Linux EFI/UEFI Development
[Prev Page][Next Page]
- Re: [PATCH v10 1/7] x86/boot: Introduce cmdline_find_option_arg()to detect if option=arg in cmdline
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH 2/4] efi/arm: defer persistent reservations until after paging_init()
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Masayoshi Mizuma <msys.mizuma@xxxxxxxxx>
- Re: [PATCH 0/4] arm/efi: fix memblock reallocation crash due to persistent reservations
- From: Will Deacon <will.deacon@xxxxxxx>
- Re: [PATCH 0/4] arm/efi: fix memblock reallocation crash due to persistent reservations
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 0/4] arm/efi: fix memblock reallocation crash due to persistent reservations
- From: Will Deacon <will.deacon@xxxxxxx>
- Re: [PATCH 1/4] arm64: memblock: don't permit memblock resizing until linear mapping is up
- From: Will Deacon <will.deacon@xxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 2/4] efi/arm: defer persistent reservations until after paging_init()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 0/4] arm/efi: fix memblock reallocation crash due to persistent reservations
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Masayoshi Mizuma <msys.mizuma@xxxxxxxxx>
- Re: [PATCH v10 2/7] x86/boot: Copy kstrtoull() to compressed period
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 0/4] arm/efi: fix memblock reallocation crash due to persistent reservations
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 2/4] efi/arm: defer persistent reservations until after paging_init()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 2/4] efi/arm: defer persistent reservations until after paging_init()
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 0/4] arm/efi: fix memblock reallocation crash due to persistent reservations
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH 1/4] EFI stub: remove -fdata-sections
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 1/4] EFI stub: remove -fdata-sections
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH] efi/libstub: Disable some warnings for x86{,_64}
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 1/4] EFI stub: remove -fdata-sections
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Baoquan He <bhe@xxxxxxxxxx>
- [PATCH 1/4] EFI stub: remove -fdata-sections
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- [PATCH 0/4] Enable deadcode elimination at link time
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH] efi/libstub: Disable some warnings for x86{,_64}
- From: Sedat Dilek <sedat.dilek@xxxxxxxxx>
- Re: [PATCH v10 1/7] x86/boot: Introduce cmdline_find_option_arg()to detect if option=arg in cmdline
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH 4/4] efi: reduce the amount of memblock reservations for persistent allocations
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 3/4] efi: permit multiple entries in persistent memreserve data structure
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 2/4] efi/arm: defer persistent reservations until after paging_init()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 1/4] arm64: memblock: don't permit memblock resizing until linear mapping is up
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 0/4] arm/efi: fix memblock reallocation crash due to persistent reservations
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [Bug Report] kdump crashes after latest EFI memblock changes on arm64 machines with large number of CPUs
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [Bug Report] kdump crashes after latest EFI memblock changes on arm64 machines with large number of CPUs
- From: Will Deacon <will.deacon@xxxxxxx>
- Re: [PATCH V3 0/3] Unmap EFI boot services code/data regions after boot.
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V3 0/3] Unmap EFI boot services code/data regions after boot.
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH V3 1/3] x86/mm/pageattr: Introduce helper function to unmap EFI boot services
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH] efi: Fix debugobjects warning on efi_rts_work
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi/libstub: Disable some warnings for x86{,_64}
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V3 0/3] Unmap EFI boot services code/data regions after boot.
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 2/2] efi/fdt: Simplify get_fdt flow
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 1/2] efi/fdt: Indentation fix
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [Bug Report] kdump crashes after latest EFI memblock changes on arm64 machines with large number of CPUs
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [Bug Report] kdump crashes after latest EFI memblock changes on arm64 machines with large number of CPUs
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: [PATCH V3 1/3] x86/mm/pageattr: Introduce helper function to unmap EFI boot services
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V3 2/3] x86/efi: Unmap EFI boot services code/data regions from efi_pgd
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V3 1/3] x86/mm/pageattr: Introduce helper function to unmap EFI boot services
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V3 3/3] x86/efi: Move efi_<reserve/free>_boot_services() to arch/x86
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V3 0/3] Unmap EFI boot services code/data regions after boot.
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH v5 2/2] efi: take size of partition entry from GPT header
- From: Eugene Korenevsky <ekorenevsky@xxxxxxxxx>
- [PATCH v5 1/2] efi: add sanity checks for GPT entries
- From: Eugene Korenevsky <ekorenevsky@xxxxxxxxx>
- [Bug Report] kdump crashes after latest EFI memblock changes on arm64 machines with large number of CPUs
- From: Bhupesh Sharma <bhsharma@xxxxxxxxxx>
- Re: [PATCH v10 0/7] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v10 0/7] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v10 0/7] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- RE: [PATCH V2 1/2] x86/efi: Unmap EFI boot services code/data regions from efi_pgd
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- RE: [PATCH V2 1/2] x86/efi: Unmap EFI boot services code/data regions from efi_pgd
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- RE: [PATCH V2 1/2] x86/efi: Unmap EFI boot services code/data regions from efi_pgd
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- RE: [PATCH V2 1/2] x86/efi: Unmap EFI boot services code/data regions from efi_pgd
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- RE: [PATCH V2 1/2] x86/efi: Unmap EFI boot services code/data regions from efi_pgd
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH V2 1/2] x86/efi: Unmap EFI boot services code/data regions from efi_pgd
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH V2 2/2] x86/efi: Move efi_<reserve/free>_boot_services() to arch/x86
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH V2 1/2] x86/efi: Unmap EFI boot services code/data regions from efi_pgd
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH V2 1/2] x86/efi: Unmap EFI boot services code/data regions from efi_pgd
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 0/8] add generic builtin command line
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/8] add generic builtin command line
- From: Will Deacon <will.deacon@xxxxxxx>
- [PATCH v2 1/2] efi/fdt: Indentation fix
- From: Julien Thierry <julien.thierry@xxxxxxx>
- [PATCH v2 2/2] efi/fdt: Simplify get_fdt flow
- From: Julien Thierry <julien.thierry@xxxxxxx>
- [PATCH v2 0/2] efi/fdt: get_fdt cleanups
- From: Julien Thierry <julien.thierry@xxxxxxx>
- Re: [PATCH] efi/fdt: Indentation fix
- From: Julien Thierry <julien.thierry@xxxxxxx>
- RE: [PATCH V2 1/2] x86/efi: Unmap EFI boot services code/data regions from efi_pgd
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH V2 1/2] x86/efi: Unmap EFI boot services code/data regions from efi_pgd
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- [PATCH V2 2/2] x86/efi: Move efi_<reserve/free>_boot_services() to arch/x86
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V2 1/2] x86/efi: Unmap EFI boot services code/data regions from efi_pgd
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V2 0/2] Unmap EFI boot services code/data regions after boot.
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Masayoshi Mizuma <msys.mizuma@xxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Masayoshi Mizuma <msys.mizuma@xxxxxxxxx>
- Re: [PATCH 5/8] arm: convert to generic builtin command line
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/8] add generic builtin command line
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/8] add generic builtin command line
- From: Maksym Kokhan <maksym.kokhan@xxxxxxxxxxxxxxx>
- Re: [PATCH] efi/libstub: Disable some warnings for x86{,_64}
- From: Sedat Dilek <sedat.dilek@xxxxxxxxx>
- Re: [PATCH] efi/libstub: Disable some warnings for x86{,_64}
- From: Nathan Chancellor <natechancellor@xxxxxxxxx>
- RE: [PATCH] efi: Fix debugobjects warning on efi_rts_work
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH 0/8] add generic builtin command line
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/8] add generic builtin command line
- From: Maksym Kokhan <maksym.kokhan@xxxxxxxxxxxxxxx>
- [PATCH] efi: Fix debugobjects warning on efi_rts_work
- From: Waiman Long <longman@xxxxxxxxxx>
- [GIT PULL] EFI changes for v4.20
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- RE: [PATCH 1/2] x86/efi: Unmap efi boot services code/data regions from efi_pgd
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- RE: [PATCH 1/2] x86/efi: Unmap efi boot services code/data regions from efi_pgd
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Masayoshi Mizuma <msys.mizuma@xxxxxxxxx>
- Re: [PATCH 1/2] x86/efi: Unmap efi boot services code/data regions from efi_pgd
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v9 8/8] x86/boot/KASLR: Limit kaslr to choosing the immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v9 8/8] x86/boot/KASLR: Limit kaslr to choosing the immovable memory
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH v9 8/8] x86/boot/KASLR: Limit kaslr to choosing the immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- [PATCH v10 6/7] x86/boot: Dig out SRAT table from RSDP and find immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- [PATCH v10 7/7] x86/boot/KASLR: Limit kaslr to choosing the immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- [PATCH v10 3/7] x86/boot: Add efi_get_rsdp_addr() to dig out RSDP from EFI table
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- [PATCH v10 5/7] x86/boot: Add get_acpi_rsdp() to parse RSDP in cmdline from kexec
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- [PATCH v10 2/7] x86/boot: Copy kstrtoull() to compressed period
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- [PATCH v10 4/7] x86/boot: Add bios_get_rsdp_addr() to search RSDP in memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- [PATCH v10 1/7] x86/boot: Introduce cmdline_find_option_arg()to detect if option=arg in cmdline
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- [PATCH v10 0/7] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v9 5/8] x86/boot: Add get_acpi_rsdp() to parse RSDP in cmdlien from kexec
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH v9 5/8] x86/boot: Add get_acpi_rsdp() to parse RSDP in cmdlien from kexec
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v9 6/8] x86/boot: Dig out SRAT table from RSDP and find immovable memory
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH v9 5/8] x86/boot: Add get_acpi_rsdp() to parse RSDP in cmdlien from kexec
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH v9 5/8] x86/boot: Add get_acpi_rsdp() to parse RSDP in cmdlien from kexec
- From: "Fan, Chao" <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v9 6/8] x86/boot: Dig out SRAT table from RSDP and find immovable memory
- From: "Fan, Chao" <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] x86/efi: Unmap efi boot services code/data regions from efi_pgd
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- RE: [PATCH 1/2] x86/efi: Unmap efi boot services code/data regions from efi_pgd
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH 1/2] x86/efi: Unmap efi boot services code/data regions from efi_pgd
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- [PATCH 1/2] x86/efi: Unmap efi boot services code/data regions from efi_pgd
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH 2/2] x86/efi: Move efi_<reserve/free>_boot_services() to arch/x86
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH 0/2] Unmap efi boot services code/data regions after boot.
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH v9 6/8] x86/boot: Dig out SRAT table from RSDP and find immovable memory
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH v9 5/8] x86/boot: Add get_acpi_rsdp() to parse RSDP in cmdlien from kexec
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH v9 1/8] x86/boot: Introduce cmdline_find_option_arg()to detect if option=arg in cmdline
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v9 6/8] x86/boot: Dig out SRAT table from RSDP and find immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v9 3/8] x86/boot: Add efi_get_rsdp_addr() to dig out RSDP from EFI table
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v9 2/8] x86/boot: Copy kstrtoull() to compressed period
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v9 2/8] x86/boot: Copy kstrtoull() to compressed period
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH v9 7/8] x86/boot/KASLR: Walk srat tables to filter immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v9 3/8] x86/boot: Add efi_get_rsdp_addr() to dig out RSDP from EFI table
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH v9 3/8] x86/boot: Add efi_get_rsdp_addr() to dig out RSDP from EFI table
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v9 2/8] x86/boot: Copy kstrtoull() to compressed period
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v9 0/8] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v9 3/8] x86/boot: Add efi_get_rsdp_addr() to dig out RSDP from EFI table
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH v9 7/8] x86/boot/KASLR: Walk srat tables to filter immovable memory
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH v9 8/8] x86/boot/KASLR: Limit kaslr to choosing the immovable memory
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH v9 2/8] x86/boot: Copy kstrtoull() to compressed period
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH v9 1/8] x86/boot: Introduce cmdline_find_option_arg()to detect if option=arg in cmdline
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH v9 0/8] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Baoquan He <bhe@xxxxxxxxxx>
- [PATCH v9 1/8] x86/boot: Introduce cmdline_find_option_arg()to detect if option=arg in cmdline
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- [PATCH v9 3/8] x86/boot: Add efi_get_rsdp_addr() to dig out RSDP from EFI table
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- [PATCH v9 0/8] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- [PATCH v9 2/8] x86/boot: Copy kstrtoull() to compressed period
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- [PATCH v9 4/8] x86/boot: Add bios_get_rsdp_addr() to search RSDP in memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- [PATCH v9 8/8] x86/boot/KASLR: Limit kaslr to choosing the immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- [PATCH v9 7/8] x86/boot/KASLR: Walk srat tables to filter immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- [PATCH v9 6/8] x86/boot: Dig out SRAT table from RSDP and find immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- [PATCH v9 5/8] x86/boot: Add get_acpi_rsdp() to parse RSDP in cmdlien from kexec
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v8 1/3] x86/boot: Add acpitb.c to parse acpi tables
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Masayoshi Mizuma <msys.mizuma@xxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Masayoshi Mizuma <msys.mizuma@xxxxxxxxx>
- Re: [PATCH v8 1/3] x86/boot: Add acpitb.c to parse acpi tables
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v8 1/3] x86/boot: Add acpitb.c to parse acpi tables
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v8 1/3] x86/boot: Add acpitb.c to parse acpi tables
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v8 1/3] x86/boot: Add acpitb.c to parse acpi tables
- From: Masayoshi Mizuma <msys.mizuma@xxxxxxxxx>
- Re: [PATCH] efi/libstub: Disable some warnings for x86{,_64}
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH] efi/libstub: Disable some warnings for x86{,_64}
- From: Nathan Chancellor <natechancellor@xxxxxxxxx>
- Re: [PATCH] efi/libstub: Disable some warnings for x86{,_64}
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Masayoshi Mizuma <msys.mizuma@xxxxxxxxx>
- Re: [RFC PATCH] x86/efi: Allocate e820 buffer before calling efi_exit_boot_service
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH] x86/efi: Allocate e820 buffer before calling efi_exit_boot_service
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH 3.16 299/366] efi: Avoid potential crashes, fix the 'struct efi_pci_io_protocol_32' definition for mixed mode
- From: Ben Hutchings <ben@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH] x86/efi: Allocate e820 buffer before calling efi_exit_boot_service
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Masayoshi Mizuma <msys.mizuma@xxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Masayoshi Mizuma <msys.mizuma@xxxxxxxxx>
- [PATCH] efi/libstub: Disable some warnings for x86{,_64}
- From: Nathan Chancellor <natechancellor@xxxxxxxxx>
- Re: [RFC PATCH] x86/efi: Allocate e820 buffer before calling efi_exit_boot_service
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC-resend 1/2] x86/compat: Adjust in_compat_syscall() to generic code under !COMPAT
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- [RFC-resend 2/2] compat: Cleanup in_compat_syscall() callers
- From: Dmitry Safonov <dima@xxxxxxxxxx>
- [RFC-resend 1/2] x86/compat: Adjust in_compat_syscall() to generic code under !COMPAT
- From: Dmitry Safonov <dima@xxxxxxxxxx>
- [RFC-resend 0/2] compat: in_compat_syscall() differs on x86
- From: Dmitry Safonov <dima@xxxxxxxxxx>
- Re: [PATCH v8 1/3] x86/boot: Add acpitb.c to parse acpi tables
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v8 1/3] x86/boot: Add acpitb.c to parse acpi tables
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v8 1/3] x86/boot: Add acpitb.c to parse acpi tables
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v8 1/3] x86/boot: Add acpitb.c to parse acpi tables
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v8 1/3] x86/boot: Add acpitb.c to parse acpi tables
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Masayoshi Mizuma <msys.mizuma@xxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH v8 2/3] x86/boot/KASLR: Walk srat tables to filter immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- [PATCH v8 3/3] x86/boot/KASLR: Limit kaslr to choosing the immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- [PATCH v8 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- [PATCH v8 1/3] x86/boot: Add acpitb.c to parse acpi tables
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- [PATCH v6 5/5] x86/ima: define arch_get_ima_policy() for x86
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 4/5] ima: add support for arch specific policies
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 3/5] ima: refactor ima_init_policy()
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 2/5] ima: prevent kexec_load syscall based on runtime secureboot flag
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 1/5] x86/ima: define arch_ima_get_secureboot
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 0/6] Add support for architecture specific IMA policies
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/8] add generic builtin command line
- From: Maksym Kokhan <maksym.kokhan@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 0/6] Add support for architecture specific IMA policies
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] efi: take size of partition entry from GPT header
- From: Karel Zak <kzak@xxxxxxxxxx>
- Re: [PATCH v2] efi: take size of partition entry from GPT header
- From: Eugene Korenevsky <ekorenevsky@xxxxxxxxx>
- Re: [PATCH v4 5/6] ima: add support for external setting of ima_appraise
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 5/5] x86/ima: define arch_get_ima_policy() for x86
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 4/5] ima: add support for arch specific policies
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 3/5] ima: refactor ima_init_policy()
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 2/5] ima: prevent kexec_load syscall based on runtime secureboot flag
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 1/5] x86/ima: define arch_ima_get_secureboot
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 0/6] Add support for architecture specific IMA policies
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] efi/fdt: Indentation fix
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [GIT PULL 00/11] EFI updates for v4.20
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [GIT PULL 00/11] EFI updates for v4.20
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [GIT PULL 00/11] EFI updates for v4.20
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [GIT PULL 00/11] EFI updates for v4.20
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- [PATCH] efi/fdt: Indentation fix
- From: Julien Thierry <julien.thierry@xxxxxxx>
- Re: [PATCH 0/8] add generic builtin command line
- Re: [PATCH v4 3/6] ima: refactor ima_init_policy()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 0/8] add generic builtin command line
- From: Daniel Walker <danielwa@xxxxxxxxx>
- Re: [PATCH 0/8] add generic builtin command line
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 6/8] arm64: convert to generic builtin command line
- From: Maksym Kokhan <maksym.kokhan@xxxxxxxxxxxxxxx>
- [PATCH 5/8] arm: convert to generic builtin command line
- From: Maksym Kokhan <maksym.kokhan@xxxxxxxxxxxxxxx>
- [PATCH 3/8] efi: modify EFI stub code for arm/arm64
- From: Maksym Kokhan <maksym.kokhan@xxxxxxxxxxxxxxx>
- [PATCH 1/8] add generic builtin command line
- From: Maksym Kokhan <maksym.kokhan@xxxxxxxxxxxxxxx>
- [PATCH 0/8] add generic builtin command line
- From: Maksym Kokhan <maksym.kokhan@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 6/6] x86/ima: define arch_get_ima_policy() for x86
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 4/6] ima: add support for arch specific policies
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 5/6] ima: add support for external setting of ima_appraise
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 3/6] ima: refactor ima_init_policy()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/6] x86/ima: define arch_ima_get_secureboot
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 2/6] ima: prevent kexec_load syscall based on runtime secureboot flag
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [GIT PULL 00/11] EFI updates for v4.20
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH 01/11] efi: honour memory reservations passed via a linux specific config table
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 03/11] efi: add API to reserve memory persistently across kexec reboot
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 05/11] efi/efi_test: add exporting ResetSystem runtime service
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 11/11] x86: boot: Fix EFI stub alignment
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 10/11] efi/x86: Call efi_parse_options() from efi_main()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 09/11] efi/x86: earlyprintk - Add 64bit efi fb address support
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 08/11] efi/x86: drop task_lock() from efi_switch_mm()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 07/11] efi/x86: Handle page faults occurring while running EFI runtime services
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 06/11] efi: Make efi_rts_work accessible to efi page fault handler
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 04/11] efi/libstub: arm: support building with clang
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 02/11] efi/arm: libstub: add a root memreserve config table
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [GIT PULL 00/11] EFI updates for v4.20
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 4/6] ima: add support for arch specific policies
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 5/6] ima: add support for external setting of ima_appraise
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 6/6] x86/ima: define arch_get_ima_policy() for x86
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 3/6] ima: refactor ima_init_policy()
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 2/6] ima: prevent kexec_load syscall based on runtime secureboot flag
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 1/6] x86/ima: define arch_ima_get_secureboot
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 0/6] Add support for architecture specific IMA policies
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] efi: add support for persistent memory reservations
- From: Jeremy Linton <jeremy.linton@xxxxxxx>
- Re: [PATCH v7 1/3] x86/boot: Add acpitb.c to parse acpi tables
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v7 3/3] x86/boot/KASLR: Limit kaslr to choosing the immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- [PATCH 4.9 079/111] efi/esrt: Only call efi_mem_reserve() for boot services memory
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.18 167/235] efi/esrt: Only call efi_mem_reserve() for boot services memory
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.14 122/173] efi/esrt: Only call efi_mem_reserve() for boot services memory
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/6] ima: refactor ima_init_policy()
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 3/3] x86/boot/KASLR: Limit kaslr to choosing the immovable memory
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v7 2/3] x86/boot/KASLR: Walk srat tables to filter immovable memory
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v7 1/3] x86/boot: Add acpitb.c to parse acpi tables
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 0/3] efi: add support for persistent memory reservations
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH 0/3] efi: add support for persistent memory reservations
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 0/3] efi: add support for persistent memory reservations
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH 0/3] efi: add support for persistent memory reservations
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 0/3] efi: add support for persistent memory reservations
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- [PATCH 3/3] efi: add API to reserve memory persistently across kexec reboot
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 2/3] efi/arm: libstub: add a root memreserve config table
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 1/3] efi: honour memory reservations passed via a linux specific config table
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 0/3] efi: add support for persistent memory reservations
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v3 3/6] ima: refactor ima_init_policy()
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- [PATCH v3 2/6] ima: prevent kexec_load syscall based on runtime secureboot flag
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 5/6] ima: add support for external setting of ima_appraise
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 6/6] x86/ima: define arch_get_ima_policy() for x86
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 4/6] ima: add support for arch specific policies
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 3/6] ima: refactor ima_init_policy()
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 1/6] x86/ima: define arch_ima_get_secureboot
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 0/6] Add support for architecture specific IMA policies
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL 0/1] EFI fix for v4.19-rc
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH] x86: boot: Fix EFI stub alignment
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 1/1] efi/libstub/arm: default EFI_ARMSTUB_DTB_LOADER to y
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [GIT PULL 0/1] EFI fix for v4.19-rc
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] x86: boot: Fix EFI stub alignment
- From: Ben Hutchings <ben@xxxxxxxxxxxxxxx>
- [PATCH AUTOSEL 4.18 24/92] efi/esrt: Only call efi_mem_reserve() for boot services memory
- From: Sasha Levin <Alexander.Levin@xxxxxxxxxxxxx>
- [PATCH AUTOSEL 4.14 18/57] efi/esrt: Only call efi_mem_reserve() for boot services memory
- From: Sasha Levin <Alexander.Levin@xxxxxxxxxxxxx>
- [PATCH AUTOSEL 4.9 09/34] efi/esrt: Only call efi_mem_reserve() for boot services memory
- From: Sasha Levin <Alexander.Levin@xxxxxxxxxxxxx>
- Re: [PATCH v2 6/6] x86/ima: define arch_get_ima_policy() for x86
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2] efi: take size of partition entry from GPT header
- From: "kzak@xxxxxxxxxx" <kzak@xxxxxxxxxx>
- RE: [PATCH v2] efi: take size of partition entry from GPT header
- From: David Laight <David.Laight@xxxxxxxxxx>
- [PATCH v2 2/6] ima: prevent kexec_load syscall based on runtime secureboot flag
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 6/6] x86/ima: define arch_get_ima_policy() for x86
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 5/6] ima: add support for external setting of ima_appraise
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 4/6] ima: add support for arch specific policies
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 3/6] ima: refactor ima_init_policy()
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 1/6] ima: define arch_ima_get_secureboot
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 0/6] Add support for architecture specific IMA policies
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] efi: take size of partition entry from GPT header
- From: Eugene Korenevsky <ekorenevsky@xxxxxxxxx>
- Re: [PATCH v3] efi: take size of partition entry from GPT header
- From: Eugene Korenevsky <ekorenevsky@xxxxxxxxx>
- RE: [PATCH v3] efi: take size of partition entry from GPT header
- From: David Laight <David.Laight@xxxxxxxxxx>
- RE: [PATCH v2] efi: take size of partition entry from GPT header
- From: David Laight <David.Laight@xxxxxxxxxx>
- [PATCH v7 3/3] x86/boot/KASLR: Limit kaslr to choosing the immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- [PATCH v7 1/3] x86/boot: Add acpitb.c to parse acpi tables
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- [PATCH v7 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- [PATCH v7 2/3] x86/boot/KASLR: Walk srat tables to filter immovable memory
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- [PATCH v4] efi: take size of partition entry from GPT header
- From: Eugene Korenevsky <ekorenevsky@xxxxxxxxx>
- Re: [PATCH v2] efi/x86: Call efi_parse_options() from efi_main()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi/efi_test: add exporting ResetSystem runtime service
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: [PATCH V6 2/2] x86/efi: Add efi page fault handler to recover from page faults caused by the firmware
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH V6 2/2] x86/efi: Add efi page fault handler to recover from page faults caused by the firmware
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V6 2/2] x86/efi: Add efi page fault handler to recover from page faults caused by the firmware
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v3] efi: take size of partition entry from GPT header
- From: Davidlohr Bueso <dave@xxxxxxxxxxxx>
- Re: [PATCH v2] x86/efi: earlyprintk - Add 64bit efi fb address support
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3] efi: take size of partition entry from GPT header
- From: Eugene Korenevsky <ekorenevsky@xxxxxxxxx>
- [PATCH v2] efi/x86: Call efi_parse_options() from efi_main()
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH] efi/x86: Call efi_parse_options() from efi_main()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2] x86/efi: earlyprintk - Add 64bit efi fb address support
- From: Aaron Ma <aaron.ma@xxxxxxxxxxxxx>
- RE: [PATCH V6 0/2] Add efi page fault handler to recover from page
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH] efi/x86: Call efi_parse_options() from efi_main()
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH] x86/efi: earlyprintk - Add 64bit efi fb address support
- From: Aaron Ma <aaron.ma@xxxxxxxxxxxxx>
- Re: [PATCH] efi/x86: Call efi_parse_options() from efi_main()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] x86/efi: earlyprintk - Add 64bit efi fb address support
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V6 0/2] Add efi page fault handler to recover from page
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] efi/x86: Call efi_parse_options() from efi_main()
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [REGRESSION] boot-screen override by "34db50e55656 efifb: Copy the ACPI BGRT"
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v2] efi: take size of partition entry from GPT header
- From: Karel Zak <kzak@xxxxxxxxxx>
- Re: [PATCH v6 1/3] x86/boot: Add acpitb.c to parse acpi tables
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2] efi: take size of partition entry from GPT header
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2] efi: take size of partition entry from GPT header
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2] efi: take size of partition entry from GPT header
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH] efi/libstub/arm: default EFI_ARMSTUB_DTB_LOADER to y
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- [PATCH V6 1/2] efi: Make efi_rts_work accessible to efi page fault handler
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V6 2/2] x86/efi: Add efi page fault handler to recover from page faults caused by the firmware
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V6 0/2] Add efi page fault handler to recover from page
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- Re: Random crashes with i386 and efi boots
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- [PATCH] x86/efi: Load fixmap GDT in efi_call_phys_epilog() before setting %cr3
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: Random crashes with i386 and efi boots
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: Random crashes with i386 and efi boots
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: Random crashes with i386 and efi boots
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: Random crashes with i386 and efi boots
- From: Joerg Roedel <jroedel@xxxxxxx>
- Re: [PATCH v2] efi: take size of partition entry from GPT header
- From: Eugene Korenevsky <ekorenevsky@xxxxxxxxx>
- Re: Random crashes with i386 and efi boots
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v2] efi: take size of partition entry from GPT header
- From: Davidlohr Bueso <dave@xxxxxxxxxxxx>
- [PATCH v2] efi: take size of partition entry from GPT header
- From: Eugene Korenevsky <ekorenevsky@xxxxxxxxx>
- Re: Random crashes with i386 and efi boots
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: Random crashes with i386 and efi boots
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v1 4/4] ACPI / x86: utils: Get rid of custom ICPU() macro
- From: "Rafael J. Wysocki" <rjw@xxxxxxxxxxxxx>
- Re: [PATCH v1 3/4] ACPI / LPSS: Get rid of custom ICPU() macro
- From: "Rafael J. Wysocki" <rjw@xxxxxxxxxxxxx>
- Re: [RFC PATCH] x86/boot: get_acpi_srat_table() can be static
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v6 1/3] x86/boot: Add acpitb.c to parse acpi tables
- From: kbuild test robot <lkp@xxxxxxxxx>
- [RFC PATCH] x86/boot: get_acpi_srat_table() can be static
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- Re: [PATCH V5 2/2] x86/efi: Add efi page fault handler to recover from page faults caused by the firmware
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH V5 2/2] x86/efi: Add efi page fault handler to recover from page faults caused by the firmware
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v6 1/3] x86/boot: Add acpitb.c to parse acpi tables
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH v6 1/3] x86/boot: Add acpitb.c to parse acpi tables
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- Re: [PATCH v6 1/3] x86/boot: Add acpitb.c to parse acpi tables
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Random crashes with i386 and efi boots
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH v6 1/3] x86/boot: Add acpitb.c to parse acpi tables
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- RE: [PATCH V5 0/2] Add efi page fault handler to recover from page
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V5 2/2] x86/efi: Add efi page fault handler to recover from page faults caused by the firmware
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V5 0/2] Add efi page fault handler to recover from page
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V5 1/2] efi: Make efi_rts_work accessible to efi page fault handler
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH] efi: take size of partition entry from GPT header
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] efi: take size of partition entry from GPT header
- From: Eugene Korenevsky <ekorenevsky@xxxxxxxxx>
- [PATCH v6 1/3] x86/boot: Add acpitb.c to parse acpi tables
- From: Chao Fan <fanc.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH] x86/efi: earlyprintk - Add 64bit efi fb address support
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH RESEND] efi_stub: update documentation on dtb= parameter
- From: Jonathan Corbet <corbet@xxxxxxx>
- [PATCH] x86/efi: earlyprintk - Add 64bit efi fb address support
- From: Aaron Ma <aaron.ma@xxxxxxxxxxxxx>
- Re: [PATCH V4 3/3] x86/efi: Introduce EFI_PAGE_FAULT_HANDLER
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH V4 3/3] x86/efi: Introduce EFI_PAGE_FAULT_HANDLER
- From: Bhupesh Sharma <bhsharma@xxxxxxxxxx>
- RE: [PATCH V4 3/3] x86/efi: Introduce EFI_PAGE_FAULT_HANDLER
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- RE: [PATCH V4 0/3] Add efi page fault handler to recover from page
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- RE: [PATCH V4 3/3] x86/efi: Introduce EFI_PAGE_FAULT_HANDLER
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH V4 0/3] Add efi page fault handler to recover from page
- From: Bhupesh Sharma <bhsharma@xxxxxxxxxx>
- Re: [PATCH V4 3/3] x86/efi: Introduce EFI_PAGE_FAULT_HANDLER
- From: Bhupesh Sharma <bhsharma@xxxxxxxxxx>
- RE: [PATCH V4 0/3] Add efi page fault handler to recover from page
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- RE: [PATCH V4 2/3] x86/efi: Add efi page fault handler to recover from page faults caused by the firmware
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- RE: [PATCH V4 3/3] x86/efi: Introduce EFI_PAGE_FAULT_HANDLER
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH V4 3/3] x86/efi: Introduce EFI_PAGE_FAULT_HANDLER
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH V4 2/3] x86/efi: Add efi page fault handler to recover from page faults caused by the firmware
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH RESEND] efi_stub: update documentation on dtb= parameter
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V4 0/3] Add efi page fault handler to recover from page
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH V4 2/3] x86/efi: Add efi page fault handler to recover from page faults caused by the firmware
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V4 1/3] efi: Make efi_rts_work accessible to efi page fault handler
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V4 3/3] x86/efi: Introduce EFI_PAGE_FAULT_HANDLER
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V4 0/3] Add efi page fault handler to recover from page
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH RESEND] efi_stub: update documentation on dtb= parameter
- From: Grant Likely <grant.likely@xxxxxxx>
- Re: [PATCH] efi_stub: update documentation on dtb= parameter
- From: Grant Likely <Grant.Likely@xxxxxxx>
- RE: [PATCH V3 3/5] x86/efi: Permanently save the EFI_MEMORY_MAP passed by the firmware
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH] efi_stub: update documentation on dtb= parameter
- From: Jonathan Corbet <corbet@xxxxxxx>
- Re: [PATCH V3 3/5] x86/efi: Permanently save the EFI_MEMORY_MAP passed by the firmware
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi_stub: update documentation on dtb= parameter
- From: Olof Johansson <olof@xxxxxxxxx>
- Re: [PATCH] efi_stub: update documentation on dtb= parameter
- From: Alexander Graf <agraf@xxxxxxx>
- Re: [PATCH] efi_stub: update documentation on dtb= parameter
- From: Leif Lindholm <leif.lindholm@xxxxxxxxxx>
- [PATCH] efi_stub: update documentation on dtb= parameter
- From: Grant Likely <grant.likely@xxxxxxx>
- RE: [PATCH V3 3/5] x86/efi: Permanently save the EFI_MEMORY_MAP passed by the firmware
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH 2/5 V6] x86/ioremap: strengthen the logic in early_memremap_pgprot_adjust() to adjust encryption mask
- From: lijiang <lijiang@xxxxxxxxxx>
- Re: [PATCH V3 3/5] x86/efi: Permanently save the EFI_MEMORY_MAP passed by the firmware
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH V3 3/5] x86/efi: Permanently save the EFI_MEMORY_MAP passed by the firmware
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V3 3/5] x86/efi: Permanently save the EFI_MEMORY_MAP passed by the firmware
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH V3 3/5] x86/efi: Permanently save the EFI_MEMORY_MAP passed by the firmware
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V3 3/5] x86/efi: Permanently save the EFI_MEMORY_MAP passed by the firmware
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 2/5 V6] x86/ioremap: strengthen the logic in early_memremap_pgprot_adjust() to adjust encryption mask
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH 2/5 V6] x86/ioremap: strengthen the logic in early_memremap_pgprot_adjust() to adjust encryption mask
- From: lijiang <lijiang@xxxxxxxxxx>
- RE: [PATCH V3 2/5] efi: Introduce __efi_init attribute
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V3 2/5] efi: Introduce __efi_init attribute
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V3 5/5] x86/efi: Introduce EFI_WARN_ON_ILLEGAL_ACCESS
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V3 3/5] x86/efi: Permanently save the EFI_MEMORY_MAP passed by the firmware
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V3 4/5] x86/efi: Add efi page fault handler to recover from the page faults caused by firmware
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V3 1/5] efi: Make efi_rts_work accessible to efi page fault handler
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V3 0/5] Add efi page fault handler to detect and recover
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH v1 2/4] x86/efi: Get rid of custom ICPU() macro
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 2/5 V6] x86/ioremap: strengthen the logic in early_memremap_pgprot_adjust() to adjust encryption mask
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH 2/5 V6] x86/ioremap: strengthen the logic in early_memremap_pgprot_adjust() to adjust encryption mask
- From: Dave Young <dyoung@xxxxxxxxxx>
- RE: [PATCH V2 4/6] x86/efi: Add efi page fault handler to fixup/recover from page faults caused by firmware
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- RE: [PATCH V2 5/6] x86/mm: If in_atomic(), allocate pages without sleeping
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [REGRESSION] boot-screen override by "34db50e55656 efifb: Copy the ACPI BGRT"
- From: David Herrmann <dh.herrmann@xxxxxxxxx>
- Re: [REGRESSION] boot-screen override by "34db50e55656 efifb: Copy the ACPI BGRT"
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [REGRESSION] boot-screen override by "34db50e55656 efifb: Copy the ACPI BGRT"
- From: Bartlomiej Zolnierkiewicz <b.zolnierkie@xxxxxxxxxxx>
- [REGRESSION] boot-screen override by "34db50e55656 efifb: Copy the ACPI BGRT"
- From: David Herrmann <dh.herrmann@xxxxxxxxx>
- Re: [PATCH V2 4/6] x86/efi: Add efi page fault handler to fixup/recover from page faults caused by firmware
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH V2 5/6] x86/mm: If in_atomic(), allocate pages without sleeping
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH V2 5/6] x86/mm: If in_atomic(), allocate pages without sleeping
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- RE: [PATCH V2 2/6] x86/efi: Remove __init attribute from memory mapping functions
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH V2 2/6] x86/efi: Remove __init attribute from memory mapping functions
- From: Borislav Petkov <bp@xxxxxxxxx>
- RE: [PATCH V2 2/6] x86/efi: Remove __init attribute from memory mapping functions
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH V2 2/6] x86/efi: Remove __init attribute from memory mapping functions
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH V2 5/6] x86/mm: If in_atomic(), allocate pages without sleeping
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V2 3/6] x86/efi: Permanently save the EFI_MEMORY_MAP passed by the firmware
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V2 6/6] x86/efi: Introduce EFI_WARN_ON_ILLEGAL_ACCESS
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V2 1/6] efi: Make efi_rts_work accessible to efi page fault handler
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V2 2/6] x86/efi: Remove __init attribute from memory mapping functions
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V2 4/6] x86/efi: Add efi page fault handler to fixup/recover from page faults caused by firmware
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V2 0/6] Add efi page fault handler to fix/recover from
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH 4.4 103/105] Revert "x86/mm/pat: Ensure cpa->pfn only contains page frame numbers"
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 1/4] x86/cpu: Introduce INTEL_CPU_FAM*_NODATA() helper macros
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH v1 1/4] x86/cpu: Introduce INTEL_CPU_FAM*_NODATA() helper macros
- From: Andi Kleen <ak@xxxxxxxxxxxxxxx>
- Re: question regarding partition detection on efi boot
- From: daggs <daggs@xxxxxxx>
- [PATCH v1 1/4] x86/cpu: Introduce INTEL_CPU_FAM*_NODATA() helper macros
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- [PATCH v1 3/4] ACPI / LPSS: Get rid of custom ICPU() macro
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- [PATCH v1 4/4] ACPI / x86: utils: Get rid of custom ICPU() macro
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- [PATCH v1 2/4] x86/efi: Get rid of custom ICPU() macro
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- [PATCH] x86/efi: Load fixmap GDT in efi_call_phys_epilog()
- From: Joerg Roedel <joro@xxxxxxxxxx>
- Re: [PATCH 4.4 103/105] Revert "x86/mm/pat: Ensure cpa->pfn only contains page frame numbers"
- From: Guillaume Tucker <guillaume.tucker@xxxxxxxxxxxxx>
- Re: question regarding partition detection on efi boot
- From: Bhupesh Sharma <bhsharma@xxxxxxxxxx>
- Re: question regarding partition detection on efi boot
- From: daggs <daggs@xxxxxxx>
- Re: question regarding partition detection on efi boot
- From: Bhupesh Sharma <bhsharma@xxxxxxxxxx>
- question regarding partition detection on efi boot
- From: daggs <daggs@xxxxxxx>
- Re: [PATCH 4.4 103/105] Revert "x86/mm/pat: Ensure cpa->pfn only contains page frame numbers"
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4.4 103/105] Revert "x86/mm/pat: Ensure cpa->pfn only contains page frame numbers"
- From: Roland Dreier <roland@xxxxxxxxxxxxxxx>
- Re: [PATCH 4.4 018/107] x86/paravirt: Make native_save_fl() extern inline
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH v5 2/4] x86/boot: Add acpitb.c to parse acpi tables
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH 4.4 103/105] Revert "x86/mm/pat: Ensure cpa->pfn only contains page frame numbers"
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH 4.4 103/105] Revert "x86/mm/pat: Ensure cpa->pfn only contains page frame numbers"
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4.4 103/105] Revert "x86/mm/pat: Ensure cpa->pfn only contains page frame numbers"
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH 4.4 018/107] x86/paravirt: Make native_save_fl() extern inline
- From: Ben Hutchings <ben.hutchings@xxxxxxxxxxxxxxx>
- Re: [PATCH 4.4 103/105] Revert "x86/mm/pat: Ensure cpa->pfn only contains page frame numbers"
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH 4.4 103/105] Revert "x86/mm/pat: Ensure cpa->pfn only contains page frame numbers"
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH 4.4 103/105] Revert "x86/mm/pat: Ensure cpa->pfn only contains page frame numbers"
- From: Roland Dreier <roland@xxxxxxxxxxxxxxx>
- Re: [PATCH 4.4 103/105] Revert "x86/mm/pat: Ensure cpa->pfn only contains page frame numbers"
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH 4.4 103/105] Revert "x86/mm/pat: Ensure cpa->pfn only contains page frame numbers"
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH 4.4 103/105] Revert "x86/mm/pat: Ensure cpa->pfn only contains page frame numbers"
- From: Roland Dreier <roland@xxxxxxxxxxxxxxx>
- Re: [PATCH 4.4 103/105] Revert "x86/mm/pat: Ensure cpa->pfn only contains page frame numbers"
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4.4 103/105] Revert "x86/mm/pat: Ensure cpa->pfn only contains page frame numbers"
- From: Roland Dreier <roland@xxxxxxxxxxxxxxx>
- Re: [PATCH 4.4 103/105] Revert "x86/mm/pat: Ensure cpa->pfn only contains page frame numbers"
- From: Ben Hutchings <ben.hutchings@xxxxxxxxxxxxxxx>
- Re: [PATCH 4.4 103/105] Revert "x86/mm/pat: Ensure cpa->pfn only contains page frame numbers"
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86, kdump: Fix efi=noruntime NULL pointer dereference
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH] x86, kdump: Fix efi=noruntime NULL pointer dereference
- From: Mike Galbraith <efault@xxxxxx>
- Re: [PATCH 4.4 103/105] Revert "x86/mm/pat: Ensure cpa->pfn only contains page frame numbers"
- From: Roland Dreier <roland@xxxxxxxxxxxxxxx>
- Re: efisubsys_init takes more than a few milliseconds
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 4.4 103/105] Revert "x86/mm/pat: Ensure cpa->pfn only contains page frame numbers"
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86, kdump: Fix efi=noruntime NULL pointer dereference
- From: Mike Galbraith <efault@xxxxxx>
- Re: [PATCH] x86, kdump: Fix efi=noruntime NULL pointer dereference
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH 4.4 103/105] Revert "x86/mm/pat: Ensure cpa->pfn only contains page frame numbers"
- From: Roland Dreier <roland@xxxxxxxxxxxxxxx>
- Re: efisubsys_init takes more than a few milliseconds
- From: Paul Menzel <pmenzel+linux-efi@xxxxxxxxxxxxx>
- Re: [PATCH] x86, kdump: Fix efi=noruntime NULL pointer dereference
- From: Dave Young <dyoung@xxxxxxxxxx>
- [PATCH] efi/efi_test: add exporting ResetSystem runtime service
- From: Ivan Hu <ivan.hu@xxxxxxxxxxxxx>
- Re: [PATCH] x86, kdump: Fix efi=noruntime NULL pointer dereference
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi/libstub: arm: support building with clang
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] x86/mm: Simplify p[g4um]d_page() macros
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH] x86/mm: Simplify p[g4um]d_page() macros
- From: Andi Kleen <andi@xxxxxxxxxxxxxx>
- Re: [PATCH] x86/mm: Simplify p[g4um]d_page() macros
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [PATCH] x86/mm: Simplify p[g4um]d_page() macros
- From: Andi Kleen <andi@xxxxxxxxxxxxxx>
- Re: [PATCH] efi/libstub: arm: support building with clang
- From: Stefan Agner <stefan@xxxxxxxx>
- Re: [PATCH V1 6/6] x86/efi: Introduce EFI_WARN_ON_ILLEGAL_ACCESSES
- From: Bhupesh Sharma <bhsharma@xxxxxxxxxx>
- RE: [PATCH V1 6/6] x86/efi: Introduce EFI_WARN_ON_ILLEGAL_ACCESSES
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH V1 6/6] x86/efi: Introduce EFI_WARN_ON_ILLEGAL_ACCESSES
- From: Bhupesh Sharma <bhsharma@xxxxxxxxxx>
- [PATCH] efi/libstub: arm: support building with clang
- From: Alistair Strachan <astrachan@xxxxxxxxxx>
- [RFC PATCH] x86/efi: Allocate e820 buffer before calling efi_exit_boot_service
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH] x86, kdump: Fix efi=noruntime NULL pointer dereference
- From: Dave Young <dyoung@xxxxxxxxxx>
- [PATCH V1 4/6] x86/efi: Add efi page fault handler to fixup/recover from page faults caused by firmware
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V1 3/6] x86/efi: Permanently save the EFI_MEMORY_MAP passed by the firmware
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V1 5/6] x86/mm: If in_atomic(), allocate pages without sleeping
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V1 6/6] x86/efi: Introduce EFI_WARN_ON_ILLEGAL_ACCESSES
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V1 2/6] x86/efi: Remove __init attribute from memory mapping functions
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V1 1/6] efi: Make efi_rts_work accessible to efi page fault handler
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V1 0/6] Add efi page fault handler to fix/recover from
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- RE: [PATCH RFC 0/8] Add efi page fault handler to fix/recover from
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH RFC 0/8] Add efi page fault handler to fix/recover from
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- RE: [PATCH RFC 0/8] Add efi page fault handler to fix/recover from
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH RFC 0/8] Add efi page fault handler to fix/recover from
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: [PATCH RFC 0/8] Add efi page fault handler to fix/recover from
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [RFC PATCH 0/2] efi: add contents of LinuxExtraArgs EFI var to command line
- From: Geoff Levand <geoff@xxxxxxxxxxxxx>
- Re: [PATCH 0/6][RFC] Add EFI secure key to key retention service
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH 0/6][RFC] Add EFI secure key to key retention service
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 0/6][RFC] Add EFI secure key to key retention service
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/6][RFC] Add EFI secure key to key retention service
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH 1/6] x86/KASLR: make getting random long number function public
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH 2/6] efi: the function transfers status to string
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 1/6] x86/KASLR: make getting random long number function public
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 0/6][RFC] Add EFI secure key to key retention service
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 6/6] key: enforce the secure boot checking when loading efi root key
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 5/6] key: add EFI secure key as a master key type
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 4/6] key: add EFI secure key type
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 3/6] efi: generate efi root key in EFI boot stub
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 2/6] efi: the function transfers status to string
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 1/6] x86/KASLR: make getting random long number function public
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 0/6][RFC] Add EFI secure key to key retention service
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 4.17 17/31] x86/efi: Access EFI MMIO data as unencrypted when SEV is active
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/4] ima: add support for KEXEC_ORIG_KERNEL_CHECK
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 3/4] ima: add support for KEXEC_ORIG_KERNEL_CHECK
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- Re: [PATCH 3/4] ima: add support for KEXEC_ORIG_KERNEL_CHECK
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 3/4] ima: add support for KEXEC_ORIG_KERNEL_CHECK
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- Re: [PATCH 1/4] ima: add support for arch specific policies
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/2] efi: add contents of LinuxExtraArgs EFI var to command line
- From: Graeme Gregory <graeme.gregory@xxxxxxxxxx>
- Re: [RFC PATCH] efi/libstub: Update memory map after calling priv_func
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH] efi/libstub: Update memory map after calling priv_func
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [RFC PATCH] efi/libstub: Update memory map after calling priv_func
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [RFC PATCH] efi/libstub: Update memory map after calling priv_func
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] efi/libstub: Update memory map after calling priv_func
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH] efi/libstub: Update memory map after calling priv_func
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] efi/libstub: Update memory map after calling priv_func
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [RFC PATCH] efi/libstub: Update memory map after calling priv_func
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- [RFC PATCH] efi/libstub: Update memory map after calling priv_func
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [RFC PATCH 0/2] efi: add contents of LinuxExtraArgs EFI var to command line
- From: James Morse <james.morse@xxxxxxx>
- Re: [PATCH v2] x86/efi: drop task_lock() from efi_switch_mm()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH 0/2] efi: add contents of LinuxExtraArgs EFI var to command line
- From: Geoff Levand <geoff@xxxxxxxxxxxxx>
- Re: [PATCH 00/18] xfrm: Add compat layer
- From: Florian Westphal <fw@xxxxxxxxx>
- [GIT PULL] EFI fix
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH 00/18] xfrm: Add compat layer
- From: Dmitry Safonov <dima@xxxxxxxxxx>
- Re: [PATCH 00/18] xfrm: Add compat layer
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH 00/18] xfrm: Add compat layer
- From: Dmitry Safonov <dima@xxxxxxxxxx>
- Re: [PATCH 4/4] x86/ima: define arch_get_ima_policy() for x86
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 1/4] ima: add support for arch specific policies
- From: kbuild test robot <lkp@xxxxxxxxx>
- [RFC PATCH] ima: arch_policy_rules can be static
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- Re: [PATCH 00/18] xfrm: Add compat layer
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH 00/18] xfrm: Add compat layer
- From: Nathan Harold <nharold@xxxxxxxxxx>
- Re: [PATCH 00/18] xfrm: Add compat layer
- From: Dmitry Safonov <dima@xxxxxxxxxx>
- Re: [PATCH 00/18] xfrm: Add compat layer
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH 00/18] xfrm: Add compat layer
- From: Dmitry Safonov <dima@xxxxxxxxxx>
- Re: [PATCH 00/18] xfrm: Add compat layer
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- RE: [PATCH RFC 0/8] Add efi page fault handler to fix/recover from
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH RFC 0/8] Add efi page fault handler to fix/recover from
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: [PATCH RFC 0/8] Add efi page fault handler to fix/recover from
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH RFC 0/8] Add efi page fault handler to fix/recover from
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH RFC 0/8] Add efi page fault handler to fix/recover from
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- RE: [PATCH RFC 0/8] Add efi page fault handler to fix/recover from
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH RFC 0/8] Add efi page fault handler to fix/recover from
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH RT] rtc: Disable RTC_DRV_EFI on RT
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH RT] rtc: Disable RTC_DRV_EFI on RT
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: [PATCH RFC 0/8] Add efi page fault handler to fix/recover from
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH RT] rtc: Disable RTC_DRV_EFI on RT
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH RT] rtc: Disable RTC_DRV_EFI on RT
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH RT] rtc: Disable RTC_DRV_EFI on RT
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH RT] rtc: Disable RTC_DRV_EFI on RT
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH RT] rtc: Disable RTC_DRV_EFI on RT
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH RT] rtc: Disable RTC_DRV_EFI on RT
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH RT] rtc: Disable RTC_DRV_EFI on RT
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH RT] rtc: Disable RTC_DRV_EFI on RT
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH 00/18] xfrm: Add compat layer
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH RFC 0/8] Add efi page fault handler to fix/recover from
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 00/18] xfrm: Add compat layer
- From: Dmitry Safonov <dima@xxxxxxxxxx>
- [PATCH 02/18] compat: Cleanup in_compat_syscall() callers
- From: Dmitry Safonov <dima@xxxxxxxxxx>
- [PATCH 01/18] x86/compat: Adjust in_compat_syscall() to generic code under !COMPAT
- From: Dmitry Safonov <dima@xxxxxxxxxx>
- [PATCH 4/4] x86/ima: define arch_get_ima_policy() for x86
- From: Eric Richter <erichte@xxxxxxxxxxxxxxxxxx>
- [PATCH 3/4] ima: add support for KEXEC_ORIG_KERNEL_CHECK
- From: Eric Richter <erichte@xxxxxxxxxxxxxxxxxx>
- [PATCH 2/4] ima: add support for external setting of ima_appraise
- From: Eric Richter <erichte@xxxxxxxxxxxxxxxxxx>
- [PATCH 1/4] ima: add support for arch specific policies
- From: Eric Richter <erichte@xxxxxxxxxxxxxxxxxx>
- [PATCH 0/4] Add support for architecture-specific IMA policies
- From: Eric Richter <erichte@xxxxxxxxxxxxxxxxxx>
- RE: [PATCH RFC 0/8] Add efi page fault handler to fix/recover from
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH RFC 0/8] Add efi page fault handler to fix/recover from
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2] x86/efi: drop task_lock() from efi_switch_mm()
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- RE: [RFC PATCH] x86/efi: drop task_lock() from efi_switch_mm()
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [RFC PATCH] x86/efi: drop task_lock() from efi_switch_mm()
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [RFC PATCH] x86/efi: drop task_lock() from efi_switch_mm()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH] x86/efi: drop task_lock() from efi_switch_mm()
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [RFC PATCH] x86/efi: drop task_lock() from efi_switch_mm()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH] x86/efi: drop task_lock() from efi_switch_mm()
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [RFC PATCH] x86/efi: drop task_lock() from efi_switch_mm()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [RFC PATCH] x86/efi: drop task_lock() from efi_switch_mm()
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- [PATCH 4.4 018/107] x86/paravirt: Make native_save_fl() extern inline
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH RFC 8/8] x86/efi: Introduce EFI_WARN_ON_ILLEGAL_ACCESSES
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH RFC 7/8] x86/mm: If in_atomic(), allocate pages without sleeping
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH RFC 4/8] x86/efi: Add page fault handler to fixup/recover from page faults caused by firmware
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH RFC 5/8] x86/efi: If EFI_WARN_ON_ILLEGAL_ACCESSES is enabled don't call efi_free_boot_services()
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH RFC 3/8] x86/efi: Save kernel context before calling EFI Runtime Services
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH RFC 1/8] x86/efi: Remove __init attribute from memory mapping functions
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH RFC 6/8] x86/efi: Map EFI_BOOT_SERVICES_<CODE/DATA> regions only when EFI_WARN_ON_ILLEGAL_ACCESSES is disabled
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH RFC 2/8] x86/efi: Permanently save the EFI_MEMORY_MAP passed by firmware
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH RFC 0/8] Add efi page fault handler to fix/recover from
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH 4.17 003/101] x86/paravirt: Make native_save_fl() extern inline
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.17 002/101] x86/asm: Add _ASM_ARG* constants for argument registers to <asm/asm.h>
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.17 001/101] compiler-gcc.h: Add __attribute__((gnu_inline)) to all inline declarations
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.14 03/92] x86/paravirt: Make native_save_fl() extern inline
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.14 01/92] compiler-gcc.h: Add __attribute__((gnu_inline)) to all inline declarations
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.9 06/66] x86/asm: Add _ASM_ARG* constants for argument registers to <asm/asm.h>
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.9 05/66] compiler-gcc.h: Add __attribute__((gnu_inline)) to all inline declarations
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.4 05/31] x86/asm: Add _ASM_ARG* constants for argument registers to <asm/asm.h>
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.14 02/92] x86/asm: Add _ASM_ARG* constants for argument registers to <asm/asm.h>
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.9 07/66] x86/paravirt: Make native_save_fl() extern inline
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.4 04/31] compiler-gcc.h: Add __attribute__((gnu_inline)) to all inline declarations
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [GIT PULL 0/9] EFI changes for v4.19 (#2)
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 2/9] efi/x86: merge setup_efi_pci32 and setup_efi_pci64 routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 5/9] efi/x86: add missing NULL initialization in UGA draw protocol discovery
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 7/9] efi/x86: replace references to efi_early->is64 with efi_is_64bit()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 6/9] efi: Deduplicate efi_open_volume()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 9/9] efivars: Call guid_parse() against guid_t type of variable
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 8/9] efi/cper: Use consistent types for UUIDs
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 4/9] efi/x86: merge 32-bit and 64-bit UGA draw protocol setup routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 3/9] efi/x86: align efi_uga_draw_protocol typedef names to convention
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 1/9] efi/x86: prevent reentrant firmware calls in mixed mode
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 1/1] x86/efi: Access EFI MMIO data as unencrypted when SEV is active
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [GIT PULL 0/1] EFI fix for v4.18
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] x86/efi: Access EFI MMIO data as unencrypted when SEV is active
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC 1/2] x86/compat: Adjust in_compat_syscall() to generic code under !COMPAT
- From: Dmitry Safonov <dima@xxxxxxxxxx>
- [RFC 2/2] compat: Cleanup in_compat_syscall() callers
- From: Dmitry Safonov <dima@xxxxxxxxxx>
- [RFC 0/2] compat: in_compat_syscall() differs on x86
- From: Dmitry Safonov <dima@xxxxxxxxxx>
- Re: [PATCH] x86/efi: Access EFI MMIO data as unencrypted when SEV is active
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v6 3/3] x86: paravirt: make native_save_fl extern inline
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- [PATCH] efi/esrt: only call efi_mem_reserve() for boot services memory
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: EFI mixed mode fix for v4.18
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v1] efivars: Call guid_parse() against guid_t type of variable
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v1] efi/cper: Use consistent types for UUIDs
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v1] efi/cper: Use consistent types for UUIDs
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH v1] efi/cper: Use consistent types for UUIDs
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v1] efi/cper: Use consistent types for UUIDs
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/8] efi/x86: Use non-blocking SetVariable() for efi_delete_dummy_variable()
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- RE: [PATCH 2/8] efi/x86: Use non-blocking SetVariable() for efi_delete_dummy_variable()
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH 2/8] efi/x86: Use non-blocking SetVariable() for efi_delete_dummy_variable()
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH 0/6] efi/x86 mixed mode cleanups
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 0/6] efi/x86 mixed mode cleanups
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [efi:next 15/15] drivers/firmware/efi/libstub/efi-stub-helper.c:425:3: warning: cast to pointer from integer of different size
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [efi:next 15/15] drivers/firmware/efi/libstub/efi-stub-helper.c:425:3: warning: cast to pointer from integer of different size
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [efi:next 15/15] drivers/firmware/efi/libstub/efi-stub-helper.c:425:3: warning: cast to pointer from integer of different size
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [efi:next 15/15] drivers/firmware/efi/libstub/efi-stub-helper.c:425:3: warning: cast to pointer from integer of different size
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [efi:next 15/15] drivers/firmware/efi/libstub/efi-stub-helper.c:425:3: warning: cast to pointer from integer of different size
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [RFC PATCH 0/2] efi: add contents of LinuxExtraArgs EFI var to command line
- From: Geoff Levand <geoff@xxxxxxxxxxxxx>
- Re: [PATCH v1] efivars: Call guid_parse() against guid_t type of variable
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: EFI mixed mode fix for v4.18
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 0/6] efi/x86 mixed mode cleanups
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: EFI mixed mode fix for v4.18
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 0/6] efi/x86 mixed mode cleanups
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 0/6] efi/x86 mixed mode cleanups
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- [PATCH v1] efivars: Call guid_parse() against guid_t type of variable
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/2] efi: add contents of LinuxExtraArgs EFI var to command line
- From: Ian Campbell <ijc@xxxxxxxxxx>
- Re: [PATCH 0/6] efi/x86 mixed mode cleanups
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [RFC PATCH 0/2] efi: add contents of LinuxExtraArgs EFI var to command line
- From: Will Deacon <will.deacon@xxxxxxx>
- Re: [RFC PATCH 0/2] efi: add contents of LinuxExtraArgs EFI var to command line
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: [PATCH 0/6] efi/x86 mixed mode cleanups
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH 1/6] efi/x86: prevent reentrant firmware calls in mixed mode
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 0/6] efi/x86 mixed mode cleanups
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: [PATCH 1/6] efi/x86: prevent reentrant firmware calls in mixed mode
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- RE: [PATCH 0/6] efi/x86 mixed mode cleanups
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [RFC PATCH 0/2] efi: add contents of LinuxExtraArgs EFI var to command line
- From: Geoff Levand <geoff@xxxxxxxxxxxxx>
- Re: [RFC PATCH 0/2] efi: add contents of LinuxExtraArgs EFI var to command line
- From: Ian Campbell <ijc@xxxxxxxxxx>
- Re: [RFC PATCH 0/2] efi: add contents of LinuxExtraArgs EFI var to command line
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH 0/2] efi: add contents of LinuxExtraArgs EFI var to command line
- From: Will Deacon <will.deacon@xxxxxxx>
[Index of Archives]
[Linux Kernel Development]
[Security]
[Linux ARM Kernel]
[Tools]
[Linux MIPS]
[Linux S390]
[Bugtraq]
[Share Photos]>
[Fedora ARM]