Linux EFI/UEFI Development
[Prev Page][Next Page]
- Re: [PATCH v7 14/22] x86/decompressor: Merge trampoline cleanup with switching code
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v7 14/22] x86/decompressor: Merge trampoline cleanup with switching code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v7 14/22] x86/decompressor: Merge trampoline cleanup with switching code
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v7 14/22] x86/decompressor: Merge trampoline cleanup with switching code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v7 14/22] x86/decompressor: Merge trampoline cleanup with switching code
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v7 12/22] x86/decompressor: Call trampoline directly from C code
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v7 12/22] x86/decompressor: Call trampoline directly from C code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v7 12/22] x86/decompressor: Call trampoline directly from C code
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v7 02/22] x86/head_64: Store boot_params pointer in callee save register
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v7 11/22] x86/decompressor: Avoid the need for a stack in the 32-bit trampoline
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v7 3/5] efi: Add tee-based EFI variable driver
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v7 10/22] x86/decompressor: Use standard calling convention for trampoline
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v7 10/22] x86/decompressor: Use standard calling convention for trampoline
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH -next] efi: memmap: Remove kernel-doc warnings
- From: Zhu Wang <wangzhu9@xxxxxxxxxx>
- Re: [PATCH v7 01/22] x86/decompressor: Don't rely on upper 32 bits of GPRs being preserved
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v7 01/22] x86/decompressor: Don't rely on upper 32 bits of GPRs being preserved
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v7 01/22] x86/decompressor: Don't rely on upper 32 bits of GPRs being preserved
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH v7 3/5] efi: Add tee-based EFI variable driver
- From: Masahisa Kojima <masahisa.kojima@xxxxxxxxxx>
- [PATCH v7 4/5] efivarfs: automatically update super block flag
- From: Masahisa Kojima <masahisa.kojima@xxxxxxxxxx>
- [PATCH v7 5/5] efivarfs: force RO when remounting if SetVariable is not supported
- From: Masahisa Kojima <masahisa.kojima@xxxxxxxxxx>
- [PATCH v7 2/5] efi: Add EFI_ACCESS_DENIED status code
- From: Masahisa Kojima <masahisa.kojima@xxxxxxxxxx>
- [PATCH v7 1/5] efi: expose efivar generic ops register function
- From: Masahisa Kojima <masahisa.kojima@xxxxxxxxxx>
- Re: [PATCH v2] x86/kexec: Add EFI config table identity mapping for kexec kernel
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH v7 22/22] x86/efistub: Avoid legacy decompressor when doing EFI boot
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v7 20/22] efi/libstub: Add limit argument to efi_random_alloc()
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v7 21/22] x86/efistub: Perform SNP feature test while running in the firmware
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v7 19/22] x86/decompressor: Factor out kernel decompression and relocation
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v7 18/22] x86/decompressor: Move global symbol references to C code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v7 09/22] x86/decompressor: Call trampoline as a normal function
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v7 10/22] x86/decompressor: Use standard calling convention for trampoline
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v7 17/22] decompress: Use 8 byte alignment
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v7 16/22] x86/efistub: Prefer EFI memory attributes protocol over DXE services
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v7 14/22] x86/decompressor: Merge trampoline cleanup with switching code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v7 15/22] x86/efistub: Perform 4/5 level paging switch from the stub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v7 12/22] x86/decompressor: Call trampoline directly from C code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v7 00/22] efi/x86: Avoid bare metal decompressor during EFI boot
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v7 04/22] x86/efistub: Simplify and clean up handover entry code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v7 03/22] x86/efistub: Branch straight to kernel entry point from C code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v7 08/22] x86/decompressor: Store boot_params pointer in callee save register
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v7 11/22] x86/decompressor: Avoid the need for a stack in the 32-bit trampoline
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v7 06/22] x86/efistub: Clear BSS in EFI handover protocol entrypoint
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v7 13/22] x86/decompressor: Only call the trampoline when changing paging levels
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v7 07/22] x86/decompressor: Use proper sequence to take the address of the GOT
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v7 02/22] x86/head_64: Store boot_params pointer in callee save register
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v7 01/22] x86/decompressor: Don't rely on upper 32 bits of GPRs being preserved
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v7 05/22] x86/decompressor: Avoid magic offsets for EFI handover entrypoint
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2] x86/kexec: Add EFI config table identity mapping for kexec kernel
- From: Tao Liu <ltao@xxxxxxxxxx>
- Re: [PATCH v2] x86/kexec: Add EFI config table identity mapping for kexec kernel
- From: Tao Liu <ltao@xxxxxxxxxx>
- Re: [PATCH v6 4/4] efivarfs: automatically update super block flag
- From: Masahisa Kojima <masahisa.kojima@xxxxxxxxxx>
- Re: [PATCH v6 4/4] efivarfs: automatically update super block flag
- From: Masahisa Kojima <masahisa.kojima@xxxxxxxxxx>
- [PATCH -next] efi: Remove unused extern declaration efi_lookup_mapped_addr()
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- Re: [PATCH v6 2/5] riscv: Dump out kernel offset information on panic
- From: Conor Dooley <conor.dooley@xxxxxxxxxxxxx>
- Re: [PATCH v6 0/5] riscv: Introduce KASLR
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- Re: [PATCH v6 2/5] riscv: Dump out kernel offset information on panic
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- Re: [PATCH v6 0/5] riscv: Introduce KASLR
- From: Conor Dooley <conor.dooley@xxxxxxxxxxxxx>
- Re: [PATCH v6 2/5] riscv: Dump out kernel offset information on panic
- From: Conor Dooley <conor.dooley@xxxxxxxxxxxxx>
- Re: [PATCH v6 3/5] arm64: libstub: Move KASLR handling functions to kaslr.c
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 1/9] vgacon: rework Kconfig dependencies
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH v6 4/4] efivarfs: automatically update super block flag
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH mm-hotfixes] mm/pagewalk: fix EFI_PGT_DUMP of espfix area
- From: Mikhail Gavrilov <mikhail.v.gavrilov@xxxxxxxxx>
- Re: [PATCH AUTOSEL 6.4 1/4] efivarfs: expose used and total size
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v6 4/4] efivarfs: automatically update super block flag
- From: Masahisa Kojima <masahisa.kojima@xxxxxxxxxx>
- [PATCH AUTOSEL 6.1 1/3] efivarfs: expose used and total size
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.4 1/4] efivarfs: expose used and total size
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH mm-hotfixes] mm/pagewalk: fix EFI_PGT_DUMP of espfix area
- From: Hugh Dickins <hughd@xxxxxxxxxx>
- [PATCH v6 5/5] riscv: libstub: Implement KASLR by using generic functions
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH v6 4/5] libstub: Fix compilation warning for rv32
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH v6 3/5] arm64: libstub: Move KASLR handling functions to kaslr.c
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH v6 2/5] riscv: Dump out kernel offset information on panic
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH v6 1/5] riscv: Introduce virtual kernel mapping KASLR
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH v6 0/5] riscv: Introduce KASLR
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- Re: [PATCH v5 3/5] arm64: libstub: Move KASLR handling functions to kaslr.c
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- Re: [PATCH v5 3/5] arm64: libstub: Move KASLR handling functions to kaslr.c
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v5 3/5] arm64: libstub: Move KASLR handling functions to kaslr.c
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v5 3/5] arm64: libstub: Move KASLR handling functions to kaslr.c
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [RFC PATCH v2] x86/boot: add .sbat section to the bzImage
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2] x86/boot: add .sbat section to the bzImage
- From: Luca Boccassi <bluca@xxxxxxxxxx>
- Re: [RFC PATCH v2] x86/boot: add .sbat section to the bzImage
- From: Luca Boccassi <bluca@xxxxxxxxxx>
- Re: [PATCH v5 4/5] libstub: Fix compilation warning for rv32
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v5 3/5] arm64: libstub: Move KASLR handling functions to kaslr.c
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH v2] x86/boot: add .sbat section to the bzImage
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2] x86/boot: add .sbat section to the bzImage
- From: Luca Boccassi <bluca@xxxxxxxxxx>
- Re: [RFC PATCH v2] x86/boot: add .sbat section to the bzImage
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2] x86/boot: add .sbat section to the bzImage
- From: Luca Boccassi <bluca@xxxxxxxxxx>
- Re: [RFC PATCH v2] x86/boot: add .sbat section to the bzImage
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2] x86/boot: add .sbat section to the bzImage
- From: Luca Boccassi <bluca@xxxxxxxxxx>
- Re: [PATCH v2 1/9] vgacon: rework Kconfig dependencies
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- [PATCH v5 5/5] riscv: libstub: Implement KASLR by using generic functions
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH v5 4/5] libstub: Fix compilation warning for rv32
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH v5 3/5] arm64: libstub: Move KASLR handling functions to kaslr.c
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH v5 2/5] riscv: Dump out kernel offset information on panic
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH v5 1/5] riscv: Introduce virtual kernel mapping KASLR
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH v5 0/5] riscv: Introduce KASLR
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- Re: [PATCH v2 1/9] vgacon: rework Kconfig dependencies
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2] x86/boot: add .sbat section to the bzImage
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v2 1/9] vgacon: rework Kconfig dependencies
- From: Khalid Aziz <khalid@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2] x86/boot: add .sbat section to the bzImage
- From: Luca Boccassi <bluca@xxxxxxxxxx>
- Re: [PATCH v2 2/9] vgacon: rework screen_info #ifdef checks
- From: Khalid Aziz <khalid@xxxxxxxxxxxxxx>
- Re: [PATCH v2 6/9] vgacon: clean up global screen_info instances
- From: Khalid Aziz <khalid@xxxxxxxxxxxxxx>
- Re: [PATCH v2 5/9] vgacon: remove screen_info dependency
- From: Khalid Aziz <khalid@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2] x86/boot: add .sbat section to the bzImage
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [RFC PATCH v2] x86/boot: add .sbat section to the bzImage
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2] x86/boot: add .sbat section to the bzImage
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v2 0/9] video: screen_info cleanups
- From: Helge Deller <deller@xxxxxx>
- Re: [PATCH v2 5/9] vgacon: remove screen_info dependency
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH v2 9/9] efi: move screen_info into efi init code
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH v2 8/9] hyperv: avoid dependency on screen_info
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH v2 7/9] vga16fb: drop powerpc support
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH v2 6/9] vgacon: clean up global screen_info instances
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH v2 5/9] vgacon: remove screen_info dependency
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH v2 5/9] vgacon: remove screen_info dependency
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH v2 4/9] vgacon, arch/*: remove unused screen_info definitions
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH v2 9/9] efi: move screen_info into efi init code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 9/9] efi: move screen_info into efi init code
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH v2 8/9] hyperv: avoid dependency on screen_info
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH v2 7/9] vga16fb: drop powerpc support
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH v2 6/9] vgacon: clean up global screen_info instances
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH v2 5/9] vgacon: remove screen_info dependency
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH v2 4/9] vgacon, arch/*: remove unused screen_info definitions
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH v2 3/9] dummycon: limit Arm console size hack to footbridge
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH v2 2/9] vgacon: rework screen_info #ifdef checks
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH v2 1/9] vgacon: rework Kconfig dependencies
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH v2 0/9] video: screen_info cleanups
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCH 07/12] arch/x86: Declare edid_info in <asm/screen_info.h>
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH v6 01/21] x86/head_64: Store boot_params pointer in callee save register
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH v2] x86/boot: add .sbat section to the bzImage
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- Re: [RFC PATCH v2] x86/boot: add .sbat section to the bzImage
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2] x86/boot: add .sbat section to the bzImage
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- Re: [RFC PATCH v2] x86/boot: add .sbat section to the bzImage
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] x86/kexec: Add EFI config table identity mapping for kexec kernel
- From: Tao Liu <ltao@xxxxxxxxxx>
- Re: [PATCH v2] x86/kexec: Add EFI config table identity mapping for kexec kernel
- From: Tao Liu <ltao@xxxxxxxxxx>
- Re: [PATCH v2] x86/kexec: Add EFI config table identity mapping for kexec kernel
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2] x86/kexec: Add EFI config table identity mapping for kexec kernel
- From: Tao Liu <ltao@xxxxxxxxxx>
- Re: [PATCH v2] x86/kexec: Add EFI config table identity mapping for kexec kernel
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2] x86/kexec: Add EFI config table identity mapping for kexec kernel
- From: Tao Liu <ltao@xxxxxxxxxx>
- Re: [RFC PATCH v2] x86/boot: add .sbat section to the bzImage
- From: Luca Boccassi <bluca@xxxxxxxxxx>
- Re: [RFC PATCH v2] x86/boot: add .sbat section to the bzImage
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH v2] x86/boot: add .sbat section to the bzImage
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [RFC PATCH v2] x86/boot: add .sbat section to the bzImage
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH v2] x86/boot: add .sbat section to the bzImage
- From: Luca Boccassi <bluca@xxxxxxxxxx>
- Re: [RFC PATCH v2] x86/boot: add .sbat section to the bzImage
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- [PATCH RESEND v4 5/5] riscv: libstub: Implement KASLR by using generic functions
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH RESEND v4 4/5] libstub: Fix compilation warning for rv32
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH RESEND v4 3/5] arm64: libstub: Move KASLR handling functions to efi-stub-helper.c
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH RESEND v4 2/5] riscv: Dump out kernel offset information on panic
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH RESEND v4 1/5] riscv: Introduce virtual kernel mapping KASLR
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH RESEND v4 0/5] riscv: Introduce KASLR
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- Re: [PATCH v4 3/5] arm64: libstub: Move KASLR handling functions to efi-stub-helper.c
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- Re: [PATCH v4 3/5] arm64: libstub: Move KASLR handling functions to efi-stub-helper.c
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH v2] x86/boot: add .sbat section to the bzImage
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v4 3/5] arm64: libstub: Move KASLR handling functions to efi-stub-helper.c
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH v4 2/5] riscv: Dump out kernel offset information on panic
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH v4 1/5] riscv: Introduce virtual kernel mapping KASLR
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH v4 0/5] riscv: Introduce KASLR
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- Re: [PATCH v2] x86/kexec: Add EFI config table identity mapping for kexec kernel
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2] x86/kexec: Add EFI config table identity mapping for kexec kernel
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 01/79] fs: add ctime accessors infrastructure
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCHv14 5/9] efi: Add unaccepted memory support
- From: Mel Gorman <mgorman@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 21/21] x86/efistub: Avoid legacy decompressor when doing EFI boot
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v6 20/21] x86/efistub: Perform SNP feature test while running in the firmware
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v6 19/21] efi/libstub: Add limit argument to efi_random_alloc()
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v6 18/21] x86/decompressor: Factor out kernel decompression and relocation
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v6 16/21] decompress: Use 8 byte alignment
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v6 17/21] x86/decompressor: Move global symbol references to C code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v6 15/21] x86/efistub: Prefer EFI memory attributes protocol over DXE services
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v6 14/21] x86/efistub: Perform 4/5 level paging switch from the stub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v6 09/21] x86/decompressor: Use standard calling convention for trampoline
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v6 13/21] x86/decompressor: Merge trampoline cleanup with switching code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v6 11/21] x86/decompressor: Call trampoline directly from C code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v6 10/21] x86/decompressor: Avoid the need for a stack in the 32-bit trampoline
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v6 12/21] x86/decompressor: Only call the trampoline when changing paging levels
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v6 07/21] x86/decompressor: Store boot_params pointer in callee save register
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v6 05/21] x86/efistub: Clear BSS in EFI handover protocol entrypoint
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v6 06/21] x86/decompressor: Use proper sequence to take the address of the GOT
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v6 08/21] x86/decompressor: Call trampoline as a normal function
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v6 04/21] x86/decompressor: Avoid magic offsets for EFI handover entrypoint
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v6 02/21] x86/efistub: Branch straight to kernel entry point from C code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v6 03/21] x86/efistub: Simplify and clean up handover entry code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v6 01/21] x86/head_64: Store boot_params pointer in callee save register
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v6 00/21] efi/x86: Avoid bare metal decompressor during EFI boot
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v5 06/20] x86/decompressor: Store boot_params pointer in callee save register
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v5 06/20] x86/decompressor: Store boot_params pointer in callee save register
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] fbdev/hyperv_fb: Include <linux/screen_info.h>
- From: suijingfeng <suijingfeng@xxxxxxxxxxx>
- Re: [PATCH v2 00/89] fs: new accessors for inode->i_ctime
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [PATCH v2 00/89] fs: new accessors for inode->i_ctime
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v2 00/92] fs: new accessors for inode->i_ctime
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v5 06/20] x86/decompressor: Store boot_params pointer in callee save register
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] fbdev/hyperv_fb: Include <linux/screen_info.h>
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- [PATCH] fbdev/hyperv_fb: Include <linux/screen_info.h>
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- Re: [PATCH v6 04/14] x86: Secure Launch Resource Table header file
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] x86/kexec: Add EFI config table identity mapping for kexec kernel
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2] x86/kexec: Add EFI config table identity mapping for kexec kernel
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v2] x86/kexec: Add EFI config table identity mapping for kexec kernel
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v5 05/20] x86/decompressor: Use proper sequence to take the address of the GOT
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 00/89] fs: new accessors for inode->i_ctime
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [apparmor] [PATCH v2 08/92] fs: new helper: simple_rename_timestamp
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [RFC PATCH 1/1] libstub: zboot: Use -ffunction-sections + --gc-sections
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- Re: [PATCH v2] x86/kexec: Add EFI config table identity mapping for kexec kernel
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH 1/1] libstub: zboot: Use -ffunction-sections + --gc-sections
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH 1/1] libstub: zboot: Use -ffunction-sections + --gc-sections
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- Re: [PATCH v2] x86/kexec: Add EFI config table identity mapping for kexec kernel
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH v2] x86/kexec: Add EFI config table identity mapping for kexec kernel
- From: Joerg Roedel <jroedel@xxxxxxx>
- Re: [PATCH v2 4/4] staging/sm750fb: Do not include <linux/screen_info.h>
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH v2] x86/kexec: Add EFI config table identity mapping for kexec kernel
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH v2] x86/kexec: Add EFI config table identity mapping for kexec kernel
- From: Tao Liu <ltao@xxxxxxxxxx>
- Re: [PATCH v2] x86/kexec: Add EFI config table identity mapping for kexec kernel
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [apparmor] [PATCH v2 08/92] fs: new helper: simple_rename_timestamp
- From: Seth Arnold <seth.arnold@xxxxxxxxxxxxx>
- Re: [PATCH v2 00/89] fs: new accessors for inode->i_ctime
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- Re: [PATCH v2 00/89] fs: new accessors for inode->i_ctime
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [PATCH v2 92/92] fs: rename i_ctime field to __i_ctime
- From: Jan Kara <jack@xxxxxxx>
- Re: [PATCH v2 3/4] sysfb: Do not include <linux/screen_info.h> from sysfb header
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH v2 1/4] efi: Do not include <linux/screen_info.h> from EFI header
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH v2 2/4] fbdev/sm712fb: Do not include <linux/screen_info.h>
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH v2 37/92] efivarfs: convert to ctime accessor functions
- From: Jan Kara <jack@xxxxxxx>
- [PATCH v2 3/4] sysfb: Do not include <linux/screen_info.h> from sysfb header
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH v2 4/4] staging/sm750fb: Do not include <linux/screen_info.h>
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH v2 2/4] fbdev/sm712fb: Do not include <linux/screen_info.h>
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH v2 1/4] efi: Do not include <linux/screen_info.h> from EFI header
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH v2 0/4] Remove unnecessary includes of <linux/screen_info.h>
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- Re: [PATCH v2 08/92] fs: new helper: simple_rename_timestamp
- From: Jan Kara <jack@xxxxxxx>
- Re: [PATCH v2 08/92] fs: new helper: simple_rename_timestamp
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [PATCH v2 92/92] fs: rename i_ctime field to __i_ctime
- From: Damien Le Moal <dlemoal@xxxxxxxxxx>
- Re: [PATCH 7/9] gfs2: update ctime when quota is updated
- From: Andreas Grünbacher <andreas.gruenbacher@xxxxxxxxx>
- Re: [PATCH v2 08/92] fs: new helper: simple_rename_timestamp
- From: Damien Le Moal <dlemoal@xxxxxxxxxx>
- Re: [PATCH v2 07/92] fs: add ctime accessors infrastructure
- From: Damien Le Moal <dlemoal@xxxxxxxxxx>
- Re: [PATCH v2 00/89] fs: new accessors for inode->i_ctime
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [PATCH 7/9] gfs2: update ctime when quota is updated
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [PATCH 7/9] gfs2: update ctime when quota is updated
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v2 37/92] efivarfs: convert to ctime accessor functions
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- [PATCH v2 03/92] efivarfs: update ctime when mtime changes on a write
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- [PATCH v2 92/92] fs: rename i_ctime field to __i_ctime
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- [PATCH v2 08/92] fs: new helper: simple_rename_timestamp
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- [PATCH v2 07/92] fs: add ctime accessors infrastructure
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- [PATCH v2 00/89] fs: new accessors for inode->i_ctime
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [PATCH v2] x86/kexec: Add EFI config table identity mapping for kexec kernel
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 07/12] arch/x86: Declare edid_info in <asm/screen_info.h>
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- Re: [PATCH 10/12] fbdev/core: Use fb_is_primary_device() in fb_firmware_edid()
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [06/12] arch: Declare screen_info in <asm/screen_info.h>
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- Re: [01/12] efi: Do not include <linux/screen_info.h> from EFI header
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- Re: [PATCH 08/12] drivers/firmware: Remove trailing whitespaces
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [11/12] fbdev/core: Protect edid_info with CONFIG_ARCH_HAS_EDID_INFO
- From: Sui Jingfeng <suijingfeng@xxxxxxxxxxx>
- Re: [03/12] sysfb: Do not include <linux/screen_info.h> from sysfb header
- From: Sui Jingfeng <suijingfeng@xxxxxxxxxxx>
- Re: [01/12] efi: Do not include <linux/screen_info.h> from EFI header
- From: Sui Jingfeng <suijingfeng@xxxxxxxxxxx>
- Re: [08/12] drivers/firmware: Remove trailing whitespaces
- From: Sui Jingfeng <suijingfeng@xxxxxxxxxxx>
- Re: [05/12] arch: Remove trailing whitespaces
- From: Sui Jingfeng <suijingfeng@xxxxxxxxxxx>
- Re: [06/12] arch: Declare screen_info in <asm/screen_info.h>
- From: Sui Jingfeng <suijingfeng@xxxxxxxxxxx>
- Re: [PATCH 05/12] arch: Remove trailing whitespaces
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH 04/12] staging/sm750fb: Do not include <linux/screen_info.h>
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH 03/12] sysfb: Do not include <linux/screen_info.h> from sysfb header
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH 02/12] fbdev/sm712fb: Do not include <linux/screen_info.h>
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH 01/12] efi: Do not include <linux/screen_info.h> from EFI header
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCHv14 5/9] efi: Add unaccepted memory support
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCHv14 5/9] efi: Add unaccepted memory support
- From: Mel Gorman <mgorman@xxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] EFI updates for v6.5
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH 01/79] fs: add ctime accessors infrastructure
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH 00/79] fs: new accessors for inode->i_ctime
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH 07/12] arch/x86: Declare edid_info in <asm/screen_info.h>
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH 07/12] arch/x86: Declare edid_info in <asm/screen_info.h>
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [GIT PULL] EFI updates for v6.5
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: x86/efi: Make efi_set_virtual_address_map IBT safe
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: x86/efi: Make efi_set_virtual_address_map IBT safe
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- x86/efi: Make efi_set_virtual_address_map IBT safe
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH 00/12] arch,fbdev: Move screen_info into arch/
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH 00/12] arch,fbdev: Move screen_info into arch/
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH 00/12] arch,fbdev: Move screen_info into arch/
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- Re: [PATCH 00/12] arch,fbdev: Move screen_info into arch/
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH 07/12] arch/x86: Declare edid_info in <asm/screen_info.h>
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH 06/12] arch: Declare screen_info in <asm/screen_info.h>
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- Re: [PATCH 06/12] arch: Declare screen_info in <asm/screen_info.h>
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH 07/12] arch/x86: Declare edid_info in <asm/screen_info.h>
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- Re: [PATCH 06/12] arch: Declare screen_info in <asm/screen_info.h>
- From: WANG Xuerui <kernel@xxxxxxxxxx>
- Re: [PATCH 07/12] arch/x86: Declare edid_info in <asm/screen_info.h>
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- [PATCH 05/12] arch: Remove trailing whitespaces
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 07/12] arch/x86: Declare edid_info in <asm/screen_info.h>
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 11/12] fbdev/core: Protect edid_info with CONFIG_ARCH_HAS_EDID_INFO
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 09/12] drivers: Add dependencies on CONFIG_ARCH_HAS_SCREEN_INFO
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 12/12] fbdev/core: Define empty fb_firmware_edid() in <linux/fb.h>
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 10/12] fbdev/core: Use fb_is_primary_device() in fb_firmware_edid()
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 08/12] drivers/firmware: Remove trailing whitespaces
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 01/12] efi: Do not include <linux/screen_info.h> from EFI header
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 04/12] staging/sm750fb: Do not include <linux/screen_info.h>
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 06/12] arch: Declare screen_info in <asm/screen_info.h>
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 03/12] sysfb: Do not include <linux/screen_info.h> from sysfb header
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 02/12] fbdev/sm712fb: Do not include <linux/screen_info.h>
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 00/12] arch,fbdev: Move screen_info into arch/
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [efi:next] BUILD SUCCESS 2e28a798c3092ea42b968fa16ac835969d124898
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] efi/libstub: Disable PCI DMA before grabbing the EFI memory map
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi/libstub: Disable PCI DMA before grabbing the EFI memory map
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH] efi/libstub: Disable PCI DMA before grabbing the EFI memory map
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi/libstub: Disable PCI DMA before grabbing the EFI memory map
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH] efi/libstub: Disable PCI DMA before grabbing the EFI memory map
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi/libstub: Disable PCI DMA before grabbing the EFI memory map
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- [PATCH] efi/libstub: Disable PCI DMA before grabbing the EFI memory map
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [efi:next] BUILD SUCCESS 36e60c0bb7d29e755e58136f8531708932838f3d
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] efivarfs: Expose RandomSeed variable but with limited permissions
- From: Sami Korkalainen <sami.korkalainen@xxxxxxxxx>
- Re: [PATCH] efi: random: refresh random seed on modern EFI only
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] efivarfs: Expose RandomSeed variable but with limited permissions
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH] efivarfs: Expose RandomSeed variable but with limited permissions
- From: Sami Korkalainen <sami.korkalainen@xxxxxxxxx>
- [PATCH] efi: random: refresh random seed on modern EFI only
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH] efivarfs: Expose RandomSeed variable but with limited permissions
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH] efivarfs: Expose RandomSeed variable but with limited permissions
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efivarfs: Expose RandomSeed variable but with limited permissions
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] efivarfs: Expose RandomSeed variable but with limited permissions
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH] efivarfs: Expose RandomSeed variable but with limited permissions
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v5 05/20] x86/decompressor: Use proper sequence to take the address of the GOT
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 00/79] fs: new accessors for inode->i_ctime
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v6 4/4] efivarfs: automatically update super block flag
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH v6 4/4] efivarfs: automatically update super block flag
- From: Jan Kiszka <jan.kiszka@xxxxxxxxxxx>
- Re: [PATCH 01/79] fs: add ctime accessors infrastructure
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- [PATCH v6 4/4] efivarfs: automatically update super block flag
- From: Masahisa Kojima <masahisa.kojima@xxxxxxxxxx>
- [PATCH v6 3/4] efi: Add tee-based EFI variable driver
- From: Masahisa Kojima <masahisa.kojima@xxxxxxxxxx>
- [PATCH v6 1/4] efi: expose efivar generic ops register function
- From: Masahisa Kojima <masahisa.kojima@xxxxxxxxxx>
- [PATCH v6 2/4] efi: Add EFI_ACCESS_DENIED status code
- From: Masahisa Kojima <masahisa.kojima@xxxxxxxxxx>
- Re: [PATCH v3 0/5] riscv: Introduce KASLR
- From: Palmer Dabbelt <palmer@xxxxxxxxxxx>
- [PATCH 24/79] efivarfs: switch to new ctime accessors
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- [RFC PATCH 1/1] libstub: zboot: Use -ffunction-sections + --gc-sections
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [RFC PATCH 0/1] zboot: Garbage collect unused functions
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- Re: [PATCH v5 05/20] x86/decompressor: Use proper sequence to take the address of the GOT
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v6 04/14] x86: Secure Launch Resource Table header file
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 04/14] x86: Secure Launch Resource Table header file
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 02/14] Documentation/x86: Secure Launch kernel documentation
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 02/14] Documentation/x86: Secure Launch kernel documentation
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 02/14] Documentation/x86: Secure Launch kernel documentation
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] x86/kexec: Add EFI config table identity mapping for kexec kernel
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH v6 07/14] x86: Secure Launch kernel early boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: (subset) [PATCH v2 3/8] autofs: set ctime as well when mtime changes on a dir
- From: Ian Kent <raven@xxxxxxxxxx>
- Re: (subset) [PATCH v2 3/8] autofs: set ctime as well when mtime changes on a dir
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH 3/5] arm64: Fix dangling references to Documentation/arm64
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- [PATCH 3/5] arm64: Fix dangling references to Documentation/arm64
- From: Jonathan Corbet <corbet@xxxxxxx>
- Re: [PATCH v2 3/8] autofs: set ctime as well when mtime changes on a dir
- From: Ian Kent <raven@xxxxxxxxxx>
- Re: [PATCH v2 8/8] cifs: update the ctime on a partial page write
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [PATCH v2 8/8] cifs: update the ctime on a partial page write
- From: Tom Talpey <tom@xxxxxxxxxx>
- [PATCH v2 8/8] cifs: update the ctime on a partial page write
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- [PATCH v2 7/8] apparmor: update ctime whenever the mtime changes on an inode
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- [PATCH v2 3/8] autofs: set ctime as well when mtime changes on a dir
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- [PATCH v2 0/8] fs: add some missing ctime updates
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- [PATCH v2 2/8] usb: update the ctime as well when updating mtime after an ioctl
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- [PATCH v2 5/8] efivarfs: update ctime when mtime changes on a write
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- [PATCH v2 1/8] ibmvmc: update ctime in conjunction with mtime on write
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- [PATCH v2 6/8] exfat: ensure that ctime is updated whenever the mtime is
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- [PATCH v2 4/8] bfs: update ctime in addition to mtime when adding entries
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [PATCH 7/9] gfs2: update ctime when quota is updated
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [PATCH 7/9] gfs2: update ctime when quota is updated
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- Re: [PATCH 0/9] fs: add some missing ctime updates
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [PATCH 0/9] fs: add some missing ctime updates
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/9] usb: update the ctime as well when updating mtime after an ioctl
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 7/9] gfs2: update ctime when quota is updated
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- [PATCH 5/9] efivarfs: update ctime when mtime changes on a write
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- [PATCH 2/9] usb: update the ctime as well when updating mtime after an ioctl
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- [PATCH 8/9] apparmor: update ctime whenever the mtime changes on an inode
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- [PATCH 6/9] exfat: ensure that ctime is updated whenever the mtime is
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- [PATCH 3/9] autofs: set ctime as well when mtime changes on a dir
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- [PATCH 9/9] cifs: update the ctime on a partial page write
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- [PATCH 4/9] bfs: update ctime in addition to mtime when adding entries
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- [PATCH 0/9] fs: add some missing ctime updates
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- [PATCH 1/9] ibmvmc: update ctime in conjunction with mtime on write
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- [PATCH] efivarfs: force RO when remounting if SetVariable is not supported
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH v5 3/3] efi: Add tee-based EFI variable driver
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH v5 3/3] efi: Add tee-based EFI variable driver
- From: Jan Kiszka <jan.kiszka@xxxxxxxxxxx>
- Re: [PATCH v5 3/3] efi: Add tee-based EFI variable driver
- From: Jan Kiszka <jan.kiszka@xxxxxxxxxxx>
- Re: [PATCH v5 3/3] efi: Add tee-based EFI variable driver
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH v5 3/3] efi: Add tee-based EFI variable driver
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH v5 3/3] efi: Add tee-based EFI variable driver
- From: Jan Kiszka <jan.kiszka@xxxxxxxxxxx>
- Re: [PATCH v5 3/3] efi: Add tee-based EFI variable driver
- From: Jan Kiszka <jan.kiszka@xxxxxxxxxxx>
- Re: [PATCH v5 3/3] efi: Add tee-based EFI variable driver
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH v5 10/20] x86/decompressor: Call trampoline directly from C code
- From: Yunhong Jiang <yunhong.jiang@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 13/20] x86/efistub: Perform 4/5 level paging switch from the stub
- From: Yunhong Jiang <yunhong.jiang@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/3] efi: Add tee-based EFI variable driver
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [efi:next] BUILD SUCCESS d0a1865cf7e2211d9227592ef4141f4632e33908
- From: Philip Li <philip.li@xxxxxxxxx>
- Re: [efi:next] BUILD SUCCESS d0a1865cf7e2211d9227592ef4141f4632e33908
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [efi:next] BUILD SUCCESS d0a1865cf7e2211d9227592ef4141f4632e33908
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v5 10/20] x86/decompressor: Call trampoline directly from C code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2] x86/kexec: Add EFI config table identity mapping for kexec kernel
- From: Tao Liu <ltao@xxxxxxxxxx>
- Re: [PATCH v5 13/20] x86/efistub: Perform 4/5 level paging switch from the stub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v5 3/3] efi: Add tee-based EFI variable driver
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH v5 13/20] x86/efistub: Perform 4/5 level paging switch from the stub
- From: Yunhong Jiang <yunhong.jiang@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/5] arm64: libstub: Move KASLR handling functions to efi-stub-helper.c
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v5 13/20] x86/efistub: Perform 4/5 level paging switch from the stub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v5 13/20] x86/efistub: Perform 4/5 level paging switch from the stub
- From: Yunhong Jiang <yunhong.jiang@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 08/20] x86/decompressor: Use standard calling convention for trampoline
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v5 3/3] efi: Add tee-based EFI variable driver
- From: Jan Kiszka <jan.kiszka@xxxxxxxxxxx>
- Re: [PATCH v5 01/20] x86/efistub: Branch straight to kernel entry point from C code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v5 08/20] x86/decompressor: Use standard calling convention for trampoline
- From: Yunhong Jiang <yunhong.jiang@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 01/20] x86/efistub: Branch straight to kernel entry point from C code
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v5 3/3] efi: Add tee-based EFI variable driver
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH v5 10/20] x86/decompressor: Call trampoline directly from C code
- From: Yunhong Jiang <yunhong.jiang@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 19/20] x86/efistub: Perform SNP feature test while running in the firmware
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v5 3/3] efi: Add tee-based EFI variable driver
- From: Jan Kiszka <jan.kiszka@xxxxxxxxxxx>
- Re: [PATCH v5 3/3] efi: Add tee-based EFI variable driver
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH v5 19/20] x86/efistub: Perform SNP feature test while running in the firmware
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v5 3/3] efi: Add tee-based EFI variable driver
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH v5 19/20] x86/efistub: Perform SNP feature test while running in the firmware
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v5 3/3] efi: Add tee-based EFI variable driver
- From: Jan Kiszka <jan.kiszka@xxxxxxxxxxx>
- Re: [PATCH v5 3/3] efi: Add tee-based EFI variable driver
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v5 3/3] efi: Add tee-based EFI variable driver
- From: Jan Kiszka <jan.kiszka@xxxxxxxxxxx>
- Re: [PATCH v5 3/3] efi: Add tee-based EFI variable driver
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH v5 3/3] efi: Add tee-based EFI variable driver
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH v5 19/20] x86/efistub: Perform SNP feature test while running in the firmware
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v5 20/20] x86/efistub: Avoid legacy decompressor when doing EFI boot
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v5 18/20] efi/libstub: Add limit argument to efi_random_alloc()
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v5 16/20] x86/decompressor: Move global symbol references to C code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v5 17/20] x86/decompressor: Factor out kernel decompression and relocation
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v5 10/20] x86/decompressor: Call trampoline directly from C code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v5 12/20] x86/decompressor: Merge trampoline cleanup with switching code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v5 06/20] x86/decompressor: Store boot_params pointer in callee save register
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v5 11/20] x86/decompressor: Only call the trampoline when changing paging levels
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v5 07/20] x86/decompressor: Call trampoline as a normal function
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v5 09/20] x86/decompressor: Avoid the need for a stack in the 32-bit trampoline
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v5 15/20] decompress: Use 8 byte alignment
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v5 14/20] x86/efistub: Prefer EFI memory attributes protocol over DXE services
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v5 01/20] x86/efistub: Branch straight to kernel entry point from C code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v5 13/20] x86/efistub: Perform 4/5 level paging switch from the stub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v5 02/20] x86/efistub: Simplify and clean up handover entry code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v5 08/20] x86/decompressor: Use standard calling convention for trampoline
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v5 03/20] x86/decompressor: Avoid magic offsets for EFI handover entrypoint
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v5 05/20] x86/decompressor: Use proper sequence to take the address of the GOT
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v5 04/20] x86/efistub: Clear BSS in EFI handover protocol entrypoint
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v5 00/20] efi/x86: Avoid bare metal decompressor during EFI boot
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v5 3/3] efi: Add tee-based EFI variable driver
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH v5 3/3] efi: Add tee-based EFI variable driver
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH v3 3/5] arm64: libstub: Move KASLR handling functions to efi-stub-helper.c
- From: kernel test robot <lkp@xxxxxxxxx>
- [efi:next] BUILD SUCCESS 39c90699b3303fc25c0da077f37cc3bbd45c8f83
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCHv14 0/9] mm, x86/cc, efi: Implement support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH] efi/esrt: Allow ESRT access without CAP_SYS_ADMIN
- From: Peter Jones <pjones@xxxxxxxxxx>
- Re: [PATCHv14 0/9] mm, x86/cc, efi: Implement support for unaccepted memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCHv14 0/9] mm, x86/cc, efi: Implement support for unaccepted memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCHv14 7/9] x86/tdx: Make _tdx_hypercall() and __tdx_module_call() available in boot stub
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv14 9/9] x86/tdx: Add unaccepted memory support
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv14 6/9] efi/unaccepted: Avoid load_unaligned_zeropad() stepping into unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv14 8/9] x86/tdx: Refactor try_accept_one()
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv14 1/9] mm: Add support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv14 3/9] efi/libstub: Implement support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv14 2/9] efi/x86: Get full memory map in allocate_e820()
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv14 5/9] efi: Add unaccepted memory support
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv14 4/9] x86/boot/compressed: Handle unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv14 0/9] mm, x86/cc, efi: Implement support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCH v3 5/5] riscv: libstub: Implement KASLR by using generic functions
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH v3 4/5] libstub: Fix compilation warning for rv32
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH v3 3/5] arm64: libstub: Move KASLR handling functions to efi-stub-helper.c
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH v3 2/5] riscv: Dump out kernel offset information on panic
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH v3 1/5] riscv: Introduce virtual kernel mapping KASLR
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH v3 0/5] riscv: Introduce KASLR
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- Re: [PATCHv13 5/9] efi: Add unaccepted memory support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCHv13 5/9] efi: Add unaccepted memory support
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH v5 3/3] efi: Add tee-based EFI variable driver
- From: Jan Kiszka <jan.kiszka@xxxxxxxxxxx>
- Re: [PATCH v5 3/3] efi: Add tee-based EFI variable driver
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v5 3/3] efi: Add tee-based EFI variable driver
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v5 3/3] efi: Add tee-based EFI variable driver
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v5 3/3] efi: Add tee-based EFI variable driver
- From: Jan Kiszka <jan.kiszka@xxxxxxxxxxx>
- Re: [PATCHv13 9/9] x86/tdx: Add unaccepted memory support
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCHv13 5/9] efi: Add unaccepted memory support
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCHv13 9/9] x86/tdx: Add unaccepted memory support
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCHv13 5/9] efi: Add unaccepted memory support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCHv13 5/9] efi: Add unaccepted memory support
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCHv13 5/9] efi: Add unaccepted memory support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCHv13 4/9] x86/boot/compressed: Handle unaccepted memory
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- [efi:next] BUILD SUCCESS 13c21ab8038d00b4bcc69a46c5f7f1c95e5decce
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] efi: bump efistub version from 1.1 to 3.0 for VZLinuxBootLoader compatibility
- From: Akihiro Suda <suda.kyoto@xxxxxxxxx>
- [efi:next] BUILD SUCCESS 128d85761fe9ccd91ea685287c3472d09be6de29
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] efi: bump efistub version from 1.1 to 3.0 for VZLinuxBootLoader compatibility
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v4 20/21] x86/efistub: Perform SNP feature test while running in the firmware
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v4 20/21] x86/efistub: Perform SNP feature test while running in the firmware
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v4 20/21] x86/efistub: Perform SNP feature test while running in the firmware
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v4 20/21] x86/efistub: Perform SNP feature test while running in the firmware
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v4 20/21] x86/efistub: Perform SNP feature test while running in the firmware
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH] efi: bump efistub version from 1.1 to 3.0 for VZLinuxBootLoader compatibility
- From: Akihiro Suda <suda.kyoto@xxxxxxxxx>
- Re: [PATCHv13 4/9] x86/boot/compressed: Handle unaccepted memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCHv13 4/9] x86/boot/compressed: Handle unaccepted memory
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCHv13 4/9] x86/boot/compressed: Handle unaccepted memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCHv13 4/9] x86/boot/compressed: Handle unaccepted memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCHv13 4/9] x86/boot/compressed: Handle unaccepted memory
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCHv13 4/9] x86/boot/compressed: Handle unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCHv13 9/9] x86/tdx: Add unaccepted memory support
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCHv13 9/9] x86/tdx: Add unaccepted memory support
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCHv13 4/9] x86/boot/compressed: Handle unaccepted memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCHv13 9/9] x86/tdx: Add unaccepted memory support
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH] efi/esrt: Allow ESRT access without CAP_SYS_ADMIN
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCHv13 3/9] efi/libstub: Implement support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCHv13 3/9] efi/libstub: Implement support for unaccepted memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [GIT PULL] EFI fixes for v6.4 #1
- From: pr-tracker-bot@xxxxxxxxxx
- [PATCH v4 21/21] x86/efistub: Avoid legacy decompressor when doing EFI boot
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v4 19/21] efi/libstub: Add limit argument to efi_random_alloc()
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v4 20/21] x86/efistub: Perform SNP feature test while running in the firmware
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v4 17/21] x86/decompressor: Factor out kernel decompression and relocation
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v4 18/21] x86/head_64: Store boot_params pointer in callee-preserved register
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v4 16/21] x86/decompressor: Move global symbol references to C code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v4 15/21] decompress: Use 8 byte alignment
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v4 13/21] x86/efistub: Perform 4/5 level paging switch from the stub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v4 12/21] x86/decompressor: Merge trampoline cleanup with switching code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v4 14/21] x86/efistub: Prefer EFI memory attributes protocol over DXE services
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v4 11/21] x86/decompressor: Only call the trampoline when changing paging levels
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v4 10/21] x86/decompressor: Call trampoline directly from C code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v4 07/21] x86/decompressor: Call trampoline as a normal function
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v4 08/21] x86/decompressor: Use standard calling convention for trampoline
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v4 09/21] x86/decompressor: Avoid the need for a stack in the 32-bit trampoline
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v4 05/21] x86/decompressor: Use proper sequence to take the address of the GOT
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v4 03/21] x86/decompressor: Avoid magic offsets for EFI handover entrypoint
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v4 00/21] efi/x86: Avoid bare metal decompressor during EFI boot
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v4 01/21] x86/efistub: Branch straight to kernel entry point from C code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v4 06/21] x86/decompressor: Store boot_params pointer in callee save register
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v4 02/21] x86/efistub: Simplify and clean up handover entry code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v4 04/21] x86/efistub: Clear BSS in EFI handover protocol entrypoint
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [GIT PULL] EFI fixes for v6.4 #1
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCHv13 8/9] x86/tdx: Refactor try_accept_one()
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv13 0/9] mm, x86/cc, efi: Implement support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv13 5/9] efi: Add unaccepted memory support
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv13 1/9] mm: Add support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv13 9/9] x86/tdx: Add unaccepted memory support
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv13 6/9] efi/unaccepted: Avoid load_unaligned_zeropad() stepping into unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv13 7/9] x86/tdx: Make _tdx_hypercall() and __tdx_module_call() available in boot stub
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv13 4/9] x86/boot/compressed: Handle unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv13 2/9] efi/x86: Get full memory map in allocate_e820()
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv13 3/9] efi/libstub: Implement support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] block:sed-opal: SED Opal keystore
- From: Greg Joyce <gjoyce@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/4] powerpc/pseries: update SED for PLPKS api changes
- From: Greg Joyce <gjoyce@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] x86/kexec: Add EFI config table identity mapping for kexec kernel
- From: Tao Liu <ltao@xxxxxxxxxx>
- Re: [PATCH v2] x86/kexec: Add EFI config table identity mapping for kexec kernel
- From: Baoquan He <bhe@xxxxxxxxxx>
- [PATCH v2] x86/kexec: Add EFI config table identity mapping for kexec kernel
- From: Tao Liu <ltao@xxxxxxxxxx>
- [PATCHv12.1 1/9] mm: Add support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCHv12 1/9] mm: Add support for unaccepted memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCHv12 1/9] mm: Add support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCHv12 1/9] mm: Add support for unaccepted memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCHv12 9/9] x86/tdx: Add unaccepted memory support
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCHv12 9/9] x86/tdx: Add unaccepted memory support
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- [efi:next] BUILD SUCCESS ac3bb6e23bbb0a87fac68ec6bcdecd1a36d8c53f
- From: kernel test robot <lkp@xxxxxxxxx>
- [efi:urgent] BUILD SUCCESS 36e4fc57fc1619f462e669e939209c45763bc8f5
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] efi: bump efistub version from 1.1 to 3.0 for VZLinuxBootLoader compatibility
- From: Akihiro Suda <suda.kyoto@xxxxxxxxx>
- Re: [PATCH] efi: bump efistub version from 1.1 to 3.0 for VZLinuxBootLoader compatibility
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] efi: bump efistub version from 1.1 to 3.0 for VZLinuxBootLoader compatibility
- From: Akihiro Suda <suda.kyoto@xxxxxxxxx>
- Re: mix of ACPICA regression and EFISTUB regression (Was: kernel >= v6.2 no longer boots on Apple's Virtualization.framework (x86_64); likely to be related to ACPICA)
- From: Akihiro Suda <suda.kyoto@xxxxxxxxx>
- Re: mix of ACPICA regression and EFISTUB regression (Was: kernel >= v6.2 no longer boots on Apple's Virtualization.framework (x86_64); likely to be related to ACPICA)
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: mix of ACPICA regression and EFISTUB regression (Was: kernel >= v6.2 no longer boots on Apple's Virtualization.framework (x86_64); likely to be related to ACPICA)
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: mix of ACPICA regression and EFISTUB regression (Was: kernel >= v6.2 no longer boots on Apple's Virtualization.framework (x86_64); likely to be related to ACPICA)
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: mix of ACPICA regression and EFISTUB regression (Was: kernel >= v6.2 no longer boots on Apple's Virtualization.framework (x86_64); likely to be related to ACPICA)
- From: Akihiro Suda <suda.kyoto@xxxxxxxxx>
- Re: mix of ACPICA regression and EFISTUB regression (Was: kernel >= v6.2 no longer boots on Apple's Virtualization.framework (x86_64); likely to be related to ACPICA)
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: mix of ACPICA regression and EFISTUB regression (Was: kernel >= v6.2 no longer boots on Apple's Virtualization.framework (x86_64); likely to be related to ACPICA)
- From: Akihiro Suda <suda.kyoto@xxxxxxxxx>
- Re: [PATCH] x86/kexec: Add EFI config table identity mapping for kexec kernel
- From: Tao Liu <ltao@xxxxxxxxxx>
- Re: [PATCH] x86/kexec: Add EFI config table identity mapping for kexec kernel
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH] x86/kexec: Add EFI config table identity mapping for kexec kernel
- From: Baoquan He <bhe@xxxxxxxxxx>
- [efi:urgent] BUILD SUCCESS fd936fd8ac105ba3eb764185e8ba483c789c893e
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v5 3/3] efi: Add tee-based EFI variable driver
- From: Masahisa Kojima <masahisa.kojima@xxxxxxxxxx>
- [PATCH v5 2/3] efi: Add EFI_ACCESS_DENIED status code
- From: Masahisa Kojima <masahisa.kojima@xxxxxxxxxx>
- [PATCH v5 1/3] efi: expose efivar generic ops register function
- From: Masahisa Kojima <masahisa.kojima@xxxxxxxxxx>
- Re: [PATCH 00/15] arm64: address -Wmissing-prototype warnings
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- [PATCH] x86/kexec: Add EFI config table identity mapping for kexec kernel
- From: Tao Liu <ltao@xxxxxxxxxx>
- Re: [PATCH] [v2] efi: fix missing prototype warnings
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] [v2] efi: fix missing prototype warnings
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- Re: [PATCH v6 08/14] x86: Secure Launch kernel late boot stub
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH] [v2] efi: fix missing prototype warnings
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH v3a 20/21] x86/efistub: Check SEV/SNP support while running in the firmware
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v4 3/3] efi: Add tee-based EFI variable driver
- From: Masahisa Kojima <masahisa.kojima@xxxxxxxxxx>
- [PATCH v4 2/3] efi: Add EFI_ACCESS_DENIED status code
- From: Masahisa Kojima <masahisa.kojima@xxxxxxxxxx>
- [PATCH v4 1/3] efi: expose efivar generic ops register function
- From: Masahisa Kojima <masahisa.kojima@xxxxxxxxxx>
- Re: [PATCH v3 3/3] efi: Add tee-based EFI variable driver
- From: Masahisa Kojima <masahisa.kojima@xxxxxxxxxx>
- [PATCH v2 1/1] block: fix conversion of GPT partition name to 7-bit
- From: Olivier Gayot <olivier.gayot@xxxxxxxxxxxxx>
- [PATCH v2 0/1] block: fix conversion of GPT partition name to 7-bit
- From: Olivier Gayot <olivier.gayot@xxxxxxxxxxxxx>
- [efi:urgent] BUILD SUCCESS 3610dc36f4fd767c382e5f9b234d19d0610eb950
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] efi/libstub: zboot: Avoid eager evaluation of objcopy flags
- From: Alan Bartlett <ajb@xxxxxxxxxx>
- Re: [PATCH v2 17/20] x86: efistub: Check SEV/SNP support while running in the firmware
- From: Joerg Roedel <jroedel@xxxxxxx>
- Re: [PATCH v2 17/20] x86: efistub: Check SEV/SNP support while running in the firmware
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 17/20] x86: efistub: Check SEV/SNP support while running in the firmware
- From: Joerg Roedel <jroedel@xxxxxxx>
- Re: [PATCHv12 4/9] x86/boot/compressed: Handle unaccepted memory
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCHv12 4/9] x86/boot/compressed: Handle unaccepted memory
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH] efi/esrt: Allow ESRT access without CAP_SYS_ADMIN
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi: fix missing prototype warnings
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 21/21] x86/efistub: Avoid legacy decompressor when doing EFI boot
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 20/21] x86/efistub: Check SEV/SNP support while running in the firmware
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 19/21] efi/libstub: Add limit argument to efi_random_alloc()
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 17/21] x86/decompressor: Factor out kernel decompression and relocation
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 18/21] x86/head_64: Store boot_params pointer in callee-preserved register
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 16/21] x86/decompressor: Move global symbol references to C code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 15/21] decompress: Use 8 byte alignment
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 13/21] x86/efistub: Perform 4/5 level paging switch from the stub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 14/21] x86/efistub: Prefer EFI memory attributes protocol over DXE services
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 12/21] x86/decompressor: Merge trampoline cleanup with switching code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 11/21] x86/decompressor: Only call the trampoline when changing paging levels
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 10/21] x86/decompressor: Call trampoline directly from C code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 09/21] x86/decompressor: Avoid the need for a stack in the 32-bit trampoline
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 01/21] x86/efistub: Branch straight to kernel entry point from C code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 05/21] x86/decompressor: Use proper sequence to take the address of the GOT
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 06/21] x86/decompressor: Store boot_params pointer in callee save register
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 03/21] x86/decompressor: Avoid magic offsets for EFI handover entrypoint
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 07/21] x86/decompressor: Call trampoline as a normal function
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 04/21] x86/efistub: Clear BSS in EFI handover protocol entrypoint
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 08/21] x86/decompressor: Use standard calling convention for trampoline
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 00/21] efi/x86: Avoid bare metal decompressor during EFI boot
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 02/21] x86/efistub: Simplify and clean up handover entry code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: Regression. -6.3.X Good. -6.4-rcY Bad.
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: Regression. -6.3.X Good. -6.4-rcY Bad.
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] efi/libstub: zboot: Avoid eager evaluation of objcopy flags
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: Regression. -6.3.X Good. -6.4-rcY Bad.
- From: Pedro Falcato <pedro.falcato@xxxxxxxxx>
- Fwd: Regression. -6.3.X Good. -6.4-rcY Bad.
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [PATCHv12 3/9] efi/libstub: Implement support for unaccepted memory
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v2 17/20] x86: efistub: Check SEV/SNP support while running in the firmware
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCHv12 4/9] x86/boot/compressed: Handle unaccepted memory
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- [PATCHv12 7/9] x86/tdx: Make _tdx_hypercall() and __tdx_module_call() available in boot stub
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv12 5/9] efi: Add unaccepted memory support
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv12 9/9] x86/tdx: Add unaccepted memory support
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv12 6/9] efi/unaccepted: Avoid load_unaligned_zeropad() stepping into unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv12 8/9] x86/tdx: Refactor try_accept_one()
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv12 1/9] mm: Add support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv12 0/9] mm, x86/cc, efi: Implement support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv12 4/9] x86/boot/compressed: Handle unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv12 3/9] efi/libstub: Implement support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv12 2/9] efi/x86: Get full memory map in allocate_e820()
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 18/20] x86: efistub: Avoid legacy decompressor when doing EFI boot
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 17/20] x86: efistub: Check SEV/SNP support while running in the firmware
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 18/20] x86: efistub: Avoid legacy decompressor when doing EFI boot
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v2 17/20] x86: efistub: Check SEV/SNP support while running in the firmware
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v2 05/20] x86: decompressor: Avoid the need for a stack in the 32-bit trampoline
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [efi:next] BUILD SUCCESS d86ff3333cb1d5f42d8898fb5fdb304e143c0237
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 05/20] x86: decompressor: Avoid the need for a stack in the 32-bit trampoline
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v2 15/20] x86: head_64: Switch to kernel CS before enabling memory encryption
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCHv11 0/9] mm, x86/cc, efi: Implement support for unaccepted memory
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCHv11 0/9] mm, x86/cc, efi: Implement support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 01/20] x86: decompressor: Use proper sequence to take the address of the GOT
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 01/20] x86: decompressor: Use proper sequence to take the address of the GOT
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2] efivarfs: expose used and total size
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCHv11 6/9] efi/unaccepted: Avoid load_unaligned_zeropad() stepping into unaccepted memory
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCHv11.1 5/9] efi: Add unaccepted memory support
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCHv11 4/9] x86/boot/compressed: Handle unaccepted memory
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v2] efivarfs: expose used and total size
- From: Anisse Astier <anisse@xxxxxxxxx>
- Re: [PATCHv11 0/9] mm, x86/cc, efi: Implement support for unaccepted memory
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCHv11 0/9] mm, x86/cc, efi: Implement support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCHv11 6/9] efi/unaccepted: Avoid load_unaligned_zeropad() stepping into unaccepted memory
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCHv11 0/9] mm, x86/cc, efi: Implement support for unaccepted memory
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCHv11 6/9] efi/unaccepted: Avoid load_unaligned_zeropad() stepping into unaccepted memory
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCHv11 6/9] efi/unaccepted: Avoid load_unaligned_zeropad() stepping into unaccepted memory
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCHv11 6/9] efi/unaccepted: Avoid load_unaligned_zeropad() stepping into unaccepted memory
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCHv11 1/9] mm: Add support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- [PATCH] efi: fix missing prototype warnings
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCHv11 6/9] efi/unaccepted: Avoid load_unaligned_zeropad() stepping into unaccepted memory
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 00/15] arm64: address -Wmissing-prototype warnings
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCHv11 2/9] efi/x86: Get full memory map in allocate_e820()
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCHv11 1/9] mm: Add support for unaccepted memory
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCHv11 6/9] efi/unaccepted: Avoid load_unaligned_zeropad() stepping into unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCHv11 6/9] efi/unaccepted: Avoid load_unaligned_zeropad() stepping into unaccepted memory
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCHv11 6/9] efi/unaccepted: Avoid load_unaligned_zeropad() stepping into unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCHv11 6/9] efi/unaccepted: Avoid load_unaligned_zeropad() stepping into unaccepted memory
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCHv11 6/9] efi/unaccepted: Avoid load_unaligned_zeropad() stepping into unaccepted memory
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCHv11 3/9] efi/libstub: Implement support for unaccepted memory
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCHv11 3/9] efi/libstub: Implement support for unaccepted memory
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 09/20] x86: efistub: Perform 4/5 level paging switch from the stub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 08/20] x86: decompressor: Merge trampoline cleanup with switching code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCHv11.1 5/9] efi: Add unaccepted memory support
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 00/15] arm64: address -Wmissing-prototype warnings
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCHv11 4/9] x86/boot/compressed: Handle unaccepted memory
- From: Liam Merwick <liam.merwick@xxxxxxxxxx>
- [PATCH 14/15] arm64: move early_brk64 prototype to header
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 15/15] arm64: add alt_cb_patch_nops prototype
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 12/15] arm64: kaslr: add kaslr_early_init() declaration
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 13/15] arm64: signal: include asm/exception.h
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 09/15] arm64: hide unused is_valid_bugaddr()
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 11/15] arm64: flush: include linux/libnvdimm.h
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 10/15] arm64: module-plts: inline linux/moduleloader.h
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 07/15] arm64: cpuidle: fix #ifdef for acpi functions
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 08/15] arm64: efi: add efi_handle_corrupted_x18 prototype
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 06/15] arm64: kvm: add prototypes for functions called in asm
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 02/15] arm64: add scs_patch_vmlinux prototype
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 04/15] arm64: move cpu_suspend_set_dbg_restorer() prototype to header
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 05/15] arm64: spectre: provide prototypes for internal functions
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 03/15] arm64: avoid prototype warnings for syscalls
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 01/15] arm64: xor-neon: mark xor_arm64_neon_*() static
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 00/15] arm64: address -Wmissing-prototype warnings
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCHv11.1 5/9] efi: Add unaccepted memory support
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 07/14] x86: Secure Launch kernel early boot stub
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 04/14] x86: Secure Launch Resource Table header file
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
[Index of Archives]
[Linux Kernel Development]
[Security]
[Linux ARM Kernel]
[Tools]
[Linux MIPS]
[Linux S390]
[Bugtraq]
[Share Photos]>
[Fedora ARM]