Linux EFI/UEFI Development
[Prev Page][Next Page]
- Re: [PATCH v9 04/19] x86: Secure Launch Resource Table header file
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v9 16/19] tpm: Add ability to set the preferred locality the TPM chip uses
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 10/19] x86: Secure Launch SMP bringup support
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 09/19] x86: Secure Launch kernel late boot stub
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 08/19] x86: Secure Launch kernel early boot stub
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 04/19] x86: Secure Launch Resource Table header file
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 16/19] tpm: Add ability to set the preferred locality the TPM chip uses
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v9 10/19] x86: Secure Launch SMP bringup support
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH] efi: Add missing __nocfi annotations to runtime wrappers
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v9 09/19] x86: Secure Launch kernel late boot stub
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v9 09/19] x86: Secure Launch kernel late boot stub
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v9 08/19] x86: Secure Launch kernel early boot stub
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v9 08/19] x86: Secure Launch kernel early boot stub
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH] efi: Add missing __nocfi annotations to runtime wrappers
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v9 08/19] x86: Secure Launch kernel early boot stub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v9 05/19] x86: Secure Launch main header file
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v9 04/19] x86: Secure Launch Resource Table header file
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v9 01/19] x86/boot: Place kernel_info at a fixed offset
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v9 17/19] tpm: Add sysfs interface to allow setting and querying the preferred locality
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 16/19] tpm: Add ability to set the preferred locality the TPM chip uses
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 14/19] tpm: Ensure tpm is in known state at startup
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 13/19] tpm: Protect against locality counter underflow
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 10/19] x86: Secure Launch SMP bringup support
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 09/19] x86: Secure Launch kernel late boot stub
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 09/19] x86: Secure Launch kernel late boot stub
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 08/19] x86: Secure Launch kernel early boot stub
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 7/8] efi: pstore: Follow convention for the efi-pstore backend name
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 05/19] x86: Secure Launch main header file
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 04/19] x86: Secure Launch Resource Table header file
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 01/19] x86/boot: Place kernel_info at a fixed offset
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 1/8] certs: Introduce ability to link to a system key
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 0/8] Clavis LSM
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 08/19] x86: Secure Launch kernel early boot stub
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v9 08/19] x86: Secure Launch kernel early boot stub
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v9 08/19] x86: Secure Launch kernel early boot stub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v9 08/19] x86: Secure Launch kernel early boot stub
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v9 19/19] x86: EFI stub DRTM launch support for Secure Launch
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v9 08/19] x86: Secure Launch kernel early boot stub
- From: ross.philipson@xxxxxxxxxx
- [PATCH] efi: Add missing __nocfi annotations to runtime wrappers
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [PATCH 7/8] efi: pstore: Follow convention for the efi-pstore backend name
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v9 08/19] x86: Secure Launch kernel early boot stub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- Re: [PATCH v9 08/19] x86: Secure Launch kernel early boot stub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v9 08/19] x86: Secure Launch kernel early boot stub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v9 19/19] x86: EFI stub DRTM launch support for Secure Launch
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v9 08/19] x86: Secure Launch kernel early boot stub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v9 18/19] x86: Secure Launch late initcall platform module
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 16/19] tpm: Add ability to set the preferred locality the TPM chip uses
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 15/19] tpm: Make locality requests return consistent values
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 14/19] tpm: Ensure tpm is in known state at startup
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 11/19] kexec: Secure Launch kexec SEXIT support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 13/19] tpm: Protect against locality counter underflow
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 09/19] x86: Secure Launch kernel late boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 17/19] tpm: Add sysfs interface to allow setting and querying the preferred locality
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 12/19] reboot: Secure Launch SEXIT support on reboot paths
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 10/19] x86: Secure Launch SMP bringup support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 07/19] x86: Add early SHA-256 support for Secure Launch early measurements
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 02/19] Documentation/x86: Secure Launch kernel documentation
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 05/19] x86: Secure Launch main header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 08/19] x86: Secure Launch kernel early boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 01/19] x86/boot: Place kernel_info at a fixed offset
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 00/19] x86: Trenchboot secure dynamic launch Linux kernel support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 04/19] x86: Secure Launch Resource Table header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 19/19] x86: EFI stub DRTM launch support for Secure Launch
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 03/19] x86: Secure Launch Kconfig
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [RFC PATCH v2 8/8] clavis: Introduce new LSM called clavis
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC PATCH v2 7/8] clavis: Introduce a new key type called clavis_key_acl
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC PATCH v2 0/8] Clavis LSM
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC PATCH v2 6/8] keys: Add ability to track intended usage of the public key
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC PATCH v2 3/8] efi: Make clavis boot param persist across kexec
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC PATCH v2 5/8] keys: Add new verification type (VERIFYING_CLAVIS_SIGNATURE)
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC PATCH v2 2/8] clavis: Introduce a new system keyring called clavis
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC PATCH v2 1/8] certs: Introduce ability to link to a system key
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC PATCH v2 4/8] clavis: Prevent clavis boot param from changing during kexec
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v2] riscv: dmi: Add SMBIOS/DMI support
- From: Haibo Xu <xiaobo55x@xxxxxxxxx>
- [efi:next] BUILD SUCCESS 7c23b186ab892088f76a3ad9dbff1685ffe2e832
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 2/4] acpi/ghes, efi/cper: Recognize and process CXL Protocol Errors.
- From: Dave Jiang <dave.jiang@xxxxxxxxx>
- Re: [PATCH 4/4] cxl/pci: Define a common function get_cxl_dev()
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- Re: [PATCH 3/4] acpi/ghes, cxl/pci: Trace FW-First CXL Protocol Errors
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- Re: [PATCH 3/4] acpi/ghes, cxl/pci: Trace FW-First CXL Protocol Errors
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- Re: [PATCH 2/4] acpi/ghes, efi/cper: Recognize and process CXL Protocol Errors.
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- Re: [PATCH 2/4] acpi/ghes, efi/cper: Recognize and process CXL Protocol Errors.
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- Re: [PATCH] sysfs: Unbreak the build around sysfs_bin_attr_simple_read()
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH] sysfs: Unbreak the build around sysfs_bin_attr_simple_read()
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- [PATCH] sysfs: Unbreak the build around sysfs_bin_attr_simple_read()
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH] efi: pstore: Return proper errors on UEFI failures
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 2/2] treewide: Use sysfs_bin_attr_simple_read() helper
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/4] acpi/ghes, cxl/pci: Trace FW-First CXL Protocol Errors
- From: Alison Schofield <alison.schofield@xxxxxxxxx>
- Re: [PATCH 2/2] treewide: Use sysfs_bin_attr_simple_read() helper
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH] efi/libstub: zboot.lds: Discard .discard sections
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- Re: [PATCH 4/4] cxl/pci: Define a common function get_cxl_dev()
- From: Alison Schofield <alison.schofield@xxxxxxxxx>
- Re: [PATCH 3/4] acpi/ghes, cxl/pci: Trace FW-First CXL Protocol Errors
- From: Alison Schofield <alison.schofield@xxxxxxxxx>
- Re: [PATCH 2/4] acpi/ghes, efi/cper: Recognize and process CXL Protocol Errors.
- From: Alison Schofield <alison.schofield@xxxxxxxxx>
- Re: [PATCH 1/4] efi/cper, cxl: Make definitions and structures global
- From: Alison Schofield <alison.schofield@xxxxxxxxx>
- Re: [PATCH 4/4] cxl/pci: Define a common function get_cxl_dev()
- From: Dave Jiang <dave.jiang@xxxxxxxxx>
- Re: [PATCH 3/4] acpi/ghes, cxl/pci: Trace FW-First CXL Protocol Errors
- From: Dave Jiang <dave.jiang@xxxxxxxxx>
- Re: [PATCH 2/4] acpi/ghes, efi/cper: Recognize and process CXL Protocol Errors.
- From: Dave Jiang <dave.jiang@xxxxxxxxx>
- Re: [PATCH] efi/libstub: zboot.lds: Discard .discard sections
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] efi/libstub: zboot.lds: Discard .discard sections
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH 1/4] efi/cper, cxl: Make definitions and structures global
- From: Dave Jiang <dave.jiang@xxxxxxxxx>
- [PATCH 4/4] cxl/pci: Define a common function get_cxl_dev()
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- [PATCH 3/4] acpi/ghes, cxl/pci: Trace FW-First CXL Protocol Errors
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- [PATCH 1/4] efi/cper, cxl: Make definitions and structures global
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- [PATCH 2/4] acpi/ghes, efi/cper: Recognize and process CXL Protocol Errors.
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- [PATCH 0/4] acpi/ghes, cper, cxl: Trace FW-First CXL Protocol Errors
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- Re: [GIT PULL] EFI fixes for v6.10 #1
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] EFI fixes for v6.10 #1
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [PATCH] efi: pstore: Return proper errors on UEFI failures
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH] efi: pstore: Return proper errors on UEFI failures
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- From Financial Crimes Enforcement Network
- From: "Financial Crimes Enforcement Network" <bill@xxxxxxxxxxxxxxxxxxx>
- [efi:next] BUILD SUCCESS 15aa8fb852f995dd234a57f12dfb989044968bb6
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] x86/efistub: Omit physical KASLR when memory reservations exist
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] x86/efistub: Omit physical KASLR when memory reservations exist
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] x86/efistub: Omit physical KASLR when memory reservations exist
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 0/4] acpi/ghes, cper, cxl: Trace FW-First CXL Protocol Errors
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- Re: [PATCH] x86/efistub: Omit physical KASLR when memory reservations exist
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] x86/efistub: Omit physical KASLR when memory reservations exist
- From: "Chaney, Ben" <bchaney@xxxxxxxxxx>
- Re: Regression in 6.1.81: Missing memory in pmem device
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: Regression in 6.1.81: Missing memory in pmem device
- From: "Chaney, Ben" <bchaney@xxxxxxxxxx>
- [PATCH] x86/efistub: Omit physical KASLR when memory reservations exist
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: Regression in 6.1.81: Missing memory in pmem device
- From: Kees Cook <kees@xxxxxxxxxx>
- Regression in 6.1.81: Missing memory in pmem device
- From: "Chaney, Ben" <bchaney@xxxxxxxxxx>
- Re: Regression in 6.1.81: Missing memory in pmem device
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [GIT PULL] EFI updates for v6.10
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH 01/12] mm, arm64: Rename ARM64_CONTPTE to THP_CONTPTE
- From: Barry Song <21cnbao@xxxxxxxxx>
- [GIT PULL] EFI updates for v6.10
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [PATCH 01/12] mm, arm64: Rename ARM64_CONTPTE to THP_CONTPTE
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- Re: [PATCH 01/12] mm, arm64: Rename ARM64_CONTPTE to THP_CONTPTE
- From: Barry Song <21cnbao@xxxxxxxxx>
- [PATCH 12/12] mm, riscv, arm64: Use common get_and_clear_full_ptes()/clear_full_ptes() functions
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH 11/12] mm, riscv, arm64: Use common ptep_set_wrprotect()/wrprotect_ptes() functions
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH 10/12] mm, riscv, arm64: Use common ptep_set_access_flags() function
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH 09/12] mm, riscv, arm64: Use common ptep_clear_flush_young() function
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH 08/12] mm, riscv, arm64: Use common ptep_test_and_clear_young() function
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH 07/12] mm, riscv, arm64: Use common ptep_get_and_clear() function
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH 06/12] mm, riscv, arm64: Use common pte_clear() function
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH 05/12] mm, riscv, arm64: Use common set_pte() function
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH 04/12] mm, riscv, arm64: Use common ptep_get_lockless() function
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH 03/12] mm, riscv, arm64: Use common set_ptes() function
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH 02/12] mm, riscv, arm64: Use common ptep_get() function
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH 01/12] mm, arm64: Rename ARM64_CONTPTE to THP_CONTPTE
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH 00/12] Make riscv use THP contpte support for arm64
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- Re: [PATCH v2 0/4] acpi/ghes, cper, cxl: Trace FW-First CXL Protocol Errors
- From: "Fabio M. De Francesco" <fabio.m.de.francesco@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] efi/unaccepted: touch soft lockup during memory accept
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [GIT PULL] EFI fix for v6.9 (#1)
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v2] efi/unaccepted: touch soft lockup during memory accept
- From: Chen Yu <yu.c.chen@xxxxxxxxx>
- Re: [PATCH v2] efi/unaccepted: touch soft lockup during memory accept
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- [GIT PULL] EFI fix for v6.9 (#1)
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [PATCH v2] efi/unaccepted: touch soft lockup during memory accept
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v4 1/2] acpi/ghes: Process CXL Component Events
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH v4 2/2] cxl/pci: Process CPER events
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- Re: [PATCH v4 1/2] acpi/ghes: Process CXL Component Events
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- Re: [PATCH] x86/efi: mark racy access on efi_rts_work.efi_rts_id
- From: linke li <lilinke99@xxxxxx>
- RE: [PATCH v4 1/2] acpi/ghes: Process CXL Component Events
- From: "Luck, Tony" <tony.luck@xxxxxxxxx>
- Re: [PATCH v4 1/2] acpi/ghes: Process CXL Component Events
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH v4 1/2] acpi/ghes: Process CXL Component Events
- From: Tony Luck <tony.luck@xxxxxxxxx>
- [efi:next] BUILD SUCCESS 4b2543f7e1e6b91cfc8dd1696e3cdf01c3ac8974
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v4 1/2] acpi/ghes: Process CXL Component Events
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH v4 2/2] cxl/pci: Process CPER events
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v4 1/2] acpi/ghes: Process CXL Component Events
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v2] efi: libstub: only free priv.runtime_map when allocated
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] x86/efi: mark racy access on efi_rts_work.efi_rts_id
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2] riscv: dmi: Add SMBIOS/DMI support
- From: Haibo Xu <xiaobo55x@xxxxxxxxx>
- [PATCH] x86/efi: mark racy access on efi_rts_work.efi_rts_id
- From: linke li <lilinke99@xxxxxx>
- [PATCH v4 2/2] cxl/pci: Process CPER events
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- [PATCH v4 1/2] acpi/ghes: Process CXL Component Events
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- [PATCH v4 0/2] efi/cxl-cper: Report CXL CPER events through tracing
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH v3 1/2] acpi/ghes: Process CXL Component Events
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH v3 2/2] cxl/pci: Process CPER events
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v3 1/2] acpi/ghes: Process CXL Component Events
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v3 2/2] cxl/pci: Process CPER events
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- [PATCH v3 1/2] acpi/ghes: Process CXL Component Events
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- [PATCH v3 0/2] efi/cxl-cper: Report CXL CPER events through tracing
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: Mikko Rapeli <mikko.rapeli@xxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [efi:urgent] BUILD SUCCESS 1c5a1627f48105cbab81d25ec2f72232bfaa8185
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: Lennart Poettering <mzxreary@xxxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: Mikko Rapeli <mikko.rapeli@xxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: Lennart Poettering <mzxreary@xxxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: Lennart Poettering <mzxreary@xxxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: Lennart Poettering <mzxreary@xxxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: Mikko Rapeli <mikko.rapeli@xxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2] efi/unaccepted: touch soft lockup during memory accept
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2] efi: libstub: only free priv.runtime_map when allocated
- From: Hagar Hemdan <hagarhem@xxxxxxxxxx>
- [PATCH] efi: libstub: only free priv.runtime_map when allocated
- From: Hagar Hemdan <hagarhem@xxxxxxxxxx>
- RE: [PATCH v2 1/3] acpi/ghes: Process CXL Component Events
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- RE: [PATCH v2 3/3] ras/events: Trace CXL CPER events without CXL stack
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- RE: [PATCH v2 1/3] acpi/ghes: Process CXL Component Events
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- RE: [PATCH v2 3/3] ras/events: Trace CXL CPER events without CXL stack
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- RE: [PATCH v2 1/3] acpi/ghes: Process CXL Component Events
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v2 3/3] ras/events: Trace CXL CPER events without CXL stack
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- [PATCH v2 2/3] cxl/pci: Process CPER events
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- [PATCH v2 1/3] acpi/ghes: Process CXL Component Events
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- [PATCH v2 0/3] efi/cxl-cper: Report CXL CPER events through tracing
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: Mikko Rapeli <mikko.rapeli@xxxxxxxxxx>
- Re: [PATCH v2] efi/unaccepted: touch soft lockup during memory accept
- From: Chen Yu <yu.c.chen@xxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: Mikko Rapeli <mikko.rapeli@xxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] efi: expose TPM event log to userspace via sysfs
- From: Mikko Rapeli <mikko.rapeli@xxxxxxxxxx>
- Re: (subset) [PATCH 00/34] address all -Wunused-const warnings
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- [syzbot] [efi?] BUG: soft lockup in sync_hw_clock
- From: syzbot <syzbot+b3dc5d82ebb394dabe43@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [efi:next] BUILD SUCCESS cda30c6542c8bb445bc84f6616cac8d012547f0a
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] efivarfs: Iterate variables with increasing name buffer sizes
- From: Tim Schumacher <timschumi@xxxxxx>
- Re: [PATCH 0/2] Deduplicate bin_attribute simple read() callbacks
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH 0/2] Deduplicate bin_attribute simple read() callbacks
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] sysfs: Add sysfs_bin_attr_simple_read() helper
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Regression: ef/x86: Remove EfiMemoryMappedIO from E820 map
- [PATCH v2] efi/unaccepted: touch soft lockup during memory accept
- From: Chen Yu <yu.c.chen@xxxxxxxxx>
- Re: [PATCH] efi/unaccepted: touch soft lockup during memory accept
- From: Chen Yu <yu.c.chen@xxxxxxxxx>
- Re: [PATCH] efi/unaccepted: touch soft lockup during memory accept
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCH] efi/unaccepted: touch soft lockup during memory accept
- From: Chen Yu <yu.c.chen@xxxxxxxxx>
- Re: (subset) [PATCH 00/34] address all -Wunused-const warnings
- From: Sebastian Reichel <sebastian.reichel@xxxxxxxxxxxxx>
- Re: [PATCH 0/2] Deduplicate bin_attribute simple read() callbacks
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- Re: [PATCH 2/2] treewide: Use sysfs_bin_attr_simple_read() helper
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] treewide: Use sysfs_bin_attr_simple_read() helper
- From: Zhi Wang <zhiwang@xxxxxxxxxx>
- Re: [PATCH 0/2] Deduplicate bin_attribute simple read() callbacks
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 2/2] treewide: Use sysfs_bin_attr_simple_read() helper
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH 1/2] sysfs: Add sysfs_bin_attr_simple_read() helper
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH 0/2] Deduplicate bin_attribute simple read() callbacks
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH 00/34] address all -Wunused-const warnings
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH RFC 1/8] certs: Introduce ability to link to a system key
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH RFC 1/8] certs: Introduce ability to link to a system key
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 06/15] x86: Add early SHA support for Secure Launch early measurements
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 06/15] x86: Add early SHA support for Secure Launch early measurements
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v8 06/15] x86: Add early SHA support for Secure Launch early measurements
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v8 06/15] x86: Add early SHA support for Secure Launch early measurements
- From: "Andy Lutomirski" <luto@xxxxxxxxxx>
- Re: [PATCH 10/34] efi: sysfb: don't build when EFI is disabled
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH 10/34] efi: sysfb: don't build when EFI is disabled
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 10/34] efi: sysfb: don't build when EFI is disabled
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 00/34] address all -Wunused-const warnings
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: x86_64 32-bit EFI mixed mode boot broken
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: x86_64 32-bit EFI mixed mode boot broken
- From: Clayton Craft <clayton@xxxxxxxxxxxxx>
- Re: [PATCH v8 04/15] x86: Secure Launch Resource Table header file
- From: ross.philipson@xxxxxxxxxx
- [PATCH 6.1 192/272] efi/libstub: fix efi_random_alloc() to allocate memory at alloc_min or higher address
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 6.6 300/396] efi/libstub: fix efi_random_alloc() to allocate memory at alloc_min or higher address
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 6.7 314/432] efi/libstub: fix efi_random_alloc() to allocate memory at alloc_min or higher address
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 6.8 267/399] efi/libstub: fix efi_random_alloc() to allocate memory at alloc_min or higher address
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [efi:next] BUILD SUCCESS bf87a149828e6a10437ef96036af0d2706d4cbc6
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v8 04/15] x86: Secure Launch Resource Table header file
- From: Kim Phillips <kim.phillips@xxxxxxx>
- Re: [PATCH 1/3] efi: pstore: Request at most 512 bytes for variable names
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- Re: [GIT PULL] EFI fixes for v6.9 #3
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] EFI fixes for v6.9 #3
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [PATCH 5.15-] efivars: Request at most 512 bytes for variable names
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/4] efi: Clear up misconceptions about a maximum variable name size
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 1/3] efi: pstore: Request at most 512 bytes for variable names
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [efi:urgent] BUILD SUCCESS decd347c2a75d32984beb8807d470b763a53b542
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v2 4/4] efi: Clear up misconceptions about a maximum variable name size
- From: Tim Schumacher <timschumi@xxxxxx>
- [PATCH v2 2/4] Documentation: Mark the 'efivars' sysfs interface as removed
- From: Tim Schumacher <timschumi@xxxxxx>
- [PATCH v2 3/4] efivarfs: Remove unused internal struct members
- From: Tim Schumacher <timschumi@xxxxxx>
- [PATCH v2 1/4] efi: pstore: Request at most 512 bytes for variable names
- From: Tim Schumacher <timschumi@xxxxxx>
- [PATCH] x86/efistub: Reinstate soft limit for initrd loading
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [PATCH] efi/libstub: Cast away type warning in use of max()
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi/libstub: Cast away type warning in use of max()
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH] efi/libstub: Cast away type warning in use of max()
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi/libstub: Cast away type warning in use of max()
- From: Lukas Wunner <lukas@xxxxxxxxx>
- FAILED: Patch "x86/efistub: Clear decompressor BSS in native EFI entrypoint" failed to apply to 4.19-stable tree
- From: Sasha Levin <sashal@xxxxxxxxxx>
- FAILED: Patch "x86/efistub: Clear decompressor BSS in native EFI entrypoint" failed to apply to 5.4-stable tree
- From: Sasha Levin <sashal@xxxxxxxxxx>
- FAILED: Patch "x86/efistub: Clear decompressor BSS in native EFI entrypoint" failed to apply to 5.10-stable tree
- From: Sasha Levin <sashal@xxxxxxxxxx>
- FAILED: Patch "x86/efistub: Clear decompressor BSS in native EFI entrypoint" failed to apply to 5.15-stable tree
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [efi:urgent] BUILD SUCCESS 07263d8a5a2cea66a3f10d930fea60ce49c7dc3b
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH] efi/libstub: Cast away type warning in use of max()
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [PATCH] x86/efistub: Add missing boot_params for mixed mode compat entry
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] x86/efistub: Add missing boot_params for mixed mode compat entry
- From: Clayton Craft <clayton@xxxxxxxxxxxxx>
- Re: [PATCH] x86/efistub: Add missing boot_params for mixed mode compat entry
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] x86/efistub: Add missing boot_params for mixed mode compat entry
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [efi:next] BUILD SUCCESS bada36a9fa965a2d15ad28b95da926a98fcc6ade
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH] x86/efistub: Add missing boot_params for mixed mode compat entry
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [PATCH] efi/libstub: fix efi_random_alloc() to allocate memory at alloc_min or higher address
- From: KONDO KAZUMA(近藤 和真) <kazuma-kondo@xxxxxxx>
- Re: [GIT PULL] EFI fixes for v6.9 #2
- From: pr-tracker-bot@xxxxxxxxxx
- Re: x86_64 32-bit EFI mixed mode boot broken
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [GIT PULL] EFI fixes for v6.9 #2
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: x86_64 32-bit EFI mixed mode boot broken
- From: "Clayton Craft" <clayton@xxxxxxxxxxxxx>
- Re: x86_64 32-bit EFI mixed mode boot broken
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: x86_64 32-bit EFI mixed mode boot broken
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: x86_64 32-bit EFI mixed mode boot broken
- From: "Clayton Craft" <clayton@xxxxxxxxxxxxx>
- [efi:next] BUILD SUCCESS 8e6edb6d7924df5fb154b8b0a03ffef87d84b2d5
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: x86_64 32-bit EFI mixed mode boot broken
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: x86_64 32-bit EFI mixed mode boot broken
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2] efi: fix panic in kdump kernel
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [efi:next] BUILD SUCCESS 917b3b926ae0d8d89803dcda5e8db81a3ef9288b
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v2] efi: fix panic in kdump kernel
- From: Oleksandr Tymoshenko <ovt@xxxxxxxxxx>
- Re: [PATCH v8 01/15] x86/boot: Place kernel_info at a fixed offset
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: x86_64 32-bit EFI mixed mode boot broken
- From: "Clayton Craft" <clayton@xxxxxxxxxxxxx>
- Re: [PATCH 3/4] PCI: Add TLP Prefix reading into pcie_read_tlp_log()
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: x86_64 32-bit EFI mixed mode boot broken
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: x86_64 32-bit EFI mixed mode boot broken
- From: "Clayton Craft" <clayton@xxxxxxxxxxxxx>
- Re: x86_64 32-bit EFI mixed mode boot broken
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: x86_64 32-bit EFI mixed mode boot broken
- From: Clayton Craft <clayton@xxxxxxxxxxxxx>
- [PATCH 0/2] EFI mixed mode fixes
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH 1/2] x86/efistub: Call mixed mode boot services on the firmware's stack
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH 2/2] x86/efistub: Don't clear BSS twice in mixed mode
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [PATCH v8 01/15] x86/boot: Place kernel_info at a fixed offset
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH 0/4] PCI: Consolidate TLP Log reading and printing
- From: Ilpo Järvinen <ilpo.jarvinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] efi/libstub: fix efi_random_alloc() to allocate memory at alloc_min or higher address
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: x86_64 32-bit EFI mixed mode boot broken
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] efi/libstub: fix efi_random_alloc() to allocate memory at alloc_min or higher address
- From: KONDO KAZUMA(近藤 和真) <kazuma-kondo@xxxxxxx>
- [PATCH] efi/libstub: fix efi_random_alloc() to allocate memory at alloc_min or higher address
- From: KONDO KAZUMA(近藤 和真) <kazuma-kondo@xxxxxxx>
- Re: [PATCH] efi: fix panic in kdump kernel
- From: Johan Hovold <johan@xxxxxxxxxx>
- Re: Question about Address Range Validation in Crash Kernel Allocation
- From: Li Huafei <lihuafei1@xxxxxxxxxx>
- Re: Question about Address Range Validation in Crash Kernel Allocation
- From: Dave Young <dyoung@xxxxxxxxxx>
- [PATCH] efi: fix panic in kdump kernel
- From: Oleksandr Tymoshenko <ovt@xxxxxxxxxx>
- Re: x86_64 32-bit EFI mixed mode boot broken
- From: Clayton Craft <clayton@xxxxxxxxxxxxx>
- Re: x86_64 32-bit EFI mixed mode boot broken
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- x86_64 32-bit EFI mixed mode boot broken
- From: Clayton Craft <clayton@xxxxxxxxxxxxx>
- x86_64 32-bit EFI mixed mode boot broken
- From: Clayton Craft <clayton@xxxxxxxxxxxxx>
- Re: efivarfs fixes without the commit being fixed in 6.1 and 6.6 (resending without html)
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: efivarfs fixes without the commit being fixed in 6.1 and 6.6 (resending without html)
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: efivarfs fixes without the commit being fixed in 6.1 and 6.6 (resending without html)
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: efivarfs fixes without the commit being fixed in 6.1 and 6.6 (resending without html)
- From: Ted Brandston <tbrandston@xxxxxxxxxx>
- Re: [PATCH v8 14/15] x86: Secure Launch late initcall platform module
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 01/15] x86/boot: Place kernel_info at a fixed offset
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] riscv: dmi: Add SMBIOS/DMI support
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- Re: [PATCH v2] riscv: dmi: Add SMBIOS/DMI support
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2] riscv: dmi: Add SMBIOS/DMI support
- From: Haibo Xu <haibo1.xu@xxxxxxxxx>
- Re: [GIT PULL] EFI fixes for v6.9 #1
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] EFI fixes for v6.9 #1
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH 5.15-] efivars: Request at most 512 bytes for variable names
- From: Tim Schumacher <timschumi@xxxxxx>
- [efi:next] BUILD SUCCESS b3810c5a2cc4a6665f7a65bed5393c75ce3f3aa2
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 1/3] efi: pstore: Request at most 512 bytes for variable names
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- Re: [PATCH 3/3] efi: Clear up misconceptions about a maximum variable name size
- From: Tim Schumacher <timschumi@xxxxxx>
- Re: [PATCH 1/3] efi: pstore: Request at most 512 bytes for variable names
- From: Tim Schumacher <timschumi@xxxxxx>
- Re: [PATCH 2/3] efivarfs: Remove unused internal struct members
- From: Tim Schumacher <timschumi@xxxxxx>
- [PATCH] x86/efistub: Clear decompressor BSS in native EFI entrypoint
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [PATCH 3/3] efi: Clear up misconceptions about a maximum variable name size
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 2/3] efivarfs: Remove unused internal struct members
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 1/3] efi: pstore: Request at most 512 bytes for variable names
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 1/3] efi: pstore: Request at most 512 bytes for variable names
- From: Tim Schumacher <timschumi@xxxxxx>
- [PATCH 3/3] efi: Clear up misconceptions about a maximum variable name size
- From: Tim Schumacher <timschumi@xxxxxx>
- [PATCH 2/3] efivarfs: Remove unused internal struct members
- From: Tim Schumacher <timschumi@xxxxxx>
- Re: [PATCH 2/4] PCI: Generalize TLP Header Log reading
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: [GIT PULL] EFI updates for v6.9
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] EFI updates for v6.9
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [PATCH RFC 1/8] certs: Introduce ability to link to a system key
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC 8/8] clavis: Introduce new LSM called clavis
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- RE: [EXTERNAL] [PATCH RFC 1/8] certs: Introduce ability to link to a system key
- From: Bharat Bhushan <bbhushan2@xxxxxxxxxxx>
- Re: [PATCH RFC 8/8] clavis: Introduce new LSM called clavis
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH RFC 1/8] certs: Introduce ability to link to a system key
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH RFC 1/8] certs: Introduce ability to link to a system key
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH RFC 1/8] certs: Introduce ability to link to a system key
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC 1/8] certs: Introduce ability to link to a system key
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH RFC 8/8] clavis: Introduce new LSM called clavis
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC 7/8] clavis: Introduce a new key type called clavis_key_acl
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC 6/8] keys: Add ability to track intended usage of the public key
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC 0/8] Clavis LSM
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC 5/8] keys: Add new verification type (VERIFYING_CLAVIS_SIGNATURE)
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC 4/8] clavis: Prevent clavis boot param from changing during kexec
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC 2/8] clavis: Introduce a new system keyring called clavis
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC 1/8] certs: Introduce ability to link to a system key
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC 3/8] efi: Make clavis boot param persist across kexec
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH 0/4] PCI: Consolidate TLP Log reading and printing
- From: Ilpo Järvinen <ilpo.jarvinen@xxxxxxxxxxxxxxx>
- [efi:next] BUILD SUCCESS 021bc4b9d7ed8dcc90dc288e59f120fa6e3087dc
- From: kernel test robot <lkp@xxxxxxxxx>
- [efi:next] BUILD SUCCESS WITH WARNING 4749cfc7ffaa827b6ecc916ab8d09bae718688bc
- From: kernel test robot <lkp@xxxxxxxxx>
- [efi:next 1/7] drivers/firmware/efi/libstub/efi-stub-helper.c:225:26: warning: field tagged_event within 'struct efistub_measured_event' is less aligned than 'TCG_PCClientTaggedEvent' (aka 'struct tdTCG_PCClientTaggedEvent') and is usually due to 'struct efistub_measure...
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 0/4] PCI: Consolidate TLP Log reading and printing
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: [PATCH v3 1/5] efi/libstub: Use correct event size when measuring data into the TPM
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH v3 1/5] efi/libstub: Use correct event size when measuring data into the TPM
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v3 1/5] efi/libstub: Use correct event size when measuring data into the TPM
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH v3 1/5] efi/libstub: Use correct event size when measuring data into the TPM
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [efi:next] BUILD SUCCESS 540e90b461259ac990ce234f526668b86583e3cc
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v3 5/5] efi/libstub: Add get_event_log() support for CC platforms
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH v3 4/5] efi/libstub: Measure into CC protocol if TCG2 protocol is absent
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH v3 3/5] efi/libstub: Add Confidential Computing (CC) measurement typedefs
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH v3 2/5] efi/tpm: Use symbolic GUID name from spec for final events table
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH v3 0/5] efi/libstub: Fall back to CC proto for measurement
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH v3 1/5] efi/libstub: Use correct event size when measuring data into the TPM
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [External] Re: [PATCH 3/3] efistub: fix missed the initialization of gp
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] riscv: dmi: Add SMBIOS/DMI support
- From: Haibo Xu <xiaobo55x@xxxxxxxxx>
- Re: [External] Re: [PATCH 3/3] efistub: fix missed the initialization of gp
- From: yunhui cui <cuiyunhui@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/5] efi/libstub: Fold efi_tcg2_tagged_event into efi_measured_event
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH v2 2/5] efi/tpm: Use symbolic GUID name from spec for final events table
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [External] Re: [PATCH 3/3] efistub: fix missed the initialization of gp
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 2/5] efi/tpm: Use symbolic GUID name from spec for final events table
- From: Kuppuswamy Sathyanarayanan <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- [PATCH v2 5/5] efi/libstub: Add get_event_log() support for CC platforms
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH v2 4/5] efi/libstub: Measure into CC protocol if TCG2 protocol is absent
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH v2 3/5] efi/libstub: Add Confidential Computing (CC) measurement typedefs
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH v2 2/5] efi/tpm: Use symbolic GUID name from spec for final events table
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH v2 1/5] efi/libstub: Fold efi_tcg2_tagged_event into efi_measured_event
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH v2 0/5] efi/libstub: Fall back to CC proto for measurement
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [Bug Report] Bug in "efi/libstub: Add get_event_log() support for CC platforms"
- From: Kuppuswamy Sathyanarayanan <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [Bug Report] Bug in "efi/libstub: Add get_event_log() support for CC platforms"
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [Bug Report] Bug in "efi/libstub: Add get_event_log() support for CC platforms"
- From: Kuppuswamy Sathyanarayanan <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [Bug Report] Bug in "efi/libstub: Add get_event_log() support for CC platforms"
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [Bug Report] Bug in "efi/libstub: Add get_event_log() support for CC platforms"
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [Bug Report] Bug in "efi/libstub: Add get_event_log() support for CC platforms"
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [Bug Report] Bug in "efi/libstub: Add get_event_log() support for CC platforms"
- From: Muhammad Usama Anjum <usama.anjum@xxxxxxxxxxxxx>
- Re: [PATCH] riscv: dmi: Add SMBIOS/DMI support
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] riscv: dmi: Add SMBIOS/DMI support
- From: Haibo Xu <haibo1.xu@xxxxxxxxx>
- Re: [External] Re: [PATCH 3/3] efistub: fix missed the initialization of gp
- From: yunhui cui <cuiyunhui@xxxxxxxxxxxxx>
- Re: [External] Re: [PATCH 3/3] efistub: fix missed the initialization of gp
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [External] Re: [PATCH 3/3] efistub: fix missed the initialization of gp
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [External] Re: [PATCH 3/3] efistub: fix missed the initialization of gp
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [External] Re: [PATCH 3/3] efistub: fix missed the initialization of gp
- From: Palmer Dabbelt <palmer@xxxxxxxxxxx>
- [efi:next] BUILD SUCCESS 34dbd8b7c991b784fcc1af7bfa5b6f96f33ff196
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [External] Re: [PATCH 1/3] Revert "riscv/efistub: Ensure GP-relative addressing is not used"
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [External] Re: [PATCH 3/3] efistub: fix missed the initialization of gp
- From: yunhui cui <cuiyunhui@xxxxxxxxxxxxx>
- Re: [External] Re: [PATCH 1/3] Revert "riscv/efistub: Ensure GP-relative addressing is not used"
- From: yunhui cui <cuiyunhui@xxxxxxxxxxxxx>
- Re: [External] Re: [PATCH 1/3] Revert "riscv/efistub: Ensure GP-relative addressing is not used"
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [External] Re: [PATCH 3/3] efistub: fix missed the initialization of gp
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [External] Re: [PATCH 1/3] Revert "riscv/efistub: Ensure GP-relative addressing is not used"
- From: yunhui cui <cuiyunhui@xxxxxxxxxxxxx>
- Re: [External] Re: [PATCH 3/3] efistub: fix missed the initialization of gp
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 1/3] Revert "riscv/efistub: Ensure GP-relative addressing is not used"
- From: Jan Kiszka <jan.kiszka@xxxxxxxxxxx>
- Re: [External] Re: [PATCH 1/3] Revert "riscv/efistub: Ensure GP-relative addressing is not used"
- From: yunhui cui <cuiyunhui@xxxxxxxxxxxxx>
- Re: [External] Re: [PATCH 3/3] efistub: fix missed the initialization of gp
- From: yunhui cui <cuiyunhui@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] Revert "riscv/efistub: Ensure GP-relative addressing is not used"
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 3/3] efistub: fix missed the initialization of gp
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 1/3] Revert "riscv/efistub: Ensure GP-relative addressing is not used"
- From: Yunhui Cui <cuiyunhui@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] Revert "riscv/efistub: Ensure GP-relative addressing is not used"
- From: Conor Dooley <conor.dooley@xxxxxxxxxxxxx>
- [PATCH 3/3] efistub: fix missed the initialization of gp
- From: Yunhui Cui <cuiyunhui@xxxxxxxxxxxxx>
- [PATCH 2/3] Revert "riscv/efistub: Tighten ELF relocation check"
- From: Yunhui Cui <cuiyunhui@xxxxxxxxxxxxx>
- 판매 문의 2024
- From: info@xxxxxxxxxxxxxxxxxxxxxx
- Re: [PATCH 3/4] efi/libstub: Measure into CC protocol if TCG2 protocol is absent
- From: Kuppuswamy Sathyanarayanan <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/4] efi/libstub: Measure into CC protocol if TCG2 protocol is absent
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH 3/4] efi/libstub: Measure into CC protocol if TCG2 protocol is absent
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 2/4] efi/libstub: Add Confidential Computing (CC) measurement typedefs
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH 3/4] efi/libstub: Measure into CC protocol if TCG2 protocol is absent
- From: Kuppuswamy Sathyanarayanan <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/4] efi/libstub: Add Confidential Computing (CC) measurement typedefs
- From: Kuppuswamy Sathyanarayanan <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] efi/libstub: Fold efi_tcg2_tagged_event into efi_measured_event
- From: Kuppuswamy Sathyanarayanan <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/4] efi/libstub: Measure into CC protocol if TCG2 protocol is absent
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH 3/4] efi/libstub: Measure into CC protocol if TCG2 protocol is absent
- From: Kuppuswamy Sathyanarayanan <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/4] efi/libstub: Add Confidential Computing (CC) measurement typedefs
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH 3/4] efi/libstub: Measure into CC protocol if TCG2 protocol is absent
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH 3/4] efi/libstub: Measure into CC protocol if TCG2 protocol is absent
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH 3/4] efi/libstub: Measure into CC protocol if TCG2 protocol is absent
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 3/4] efi/libstub: Measure into CC protocol if TCG2 protocol is absent
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH 1/4] efi/libstub: Fold efi_tcg2_tagged_event into efi_measured_event
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v5 3/3] of: property: fw_devlink: Add support for "post-init-providers" property
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- [PATCH v5 2/3] driver core: Add FWLINK_FLAG_IGNORE to completely ignore a fwnode link
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- [PATCH v5 1/3] driver core: Adds flags param to fwnode_link_add()
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- [PATCH v5 0/3] Add post-init-providers binding to improve suspend/resume stability
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- Re: [PATCH 1/4] efi/libstub: Fold efi_tcg2_tagged_event into efi_measured_event
- From: Kuppuswamy Sathyanarayanan <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/4] Add post-init-providers binding to improve suspend/resume stability
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH stable-v6.1 00/18] efistub/x86 changes for secure boot
- From: Greg KH <greg@xxxxxxxxx>
- [PATCH stable-v6.1 18/18] efi/x86: Fix the missing KASLR_FLAG bit in boot_params->hdr.loadflags
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH stable-v6.1 16/18] x86/boot: Rename conflicting 'boot_params' pointer to 'boot_params_ptr'
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH stable-v6.1 17/18] x86/boot: efistub: Assign global boot_params variable
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH stable-v6.1 15/18] x86/efistub: Avoid placing the kernel below LOAD_PHYSICAL_ADDR
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH stable-v6.1 14/18] efi/x86: Avoid physical KASLR on older Dell systems
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH stable-v6.1 13/18] x86/efistub: Avoid legacy decompressor when doing EFI boot
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH stable-v6.1 12/18] x86/efistub: Perform SNP feature test while running in the firmware
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH stable-v6.1 11/18] x86/efistub: Prefer EFI memory attributes protocol over DXE services
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH stable-v6.1 10/18] x86/decompressor: Factor out kernel decompression and relocation
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH stable-v6.1 09/18] x86/efistub: Perform 4/5 level paging switch from the stub
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH stable-v6.1 08/18] efi/libstub: Add limit argument to efi_random_alloc()
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH stable-v6.1 07/18] efi/libstub: Add memory attribute protocol definitions
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH stable-v6.1 06/18] x86/decompressor: Move global symbol references to C code
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH stable-v6.1 05/18] x86/efistub: Clear BSS in EFI handover protocol entrypoint
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH stable-v6.1 04/18] x86/decompressor: Avoid magic offsets for EFI handover entrypoint
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH stable-v6.1 02/18] efi: efivars: prevent double registration
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH stable-v6.1 03/18] x86/efistub: Simplify and clean up handover entry code
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH stable-v6.1 01/18] arm64: efi: Limit allocations to 48-bit addressable physical region
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH stable-v6.1 00/18] efistub/x86 changes for secure boot
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH 4/4] efi/libstub: Add get_event_log() support for CC platforms
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH 3/4] efi/libstub: Measure into CC protocol if TCG2 protocol is absent
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH 2/4] efi/libstub: Add Confidential Computing (CC) measurement typedefs
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH 1/4] efi/libstub: Fold efi_tcg2_tagged_event into efi_measured_event
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH 0/4] efi/libstub: Fall back to CC proto for measurement
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [PATCH v2 1/2] efi/libstub: Add Confidential Computing (CC) measurement support
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Development of new flavors
- From: "Maxwell Atlee" <maxwell.atlee@xxxxxxxxxxxxx>
- Re: [PATCH 4/4] ras/events: Trace CXL CPER events even without the CXL stack loaded
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH 2/4] acpi/ghes: Process CXL Component Events
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH 4/4] ras/events: Trace CXL CPER events even without the CXL stack loaded
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH 1/4] cxl/event: Add missing include files
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH 3/4] cxl/pci: Register for and process CPER events
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH 2/4] acpi/ghes: Process CXL Component Events
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH 1/4] cxl/event: Add missing include files
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [GIT PULL] EFI fixes for v6.8 #2
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] EFI fixes for v6.8 #2
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [PATCH v3 0/4] Add post-init-providers binding to improve suspend/resume stability
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- Re: [PATCH v4 0/4] Add post-init-providers binding to improve suspend/resume stability
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- [PATCH 4/4] ras/events: Trace CXL CPER events even without the CXL stack loaded
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- [PATCH 3/4] cxl/pci: Register for and process CPER events
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- [PATCH 2/4] acpi/ghes: Process CXL Component Events
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- [PATCH 1/4] cxl/event: Add missing include files
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- [PATCH 0/4] efi/cxl-cper: Report CXL CPER events through tracing
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH v2 2/2] efi/libstub: Add get_event_log() support for CC platforms
- From: Kuppuswamy Sathyanarayanan <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] efi/libstub: Add Confidential Computing (CC) measurement support
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH v2 2/2] efi/libstub: Add get_event_log() support for CC platforms
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- [efi:urgent] BUILD SUCCESS 2ce507f57ba9c78c080d4a050ebdc97263239de8
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH 1/2] efivarfs: Drop redundant cleanup on fill_super() failure
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH 2/2] efivarfs: Drop 'duplicates' bool parameter on efivar_init()
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [PATCH v2 1/2] efi/libstub: Add Confidential Computing (CC) measurement support
- From: Kuppuswamy Sathyanarayanan <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] efi/libstub: Add get_event_log() support for CC platforms
- From: Kuppuswamy Sathyanarayanan <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 06/15] x86: Add early SHA support for Secure Launch early measurements
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v8 06/15] x86: Add early SHA support for Secure Launch early measurements
- From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
- Re: [PATCH v8 06/15] x86: Add early SHA support for Secure Launch early measurements
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v3 4/4] of: property: fw_devlink: Add support for "post-init-providers" property
- From: Rob Herring <robh+dt@xxxxxxxxxx>
- Re: [PATCH v8 06/15] x86: Add early SHA support for Secure Launch early measurements
- From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
- Re: [PATCH v2 2/2] efi/libstub: Add get_event_log() support for CC platforms
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH v8 14/15] x86: Secure Launch late initcall platform module
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v8 06/15] x86: Add early SHA support for Secure Launch early measurements
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v3 4/4] of: property: fw_devlink: Add support for "post-init-providers" property
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- Re: [PATCH v3 0/4] Add post-init-providers binding to improve suspend/resume stability
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- Re: [PATCH v8 04/15] x86: Secure Launch Resource Table header file
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH 2/2] x86/snp: Convert shared memory back to private on kexec
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v8 14/15] x86: Secure Launch late initcall platform module
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/4] Add post-init-providers binding to improve suspend/resume stability
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 4/4] of: property: fw_devlink: Add support for "post-init-providers" property
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 06/15] x86: Add early SHA support for Secure Launch early measurements
- From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
- Re: [PATCH 2/2] x86/snp: Convert shared memory back to private on kexec
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 06/15] x86: Add early SHA support for Secure Launch early measurements
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v3 3/4] dt-bindings: Add post-init-providers property
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH v4 3/4] dt-bindings: Add post-init-providers property
- From: Rob Herring <robh@xxxxxxxxxx>
- [PATCH v4 4/4] of: property: fw_devlink: Add support for "post-init-providers" property
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- [PATCH v4 3/4] dt-bindings: Add post-init-providers property
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- [PATCH v4 2/4] driver core: Add FWLINK_FLAG_IGNORE to completely ignore a fwnode link
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- [PATCH v4 1/4] driver core: Adds flags param to fwnode_link_add()
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- [PATCH v4 0/4] Add post-init-providers binding to improve suspend/resume stability
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- Re: [PATCH v3 3/4] dt-bindings: Add post-init-providers property
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- Re: [PATCH v8 06/15] x86: Add early SHA support for Secure Launch early measurements
- From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
- Re: [PATCH v8 04/15] x86: Secure Launch Resource Table header file
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v8 04/15] x86: Secure Launch Resource Table header file
- From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
- Re: [PATCH v3 3/4] dt-bindings: Add post-init-providers property
- From: Rob Herring <robh@xxxxxxxxxx>
- [PATCH v3 4/4] of: property: fw_devlink: Add support for "post-init-providers" property
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- [PATCH v3 3/4] dt-bindings: Add post-init-providers property
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- [PATCH v3 2/4] driver core: Add FWLINK_FLAG_IGNORE to completely ignore a fwnode link
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- [PATCH v3 1/4] driver core: Adds flags param to fwnode_link_add()
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- [PATCH v3 0/4] Add post-init-providers binding to improve suspend/resume stability
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- Re: [PATCH v8 15/15] x86: EFI stub DRTM launch support for Secure Launch
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 3/4] dt-bindings: Add post-init-supplier property
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- Re: [PATCH v8 15/15] x86: EFI stub DRTM launch support for Secure Launch
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH 2/2] x86/snp: Convert shared memory back to private on kexec
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v8 15/15] x86: EFI stub DRTM launch support for Secure Launch
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v2 3/4] dt-bindings: Add post-init-supplier property
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH 0/4] arm64: mm: support dynamic vmalloc/pmd configuration
- From: Maxwell Bland <mbland@xxxxxxxxxxxx>
- Re: [PATCH 1/4] mm/vmalloc: allow arch-specific vmalloc_node overrides
- From: Maxwell Bland <mbland@xxxxxxxxxxxx>
- RE: [External] Re: [PATCH 2/4] mm: pgalloc: support address-conditional pmd allocation
- From: Maxwell Bland <mbland@xxxxxxxxxxxx>
- RE: [External] Re: [PATCH 0/4] arm64: mm: support dynamic vmalloc/pmd configuration
- From: Maxwell Bland <mbland@xxxxxxxxxxxx>
- Re: [PATCH 0/4] arm64: mm: support dynamic vmalloc/pmd configuration
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH v2 3/4] dt-bindings: Add post-init-supplier property
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH 2/4] mm: pgalloc: support address-conditional pmd allocation
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH 1/4] mm/vmalloc: allow arch-specific vmalloc_node overrides
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH 0/4] arm64: mm: support dynamic vmalloc/pmd configuration
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH v2 3/4] dt-bindings: Add post-init-supplier property
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH 3/4] arm64: separate code and data virtual memory allocation
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH 2/4] mm: pgalloc: support address-conditional pmd allocation
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH 1/4] mm/vmalloc: allow arch-specific vmalloc_node overrides
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH 1/4] mm/vmalloc: allow arch-specific vmalloc_node overrides
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] dt-bindings: Add post-init-supplier property
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- Re: [PATCH v2 3/4] dt-bindings: Add post-init-supplier property
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- [PATCH 3/4] arm64: separate code and data virtual memory allocation
- From: Maxwell Bland <mbland@xxxxxxxxxxxx>
- [PATCH 1/4] mm/vmalloc: allow arch-specific vmalloc_node overrides
- From: Maxwell Bland <mbland@xxxxxxxxxxxx>
- [PATCH 4/4] arm64: dynamic enforcement of pmd-level PXNTable
- From: Maxwell Bland <mbland@xxxxxxxxxxxx>
- [PATCH 2/4] mm: pgalloc: support address-conditional pmd allocation
- From: Maxwell Bland <mbland@xxxxxxxxxxxx>
- [PATCH 0/4] arm64: mm: support dynamic vmalloc/pmd configuration
- From: Maxwell Bland <mbland@xxxxxxxxxxxx>
- Re: [PATCH 1/2] x86/mm: Do not zap PMD entry mapping unaccepted memory table during kdump.
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [RFC] efi: Add ACPI_MEMORY_NVS into the linear map
- From: Boqun Feng <boqun.feng@xxxxxxxxx>
- Re: x86 efistub stable backports for v6.6
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH 1/2] x86/mm: Do not zap PMD entry mapping unaccepted memory table during kdump.
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: x86 efistub stable backports for v6.6
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- Re: x86 efistub stable backports for v6.6
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC] efi: Add ACPI_MEMORY_NVS into the linear map
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC] efi: Add ACPI_MEMORY_NVS into the linear map
- From: Boqun Feng <boqun.feng@xxxxxxxxx>
- [PATCH 2/2] x86/snp: Convert shared memory back to private on kexec
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH 1/2] x86/mm: Do not zap PMD entry mapping unaccepted memory table during kdump.
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH 0/2] x86/snp: Add kexec support
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- Re: x86 efistub stable backports for v6.6
- From: xnox <dimitri.ledkov@xxxxxxxxxxxxx>
- [PATCH v2] efi/x86: skip efi_arch_mem_reserve() in case of kexec.
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH] efi/x86: skip efi_arch_mem_reserve() in case of kexec.
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- Re: [PATCH v2 2/2] efi/libstub: Add get_event_log() support for CC platforms
- From: Kuppuswamy Sathyanarayanan <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] efi/libstub: Add get_event_log() support for CC platforms
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH v2 1/2] efi/libstub: Add Confidential Computing (CC) measurement support
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH v8 15/15] x86: EFI stub DRTM launch support for Secure Launch
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 3/4] dt-bindings: Add post-init-supplier property
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH v8 14/15] x86: Secure Launch late initcall platform module
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [RFC] efi: Add ACPI_MEMORY_NVS into the linear map
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 15/15] x86: EFI stub DRTM launch support for Secure Launch
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v8 14/15] x86: Secure Launch late initcall platform module
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [RFC] efi: Add ACPI_MEMORY_NVS into the linear map
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC] efi: Add ACPI_MEMORY_NVS into the linear map
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC] efi: Add ACPI_MEMORY_NVS into the linear map
- From: Boqun Feng <boqun.feng@xxxxxxxxx>
- [RFC] efi: Add ACPI_MEMORY_NVS into the linear map
- From: Boqun Feng <boqun.feng@xxxxxxxxx>
- Re: [PATCH v8 07/15] x86: Secure Launch kernel early boot stub
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v8 03/15] x86: Secure Launch Kconfig
- From: ross.philipson@xxxxxxxxxx
- [efi:urgent] BUILD SUCCESS e258b85f1c3c9122fe4592a0cf99669c60df35e1
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 2/4] efi/cper, cxl: Make definitions and structures global
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 4/4] acpi/ghes, cxl/pci: Trace FW-First CXL Protocol Errors
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v2 3/4] dt-bindings: Add post-init-supplier property
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH v2 3/4] acpi/ghes, efi/cper: Recognize and process CXL Protocol Errors.
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v2 2/4] efi/cper, cxl: Make definitions and structures global
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: x86 efistub stable backports for v6.6
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 1/4] acpi/ghes, cxl: Create a common CXL struct to handle different CXL CPER records
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v8 01/15] x86/boot: Place kernel_info at a fixed offset
- From: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
- Re: x86 efistub stable backports for v6.6
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: x86 efistub stable backports for v6.6
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: x86 efistub stable backports for v6.6
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- x86 efistub stable backports for v6.6
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v8 15/15] x86: EFI stub DRTM launch support for Secure Launch
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v8 14/15] x86: Secure Launch late initcall platform module
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v8 07/15] x86: Secure Launch kernel early boot stub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v8 06/15] x86: Add early SHA support for Secure Launch early measurements
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v8 04/15] x86: Secure Launch Resource Table header file
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v8 03/15] x86: Secure Launch Kconfig
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v8 01/15] x86/boot: Place kernel_info at a fixed offset
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 2/2] efi/libstub: Add get_event_log() support for CC platforms
- From: Kuppuswamy Sathyanarayanan <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- [PATCH v2 1/2] efi/libstub: Add Confidential Computing (CC) measurement support
- From: Kuppuswamy Sathyanarayanan <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- [PATCH v2 0/2] Add measurement and event log support for CC platforms
- From: Kuppuswamy Sathyanarayanan <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] dt-bindings: Add post-init-supplier property
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- [PATCH v8 13/15] tpm: Add sysfs interface to allow setting and querying the preferred locality
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 11/15] reboot: Secure Launch SEXIT support on reboot paths
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 12/15] tpm: Add ability to set the preferred locality the TPM chip uses
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 10/15] kexec: Secure Launch kexec SEXIT support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 09/15] x86: Secure Launch SMP bringup support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 07/15] x86: Secure Launch kernel early boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 02/15] Documentation/x86: Secure Launch kernel documentation
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 15/15] x86: EFI stub DRTM launch support for Secure Launch
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 08/15] x86: Secure Launch kernel late boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 14/15] x86: Secure Launch late initcall platform module
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 05/15] x86: Secure Launch main header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 06/15] x86: Add early SHA support for Secure Launch early measurements
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 01/15] x86/boot: Place kernel_info at a fixed offset
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 04/15] x86: Secure Launch Resource Table header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 00/15] x86: Trenchboot secure dynamic launch Linux kernel support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 03/15] x86: Secure Launch Kconfig
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v2 3/4] dt-bindings: Add post-init-supplier property
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH v2 3/4] dt-bindings: Add post-init-supplier property
- From: Conor Dooley <conor@xxxxxxxxxx>
- [efi:urgent] BUILD SUCCESS fccfa646ef3628097d59f7d9c1a3e84d4b6bb45e
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v3] efivarfs: Request at most 512 bytes for variable names
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi/capsule-loader: fix incorrect allocation size
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH AUTOSEL 5.10 2/6] efi: Don't add memblocks for soft-reserved memory
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.10 1/6] efi: runtime: Fix potential overflow of soft-reserved region size
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.15 15/22] efi: Don't add memblocks for soft-reserved memory
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.15 14/22] efi: runtime: Fix potential overflow of soft-reserved region size
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.1 16/28] efi: Don't add memblocks for soft-reserved memory
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.1 15/28] efi: runtime: Fix potential overflow of soft-reserved region size
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.6 28/51] efi: Don't add memblocks for soft-reserved memory
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.6 27/51] efi: runtime: Fix potential overflow of soft-reserved region size
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.7 33/58] efi: Don't add memblocks for soft-reserved memory
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.7 32/58] efi: runtime: Fix potential overflow of soft-reserved region size
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v2 3/4] dt-bindings: Add post-init-supplier property
- From: Rob Herring <robh@xxxxxxxxxx>
- [PATCH v2 4/4] of: property: fw_devlink: Add support for "post-init-supplier" property
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- [PATCH v2 3/4] dt-bindings: Add post-init-supplier property
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- [PATCH v2 2/4] driver core: Add FWLINK_FLAG_IGNORE to completely ignore a fwnode link
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- [PATCH v2 1/4] driver core: Adds flags param to fwnode_link_add()
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- [PATCH v2 0/4] Add post-init-supplier binding to improve suspend/resume stability
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- Re: [PATCH v1 3/4] dt-bindings: Add post-init-supplier property
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- Re: [PATCH v1 3/4] dt-bindings: Add post-init-supplier property
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- [PATCH] efi/capsule-loader: fix incorrect allocation size
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCH v1 3/4] dt-bindings: Add post-init-supplier property
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH v1 3/4] dt-bindings: Add post-init-supplier property
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v1 3/4] dt-bindings: Add post-init-supplier property
- From: Rob Herring <robh+dt@xxxxxxxxxx>
- [PATCH v1 4/4] of: property: fw_devlink: Add support for "post-init-supplier" property
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- [PATCH v1 3/4] dt-bindings: Add post-init-supplier property
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- [PATCH v1 2/4] driver core: Add FWLINK_FLAG_IGNORE to completely ignore a fwnode link
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- [PATCH v1 1/4] driver core: Adds flags param to fwnode_link_add()
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- [PATCH v1 0/4] Add post-init-supplier binding to improve suspend/resume stability
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
[Index of Archives]
[Linux Kernel Development]
[Security]
[Linux ARM Kernel]
[Tools]
[Linux MIPS]
[Linux S390]
[Bugtraq]
[Share Photos]>
[Fedora ARM]