAGS
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- Re: [PATCH] drivers: firmware: efi: fix gcc warning -Wint-conversion
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/7] vfs: flush and wait for io when setting the immutable flag via SETFLAGS
- From: Jan Kara <jack@xxxxxxx>
- Re: [PATCH 2/7] vfs: flush and wait for io when setting the immutable flag via SETFLAGS
- From: Jan Kara <jack@xxxxxxx>
- Re: [PATCH 1/7] mm/fs: don't allow writes to immutable files
- From: Jan Kara <jack@xxxxxxx>
- Re: [PATCH V34 28/29] efi: Restrict efivar_ssdt_load when the kernel is locked down
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [GIT PULL 0/4] EFI fixes for v5.2
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 4/4] efibc: Replace variable set function in notifier call
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 1/4] efi/memreserve: deal with memreserve entries in unmapped memory
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 3/4] x86/efi: fix a -Wtype-limits compilation warning
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 2/4] efi/bgrt: Drop BGRT status field reserved bits check
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH V34 28/29] efi: Restrict efivar_ssdt_load when the kernel is locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH 5/7] xfs: refactor setflags to use setattr code directly
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH 1/4] vfs: create a generic checking function for FS_IOC_SETFLAGS
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH 7/7] vfs: don't allow writes to swap files
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH 6/7] xfs: clean up xfs_merge_ioc_xflags
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH 2/7] vfs: flush and wait for io when setting the immutable flag via SETFLAGS
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH v4 0/7] vfs: make immutable files actually immutable
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH 4/7] vfs: don't allow most setxattr to immutable files
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH 3/7] vfs: flush and wait for io when setting the immutable flag via FSSETXATTR
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH 1/7] mm/fs: don't allow writes to immutable files
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH 4/4] vfs: teach vfs_ioc_fssetxattr_check to check extent size hints
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH 2/4] vfs: create a generic checking function for FS_IOC_FSSETXATTR
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH 3/4] fs: teach vfs_ioc_fssetxattr_check to check project id info
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH v2 0/4] vfs: clean up SETFLAGS and FSSETXATTR option processing
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- Re: [PATCH v3 07/10] lib/memregion: Uplevel the pmem "region" ida to a global allocator
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v2 4/8] x86, efi: Reserve UEFI 2.8 Specific Purpose Memory for dax
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [RFC PATCH 1/6] efi / ras: CCIX Memory error reporting
- From: Jonathan Cameron <jonathan.cameron@xxxxxxxxxx>
- Re: [RFC PATCH] Export Runtime Configuration Interface table to sysfs
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [[efi boot control]] efibc: Replace variable set function in notifier call
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2] x86/efi: fix a -Wtype-limits compilation warning
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efifb: BGRT: Add check for new BGRT status field rotation bits
- From: Bartlomiej Zolnierkiewicz <b.zolnierkie@xxxxxxxxxxx>
- [PATCH V33 30/30] efi: Restrict efivar_ssdt_load when the kernel is locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: [PATCH 1/6] mm/fs: don't allow writes to immutable files
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH 1/6] mm/fs: don't allow writes to immutable files
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- Re: [PATCH 2/6] vfs: flush and wait for io when setting the immutable flag via SETFLAGS
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- Re: [PATCH] drivers: firmware: efi: fix gcc warning -Wint-conversion
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 1/6] mm/fs: don't allow writes to immutable files
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH 4/6] vfs: don't allow most setxattr to immutable files
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- Re: [PATCH] drivers: firmware: efi: fix gcc warning -Wint-conversion
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 4/6] vfs: don't allow most setxattr to immutable files
- From: Jan Kara <jack@xxxxxxx>
- Re: [PATCH 2/6] vfs: flush and wait for io when setting the immutable flag via SETFLAGS
- From: Jan Kara <jack@xxxxxxx>
- Re: [PATCH 4/4] vfs: teach vfs_ioc_fssetxattr_check to check extent size hints
- From: Jan Kara <jack@xxxxxxx>
- Re: [PATCH 3/4] fs: teach vfs_ioc_fssetxattr_check to check project id info
- From: Jan Kara <jack@xxxxxxx>
- Re: [PATCH 2/4] vfs: create a generic checking function for FS_IOC_FSSETXATTR
- From: Jan Kara <jack@xxxxxxx>
- Re: [PATCH v2 1/4] vfs: create a generic checking function for FS_IOC_SETFLAGS
- From: Jan Kara <jack@xxxxxxx>
- RE: [[efi boot control]] efibc: Replace variable set function in notifier call
- From: "Tian, Baofeng" <baofeng.tian@xxxxxxxxx>
- Re: [PATCH] drivers: firmware: efi: fix gcc warning -Wint-conversion
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH AUTOSEL 4.19 17/49] efi/x86/Add missing error handling to old_memmap 1:1 mapping code
- From: Sasha Levin <sashal@xxxxxxxxxx>
- RE: [PATCH v2] x86/efi: fix a -Wtype-limits compilation warning
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH v2] x86/efi: fix a -Wtype-limits compilation warning
- From: Qian Cai <cai@xxxxxx>
- Re: [PATCH] drivers: firmware: efi: fix gcc warning -Wint-conversion
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v1 11/22] docs: admin-guide: add .rst files from the main dir
- From: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
- [PATCH v2 19/29] docs: ia64: convert to ReST
- From: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
- [RFC PATCH] Export Runtime Configuration Interface table to sysfs
- From: <Narendra.K@xxxxxxxx>
- Re: [PATCH v3 1/3] powerpc/powernv: Add OPAL API interface to get secureboot state
- From: Daniel Axtens <dja@xxxxxxxxxx>
- [PATCH] drivers: firmware: efi: fix gcc warning -Wint-conversion
- From: Hariprasad Kelam <hariprasad.kelam@xxxxxxxxx>
- Re: [PATCH v3 1/3] powerpc/powernv: Add OPAL API interface to get secureboot state
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 02/28] docs: arm64: convert docs to ReST and rename to .rst
- From: Jonathan Corbet <corbet@xxxxxxx>
- Re: [PATCH v4 02/28] docs: arm64: convert docs to ReST and rename to .rst
- From: Jonathan Corbet <corbet@xxxxxxx>
- Re: [PATCH 2/2] powerpc: expose secure variables via sysfs
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] powerpc: expose secure variables via sysfs
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] powerpc: expose secure variables via sysfs
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH 1/2] powerpc/powernv: add OPAL APIs for secure variables
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH 0/2] powerpc/powernv: expose secure variables to userspace
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/3] powerpc/powernv: Add OPAL API interface to get secureboot state
- From: Daniel Axtens <dja@xxxxxxxxxx>
- Re: [PATCH -next] efi/tpm: fix a compilation warning
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH -next] efi/tpm: fix a compilation warning
- From: Bartosz Szczepanek <bsz@xxxxxxxxxxxx>
- Re: [PATCH -next] efi/tpm: fix a compilation warning
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH -next] efi/tpm: fix a compilation warning
- From: Bartosz Szczepanek <bsz@xxxxxxxxxxxx>
- Re: [PATCH V2 1/2] Abstract out support for locating an EFI config table
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH V2 2/2] tpm: Don't duplicate events from the final event log in the TCG2 log
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH V2 2/2] tpm: Don't duplicate events from the final event log in the TCG2 log
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH V2 2/2] tpm: Don't duplicate events from the final event log in the TCG2 log
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V2 1/2] Abstract out support for locating an EFI config table
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v1 21/31] docs: ia64: convert to ReST
- From: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
- [PATCH v4 02/28] docs: arm64: convert docs to ReST and rename to .rst
- From: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
- [[efi boot control]] efibc: Replace variable set function in notifier call
- From: baofeng.tian@xxxxxxxxx
- [[efi boot control]] efibc: Replace variable set function in notifier call
- From: baofeng.tian@xxxxxxxxx
- Re: [PATCH v3 1/3] powerpc/powernv: Add OPAL API interface to get secureboot state
- From: Daniel Axtens <dja@xxxxxxxxxx>
- [PATCH v2 1/4] vfs: create a generic checking function for FS_IOC_SETFLAGS
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- Re: [Jfs-discussion] [PATCH 1/4] vfs: create a generic checking function for FS_IOC_SETFLAGS
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- Re: [PATCH v3 3/3] powerpc: Add support to initialize ima policy rules
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 3/3] powerpc: Add support to initialize ima policy rules
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v4 2/3] powerpc/powernv: detect the secure boot mode of the system
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v4 1/3] powerpc/powernv: Add OPAL API interface to get secureboot state
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v4 0/3] powerpc: Enabling IMA arch specific secure boot policies
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- Re: [PATCH] efifb: BGRT: Add check for new BGRT status field rotation bits
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH] efifb: BGRT: Add check for new BGRT status field rotation bits
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efifb: BGRT: Add check for new BGRT status field rotation bits
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH] efifb: BGRT: Add check for new BGRT status field rotation bits
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [Jfs-discussion] [PATCH 1/4] vfs: create a generic checking function for FS_IOC_SETFLAGS
- From: Dave Kleikamp <dave.kleikamp@xxxxxxxxxx>
- [PATCH -next] efi/tpm: fix a compilation warning
- From: Qian Cai <cai@xxxxxx>
- Re: [PATCH v3 3/3] powerpc: Add support to initialize ima policy rules
- From: Satheesh Rajendran <sathnaga@xxxxxxxxxxxxxxxxxx>
- [PATCH 6/6] xfs: clean up xfs_merge_ioc_xflags
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH 3/4] fs: teach vfs_ioc_fssetxattr_check to check project id info
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH 3/6] vfs: flush and wait for io when setting the immutable flag via FSSETXATTR
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH 1/6] mm/fs: don't allow writes to immutable files
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH 4/6] vfs: don't allow most setxattr to immutable files
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH 5/6] xfs: refactor setflags to use setattr code directly
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH v3 0/6] vfs: make immutable files actually immutable
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH 2/6] vfs: flush and wait for io when setting the immutable flag via SETFLAGS
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH 4/4] vfs: teach vfs_ioc_fssetxattr_check to check extent size hints
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH 1/4] vfs: create a generic checking function for FS_IOC_SETFLAGS
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH 2/4] vfs: create a generic checking function for FS_IOC_FSSETXATTR
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH 0/4] vfs: clean up SETFLAGS and FSSETXATTR option processing
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- Re: [PATCH] efi/memreserve: deal with memreserve entries in unmapped memory
- From: Jonathan Richardson <jonathan.richardson@xxxxxxxxxxxx>
- [PATCH v3 3/3] powerpc: Add support to initialize ima policy rules
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v3 2/3] powerpc/powernv: detect the secure boot mode of the system
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v3 1/3] powerpc/powernv: Add OPAL API interface to get secureboot state
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v3 0/3] powerpc: Enabling IMA arch specific secure boot policies
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- Re: [PATCH V2 1/2] Abstract out support for locating an EFI config table
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V2 1/2] Abstract out support for locating an EFI config table
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] efi/memreserve: deal with memreserve entries in unmapped memory
- From: Ray Jui <ray.jui@xxxxxxxxxxxx>
- Re: [PATCH] efifb: BGRT: Add check for new BGRT status field rotation bits
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi/bgrt: Drop BGRT status field reserved bits check
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] efi/memreserve: deal with memreserve entries in unmapped memory
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v3 01/10] acpi/numa: Establish a new drivers/acpi/numa/ directory
- From: "Rafael J. Wysocki" <rjw@xxxxxxxxxxxxx>
- Re: [PATCH] efi: Fix TPM code build failure on ARM
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH AUTOSEL 4.19 17/49] efi/x86/Add missing error handling to old_memmap 1:1 mapping code
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 4.9 60/83] efi/libstub: Unify command line param parsing
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 02/33] docs: arm64: convert docs to ReST and rename to .rst
- From: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
- Re: [PATCH v2 4/8] x86, efi: Reserve UEFI 2.8 Specific Purpose Memory for dax
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH AUTOSEL 5.1 25/70] efi/x86/Add missing error handling to old_memmap 1:1 mapping code
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 17/49] efi/x86/Add missing error handling to old_memmap 1:1 mapping code
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v2 4/8] x86, efi: Reserve UEFI 2.8 Specific Purpose Memory for dax
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v3 03/10] efi: Enumerate EFI_MEMORY_SP
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v3 03/10] efi: Enumerate EFI_MEMORY_SP
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH V2 2/2] tpm: Don't duplicate events from the final event log in the TCG2 log
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V2 1/2] Abstract out support for locating an EFI config table
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH V2 2/2] tpm: Don't duplicate events from the final event log in the TCG2 log
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V2 1/2] Abstract out support for locating an EFI config table
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: gicv3-its driver crashes in crash dump kernel
- From: Jonathan Richardson <jonathan.richardson@xxxxxxxxxxxx>
- Re: [PATCH v3 00/10] EFI Specific Purpose Memory Support
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v3 07/10] lib/memregion: Uplevel the pmem "region" ida to a global allocator
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH v3 08/10] device-dax: Add a driver for "hmem" devices
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v3 03/10] efi: Enumerate EFI_MEMORY_SP
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v3 00/10] EFI Specific Purpose Memory Support
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v3 08/10] device-dax: Add a driver for "hmem" devices
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v3 03/10] efi: Enumerate EFI_MEMORY_SP
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH v3 10/10] acpi/numa/hmat: Register "specific purpose" memory as an "hmem" device
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v3 09/10] acpi/numa/hmat: Register HMAT at device_initcall level
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v3 08/10] device-dax: Add a driver for "hmem" devices
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v3 07/10] lib/memregion: Uplevel the pmem "region" ida to a global allocator
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v3 06/10] x86, efi: Add efi_fake_mem support for EFI_MEMORY_SP
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v3 05/10] x86, efi: Reserve UEFI 2.8 Specific Purpose Memory for dax
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v3 04/10] x86, efi: Push EFI_MEMMAP check into leaf routines
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v3 03/10] efi: Enumerate EFI_MEMORY_SP
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v3 02/10] acpi/numa/hmat: Skip publishing target info for nodes with no online memory
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v3 01/10] acpi/numa: Establish a new drivers/acpi/numa/ directory
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v3 00/10] EFI Specific Purpose Memory Support
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [RESEND PATCH] x86/efi: fix a -Wtype-limits compilation warning
- From: Qian Cai <cai@xxxxxx>
- Re: [PATCH v2 4/8] x86, efi: Reserve UEFI 2.8 Specific Purpose Memory for dax
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: "arm64: Silence gcc warnings about arch ABI drift" breaks clang
- From: Will Deacon <will.deacon@xxxxxxx>
- Re: "arm64: Silence gcc warnings about arch ABI drift" breaks clang
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: "arm64: Silence gcc warnings about arch ABI drift" breaks clang
- From: Nathan Chancellor <natechancellor@xxxxxxxxx>
- Re: "arm64: Silence gcc warnings about arch ABI drift" breaks clang
- From: Qian Cai <cai@xxxxxx>
- Re: "arm64: Silence gcc warnings about arch ABI drift" breaks clang
- From: Will Deacon <will.deacon@xxxxxxx>
- Re: [PATCH v2 4/8] x86, efi: Reserve UEFI 2.8 Specific Purpose Memory for dax
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- "arm64: Silence gcc warnings about arch ABI drift" breaks clang
- From: Qian Cai <cai@xxxxxx>
- Re: [PATCH v2 4/8] x86, efi: Reserve UEFI 2.8 Specific Purpose Memory for dax
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: gicv3-its driver crashes in crash dump kernel
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi: Fix TPM code build failure on ARM
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V2] tpm: Don't duplicate events from the final event log in the TCG2 log
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH for-4.9-stable] efi/libstub: Unify command line param parsing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: gicv3-its driver crashes in crash dump kernel
- From: Jonathan Richardson <jonathan.richardson@xxxxxxxxxxxx>
- Re: gicv3-its driver crashes in crash dump kernel
- From: Bhupesh Sharma <bhsharma@xxxxxxxxxx>
- Re: gicv3-its driver crashes in crash dump kernel
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi: Fix TPM code build failure on ARM
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V2] tpm: Don't duplicate events from the final event log in the TCG2 log
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH for-4.9-stable] efi/libstub: Unify command line param parsing
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: gicv3-its driver crashes in crash dump kernel
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH for-4.9-stable] efi/libstub: Unify command line param parsing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH for-4.9-stable] efi/libstub: Unify command line param parsing
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [RFC PATCH 5/6] efi / ras: CCIX Link error reporting
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [RFC PATCH 6/6] efi / ras: CCIX Agent internal error reporting
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [RFC PATCH 3/6] efi / ras: CCIX Address Translation Cache error reporting
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [RFC PATCH 1/6] efi / ras: CCIX Memory error reporting
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [RFC PATCH 4/6] efi / ras: CCIX Port error reporting
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [RFC PATCH 2/6] efi / ras: CCIX Cache error reporting
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [RFC PATCH 0/6] CCIX Protocol Error reporting
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH for-4.9-stable] efi/libstub: Unify command line param parsing
- From: Rolf Eike Beer <eb@xxxxxxxxx>
- Re: [PATCH] efi: Fix TPM code build failure on ARM
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH for-4.9-stable] efi/libstub: Unify command line param parsing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: Building arm64 EFI stub with -fpie breaks build of 4.9.x (undefined reference to `__efistub__GLOBAL_OFFSET_TABLE_')
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: Building arm64 EFI stub with -fpie breaks build of 4.9.x (undefined reference to `__efistub__GLOBAL_OFFSET_TABLE_')
- From: Rolf Eike Beer <eb@xxxxxxxxx>
- Re: Building arm64 EFI stub with -fpie breaks build of 4.9.x (undefined reference to `__efistub__GLOBAL_OFFSET_TABLE_')
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: Building arm64 EFI stub with -fpie breaks build of 4.9.x (undefined reference to `__efistub__GLOBAL_OFFSET_TABLE_')
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: Building arm64 EFI stub with -fpie breaks build of 4.9.x (undefined reference to `__efistub__GLOBAL_OFFSET_TABLE_')
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: Building arm64 EFI stub with -fpie breaks build of 4.9.x (undefined reference to `__efistub__GLOBAL_OFFSET_TABLE_')
- From: Rolf Eike Beer <eb@xxxxxxxxx>
- Re: Building arm64 EFI stub with -fpie breaks build of 4.9.x (undefined reference to `__efistub__GLOBAL_OFFSET_TABLE_')
- From: Rolf Eike Beer <eb@xxxxxxxxx>
- Re: Building arm64 EFI stub with -fpie breaks build of 4.9.x (undefined reference to `__efistub__GLOBAL_OFFSET_TABLE_')
- From: Rolf Eike Beer <eb@xxxxxxxxx>
- Re: Building arm64 EFI stub with -fpie breaks build of 4.9.x (undefined reference to `__efistub__GLOBAL_OFFSET_TABLE_')
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: Building arm64 EFI stub with -fpie breaks build of 4.9.x (undefined reference to `__efistub__GLOBAL_OFFSET_TABLE_')
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- gicv3-its driver crashes in crash dump kernel
- From: Jonathan Richardson <jonathan.richardson@xxxxxxxxxxxx>
- Re: Building arm64 EFI stub with -fpie breaks build of 4.9.x (undefined reference to `__efistub__GLOBAL_OFFSET_TABLE_')
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: Building arm64 EFI stub with -fpie breaks build of 4.9.x (undefined reference to `__efistub__GLOBAL_OFFSET_TABLE_')
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/8] x86, efi: Reserve UEFI 2.8 Specific Purpose Memory for dax
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: Building arm64 EFI stub with -fpie breaks build of 4.9.x (undefined reference to `__efistub__GLOBAL_OFFSET_TABLE_')
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] efi: Fix TPM code build failure on ARM
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V2] tpm: Don't duplicate events from the final event log in the TCG2 log
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: Building arm64 EFI stub with -fpie breaks build of 4.9.x (undefined reference to `__efistub__GLOBAL_OFFSET_TABLE_')
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: Building arm64 EFI stub with -fpie breaks build of 4.9.x (undefined reference to `__efistub__GLOBAL_OFFSET_TABLE_')
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH 1/1] tpm: Don't dereference event after it's unmapped in __calc_tpm2_event_size
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/1] Fix crash in __calc_tpm2_event_size
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Don't duplicate events from the final event log in the TCG2 log
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Building arm64 EFI stub with -fpie breaks build of 4.9.x (undefined reference to `__efistub__GLOBAL_OFFSET_TABLE_')
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/1] tpm: Don't dereference event after it's unmapped in __calc_tpm2_event_size
- From: Chris Coulson <chris.coulson@xxxxxxxxxxxxx>
- [PATCH 0/1] Fix crash in __calc_tpm2_event_size
- From: Chris Coulson <chris.coulson@xxxxxxxxxxxxx>
- [PATCH] tpm: Don't duplicate events from the final event log in the TCG2 log
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: [PATCH v2 4/8] x86, efi: Reserve UEFI 2.8 Specific Purpose Memory for dax
- From: Mike Rapoport <rppt@xxxxxxxxxxxxx>
- Re: [GIT PULL] EFI fixes
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] EFI fixes
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH v2 4/8] x86, efi: Reserve UEFI 2.8 Specific Purpose Memory for dax
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [Bug 203761] New: efivar_ssdt_iter is subject to stack corruption when the input name_size is 0
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V7 0/4] Add support for crypto agile logs
- From: Joe Richey <joerichey@xxxxxxxxxx>
- [PATCH] x86/efi: fix a -Wtype-limits compilation warning
- From: Qian Cai <cai@xxxxxx>
- Re: [PATCH v2 4/8] x86, efi: Reserve UEFI 2.8 Specific Purpose Memory for dax
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 4/8] x86, efi: Reserve UEFI 2.8 Specific Purpose Memory for dax
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v2 1/8] acpi: Drop drivers/acpi/hmat/ directory
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [Bug 203761] New: efivar_ssdt_iter is subject to stack corruption when the input name_size is 0
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 4/8] x86, efi: Reserve UEFI 2.8 Specific Purpose Memory for dax
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V7 2/4] tpm: Reserve the TPM final events table
- From: Joe Richey <joerichey@xxxxxxxxxx>
- Re: [PATCH v2 1/8] acpi: Drop drivers/acpi/hmat/ directory
- From: "Rafael J. Wysocki" <rjw@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/8] efi: Enumerate EFI_MEMORY_SP
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 8/8] acpi/hmat: Register "specific purpose" memory as an "hmem" device
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v2 7/8] acpi/hmat: Register HMAT at device_initcall level
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v2 6/8] device-dax: Add a driver for "hmem" devices
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v2 5/8] lib/memregion: Uplevel the pmem "region" ida to a global allocator
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v2 4/8] x86, efi: Reserve UEFI 2.8 Specific Purpose Memory for dax
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v2 3/8] efi: Enumerate EFI_MEMORY_SP
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v2 2/8] acpi/hmat: Skip publishing target info for nodes with no online memory
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v2 1/8] acpi: Drop drivers/acpi/hmat/ directory
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v2 0/8] EFI Specific Purpose Memory Support
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH 5.1 289/405] efifb: Omit memory map check on legacy boot
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.0 260/346] efifb: Omit memory map check on legacy boot
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.19 223/276] efifb: Omit memory map check on legacy boot
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH] efifb: BGRT: Add check for new BGRT status field rotation bits
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH] efi/bgrt: Drop BGRT status field reserved bits check
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH] x86/efi: Free efi_pgd with free_pages()
- From: Lennart Glauer <mail@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86/efi: Free efi_pgd with free_pages()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V7 0/4] Add support for crypto agile logs
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH 1/2] efi/x86: Add missing error handling to old_memmap 1:1 mapping code
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 2/2] efi: Allow the number of EFI configuration tables entries to be zero
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [GIT PULL 0/2] EFI fixes for v5.2
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2] efi_64: Fix a missing-check bug in arch/x86/platform/efi/efi_64.c
- From: Gen Zhang <blackgod016574@xxxxxxxxx>
- Re: [PATCH v2] efi_64: Fix a missing-check bug in arch/x86/platform/efi/efi_64.c
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2] efi_64: Fix a missing-check bug in arch/x86/platform/efi/efi_64.c
- From: Gen Zhang <blackgod016574@xxxxxxxxx>
- Re: [PATCH V7 0/4] Add support for crypto agile logs
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v2] efi_64: Fix a missing-check bug in arch/x86/platform/efi/efi_64.c
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2] efi: Check the number of EFI configuration tables entries
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V7 0/4] Add support for crypto agile logs
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH 4.19 061/114] fbdev/efifb: Ignore framebuffer memmap entries that lack any memory types
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.0 076/139] fbdev/efifb: Ignore framebuffer memmap entries that lack any memory types
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.1 085/122] fbdev/efifb: Ignore framebuffer memmap entries that lack any memory types
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V7 0/4] Add support for crypto agile logs
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH V7 0/4] Add support for crypto agile logs
- From: Bartosz Szczepanek <bsz@xxxxxxxxxxxx>
- Re: [PATCH V7 0/4] Add support for crypto agile logs
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH V7 0/4] Add support for crypto agile logs
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v2] efi_64: Fix a missing-check bug in arch/x86/platform/efi/efi_64.c
- From: Gen Zhang <blackgod016574@xxxxxxxxx>
- Re: [PATCH v2] efi: Check the number of EFI configuration tables entries
- From: "Bradford, Robert" <robert.bradford@xxxxxxxxx>
- Re: [PATCH V7 0/4] Add support for crypto agile logs
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH V7 2/4] tpm: Reserve the TPM final events table
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V7 4/4] efi: Attempt to get the TCG2 event log in the boot stub
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH V7 0/4] Add support for crypto agile logs
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V7 3/4] tpm: Append the final event log to the TPM event log
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V7 4/4] efi: Attempt to get the TCG2 event log in the boot stub
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V7 2/4] tpm: Reserve the TPM final events table
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V7 1/4] tpm: Abstract crypto agile event size calculations
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: [PATCH V6 0/4] Add support for crypto agile TPM event logs
- From: Bartosz Szczepanek <bsz@xxxxxxxxxxxx>
- Re: [PATCH] x86/boot: provide KASAN compatible aliases for string routines
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH V6 4/4] efi: Attempt to get the TCG2 event log in the boot stub
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] x86/boot: provide KASAN compatible aliases for string routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH V6 2/4] tpm: Reserve the TPM final events table
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V6 4/4] efi: Attempt to get the TCG2 event log in the boot stub
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V6 3/4] tpm: Append the final event log to the TPM event log
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V6 1/4] tpm: Abstract crypto agile event size calculations
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V6 0/4] Add support for crypto agile TPM event logs
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: [PATCH] efi_64: Fix a missing-check bug in arch/x86/platform/efi/efi_64.c of Linux 5.1
- From: Gen Zhang <blackgod016574@xxxxxxxxx>
- Re: [PATCH] efi_64: Fix a missing-check bug in arch/x86/platform/efi/efi_64.c of Linux 5.1
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi_64: Fix a missing-check bug in arch/x86/platform/efi/efi_64.c of Linux 5.1
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [GIT PULL 0/1] EFI fix for v5.2
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 1/1] fbdev/efifb: ignore framebuffer memmap entries that lack any memory types
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] fbdev/efifb: ignore framebuffer memmap entries that lack any memory types
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 4.14 022/115] x86/reboot, efi: Use EFI reboot for Acer TravelMate X514-51T
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.14 083/115] x86/fpu: Dont export __kernel_fpu_{begin,end}()
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.19 037/113] x86/reboot, efi: Use EFI reboot for Acer TravelMate X514-51T
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.0 049/137] x86/reboot, efi: Use EFI reboot for Acer TravelMate X514-51T
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.9 16/51] x86/reboot, efi: Use EFI reboot for Acer TravelMate X514-51T
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Claudio Carvalho <cclaudio@xxxxxxxxxxxxx>
- Re: [PATCH] fbdev/efifb: ignore framebuffer memmap entries that lack any memory types
- From: James Hilliard <james.hilliard1@xxxxxxxxx>
- Re: [PATCH 2/2 v3] efi: print appropriate status message when loading certificates
- From: joeyli <jlee@xxxxxxxx>
- [PATCH AUTOSEL 5.0 42/99] x86/reboot, efi: Use EFI reboot for Acer TravelMate X514-51T
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 17/95] x86/reboot, efi: Use EFI reboot for Acer TravelMate X514-51T
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 84/95] x86/fpu: Don't export __kernel_fpu_{begin,end}()
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.9 12/25] x86/reboot, efi: Use EFI reboot for Acer TravelMate X514-51T
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 31/81] x86/reboot, efi: Use EFI reboot for Acer TravelMate X514-51T
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [GIT PULL] EFI changes for v5.2
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Bartosz Szczepanek <bsz@xxxxxxxxxxxx>
- [PATCH 4.19 20/99] efi: Fix debugobjects warning on efi_rts_work
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [GIT PULL] EFI changes for v5.2
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH 2/2 v3] efi: print appropriate status message when loading certificates
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] mm/pgtable: Drop pgtable_t variable from pte_fn_t functions
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH 2/2 v3] efi: print appropriate status message when loading certificates
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH 2/2 v3] efi: print appropriate status message when loading certificates
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 1/2 v2] efi: add a function to convert the status value to string
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH 2/2 v3] efi: print appropriate status message when loading certificates
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH 1/2 v2] efi: add a function to convert the status value to string
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 1/2 v2] efi: add a function to convert the status value to string
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH] mm/pgtable: Drop pgtable_t variable from pte_fn_t functions
- From: Martin Schwidefsky <schwidefsky@xxxxxxxxxx>
- Re: [PATCH] mm/pgtable: Drop pgtable_t variable from pte_fn_t functions
- From: Anshuman Khandual <anshuman.khandual@xxxxxxx>
- Re: [PATCH] mm/pgtable: Drop pgtable_t variable from pte_fn_t functions
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- [PATCH] mm/pgtable: Drop pgtable_t variable from pte_fn_t functions
- From: Anshuman Khandual <anshuman.khandual@xxxxxxx>
- Re: [PATCH 2/2 v3] efi: print appropriate status message when loading certificates
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 1/2 v2] efi: add a function to convert the status value to string
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Bartosz Szczepanek <barteks7r@xxxxxxxxx>
- [PATCH 2/2 v3] efi: print appropriate status message when loading certificates
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 1/2 v2] efi: add a function to convert the status value to string
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- Re: [PATCH 4.19 083/100] x86/fpu: Dont export __kernel_fpu_{begin,end}()
- From: Lukas Wunner <lukas@xxxxxxxxx>
- UEFI Fast Boot or Quick Boot for MS Windows also for Linux?
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- Re: [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Bartosz Szczepanek <bsz@xxxxxxxxxxxx>
- [PATCH 4.19 083/100] x86/fpu: Dont export __kernel_fpu_{begin,end}()
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: linux-next: Tree for Apr 26 (x86/efi)
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH] fbdev/efifb: ignore framebuffer memmap entries that lack any memory types
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] fbdev/efifb: ignore framebuffer memmap entries that lack any memory types
- From: James Hilliard <james.hilliard1@xxxxxxxxx>
- [PATCH] fbdev/efifb: ignore framebuffer memmap entries that lack any memory types
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 8/8] fbdev/efifb: honour UEFI memory map attributes when mapping the fb
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Black screen regression introduced in: efi: Refactor efi_memmap_init_early() into arch-neutral code
- From: Niklas Hambüchen <mail@xxxxxx>
- [PATCH v2 05/79] docs: arm64: convert docs to ReST and rename to .rst
- From: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
- [PATCH v2 60/79] docs: ia64: convert to ReST
- From: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
- Re: [PATCH 8/8] fbdev/efifb: honour UEFI memory map attributes when mapping the fb
- From: James Hilliard <james.hilliard1@xxxxxxxxx>
- Re: kexec reboot reset with efi_delete_dummy_variable
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: kexec reboot reset with efi_delete_dummy_variable
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- kexec reboot reset with efi_delete_dummy_variable
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: EFI reboot vs. ACPI reboot (was: Re: [tip:x86/urgent] x86/reboot, efi: Use EFI reboot for Acer TravelMate X514-51T)
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: EFI reboot vs. ACPI reboot (was: Re: [tip:x86/urgent] x86/reboot, efi: Use EFI reboot for Acer TravelMate X514-51T)
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: EFI reboot vs. ACPI reboot (was: Re: [tip:x86/urgent] x86/reboot, efi: Use EFI reboot for Acer TravelMate X514-51T)
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- RE: kexec crash on OVMF i386 + x86_64 kernel (Re: [PATCH v4] x86/boot: Use efi_setup_data for searching RSDP on kexec-ed kernel)
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- RE: EFI reboot vs. ACPI reboot (was: Re: [tip:x86/urgent] x86/reboot, efi: Use EFI reboot for Acer TravelMate X514-51T)
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- Re: EFI reboot vs. ACPI reboot (was: Re: [tip:x86/urgent] x86/reboot, efi: Use EFI reboot for Acer TravelMate X514-51T)
- Re: EFI reboot vs. ACPI reboot (was: Re: [tip:x86/urgent] x86/reboot, efi: Use EFI reboot for Acer TravelMate X514-51T)
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: EFI reboot vs. ACPI reboot (was: Re: [tip:x86/urgent] x86/reboot, efi: Use EFI reboot for Acer TravelMate X514-51T)
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: EFI reboot vs. ACPI reboot (was: Re: [tip:x86/urgent] x86/reboot, efi: Use EFI reboot for Acer TravelMate X514-51T)
- Re: EFI reboot vs. ACPI reboot (was: Re: [tip:x86/urgent] x86/reboot, efi: Use EFI reboot for Acer TravelMate X514-51T)
- From: Daniel Drake <drake@xxxxxxxxxxxx>
- Re: EFI reboot vs. ACPI reboot (was: Re: [tip:x86/urgent] x86/reboot, efi: Use EFI reboot for Acer TravelMate X514-51T)
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: kexec crash on OVMF i386 + x86_64 kernel (Re: [PATCH v4] x86/boot: Use efi_setup_data for searching RSDP on kexec-ed kernel)
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: EFI reboot vs. ACPI reboot (was: Re: [tip:x86/urgent] x86/reboot, efi: Use EFI reboot for Acer TravelMate X514-51T)
- From: Daniel Drake <drake@xxxxxxxxxxxx>
- [PATCH v2] efi: Check the number of EFI configuration tables entries
- From: Rob Bradford <robert.bradford@xxxxxxxxx>
- EFI reboot vs. ACPI reboot (was: Re: [tip:x86/urgent] x86/reboot, efi: Use EFI reboot for Acer TravelMate X514-51T)
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH] efi: Include tpm_eventlog.h after asm/efi.h to avoid memcpy breakage
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] TCG2 log support build fixes for non-x86_64
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] efi/arm: enable CP15 DMB instructions before cleaning the cache
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2] efi/arm: enable CP15 DMB instructions before cleaning the cache
- From: Russell King - ARM Linux admin <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] efi/arm: enable CP15 DMB instructions before cleaning the cache
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2] efi/arm: enable CP15 DMB instructions before cleaning the cache
- From: Russell King - ARM Linux admin <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] efi/arm: enable CP15 DMB instructions before cleaning the cache
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Claudio Carvalho <cclaudio@xxxxxxxxxxxxx>
- [PATCH v2] efi/arm: enable CP15 DMB instructions before cleaning the cache
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 3/3] powerpc: Add support to initialize ima policy rules
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v2 2/3] powerpc/powernv: detect the secure boot mode of the system
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v2 1/3] powerpc/powernv: Add support for OPAL_SECVAR_GET
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v2 0/3] powerpc: Enabling secure boot on powernv systems - Part 1
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- Re: [PATCH] efi/arm: enable CP15 DMB instructions before cleaning the cache
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v8 2/5] arm64: replace -pg with CC_FLAGS_FTRACE in efi Makefiles
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v8 2/5] arm64: replace -pg with CC_FLAGS_FTRACE in efi Makefiles
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH] efi/arm: enable CP15 DMB instructions before cleaning the cache
- From: Vladimir Murzin <vladimir.murzin@xxxxxxx>
- Re: [PATCH] efi/arm: enable CP15 DMB instructions before cleaning the cache
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH] efi/arm: enable CP15 DMB instructions before cleaning the cache
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Claudio Carvalho <cclaudio@xxxxxxxxxxxxx>
- Re: [PATCH] TCG2 log support build fixes for non-x86_64
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 1/2] efi: Fix cast to pointer from integer of different size in TPM log code
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH] efi: Check the number of EFI configuration tables entries
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 1/2] efi: Fix cast to pointer from integer of different size in TPM log code
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi: Include tpm_eventlog.h after asm/efi.h to avoid memcpy breakage
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi: Include tpm_eventlog.h after asm/efi.h to avoid memcpy breakage
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] TCG2 log support build fixes for non-x86_64
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] tpm: Fix builds on platforms that lack early_memremap()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] efi: Fix cast to pointer from integer of different size in TPM log code
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH] efi: Check the number of EFI configuration tables entries
- From: Rob Bradford <robert.bradford@xxxxxxxxx>
- [PATCH 4.9 67/91] efi/memattr: Dont bail on zero VA if it equals the regions PA
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.14 087/121] efi/memattr: Dont bail on zero VA if it equals the regions PA
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.14 089/121] efi/arm/arm64: Allow SetVirtualAddressMap() to be omitted
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.19 137/187] efi/arm/arm64: Allow SetVirtualAddressMap() to be omitted
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.0 126/246] efi: Fix build error due to enum collision between efi.h and ima.h
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.0 175/246] efi/memattr: Dont bail on zero VA if it equals the regions PA
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.0 180/246] efi/arm/arm64: Allow SetVirtualAddressMap() to be omitted
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.19 133/187] efi/memattr: Dont bail on zero VA if it equals the regions PA
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Claudio Carvalho <cclaudio@xxxxxxxxxxxxx>
- [PATCH] efi: Include tpm_eventlog.h after asm/efi.h to avoid memcpy breakage
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: Add support for TCG2 log format on UEFI systems
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] efi: Fix cast to pointer from integer of different size in TPM log code
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- RE: [PATCH 1/2] efi: Fix cast to pointer from integer of different size in TPM log code
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Claudio Carvalho <cclaudio@xxxxxxxxxxxxx>
- [PATCH 2/2] tpm: Fix builds on platforms that lack early_memremap()
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH 1/2] efi: Fix cast to pointer from integer of different size in TPM log code
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH] TCG2 log support build fixes for non-x86_64
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Claudio Carvalho <cclaudio@xxxxxxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- [PATCH 4/4] powerpc: Add support to initialize ima policy rules
- From: Claudio Carvalho <cclaudio@xxxxxxxxxxxxx>
- [PATCH 3/4] powerpc/powernv: Detect the secure boot mode of the system
- From: Claudio Carvalho <cclaudio@xxxxxxxxxxxxx>
- [PATCH 2/4] powerpc/powernv: Add support for OPAL secure variables
- From: Claudio Carvalho <cclaudio@xxxxxxxxxxxxx>
- [PATCH 1/4] powerpc/include: Override unneeded early ioremap functions
- From: Claudio Carvalho <cclaudio@xxxxxxxxxxxxx>
- [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Claudio Carvalho <cclaudio@xxxxxxxxxxxxx>
- Re: Add support for TCG2 log format on UEFI systems
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: Add support for TCG2 log format on UEFI systems
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Add support for TCG2 log format on UEFI systems
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: Add support for TCG2 log format on UEFI systems
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] efi/arm: enable CP15 DMB instructions before cleaning the cache
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH] efi/arm: enable CP15 DMB instructions before cleaning the cache
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi/arm: enable CP15 DMB instructions before cleaning the cache
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH 1/2] efi: add a function for transferring status to string
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH 1/2] efi: add a function for transferring status to string
- From: joeyli <jlee@xxxxxxxx>
- [PATCH] efi/arm: enable CP15 DMB instructions before cleaning the cache
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 2/2 v2] efi: print appropriate status message when loading certificates
- [tip:x86/urgent] x86/realmode: Make set_real_mode_mem() static inline
- From: tip-bot for Matteo Croce <tipbot@xxxxxxxxx>
- Re: [GIT PULL 0/5] EFI changes for v5.2
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- [GIT PULL 0/5] EFI changes for v5.2
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 1/5] efi/libstub: refactor cmd_stubcopy
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 2/5] efifb: omit memory map check on legacy boot
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 4/5] efi: Unify dmi setup code over architectures arm/arm64, ia64 and x86
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 5/5] efi/libstub/arm: omit unneeded stripping of ksymtab/kcrctab sections
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 3/5] efi/arm: Show SMBIOS bank/device location in cper and ghes error logs
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] x86: remove unused argument from set_real_mode_mem()
- From: Mukesh Ojha <mojha@xxxxxxxxxxxxxx>
- [PATCH] x86: remove unused argument from set_real_mode_mem()
- From: Matteo Croce <mcroce@xxxxxxxxxx>
- Re: [PATCH v2] efi: Unify dmi setup code over architectures arm/arm64, io64 and x86
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2] efi: Unify dmi setup code over architectures arm/arm64, io64 and x86
- From: Robert Richter <rrichter@xxxxxxxxxxx>
[Index of Archives]
[Linux Kernel Development]
[Security]
[Linux ARM Kernel]
[Tools]
[Linux MIPS]
[Linux S390]
[Bugtraq]
[Share Photos]>
[Fedora ARM]