Linux EFI/UEFI Development
[Prev Page][Next Page]
- Re: [RFC PATCH] efi/libstub: Retry ExitBootServices if map key is invalid
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [RFC PATCH] efi/libstub: Retry ExitBootServices if map key is invalid
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] efi/libstub: Retry ExitBootServices if map key is invalid
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH] efi/libstub: Retry ExitBootServices if map key is invalid
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] efi/libstub: Retry ExitBootServices if map key is invalid
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH] efi/libstub: Retry ExitBootServices if map key is invalid
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH 0/5] arm64: avoid block entries that we need to split later
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 0/5] arm64: avoid block entries that we need to split later
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- [RFC PATCH] efi/libstub: Retry ExitBootServices if map key is invalid
- From: Jeff Hugo <jhugo@xxxxxxxxxxxxxx>
- Re: [PATCH 11/11] x86/efi-bgrt: Use efi_mem_reserve() to avoid copying image data
- From: Josh Triplett <josh@xxxxxxxxxxxxxxxx>
- Re: [PATCH 00/11] efi: Permanent runtime EFI memmap support
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH] efi: arm64: add debugfs node to dump UEFI runtime page tables
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v4 6/8] efi: load SSTDs from EFI variables
- From: Octavian Purdila <octavian.purdila@xxxxxxxxx>
- [PATCH] efi: arm64: add debugfs node to dump UEFI runtime page tables
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 3/5] arm64: efi: avoid block mappings for unaligned UEFI memory regions
- From: Leif Lindholm <leif.lindholm@xxxxxxxxxx>
- Re: [PATCH 3/5] arm64: efi: avoid block mappings for unaligned UEFI memory regions
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 3/5] arm64: efi: avoid block mappings for unaligned UEFI memory regions
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 3/5] arm64: efi: avoid block mappings for unaligned UEFI memory regions
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 3/5] arm64: efi: avoid block mappings for unaligned UEFI memory regions
- From: Leif Lindholm <leif.lindholm@xxxxxxxxxx>
- Re: [PATCH 3/5] arm64: efi: avoid block mappings for unaligned UEFI memory regions
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 3/5] arm64: efi: avoid block mappings for unaligned UEFI memory regions
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 3/5] arm64: efi: avoid block mappings for unaligned UEFI memory regions
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- [PATCH 5/5] arm64: mm: fold init_pgd() into __create_pgd_mapping()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 4/5] arm64: mm: Remove split_p*d() functions
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 3/5] arm64: efi: avoid block mappings for unaligned UEFI memory regions
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 2/5] arm64: efi: always map runtime services code and data regions down to pages
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 1/5] arm64: mm: add param to force create_pgd_mapping() to use page mappings
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 0/5] arm64: avoid block entries that we need to split later
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 2/3] arm64: efi: Ensure efi_create_mapping() does not map overlapping regions
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH 2/3] arm64: efi: Ensure efi_create_mapping() does not map overlapping regions
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 2/3] arm64: efi: Ensure efi_create_mapping() does not map overlapping regions
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH 2/3] arm64: efi: Ensure efi_create_mapping() does not map overlapping regions
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 2/3] arm64: efi: Ensure efi_create_mapping() does not map overlapping regions
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- [PATCH v5 3/3] arm64:acpi Fix the acpi alignment exeception when 'mem=' specified
- From: Dennis Chen <dennis.chen@xxxxxxx>
- [PATCH v5 1/3] mm: memblock enhence the memblock debugfs output
- From: Dennis Chen <dennis.chen@xxxxxxx>
- [PATCH v5 2/3] mm: memblock Add some new functions to address the mem limit issue
- From: Dennis Chen <dennis.chen@xxxxxxx>
- Re: [PATCH 2/3] arm64: efi: Ensure efi_create_mapping() does not map overlapping regions
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 2/3] arm64: efi: Ensure efi_create_mapping() does not map overlapping regions
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v4 2/3] mm: memblock Add some new functions to address the mem limit issue
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH v4 3/3] arm64:acpi Fix the acpi alignment exeception when 'mem=' specified
- From: Dennis Chen <dennis.chen@xxxxxxx>
- [PATCH v4 2/3] mm: memblock Add some new functions to address the mem limit issue
- From: Dennis Chen <dennis.chen@xxxxxxx>
- [PATCH v4 1/3] mm: memblock enhence the memblock debugfs output
- From: Dennis Chen <dennis.chen@xxxxxxx>
- Re: [PATCH v3 1/2] mm: memblock Add some new functions to address the mem limit issue
- From: Dennis Chen <dennis.chen@xxxxxxx>
- Re: [PATCH v2 2/2] arm64:acpi Fix the acpi alignment exeception when 'mem=' specified
- From: Dennis Chen <dennis.chen@xxxxxxx>
- Re: [PATCH v4 5/8] spi: add support for ACPI reconfigure notifications
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- Re: [PATCH] arm64:acpi fix the acpi alignment exception when 'mem=' specified
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 1/3] block: provide helpers for reading block count
- From: Davidlohr Bueso <dave@xxxxxxxxxxxx>
- Re: [PATCH v3 1/2] mm: memblock Add some new functions to address the mem limit issue
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v4 5/8] spi: add support for ACPI reconfigure notifications
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH 2/7] efi: Document #define FOO_PROTOCOL_GUID layout
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH 4/7] efi: Convert efi_call_virt to efi_call_virt_pointer
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH 4/7] efi: Convert efi_call_virt to efi_call_virt_pointer
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH 2/7] efi: Document #define FOO_PROTOCOL_GUID layout
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH v2 2/2] arm64:acpi Fix the acpi alignment exeception when 'mem=' specified
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v4 05/29] x86/mm: Remove kernel_unmap_pages_in_pgd() and efi_cleanup_page_tables()
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH v3 1/2] mm: memblock Add some new functions to address the mem limit issue
- From: Dennis Chen <dennis.chen@xxxxxxx>
- [PATCH v3 2/2] arm64:acpi Fix the acpi alignment exeception when 'mem=' specified
- From: Dennis Chen <dennis.chen@xxxxxxx>
- Re: [PATCH v2 2/2] arm64:acpi Fix the acpi alignment exeception when 'mem=' specified
- From: Dennis Chen <dennis.chen@xxxxxxx>
- [PATCH v4 05/29] x86/mm: Remove kernel_unmap_pages_in_pgd() and efi_cleanup_page_tables()
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH 4/7] efi: Convert efi_call_virt to efi_call_virt_pointer
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 6/7] x86/efi: Update efi_thunk to use the the arch_efi_call_virt* macros
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3/7] x86/efi: Remove unused variable efi
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 7/7] x86/efi: Remove unused efi_get_time function
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5/7] x86/uv: Update uv_bios_call to use efi_call_virt_pointer
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/7] efibc: Report more information in the error messages
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [GIT PULL 0/7] EFI changes for v4.8
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/7] efi: Document #define FOO_PROTOCOL_GUID layout
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] arm64:acpi Fix the acpi alignment exeception when 'mem=' specified
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 2/2] arm64:acpi Fix the acpi alignment exeception when 'mem=' specified
- From: Dennis Chen <dennis.chen@xxxxxxx>
- Re: [PATCH 03/11] efi: Refactor efi_memmap_init_early() into arch-neutral code
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 2/2] arm64:acpi Fix the acpi alignment exeception when 'mem=' specified
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 05/16] x86/mm: Remove kernel_unmap_pages_in_pgd() and efi_cleanup_page_tables()
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v2 2/2] arm64:acpi Fix the acpi alignment exeception when 'mem=' specified
- From: Dennis Chen <dennis.chen@xxxxxxx>
- [PATCH v2 1/2] mm: memblock Add some new functions to address the mem limit issue
- From: Dennis Chen <dennis.chen@xxxxxxx>
- Re: [PATCH 2/2] arm64:acpi Fix the acpi alignment exeception when 'mem=' specified
- From: Dennis Chen <dennis.chen@xxxxxxx>
- Re: [PATCH 1/2] mm: memblock Add some new functions to address the mem limit issue
- From: Dennis Chen <dennis.chen@xxxxxxx>
- Re: [PATCH v2 1/3] block: provide helpers for reading block count
- From: Sagi Grimberg <sagi@xxxxxxxxxxx>
- Re: [PATCH 1/2] mm: memblock Add some new functions to address the mem limit issue
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 1/3] block: provide helpers for reading block count
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH 02/11] x86/efi: Consolidate region mapping logic
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] x86: fix unused efi_get_time function
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 3/3] target/iblock: use bdev_logical_block_count()
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH v2 2/3] partition/efi: use bdev_logical_block_count()
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH v2 1/3] block: provide helpers for reading block count
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v4 6/8] efi: load SSTDs from EFI variables
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] arm64/efi: remove spurious WARN_ON for !4K kernels
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH 1/2] mm: memblock Add some new functions to address the mem limit issue
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCHv2 0/3] x86/UV, x86/efi: Re-factor efi_call_virt for general use
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] arm64:acpi Fix the acpi alignment exeception when 'mem=' specified
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: BGRT warns again on my system
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 01/11] x86/efi: Test for EFI_MEMMAP functionality when iterating EFI memmap
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 00/11] efi: Permanent runtime EFI memmap support
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 03/11] efi: Refactor efi_memmap_init_early() into arch-neutral code
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 02/11] x86/efi: Consolidate region mapping logic
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 05/11] efi/fake_mem: Refactor main two code chunks into functions
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 08/11] efi: Allow drivers to reserve boot services forever
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 04/11] efi: Add efi_memmap_init_late() for permanent EFI memmap
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 11/11] x86/efi-bgrt: Use efi_mem_reserve() to avoid copying image data
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 10/11] efi/esrt: Use efi_mem_reserve() and avoid a kmalloc()
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 06/11] efi: Split out EFI memory map functions into new file
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 07/11] efi: Add efi_memmap_install() for installing new EFI memory maps
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 09/11] efi/runtime-map: Use efi.memmap directly instead of a copy
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] arm64:acpi Fix the acpi alignment exeception when 'mem=' specified
- From: Dennis Chen <dennis.chen@xxxxxxx>
- [PATCH 1/2] mm: memblock Add some new functions to address the mem limit issue
- From: Dennis Chen <dennis.chen@xxxxxxx>
- Re: [PATCH] arm64:acpi fix the acpi alignment exception when 'mem=' specified
- From: Dennis Chen <dennis.chen@xxxxxxx>
- [PATCH] partition/efi: use ilog2 to compute block size
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH] arm64:acpi fix the acpi alignment exception when 'mem=' specified
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [PATCH] arm64:acpi fix the acpi alignment exception when 'mem=' specified
- From: Dennis Chen <dennis.chen@xxxxxxx>
- [efi:efi/memmap 7/12] arch/x86/platform/efi/efi.c:954:5: warning: cast to pointer from integer of different size
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- [efi:efi/memmap 10/12] include/linux/kern_levels.h:4:18: warning: format '%p' expects argument of type 'void *', but argument 2 has type 'phys_addr_t {aka long long unsigned int}'
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- [efi:efi/memmap 10/12] include/linux/kern_levels.h:4:18: warning: format '%p' expects argument of type 'void *', but argument 2 has type 'phys_addr_t {aka unsigned int}'
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- Re: [PATCH v3 03/13] x86/mm: Remove kernel_unmap_pages_in_pgd() and efi_cleanup_page_tables()
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 03/13] x86/mm: Remove kernel_unmap_pages_in_pgd() and efi_cleanup_page_tables()
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [efi:efi/memmap 11/12] kexec-bzimage64.c:undefined reference to `efi'
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- [efi:efi/memmap 10/12] arch/x86/platform/efi/quirks.c:224:3: warning: format '%x' expects argument of type 'unsigned int', but argument 2 has type 'phys_addr_t'
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- [efi:efi/memmap 10/12] arch/x86/platform/efi/quirks.c:224:3: note: in expansion of macro 'pr_err'
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- Re: BGRT warns again on my system
- From: Josh Triplett <josh@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] efi: esrt: use memremap not ioremap to access ESRT table in memory
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] x86/mm: only allow memmap=XX!YY over existing RAM
- From: Yigal Korman <yigal@xxxxxxxxxxxxx>
- Re: BGRT warns again on my system
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [RFC] x86/mm: only allow memmap=XX!YY over existing RAM
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: BGRT warns again on my system
- From: Môshe van der Sterre <me@xxxxxxxx>
- Re: BGRT warns again on my system
- From: Josh Triplett <josh@xxxxxxxxxxxxxxxx>
- Re: BGRT warns again on my system
- From: Môshe van der Sterre <me@xxxxxxxx>
- [RFC] x86/mm: only allow memmap=XX!YY over existing RAM
- From: Yigal Korman <yigal@xxxxxxxxxxxxx>
- Re: [PATCH v2 03/13] x86/cpa: Warn if kernel_unmap_pages_in_pgd is used inappropriately
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 03/13] x86/cpa: Warn if kernel_unmap_pages_in_pgd is used inappropriately
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- RE: [PATCH] ia64: efi: use timespec64 for persistent clock
- From: "Luck, Tony" <tony.luck@xxxxxxxxx>
- Re: [PATCH] arm64/efi: remove spurious WARN_ON for !4K kernels
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86/efi: Auto enable EFI memmap on SGI UV systems
- From: Joseph Thelen <jthelen@xxxxxxx>
- Re: [RFC PATCH v1 10/18] x86/efi: Access EFI related tables in the clear
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86: remove unused efi_get_time function
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] x86: remove unused efi_get_time function
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH] x86: fix unused efi_get_time function
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH] ia64: efi: use timespec64 for persistent clock
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH v4 1/8] Documentation: acpi: add SSDT overlays documentation
- From: Octavian Purdila <octavian.purdila@xxxxxxxxx>
- [PATCH v4 2/8] acpi: fix enumeration (visited) flags for bus rescans
- From: Octavian Purdila <octavian.purdila@xxxxxxxxx>
- [PATCH v4 3/8] acpi: add support for ACPI reconfiguration notifiers
- From: Octavian Purdila <octavian.purdila@xxxxxxxxx>
- [PATCH v4 4/8] i2c: add support for ACPI reconfigure notifications
- From: Octavian Purdila <octavian.purdila@xxxxxxxxx>
- [PATCH v4 5/8] spi: add support for ACPI reconfigure notifications
- From: Octavian Purdila <octavian.purdila@xxxxxxxxx>
- [PATCH v4 6/8] efi: load SSTDs from EFI variables
- From: Octavian Purdila <octavian.purdila@xxxxxxxxx>
- [PATCH v4 7/8] acpi: add support for configfs
- From: Octavian Purdila <octavian.purdila@xxxxxxxxx>
- [PATCH v4 8/8] acpi: add support for loading SSDTs via configfs
- From: Octavian Purdila <octavian.purdila@xxxxxxxxx>
- [PATCH v4 0/8]
- From: Octavian Purdila <octavian.purdila@xxxxxxxxx>
- Re: [RFC PATCH v1 10/18] x86/efi: Access EFI related tables in the clear
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v2 1/2] efi: esrt: use memremap not ioremap to access ESRT table in memory
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v3 7/8] acpi: add support for configfs
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- [PATCH 2/3] Update uv_bios_call to use efi_call_virt_pointer
- From: Alex Thorlton <athorlton@xxxxxxx>
- [PATCHv2 0/3] x86/UV, x86/efi: Re-factor efi_call_virt for general use
- From: Alex Thorlton <athorlton@xxxxxxx>
- [PATCH 1/3] Convert efi_call_virt to efi_call_virt_pointer
- From: Alex Thorlton <athorlton@xxxxxxx>
- [PATCH 3/3] Update efi_thunk to use the the arch_efi_call_virt* macros
- From: Alex Thorlton <athorlton@xxxxxxx>
- Re: [RFC PATCH v1 10/18] x86/efi: Access EFI related tables in the clear
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v3 4/8] i2c: add support for ACPI reconfigure notifications
- From: Octavian Purdila <octavian.purdila@xxxxxxxxx>
- Re: [PATCH v3 7/8] acpi: add support for configfs
- From: Octavian Purdila <octavian.purdila@xxxxxxxxx>
- Re: [PATCH v3 4/8] i2c: add support for ACPI reconfigure notifications
- From: Wolfram Sang <wsa@xxxxxxxxxxxxx>
- Re: [PATCH v3 7/8] acpi: add support for configfs
- From: "Rafael J. Wysocki" <rjw@xxxxxxxxxxxxx>
- Re: [PATCH v3 7/8] acpi: add support for configfs
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH] x86/efi: Auto enable EFI memmap on SGI UV systems
- From: Joseph Thelen <jthelen@xxxxxxx>
- Re: [PATCH] x86/efi: Auto enable EFI memmap on SGI UV systems
- From: Joseph Thelen <jthelen@xxxxxxx>
- [PATCH v3 0/8] ACPI overlays
- From: Octavian Purdila <octavian.purdila@xxxxxxxxx>
- [PATCH v3 1/8] Documentation: acpi: add SSDT overlays documentation
- From: Octavian Purdila <octavian.purdila@xxxxxxxxx>
- [PATCH v3 3/8] acpi: add support for ACPI reconfiguration notifiers
- From: Octavian Purdila <octavian.purdila@xxxxxxxxx>
- [PATCH v3 5/8] spi: add support for ACPI reconfigure notifications
- From: Octavian Purdila <octavian.purdila@xxxxxxxxx>
- [PATCH v3 4/8] i2c: add support for ACPI reconfigure notifications
- From: Octavian Purdila <octavian.purdila@xxxxxxxxx>
- [PATCH v3 7/8] acpi: add support for configfs
- From: Octavian Purdila <octavian.purdila@xxxxxxxxx>
- [PATCH v3 8/8] acpi: add support for loading SSDTs via configfs
- From: Octavian Purdila <octavian.purdila@xxxxxxxxx>
- [PATCH v3 6/8] efi: load SSTDs from EFI variables
- From: Octavian Purdila <octavian.purdila@xxxxxxxxx>
- [PATCH v3 2/8] acpi: fix enumeration (visited) flags for bus rescans
- From: Octavian Purdila <octavian.purdila@xxxxxxxxx>
- [PATCH 3.16 071/114] MAINTAINERS: Remove asterisk from EFI directory names
- From: Ben Hutchings <ben@xxxxxxxxxxxxxxx>
- [PATCH 3.16 074/114] x86/sysfb_efi: Fix valid BAR address range check
- From: Ben Hutchings <ben@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v1 10/18] x86/efi: Access EFI related tables in the clear
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH v1 10/18] x86/efi: Access EFI related tables in the clear
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v1 10/18] x86/efi: Access EFI related tables in the clear
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v1 10/18] x86/efi: Access EFI related tables in the clear
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH] efi: kernel param for legacy NVDIMM support
- From: "Elliott, Robert (Persistent Memory)" <elliott@xxxxxxx>
- Re: [PATCH] efi: kernel param for legacy NVDIMM support
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH] efi: kernel param for legacy NVDIMM support
- From: Yigal Korman <yigal@xxxxxxxxxxxxx>
- Re: [PATCH] efi: kernel param for legacy NVDIMM support
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [RFC PATCH v1 10/18] x86/efi: Access EFI related tables in the clear
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH] efi: kernel param for legacy NVDIMM support
- From: Yigal Korman <yigal@xxxxxxxxxxxxx>
- Re: [RFC PATCH v1 10/18] x86/efi: Access EFI related tables in the clear
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 00/21] Delete CURRENT_TIME and CURRENT_TIME_SEC macros
- From: Felipe Balbi <balbi@xxxxxxxxxx>
- [PATCH 00/21] Delete CURRENT_TIME and CURRENT_TIME_SEC macros
- From: Deepa Dinamani <deepa.kernel@xxxxxxxxx>
- Re: [PATCH] x86/efi: remove unused variable efi
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86/efi: Auto enable EFI memmap on SGI UV systems
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v1 10/18] x86/efi: Access EFI related tables in the clear
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86/efi: Auto enable EFI memmap on SGI UV systems
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [RFC PATCH v1 10/18] x86/efi: Access EFI related tables in the clear
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL 0/2] EFI urgent fixes
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH 2/3] arm64: efi: Ensure efi_create_mapping() does not map overlapping regions
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 2/3] arm64: efi: Ensure efi_create_mapping() does not map overlapping regions
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH 2/3] arm64: efi: Ensure efi_create_mapping() does not map overlapping regions
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 2/3] arm64: efi: Ensure efi_create_mapping() does not map overlapping regions
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- [PATCH] x86/efi: remove unused variable efi
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- Re: [GIT PULL 0/2] EFI urgent fixes
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] arm64: efi: Ensure efi_create_mapping() does not map overlapping regions
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 3.10 111/143] MAINTAINERS: Remove asterisk from EFI directory names
- From: Willy Tarreau <w@xxxxxx>
- Re: [PATCH 2/3] arm64: efi: Ensure efi_create_mapping() does not map overlapping regions
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] efi: Introduce *_continue efi_memory_desc iterators
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] arm64/efi: remove spurious WARN_ON for !4K kernels
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] arm64/efi: remove spurious WARN_ON for !4K kernels
- From: Will Deacon <will.deacon@xxxxxxx>
- Re: [PATCH 2/3] Update uv_bios_call to use efi_call_virt_generic
- From: Alex Thorlton <athorlton@xxxxxxx>
- Re: [PATCH 3/3] Update efi_thunk to use efi_call_virt_generic
- From: Alex Thorlton <athorlton@xxxxxxx>
- Re: [PATCH 2/3] Update uv_bios_call to use efi_call_virt_generic
- From: Alex Thorlton <athorlton@xxxxxxx>
- [RFC PATCH] x86/efi: Auto enable EFI memmap on SGI UV systems
- From: Joseph Thelen <jthelen@xxxxxxx>
- [PATCH] x86/efi: Auto enable EFI memmap on SGI UV systems
- From: Joseph Thelen <jthelen@xxxxxxx>
- Re: [PATCH 3/3] Update efi_thunk to use efi_call_virt_generic
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] Update uv_bios_call to use efi_call_virt_generic
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/3] efi-pstore: implement efivars_pstore_exit()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- RE: [PATCH 1/3] efi: Introduce *_continue efi_memory_desc iterators
- From: Jeremy Linton <Jeremy.Linton@xxxxxxx>
- Re: [PATCH 1/3] efi: Introduce *_continue efi_memory_desc iterators
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH 2/3] arm64: efi: Ensure efi_create_mapping() does not map overlapping regions
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH 1/3] efi: Introduce *_continue efi_memory_desc iterators
- From: Jeremy Linton <jeremy.linton@xxxxxxx>
- Re: [PATCH 1/3] efi: Introduce *_continue efi_memory_desc iterators
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH 1/3] Convert efi_call_virt to efi_call_virt_generic
- From: Alex Thorlton <athorlton@xxxxxxx>
- Re: [PATCH] pstore: set ecc_notice_size to zero
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 1/3] Convert efi_call_virt to efi_call_virt_generic
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] arm64: efi: Ensure efi_create_mapping() does not map overlapping regions
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] efi: Introduce *_continue efi_memory_desc iterators
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: BGRT warns again on my system
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/3] efi-pstore: implement efivars_pstore_exit()
- From: Geliang Tang <geliangtang@xxxxxxx>, Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH] pstore: set ecc_notice_size to zero
- From: Geliang Tang <geliangtang@xxxxxxxxx>
- Re: [PATCH 1/3] efi: Introduce *_continue efi_memory_desc iterators
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH 1/3] efi: Introduce *_continue efi_memory_desc iterators
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [PATCH 3/3] arm64: mm: Remove split_p*d() functions
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- [PATCH 2/3] arm64: efi: Ensure efi_create_mapping() does not map overlapping regions
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- [PATCH 1/3] efi: Introduce *_continue efi_memory_desc iterators
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- [PATCH 0/3] arm64: Avoid overlapping EFI regions
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v2 4/6] arm64: mm: dump: make page table dumping reusable
- From: Will Deacon <will.deacon@xxxxxxx>
- [PATCH 1/2] efi: Fix for_each_efi_memory_desc_in_map() for empty memmaps
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] efi/arm: Fix the format of debug message from efi
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [GIT PULL 0/2] EFI urgent fixes
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] arm64:efi fix the format of debug message from efi
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] arm64/efi: remove spurious WARN_ON for !4K kernels
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: BGRT warns again on my system
- From: Môshe van der Sterre <me@xxxxxxxx>
- Re: BGRT warns again on my system
- From: Josh Triplett <josh@xxxxxxxxxxxxxxxx>
- BGRT warns again on my system
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v2] arm64:efi fix the format of debug message from efi
- From: Dennis Chen <dennis.chen@xxxxxxx>
- Re: [RFC PATCH v1 10/18] x86/efi: Access EFI related tables in the clear
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH] arm64/efi: remove spurious WARN_ON for !4K kernels
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [PATCH v2] efi: fix for_each_efi_memory_desc_in_map() for empty memmaps
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH] efi: fix for_each_efi_memory_desc_in_map() for empty memmaps
- From: Mark Salter <msalter@xxxxxxxxxx>
- Re: [PATCH] efi: fix for_each_efi_memory_desc_in_map() for empty memmaps
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v1 10/18] x86/efi: Access EFI related tables in the clear
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] arm64/efi: remove spurious WARN_ON for !4K kernels
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] arm64/efi: remove spurious WARN_ON for !4K kernels
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [RFC PATCH v1 10/18] x86/efi: Access EFI related tables in the clear
- From: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
- Re: [PATCH] arm64/efi: remove spurious WARN_ON for !4K kernels
- From: Jeremy Linton <jeremy.linton@xxxxxxx>
- Re: [PATCH] arm64/efi: remove spurious WARN_ON for !4K kernels
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH] arm64/efi: remove spurious WARN_ON for !4K kernels
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] arm64/efi: remove spurious WARN_ON for !4K kernels
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [PATCH] efi: fix for_each_efi_memory_desc_in_map() for empty memmaps
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [RFC PATCH v1 10/18] x86/efi: Access EFI related tables in the clear
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH 3.12 43/76] x86/sysfb_efi: Fix valid BAR address range check
- From: Jiri Slaby <jslaby@xxxxxxx>
- [PATCH 3.12 42/76] MAINTAINERS: Remove asterisk from EFI directory names
- From: Jiri Slaby <jslaby@xxxxxxx>
- [added to the 4.1 stable tree] x86/sysfb_efi: Fix valid BAR address range check
- From: Sasha Levin <sasha.levin@xxxxxxxxxx>
- [added to the 4.1 stable tree] MAINTAINERS: Remove asterisk from EFI directory names
- From: Sasha Levin <sasha.levin@xxxxxxxxxx>
- [added to the 3.18 stable tree] x86/sysfb_efi: Fix valid BAR address range check
- From: Sasha Levin <sasha.levin@xxxxxxxxxx>
- [added to the 3.18 stable tree] MAINTAINERS: Remove asterisk from EFI directory names
- From: Sasha Levin <sasha.levin@xxxxxxxxxx>
- Re: [RFC PATCH 0/3] x86/UV, x86/efi: Re-factor efi_call_virt for general use
- From: Alex Thorlton <athorlton@xxxxxxx>
- [PATCH 2/3] Update uv_bios_call to use efi_call_virt_generic
- From: Alex Thorlton <athorlton@xxxxxxx>
- [PATCH 1/3] Convert efi_call_virt to efi_call_virt_generic
- From: Alex Thorlton <athorlton@xxxxxxx>
- [PATCH 3/3] Update efi_thunk to use efi_call_virt_generic
- From: Alex Thorlton <athorlton@xxxxxxx>
- [RFC PATCH 0/3] x86/UV, x86/efi: Re-factor efi_call_virt for general use
- From: Alex Thorlton <athorlton@xxxxxxx>
- Re: [PATCH v2 2/5] arm64: efi: apply strict permissons for UEFI Runtime Services regions
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 2/5] arm64: efi: apply strict permissons for UEFI Runtime Services regions
- From: Shanker Donthineni <shankerd@xxxxxxxxxxxxxx>
- Re: [Xen-devel] [GIT PULL] EFI ARM Xen support
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [Xen-devel] [GIT PULL] EFI ARM Xen support
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH v2 1/2] efi: esrt: use memremap not ioremap to access ESRT table in memory
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] efi: esrt: use memremap not ioremap to access ESRT table in memory
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 2/5] arm64: efi: apply strict permissons for UEFI Runtime Services regions
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 2/5] arm64: efi: apply strict permissons for UEFI Runtime Services regions
- From: Shanker Donthineni <shankerd@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] arm64/efi: esrt: add missing call to efi_esrt_init()
- From: Christopher Covington <cov@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] Create UV efi_call macros
- From: Alex Thorlton <athorlton@xxxxxxx>
- Re: [Xen-devel] [GIT PULL] EFI ARM Xen support
- From: Stefano Stabellini <sstabellini@xxxxxxxxxx>
- Re: [PATCH 1/2] Create UV efi_call macros
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [Xen-devel] [GIT PULL] EFI ARM Xen support
- From: David Vrabel <david.vrabel@xxxxxxxxxx>
- Re: [GIT PULL] EFI ARM Xen support
- From: Stefano Stabellini <sstabellini@xxxxxxxxxx>
- Re: [PATCH 1/2] Create UV efi_call macros
- From: Alex Thorlton <athorlton@xxxxxxx>
- Re: [PATCH 1/2] Create UV efi_call macros
- From: Alex Thorlton <athorlton@xxxxxxx>
- Re: [PATCH 2/2] Fix efi_call
- From: Alex Thorlton <athorlton@xxxxxxx>
- Re: [PATCH 2/2] Fix efi_call
- From: Alex Thorlton <athorlton@xxxxxxx>
- Re: [PATCH v2] Xen: EFI: Parse DT parameters for Xen specific UEFI
- From: Stefano Stabellini <sstabellini@xxxxxxxxxx>
- Re: [PATCH 2/5] efibc: Fix excessive stack footprint warning
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [GIT PULL] EFI ARM Xen support
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] Xen: EFI: Parse DT parameters for Xen specific UEFI
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH] x86/efi: Fix 7th argument to efi_call
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [GIT PULL] EFI urgent fix
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [patch added to 3.12-stable] MAINTAINERS: Remove asterisk from EFI directory names
- From: Jiri Slaby <jslaby@xxxxxxx>
- [patch added to 3.12-stable] x86/sysfb_efi: Fix valid BAR address range check
- From: Jiri Slaby <jslaby@xxxxxxx>
- Re: [PATCH v2 4/6] arm64: mm: dump: make page table dumping reusable
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [RFC PATCH v1 10/18] x86/efi: Access EFI related tables in the clear
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v2] Xen: EFI: Parse DT parameters for Xen specific UEFI
- From: Shannon Zhao <zhaoshenglong@xxxxxxxxxx>
- Re: [PATCH 1/2] Create UV efi_call macros
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] Fix efi_call
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] Fix efi_call
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Xen: EFI: Parse DT parameters for Xen specific UEFI
- From: Stefano Stabellini <sstabellini@xxxxxxxxxx>
- Re: [PATCH] Xen: EFI: Parse DT parameters for Xen specific UEFI
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] Create UV efi_call macros
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH 1/2] Create UV efi_call macros
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 2/2] Fix efi_call
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH 1/2] Create UV efi_call macros
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH] Xen: EFI: Parse DT parameters for Xen specific UEFI
- From: Shannon Zhao <zhaoshenglong@xxxxxxxxxx>
- Re: [PATCH] Xen: EFI: Parse DT parameters for Xen specific UEFI
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH 0/2] Fix EFI runtime calls on SGI UV
- From: Alex Thorlton <athorlton@xxxxxxx>
- [PATCH 1/2] Create UV efi_call macros
- From: Alex Thorlton <athorlton@xxxxxxx>
- [PATCH 2/2] Fix efi_call
- From: Alex Thorlton <athorlton@xxxxxxx>
- Re: [PATCH 2/5] efibc: Fix excessive stack footprint warning
- From: jeremy.compostella@xxxxxxxxx (Compostella, Jeremy)
- Re: [PATCH] Xen: EFI: Parse DT parameters for Xen specific UEFI
- From: Shannon Zhao <shannon.zhao@xxxxxxxxxx>
- Re: [PATCH 2/5] efibc: Fix excessive stack footprint warning
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Xen: EFI: Parse DT parameters for Xen specific UEFI
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Xen: EFI: Parse DT parameters for Xen specific UEFI
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [BUG] x86/efi: MMRs no longer properly mapped after switch to isolated page table
- From: Alex Thorlton <athorlton@xxxxxxx>
- Re: [RFC PATCH v1 10/18] x86/efi: Access EFI related tables in the clear
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH v1 10/18] x86/efi: Access EFI related tables in the clear
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v1 00/18] x86: Secure Memory Encryption (AMD)
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH v1 00/18] x86: Secure Memory Encryption (AMD)
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 2/5] efibc: Fix excessive stack footprint warning
- From: jeremy.compostella@xxxxxxxxx (Compostella, Jeremy)
- [PATCH 3.19.y-ckt 40/54] MAINTAINERS: Remove asterisk from EFI directory names
- From: Kamal Mostafa <kamal@xxxxxxxxxxxxx>
- [PATCH 3.19.y-ckt 42/54] x86/sysfb_efi: Fix valid BAR address range check
- From: Kamal Mostafa <kamal@xxxxxxxxxxxxx>
- [3.19.y-ckt stable] Patch "MAINTAINERS: Remove asterisk from EFI directory names" has been added to the 3.19.y-ckt tree
- From: Kamal Mostafa <kamal@xxxxxxxxxxxxx>
- [3.19.y-ckt stable] Patch "x86/sysfb_efi: Fix valid BAR address range check" has been added to the 3.19.y-ckt tree
- From: Kamal Mostafa <kamal@xxxxxxxxxxxxx>
- RE: [PATCH 2/5] efibc: Fix excessive stack footprint warning
- From: "Elliott, Robert (Persistent Memory)" <elliott@xxxxxxx>
- Re: [BUG] x86/efi: MMRs no longer properly mapped after switch to isolated page table
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v1 00/18] x86: Secure Memory Encryption (AMD)
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH 4.2.y-ckt 39/59] MAINTAINERS: Remove asterisk from EFI directory names
- From: Kamal Mostafa <kamal@xxxxxxxxxxxxx>
- [PATCH 4.2.y-ckt 42/59] x86/sysfb_efi: Fix valid BAR address range check
- From: Kamal Mostafa <kamal@xxxxxxxxxxxxx>
- [4.2.y-ckt stable] Patch "x86/sysfb_efi: Fix valid BAR address range check" has been added to the 4.2.y-ckt tree
- From: Kamal Mostafa <kamal@xxxxxxxxxxxxx>
- [4.2.y-ckt stable] Patch "MAINTAINERS: Remove asterisk from EFI directory names" has been added to the 4.2.y-ckt tree
- From: Kamal Mostafa <kamal@xxxxxxxxxxxxx>
- Re: [RFC PATCH v1 00/18] x86: Secure Memory Encryption (AMD)
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH v2 07/10] efi: load SSTDs from EFI variables
- From: Octavian Purdila <octavian.purdila@xxxxxxxxx>
- [PATCH 3.14 15/23] MAINTAINERS: Remove asterisk from EFI directory names
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3.14 17/23] x86/sysfb_efi: Fix valid BAR address range check
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.5 59/88] MAINTAINERS: Remove asterisk from EFI directory names
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.5 65/88] x86/sysfb_efi: Fix valid BAR address range check
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.4 47/67] x86/sysfb_efi: Fix valid BAR address range check
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.4 41/67] MAINTAINERS: Remove asterisk from EFI directory names
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 07/10] efi: load SSTDs from EFI variables
- From: Jon Masters <jcm@xxxxxxxxxx>
- [GIT PULL 0/5] EFI changes for v4.7
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/5] efi/capsule: Make efi_capsule_pending() lockless
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4/5] efi: Merge boolean flag arguments
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3/5] efi/capsule: Move 'capsule' to the stack in efi_capsule_supported()
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/5] efibc: Fix excessive stack footprint warning
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5/5] efivarfs: Make efivarfs_file_ioctl static
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Xen: EFI: Parse DT parameters for Xen specific UEFI
- From: Mathieu Poirier <mathieu.poirier@xxxxxxxxxx>
- [PATCH] Xen: EFI: Parse DT parameters for Xen specific UEFI
- From: Shannon Zhao <zhaoshenglong@xxxxxxxxxx>
- Re: [PATCH] efi/capsule: Make efi_capsule_pending() lockless
- From: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] efi/capsule: Make efi_capsule_pending() lockless
- From: One Thousand Gnomes <gnomes@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] efi/capsule: Make efi_capsule_pending() lockless
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH] efi/capsule: Make efi_capsule_pending() lockless
- From: "Kweh, Hock Leong" <hock.leong.kweh@xxxxxxxxx>
- [PATCH] x86/sysfb_efi: Fix valid BAR address range check
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [GIT PULL v2] EFI urgent fix
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Support for generating and verifying the signature of memory snapshot image
- From: poma <pomidorabelisima@xxxxxxxxx>
- Re: [BUG] x86/efi: MMRs no longer properly mapped after switch to isolated page table
- From: Alex Thorlton <athorlton@xxxxxxx>
- Re: [PATCH 2/3] x86/sysfb_efi: Fix valid BAR address range check
- From: Wang YanQing <udknight@xxxxxxxxx>
- Re: [RFC PATCH v2 06/10] spi: add support for ACPI reconfigure notifications
- From: Octavian Purdila <octavian.purdila@xxxxxxxxx>
- Re: [PATCH] efi/capsule: Make efi_capsule_pending() lockless
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] efi/capsule: Make efi_capsule_pending() lockless
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: efi: Add 'capsule' update support
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi/capsule: Make efi_capsule_pending() lockless
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: efi: Add 'capsule' update support
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] efi/capsule: Make efi_capsule_pending() lockless
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [BUG] x86/efi: MMRs no longer properly mapped after switch to isolated page table
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [PATCH 2/3] x86/sysfb_efi: Fix valid BAR address range check
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] x86/sysfb_efi: Fix valid BAR address range check
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH] efi/capsule: Make efi_capsule_pending() lockless
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 2/3] x86/sysfb_efi: Fix valid BAR address range check
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] x86/sysfb_efi: Fix valid BAR address range check
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH v2] x86/efi-bgrt: Switch all pr_err() to pr_notice() for invalid BGRT
- From: Josh Triplett <josh@xxxxxxxxxxxxxxxx>
- [PATCH 2/3] x86/sysfb_efi: Fix valid BAR address range check
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [GIT PULL 0/3] EFI urgent fixes
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3/3] x86/efi-bgrt: Switch all pr_err() to pr_notice() for invalid BGRT
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/3] MAINTAINERS: Remove asterisk from EFI directory names
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] x86/efi-bgrt: Switch all pr_err() to pr_notice() for invalid BGRT
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [BUG] x86/efi: MMRs no longer properly mapped after switch to isolated page table
- From: Alex Thorlton <athorlton@xxxxxxx>
- Re: [PATCH v2] x86/efi-bgrt: Switch all pr_err() to pr_notice() for invalid BGRT
- From: Josh Triplett <josh@xxxxxxxxxxxxxxxx>
- [PATCH v2] x86/efi-bgrt: Switch all pr_err() to pr_notice() for invalid BGRT
- From: Josh Boyer <jwboyer@xxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v1 15/18] x86: Enable memory encryption on the APs
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: efi: Add 'capsule' update support
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH v1 00/18] x86: Secure Memory Encryption (AMD)
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH] efivarfs: merge boolean flag arguments
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] efivarfs: make efivarfs_file_ioctl static.
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: efi: Add 'capsule' update support
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] efi/capsule: Make efi_capsule_pending() lockless
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 06/10] spi: add support for ACPI reconfigure notifications
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [BUG] x86/efi: MMRs no longer properly mapped after switch to isolated page table
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [PATCH] efi/capsule: Make efi_capsule_pending() lockless
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH 4.5 126/200] efi: Expose non-blocking set_variable() wrapper to efivars
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.4 098/163] efi: Expose non-blocking set_variable() wrapper to efivars
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [BUG] x86/efi: MMRs no longer properly mapped after switch to isolated page table
- From: Alex Thorlton <athorlton@xxxxxxx>
- Re: [BUG] x86/efi: MMRs no longer properly mapped after switch to isolated page table
- From: Alex Thorlton <athorlton@xxxxxxx>
- Re: [BUG] x86/efi: MMRs no longer properly mapped after switch to isolated page table
- From: Mike Travis <travis@xxxxxxx>
- Re: [BUG] x86/efi: MMRs no longer properly mapped after switch to isolated page table
- From: Alex Thorlton <athorlton@xxxxxxx>
- RE: [PATCH v2] pstore: add lzo/lz4 compression support
- From: "Luck, Tony" <tony.luck@xxxxxxxxx>
- Re: [PATCH v2] pstore: add lzo/lz4 compression support
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC PATCH v1 00/18] x86: Secure Memory Encryption (AMD)
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- [PATCH] efivarfs: make efivarfs_file_ioctl static.
- From: Peter Jones <pjones@xxxxxxxxxx>
- re: efi: Add 'capsule' update support
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [BUG] x86/efi: MMRs no longer properly mapped after switch to isolated page table
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [RFC PATCH v1 15/18] x86: Enable memory encryption on the APs
- From: "Huang, Kai" <kai.huang@xxxxxxxxxxxxxxx>
- Re: [PATCH] efibc: avoid stack overflow warning
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] efibc: avoid stack overflow warning
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH] x86/efi-bgrt: Switch all pr_err() to pr_debug() for invalid BGRT
- From: Josh Triplett <josh@xxxxxxxxxxxxxxxx>
- Re: [PATCH] efibc: avoid stack overflow warning
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86/efi-bgrt: Switch all pr_err() to pr_debug() for invalid BGRT
- From: Colin Ian King <colin.king@xxxxxxxxxxxxx>
- Re: [PATCH] x86/efi-bgrt: Switch all pr_err() to pr_debug() for invalid BGRT
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] efibc: avoid stack overflow warning
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH] efi/capsule: Make efi_capsule_pending() lockless
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [BUG] x86/efi: MMRs no longer properly mapped after switch to isolated page table
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] efibc: avoid stack overflow warning
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- RE: [RFC PATCH v1 00/18] x86: Secure Memory Encryption (AMD)
- From: "Elliott, Robert (Persistent Memory)" <elliott@xxxxxxx>
- Re: [PATCH v2] pstore: add lzo/lz4 compression support
- From: Geliang Tang <geliangtang@xxxxxxx>
- Re: [RFC PATCH v1 13/18] x86: DMA support for memory encryption
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH] efibc: avoid stack overflow warning
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [BUG] x86/efi: MMRs no longer properly mapped after switch to isolated page table
- From: Alex Thorlton <athorlton@xxxxxxx>
- Re: [BUG] x86/efi: MMRs no longer properly mapped after switch to isolated page table
- From: Alex Thorlton <athorlton@xxxxxxx>
- Re: [RFC PATCH v1 13/18] x86: DMA support for memory encryption
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [BUG] x86/efi: MMRs no longer properly mapped after switch to isolated page table
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 06/10] spi: add support for ACPI reconfigure notifications
- From: Octavian Purdila <octavian.purdila@xxxxxxxxx>
- Re: [RFC PATCH v2 06/10] spi: add support for ACPI reconfigure notifications
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [RFC PATCH v2 06/10] spi: add support for ACPI reconfigure notifications
- From: Mika Westerberg <mika.westerberg@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 05/10] i2c: add support for ACPI reconfigure notifications
- From: Mika Westerberg <mika.westerberg@xxxxxxxxxxxxxxx>
- Re: [BUG] x86/efi: MMRs no longer properly mapped after switch to isolated page table
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [BUG] x86/efi: MMRs no longer properly mapped after switch to isolated page table
- From: Alex Thorlton <athorlton@xxxxxxx>
- Re: [BUG] x86/efi: MMRs no longer properly mapped after switch to isolated page table
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [PATCH] block: partitions: efi: Always check for alternative GPT at end of drive
- From: Julius Werner <jwerner@xxxxxxxxxxxx>
- Re: [PATCH v2 6/6] efi/arm*: add support to dump the EFI page tables
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v1 00/18] x86: Secure Memory Encryption (AMD)
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [BUG] x86/efi: MMRs no longer properly mapped after switch to isolated page table
- From: Alex Thorlton <athorlton@xxxxxxx>
- Re: [PATCH] x86/efi-bgrt: Switch all pr_err() to pr_debug() for invalid BGRT
- From: Josh Boyer <jwboyer@xxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v1 02/18] x86: Secure Memory Encryption (SME) build enablement
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH v1 02/18] x86: Secure Memory Encryption (SME) build enablement
- From: Robin Murphy <robin.murphy@xxxxxxx>
- Re: [PATCH] x86/efi-bgrt: Switch all pr_err() to pr_debug() for invalid BGRT
- From: Josh Triplett <josh@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v1 02/18] x86: Secure Memory Encryption (SME) build enablement
- From: Pavel Machek <pavel@xxxxxx>
- Re: [RFC PATCH v1 03/18] x86: Secure Memory Encryption (SME) support
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [BUG] x86/efi: MMRs no longer properly mapped after switch to isolated page table
- From: Alex Thorlton <athorlton@xxxxxxx>
- Re: [RFC PATCH v1 00/18] x86: Secure Memory Encryption (AMD)
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH] block: partitions: efi: Always check for alternative GPT at end of drive
- From: Doug Anderson <dianders@xxxxxxxxxxxx>
- Re: [RFC PATCH v1 01/18] x86: Set the write-protect cache mode for AMD processors
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v1 02/18] x86: Secure Memory Encryption (SME) build enablement
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH v1 01/18] x86: Set the write-protect cache mode for AMD processors
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH v1 02/18] x86: Secure Memory Encryption (SME) build enablement
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH] x86/efi-bgrt: Switch all pr_err() to pr_debug() for invalid BGRT
- From: Josh Boyer <jwboyer@xxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v1 02/18] x86: Secure Memory Encryption (SME) build enablement
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH v1 01/18] x86: Set the write-protect cache mode for AMD processors
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH] block: partitions: efi: Always check for alternative GPT at end of drive
- From: Karel Zak <kzak@xxxxxxxxxx>
- Re: [RFC PATCH v1 01/18] x86: Set the write-protect cache mode for AMD processors
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH v1 00/18] x86: Secure Memory Encryption (AMD)
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH] x86/efi-bgrt: Switch all pr_err() to pr_debug() for invalid BGRT
- From: Môshe van der Sterre <me@xxxxxxxx>
- Re: [RFC PATCH v1 01/18] x86: Set the write-protect cache mode for AMD processors
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v1 01/18] x86: Set the write-protect cache mode for AMD processors
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH v1 00/18] x86: Secure Memory Encryption (AMD)
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH v1 00/18] x86: Secure Memory Encryption (AMD)
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v1 01/18] x86: Set the write-protect cache mode for AMD processors
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v1 00/18] x86: Secure Memory Encryption (AMD)
- From: Pavel Machek <pavel@xxxxxx>
- Re: [RFC PATCH v1 00/18] x86: Secure Memory Encryption (AMD)
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH v1 00/18] x86: Secure Memory Encryption (AMD)
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] x86/efi-bgrt: Switch all pr_err() to pr_debug() for invalid BGRT
- From: Josh Boyer <jwboyer@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86/efi-bgrt: Switch all pr_err() to pr_debug() for invalid BGRT
- From: Môshe van der Sterre <me@xxxxxxxx>
- Re: [PATCH] block: partitions: efi: Always check for alternative GPT at end of drive
- From: "Austin S. Hemmelgarn" <ahferroin7@xxxxxxxxx>
- Re: [RFC PATCH v1 18/18] x86: Add support to turn on Secure Memory Encryption
- From: Pavel Machek <pavel@xxxxxx>
- [PATCH] x86/efi-bgrt: Switch all pr_err() to pr_debug() for invalid BGRT
- From: Josh Boyer <jwboyer@xxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v1 03/18] x86: Secure Memory Encryption (SME) support
- From: Pavel Machek <pavel@xxxxxx>
- Re: [RFC PATCH v1 02/18] x86: Secure Memory Encryption (SME) build enablement
- From: Pavel Machek <pavel@xxxxxx>
- Re: [RFC PATCH v1 00/18] x86: Secure Memory Encryption (AMD)
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH] block: partitions: efi: Always check for alternative GPT at end of drive
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH v1 05/18] x86: Handle reduction in physical address size with SME
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v1 04/18] x86: Add the Secure Memory Encryption cpu feature
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v1 07/18] x86: Extend the early_memmap support with additional attrs
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v1 08/18] x86: Add support for early encryption/decryption of memory
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v1 09/18] x86: Insure that memory areas are encrypted when possible
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v1 10/18] x86/efi: Access EFI related tables in the clear
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v1 11/18] x86: Decrypt trampoline area if memory encryption is active
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v1 13/18] x86: DMA support for memory encryption
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v1 02/18] x86: Secure Memory Encryption (SME) build enablement
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v1 05/18] x86: Handle reduction in physical address size with SME
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v1 01/18] x86: Set the write-protect cache mode for AMD processors
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v1 04/18] x86: Add the Secure Memory Encryption cpu feature
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v1 08/18] x86: Add support for early encryption/decryption of memory
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v1 00/18] x86: Secure Memory Encryption (AMD)
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v1 14/18] iommu/amd: AMD IOMMU support for memory encryption
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v1 15/18] x86: Enable memory encryption on the APs
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v1 16/18] x86: Do not specify encrypted memory for VGA mapping
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v1 18/18] x86: Add support to turn on Secure Memory Encryption
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v1 17/18] x86/kvm: Enable Secure Memory Encryption of nested page tables
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v1 12/18] x86: Access device tree in the clear
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v1 06/18] x86: Provide general kernel support for memory encryption
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v1 03/18] x86: Secure Memory Encryption (SME) support
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v1 02/18] x86: Secure Memory Encryption (SME) build enablement
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v1 01/18] x86: Set the write-protect cache mode for AMD processors
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v1 00/18] x86: Secure Memory Encryption (AMD)
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v1 06/18] x86: Provide general kernel support for memory encryption
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v1 09/18] x86: Insure that memory areas are encrypted when possible
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v1 10/18] x86/efi: Access EFI related tables in the clear
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v1 07/18] x86: Extend the early_memmap support with additional attrs
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [RFC PATCH v1 03/18] x86: Secure Memory Encryption (SME) support
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH] block: partitions: efi: Always check for alternative GPT at end of drive
- From: Gwendal Grignou <gwendal@xxxxxxxxxxxx>
- Re: [PATCH] block: partitions: efi: Always check for alternative GPT at end of drive
- From: Davidlohr Bueso <dave@xxxxxxxxxxxx>
- RE: [PATCH] block: partitions: efi: Always check for alternative GPT at end of drive
- From: "Elliott, Robert (Persistent Memory)" <elliott@xxxxxxx>
- Re: [PATCH] block: partitions: efi: Always check for alternative GPT at end of drive
- From: Julius Werner <jwerner@xxxxxxxxxxxx>
- Re: [PATCH] block: partitions: efi: Always check for alternative GPT at end of drive
- From: "Austin S. Hemmelgarn" <ahferroin7@xxxxxxxxx>
- Re: [PATCH] block: partitions: efi: Always check for alternative GPT at end of drive
- From: Davidlohr Bueso <dave@xxxxxxxxxxxx>
- Re: [PATCH] block: partitions: efi: Always check for alternative GPT at end of drive
- From: Davidlohr Bueso <dave@xxxxxxxxxxxx>
- Re: [PATCH] block: partitions: efi: Always check for alternative GPT at end of drive
- From: "Austin S. Hemmelgarn" <ahferroin7@xxxxxxxxx>
- Re: [PATCH v2 0/6] arm64/ARM pt dumper changes
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 0/6] arm64/ARM pt dumper changes
- From: Will Deacon <will.deacon@xxxxxxx>
- Re: [PATCH] block: partitions: efi: Always check for alternative GPT at end of drive
- From: Karel Zak <kzak@xxxxxxxxxx>
- [PATCH] block: partitions: efi: Always check for alternative GPT at end of drive
- From: Julius Werner <jwerner@xxxxxxxxxxxx>
- [PATCH 02/40] efi/arm*: Drop writable mapping of the UEFI System table
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 03/40] x86/mm/pat: Document the (currently) EFI-only code path
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [GIT PULL 00/40] EFI changes for v4.7
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 05/40] efi/arm64: Check SetupMode when determining Secure Boot status
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 06/40] efi: Iterate over efi.memmap in for_each_efi_memory_desc
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 08/40] efi: Check EFI_MEMORY_DESCRIPTOR version explicitly
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 09/40] efi/arm*: Use memremap() to create the persistent memmap mapping
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 07/40] efi: Remove global 'memmap'
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 10/40] ARM: efi: Apply strict permissons for UEFI Runtime Services regions
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 12/40] efi: Add support for the EFI_MEMORY_ATTRIBUTES_TABLE config table
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 14/40] efi/arm*: Take the Memory Attributes table into account
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 13/40] efi: Implement generic support for the Memory Attributes table
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 15/40] x86/efi: Remove the always true EFI_DEBUG symbol
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 16/40] x86/efi: Prepare GOP handling code for reuse as generic code
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 19/40] efifb: Use builtin_platform_driver and drop unused includes
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 18/40] x86/efi: efifb: Move DMI based quirks handling out of generic code
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 17/40] efi/libstub: Move Graphics Output Protocol handling to generic code
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 21/40] efi/arm: libstub: Make screen_info accessible to the UEFI stub
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 20/40] arm64/efi: libstub: Make screen_info accessible to the UEFI stub
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 22/40] efi/arm*: libstub: Wire up GOP protocol to struct screen_info
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 24/40] efifb: Enable the efi-framebuffer platform driver for ARM and arm64
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 23/40] efi/arm*: Wire up struct screen_info to efi-framebuffer platform device
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 26/40] efi: Move efi_status_to_err() to drivers/firmware/efi/
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 27/40] efi: Capsule update support
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 29/40] efi: A misc char interface to update EFI firmware
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 30/40] efi/arm-init: Reserve rather than unmap the memory map for ARM as well
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 28/40] x86/efi: Force EFI reboot to process pending capsules
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 31/40] efi/runtime-wrappers: Add {__,}efi_call_virt templates
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 25/40] efibc: EFI Bootloader Control
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 32/40] arm64/efi: Move to generic {__,}efi_call_virt
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 34/40] x86/efi: Move to generic {__,}efi_call_virt
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 35/40] efi/runtime-wrappers: Remove redundant ifdefs
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 33/40] arm/efi: Move to generic {__,}efi_call_virt
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 37/40] arm64/efi: Enable runtime call flag checking
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 40/40] efi/runtime-wrappers: Remove ARCH_EFI_IRQ_FLAGS_MASK ifdef
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 38/40] arm/efi: Enable runtime call flag checking
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 39/40] x86/efi: Enable runtime call flag checking
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 36/40] efi/runtime-wrappers: Detect firmware irq flag corruption
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 11/40] arm64: efi: Apply strict permissons for UEFI Runtime Services regions
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 04/40] efi/arm64: Report unexpected errors when determining Secure Boot status
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH 01/40] efi: Get rid of EFI_SYSTEM_TABLES status bit
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCHv3 1/5] efi/runtime-wrappers: detect FW irq flag corruption
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCHv3 0/5] efi: detect erroneous firmware IRQ manipulation
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCHv3 1/5] efi/runtime-wrappers: detect FW irq flag corruption
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] EFI urgent fix
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCHv3 1/5] efi/runtime-wrappers: detect FW irq flag corruption
- From: Robin Murphy <robin.murphy@xxxxxxx>
- Re: [PATCHv3 1/5] efi/runtime-wrappers: detect FW irq flag corruption
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCHv3 1/5] efi/runtime-wrappers: detect FW irq flag corruption
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCHv3 1/5] efi/runtime-wrappers: detect FW irq flag corruption
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCHv3 1/5] efi/runtime-wrappers: detect FW irq flag corruption
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCHv3 1/5] efi/runtime-wrappers: detect FW irq flag corruption
- From: Robin Murphy <robin.murphy@xxxxxxx>
- Re: [PATCHv3 2/5] arm64/efi: enable runtime call flag checking
- From: Will Deacon <will.deacon@xxxxxxx>
- [PATCHv3 1/5] efi/runtime-wrappers: detect FW irq flag corruption
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [PATCHv3 2/5] arm64/efi: enable runtime call flag checking
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [PATCHv3 3/5] arm/efi: enable runtime call flag checking
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [PATCHv3 5/5] efi/runtime-wrappers: remove ARCH_EFI_IRQ_FLAGS_MASK ifdef
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [PATCHv3 4/5] x86/efi: enable runtime call flag checking
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [PATCHv3 0/5] efi: detect erroneous firmware IRQ manipulation
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH] efibc: EFI Bootloader Control
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH] efi: Fix out-of-bounds read in variable_matches()
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [GIT PULL] EFI urgent fix
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 6/6] efi/arm*: add support to dump the EFI page tables
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCHv2 0/6] efi: detect erroneous firmware IRQ manipulation
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/6] arm64: mm: dump: make page table dumping reusable
- From: Will Deacon <will.deacon@xxxxxxx>
- Re: [PATCHv2 0/6] efi: detect erroneous firmware IRQ manipulation
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCHv2 0/6] efi: detect erroneous firmware IRQ manipulation
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCHv2 0/6] efi: detect erroneous firmware IRQ manipulation
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCHv2 0/6] efi: detect erroneous firmware IRQ manipulation
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCHv2 0/6] efi: detect erroneous firmware IRQ manipulation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] lib: Always NUL terminate ucs2_as_utf8
- From: Laszlo Ersek <lersek@xxxxxxxxxx>
- Re: [PATCH v11 12/17] ARM64: ACPI: Check if it runs on Xen to enable or disable ACPI
- From: Stefano Stabellini <sstabellini@xxxxxxxxxx>
- Re: [PATCHv2 0/6] efi: detect erroneous firmware IRQ manipulation
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] efi/arm-init: reserve rather than unmap the memory map for ARM as well
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCHv2 0/6] efi: detect erroneous firmware IRQ manipulation
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCHv2 6/6] efi/runtime-wrappers: detect FW irq flag corruption
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCHv2 1/6] efi/runtime-wrappers: add {__,}efi_call_virt templates
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] efi/arm-init: reserve rather than unmap the memory map for ARM as well
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] PCI: Add Broadcom 4331 reset quirk to prevent IRQ storm
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH] efibc: EFI Bootloader Control
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] efibc: EFI Bootloader Control
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] EFI framebuffer support for ARM and arm64
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] lib: Always NUL terminate ucs2_as_utf8
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 6/6] efi/arm*: add support to dump the EFI page tables
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v2 6/6] efi/arm*: add support to dump the EFI page tables
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 2/6] arm64: ptdump: add region marker for kasan shadow region
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v2 1/6] arm64: ptdump: use static initializers for vmemmap region boundaries
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v2 6/6] efi/arm*: add support to dump the EFI page tables
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [PATCH v2 2/6] arm64: ptdump: add region marker for kasan shadow region
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 6/6] efi/arm*: add support to dump the EFI page tables
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 5/6] arm: mm: dump: make page table dumping reusable
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 4/6] arm64: mm: dump: make page table dumping reusable
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 3/6] arm64: ptdump: fold string literals into address_markers[] and pte_bits[]
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 1/6] arm64: ptdump: use static initializers for vmemmap region boundaries
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 0/6] arm64/ARM pt dumper changes
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCHv2 0/6] efi: detect erroneous firmware IRQ manipulation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCHv2 1/6] efi/runtime-wrappers: add {__,}efi_call_virt templates
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [PATCHv2 2/6] arm64/efi: move to generic {__,}efi_call_virt
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [PATCHv2 3/6] arm/efi: move to generic {__,}efi_call_virt
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [PATCHv2 4/6] x86/efi: move to generic {__,}efi_call_virt
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [PATCHv2 5/6] efi/runtime-wrappers: remove redundant ifdefs
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [PATCHv2 6/6] efi/runtime-wrappers: detect FW irq flag corruption
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [PATCHv2 0/6] efi: detect erroneous firmware IRQ manipulation
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v11 15/17] ARM64: XEN: Add a function to initialize Xen specific UEFI runtime services
- From: Stefano Stabellini <sstabellini@xxxxxxxxxx>
- Re: [PATCH v11 15/17] ARM64: XEN: Add a function to initialize Xen specific UEFI runtime services
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v11 12/17] ARM64: ACPI: Check if it runs on Xen to enable or disable ACPI
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v11 11/17] ARM: XEN: Move xen_early_init() before efi_init()
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v11 12/17] ARM64: ACPI: Check if it runs on Xen to enable or disable ACPI
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH 3/3] efi: replace runtime services spinlock with semaphore
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 3/3] efi: replace runtime services spinlock with semaphore
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 2/3] efi: don't use spinlocks for efi vars
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 1/3] efi: use a file local lock for efivars
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 0/3] efi interruptible runtime services
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH v2 05/10] i2c: add support for ACPI reconfigure notifications
- From: Octavian Purdila <octavian.purdila@xxxxxxxxx>
- Re: [RFC PATCH v2 05/10] i2c: add support for ACPI reconfigure notifications
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCHv2 5/5] efi/runtime-wrappers: detect FW irq flag corruption
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCHv2 5/5] efi/runtime-wrappers: detect FW irq flag corruption
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCHv2 2/5] arm64/efi: move to generic {__,}efi_call_virt
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCHv2 2/5] arm64/efi: move to generic {__,}efi_call_virt
- From: Will Deacon <will.deacon@xxxxxxx>
- Re: [PATCH] lib: Always NUL terminate ucs2_as_utf8
- From: Laszlo Ersek <lersek@xxxxxxxxxx>
- Re: [PATCH] lib: Always NUL terminate ucs2_as_utf8
- From: Peter Jones <pjones@xxxxxxxxxx>
- Re: [PATCHv2 1/5] efi/runtime-wrappers: add {__,}efi_call_virt templates
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [PATCH] efivarfs: merge boolean flag arguments
- From: Julia Lawall <Julia.Lawall@xxxxxxx>
- Re: [PATCHv2 1/5] efi/runtime-wrappers: add {__,}efi_call_virt templates
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCHv2 0/5] efi: detect erroneous firmware IRQ manipulation
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH] x86/efi: Remove the always true EFI_DEBUG symbol
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86/efi: Remove the always true EFI_DEBUG symbol
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] lib: Always NUL terminate ucs2_as_utf8
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCHv2 0/5] efi: detect erroneous firmware IRQ manipulation
- From: Leif Lindholm <leif.lindholm@xxxxxxxxxx>
- Re: [PATCHv2 1/5] efi/runtime-wrappers: add {__,}efi_call_virt templates
- From: Leif Lindholm <leif.lindholm@xxxxxxxxxx>
- [PATCHv2 2/5] arm64/efi: move to generic {__,}efi_call_virt
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [PATCHv2 3/5] arm/efi: move to generic {__,}efi_call_virt
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [PATCHv2 5/5] efi/runtime-wrappers: detect FW irq flag corruption
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [PATCHv2 4/5] x86/efi: move to generic {__,}efi_call_virt
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [PATCHv2 1/5] efi/runtime-wrappers: add {__,}efi_call_virt templates
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [PATCHv2 0/5] efi: detect erroneous firmware IRQ manipulation
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [PATCH] x86/efi: Remove the always true EFI_DEBUG symbol
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH][v6] ACPI / PM: Introduce efi poweroff for HW-full platforms without _S5
- From: "Rafael J. Wysocki" <rjw@xxxxxxxxxxxxx>
- Re: [PATCH V2 6/9] acpi: apei: handle SEA notification type for ARMv8
- From: "Baicar, Tyler" <tbaicar@xxxxxxxxxxxxxx>
- Re: [PATCH V2 2/9] ras: acpi/apei: cper: generic error data entry v3 per ACPI 6.1
- From: "Baicar, Tyler" <tbaicar@xxxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] EFI framebuffer support for ARM and arm64
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxxxx>
- [PATCH] efi/arm-init: reserve rather than unmap the memory map for ARM as well
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [Intel-gfx] [PATCH] lib: Always NUL terminate ucs2_as_utf8
- From: Jani Nikula <jani.nikula@xxxxxxxxxxxxxxx>
- Re: [PATCH] lib: Always NUL terminate ucs2_as_utf8
- From: Laszlo Ersek <lersek@xxxxxxxxxx>
- Re: [PATCH v3 0/9] EFI framebuffer support for ARM and arm64
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] lib: Always NUL terminate ucs2_as_utf8
- From: Laszlo Ersek <lersek@xxxxxxxxxx>
- Re: [PATCH] lib: Always NUL terminate ucs2_as_utf8
- From: Chris Wilson <chris@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v11 01/17] Xen: ACPI: Hide UART used by Xen
- From: Stefano Stabellini <sstabellini@xxxxxxxxxx>
- Re: [PATCH] lib: Always NUL terminate ucs2_as_utf8
- From: Laszlo Ersek <lersek@xxxxxxxxxx>
- Re: [PATCH v11 12/17] ARM64: ACPI: Check if it runs on Xen to enable or disable ACPI
- From: Stefano Stabellini <sstabellini@xxxxxxxxxx>
- [PATCH] lib: Always NUL terminate ucs2_as_utf8
- From: Chris Wilson <chris@xxxxxxxxxxxxxxxxxx>
- [RFC PATCH v2 01/10] kernel: add TAINT_OVERLAY_ACPI_TABLE
- From: Octavian Purdila <octavian.purdila@xxxxxxxxx>
- [RFC PATCH v2 02/10] acpi: decouple initrd table install from CONFIG_ACPI_INITRD_TABLE_OVERRIDE
- From: Octavian Purdila <octavian.purdila@xxxxxxxxx>
- [RFC PATCH v2 03/10] acpi: fix enumeration (visited) flags for bus rescans
- From: Octavian Purdila <octavian.purdila@xxxxxxxxx>
- [RFC PATCH v2 04/10] acpi: add support for ACPI reconfiguration notifiers
- From: Octavian Purdila <octavian.purdila@xxxxxxxxx>
- [RFC PATCH v2 05/10] i2c: add support for ACPI reconfigure notifications
- From: Octavian Purdila <octavian.purdila@xxxxxxxxx>
- [RFC PATCH v2 06/10] spi: add support for ACPI reconfigure notifications
- From: Octavian Purdila <octavian.purdila@xxxxxxxxx>
- [RFC PATCH v2 07/10] efi: load SSTDs from EFI variables
- From: Octavian Purdila <octavian.purdila@xxxxxxxxx>
- [RFC PATCH v2 08/10] acpi: add support for configfs
- From: Octavian Purdila <octavian.purdila@xxxxxxxxx>
[Index of Archives]
[Linux Kernel Development]
[Security]
[Linux ARM Kernel]
[Tools]
[Linux MIPS]
[Linux S390]
[Bugtraq]
[Share Photos]>
[Fedora ARM]