Linux EFI/UEFI Development
[Prev Page][Next Page]
- [efi:next] BUILD SUCCESS 917b3b926ae0d8d89803dcda5e8db81a3ef9288b
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v2] efi: fix panic in kdump kernel
- From: Oleksandr Tymoshenko <ovt@xxxxxxxxxx>
- Re: [PATCH v8 01/15] x86/boot: Place kernel_info at a fixed offset
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: x86_64 32-bit EFI mixed mode boot broken
- From: "Clayton Craft" <clayton@xxxxxxxxxxxxx>
- Re: [PATCH 3/4] PCI: Add TLP Prefix reading into pcie_read_tlp_log()
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: x86_64 32-bit EFI mixed mode boot broken
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: x86_64 32-bit EFI mixed mode boot broken
- From: "Clayton Craft" <clayton@xxxxxxxxxxxxx>
- Re: x86_64 32-bit EFI mixed mode boot broken
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: x86_64 32-bit EFI mixed mode boot broken
- From: Clayton Craft <clayton@xxxxxxxxxxxxx>
- [PATCH 0/2] EFI mixed mode fixes
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH 1/2] x86/efistub: Call mixed mode boot services on the firmware's stack
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH 2/2] x86/efistub: Don't clear BSS twice in mixed mode
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [PATCH v8 01/15] x86/boot: Place kernel_info at a fixed offset
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH 0/4] PCI: Consolidate TLP Log reading and printing
- From: Ilpo Järvinen <ilpo.jarvinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] efi/libstub: fix efi_random_alloc() to allocate memory at alloc_min or higher address
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: x86_64 32-bit EFI mixed mode boot broken
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] efi/libstub: fix efi_random_alloc() to allocate memory at alloc_min or higher address
- From: KONDO KAZUMA(近藤 和真) <kazuma-kondo@xxxxxxx>
- [PATCH] efi/libstub: fix efi_random_alloc() to allocate memory at alloc_min or higher address
- From: KONDO KAZUMA(近藤 和真) <kazuma-kondo@xxxxxxx>
- Re: [PATCH] efi: fix panic in kdump kernel
- From: Johan Hovold <johan@xxxxxxxxxx>
- Re: Question about Address Range Validation in Crash Kernel Allocation
- From: Li Huafei <lihuafei1@xxxxxxxxxx>
- Re: Question about Address Range Validation in Crash Kernel Allocation
- From: Dave Young <dyoung@xxxxxxxxxx>
- [PATCH] efi: fix panic in kdump kernel
- From: Oleksandr Tymoshenko <ovt@xxxxxxxxxx>
- Re: x86_64 32-bit EFI mixed mode boot broken
- From: Clayton Craft <clayton@xxxxxxxxxxxxx>
- Re: x86_64 32-bit EFI mixed mode boot broken
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- x86_64 32-bit EFI mixed mode boot broken
- From: Clayton Craft <clayton@xxxxxxxxxxxxx>
- x86_64 32-bit EFI mixed mode boot broken
- From: Clayton Craft <clayton@xxxxxxxxxxxxx>
- Re: efivarfs fixes without the commit being fixed in 6.1 and 6.6 (resending without html)
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: efivarfs fixes without the commit being fixed in 6.1 and 6.6 (resending without html)
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: efivarfs fixes without the commit being fixed in 6.1 and 6.6 (resending without html)
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: efivarfs fixes without the commit being fixed in 6.1 and 6.6 (resending without html)
- From: Ted Brandston <tbrandston@xxxxxxxxxx>
- Re: [PATCH v8 14/15] x86: Secure Launch late initcall platform module
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 01/15] x86/boot: Place kernel_info at a fixed offset
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] riscv: dmi: Add SMBIOS/DMI support
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- Re: [PATCH v2] riscv: dmi: Add SMBIOS/DMI support
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2] riscv: dmi: Add SMBIOS/DMI support
- From: Haibo Xu <haibo1.xu@xxxxxxxxx>
- Re: [GIT PULL] EFI fixes for v6.9 #1
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] EFI fixes for v6.9 #1
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH 5.15-] efivars: Request at most 512 bytes for variable names
- From: Tim Schumacher <timschumi@xxxxxx>
- [efi:next] BUILD SUCCESS b3810c5a2cc4a6665f7a65bed5393c75ce3f3aa2
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 1/3] efi: pstore: Request at most 512 bytes for variable names
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- Re: [PATCH 3/3] efi: Clear up misconceptions about a maximum variable name size
- From: Tim Schumacher <timschumi@xxxxxx>
- Re: [PATCH 1/3] efi: pstore: Request at most 512 bytes for variable names
- From: Tim Schumacher <timschumi@xxxxxx>
- Re: [PATCH 2/3] efivarfs: Remove unused internal struct members
- From: Tim Schumacher <timschumi@xxxxxx>
- [PATCH] x86/efistub: Clear decompressor BSS in native EFI entrypoint
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [PATCH 3/3] efi: Clear up misconceptions about a maximum variable name size
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 2/3] efivarfs: Remove unused internal struct members
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 1/3] efi: pstore: Request at most 512 bytes for variable names
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 1/3] efi: pstore: Request at most 512 bytes for variable names
- From: Tim Schumacher <timschumi@xxxxxx>
- [PATCH 3/3] efi: Clear up misconceptions about a maximum variable name size
- From: Tim Schumacher <timschumi@xxxxxx>
- [PATCH 2/3] efivarfs: Remove unused internal struct members
- From: Tim Schumacher <timschumi@xxxxxx>
- Re: [PATCH 2/4] PCI: Generalize TLP Header Log reading
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: [GIT PULL] EFI updates for v6.9
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] EFI updates for v6.9
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [PATCH RFC 1/8] certs: Introduce ability to link to a system key
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC 8/8] clavis: Introduce new LSM called clavis
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- RE: [EXTERNAL] [PATCH RFC 1/8] certs: Introduce ability to link to a system key
- From: Bharat Bhushan <bbhushan2@xxxxxxxxxxx>
- Re: [PATCH RFC 8/8] clavis: Introduce new LSM called clavis
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH RFC 1/8] certs: Introduce ability to link to a system key
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH RFC 1/8] certs: Introduce ability to link to a system key
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH RFC 1/8] certs: Introduce ability to link to a system key
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC 1/8] certs: Introduce ability to link to a system key
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH RFC 8/8] clavis: Introduce new LSM called clavis
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC 7/8] clavis: Introduce a new key type called clavis_key_acl
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC 6/8] keys: Add ability to track intended usage of the public key
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC 0/8] Clavis LSM
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC 5/8] keys: Add new verification type (VERIFYING_CLAVIS_SIGNATURE)
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC 4/8] clavis: Prevent clavis boot param from changing during kexec
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC 2/8] clavis: Introduce a new system keyring called clavis
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC 1/8] certs: Introduce ability to link to a system key
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC 3/8] efi: Make clavis boot param persist across kexec
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH 0/4] PCI: Consolidate TLP Log reading and printing
- From: Ilpo Järvinen <ilpo.jarvinen@xxxxxxxxxxxxxxx>
- [efi:next] BUILD SUCCESS 021bc4b9d7ed8dcc90dc288e59f120fa6e3087dc
- From: kernel test robot <lkp@xxxxxxxxx>
- [efi:next] BUILD SUCCESS WITH WARNING 4749cfc7ffaa827b6ecc916ab8d09bae718688bc
- From: kernel test robot <lkp@xxxxxxxxx>
- [efi:next 1/7] drivers/firmware/efi/libstub/efi-stub-helper.c:225:26: warning: field tagged_event within 'struct efistub_measured_event' is less aligned than 'TCG_PCClientTaggedEvent' (aka 'struct tdTCG_PCClientTaggedEvent') and is usually due to 'struct efistub_measure...
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 0/4] PCI: Consolidate TLP Log reading and printing
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: [PATCH v3 1/5] efi/libstub: Use correct event size when measuring data into the TPM
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH v3 1/5] efi/libstub: Use correct event size when measuring data into the TPM
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v3 1/5] efi/libstub: Use correct event size when measuring data into the TPM
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH v3 1/5] efi/libstub: Use correct event size when measuring data into the TPM
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [efi:next] BUILD SUCCESS 540e90b461259ac990ce234f526668b86583e3cc
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v3 5/5] efi/libstub: Add get_event_log() support for CC platforms
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH v3 4/5] efi/libstub: Measure into CC protocol if TCG2 protocol is absent
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH v3 3/5] efi/libstub: Add Confidential Computing (CC) measurement typedefs
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH v3 2/5] efi/tpm: Use symbolic GUID name from spec for final events table
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH v3 0/5] efi/libstub: Fall back to CC proto for measurement
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH v3 1/5] efi/libstub: Use correct event size when measuring data into the TPM
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [External] Re: [PATCH 3/3] efistub: fix missed the initialization of gp
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] riscv: dmi: Add SMBIOS/DMI support
- From: Haibo Xu <xiaobo55x@xxxxxxxxx>
- Re: [External] Re: [PATCH 3/3] efistub: fix missed the initialization of gp
- From: yunhui cui <cuiyunhui@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/5] efi/libstub: Fold efi_tcg2_tagged_event into efi_measured_event
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH v2 2/5] efi/tpm: Use symbolic GUID name from spec for final events table
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [External] Re: [PATCH 3/3] efistub: fix missed the initialization of gp
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 2/5] efi/tpm: Use symbolic GUID name from spec for final events table
- From: Kuppuswamy Sathyanarayanan <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- [PATCH v2 5/5] efi/libstub: Add get_event_log() support for CC platforms
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH v2 4/5] efi/libstub: Measure into CC protocol if TCG2 protocol is absent
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH v2 3/5] efi/libstub: Add Confidential Computing (CC) measurement typedefs
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH v2 2/5] efi/tpm: Use symbolic GUID name from spec for final events table
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH v2 1/5] efi/libstub: Fold efi_tcg2_tagged_event into efi_measured_event
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH v2 0/5] efi/libstub: Fall back to CC proto for measurement
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [Bug Report] Bug in "efi/libstub: Add get_event_log() support for CC platforms"
- From: Kuppuswamy Sathyanarayanan <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [Bug Report] Bug in "efi/libstub: Add get_event_log() support for CC platforms"
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [Bug Report] Bug in "efi/libstub: Add get_event_log() support for CC platforms"
- From: Kuppuswamy Sathyanarayanan <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [Bug Report] Bug in "efi/libstub: Add get_event_log() support for CC platforms"
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [Bug Report] Bug in "efi/libstub: Add get_event_log() support for CC platforms"
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [Bug Report] Bug in "efi/libstub: Add get_event_log() support for CC platforms"
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [Bug Report] Bug in "efi/libstub: Add get_event_log() support for CC platforms"
- From: Muhammad Usama Anjum <usama.anjum@xxxxxxxxxxxxx>
- Re: [PATCH] riscv: dmi: Add SMBIOS/DMI support
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] riscv: dmi: Add SMBIOS/DMI support
- From: Haibo Xu <haibo1.xu@xxxxxxxxx>
- Re: [External] Re: [PATCH 3/3] efistub: fix missed the initialization of gp
- From: yunhui cui <cuiyunhui@xxxxxxxxxxxxx>
- Re: [External] Re: [PATCH 3/3] efistub: fix missed the initialization of gp
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [External] Re: [PATCH 3/3] efistub: fix missed the initialization of gp
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [External] Re: [PATCH 3/3] efistub: fix missed the initialization of gp
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [External] Re: [PATCH 3/3] efistub: fix missed the initialization of gp
- From: Palmer Dabbelt <palmer@xxxxxxxxxxx>
- [efi:next] BUILD SUCCESS 34dbd8b7c991b784fcc1af7bfa5b6f96f33ff196
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [External] Re: [PATCH 1/3] Revert "riscv/efistub: Ensure GP-relative addressing is not used"
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [External] Re: [PATCH 3/3] efistub: fix missed the initialization of gp
- From: yunhui cui <cuiyunhui@xxxxxxxxxxxxx>
- Re: [External] Re: [PATCH 1/3] Revert "riscv/efistub: Ensure GP-relative addressing is not used"
- From: yunhui cui <cuiyunhui@xxxxxxxxxxxxx>
- Re: [External] Re: [PATCH 1/3] Revert "riscv/efistub: Ensure GP-relative addressing is not used"
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [External] Re: [PATCH 3/3] efistub: fix missed the initialization of gp
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [External] Re: [PATCH 1/3] Revert "riscv/efistub: Ensure GP-relative addressing is not used"
- From: yunhui cui <cuiyunhui@xxxxxxxxxxxxx>
- Re: [External] Re: [PATCH 3/3] efistub: fix missed the initialization of gp
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 1/3] Revert "riscv/efistub: Ensure GP-relative addressing is not used"
- From: Jan Kiszka <jan.kiszka@xxxxxxxxxxx>
- Re: [External] Re: [PATCH 1/3] Revert "riscv/efistub: Ensure GP-relative addressing is not used"
- From: yunhui cui <cuiyunhui@xxxxxxxxxxxxx>
- Re: [External] Re: [PATCH 3/3] efistub: fix missed the initialization of gp
- From: yunhui cui <cuiyunhui@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] Revert "riscv/efistub: Ensure GP-relative addressing is not used"
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 3/3] efistub: fix missed the initialization of gp
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 1/3] Revert "riscv/efistub: Ensure GP-relative addressing is not used"
- From: Yunhui Cui <cuiyunhui@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] Revert "riscv/efistub: Ensure GP-relative addressing is not used"
- From: Conor Dooley <conor.dooley@xxxxxxxxxxxxx>
- [PATCH 3/3] efistub: fix missed the initialization of gp
- From: Yunhui Cui <cuiyunhui@xxxxxxxxxxxxx>
- [PATCH 2/3] Revert "riscv/efistub: Tighten ELF relocation check"
- From: Yunhui Cui <cuiyunhui@xxxxxxxxxxxxx>
- 판매 문의 2024
- From: info@xxxxxxxxxxxxxxxxxxxxxx
- Re: [PATCH 3/4] efi/libstub: Measure into CC protocol if TCG2 protocol is absent
- From: Kuppuswamy Sathyanarayanan <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/4] efi/libstub: Measure into CC protocol if TCG2 protocol is absent
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH 3/4] efi/libstub: Measure into CC protocol if TCG2 protocol is absent
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 2/4] efi/libstub: Add Confidential Computing (CC) measurement typedefs
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH 3/4] efi/libstub: Measure into CC protocol if TCG2 protocol is absent
- From: Kuppuswamy Sathyanarayanan <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/4] efi/libstub: Add Confidential Computing (CC) measurement typedefs
- From: Kuppuswamy Sathyanarayanan <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] efi/libstub: Fold efi_tcg2_tagged_event into efi_measured_event
- From: Kuppuswamy Sathyanarayanan <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/4] efi/libstub: Measure into CC protocol if TCG2 protocol is absent
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH 3/4] efi/libstub: Measure into CC protocol if TCG2 protocol is absent
- From: Kuppuswamy Sathyanarayanan <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/4] efi/libstub: Add Confidential Computing (CC) measurement typedefs
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH 3/4] efi/libstub: Measure into CC protocol if TCG2 protocol is absent
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH 3/4] efi/libstub: Measure into CC protocol if TCG2 protocol is absent
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH 3/4] efi/libstub: Measure into CC protocol if TCG2 protocol is absent
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 3/4] efi/libstub: Measure into CC protocol if TCG2 protocol is absent
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH 1/4] efi/libstub: Fold efi_tcg2_tagged_event into efi_measured_event
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v5 3/3] of: property: fw_devlink: Add support for "post-init-providers" property
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- [PATCH v5 2/3] driver core: Add FWLINK_FLAG_IGNORE to completely ignore a fwnode link
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- [PATCH v5 1/3] driver core: Adds flags param to fwnode_link_add()
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- [PATCH v5 0/3] Add post-init-providers binding to improve suspend/resume stability
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- Re: [PATCH 1/4] efi/libstub: Fold efi_tcg2_tagged_event into efi_measured_event
- From: Kuppuswamy Sathyanarayanan <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/4] Add post-init-providers binding to improve suspend/resume stability
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH stable-v6.1 00/18] efistub/x86 changes for secure boot
- From: Greg KH <greg@xxxxxxxxx>
- [PATCH stable-v6.1 18/18] efi/x86: Fix the missing KASLR_FLAG bit in boot_params->hdr.loadflags
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH stable-v6.1 16/18] x86/boot: Rename conflicting 'boot_params' pointer to 'boot_params_ptr'
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH stable-v6.1 17/18] x86/boot: efistub: Assign global boot_params variable
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH stable-v6.1 15/18] x86/efistub: Avoid placing the kernel below LOAD_PHYSICAL_ADDR
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH stable-v6.1 14/18] efi/x86: Avoid physical KASLR on older Dell systems
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH stable-v6.1 13/18] x86/efistub: Avoid legacy decompressor when doing EFI boot
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH stable-v6.1 12/18] x86/efistub: Perform SNP feature test while running in the firmware
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH stable-v6.1 11/18] x86/efistub: Prefer EFI memory attributes protocol over DXE services
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH stable-v6.1 10/18] x86/decompressor: Factor out kernel decompression and relocation
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH stable-v6.1 09/18] x86/efistub: Perform 4/5 level paging switch from the stub
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH stable-v6.1 08/18] efi/libstub: Add limit argument to efi_random_alloc()
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH stable-v6.1 07/18] efi/libstub: Add memory attribute protocol definitions
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH stable-v6.1 06/18] x86/decompressor: Move global symbol references to C code
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH stable-v6.1 05/18] x86/efistub: Clear BSS in EFI handover protocol entrypoint
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH stable-v6.1 04/18] x86/decompressor: Avoid magic offsets for EFI handover entrypoint
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH stable-v6.1 02/18] efi: efivars: prevent double registration
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH stable-v6.1 03/18] x86/efistub: Simplify and clean up handover entry code
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH stable-v6.1 01/18] arm64: efi: Limit allocations to 48-bit addressable physical region
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH stable-v6.1 00/18] efistub/x86 changes for secure boot
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH 4/4] efi/libstub: Add get_event_log() support for CC platforms
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH 3/4] efi/libstub: Measure into CC protocol if TCG2 protocol is absent
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH 2/4] efi/libstub: Add Confidential Computing (CC) measurement typedefs
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH 1/4] efi/libstub: Fold efi_tcg2_tagged_event into efi_measured_event
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH 0/4] efi/libstub: Fall back to CC proto for measurement
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [PATCH v2 1/2] efi/libstub: Add Confidential Computing (CC) measurement support
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Development of new flavors
- From: "Maxwell Atlee" <maxwell.atlee@xxxxxxxxxxxxx>
- Re: [PATCH 4/4] ras/events: Trace CXL CPER events even without the CXL stack loaded
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH 2/4] acpi/ghes: Process CXL Component Events
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH 4/4] ras/events: Trace CXL CPER events even without the CXL stack loaded
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH 1/4] cxl/event: Add missing include files
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH 3/4] cxl/pci: Register for and process CPER events
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH 2/4] acpi/ghes: Process CXL Component Events
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH 1/4] cxl/event: Add missing include files
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [GIT PULL] EFI fixes for v6.8 #2
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] EFI fixes for v6.8 #2
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [PATCH v3 0/4] Add post-init-providers binding to improve suspend/resume stability
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- Re: [PATCH v4 0/4] Add post-init-providers binding to improve suspend/resume stability
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- [PATCH 4/4] ras/events: Trace CXL CPER events even without the CXL stack loaded
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- [PATCH 3/4] cxl/pci: Register for and process CPER events
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- [PATCH 2/4] acpi/ghes: Process CXL Component Events
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- [PATCH 1/4] cxl/event: Add missing include files
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- [PATCH 0/4] efi/cxl-cper: Report CXL CPER events through tracing
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH v2 2/2] efi/libstub: Add get_event_log() support for CC platforms
- From: Kuppuswamy Sathyanarayanan <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] efi/libstub: Add Confidential Computing (CC) measurement support
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH v2 2/2] efi/libstub: Add get_event_log() support for CC platforms
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- [efi:urgent] BUILD SUCCESS 2ce507f57ba9c78c080d4a050ebdc97263239de8
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH 1/2] efivarfs: Drop redundant cleanup on fill_super() failure
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH 2/2] efivarfs: Drop 'duplicates' bool parameter on efivar_init()
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [PATCH v2 1/2] efi/libstub: Add Confidential Computing (CC) measurement support
- From: Kuppuswamy Sathyanarayanan <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] efi/libstub: Add get_event_log() support for CC platforms
- From: Kuppuswamy Sathyanarayanan <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 06/15] x86: Add early SHA support for Secure Launch early measurements
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v8 06/15] x86: Add early SHA support for Secure Launch early measurements
- From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
- Re: [PATCH v8 06/15] x86: Add early SHA support for Secure Launch early measurements
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v3 4/4] of: property: fw_devlink: Add support for "post-init-providers" property
- From: Rob Herring <robh+dt@xxxxxxxxxx>
- Re: [PATCH v8 06/15] x86: Add early SHA support for Secure Launch early measurements
- From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
- Re: [PATCH v2 2/2] efi/libstub: Add get_event_log() support for CC platforms
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH v8 14/15] x86: Secure Launch late initcall platform module
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v8 06/15] x86: Add early SHA support for Secure Launch early measurements
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v3 4/4] of: property: fw_devlink: Add support for "post-init-providers" property
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- Re: [PATCH v3 0/4] Add post-init-providers binding to improve suspend/resume stability
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- Re: [PATCH v8 04/15] x86: Secure Launch Resource Table header file
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH 2/2] x86/snp: Convert shared memory back to private on kexec
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v8 14/15] x86: Secure Launch late initcall platform module
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/4] Add post-init-providers binding to improve suspend/resume stability
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 4/4] of: property: fw_devlink: Add support for "post-init-providers" property
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 06/15] x86: Add early SHA support for Secure Launch early measurements
- From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
- Re: [PATCH 2/2] x86/snp: Convert shared memory back to private on kexec
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 06/15] x86: Add early SHA support for Secure Launch early measurements
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v3 3/4] dt-bindings: Add post-init-providers property
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH v4 3/4] dt-bindings: Add post-init-providers property
- From: Rob Herring <robh@xxxxxxxxxx>
- [PATCH v4 4/4] of: property: fw_devlink: Add support for "post-init-providers" property
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- [PATCH v4 3/4] dt-bindings: Add post-init-providers property
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- [PATCH v4 2/4] driver core: Add FWLINK_FLAG_IGNORE to completely ignore a fwnode link
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- [PATCH v4 1/4] driver core: Adds flags param to fwnode_link_add()
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- [PATCH v4 0/4] Add post-init-providers binding to improve suspend/resume stability
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- Re: [PATCH v3 3/4] dt-bindings: Add post-init-providers property
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- Re: [PATCH v8 06/15] x86: Add early SHA support for Secure Launch early measurements
- From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
- Re: [PATCH v8 04/15] x86: Secure Launch Resource Table header file
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v8 04/15] x86: Secure Launch Resource Table header file
- From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
- Re: [PATCH v3 3/4] dt-bindings: Add post-init-providers property
- From: Rob Herring <robh@xxxxxxxxxx>
- [PATCH v3 4/4] of: property: fw_devlink: Add support for "post-init-providers" property
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- [PATCH v3 3/4] dt-bindings: Add post-init-providers property
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- [PATCH v3 2/4] driver core: Add FWLINK_FLAG_IGNORE to completely ignore a fwnode link
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- [PATCH v3 1/4] driver core: Adds flags param to fwnode_link_add()
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- [PATCH v3 0/4] Add post-init-providers binding to improve suspend/resume stability
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- Re: [PATCH v8 15/15] x86: EFI stub DRTM launch support for Secure Launch
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 3/4] dt-bindings: Add post-init-supplier property
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- Re: [PATCH v8 15/15] x86: EFI stub DRTM launch support for Secure Launch
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH 2/2] x86/snp: Convert shared memory back to private on kexec
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v8 15/15] x86: EFI stub DRTM launch support for Secure Launch
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v2 3/4] dt-bindings: Add post-init-supplier property
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH 0/4] arm64: mm: support dynamic vmalloc/pmd configuration
- From: Maxwell Bland <mbland@xxxxxxxxxxxx>
- Re: [PATCH 1/4] mm/vmalloc: allow arch-specific vmalloc_node overrides
- From: Maxwell Bland <mbland@xxxxxxxxxxxx>
- RE: [External] Re: [PATCH 2/4] mm: pgalloc: support address-conditional pmd allocation
- From: Maxwell Bland <mbland@xxxxxxxxxxxx>
- RE: [External] Re: [PATCH 0/4] arm64: mm: support dynamic vmalloc/pmd configuration
- From: Maxwell Bland <mbland@xxxxxxxxxxxx>
- Re: [PATCH 0/4] arm64: mm: support dynamic vmalloc/pmd configuration
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH v2 3/4] dt-bindings: Add post-init-supplier property
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH 2/4] mm: pgalloc: support address-conditional pmd allocation
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH 1/4] mm/vmalloc: allow arch-specific vmalloc_node overrides
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH 0/4] arm64: mm: support dynamic vmalloc/pmd configuration
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH v2 3/4] dt-bindings: Add post-init-supplier property
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH 3/4] arm64: separate code and data virtual memory allocation
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH 2/4] mm: pgalloc: support address-conditional pmd allocation
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH 1/4] mm/vmalloc: allow arch-specific vmalloc_node overrides
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH 1/4] mm/vmalloc: allow arch-specific vmalloc_node overrides
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] dt-bindings: Add post-init-supplier property
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- Re: [PATCH v2 3/4] dt-bindings: Add post-init-supplier property
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- [PATCH 3/4] arm64: separate code and data virtual memory allocation
- From: Maxwell Bland <mbland@xxxxxxxxxxxx>
- [PATCH 1/4] mm/vmalloc: allow arch-specific vmalloc_node overrides
- From: Maxwell Bland <mbland@xxxxxxxxxxxx>
- [PATCH 4/4] arm64: dynamic enforcement of pmd-level PXNTable
- From: Maxwell Bland <mbland@xxxxxxxxxxxx>
- [PATCH 2/4] mm: pgalloc: support address-conditional pmd allocation
- From: Maxwell Bland <mbland@xxxxxxxxxxxx>
- [PATCH 0/4] arm64: mm: support dynamic vmalloc/pmd configuration
- From: Maxwell Bland <mbland@xxxxxxxxxxxx>
- Re: [PATCH 1/2] x86/mm: Do not zap PMD entry mapping unaccepted memory table during kdump.
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [RFC] efi: Add ACPI_MEMORY_NVS into the linear map
- From: Boqun Feng <boqun.feng@xxxxxxxxx>
- Re: x86 efistub stable backports for v6.6
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH 1/2] x86/mm: Do not zap PMD entry mapping unaccepted memory table during kdump.
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: x86 efistub stable backports for v6.6
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- Re: x86 efistub stable backports for v6.6
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC] efi: Add ACPI_MEMORY_NVS into the linear map
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC] efi: Add ACPI_MEMORY_NVS into the linear map
- From: Boqun Feng <boqun.feng@xxxxxxxxx>
- [PATCH 2/2] x86/snp: Convert shared memory back to private on kexec
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH 1/2] x86/mm: Do not zap PMD entry mapping unaccepted memory table during kdump.
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH 0/2] x86/snp: Add kexec support
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- Re: x86 efistub stable backports for v6.6
- From: xnox <dimitri.ledkov@xxxxxxxxxxxxx>
- [PATCH v2] efi/x86: skip efi_arch_mem_reserve() in case of kexec.
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH] efi/x86: skip efi_arch_mem_reserve() in case of kexec.
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- Re: [PATCH v2 2/2] efi/libstub: Add get_event_log() support for CC platforms
- From: Kuppuswamy Sathyanarayanan <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] efi/libstub: Add get_event_log() support for CC platforms
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH v2 1/2] efi/libstub: Add Confidential Computing (CC) measurement support
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH v8 15/15] x86: EFI stub DRTM launch support for Secure Launch
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 3/4] dt-bindings: Add post-init-supplier property
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH v8 14/15] x86: Secure Launch late initcall platform module
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [RFC] efi: Add ACPI_MEMORY_NVS into the linear map
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 15/15] x86: EFI stub DRTM launch support for Secure Launch
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v8 14/15] x86: Secure Launch late initcall platform module
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [RFC] efi: Add ACPI_MEMORY_NVS into the linear map
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC] efi: Add ACPI_MEMORY_NVS into the linear map
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC] efi: Add ACPI_MEMORY_NVS into the linear map
- From: Boqun Feng <boqun.feng@xxxxxxxxx>
- [RFC] efi: Add ACPI_MEMORY_NVS into the linear map
- From: Boqun Feng <boqun.feng@xxxxxxxxx>
- Re: [PATCH v8 07/15] x86: Secure Launch kernel early boot stub
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v8 03/15] x86: Secure Launch Kconfig
- From: ross.philipson@xxxxxxxxxx
- [efi:urgent] BUILD SUCCESS e258b85f1c3c9122fe4592a0cf99669c60df35e1
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 2/4] efi/cper, cxl: Make definitions and structures global
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 4/4] acpi/ghes, cxl/pci: Trace FW-First CXL Protocol Errors
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v2 3/4] dt-bindings: Add post-init-supplier property
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH v2 3/4] acpi/ghes, efi/cper: Recognize and process CXL Protocol Errors.
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v2 2/4] efi/cper, cxl: Make definitions and structures global
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: x86 efistub stable backports for v6.6
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 1/4] acpi/ghes, cxl: Create a common CXL struct to handle different CXL CPER records
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v8 01/15] x86/boot: Place kernel_info at a fixed offset
- From: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
- Re: x86 efistub stable backports for v6.6
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: x86 efistub stable backports for v6.6
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: x86 efistub stable backports for v6.6
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- x86 efistub stable backports for v6.6
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v8 15/15] x86: EFI stub DRTM launch support for Secure Launch
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v8 14/15] x86: Secure Launch late initcall platform module
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v8 07/15] x86: Secure Launch kernel early boot stub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v8 06/15] x86: Add early SHA support for Secure Launch early measurements
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v8 04/15] x86: Secure Launch Resource Table header file
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v8 03/15] x86: Secure Launch Kconfig
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v8 01/15] x86/boot: Place kernel_info at a fixed offset
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 2/2] efi/libstub: Add get_event_log() support for CC platforms
- From: Kuppuswamy Sathyanarayanan <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- [PATCH v2 1/2] efi/libstub: Add Confidential Computing (CC) measurement support
- From: Kuppuswamy Sathyanarayanan <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- [PATCH v2 0/2] Add measurement and event log support for CC platforms
- From: Kuppuswamy Sathyanarayanan <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] dt-bindings: Add post-init-supplier property
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- [PATCH v8 13/15] tpm: Add sysfs interface to allow setting and querying the preferred locality
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 11/15] reboot: Secure Launch SEXIT support on reboot paths
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 12/15] tpm: Add ability to set the preferred locality the TPM chip uses
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 10/15] kexec: Secure Launch kexec SEXIT support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 09/15] x86: Secure Launch SMP bringup support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 07/15] x86: Secure Launch kernel early boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 02/15] Documentation/x86: Secure Launch kernel documentation
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 15/15] x86: EFI stub DRTM launch support for Secure Launch
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 08/15] x86: Secure Launch kernel late boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 14/15] x86: Secure Launch late initcall platform module
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 05/15] x86: Secure Launch main header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 06/15] x86: Add early SHA support for Secure Launch early measurements
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 01/15] x86/boot: Place kernel_info at a fixed offset
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 04/15] x86: Secure Launch Resource Table header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 00/15] x86: Trenchboot secure dynamic launch Linux kernel support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 03/15] x86: Secure Launch Kconfig
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v2 3/4] dt-bindings: Add post-init-supplier property
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH v2 3/4] dt-bindings: Add post-init-supplier property
- From: Conor Dooley <conor@xxxxxxxxxx>
- [efi:urgent] BUILD SUCCESS fccfa646ef3628097d59f7d9c1a3e84d4b6bb45e
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v3] efivarfs: Request at most 512 bytes for variable names
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi/capsule-loader: fix incorrect allocation size
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH AUTOSEL 5.10 2/6] efi: Don't add memblocks for soft-reserved memory
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.10 1/6] efi: runtime: Fix potential overflow of soft-reserved region size
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.15 15/22] efi: Don't add memblocks for soft-reserved memory
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.15 14/22] efi: runtime: Fix potential overflow of soft-reserved region size
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.1 16/28] efi: Don't add memblocks for soft-reserved memory
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.1 15/28] efi: runtime: Fix potential overflow of soft-reserved region size
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.6 28/51] efi: Don't add memblocks for soft-reserved memory
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.6 27/51] efi: runtime: Fix potential overflow of soft-reserved region size
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.7 33/58] efi: Don't add memblocks for soft-reserved memory
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.7 32/58] efi: runtime: Fix potential overflow of soft-reserved region size
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v2 3/4] dt-bindings: Add post-init-supplier property
- From: Rob Herring <robh@xxxxxxxxxx>
- [PATCH v2 4/4] of: property: fw_devlink: Add support for "post-init-supplier" property
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- [PATCH v2 3/4] dt-bindings: Add post-init-supplier property
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- [PATCH v2 2/4] driver core: Add FWLINK_FLAG_IGNORE to completely ignore a fwnode link
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- [PATCH v2 1/4] driver core: Adds flags param to fwnode_link_add()
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- [PATCH v2 0/4] Add post-init-supplier binding to improve suspend/resume stability
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- Re: [PATCH v1 3/4] dt-bindings: Add post-init-supplier property
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- Re: [PATCH v1 3/4] dt-bindings: Add post-init-supplier property
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- [PATCH] efi/capsule-loader: fix incorrect allocation size
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCH v1 3/4] dt-bindings: Add post-init-supplier property
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH v1 3/4] dt-bindings: Add post-init-supplier property
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v1 3/4] dt-bindings: Add post-init-supplier property
- From: Rob Herring <robh+dt@xxxxxxxxxx>
- [PATCH v1 4/4] of: property: fw_devlink: Add support for "post-init-supplier" property
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- [PATCH v1 3/4] dt-bindings: Add post-init-supplier property
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- [PATCH v1 2/4] driver core: Add FWLINK_FLAG_IGNORE to completely ignore a fwnode link
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- [PATCH v1 1/4] driver core: Adds flags param to fwnode_link_add()
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- [PATCH v1 0/4] Add post-init-supplier binding to improve suspend/resume stability
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- Re: [GIT PULL] EFI fixes for v6.8 #1
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] EFI fixes for v6.8 #1
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH] drivers: efistub: fix typo in docs
- From: Vincenzo Mezzela <vincenzo.mezzela@xxxxxxxxx>
- Re: [PATCH 0/4] PCI: Consolidate TLP Log reading and printing
- From: Ilpo Järvinen <ilpo.jarvinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] efi: Fixes for EFI_MEMORY_SP memory on RISC-V and ARM64
- From: Palmer Dabbelt <palmer@xxxxxxxxxxx>
- [PATCH 4/4] PCI: Create helper to print TLP Header and Prefix Log
- From: Ilpo Järvinen <ilpo.jarvinen@xxxxxxxxxxxxxxx>
- [PATCH 3/4] PCI: Add TLP Prefix reading into pcie_read_tlp_log()
- From: Ilpo Järvinen <ilpo.jarvinen@xxxxxxxxxxxxxxx>
- [PATCH 2/4] PCI: Generalize TLP Header Log reading
- From: Ilpo Järvinen <ilpo.jarvinen@xxxxxxxxxxxxxxx>
- [PATCH 1/4] PCI/AER: Cleanup register variable
- From: Ilpo Järvinen <ilpo.jarvinen@xxxxxxxxxxxxxxx>
- [PATCH 0/4] PCI: Consolidate TLP Log reading and printing
- From: Ilpo Järvinen <ilpo.jarvinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] x86/boot: Order sections by their RVAs
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 1/2] x86/boot: Order sections by their RVAs
- From: Mike Beaton <mjsbeaton@xxxxxxxxx>
- [efi:urgent] BUILD SUCCESS 1ad55cecf22f05f1c884adf63cc09d3c3e609ebf
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v1] efi/libstub: Add Confidential Computing (CC) measurement support
- From: Kuppuswamy Sathyanarayanan <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] x86/boot: Order sections by their RVAs
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 1/2] x86/boot: Order sections by their RVAs
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- Re: [PATCH 2/2] x86/boot: Align .compat virtual size
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 1/2] x86/boot: Order sections by their RVAs
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 0/2] x86/boot: EFISTUB section alignment
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- [PATCH 2/2] x86/boot: Align .compat virtual size
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- [PATCH 1/2] x86/boot: Order sections by their RVAs
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- Re: [PATCH v1] efi/libstub: Add Confidential Computing (CC) measurement support
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] x86/efistub: Use 1:1 file:memory mapping for PE/COFF .compat section
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: Broken section alignment in 6.7 and 6.8rc EFI stub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: Broken section alignment in 6.7 and 6.8rc EFI stub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: Broken section alignment in 6.7 and 6.8rc EFI stub
- From: Mike Beaton <mjsbeaton@xxxxxxxxx>
- Re: Broken section alignment in 6.7 and 6.8rc EFI stub
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Broken section alignment in 6.7 and 6.8rc EFI stub
- From: Mike Beaton <mjsbeaton@xxxxxxxxx>
- Re: [PATCH v1] efi/libstub: Add Confidential Computing (CC) measurement support
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v1] efi/libstub: Add Confidential Computing (CC) measurement support
- From: Kuppuswamy Sathyanarayanan <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- [efi:urgent] BUILD SUCCESS dbea519d6878c298dd0f48e6ec2dbacebe4bbb2a
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v1] efi/libstub: Add Confidential Computing (CC) measurement support
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1] efi/libstub: Add Confidential Computing (CC) measurement support
- From: Kuppuswamy Sathyanarayanan <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] cxl/cper: Fixes for CXL CPER event processing
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v1] efi/libstub: Add Confidential Computing (CC) measurement support
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v1] efi/libstub: Add Confidential Computing (CC) measurement support
- From: Kuppuswamy Sathyanarayanan <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] efi: Fixes for EFI_MEMORY_SP memory on RISC-V and ARM64
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 0/2] efi: Fixes for EFI_MEMORY_SP memory on RISC-V and ARM64
- From: Andrew Bresticker <abrestic@xxxxxxxxxxxx>
- [PATCH v2 2/2] efi: Don't add memblocks for soft-reserved memory
- From: Andrew Bresticker <abrestic@xxxxxxxxxxxx>
- [PATCH v2 1/2] efi: runtime: Fix potential overflow of soft-reserved region size
- From: Andrew Bresticker <abrestic@xxxxxxxxxxxx>
- Re: [PATCH 2/2] efi: Don't add memblocks for unusable memory
- From: Andrew Bresticker <abrestic@xxxxxxxxxxxx>
- Re: [PATCH 2/2] efi: Don't add memblocks for unusable memory
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 1/2] efi: runtime: Fix potential overflow of soft-reserved region size
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 2/2] efi: Don't add memblocks for unusable memory
- From: Andrew Bresticker <abrestic@xxxxxxxxxxxx>
- [PATCH 1/2] efi: runtime: Fix potential overflow of soft-reserved region size
- From: Andrew Bresticker <abrestic@xxxxxxxxxxxx>
- [PATCH 0/2] efi: Fixes for EFI_MEMORY_SP memory on RISC-V and ARM64
- From: Andrew Bresticker <abrestic@xxxxxxxxxxxx>
- Re: [PATCH] efi: pstore: Allow dynamic initialization based on module parameter
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 2/2] cxl/trace: Remove unnecessary memcpy's
- From: Dave Jiang <dave.jiang@xxxxxxxxx>
- Re: [PATCH 1/2] cxl/cper: Fix errant CPER prints for CXL events
- From: Dave Jiang <dave.jiang@xxxxxxxxx>
- Re: [PATCH 2/2] cxl/trace: Remove unnecessary memcpy's
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH 1/2] cxl/cper: Fix errant CPER prints for CXL events
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH 2/2] cxl/trace: Remove unnecessary memcpy's
- From: Alison Schofield <alison.schofield@xxxxxxxxx>
- Re: [PATCH 1/2] cxl/cper: Fix errant CPER prints for CXL events
- From: Alison Schofield <alison.schofield@xxxxxxxxx>
- [PATCH 1/2] cxl/cper: Fix errant CPER prints for CXL events
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- [PATCH 2/2] cxl/trace: Remove unnecessary memcpy's
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- [PATCH 0/2] cxl/cper: Fixes for CXL CPER event processing
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH v7 02/13] Documentation/x86: Secure Launch kernel documentation
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [REGRESSION] boot fails for EFI boot stub loaded by u-boot
- From: Ben Schneider <ben@xxxxxxxxx>
- [efi:urgent] BUILD SUCCESS aa0e784dea7c1a026aabff9db1cb5d2bd92b3e92
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH] x86/efistub: Avoid placing the kernel below LOAD_PHYSICAL_ADDR
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [PATCH v3] efivarfs: Request at most 512 bytes for variable names
- From: Tim Schumacher <timschumi@xxxxxx>
- [efi:urgent] BUILD SUCCESS 9ec96d83b3d3c0759c9a7e59c6aa1510b49cb049
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v3] efivarfs: Request at most 512 bytes for variable names
- From: Tim Schumacher <timschumi@xxxxxx>
- Re: [PATCH v3] efivarfs: Request at most 512 bytes for variable names
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3] efivarfs: Request at most 512 bytes for variable names
- From: Tim Schumacher <timschumi@xxxxxx>
- [PATCH] x86/efistub: Give up if memory attribute protocol returns an error
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [PATCH] x86/efi: Remap kernel code read-only before dropping NX attribute
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] x86/efi: Remap kernel code read-only before dropping NX attribute
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [PATCH] efivarfs: Iterate variables with increasing name buffer sizes
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efivarfs: Iterate variables with increasing name buffer sizes
- From: Peter Jones <pjones@xxxxxxxxxx>
- [efi:urgent] BUILD SUCCESS 58466b730c38bdb380dcda6a6b64974779d484c1
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v2] efivarfs: Halve name buffer size until first successful response
- From: Tim Schumacher <timschumi@xxxxxx>
- Re: [PATCH] efivarfs: Iterate variables with increasing name buffer sizes
- From: Tim Schumacher <timschumi@xxxxxx>
- Re: [PATCH] efivarfs: Iterate variables with increasing name buffer sizes
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efivarfs: Iterate variables with increasing name buffer sizes
- From: Tim Schumacher <timschumi@xxxxxx>
- Re: [PATCH] efivarfs: Iterate variables with increasing name buffer sizes
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] efivarfs: Iterate variables with increasing name buffer sizes
- From: Tim Schumacher <timschumi@xxxxxx>
- Re: [PATCH -next] efi/libstub: Add one kernel-doc comment
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH -next] efi/libstub: Add one kernel-doc comment
- From: Yang Li <yang.lee@xxxxxxxxxxxxxxxxx>
- [efi:urgent] BUILD SUCCESS 0e9ce09fde3a54d8911ceaa2063dc37d04c027ee
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] riscv/efistub: Ensure GP-relative addressing is not used
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] riscv/efistub: Ensure GP-relative addressing is not used
- From: Jan Kiszka <jan.kiszka@xxxxxxxxxxx>
- Re: [PATCH] riscv/efistub: Ensure GP-relative addressing is not used
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] riscv/efistub: Ensure GP-relative addressing is not used
- From: Jan Kiszka <jan.kiszka@xxxxxxxxxxx>
- Re: [PATCH] efi: pstore: Allow dynamic initialization based on module parameter
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- [PATCH] efi/x86: Set the PE/COFF header's NX compat flag unconditionally
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [PATCH] efi: pstore: Allow dynamic initialization based on module parameter
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] riscv/efistub: Ensure GP-relative addressing is not used
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] riscv/efistub: Ensure GP-relative addressing is not used
- From: Jan Kiszka <jan.kiszka@xxxxxxxxxxx>
- Re: [PATCH] efi: pstore: Allow dynamic initialization based on module parameter
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- Re: [PATCH] riscv/efistub: Ensure GP-relative addressing is not used
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v5 0/4] arch/x86: Remove unnecessary dependencies on bootparam.h
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v5 0/4] arch/x86: Remove unnecessary dependencies on bootparam.h
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v5 0/4] arch/x86: Remove unnecessary dependencies on bootparam.h
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- Re: [PATCH] riscv/efistub: Ensure GP-relative addressing is not used
- From: Jan Kiszka <jan.kiszka@xxxxxxxxxxx>
- Re: [PATCH] riscv/efistub: Ensure GP-relative addressing is not used
- From: Palmer Dabbelt <palmer@xxxxxxxxxxxx>
- Re: [PATCH] riscv/efistub: Ensure GP-relative addressing is not used
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] riscv/efistub: Ensure GP-relative addressing is not used
- From: Jan Kiszka <jan.kiszka@xxxxxxxxxxx>
- Re: [PATCH v5 0/4] arch/x86: Remove unnecessary dependencies on bootparam.h
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 0/3] Update LLVM Phabricator and Bugzilla links
- From: Alex Deucher <alexdeucher@xxxxxxxxx>
- [PATCH v5 4/4] arch/x86: Do not include <asm/bootparam.h> in several files
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH v5 3/4] arch/x86: Implement arch_ima_efi_boot_mode() in source file
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH v5 2/4] arch/x86: Move internal setup_data structures into setup_data.h
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH v5 1/4] arch/x86: Move UAPI setup structures into setup_data.h
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH v5 0/4] arch/x86: Remove unnecessary dependencies on bootparam.h
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- Re: [PATCH v4 2/4] arch/x86: Move internal setup_data structures into setup_data.h
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH 0/3] Update LLVM Phabricator and Bugzilla links
- From: Fangrui Song <maskray@xxxxxxxxxx>
- Re: [PATCH 1/3] selftests/bpf: Update LLVM Phabricator links
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH 1/3] selftests/bpf: Update LLVM Phabricator links
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH 1/3] selftests/bpf: Update LLVM Phabricator links
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH v4 2/4] arch/x86: Move internal setup_data structures into setup_data.h
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- Re: [PATCH 1/3] selftests/bpf: Update LLVM Phabricator links
- From: Yonghong Song <yonghong.song@xxxxxxxxx>
- Re: [PATCH 0/3] Update LLVM Phabricator and Bugzilla links
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v5 0/9] efi/cxl-cper: Report CPER CXL component events through trace events
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v5 4/9] cxl/events: Remove passing a UUID to known event traces
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH 2/3] arch and include: Update LLVM Phabricator links
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [GIT PULL] EFI updates for v6.8
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v5 9/9] cxl/pci: Register for and process CPER events
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v5 4/9] cxl/events: Remove passing a UUID to known event traces
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v5 0/9] efi/cxl-cper: Report CPER CXL component events through trace events
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v5 0/9] efi/cxl-cper: Report CPER CXL component events through trace events
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH 3/3] treewide: Update LLVM Bugzilla links
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- [PATCH 2/3] arch and include: Update LLVM Phabricator links
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- [PATCH 1/3] selftests/bpf: Update LLVM Phabricator links
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- [PATCH 0/3] Update LLVM Phabricator and Bugzilla links
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH v5 0/9] efi/cxl-cper: Report CPER CXL component events through trace events
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v4 2/4] arch/x86: Move internal setup_data structures into setup_data.h
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH v5 0/9] efi/cxl-cper: Report CPER CXL component events through trace events
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v2 4/4] acpi/ghes, cxl/pci: Trace FW-First CXL Protocol Errors
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- [PATCH v2 1/4] acpi/ghes, cxl: Create a common CXL struct to handle different CXL CPER records
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- [PATCH v2 3/4] acpi/ghes, efi/cper: Recognize and process CXL Protocol Errors.
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- [PATCH v2 0/4] acpi/ghes, cper, cxl: Trace FW-First CXL Protocol Errors
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- [PATCH v2 2/4] efi/cper, cxl: Make definitions and structures global
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- Re: [PATCH v5 0/9] efi/cxl-cper: Report CPER CXL component events through trace events
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v5 0/9] efi/cxl-cper: Report CPER CXL component events through trace events
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH v5 0/9] efi/cxl-cper: Report CPER CXL component events through trace events
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v4 2/4] arch/x86: Move internal setup_data structures into setup_data.h
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v4 4/4] arch/x86: Do not include <asm/bootparam.h> in several files
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v4 4/4] arch/x86: Do not include <asm/bootparam.h> in several files
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v5 0/9] efi/cxl-cper: Report CPER CXL component events through trace events
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- Re: [PATCH v5 0/9] efi/cxl-cper: Report CPER CXL component events through trace events
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v5 9/9] cxl/pci: Register for and process CPER events
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v5 8/9] PCI: Define scoped based management functions
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v5 7/9] acpi/ghes: Process CXL Component Events
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v5 6/9] cxl/events: Create a CXL event union
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v5 5/9] cxl/events: Separate UUID from event structures
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v5 4/9] cxl/events: Remove passing a UUID to known event traces
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v5 3/9] cxl/events: Create common event UUID defines
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v5 2/9] cxl/events: Promote CXL event structures to a core header
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v5 1/9] cxl/trace: Pass uuid explicitly to event traces
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v4 4/4] arch/x86: Do not include <asm/bootparam.h> in several files
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH v4 3/4] arch/x86: Implement arch_ima_efi_boot_mode() in source file
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH v4 2/4] arch/x86: Move internal setup_data structures into setup_data.h
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH v4 1/4] arch/x86: Move UAPI setup structures into setup_data.h
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH v4 0/4] arch/x86: Remove unnecessary dependencies on bootparam.h
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- Re: [PATCH v3 4/4] arch/x86: Do not include <asm/bootparam.h> in several files
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [GIT PULL] EFI updates for v6.8
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [PATCH v2 0/4] riscv: Use READ_ONCE()/WRITE_ONCE() for pte accesses
- From: patchwork-bot+linux-riscv@xxxxxxxxxx
- Re: [PATCH v5 8/9] PCI: Define scoped based management functions
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH v5 0/9] efi/cxl-cper: Report CPER CXL component events through trace events
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: [PATCH v5 8/9] PCI: Define scoped based management functions
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: [PATCH v5 8/9] PCI: Define scoped based management functions
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH v5 8/9] PCI: Define scoped based management functions
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v5 8/9] PCI: Define scoped based management functions
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: [PATCH v5 9/9] cxl/pci: Register for and process CPER events
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH v5 8/9] PCI: Define scoped based management functions
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v5 8/9] PCI: Define scoped based management functions
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH v3 4/4] arch/x86: Do not include <asm/bootparam.h> in several files
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 1/2] efi/cper, cxl: Decode CXL Protocol Error Section
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v3 4/4] arch/x86: Do not include <asm/bootparam.h> in several files
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH v3 3/4] arch/x86: Implement arch_ima_efi_boot_mode() in source file
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH v3 2/4] arch/x86: Move internal setup_data structures into setup_data.h
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH v3 1/4] arch/x86: Move UAPI setup structures into setup_data.h
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH v3 0/4] arch/x86: Remove unnecessary dependencies on bootparam.h
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- Re: [PATCH v5 8/9] PCI: Define scoped based management functions
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v5 8/9] PCI: Define scoped based management functions
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH v5 8/9] PCI: Define scoped based management functions
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v5 8/9] PCI: Define scoped based management functions
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH v5 8/9] PCI: Define scoped based management functions
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v5 8/9] PCI: Define scoped based management functions
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- RE: [PATCH v5 8/9] PCI: Define scoped based management functions
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH 3/4] acpi/ghes, efi/cper: Recognize and process CXL Protocol Errors.
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH 2/4] efi/cper, cxl: Make definitions and structures global
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [GIT PULL] EFI fix for v6.7 #3
- From: pr-tracker-bot@xxxxxxxxxx
- RE: [PATCH v5 9/9] cxl/pci: Register for and process CPER events
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH 4/4] acpi/ghes, cxl/pci: Trace FW-First CXL Protocol Errors
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- Re: [PATCH 3/4] acpi/ghes, efi/cper: Recognize and process CXL Protocol Errors.
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- Re: [PATCH RFC v4 5/6] firmware/efi: Process CXL Component Events
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH 1/4] acpi/ghes, cxl: Create a common CXL struct to handle different CXL CPER records
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH 2/4] efi/cper, cxl: Make definitions and structures global
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- Re: [PATCH 1/4] acpi/ghes, cxl: Create a common CXL struct to handle different CXL CPER records
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- [PATCH] efi: pstore: Allow dynamic initialization based on module parameter
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- Re: [PATCH RFC v4 5/6] firmware/efi: Process CXL Component Events
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [efi:urgent] BUILD SUCCESS 01638431c465741e071ab34acf3bef3c2570f878
- From: kernel test robot <lkp@xxxxxxxxx>
- [GIT PULL] EFI fix for v6.7 #3
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [PATCH v2 2/3] arch/x86: Add <asm/ima-efi.h> for arch_ima_efi_boot_mode
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- Re: [PATCH v2 2/3] arch/x86: Add <asm/ima-efi.h> for arch_ima_efi_boot_mode
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v4 7/7] cxl/memdev: Register for and process CPER events
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v5 9/9] cxl/pci: Register for and process CPER events
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH 4/4] acpi/ghes, cxl/pci: Trace FW-First CXL Protocol Errors
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH 3/4] acpi/ghes, efi/cper: Recognize and process CXL Protocol Errors.
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH 2/4] efi/cper, cxl: Make definitions and structures global
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH] x86/efistub: fix the missing KASLR_FLAG bit in boot_params->hdr.loadflags
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] x86/efistub: fix the missing KASLR_FLAG bit in boot_params->hdr.loadflags
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 1/4] acpi/ghes, cxl: Create a common CXL struct to handle different CXL CPER records
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH] x86/efistub: fix the missing KASLR_FLAG bit in boot_params->hdr.loadflags
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v5 9/9] cxl/pci: Register for and process CPER events
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- [PATCH 3/4] acpi/ghes, efi/cper: Recognize and process CXL Protocol Errors.
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- [PATCH 4/4] acpi/ghes, cxl/pci: Trace FW-First CXL Protocol Errors
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- [PATCH 1/4] acpi/ghes, cxl: Create a common CXL struct to handle different CXL CPER records
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- [PATCH 2/4] efi/cper, cxl: Make definitions and structures global
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- [PATCH 0/4] acpi/ghes, cper, cxl: Trace FW-First CXL Protocol Errors
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- Re: [PATCH v2 2/3] arch/x86: Add <asm/ima-efi.h> for arch_ima_efi_boot_mode
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- Re: [PATCH v2 1/3] arch/x86: Move UAPI setup structures into setup_data.h
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH] x86/efistub: fix the missing KASLR_FLAG bit in boot_params->hdr.loadflags
- From: Yuntao Wang <ytcoode@xxxxxxxxx>
- [efi:next] BUILD SUCCESS 4afa688d7141ae7a166d32224abbfd536acccfca
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] efi: memmap: fix kernel-doc warnings
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] efi: memmap: fix kernel-doc warnings
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH v5 9/9] cxl/pci: Register for and process CPER events
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- [PATCH v5 7/9] acpi/ghes: Process CXL Component Events
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- [PATCH v5 8/9] PCI: Define scoped based management functions
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- [PATCH v5 6/9] cxl/events: Create a CXL event union
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- [PATCH v5 1/9] cxl/trace: Pass uuid explicitly to event traces
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- [PATCH v5 5/9] cxl/events: Separate UUID from event structures
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- [PATCH v5 4/9] cxl/events: Remove passing a UUID to known event traces
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- [PATCH v5 3/9] cxl/events: Create common event UUID defines
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- [PATCH v5 2/9] cxl/events: Promote CXL event structures to a core header
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- [PATCH v5 0/9] efi/cxl-cper: Report CPER CXL component events through trace events
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH RFC v4 5/6] firmware/efi: Process CXL Component Events
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- [efi:next] BUILD SUCCESS 174a0c565cea74a7811ff79fbee1b70247570ade
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v4 7/7] cxl/memdev: Register for and process CPER events
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH v4 7/7] cxl/memdev: Register for and process CPER events
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v4 7/7] cxl/memdev: Register for and process CPER events
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH v4 6/7] firmware/efi: Process CXL Component Events
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH v4 7/7] cxl/memdev: Register for and process CPER events
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH RFC v4 5/6] firmware/efi: Process CXL Component Events
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v4 7/7] cxl/memdev: Register for and process CPER events
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH v4 6/7] firmware/efi: Process CXL Component Events
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH v4 7/7] cxl/memdev: Register for and process CPER events
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v4 6/7] firmware/efi: Process CXL Component Events
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v2 2/3] arch/x86: Add <asm/ima-efi.h> for arch_ima_efi_boot_mode
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi/libstub: zboot: do not use $(shell ...) in cmd_copy_and_pad
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v2 1/3] arch/x86: Move UAPI setup structures into setup_data.h
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2] efi/loongarch: Directly position the loaded image file
- From: Ainux Wang <ainux.wang@xxxxxxxxx>
- Re: [PATCH v2] efi/loongarch: Directly position the loaded image file
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2] efi/loongarch: Directly position the loaded image file
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2] efi/loongarch: Directly position the loaded image file
- From: Ainux Wang <ainux.wang@xxxxxxxxx>
- Re: [PATCH v2] efi/loongarch: Directly position the loaded image file
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2] efi/loongarch: Directly position the loaded image file
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2] efi/loongarch: Directly position the loaded image file
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2] efi/loongarch: Directly position the loaded image file
- From: Ainux Wang <ainux.wang@xxxxxxxxx>
- Re: [PATCH v2] efi/loongarch: Directly position the loaded image file
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2] efi/loongarch: Directly position the loaded image file
- Re: [PATCH] efi/loongarch: Directly position the loaded image file
- From: Ainux Wang <ainux.wang@xxxxxxxxx>
- Re: [PATCH] efi/loongarch: Directly position the loaded image file
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi/loongarch: Directly position the loaded image file
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- [PATCH] efi/loongarch: Directly position the loaded image file
- Re: [PATCH] efi/libstub: zboot: do not use $(shell ...) in cmd_copy_and_pad
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v4 7/7] cxl/memdev: Register for and process CPER events
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v4 6/7] firmware/efi: Process CXL Component Events
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v4 7/7] cxl/memdev: Register for and process CPER events
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- Re: [PATCH v4 6/7] firmware/efi: Process CXL Component Events
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- [PATCH AUTOSEL 6.6 11/18] efi/loongarch: Use load address to calculate kernel entry address
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH] efi/libstub: zboot: do not use $(shell ...) in cmd_copy_and_pad
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- [PATCH v4 7/7] cxl/memdev: Register for and process CPER events
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- [PATCH v4 6/7] firmware/efi: Process CXL Component Events
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- [PATCH v4 5/7] cxl/events: Create a CXL event union
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- [PATCH v4 4/7] cxl/events: Separate UUID from event structures
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- [PATCH v4 3/7] cxl/events: Create common event UUID defines
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- [PATCH v4 2/7] cxl/events: Promote CXL event structures to a core header
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- [PATCH v4 1/7] cxl/trace: Pass uuid explicitly to event traces
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- [PATCH v4 0/7] efi/cxl-cper: Report CPER CXL component events through trace events
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- [PATCH v2 3/3] arch/x86: Do not include <asm/bootparam.h> in several header files
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH v2 1/3] arch/x86: Move UAPI setup structures into setup_data.h
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH v2 2/3] arch/x86: Add <asm/ima-efi.h> for arch_ima_efi_boot_mode
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH v2 0/3] arch/x86: Remove unnecessary dependencies on bootparam.h
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- Re: [PATCH 2/3] arch/x86: Add <asm/ima-efi.h> for arch_ima_efi_boot_mode
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- Re: [PATCH 1/3] arch/x86: Move struct pci_setup_rom into pci_setup.h
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- Re: [PATCH v3 6/7] firmware/efi: Process CXL Component Events
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH v3 0/7] efi/cxl-cper: Report CPER CXL component events through trace events
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [RFC PATCH 0/6] Add GPT parser to MTD layer
- From: Miquel Raynal <miquel.raynal@xxxxxxxxxxx>
- Re: [PATCH v2 4/4] riscv: Use accessors to page table entries instead of direct dereference
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- [PATCH v3 7/7] cxl/memdev: Register for and process CPER events
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- [PATCH v3 6/7] firmware/efi: Process CXL Component Events
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- [PATCH v3 5/7] cxl/events: Create a CXL event union
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- [PATCH v3 4/7] cxl/events: Separate UUID from event structures
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- [PATCH v3 2/7] cxl/events: Promote CXL event structures to a core header
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- [PATCH v3 3/7] cxl/events: Create common event UUID defines
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- [PATCH v3 0/7] efi/cxl-cper: Report CPER CXL component events through trace events
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- [PATCH v3 1/7] cxl/trace: Pass uuid explicitly to event traces
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH RFC v4 5/6] firmware/efi: Process CXL Component Events
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- [PATCH v2 4/4] riscv: Use accessors to page table entries instead of direct dereference
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH v2 3/4] riscv: mm: Only compile pgtable.c if MMU
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH v2 2/4] mm: Introduce pudp/p4dp/pgdp_get() functions
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH v2 1/4] riscv: Use WRITE_ONCE() when setting page table entries
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH v2 0/4] riscv: Use READ_ONCE()/WRITE_ONCE() for pte accesses
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- Re: [GIT PULL] EFI fixes for v6.7 #2
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH RFC v4 5/6] firmware/efi: Process CXL Component Events
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [GIT PULL] EFI fixes for v6.7 #2
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [efi:urgent] BUILD SUCCESS 50d7cdf7a9b1ab6f4f74a69c84e974d5dc0c1bf1
- From: kernel test robot <lkp@xxxxxxxxx>
[Index of Archives]
[Linux Kernel Development]
[Security]
[Linux ARM Kernel]
[Tools]
[Linux MIPS]
[Linux S390]
[Bugtraq]
[Share Photos]>
[Fedora ARM]