Linux EFI/UEFI Development
[Prev Page][Next Page]
- Re: [GIT PULL] Kernel lockdown for secure boot
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [GIT PULL] Kernel lockdown for secure boot
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] Kernel lockdown for secure boot
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] Kernel lockdown for secure boot
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [GIT PULL] Kernel lockdown for secure boot
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [GIT PULL] Kernel lockdown for secure boot
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] Kernel lockdown for secure boot
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [GIT PULL] Kernel lockdown for secure boot
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] Kernel lockdown for secure boot
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [GIT PULL] Kernel lockdown for secure boot
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [GIT PULL] Kernel lockdown for secure boot
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] Kernel lockdown for secure boot
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [GIT PULL] Kernel lockdown for secure boot
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [GIT PULL] Kernel lockdown for secure boot
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [GIT PULL] Kernel lockdown for secure boot
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [GIT PULL] Kernel lockdown for secure boot
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [GIT PULL] Kernel lockdown for secure boot
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [GIT PULL] Kernel lockdown for secure boot
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [GIT PULL] Kernel lockdown for secure boot
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] Kernel lockdown for secure boot
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] Kernel lockdown for secure boot
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [GIT PULL] Kernel lockdown for secure boot
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] Kernel lockdown for secure boot
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [GIT PULL] Kernel lockdown for secure boot
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] efi: Add embedded peripheral firmware support
- From: Peter Jones <pjones@xxxxxxxxxx>
- Re: [GIT PULL] Kernel lockdown for secure boot
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [GIT PULL] Kernel lockdown for secure boot
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [GIT PULL] Kernel lockdown for secure boot
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [GIT PULL] Kernel lockdown for secure boot
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [GIT PULL] Kernel lockdown for secure boot
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH 2/2] efi: Add embedded peripheral firmware support
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- Re: [PATCH 2/2] efi: Add embedded peripheral firmware support
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- Re: [GIT PULL] Kernel lockdown for secure boot
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 2/2] efi: Add embedded peripheral firmware support
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [GIT PULL] Kernel lockdown for secure boot
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v2] x86/xen/efi: Initialize UEFI secure boot state during dom0 boot
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] Kernel lockdown for secure boot
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [GIT PULL] Kernel lockdown for secure boot
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [GIT PULL] Kernel lockdown for secure boot
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v2] x86/xen/efi: Initialize UEFI secure boot state during dom0 boot
- From: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
- Re: [PATCH v2] x86/xen/efi: Initialize UEFI secure boot state during dom0 boot
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] Kernel lockdown for secure boot
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [GIT PULL] Kernel lockdown for secure boot
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v2] x86/xen/efi: Initialize UEFI secure boot state during dom0 boot
- From: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
- Re: [GIT PULL] Kernel lockdown for secure boot
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 2/2] efi: Add embedded peripheral firmware support
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [GIT PULL] EFI updates for v4.17
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] efi: Add embedded peripheral firmware support
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- [PATCH v4 1/8] efi: Fix IA32/X64 Processor Error Record definition
- From: Yazen Ghannam <Yazen.Ghannam@xxxxxxx>
- [PATCH v4 5/8] efi: Decode IA32/X64 Cache, TLB, and Bus Check structures
- From: Yazen Ghannam <Yazen.Ghannam@xxxxxxx>
- [PATCH v4 3/8] efi: Decode IA32/X64 Processor Error Info Structure
- From: Yazen Ghannam <Yazen.Ghannam@xxxxxxx>
- [PATCH v4 7/8] efi: Decode IA32/X64 MS Check structure
- From: Yazen Ghannam <Yazen.Ghannam@xxxxxxx>
- [PATCH v4 8/8] efi: Decode IA32/X64 Context Info structure
- From: Yazen Ghannam <Yazen.Ghannam@xxxxxxx>
- [PATCH v4 6/8] efi: Decode additional IA32/X64 Bus Check fields
- From: Yazen Ghannam <Yazen.Ghannam@xxxxxxx>
- [PATCH v4 4/8] efi: Decode UEFI-defined IA32/X64 Error Structure GUIDs
- From: Yazen Ghannam <Yazen.Ghannam@xxxxxxx>
- [PATCH v4 2/8] efi: Decode IA32/X64 Processor Error Section
- From: Yazen Ghannam <Yazen.Ghannam@xxxxxxx>
- [PATCH v4 0/8] Decode IA32/X64 CPER
- From: Yazen Ghannam <Yazen.Ghannam@xxxxxxx>
- Re: [PATCH v3 3/8] efi: Decode IA32/X64 Processor Error Info Structure
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: [PATCH v3 3/8] efi: Decode IA32/X64 Processor Error Info Structure
- From: "Ghannam, Yazen" <Yazen.Ghannam@xxxxxxx>
- [GIT PULL] EFI updates for v4.17
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [RFC] arm64: extra entries in /proc/iomem for kexec
- From: AKASHI Takahiro <takahiro.akashi@xxxxxxxxxx>
- Re: [PATCH 2/2] efi: Add embedded peripheral firmware support
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 2/2] efi: Add embedded peripheral firmware support
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 1/2] efi: Export boot-services code and data as debugfs-blobs
- From: kbuild test robot <lkp@xxxxxxxxx>
- [RFC PATCH] efi: debugfs_blob[] can be static
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 1/2] efi: Export boot-services code and data as debugfs-blobs
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH 1/2] efi: Export boot-services code and data as debugfs-blobs
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Patch to replace DEFINE_SEMAPHORE with DEFINE_BINARY_SEMAPHORE
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] efi: Add embedded peripheral firmware support
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH 1/2] efi: Export boot-services code and data as debugfs-blobs
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [GIT PULL] Kernel lockdown for secure boot
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [GIT PULL] Kernel lockdown for secure boot
- From: James Morris <jmorris@xxxxxxxxx>
- [GIT PULL] Kernel lockdown for secure boot
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] efi: Ignore unrealistically large option roms
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] efi: Ignore unrealistically large option roms
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v3 3/8] efi: Decode IA32/X64 Processor Error Info Structure
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi/cper: Remove the INDENT_SP silliness
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] efi/cper: Remove the INDENT_SP silliness
- From: Borislav Petkov <bp@xxxxxxxxx>
- RE: [PATCH v3 3/8] efi: Decode IA32/X64 Processor Error Info Structure
- From: "Ghannam, Yazen" <Yazen.Ghannam@xxxxxxx>
- RE: [PATCH v3 2/8] efi: Decode IA32/X64 Processor Error Section
- From: "Ghannam, Yazen" <Yazen.Ghannam@xxxxxxx>
- Re: [PATCH v3 3/8] efi: Decode IA32/X64 Processor Error Info Structure
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3 2/8] efi: Decode IA32/X64 Processor Error Section
- From: Borislav Petkov <bp@xxxxxxxxx>
- RE: [PATCH -next] efi/libstub/tpm: efi_retrieve_tpm2_eventlog_1_2() can be static
- From: "weiyongjun (A)" <weiyongjun1@xxxxxxxxxx>
- Re: [PATCH -next] efi/libstub/tpm: efi_retrieve_tpm2_eventlog_1_2() can be static
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH -next] efi/libstub/tpm: efi_retrieve_tpm2_eventlog_1_2() can be static
- From: Wei Yongjun <weiyongjun1@xxxxxxxxxx>
- [PATCH 4.14 081/101] x86/efi: Free efi_pgd with free_pages()
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.15 086/105] x86/efi: Free efi_pgd with free_pages()
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] arm64: extra entries in /proc/iomem for kexec
- From: James Morse <james.morse@xxxxxxx>
- FW: [PATCH 1/2] drivers: firmware: efi: change sys_table to sys_table_arg
- From: Pankaj Bansal <pankaj.bansal@xxxxxxx>
- [PATCH 2/2] drivers: firmware: efi: install new fdt in configuration table
- From: Pankaj Bansal <pankaj.bansal@xxxxxxx>
- [PATCH 1/2] drivers: firmware: efi: change sys_table to sys_table_arg
- From: Pankaj Bansal <pankaj.bansal@xxxxxxx>
- Re: [PATCH 0/9] KEYS: Blacklisting & UEFI database load
- From: joeyli <jlee@xxxxxxxx>
- Re: [RFC] arm64: extra entries in /proc/iomem for kexec
- From: AKASHI Takahiro <takahiro.akashi@xxxxxxxxxx>
- RE: [PATCH 2/2] drivers: firmware: efi: install new fdt in configuration table
- From: Pankaj Bansal <pankaj.bansal@xxxxxxx>
- Re: [PATCH 2/2] drivers: firmware: efi: install new fdt in configuration table
- From: Grant Likely <grant.likely@xxxxxxx>
- Re: efisubsys_init takes more than a few milliseconds
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 2/2] drivers: firmware: efi: install new fdt in configuration table
- From: Bhupesh Sharma <bhsharma@xxxxxxxxxx>
- RE: [PATCH 2/2] drivers: firmware: efi: install new fdt in configuration table
- From: Pankaj Bansal <pankaj.bansal@xxxxxxx>
- Re: [PATCH 2/2] drivers: firmware: efi: install new fdt in configuration table
- From: Bhupesh Sharma <bhsharma@xxxxxxxxxx>
- Re: [PATCH 2/2] drivers: firmware: efi: install new fdt in configuration table
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: efisubsys_init takes more than a few milliseconds
- From: Paul Menzel <pmenzel+linux-efi@xxxxxxxxxxxxx>
- [PATCH 2/2] drivers: firmware: efi: install new fdt in configuration table
- From: Pankaj Bansal <pankaj.bansal@xxxxxxx>
- [PATCH 1/2] drivers: firmware: efi: change sys_table to sys_table_arg
- From: Pankaj Bansal <pankaj.bansal@xxxxxxx>
- Re: efisubsys_init takes more than a few milliseconds
- From: Paul Menzel <pmenzel+linux-efi@xxxxxxxxxxxxx>
- Re: efisubsys_init takes more than a few milliseconds
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- efisubsys_init takes more than a few milliseconds
- From: Paul Menzel <pmenzel+linux-efi@xxxxxxxxxxxxx>
- [PATCH v3 1/8] efi: Fix IA32/X64 Processor Error Record definition
- From: Yazen Ghannam <Yazen.Ghannam@xxxxxxx>
- [PATCH v3 3/8] efi: Decode IA32/X64 Processor Error Info Structure
- From: Yazen Ghannam <Yazen.Ghannam@xxxxxxx>
- [PATCH v3 5/8] efi: Decode IA32/X64 Cache, TLB, and Bus Check structures
- From: Yazen Ghannam <Yazen.Ghannam@xxxxxxx>
- [PATCH v3 6/8] efi: Decode additional IA32/X64 Bus Check fields
- From: Yazen Ghannam <Yazen.Ghannam@xxxxxxx>
- [PATCH v3 8/8] efi: Decode IA32/X64 Context Info structure
- From: Yazen Ghannam <Yazen.Ghannam@xxxxxxx>
- [PATCH v3 7/8] efi: Decode IA32/X64 MS Check structure
- From: Yazen Ghannam <Yazen.Ghannam@xxxxxxx>
- [PATCH v3 4/8] efi: Decode UEFI-defined IA32/X64 Error Structure GUIDs
- From: Yazen Ghannam <Yazen.Ghannam@xxxxxxx>
- [PATCH v3 2/8] efi: Decode IA32/X64 Processor Error Section
- From: Yazen Ghannam <Yazen.Ghannam@xxxxxxx>
- [PATCH v3 0/8] Decode IA32/X64 CPER
- From: Yazen Ghannam <Yazen.Ghannam@xxxxxxx>
- Re: [PATCH v2 0/8] Decode IA32/X64 CPER
- From: Borislav Petkov <bp@xxxxxxx>
- RE: [PATCH v2 0/8] Decode IA32/X64 CPER
- From: "Ghannam, Yazen" <Yazen.Ghannam@xxxxxxx>
- [PATCH] x86/efi: Free efi_pgd with free_pages()
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [PATCH -next] efi/libstub/tpm: Make function efi_retrieve_tpm2_eventlog_1_2() static
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH -next] efi/libstub/tpm: Make function efi_retrieve_tpm2_eventlog_1_2() static
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH -next] efi/libstub/tpm: Make function efi_retrieve_tpm2_eventlog_1_2() static
- From: Wei Yongjun <weiyongjun1@xxxxxxxxxx>
- [PATCH AUTOSEL for 4.9 153/281] x86/efi: Disable runtime services on kexec kernel if booted with efi=old_map
- From: Sasha Levin <Alexander.Levin@xxxxxxxxxxxxx>
- [PATCH 4.9 052/241] x86/boot/32: Defer resyncing initial_page_table until per-cpu is set up
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] arm64: extra entries in /proc/iomem for kexec
- From: Bhupesh Sharma <bhsharma@xxxxxxxxxx>
- [PATCH 4.9 211/241] x86/boot/32: Fix UP boot on Quark and possibly other platforms
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/9] KEYS: Blacklisting & UEFI database load
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] efi/libstub: tpm: zero initialize pointer variables for mixed mode
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Regression from efi: call get_event_log before ExitBootServices
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 4/5] MODSIGN: checking the blacklisted hash before loading a kernel module
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH 4/5] MODSIGN: checking the blacklisted hash before loading a kernel module
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC] arm64: extra entries in /proc/iomem for kexec
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 4/5] MODSIGN: checking the blacklisted hash before loading a kernel module
- From: joeyli <jlee@xxxxxxxx>
- Re: [RFC] arm64: extra entries in /proc/iomem for kexec
- From: AKASHI Takahiro <takahiro.akashi@xxxxxxxxxx>
- Re: [PATCH V2 2/3] efi: Introduce efi_rts_workqueue and some infrastructure to invoke all efi_runtime_services()
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 4/5] MODSIGN: checking the blacklisted hash before loading a kernel module
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/5] MODSIGN: do not load mok when secure boot disabled
- From: joeyli <jlee@xxxxxxxx>
- Re: [RFC] arm64: extra entries in /proc/iomem for kexec
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC] arm64: extra entries in /proc/iomem for kexec
- From: AKASHI Takahiro <takahiro.akashi@xxxxxxxxxx>
- Re: [PATCH 4/5] MODSIGN: checking the blacklisted hash before loading a kernel module
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH 2/5] MODSIGN: print appropriate status message when getting UEFI certificates list
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH 1/5] MODSIGN: do not load mok when secure boot disabled
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 4/5] MODSIGN: checking the blacklisted hash before loading a kernel module
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/5] MODSIGN: print appropriate status message when getting UEFI certificates list
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] efi/libstub: tpm: zero initialize pointer variables for mixed mode
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: Regression from efi: call get_event_log before ExitBootServices
- From: Thiebaud Weksteen <tweek@xxxxxxxxxx>
- [GIT PULL 0/1] EFI fix for v4.16
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 1/1] efi/libstub: tpm: zero initialize pointer variables for mixed mode
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: Regression from efi: call get_event_log before ExitBootServices
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: Regression from efi: call get_event_log before ExitBootServices
- From: Jeremy Cline <jeremy@xxxxxxxxxx>
- Re: Regression from efi: call get_event_log before ExitBootServices
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- [PATCH 0/5 v2] Using the hash in MOKx to blacklist kernel module
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 2/5] MODSIGN: print appropriate status message when getting UEFI certificates list
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 3/5] MODSIGN: load blacklist from MOKx
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 4/5] MODSIGN: checking the blacklisted hash before loading a kernel module
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 5/5] MODSIGN: check the attributes of db and mok
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 1/5] MODSIGN: do not load mok when secure boot disabled
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 2/5] MODSIGN: print appropriate status message when getting UEFI certificates list
- From: "Lee, Chun-Yi" <jlee@xxxxxxxx>
- [PATCH 0/5 v2] Using the hash in MOKx to blacklist kernel module
- From: "Lee, Chun-Yi" <jlee@xxxxxxxx>
- [PATCH 1/5] MODSIGN: do not load mok when secure boot disabled
- From: "Lee, Chun-Yi" <jlee@xxxxxxxx>
- Re: Regression from efi: call get_event_log before ExitBootServices
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: Regression from efi: call get_event_log before ExitBootServices
- From: Thiebaud Weksteen <tweek@xxxxxxxxxx>
- Re: Regression from efi: call get_event_log before ExitBootServices
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: Regression from efi: call get_event_log before ExitBootServices
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: Regression from efi: call get_event_log before ExitBootServices
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: Regression from efi: call get_event_log before ExitBootServices
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: Regression from efi: call get_event_log before ExitBootServices
- From: Thiebaud Weksteen <tweek@xxxxxxxxxx>
- Re: Regression from efi: call get_event_log before ExitBootServices
- From: Jeremy Cline <jeremy@xxxxxxxxxx>
- Re: Regression from efi: call get_event_log before ExitBootServices
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: Regression from efi: call get_event_log before ExitBootServices
- From: Thiebaud Weksteen <tweek@xxxxxxxxxx>
- Re: Regression from efi: call get_event_log before ExitBootServices
- From: Jeremy Cline <jeremy@xxxxxxxxxx>
- Re: Regression from efi: call get_event_log before ExitBootServices
- From: Jeremy Cline <jeremy@xxxxxxxxxx>
- Re: Regression from efi: call get_event_log before ExitBootServices
- From: Thiebaud Weksteen <tweek@xxxxxxxxxx>
- Re: Regression from efi: call get_event_log before ExitBootServices
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: Regression from efi: call get_event_log before ExitBootServices
- From: Jeremy Cline <jeremy@xxxxxxxxxx>
- Re: Regression from efi: call get_event_log before ExitBootServices
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: Regression from efi: call get_event_log before ExitBootServices
- From: Jeremy Cline <jeremy@xxxxxxxxxx>
- Re: Regression from efi: call get_event_log before ExitBootServices
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: Regression from efi: call get_event_log before ExitBootServices
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- Re: Regression from efi: call get_event_log before ExitBootServices
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/5] x86/efi: Replace efi_pgd with efi_mm.pgd
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- [PATCH rebased 2/2] x86/efi: Use efi_switch_mm() rather than manually twiddling with %cr3
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH rebased 1/2] x86/efi: Replace efi_pgd with efi_mm.pgd
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 2/5] x86/efi: Replace efi_pgd with efi_mm.pgd
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 2/5] x86/efi: Replace efi_pgd with efi_mm.pgd
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH 2/5] x86/efi: Replace efi_pgd with efi_mm.pgd
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- [GIT PULL 0/5] more EFI changes for v4.17
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 3/5] x86/efi: Use efi_switch_mm() rather than manually twiddling with %cr3
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 4/5] efi/esrt: fix handling of early ESRT table mapping
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 5/5] efi: use string literals for efi_char16_t variable initializers
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 1/5] efi: Use efi_mm in x86 as well as ARM
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 2/5] x86/efi: Replace efi_pgd with efi_mm.pgd
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 0/9] KEYS: Blacklisting & UEFI database load
- From: joeyli <jlee@xxxxxxxx>
- Re: Regression from efi: call get_event_log before ExitBootServices
- From: Thiebaud Weksteen <tweek@xxxxxxxxxx>
- RE: [PATCH V2 2/3] efi: Introduce efi_rts_workqueue and some infrastructure to invoke all efi_runtime_services()
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- Re: Regression from efi: call get_event_log before ExitBootServices
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: Regression from efi: call get_event_log before ExitBootServices
- From: Jeremy Cline <jeremy@xxxxxxxxxx>
- Re: [PATCH V2 2/3] efi: Introduce efi_rts_workqueue and some infrastructure to invoke all efi_runtime_services()
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH V2 2/3] efi: Introduce efi_rts_workqueue and some infrastructure to invoke all efi_runtime_services()
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: Regression from efi: call get_event_log before ExitBootServices
- From: Thiebaud Weksteen <tweek@xxxxxxxxxx>
- Re: Regression from efi: call get_event_log before ExitBootServices
- From: Thiebaud Weksteen <tweek@xxxxxxxxxx>
- Re: [PATCH 07/12] efi: Use efi_mm in x86 as well as ARM
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 12/12] efi: make const array 'apple' static
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: Regression from efi: call get_event_log before ExitBootServices
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- RE: [PATCH 07/12] efi: Use efi_mm in x86 as well as ARM
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH 12/12] efi: make const array 'apple' static
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 12/12] efi: make const array 'apple' static
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH 12/12] efi: make const array 'apple' static
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH 12/12] efi: make const array 'apple' static
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 12/12] efi: make const array 'apple' static
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 12/12] efi: make const array 'apple' static
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH 06/12] x86: efi: Replace GFP_ATOMIC with GFP_KERNEL in efi_query_variable_store
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH 12/12] efi: make const array 'apple' static
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 12/12] efi: make const array 'apple' static
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH 12/12] efi: make const array 'apple' static
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 12/12] efi: make const array 'apple' static
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 07/12] efi: Use efi_mm in x86 as well as ARM
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- RE: [PATCH V2 2/3] efi: Introduce efi_rts_workqueue and some infrastructure to invoke all efi_runtime_services()
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH 1/2] efi/esrt: fix unsupported version initialization failure
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: Regression from efi: call get_event_log before ExitBootServices
- From: Jeremy Cline <jeremy@xxxxxxxxxx>
- Re: [PATCH 1/2] efi/esrt: fix unsupported version initialization failure
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: [PATCH V2 2/3] efi: Introduce efi_rts_workqueue and some infrastructure to invoke all efi_runtime_services()
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- RE: [PATCH V2 1/3] x86/efi: Call efi_delete_dummy_variable() during efi subsystem initialization
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH 1/2] efi/esrt: fix unsupported version initialization failure
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: Regression from efi: call get_event_log before ExitBootServices
- From: Jeremy Cline <jeremy@xxxxxxxxxx>
- RE: [PATCH V2 2/3] efi: Introduce efi_rts_workqueue and some infrastructure to invoke all efi_runtime_services()
- From: "Luck, Tony" <tony.luck@xxxxxxxxx>
- Re: Regression from efi: call get_event_log before ExitBootServices
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH 1/2] efi/esrt: fix unsupported version initialization failure
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- Re: [PATCH V2 2/3] efi: Introduce efi_rts_workqueue and some infrastructure to invoke all efi_runtime_services()
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 12/12] efi: make const array 'apple' static
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH 0/2] ESRT fixes for relocatable kexec'd kernel
- From: AKASHI Takahiro <takahiro.akashi@xxxxxxxxxx>
- Re: Regression from efi: call get_event_log before ExitBootServices
- From: Thiebaud Weksteen <tweek@xxxxxxxxxx>
- Re: [PATCH V2 2/3] efi: Introduce efi_rts_workqueue and some infrastructure to invoke all efi_runtime_services()
- From: Miguel Ojeda <miguel.ojeda.sandonis@xxxxxxxxx>
- Re: Regression from efi: call get_event_log before ExitBootServices
- From: Thiebaud Weksteen <tweek@xxxxxxxxxx>
- [PATCH 01/12] efi/arm*: Only register page tables when they exist
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 02/12] efi/apple-properties: Device core takes care of empty properties
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 03/12] efi/arm*: Stop printing addresses of virtual mappings
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 05/12] efi: arm64: Check whether x18 is preserved by runtime services calls
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 07/12] efi: Use efi_mm in x86 as well as ARM
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 06/12] x86: efi: Replace GFP_ATOMIC with GFP_KERNEL in efi_query_variable_store
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 09/12] x86/efi: Use efi_switch_mm() rather than manually twiddling with %cr3
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 11/12] efi/apple-properties: Use memremap() instead of ioremap()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 10/12] efi: reorder pr_notice() with add_device_randomness() call
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 12/12] efi: make const array 'apple' static
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 08/12] x86/efi: Replace efi_pgd with efi_mm.pgd
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 04/12] efi/x86: Fix trailing semicolons
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [GIT PULL 00/12] first batch of EFI changes for v4.17
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V2 1/3] x86/efi: Call efi_delete_dummy_variable() during efi subsystem initialization
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: [PATCH V2 2/3] efi: Introduce efi_rts_workqueue and some infrastructure to invoke all efi_runtime_services()
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- RE: [PATCH V2 2/3] efi: Introduce efi_rts_workqueue and some infrastructure to invoke all efi_runtime_services()
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- RE: [PATCH V2 3/3] efi: Use efi_rts_workqueue to invoke EFI Runtime Services
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH V2 3/3] efi: Use efi_rts_workqueue to invoke EFI Runtime Services
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- RE: [PATCH V2 2/3] efi: Introduce efi_rts_workqueue and some infrastructure to invoke all efi_runtime_services()
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- RE: [PATCH V2 3/3] efi: Use efi_rts_workqueue to invoke EFI Runtime Services
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- RE: [PATCH V2 2/3] efi: Introduce efi_rts_workqueue and some infrastructure to invoke all efi_runtime_services()
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH 0/2] ESRT fixes for relocatable kexec'd kernel
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 0/2] ESRT fixes for relocatable kexec'd kernel
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- Re: [PATCH v1] efi/apple-properties: Use memremap() instead of ioremap()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v1] efi/apple-properties: Use memremap() instead of ioremap()
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/9] KEYS: Blacklisting & UEFI database load
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/9] KEYS: Blacklisting & UEFI database load
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH V2 2/3] efi: Introduce efi_rts_workqueue and some infrastructure to invoke all efi_runtime_services()
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: Regression from efi: call get_event_log before ExitBootServices
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH V2 2/3] efi: Introduce efi_rts_workqueue and some infrastructure to invoke all efi_runtime_services()
- From: Miguel Ojeda <miguel.ojeda.sandonis@xxxxxxxxx>
- Re: Regression from efi: call get_event_log before ExitBootServices
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: Regression from efi: call get_event_log before ExitBootServices
- From: Thiebaud Weksteen <tweek@xxxxxxxxxx>
- Regression from efi: call get_event_log before ExitBootServices
- From: Jeremy Cline <jeremy@xxxxxxxxxx>
- Re: [PATCH 0/9] KEYS: Blacklisting & UEFI database load
- From: Jiri Slaby <jslaby@xxxxxxx>
- Re: [PATCH V2 3/3] efi: Use efi_rts_workqueue to invoke EFI Runtime Services
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH V2 2/3] efi: Introduce efi_rts_workqueue and some infrastructure to invoke all efi_runtime_services()
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v3 4/5] efi: call get_event_log before ExitBootServices
- From: Thiebaud Weksteen <tweek@xxxxxxxxxx>
- Re: [PATCH 0/2] ESRT fixes for relocatable kexec'd kernel
- From: AKASHI Takahiro <takahiro.akashi@xxxxxxxxxx>
- RE: [PATCH V2 3/3] efi: Use efi_rts_workqueue to invoke EFI Runtime Services
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH V2 3/3] efi: Use efi_rts_workqueue to invoke EFI Runtime Services
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH V2 2/3] efi: Introduce efi_rts_workqueue and some infrastructure to invoke all efi_runtime_services()
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V2 1/3] x86/efi: Call efi_delete_dummy_variable() during efi subsystem initialization
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V2 3/3] efi: Use efi_rts_workqueue to invoke EFI Runtime Services
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V2 0/3] Use efi_rts_workqueue to invoke EFI Runtime Services
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH v3 4/5] efi: call get_event_log before ExitBootServices
- From: Marc-André Lureau <marcandre.lureau@xxxxxxxxx>
- [PATCH AUTOSEL for 4.9 054/219] x86/boot/32: Defer resyncing initial_page_table until per-cpu is set up
- From: Sasha Levin <Alexander.Levin@xxxxxxxxxxxxx>
- Re: [PATCH V4 0/3] Use mm_struct and switch_mm() instead of manually
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 00/30] security, efi: Add kernel lockdown
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: Deleting pstore data causes immediate hang of 4.15.5 on Lenovo P70 with upgraded bios
- From: Marc MERLIN <marc@xxxxxxxxxxx>
- Re: Deleting pstore data causes immediate hang of 4.15.5 on Lenovo P70 with upgraded bios
- From: Marc MERLIN <marc@xxxxxxxxxxx>
- Re: [PATCH] efi: make const array 'apple' static
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] efi: make const array 'apple' static
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- Re: [PATCH 0/2] ESRT fixes for relocatable kexec'd kernel
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH 4.14 079/115] x86/efi: Fix kernel param add_efi_memmap regression
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH v2 0/8] Decode IA32/X64 CPER
- From: "Luck, Tony" <tony.luck@xxxxxxxxx>
- Re: linux-next: UEFI Secure boot lockdown patchset
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/8] Decode IA32/X64 CPER
- From: Borislav Petkov <bp@xxxxxxx>
- Re: linux-next: UEFI Secure boot lockdown patchset
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: linux-next: UEFI Secure boot lockdown patchset
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- linux-next: UEFI Secure boot lockdown patchset
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 0/2] ESRT fixes for relocatable kexec'd kernel
- From: AKASHI Takahiro <takahiro.akashi@xxxxxxxxxx>
- RE: [PATCH v2 0/8] Decode IA32/X64 CPER
- From: "Ghannam, Yazen" <Yazen.Ghannam@xxxxxxx>
- Re: [RFC/mock up/PoC/DRAFT PATCH v1] efi/apple-properties: Convert to be a property provider
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [RFC/mock up/PoC/DRAFT PATCH v1] efi/apple-properties: Convert to be a property provider
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [RFC/mock up/PoC/DRAFT PATCH v1] efi/apple-properties: Convert to be a property provider
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/8] Decode IA32/X64 CPER
- From: Borislav Petkov <bp@xxxxxxx>
- [PATCH 3.16 061/254] efi: Move some sysfs files to be read-only by root
- From: Ben Hutchings <ben@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] ESRT fixes for relocatable kexec'd kernel
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- RE: [PATCH v2 0/8] Decode IA32/X64 CPER
- From: "Ghannam, Yazen" <Yazen.Ghannam@xxxxxxx>
- Re: [PATCH v2 0/8] Decode IA32/X64 CPER
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [PATCH 0/2] ESRT fixes for relocatable kexec'd kernel
- From: AKASHI Takahiro <takahiro.akashi@xxxxxxxxxx>
- Re: [PATCH V1 1/3] x86/efi: Call efi_delete_dummy_variable() during efi subsystem initialization
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v1] efi/apple-properties: Use memremap() instead of ioremap()
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH v2 3/8] efi: Decode IA32/X64 Processor Error Info Structure
- From: Borislav Petkov <bp@xxxxxxx>
- RE: [PATCH v2 3/8] efi: Decode IA32/X64 Processor Error Info Structure
- From: "Ghannam, Yazen" <Yazen.Ghannam@xxxxxxx>
- Re: [PATCH v2 3/8] efi: Decode IA32/X64 Processor Error Info Structure
- From: Borislav Petkov <bp@xxxxxxx>
- RE: [PATCH v2 3/8] efi: Decode IA32/X64 Processor Error Info Structure
- From: "Ghannam, Yazen" <Yazen.Ghannam@xxxxxxx>
- Re: [PATCH v2 2/8] efi: Decode IA32/X64 Processor Error Section
- From: Borislav Petkov <bp@xxxxxxx>
- RE: [PATCH v2 2/8] efi: Decode IA32/X64 Processor Error Section
- From: "Ghannam, Yazen" <Yazen.Ghannam@xxxxxxx>
- Re: [PATCH v2 3/8] efi: Decode IA32/X64 Processor Error Info Structure
- From: Borislav Petkov <bp@xxxxxxx>
- RE: [PATCH v2 3/8] efi: Decode IA32/X64 Processor Error Info Structure
- From: "Ghannam, Yazen" <Yazen.Ghannam@xxxxxxx>
- Re: [PATCH v2 2/8] efi: Decode IA32/X64 Processor Error Section
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [PATCH v1] efi/apple-properties: Use memremap() instead of ioremap()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: [PATCH v2 2/8] efi: Decode IA32/X64 Processor Error Section
- From: "Ghannam, Yazen" <Yazen.Ghannam@xxxxxxx>
- [PATCH v1] efi/apple-properties: Use memremap() instead of ioremap()
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 5/8] efi: Decode IA32/X64 Cache, TLB, and Bus Check structures
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [PATCH v2 3/8] efi: Decode IA32/X64 Processor Error Info Structure
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [PATCH v2 2/8] efi: Decode IA32/X64 Processor Error Section
- From: Borislav Petkov <bp@xxxxxxx>
- RE: [PATCH v2 5/8] efi: Decode IA32/X64 Cache, TLB, and Bus Check structures
- From: "Ghannam, Yazen" <Yazen.Ghannam@xxxxxxx>
- Re: [PATCH v2 4/8] efi: Decode UEFI-defined IA32/X64 Error Structure GUIDs
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: [PATCH v2 4/8] efi: Decode UEFI-defined IA32/X64 Error Structure GUIDs
- From: "Ghannam, Yazen" <Yazen.Ghannam@xxxxxxx>
- RE: [PATCH v2 3/8] efi: Decode IA32/X64 Processor Error Info Structure
- From: "Ghannam, Yazen" <Yazen.Ghannam@xxxxxxx>
- RE: [PATCH v2 2/8] efi: Decode IA32/X64 Processor Error Section
- From: "Ghannam, Yazen" <Yazen.Ghannam@xxxxxxx>
- RE: [PATCH v2 1/8] efi: Fix IA32/X64 Processor Error Record definition
- From: "Ghannam, Yazen" <Yazen.Ghannam@xxxxxxx>
- Re: [PATCH v2 5/8] efi: Decode IA32/X64 Cache, TLB, and Bus Check structures
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [PATCH v2 4/8] efi: Decode UEFI-defined IA32/X64 Error Structure GUIDs
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [PATCH v2 3/8] efi: Decode IA32/X64 Processor Error Info Structure
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [PATCH v2 2/8] efi: Decode IA32/X64 Processor Error Section
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [RFC PATCH v1] efi/apple-properties: Assume 32-bit values only for now
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v1] efi/apple-properties: Assume 32-bit values only for now
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/8] efi: Fix IA32/X64 Processor Error Record definition
- From: Borislav Petkov <bp@xxxxxxx>
- Re: 91f606a8fa ("x86/mm: Replace compile-time checks for 5-level .."): BUG: kernel reboot-without-warning in boot stage
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [RFC PATCH v1] efi/apple-properties: Assume 32-bit values only for now
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [RFC PATCH v1] efi/apple-properties: Assume 32-bit values only for now
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- [PATCH v2 1/8] efi: Fix IA32/X64 Processor Error Record definition
- From: Yazen Ghannam <Yazen.Ghannam@xxxxxxx>
- [PATCH v2 2/8] efi: Decode IA32/X64 Processor Error Section
- From: Yazen Ghannam <Yazen.Ghannam@xxxxxxx>
- [PATCH v2 3/8] efi: Decode IA32/X64 Processor Error Info Structure
- From: Yazen Ghannam <Yazen.Ghannam@xxxxxxx>
- [PATCH v2 5/8] efi: Decode IA32/X64 Cache, TLB, and Bus Check structures
- From: Yazen Ghannam <Yazen.Ghannam@xxxxxxx>
- [PATCH v2 8/8] efi: Decode IA32/X64 Context Info structure
- From: Yazen Ghannam <Yazen.Ghannam@xxxxxxx>
- [PATCH v2 4/8] efi: Decode UEFI-defined IA32/X64 Error Structure GUIDs
- From: Yazen Ghannam <Yazen.Ghannam@xxxxxxx>
- [PATCH v2 6/8] efi: Decode additional IA32/X64 Bus Check fields
- From: Yazen Ghannam <Yazen.Ghannam@xxxxxxx>
- [PATCH v2 7/8] efi: Decode IA32/X64 MS Check structure
- From: Yazen Ghannam <Yazen.Ghannam@xxxxxxx>
- [PATCH v2 0/8] Decode IA32/X64 CPER
- From: Yazen Ghannam <Yazen.Ghannam@xxxxxxx>
- Re: [PATCH 8/8] efi: Decode IA32/X64 Context Info structure
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: [PATCH 8/8] efi: Decode IA32/X64 Context Info structure
- From: "Ghannam, Yazen" <Yazen.Ghannam@xxxxxxx>
- Re: [PATCH 3/8] efi: Decode IA32/X64 Processor Error Info Structure
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: [PATCH 4/8] efi: Decode UEFI-defined IA32/X64 Error Structure GUIDs
- From: "Ghannam, Yazen" <Yazen.Ghannam@xxxxxxx>
- RE: [PATCH 3/8] efi: Decode IA32/X64 Processor Error Info Structure
- From: "Ghannam, Yazen" <Yazen.Ghannam@xxxxxxx>
- RE: [PATCH 2/8] efi: Decode IA32/X64 Processor Error Section
- From: "Ghannam, Yazen" <Yazen.Ghannam@xxxxxxx>
- RE: [PATCH 0/8] Decode IA32/X64 CPER
- From: "Ghannam, Yazen" <Yazen.Ghannam@xxxxxxx>
- Re: [PATCH 2/2] efi/esrt: mark ESRT memory region as nomap
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] efi/esrt: mark ESRT memory region as nomap
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: [PATCH V1 2/3] efi: Introduce efi_rts_workqueue and necessary infrastructure to invoke all efi_runtime_services()
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH 1/2] fs/efivarfs: restrict inode permissions
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V1 2/3] efi: Introduce efi_rts_workqueue and necessary infrastructure to invoke all efi_runtime_services()
- From: Miguel Ojeda <miguel.ojeda.sandonis@xxxxxxxxx>
- [PATCH V1 1/3] x86/efi: Call efi_delete_dummy_variable() during efi subsystem initialization
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V1 3/3] efi: Use efi_rts_workqueue to invoke EFI Runtime Services
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V1 2/3] efi: Introduce efi_rts_workqueue and necessary infrastructure to invoke all efi_runtime_services()
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V1 0/3] Use efi_rts_workqueue to invoke EFI Runtime Services
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH 1/2] fs/efivarfs: restrict inode permissions
- From: Alan Cox <gnomes@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/8] Decode IA32/X64 CPER
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 8/8] efi: Decode IA32/X64 Context Info structure
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 7/8] efi: Decode IA32/X64 MS Check structure
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 6/8] efi: Decode additional IA32/X64 Bus Check fields
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 5/8] efi: Decode IA32/X64 Cache, TLB, and Bus Check structures
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 4/8] efi: Decode UEFI-defined IA32/X64 Error Structure GUIDs
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 3/8] efi: Decode IA32/X64 Processor Error Info Structure
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 2/8] efi: Decode IA32/X64 Processor Error Section
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 2/2] efi/esrt: mark ESRT memory region as nomap
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 2/2] efi/esrt: mark ESRT memory region as nomap
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH 1/2] efi/esrt: fix unsupported version initialization failure
- From: Dave Young <dyoung@xxxxxxxxxx>
- [PATCH 3.18 53/58] mm/early_ioremap: Fix boot hang with earlyprintk=efi,keep
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] efivarfs: Limit the rate for non-root to read files
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH 4.4 058/193] mm/early_ioremap: Fix boot hang with earlyprintk=efi,keep
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/8] efi: Decode IA32/X64 Processor Error Section
- From: Yazen Ghannam <Yazen.Ghannam@xxxxxxx>
- [PATCH 1/8] efi: Fix IA32/X64 Processor Error Record definition
- From: Yazen Ghannam <Yazen.Ghannam@xxxxxxx>
- [PATCH 3/8] efi: Decode IA32/X64 Processor Error Info Structure
- From: Yazen Ghannam <Yazen.Ghannam@xxxxxxx>
- [PATCH 6/8] efi: Decode additional IA32/X64 Bus Check fields
- From: Yazen Ghannam <Yazen.Ghannam@xxxxxxx>
- [PATCH 4/8] efi: Decode UEFI-defined IA32/X64 Error Structure GUIDs
- From: Yazen Ghannam <Yazen.Ghannam@xxxxxxx>
- [PATCH 7/8] efi: Decode IA32/X64 MS Check structure
- From: Yazen Ghannam <Yazen.Ghannam@xxxxxxx>
- [PATCH 5/8] efi: Decode IA32/X64 Cache, TLB, and Bus Check structures
- From: Yazen Ghannam <Yazen.Ghannam@xxxxxxx>
- [PATCH 8/8] efi: Decode IA32/X64 Context Info structure
- From: Yazen Ghannam <Yazen.Ghannam@xxxxxxx>
- [PATCH 0/8] Decode IA32/X64 CPER
- From: Yazen Ghannam <Yazen.Ghannam@xxxxxxx>
- Re: [PATCH] efivarfs: Limit the rate for non-root to read files
- From: Peter Jones <pjones@xxxxxxxxxx>
- [PATCH 4.9 082/145] mm/early_ioremap: Fix boot hang with earlyprintk=efi,keep
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] efi/esrt: fix unsupported version initialization failure
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH 0/2] ESRT fixes for relocatable kexec'd kernel
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH 2/2] efi/esrt: mark ESRT memory region as nomap
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH 4.14 147/159] mm/early_ioremap: Fix boot hang with earlyprintk=efi,keep
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 08/30] kexec_file: Restrict at runtime if the kernel is locked down
- From: Jiri Bohac <jbohac@xxxxxxx>
- Re: [PATCH 08/30] kexec_file: Restrict at runtime if the kernel is locked down
- From: Jiri Bohac <jbohac@xxxxxxx>
- Re: [PATCH 04/30] Enforce module signatures if the kernel is locked down
- From: Jiri Bohac <jbohac@xxxxxxx>
- Re: [PATCH v2] efivarfs: Limit the rate for non-root to read files
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] efivarfs: Limit the rate for non-root to read files
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2] efivarfs: Limit the rate for non-root to read files
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [PATCH v2] efivarfs: Limit the rate for non-root to read files
- From: "Luck, Tony" <tony.luck@xxxxxxxxx>
- Re: [PATCH v2] efivarfs: Limit the rate for non-root to read files
- From: "Luck, Tony" <tony.luck@xxxxxxxxx>
- Re: [PATCH] efivarfs: Limit the rate for non-root to read files
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 08/30] kexec_file: Restrict at runtime if the kernel is locked down
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 08/30] kexec_file: Restrict at runtime if the kernel is locked down
- From: David Howells <dhowells@xxxxxxxxxx>
- RE: [PATCH] efivarfs: Limit the rate for non-root to read files
- From: "Luck, Tony" <tony.luck@xxxxxxxxx>
- Re: [PATCH] efivarfs: Limit the rate for non-root to read files
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [PATCH] efivarfs: Limit the rate for non-root to read files
- From: "Luck, Tony" <tony.luck@xxxxxxxxx>
- Re: [PATCH 04/30] Enforce module signatures if the kernel is locked down
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 1/2] fs/efivarfs: restrict inode permissions
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- RE: [PATCH 1/2] fs/efivarfs: restrict inode permissions
- From: "Luck, Tony" <tony.luck@xxxxxxxxx>
- Re: [PATCH 1/2] fs/efivarfs: restrict inode permissions
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] fs/efivarfs: restrict inode permissions
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] fs/efivarfs: restrict inode permissions
- From: "Luck, Tony" <tony.luck@xxxxxxxxx>
- Re: [PATCH 1/2] fs/efivarfs: restrict inode permissions
- From: Andi Kleen <ak@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] fs/efivarfs: restrict inode permissions
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 08a/30] kexec_file: split KEXEC_VERIFY_SIG into KEXEC_SIG and KEXEC_SIG_FORCE
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 1/2] fs/efivarfs: restrict inode permissions
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 1/2] fs/efivarfs: restrict inode permissions
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- RE: [PATCH 1/2] fs/efivarfs: restrict inode permissions
- From: "Luck, Tony" <tony.luck@xxxxxxxxx>
- Re: [PATCH 1/2] fs/efivarfs: restrict inode permissions
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] fs/efivarfs: restrict inode permissions
- From: Peter Jones <pjones@xxxxxxxxxx>
- RE: [PATCH 1/2] fs/efivarfs: restrict inode permissions
- From: "Luck, Tony" <tony.luck@xxxxxxxxx>
- Re: [PATCH 1/2] fs/efivarfs: restrict inode permissions
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 1/2] fs/efivarfs: restrict inode permissions
- From: "Luck, Tony" <tony.luck@xxxxxxxxx>
- Re: [PATCH 1/2] fs/efivarfs: restrict inode permissions
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH 1/2] fs/efivarfs: restrict inode permissions
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] fs/efivarfs: restrict inode permissions
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 1/2] fs/efivarfs: restrict inode permissions
- From: "Luck, Tony" <tony.luck@xxxxxxxxx>
- Re: [PATCH 1/2] fs/efivarfs: restrict inode permissions
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 1/2] fs/efivarfs: restrict inode permissions
- From: "Luck, Tony" <tony.luck@xxxxxxxxx>
- Re: [PATCH 1/2] fs/efivarfs: restrict inode permissions
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: Read-protected UEFI variables
- From: Alan Cox <gnomes@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] efivars: reading variables can generate SMIs
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH 0/2] efivars: reading variables can generate SMIs
- From: Andi Kleen <ak@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] efivars: reading variables can generate SMIs
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 0/2] efivars: reading variables can generate SMIs
- From: Peter Jones <pjones@xxxxxxxxxx>
- Re: [PATCH 0/2] efivars: reading variables can generate SMIs
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- RE: [PATCH 0/2] efivars: reading variables can generate SMIs
- From: "Luck, Tony" <tony.luck@xxxxxxxxx>
- Re: [PATCH 0/2] efivars: reading variables can generate SMIs
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 0/2] efivars: reading variables can generate SMIs
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- RE: [PATCH 0/2] efivars: reading variables can generate SMIs
- From: "Luck, Tony" <tony.luck@xxxxxxxxx>
- Re: [PATCH 0/2] efivars: reading variables can generate SMIs
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] efivars: reading variables can generate SMIs
- From: Peter Jones <pjones@xxxxxxxxxx>
- Re: [PATCH 0/2] efivars: reading variables can generate SMIs
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 0/2] efivars: reading variables can generate SMIs
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: [PATCH 0/2] efivars: reading variables can generate SMIs
- From: "Luck, Tony" <tony.luck@xxxxxxxxx>
- Re: [PATCH 0/2] efivars: reading variables can generate SMIs
- From: Peter Jones <pjones@xxxxxxxxxx>
- Re: [PATCH 0/2] efivars: reading variables can generate SMIs
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 0/2] efivars: reading variables can generate SMIs
- From: Joe Konno <joe.konno@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] efivars: reading variables can generate SMIs
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 0/2] efivars: reading variables can generate SMIs
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 0/2] efivars: reading variables can generate SMIs
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 0/2] efivars: reading variables can generate SMIs
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 0/2] efivars: reading variables can generate SMIs
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: Read-protected UEFI variables
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 1/2] fs/efivarfs: restrict inode permissions
- From: Joe Konno <joe.konno@xxxxxxxxxxxxxxx>
- [PATCH 2/2] efi: restrict top-level attribute permissions
- From: Joe Konno <joe.konno@xxxxxxxxxxxxxxx>
- [PATCH 0/2] efivars: reading variables can generate SMIs
- From: Joe Konno <joe.konno@xxxxxxxxxxxxxxx>
- Re: Read-protected UEFI variables
- From: "Austin S. Hemmelgarn" <ahferroin7@xxxxxxxxx>
- Re: Read-protected UEFI variables
- From: Benjamin Drung <benjamin.drung@xxxxxxxxxxxxxxxx>
- Re: Read-protected UEFI variables
- From: Môshe van der Sterre <me@xxxxxxxx>
- Re: Read-protected UEFI variables
- From: Benjamin Drung <benjamin.drung@xxxxxxxxxxxxxxxx>
- Re: Read-protected UEFI variables
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Read-protected UEFI variables
- From: Benjamin Drung <benjamin.drung@xxxxxxxxxxxxxxxx>
- Re: efi/apple-properties: Checking error handling in unmarshal_devices()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] efi/apple-properties: Delete an error message for a failed memory allocation in unmarshal_devices()
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH] efi/apple-properties: Delete an error message for a failed memory allocation in unmarshal_devices()
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH] x86: efi: Replace GFP_ATOMIC with GFP_KERNEL in efi_query_variable_store
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] x86: efi: Replace GFP_ATOMIC with GFP_KERNEL in efi_query_variable_store
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- [PATCH] efi/apple-properties: Delete an error message for a failed memory allocation in unmarshal_devices()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] efi: Delete an error message for a failed memory allocation in efivar_init()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH AUTOSEL for 4.14 082/110] x86/efi: Fix kernel param add_efi_memmap regression
- From: Sasha Levin <Alexander.Levin@xxxxxxxxxxxxx>
- [PATCH 4.14 156/156] x86/efi: Clarify that reset attack mitigation needs appropriate userspace
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.15 55/55] x86/efi: Clarify that reset attack mitigation needs appropriate userspace
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86/debugfs: Add the EFI pagetable to the debugfs 'page_tables' directory
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] x86/debugfs: Add the EFI pagetable to the debugfs 'page_tables' directory
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH 0/4] efi/arm64: unmap the kernel during runtime service calls
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 0/4] efi/arm64: unmap the kernel during runtime service calls
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- Re: [PATCH V4 0/3] Use mm_struct and switch_mm() instead of manually
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [GIT PULL] EFI changes for v4.16
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- [PATCH AUTOSEL for 4.14 094/100] mm/early_ioremap: Fix boot hang with earlyprintk=efi,keep
- From: Sasha Levin <Alexander.Levin@xxxxxxxxxxxxx>
- [PATCH AUTOSEL for 4.9 45/49] mm/early_ioremap: Fix boot hang with earlyprintk=efi,keep
- From: Sasha Levin <Alexander.Levin@xxxxxxxxxxxxx>
- [PATCH AUTOSEL for 4.4 33/36] mm/early_ioremap: Fix boot hang with earlyprintk=efi,keep
- From: Sasha Levin <Alexander.Levin@xxxxxxxxxxxxx>
- [PATCH AUTOSEL for 3.18 22/25] mm/early_ioremap: Fix boot hang with earlyprintk=efi,keep
- From: Sasha Levin <Alexander.Levin@xxxxxxxxxxxxx>
- Re: [PATCH V4 0/3] Use mm_struct and switch_mm() instead of manually
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/4] efi/arm64: unmap the kernel while executing UEFI services
- From: Will Deacon <will.deacon@xxxxxxx>
- Re: [PATCH 2/4] efi/arm64: map the stack and entry wrapper into the UEFI page tables
- From: Will Deacon <will.deacon@xxxxxxx>
- Re: [PATCH 4/4] efi/arm64: unmap the kernel while executing UEFI services
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 4/4] efi/arm64: unmap the kernel while executing UEFI services
- From: Will Deacon <will.deacon@xxxxxxx>
- Re: [PATCH 2/4] efi/arm64: map the stack and entry wrapper into the UEFI page tables
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 2/4] efi/arm64: map the stack and entry wrapper into the UEFI page tables
- From: Will Deacon <will.deacon@xxxxxxx>
- Re: [PATCH 1/4] efi: arm64: Check whether x18 is preserved by runtime services calls
- From: Will Deacon <will.deacon@xxxxxxx>
- [PATCH 4/4] efi/arm64: unmap the kernel while executing UEFI services
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 3/4] efi/arm64: marshall runtime services arguments via buffer in TTBR0
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 2/4] efi/arm64: map the stack and entry wrapper into the UEFI page tables
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 1/4] efi: arm64: Check whether x18 is preserved by runtime services calls
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 0/4] efi/arm64: unmap the kernel during runtime service calls
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] x86: efi: Replace GFP_ATOMIC with GFP_KERNEL in efi_query_variable_store
- From: Joe Perches <joe@xxxxxxxxxxx>
- [PATCH] x86: efi: Replace GFP_ATOMIC with GFP_KERNEL in efi_query_variable_store
- From: Jia-Ju Bai <baijiaju1990@xxxxxxxxx>
- Re: [PATCH 0/4] x86/xen/efi: Initialize UEFI secure boot state during dom0 boot
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi/arm*: Only register page tables when they exist
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v1] efi/apple-properties: Device core takes care of empty properties
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] x86/efi: Fix trailing semicolons
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] x86/efi: Fix trailing semicolons
- From: Luis de Bethencourt <luisbg@xxxxxxxxxx>
- Re: [PATCH v1] efi/apple-properties: Device core takes care of empty properties
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH v1] efi/apple-properties: Device core takes care of empty properties
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH] efi: arm: stop printing addresses of virtual mappings
- From: Leif Lindholm <leif.lindholm@xxxxxxxxxx>
- Re: [PATCH 08a/30] kexec_file: split KEXEC_VERIFY_SIG into KEXEC_SIG and KEXEC_SIG_FORCE
- From: Jiri Bohac <jbohac@xxxxxxx>
- [PATCH] efi: arm: stop printing addresses of virtual mappings
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH V4 1/3] efi: Use efi_mm in x86 as well as ARM
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V4 3/3] x86/efi: Use efi_switch_mm() rather than manually twiddling with %cr3
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V4 2/3] x86/efi: Replace efi_pgd with efi_mm.pgd
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH V4 0/3] Use mm_struct and switch_mm() instead of manually
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH] efi: arm64: Check whether x18 is preserved by runtime services calls
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 08a/30] kexec_file: split KEXEC_VERIFY_SIG into KEXEC_SIG and KEXEC_SIG_FORCE
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 08/30] kexec_file: Restrict at runtime if the kernel is locked down
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] efi/arm*: Only register page tables when they exist
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi/arm*: Only register page tables when they exist
- From: Will Deacon <will.deacon@xxxxxxx>
- Re: [PATCH 08a/30] kexec_file: split KEXEC_VERIFY_SIG into KEXEC_SIG and KEXEC_SIG_FORCE
- From: Jiri Bohac <jbohac@xxxxxxx>
- Re: [PATCH 08a/30] kexec_file: split KEXEC_VERIFY_SIG into KEXEC_SIG and KEXEC_SIG_FORCE
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH] efi/arm*: Only register page tables when they exist
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [PATCH 4.14 090/118] x86/pti: Unbreak EFI old_memmap
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] efi: Clarify that reset attack mitigation needs appropriate userspace
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 0/4] x86/xen/efi: Initialize UEFI secure boot state during dom0 boot
- From: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
- Re: [PATCH 08/30] kexec_file: Restrict at runtime if the kernel is locked down
- From: Jiri Bohac <jbohac@xxxxxxx>
- Re: [PATCH 1/2] kconfig: use bool instead of boolean for type definition attributes, again
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- Re: [PATCH 0/4] x86/xen/efi: Initialize UEFI secure boot state during dom0 boot
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 08/30] kexec_file: Restrict at runtime if the kernel is locked down
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 08/30] kexec_file: Restrict at runtime if the kernel is locked down
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 08b/30] kexec_file: Restrict at runtime if the kernel is locked down
- From: Jiri Bohac <jbohac@xxxxxxx>
- [PATCH 08a/30] kexec_file: split KEXEC_VERIFY_SIG into KEXEC_SIG and KEXEC_SIG_FORCE
- From: Jiri Bohac <jbohac@xxxxxxx>
- Re: [PATCH 08/30] kexec_file: Restrict at runtime if the kernel is locked down
- From: Jiri Bohac <jbohac@xxxxxxx>
- [PATCH 0/4] x86/xen/efi: Initialize UEFI secure boot state during dom0 boot
- From: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
- [PATCH 2/4] x86/xen/efi: Initialize boot_params.secure_boot in xen_efi_init()
- From: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
- [PATCH 4/4] efi: Rename efi_get_secureboot() to __efi_get_secureboot() and make it static
- From: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
- [PATCH 3/4] efi: Tweak efi_get_secureboot() and its data section assignment
- From: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
- [PATCH 1/4] efi/stub: Extract efi_get_secureboot() to separate file
- From: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
- Re: arm64 crashkernel fails to boot on acpi-only machines due to ACPI regions being no longer mapped as NOMAP
- From: Bhupesh Sharma <bhsharma@xxxxxxxxxx>
- Re: arm64 crashkernel fails to boot on acpi-only machines due to ACPI regions being no longer mapped as NOMAP
- From: AKASHI Takahiro <takahiro.akashi@xxxxxxxxxx>
- Re: arm64 crashkernel fails to boot on acpi-only machines due to ACPI regions being no longer mapped as NOMAP
- From: AKASHI Takahiro <takahiro.akashi@xxxxxxxxxx>
- Re: arm64 crashkernel fails to boot on acpi-only machines due to ACPI regions being no longer mapped as NOMAP
- From: AKASHI Takahiro <takahiro.akashi@xxxxxxxxxx>
- [PATCH] efi: Clarify that reset attack mitigation needs appropriate userspace
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: arm64 crashkernel fails to boot on acpi-only machines due to ACPI regions being no longer mapped as NOMAP
- From: Bhupesh Sharma <bhsharma@xxxxxxxxxx>
- [PATCH 4.14 13/38] efi/capsule-loader: Reinstate virtual capsule mapping
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH] PTI: unbreak EFI old_memmap
- From: Jiri Kosina <jikos@xxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: Remove Matt Fleming as EFI co-maintainer
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: Remove Matt Fleming as EFI co-maintainer
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] MAINTAINERS: Add Ard Biesheuvel to EFI test driver and efivarfs
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: Remove Matt Fleming as EFI co-maintainer
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: Remove Matt Fleming as EFI co-maintainer
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: Remove Matt Fleming as EFI co-maintainer
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] MAINTAINERS: Remove Matt Fleming as EFI co-maintainer
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/5] arm64: efi: ignore EFI_MEMORY_XP attribute if RP and/or WP are set
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 5/5] efi: parse ARM error information value
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 4/5] efi: move ARM CPER code to new file
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 3/5] efi: Use PTR_ERR_OR_ZERO()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 1/5] efi/capsule-loader: pr_err() strings should end with newlines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [GIT PULL 0/5] EFI updates for v4.16
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 2/2] efi: capsule-loader: reinstate virtual capsule mapping
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 1/2] x86/efi: Fix kernel param add_efi_memmap regression
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [GIT PULL 0/2] EFI fixes for v4.15
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: [RFT PATCH] efi: capsule-loader: reinstate virtual capsule mapping
- From: "Song, Ge" <ge.song@xxxxxxxxxxxxxxxx>
- Re: [RFT PATCH] efi: capsule-loader: reinstate virtual capsule mapping
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFT PATCH] efi: capsule-loader: reinstate virtual capsule mapping
- From: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
- Re: [GIT PULL 0/2] EFI updates for v4.15
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] module: allow symbol exports to be disabled
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [GIT PULL 0/2] EFI updates for v4.15
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- [RFT PATCH] efi: capsule-loader: reinstate virtual capsule mapping
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [GIT PULL 0/2] EFI updates for v4.15
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: arm64 crashkernel fails to boot on acpi-only machines due to ACPI regions being no longer mapped as NOMAP
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: arm64 crashkernel fails to boot on acpi-only machines due to ACPI regions being no longer mapped as NOMAP
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: arm64 crashkernel fails to boot on acpi-only machines due to ACPI regions being no longer mapped as NOMAP
- From: Bhupesh Sharma <bhsharma@xxxxxxxxxx>
- Re: arm64 crashkernel fails to boot on acpi-only machines due to ACPI regions being no longer mapped as NOMAP
- From: AKASHI Takahiro <takahiro.akashi@xxxxxxxxxx>
- Re: arm64 crashkernel fails to boot on acpi-only machines due to ACPI regions being no longer mapped as NOMAP
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: arm64 crashkernel fails to boot on acpi-only machines due to ACPI regions being no longer mapped as NOMAP
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: arm64 crashkernel fails to boot on acpi-only machines due to ACPI regions being no longer mapped as NOMAP
- From: Bhupesh Sharma <bhsharma@xxxxxxxxxx>
- Re: arm64 crashkernel fails to boot on acpi-only machines due to ACPI regions being no longer mapped as NOMAP
- From: AKASHI Takahiro <takahiro.akashi@xxxxxxxxxx>
- Re: arm64 crashkernel fails to boot on acpi-only machines due to ACPI regions being no longer mapped as NOMAP
- From: Bhupesh Sharma <bhsharma@xxxxxxxxxx>
- Re: [PATCH 0/2] Make capsules in a contiguous virtual space
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: arm64 crashkernel fails to boot on acpi-only machines due to ACPI regions being no longer mapped as NOMAP
- From: AKASHI Takahiro <takahiro.akashi@xxxxxxxxxx>
- Re: [PATCH 0/2] Make capsules in a contiguous virtual space
- From: Richard Ruigrok <rruigrok@xxxxxxxxxxxxxx>
- BUG: EFI capsule loader fails as of 4.13, the capsule is not passed in contiguous virtual memory
- From: Richard Ruigrok <rruigrok@xxxxxxxxxxxxxx>
- Re: arm64 crashkernel fails to boot on acpi-only machines due to ACPI regions being no longer mapped as NOMAP
- From: Bhupesh Sharma <bhsharma@xxxxxxxxxx>
- Re: arm64 crashkernel fails to boot on acpi-only machines due to ACPI regions being no longer mapped as NOMAP
- From: AKASHI Takahiro <takahiro.akashi@xxxxxxxxxx>
- Re: arm64 crashkernel fails to boot on acpi-only machines due to ACPI regions being no longer mapped as NOMAP
- From: Bhupesh Sharma <bhsharma@xxxxxxxxxx>
- Re: arm64 crashkernel fails to boot on acpi-only machines due to ACPI regions being no longer mapped as NOMAP
- From: Bhupesh Sharma <bhsharma@xxxxxxxxxx>
- Re: EFI crash with PCID on
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: EFI crash with PCID on
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- EFI crash with PCID on
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: arm64 crashkernel fails to boot on acpi-only machines due to ACPI regions being no longer mapped as NOMAP
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 0/2] Make capsules in a contiguous virtual space
- From: Ge Song <ge.song@xxxxxxxxxxxxxxxx>
- [PATCH 1/2] Revert "efi/capsule-loader: Use page addresses rather than struct page pointers"
- From: Ge Song <ge.song@xxxxxxxxxxxxxxxx>
- [PATCH 2/2] efi/capsule-loader: Request a contiguous virtual space for capsules
- From: Ge Song <ge.song@xxxxxxxxxxxxxxxx>
- RE: [PATCH 0/3] Use mm_struct and switch_mm() instead of manually
- From: "Prakhya, Sai Praneeth" <sai.praneeth.prakhya@xxxxxxxxx>
- Re: arm64 crashkernel fails to boot on acpi-only machines due to ACPI regions being no longer mapped as NOMAP
- From: AKASHI Takahiro <takahiro.akashi@xxxxxxxxxx>
- Re: arm64 crashkernel fails to boot on acpi-only machines due to ACPI regions being no longer mapped as NOMAP
- From: AKASHI Takahiro <takahiro.akashi@xxxxxxxxxx>
- Re: arm64 crashkernel fails to boot on acpi-only machines due to ACPI regions being no longer mapped as NOMAP
- From: AKASHI Takahiro <takahiro.akashi@xxxxxxxxxx>
- Re: arm64 crashkernel fails to boot on acpi-only machines due to ACPI regions being no longer mapped as NOMAP
- From: Bhupesh Sharma <bhsharma@xxxxxxxxxx>
- Re: arm64 crashkernel fails to boot on acpi-only machines due to ACPI regions being no longer mapped as NOMAP
- From: Bhupesh Sharma <bhsharma@xxxxxxxxxx>
- Re: [PATCH V3 0/2] CPER ARM error information parsing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V2] x86/efi: fix kernel param add_efi_memmap regression
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86: move parse_early_param to earlier code for add_efi_memmap
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: arm64 crashkernel fails to boot on acpi-only machines due to ACPI regions being no longer mapped as NOMAP
- From: AKASHI Takahiro <takahiro.akashi@xxxxxxxxxx>
- Re: arm64 crashkernel fails to boot on acpi-only machines due to ACPI regions being no longer mapped as NOMAP
- From: Bhupesh SHARMA <bhupesh.linux@xxxxxxxxx>
- Re: arm64 crashkernel fails to boot on acpi-only machines due to ACPI regions being no longer mapped as NOMAP
- From: AKASHI Takahiro <takahiro.akashi@xxxxxxxxxx>
- Re: arm64 crashkernel fails to boot on acpi-only machines due to ACPI regions being no longer mapped as NOMAP
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: arm64 crashkernel fails to boot on acpi-only machines due to ACPI regions being no longer mapped as NOMAP
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: arm64 crashkernel fails to boot on acpi-only machines due to ACPI regions being no longer mapped as NOMAP
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH 0/3] Use mm_struct and switch_mm() instead of manually
- From: Bhupesh Sharma <bhsharma@xxxxxxxxxx>
- Re: arm64 crashkernel fails to boot on acpi-only machines due to ACPI regions being no longer mapped as NOMAP
- From: Bhupesh Sharma <bhsharma@xxxxxxxxxx>
- [PATCH 3/3] x86/efi: Use efi_switch_mm() rather than manually twiddling with %cr3
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH 2/3] x86/efi: Replace efi_pgd with efi_mm.pgd
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH 1/3] efi: Use efi_mm in x86 as well as ARM
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH 0/3] Use mm_struct and switch_mm() instead of manually
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH] x86: move parse_early_param to earlier code for add_efi_memmap
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH] x86: move parse_early_param to earlier code for add_efi_memmap
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- [PATCH] efi: make EFI a menuconfig to ease disabling it all
- From: Vincent Legoll <vincent.legoll@xxxxxxxxx>
- [PATCH,v2] efi: make EFI a menuconfig to ease disabling it all
- From: Vincent Legoll <vincent.legoll@xxxxxxxxx>
- [PATCH V2] x86/efi: fix kernel param add_efi_memmap regression
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH 1/2] kconfig: use bool instead of boolean for type definition attributes, again
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] efi: make EFI a menuconfig to ease disabling it all
- From: "Austin S. Hemmelgarn" <ahferroin7@xxxxxxxxx>
- Re: [PATCH] efi: make EFI a menuconfig to ease disabling it all
- From: Vincent Legoll <vincent.legoll@xxxxxxxxx>
- Re: [PATCH] efi: make EFI a menuconfig to ease disabling it all
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 1/2] kconfig: use bool instead of boolean for type definition attributes, again
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- Re: [PATCH] efi: make EFI a menuconfig to ease disabling it all
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86: move parse_early_param to earlier code for add_efi_memmap
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] efi: Use PTR_ERR_OR_ZERO()
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.4 013/105] efi: Move some sysfs files to be read-only by root
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.4 103/105] Revert "x86/mm/pat: Ensure cpa->pfn only contains page frame numbers"
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.4 102/105] Revert "x86/efi: Hoist page table switching code into efi_call_virt()"
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.4 101/105] Revert "x86/efi: Build our own page table structures"
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3.18 11/64] efi: Move some sysfs files to be read-only by root
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: arm64 crashkernel fails to boot on acpi-only machines due to ACPI regions being no longer mapped as NOMAP
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: arm64 crashkernel fails to boot on acpi-only machines due to ACPI regions being no longer mapped as NOMAP
- From: AKASHI Takahiro <takahiro.akashi@xxxxxxxxxx>
- Booting LiveCD image from EFI PXE?
- From: Locane <locane@xxxxxxxxx>
- Re: [PATCH 4.4 05/27] x86/efi: Build our own page table structures
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86: move parse_early_param to earlier code for add_efi_memmap
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: arm64 crashkernel fails to boot on acpi-only machines due to ACPI regions being no longer mapped as NOMAP
- From: Bhupesh SHARMA <bhupesh.linux@xxxxxxxxx>
- Re: arm64 crashkernel fails to boot on acpi-only machines due to ACPI regions being no longer mapped as NOMAP
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: arm64 crashkernel fails to boot on acpi-only machines due to ACPI regions being no longer mapped as NOMAP
- From: AKASHI Takahiro <takahiro.akashi@xxxxxxxxxx>
- Re: arm64 crashkernel fails to boot on acpi-only machines due to ACPI regions being no longer mapped as NOMAP
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: arm64 crashkernel fails to boot on acpi-only machines due to ACPI regions being no longer mapped as NOMAP
- From: AKASHI Takahiro <takahiro.akashi@xxxxxxxxxx>
- Re: arm64 crashkernel fails to boot on acpi-only machines due to ACPI regions being no longer mapped as NOMAP
- From: Bhupesh Sharma <bhsharma@xxxxxxxxxx>
- RE: [PATCH 4.4 05/27] x86/efi: Build our own page table structures
- From: "Ghannam, Yazen" <Yazen.Ghannam@xxxxxxx>
- [PATCH V3 2/2] efi: parse ARM error information value
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V3 1/2] efi: move ARM CPER code to new file
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V3 0/2] CPER ARM error information parsing
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH 4.14 038/164] efi: Move some sysfs files to be read-only by root
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.14 039/164] efi/esrt: Use memunmap() instead of kfree() to free the remapping
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.9 017/148] efi/esrt: Use memunmap() instead of kfree() to free the remapping
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.9 016/148] efi: Move some sysfs files to be read-only by root
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 41/45] arch/x86: remove duplicate includes
- From: Juergen Gross <jgross@xxxxxxxx>
- Re: [PATCH V2 1/2] efi: move ARM CPER code to new file
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 2/2] arm64: Add software workaround for Falkor erratum 1041
- From: Shanker Donthineni <shankerd@xxxxxxxxxxxxxx>
- [PATCH v5 1/2] arm64: Define cputype macros for Falkor CPU
- From: Shanker Donthineni <shankerd@xxxxxxxxxxxxxx>
- Re: [RESEND PATCH v4 2/2] arm64: Add software workaround for Falkor erratum 1041
- From: Shanker Donthineni <shankerd@xxxxxxxxxxxxxx>
- Re: [PATCH V2 1/2] efi: move ARM CPER code to new file
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- Re: [PATCH V2 1/2] efi: move ARM CPER code to new file
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V2 1/2] efi: move ARM CPER code to new file
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH 41/45] arch/x86: remove duplicate includes
- From: Pravin Shedge <pravin.shedge4linux@xxxxxxxxx>
- Re: [RESEND PATCH v4 2/2] arm64: Add software workaround for Falkor erratum 1041
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [RESEND PATCH v4 2/2] arm64: Add software workaround for Falkor erratum 1041
- From: Shanker Donthineni <shankerd@xxxxxxxxxxxxxx>
- [RESEND PATCH v4 1/2] arm64: Define cputype macros for Falkor CPU
- From: Shanker Donthineni <shankerd@xxxxxxxxxxxxxx>
- Re: [PATCH 4.4 05/27] x86/efi: Build our own page table structures
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH] efi: make EFI a menuconfig to ease disabling it all
- From: Vincent Legoll <vincent.legoll@xxxxxxxxx>
- [PATCH resend] fix boot hang with earlyprintk=efi,keep
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: Firmware signing -- Re: [PATCH 00/27] security, efi: Add kernel lockdown
- From: Alan Cox <gnomes@xxxxxxxxxxxxxxxxxxx>
[Index of Archives]
[Linux Kernel Development]
[Security]
[Linux ARM Kernel]
[Tools]
[Linux MIPS]
[Linux S390]
[Bugtraq]
[Share Photos]>
[Fedora ARM]