Linux EFI/UEFI Development
Thread Index
[
Prev Page
][
Next Page
]
Re: [PATCH v3 2/6] efi/cper: Export cper_mem_err_unpack() for use by modules
From
: Robert Richter <rrichter@xxxxxxx>
Re: [PATCH v3 2/6] efi/cper: Export cper_mem_err_unpack() for use by modules
From
: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
Re: [PATCHv9 03/14] mm/page_alloc: Fake unaccepted memory
From
: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
Re: kernel 6.2 stuck at boot (efi_call_rts) on arm64
From
: Andrea Righi <andrea.righi@xxxxxxxxxxxxx>
Re: [PATCH v3 2/6] efi/cper: Export cper_mem_err_unpack() for use by modules
From
: Terry Bowman <Terry.Bowman@xxxxxxx>
Re: [PATCH v3 2/6] efi/cper: Export cper_mem_err_unpack() for use by modules
From
: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
Re: [PATCH v3 2/6] efi/cper: Export cper_mem_err_unpack() for use by modules
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 2/6] efi/cper: Export cper_mem_err_unpack() for use by modules
From
: Terry Bowman <terry.bowman@xxxxxxx>
Re: [PATCH v5 03/27] x86/boot: Set cr0 to known state in trampoline
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH v5 02/27] x86/build: Remove RWX sections and align on 4KB
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH v5 01/27] x86/boot: Align vmlinuz sections on page size
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH v5 02/27] x86/build: Remove RWX sections and align on 4KB
From
: Gerd Hoffmann <kraxel@xxxxxxxxxx>
[efi:next] BUILD SUCCESS 8364f6d000ede4185a82b1f2514543ed172d4b51
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v5 03/27] x86/boot: Set cr0 to known state in trampoline
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v5 02/27] x86/build: Remove RWX sections and align on 4KB
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v5 01/27] x86/boot: Align vmlinuz sections on page size
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH 2/6] arm64: efi: Enable BTI codegen and add PE/COFF annotation
From
: Mark Brown <broonie@xxxxxxxxxx>
Re: [PATCH v5 00/27] x86_64: Improvements at compressed kernel stage
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: kernel 6.2 stuck at boot (efi_call_rts) on arm64
From
: "Linux regression tracking #update (Thorsten Leemhuis)" <regressions@xxxxxxxxxxxxx>
Re: [PATCH] efi/loongarch: Reintroduce efi_relocate_kernel() to relocate kernel
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] efi/loongarch: Reintroduce efi_relocate_kernel() to relocate kernel
From
: Huacai Chen <chenhuacai@xxxxxxxxxx>
Re: [PATCH] efi/loongarch: Reintroduce efi_relocate_kernel() to relocate kernel
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] efi/loongarch: Reintroduce efi_relocate_kernel() to relocate kernel
From
: Huacai Chen <chenhuacai@xxxxxxxxxx>
[PATCH 6/6] efi/zboot: arm64: Grab code size from image header
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH 5/6] efi/zboot: Set forward edge CFI compat header flag if supported
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH 4/6] efi/zboot: Add BSS padding before compression
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH 3/6] arm64: image: Add code size to the image header
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH 1/6] efi/pe: Import new BTI/IBT header flags from the spec
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH 2/6] arm64: efi: Enable BTI codegen and add PE/COFF annotation
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH 0/6] arm64/efi/zboot: Clean up and enable BTI annotation
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCHv9 03/14] mm/page_alloc: Fake unaccepted memory
From
: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
Re: [PATCHv9 03/14] mm/page_alloc: Fake unaccepted memory
From
: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
Re: [PATCHv9 03/14] mm/page_alloc: Fake unaccepted memory
From
: David Hildenbrand <david@xxxxxxxxxx>
Re: [PATCHv9 00/14] mm, x86/cc: Implement support for unaccepted memory
From
: Vlastimil Babka <vbabka@xxxxxxx>
Re: [PATCHv9 11/14] x86/mm: Avoid load_unaligned_zeropad() stepping into unaccepted memory
From
: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
Re: [PATCHv9 04/14] mm/page_alloc: Add sysfs handle to accept accept_memory
From
: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
Re: [PATCHv9 03/14] mm/page_alloc: Fake unaccepted memory
From
: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
Re: [PATCHv9 04/14] mm/page_alloc: Add sysfs handle to accept accept_memory
From
: Vlastimil Babka <vbabka@xxxxxxx>
Re: [PATCHv9 03/14] mm/page_alloc: Fake unaccepted memory
From
: Vlastimil Babka <vbabka@xxxxxxx>
Re: [PATCHv9 11/14] x86/mm: Avoid load_unaligned_zeropad() stepping into unaccepted memory
From
: Vlastimil Babka <vbabka@xxxxxxx>
Re: [PATCHv9 02/14] mm: Add support for unaccepted memory
From
: Vlastimil Babka <vbabka@xxxxxxx>
Re: [PATCHv9 02/14] mm: Add support for unaccepted memory
From
: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
Re: [PATCHv9 02/14] mm: Add support for unaccepted memory
From
: Vlastimil Babka <vbabka@xxxxxxx>
[PATCH AUTOSEL 5.15 06/11] efi: sysfb_efi: Add quirk for Lenovo Yoga Book X91F/L
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 6.1 10/24] efi: sysfb_efi: Add quirk for Lenovo Yoga Book X91F/L
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 6.2 11/25] efi: sysfb_efi: Add quirk for Lenovo Yoga Book X91F/L
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCHv9 00/14] mm, x86/cc: Implement support for unaccepted memory
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
[PATCHv9 06/14] x86/boot: Add infrastructure required for unaccepted memory support
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
[PATCHv9 14/14] x86/tdx: Add unaccepted memory support
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
[PATCHv9 08/14] x86/boot/compressed: Handle unaccepted memory
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
[PATCHv9 10/14] x86/mm: Provide helpers for unaccepted memory
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
[PATCHv9 09/14] x86/mm: Reserve unaccepted memory bitmap
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
[PATCHv9 12/14] x86/tdx: Make _tdx_hypercall() and __tdx_module_call() available in boot stub
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
[PATCHv9 13/14] x86/tdx: Refactor try_accept_one()
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
[PATCHv9 11/14] x86/mm: Avoid load_unaligned_zeropad() stepping into unaccepted memory
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
[PATCHv9 04/14] mm/page_alloc: Add sysfs handle to accept accept_memory
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
[PATCHv9 05/14] efi/x86: Get full memory map in allocate_e820()
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
[PATCHv9 03/14] mm/page_alloc: Fake unaccepted memory
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
[PATCHv9 07/14] efi/x86: Implement support for unaccepted memory
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
[PATCHv9 01/14] x86/boot: Centralize __pa()/__va() definitions
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
[PATCHv9 02/14] mm: Add support for unaccepted memory
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
Re: [PATCH] efi: zboot: Ensure zboot PIC
From
: Pingfan Liu <kernelfans@xxxxxxxxx>
[PATCH v2 4/4] riscv: libstub: Implement KASLR by using generic functions
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
[PATCH v2 3/4] arm64: libstub: Move KASLR handling functions to efi-stub-helper.c
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
[PATCH v2 2/4] riscv: Dump out kernel offset information on panic
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
[PATCH v2 1/4] riscv: Introduce virtual kernel mapping KASLR
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
[PATCH v2 0/4] riscv: Introduce KASLR
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
Re: [PATCH] efi: zboot: Ensure zboot PIC
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] efi: zboot: Ensure zboot PIC
From
: Pingfan Liu <kernelfans@xxxxxxxxx>
Re: [PATCH] efi: zboot: Ensure zboot PIC
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] efi: zboot: Ensure zboot PIC
From
: Pingfan Liu <kernelfans@xxxxxxxxx>
Re: [PATCH] efi: zboot: Ensure zboot PIC
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH] efi: zboot: Ensure zboot PIC
From
: Pingfan Liu <kernelfans@xxxxxxxxx>
Re: [PATCHv8 06/14] efi/x86: Implement support for unaccepted memory
From
: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
Re: [GIT PULL] EFI fixes for v6.3 #1
From
: pr-tracker-bot@xxxxxxxxxx
[GIT PULL] EFI fixes for v6.3 #1
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[efi:urgent] BUILD SUCCESS 0b1d9debe30304f35c1211e6dcdca1935ce67240
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v2 2/5] efi/cper: Export cper_mem_err_unpack() for CXL logging
From
: Terry Bowman <Terry.Bowman@xxxxxxx>
Re: [PATCH v2] efi: libstub: Use relocated version of kernel's struct screen_info
From
: Huacai Chen <chenhuacai@xxxxxxxxxx>
[efi:urgent] BUILD SUCCESS 10e9aa1d82f64760fc41e4b994ca1689f4cee4ae
From
: kernel test robot <lkp@xxxxxxxxx>
[PATCH 3/3] efi/libstub: smbios: Drop unused 'recsize' parameter
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH 2/3] arm64: efi: Use SMBIOS processor version to key off Ampere quirk
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH 1/3] efi/libstub: smbios: Use length member instead of record struct size
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH 0/3] arm64: efi: Use SMBIOS type 4 record for Altra quirk
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v2] efi: libstub: Use relocated version of kernel's struct screen_info
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[efi:urgent] BUILD SUCCESS d06ecd29e69d087b3f2996dd411118a0376ffc3a
From
: kernel test robot <lkp@xxxxxxxxx>
[efi:next] BUILD SUCCESS bac363715a7c961076e568609a12f62003cd17b0
From
: kernel test robot <lkp@xxxxxxxxx>
[PATCH v2 1/3] efi/libstub: Use const qualified device path protocol pointers
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v2 3/3] efi/libstub: Look for initrd LoadFile2 protocol on image handle
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v2 2/3] efi/libstub: Pass loaded image EFI handle to efi_load_initrd()
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v2 0/3] efi: Allow initrd LoadFile2 proto on loaded image
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH] efi/libstub: zboot: Add compressed image to make targets
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: kernel 6.2 stuck at boot (efi_call_rts) on arm64
From
: Darren Hart <darren@xxxxxxxxxxxxxxxxxxxxxx>
[efi:urgent] BUILD SUCCESS 5ed213dd64681f84a01ceaa82fb336cf7d59ddcf
From
: kernel test robot <lkp@xxxxxxxxx>
[efi:next] BUILD SUCCESS 1ca8f339d8693884feb0e14d2905f4b05418640b
From
: kernel test robot <lkp@xxxxxxxxx>
Re: kernel 6.2 stuck at boot (efi_call_rts) on arm64
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[efi:urgent 12/12] drivers/firmware/efi/libstub/efi-stub-helper.c:528 efi_load_initrd_lf2() error: uninitialized symbol 'dp'.
From
: Dan Carpenter <error27@xxxxxxxxx>
[efi:urgent] BUILD SUCCESS WITH WARNING 86237b46f2b202331c07e4c6c2633ce3d3ba7f13
From
: kernel test robot <lkp@xxxxxxxxx>
[efi:urgent 12/12] drivers/firmware/efi/libstub/efi-stub-helper.c:513:6: warning: variable 'dp' is used uninitialized whenever 'if' condition is false
From
: kernel test robot <lkp@xxxxxxxxx>
[efi:urgent] BUILD SUCCESS 03870ad6e047a922e761c07902e41b4ce43e744d
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH 1/2] efi: sysfb_efi: Fix DMI quirks not working for simpledrm
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: kernel 6.2 stuck at boot (efi_call_rts) on arm64
From
: Darren Hart <darren@xxxxxxxxxxxxxxxxxxxxxx>
Re: kernel 6.2 stuck at boot (efi_call_rts) on arm64
From
: Andrea Righi <andrea.righi@xxxxxxxxxxxxx>
Re: kernel 6.2 stuck at boot (efi_call_rts) on arm64
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: kernel 6.2 stuck at boot (efi_call_rts) on arm64
From
: Andrea Righi <andrea.righi@xxxxxxxxxxxxx>
Re: kernel 6.2 stuck at boot (efi_call_rts) on arm64
From
: Andrea Righi <andrea.righi@xxxxxxxxxxxxx>
Re: kernel 6.2 stuck at boot (efi_call_rts) on arm64
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: kernel 6.2 stuck at boot (efi_call_rts) on arm64
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: kernel 6.2 stuck at boot (efi_call_rts) on arm64
From
: Andrea Righi <andrea.righi@xxxxxxxxxxxxx>
Re: kernel 6.2 stuck at boot (efi_call_rts) on arm64
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: kernel 6.2 stuck at boot (efi_call_rts) on arm64
From
: Andrea Righi <andrea.righi@xxxxxxxxxxxxx>
Re: kernel 6.2 stuck at boot (efi_call_rts) on arm64
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: kernel 6.2 stuck at boot (efi_call_rts) on arm64
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: kernel 6.2 stuck at boot (efi_call_rts) on arm64
From
: Andrea Righi <andrea.righi@xxxxxxxxxxxxx>
Re: kernel 6.2 stuck at boot (efi_call_rts) on arm64
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: kernel 6.2 stuck at boot (efi_call_rts) on arm64
From
: Andrea Righi <andrea.righi@xxxxxxxxxxxxx>
Re: kernel 6.2 stuck at boot (efi_call_rts) on arm64
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: kernel 6.2 stuck at boot (efi_call_rts) on arm64
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: kernel 6.2 stuck at boot (efi_call_rts) on arm64
From
: Andrea Righi <andrea.righi@xxxxxxxxxxxxx>
Re: kernel 6.2 stuck at boot (efi_call_rts) on arm64
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: kernel 6.2 stuck at boot (efi_call_rts) on arm64
From
: Andrea Righi <andrea.righi@xxxxxxxxxxxxx>
Re: kernel 6.2 stuck at boot (efi_call_rts) on arm64
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: kernel 6.2 stuck at boot (efi_call_rts) on arm64
From
: Andrea Righi <andrea.righi@xxxxxxxxxxxxx>
Re: kernel 6.2 stuck at boot (efi_call_rts) on arm64
From
: "Linux regression tracking #adding (Thorsten Leemhuis)" <regressions@xxxxxxxxxxxxx>
Re: kernel 6.2 stuck at boot (efi_call_rts) on arm64
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
kernel 6.2 stuck at boot (efi_call_rts) on arm64
From
: Andrea Righi <andrea.righi@xxxxxxxxxxxxx>
Re: [PATCH v5 00/27] x86_64: Improvements at compressed kernel stage
From
: Peter Jones <pjones@xxxxxxxxxx>
Re: [PATCH v5 09/27] x86/boot: Remove mapping from page fault handler
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH v5 00/27] x86_64: Improvements at compressed kernel stage
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH v5 00/27] x86_64: Improvements at compressed kernel stage
From
: Gerd Hoffmann <kraxel@xxxxxxxxxx>
Re: [PATCH V2] efi/libstub: Call setup_graphics() before handle_kernel_image()
From
: Huacai Chen <chenhuacai@xxxxxxxxxx>
Re: [PATCH v5 00/27] x86_64: Improvements at compressed kernel stage
From
: "Andy Lutomirski" <luto@xxxxxxxxxx>
[efi:urgent] BUILD REGRESSION ef3efc2af044f6da5bb8c55e99f2398081d99c09
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH V2] efi/libstub: Call setup_graphics() before handle_kernel_image()
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v5 00/27] x86_64: Improvements at compressed kernel stage
From
: "Andy Lutomirski" <luto@xxxxxxxxxx>
Re: [PATCH v5 09/27] x86/boot: Remove mapping from page fault handler
From
: "Andy Lutomirski" <luto@xxxxxxxxxx>
Re: [PATCH 2/2] efi: sysfb_efi: Add quirk for Lenovo Yoga Book X91F/L
From
: Javier Martinez Canillas <javierm@xxxxxxxxxx>
Re: [PATCH 1/2] efi: sysfb_efi: Fix DMI quirks not working for simpledrm
From
: Javier Martinez Canillas <javierm@xxxxxxxxxx>
[efi:urgent 5/5] ld.lld: error: undefined hidden symbol: __efistub__start
From
: kernel test robot <lkp@xxxxxxxxx>
[PATCH 2/2] efi: sysfb_efi: Add quirk for Lenovo Yoga Book X91F/L
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH 1/2] efi: sysfb_efi: Fix DMI quirks not working for simpledrm
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v5 18/27] tools/include: Add simplified version of pe.h
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v5 15/27] efi/x86: Support extracting kernel from libstub
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v5 25/27] efi/libstub: Use memory attribute protocol
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v5 21/27] x86/build: Add SETUP_HEADER_OFFSET constant
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v5 23/27] efi/libstub: Don't set ramdisk_image/ramdisk_size
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v5 26/27] efi/libstub: make memory protection warnings include newlines.
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v5 24/27] x86/build: Make generated PE more spec compliant
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v5 27/27] efi/x86: don't try to set page attributes on 0-sized regions.
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[efi:urgent 5/5] ld.lld: error: undefined hidden symbol: __efistub__text
From
: kernel test robot <lkp@xxxxxxxxx>
[PATCH v5 22/27] x86/build: set type_of_loader for EFISTUB
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v5 04/27] x86/boot: Increase boot page table size
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v5 05/27] x86/boot: Support 4KB pages for identity mapping
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v5 06/27] x86/boot: Setup memory protection for bzImage code
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v5 02/27] x86/build: Remove RWX sections and align on 4KB
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v5 03/27] x86/boot: Set cr0 to known state in trampoline
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v5 20/27] efi: x86: Use private copy of struct setup_header
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v5 19/27] x86/build: Cleanup tools/build.c
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v5 16/27] x86/boot: Reduce lower limit of physical KASLR
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v5 17/27] x86: decompressor: Remove the 'bugger off' message
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v5 14/27] x86/boot: Add EFI kernel extraction interface
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v5 13/27] x86/boot: Split trampoline and pt init code
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v5 12/27] x86/boot: Make kernel_add_identity_map() a pointer
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v5 11/27] x86/boot: Make console interface more abstract
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v5 08/27] x86/boot: Map memory explicitly
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v5 10/27] efi/libstub: Move helper function to related file
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v5 07/27] x86/build: Check W^X of vmlinux during build
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v5 09/27] x86/boot: Remove mapping from page fault handler
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v5 00/27] x86_64: Improvements at compressed kernel stage
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v5 01/27] x86/boot: Align vmlinuz sections on page size
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[efi:urgent 5/5] efi-stub-entry.c:undefined reference to `screen_info'
From
: kernel test robot <lkp@xxxxxxxxx>
[efi:urgent] BUILD REGRESSION 21f136ebfb9ef430ed614c3f10325876a12695d2
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH] efi: libstub: Use relocated version of kernel's struct screen_info
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] efi: libstub: Use relocated version of kernel's struct screen_info
From
: Huacai Chen <chenhuacai@xxxxxxxxxx>
[efi:urgent 5/5] ld.lld: error: undefined hidden symbol: __efistub__start
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH] efi: libstub: Use relocated version of kernel's struct screen_info
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4 20/26] x86/build: Make generated PE more spec compliant
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH] efi: libstub: Use relocated version of kernel's struct screen_info
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH] efi: libstub: Use relocated version of kernel's struct screen_info
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 2/2] efi: libstub: Look for initrd LoadFile2 protocol on image handle
From
: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
Re: [PATCH] efi: libstub: Always pass screen_info via config table
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] efi: libstub: Always pass screen_info via config table
From
: Huacai Chen <chenhuacai@xxxxxxxxxx>
Re: [PATCH] efi: libstub: Always pass screen_info via config table
From
: WANG Xuerui <kernel@xxxxxxxxxx>
Re: [PATCH] efi: libstub: Always pass screen_info via config table
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 1/2] efi: libstub: Pass loaded image EFI handle to efi_load_initrd()
From
: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
Re: [PATCH] efi: earlycon: Reprobe after parsing config tables
From
: Shawn Guo <shawn.guo@xxxxxxxxxx>
[PATCH] efi: libstub: Always pass screen_info via config table
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH] efi: earlycon: Reprobe after parsing config tables
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4 20/26] x86/build: Make generated PE more spec compliant
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4 17/26] x86/boot: Reduce size of the DOS stub
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH v4 21/26] efi/x86: Explicitly set sections memory attributes
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH v4 20/26] x86/build: Make generated PE more spec compliant
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH v4 21/26] efi/x86: Explicitly set sections memory attributes
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4 20/26] x86/build: Make generated PE more spec compliant
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4 17/26] x86/boot: Reduce size of the DOS stub
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4 23/26] efi/libstub: Use memory attribute protocol
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH v4 21/26] efi/x86: Explicitly set sections memory attributes
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH v4 20/26] x86/build: Make generated PE more spec compliant
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH v4 17/26] x86/boot: Reduce size of the DOS stub
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH v4 01/26] x86/boot: Align vmlinuz sections on page size
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4 13/26] x86/boot: Split trampoline and pt init code
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH v4 12/26] x86/boot: Make kernel_add_identity_map() a pointer
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH v4 02/26] x86/build: Remove RWX sections and align on 4KB
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH v4 01/26] x86/boot: Align vmlinuz sections on page size
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[efi:urgent] BUILD SUCCESS 3c66bb1918c262dd52fb4221a8d372619c5da70a
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v4 23/26] efi/libstub: Use memory attribute protocol
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4 21/26] efi/x86: Explicitly set sections memory attributes
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4 20/26] x86/build: Make generated PE more spec compliant
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4 15/26] efi/x86: Support extracting kernel from libstub
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4 09/26] x86/boot: Remove mapping from page fault handler
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4 18/26] tools/include: Add simplified version of pe.h
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4 17/26] x86/boot: Reduce size of the DOS stub
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4 13/26] x86/boot: Split trampoline and pt init code
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4 12/26] x86/boot: Make kernel_add_identity_map() a pointer
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4 03/26] x86/boot: Set cr0 to known state in trampoline
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4 02/26] x86/build: Remove RWX sections and align on 4KB
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4 01/26] x86/boot: Align vmlinuz sections on page size
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH 3/3] arm64: efi: Set NX compat flag in PE/COFF header
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH 2/3] efi/libstub: arm64: Remap relocated image with strict permissions
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH 1/3] efi/libstub: zboot: Mark zboot EFI application as NX compatible
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH 0/3] efi: arm64: Set NX compat flag where appropriate
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH 1/2] efi: libstub: Pass loaded image EFI handle to efi_load_initrd()
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH 0/2] efi: Allow initrd LoadFile2 proto on loaded image
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH 2/2] efi: libstub: Look for initrd LoadFile2 protocol on image handle
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH V2] efi/libstub: Call setup_graphics() before handle_kernel_image()
From
: Huacai Chen <chenhuacai@xxxxxxxxxxx>
Re: [PATCH] efi/libstub: Call setup_graphics() before handle_kernel_image()
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [RFC PATCH 0/4] efi: x86: Use strict W^X mappings in PE/COFF header
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [RFC PATCH 0/4] efi: x86: Use strict W^X mappings in PE/COFF header
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [RFC PATCH 4/4] efi: x86: Split PE/COFF .text section into .text and .data
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [RFC PATCH 4/4] efi: x86: Split PE/COFF .text section into .text and .data
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [RFC PATCH 0/4] efi: x86: Use strict W^X mappings in PE/COFF header
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [RFC PATCH 2/4] efi: x86: Move PE header after setup header
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4 19/26] x86/build: Cleanup tools/build.c
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4 19/26] x86/build: Cleanup tools/build.c
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH v4 15/26] efi/x86: Support extracting kernel from libstub
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4 15/26] efi/x86: Support extracting kernel from libstub
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH v4 15/26] efi/x86: Support extracting kernel from libstub
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH v4 19/26] x86/build: Cleanup tools/build.c
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4 15/26] efi/x86: Support extracting kernel from libstub
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4 19/26] x86/build: Cleanup tools/build.c
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH v4 15/26] efi/x86: Support extracting kernel from libstub
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4 19/26] x86/build: Cleanup tools/build.c
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH] efi/libstub: Call setup_graphics() before handle_kernel_image()
From
: Huacai Chen <chenhuacai@xxxxxxxxxxx>
Re: [PATCH] cper-arm: Remove unnecessary aer.h include
From
: Bjorn Helgaas <helgaas@xxxxxxxxxx>
Re: [PATCH] efistub: LoongArch: Reimplement kernel_entry_address()
From
: kernel test robot <lkp@xxxxxxxxx>
[RFC PATCH 4/4] efi: x86: Split PE/COFF .text section into .text and .data
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[RFC PATCH 2/4] efi: x86: Move PE header after setup header
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[RFC PATCH 0/4] efi: x86: Use strict W^X mappings in PE/COFF header
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[RFC PATCH 1/4] efi: x86: Use private copy of struct setup_header
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[RFC PATCH 3/4] efi: x86: Drop alignment section header flags
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4 06/26] x86/boot: Setup memory protection for bzImage code
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH v4 05/26] x86/boot: Support 4KB pages for identity mapping
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH v4 08/26] x86/boot: Map memory explicitly
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH v4 07/26] x86/build: Check W^X of vmlinux during build
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH v4 06/26] x86/boot: Setup memory protection for bzImage code
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4 08/26] x86/boot: Map memory explicitly
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4 05/26] x86/boot: Support 4KB pages for identity mapping
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4 08/26] x86/boot: Map memory explicitly
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4 07/26] x86/build: Check W^X of vmlinux during build
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4 04/26] x86/boot: Increase boot page table size
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4 0/6] RISC-V kasan rework
From
: Palmer Dabbelt <palmer@xxxxxxxxxxx>
Re: [PATCH v4 0/6] RISC-V kasan rework
From
: Palmer Dabbelt <palmer@xxxxxxxxxxxx>
Re: [PATCH v4 0/6] RISC-V kasan rework
From
: patchwork-bot+linux-riscv@xxxxxxxxxx
[PATCH] efi/libstub: randomalloc: Return EFI_OUT_OF_RESOURCES on failure
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] cper-arm: Remove unnecessary aer.h include
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH] cper-arm: Remove unnecessary aer.h include
From
: Bjorn Helgaas <helgaas@xxxxxxxxxx>
[PATCH] efistub: LoongArch: Reimplement kernel_entry_address()
From
: Youling Tang <tangyouling@xxxxxxxxxxx>
[efi:urgent] BUILD SUCCESS 112fd39a2722e1e872f1d30101aa2cca4de5ea86
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH AUTOSEL 6.2 2/6] efi: efivars: prevent double registration
From
: Sasha Levin <sashal@xxxxxxxxxx>
Re: [PATCH AUTOSEL 6.1 2/6] efi: efivars: prevent double registration
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH AUTOSEL 4.14 2/3] efi: efivars: prevent double registration
From
: Sasha Levin <sashal@xxxxxxxxxx>
Re: [PATCH AUTOSEL 4.19 2/3] efi: efivars: prevent double registration
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH AUTOSEL 5.4 2/4] efi: efivars: prevent double registration
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH AUTOSEL 4.14 2/3] efi: efivars: prevent double registration
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH AUTOSEL 5.10 2/5] efi: efivars: prevent double registration
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH AUTOSEL 5.15 2/6] efi: efivars: prevent double registration
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH AUTOSEL 6.2 2/6] efi: efivars: prevent double registration
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH AUTOSEL 4.19 2/3] efi: efivars: prevent double registration
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 5.4 2/4] efi: efivars: prevent double registration
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 5.10 2/5] efi: efivars: prevent double registration
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 5.15 4/6] firmware/efi sysfb_efi: Add quirk for Lenovo IdeaPad Duet 3
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 5.15 2/6] efi: efivars: prevent double registration
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 6.1 4/6] firmware/efi sysfb_efi: Add quirk for Lenovo IdeaPad Duet 3
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 6.2 4/6] firmware/efi sysfb_efi: Add quirk for Lenovo IdeaPad Duet 3
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 6.1 2/6] efi: efivars: prevent double registration
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 6.2 2/6] efi: efivars: prevent double registration
From
: Sasha Levin <sashal@xxxxxxxxxx>
Re: [PATCH] efi/loongarch: Reintroduce efi_relocate_kernel() to relocate kernel
From
: Huacai Chen <chenhuacai@xxxxxxxxxx>
Re: [PATCH] efi/loongarch: Reintroduce efi_relocate_kernel() to relocate kernel
From
: Youling Tang <tangyouling@xxxxxxxxxxx>
Re: [PATCH] efi/loongarch: Reintroduce efi_relocate_kernel() to relocate kernel
From
: Huacai Chen <chenhuacai@xxxxxxxxxx>
Re: [PATCH] efi/loongarch: Reintroduce efi_relocate_kernel() to relocate kernel
From
: Huacai Chen <chenhuacai@xxxxxxxxxx>
Re: [PATCH] efi/loongarch: Reintroduce efi_relocate_kernel() to relocate kernel
From
: Youling Tang <tangyouling@xxxxxxxxxxx>
Re: [PATCH] efi/loongarch: Reintroduce efi_relocate_kernel() to relocate kernel
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH] efi/loongarch: Reintroduce efi_relocate_kernel() to relocate kernel
From
: Huacai Chen <chenhuacai@xxxxxxxxxxx>
[efi:urgent] BUILD SUCCESS 5aed793ff011549535e20b7b15bc705e828223b1
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH] arm64: kaslr: don't pretend KASLR is enabled if offset < MIN_KIMG_ALIGN
From
: Catalin Marinas <catalin.marinas@xxxxxxx>
Re: [PATCH] arm64: kaslr: don't pretend KASLR is enabled if offset < MIN_KIMG_ALIGN
From
: Mark Rutland <mark.rutland@xxxxxxx>
Re: [RFT PATCH 0/2] arm64: efi: Call SetVaMap() with a 1:1 mapping
From
: Darren Hart <darren@xxxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH] efi: x86: make kobj_type structure constant
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH] efi: make kobj_type structure constant
From
: Thomas Weißschuh <linux@xxxxxxxxxxxxxx>
[PATCH] efi: x86: make kobj_type structure constant
From
: Thomas Weißschuh <linux@xxxxxxxxxxxxxx>
Re: [PATCH] arm64: kaslr: don't pretend KASLR is enabled if offset < MIN_KIMG_ALIGN
From
: Mark Brown <broonie@xxxxxxxxxx>
Re: [PATCH] efivarfs: fix NULL-deref on mount when no efivars
From
: Johan Hovold <johan@xxxxxxxxxx>
Re: [GIT PULL] EFI updates for v6.3
From
: pr-tracker-bot@xxxxxxxxxx
[PATCH] arm64: kaslr: don't pretend KASLR is enabled if offset < MIN_KIMG_ALIGN
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] efivarfs: fix NULL-deref on mount when no efivars
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH] efivarfs: fix NULL-deref on mount when no efivars
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH] rtc: efi: Avoid spamming the log on RTC read failure
From
: Alexandre Belloni <alexandre.belloni@xxxxxxxxxxx>
[PATCH v3 3/3] efi: Add tee-based EFI variable driver
From
: Masahisa Kojima <masahisa.kojima@xxxxxxxxxx>
[PATCH v3 1/3] efi: expose efivar generic ops register function
From
: Masahisa Kojima <masahisa.kojima@xxxxxxxxxx>
[PATCH v3 2/3] efi: Add EFI_ACCESS_DENIED status code
From
: Masahisa Kojima <masahisa.kojima@xxxxxxxxxx>
Re: [PATCH 0/4] riscv: Introduce KASLR
From
: Björn Töpel <bjorn@xxxxxxxxxx>
[GIT PULL] EFI updates for v6.3
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v2 2/3] efi: arm64: Wire up BTI annotation in memory attributes table
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v2 2/3] efi: arm64: Wire up BTI annotation in memory attributes table
From
: Mark Brown <broonie@xxxxxxxxxx>
Re: [PATCH v2 4/4] efi: Add tee-based EFI variable driver
From
: kernel test robot <lkp@xxxxxxxxx>
[PATCH v2 4/4] efi: Add tee-based EFI variable driver
From
: Masahisa Kojima <masahisa.kojima@xxxxxxxxxx>
[PATCH v2 2/4] efi: Add EFI_ACCESS_DENIED status code
From
: Masahisa Kojima <masahisa.kojima@xxxxxxxxxx>
[PATCH v2 1/4] efi: expose efivar generic ops register function
From
: Masahisa Kojima <masahisa.kojima@xxxxxxxxxx>
[efi:next] BUILD SUCCESS e1d447157f232c650e6f32c9fb89ff3d0207c69a
From
: kernel test robot <lkp@xxxxxxxxx>
[efi:next] BUILD SUCCESS 685c6689bdf8001cd0261b6210063ee0910bf368
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v2] firmware/efi sysfb_efi: Add quirk for Lenovo IdeaPad Duet 3
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4 3/6] riscv: Move DTB_EARLY_BASE_VA to the kernel address space
From
: Björn Töpel <bjorn@xxxxxxxxxx>
Re: [PATCH v4 6/6] riscv: Unconditionnally select KASAN_VMALLOC if KASAN
From
: Björn Töpel <bjorn@xxxxxxxxxx>
Re: [PATCH v4 5/6] riscv: Fix ptdump when KASAN is enabled
From
: Björn Töpel <bjorn@xxxxxxxxxx>
Re: [PATCH v4 2/6] riscv: Rework kasan population functions
From
: Björn Töpel <bjorn@xxxxxxxxxx>
[PATCH] rtc: efi: Avoid spamming the log on RTC read failure
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [BUG] rtc-efi: Error in efi.get_time() spams dmesg with error message
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4 1/6] riscv: Split early and final KASAN population functions
From
: Björn Töpel <bjorn@xxxxxxxxxx>
Re: [PATCH v1] arm64: efi: Make efi_rt_lock a raw_spinlock
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v1] arm64: efi: Make efi_rt_lock a raw_spinlock
From
: Pierre Gondois <pierre.gondois@xxxxxxx>
Re: [PATCH v1] arm64: efi: Make efi_rt_lock a raw_spinlock
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v1] arm64: efi: Make efi_rt_lock a raw_spinlock
From
: Pierre Gondois <pierre.gondois@xxxxxxx>
[PATCH v1] arm64: efi: Make efi_rt_lock a raw_spinlock
From
: Pierre Gondois <pierre.gondois@xxxxxxx>
Re: [PATCH v2] firmware/efi sysfb_efi: Add quirk for Lenovo IdeaPad Duet 3
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH 4/4] riscv: libstub: Implement KASLR by using generic functions
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
[PATCH 3/4] arm64: libstub: Move KASLR handling functions to efi-stub-helper.c
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
[PATCH 2/4] riscv: Dump out kernel offset information on panic
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
[PATCH 1/4] riscv: Introduce virtual kernel mapping KASLR
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
[PATCH 0/4] riscv: Introduce KASLR
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
[PATCH v2] firmware/efi sysfb_efi: Add quirk for Lenovo IdeaPad Duet 3
From
: Darrell Kavanagh <darrell.kavanagh@xxxxxxxxx>
Re: [PATCH] firmware/efi sysfb_efi: Add quirk for Lenovo IdeaPad Duet 3
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH] firmware/efi sysfb_efi: Add quirk for Lenovo IdeaPad Duet 3
From
: Darrell Kavanagh <darrell.kavanagh@xxxxxxxxx>
Re: [GIT PULL] EFI fixes for v6.2 #4
From
: pr-tracker-bot@xxxxxxxxxx
[GIT PULL] EFI fixes for v6.2 #4
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[efi:next] BUILD SUCCESS 45d5165426ae3ceb35e2c35ad675e7dacd2aa59e
From
: kernel test robot <lkp@xxxxxxxxx>
[PATCH] efi: Add mixed-mode thunk recipe for GetMemoryAttributes
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[efi:next] BUILD SUCCESS 93be2859e26c3be847780c65313da1b261833451
From
: kernel test robot <lkp@xxxxxxxxx>
[efi:urgent] BUILD SUCCESS 190233164cd77115f8dea718cbac561f557092c6
From
: kernel test robot <lkp@xxxxxxxxx>
RE: [PATCH v2] arm64: efi: Force the use of SetVirtualAddressMap() on eMAG and Altra Max machines
From
: Justin He <Justin.He@xxxxxxx>
RE: [PATCH v2] arm64: efi: Force the use of SetVirtualAddressMap() on eMAG and Altra Max machines
From
: Justin He <Justin.He@xxxxxxx>
Re: [PATCH v2] arm64: efi: Force the use of SetVirtualAddressMap() on eMAG and Altra Max machines
From
: Darren Hart <darren@xxxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 3/3] efi: x86: Wire up IBT annotation in memory attributes table
From
: Kees Cook <keescook@xxxxxxxxxxxx>
Re: [PATCH v2 3/3] efi: x86: Wire up IBT annotation in memory attributes table
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH v2 3/3] efi: x86: Wire up IBT annotation in memory attributes table
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v2 3/3] efi: x86: Wire up IBT annotation in memory attributes table
From
: Kees Cook <keescook@xxxxxxxxxxxx>
Re: [PATCH v2 2/3] efi: arm64: Wire up BTI annotation in memory attributes table
From
: Will Deacon <will@xxxxxxxxxx>
Re: [PATCH v2] arm64: efi: Force the use of SetVirtualAddressMap() on eMAG and Altra Max machines
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v2 2/3] efi: arm64: Wire up BTI annotation in memory attributes table
From
: Mark Rutland <mark.rutland@xxxxxxx>
Re: [PATCH v2 2/3] efi: arm64: Wire up BTI annotation in memory attributes table
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
RE: [PATCH v2] arm64: efi: Force the use of SetVirtualAddressMap() on eMAG and Altra Max machines
From
: Justin He <Justin.He@xxxxxxx>
[PATCH v2] arm64: efi: Force the use of SetVirtualAddressMap() on eMAG and Altra Max machines
From
: Darren Hart <darren@xxxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH] arm64: efi: Force the use of SetVirtualAddressMap() on Altra Max machines
From
: Darren Hart <darren@xxxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH] arm64: efi: Force the use of SetVirtualAddressMap() on Altra Max machines
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] arm64: efi: Force the use of SetVirtualAddressMap() on Altra Max machines
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH] arm64: efi: Force the use of SetVirtualAddressMap() on Altra Max machines
From
: Darren Hart <darren@xxxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 3/3] efi: x86: Wire up IBT annotation in memory attributes table
From
: Mark Rutland <mark.rutland@xxxxxxx>
Re: [PATCH v2 3/3] efi: x86: Wire up IBT annotation in memory attributes table
From
: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
Re: [PATCH v2 3/3] efi: x86: Wire up IBT annotation in memory attributes table
From
: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
Re: [PATCH v2 3/3] efi: x86: Wire up IBT annotation in memory attributes table
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH v2 2/3] efi: arm64: Wire up BTI annotation in memory attributes table
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v2 2/3] efi: arm64: Wire up BTI annotation in memory attributes table
From
: Mark Rutland <mark.rutland@xxxxxxx>
Re: [PATCH v2 2/3] efi: arm64: Wire up BTI annotation in memory attributes table
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v2 2/3] efi: arm64: Wire up BTI annotation in memory attributes table
From
: Will Deacon <will@xxxxxxxxxx>
Re: [PATCH v2 0/3] efi: Enable BTI for EFI runtimes services
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
RE: [PATCH 0/2] Fix boot hang issue on Ampere Emag server
From
: Justin He <Justin.He@xxxxxxx>
Re: [PATCH 0/2] Fix boot hang issue on Ampere Emag server
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
RE: [PATCH 0/2] Fix boot hang issue on Ampere Emag server
From
: Justin He <Justin.He@xxxxxxx>
Re: [PATCH 0/2] Fix boot hang issue on Ampere Emag server
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
RE: [PATCH 0/2] Fix boot hang issue on Ampere Emag server
From
: Justin He <Justin.He@xxxxxxx>
Re: [PATCH 0/2] Fix boot hang issue on Ampere Emag server
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
RE: [PATCH 0/2] Fix boot hang issue on Ampere Emag server
From
: Justin He <Justin.He@xxxxxxx>
Re: [PATCH 0/2] Fix boot hang issue on Ampere Emag server
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
RE: [PATCH 0/2] Fix boot hang issue on Ampere Emag server
From
: Justin He <Justin.He@xxxxxxx>
[PATCH v2 3/3] efi: x86: Wire up IBT annotation in memory attributes table
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v2 2/3] efi: arm64: Wire up BTI annotation in memory attributes table
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v2 1/3] efi: Discover BTI support in runtime services regions
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v2 0/3] efi: Enable BTI for EFI runtimes services
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [RFC PATCH 2/2] tee: Add op-tee helper functions for variable access
From
: Masahisa Kojima <masahisa.kojima@xxxxxxxxxx>
[efi:next] BUILD SUCCESS f4412001b6521003e4938d710cbfae5c50f508ad
From
: kernel test robot <lkp@xxxxxxxxx>
[efi:urgent] BUILD SUCCESS 966d47e1f27c45507c5df82b2a2157e5a4fd3909
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH 0/2] efi: Enable BTI for EFI runtimes services
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] efi/cper, cxl: Remove cxl_err.h
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v7 2/6] arm64: kernel: move identity map out of .text mapping
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] efi/cper, cxl: Remove cxl_err.h
From
: Ira Weiny <ira.weiny@xxxxxxxxx>
[PATCH] efi/cper, cxl: Remove cxl_err.h
From
: Dan Williams <dan.j.williams@xxxxxxxxx>
Re: [GIT PULL] EFI fixes for v6.2 batch #3
From
: pr-tracker-bot@xxxxxxxxxx
Re: [PATCH v7 2/6] arm64: kernel: move identity map out of .text mapping
From
: Nathan Chancellor <nathan@xxxxxxxxxx>
[GIT PULL] EFI fixes for v6.2 batch #3
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v2] efi: fix potential NULL deref in efi_mem_reserve_persistent
From
: Anton Gusev <aagusev@xxxxxxxxx>
Re: [PATCH] efi: fix potential NULL deref in efi_mem_reserve_persistent
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH] efi: fix potential NULL deref in efi_mem_reserve_persistent
From
: Anton Gusev <aagusev@xxxxxxxxx>
[efi:urgent] BUILD SUCCESS 636ab417a7aec4ee993916e688eb5c5977570836
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [RFC PATCH 2/2] tee: Add op-tee helper functions for variable access
From
: Jens Wiklander <jens.wiklander@xxxxxxxxxx>
[PATCH v4 6/6] riscv: Unconditionnally select KASAN_VMALLOC if KASAN
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
Re: [PATCH v4 4/6] riscv: Fix EFI stub usage of KASAN instrumented strcmp function
From
: Atish Patra <atishp@xxxxxxxxxxxxxx>
[PATCH v4 5/6] riscv: Fix ptdump when KASAN is enabled
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
[PATCH v4 4/6] riscv: Fix EFI stub usage of KASAN instrumented strcmp function
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
[PATCH v4 3/6] riscv: Move DTB_EARLY_BASE_VA to the kernel address space
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
[PATCH v4 2/6] riscv: Rework kasan population functions
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
[PATCH v4 1/6] riscv: Split early and final KASAN population functions
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
[PATCH v4 0/6] RISC-V kasan rework
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
Re: [PATCH 0/2] efi: Enable BTI for EFI runtimes services
From
: Kees Cook <keescook@xxxxxxxxxxxx>
Re: [PATCH v3 2/6] riscv: Rework kasan population functions
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
RE: [PATCH 0/2] Fix boot hang issue on Ampere Emag server
From
: Justin He <Justin.He@xxxxxxx>
[PATCH 1/2] efi: Discover BTI support in runtime services regions
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH 2/2] efi: arm64: Wire up BTI annotation in memory attributes table
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH 0/2] efi: Enable BTI for EFI runtimes services
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v3 2/6] riscv: Rework kasan population functions
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH 0/2] Fix boot hang issue on Ampere Emag server
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH 0/2] Fix boot hang issue on Ampere Emag server
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH 0/2] Fix boot hang issue on Ampere Emag server
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH v2, RESEND] x86/efi: Safely enable unaccepted memory in UEFI
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH v2, RESEND] x86/efi: Safely enable unaccepted memory in UEFI
From
: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
RE: [PATCH 0/2] Fix boot hang issue on Ampere Emag server
From
: Justin He <Justin.He@xxxxxxx>
[PATCH] efi: Use standard format for printing the EFI revision
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v3 22/24] efi/libstub: Add memory attribute protocol definitions
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v3 22/24] efi/libstub: Add memory attribute protocol definitions
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH v3 22/24] efi/libstub: Add memory attribute protocol definitions
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v2, RESEND] x86/efi: Safely enable unaccepted memory in UEFI
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 0/2] Fix boot hang issue on Ampere Emag server
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 2/2] efi: Introduce efi_get_supported_rt_services() to get the runtime services mask
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 1/2] efi: libstub: Fix the retriving of supported rutime services
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH 2/2] efi: Introduce efi_get_supported_rt_services() to get the runtime services mask
From
: Jia He <justin.he@xxxxxxx>
[PATCH 1/2] efi: libstub: Fix the retriving of supported rutime services
From
: Jia He <justin.he@xxxxxxx>
[PATCH 0/2] Fix boot hang issue on Ampere Emag server
From
: Jia He <justin.he@xxxxxxx>
[efi:next] BUILD SUCCESS 3b7221033c0ed624029157045956a472bb582a44
From
: kernel test robot <lkp@xxxxxxxxx>
[PATCH v2, RESEND] x86/efi: Safely enable unaccepted memory in UEFI
From
: Dionna Glaze <dionnaglaze@xxxxxxxxxx>
[PATCH] efi: zboot: Use EFI protocol to remap code/data with the right attributes
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: general protection fault in efivar_lock
From
: Pedro Falcato <pedro.falcato@xxxxxxxxx>
[efi:next] BUILD SUCCESS 240645b94108b30043095694c49fe3ee013ffbcc
From
: kernel test robot <lkp@xxxxxxxxx>
general protection fault in efivar_lock
From
: Sanan Hasanov <sanan.hasanov@xxxxxxxxxxxxxxx>
Re: [PATCH v3 3/6] riscv: Move DTB_EARLY_BASE_VA to the kernel address space
From
: Conor Dooley <conor.dooley@xxxxxxxxxxxxx>
Re: [PATCH] efivarfs: fix NULL-deref on mount when no efivars
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] efivarfs: fix NULL-deref on mount when no efivars
From
: Johan Hovold <johan@xxxxxxxxxx>
Re: [PATCH] efivarfs: fix NULL-deref on mount when no efivars
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] arm64: head: Switch endianness before populating the ID map
From
: Catalin Marinas <catalin.marinas@xxxxxxx>
[RFC PATCH 2/2] tee: Add op-tee helper functions for variable access
From
: Masahisa Kojima <masahisa.kojima@xxxxxxxxxx>
[RFC PATCH 1/2] efi: expose efivar generic ops register function
From
: Masahisa Kojima <masahisa.kojima@xxxxxxxxxx>
[PATCH] efivarfs: fix NULL-deref on mount when no efivars
From
: Johan Hovold <johan+linaro@xxxxxxxxxx>
Re: [PATCH] arm64: head: Switch endianness before populating the ID map
From
: Nathan Chancellor <nathan@xxxxxxxxxx>
Re: [PATCH] arm64: head: Switch endianness before populating the ID map
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH] arm64: head: Switch endianness before populating the ID map
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v7 4/6] arm64: head: avoid cache invalidation when entering with the MMU on
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v7 4/6] arm64: head: avoid cache invalidation when entering with the MMU on
From
: Nathan Chancellor <nathan@xxxxxxxxxx>
[PATCH v3 6/6] riscv: Unconditionnally select KASAN_VMALLOC if KASAN
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
[PATCH v3 5/6] riscv: Fix ptdump when KASAN is enabled
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
[PATCH v3 4/6] riscv: Fix EFI stub usage of KASAN instrumented strcmp function
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
[PATCH v3 3/6] riscv: Move DTB_EARLY_BASE_VA to the kernel address space
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
[PATCH v3 2/6] riscv: Rework kasan population functions
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
[PATCH v3 1/6] riscv: Split early and final KASAN population functions
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
[PATCH v3 0/6] RISC-V kasan rework
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
Re: please backport EFI patches to v6.1
From
: Sasha Levin <sashal@xxxxxxxxxx>
Re: [PATCH 0/8] generic command line v5
From
: Sean Anderson <sean.anderson@xxxxxxxx>
Re: [PATCH v7 0/6] arm64: Permit EFI boot with MMU and caches on
From
: Catalin Marinas <catalin.marinas@xxxxxxx>
Re: [PATCH v2 1/6] riscv: Split early and final KASAN population functions
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
[efi:next] BUILD SUCCESS 8b30ec8d5eb17bf60bbd0fa8c45d03ad0b9d8a15
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v2 1/6] riscv: Split early and final KASAN population functions
From
: Conor Dooley <conor@xxxxxxxxxx>
please backport EFI patches to v6.1
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [GIT PULL] EFI fixes for v6.2 #2
From
: pr-tracker-bot@xxxxxxxxxx
Re: [GIT PULL] EFI fixes for v6.2 #2
From
: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
[GIT PULL] EFI fixes for v6.2 #2
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 0/4] efi: verify that variable services are supported
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 2/4] efivarfs: always register filesystem
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v2 4/6] riscv: Fix EFI stub usage of KASAN instrumented strcmp function
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v2 6/6] riscv: Unconditionnally select KASAN_VMALLOC if KASAN
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
[PATCH v2 5/6] riscv: Fix ptdump when KASAN is enabled
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
[PATCH v2 4/6] riscv: Fix EFI stub usage of KASAN instrumented strcmp function
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
[PATCH v2 3/6] riscv: Move DTB_EARLY_BASE_VA to the kernel address space
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
[PATCH v2 2/6] riscv: Rework kasan population functions
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
[PATCH v2 1/6] riscv: Split early and final KASAN population functions
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
[PATCH v2 0/6] RISC-V kasan rework
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
Re: [PATCH v2] efi: drop obsolete efivars sysfs documentation
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v2] efi: drop obsolete efivars sysfs documentation
From
: Johan Hovold <johan@xxxxxxxxxx>
Re: [PATCH v2] efi: drop obsolete efivars sysfs documentation
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v2] efi: drop obsolete efivars sysfs documentation
From
: Johan Hovold <johan+linaro@xxxxxxxxxx>
Re: [PATCH v3 0/5] efi: Support ESRT under Xen
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 1/2] arm64: efi: Execute runtime services from a dedicated stack
From
: Greg KH <greg@xxxxxxxxx>
Re: Is there a known boot failure with 6.2-rc and the Intel SDV EFI systems?
From
: "Linux kernel regression tracking (#update)" <regressions@xxxxxxxxxxxxx>
Re: Is there a known boot failure with 6.2-rc and the Intel SDV EFI systems?
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: Is there a known boot failure with 6.2-rc and the Intel SDV EFI systems?
From
: "Linux kernel regression tracking (#adding)" <regressions@xxxxxxxxxxxxx>
Re: [PATCH] efi: tpm: Avoid READ_ONCE() for accessing the event log
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH] efi: drop obsolete efivars sysfs documentation
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH 2/4] efivarfs: always register filesystem
From
: Johan Hovold <johan@xxxxxxxxxx>
Re: [PATCH 2/4] efivarfs: always register filesystem
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: Is there a known boot failure with 6.2-rc and the Intel SDV EFI systems?
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH] efi: drop obsolete efivars sysfs documentation
From
: Johan Hovold <johan+linaro@xxxxxxxxxx>
[PATCH 2/4] efivarfs: always register filesystem
From
: Johan Hovold <johan+linaro@xxxxxxxxxx>
[PATCH 1/4] efi: efivars: add efivars printk prefix
From
: Johan Hovold <johan+linaro@xxxxxxxxxx>
Is there a known boot failure with 6.2-rc and the Intel SDV EFI systems?
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v3 5/5] efi: Warn if trying to reserve memory under Xen
From
: Demi Marie Obenour <demi@xxxxxxxxxxxxxxxxxxxxxx>
[PATCH v3 3/5] efi: Apply allowlist to EFI configuration tables when running under Xen
From
: Demi Marie Obenour <demi@xxxxxxxxxxxxxxxxxxxxxx>
[PATCH v3 1/5] efi: memmap: Disregard bogus entries instead of returning them
From
: Demi Marie Obenour <demi@xxxxxxxxxxxxxxxxxxxxxx>
[PATCH v3 2/5] efi: xen: Implement memory descriptor lookup based on hypercall
From
: Demi Marie Obenour <demi@xxxxxxxxxxxxxxxxxxxxxx>
[PATCH v3 4/5] efi: Actually enable the ESRT under Xen
From
: Demi Marie Obenour <demi@xxxxxxxxxxxxxxxxxxxxxx>
[PATCH v3 0/5] efi: Support ESRT under Xen
From
: Demi Marie Obenour <demi@xxxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 3/4] firmware: Add support for Qualcomm UEFI Secure Application
From
: Maximilian Luz <luzmaximilian@xxxxxxxxx>
Re: [PATCH 3/4] firmware: Add support for Qualcomm UEFI Secure Application
From
: Johan Hovold <johan@xxxxxxxxxx>
[PATCH 3/4] efi: verify that variable services are supported
From
: Johan Hovold <johan+linaro@xxxxxxxxxx>
[PATCH 4/4] efi: efivars: prevent double registration
From
: Johan Hovold <johan+linaro@xxxxxxxxxx>
[PATCH 0/4] efi: verify that variable services are supported
From
: Johan Hovold <johan+linaro@xxxxxxxxxx>
[efi:urgent] BUILD SUCCESS e1fabbc83cb1dd4ba63932faa86c9cacb8bf791e
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH 3/4] firmware: Add support for Qualcomm UEFI Secure Application
From
: Maximilian Luz <luzmaximilian@xxxxxxxxx>
Re: [PATCH v2] ACPI: PRM: Check whether EFI runtime is available
From
: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
Re: [PATCH v2] x86/efi: Safely enable unaccepted memory in UEFI
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v2] x86/efi: Safely enable unaccepted memory in UEFI
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [RFT PATCH 0/2] arm64: efi: Call SetVaMap() with a 1:1 mapping
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [RFT PATCH 0/2] arm64: efi: Call SetVaMap() with a 1:1 mapping
From
: Nathan Chancellor <nathan@xxxxxxxxxx>
Re: [PATCH v2] x86/efi: Safely enable unaccepted memory in UEFI
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [RFT PATCH 0/2] arm64: efi: Call SetVaMap() with a 1:1 mapping
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [edk2-devel] [PATCH v2] x86/efi: Safely enable unaccepted memory in UEFI
From
: Gerd Hoffmann <kraxel@xxxxxxxxxx>
[efi:next] BUILD SUCCESS 2cf9e278efeff8f8bbb9580e2d6760e19795e310
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [RFT PATCH 0/2] arm64: efi: Call SetVaMap() with a 1:1 mapping
From
: Nathan Chancellor <nathan@xxxxxxxxxx>
Re: [PATCH] efi: Remove Matthew Garrett as efivarfs maintainer
From
: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
[PATCH] efi: Remove Matthew Garrett as efivarfs maintainer
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 1/2] arm64: efi: Execute runtime services from a dedicated stack
From
: Lee Jones <lee@xxxxxxxxxx>
Re: [PATCH v2] x86/efi: Safely enable unaccepted memory in UEFI
From
: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
Re: [PATCH 0/2] efi: efivars: drop kobject from efivars_register()
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v2] ACPI: PRM: Check whether EFI runtime is available
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [RFT PATCH 0/2] arm64: efi: Call SetVaMap() with a 1:1 mapping
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[RFT PATCH 2/2] arm64: efi: Force use of SetVirtualAddressMap() on MS Surface
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[RFT PATCH 1/2] arm64: efi: Prefer a flat virtual mapping of the runtime services
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[RFT PATCH 0/2] arm64: efi: Call SetVaMap() with a 1:1 mapping
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH 2/2] efi: efivars: make efivar_supports_writes() return bool
From
: Johan Hovold <johan+linaro@xxxxxxxxxx>
[PATCH 1/2] efi: efivars: drop kobject from efivars_register()
From
: Johan Hovold <johan+linaro@xxxxxxxxxx>
[PATCH 0/2] efi: efivars: drop kobject from efivars_register()
From
: Johan Hovold <johan+linaro@xxxxxxxxxx>
Re: [PATCH v2] ACPI: PRM: Check whether EFI runtime is available
From
: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
Re: [PATCH 3/4] firmware: Add support for Qualcomm UEFI Secure Application
From
: Maximilian Luz <luzmaximilian@xxxxxxxxx>
Re: [PATCH 3/4] firmware: Add support for Qualcomm UEFI Secure Application
From
: Johan Hovold <johan@xxxxxxxxxx>
Re: [PATCH v2] x86/efi: Safely enable unaccepted memory in UEFI
From
: Gerd Hoffmann <kraxel@xxxxxxxxxx>
Re: [PATCH v2] x86/efi: Safely enable unaccepted memory in UEFI
From
: Gerd Hoffmann <kraxel@xxxxxxxxxx>
Re: [PATCH 3/4] firmware: Add support for Qualcomm UEFI Secure Application
From
: Maximilian Luz <luzmaximilian@xxxxxxxxx>
Re: [PATCH 3/4] firmware: Add support for Qualcomm UEFI Secure Application
From
: Johan Hovold <johan@xxxxxxxxxx>
Re: [PATCH v2] x86/efi: Safely enable unaccepted memory in UEFI
From
: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
Re: [PATCH v2] x86/efi: Safely enable unaccepted memory in UEFI
From
: Tom Lendacky <thomas.lendacky@xxxxxxx>
Re: [PATCH v2] x86/efi: Safely enable unaccepted memory in UEFI
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH v2] x86/efi: Safely enable unaccepted memory in UEFI
From
: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
Re: Report Use-After-Free in capsule-loader.c
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v2] x86/efi: Safely enable unaccepted memory in UEFI
From
: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
Re: [PATCHv8 02/14] mm: Add support for unaccepted memory
From
: Mel Gorman <mgorman@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] x86/efi: Safely enable unaccepted memory in UEFI
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v2] x86/efi: Safely enable unaccepted memory in UEFI
From
: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
Re: [PATCH v2] x86/efi: Safely enable unaccepted memory in UEFI
From
: Gerd Hoffmann <kraxel@xxxxxxxxxx>
Re: [PATCH v2 5/6] efi: xen: Implement memory descriptor lookup based on hypercall
From
: Marek Marczykowski-Górecki <marmarek@xxxxxxxxxxxxxxxxxxxxxx>
[efi:urgent] BUILD SUCCESS 8118d6171a5f68caa56b3f4af6f49cf7ad481f41
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v2] x86/efi: Safely enable unaccepted memory in UEFI
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
[PATCH v2] x86/efi: Safely enable unaccepted memory in UEFI
From
: Dionna Glaze <dionnaglaze@xxxxxxxxxx>
Re: [PATCH] x86/efi: Safely enable unaccepted memory in UEFI
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [GIT PULL] EFI fixes for v6.2 #1
From
: pr-tracker-bot@xxxxxxxxxx
[GIT PULL] EFI fixes for v6.2 #1
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: linker problem with Ubuntu 18.04 tool chain: unknown architecture of input file `arch/arm64/boot/vmlinuz.o' is incompatible with aarch64 output
From
: Lukas Bulwahn <lukas.bulwahn@xxxxxxxxx>
Re: linker problem with Ubuntu 18.04 tool chain: unknown architecture of input file `arch/arm64/boot/vmlinuz.o' is incompatible with aarch64 output
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: linker problem with Ubuntu 18.04 tool chain: unknown architecture of input file `arch/arm64/boot/vmlinuz.o' is incompatible with aarch64 output
From
: Lukas Bulwahn <lukas.bulwahn@xxxxxxxxx>
Re: linker problem with Ubuntu 18.04 tool chain: unknown architecture of input file `arch/arm64/boot/vmlinuz.o' is incompatible with aarch64 output
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
linker problem with Ubuntu 18.04 tool chain: unknown architecture of input file `arch/arm64/boot/vmlinuz.o' is incompatible with aarch64 output
From
: Lukas Bulwahn <lukas.bulwahn@xxxxxxxxx>
[PATCH v2] ACPI: PRM: Check whether EFI runtime is available
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] ACPI: PRM: Check whether EFI runtime is available
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] ACPI: PRM: Check whether EFI runtime is available
From
: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
Re: [PATCHv8 02/14] mm: Add support for unaccepted memory
From
: Vlastimil Babka <vbabka@xxxxxxx>
[efi:urgent] BUILD SUCCESS 608509b15a311df6a5b9cf1dbe034a4f52784315
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v3 2/2] arm64: efi: Account for the EFI runtime stack in stack unwinder
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v3 2/2] arm64: efi: Account for the EFI runtime stack in stack unwinder
From
: Nathan Chancellor <nathan@xxxxxxxxxx>
Re: [PATCH] ACPI: PRM: Check whether EFI runtime is available
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] ACPI: PRM: Check whether EFI runtime is available
From
: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
[PATCH] ACPI: PRM: Check whether EFI runtime is available
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[efi:urgent] BUILD SUCCESS 2084037b838d2ab5c97e66704b8cf397c5f43805
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v7 0/6] arm64: Permit EFI boot with MMU and caches on
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v7 2/6] arm64: kernel: move identity map out of .text mapping
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v7 6/6] efi: arm64: enter with MMU and caches enabled
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v7 5/6] arm64: head: Clean the ID map and the HYP text to the PoC if needed
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v7 3/6] arm64: head: record the MMU state at primary entry
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v7 4/6] arm64: head: avoid cache invalidation when entering with the MMU on
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v7 1/6] arm64: head: Move all finalise_el2 calls to after __enable_mmu
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v7 0/6] arm64: Permit EFI boot with MMU and caches on
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v3 2/2] arm64: efi: Account for the EFI runtime stack in stack unwinder
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[efi:next] BUILD SUCCESS 2a5b4ccf0de17e47e9ad13ee0fda9436d5de0a35
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v3 2/2] arm64: efi: Account for the EFI runtime stack in stack unwinder
From
: Nathan Chancellor <nathan@xxxxxxxxxx>
Re: [PATCH v1 1/2] efi/earlycon: Replace open coded strnchrnul()
From
: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
Re: [PATCH v3 0/3] Add generic framebuffer support to EFI earlycon driver
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v3 0/3] Add generic framebuffer support to EFI earlycon driver
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v1 1/2] efi/earlycon: Replace open coded strnchrnul()
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v1 1/2] efi/earlycon: Replace open coded strnchrnul()
From
: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
[efi:urgent] BUILD SUCCESS 7b817a99509125ee1337888ec453a76ce5937ae8
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v2] rtc: efi: Enable SET/GET WAKEUP services as optional
From
: Alexandre Belloni <alexandre.belloni@xxxxxxxxxxx>
Re: [PATCH] efi: tpm: Avoid READ_ONCE() for accessing the event log
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] efi: tpm: Avoid READ_ONCE() for accessing the event log
From
: Nathan Chancellor <nathan@xxxxxxxxxx>
Re: [PATCH] efi: tpm: Avoid READ_ONCE() for accessing the event log
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] efi: tpm: Avoid READ_ONCE() for accessing the event log
From
: Will Deacon <will@xxxxxxxxxx>
Re: [PATCH] efi: tpm: Avoid READ_ONCE() for accessing the event log
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] efi: tpm: Avoid READ_ONCE() for accessing the event log
From
: Will Deacon <will@xxxxxxxxxx>
[PATCH] efi: rt-wrapper: Add missing include
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v3 0/2] efi: Follow-up fixes for EFI runtime stack
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v3 1/2] arm64: efi: Avoid workqueue to check whether EFI runtime is live
From
: Mark Rutland <mark.rutland@xxxxxxx>
Re: [PATCH v3 0/2] efi: Follow-up fixes for EFI runtime stack
From
: Lee Jones <lee@xxxxxxxxxx>
[PATCH] efi: tpm: Avoid READ_ONCE() for accessing the event log
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v3 1/1] mm: Always release pages to the buddy allocator in memblock_free_late().
From
: Mike Rapoport <rppt@xxxxxxxxxx>
Re: [PATCH] x86/boot: Check if the input parameter (buffer) of the function is a null pointer
From
: Ingo Molnar <mingo@xxxxxxxxxx>
[PATCH v3 0/1] Pages not released from memblock to the buddy allocator
From
: Aaron Thompson <dev@xxxxxxxxxx>
[PATCH v3 1/1] mm: Always release pages to the buddy allocator in memblock_free_late().
From
: Aaron Thompson <dev@xxxxxxxxxx>
[PATCH v3 0/2] efi: Follow-up fixes for EFI runtime stack
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 1/2] arm64: efi: Avoid workqueue to check whether EFI runtime is live
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 2/2] arm64: efi: Account for the EFI runtime stack in stack unwinder
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v2 1/2] arm64: efi: Avoid workqueue to check whether EFI runtime is live
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v2 1/1] mm: Always release pages to the buddy allocator in memblock_free_late().
From
: Ingo Molnar <mingo@xxxxxxxxxx>
Re: [PATCH v2 1/1] mm: Always release pages to the buddy allocator in memblock_free_late().
From
: Aaron Thompson <dev@xxxxxxxxxx>
Re: [PATCH v2 13/17] driver core: Use device's fwnode to check if it is waiting for suppliers
From
: Dmitry Baryshkov <dmitry.baryshkov@xxxxxxxxxx>
Re: [PATCH 1/2] arm64: efi: Execute runtime services from a dedicated stack
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 1/2] arm64: efi: Execute runtime services from a dedicated stack
From
: Mark Rutland <mark.rutland@xxxxxxx>
Re: [PATCH v2 2/2] arm64: efi: Account for the EFI runtime stack in stack unwinder
From
: Mark Rutland <mark.rutland@xxxxxxx>
Re: [PATCH v2 1/2] arm64: efi: Avoid workqueue to check whether EFI runtime is live
From
: Mark Rutland <mark.rutland@xxxxxxx>
Re: [PATCH 1/2] arm64: efi: Execute runtime services from a dedicated stack
From
: Greg KH <greg@xxxxxxxxx>
Re: [PATCH v2 1/1] mm: Always release pages to the buddy allocator in memblock_free_late().
From
: Ingo Molnar <mingo@xxxxxxxxxx>
Re: [PATCH 1/1] mm: Always release pages to the buddy allocator in memblock_free_late().
From
: Aaron Thompson <dev@xxxxxxxxxx>
[PATCH v2 1/1] mm: Always release pages to the buddy allocator in memblock_free_late().
From
: Aaron Thompson <dev@xxxxxxxxxx>
[PATCH v2 0/1] Pages not released from memblock to the buddy allocator
From
: Aaron Thompson <dev@xxxxxxxxxx>
Re: [PATCH 0/1] Pages not released from memblock to the buddy allocator
From
: David Rientjes <rientjes@xxxxxxxxxx>
Re: [PATCH 1/1] mm: Always release pages to the buddy allocator in memblock_free_late().
From
: Mike Rapoport <rppt@xxxxxxxxxx>
[PATCH v2 2/2] arm64: efi: Account for the EFI runtime stack in stack unwinder
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v2 1/2] arm64: efi: Avoid workqueue to check whether EFI runtime is live
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v2 0/2] efi: Follow-up fixes for EFI runtime stack
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 1/2] arm64: efi: Execute runtime services from a dedicated stack
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 1/2] arm64: efi: Execute runtime services from a dedicated stack
From
: Mark Rutland <mark.rutland@xxxxxxx>
Re: [PATCH 1/2] arm64: efi: Execute runtime services from a dedicated stack
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 1/2] arm64: efi: Execute runtime services from a dedicated stack
From
: Mark Rutland <mark.rutland@xxxxxxx>
Re: [PATCH 4/6] riscv: Fix EFI stub usage of KASAN instrumented string functions
From
: Heiko Stübner <heiko@xxxxxxxxx>
Re: [PATCH v3 12/14] efi/riscv: libstub: mark when compiling libstub
From
: Heiko Stübner <heiko@xxxxxxxxx>
Re: [PATCH v3 12/14] efi/riscv: libstub: mark when compiling libstub
From
: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
Re: [PATCH 1/2] arm64: efi: Execute runtime services from a dedicated stack
From
: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 1/2] arm64: efi: Execute runtime services from a dedicated stack
From
: Lee Jones <lee@xxxxxxxxxx>
Re: [PATCH 1/2] arm64: efi: Execute runtime services from a dedicated stack
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 1/2] arm64: efi: Execute runtime services from a dedicated stack
From
: Lee Jones <lee@xxxxxxxxxx>
[PATCH 0/1] Pages not released from memblock to the buddy allocator
From
: Aaron Thompson <dev@xxxxxxxxxx>
[PATCH 1/1] mm: Always release pages to the buddy allocator in memblock_free_late().
From
: Aaron Thompson <dev@xxxxxxxxxx>
[efi:urgent] BUILD SUCCESS e006ac3003080177cf0b673441a4241f77aaecce
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH 1/1] efi: rtc: Enable SET/GET WAKEUP services as optional
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 1/1] efi: rtc: Enable SET/GET WAKEUP services as optional
From
: Shanker Donthineni <sdonthineni@xxxxxxxxxx>
Re: [PATCHv8 06/14] efi/x86: Implement support for unaccepted memory
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCHv8 05/14] x86/boot: Add infrastructure required for unaccepted memory support
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH 1/1] efi: rtc: Enable SET/GET WAKEUP services as optional
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[efi:urgent] BUILD SUCCESS 8a38790a9df1b89c86182dd40410c9e2de8fd563
From
: kernel test robot <lkp@xxxxxxxxx>
[PATCH v2] rtc: efi: Enable SET/GET WAKEUP services as optional
From
: Shanker Donthineni <sdonthineni@xxxxxxxxxx>
Re: [PATCH 1/1] efi: rtc: Enable SET/GET WAKEUP services as optional
From
: Shanker Donthineni <sdonthineni@xxxxxxxxxx>
Re: [PATCH 1/1] efi: rtc: Enable SET/GET WAKEUP services as optional
From
: Alexandre Belloni <alexandre.belloni@xxxxxxxxxxx>
Re: [PATCH] efi: fix userspace infinite retry read efivars after EFI runtime services page fault
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 1/1] efi: rtc: Enable SET/GET WAKEUP services as optional
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v3 0/3] Add generic framebuffer support to EFI earlycon driver
From
: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
Re: [PATCH 0/2] Recover from failure to probe GPU
From
: Javier Martinez Canillas <javierm@xxxxxxxxxx>
Re: [PATCH 0/2] Recover from failure to probe GPU
From
: Alex Deucher <alexdeucher@xxxxxxxxx>
Re: [PATCH 0/2] Recover from failure to probe GPU
From
: Alex Deucher <alexdeucher@xxxxxxxxx>
[PATCH] efi: fix userspace infinite retry read efivars after EFI runtime services page fault
From
: Ding Hui <dinghui@xxxxxxxxxxxxxx>
[PATCH 1/1] efi: rtc: Enable SET/GET WAKEUP services as optional
From
: Shanker Donthineni <sdonthineni@xxxxxxxxxx>
Re: [PATCHv8 02/14] mm: Add support for unaccepted memory
From
: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
Re: [PATCHv8 02/14] mm: Add support for unaccepted memory
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH 0/2] Recover from failure to probe GPU
From
: Christian König <christian.koenig@xxxxxxx>
Re: [PATCHv8 02/14] mm: Add support for unaccepted memory
From
: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
Re: [PATCH 0/2] Recover from failure to probe GPU
From
: Thomas Zimmermann <tzimmermann@xxxxxxx>
Re: [PATCH 0/2] Recover from failure to probe GPU
From
: Mario Limonciello <mario.limonciello@xxxxxxx>
[Index of Archives]
[Linux Kernel Development]
[Security]
[Linux ARM Kernel]
[Tools]
[Linux MIPS]
[Linux S390]
[Bugtraq]
[Share Photos]>
[Fedora ARM]