Linux EFI/UEFI Development
[Prev Page][Next Page]
- [PATCHv13 8/9] x86/tdx: Refactor try_accept_one()
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv13 0/9] mm, x86/cc, efi: Implement support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv13 5/9] efi: Add unaccepted memory support
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv13 1/9] mm: Add support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv13 9/9] x86/tdx: Add unaccepted memory support
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv13 6/9] efi/unaccepted: Avoid load_unaligned_zeropad() stepping into unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv13 7/9] x86/tdx: Make _tdx_hypercall() and __tdx_module_call() available in boot stub
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv13 4/9] x86/boot/compressed: Handle unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv13 2/9] efi/x86: Get full memory map in allocate_e820()
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv13 3/9] efi/libstub: Implement support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] block:sed-opal: SED Opal keystore
- From: Greg Joyce <gjoyce@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/4] powerpc/pseries: update SED for PLPKS api changes
- From: Greg Joyce <gjoyce@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] x86/kexec: Add EFI config table identity mapping for kexec kernel
- From: Tao Liu <ltao@xxxxxxxxxx>
- Re: [PATCH v2] x86/kexec: Add EFI config table identity mapping for kexec kernel
- From: Baoquan He <bhe@xxxxxxxxxx>
- [PATCH v2] x86/kexec: Add EFI config table identity mapping for kexec kernel
- From: Tao Liu <ltao@xxxxxxxxxx>
- [PATCHv12.1 1/9] mm: Add support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCHv12 1/9] mm: Add support for unaccepted memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCHv12 1/9] mm: Add support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCHv12 1/9] mm: Add support for unaccepted memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCHv12 9/9] x86/tdx: Add unaccepted memory support
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCHv12 9/9] x86/tdx: Add unaccepted memory support
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- [efi:next] BUILD SUCCESS ac3bb6e23bbb0a87fac68ec6bcdecd1a36d8c53f
- From: kernel test robot <lkp@xxxxxxxxx>
- [efi:urgent] BUILD SUCCESS 36e4fc57fc1619f462e669e939209c45763bc8f5
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] efi: bump efistub version from 1.1 to 3.0 for VZLinuxBootLoader compatibility
- From: Akihiro Suda <suda.kyoto@xxxxxxxxx>
- Re: [PATCH] efi: bump efistub version from 1.1 to 3.0 for VZLinuxBootLoader compatibility
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] efi: bump efistub version from 1.1 to 3.0 for VZLinuxBootLoader compatibility
- From: Akihiro Suda <suda.kyoto@xxxxxxxxx>
- Re: mix of ACPICA regression and EFISTUB regression (Was: kernel >= v6.2 no longer boots on Apple's Virtualization.framework (x86_64); likely to be related to ACPICA)
- From: Akihiro Suda <suda.kyoto@xxxxxxxxx>
- Re: mix of ACPICA regression and EFISTUB regression (Was: kernel >= v6.2 no longer boots on Apple's Virtualization.framework (x86_64); likely to be related to ACPICA)
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: mix of ACPICA regression and EFISTUB regression (Was: kernel >= v6.2 no longer boots on Apple's Virtualization.framework (x86_64); likely to be related to ACPICA)
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: mix of ACPICA regression and EFISTUB regression (Was: kernel >= v6.2 no longer boots on Apple's Virtualization.framework (x86_64); likely to be related to ACPICA)
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: mix of ACPICA regression and EFISTUB regression (Was: kernel >= v6.2 no longer boots on Apple's Virtualization.framework (x86_64); likely to be related to ACPICA)
- From: Akihiro Suda <suda.kyoto@xxxxxxxxx>
- Re: mix of ACPICA regression and EFISTUB regression (Was: kernel >= v6.2 no longer boots on Apple's Virtualization.framework (x86_64); likely to be related to ACPICA)
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: mix of ACPICA regression and EFISTUB regression (Was: kernel >= v6.2 no longer boots on Apple's Virtualization.framework (x86_64); likely to be related to ACPICA)
- From: Akihiro Suda <suda.kyoto@xxxxxxxxx>
- Re: [PATCH] x86/kexec: Add EFI config table identity mapping for kexec kernel
- From: Tao Liu <ltao@xxxxxxxxxx>
- Re: [PATCH] x86/kexec: Add EFI config table identity mapping for kexec kernel
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH] x86/kexec: Add EFI config table identity mapping for kexec kernel
- From: Baoquan He <bhe@xxxxxxxxxx>
- [efi:urgent] BUILD SUCCESS fd936fd8ac105ba3eb764185e8ba483c789c893e
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v5 3/3] efi: Add tee-based EFI variable driver
- From: Masahisa Kojima <masahisa.kojima@xxxxxxxxxx>
- [PATCH v5 2/3] efi: Add EFI_ACCESS_DENIED status code
- From: Masahisa Kojima <masahisa.kojima@xxxxxxxxxx>
- [PATCH v5 1/3] efi: expose efivar generic ops register function
- From: Masahisa Kojima <masahisa.kojima@xxxxxxxxxx>
- Re: [PATCH 00/15] arm64: address -Wmissing-prototype warnings
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- [PATCH] x86/kexec: Add EFI config table identity mapping for kexec kernel
- From: Tao Liu <ltao@xxxxxxxxxx>
- Re: [PATCH] [v2] efi: fix missing prototype warnings
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] [v2] efi: fix missing prototype warnings
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- Re: [PATCH v6 08/14] x86: Secure Launch kernel late boot stub
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH] [v2] efi: fix missing prototype warnings
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH v3a 20/21] x86/efistub: Check SEV/SNP support while running in the firmware
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v4 3/3] efi: Add tee-based EFI variable driver
- From: Masahisa Kojima <masahisa.kojima@xxxxxxxxxx>
- [PATCH v4 2/3] efi: Add EFI_ACCESS_DENIED status code
- From: Masahisa Kojima <masahisa.kojima@xxxxxxxxxx>
- [PATCH v4 1/3] efi: expose efivar generic ops register function
- From: Masahisa Kojima <masahisa.kojima@xxxxxxxxxx>
- Re: [PATCH v3 3/3] efi: Add tee-based EFI variable driver
- From: Masahisa Kojima <masahisa.kojima@xxxxxxxxxx>
- [PATCH v2 1/1] block: fix conversion of GPT partition name to 7-bit
- From: Olivier Gayot <olivier.gayot@xxxxxxxxxxxxx>
- [PATCH v2 0/1] block: fix conversion of GPT partition name to 7-bit
- From: Olivier Gayot <olivier.gayot@xxxxxxxxxxxxx>
- [efi:urgent] BUILD SUCCESS 3610dc36f4fd767c382e5f9b234d19d0610eb950
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] efi/libstub: zboot: Avoid eager evaluation of objcopy flags
- From: Alan Bartlett <ajb@xxxxxxxxxx>
- Re: [PATCH v2 17/20] x86: efistub: Check SEV/SNP support while running in the firmware
- From: Joerg Roedel <jroedel@xxxxxxx>
- Re: [PATCH v2 17/20] x86: efistub: Check SEV/SNP support while running in the firmware
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 17/20] x86: efistub: Check SEV/SNP support while running in the firmware
- From: Joerg Roedel <jroedel@xxxxxxx>
- Re: [PATCHv12 4/9] x86/boot/compressed: Handle unaccepted memory
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCHv12 4/9] x86/boot/compressed: Handle unaccepted memory
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH] efi/esrt: Allow ESRT access without CAP_SYS_ADMIN
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi: fix missing prototype warnings
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 21/21] x86/efistub: Avoid legacy decompressor when doing EFI boot
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 20/21] x86/efistub: Check SEV/SNP support while running in the firmware
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 19/21] efi/libstub: Add limit argument to efi_random_alloc()
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 17/21] x86/decompressor: Factor out kernel decompression and relocation
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 18/21] x86/head_64: Store boot_params pointer in callee-preserved register
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 16/21] x86/decompressor: Move global symbol references to C code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 15/21] decompress: Use 8 byte alignment
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 13/21] x86/efistub: Perform 4/5 level paging switch from the stub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 14/21] x86/efistub: Prefer EFI memory attributes protocol over DXE services
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 12/21] x86/decompressor: Merge trampoline cleanup with switching code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 11/21] x86/decompressor: Only call the trampoline when changing paging levels
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 10/21] x86/decompressor: Call trampoline directly from C code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 09/21] x86/decompressor: Avoid the need for a stack in the 32-bit trampoline
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 01/21] x86/efistub: Branch straight to kernel entry point from C code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 05/21] x86/decompressor: Use proper sequence to take the address of the GOT
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 06/21] x86/decompressor: Store boot_params pointer in callee save register
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 03/21] x86/decompressor: Avoid magic offsets for EFI handover entrypoint
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 07/21] x86/decompressor: Call trampoline as a normal function
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 04/21] x86/efistub: Clear BSS in EFI handover protocol entrypoint
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 08/21] x86/decompressor: Use standard calling convention for trampoline
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 00/21] efi/x86: Avoid bare metal decompressor during EFI boot
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 02/21] x86/efistub: Simplify and clean up handover entry code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: Regression. -6.3.X Good. -6.4-rcY Bad.
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: Regression. -6.3.X Good. -6.4-rcY Bad.
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] efi/libstub: zboot: Avoid eager evaluation of objcopy flags
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: Regression. -6.3.X Good. -6.4-rcY Bad.
- From: Pedro Falcato <pedro.falcato@xxxxxxxxx>
- Fwd: Regression. -6.3.X Good. -6.4-rcY Bad.
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [PATCHv12 3/9] efi/libstub: Implement support for unaccepted memory
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v2 17/20] x86: efistub: Check SEV/SNP support while running in the firmware
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCHv12 4/9] x86/boot/compressed: Handle unaccepted memory
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- [PATCHv12 7/9] x86/tdx: Make _tdx_hypercall() and __tdx_module_call() available in boot stub
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv12 5/9] efi: Add unaccepted memory support
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv12 9/9] x86/tdx: Add unaccepted memory support
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv12 6/9] efi/unaccepted: Avoid load_unaligned_zeropad() stepping into unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv12 8/9] x86/tdx: Refactor try_accept_one()
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv12 1/9] mm: Add support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv12 0/9] mm, x86/cc, efi: Implement support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv12 4/9] x86/boot/compressed: Handle unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv12 3/9] efi/libstub: Implement support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv12 2/9] efi/x86: Get full memory map in allocate_e820()
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 18/20] x86: efistub: Avoid legacy decompressor when doing EFI boot
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 17/20] x86: efistub: Check SEV/SNP support while running in the firmware
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 18/20] x86: efistub: Avoid legacy decompressor when doing EFI boot
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v2 17/20] x86: efistub: Check SEV/SNP support while running in the firmware
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v2 05/20] x86: decompressor: Avoid the need for a stack in the 32-bit trampoline
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [efi:next] BUILD SUCCESS d86ff3333cb1d5f42d8898fb5fdb304e143c0237
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 05/20] x86: decompressor: Avoid the need for a stack in the 32-bit trampoline
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v2 15/20] x86: head_64: Switch to kernel CS before enabling memory encryption
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCHv11 0/9] mm, x86/cc, efi: Implement support for unaccepted memory
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCHv11 0/9] mm, x86/cc, efi: Implement support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 01/20] x86: decompressor: Use proper sequence to take the address of the GOT
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 01/20] x86: decompressor: Use proper sequence to take the address of the GOT
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2] efivarfs: expose used and total size
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCHv11 6/9] efi/unaccepted: Avoid load_unaligned_zeropad() stepping into unaccepted memory
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCHv11.1 5/9] efi: Add unaccepted memory support
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCHv11 4/9] x86/boot/compressed: Handle unaccepted memory
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v2] efivarfs: expose used and total size
- From: Anisse Astier <anisse@xxxxxxxxx>
- Re: [PATCHv11 0/9] mm, x86/cc, efi: Implement support for unaccepted memory
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCHv11 0/9] mm, x86/cc, efi: Implement support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCHv11 6/9] efi/unaccepted: Avoid load_unaligned_zeropad() stepping into unaccepted memory
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCHv11 0/9] mm, x86/cc, efi: Implement support for unaccepted memory
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCHv11 6/9] efi/unaccepted: Avoid load_unaligned_zeropad() stepping into unaccepted memory
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCHv11 6/9] efi/unaccepted: Avoid load_unaligned_zeropad() stepping into unaccepted memory
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCHv11 6/9] efi/unaccepted: Avoid load_unaligned_zeropad() stepping into unaccepted memory
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCHv11 1/9] mm: Add support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- [PATCH] efi: fix missing prototype warnings
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCHv11 6/9] efi/unaccepted: Avoid load_unaligned_zeropad() stepping into unaccepted memory
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 00/15] arm64: address -Wmissing-prototype warnings
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCHv11 2/9] efi/x86: Get full memory map in allocate_e820()
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCHv11 1/9] mm: Add support for unaccepted memory
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCHv11 6/9] efi/unaccepted: Avoid load_unaligned_zeropad() stepping into unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCHv11 6/9] efi/unaccepted: Avoid load_unaligned_zeropad() stepping into unaccepted memory
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCHv11 6/9] efi/unaccepted: Avoid load_unaligned_zeropad() stepping into unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCHv11 6/9] efi/unaccepted: Avoid load_unaligned_zeropad() stepping into unaccepted memory
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCHv11 6/9] efi/unaccepted: Avoid load_unaligned_zeropad() stepping into unaccepted memory
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCHv11 3/9] efi/libstub: Implement support for unaccepted memory
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCHv11 3/9] efi/libstub: Implement support for unaccepted memory
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 09/20] x86: efistub: Perform 4/5 level paging switch from the stub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 08/20] x86: decompressor: Merge trampoline cleanup with switching code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCHv11.1 5/9] efi: Add unaccepted memory support
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 00/15] arm64: address -Wmissing-prototype warnings
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCHv11 4/9] x86/boot/compressed: Handle unaccepted memory
- From: Liam Merwick <liam.merwick@xxxxxxxxxx>
- [PATCH 14/15] arm64: move early_brk64 prototype to header
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 15/15] arm64: add alt_cb_patch_nops prototype
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 12/15] arm64: kaslr: add kaslr_early_init() declaration
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 13/15] arm64: signal: include asm/exception.h
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 09/15] arm64: hide unused is_valid_bugaddr()
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 11/15] arm64: flush: include linux/libnvdimm.h
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 10/15] arm64: module-plts: inline linux/moduleloader.h
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 07/15] arm64: cpuidle: fix #ifdef for acpi functions
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 08/15] arm64: efi: add efi_handle_corrupted_x18 prototype
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 06/15] arm64: kvm: add prototypes for functions called in asm
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 02/15] arm64: add scs_patch_vmlinux prototype
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 04/15] arm64: move cpu_suspend_set_dbg_restorer() prototype to header
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 05/15] arm64: spectre: provide prototypes for internal functions
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 03/15] arm64: avoid prototype warnings for syscalls
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 01/15] arm64: xor-neon: mark xor_arm64_neon_*() static
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 00/15] arm64: address -Wmissing-prototype warnings
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCHv11.1 5/9] efi: Add unaccepted memory support
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 07/14] x86: Secure Launch kernel early boot stub
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 04/14] x86: Secure Launch Resource Table header file
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 13/14] tpm: Allow locality 2 to be set when initializing the TPM for Secure Launch
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 11/14] reboot: Secure Launch SEXIT support on reboot paths
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 07/14] x86: Secure Launch kernel early boot stub
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 04/14] x86: Secure Launch Resource Table header file
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 04/14] x86: Secure Launch Resource Table header file
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 04/14] x86: Secure Launch Resource Table header file
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 04/14] x86: Secure Launch Resource Table header file
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 09/14] x86: Secure Launch SMP bringup support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v6 07/14] x86: Secure Launch kernel early boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v6 08/14] x86: Secure Launch kernel late boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v6 11/14] reboot: Secure Launch SEXIT support on reboot paths
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v2 09/20] x86: efistub: Perform 4/5 level paging switch from the stub
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH] efivarfs: expose used and total size
- From: Anisse Astier <anisse@xxxxxxxxx>
- Re: [PATCH v2 07/20] x86: decompressor: Only call the trampoline when changing paging levels
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH v2 06/20] x86: decompressor: Call trampoline directly from C code
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH v2 05/20] x86: decompressor: Avoid the need for a stack in the 32-bit trampoline
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH v2 04/20] x86: decompressor: Use standard calling convention for trampoline
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH v2 03/20] x86: decompressor: Call trampoline as a normal function
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH] efivarfs: expose used and total size
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH 4/4] powerpc/pseries: update SED for PLPKS api changes
- From: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
- Re: [PATCHv11 3/9] efi/libstub: Implement support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCHv11 3/9] efi/libstub: Implement support for unaccepted memory
- From: Mika Penttilä <mpenttil@xxxxxxxxxx>
- [PATCHv11 9/9] x86/tdx: Add unaccepted memory support
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv11 6/9] efi/unaccepted: Avoid load_unaligned_zeropad() stepping into unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv11 7/9] x86/tdx: Make _tdx_hypercall() and __tdx_module_call() available in boot stub
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv11 5/9] efi: Provide helpers for unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv11 8/9] x86/tdx: Refactor try_accept_one()
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv11 1/9] mm: Add support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv11 2/9] efi/x86: Get full memory map in allocate_e820()
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv11 3/9] efi/libstub: Implement support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv11 4/9] x86/boot/compressed: Handle unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv11 0/9] mm, x86/cc, efi: Implement support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 12/14] x86: Secure Launch late initcall platform module
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH] efi/esrt: Allow ESRT access without CAP_SYS_ADMIN
- From: Nicholas Bishop <nicholasbishop@xxxxxxxxxx>
- Re: [PATCH v6 07/14] x86: Secure Launch kernel early boot stub
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v6 07/14] x86: Secure Launch kernel early boot stub
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 05/14] x86: Secure Launch main header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Andrew Cooper <andyhhp@xxxxxxxxx>
- Re: [PATCH v6 13/14] tpm: Allow locality 2 to be set when initializing the TPM for Secure Launch
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 07/14] x86: Secure Launch kernel early boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v6 08/14] x86: Secure Launch kernel late boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v6 02/14] Documentation/x86: Secure Launch kernel documentation
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v6 12/14] x86: Secure Launch late initcall platform module
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v6 09/14] x86: Secure Launch SMP bringup support
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v6 08/14] x86: Secure Launch kernel late boot stub
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v6 13/14] tpm: Allow locality 2 to be set when initializing the TPM for Secure Launch
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 11/14] reboot: Secure Launch SEXIT support on reboot paths
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 07/14] x86: Secure Launch kernel early boot stub
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v6 05/14] x86: Secure Launch main header file
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 02/14] Documentation/x86: Secure Launch kernel documentation
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 04/14] x86: Secure Launch Resource Table header file
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCHv10 04/11] efi/x86: Implement support for unaccepted memory
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCHv10 04/11] efi/x86: Implement support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCHv10 04/11] efi/x86: Implement support for unaccepted memory
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCHv10 04/11] efi/x86: Implement support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH v6 09/14] x86: Secure Launch SMP bringup support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH] efivarfs: expose used and total size
- From: Anisse Astier <anisse@xxxxxxxxx>
- [efi:next] BUILD SUCCESS 0153431c85af3d4470ac8c59a3f854a3926dff86
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 04/14] x86: Secure Launch Resource Table header file
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 08/14] x86: Secure Launch kernel late boot stub
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 09/14] x86: Secure Launch SMP bringup support
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/4] block:sed-opal: SED Opal keystore
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 12/14] x86: Secure Launch late initcall platform module
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 12/14] x86: Secure Launch late initcall platform module
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 02/14] Documentation/x86: Secure Launch kernel documentation
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH] efivarfs: expose used and total size
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCHv10 04/11] efi/x86: Implement support for unaccepted memory
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCHv10 04/11] efi/x86: Implement support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCHv10 04/11] efi/x86: Implement support for unaccepted memory
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCHv10 04/11] efi/x86: Implement support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH v6 12/14] x86: Secure Launch late initcall platform module
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v3 3/3] efi: Add tee-based EFI variable driver
- From: Jens Wiklander <jens.wiklander@xxxxxxxxxx>
- Re: [PATCHv10 05/11] x86/boot/compressed: Handle unaccepted memory
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCHv10 04/11] efi/x86: Implement support for unaccepted memory
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCHv10 02/11] efi/x86: Get full memory map in allocate_e820()
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 19/20] x86: efistub: Clear BSS in EFI handover protocol entrypoint
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 18/20] x86: efistub: Avoid legacy decompressor when doing EFI boot
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 20/20] x86: decompressor: Avoid magic offsets for EFI handover entrypoint
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 17/20] x86: efistub: Check SEV/SNP support while running in the firmware
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 16/20] efi: libstub: Add limit argument to efi_random_alloc()
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 15/20] x86: head_64: Switch to kernel CS before enabling memory encryption
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 12/20] x86: decompressor: Move global symbol references to C code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 13/20] x86: decompressor: Factor out kernel decompression and relocation
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 14/20] x86: head_64: Store boot_params pointer in callee-preserved register
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 11/20] decompress: Use 8 byte alignment
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 10/20] x86: efistub: Prefer EFI memory attributes protocol over DXE services
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 06/20] x86: decompressor: Call trampoline directly from C code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 08/20] x86: decompressor: Merge trampoline cleanup with switching code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 07/20] x86: decompressor: Only call the trampoline when changing paging levels
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 05/20] x86: decompressor: Avoid the need for a stack in the 32-bit trampoline
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 09/20] x86: efistub: Perform 4/5 level paging switch from the stub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 04/20] x86: decompressor: Use standard calling convention for trampoline
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 02/20] x86: decompressor: Store boot_params pointer in callee save register
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 03/20] x86: decompressor: Call trampoline as a normal function
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 01/20] x86: decompressor: Use proper sequence to take the address of the GOT
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 00/20] efi/x86: Avoid bare metal decompressor during EFI boot
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCHv10 11/11] x86/tdx: Add unaccepted memory support
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv10 01/11] mm: Add support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv10 08/11] x86/mm: Avoid load_unaligned_zeropad() stepping into unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv10 07/11] x86/mm: Provide helpers for unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv10 05/11] x86/boot/compressed: Handle unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv10 06/11] x86/mm: Reserve unaccepted memory bitmap
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv10 00/11] mm, x86/cc: Implement support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv10 10/11] x86/tdx: Refactor try_accept_one()
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv10 09/11] x86/tdx: Make _tdx_hypercall() and __tdx_module_call() available in boot stub
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv10 03/11] x86/boot: Add infrastructure required for unaccepted memory support
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv10 02/11] efi/x86: Get full memory map in allocate_e820()
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv10 04/11] efi/x86: Implement support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 02/14] Documentation/x86: Secure Launch kernel documentation
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [PATCH v6 00/14] x86: Trenchboot secure dynamic launch Linux kernel support
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- [PATCH v5 0/4] generic and PowerPC SED Opal keystore
- From: gjoyce@xxxxxxxxxxxxxxxxxx
- Re: [PATCH v6 07/14] x86: Secure Launch kernel early boot stub
- From: Simon Horman <horms@xxxxxxxxxx>
- [PATCH 2/4] powerpc/pseries: PLPKS SED Opal keystore support
- From: gjoyce@xxxxxxxxxxxxxxxxxx
- [PATCH 3/4] block: sed-opal: keystore access for SED Opal keys
- From: gjoyce@xxxxxxxxxxxxxxxxxx
- [PATCH 1/4] block:sed-opal: SED Opal keystore
- From: gjoyce@xxxxxxxxxxxxxxxxxx
- [PATCH 4/4] powerpc/pseries: update SED for PLPKS api changes
- From: gjoyce@xxxxxxxxxxxxxxxxxx
- [PATCH v4 3/3] block: sed-opal: keyring support for SED keys
- From: gjoyce@xxxxxxxxxxxxxxxxxx
- Re: [PATCH v6 12/14] x86: Secure Launch late initcall platform module
- From: Simon Horman <horms@xxxxxxxxxx>
- [PATCH v4 2/3] block: sed-opal: Implement IOC_OPAL_REVERT_LSP
- From: gjoyce@xxxxxxxxxxxxxxxxxx
- [PATCH v4 1/3] block: sed-opal: Implement IOC_OPAL_DISCOVERY
- From: gjoyce@xxxxxxxxxxxxxxxxxx
- [PATCH v4 0/3] sed-opal: keyrings, discovery, revert, key store
- From: gjoyce@xxxxxxxxxxxxxxxxxx
- Re: [PATCH v6 09/14] x86: Secure Launch SMP bringup support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v6 08/14] x86: Secure Launch kernel late boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v6 07/14] x86: Secure Launch kernel early boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v6 09/14] x86: Secure Launch SMP bringup support
- From: Simon Horman <horms@xxxxxxxxxx>
- Re: [PATCH v6 08/14] x86: Secure Launch kernel late boot stub
- From: Simon Horman <horms@xxxxxxxxxx>
- Re: [PATCH v6 07/14] x86: Secure Launch kernel early boot stub
- From: Simon Horman <horms@xxxxxxxxxx>
- Re: [PATCH v6 05/14] x86: Secure Launch main header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v6 04/14] x86: Secure Launch Resource Table header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v6 02/14] Documentation/x86: Secure Launch kernel documentation
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Simon Horman <horms@xxxxxxxxxx>
- Re: [PATCH v6 05/14] x86: Secure Launch main header file
- From: Simon Horman <horms@xxxxxxxxxx>
- Re: [PATCH v6 04/14] x86: Secure Launch Resource Table header file
- From: Simon Horman <horms@xxxxxxxxxx>
- Re: [PATCH v6 02/14] Documentation/x86: Secure Launch kernel documentation
- From: Simon Horman <horms@xxxxxxxxxx>
- Re: [PATCH v6 00/14] x86: Trenchboot secure dynamic launch Linux kernel support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v6 00/14] x86: Trenchboot secure dynamic launch Linux kernel support
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- [PATCH v6 12/14] x86: Secure Launch late initcall platform module
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v6 14/14] x86: EFI stub DRTM launch support for Secure Launch
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v6 11/14] reboot: Secure Launch SEXIT support on reboot paths
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v6 13/14] tpm: Allow locality 2 to be set when initializing the TPM for Secure Launch
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v6 09/14] x86: Secure Launch SMP bringup support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v6 10/14] kexec: Secure Launch kexec SEXIT support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v6 07/14] x86: Secure Launch kernel early boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v6 08/14] x86: Secure Launch kernel late boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v6 02/14] Documentation/x86: Secure Launch kernel documentation
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v6 05/14] x86: Secure Launch main header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v6 04/14] x86: Secure Launch Resource Table header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v6 03/14] x86: Secure Launch Kconfig
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v6 00/14] x86: Trenchboot secure dynamic launch Linux kernel support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v6 01/14] x86/boot: Place kernel_info at a fixed offset
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH 0/6] efi/x86: Avoid legacy decompressor during EFI boot
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 0/6] efi/x86: Avoid legacy decompressor during EFI boot
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 0/6] efi/x86: Avoid legacy decompressor during EFI boot
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 0/6] efi/x86: Avoid legacy decompressor during EFI boot
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 0/6] efi/x86: Avoid legacy decompressor during EFI boot
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 0/6] efi/x86: Avoid legacy decompressor during EFI boot
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 0/6] efi/x86: Avoid legacy decompressor during EFI boot
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 0/6] efi/x86: Avoid legacy decompressor during EFI boot
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH 0/3] efi: Implement generic zboot support
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 0/6] efi/x86: Avoid legacy decompressor during EFI boot
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH 0/3] efi: Implement generic zboot support
- From: "Andy Lutomirski" <luto@xxxxxxxxxx>
- Re: [PATCH 0/6] efi/x86: Avoid legacy decompressor during EFI boot
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 0/6] efi/x86: Avoid legacy decompressor during EFI boot
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 0/6] efi/x86: Avoid legacy decompressor during EFI boot
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 0/6] efi/x86: Avoid legacy decompressor during EFI boot
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH] efivarfs: expose used and total size
- From: Richard Hughes <hughsient@xxxxxxxxx>
- Re: [PATCH v2 3/4] arm64: libstub: Move KASLR handling functions to efi-stub-helper.c
- From: Alexandre Ghiti <alex@xxxxxxxx>
- Re: [GIT PULL] EFI updates for v6.4
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v2 3/4] arm64: libstub: Move KASLR handling functions to efi-stub-helper.c
- From: Palmer Dabbelt <palmer@xxxxxxxxxxx>
- [GIT PULL] EFI updates for v6.4
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 0/6] efi/x86: Avoid legacy decompressor during EFI boot
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 0/6] efi/x86: Avoid legacy decompressor during EFI boot
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- [PATCH RFC 42/43] x86/pie: Allow kernel image to be relocated in top 512G
- From: "Hou Wenlong" <houwenlong.hwl@xxxxxxxxxxxx>
- [efi:next] BUILD SUCCESS 026b85796ab4d52af56f8a1c60d2613983ecd845
- From: kernel test robot <lkp@xxxxxxxxx>
- RE: [PATCH] efivarfs: expose used and total size
- From: "Limonciello, Mario" <Mario.Limonciello@xxxxxxx>
- Re: [PATCH 4/6] x86: efistub: Perform 4/5 level paging switch from the stub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 0/6] efi/x86: Avoid legacy decompressor during EFI boot
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] efivarfs: expose used and total size
- From: Anisse Astier <anisse@xxxxxxxxx>
- Re: [PATCH 1/2] efi/zboot: arm64: Inject kernel code size symbol into the zboot payload
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH 2/2] efi/zboot: arm64: Grab kernel code size from zboot payload
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH 2/2] efi/zboot: arm64: Grab kernel code size from zboot payload
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 2/2] efi/zboot: arm64: Grab kernel code size from zboot payload
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 1/2] efi/zboot: arm64: Inject kernel code size symbol into the zboot payload
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 0/2] arm64: Expose kernel code size to EFI zboot code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 4/6] x86: efistub: Perform 4/5 level paging switch from the stub
- From: "Kirill A . Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/6] efi/x86: Avoid legacy decompressor during EFI boot
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH 6/6] x86: efistub: Avoid legacy decompressor when doing EFI boot
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 5/6] x86: efistub: Prefer EFI memory attributes protocol over DXE services
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 3/6] x86: efistub: Obtain ACPI RSDP address while running in the stub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 4/6] x86: efistub: Perform 4/5 level paging switch from the stub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 2/6] x86: decompressor: Factor out kernel decompression and relocation
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 1/6] x86: decompressor: Move global symbol references to C code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 0/6] efi/x86: Avoid legacy decompressor during EFI boot
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v4 0/6] RISC-V kasan rework
- From: Palmer Dabbelt <palmer@xxxxxxxxxxxx>
- Re: [RFC PATCH 0/3] efi: Implement generic zboot support
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH 0/3] efi: Implement generic zboot support
- From: "Andy Lutomirski" <luto@xxxxxxxxxx>
- [efi:next] BUILD SUCCESS 4067a1265c976819d749b61b5406ab6bfacd3a08
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v4 0/6] RISC-V kasan rework
- From: Palmer Dabbelt <palmer@xxxxxxxxxxxx>
- Re: [RFC PATCH 0/3] efi: Implement generic zboot support
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- Re: [RFC PATCH 0/3] efi: Implement generic zboot support
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH 0/3] efi: Implement generic zboot support
- From: Gerd Hoffmann <kraxel@xxxxxxxxxx>
- Re: [RFC PATCH 0/3] efi: Implement generic zboot support
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH 0/3] efi: Implement generic zboot support
- From: Gerd Hoffmann <kraxel@xxxxxxxxxx>
- Re: [RFC PATCH 0/3] efi: Implement generic zboot support
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [RFC PATCH 0/3] efi: Implement generic zboot support
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- [PATCH v2 6/6] efi/zboot: arm64: Grab code size from image header
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 1/6] efi/pe: Import new BTI/IBT header flags from the spec
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 2/6] arm64: efi: Enable BTI codegen and add PE/COFF annotation
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 5/6] efi/zboot: Set forward edge CFI compat header flag if supported
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 4/6] efi/zboot: Add BSS padding before compression
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 0/6] arm64/efi/zboot: Clean up and enable BTI annotation
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 3/6] efi/zboot: arm64: Poke kernel code size into the zboot payload image header
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: kernel 6.2 stuck at boot (efi_call_rts) on arm64
- From: Andrea Righi <andrea.righi@xxxxxxxxxxxxx>
- RE: [PATCH v3 2/6] efi/cper: Export cper_mem_err_unpack() for use by modules
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: kernel 6.2 stuck at boot (efi_call_rts) on arm64
- From: Darren Hart <darren@xxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCHv9 00/14] mm, x86/cc: Implement support for unaccepted memory
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCHv9 00/14] mm, x86/cc: Implement support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- [RFC PATCH 3/3] efi/zboot: x86: Clear NX restrictions on populated code regions
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [RFC PATCH 2/3] efi/zboot: x86: Implement EFI zboot support
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [RFC PATCH 1/3] efi/libstub: x86: Split off pieces shared with zboot
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [RFC PATCH 0/3] efi: Implement generic zboot support
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v3 2/6] efi/cper: Export cper_mem_err_unpack() for use by modules
- From: Terry Bowman <Terry.Bowman@xxxxxxx>
- Re: [PATCH v3 2/6] efi/cper: Export cper_mem_err_unpack() for use by modules
- From: Robert Richter <rrichter@xxxxxxx>
- Re: [PATCH v3 2/6] efi/cper: Export cper_mem_err_unpack() for use by modules
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCHv9 03/14] mm/page_alloc: Fake unaccepted memory
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: kernel 6.2 stuck at boot (efi_call_rts) on arm64
- From: Andrea Righi <andrea.righi@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/6] efi/cper: Export cper_mem_err_unpack() for use by modules
- From: Terry Bowman <Terry.Bowman@xxxxxxx>
- Re: [PATCH v3 2/6] efi/cper: Export cper_mem_err_unpack() for use by modules
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v3 2/6] efi/cper: Export cper_mem_err_unpack() for use by modules
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 2/6] efi/cper: Export cper_mem_err_unpack() for use by modules
- From: Terry Bowman <terry.bowman@xxxxxxx>
- Re: [PATCH v5 03/27] x86/boot: Set cr0 to known state in trampoline
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- Re: [PATCH v5 02/27] x86/build: Remove RWX sections and align on 4KB
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- Re: [PATCH v5 01/27] x86/boot: Align vmlinuz sections on page size
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- Re: [PATCH v5 02/27] x86/build: Remove RWX sections and align on 4KB
- From: Gerd Hoffmann <kraxel@xxxxxxxxxx>
- [efi:next] BUILD SUCCESS 8364f6d000ede4185a82b1f2514543ed172d4b51
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v5 03/27] x86/boot: Set cr0 to known state in trampoline
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v5 02/27] x86/build: Remove RWX sections and align on 4KB
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v5 01/27] x86/boot: Align vmlinuz sections on page size
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 2/6] arm64: efi: Enable BTI codegen and add PE/COFF annotation
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v5 00/27] x86_64: Improvements at compressed kernel stage
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: kernel 6.2 stuck at boot (efi_call_rts) on arm64
- From: "Linux regression tracking #update (Thorsten Leemhuis)" <regressions@xxxxxxxxxxxxx>
- Re: [PATCH] efi/loongarch: Reintroduce efi_relocate_kernel() to relocate kernel
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi/loongarch: Reintroduce efi_relocate_kernel() to relocate kernel
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- Re: [PATCH] efi/loongarch: Reintroduce efi_relocate_kernel() to relocate kernel
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi/loongarch: Reintroduce efi_relocate_kernel() to relocate kernel
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- [PATCH 6/6] efi/zboot: arm64: Grab code size from image header
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 5/6] efi/zboot: Set forward edge CFI compat header flag if supported
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 4/6] efi/zboot: Add BSS padding before compression
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 3/6] arm64: image: Add code size to the image header
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 1/6] efi/pe: Import new BTI/IBT header flags from the spec
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 2/6] arm64: efi: Enable BTI codegen and add PE/COFF annotation
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 0/6] arm64/efi/zboot: Clean up and enable BTI annotation
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCHv9 03/14] mm/page_alloc: Fake unaccepted memory
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCHv9 03/14] mm/page_alloc: Fake unaccepted memory
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCHv9 03/14] mm/page_alloc: Fake unaccepted memory
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCHv9 00/14] mm, x86/cc: Implement support for unaccepted memory
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCHv9 11/14] x86/mm: Avoid load_unaligned_zeropad() stepping into unaccepted memory
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCHv9 04/14] mm/page_alloc: Add sysfs handle to accept accept_memory
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCHv9 03/14] mm/page_alloc: Fake unaccepted memory
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCHv9 04/14] mm/page_alloc: Add sysfs handle to accept accept_memory
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCHv9 03/14] mm/page_alloc: Fake unaccepted memory
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCHv9 11/14] x86/mm: Avoid load_unaligned_zeropad() stepping into unaccepted memory
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCHv9 02/14] mm: Add support for unaccepted memory
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCHv9 02/14] mm: Add support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCHv9 02/14] mm: Add support for unaccepted memory
- From: Vlastimil Babka <vbabka@xxxxxxx>
- [PATCH AUTOSEL 5.15 06/11] efi: sysfb_efi: Add quirk for Lenovo Yoga Book X91F/L
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.1 10/24] efi: sysfb_efi: Add quirk for Lenovo Yoga Book X91F/L
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.2 11/25] efi: sysfb_efi: Add quirk for Lenovo Yoga Book X91F/L
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCHv9 00/14] mm, x86/cc: Implement support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv9 06/14] x86/boot: Add infrastructure required for unaccepted memory support
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv9 14/14] x86/tdx: Add unaccepted memory support
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv9 08/14] x86/boot/compressed: Handle unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv9 10/14] x86/mm: Provide helpers for unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv9 09/14] x86/mm: Reserve unaccepted memory bitmap
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv9 12/14] x86/tdx: Make _tdx_hypercall() and __tdx_module_call() available in boot stub
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv9 13/14] x86/tdx: Refactor try_accept_one()
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv9 11/14] x86/mm: Avoid load_unaligned_zeropad() stepping into unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv9 04/14] mm/page_alloc: Add sysfs handle to accept accept_memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv9 05/14] efi/x86: Get full memory map in allocate_e820()
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv9 03/14] mm/page_alloc: Fake unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv9 07/14] efi/x86: Implement support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv9 01/14] x86/boot: Centralize __pa()/__va() definitions
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCHv9 02/14] mm: Add support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH] efi: zboot: Ensure zboot PIC
- From: Pingfan Liu <kernelfans@xxxxxxxxx>
- [PATCH v2 4/4] riscv: libstub: Implement KASLR by using generic functions
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH v2 3/4] arm64: libstub: Move KASLR handling functions to efi-stub-helper.c
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH v2 2/4] riscv: Dump out kernel offset information on panic
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH v2 1/4] riscv: Introduce virtual kernel mapping KASLR
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- [PATCH v2 0/4] riscv: Introduce KASLR
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- Re: [PATCH] efi: zboot: Ensure zboot PIC
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi: zboot: Ensure zboot PIC
- From: Pingfan Liu <kernelfans@xxxxxxxxx>
- Re: [PATCH] efi: zboot: Ensure zboot PIC
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi: zboot: Ensure zboot PIC
- From: Pingfan Liu <kernelfans@xxxxxxxxx>
- Re: [PATCH] efi: zboot: Ensure zboot PIC
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] efi: zboot: Ensure zboot PIC
- From: Pingfan Liu <kernelfans@xxxxxxxxx>
- Re: [PATCHv8 06/14] efi/x86: Implement support for unaccepted memory
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [GIT PULL] EFI fixes for v6.3 #1
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] EFI fixes for v6.3 #1
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [efi:urgent] BUILD SUCCESS 0b1d9debe30304f35c1211e6dcdca1935ce67240
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 2/5] efi/cper: Export cper_mem_err_unpack() for CXL logging
- From: Terry Bowman <Terry.Bowman@xxxxxxx>
- Re: [PATCH v2] efi: libstub: Use relocated version of kernel's struct screen_info
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- [efi:urgent] BUILD SUCCESS 10e9aa1d82f64760fc41e4b994ca1689f4cee4ae
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH 3/3] efi/libstub: smbios: Drop unused 'recsize' parameter
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 2/3] arm64: efi: Use SMBIOS processor version to key off Ampere quirk
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 1/3] efi/libstub: smbios: Use length member instead of record struct size
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 0/3] arm64: efi: Use SMBIOS type 4 record for Altra quirk
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2] efi: libstub: Use relocated version of kernel's struct screen_info
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [efi:urgent] BUILD SUCCESS d06ecd29e69d087b3f2996dd411118a0376ffc3a
- From: kernel test robot <lkp@xxxxxxxxx>
- [efi:next] BUILD SUCCESS bac363715a7c961076e568609a12f62003cd17b0
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v2 1/3] efi/libstub: Use const qualified device path protocol pointers
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 3/3] efi/libstub: Look for initrd LoadFile2 protocol on image handle
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 2/3] efi/libstub: Pass loaded image EFI handle to efi_load_initrd()
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 0/3] efi: Allow initrd LoadFile2 proto on loaded image
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] efi/libstub: zboot: Add compressed image to make targets
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: kernel 6.2 stuck at boot (efi_call_rts) on arm64
- From: Darren Hart <darren@xxxxxxxxxxxxxxxxxxxxxx>
- [efi:urgent] BUILD SUCCESS 5ed213dd64681f84a01ceaa82fb336cf7d59ddcf
- From: kernel test robot <lkp@xxxxxxxxx>
- [efi:next] BUILD SUCCESS 1ca8f339d8693884feb0e14d2905f4b05418640b
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: kernel 6.2 stuck at boot (efi_call_rts) on arm64
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [efi:urgent 12/12] drivers/firmware/efi/libstub/efi-stub-helper.c:528 efi_load_initrd_lf2() error: uninitialized symbol 'dp'.
- From: Dan Carpenter <error27@xxxxxxxxx>
- [efi:urgent] BUILD SUCCESS WITH WARNING 86237b46f2b202331c07e4c6c2633ce3d3ba7f13
- From: kernel test robot <lkp@xxxxxxxxx>
- [efi:urgent 12/12] drivers/firmware/efi/libstub/efi-stub-helper.c:513:6: warning: variable 'dp' is used uninitialized whenever 'if' condition is false
- From: kernel test robot <lkp@xxxxxxxxx>
- [efi:urgent] BUILD SUCCESS 03870ad6e047a922e761c07902e41b4ce43e744d
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 1/2] efi: sysfb_efi: Fix DMI quirks not working for simpledrm
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: kernel 6.2 stuck at boot (efi_call_rts) on arm64
- From: Darren Hart <darren@xxxxxxxxxxxxxxxxxxxxxx>
- Re: kernel 6.2 stuck at boot (efi_call_rts) on arm64
- From: Andrea Righi <andrea.righi@xxxxxxxxxxxxx>
- Re: kernel 6.2 stuck at boot (efi_call_rts) on arm64
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: kernel 6.2 stuck at boot (efi_call_rts) on arm64
- From: Andrea Righi <andrea.righi@xxxxxxxxxxxxx>
- Re: kernel 6.2 stuck at boot (efi_call_rts) on arm64
- From: Andrea Righi <andrea.righi@xxxxxxxxxxxxx>
- Re: kernel 6.2 stuck at boot (efi_call_rts) on arm64
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: kernel 6.2 stuck at boot (efi_call_rts) on arm64
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: kernel 6.2 stuck at boot (efi_call_rts) on arm64
- From: Andrea Righi <andrea.righi@xxxxxxxxxxxxx>
- Re: kernel 6.2 stuck at boot (efi_call_rts) on arm64
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: kernel 6.2 stuck at boot (efi_call_rts) on arm64
- From: Andrea Righi <andrea.righi@xxxxxxxxxxxxx>
- Re: kernel 6.2 stuck at boot (efi_call_rts) on arm64
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: kernel 6.2 stuck at boot (efi_call_rts) on arm64
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: kernel 6.2 stuck at boot (efi_call_rts) on arm64
- From: Andrea Righi <andrea.righi@xxxxxxxxxxxxx>
- Re: kernel 6.2 stuck at boot (efi_call_rts) on arm64
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: kernel 6.2 stuck at boot (efi_call_rts) on arm64
- From: Andrea Righi <andrea.righi@xxxxxxxxxxxxx>
- Re: kernel 6.2 stuck at boot (efi_call_rts) on arm64
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: kernel 6.2 stuck at boot (efi_call_rts) on arm64
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: kernel 6.2 stuck at boot (efi_call_rts) on arm64
- From: Andrea Righi <andrea.righi@xxxxxxxxxxxxx>
- Re: kernel 6.2 stuck at boot (efi_call_rts) on arm64
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: kernel 6.2 stuck at boot (efi_call_rts) on arm64
- From: Andrea Righi <andrea.righi@xxxxxxxxxxxxx>
- Re: kernel 6.2 stuck at boot (efi_call_rts) on arm64
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: kernel 6.2 stuck at boot (efi_call_rts) on arm64
- From: Andrea Righi <andrea.righi@xxxxxxxxxxxxx>
- Re: kernel 6.2 stuck at boot (efi_call_rts) on arm64
- From: "Linux regression tracking #adding (Thorsten Leemhuis)" <regressions@xxxxxxxxxxxxx>
- Re: kernel 6.2 stuck at boot (efi_call_rts) on arm64
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- kernel 6.2 stuck at boot (efi_call_rts) on arm64
- From: Andrea Righi <andrea.righi@xxxxxxxxxxxxx>
- Re: [PATCH v5 00/27] x86_64: Improvements at compressed kernel stage
- From: Peter Jones <pjones@xxxxxxxxxx>
- Re: [PATCH v5 09/27] x86/boot: Remove mapping from page fault handler
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- Re: [PATCH v5 00/27] x86_64: Improvements at compressed kernel stage
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- Re: [PATCH v5 00/27] x86_64: Improvements at compressed kernel stage
- From: Gerd Hoffmann <kraxel@xxxxxxxxxx>
- Re: [PATCH V2] efi/libstub: Call setup_graphics() before handle_kernel_image()
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- Re: [PATCH v5 00/27] x86_64: Improvements at compressed kernel stage
- From: "Andy Lutomirski" <luto@xxxxxxxxxx>
- [efi:urgent] BUILD REGRESSION ef3efc2af044f6da5bb8c55e99f2398081d99c09
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH V2] efi/libstub: Call setup_graphics() before handle_kernel_image()
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v5 00/27] x86_64: Improvements at compressed kernel stage
- From: "Andy Lutomirski" <luto@xxxxxxxxxx>
- Re: [PATCH v5 09/27] x86/boot: Remove mapping from page fault handler
- From: "Andy Lutomirski" <luto@xxxxxxxxxx>
- Re: [PATCH 2/2] efi: sysfb_efi: Add quirk for Lenovo Yoga Book X91F/L
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH 1/2] efi: sysfb_efi: Fix DMI quirks not working for simpledrm
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- [efi:urgent 5/5] ld.lld: error: undefined hidden symbol: __efistub__start
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH 2/2] efi: sysfb_efi: Add quirk for Lenovo Yoga Book X91F/L
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH 1/2] efi: sysfb_efi: Fix DMI quirks not working for simpledrm
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v5 18/27] tools/include: Add simplified version of pe.h
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- [PATCH v5 15/27] efi/x86: Support extracting kernel from libstub
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- [PATCH v5 25/27] efi/libstub: Use memory attribute protocol
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- [PATCH v5 21/27] x86/build: Add SETUP_HEADER_OFFSET constant
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- [PATCH v5 23/27] efi/libstub: Don't set ramdisk_image/ramdisk_size
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- [PATCH v5 26/27] efi/libstub: make memory protection warnings include newlines.
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- [PATCH v5 24/27] x86/build: Make generated PE more spec compliant
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- [PATCH v5 27/27] efi/x86: don't try to set page attributes on 0-sized regions.
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- [efi:urgent 5/5] ld.lld: error: undefined hidden symbol: __efistub__text
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v5 22/27] x86/build: set type_of_loader for EFISTUB
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- [PATCH v5 04/27] x86/boot: Increase boot page table size
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- [PATCH v5 05/27] x86/boot: Support 4KB pages for identity mapping
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- [PATCH v5 06/27] x86/boot: Setup memory protection for bzImage code
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- [PATCH v5 02/27] x86/build: Remove RWX sections and align on 4KB
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- [PATCH v5 03/27] x86/boot: Set cr0 to known state in trampoline
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- [PATCH v5 20/27] efi: x86: Use private copy of struct setup_header
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- [PATCH v5 19/27] x86/build: Cleanup tools/build.c
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- [PATCH v5 16/27] x86/boot: Reduce lower limit of physical KASLR
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- [PATCH v5 17/27] x86: decompressor: Remove the 'bugger off' message
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- [PATCH v5 14/27] x86/boot: Add EFI kernel extraction interface
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- [PATCH v5 13/27] x86/boot: Split trampoline and pt init code
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- [PATCH v5 12/27] x86/boot: Make kernel_add_identity_map() a pointer
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- [PATCH v5 11/27] x86/boot: Make console interface more abstract
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- [PATCH v5 08/27] x86/boot: Map memory explicitly
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- [PATCH v5 10/27] efi/libstub: Move helper function to related file
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- [PATCH v5 07/27] x86/build: Check W^X of vmlinux during build
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- [PATCH v5 09/27] x86/boot: Remove mapping from page fault handler
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- [PATCH v5 00/27] x86_64: Improvements at compressed kernel stage
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- [PATCH v5 01/27] x86/boot: Align vmlinuz sections on page size
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- [efi:urgent 5/5] efi-stub-entry.c:undefined reference to `screen_info'
- From: kernel test robot <lkp@xxxxxxxxx>
- [efi:urgent] BUILD REGRESSION 21f136ebfb9ef430ed614c3f10325876a12695d2
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] efi: libstub: Use relocated version of kernel's struct screen_info
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi: libstub: Use relocated version of kernel's struct screen_info
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- [efi:urgent 5/5] ld.lld: error: undefined hidden symbol: __efistub__start
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] efi: libstub: Use relocated version of kernel's struct screen_info
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v4 20/26] x86/build: Make generated PE more spec compliant
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- Re: [PATCH] efi: libstub: Use relocated version of kernel's struct screen_info
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] efi: libstub: Use relocated version of kernel's struct screen_info
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 2/2] efi: libstub: Look for initrd LoadFile2 protocol on image handle
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH] efi: libstub: Always pass screen_info via config table
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi: libstub: Always pass screen_info via config table
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- Re: [PATCH] efi: libstub: Always pass screen_info via config table
- From: WANG Xuerui <kernel@xxxxxxxxxx>
- Re: [PATCH] efi: libstub: Always pass screen_info via config table
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 1/2] efi: libstub: Pass loaded image EFI handle to efi_load_initrd()
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH] efi: earlycon: Reprobe after parsing config tables
- From: Shawn Guo <shawn.guo@xxxxxxxxxx>
- [PATCH] efi: libstub: Always pass screen_info via config table
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] efi: earlycon: Reprobe after parsing config tables
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v4 20/26] x86/build: Make generated PE more spec compliant
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v4 17/26] x86/boot: Reduce size of the DOS stub
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- Re: [PATCH v4 21/26] efi/x86: Explicitly set sections memory attributes
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- Re: [PATCH v4 20/26] x86/build: Make generated PE more spec compliant
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- Re: [PATCH v4 21/26] efi/x86: Explicitly set sections memory attributes
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v4 20/26] x86/build: Make generated PE more spec compliant
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v4 17/26] x86/boot: Reduce size of the DOS stub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v4 23/26] efi/libstub: Use memory attribute protocol
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- Re: [PATCH v4 21/26] efi/x86: Explicitly set sections memory attributes
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- Re: [PATCH v4 20/26] x86/build: Make generated PE more spec compliant
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- Re: [PATCH v4 17/26] x86/boot: Reduce size of the DOS stub
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- Re: [PATCH v4 01/26] x86/boot: Align vmlinuz sections on page size
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v4 13/26] x86/boot: Split trampoline and pt init code
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- Re: [PATCH v4 12/26] x86/boot: Make kernel_add_identity_map() a pointer
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- Re: [PATCH v4 02/26] x86/build: Remove RWX sections and align on 4KB
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- Re: [PATCH v4 01/26] x86/boot: Align vmlinuz sections on page size
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- [efi:urgent] BUILD SUCCESS 3c66bb1918c262dd52fb4221a8d372619c5da70a
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v4 23/26] efi/libstub: Use memory attribute protocol
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v4 21/26] efi/x86: Explicitly set sections memory attributes
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v4 20/26] x86/build: Make generated PE more spec compliant
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v4 15/26] efi/x86: Support extracting kernel from libstub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v4 09/26] x86/boot: Remove mapping from page fault handler
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v4 18/26] tools/include: Add simplified version of pe.h
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v4 17/26] x86/boot: Reduce size of the DOS stub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v4 13/26] x86/boot: Split trampoline and pt init code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v4 12/26] x86/boot: Make kernel_add_identity_map() a pointer
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v4 03/26] x86/boot: Set cr0 to known state in trampoline
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v4 02/26] x86/build: Remove RWX sections and align on 4KB
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v4 01/26] x86/boot: Align vmlinuz sections on page size
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 3/3] arm64: efi: Set NX compat flag in PE/COFF header
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 2/3] efi/libstub: arm64: Remap relocated image with strict permissions
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 1/3] efi/libstub: zboot: Mark zboot EFI application as NX compatible
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 0/3] efi: arm64: Set NX compat flag where appropriate
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 1/2] efi: libstub: Pass loaded image EFI handle to efi_load_initrd()
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 0/2] efi: Allow initrd LoadFile2 proto on loaded image
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 2/2] efi: libstub: Look for initrd LoadFile2 protocol on image handle
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH V2] efi/libstub: Call setup_graphics() before handle_kernel_image()
- From: Huacai Chen <chenhuacai@xxxxxxxxxxx>
- Re: [PATCH] efi/libstub: Call setup_graphics() before handle_kernel_image()
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [RFC PATCH 0/4] efi: x86: Use strict W^X mappings in PE/COFF header
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- Re: [RFC PATCH 0/4] efi: x86: Use strict W^X mappings in PE/COFF header
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH 4/4] efi: x86: Split PE/COFF .text section into .text and .data
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH 4/4] efi: x86: Split PE/COFF .text section into .text and .data
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- Re: [RFC PATCH 0/4] efi: x86: Use strict W^X mappings in PE/COFF header
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- Re: [RFC PATCH 2/4] efi: x86: Move PE header after setup header
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v4 19/26] x86/build: Cleanup tools/build.c
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v4 19/26] x86/build: Cleanup tools/build.c
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- Re: [PATCH v4 15/26] efi/x86: Support extracting kernel from libstub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v4 15/26] efi/x86: Support extracting kernel from libstub
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- Re: [PATCH v4 15/26] efi/x86: Support extracting kernel from libstub
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- Re: [PATCH v4 19/26] x86/build: Cleanup tools/build.c
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v4 15/26] efi/x86: Support extracting kernel from libstub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v4 19/26] x86/build: Cleanup tools/build.c
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- Re: [PATCH v4 15/26] efi/x86: Support extracting kernel from libstub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v4 19/26] x86/build: Cleanup tools/build.c
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] efi/libstub: Call setup_graphics() before handle_kernel_image()
- From: Huacai Chen <chenhuacai@xxxxxxxxxxx>
- Re: [PATCH] cper-arm: Remove unnecessary aer.h include
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: [PATCH] efistub: LoongArch: Reimplement kernel_entry_address()
- From: kernel test robot <lkp@xxxxxxxxx>
- [RFC PATCH 4/4] efi: x86: Split PE/COFF .text section into .text and .data
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [RFC PATCH 2/4] efi: x86: Move PE header after setup header
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [RFC PATCH 0/4] efi: x86: Use strict W^X mappings in PE/COFF header
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [RFC PATCH 1/4] efi: x86: Use private copy of struct setup_header
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [RFC PATCH 3/4] efi: x86: Drop alignment section header flags
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v4 06/26] x86/boot: Setup memory protection for bzImage code
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- Re: [PATCH v4 05/26] x86/boot: Support 4KB pages for identity mapping
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- Re: [PATCH v4 08/26] x86/boot: Map memory explicitly
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- Re: [PATCH v4 07/26] x86/build: Check W^X of vmlinux during build
- From: Evgeniy Baskov <baskov@xxxxxxxxx>
- Re: [PATCH v4 06/26] x86/boot: Setup memory protection for bzImage code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v4 08/26] x86/boot: Map memory explicitly
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v4 05/26] x86/boot: Support 4KB pages for identity mapping
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v4 08/26] x86/boot: Map memory explicitly
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v4 07/26] x86/build: Check W^X of vmlinux during build
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v4 04/26] x86/boot: Increase boot page table size
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v4 0/6] RISC-V kasan rework
- From: Palmer Dabbelt <palmer@xxxxxxxxxxx>
- Re: [PATCH v4 0/6] RISC-V kasan rework
- From: Palmer Dabbelt <palmer@xxxxxxxxxxxx>
- Re: [PATCH v4 0/6] RISC-V kasan rework
- From: patchwork-bot+linux-riscv@xxxxxxxxxx
[Index of Archives]
[Linux Kernel Development]
[Security]
[Linux ARM Kernel]
[Tools]
[Linux MIPS]
[Linux S390]
[Bugtraq]
[Share Photos]>
[Fedora ARM]