Linux EFI/UEFI Development
[Prev Page][Next Page]
- Re: [PATCH V3 05/10] acpi: apei: handle SEA notification type for ARMv8
- From: Hanjun Guo <hanjun.guo@xxxxxxxxxx>
- Re: [PATCH V3 05/10] acpi: apei: handle SEA notification type for ARMv8
- From: Hanjun Guo <hanjun.guo@xxxxxxxxxx>
- Re: [PATCH] arm64: mm: Fix memmap to be initialized for the entire section
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH] partitions/efi: Ignore errors when alternate GPT is not at the end of disk
- From: Hannes Reinecke <hare@xxxxxxxx>
- Re: [PATCH] partitions/efi: Ignore errors when alternate GPT is not at the end of disk
- From: Karel Zak <kzak@xxxxxxxxxx>
- Re: [RFC PATCH v1 21/28] KVM: introduce KVM_SEV_ISSUE_CMD ioctl
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH v1 21/28] KVM: introduce KVM_SEV_ISSUE_CMD ioctl
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH] arm64: mm: Fix memmap to be initialized for the entire section
- From: Robert Richter <rric@xxxxxxxxxx>
- Re: [RFC PATCH v1 00/28] x86: Secure Encrypted Virtualization (AMD)
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v2 3/3] thunderbolt: Use Device ROM retrieved from EFI
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH v2 2/3] x86/efi: Retrieve and assign Apple device properties
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH v2 1/3] efi: Add device path parser
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH v2 0/3] Apple device properties
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH] partitions/efi: Ignore errors when alternate GPT is not at the end of disk
- From: Hannes Reinecke <hare@xxxxxxx>
- Re: [PATCH V3 10/10] arm64: KVM: add guest SEA support
- From: "Baicar, Tyler" <tbaicar@xxxxxxxxxxxxxx>
- Re: [PATCH V3 02/10] ras: acpi/apei: cper: generic error data entry v3 per ACPI 6.1
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH V3 02/10] ras: acpi/apei: cper: generic error data entry v3 per ACPI 6.1
- From: Suzuki K Poulose <Suzuki.Poulose@xxxxxxx>
- Re: [PATCH V3 05/10] acpi: apei: handle SEA notification type for ARMv8
- From: Punit Agrawal <punit.agrawal@xxxxxxx>
- Re: [PATCH V3 10/10] arm64: KVM: add guest SEA support
- From: Punit Agrawal <punit.agrawal@xxxxxxx>
- Re: [PATCH V3 06/10] acpi: apei: panic OS with fatal error status block
- From: "Baicar, Tyler" <tbaicar@xxxxxxxxxxxxxx>
- Re: [PATCH V3 08/10] ras: acpi / apei: generate trace event for unrecognized CPER section
- From: "Baicar, Tyler" <tbaicar@xxxxxxxxxxxxxx>
- Re: [PATCH V3 10/10] arm64: KVM: add guest SEA support
- From: "Baicar, Tyler" <tbaicar@xxxxxxxxxxxxxx>
- Re: [PATCH V3 02/10] ras: acpi/apei: cper: generic error data entry v3 per ACPI 6.1
- From: "Baicar, Tyler" <tbaicar@xxxxxxxxxxxxxx>
- Re: [PATCH V3 05/10] acpi: apei: handle SEA notification type for ARMv8
- From: "Baicar, Tyler" <tbaicar@xxxxxxxxxxxxxx>
- Re: [PATCH V3 01/10] acpi: apei: read ack upon ghes record consumption
- From: "Baicar, Tyler" <tbaicar@xxxxxxxxxxxxxx>
- Re: [PATCH V3 04/10] arm64: exception: handle Synchronous External Abort
- From: "Baicar, Tyler" <tbaicar@xxxxxxxxxxxxxx>
- Re: [PATCH V3 10/10] arm64: KVM: add guest SEA support
- From: Punit Agrawal <punit.agrawal@xxxxxxx>
- Re: [PATCH V3 06/10] acpi: apei: panic OS with fatal error status block
- From: Suzuki K Poulose <Suzuki.Poulose@xxxxxxx>
- Re: [RFC PATCH v1 20/28] KVM: SVM: prepare for SEV guest management API support
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH v1 00/28] x86: Secure Encrypted Virtualization (AMD)
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH v1 24/28] KVM: SVM: add SEV_LAUNCH_FINISH command
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH v1 22/28] KVM: SVM: add SEV launch start command
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [patch] efi: fix an error code
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH v1 21/28] KVM: introduce KVM_SEV_ISSUE_CMD ioctl
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH V3 08/10] ras: acpi / apei: generate trace event for unrecognized CPER section
- From: Punit Agrawal <punit.agrawal@xxxxxxx>
- Re: [RFC PATCH v1 19/28] KVM: SVM: prepare to reserve asid for SEV guest
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [patch] efi: fix an error code
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH V3 02/10] ras: acpi/apei: cper: generic error data entry v3 per ACPI 6.1
- From: Suzuki K Poulose <Suzuki.Poulose@xxxxxxx>
- Re: [PATCH V3 02/10] ras: acpi/apei: cper: generic error data entry v3 per ACPI 6.1
- From: "Baicar, Tyler" <tbaicar@xxxxxxxxxxxxxx>
- Re: [PATCH V3 02/10] ras: acpi/apei: cper: generic error data entry v3 per ACPI 6.1
- From: "Baicar, Tyler" <tbaicar@xxxxxxxxxxxxxx>
- Re: [PATCH V3 09/10] trace, ras: add ARM processor error trace event
- From: "Baicar, Tyler" <tbaicar@xxxxxxxxxxxxxx>
- Re: [PATCH V3 05/10] acpi: apei: handle SEA notification type for ARMv8
- From: Punit Agrawal <punit.agrawal@xxxxxxx>
- Re: [PATCH V3 04/10] arm64: exception: handle Synchronous External Abort
- From: Punit Agrawal <punit.agrawal@xxxxxxx>
- Re: [PATCH V3 01/10] acpi: apei: read ack upon ghes record consumption
- From: Punit Agrawal <punit.agrawal@xxxxxxx>
- Re: [PATCH] efi: Use LocateHandleBuffer instead of LocateHandle
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V3 02/10] ras: acpi/apei: cper: generic error data entry v3 per ACPI 6.1
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH V3 02/10] ras: acpi/apei: cper: generic error data entry v3 per ACPI 6.1
- From: Suzuki K Poulose <Suzuki.Poulose@xxxxxxx>
- Re: [PATCH] arm64: mm: Fix memmap to be initialized for the entire section
- From: David Daney <ddaney.cavm@xxxxxxxxx>
- Re: [PATCH] efi/arm: fix absolute relocation detection for older toolchains
- From: Jon Hunter <jonathanh@xxxxxxxxxx>
- Re: [PATCH V3 09/10] trace, ras: add ARM processor error trace event
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- [PATCH V3 04/10] arm64: exception: handle Synchronous External Abort
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V3 08/10] ras: acpi / apei: generate trace event for unrecognized CPER section
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V3 09/10] trace, ras: add ARM processor error trace event
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V3 10/10] arm64: KVM: add guest SEA support
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V3 07/10] efi: print unrecognized CPER section
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V3 06/10] acpi: apei: panic OS with fatal error status block
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V3 05/10] acpi: apei: handle SEA notification type for ARMv8
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V3 03/10] efi: parse ARMv8 processor error
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V3 02/10] ras: acpi/apei: cper: generic error data entry v3 per ACPI 6.1
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V3 01/10] acpi: apei: read ack upon ghes record consumption
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- [PATCH V3 00/10] Add UEFI 2.6 and ACPI 6.1 updates for RAS on ARM64
- From: Tyler Baicar <tbaicar@xxxxxxxxxxxxxx>
- Re: [PATCH] arm64: mm: Fix memmap to be initialized for the entire section
- From: Robert Richter <robert.richter@xxxxxxxxxx>
- Re: arm64: kernel BUG at mm/page_alloc.c:1844!
- From: Robert Richter <robert.richter@xxxxxxxxxx>
- [PATCH 2/2] efi/arm*: libstub: invoke EFI_RNG_PROTOCOL to seed the UEFI RNG table
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 1/2] efi: add support for seeding the RNG from a UEFI config table
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 0/2] efi: add support for seeding the kernel RNG from UEFI
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] arm64: mm: Fix memmap to be initialized for the entire section
- From: Robert Richter <rrichter@xxxxxxxxxx>
- Re: [PATCH] arm64: mm: Fix memmap to be initialized for the entire section
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi: Use LocateHandleBuffer instead of LocateHandle
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH] efifb: show framebuffer layout as device attributes
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi/arm: fix absolute relocation detection for older toolchains
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi: Use LocateHandleBuffer instead of LocateHandle
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- arm64: kernel BUG at mm/page_alloc.c:1844!
- From: Robert Richter <robert.richter@xxxxxxxxxx>
- Re: [PATCH 1/3 V2] efi/efi_test: use memdup_user() as a cleanup
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/3 V2] efi/efi_test: use memdup_user() as a cleanup
- From: Ivan Hu <ivan.hu@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] efi/efi_test: use memdup_user() as a cleanup
- From: ivanhu <ivan.hu@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] efi/efi_test: use memdup_user() as a cleanup
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] efi: Use LocateHandleBuffer instead of LocateHandle
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] efi/arm: fix absolute relocation detection for older toolchains
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] efifb: show framebuffer layout as device attributes
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] efi: Use LocateHandleBuffer instead of LocateHandle
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH] efifb: show framebuffer layout as device attributes
- From: Peter Jones <pjones@xxxxxxxxxx>
- Re: [PATCH] efifb: show framebuffer layout as device attributes
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi: Use LocateHandleBuffer instead of LocateHandle
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi/arm: fix absolute relocation detection for older toolchains
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi/arm: fix absolute relocation detection for older toolchains
- From: Jon Hunter <jonathanh@xxxxxxxxxx>
- Re: [PATCH 1/3] efi/efi_test: use memdup_user() as a cleanup
- From: ivanhu <ivan.hu@xxxxxxxxxxxxx>
- Re: [PATCH] efi/arm: fix absolute relocation detection for older toolchains
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] efi/efi_test: fix the uninitialized value rv
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] efi/efi_test: fix the uninitialized value datasize
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] efi/efi_test: use memdup_user() as a cleanup
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next v2] arm*/efi: efi_init error handling fix
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] efi: Remove unused including <linux/version.h>
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] efi: Use LocateHandleBuffer instead of LocateHandle
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH] efifb: show framebuffer layout as device attributes
- From: Peter Jones <pjones@xxxxxxxxxx>
- [PATCH] efi/arm: fix absolute relocation detection for older toolchains
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH 0/3] efi: MMC proxy support for the UEFI varstore
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH 0/3] efi: MMC proxy support for the UEFI varstore
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [RFC PATCH 0/3] efi: MMC proxy support for the UEFI varstore
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [PATCH 3/3] efi/efi_test: fix the uninitialized value rv
- From: Ivan Hu <ivan.hu@xxxxxxxxxxxxx>
- [PATCH 2/3] efi/efi_test: fix the uninitialized value datasize
- From: Ivan Hu <ivan.hu@xxxxxxxxxxxxx>
- [PATCH 1/3] efi/efi_test: use memdup_user() as a cleanup
- From: Ivan Hu <ivan.hu@xxxxxxxxxxxxx>
- [PATCH 0/3] efi_test: fix Coccinelle warning and CoverityScan issues
- From: Ivan Hu <ivan.hu@xxxxxxxxxxxxx>
- Re: [RFC PATCH v1 09/28] x86/efi: Access EFI data as encrypted when SEV is active
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [RFC PATCH v1 09/28] x86/efi: Access EFI data as encrypted when SEV is active
- From: Kai Huang <kaih.linux@xxxxxxxxx>
- Re: [RFC PATCH 0/3] efi: MMC proxy support for the UEFI varstore
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [RFC PATCH v1 09/28] x86/efi: Access EFI data as encrypted when SEV is active
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [RFC PATCH v1 09/28] x86/efi: Access EFI data as encrypted when SEV is active
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH v1 09/28] x86/efi: Access EFI data as encrypted when SEV is active
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [RFC PATCH v1 09/28] x86/efi: Access EFI data as encrypted when SEV is active
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH v1 09/28] x86/efi: Access EFI data as encrypted when SEV is active
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH v1 09/28] x86/efi: Access EFI data as encrypted when SEV is active
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH v1 09/28] x86/efi: Access EFI data as encrypted when SEV is active
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH v1 09/28] x86/efi: Access EFI data as encrypted when SEV is active
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH v1 09/28] x86/efi: Access EFI data as encrypted when SEV is active
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [RFC PATCH v1 09/28] x86/efi: Access EFI data as encrypted when SEV is active
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH v1 09/28] x86/efi: Access EFI data as encrypted when SEV is active
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH v1 09/28] x86/efi: Access EFI data as encrypted when SEV is active
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [RFC PATCH v1 09/28] x86/efi: Access EFI data as encrypted when SEV is active
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH v1 09/28] x86/efi: Access EFI data as encrypted when SEV is active
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [RFC PATCH v1 09/28] x86/efi: Access EFI data as encrypted when SEV is active
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH v1 04/28] x86: Secure Encrypted Virtualization (SEV) support
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [RFC PATCH v1 09/28] x86/efi: Access EFI data as encrypted when SEV is active
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [RFC PATCH v1 09/28] x86/efi: Access EFI data as encrypted when SEV is active
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH v1 09/28] x86/efi: Access EFI data as encrypted when SEV is active
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [RFC PATCH v1 05/28] KVM: SVM: prepare for new bit definition in nested_ctl
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [RFC PATCH 0/3] efi: MMC proxy support for the UEFI varstore
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH 0/3] efi: MMC proxy support for the UEFI varstore
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [RFC PATCH 2/3] efi/arm: add SIMD stash/unstash operations
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 1/3] efi/arm64: add SIMD stash/unstash operations
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 3/3] efi: implement MMC proxy support for the UEFI variable store
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 0/3] efi: MMC proxy support for the UEFI varstore
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: EFI co-maintainer
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: EFI co-maintainer
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: EFI co-maintainer
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: EFI co-maintainer
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [RFC PATCH v1 03/28] kvm: svm: Use the hardware provided GPA instead of page walk
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [PATCH 2/2] MAINTAINERS: add ARM and arm64 EFI specific files to EFI subsystem
- From: Will Deacon <will.deacon@xxxxxxx>
- Re: [PATCH 1/2] MAINTAINERS: add myself as EFI maintainer
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] MAINTAINERS: add myself as EFI maintainer
- From: Will Deacon <will.deacon@xxxxxxx>
- [PATCH 1/2] MAINTAINERS: add myself as EFI maintainer
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 2/2] MAINTAINERS: add ARM and arm64 EFI specific files to EFI subsystem
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: EFI co-maintainer
- From: Grant Likely <grant.likely@xxxxxxxxxxxx>
- EFI co-maintainer
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v1 02/28] kvm: svm: Add kvm_fast_pio_in support
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [GIT PULL 0/2] EFI urgent fixes
- From: Waiman Long <waiman.long@xxxxxxx>
- Re: [GIT PULL 0/2] EFI urgent fixes
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] EFI fix for v4.9 queue
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [GIT PULL 0/2] EFI urgent fixes
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- [PATCH 1/2] x86/mm/pat: Prevent hang during boot when mapping pages
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] x86/efi: Only map RAM into EFI page tables if in mixed-mode
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [GIT PULL 0/2] EFI urgent fixes
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH] x86/efi: Round EFI memmap reservations to EFI_PAGE_SIZE
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [GIT PULL] EFI fix for v4.9 queue
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH -next v2] arm*/efi: efi_init error handling fix
- From: Yisheng Xie <xieyisheng1@xxxxxxxxxx>
- Re: [PATCH] x86/efi: Add necessary checks before iterating over efi.memmap
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86/efi: Add necessary checks before iterating over efi.memmap
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH] arm64/efi: efi_init error handling fix
- From: Yisheng Xie <xieyisheng1@xxxxxxxxxx>
- Re: Cannot load linux after recent efi-related changes
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: Cannot load linux after recent efi-related changes
- From: Mike Krinkin <krinkin.m.u@xxxxxxxxx>
- Re: [tip regression] efi: Allow drivers to reserve boot services forever == toxic
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: Cannot load linux after recent efi-related changes
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [tip regression] efi: Allow drivers to reserve boot services forever == toxic
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [tip regression] efi: Allow drivers to reserve boot services forever == toxic
- From: Mike Galbraith <umgwanakikbuti@xxxxxxxxx>
- Re: Cannot load linux after recent efi-related changes
- From: Mike Krinkin <krinkin.m.u@xxxxxxxxx>
- Re: [tip regression] efi: Allow drivers to reserve boot services forever == toxic
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Cannot load linux after recent efi-related changes
- From: Mike Krinkin <krinkin.m.u@xxxxxxxxx>
- Re: [tip regression] efi: Allow drivers to reserve boot services forever == toxic
- From: Mike Galbraith <umgwanakikbuti@xxxxxxxxx>
- Re: [tip regression] efi: Allow drivers to reserve boot services forever == toxic
- From: Mike Galbraith <umgwanakikbuti@xxxxxxxxx>
- Re: [tip regression] efi: Allow drivers to reserve boot services forever == toxic
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH 3/3] efi: Format EFI version prints the way the standard says.
- From: Peter Jones <pjones@xxxxxxxxxx>
- Re: [tip regression] efi: Allow drivers to reserve boot services forever == toxic
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [tip regression] efi: Allow drivers to reserve boot services forever == toxic
- From: Mike Galbraith <umgwanakikbuti@xxxxxxxxx>
- Re: [PATCH 3/3] efi: Format EFI version prints the way the standard says.
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [tip regression] efi: Allow drivers to reserve boot services forever == toxic
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 19/20] x86: Access the setup data through debugfs un-encrypted
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH v2 15/20] iommu/amd: AMD IOMMU support for memory encryption
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH -next] efi: Remove unused including <linux/version.h>
- From: Wei Yongjun <weiyj.lk@xxxxxxxxx>
- Re: [RFC PATCH v2 19/20] x86: Access the setup data through debugfs un-encrypted
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH v2 11/20] mm: Access BOOT related data in the clear
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH v2 15/20] iommu/amd: AMD IOMMU support for memory encryption
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 3/3] efi: Format EFI version prints the way the standard says.
- From: Peter Jones <pjones@xxxxxxxxxx>
- Re: [RFC PATCH v2 11/20] mm: Access BOOT related data in the clear
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] efi: Format EFI version prints the way the standard says.
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 19/20] x86: Access the setup data through debugfs un-encrypted
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH v2 15/20] iommu/amd: AMD IOMMU support for memory encryption
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH v2 20/20] x86: Add support to make use of Secure Memory Encryption
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH v2 19/20] x86: Access the setup data through debugfs un-encrypted
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH v2 11/20] mm: Access BOOT related data in the clear
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH v2 16/20] x86: Check for memory encryption on the APs
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH v2 10/20] x86: Insure that memory areas are encrypted when possible
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH v2 18/20] x86/kvm: Enable Secure Memory Encryption of nested page tables
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH v2 16/20] x86: Check for memory encryption on the APs
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH v2 15/20] iommu/amd: AMD IOMMU support for memory encryption
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH v2 14/20] x86: DMA support for memory encryption
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [GIT PULL 00/29] EFI changes for v4.9
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH 2/3] efi: add firmware version information to sysfs
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] efi: don't call the system table version the runtime services version
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] Apple device properties
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86/efi: Add necessary checks before iterating over efi.memmap
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH] arm64/efi: efi_init error handling fix
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v1 01/28] kvm: svm: Add support for additional SVM NPF error codes
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [PATCH] x86/efi: Add necessary checks before iterating over efi.memmap
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] x86/efi: Add necessary checks before iterating over efi.memmap
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH 4/6] driver core: Don't leak secondary fwnode on device removal
- From: "Rafael J. Wysocki" <rjw@xxxxxxxxxxxxx>
- Re: [PATCH 2/6] ACPI / bus: Make acpi_get_first_physical_node() public
- From: "Rafael J. Wysocki" <rjw@xxxxxxxxxxxxx>
- Re: [RFC PATCH v2 20/20] x86: Add support to make use of Secure Memory Encryption
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH v2 19/20] x86: Access the setup data through debugfs un-encrypted
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH v2 11/20] mm: Access BOOT related data in the clear
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 16/20] x86: Check for memory encryption on the APs
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH v2 12/20] x86: Add support for changing memory encryption attribute
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH v2 11/20] mm: Access BOOT related data in the clear
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH v2 10/20] x86: Insure that memory areas are encrypted when possible
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH v2 13/20] x86: Decrypt trampoline area if memory encryption is active
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH v2 12/20] x86: Add support for changing memory encryption attribute
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH v2 11/20] mm: Access BOOT related data in the clear
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH v2 10/20] x86: Insure that memory areas are encrypted when possible
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH v2 18/20] x86/kvm: Enable Secure Memory Encryption of nested page tables
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH v2 07/20] x86: Provide general kernel support for memory encryption
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH v2 16/20] x86: Check for memory encryption on the APs
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH v2 15/20] iommu/amd: AMD IOMMU support for memory encryption
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [GIT PULL 00/29] EFI changes for v4.9
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [RFC PATCH v2 14/20] x86: DMA support for memory encryption
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [GIT PULL 00/29] EFI changes for v4.9
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 13/20] x86: Decrypt trampoline area if memory encryption is active
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH v2 12/20] x86: Add support for changing memory encryption attribute
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH v2 11/20] mm: Access BOOT related data in the clear
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH v2 10/20] x86: Insure that memory areas are encrypted when possible
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH 01/29] x86/efi: Test for EFI_MEMMAP functionality when iterating EFI memmap
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 02/29] x86/efi: Consolidate region mapping logic
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 03/29] efi: Refactor efi_memmap_init_early() into arch-neutral code
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 04/29] efi: Add efi_memmap_init_late() for permanent EFI memmap
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 05/29] efi/fake_mem: Refactor main two code chunks into functions
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 06/29] efi: Split out EFI memory map functions into new file
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 08/29] efi: Allow drivers to reserve boot services forever
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 07/29] efi: Add efi_memmap_install() for installing new EFI memory maps
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 14/29] efi: Use a file local lock for efivars
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 10/29] efi/esrt: Use efi_mem_reserve() and avoid a kmalloc()
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 11/29] x86/efi-bgrt: Use efi_mem_reserve() to avoid copying image data
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 12/29] efi/esrt: Use memremap not ioremap to access ESRT table in memory
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 13/29] efi/arm*: esrt: Add missing call to efi_esrt_init()
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 16/29] efi: Replace runtime services spinlock with semaphore
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 21/29] fs/efivarfs: Fix double kfree() in error path
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 19/29] lib/ucs2_string: Speed up ucs2_utf8size()
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 17/29] x86/efi: Initialize status to ensure garbage is not returned on small size
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 20/29] x86/efi: Map in physical addresses in efi_map_region_fixed
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 18/29] firmware-gsmi: Delete an unnecessary check before the function call "dma_pool_destroy"
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 22/29] x86/efi: Remove unused find_bits() function
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 25/29] efi: Add efi_test driver for exporting UEFI runtime service interfaces
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 27/29] x86/efi: Use kmalloc_array() in efi_call_phys_prolog()
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 23/29] efi/arm64: Add debugfs node to dump UEFI runtime page tables
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 28/29] x86/efi: Optimize away setup_gop32/64 if unused
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 29/29] x86/efi: Allow invocation of arbitrary boot services
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 26/29] efi/arm64: Treat regions with WT/WC set but WB cleared as memory
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 24/29] x86/efi: Defer efi_esrt_init until after memblock_x86_fill
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 15/29] efi: Don't use spinlocks for efi vars
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 09/29] efi/runtime-map: Use efi.memmap directly instead of a copy
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [GIT PULL 00/29] EFI changes for v4.9
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] efi: Use LocateHandleBuffer instead of LocateHandle
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH] efi: Use LocateHandleBuffer instead of LocateHandle
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH v2 07/20] x86: Provide general kernel support for memory encryption
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH v2 07/20] x86: Provide general kernel support for memory encryption
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH] efi: Use LocateHandleBuffer instead of LocateHandle
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [RFC PATCH v2 07/20] x86: Provide general kernel support for memory encryption
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH v2 01/20] x86: Documentation for AMD Secure Memory Encryption (SME)
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH 3/3] efi: Format EFI version prints the way the standard says.
- From: Peter Jones <pjones@xxxxxxxxxx>
- [PATCH 1/3] efi: don't call the system table version the runtime services version
- From: Peter Jones <pjones@xxxxxxxxxx>
- [PATCH 2/3] efi: add firmware version information to sysfs
- From: Peter Jones <pjones@xxxxxxxxxx>
- Re: [RFC PATCH v2 07/20] x86: Provide general kernel support for memory encryption
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH v2 05/20] x86: Add the Secure Memory Encryption cpu feature
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH v2 07/20] x86: Provide general kernel support for memory encryption
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH v2 07/20] x86: Provide general kernel support for memory encryption
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH v2 07/20] x86: Provide general kernel support for memory encryption
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH v2 03/20] x86: Secure Memory Encryption (SME) build enablement
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH v2 01/20] x86: Documentation for AMD Secure Memory Encryption (SME)
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 2/3] efi: add firmware version information to sysfs
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH 3/3] efi: Format EFI version prints the way the standard says.
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH] arm64/efi: efi_init error handling fix
- From: Yisheng Xie <xieyisheng1@xxxxxxxxxx>
- [PATCH v2 3/4] x86/efi: Retrieve and assign Apple device properties
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH v2 4/4] thunderbolt: Use Device ROM retrieved from EFI
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH v2 2/4] efi: Add device path parser
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH v2 1/4] ACPI / bus: Make acpi_get_first_physical_node() public
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH v2 0/4] Apple device properties
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [RFC PATCH v2 09/20] x86: Add support for early encryption/decryption of memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH 3/3] efi: Format EFI version prints the way the standard says.
- From: Peter Jones <pjones@xxxxxxxxxx>
- [PATCH 2/3] efi: add firmware version information to sysfs
- From: Peter Jones <pjones@xxxxxxxxxx>
- [PATCH 1/3] efi: don't call the system table version the runtime services version
- From: Peter Jones <pjones@xxxxxxxxxx>
- Re: [PATCH 2/3] efi: add firmware version information to sysfs
- From: Peter Jones <pjones@xxxxxxxxxx>
- Re: [PATCH v2] x86/efi: Optimize away setup_gop32/64 if unused
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 07/20] x86: Provide general kernel support for memory encryption
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2] x86/efi: Optimize away setup_gop32/64 if unused
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 1/2] x86/efi: Optimize away setup_gop32/64 if unused
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH v2] x86/efi: Optimize away setup_gop32/64 if unused
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH] efi: fix memdup_user.cocci warnings
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- [efi:next 25/27] drivers/firmware/efi/test/efi_test.c:269:8-15: WARNING opportunity for memdup_user
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- [PATCH 4.7 011/143] efi/capsule: Allocate whole capsule into virtual memory
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.7 003/143] x86/platform/uv: Skip UV runtime services mapping in the efi_runtime_disabled case
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 07/20] x86: Provide general kernel support for memory encryption
- From: Borislav Petkov <bp@xxxxxxxxx>
- [GIT PULL v2 0/6] EFI urgent fixes
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3/6] efi/libstub: Allocate headspace in efi_get_memory_map()
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4/6] efi/libstub: Introduce ExitBootServices helper
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5/6] efi/libstub: Use efi_exit_boot_services() in FDT
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 6/6] x86/efi: Use efi_exit_boot_services()
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/6] efi: Fix handling error value in fdt_find_uefi_params
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/6] efi: Make for_each_efi_memory_desc_in_map() cope with running on Xen
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] arm64/efi: efi_init error handling fix
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86/efi: Use kmalloc_array() in efi_call_phys_prolog()
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] efi: arm64: treat regions with WT/WC set but WB cleared as memory
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V4] efi: add efi_test driver for exporting UEFI runtime service interfaces
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] x86/efi: Allow invocation of arbitrary boot services
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] x86/efi: Optimize away setup_gop32/64 if unused
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] efi: add firmware version information to sysfs
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH V5 0/4] Handle EFI_INVALID_PARAMETER from ExitBootServices
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] arm64/efi: efi_init error handling fix
- From: Yisheng Xie <xieyisheng1@xxxxxxxxxx>
- Re: [PATCH v2] efi: fix handling error value in fdt_find_uefi_params
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 07/20] x86: Provide general kernel support for memory encryption
- From: Borislav Petkov <bp@xxxxxxxxx>
- Cannot get EFI Pstore to work but there is no indication of what is wrong
- From: Maciej Piechotka <uzytkownik2@xxxxxxxxx>
- [PATCH 3/3] efi: Format EFI version prints the way the standard says.
- From: Peter Jones <pjones@xxxxxxxxxx>
- [PATCH 2/3] efi: add firmware version information to sysfs
- From: Peter Jones <pjones@xxxxxxxxxx>
- [PATCH 1/3] efi: don't call the system table version the runtime services version
- From: Peter Jones <pjones@xxxxxxxxxx>
- Re: [PATCH 2/2] efi: add firmware version information to sysfs
- From: Peter Jones <pjones@xxxxxxxxxx>
- Re: [RFC PATCH v2 07/20] x86: Provide general kernel support for memory encryption
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH v2 05/20] x86: Add the Secure Memory Encryption cpu feature
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH v2 03/20] x86: Secure Memory Encryption (SME) build enablement
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] arm64/efi: efi_init error handling fix
- From: Will Deacon <will.deacon@xxxxxxx>
- Re: [RFC PATCH v2 01/20] x86: Documentation for AMD Secure Memory Encryption (SME)
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2] efi: arm64: treat regions with WT/WC set but WB cleared as memory
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH v2 04/20] x86: Secure Memory Encryption (SME) support
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH v2 04/20] x86: Secure Memory Encryption (SME) support
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 04/20] x86: Secure Memory Encryption (SME) support
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v2] efi: fix handling error value in fdt_find_uefi_params
- From: Andrzej Hajda <a.hajda@xxxxxxxxxxx>
- Re: [PATCH 6/6] efi/fdt: Fix handling error value in fdt_find_uefi_params
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/6] driver core: Don't leak secondary fwnode on device removal
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH V5 4/4] x86/efi: Use efi_exit_boot_services()
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- [PATCH V5 1/4] efi/libstub: Allocate headspace in efi_get_memory_map()
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- [PATCH V5 3/4] efi/libstub: Use efi_exit_boot_services() in FDT
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- [PATCH V5 2/4] efi/libstub: Introduce ExitBootServices helper
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- [PATCH V5 0/4] Handle EFI_INVALID_PARAMETER from ExitBootServices
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- Re: [PATCH v2] efi: arm64: treat regions with WT/WC set but WB cleared as memory
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2] efi: arm64: treat regions with WT/WC set but WB cleared as memory
- From: James Morse <james.morse@xxxxxxx>
- Re: [PATCH v2] efi: arm64: treat regions with WT/WC set but WB cleared as memory
- From: Leif Lindholm <leif.lindholm@xxxxxxxxxx>
- [PATCH v2] efi: arm64: treat regions with WT/WC set but WB cleared as memory
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi: arm64: treat regions with WT/WC set but WB cleared as memory
- From: Leif Lindholm <leif.lindholm@xxxxxxxxxx>
- Re: [PATCH] efi: arm64: treat regions with WT/WC set but WB cleared as memory
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH v2 04/20] x86: Secure Memory Encryption (SME) support
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH] efi: arm64: treat regions with WT/WC set but WB cleared as memory
- From: Leif Lindholm <leif.lindholm@xxxxxxxxxx>
- Re: [PATCH] x86/efi: Use kmalloc_array() in efi_call_phys_prolog()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH] x86/efi: Use kmalloc_array() in efi_call_phys_prolog()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 02/20] x86: Set the write-protect cache mode for full PAT support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v24 5/9] arm64: kdump: add kdump support
- From: Dave Young <dyoung@xxxxxxxxxx>
- [PATCH V4] efi: add efi_test driver for exporting UEFI runtime service interfaces
- From: Ivan Hu <ivan.hu@xxxxxxxxxxxxx>
- Re: [PATCH 0/6] Apple device properties
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] efi: arm64: treat regions with WT/WC set but WB cleared as memory
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] efi: arm64: treat regions with WT/WC set but WB cleared as memory
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi: fix the wrong check for the offset of subnode
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v1 18/28] crypto: add AMD Platform Security Processor driver
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 2/2] efi: add firmware version information to sysfs
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH v24 5/9] arm64: kdump: add kdump support
- From: James Morse <james.morse@xxxxxxx>
- Re: [PATCH v24 5/9] arm64: kdump: add kdump support
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH] x86/efi-bgrt: remove the check of the version field
- From: Dave Young <dyoung@xxxxxxxxxx>
- [PATCH] efi: fix the wrong check for the offset of subnode
- From: Shawn Lin <shawn.lin@xxxxxxxxxxxxxx>
- [PATCH 1/2] efi: don't call the system table version the runtime services version
- From: Peter Jones <pjones@xxxxxxxxxx>
- [PATCH 2/2] efi: add firmware version information to sysfs
- From: Peter Jones <pjones@xxxxxxxxxx>
- Re: [RFC PATCH v1 18/28] crypto: add AMD Platform Security Processor driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v1 05/28] KVM: SVM: prepare for new bit definition in nested_ctl
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v1 26/28] KVM: SVM: add KVM_SEV_DEBUG_DECRYPT command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v1 19/28] KVM: SVM: prepare to reserve asid for SEV guest
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v1 20/28] KVM: SVM: prepare for SEV guest management API support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v1 15/28] x86: Unroll string I/O when SEV is active
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v1 10/28] x86: Change early_ioremap to early_memremap for BOOT data
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v1 11/28] x86: Don't decrypt trampoline area if SEV is active
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v1 16/28] x86: Add support to determine if running with SEV enabled
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v1 14/28] x86: Don't set the SME MSR bit when SEV is active
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v1 06/28] KVM: SVM: Add SEV feature definitions to KVM
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v1 08/28] Access BOOT related data encrypted with SEV active
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v1 13/28] iommu/amd: AMD IOMMU support for SEV
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v1 00/28] x86: Secure Encrypted Virtualization (AMD)
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v1 02/28] kvm: svm: Add kvm_fast_pio_in support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v1 04/28] x86: Secure Encrypted Virtualization (SEV) support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v1 12/28] x86: DMA support for SEV memory encryption
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v1 25/28] KVM: SVM: add KVM_SEV_GUEST_STATUS command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v1 22/28] KVM: SVM: add SEV launch start command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v1 21/28] KVM: introduce KVM_SEV_ISSUE_CMD ioctl
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v1 17/28] KVM: SVM: Enable SEV by setting the SEV_ENABLE cpu feature
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v1 18/28] crypto: add AMD Platform Security Processor driver
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v1 07/28] x86: Do not encrypt memory areas if SEV is enabled
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v1 09/28] x86/efi: Access EFI data as encrypted when SEV is active
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v1 01/28] kvm: svm: Add support for additional SVM NPF error codes
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v1 03/28] kvm: svm: Use the hardware provided GPA instead of page walk
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v1 28/28] KVM: SVM: add command to query SEV API version
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v1 27/28] KVM: SVM: add KVM_SEV_DEBUG_ENCRYPT command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v1 24/28] KVM: SVM: add SEV_LAUNCH_FINISH command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v1 23/28] KVM: SVM: add SEV launch update command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v2 18/20] x86/kvm: Enable Secure Memory Encryption of nested page tables
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v2 19/20] x86: Access the setup data through debugfs un-encrypted
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v2 13/20] x86: Decrypt trampoline area if memory encryption is active
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v2 17/20] x86: Do not specify encrypted memory for VGA mapping
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v2 03/20] x86: Secure Memory Encryption (SME) build enablement
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v2 12/20] x86: Add support for changing memory encryption attribute
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v2 02/20] x86: Set the write-protect cache mode for full PAT support
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v2 08/20] x86: Extend the early_memmap support with additional attrs
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v2 00/20] x86: Secure Memory Encryption (AMD)
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v2 01/20] x86: Documentation for AMD Secure Memory Encryption (SME)
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v2 06/20] x86: Handle reduction in physical address size with SME
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v2 07/20] x86: Provide general kernel support for memory encryption
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v2 20/20] x86: Add support to make use of Secure Memory Encryption
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v2 10/20] x86: Insure that memory areas are encrypted when possible
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v2 15/20] iommu/amd: AMD IOMMU support for memory encryption
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v2 14/20] x86: DMA support for memory encryption
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v2 11/20] mm: Access BOOT related data in the clear
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v2 09/20] x86: Add support for early encryption/decryption of memory
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v2 05/20] x86: Add the Secure Memory Encryption cpu feature
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v2 04/20] x86: Secure Memory Encryption (SME) support
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v2 16/20] x86: Check for memory encryption on the APs
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 4/6] efi/libstub: Use efi_exit_boot_services() in FDT
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH 6/6] efi/fdt: Fix handling error value in fdt_find_uefi_params
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH 3/6] efi/libstub: Introduce ExitBootServices helper
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH 2/6] efi/libstub: Allocate headspace in efi_get_memory_map()
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH] x86/efi: delay efi_esrt_init to efi_late_init
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi: simply the fdt_find_uefi_params
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [PATCH 2/2] x86/efi: Allow invocation of arbitrary boot services
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH 1/2] x86/efi: Optimize away setup_gop32/64 if unused
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH 0/6] Apple device properties
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH] efi: simply the fdt_find_uefi_params
- From: Shawn Lin <shawn.lin@xxxxxxxxxxxxxx>
- Re: [PATCH] x86/efi-bgrt: remove the check of the version field
- From: Dave Young <dyoung@xxxxxxxxxx>
- [GIT PULL 0/6] EFI urgent fixes
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/6] efi: Make for_each_efi_memory_desc_in_map() cope with running on Xen
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3/6] efi/libstub: Introduce ExitBootServices helper
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/6] efi/libstub: Allocate headspace in efi_get_memory_map()
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5/6] x86/efi: Use efi_exit_boot_services()
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 6/6] efi/fdt: Fix handling error value in fdt_find_uefi_params
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4/6] efi/libstub: Use efi_exit_boot_services() in FDT
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] efi: fix handling error value in fdt_find_uefi_params
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] x86/efi: defer efi_esrt_init until after memblock_x86_fill
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] EFI: make for_each_efi_memory_desc_in_map() cope with running on Xen
- From: "Jan Beulich" <JBeulich@xxxxxxxx>
- Re: [PATCH v2] efi: arm64: add debugfs node to dump UEFI runtime page tables
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V4 0/4] Handle EFI_INVALID_PARAMETER from ExitBootServices
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] EFI: make for_each_efi_memory_desc_in_map() cope with running on Xen
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/6] Apple device properties
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V3] efi: add efi_test driver for exporting UEFI runtime service interfaces
- From: ivanhu <ivan.hu@xxxxxxxxxxxxx>
- Re: [PATCH] x86/efi-bgrt: remove the check of the version field
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Map in physical addresses in efi_map_region_fixed
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH] Map in physical addresses in efi_map_region_fixed
- From: Alex Thorlton <athorlton@xxxxxxx>
- [PATCH] efi: fix handling error value in fdt_find_uefi_params
- From: Andrzej Hajda <a.hajda@xxxxxxxxxxx>
- Re: [PATCH] Map in physical addresses in efi_map_region_fixed
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH] x86/efi-bgrt: remove the check of the version field
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH] x86/efi: delay efi_esrt_init to efi_late_init
- From: Ricardo Neri <ricardo.neri-calderon@xxxxxxxxxxxxxxx>
- [PATCH v2] x86/efi: defer efi_esrt_init until after memblock_x86_fill
- From: Ricardo Neri <ricardo.neri-calderon@xxxxxxxxxxxxxxx>
- Re: [PATCH 4/6] driver core: Don't leak secondary fwnode on device removal
- From: "Rafael J. Wysocki" <rjw@xxxxxxxxxxxxx>
- Re: [PATCH 2/6] ACPI / bus: Make acpi_get_first_physical_node() public
- From: "Rafael J. Wysocki" <rjw@xxxxxxxxxxxxx>
- Re: [PATCH] Map in physical addresses in efi_map_region_fixed
- From: Alex Thorlton <athorlton@xxxxxxx>
- Re: [PATCH] Map in physical addresses in efi_map_region_fixed
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] Map in physical addresses in efi_map_region_fixed
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2] efi: arm64: add debugfs node to dump UEFI runtime page tables
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2] EFI: make for_each_efi_memory_desc_in_map() cope with running on Xen
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86/efi: Remove unused find_bits() function
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V3] efi: add efi_test driver for exporting UEFI runtime service interfaces
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Map in physical addresses in efi_map_region_fixed
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] Map in physical addresses in efi_map_region_fixed
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] Map in physical addresses in efi_map_region_fixed
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- [PATCH V4 4/4] x86/efi: Use efi_exit_boot_services()
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- [PATCH V4 3/4] efi/libstub: Use efi_exit_boot_services() in FDT
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- [PATCH V4 2/4] efi/libstub: Introduce ExitBootServices helper
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- [PATCH V4 1/4] efi/libstub: Allocate headspace in efi_get_memory_map()
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- [PATCH V4 0/4] Handle EFI_INVALID_PARAMETER from ExitBootServices
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- Re: [PATCH] Map in physical addresses in efi_map_region_fixed
- From: Alex Thorlton <athorlton@xxxxxxx>
- Re: [PATCH] x86/efi-bgrt: remove the check of the version field
- From: Josh Triplett <josh@xxxxxxxxxxxxxxxx>
- Re: [PATCH 0/6] Apple device properties
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH] Map in physical addresses in efi_map_region_fixed
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH v2] EFI: make for_each_efi_memory_desc_in_map() cope with running on Xen
- From: "Jan Beulich" <JBeulich@xxxxxxxx>
- Re: [efi:next 15/19] fs/efivarfs/super.c:180:7-11: ERROR: reference preceded by free on line 162
- From: Julia Lawall <julia.lawall@xxxxxxx>
- Re: [efi:next 15/19] fs/efivarfs/super.c:180:7-11: ERROR: reference preceded by free on line 162
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86/efi-bgrt: remove the check of the version field
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Map in physical addresses in efi_map_region_fixed
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/6] Apple device properties
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH] x86/efi: Remove unused find_bits() function
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH V3] efi: add efi_test driver for exporting UEFI runtime service interfaces
- From: Ivan Hu <ivan.hu@xxxxxxxxxxxxx>
- [PATCH 1/2] x86/platform/uv: Skip UV runtime services mapping in the efi_runtime_disabled case
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] efi/capsule: Allocate whole capsule into virtual memory
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [GIT PULL 0/2] EFI urgent fixes
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86/efi: delay efi_esrt_init to efi_late_init
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86/efi-bgrt: remove the check of the version field
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH] x86/efi-bgrt: remove the check of the version field
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH] Map in physical addresses in efi_map_region_fixed
- From: Alex Thorlton <athorlton@xxxxxxx>
- Re: [PATCH] EFI: make for_each_efi_memory_desc_in_map() cope with running on Xen
- From: "Jan Beulich" <JBeulich@xxxxxxxx>
- Re: [PATCH] EFI: make for_each_efi_memory_desc_in_map() cope with running on Xen
- From: "Jan Beulich" <JBeulich@xxxxxxxx>
- Re: [PATCH] EFI: make for_each_efi_memory_desc_in_map() cope with running on Xen
- From: Jiri Slaby <jslaby@xxxxxxx>
- Re: [PATCH] EFI: make for_each_efi_memory_desc_in_map() cope with running on Xen
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH] EFI: make for_each_efi_memory_desc_in_map() cope with running on Xen
- From: "Jan Beulich" <JBeulich@xxxxxxxx>
- Re: [PATCH 0/6] Apple device properties
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH] EFI: make for_each_efi_memory_desc_in_map() cope with running on Xen
- From: Jiri Slaby <jslaby@xxxxxxx>
- [efi:next 15/19] fs/efivarfs/super.c:180:7-11: ERROR: reference preceded by free on line 162
- From: Julia Lawall <julia.lawall@xxxxxxx>
- Re: [PATCH] lib/ucs2_string: Speed up ucs2_utf8size()
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH] EFI: make for_each_efi_memory_desc_in_map() cope with running on Xen
- From: "Jan Beulich" <JBeulich@xxxxxxxx>
- [PATCH] x86/efi: delay efi_esrt_init to efi_late_init
- From: Ricardo Neri <ricardo.neri-calderon@xxxxxxxxxxxxxxx>
- Re: [PATCH V2] efi: add efi_test driver for exporting UEFI runtime service interfaces
- From: ivanhu <ivan.hu@xxxxxxxxxxxxx>
- [PATCH] Map in physical addresses in efi_map_region_fixed
- From: Alex Thorlton <athorlton@xxxxxxx>
- Re: [PATCH 1/6] efi: Retrieve Apple device properties
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] efi: capsule: allocate whole capsule into virtual memory
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/6] efi: Retrieve Apple device properties
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH 5/6] efi: Assign Apple device properties
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/6] efi: Retrieve Apple device properties
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/6] Apple device properties
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V2] efi: add efi_test driver for exporting UEFI runtime service interfaces
- From: joeyli <jlee@xxxxxxxx>
- [PATCH] lib/ucs2_string: Speed up ucs2_utf8size()
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH 0170/1285] Replace numeric parameter like 0444 with macro
- From: Baole Ni <baolex.ni@xxxxxxxxx>
- [PATCH 0171/1285] Replace numeric parameter like 0444 with macro
- From: Baole Ni <baolex.ni@xxxxxxxxx>
- Re: [PATCH V2 2/4] efi/libstub: Introduce ExitBootServices helper
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86/efi: initialize status to ensure garbage is not returned on small size
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH V2] efi: add efi_test driver for exporting UEFI runtime service interfaces
- From: Ivan Hu <ivan.hu@xxxxxxxxxxxxx>
- [PATCH v2] efi: capsule: allocate whole capsule into virtual memory
- From: Austin Christ <austinwc@xxxxxxxxxxxxxx>
- Re: [PATCH] efi: capsule: allocate whole capsule into virtual memory
- From: "Christ, Austin" <austinwc@xxxxxxxxxxxxxx>
- Re: [PATCH] efi: capsule: allocate whole capsule into virtual memory
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH 0/6] Apple device properties
- From: "Rafael J. Wysocki" <rjw@xxxxxxxxxxxxx>
- Re: [PATCH V2 2/4] efi/libstub: Introduce ExitBootServices helper
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- Re: [PATCH V2 4/4] x86/efi: Use efi_exit_boot_services()
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- Re: [PATCH V2 4/4] x86/efi: Use efi_exit_boot_services()
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V2 2/4] efi/libstub: Introduce ExitBootServices helper
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH V3 4/4] x86/efi: Use efi_exit_boot_services()
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- [PATCH V3 3/4] efi/libstub: Use efi_exit_boot_services() in FDT
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- [PATCH V3 2/4] efi/libstub: Introduce ExitBootServices helper
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- [PATCH V3 1/4] efi/libstub: Allocate headspace in efi_get_memory_map()
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- [PATCH V3 0/4] Handle EFI_INVALID_PARAMETER from ExitBootServices
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- Re: [PATCH V2 1/4] efi/libstub: Allocate headspace in efi_get_memory_map()
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- [PATCH 1/7] pstore: Split pstore fragile flags
- From: Namhyung Kim <namhyung@xxxxxxxxxx>
- [PATCH 3/7] pstore: Manage buffer position for async write
- From: Namhyung Kim <namhyung@xxxxxxxxxx>
- Re: [PATCH V2 1/4] efi/libstub: Allocate headspace in efi_get_memory_map()
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86/efi: initialize status to ensure garbage is not returned on small size
- From: Colin Ian King <colin.king@xxxxxxxxxxxxx>
- Re: [PATCH] x86/efi: initialize status to ensure garbage is not returned on small size
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/6] ACPI / bus: Make acpi_get_first_physical_node() public
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH 3/6] efi: Add device path parser
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH 5/6] efi: Assign Apple device properties
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH 6/6] thunderbolt: Use Device ROM retrieved from EFI
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH 4/6] driver core: Don't leak secondary fwnode on device removal
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH 1/6] efi: Retrieve Apple device properties
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH 0/6] Apple device properties
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH] efi: add efi_test driver for exporting UEFI runtime service interfaces
- From: ivanhu <ivan.hu@xxxxxxxxxxxxx>
- Re: [PATCH] efi: add efi_test driver for exporting UEFI runtime service interfaces
- From: joeyli <jlee@xxxxxxxx>
- Re: ESRT failures ... was Re: [PATCH 04/11] efi: Add efi_memmap_init_late() for permanent EFI memmap
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: ESRT failures ... was Re: [PATCH 04/11] efi: Add efi_memmap_init_late() for permanent EFI memmap
- From: Prarit Bhargava <prarit@xxxxxxxxxx>
- Re: [PATCH v3 0/3] efi interruptible runtime services
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/3] efi: don't use spinlocks for efi vars
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: ESRT failures ... was Re: [PATCH 04/11] efi: Add efi_memmap_init_late() for permanent EFI memmap
- From: Prarit Bhargava <prarit@xxxxxxxxxx>
- Re: ESRT failures ... was Re: [PATCH 04/11] efi: Add efi_memmap_init_late() for permanent EFI memmap
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: ESRT failures ... was Re: [PATCH 04/11] efi: Add efi_memmap_init_late() for permanent EFI memmap
- From: Prarit Bhargava <prarit@xxxxxxxxxx>
- Re: ESRT failures ... was Re: [PATCH 04/11] efi: Add efi_memmap_init_late() for permanent EFI memmap
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/5] arm64: efi: always map runtime services code and data regions down to pages
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 2/5] arm64: efi: always map runtime services code and data regions down to pages
- From: Suzuki K Poulose <Suzuki.Poulose@xxxxxxx>
- Re: [PATCH 2/5] arm64: efi: always map runtime services code and data regions down to pages
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 2/5] arm64: efi: always map runtime services code and data regions down to pages
- From: Sudeep Holla <sudeep.holla@xxxxxxx>
- Re: ESRT failures ... was Re: [PATCH 04/11] efi: Add efi_memmap_init_late() for permanent EFI memmap
- From: Prarit Bhargava <prarit@xxxxxxxxxx>
- Re: ESRT failures ... was Re: [PATCH 04/11] efi: Add efi_memmap_init_late() for permanent EFI memmap
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] efi: add efi_test driver for exporting UEFI runtime service interfaces
- From: ivanhu <ivan.hu@xxxxxxxxxxxxx>
- Re: [PATCH] efi: add efi_test driver for exporting UEFI runtime service interfaces
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH] efi: capsule: allocate whole capsule into virtual memory
- From: "Christ, Austin" <austinwc@xxxxxxxxxxxxxx>
- [PATCH V2 0/4] Handle EFI_INVALID_PARAMETER from ExitBootServices
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- [PATCH V2 3/4] efi/libstub: Use efi_exit_boot_services() in FDT
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- [PATCH V2 4/4] x86/efi: Use efi_exit_boot_services()
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- [PATCH V2 2/4] efi/libstub: Introduce ExitBootServices helper
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- [PATCH V2 1/4] efi/libstub: Allocate headspace in efi_get_memory_map()
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- Re: ESRT failures ... was Re: [PATCH 04/11] efi: Add efi_memmap_init_late() for permanent EFI memmap
- From: Prarit Bhargava <prarit@xxxxxxxxxx>
- Re: [PATCH] efi: capsule: allocate whole capsule into virtual memory
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: ESRT failures ... was Re: [PATCH 04/11] efi: Add efi_memmap_init_late() for permanent EFI memmap
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] efivarfs: Eliminate dead code in efivarfs_create()
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 1/2] pstore: Split pstore fragile flags
- From: Namhyung Kim <namhyung@xxxxxxxxxx>
- [PATCH] x86/efi: initialize status to ensure garbage is not returned on small size
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- [PATCH -next] x86/efi: Remove duplicated include from efi_64.c
- From: Wei Yongjun <weiyj_lk@xxxxxxx>
- Re: [PATCH] efivarfs: Eliminate dead code in efivarfs_create()
- From: Tobias Klauser <tklauser@xxxxxxxxxx>
- Re: [PATCH 1/4] efi/libstub: Allocate headspace in efi_get_memory_map()
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- Re: [PATCH 1/4] efi/libstub: Allocate headspace in efi_get_memory_map()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 1/4] efi/libstub: Allocate headspace in efi_get_memory_map()
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH 1/4] efi/libstub: Allocate headspace in efi_get_memory_map()
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- Re: [PATCH 1/4] efi/libstub: Allocate headspace in efi_get_memory_map()
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [PATCH 4/4] x86/efi: Use efi_exit_boot_services()
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- [PATCH 3/4] efi/libstub: Use efi_exit_boot_services() in FDT
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- [PATCH 2/4] efi/libstub: Introduce ExitBootServices helper
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- [PATCH 1/4] efi/libstub: Allocate headspace in efi_get_memory_map()
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- [PATCH 0/4] Handle EFI_INVALID_PARAMETER from ExitBootServices
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- [PATCH v3 3/3] efi: replace runtime services spinlock with semaphore
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 2/3] efi: don't use spinlocks for efi vars
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 1/3] efi: use a file local lock for efivars
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 0/3] efi interruptible runtime services
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 0/3] efi interruptible runtime services
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] efi: capsule: allocate whole capsule into virtual memory
- From: Austin Christ <austinwc@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] efi/arm*: esrt: add missing call to efi_esrt_init()
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] efi: esrt: use memremap not ioremap to access ESRT table in memory
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/3] efi: replace runtime services spinlock with semaphore
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/3] efi: don't use spinlocks for efi vars
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] efi: use a file local lock for efivars
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH] efi: add efi_test driver for exporting UEFI runtime service interfaces
- From: Ivan Hu <ivan.hu@xxxxxxxxxxxxx>
- [PATCH 03/11] x86/mm: Remove kernel_unmap_pages_in_pgd() and efi_cleanup_page_tables()
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v6 2/2] arm64:acpi Fix the acpi alignment exception when 'mem=' specified
- From: Dennis Chen <dennis.chen@xxxxxxx>
- [PATCH v6 1/2] mm:memblock Add new infrastructure to address the mem limit issue
- From: Dennis Chen <dennis.chen@xxxxxxx>
- [PATCH v6 0/2] Fix acpi alignment fault with 'mem='
- From: Dennis Chen <dennis.chen@xxxxxxx>
- ESRT failures ... was Re: [PATCH 04/11] efi: Add efi_memmap_init_late() for permanent EFI memmap
- From: Prarit Bhargava <prarit@xxxxxxxxxx>
- [added to the 3.18 stable tree] efi: Expose non-blocking set_variable() wrapper to efivars
- From: Sasha Levin <sasha.levin@xxxxxxxxxx>
- [added to the 4.1 stable tree] efi: Expose non-blocking set_variable() wrapper to efivars
- From: Sasha Levin <sasha.levin@xxxxxxxxxx>
- [PATCH v5 04/32] x86/mm: Remove kernel_unmap_pages_in_pgd() and efi_cleanup_page_tables()
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v2 2/2] efi/arm*: esrt: add missing call to efi_esrt_init()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 1/2] efi: esrt: use memremap not ioremap to access ESRT table in memory
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 0/2] efi/arm*: wire up ESRT table
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 3/3] efi: replace runtime services spinlock with semaphore
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 2/3] efi: don't use spinlocks for efi vars
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 1/3] efi: use a file local lock for efivars
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 0/3] efi interruptible runtime services
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v7 1/8] Documentation: acpi: add SSDT overlays documentation
- From: Octavian Purdila <octavian.purdila@xxxxxxxxx>
- [PATCH v7 2/8] acpi: fix enumeration (visited) flags for bus rescans
- From: Octavian Purdila <octavian.purdila@xxxxxxxxx>
- [PATCH v7 6/8] efi: load SSTDs from EFI variables
- From: Octavian Purdila <octavian.purdila@xxxxxxxxx>
- [PATCH v7 3/8] acpi: add support for ACPI reconfiguration notifiers
- From: Octavian Purdila <octavian.purdila@xxxxxxxxx>
- [PATCH v7 8/8] acpi: add support for loading SSDTs via configfs
- From: Octavian Purdila <octavian.purdila@xxxxxxxxx>
- [PATCH v7 4/8] i2c: add support for ACPI reconfigure notifications
- From: Octavian Purdila <octavian.purdila@xxxxxxxxx>
- [PATCH v7 7/8] acpi: add support for configfs
- From: Octavian Purdila <octavian.purdila@xxxxxxxxx>
- [PATCH v7 5/8] spi: add support for ACPI reconfigure notifications
- From: Octavian Purdila <octavian.purdila@xxxxxxxxx>
- [PATCH v7 0/8] ACPI overlays
- From: Octavian Purdila <octavian.purdila@xxxxxxxxx>
- Re: [PATCH v5 8/8] acpi: add support for loading SSDTs via configfs
- From: Mika Westerberg <mika.westerberg@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 7/8] acpi: add support for configfs
- From: Mika Westerberg <mika.westerberg@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/8] acpi: add support for ACPI reconfiguration notifiers
- From: Mika Westerberg <mika.westerberg@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/8] acpi: fix enumeration (visited) flags for bus rescans
- From: Mika Westerberg <mika.westerberg@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/8] Documentation: acpi: add SSDT overlays documentation
- From: Mika Westerberg <mika.westerberg@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/8] acpi: fix enumeration (visited) flags for bus rescans
- From: Mika Westerberg <mika.westerberg@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/8] acpi: fix enumeration (visited) flags for bus rescans
- From: "Rafael J. Wysocki" <rjw@xxxxxxxxxxxxx>
- Re: [PATCH v5 2/8] acpi: fix enumeration (visited) flags for bus rescans
- From: Octavian Purdila <octavian.purdila@xxxxxxxxx>
- Re: [PATCH v5 2/8] acpi: fix enumeration (visited) flags for bus rescans
- From: Mika Westerberg <mika.westerberg@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 6/8] efi: load SSTDs from EFI variables
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 0/8] ACPI overlays
- From: Octavian Purdila <octavian.purdila@xxxxxxxxx>
- Re: [PATCH v5 0/8] ACPI overlays
- From: "Rafael J. Wysocki" <rjw@xxxxxxxxxxxxx>
- [PATCH v6 6/8] efi: load SSTDs from EFI variables
- From: Octavian Purdila <octavian.purdila@xxxxxxxxx>
- Re: MemoryOverwriteRequestControl
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: MemoryOverwriteRequestControl
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: MemoryOverwriteRequestControl
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: MemoryOverwriteRequestControl
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: MemoryOverwriteRequestControl
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: MemoryOverwriteRequestControl
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: MemoryOverwriteRequestControl
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: MemoryOverwriteRequestControl
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: MemoryOverwriteRequestControl
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH 03/11] efi: Refactor efi_memmap_init_early() into arch-neutral code
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: MemoryOverwriteRequestControl
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- MemoryOverwriteRequestControl
- From: Grant Likely <grant.likely@xxxxxxxxxxxx>
- Re: [RFC PATCH] efi/libstub: Retry ExitBootServices if map key is invalid
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/7] efi: Convert efi_call_virt to efi_call_virt_pointer
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/7] efi: Document #define FOO_PROTOCOL_GUID layout
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 03/11] efi: Refactor efi_memmap_init_early() into arch-neutral code
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 6/8] efi: load SSTDs from EFI variables
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/8] i2c: add support for ACPI reconfigure notifications
- From: Wolfram Sang <wsa@xxxxxxxxxxxxx>
- Re: [PATCH v5 5/8] spi: add support for ACPI reconfigure notifications
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH 1/2] efi: arm64: abort boot on pending SError
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v5 6/8] efi: load SSTDs from EFI variables
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH v5 2/8] acpi: fix enumeration (visited) flags for bus rescans
- From: Octavian Purdila <octavian.purdila@xxxxxxxxx>
- [PATCH v5 5/8] spi: add support for ACPI reconfigure notifications
- From: Octavian Purdila <octavian.purdila@xxxxxxxxx>
- [PATCH v5 7/8] acpi: add support for configfs
- From: Octavian Purdila <octavian.purdila@xxxxxxxxx>
- [PATCH v5 3/8] acpi: add support for ACPI reconfiguration notifiers
- From: Octavian Purdila <octavian.purdila@xxxxxxxxx>
- [PATCH v5 8/8] acpi: add support for loading SSDTs via configfs
- From: Octavian Purdila <octavian.purdila@xxxxxxxxx>
- [PATCH v5 6/8] efi: load SSTDs from EFI variables
- From: Octavian Purdila <octavian.purdila@xxxxxxxxx>
- [PATCH v5 4/8] i2c: add support for ACPI reconfigure notifications
- From: Octavian Purdila <octavian.purdila@xxxxxxxxx>
- [PATCH v5 1/8] Documentation: acpi: add SSDT overlays documentation
- From: Octavian Purdila <octavian.purdila@xxxxxxxxx>
- [PATCH v5 0/8] ACPI overlays
- From: Octavian Purdila <octavian.purdila@xxxxxxxxx>
- Re: [PATCH 1/2] efi: arm64: abort boot on pending SError
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH 1/2] efi: arm64: abort boot on pending SError
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 2/2] arm64: document that pending SErrors are not allowed at kernel entry
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 2/2] arm64: document that pending SErrors are not allowed at kernel entry
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH 1/2] efi: arm64: abort boot on pending SError
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [PATCH 1/2] efi: arm64: abort boot on pending SError
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 2/2] arm64: document that pending SErrors are not allowed at kernel entry
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi: arm64: add debugfs node to dump UEFI runtime page tables
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH] efi/libstub: Retry ExitBootServices if map key is invalid
- From: Mark Rutland <mark.rutland@xxxxxxx>
[Index of Archives]
[Linux Kernel Development]
[Security]
[Linux ARM Kernel]
[Tools]
[Linux MIPS]
[Linux S390]
[Bugtraq]
[Share Photos]>
[Fedora ARM]