Linux EFI/UEFI Development
[Prev Page][Next Page]
- [PATCH 17/18] pstore: Replace arguments for write_buf_user() API
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 01/18] pstore: Use dynamic spinlock initializer
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 10/18] pstore: Replace arguments for write() API
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 16/18] pstore: Replace arguments for write_buf() API
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC PATCH v2 01/32] x86: Add the Secure Encrypted Virtualization CPU feature
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [PATCH V12 07/10] efi: print unrecognized CPER section
- From: Joe Perches <joe@xxxxxxxxxxx>
- [PATCH V12 06/10] acpi: apei: panic OS with fatal error status block
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V12 07/10] efi: print unrecognized CPER section
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V12 10/10] arm/arm64: KVM: add guest SEA support
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V12 09/10] trace, ras: add ARM processor error trace event
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V12 08/10] ras: acpi / apei: generate trace event for unrecognized CPER section
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V12 05/10] acpi: apei: handle SEA notification type for ARMv8
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V12 04/10] arm64: exception: handle Synchronous External Abort
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V12 03/10] efi: parse ARM processor error
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V12 02/10] ras: acpi/apei: cper: generic error data entry v3 per ACPI 6.1
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V12 01/10] acpi: apei: read ack upon ghes record consumption
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V12 00/10] Add UEFI 2.6 and ACPI 6.1 updates for RAS on ARM64
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 01/32] x86: Add the Secure Encrypted Virtualization CPU feature
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [RFC PATCH v4 26/28] x86: Allow kexec to be used with SME
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH v4 26/28] x86: Allow kexec to be used with SME
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH V11 10/10] arm/arm64: KVM: add guest SEA support
- From: "Baicar, Tyler" <tbaicar@xxxxxxxxxxxxxx>
- Re: [PATCH V11 10/10] arm/arm64: KVM: add guest SEA support
- From: James Morse <james.morse@xxxxxxx>
- Re: [PATCH V11 10/10] arm/arm64: KVM: add guest SEA support
- From: Xiongfeng Wang <wangxiongfeng2@xxxxxxxxxx>
- Re: [PATCH V11 10/10] arm/arm64: KVM: add guest SEA support
- From: gengdongjiu <gengdj.1984@xxxxxxxxx>
- Re: PROBLEM: Unexpected contents of load options (EFI Boot Stub)
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- PROBLEM: Unexpected contents of load options (EFI Boot Stub)
- From: Fabian Tschiatschek <fabian.tschiatschek@xxxxxxxxx>
- Re: [RFC PATCH v2 01/32] x86: Add the Secure Encrypted Virtualization CPU feature
- From: Borislav Petkov <bp@xxxxxxx>
- Re: the Mail Archive is now (again) subscribed to this list...
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: the Mail Archive is now (again) subscribed to this list...
- From: Lukas Wunner <lukas@xxxxxxxxx>
- RE: [PATCH v2 1/2] efi/capsule: Add 'capsule' lookup support
- From: "Zhuo, Qiuxu" <qiuxu.zhuo@xxxxxxxxx>
- RE: [PATCH v2 0/2] capsule pstore backend
- From: "Zhuo, Qiuxu" <qiuxu.zhuo@xxxxxxxxx>
- Re: [RFC PATCH v2 00/32] x86: Secure Encrypted Virtualization (AMD)
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [RFC PATCH v2 06/32] x86/pci: Use memremap when walking setup data
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH v2 01/32] x86: Add the Secure Encrypted Virtualization CPU feature
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [RFC PATCH v2 00/32] x86: Secure Encrypted Virtualization (AMD)
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [RFC PATCH v2 06/32] x86/pci: Use memremap when walking setup data
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: [RFC PATCH v2 00/32] x86: Secure Encrypted Virtualization (AMD)
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Multiple Acer laptops hang on ACPI poweroff
- From: Daniel Drake <drake@xxxxxxxxxxxx>
- Re: [PATCH v2 0/2] capsule pstore backend
- From: "Luck, Tony" <tony.luck@xxxxxxxxx>
- Re: [PATCH v2 0/2] capsule pstore backend
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH v2 01/32] x86: Add the Secure Encrypted Virtualization CPU feature
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [PATCH v2 0/2] capsule pstore backend
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH v2 19/32] crypto: ccp: Introduce the AMD Secure Processor device
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- the Mail Archive is now (again) subscribed to this list...
- From: Laszlo Ersek <lersek@xxxxxxxxxx>
- Re: [RFC PATCH v4 11/28] x86: Add support to determine the E820 type of an address
- From: Borislav Petkov <bp@xxxxxxxxx>
- [RFC PATCH v2 17/32] x86: kvmclock: Clear encryption attribute when SEV is active
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v2 2/2] efi: capsule pstore backend
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [RFC PATCH v2 16/32] x86: kvm: Provide support to create Guest and HV shared per-CPU variables
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v2 27/32] kvm: svm: Add support for SEV LAUNCH_FINISH command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [RFC PATCH v4 27/28] x86: Add support to encrypt the kernel in-place
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH v4 27/28] x86: Add support to encrypt the kernel in-place
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH v2 19/32] crypto: ccp: Introduce the AMD Secure Processor device
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v2 31/32] kvm: svm: Add support for SEV LAUNCH_MEASURE command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v2 15/32] x86: Add support for changing memory encryption attribute in early boot
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [RFC PATCH v2 19/32] crypto: ccp: Introduce the AMD Secure Processor device
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v2 1/2] efi/capsule: Add 'capsule' lookup support
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v4 19/28] swiotlb: Add warnings for use of bounce buffers with SME
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [RFC PATCH v2 10/32] x86: DMA support for SEV memory encryption
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v2 1/2] efi/capsule: Add 'capsule' lookup support
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH v2 14/32] x86: mm: Provide support to use memblock when spliting large pages
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v2 13/32] KVM: SVM: Enable SEV by setting the SEV_ENABLE CPU feature
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v2 12/32] x86: Add early boot support when running with SEV active
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v2 1/2] efi/capsule: Add 'capsule' lookup support
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 2/2] efi: capsule pstore backend
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2] efi/libstub/arm*: Set default address and size cells values for an empty dtb
- From: AKASHI Takahiro <takahiro.akashi@xxxxxxxxxx>
- [RFC PATCH v2 26/32] kvm: svm: Add support for SEV LAUNCH_UPDATE_DATA command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v2 28/32] kvm: svm: Add support for SEV GUEST_STATUS command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v2 11/32] x86: Unroll string I/O when SEV is active
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v2 25/32] kvm: svm: Add support for SEV LAUNCH_START command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v2 20/32] crypto: ccp: Add Platform Security Processor (PSP) interface support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v2 21/32] crypto: ccp: Add Secure Encrypted Virtualization (SEV) interface support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v2 04/32] KVM: SVM: Add SEV feature definitions to KVM
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v2 19/32] crypto: ccp: Introduce the AMD Secure Processor device
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v2 23/32] kvm: introduce KVM_MEMORY_ENCRYPT_OP ioctl
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v2 18/32] kvm: svm: Use the hardware provided GPA instead of page walk
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v2 22/32] kvm: svm: prepare to reserve asid for SEV guest
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v2 24/32] kvm: x86: prepare for SEV guest management API support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v2 03/32] KVM: SVM: prepare for new bit definition in nested_ctl
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v2 1/2] efi/capsule: Add 'capsule' lookup support
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH v2 32/32] x86: kvm: Pin the guest memory when SEV is active
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v2 05/32] x86: Use encrypted access of BOOT related data with SEV
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v2 30/32] kvm: svm: Add support for SEV DEBUG_ENCRYPT command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v2 29/32] kvm: svm: Add support for SEV DEBUG_DECRYPT command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v2 02/32] x86: Secure Encrypted Virtualization (SEV) support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v2] efi/libstub/arm*: Set default address and size cells values for an empty dtb
- From: "Goel, Sameer" <sgoel@xxxxxxxxxxxxxx>
- [RFC PATCH v2 07/32] x86/efi: Access EFI data as encrypted when SEV is active
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v2 08/32] x86: Use PAGE_KERNEL protection for ioremap of memory page
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v2 06/32] x86/pci: Use memremap when walking setup data
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v2 09/32] x86: Change early_ioremap to early_memremap for BOOT data
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v2 01/32] x86: Add the Secure Encrypted Virtualization CPU feature
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v2 00/32] x86: Secure Encrypted Virtualization (AMD)
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v2] efi/libstub/arm*: Set default address and size cells values for an empty dtb
- From: Timur Tabi <timur@xxxxxxxxxxxxxx>
- Re: [PATCH V11 10/10] arm/arm64: KVM: add guest SEA support
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH v2 1/2] efi/capsule: Add 'capsule' lookup support
- From: Qiuxu Zhuo <qiuxu.zhuo@xxxxxxxxx>
- [PATCH v2 0/2] capsule pstore backend
- From: Qiuxu Zhuo <qiuxu.zhuo@xxxxxxxxx>
- [PATCH v2 2/2] efi: capsule pstore backend
- From: Qiuxu Zhuo <qiuxu.zhuo@xxxxxxxxx>
- Re: [PATCH v1 2/2] efi: capsule pstore backend
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v1 1/2] efi/capsule: Add 'capsule' lookup support
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH] efi: arm: enable DMI/SMBIOS
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v1 1/2] efi/capsule: Add 'capsule' lookup support
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH v4 28/28] x86: Add support to make use of Secure Memory Encryption
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH V11 05/10] acpi: apei: handle SEA notification type for ARMv8
- From: "Baicar, Tyler" <tbaicar@xxxxxxxxxxxxxx>
- [PATCH 2/2] efi: arm: Fix boot crash with CONFIG_CPUMASK_OFFSTACK=y
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [GIT PULL 0/2] EFI fixes for v4.11-rc
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 1/2] efi: libstub: Treat missing SecureBoot variable as S/B disabled
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH v4 00/28] x86: Secure Memory Encryption (AMD)
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH v4 27/28] x86: Add support to encrypt the kernel in-place
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH v4 26/28] x86: Allow kexec to be used with SME
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 0/2] efi: Enhance capsule loader to support signed Quark images
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH 0/2] efi: Enhance capsule loader to support signed Quark images
- From: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v4 19/28] swiotlb: Add warnings for use of bounce buffers with SME
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH v4 21/28] x86: Check for memory encryption on the APs
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH v4 26/28] x86: Allow kexec to be used with SME
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [RFC PATCH v4 26/28] x86: Allow kexec to be used with SME
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [RFC PATCH v4 00/28] x86: Secure Memory Encryption (AMD)
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH V2] x86/efi: Add missing 1:1 mappings to support buggy firmware
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- [PATCH v1 2/2] efi: capsule pstore backend
- From: Qiuxu Zhuo <qiuxu.zhuo@xxxxxxxxx>
- [PATCH v1 1/2] efi/capsule: Add 'capsule' lookup support
- From: Qiuxu Zhuo <qiuxu.zhuo@xxxxxxxxx>
- Re: [PATCH V11 05/10] acpi: apei: handle SEA notification type for ARMv8
- From: Xie XiuQi <xiexiuqi@xxxxxxxxxx>
- Re: [PATCH V2] x86/efi: Add missing 1:1 mappings to support buggy firmware
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH V11 10/10] arm/arm64: KVM: add guest SEA support
- From: Xiongfeng Wang <wangxiongfeng2@xxxxxxxxxx>
- Re: [RFC PATCH v4 16/28] x86: Add support for changing memory encryption attribute
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH v4 21/28] x86: Check for memory encryption on the APs
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH v4 19/28] swiotlb: Add warnings for use of bounce buffers with SME
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH v4 05/28] x86: Add Secure Memory Encryption (SME) support
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH v4 11/28] x86: Add support to determine the E820 type of an address
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH V11 10/10] arm/arm64: KVM: add guest SEA support
- From: "Baicar, Tyler" <tbaicar@xxxxxxxxxxxxxx>
- Re: [PATCH 0/2] efi: Enhance capsule loader to support signed Quark images
- From: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] efi: Enhance capsule loader to support signed Quark images
- From: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] efi: Enhance capsule loader to support signed Quark images
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH 0/2] efi: Enhance capsule loader to support signed Quark images
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH 0/2] efi: Enhance capsule loader to support signed Quark images
- From: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] efi: Enhance capsule loader to support signed Quark images
- From: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] efi: Enhance capsule loader to support signed Quark images
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH 0/2] efi: Enhance capsule loader to support signed Quark images
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH 0/2] efi: Enhance capsule loader to support signed Quark images
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V11 10/10] arm/arm64: KVM: add guest SEA support
- From: James Morse <james.morse@xxxxxxx>
- Re: [PATCH V2] x86/efi: Add missing 1:1 mappings to support buggy firmware
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] efi: Enhance capsule loader to support signed Quark images
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] efi: Enhance capsule loader to support signed Quark images
- From: Jan Kiszka <jan.kiszka@xxxxxxxxxxx>
- Re: [PATCH 0/2] efi: Enhance capsule loader to support signed Quark images
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86/efi: Add missing 1:1 mappings to support buggy firmware
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v4 26/28] x86: Allow kexec to be used with SME
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH V11 10/10] arm/arm64: KVM: add guest SEA support
- From: Xiongfeng Wang <wangxiongfeng2@xxxxxxxxxx>
- Re: [PATCH v2 2/2] efi: efi_mem_reserve(): don't reserve through memblock after mm_init()
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v4 21/28] x86: Check for memory encryption on the APs
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH v4 19/28] swiotlb: Add warnings for use of bounce buffers with SME
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH V11 10/10] arm/arm64: KVM: add guest SEA support
- From: James Morse <james.morse@xxxxxxx>
- Re: [PATCH V11 10/10] arm/arm64: KVM: add guest SEA support
- From: gengdongjiu <gengdj.1984@xxxxxxxxx>
- Re: [PATCH 1/2] efi/esrt: Not having an ERST descriptor is not an error
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH 1/2] efi/esrt: Not having an ERST descriptor is not an error
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 2/2] efi/efi_mem_desc_lookup: Not finding a descriptor is not an error
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH 1/2] efi/esrt: Not having an ERST descriptor is not an error
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [RFC PATCH v4 18/28] x86: DMA support for memory encryption
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH v4 05/28] x86: Add Secure Memory Encryption (SME) support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH V11 10/10] arm/arm64: KVM: add guest SEA support
- From: Xiongfeng Wang <wangxiongfeng2@xxxxxxxxxx>
- Re: [PATCH v2] efi/libstub/arm*: Set default address and size cells values for an empty dtb
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- Re: [PATCH v2] efi/libstub/arm*: Set default address and size cells values for an empty dtb
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v2] efi/libstub/arm*: Set default address and size cells values for an empty dtb
- From: Robin Murphy <robin.murphy@xxxxxxx>
- Re: [RFC PATCH v4 14/28] Add support to access boot related data in the clear
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH v4 14/28] Add support to access boot related data in the clear
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v2] efi/libstub/arm*: Set default address and size cells values for an empty dtb
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- Re: [PATCH V11 10/10] arm/arm64: KVM: add guest SEA support
- From: James Morse <james.morse@xxxxxxx>
- Re: [RFC PATCH v4 14/28] Add support to access boot related data in the clear
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH v4 13/28] efi: Update efi_mem_type() to return defined EFI mem types
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v4 07/28] x86: Provide general kernel support for memory encryption
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [REGRESSION] EFI mixed mode patch triggers boot failure
- From: Laura Abbott <labbott@xxxxxxxxxx>
- Re: [RFC PATCH v4 14/28] Add support to access boot related data in the clear
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [REGRESSION] EFI mixed mode patch triggers boot failure
- From: Jiri Kosina <jikos@xxxxxxxxxx>
- [PATCH] efi: ARM/arm64: fix boot crash with CONFIG_CPUMASK_OFFSTACK=y
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH v4 13/28] efi: Update efi_mem_type() to return defined EFI mem types
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH v4 16/28] x86: Add support for changing memory encryption attribute
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH v4 10/28] x86: Insure that boot memory areas are mapped properly
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH v4 07/28] x86: Provide general kernel support for memory encryption
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC PATCH v4 07/28] x86: Provide general kernel support for memory encryption
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC PATCH v4 07/28] x86: Provide general kernel support for memory encryption
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH v4 09/28] x86: Add support for early encryption/decryption of memory
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH v4 08/28] x86: Extend the early_memremap support with additional attrs
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH v4 07/28] x86: Provide general kernel support for memory encryption
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH V10 07/10] efi: print unrecognized CPER section
- From: James Morse <james.morse@xxxxxxx>
- Re: [PATCH V10 07/10] efi: print unrecognized CPER section
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH V10 07/10] efi: print unrecognized CPER section
- From: Joe Perches <joe@xxxxxxxxxxx>
- [PATCH V11 07/10] efi: print unrecognized CPER section
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V11 09/10] trace, ras: add ARM processor error trace event
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V11 08/10] ras: acpi / apei: generate trace event for unrecognized CPER section
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V11 10/10] arm/arm64: KVM: add guest SEA support
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V11 06/10] acpi: apei: panic OS with fatal error status block
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V11 05/10] acpi: apei: handle SEA notification type for ARMv8
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V11 04/10] arm64: exception: handle Synchronous External Abort
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V11 03/10] efi: parse ARM processor error
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V11 02/10] ras: acpi/apei: cper: generic error data entry v3 per ACPI 6.1
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V11 01/10] acpi: apei: read ack upon ghes record consumption
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V11 00/10] Add UEFI 2.6 and ACPI 6.1 updates for RAS on ARM64
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- Re: [PATCH V10 07/10] efi: print unrecognized CPER section
- From: "Baicar, Tyler" <tbaicar@xxxxxxxxxxxxxx>
- Re: [PATCH V10 07/10] efi: print unrecognized CPER section
- From: James Morse <james.morse@xxxxxxx>
- Re: [RFC PATCH v4 00/28] x86: Secure Memory Encryption (AMD)
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH v4 00/28] x86: Secure Memory Encryption (AMD)
- From: Rik van Riel <riel@xxxxxxxxxx>
- Re: [RFC PATCH v4 07/28] x86: Provide general kernel support for memory encryption
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH V10 05/10] acpi: apei: handle SEA notification type for ARMv8
- From: "Baicar, Tyler" <tbaicar@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v4 06/28] x86: Add support to enable SME during early boot processing
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH v4 00/28] x86: Secure Memory Encryption (AMD)
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH v4 14/28] Add support to access boot related data in the clear
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH v4 06/28] x86: Add support to enable SME during early boot processing
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH v4 13/28] efi: Update efi_mem_type() to return defined EFI mem types
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v4 11/28] x86: Add support to determine the E820 type of an address
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH v4 10/28] x86: Insure that boot memory areas are mapped properly
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH v4 07/28] x86: Provide general kernel support for memory encryption
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH v4 09/28] x86: Add support for early encryption/decryption of memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH v4 08/28] x86: Extend the early_memremap support with additional attrs
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH v4 07/28] x86: Provide general kernel support for memory encryption
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH v4 06/28] x86: Add support to enable SME during early boot processing
- From: Borislav Petkov <bp@xxxxxxxxx>
- [GIT PULL] EFI changes for v4.11
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH v2] efi: libstub: treat missing SecureBoot variable as S/B disabled
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 0/2] efi: Enhance capsule loader to support signed Quark images
- From: Jan Kiszka <jan.kiszka@xxxxxxxxxxx>
- Re: [PATCH 0/2] efi: Enhance capsule loader to support signed Quark images
- From: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] efi: Enhance capsule loader to support signed Quark images
- From: Jan Kiszka <jan.kiszka@xxxxxxxxxxx>
- Re: [PATCH 0/2] efi: Enhance capsule loader to support signed Quark images
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH v4 00/28] x86: Secure Memory Encryption (AMD)
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v4 1/4] x86/mm: Adapt MODULES_END based on Fixmap section size
- From: Thomas Garnier <thgarnie@xxxxxxxxxx>
- Re: [RFC PATCH v4 19/28] swiotlb: Add warnings for use of bounce buffers with SME
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH v4 26/28] x86: Allow kexec to be used with SME
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH v4 19/28] swiotlb: Add warnings for use of bounce buffers with SME
- From: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx>
- Re: [RFC PATCH v4 26/28] x86: Allow kexec to be used with SME
- From: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx>
- Re: [RFC PATCH v4 02/28] x86: Set the write-protect cache mode for full PAT support
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH v4 05/28] x86: Add Secure Memory Encryption (SME) support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 0/2] efi: Enhance capsule loader to support signed Quark images
- From: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v4 02/28] x86: Set the write-protect cache mode for full PAT support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH v4 04/28] x86: Handle reduction in physical address size with SME
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 0/2] efi: Enhance capsule loader to support signed Quark images
- From: Jan Kiszka <jan.kiszka@xxxxxxxxxxx>
- Re: [PATCH 0/2] efi: Enhance capsule loader to support signed Quark images
- From: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] efi: Enhance capsule loader to support signed Quark images
- From: Jan Kiszka <jan.kiszka@xxxxxxxxxxx>
- Re: [PATCH v2] efi: libstub: treat missing SecureBoot variable as S/B disabled
- From: David Howells <dhowells@xxxxxxxxxx>
- RE: [PATCH 0/2] efi: Enhance capsule loader to support signed Quark images
- From: "Kweh, Hock Leong" <hock.leong.kweh@xxxxxxxxx>
- Re: [PATCH v2] efi: libstub: treat missing SecureBoot variable as S/B disabled
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2] efi: libstub: treat missing SecureBoot variable as S/B disabled
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH 2/2] efi/capsule: Add support for Quark security header
- From: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] efi: Enhance capsule loader to support signed Quark images
- From: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/4] x86/mm: Adapt MODULES_END based on Fixmap section size
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v4 1/4] x86/mm: Adapt MODULES_END based on Fixmap section size
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH v4 2/4] x86: Remap GDT tables in the Fixmap section
- From: Thomas Garnier <thgarnie@xxxxxxxxxx>
- [PATCH v4 3/4] x86: Make the GDT remapping read-only on 64-bit
- From: Thomas Garnier <thgarnie@xxxxxxxxxx>
- [PATCH v4 4/4] KVM: VMX: Simplify segment_base
- From: Thomas Garnier <thgarnie@xxxxxxxxxx>
- [PATCH v4 1/4] x86/mm: Adapt MODULES_END based on Fixmap section size
- From: Thomas Garnier <thgarnie@xxxxxxxxxx>
- Re: [RFC PATCH v4 03/28] x86: Add the Secure Memory Encryption CPU feature
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH v4 01/28] x86: Documentation for AMD Secure Memory Encryption (SME)
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH v4 03/28] x86: Add the Secure Memory Encryption CPU feature
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH V10 05/10] acpi: apei: handle SEA notification type for ARMv8
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V10 03/10] efi: parse ARM processor error
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V10 02/10] ras: acpi/apei: cper: generic error data entry v3 per ACPI 6.1
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH v4 03/28] x86: Add the Secure Memory Encryption CPU feature
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH v2] efi: libstub: treat missing SecureBoot variable as S/B disabled
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi: libstub: treat missing SecureBoot/SetupMode vars as SB disabled
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH v4 01/28] x86: Documentation for AMD Secure Memory Encryption (SME)
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH] efi: libstub: treat missing SecureBoot/SetupMode vars as SB disabled
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] efi: bgrt: add missing 'return 0' to acpi_parse_bgrt() non-ACPI stub
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [efi:next 24/24] include/linux/efi-bgrt.h:18:49: warning: no return statement in function returning non-void
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- [RFC PATCH v4 04/28] x86: Handle reduction in physical address size with SME
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v4 08/28] x86: Extend the early_memremap support with additional attrs
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v4 12/28] efi: Add an EFI table address match function
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v4 10/28] x86: Insure that boot memory areas are mapped properly
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v4 07/28] x86: Provide general kernel support for memory encryption
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v4 06/28] x86: Add support to enable SME during early boot processing
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v4 03/28] x86: Add the Secure Memory Encryption CPU feature
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v4 01/28] x86: Documentation for AMD Secure Memory Encryption (SME)
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v4 00/28] x86: Secure Memory Encryption (AMD)
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v4 13/28] efi: Update efi_mem_type() to return defined EFI mem types
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v4 26/28] x86: Allow kexec to be used with SME
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v4 27/28] x86: Add support to encrypt the kernel in-place
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v4 28/28] x86: Add support to make use of Secure Memory Encryption
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v4 25/28] x86: Access the setup data through sysfs decrypted
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v4 22/28] x86: Do not specify encrypted memory for video mappings
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v4 20/28] iommu/amd: Disable AMD IOMMU if memory encryption is active
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v4 18/28] x86: DMA support for memory encryption
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v4 16/28] x86: Add support for changing memory encryption attribute
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v4 15/28] Add support to access persistent memory in the clear
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v4 14/28] Add support to access boot related data in the clear
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v4 23/28] x86/kvm: Enable Secure Memory Encryption of nested page tables
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v4 24/28] x86: Access the setup data through debugfs decrypted
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v4 21/28] x86: Check for memory encryption on the APs
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v4 19/28] swiotlb: Add warnings for use of bounce buffers with SME
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v4 17/28] x86: Decrypt trampoline area if memory encryption is active
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v4 11/28] x86: Add support to determine the E820 type of an address
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v4 09/28] x86: Add support for early encryption/decryption of memory
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v4 05/28] x86: Add Secure Memory Encryption (SME) support
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v4 02/28] x86: Set the write-protect cache mode for full PAT support
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 0/2] RFC: Move efi bgrt code out of arch/x86
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: EFI stub kexec probelm
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH 0/2] efi: Enhance capsule loader to support signed Quark images
- From: Jan Kiszka <jan.kiszka@xxxxxxxxxxx>
- Re: [PATCH 0/2] RFC: Move efi bgrt code out of arch/x86
- From: Bhupesh Sharma <bhsharma@xxxxxxxxxx>
- RE: [PATCH 0/2] efi: Enhance capsule loader to support signed Quark images
- From: "Kweh, Hock Leong" <hock.leong.kweh@xxxxxxxxx>
- Re: [PATCH 0/2] RFC: Move efi bgrt code out of arch/x86
- From: "Rafael J. Wysocki" <rjw@xxxxxxxxxxxxx>
- Re: [PATCH V9 05/10] acpi: apei: handle SEA notification type for ARMv8
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH V10 07/10] efi: print unrecognized CPER section
- From: "Baicar, Tyler" <tbaicar@xxxxxxxxxxxxxx>
- Re: [PATCH V10 07/10] efi: print unrecognized CPER section
- From: Joe Perches <joe@xxxxxxxxxxx>
- [PATCH V10 03/10] efi: parse ARM processor error
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V10 01/10] acpi: apei: read ack upon ghes record consumption
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V10 08/10] ras: acpi / apei: generate trace event for unrecognized CPER section
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V10 04/10] arm64: exception: handle Synchronous External Abort
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V10 05/10] acpi: apei: handle SEA notification type for ARMv8
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V10 07/10] efi: print unrecognized CPER section
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V10 09/10] trace, ras: add ARM processor error trace event
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V10 10/10] arm/arm64: KVM: add guest SEA support
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V10 06/10] acpi: apei: panic OS with fatal error status block
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V10 02/10] ras: acpi/apei: cper: generic error data entry v3 per ACPI 6.1
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V10 00/10] Add UEFI 2.6 and ACPI 6.1 updates for RAS on ARM64
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- Re: [PATCH 0/2] efi: Enhance capsule loader to support signed Quark images
- From: Jan Kiszka <jan.kiszka@xxxxxxxxxxx>
- Re: [PATCH 0/2] efi: Enhance capsule loader to support signed Quark images
- From: Jan Kiszka <jan.kiszka@xxxxxxxxxxx>
- Re: [PATCH 0/2] efi: Enhance capsule loader to support signed Quark images
- From: Jan Kiszka <jan.kiszka@xxxxxxxxxxx>
- Re: [PATCH 0/2] efi: Enhance capsule loader to support signed Quark images
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH 0/2] efi: Enhance capsule loader to support signed Quark images
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- [PATCH 2/2] efi/capsule: Add support for Quark security header
- From: Jan Kiszka <jan.kiszka@xxxxxxxxxxx>
- [PATCH 1/2] efi/capsule: Prepare for loading images with security header
- From: Jan Kiszka <jan.kiszka@xxxxxxxxxxx>
- [PATCH 0/2] efi: Enhance capsule loader to support signed Quark images
- From: Jan Kiszka <jan.kiszka@xxxxxxxxxxx>
- Re: [PATCH 0/2] efi: Enhance capsule loader to support signed Quark images
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V9 09/10] trace, ras: add ARM processor error trace event
- From: "Baicar, Tyler" <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V9 00/10] Add UEFI 2.6 and ACPI 6.1 updates for RAS on ARM64
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V9 01/10] acpi: apei: read ack upon ghes record consumption
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- Re: [PATCH V9 09/10] trace, ras: add ARM processor error trace event
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- [PATCH V9 02/10] ras: acpi/apei: cper: generic error data entry v3 per ACPI 6.1
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V9 07/10] efi: print unrecognized CPER section
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V9 05/10] acpi: apei: handle SEA notification type for ARMv8
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V9 06/10] acpi: apei: panic OS with fatal error status block
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V9 03/10] efi: parse ARM processor error
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V9 09/10] trace, ras: add ARM processor error trace event
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V9 10/10] arm/arm64: KVM: add guest SEA support
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V9 08/10] ras: acpi / apei: generate trace event for unrecognized CPER section
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V9 04/10] arm64: exception: handle Synchronous External Abort
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- Re: [PATCH 0/2] RFC: Move efi bgrt code out of arch/x86
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 2/2] efi: arm-stub: Round up FDT allocation to mapping size
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V8 06/10] acpi: apei: panic OS with fatal error status block
- From: "Baicar, Tyler" <tbaicar@xxxxxxxxxxxxxx>
- Re: [PATCH V8 08/10] ras: acpi / apei: generate trace event for unrecognized CPER section
- From: "Baicar, Tyler" <tbaicar@xxxxxxxxxxxxxx>
- Re: [PATCH V8 08/10] ras: acpi / apei: generate trace event for unrecognized CPER section
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH V8 08/10] ras: acpi / apei: generate trace event for unrecognized CPER section
- From: "Baicar, Tyler" <tbaicar@xxxxxxxxxxxxxx>
- Re: [PATCH V8 08/10] ras: acpi / apei: generate trace event for unrecognized CPER section
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH v3 2/4] x86: Remap GDT tables in the Fixmap section
- From: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>
- Re: [PATCH V8 05/10] acpi: apei: handle SEA notification type for ARMv8
- From: "Baicar, Tyler" <tbaicar@xxxxxxxxxxxxxx>
- Re: [PATCH v3 1/4] x86/mm: Adapt MODULES_END based on Fixmap section size
- From: Borislav Petkov <bp@xxxxxxx>
- [PATCH 2/2] bgrt: Make ACPI BGRT parsing code common for ARCHs
- From: Bhupesh Sharma <bhsharma@xxxxxxxxxx>
- [PATCH 1/2] x86/efi-bgrt: Move efi-bgrt handling out of arch/x86
- From: Bhupesh Sharma <bhsharma@xxxxxxxxxx>
- [PATCH 0/2] RFC: Move efi bgrt code out of arch/x86
- From: Bhupesh Sharma <bhsharma@xxxxxxxxxx>
- Re: [PATCH V8 06/10] acpi: apei: panic OS with fatal error status block
- From: James Morse <james.morse@xxxxxxx>
- Re: [PATCH V8 05/10] acpi: apei: handle SEA notification type for ARMv8
- From: Zhengqiang <zhengqiang10@xxxxxxxxxx>
- [PATCH V2] x86/efi: Add missing 1:1 mappings to support buggy firmware
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH] x86/efi: Add missing 1:1 mappings to support buggy firmware
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH] x86/efi: Clean up efi CR3 save/restore
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86/efi: Add missing 1:1 mappings to support buggy firmware
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 3/4] x86: Make the GDT remapping read-only on 64-bit
- From: Thomas Garnier <thgarnie@xxxxxxxxxx>
- [PATCH v3 2/4] x86: Remap GDT tables in the Fixmap section
- From: Thomas Garnier <thgarnie@xxxxxxxxxx>
- [PATCH v3 4/4] KVM: VMX: Simplify segment_base
- From: Thomas Garnier <thgarnie@xxxxxxxxxx>
- [PATCH v3 1/4] x86/mm: Adapt MODULES_END based on Fixmap section size
- From: Thomas Garnier <thgarnie@xxxxxxxxxx>
- Re: [PATCH V8 06/10] acpi: apei: panic OS with fatal error status block
- From: "Baicar, Tyler" <tbaicar@xxxxxxxxxxxxxx>
- Re: [PATCH] efi/libstub/arm*: Set default address and size cells values for an empty dtb
- From: Timur Tabi <timur@xxxxxxxxxxxxxx>
- Re: [PATCH] efi/libstub/arm*: Set default address and size cells values for an empty dtb
- From: Timur Tabi <timur@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] efi: arm-stub: Round up FDT allocation to mapping size
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] efi: arm-stub: Correct FDT and initrd allocation rules for arm64
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- [PATCH] x86/efi: Clean up efi CR3 save/restore
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v2 1/2] efi: arm-stub: Correct FDT and initrd allocation rules for arm64
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 08/14] arm64: efi: split Image code and data into separate PE/COFF sections
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 05/14] arm64: efi: remove forbidden values from the PE/COFF header
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 04/14] arm64: efi: clean up Image header after PE header has been split off
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 2/2] efi: arm-stub: Round up FDT allocation to mapping size
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 03/14] arm64: efi: move EFI header and related data to a separate .S file
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v2 08/14] arm64: efi: split Image code and data into separate PE/COFF sections
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v2 07/14] arm64: efi: replace open coded constants with symbolic ones
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v2 04/14] arm64: efi: clean up Image header after PE header has been split off
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v2 05/14] arm64: efi: remove forbidden values from the PE/COFF header
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v2 1/2] efi: arm-stub: Correct FDT and initrd allocation rules for arm64
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v2 1/2] efi: arm-stub: Correct FDT and initrd allocation rules for arm64
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 1/2] efi: arm-stub: Correct FDT and initrd allocation rules for arm64
- From: "Ruigrok, Richard" <rruigrok@xxxxxxxxxxxxxx>
- Re: [PATCH] efi: arm-stub: Correct FDT and initrd allocation rules for arm64
- From: "Ruigrok, Richard" <rruigrok@xxxxxxxxxxxxxx>
- [PATCH v2 1/2] efi: arm-stub: Correct FDT and initrd allocation rules for arm64
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 2/2] efi: arm-stub: Round up FDT allocation to mapping size
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi: arm-stub: Correct FDT and initrd allocation rules for arm64
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi: arm-stub: Correct FDT and initrd allocation rules for arm64
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- Re: [PATCH] efi: arm-stub: Correct FDT and initrd allocation rules for arm64
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi: arm-stub: Correct FDT and initrd allocation rules for arm64
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi: arm-stub: Correct FDT and initrd allocation rules for arm64
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi: arm-stub: Correct FDT and initrd allocation rules for arm64
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- Re: [PATCH] efi: arm-stub: Correct FDT and initrd allocation rules for arm64
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi: arm-stub: Correct FDT and initrd allocation rules for arm64
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- Re: [PATCH] efi: arm-stub: Correct FDT and initrd allocation rules for arm64
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- Re: [PATCH] efi/esrt: cleanup bad memory map log messages
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V8 06/10] acpi: apei: panic OS with fatal error status block
- From: James Morse <james.morse@xxxxxxx>
- Re: [PATCH] efi: arm-stub: Correct FDT and initrd allocation rules for arm64
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] efi: arm-stub: Correct FDT and initrd allocation rules for arm64
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi/libstub/arm*: Set default address and size cells values for an empty dtb
- From: "AKASHI, Takahiro" <takahiro.akashi@xxxxxxxxxx>
- [PATCH] x86/efi: Add missing 1:1 mappings to support buggy firmware
- From: Sai Praneeth Prakhya <sai.praneeth.prakhya@xxxxxxxxx>
- Re: [PATCH v3 06/10] arm64: efi: add EFI stub
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- Re: [PATCH v3 06/10] arm64: efi: add EFI stub
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v3 06/10] arm64: efi: add EFI stub
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v3 06/10] arm64: efi: add EFI stub
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- Re: [PATCH v3 06/10] arm64: efi: add EFI stub
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v3 06/10] arm64: efi: add EFI stub
- From: Timur Tabi <timur@xxxxxxxxxxxxxx>
- Re: [PATCH v3 06/10] arm64: efi: add EFI stub
- From: Timur Tabi <timur@xxxxxxxxxxxxxx>
- Re: [PATCH v3 06/10] arm64: efi: add EFI stub
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi/esrt: cleanup bad memory map log messages
- From: Peter Jones <pjones@xxxxxxxxxx>
- Re: [PATCH] efi/esrt: cleanup bad memory map log messages
- From: Daniel Drake <drake@xxxxxxxxxxxx>
- Re: [PATCH] efi/esrt: cleanup bad memory map log messages
- From: Peter Jones <pjones@xxxxxxxxxx>
- [PATCH v2 10/14] arm: efi: remove forbidden values from the PE/COFF header
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 08/14] arm64: efi: split Image code and data into separate PE/COFF sections
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 12/14] arm: efi: replace open coded constants with symbolic ones
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 02/14] include: pe.h: add some missing definitions
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 05/14] arm64: efi: remove forbidden values from the PE/COFF header
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 01/14] include: pe.h: allow for use in assembly
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 07/14] arm64: efi: replace open coded constants with symbolic ones
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 03/14] arm64: efi: move EFI header and related data to a separate .S file
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 11/14] arm: efi: remove pointless dummy .reloc section
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 06/14] arm64: efi: remove pointless dummy .reloc section
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 00/14] arm64+ARM: efi: PE/COFF cleanup/hardening
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 14/14] arm: efi: add PE/COFF debug table to EFI header
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 13/14] arm: efi: split zImage code and data into separate PE/COFF sections
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 04/14] arm64: efi: clean up Image header after PE header has been split off
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 09/14] arm: compressed: put zImage header and EFI header in dedicated section
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi/libstub/arm*: Set default address and size cells values for an empty dtb
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH] efi/libstub/arm*: Set default address and size cells values for an empty dtb
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi/esrt: cleanup bad memory map log messages
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi/libstub/arm*: Set default address and size cells values for an empty dtb
- From: "AKASHI, Takahiro" <takahiro.akashi@xxxxxxxxxx>
- [PATCH v2] efi/libstub/arm*: Set default address and size cells values for an empty dtb
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- Re: [PATCH] efi/libstub/arm*: Set default address and size cells values for an empty dtb
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH] efi/libstub/arm*: Set default address and size cells values for an empty dtb
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH] efi/libstub/arm*: Set default address and size cells values for an empty dtb
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- Re: [PATCH] efi/libstub/arm*: Set default address and size cells values for an empty dtb
- From: Timur Tabi <timur@xxxxxxxxxxxxxx>
- Re: [PATCH] efi/libstub/arm*: Set default address and size cells values for an empty dtb
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- Re: [PATCH] efi/libstub/arm*: Set default address and size cells values for an empty dtb
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- [PATCH] efi/esrt: cleanup bad memory map log messages
- From: Daniel Drake <drake@xxxxxxxxxxxx>
- Re: [PATCH] efi/libstub/arm*: Set default address and size cells values for an empty dtb
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH] efi/libstub/arm*: Set default address and size cells values for an empty dtb
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi/libstub/arm*: Set default address and size cells values for an empty dtb
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH] efi/libstub/arm*: Set default address and size cells values for an empty dtb
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- Re: [PATCH] efi/libstub/arm*: Set default address and size cells values for an empty dtb
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH] efi/libstub/arm*: Set default address and size cells values for an empty dtb
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH] efi/libstub/arm*: Set default address and size cells values for an empty dtb
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] efi/libstub/arm*: Set default address and size cells values for an empty dtb
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- [PATCH 4.9 03/66] x86/efi: Always map the first physical page into the EFI pagetables
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.9 04/66] efi/fdt: Avoid FDT manipulation after ExitBootServices()
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/7] efi: Add SHIM and image security database GUID definitions
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH 3/7] efi: Add SHIM and image security database GUID definitions
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 3/7] efi: Add SHIM and image security database GUID definitions
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 3/7] efi: Add SHIM and image security database GUID definitions
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- [PATCH 2/7] arm/efi: Allow invocation of arbitrary runtime services
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 1/7] x86/efi: Allow invocation of arbitrary runtime services
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 7/7] efi: libstub: Make file I/O chunking x86-specific
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 6/7] efi: Print the secure boot status in x86 setup_arch()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 5/7] efi: Disable secure boot if shim is in insecure mode
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 4/7] efi: Get the secure boot status
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 3/7] efi: Add SHIM and image security database GUID definitions
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [GIT PULL 0/7] EFI updates for v4.11 part 2
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V8 05/10] acpi: apei: handle SEA notification type for ARMv8
- From: "Baicar, Tyler" <tbaicar@xxxxxxxxxxxxxx>
- Re: [PATCH V8 04/10] arm64: exception: handle Synchronous External Abort
- From: "Baicar, Tyler" <tbaicar@xxxxxxxxxxxxxx>
- Re: [PATCH V8 09/10] trace, ras: add ARM processor error trace event
- From: "Baicar, Tyler" <tbaicar@xxxxxxxxxxxxxx>
- Re: [PATCH 7/7] efi: Print the secure boot status in x86 setup_arch() [ver #7]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 7/7] efi: Print the secure boot status in x86 setup_arch() [ver #7]
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [REGRESSION][v4.9.y][v4.10.y] x86/efi: Only map RAM into EFI page tables if in mixed-mode
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 7/7] efi: Print the secure boot status in x86 setup_arch() [ver #7]
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 7/7] efi: Print the secure boot status in x86 setup_arch() [ver #7]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 7/7] efi: Print the secure boot status in x86 setup_arch() [ver #7]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 7/7] efi: Print the secure boot status in x86 setup_arch() [ver #7]
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 7/7] efi: Print the secure boot status in x86 setup_arch() [ver #7]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 7/7] efi: Print the secure boot status in x86 setup_arch() [ver #7]
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V8 05/10] acpi: apei: handle SEA notification type for ARMv8
- From: James Morse <james.morse@xxxxxxx>
- Re: [PATCH V8 04/10] arm64: exception: handle Synchronous External Abort
- From: James Morse <james.morse@xxxxxxx>
- Re: [PATCH v4] efi: arm64: Add vmlinux debug link to the Image binary
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v4] efi: arm64: Add vmlinux debug link to the Image binary
- From: Will Deacon <will.deacon@xxxxxxx>
- Re: [PATCH v4] efi: arm64: Add vmlinux debug link to the Image binary
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [REGRESSION][v4.9.y][v4.10.y] x86/efi: Only map RAM into EFI page tables if in mixed-mode
- From: Joseph Salisbury <joseph.salisbury@xxxxxxxxxxxxx>
- Re: [PATCH V2 0/4] efi/x86: move efi bgrt init code to early init
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH 4/7] efi: Get the secure boot status [ver #7]
- From: Ye Xiaolong <xiaolong.ye@xxxxxxxxx>
- Re: [PATCH 6/7] efi: Handle secure boot from UEFI-2.6 [ver #7]
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi: libstub: Make file I/O chunking x86-specific
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 6/7] efi: Handle secure boot from UEFI-2.6 [ver #7]
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/7] efi: Get the secure boot status [ver #7]
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [GIT PULL] EFI fixes
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [REGRESSION][v4.9.y][v4.10.y] x86/efi: Only map RAM into EFI page tables if in mixed-mode
- From: Joseph Salisbury <joseph.salisbury@xxxxxxxxxxxxx>
- Re: [REGRESSION][v4.9.y][v4.10.y] x86/efi: Only map RAM into EFI page tables if in mixed-mode
- From: Laura Abbott <labbott@xxxxxxxxxx>
- Re: [REGRESSION][v4.9.y][v4.10.y] x86/efi: Only map RAM into EFI page tables if in mixed-mode
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [REGRESSION][v4.9.y][v4.10.y] x86/efi: Only map RAM into EFI page tables if in mixed-mode
- From: Joseph Salisbury <joseph.salisbury@xxxxxxxxxxxxx>
- Re: [PATCH v4] efi: arm64: Add vmlinux debug link to the Image binary
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v4] efi: arm64: Add vmlinux debug link to the Image binary
- From: Will Deacon <will.deacon@xxxxxxx>
- [PATCH v4] efi: arm64: Add vmlinux debug link to the Image binary
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi: fdt: avoid FDT manipulation after ExitBootServices()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V8 09/10] trace, ras: add ARM processor error trace event
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH V8 09/10] trace, ras: add ARM processor error trace event
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH V8 08/10] ras: acpi / apei: generate trace event for unrecognized CPER section
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH] efi: fdt: avoid FDT manipulation after ExitBootServices()
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- Re: [PATCH V8 05/10] acpi: apei: handle SEA notification type for ARMv8
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 4/7] efi: Get the secure boot status [ver #7]
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] efi: fdt: avoid FDT manipulation after ExitBootServices()
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- Re: [PATCH] efi: fdt: avoid FDT manipulation after ExitBootServices()
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH] efi: fdt: avoid FDT manipulation after ExitBootServices()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi: fdt: avoid FDT manipulation after ExitBootServices()
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH] efi: fdt: avoid FDT manipulation after ExitBootServices()
- From: Leif Lindholm <leif.lindholm@xxxxxxxxxx>
- [PATCH] efi: fdt: avoid FDT manipulation after ExitBootServices()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [GIT PULL] EFI urgent fix for v4.10
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [REGRESSION] EFI mixed mode patch triggers boot failure
- From: Laura Abbott <labbott@xxxxxxxxxx>
- [PATCH V8 01/10] acpi: apei: read ack upon ghes record consumption
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V8 02/10] ras: acpi/apei: cper: generic error data entry v3 per ACPI 6.1
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V8 07/10] efi: print unrecognized CPER section
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V8 09/10] trace, ras: add ARM processor error trace event
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V8 10/10] arm/arm64: KVM: add guest SEA support
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V8 08/10] ras: acpi / apei: generate trace event for unrecognized CPER section
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V8 05/10] acpi: apei: handle SEA notification type for ARMv8
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V8 06/10] acpi: apei: panic OS with fatal error status block
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V8 04/10] arm64: exception: handle Synchronous External Abort
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V8 03/10] efi: parse ARM processor error
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V8 00/10] Add UEFI 2.6 and ACPI 6.1 updates for RAS on ARM64
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- Re: [PATCH 6/7] efi: Handle secure boot from UEFI-2.6 [ver #7]
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 6/7] efi: Handle secure boot from UEFI-2.6 [ver #7]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] efi: fdt: avoid FDT manipulation after ExitBootServices()
- From: Riku Voipio <riku.voipio@xxxxxxxxxx>
- Re: [PATCH 6/7] efi: Handle secure boot from UEFI-2.6 [ver #7]
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi: fdt: avoid FDT manipulation after ExitBootServices()
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH] efi: fdt: avoid FDT manipulation after ExitBootServices()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi: fdt: avoid FDT manipulation after ExitBootServices()
- From: Leif Lindholm <leif.lindholm@xxxxxxxxxx>
- [PATCH] efi: fdt: avoid FDT manipulation after ExitBootServices()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 6/7] efi: Handle secure boot from UEFI-2.6 [ver #7]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH] efi: arm: remove pointless dummy .reloc section
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 6/7] efi: Handle secure boot from UEFI-2.6 [ver #7]
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 6/7] efi: Handle secure boot from UEFI-2.6 [ver #7]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 4/7] efi: Get the secure boot status [ver #7]
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 6/7] efi: Handle secure boot from UEFI-2.6 [ver #7]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 4/7] efi: Get the secure boot status [ver #7]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] efi: libstub: Make file I/O chunking x86-specific
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 4/7] efi: Get the secure boot status [ver #7]
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 0/7] efi: Pass secure boot mode to kernel [ver #7]
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 6/7] efi: Handle secure boot from UEFI-2.6 [ver #7]
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 4/7] efi: Get the secure boot status [ver #7]
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 4/7] efi: Get the secure boot status [ver #7]
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 0/7] efi: Pass secure boot mode to kernel [ver #7]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 0/7] efi: Pass secure boot mode to kernel [ver #7]
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] efi: libstub: Make file I/O chunking x86-specific
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 7/7] efi: Print the secure boot status in x86 setup_arch() [ver #7]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 6/7] efi: Handle secure boot from UEFI-2.6 [ver #7]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 5/7] efi: Disable secure boot if shim is in insecure mode [ver #7]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 4/7] efi: Get the secure boot status [ver #7]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 2/7] arm/efi: Allow invocation of arbitrary runtime services [ver #7]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 3/7] efi: Add SHIM and image security database GUID definitions [ver #7]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 0/7] efi: Pass secure boot mode to kernel [ver #7]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 1/7] x86/efi: Allow invocation of arbitrary runtime services [ver #7]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 5/8] efi: Get the secure boot status [ver #6]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 02/10] x86/efi: Deduplicate efi_char16_printk()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 04/10] efi: Introduce EFI_MEM_ATTR bit and set it from memory attributes table
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 03/10] efi: Make EFI_MEMORY_ATTRIBUTES_TABLE initialization common across all architectures
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [GIT PULL 00/10] EFI updates for v4.11
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 01/10] efi: Deduplicate efi_file_size() / _read() / _close()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 05/10] x86/efi: Add support for EFI_MEMORY_ATTRIBUTES_TABLE
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 08/10] efi/x86: Move EFI BGRT init code to early init code
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 09/10] efi/x86: Add debug code to print cooked memmap
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 10/10] efi: libstub: Preserve .debug sections after absolute relocation check
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 06/10] efi/esrt: Fix spelling mistake "doen't"
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 07/10] efi: Use typed function pointers for runtime services table
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: What should the default lockdown mode be if the bootloader sentinel triggers sanitization?
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: What should the default lockdown mode be if the bootloader sentinel triggers sanitization?
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: What should the default lockdown mode be if the bootloader sentinel triggers sanitization?
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [REGRESSION] EFI mixed mode patch triggers boot failure
- From: Jiri Kosina <jikos@xxxxxxxxxx>
- What should the default lockdown mode be if the bootloader sentinel triggers sanitization?
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [REGRESSION] EFI mixed mode patch triggers boot failure
- From: Laura Abbott <labbott@xxxxxxxxxx>
- Re: [REGRESSION] EFI mixed mode patch triggers boot failure
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH] x86/efi: Always map first physical page into EFI pagetables
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] efi/x86: make efi_memmap_reserve only insert into boot mem areas
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 1/4] efi/x86: make efi_memmap_reserve only insert into boot mem areas
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [GIT PULL] EFI urgent fix
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/8] efi: Pass secure boot mode to kernel [ver #6]
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 1/4] efi/x86: make efi_memmap_reserve only insert into boot mem areas
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V2 0/4] efi/x86: move efi bgrt init code to early init
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2] x86/efi: always map first physical page into EFI pagetables
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2] x86/efi: always map first physical page into EFI pagetables
- From: Jiri Kosina <jikos@xxxxxxxxxx>
- Re: [PATCH] x86/efi: always map first physical page into EFI pagetables
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] efi/x86: make efi_memmap_reserve only insert into boot mem areas
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 5/8] efi: Get the secure boot status [ver #6]
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 0/2] efi/arm64: add vmlinux link to PE/COFF debug table
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 1/2] efi: libstub: Preserve .debug sections after absolute relocation check
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 2/2] efi: arm64: Add vmlinux debug link to the Image binary
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 2/2] arm64: efi: add vmlinux debug link to the Image binary
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v2 2/2] arm64: efi: add vmlinux debug link to the Image binary
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v2 2/2] arm64: efi: add vmlinux debug link to the Image binary
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 2/3] x86: Remap GDT tables in the Fixmap section
- From: Thomas Garnier <thgarnie@xxxxxxxxxx>
- [PATCH v2 3/3] x86: Make the GDT remapping read-only on 64 bit
- From: Thomas Garnier <thgarnie@xxxxxxxxxx>
- [PATCH v2 1/3] x86/mm: Adapt MODULES_END based on Fixmap section size
- From: Thomas Garnier <thgarnie@xxxxxxxxxx>
- Re: [PATCH V3 1/4] efi/x86: move efi bgrt init code to early init code
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH] x86/efi: always map first physical page into EFI pagetables
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [PATCH] x86/efi: always map first physical page into EFI pagetables
- From: Jiri Kosina <jkosina@xxxxxxx>
- Re: [PATCH v2 2/2] arm64: efi: add vmlinux debug link to the Image binary
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 2/2] arm64: efi: add vmlinux debug link to the Image binary
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v2 2/2] arm64: efi: add vmlinux debug link to the Image binary
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 2/2] arm64: efi: add vmlinux debug link to the Image binary
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 1/2] efi: libstub: Preserve .debug sections after absolute relocation check
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 0/2] efi/arm64: add vmlinux link to PE/COFF debug table
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V7 05/10] acpi: apei: handle SEA notification type for ARMv8
- From: "Baicar, Tyler" <tbaicar@xxxxxxxxxxxxxx>
- Re: [PATCH V7 04/10] arm64: exception: handle Synchronous External Abort
- From: "Baicar, Tyler" <tbaicar@xxxxxxxxxxxxxx>
- Re: [PATCH V7 05/10] acpi: apei: handle SEA notification type for ARMv8
- From: James Morse <james.morse@xxxxxxx>
- Re: [PATCH 0/8] efi: Pass secure boot mode to kernel [ver #6]
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 5/8] efi: Get the secure boot status [ver #6]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 5/8] efi: Get the secure boot status [ver #6]
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 5/8] efi: Get the secure boot status [ver #6]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH V7 04/10] arm64: exception: handle Synchronous External Abort
- From: James Morse <james.morse@xxxxxxx>
- Re: [PATCH V7 05/10] acpi: apei: handle SEA notification type for ARMv8
- From: "Baicar, Tyler" <tbaicar@xxxxxxxxxxxxxx>
- Re: [PATCH V7 04/10] arm64: exception: handle Synchronous External Abort
- From: "Baicar, Tyler" <tbaicar@xxxxxxxxxxxxxx>
- Re: [PATCH V7 04/10] arm64: exception: handle Synchronous External Abort
- From: James Morse <james.morse@xxxxxxx>
- Re: [PATCH V7 05/10] acpi: apei: handle SEA notification type for ARMv8
- From: James Morse <james.morse@xxxxxxx>
- Re: [PATCH V3 1/4] efi/x86: move efi bgrt init code to early init code
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V7 05/10] acpi: apei: handle SEA notification type for ARMv8
- From: "Baicar, Tyler" <tbaicar@xxxxxxxxxxxxxx>
- Re: [PATCH V7 04/10] arm64: exception: handle Synchronous External Abort
- From: "Baicar, Tyler" <tbaicar@xxxxxxxxxxxxxx>
- Re: [PATCH V7 04/10] arm64: exception: handle Synchronous External Abort
- From: "Baicar, Tyler" <tbaicar@xxxxxxxxxxxxxx>
- Re: [PATCH V7 04/10] arm64: exception: handle Synchronous External Abort
- From: "Baicar, Tyler" <tbaicar@xxxxxxxxxxxxxx>
- Re: [PATCH V3 1/4] efi/x86: move efi bgrt init code to early init code
- From: Bhupesh Sharma <bhsharma@xxxxxxxxxx>
- Re: [PATCH V7 05/10] acpi: apei: handle SEA notification type for ARMv8
- From: James Morse <james.morse@xxxxxxx>
- Re: [PATCH V3 1/4] efi/x86: move efi bgrt init code to early init code
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH V3 1/4] efi/x86: move efi bgrt init code to early init code
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH V2 4/4] efi/x86: make efi_memmap_reserve only insert into boot mem areas
- From: Dave Young <dyoung@xxxxxxxxxx>
- [PATCH 4.9 032/120] efi/libstub/arm*: Pass latest memory map to the kernel
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V2 4/4] efi/x86: make efi_memmap_reserve only insert into boot mem areas
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH V2 4/4] efi/x86: make efi_memmap_reserve only insert into boot mem areas
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH V2 4/4] efi/x86: make efi_memmap_reserve only insert into boot mem areas
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH V2 1/4] efi/x86: move efi bgrt init code to early init code
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH V2 4/4] efi/x86: make efi_memmap_reserve only insert into boot mem areas
- From: Nicolai Stange <nicstange@xxxxxxxxx>
- Re: [PATCH V2 1/4] efi/x86: move efi bgrt init code to early init code
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V2 2/4] efi/x86: move efi_print_memmap to drivers/firmware/efi/memmap.c
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V2 4/4] efi/x86: make efi_memmap_reserve only insert into boot mem areas
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 2/4] efi/x86: move efi bgrt init code to early init code
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] partitions/efi: Fix integer overflow in GPT size calculation
- From: Jens Axboe <axboe@xxxxxxxxx>
- Re: [PATCH] partitions/efi: Fix integer overflow in GPT size calculation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V2 4/4] efi/x86: make efi_memmap_reserve only insert into boot mem areas
- From: Nicolai Stange <nicstange@xxxxxxxxx>
- Re: [PATCH V2 3/4] efi/x86: add debug code to print cooked memmap
- From: Nicolai Stange <nicstange@xxxxxxxxx>
- Re: [PATCH V2 1/4] efi/x86: move efi bgrt init code to early init code
- From: Nicolai Stange <nicstange@xxxxxxxxx>
- Re: [PATCH V2 2/4] efi/x86: move efi_print_memmap to drivers/firmware/efi/memmap.c
- From: Nicolai Stange <nicstange@xxxxxxxxx>
- Re: [PATCH V7 04/10] arm64: exception: handle Synchronous External Abort
- From: James Morse <james.morse@xxxxxxx>
- Re: [PATCH V7 04/10] arm64: exception: handle Synchronous External Abort
- From: Will Deacon <will.deacon@xxxxxxx>
- Re: [PATCH V7 04/10] arm64: exception: handle Synchronous External Abort
- From: James Morse <james.morse@xxxxxxx>
- Re: [PATCH V7 10/10] arm/arm64: KVM: add guest SEA support
- From: "Baicar, Tyler" <tbaicar@xxxxxxxxxxxxxx>
- Re: [PATCH V7 04/10] arm64: exception: handle Synchronous External Abort
- From: "Baicar, Tyler" <tbaicar@xxxxxxxxxxxxxx>
- Re: [PATCH 8/8] efi: Add EFI_SECURE_BOOT bit [ver #6]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 5/8] efi: Get the secure boot status [ver #6]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 2/4] efi/x86: move efi bgrt init code to early init code
- From: Bhupesh Sharma <bhsharma@xxxxxxxxxx>
- Re: [PATCH 5/8] efi: Get the secure boot status [ver #6]
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 8/8] efi: Add EFI_SECURE_BOOT bit [ver #6]
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V7 10/10] arm/arm64: KVM: add guest SEA support
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH V7 04/10] arm64: exception: handle Synchronous External Abort
- From: Will Deacon <will.deacon@xxxxxxx>
- Re: [PATCH 2/4] efi/x86: move efi bgrt init code to early init code
- From: Dave Young <dyoung@xxxxxxxxxx>
- [PATCH V2 1/4] efi/x86: move efi bgrt init code to early init code
- From: Dave Young <dyoung@xxxxxxxxxx>
- [PATCH V2 4/4] efi/x86: make efi_memmap_reserve only insert into boot mem areas
- From: Dave Young <dyoung@xxxxxxxxxx>
- [PATCH V2 2/4] efi/x86: move efi_print_memmap to drivers/firmware/efi/memmap.c
- From: Dave Young <dyoung@xxxxxxxxxx>
- [PATCH V2 3/4] efi/x86: add debug code to print cooked memmap
- From: Dave Young <dyoung@xxxxxxxxxx>
- [PATCH V2 0/4] efi/x86: move efi bgrt init code to early init
- From: Dave Young <dyoung@xxxxxxxxxx>
- [PATCH] partitions/efi: Fix integer overflow in GPT size calculation
- From: Alden Tondettar <alden.tondettar@xxxxxxxxx>
- [GIT PULL] EFI fixes
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH 2/4] efi/x86: move efi bgrt init code to early init code
- From: Nicolai Stange <nicstange@xxxxxxxxx>
- Re: [PATCH 1/4] efi/x86: make efi_memmap_reserve only insert into boot mem areas
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH 2/4] efi/x86: move efi bgrt init code to early init code
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH 2/4] efi/x86: move efi bgrt init code to early init code
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH 2/4] efi/x86: move efi bgrt init code to early init code
- From: Nicolai Stange <nicstange@xxxxxxxxx>
- Re: [PATCH 3/4] efi/x86: move efi_print_memmap to drivers/firmware/efi/memmap.c
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH 2/4] efi/x86: move efi bgrt init code to early init code
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH 2/4] efi/x86: move efi bgrt init code to early init code
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH 1/4] efi/x86: make efi_memmap_reserve only insert into boot mem areas
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH 1/4] efi/x86: make efi_memmap_reserve only insert into boot mem areas
- From: Dave Young <dyoung@xxxxxxxxxx>
- [PATCH V7 07/10] efi: print unrecognized CPER section
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V7 08/10] ras: acpi / apei: generate trace event for unrecognized CPER section
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V7 09/10] trace, ras: add ARM processor error trace event
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V7 06/10] acpi: apei: panic OS with fatal error status block
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V7 10/10] arm/arm64: KVM: add guest SEA support
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V7 05/10] acpi: apei: handle SEA notification type for ARMv8
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V7 03/10] efi: parse ARM processor error
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V7 04/10] arm64: exception: handle Synchronous External Abort
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V7 02/10] ras: acpi/apei: cper: generic error data entry v3 per ACPI 6.1
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V7 01/10] acpi: apei: read ack upon ghes record consumption
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V7 00/10] Add UEFI 2.6 and ACPI 6.1 updates for RAS on ARM64
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- Re: [PATCH 2/4] efi/x86: move efi bgrt init code to early init code
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[Index of Archives]
[Linux Kernel Development]
[Security]
[Linux ARM Kernel]
[Tools]
[Linux MIPS]
[Linux S390]
[Bugtraq]
[Share Photos]>
[Fedora ARM]