Linux EFI/UEFI Development
[Prev Page][Next Page]
- [PATCH 2/2 v8] x86/kexec_file: add reserved e820 ranges to kdump kernel e820 table
- From: Lianbo Jiang <lijiang@xxxxxxxxxx>
- kmemleak reports leaking in efi_mem_reserve_persistent()
- From: Qian Cai <cai@xxxxxx>
- Re: [PATCH 1/2 RESEND v7] resource: add the new I/O resource descriptor 'IORES_DESC_RESERVED'
- From: lijiang <lijiang@xxxxxxxxxx>
- Re: [PATCH 0/7] add platform/firmware keys support for kernel verification by IMA
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/2 RESEND v7] resource: add the new I/O resource descriptor 'IORES_DESC_RESERVED'
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 4/7] efi: Add an EFI signature blob parser
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 5/7] efi: Import certificates from UEFI Secure Boot
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/2 RESEND v7] resource: add the new I/O resource descriptor 'IORES_DESC_RESERVED'
- From: lijiang <lijiang@xxxxxxxxxx>
- Re: [PATCH 5/5] efi: permit calling efi_mem_reserve_persistent from atomic context
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 5/5] efi: permit calling efi_mem_reserve_persistent from atomic context
- From: Jeremy Linton <jeremy.linton@xxxxxxx>
- Re: [PATCH 1/2 RESEND v7] resource: add the new I/O resource descriptor 'IORES_DESC_RESERVED'
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 1/2 RESEND v7] resource: add the new I/O resource descriptor 'IORES_DESC_RESERVED'
- From: lijiang <lijiang@xxxxxxxxxx>
- Re: [PATCH 0/2 RESEND v7] add reserved e820 ranges to the kdump kernel e820 table
- From: lijiang <lijiang@xxxxxxxxxx>
- Re: [PATCH 1/2 RESEND v7] resource: add the new I/O resource descriptor 'IORES_DESC_RESERVED'
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 0/2 RESEND v7] add reserved e820 ranges to the kdump kernel e820 table
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 0/2 RESEND v7] add reserved e820 ranges to the kdump kernel e820 table
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 0/2 RESEND v7] add reserved e820 ranges to the kdump kernel e820 table
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- EFI-pstore, sleeping from back context after fault
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- [PATCH 4.4 19/70] efi/libstub/arm64: Set -fpie when building the EFI stub
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.4 18/70] efi/libstub/arm64: Force hidden visibility for section markers
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] partitions/efi: Fix partition name parsing in GUID partition entry
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH 7/7] ima: Support platform keyring for kernel appraisal
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH 6/7] efi: Allow the "db" UEFI variable to be suppressed
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH 4/7] efi: Add an EFI signature blob parser
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH 5/7] efi: Import certificates from UEFI Secure Boot
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH 3/7] efi: Add EFI signature data types
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH 2/7] integrity: Load certs to the platform keyring
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH 1/7] integrity: Define a trusted platform keyring
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH 0/7] add platform/firmware keys support for kernel verification by IMA
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH] partitions/efi: Fix partition name parsing in GUID partition entry
- From: Nikolai Merinov <n.merinov@xxxxxxxxxxxxxxxxxx>
- [PATCH 2/2 RESEND v7] x86/kexec_file: add reserved e820 ranges to kdump kernel e820 table
- From: Lianbo Jiang <lijiang@xxxxxxxxxx>
- [PATCH 1/2 RESEND v7] resource: add the new I/O resource descriptor 'IORES_DESC_RESERVED'
- From: Lianbo Jiang <lijiang@xxxxxxxxxx>
- [PATCH 0/2 RESEND v7] add reserved e820 ranges to the kdump kernel e820 table
- From: Lianbo Jiang <lijiang@xxxxxxxxxx>
- [PATCH 1/1] efi: prevent GICv3 WARN() by mapping memreserve table before first use
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [GIT PULL 0/1] EFI fix for v4.20
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] efi/x86: earlyprintk - Fix infinite loop on some screen widths
- From: YiFei Zhu <zhuyifei1999@xxxxxxxxx>
- [PATCH AUTOSEL 4.19 32/36] efi/arm: Revert deferred unmap of early memmap mapping
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 18/21] efi/arm: Revert deferred unmap of early memmap mapping
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.9 14/15] efi/arm: Revert deferred unmap of early memmap mapping
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH] x86: fix -Wmissing-prototypes warning
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH] x86: fix -Wmissing-prototypes warning
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- [PATCH] x86: fix -Wmissing-prototypes warning
- From: Yi Wang <wang.yi59@xxxxxxxxxx>
- [PATCH 4.9 29/59] efi/libstub/arm64: Force hidden visibility for section markers
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.9 28/59] efi/libstub/arm64: Use hidden attribute for struct screen_info reference
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.9 31/59] efi/libstub/arm64: Set -fpie when building the EFI stub
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.9 30/59] efi/libstub: Preserve .debug sections after absolute relocation check
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [RFT PATCH] efi: map memreserve table before first use
- From: John Garry <john.garry@xxxxxxxxxx>
- Re: [RFT PATCH] efi: map memreserve table before first use
- From: Jan Glauber <Jan.Glauber@xxxxxxxxxx>
- [RFT PATCH v2] efi: map memreserve table before first use
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFT PATCH] efi: map memreserve table before first use
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [RFT PATCH] efi: map memreserve table before first use
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFT PATCH] efi: map memreserve table before first use
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [RFT PATCH] efi: map memreserve table before first use
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v11 4/5] x86/boot: Dig out SRAT table from RSDP and find immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- [PATCH 2/3] selftests/ima: kexec_load syscall test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 3/3] x86/ima: retry detecting secure boot mode
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 1/3] ima: add error mesage to kexec_load
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 0/3] selftest/ima: fail kexec_load syscall
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 4.14 106/124] efi/arm/libstub: Pack FDT after populating it
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.18 143/171] efi/arm/libstub: Pack FDT after populating it
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.19 170/205] efi/arm/libstub: Pack FDT after populating it
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v11 4/5] x86/boot: Dig out SRAT table from RSDP and find immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v11 5/5] x86/boot/KASLR: Walk srat tables to filter immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v11 3/5] x86/boot: Add get_acpi_rsdp() to parse RSDP in cmdlien from kexec
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [GIT PULL] EFI fixes
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] EFI fixes
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH] firmware: efi: add NULL pointer checks in efivars api functions
- From: Arend van Spriel <arend.vanspriel@xxxxxxxxxxxx>
- Re: [PATCH v11 5/5] x86/boot/KASLR: Walk srat tables to filter immovable memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v11 4/5] x86/boot: Dig out SRAT table from RSDP and find immovable memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH] efi: replace GPL license boilerplate with SPDX headers
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] firmware: efi: add NULL pointer checks in efivars api functions
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v11 3/5] x86/boot: Add get_acpi_rsdp() to parse RSDP in cmdlien from kexec
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v11 3/5] x86/boot: Add get_acpi_rsdp() to parse RSDP in cmdlien from kexec
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH 2/5] efi: arm: revert deferred unmap of early memmap mapping
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 4/5] efi/arm: defer persistent reservations until after paging_init()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 5/5] efi: permit calling efi_mem_reserve_persistent from atomic context
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 3/5] efi/arm: libstub: pack FDT after populating it
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 1/5] efi: Fix debugobjects warning on efi_rts_work
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [GIT PULL 0/5] EFI fixes for v4.20
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v11 3/5] x86/boot: Add get_acpi_rsdp() to parse RSDP in cmdlien from kexec
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v11 3/5] x86/boot: Add get_acpi_rsdp() to parse RSDP in cmdlien from kexec
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v11 3/5] x86/boot: Add get_acpi_rsdp() to parse RSDP in cmdlien from kexec
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH] firmware: efi: add NULL pointer checks in efivars api functions
- From: Arend van Spriel <arend.vanspriel@xxxxxxxxxxxx>
- Re: [PATCH] firmware: efi: add NULL pointer checks in efivars api functions
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v11 3/5] x86/boot: Add get_acpi_rsdp() to parse RSDP in cmdlien from kexec
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH] firmware: efi: add NULL pointer checks in efivars api functions
- From: Arend van Spriel <arend.vanspriel@xxxxxxxxxxxx>
- Re: [PATCH v11 3/5] x86/boot: Add get_acpi_rsdp() to parse RSDP in cmdlien from kexec
- From: Masayoshi Mizuma <msys.mizuma@xxxxxxxxx>
- Re: [PATCH v11 3/5] x86/boot: Add get_acpi_rsdp() to parse RSDP in cmdlien from kexec
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v11 3/5] x86/boot: Add get_acpi_rsdp() to parse RSDP in cmdlien from kexec
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v11 3/5] x86/boot: Add get_acpi_rsdp() to parse RSDP in cmdlien from kexec
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v11 3/5] x86/boot: Add get_acpi_rsdp() to parse RSDP in cmdlien from kexec
- From: Masayoshi Mizuma <msys.mizuma@xxxxxxxxx>
- Re: [PATCH v11 2/5] x86/boot: Add bios_get_rsdp_addr() to search RSDP in memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v11 4/5] x86/boot: Dig out SRAT table from RSDP and find immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v11 4/5] x86/boot: Dig out SRAT table from RSDP and find immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v11 3/5] x86/boot: Add get_acpi_rsdp() to parse RSDP in cmdlien from kexec
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v11 2/5] x86/boot: Add bios_get_rsdp_addr() to search RSDP in memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v11 1/5] x86/boot: Add efi_get_rsdp_addr() to dig out RSDP from EFI table
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v11 4/5] x86/boot: Dig out SRAT table from RSDP and find immovable memory
- From: Masayoshi Mizuma <msys.mizuma@xxxxxxxxx>
- Re: [PATCH v11 4/5] x86/boot: Dig out SRAT table from RSDP and find immovable memory
- From: Masayoshi Mizuma <msys.mizuma@xxxxxxxxx>
- Re: [PATCH v11 3/5] x86/boot: Add get_acpi_rsdp() to parse RSDP in cmdlien from kexec
- From: Masayoshi Mizuma <msys.mizuma@xxxxxxxxx>
- Re: [PATCH v11 2/5] x86/boot: Add bios_get_rsdp_addr() to search RSDP in memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v11 1/5] x86/boot: Add efi_get_rsdp_addr() to dig out RSDP from EFI table
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] efi: permit calling efi_mem_reserve_persistent from atomic context
- From: "Qian Cai" <cai@xxxxxx>
- Re: [PATCH v11 3/5] x86/boot: Add get_acpi_rsdp() to parse RSDP in cmdlien from kexec
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- [PATCH v11 3/5] x86/boot: Add get_acpi_rsdp() to parse RSDP in cmdlien from kexec
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- [PATCH v11 1/5] x86/boot: Add efi_get_rsdp_addr() to dig out RSDP from EFI table
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- [PATCH v11 4/5] x86/boot: Dig out SRAT table from RSDP and find immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- [PATCH v11 5/5] x86/boot/KASLR: Walk srat tables to filter immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- [PATCH v11 2/5] x86/boot: Add bios_get_rsdp_addr() to search RSDP in memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- [PATCH v11 0/5] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH] efi: permit calling efi_mem_reserve_persistent from atomic context
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH] efi: permit calling efi_mem_reserve_persistent from atomic context
- From: Qian Cai <cai@xxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Masayoshi Mizuma <msys.mizuma@xxxxxxxxx>
- Re: Object debugging warning from efivar
- From: Qian Cai <cai@xxxxxx>
- Re: Object debugging warning from efivar
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] efi: permit calling efi_mem_reserve_persistent from atomic context
- From: "Qian Cai" <cai@xxxxxx>
- Object debugging warning from efivar
- From: Qian Cai <cai@xxxxxx>
- Re: [PATCH] efi: permit calling efi_mem_reserve_persistent from atomic context
- From: Qian Cai <cai@xxxxxx>
- Re: [PATCH] efi/libstub: Disable some warnings for x86{,_64}
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH v2 0/6] arm/efi: fix memblock reallocation crash due to persistent reservations
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 0/6] arm/efi: fix memblock reallocation crash due to persistent reservations
- From: Bhupesh Sharma <bhsharma@xxxxxxxxxx>
- Re: [PATCH v2 0/6] arm/efi: fix memblock reallocation crash due to persistent reservations
- From: Bhupesh Sharma <bhsharma@xxxxxxxxxx>
- [PATCH 2/2] efi/arm: libstub: pack FDT after populating it
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 1/2] efi: arm: revert deferred unmap of early memmap mapping
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 0/2] efi/arm regression fixes
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] efi: permit calling efi_mem_reserve_persistent from atomic context
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 1/6] arm64: memblock: don't permit memblock resizing until linear mapping is up
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: BUG: sleeping function called from invalid context at mm/slab.h:421
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: BUG: sleeping function called from invalid context at mm/slab.h:421
- From: "Qian Cai" <cai@xxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [Bug Report] kdump crashes after latest EFI memblock changes on arm64 machines with large number of CPUs
- From: Bhupesh Sharma <bhsharma@xxxxxxxxxx>
- [PATCH v2 6/6] efi: reduce the amount of memblock reservations for persistent allocations
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 5/6] efi: permit multiple entries in persistent memreserve data structure
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 4/6] efi/arm: defer persistent reservations until after paging_init()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 3/6] ARM: mm: permit early_memremap() to be used in paging_init()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 2/6] ARM: mm: permit memblock resizing right after mapping the linear region
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 1/6] arm64: memblock: don't permit memblock resizing until linear mapping is up
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 0/6] arm/efi: fix memblock reallocation crash due to persistent reservations
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 2/4] efi/arm: defer persistent reservations until after paging_init()
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/4] efi/arm: defer persistent reservations until after paging_init()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 2/4] efi/arm: defer persistent reservations until after paging_init()
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/4] efi/arm: defer persistent reservations until after paging_init()
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH v10 2/7] x86/boot: Copy kstrtoull() to compressed period
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v10 1/7] x86/boot: Introduce cmdline_find_option_arg()to detect if option=arg in cmdline
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH 2/4] efi/arm: defer persistent reservations until after paging_init()
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Masayoshi Mizuma <msys.mizuma@xxxxxxxxx>
- Re: [PATCH 0/4] arm/efi: fix memblock reallocation crash due to persistent reservations
- From: Will Deacon <will.deacon@xxxxxxx>
- Re: [PATCH 0/4] arm/efi: fix memblock reallocation crash due to persistent reservations
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 0/4] arm/efi: fix memblock reallocation crash due to persistent reservations
- From: Will Deacon <will.deacon@xxxxxxx>
- Re: [PATCH 1/4] arm64: memblock: don't permit memblock resizing until linear mapping is up
- From: Will Deacon <will.deacon@xxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 2/4] efi/arm: defer persistent reservations until after paging_init()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 0/4] arm/efi: fix memblock reallocation crash due to persistent reservations
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Masayoshi Mizuma <msys.mizuma@xxxxxxxxx>
- Re: [PATCH v10 2/7] x86/boot: Copy kstrtoull() to compressed period
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 0/4] arm/efi: fix memblock reallocation crash due to persistent reservations
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 2/4] efi/arm: defer persistent reservations until after paging_init()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 2/4] efi/arm: defer persistent reservations until after paging_init()
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 0/4] arm/efi: fix memblock reallocation crash due to persistent reservations
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH 1/4] EFI stub: remove -fdata-sections
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 1/4] EFI stub: remove -fdata-sections
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH] efi/libstub: Disable some warnings for x86{,_64}
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 1/4] EFI stub: remove -fdata-sections
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Baoquan He <bhe@xxxxxxxxxx>
- [PATCH 1/4] EFI stub: remove -fdata-sections
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH 0/4] Enable deadcode elimination at link time
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH] efi/libstub: Disable some warnings for x86{,_64}
- From: Sedat Dilek <sedat.dilek@xxxxxxxxx>
- Re: [PATCH v10 1/7] x86/boot: Introduce cmdline_find_option_arg()to detect if option=arg in cmdline
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH 4/4] efi: reduce the amount of memblock reservations for persistent allocations
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 3/4] efi: permit multiple entries in persistent memreserve data structure
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 2/4] efi/arm: defer persistent reservations until after paging_init()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 1/4] arm64: memblock: don't permit memblock resizing until linear mapping is up
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 0/4] arm/efi: fix memblock reallocation crash due to persistent reservations
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [Bug Report] kdump crashes after latest EFI memblock changes on arm64 machines with large number of CPUs
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [Bug Report] kdump crashes after latest EFI memblock changes on arm64 machines with large number of CPUs
- From: Will Deacon <will.deacon@xxxxxxx>
- Re: [PATCH V3 0/3] Unmap EFI boot services code/data regions after boot.
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V3 0/3] Unmap EFI boot services code/data regions after boot.
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH V3 1/3] x86/mm/pageattr: Introduce helper function to unmap EFI boot services
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH] efi: Fix debugobjects warning on efi_rts_work
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi/libstub: Disable some warnings for x86{,_64}
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V3 0/3] Unmap EFI boot services code/data regions after boot.
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 2/2] efi/fdt: Simplify get_fdt flow
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 1/2] efi/fdt: Indentation fix
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [Bug Report] kdump crashes after latest EFI memblock changes on arm64 machines with large number of CPUs
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [Bug Report] kdump crashes after latest EFI memblock changes on arm64 machines with large number of CPUs
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: [PATCH V3 1/3] x86/mm/pageattr: Introduce helper function to unmap EFI boot services
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V3 2/3] x86/efi: Unmap EFI boot services code/data regions from efi_pgd
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V3 1/3] x86/mm/pageattr: Introduce helper function to unmap EFI boot services
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V3 3/3] x86/efi: Move efi_<reserve/free>_boot_services() to arch/x86
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V3 0/3] Unmap EFI boot services code/data regions after boot.
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH v5 2/2] efi: take size of partition entry from GPT header
- From: Eugene Korenevsky <ekorenevsky@xxxxxxxxx>
- [PATCH v5 1/2] efi: add sanity checks for GPT entries
- From: Eugene Korenevsky <ekorenevsky@xxxxxxxxx>
- [Bug Report] kdump crashes after latest EFI memblock changes on arm64 machines with large number of CPUs
- From: Bhupesh Sharma <bhsharma@xxxxxxxxxx>
- Re: [PATCH v10 0/7] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v10 0/7] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v10 0/7] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- RE: [PATCH V2 1/2] x86/efi: Unmap EFI boot services code/data regions from efi_pgd
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- RE: [PATCH V2 1/2] x86/efi: Unmap EFI boot services code/data regions from efi_pgd
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- RE: [PATCH V2 1/2] x86/efi: Unmap EFI boot services code/data regions from efi_pgd
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- RE: [PATCH V2 1/2] x86/efi: Unmap EFI boot services code/data regions from efi_pgd
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- RE: [PATCH V2 1/2] x86/efi: Unmap EFI boot services code/data regions from efi_pgd
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH V2 1/2] x86/efi: Unmap EFI boot services code/data regions from efi_pgd
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH V2 2/2] x86/efi: Move efi_<reserve/free>_boot_services() to arch/x86
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH V2 1/2] x86/efi: Unmap EFI boot services code/data regions from efi_pgd
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH V2 1/2] x86/efi: Unmap EFI boot services code/data regions from efi_pgd
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 0/8] add generic builtin command line
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/8] add generic builtin command line
- From: Will Deacon <will.deacon@xxxxxxx>
- [PATCH v2 1/2] efi/fdt: Indentation fix
- From: Julien Thierry <julien.thierry@xxxxxxx>
- [PATCH v2 2/2] efi/fdt: Simplify get_fdt flow
- From: Julien Thierry <julien.thierry@xxxxxxx>
- [PATCH v2 0/2] efi/fdt: get_fdt cleanups
- From: Julien Thierry <julien.thierry@xxxxxxx>
- Re: [PATCH] efi/fdt: Indentation fix
- From: Julien Thierry <julien.thierry@xxxxxxx>
- RE: [PATCH V2 1/2] x86/efi: Unmap EFI boot services code/data regions from efi_pgd
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH V2 1/2] x86/efi: Unmap EFI boot services code/data regions from efi_pgd
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- [PATCH V2 2/2] x86/efi: Move efi_<reserve/free>_boot_services() to arch/x86
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V2 1/2] x86/efi: Unmap EFI boot services code/data regions from efi_pgd
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V2 0/2] Unmap EFI boot services code/data regions after boot.
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Masayoshi Mizuma <msys.mizuma@xxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Masayoshi Mizuma <msys.mizuma@xxxxxxxxx>
- Re: [PATCH 5/8] arm: convert to generic builtin command line
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/8] add generic builtin command line
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/8] add generic builtin command line
- From: Maksym Kokhan <maksym.kokhan@xxxxxxxxxxxxxxx>
- Re: [PATCH] efi/libstub: Disable some warnings for x86{,_64}
- From: Sedat Dilek <sedat.dilek@xxxxxxxxx>
- Re: [PATCH] efi/libstub: Disable some warnings for x86{,_64}
- From: Nathan Chancellor <natechancellor@xxxxxxxxx>
- RE: [PATCH] efi: Fix debugobjects warning on efi_rts_work
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH 0/8] add generic builtin command line
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/8] add generic builtin command line
- From: Maksym Kokhan <maksym.kokhan@xxxxxxxxxxxxxxx>
- [PATCH] efi: Fix debugobjects warning on efi_rts_work
- From: Waiman Long <longman@xxxxxxxxxx>
- [GIT PULL] EFI changes for v4.20
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- RE: [PATCH 1/2] x86/efi: Unmap efi boot services code/data regions from efi_pgd
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- RE: [PATCH 1/2] x86/efi: Unmap efi boot services code/data regions from efi_pgd
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Masayoshi Mizuma <msys.mizuma@xxxxxxxxx>
- Re: [PATCH 1/2] x86/efi: Unmap efi boot services code/data regions from efi_pgd
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v9 8/8] x86/boot/KASLR: Limit kaslr to choosing the immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v9 8/8] x86/boot/KASLR: Limit kaslr to choosing the immovable memory
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH v9 8/8] x86/boot/KASLR: Limit kaslr to choosing the immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- [PATCH v10 6/7] x86/boot: Dig out SRAT table from RSDP and find immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- [PATCH v10 7/7] x86/boot/KASLR: Limit kaslr to choosing the immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- [PATCH v10 3/7] x86/boot: Add efi_get_rsdp_addr() to dig out RSDP from EFI table
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- [PATCH v10 5/7] x86/boot: Add get_acpi_rsdp() to parse RSDP in cmdline from kexec
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- [PATCH v10 2/7] x86/boot: Copy kstrtoull() to compressed period
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- [PATCH v10 4/7] x86/boot: Add bios_get_rsdp_addr() to search RSDP in memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- [PATCH v10 1/7] x86/boot: Introduce cmdline_find_option_arg()to detect if option=arg in cmdline
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- [PATCH v10 0/7] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v9 5/8] x86/boot: Add get_acpi_rsdp() to parse RSDP in cmdlien from kexec
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH v9 5/8] x86/boot: Add get_acpi_rsdp() to parse RSDP in cmdlien from kexec
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v9 6/8] x86/boot: Dig out SRAT table from RSDP and find immovable memory
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH v9 5/8] x86/boot: Add get_acpi_rsdp() to parse RSDP in cmdlien from kexec
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH v9 5/8] x86/boot: Add get_acpi_rsdp() to parse RSDP in cmdlien from kexec
- From: "Fan, Chao" <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v9 6/8] x86/boot: Dig out SRAT table from RSDP and find immovable memory
- From: "Fan, Chao" <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] x86/efi: Unmap efi boot services code/data regions from efi_pgd
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- RE: [PATCH 1/2] x86/efi: Unmap efi boot services code/data regions from efi_pgd
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH 1/2] x86/efi: Unmap efi boot services code/data regions from efi_pgd
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- [PATCH 1/2] x86/efi: Unmap efi boot services code/data regions from efi_pgd
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH 2/2] x86/efi: Move efi_<reserve/free>_boot_services() to arch/x86
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH 0/2] Unmap efi boot services code/data regions after boot.
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH v9 6/8] x86/boot: Dig out SRAT table from RSDP and find immovable memory
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH v9 5/8] x86/boot: Add get_acpi_rsdp() to parse RSDP in cmdlien from kexec
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH v9 1/8] x86/boot: Introduce cmdline_find_option_arg()to detect if option=arg in cmdline
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v9 6/8] x86/boot: Dig out SRAT table from RSDP and find immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v9 3/8] x86/boot: Add efi_get_rsdp_addr() to dig out RSDP from EFI table
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v9 2/8] x86/boot: Copy kstrtoull() to compressed period
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v9 2/8] x86/boot: Copy kstrtoull() to compressed period
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH v9 7/8] x86/boot/KASLR: Walk srat tables to filter immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v9 3/8] x86/boot: Add efi_get_rsdp_addr() to dig out RSDP from EFI table
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH v9 3/8] x86/boot: Add efi_get_rsdp_addr() to dig out RSDP from EFI table
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v9 2/8] x86/boot: Copy kstrtoull() to compressed period
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v9 0/8] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v9 3/8] x86/boot: Add efi_get_rsdp_addr() to dig out RSDP from EFI table
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH v9 7/8] x86/boot/KASLR: Walk srat tables to filter immovable memory
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH v9 8/8] x86/boot/KASLR: Limit kaslr to choosing the immovable memory
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH v9 2/8] x86/boot: Copy kstrtoull() to compressed period
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH v9 1/8] x86/boot: Introduce cmdline_find_option_arg()to detect if option=arg in cmdline
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH v9 0/8] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Baoquan He <bhe@xxxxxxxxxx>
- [PATCH v9 1/8] x86/boot: Introduce cmdline_find_option_arg()to detect if option=arg in cmdline
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- [PATCH v9 3/8] x86/boot: Add efi_get_rsdp_addr() to dig out RSDP from EFI table
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- [PATCH v9 0/8] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- [PATCH v9 2/8] x86/boot: Copy kstrtoull() to compressed period
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- [PATCH v9 4/8] x86/boot: Add bios_get_rsdp_addr() to search RSDP in memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- [PATCH v9 8/8] x86/boot/KASLR: Limit kaslr to choosing the immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- [PATCH v9 7/8] x86/boot/KASLR: Walk srat tables to filter immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- [PATCH v9 6/8] x86/boot: Dig out SRAT table from RSDP and find immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- [PATCH v9 5/8] x86/boot: Add get_acpi_rsdp() to parse RSDP in cmdlien from kexec
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v8 1/3] x86/boot: Add acpitb.c to parse acpi tables
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Masayoshi Mizuma <msys.mizuma@xxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Masayoshi Mizuma <msys.mizuma@xxxxxxxxx>
- Re: [PATCH v8 1/3] x86/boot: Add acpitb.c to parse acpi tables
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v8 1/3] x86/boot: Add acpitb.c to parse acpi tables
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v8 1/3] x86/boot: Add acpitb.c to parse acpi tables
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v8 1/3] x86/boot: Add acpitb.c to parse acpi tables
- From: Masayoshi Mizuma <msys.mizuma@xxxxxxxxx>
- Re: [PATCH] efi/libstub: Disable some warnings for x86{,_64}
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH] efi/libstub: Disable some warnings for x86{,_64}
- From: Nathan Chancellor <natechancellor@xxxxxxxxx>
- Re: [PATCH] efi/libstub: Disable some warnings for x86{,_64}
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Masayoshi Mizuma <msys.mizuma@xxxxxxxxx>
- Re: [RFC PATCH] x86/efi: Allocate e820 buffer before calling efi_exit_boot_service
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH] x86/efi: Allocate e820 buffer before calling efi_exit_boot_service
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH 3.16 299/366] efi: Avoid potential crashes, fix the 'struct efi_pci_io_protocol_32' definition for mixed mode
- From: Ben Hutchings <ben@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH] x86/efi: Allocate e820 buffer before calling efi_exit_boot_service
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Masayoshi Mizuma <msys.mizuma@xxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Masayoshi Mizuma <msys.mizuma@xxxxxxxxx>
- [PATCH] efi/libstub: Disable some warnings for x86{,_64}
- From: Nathan Chancellor <natechancellor@xxxxxxxxx>
- Re: [RFC PATCH] x86/efi: Allocate e820 buffer before calling efi_exit_boot_service
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC-resend 1/2] x86/compat: Adjust in_compat_syscall() to generic code under !COMPAT
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- [RFC-resend 2/2] compat: Cleanup in_compat_syscall() callers
- From: Dmitry Safonov <dima@xxxxxxxxxx>
- [RFC-resend 1/2] x86/compat: Adjust in_compat_syscall() to generic code under !COMPAT
- From: Dmitry Safonov <dima@xxxxxxxxxx>
- [RFC-resend 0/2] compat: in_compat_syscall() differs on x86
- From: Dmitry Safonov <dima@xxxxxxxxxx>
- Re: [PATCH v8 1/3] x86/boot: Add acpitb.c to parse acpi tables
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v8 1/3] x86/boot: Add acpitb.c to parse acpi tables
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v8 1/3] x86/boot: Add acpitb.c to parse acpi tables
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v8 1/3] x86/boot: Add acpitb.c to parse acpi tables
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v8 1/3] x86/boot: Add acpitb.c to parse acpi tables
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Masayoshi Mizuma <msys.mizuma@xxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH v8 2/3] x86/boot/KASLR: Walk srat tables to filter immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- [PATCH v8 3/3] x86/boot/KASLR: Limit kaslr to choosing the immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- [PATCH v8 1/3] x86/boot: Add acpitb.c to parse acpi tables
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- [PATCH v6 5/5] x86/ima: define arch_get_ima_policy() for x86
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 4/5] ima: add support for arch specific policies
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 3/5] ima: refactor ima_init_policy()
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 2/5] ima: prevent kexec_load syscall based on runtime secureboot flag
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 1/5] x86/ima: define arch_ima_get_secureboot
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 0/6] Add support for architecture specific IMA policies
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/8] add generic builtin command line
- From: Maksym Kokhan <maksym.kokhan@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 0/6] Add support for architecture specific IMA policies
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] efi: take size of partition entry from GPT header
- From: Karel Zak <kzak@xxxxxxxxxx>
- Re: [PATCH v2] efi: take size of partition entry from GPT header
- From: Eugene Korenevsky <ekorenevsky@xxxxxxxxx>
- Re: [PATCH v4 5/6] ima: add support for external setting of ima_appraise
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 5/5] x86/ima: define arch_get_ima_policy() for x86
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 4/5] ima: add support for arch specific policies
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 3/5] ima: refactor ima_init_policy()
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 2/5] ima: prevent kexec_load syscall based on runtime secureboot flag
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 1/5] x86/ima: define arch_ima_get_secureboot
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 0/6] Add support for architecture specific IMA policies
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] efi/fdt: Indentation fix
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [GIT PULL 00/11] EFI updates for v4.20
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [GIT PULL 00/11] EFI updates for v4.20
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [GIT PULL 00/11] EFI updates for v4.20
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [GIT PULL 00/11] EFI updates for v4.20
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- [PATCH] efi/fdt: Indentation fix
- From: Julien Thierry <julien.thierry@xxxxxxx>
- Re: [PATCH 0/8] add generic builtin command line
- Re: [PATCH v4 3/6] ima: refactor ima_init_policy()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 0/8] add generic builtin command line
- From: Daniel Walker <danielwa@xxxxxxxxx>
- Re: [PATCH 0/8] add generic builtin command line
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 6/8] arm64: convert to generic builtin command line
- From: Maksym Kokhan <maksym.kokhan@xxxxxxxxxxxxxxx>
- [PATCH 5/8] arm: convert to generic builtin command line
- From: Maksym Kokhan <maksym.kokhan@xxxxxxxxxxxxxxx>
- [PATCH 3/8] efi: modify EFI stub code for arm/arm64
- From: Maksym Kokhan <maksym.kokhan@xxxxxxxxxxxxxxx>
- [PATCH 1/8] add generic builtin command line
- From: Maksym Kokhan <maksym.kokhan@xxxxxxxxxxxxxxx>
- [PATCH 0/8] add generic builtin command line
- From: Maksym Kokhan <maksym.kokhan@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 6/6] x86/ima: define arch_get_ima_policy() for x86
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 4/6] ima: add support for arch specific policies
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 5/6] ima: add support for external setting of ima_appraise
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 3/6] ima: refactor ima_init_policy()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/6] x86/ima: define arch_ima_get_secureboot
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 2/6] ima: prevent kexec_load syscall based on runtime secureboot flag
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [GIT PULL 00/11] EFI updates for v4.20
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH 01/11] efi: honour memory reservations passed via a linux specific config table
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 03/11] efi: add API to reserve memory persistently across kexec reboot
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 05/11] efi/efi_test: add exporting ResetSystem runtime service
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 11/11] x86: boot: Fix EFI stub alignment
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 10/11] efi/x86: Call efi_parse_options() from efi_main()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 09/11] efi/x86: earlyprintk - Add 64bit efi fb address support
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 08/11] efi/x86: drop task_lock() from efi_switch_mm()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 07/11] efi/x86: Handle page faults occurring while running EFI runtime services
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 06/11] efi: Make efi_rts_work accessible to efi page fault handler
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 04/11] efi/libstub: arm: support building with clang
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 02/11] efi/arm: libstub: add a root memreserve config table
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [GIT PULL 00/11] EFI updates for v4.20
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 4/6] ima: add support for arch specific policies
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 5/6] ima: add support for external setting of ima_appraise
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 6/6] x86/ima: define arch_get_ima_policy() for x86
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 3/6] ima: refactor ima_init_policy()
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 2/6] ima: prevent kexec_load syscall based on runtime secureboot flag
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 1/6] x86/ima: define arch_ima_get_secureboot
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 0/6] Add support for architecture specific IMA policies
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] efi: add support for persistent memory reservations
- From: Jeremy Linton <jeremy.linton@xxxxxxx>
- Re: [PATCH v7 1/3] x86/boot: Add acpitb.c to parse acpi tables
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v7 3/3] x86/boot/KASLR: Limit kaslr to choosing the immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- [PATCH 4.9 079/111] efi/esrt: Only call efi_mem_reserve() for boot services memory
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.18 167/235] efi/esrt: Only call efi_mem_reserve() for boot services memory
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.14 122/173] efi/esrt: Only call efi_mem_reserve() for boot services memory
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/6] ima: refactor ima_init_policy()
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 3/3] x86/boot/KASLR: Limit kaslr to choosing the immovable memory
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v7 2/3] x86/boot/KASLR: Walk srat tables to filter immovable memory
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v7 1/3] x86/boot: Add acpitb.c to parse acpi tables
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 0/3] efi: add support for persistent memory reservations
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH 0/3] efi: add support for persistent memory reservations
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 0/3] efi: add support for persistent memory reservations
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH 0/3] efi: add support for persistent memory reservations
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 0/3] efi: add support for persistent memory reservations
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- [PATCH 3/3] efi: add API to reserve memory persistently across kexec reboot
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 2/3] efi/arm: libstub: add a root memreserve config table
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 1/3] efi: honour memory reservations passed via a linux specific config table
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 0/3] efi: add support for persistent memory reservations
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v3 3/6] ima: refactor ima_init_policy()
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- [PATCH v3 2/6] ima: prevent kexec_load syscall based on runtime secureboot flag
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 5/6] ima: add support for external setting of ima_appraise
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 6/6] x86/ima: define arch_get_ima_policy() for x86
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 4/6] ima: add support for arch specific policies
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 3/6] ima: refactor ima_init_policy()
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 1/6] x86/ima: define arch_ima_get_secureboot
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 0/6] Add support for architecture specific IMA policies
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL 0/1] EFI fix for v4.19-rc
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH] x86: boot: Fix EFI stub alignment
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 1/1] efi/libstub/arm: default EFI_ARMSTUB_DTB_LOADER to y
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [GIT PULL 0/1] EFI fix for v4.19-rc
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] x86: boot: Fix EFI stub alignment
- From: Ben Hutchings <ben@xxxxxxxxxxxxxxx>
- [PATCH AUTOSEL 4.18 24/92] efi/esrt: Only call efi_mem_reserve() for boot services memory
- From: Sasha Levin <Alexander.Levin@xxxxxxxxxxxxx>
- [PATCH AUTOSEL 4.14 18/57] efi/esrt: Only call efi_mem_reserve() for boot services memory
- From: Sasha Levin <Alexander.Levin@xxxxxxxxxxxxx>
- [PATCH AUTOSEL 4.9 09/34] efi/esrt: Only call efi_mem_reserve() for boot services memory
- From: Sasha Levin <Alexander.Levin@xxxxxxxxxxxxx>
- Re: [PATCH v2 6/6] x86/ima: define arch_get_ima_policy() for x86
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2] efi: take size of partition entry from GPT header
- From: "kzak@xxxxxxxxxx" <kzak@xxxxxxxxxx>
- RE: [PATCH v2] efi: take size of partition entry from GPT header
- From: David Laight <David.Laight@xxxxxxxxxx>
- [PATCH v2 2/6] ima: prevent kexec_load syscall based on runtime secureboot flag
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 6/6] x86/ima: define arch_get_ima_policy() for x86
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 5/6] ima: add support for external setting of ima_appraise
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 4/6] ima: add support for arch specific policies
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 3/6] ima: refactor ima_init_policy()
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 1/6] ima: define arch_ima_get_secureboot
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 0/6] Add support for architecture specific IMA policies
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] efi: take size of partition entry from GPT header
- From: Eugene Korenevsky <ekorenevsky@xxxxxxxxx>
- Re: [PATCH v3] efi: take size of partition entry from GPT header
- From: Eugene Korenevsky <ekorenevsky@xxxxxxxxx>
- RE: [PATCH v3] efi: take size of partition entry from GPT header
- From: David Laight <David.Laight@xxxxxxxxxx>
- RE: [PATCH v2] efi: take size of partition entry from GPT header
- From: David Laight <David.Laight@xxxxxxxxxx>
- [PATCH v7 3/3] x86/boot/KASLR: Limit kaslr to choosing the immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- [PATCH v7 1/3] x86/boot: Add acpitb.c to parse acpi tables
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- [PATCH v7 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- [PATCH v7 2/3] x86/boot/KASLR: Walk srat tables to filter immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- [PATCH v4] efi: take size of partition entry from GPT header
- From: Eugene Korenevsky <ekorenevsky@xxxxxxxxx>
- Re: [PATCH v2] efi/x86: Call efi_parse_options() from efi_main()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi/efi_test: add exporting ResetSystem runtime service
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: [PATCH V6 2/2] x86/efi: Add efi page fault handler to recover from page faults caused by the firmware
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH V6 2/2] x86/efi: Add efi page fault handler to recover from page faults caused by the firmware
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V6 2/2] x86/efi: Add efi page fault handler to recover from page faults caused by the firmware
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v3] efi: take size of partition entry from GPT header
- From: Davidlohr Bueso <dave@xxxxxxxxxxxx>
- Re: [PATCH v2] x86/efi: earlyprintk - Add 64bit efi fb address support
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3] efi: take size of partition entry from GPT header
- From: Eugene Korenevsky <ekorenevsky@xxxxxxxxx>
- [PATCH v2] efi/x86: Call efi_parse_options() from efi_main()
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH] efi/x86: Call efi_parse_options() from efi_main()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2] x86/efi: earlyprintk - Add 64bit efi fb address support
- From: Aaron Ma <aaron.ma@xxxxxxxxxxxxx>
- RE: [PATCH V6 0/2] Add efi page fault handler to recover from page
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH] efi/x86: Call efi_parse_options() from efi_main()
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH] x86/efi: earlyprintk - Add 64bit efi fb address support
- From: Aaron Ma <aaron.ma@xxxxxxxxxxxxx>
- Re: [PATCH] efi/x86: Call efi_parse_options() from efi_main()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] x86/efi: earlyprintk - Add 64bit efi fb address support
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V6 0/2] Add efi page fault handler to recover from page
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] efi/x86: Call efi_parse_options() from efi_main()
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [REGRESSION] boot-screen override by "34db50e55656 efifb: Copy the ACPI BGRT"
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v2] efi: take size of partition entry from GPT header
- From: Karel Zak <kzak@xxxxxxxxxx>
- Re: [PATCH v6 1/3] x86/boot: Add acpitb.c to parse acpi tables
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2] efi: take size of partition entry from GPT header
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2] efi: take size of partition entry from GPT header
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2] efi: take size of partition entry from GPT header
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH] efi/libstub/arm: default EFI_ARMSTUB_DTB_LOADER to y
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- [PATCH V6 1/2] efi: Make efi_rts_work accessible to efi page fault handler
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V6 2/2] x86/efi: Add efi page fault handler to recover from page faults caused by the firmware
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V6 0/2] Add efi page fault handler to recover from page
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- Re: Random crashes with i386 and efi boots
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- [PATCH] x86/efi: Load fixmap GDT in efi_call_phys_epilog() before setting %cr3
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: Random crashes with i386 and efi boots
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: Random crashes with i386 and efi boots
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: Random crashes with i386 and efi boots
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: Random crashes with i386 and efi boots
- From: Joerg Roedel <jroedel@xxxxxxx>
- Re: [PATCH v2] efi: take size of partition entry from GPT header
- From: Eugene Korenevsky <ekorenevsky@xxxxxxxxx>
- Re: Random crashes with i386 and efi boots
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v2] efi: take size of partition entry from GPT header
- From: Davidlohr Bueso <dave@xxxxxxxxxxxx>
- [PATCH v2] efi: take size of partition entry from GPT header
- From: Eugene Korenevsky <ekorenevsky@xxxxxxxxx>
- Re: Random crashes with i386 and efi boots
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: Random crashes with i386 and efi boots
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v1 4/4] ACPI / x86: utils: Get rid of custom ICPU() macro
- From: "Rafael J. Wysocki" <rjw@xxxxxxxxxxxxx>
- Re: [PATCH v1 3/4] ACPI / LPSS: Get rid of custom ICPU() macro
- From: "Rafael J. Wysocki" <rjw@xxxxxxxxxxxxx>
- Re: [RFC PATCH] x86/boot: get_acpi_srat_table() can be static
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v6 1/3] x86/boot: Add acpitb.c to parse acpi tables
- From: kbuild test robot <lkp@xxxxxxxxx>
- [RFC PATCH] x86/boot: get_acpi_srat_table() can be static
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- Re: [PATCH V5 2/2] x86/efi: Add efi page fault handler to recover from page faults caused by the firmware
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH V5 2/2] x86/efi: Add efi page fault handler to recover from page faults caused by the firmware
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v6 1/3] x86/boot: Add acpitb.c to parse acpi tables
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v6 1/3] x86/boot: Add acpitb.c to parse acpi tables
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- Re: [PATCH v6 1/3] x86/boot: Add acpitb.c to parse acpi tables
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Random crashes with i386 and efi boots
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH v6 1/3] x86/boot: Add acpitb.c to parse acpi tables
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- RE: [PATCH V5 0/2] Add efi page fault handler to recover from page
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V5 2/2] x86/efi: Add efi page fault handler to recover from page faults caused by the firmware
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V5 0/2] Add efi page fault handler to recover from page
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V5 1/2] efi: Make efi_rts_work accessible to efi page fault handler
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH] efi: take size of partition entry from GPT header
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] efi: take size of partition entry from GPT header
- From: Eugene Korenevsky <ekorenevsky@xxxxxxxxx>
- [PATCH v6 1/3] x86/boot: Add acpitb.c to parse acpi tables
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH] x86/efi: earlyprintk - Add 64bit efi fb address support
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH RESEND] efi_stub: update documentation on dtb= parameter
- From: Jonathan Corbet <corbet@xxxxxxx>
- [PATCH] x86/efi: earlyprintk - Add 64bit efi fb address support
- From: Aaron Ma <aaron.ma@xxxxxxxxxxxxx>
- Re: [PATCH V4 3/3] x86/efi: Introduce EFI_PAGE_FAULT_HANDLER
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH V4 3/3] x86/efi: Introduce EFI_PAGE_FAULT_HANDLER
- From: Bhupesh Sharma <bhsharma@xxxxxxxxxx>
- RE: [PATCH V4 3/3] x86/efi: Introduce EFI_PAGE_FAULT_HANDLER
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- RE: [PATCH V4 0/3] Add efi page fault handler to recover from page
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- RE: [PATCH V4 3/3] x86/efi: Introduce EFI_PAGE_FAULT_HANDLER
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH V4 0/3] Add efi page fault handler to recover from page
- From: Bhupesh Sharma <bhsharma@xxxxxxxxxx>
- Re: [PATCH V4 3/3] x86/efi: Introduce EFI_PAGE_FAULT_HANDLER
- From: Bhupesh Sharma <bhsharma@xxxxxxxxxx>
- RE: [PATCH V4 0/3] Add efi page fault handler to recover from page
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- RE: [PATCH V4 2/3] x86/efi: Add efi page fault handler to recover from page faults caused by the firmware
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- RE: [PATCH V4 3/3] x86/efi: Introduce EFI_PAGE_FAULT_HANDLER
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH V4 3/3] x86/efi: Introduce EFI_PAGE_FAULT_HANDLER
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH V4 2/3] x86/efi: Add efi page fault handler to recover from page faults caused by the firmware
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH RESEND] efi_stub: update documentation on dtb= parameter
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V4 0/3] Add efi page fault handler to recover from page
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH V4 2/3] x86/efi: Add efi page fault handler to recover from page faults caused by the firmware
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V4 1/3] efi: Make efi_rts_work accessible to efi page fault handler
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V4 3/3] x86/efi: Introduce EFI_PAGE_FAULT_HANDLER
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V4 0/3] Add efi page fault handler to recover from page
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH RESEND] efi_stub: update documentation on dtb= parameter
- From: Grant Likely <grant.likely@xxxxxxx>
- Re: [PATCH] efi_stub: update documentation on dtb= parameter
- From: Grant Likely <Grant.Likely@xxxxxxx>
- RE: [PATCH V3 3/5] x86/efi: Permanently save the EFI_MEMORY_MAP passed by the firmware
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH] efi_stub: update documentation on dtb= parameter
- From: Jonathan Corbet <corbet@xxxxxxx>
- Re: [PATCH V3 3/5] x86/efi: Permanently save the EFI_MEMORY_MAP passed by the firmware
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi_stub: update documentation on dtb= parameter
- From: Olof Johansson <olof@xxxxxxxxx>
- Re: [PATCH] efi_stub: update documentation on dtb= parameter
- From: Alexander Graf <agraf@xxxxxxx>
- Re: [PATCH] efi_stub: update documentation on dtb= parameter
- From: Leif Lindholm <leif.lindholm@xxxxxxxxxx>
- [PATCH] efi_stub: update documentation on dtb= parameter
- From: Grant Likely <grant.likely@xxxxxxx>
- RE: [PATCH V3 3/5] x86/efi: Permanently save the EFI_MEMORY_MAP passed by the firmware
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH 2/5 V6] x86/ioremap: strengthen the logic in early_memremap_pgprot_adjust() to adjust encryption mask
- From: lijiang <lijiang@xxxxxxxxxx>
- Re: [PATCH V3 3/5] x86/efi: Permanently save the EFI_MEMORY_MAP passed by the firmware
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH V3 3/5] x86/efi: Permanently save the EFI_MEMORY_MAP passed by the firmware
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V3 3/5] x86/efi: Permanently save the EFI_MEMORY_MAP passed by the firmware
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH V3 3/5] x86/efi: Permanently save the EFI_MEMORY_MAP passed by the firmware
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V3 3/5] x86/efi: Permanently save the EFI_MEMORY_MAP passed by the firmware
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 2/5 V6] x86/ioremap: strengthen the logic in early_memremap_pgprot_adjust() to adjust encryption mask
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH 2/5 V6] x86/ioremap: strengthen the logic in early_memremap_pgprot_adjust() to adjust encryption mask
- From: lijiang <lijiang@xxxxxxxxxx>
- RE: [PATCH V3 2/5] efi: Introduce __efi_init attribute
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V3 2/5] efi: Introduce __efi_init attribute
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V3 5/5] x86/efi: Introduce EFI_WARN_ON_ILLEGAL_ACCESS
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V3 3/5] x86/efi: Permanently save the EFI_MEMORY_MAP passed by the firmware
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V3 4/5] x86/efi: Add efi page fault handler to recover from the page faults caused by firmware
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V3 1/5] efi: Make efi_rts_work accessible to efi page fault handler
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V3 0/5] Add efi page fault handler to detect and recover
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH v1 2/4] x86/efi: Get rid of custom ICPU() macro
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 2/5 V6] x86/ioremap: strengthen the logic in early_memremap_pgprot_adjust() to adjust encryption mask
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH 2/5 V6] x86/ioremap: strengthen the logic in early_memremap_pgprot_adjust() to adjust encryption mask
- From: Dave Young <dyoung@xxxxxxxxxx>
- RE: [PATCH V2 4/6] x86/efi: Add efi page fault handler to fixup/recover from page faults caused by firmware
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- RE: [PATCH V2 5/6] x86/mm: If in_atomic(), allocate pages without sleeping
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [REGRESSION] boot-screen override by "34db50e55656 efifb: Copy the ACPI BGRT"
- From: David Herrmann <dh.herrmann@xxxxxxxxx>
- Re: [REGRESSION] boot-screen override by "34db50e55656 efifb: Copy the ACPI BGRT"
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [REGRESSION] boot-screen override by "34db50e55656 efifb: Copy the ACPI BGRT"
- From: Bartlomiej Zolnierkiewicz <b.zolnierkie@xxxxxxxxxxx>
- [REGRESSION] boot-screen override by "34db50e55656 efifb: Copy the ACPI BGRT"
- From: David Herrmann <dh.herrmann@xxxxxxxxx>
- Re: [PATCH V2 4/6] x86/efi: Add efi page fault handler to fixup/recover from page faults caused by firmware
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH V2 5/6] x86/mm: If in_atomic(), allocate pages without sleeping
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH V2 5/6] x86/mm: If in_atomic(), allocate pages without sleeping
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- RE: [PATCH V2 2/6] x86/efi: Remove __init attribute from memory mapping functions
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH V2 2/6] x86/efi: Remove __init attribute from memory mapping functions
- From: Borislav Petkov <bp@xxxxxxxxx>
- RE: [PATCH V2 2/6] x86/efi: Remove __init attribute from memory mapping functions
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH V2 2/6] x86/efi: Remove __init attribute from memory mapping functions
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH V2 5/6] x86/mm: If in_atomic(), allocate pages without sleeping
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V2 3/6] x86/efi: Permanently save the EFI_MEMORY_MAP passed by the firmware
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V2 6/6] x86/efi: Introduce EFI_WARN_ON_ILLEGAL_ACCESS
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V2 1/6] efi: Make efi_rts_work accessible to efi page fault handler
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V2 2/6] x86/efi: Remove __init attribute from memory mapping functions
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V2 4/6] x86/efi: Add efi page fault handler to fixup/recover from page faults caused by firmware
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V2 0/6] Add efi page fault handler to fix/recover from
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH 4.4 103/105] Revert "x86/mm/pat: Ensure cpa->pfn only contains page frame numbers"
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 1/4] x86/cpu: Introduce INTEL_CPU_FAM*_NODATA() helper macros
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH v1 1/4] x86/cpu: Introduce INTEL_CPU_FAM*_NODATA() helper macros
- From: Andi Kleen <ak@xxxxxxxxxxxxxxx>
- Re: question regarding partition detection on efi boot
- From: daggs <daggs@xxxxxxx>
- [PATCH v1 1/4] x86/cpu: Introduce INTEL_CPU_FAM*_NODATA() helper macros
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- [PATCH v1 3/4] ACPI / LPSS: Get rid of custom ICPU() macro
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- [PATCH v1 4/4] ACPI / x86: utils: Get rid of custom ICPU() macro
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- [PATCH v1 2/4] x86/efi: Get rid of custom ICPU() macro
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- [PATCH] x86/efi: Load fixmap GDT in efi_call_phys_epilog()
- From: Joerg Roedel <joro@xxxxxxxxxx>
- Re: [PATCH 4.4 103/105] Revert "x86/mm/pat: Ensure cpa->pfn only contains page frame numbers"
- From: Guillaume Tucker <guillaume.tucker@xxxxxxxxxxxxx>
- Re: question regarding partition detection on efi boot
- From: Bhupesh Sharma <bhsharma@xxxxxxxxxx>
- Re: question regarding partition detection on efi boot
- From: daggs <daggs@xxxxxxx>
- Re: question regarding partition detection on efi boot
- From: Bhupesh Sharma <bhsharma@xxxxxxxxxx>
- question regarding partition detection on efi boot
- From: daggs <daggs@xxxxxxx>
- Re: [PATCH 4.4 103/105] Revert "x86/mm/pat: Ensure cpa->pfn only contains page frame numbers"
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4.4 103/105] Revert "x86/mm/pat: Ensure cpa->pfn only contains page frame numbers"
- From: Roland Dreier <roland@xxxxxxxxxxxxxxx>
- Re: [PATCH 4.4 018/107] x86/paravirt: Make native_save_fl() extern inline
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH v5 2/4] x86/boot: Add acpitb.c to parse acpi tables
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH 4.4 103/105] Revert "x86/mm/pat: Ensure cpa->pfn only contains page frame numbers"
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH 4.4 103/105] Revert "x86/mm/pat: Ensure cpa->pfn only contains page frame numbers"
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4.4 103/105] Revert "x86/mm/pat: Ensure cpa->pfn only contains page frame numbers"
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH 4.4 018/107] x86/paravirt: Make native_save_fl() extern inline
- From: Ben Hutchings <ben.hutchings@xxxxxxxxxxxxxxx>
- Re: [PATCH 4.4 103/105] Revert "x86/mm/pat: Ensure cpa->pfn only contains page frame numbers"
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH 4.4 103/105] Revert "x86/mm/pat: Ensure cpa->pfn only contains page frame numbers"
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH 4.4 103/105] Revert "x86/mm/pat: Ensure cpa->pfn only contains page frame numbers"
- From: Roland Dreier <roland@xxxxxxxxxxxxxxx>
- Re: [PATCH 4.4 103/105] Revert "x86/mm/pat: Ensure cpa->pfn only contains page frame numbers"
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH 4.4 103/105] Revert "x86/mm/pat: Ensure cpa->pfn only contains page frame numbers"
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH 4.4 103/105] Revert "x86/mm/pat: Ensure cpa->pfn only contains page frame numbers"
- From: Roland Dreier <roland@xxxxxxxxxxxxxxx>
- Re: [PATCH 4.4 103/105] Revert "x86/mm/pat: Ensure cpa->pfn only contains page frame numbers"
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4.4 103/105] Revert "x86/mm/pat: Ensure cpa->pfn only contains page frame numbers"
- From: Roland Dreier <roland@xxxxxxxxxxxxxxx>
- Re: [PATCH 4.4 103/105] Revert "x86/mm/pat: Ensure cpa->pfn only contains page frame numbers"
- From: Ben Hutchings <ben.hutchings@xxxxxxxxxxxxxxx>
- Re: [PATCH 4.4 103/105] Revert "x86/mm/pat: Ensure cpa->pfn only contains page frame numbers"
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86, kdump: Fix efi=noruntime NULL pointer dereference
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH] x86, kdump: Fix efi=noruntime NULL pointer dereference
- From: Mike Galbraith <efault@xxxxxx>
- Re: [PATCH 4.4 103/105] Revert "x86/mm/pat: Ensure cpa->pfn only contains page frame numbers"
- From: Roland Dreier <roland@xxxxxxxxxxxxxxx>
- Re: efisubsys_init takes more than a few milliseconds
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 4.4 103/105] Revert "x86/mm/pat: Ensure cpa->pfn only contains page frame numbers"
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86, kdump: Fix efi=noruntime NULL pointer dereference
- From: Mike Galbraith <efault@xxxxxx>
- Re: [PATCH] x86, kdump: Fix efi=noruntime NULL pointer dereference
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH 4.4 103/105] Revert "x86/mm/pat: Ensure cpa->pfn only contains page frame numbers"
- From: Roland Dreier <roland@xxxxxxxxxxxxxxx>
- Re: efisubsys_init takes more than a few milliseconds
- From: Paul Menzel <pmenzel+linux-efi@xxxxxxxxxxxxx>
- Re: [PATCH] x86, kdump: Fix efi=noruntime NULL pointer dereference
- From: Dave Young <dyoung@xxxxxxxxxx>
- [PATCH] efi/efi_test: add exporting ResetSystem runtime service
- From: Ivan Hu <ivan.hu@xxxxxxxxxxxxx>
- Re: [PATCH] x86, kdump: Fix efi=noruntime NULL pointer dereference
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi/libstub: arm: support building with clang
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] x86/mm: Simplify p[g4um]d_page() macros
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH] x86/mm: Simplify p[g4um]d_page() macros
- From: Andi Kleen <andi@xxxxxxxxxxxxxx>
- Re: [PATCH] x86/mm: Simplify p[g4um]d_page() macros
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [PATCH] x86/mm: Simplify p[g4um]d_page() macros
- From: Andi Kleen <andi@xxxxxxxxxxxxxx>
- Re: [PATCH] efi/libstub: arm: support building with clang
- From: Stefan Agner <stefan@xxxxxxxx>
- Re: [PATCH V1 6/6] x86/efi: Introduce EFI_WARN_ON_ILLEGAL_ACCESSES
- From: Bhupesh Sharma <bhsharma@xxxxxxxxxx>
- RE: [PATCH V1 6/6] x86/efi: Introduce EFI_WARN_ON_ILLEGAL_ACCESSES
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH V1 6/6] x86/efi: Introduce EFI_WARN_ON_ILLEGAL_ACCESSES
- From: Bhupesh Sharma <bhsharma@xxxxxxxxxx>
- [PATCH] efi/libstub: arm: support building with clang
- From: Alistair Strachan <astrachan@xxxxxxxxxx>
- [RFC PATCH] x86/efi: Allocate e820 buffer before calling efi_exit_boot_service
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH] x86, kdump: Fix efi=noruntime NULL pointer dereference
- From: Dave Young <dyoung@xxxxxxxxxx>
- [PATCH V1 4/6] x86/efi: Add efi page fault handler to fixup/recover from page faults caused by firmware
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V1 3/6] x86/efi: Permanently save the EFI_MEMORY_MAP passed by the firmware
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V1 5/6] x86/mm: If in_atomic(), allocate pages without sleeping
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V1 6/6] x86/efi: Introduce EFI_WARN_ON_ILLEGAL_ACCESSES
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V1 2/6] x86/efi: Remove __init attribute from memory mapping functions
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V1 1/6] efi: Make efi_rts_work accessible to efi page fault handler
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V1 0/6] Add efi page fault handler to fix/recover from
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- RE: [PATCH RFC 0/8] Add efi page fault handler to fix/recover from
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH RFC 0/8] Add efi page fault handler to fix/recover from
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- RE: [PATCH RFC 0/8] Add efi page fault handler to fix/recover from
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH RFC 0/8] Add efi page fault handler to fix/recover from
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: [PATCH RFC 0/8] Add efi page fault handler to fix/recover from
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [RFC PATCH 0/2] efi: add contents of LinuxExtraArgs EFI var to command line
- From: Geoff Levand <geoff@xxxxxxxxxxxxx>
- Re: [PATCH 0/6][RFC] Add EFI secure key to key retention service
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH 0/6][RFC] Add EFI secure key to key retention service
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 0/6][RFC] Add EFI secure key to key retention service
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/6][RFC] Add EFI secure key to key retention service
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH 1/6] x86/KASLR: make getting random long number function public
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH 2/6] efi: the function transfers status to string
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 1/6] x86/KASLR: make getting random long number function public
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 0/6][RFC] Add EFI secure key to key retention service
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 6/6] key: enforce the secure boot checking when loading efi root key
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 5/6] key: add EFI secure key as a master key type
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 4/6] key: add EFI secure key type
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 3/6] efi: generate efi root key in EFI boot stub
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 2/6] efi: the function transfers status to string
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 1/6] x86/KASLR: make getting random long number function public
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 0/6][RFC] Add EFI secure key to key retention service
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 4.17 17/31] x86/efi: Access EFI MMIO data as unencrypted when SEV is active
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/4] ima: add support for KEXEC_ORIG_KERNEL_CHECK
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 3/4] ima: add support for KEXEC_ORIG_KERNEL_CHECK
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- Re: [PATCH 3/4] ima: add support for KEXEC_ORIG_KERNEL_CHECK
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 3/4] ima: add support for KEXEC_ORIG_KERNEL_CHECK
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
[Index of Archives]
[Linux Kernel Development]
[Security]
[Linux ARM Kernel]
[Tools]
[Linux MIPS]
[Linux S390]
[Bugtraq]
[Share Photos]>
[Fedora ARM]