Linux EFI/UEFI Development
Thread Index
[
Prev Page
][
Next Page
]
[PATCH v2 3/3] efi: x86: Wire up IBT annotation in memory attributes table
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v2 2/3] efi: arm64: Wire up BTI annotation in memory attributes table
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v2 1/3] efi: Discover BTI support in runtime services regions
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v2 0/3] efi: Enable BTI for EFI runtimes services
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [RFC PATCH 2/2] tee: Add op-tee helper functions for variable access
From
: Masahisa Kojima <masahisa.kojima@xxxxxxxxxx>
[efi:next] BUILD SUCCESS f4412001b6521003e4938d710cbfae5c50f508ad
From
: kernel test robot <lkp@xxxxxxxxx>
[efi:urgent] BUILD SUCCESS 966d47e1f27c45507c5df82b2a2157e5a4fd3909
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH 0/2] efi: Enable BTI for EFI runtimes services
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] efi/cper, cxl: Remove cxl_err.h
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v7 2/6] arm64: kernel: move identity map out of .text mapping
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] efi/cper, cxl: Remove cxl_err.h
From
: Ira Weiny <ira.weiny@xxxxxxxxx>
[PATCH] efi/cper, cxl: Remove cxl_err.h
From
: Dan Williams <dan.j.williams@xxxxxxxxx>
Re: [GIT PULL] EFI fixes for v6.2 batch #3
From
: pr-tracker-bot@xxxxxxxxxx
Re: [PATCH v7 2/6] arm64: kernel: move identity map out of .text mapping
From
: Nathan Chancellor <nathan@xxxxxxxxxx>
[GIT PULL] EFI fixes for v6.2 batch #3
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v2] efi: fix potential NULL deref in efi_mem_reserve_persistent
From
: Anton Gusev <aagusev@xxxxxxxxx>
Re: [PATCH] efi: fix potential NULL deref in efi_mem_reserve_persistent
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH] efi: fix potential NULL deref in efi_mem_reserve_persistent
From
: Anton Gusev <aagusev@xxxxxxxxx>
[efi:urgent] BUILD SUCCESS 636ab417a7aec4ee993916e688eb5c5977570836
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [RFC PATCH 2/2] tee: Add op-tee helper functions for variable access
From
: Jens Wiklander <jens.wiklander@xxxxxxxxxx>
[PATCH v4 6/6] riscv: Unconditionnally select KASAN_VMALLOC if KASAN
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
Re: [PATCH v4 4/6] riscv: Fix EFI stub usage of KASAN instrumented strcmp function
From
: Atish Patra <atishp@xxxxxxxxxxxxxx>
[PATCH v4 5/6] riscv: Fix ptdump when KASAN is enabled
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
[PATCH v4 4/6] riscv: Fix EFI stub usage of KASAN instrumented strcmp function
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
[PATCH v4 3/6] riscv: Move DTB_EARLY_BASE_VA to the kernel address space
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
[PATCH v4 2/6] riscv: Rework kasan population functions
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
[PATCH v4 1/6] riscv: Split early and final KASAN population functions
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
[PATCH v4 0/6] RISC-V kasan rework
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
Re: [PATCH 0/2] efi: Enable BTI for EFI runtimes services
From
: Kees Cook <keescook@xxxxxxxxxxxx>
Re: [PATCH v3 2/6] riscv: Rework kasan population functions
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
RE: [PATCH 0/2] Fix boot hang issue on Ampere Emag server
From
: Justin He <Justin.He@xxxxxxx>
[PATCH 1/2] efi: Discover BTI support in runtime services regions
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH 2/2] efi: arm64: Wire up BTI annotation in memory attributes table
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH 0/2] efi: Enable BTI for EFI runtimes services
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v3 2/6] riscv: Rework kasan population functions
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH 0/2] Fix boot hang issue on Ampere Emag server
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH 0/2] Fix boot hang issue on Ampere Emag server
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH 0/2] Fix boot hang issue on Ampere Emag server
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH v2, RESEND] x86/efi: Safely enable unaccepted memory in UEFI
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH v2, RESEND] x86/efi: Safely enable unaccepted memory in UEFI
From
: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
RE: [PATCH 0/2] Fix boot hang issue on Ampere Emag server
From
: Justin He <Justin.He@xxxxxxx>
[PATCH] efi: Use standard format for printing the EFI revision
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v3 22/24] efi/libstub: Add memory attribute protocol definitions
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v3 22/24] efi/libstub: Add memory attribute protocol definitions
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH v3 22/24] efi/libstub: Add memory attribute protocol definitions
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v2, RESEND] x86/efi: Safely enable unaccepted memory in UEFI
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 0/2] Fix boot hang issue on Ampere Emag server
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 2/2] efi: Introduce efi_get_supported_rt_services() to get the runtime services mask
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 1/2] efi: libstub: Fix the retriving of supported rutime services
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH 2/2] efi: Introduce efi_get_supported_rt_services() to get the runtime services mask
From
: Jia He <justin.he@xxxxxxx>
[PATCH 1/2] efi: libstub: Fix the retriving of supported rutime services
From
: Jia He <justin.he@xxxxxxx>
[PATCH 0/2] Fix boot hang issue on Ampere Emag server
From
: Jia He <justin.he@xxxxxxx>
[efi:next] BUILD SUCCESS 3b7221033c0ed624029157045956a472bb582a44
From
: kernel test robot <lkp@xxxxxxxxx>
[PATCH v2, RESEND] x86/efi: Safely enable unaccepted memory in UEFI
From
: Dionna Glaze <dionnaglaze@xxxxxxxxxx>
[PATCH] efi: zboot: Use EFI protocol to remap code/data with the right attributes
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: general protection fault in efivar_lock
From
: Pedro Falcato <pedro.falcato@xxxxxxxxx>
[efi:next] BUILD SUCCESS 240645b94108b30043095694c49fe3ee013ffbcc
From
: kernel test robot <lkp@xxxxxxxxx>
general protection fault in efivar_lock
From
: Sanan Hasanov <sanan.hasanov@xxxxxxxxxxxxxxx>
Re: [PATCH v3 3/6] riscv: Move DTB_EARLY_BASE_VA to the kernel address space
From
: Conor Dooley <conor.dooley@xxxxxxxxxxxxx>
Re: [PATCH] efivarfs: fix NULL-deref on mount when no efivars
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] efivarfs: fix NULL-deref on mount when no efivars
From
: Johan Hovold <johan@xxxxxxxxxx>
Re: [PATCH] efivarfs: fix NULL-deref on mount when no efivars
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] arm64: head: Switch endianness before populating the ID map
From
: Catalin Marinas <catalin.marinas@xxxxxxx>
[RFC PATCH 2/2] tee: Add op-tee helper functions for variable access
From
: Masahisa Kojima <masahisa.kojima@xxxxxxxxxx>
[RFC PATCH 1/2] efi: expose efivar generic ops register function
From
: Masahisa Kojima <masahisa.kojima@xxxxxxxxxx>
[PATCH] efivarfs: fix NULL-deref on mount when no efivars
From
: Johan Hovold <johan+linaro@xxxxxxxxxx>
Re: [PATCH] arm64: head: Switch endianness before populating the ID map
From
: Nathan Chancellor <nathan@xxxxxxxxxx>
Re: [PATCH] arm64: head: Switch endianness before populating the ID map
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH] arm64: head: Switch endianness before populating the ID map
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v7 4/6] arm64: head: avoid cache invalidation when entering with the MMU on
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v7 4/6] arm64: head: avoid cache invalidation when entering with the MMU on
From
: Nathan Chancellor <nathan@xxxxxxxxxx>
[PATCH v3 6/6] riscv: Unconditionnally select KASAN_VMALLOC if KASAN
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
[PATCH v3 5/6] riscv: Fix ptdump when KASAN is enabled
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
[PATCH v3 4/6] riscv: Fix EFI stub usage of KASAN instrumented strcmp function
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
[PATCH v3 3/6] riscv: Move DTB_EARLY_BASE_VA to the kernel address space
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
[PATCH v3 2/6] riscv: Rework kasan population functions
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
[PATCH v3 1/6] riscv: Split early and final KASAN population functions
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
[PATCH v3 0/6] RISC-V kasan rework
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
Re: please backport EFI patches to v6.1
From
: Sasha Levin <sashal@xxxxxxxxxx>
Re: [PATCH 0/8] generic command line v5
From
: Sean Anderson <sean.anderson@xxxxxxxx>
Re: [PATCH v7 0/6] arm64: Permit EFI boot with MMU and caches on
From
: Catalin Marinas <catalin.marinas@xxxxxxx>
Re: [PATCH v2 1/6] riscv: Split early and final KASAN population functions
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
[efi:next] BUILD SUCCESS 8b30ec8d5eb17bf60bbd0fa8c45d03ad0b9d8a15
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v2 1/6] riscv: Split early and final KASAN population functions
From
: Conor Dooley <conor@xxxxxxxxxx>
please backport EFI patches to v6.1
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [GIT PULL] EFI fixes for v6.2 #2
From
: pr-tracker-bot@xxxxxxxxxx
Re: [GIT PULL] EFI fixes for v6.2 #2
From
: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
[GIT PULL] EFI fixes for v6.2 #2
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 0/4] efi: verify that variable services are supported
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 2/4] efivarfs: always register filesystem
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v2 4/6] riscv: Fix EFI stub usage of KASAN instrumented strcmp function
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v2 6/6] riscv: Unconditionnally select KASAN_VMALLOC if KASAN
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
[PATCH v2 5/6] riscv: Fix ptdump when KASAN is enabled
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
[PATCH v2 4/6] riscv: Fix EFI stub usage of KASAN instrumented strcmp function
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
[PATCH v2 3/6] riscv: Move DTB_EARLY_BASE_VA to the kernel address space
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
[PATCH v2 2/6] riscv: Rework kasan population functions
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
[PATCH v2 1/6] riscv: Split early and final KASAN population functions
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
[PATCH v2 0/6] RISC-V kasan rework
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
Re: [PATCH v2] efi: drop obsolete efivars sysfs documentation
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v2] efi: drop obsolete efivars sysfs documentation
From
: Johan Hovold <johan@xxxxxxxxxx>
Re: [PATCH v2] efi: drop obsolete efivars sysfs documentation
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v2] efi: drop obsolete efivars sysfs documentation
From
: Johan Hovold <johan+linaro@xxxxxxxxxx>
Re: [PATCH v3 0/5] efi: Support ESRT under Xen
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 1/2] arm64: efi: Execute runtime services from a dedicated stack
From
: Greg KH <greg@xxxxxxxxx>
Re: Is there a known boot failure with 6.2-rc and the Intel SDV EFI systems?
From
: "Linux kernel regression tracking (#update)" <regressions@xxxxxxxxxxxxx>
Re: Is there a known boot failure with 6.2-rc and the Intel SDV EFI systems?
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: Is there a known boot failure with 6.2-rc and the Intel SDV EFI systems?
From
: "Linux kernel regression tracking (#adding)" <regressions@xxxxxxxxxxxxx>
Re: [PATCH] efi: tpm: Avoid READ_ONCE() for accessing the event log
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH] efi: drop obsolete efivars sysfs documentation
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH 2/4] efivarfs: always register filesystem
From
: Johan Hovold <johan@xxxxxxxxxx>
Re: [PATCH 2/4] efivarfs: always register filesystem
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: Is there a known boot failure with 6.2-rc and the Intel SDV EFI systems?
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH] efi: drop obsolete efivars sysfs documentation
From
: Johan Hovold <johan+linaro@xxxxxxxxxx>
[PATCH 2/4] efivarfs: always register filesystem
From
: Johan Hovold <johan+linaro@xxxxxxxxxx>
[PATCH 1/4] efi: efivars: add efivars printk prefix
From
: Johan Hovold <johan+linaro@xxxxxxxxxx>
Is there a known boot failure with 6.2-rc and the Intel SDV EFI systems?
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v3 5/5] efi: Warn if trying to reserve memory under Xen
From
: Demi Marie Obenour <demi@xxxxxxxxxxxxxxxxxxxxxx>
[PATCH v3 3/5] efi: Apply allowlist to EFI configuration tables when running under Xen
From
: Demi Marie Obenour <demi@xxxxxxxxxxxxxxxxxxxxxx>
[PATCH v3 1/5] efi: memmap: Disregard bogus entries instead of returning them
From
: Demi Marie Obenour <demi@xxxxxxxxxxxxxxxxxxxxxx>
[PATCH v3 2/5] efi: xen: Implement memory descriptor lookup based on hypercall
From
: Demi Marie Obenour <demi@xxxxxxxxxxxxxxxxxxxxxx>
[PATCH v3 4/5] efi: Actually enable the ESRT under Xen
From
: Demi Marie Obenour <demi@xxxxxxxxxxxxxxxxxxxxxx>
[PATCH v3 0/5] efi: Support ESRT under Xen
From
: Demi Marie Obenour <demi@xxxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 3/4] firmware: Add support for Qualcomm UEFI Secure Application
From
: Maximilian Luz <luzmaximilian@xxxxxxxxx>
Re: [PATCH 3/4] firmware: Add support for Qualcomm UEFI Secure Application
From
: Johan Hovold <johan@xxxxxxxxxx>
[PATCH 3/4] efi: verify that variable services are supported
From
: Johan Hovold <johan+linaro@xxxxxxxxxx>
[PATCH 4/4] efi: efivars: prevent double registration
From
: Johan Hovold <johan+linaro@xxxxxxxxxx>
[PATCH 0/4] efi: verify that variable services are supported
From
: Johan Hovold <johan+linaro@xxxxxxxxxx>
[efi:urgent] BUILD SUCCESS e1fabbc83cb1dd4ba63932faa86c9cacb8bf791e
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH 3/4] firmware: Add support for Qualcomm UEFI Secure Application
From
: Maximilian Luz <luzmaximilian@xxxxxxxxx>
Re: [PATCH v2] ACPI: PRM: Check whether EFI runtime is available
From
: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
Re: [PATCH v2] x86/efi: Safely enable unaccepted memory in UEFI
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v2] x86/efi: Safely enable unaccepted memory in UEFI
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [RFT PATCH 0/2] arm64: efi: Call SetVaMap() with a 1:1 mapping
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [RFT PATCH 0/2] arm64: efi: Call SetVaMap() with a 1:1 mapping
From
: Nathan Chancellor <nathan@xxxxxxxxxx>
Re: [PATCH v2] x86/efi: Safely enable unaccepted memory in UEFI
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [RFT PATCH 0/2] arm64: efi: Call SetVaMap() with a 1:1 mapping
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [edk2-devel] [PATCH v2] x86/efi: Safely enable unaccepted memory in UEFI
From
: Gerd Hoffmann <kraxel@xxxxxxxxxx>
[efi:next] BUILD SUCCESS 2cf9e278efeff8f8bbb9580e2d6760e19795e310
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [RFT PATCH 0/2] arm64: efi: Call SetVaMap() with a 1:1 mapping
From
: Nathan Chancellor <nathan@xxxxxxxxxx>
Re: [PATCH] efi: Remove Matthew Garrett as efivarfs maintainer
From
: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
[PATCH] efi: Remove Matthew Garrett as efivarfs maintainer
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 1/2] arm64: efi: Execute runtime services from a dedicated stack
From
: Lee Jones <lee@xxxxxxxxxx>
Re: [PATCH v2] x86/efi: Safely enable unaccepted memory in UEFI
From
: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
Re: [PATCH 0/2] efi: efivars: drop kobject from efivars_register()
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v2] ACPI: PRM: Check whether EFI runtime is available
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [RFT PATCH 0/2] arm64: efi: Call SetVaMap() with a 1:1 mapping
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[RFT PATCH 2/2] arm64: efi: Force use of SetVirtualAddressMap() on MS Surface
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[RFT PATCH 1/2] arm64: efi: Prefer a flat virtual mapping of the runtime services
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[RFT PATCH 0/2] arm64: efi: Call SetVaMap() with a 1:1 mapping
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH 2/2] efi: efivars: make efivar_supports_writes() return bool
From
: Johan Hovold <johan+linaro@xxxxxxxxxx>
[PATCH 1/2] efi: efivars: drop kobject from efivars_register()
From
: Johan Hovold <johan+linaro@xxxxxxxxxx>
[PATCH 0/2] efi: efivars: drop kobject from efivars_register()
From
: Johan Hovold <johan+linaro@xxxxxxxxxx>
Re: [PATCH v2] ACPI: PRM: Check whether EFI runtime is available
From
: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
Re: [PATCH 3/4] firmware: Add support for Qualcomm UEFI Secure Application
From
: Maximilian Luz <luzmaximilian@xxxxxxxxx>
Re: [PATCH 3/4] firmware: Add support for Qualcomm UEFI Secure Application
From
: Johan Hovold <johan@xxxxxxxxxx>
Re: [PATCH v2] x86/efi: Safely enable unaccepted memory in UEFI
From
: Gerd Hoffmann <kraxel@xxxxxxxxxx>
Re: [PATCH v2] x86/efi: Safely enable unaccepted memory in UEFI
From
: Gerd Hoffmann <kraxel@xxxxxxxxxx>
Re: [PATCH 3/4] firmware: Add support for Qualcomm UEFI Secure Application
From
: Maximilian Luz <luzmaximilian@xxxxxxxxx>
Re: [PATCH 3/4] firmware: Add support for Qualcomm UEFI Secure Application
From
: Johan Hovold <johan@xxxxxxxxxx>
Re: [PATCH v2] x86/efi: Safely enable unaccepted memory in UEFI
From
: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
Re: [PATCH v2] x86/efi: Safely enable unaccepted memory in UEFI
From
: Tom Lendacky <thomas.lendacky@xxxxxxx>
Re: [PATCH v2] x86/efi: Safely enable unaccepted memory in UEFI
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH v2] x86/efi: Safely enable unaccepted memory in UEFI
From
: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
Re: Report Use-After-Free in capsule-loader.c
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v2] x86/efi: Safely enable unaccepted memory in UEFI
From
: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
Re: [PATCHv8 02/14] mm: Add support for unaccepted memory
From
: Mel Gorman <mgorman@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] x86/efi: Safely enable unaccepted memory in UEFI
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v2] x86/efi: Safely enable unaccepted memory in UEFI
From
: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
Re: [PATCH v2] x86/efi: Safely enable unaccepted memory in UEFI
From
: Gerd Hoffmann <kraxel@xxxxxxxxxx>
Re: [PATCH v2 5/6] efi: xen: Implement memory descriptor lookup based on hypercall
From
: Marek Marczykowski-Górecki <marmarek@xxxxxxxxxxxxxxxxxxxxxx>
[efi:urgent] BUILD SUCCESS 8118d6171a5f68caa56b3f4af6f49cf7ad481f41
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v2] x86/efi: Safely enable unaccepted memory in UEFI
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
[PATCH v2] x86/efi: Safely enable unaccepted memory in UEFI
From
: Dionna Glaze <dionnaglaze@xxxxxxxxxx>
Re: [PATCH] x86/efi: Safely enable unaccepted memory in UEFI
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [GIT PULL] EFI fixes for v6.2 #1
From
: pr-tracker-bot@xxxxxxxxxx
[GIT PULL] EFI fixes for v6.2 #1
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: linker problem with Ubuntu 18.04 tool chain: unknown architecture of input file `arch/arm64/boot/vmlinuz.o' is incompatible with aarch64 output
From
: Lukas Bulwahn <lukas.bulwahn@xxxxxxxxx>
Re: linker problem with Ubuntu 18.04 tool chain: unknown architecture of input file `arch/arm64/boot/vmlinuz.o' is incompatible with aarch64 output
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: linker problem with Ubuntu 18.04 tool chain: unknown architecture of input file `arch/arm64/boot/vmlinuz.o' is incompatible with aarch64 output
From
: Lukas Bulwahn <lukas.bulwahn@xxxxxxxxx>
Re: linker problem with Ubuntu 18.04 tool chain: unknown architecture of input file `arch/arm64/boot/vmlinuz.o' is incompatible with aarch64 output
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
linker problem with Ubuntu 18.04 tool chain: unknown architecture of input file `arch/arm64/boot/vmlinuz.o' is incompatible with aarch64 output
From
: Lukas Bulwahn <lukas.bulwahn@xxxxxxxxx>
[PATCH v2] ACPI: PRM: Check whether EFI runtime is available
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] ACPI: PRM: Check whether EFI runtime is available
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] ACPI: PRM: Check whether EFI runtime is available
From
: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
Re: [PATCHv8 02/14] mm: Add support for unaccepted memory
From
: Vlastimil Babka <vbabka@xxxxxxx>
[efi:urgent] BUILD SUCCESS 608509b15a311df6a5b9cf1dbe034a4f52784315
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v3 2/2] arm64: efi: Account for the EFI runtime stack in stack unwinder
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v3 2/2] arm64: efi: Account for the EFI runtime stack in stack unwinder
From
: Nathan Chancellor <nathan@xxxxxxxxxx>
Re: [PATCH] ACPI: PRM: Check whether EFI runtime is available
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] ACPI: PRM: Check whether EFI runtime is available
From
: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
[PATCH] ACPI: PRM: Check whether EFI runtime is available
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[efi:urgent] BUILD SUCCESS 2084037b838d2ab5c97e66704b8cf397c5f43805
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v7 0/6] arm64: Permit EFI boot with MMU and caches on
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v7 2/6] arm64: kernel: move identity map out of .text mapping
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v7 6/6] efi: arm64: enter with MMU and caches enabled
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v7 5/6] arm64: head: Clean the ID map and the HYP text to the PoC if needed
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v7 3/6] arm64: head: record the MMU state at primary entry
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v7 4/6] arm64: head: avoid cache invalidation when entering with the MMU on
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v7 1/6] arm64: head: Move all finalise_el2 calls to after __enable_mmu
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v7 0/6] arm64: Permit EFI boot with MMU and caches on
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v3 2/2] arm64: efi: Account for the EFI runtime stack in stack unwinder
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[efi:next] BUILD SUCCESS 2a5b4ccf0de17e47e9ad13ee0fda9436d5de0a35
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v3 2/2] arm64: efi: Account for the EFI runtime stack in stack unwinder
From
: Nathan Chancellor <nathan@xxxxxxxxxx>
Re: [PATCH v1 1/2] efi/earlycon: Replace open coded strnchrnul()
From
: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
Re: [PATCH v3 0/3] Add generic framebuffer support to EFI earlycon driver
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v3 0/3] Add generic framebuffer support to EFI earlycon driver
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v1 1/2] efi/earlycon: Replace open coded strnchrnul()
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v1 1/2] efi/earlycon: Replace open coded strnchrnul()
From
: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
[efi:urgent] BUILD SUCCESS 7b817a99509125ee1337888ec453a76ce5937ae8
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v2] rtc: efi: Enable SET/GET WAKEUP services as optional
From
: Alexandre Belloni <alexandre.belloni@xxxxxxxxxxx>
Re: [PATCH] efi: tpm: Avoid READ_ONCE() for accessing the event log
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] efi: tpm: Avoid READ_ONCE() for accessing the event log
From
: Nathan Chancellor <nathan@xxxxxxxxxx>
Re: [PATCH] efi: tpm: Avoid READ_ONCE() for accessing the event log
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] efi: tpm: Avoid READ_ONCE() for accessing the event log
From
: Will Deacon <will@xxxxxxxxxx>
Re: [PATCH] efi: tpm: Avoid READ_ONCE() for accessing the event log
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] efi: tpm: Avoid READ_ONCE() for accessing the event log
From
: Will Deacon <will@xxxxxxxxxx>
[PATCH] efi: rt-wrapper: Add missing include
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v3 0/2] efi: Follow-up fixes for EFI runtime stack
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v3 1/2] arm64: efi: Avoid workqueue to check whether EFI runtime is live
From
: Mark Rutland <mark.rutland@xxxxxxx>
Re: [PATCH v3 0/2] efi: Follow-up fixes for EFI runtime stack
From
: Lee Jones <lee@xxxxxxxxxx>
[PATCH] efi: tpm: Avoid READ_ONCE() for accessing the event log
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v3 1/1] mm: Always release pages to the buddy allocator in memblock_free_late().
From
: Mike Rapoport <rppt@xxxxxxxxxx>
Re: [PATCH] x86/boot: Check if the input parameter (buffer) of the function is a null pointer
From
: Ingo Molnar <mingo@xxxxxxxxxx>
[PATCH v3 0/1] Pages not released from memblock to the buddy allocator
From
: Aaron Thompson <dev@xxxxxxxxxx>
[PATCH v3 1/1] mm: Always release pages to the buddy allocator in memblock_free_late().
From
: Aaron Thompson <dev@xxxxxxxxxx>
[PATCH v3 0/2] efi: Follow-up fixes for EFI runtime stack
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 1/2] arm64: efi: Avoid workqueue to check whether EFI runtime is live
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 2/2] arm64: efi: Account for the EFI runtime stack in stack unwinder
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v2 1/2] arm64: efi: Avoid workqueue to check whether EFI runtime is live
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v2 1/1] mm: Always release pages to the buddy allocator in memblock_free_late().
From
: Ingo Molnar <mingo@xxxxxxxxxx>
Re: [PATCH v2 1/1] mm: Always release pages to the buddy allocator in memblock_free_late().
From
: Aaron Thompson <dev@xxxxxxxxxx>
Re: [PATCH v2 13/17] driver core: Use device's fwnode to check if it is waiting for suppliers
From
: Dmitry Baryshkov <dmitry.baryshkov@xxxxxxxxxx>
Re: [PATCH 1/2] arm64: efi: Execute runtime services from a dedicated stack
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 1/2] arm64: efi: Execute runtime services from a dedicated stack
From
: Mark Rutland <mark.rutland@xxxxxxx>
Re: [PATCH v2 2/2] arm64: efi: Account for the EFI runtime stack in stack unwinder
From
: Mark Rutland <mark.rutland@xxxxxxx>
Re: [PATCH v2 1/2] arm64: efi: Avoid workqueue to check whether EFI runtime is live
From
: Mark Rutland <mark.rutland@xxxxxxx>
Re: [PATCH 1/2] arm64: efi: Execute runtime services from a dedicated stack
From
: Greg KH <greg@xxxxxxxxx>
Re: [PATCH v2 1/1] mm: Always release pages to the buddy allocator in memblock_free_late().
From
: Ingo Molnar <mingo@xxxxxxxxxx>
Re: [PATCH 1/1] mm: Always release pages to the buddy allocator in memblock_free_late().
From
: Aaron Thompson <dev@xxxxxxxxxx>
[PATCH v2 1/1] mm: Always release pages to the buddy allocator in memblock_free_late().
From
: Aaron Thompson <dev@xxxxxxxxxx>
[PATCH v2 0/1] Pages not released from memblock to the buddy allocator
From
: Aaron Thompson <dev@xxxxxxxxxx>
Re: [PATCH 0/1] Pages not released from memblock to the buddy allocator
From
: David Rientjes <rientjes@xxxxxxxxxx>
Re: [PATCH 1/1] mm: Always release pages to the buddy allocator in memblock_free_late().
From
: Mike Rapoport <rppt@xxxxxxxxxx>
[PATCH v2 2/2] arm64: efi: Account for the EFI runtime stack in stack unwinder
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v2 1/2] arm64: efi: Avoid workqueue to check whether EFI runtime is live
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v2 0/2] efi: Follow-up fixes for EFI runtime stack
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 1/2] arm64: efi: Execute runtime services from a dedicated stack
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 1/2] arm64: efi: Execute runtime services from a dedicated stack
From
: Mark Rutland <mark.rutland@xxxxxxx>
Re: [PATCH 1/2] arm64: efi: Execute runtime services from a dedicated stack
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 1/2] arm64: efi: Execute runtime services from a dedicated stack
From
: Mark Rutland <mark.rutland@xxxxxxx>
Re: [PATCH 4/6] riscv: Fix EFI stub usage of KASAN instrumented string functions
From
: Heiko Stübner <heiko@xxxxxxxxx>
Re: [PATCH v3 12/14] efi/riscv: libstub: mark when compiling libstub
From
: Heiko Stübner <heiko@xxxxxxxxx>
Re: [PATCH v3 12/14] efi/riscv: libstub: mark when compiling libstub
From
: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
Re: [PATCH 1/2] arm64: efi: Execute runtime services from a dedicated stack
From
: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 1/2] arm64: efi: Execute runtime services from a dedicated stack
From
: Lee Jones <lee@xxxxxxxxxx>
Re: [PATCH 1/2] arm64: efi: Execute runtime services from a dedicated stack
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 1/2] arm64: efi: Execute runtime services from a dedicated stack
From
: Lee Jones <lee@xxxxxxxxxx>
[PATCH 0/1] Pages not released from memblock to the buddy allocator
From
: Aaron Thompson <dev@xxxxxxxxxx>
[PATCH 1/1] mm: Always release pages to the buddy allocator in memblock_free_late().
From
: Aaron Thompson <dev@xxxxxxxxxx>
[efi:urgent] BUILD SUCCESS e006ac3003080177cf0b673441a4241f77aaecce
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH 1/1] efi: rtc: Enable SET/GET WAKEUP services as optional
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 1/1] efi: rtc: Enable SET/GET WAKEUP services as optional
From
: Shanker Donthineni <sdonthineni@xxxxxxxxxx>
Re: [PATCHv8 06/14] efi/x86: Implement support for unaccepted memory
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCHv8 05/14] x86/boot: Add infrastructure required for unaccepted memory support
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH 1/1] efi: rtc: Enable SET/GET WAKEUP services as optional
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[efi:urgent] BUILD SUCCESS 8a38790a9df1b89c86182dd40410c9e2de8fd563
From
: kernel test robot <lkp@xxxxxxxxx>
[PATCH v2] rtc: efi: Enable SET/GET WAKEUP services as optional
From
: Shanker Donthineni <sdonthineni@xxxxxxxxxx>
Re: [PATCH 1/1] efi: rtc: Enable SET/GET WAKEUP services as optional
From
: Shanker Donthineni <sdonthineni@xxxxxxxxxx>
Re: [PATCH 1/1] efi: rtc: Enable SET/GET WAKEUP services as optional
From
: Alexandre Belloni <alexandre.belloni@xxxxxxxxxxx>
Re: [PATCH] efi: fix userspace infinite retry read efivars after EFI runtime services page fault
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 1/1] efi: rtc: Enable SET/GET WAKEUP services as optional
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v3 0/3] Add generic framebuffer support to EFI earlycon driver
From
: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
Re: [PATCH 0/2] Recover from failure to probe GPU
From
: Javier Martinez Canillas <javierm@xxxxxxxxxx>
Re: [PATCH 0/2] Recover from failure to probe GPU
From
: Alex Deucher <alexdeucher@xxxxxxxxx>
Re: [PATCH 0/2] Recover from failure to probe GPU
From
: Alex Deucher <alexdeucher@xxxxxxxxx>
[PATCH] efi: fix userspace infinite retry read efivars after EFI runtime services page fault
From
: Ding Hui <dinghui@xxxxxxxxxxxxxx>
[PATCH 1/1] efi: rtc: Enable SET/GET WAKEUP services as optional
From
: Shanker Donthineni <sdonthineni@xxxxxxxxxx>
Re: [PATCHv8 02/14] mm: Add support for unaccepted memory
From
: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
Re: [PATCHv8 02/14] mm: Add support for unaccepted memory
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH 0/2] Recover from failure to probe GPU
From
: Christian König <christian.koenig@xxxxxxx>
Re: [PATCHv8 02/14] mm: Add support for unaccepted memory
From
: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
Re: [PATCH 0/2] Recover from failure to probe GPU
From
: Thomas Zimmermann <tzimmermann@xxxxxxx>
Re: [PATCH 0/2] Recover from failure to probe GPU
From
: Mario Limonciello <mario.limonciello@xxxxxxx>
Re: [PATCH v3 0/3] Add generic framebuffer support to EFI earlycon driver
From
: Markuss Broks <markuss.broks@xxxxxxxxx>
Re: [PATCH v3 0/3] Add generic framebuffer support to EFI earlycon driver
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] efi: fix NULL-deref in init error path
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: Queries about disabling EFI runtime services late
From
: Dave Young <dyoung@xxxxxxxxxx>
Re: Queries about disabling EFI runtime services late
From
: Dave Young <dyoung@xxxxxxxxxx>
Re: [PATCH 0/6] RISC-V kasan rework
From
: Conor Dooley <conor@xxxxxxxxxx>
Re: [PATCH 0/2] Recover from failure to probe GPU
From
: Javier Martinez Canillas <javierm@xxxxxxxxxx>
[PATCH 1/2] firmware: sysfb: Allow re-creating system framebuffer after init
From
: Mario Limonciello <mario.limonciello@xxxxxxx>
[PATCH 0/2] Recover from failure to probe GPU
From
: Mario Limonciello <mario.limonciello@xxxxxxx>
Re: Queries about disabling EFI runtime services late
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 4/6] riscv: Fix EFI stub usage of KASAN instrumented string functions
From
: Conor Dooley <conor@xxxxxxxxxx>
Re: [PATCH 4/6] riscv: Fix EFI stub usage of KASAN instrumented string functions
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
Re: [PATCH 4/6] riscv: Fix EFI stub usage of KASAN instrumented string functions
From
: Conor Dooley <conor@xxxxxxxxxx>
[PATCH v3 3/3] efi: earlycon: Add support for generic framebuffers
From
: Markuss Broks <markuss.broks@xxxxxxxxx>
[PATCH v3 2/3] efi: earlycon: move to video/console to prepare for changes
From
: Markuss Broks <markuss.broks@xxxxxxxxx>
[PATCH v3 1/3] drivers: serial: earlycon: Pass device-tree node
From
: Markuss Broks <markuss.broks@xxxxxxxxx>
[PATCH v3 0/3] Add generic framebuffer support to EFI earlycon driver
From
: Markuss Broks <markuss.broks@xxxxxxxxx>
Re: Queries about disabling EFI runtime services late
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Queries about disabling EFI runtime services late
From
: Dave Young <dyoung@xxxxxxxxxx>
Re: [PATCH v2] efi: random: fix NULL-deref when refreshing seed
From
: Steev Klimaszewski <steev@xxxxxxxx>
Re: [PATCH v4 00/26] x86_64: Improvements at compressed kernel stage
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH v2] efi: random: fix NULL-deref when refreshing seed
From
: Johan Hovold <johan@xxxxxxxxxx>
Re: [PATCH v2] efi: random: fix NULL-deref when refreshing seed
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH] efi: random: fix NULL-deref when refreshing seed
From
: Johan Hovold <johan@xxxxxxxxxx>
[PATCH v2] efi: random: fix NULL-deref when refreshing seed
From
: Johan Hovold <johan+linaro@xxxxxxxxxx>
[PATCH] efi: fix NULL-deref in init error path
From
: Johan Hovold <johan+linaro@xxxxxxxxxx>
Re: [PATCH] efi: random: fix NULL-deref when refreshing seed
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH] efi: random: fix NULL-deref when refreshing seed
From
: Andrew Halaney <ahalaney@xxxxxxxxxx>
[PATCH 6/6] riscv: Unconditionnally select KASAN_VMALLOC if KASAN
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
[PATCH 5/6] riscv: Fix ptdump when KASAN is enabled
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
[PATCH 4/6] riscv: Fix EFI stub usage of KASAN instrumented string functions
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
[PATCH 3/6] riscv: Move DTB_EARLY_BASE_VA to the kernel address space
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
[PATCH 1/6] riscv: Split early and final KASAN population functions
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
[PATCH 2/6] riscv: Rework kasan population functions
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
[PATCH 0/6] RISC-V kasan rework
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
[PATCH] efi: random: fix NULL-deref when refreshing seed
From
: Johan Hovold <johan+linaro@xxxxxxxxxx>
Re: [PATCH v4 00/26] x86_64: Improvements at compressed kernel stage
From
: Peter Jones <pjones@xxxxxxxxxx>
[PATCH v4 19/26] x86/build: Cleanup tools/build.c
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v4 18/26] tools/include: Add simplified version of pe.h
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v4 25/26] efi/x86: don't try to set page attributes on 0-sized regions.
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v4 24/26] efi/libstub: make memory protection warnings include newlines.
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v4 20/26] x86/build: Make generated PE more spec compliant
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v4 21/26] efi/x86: Explicitly set sections memory attributes
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v4 26/26] efi/x86: don't set unsupported memory attributes
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v4 22/26] efi/libstub: Add memory attribute protocol definitions
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v4 23/26] efi/libstub: Use memory attribute protocol
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v4 17/26] x86/boot: Reduce size of the DOS stub
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v4 14/26] x86/boot: Add EFI kernel extraction interface
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v4 12/26] x86/boot: Make kernel_add_identity_map() a pointer
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v4 10/26] efi/libstub: Move helper function to related file
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v4 16/26] x86/boot: Reduce lower limit of physical KASLR
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v4 11/26] x86/boot: Make console interface more abstract
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v4 13/26] x86/boot: Split trampoline and pt init code
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v4 15/26] efi/x86: Support extracting kernel from libstub
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v4 09/26] x86/boot: Remove mapping from page fault handler
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v4 03/26] x86/boot: Set cr0 to known state in trampoline
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v4 01/26] x86/boot: Align vmlinuz sections on page size
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v4 04/26] x86/boot: Increase boot page table size
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v4 02/26] x86/build: Remove RWX sections and align on 4KB
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v4 08/26] x86/boot: Map memory explicitly
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v4 00/26] x86_64: Improvements at compressed kernel stage
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v4 06/26] x86/boot: Setup memory protection for bzImage code
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v4 07/26] x86/build: Check W^X of vmlinux during build
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v4 05/26] x86/boot: Support 4KB pages for identity mapping
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH] efitools: Include <strings.h> for the strcasecmp function
From
: Lukas Wunner <lukas@xxxxxxxxx>
[PATCH] Define _GNU_SOURCE for a declaration of strptime
From
: Florian Weimer <fweimer@xxxxxxxxxx>
[PATCH] efitools: Include <strings.h> for the strcasecmp function
From
: Florian Weimer <fweimer@xxxxxxxxxx>
Re: [PATCH v3 00/24] x86_64: Improvements at compressed kernel stage
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH v3 00/24] x86_64: Improvements at compressed kernel stage
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [GIT PULL] EFI updates for v6.2
From
: pr-tracker-bot@xxxxxxxxxx
Re: [PATCH v3 00/24] x86_64: Improvements at compressed kernel stage
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH v3 00/24] x86_64: Improvements at compressed kernel stage
From
: Peter Jones <pjones@xxxxxxxxxx>
[PATCH 2/2] efi/x86: don't try to set page attributes on 0-sized regions.
From
: Peter Jones <pjones@xxxxxxxxxx>
[PATCH 1/2] efi/x86: don't set unsupported memory attributes
From
: Peter Jones <pjones@xxxxxxxxxx>
Re: [PATCH v3 00/24] x86_64: Improvements at compressed kernel stage
From
: Peter Jones <pjones@xxxxxxxxxx>
[GIT PULL] EFI updates for v6.2
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH] drivers: correct parameters passed to strncmp
From
: "Seija K." <doremylover123@xxxxxxxxx>
Re: [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[efi:next] BUILD SUCCESS c2530a04a73e6b75ed71ed14d09d7b42d6300013
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCHv8 02/14] mm: Add support for unaccepted memory
From
: Vlastimil Babka <vbabka@xxxxxxx>
Re: [PATCHv8 02/14] mm: Add support for unaccepted memory
From
: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
Re: [PATCHv8 02/14] mm: Add support for unaccepted memory
From
: Vlastimil Babka <vbabka@xxxxxxx>
Re: [PATCH] arm64: efi: Account for the EFI runtime stack in stack unwinder
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] arm64: efi: Account for the EFI runtime stack in stack unwinder
From
: Mark Rutland <mark.rutland@xxxxxxx>
Re: [PATCH] arm64: efi: Account for the EFI runtime stack in stack unwinder
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] arm64: efi: Account for the EFI runtime stack in stack unwinder
From
: Mark Rutland <mark.rutland@xxxxxxx>
[PATCH] arm64: efi: Account for the EFI runtime stack in stack unwinder
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v8 3/3] ASoC: SOF: Fix deadlock when shutdown a frozen userspace
From
: Kai Vehmanen <kai.vehmanen@xxxxxxxxxxxxxxx>
Re: [PATCH 1/2] arm64: efi: Execute runtime services from a dedicated stack
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 1/2] arm64: efi: Execute runtime services from a dedicated stack
From
: Mark Rutland <mark.rutland@xxxxxxx>
[efi:next] BUILD SUCCESS e8dfdf3162eb549d064b8c10b1564f7e8ee82591
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v4 3/5] partitions/efi: add support for uImage.FIT sub-partitions
From
: Davidlohr Bueso <dave@xxxxxxxxxxxx>
[PATCH v1 2/2] efi/earlycon: Speed up scrolling by skiping moving empty space
From
: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
[PATCH v1 1/2] efi/earlycon: Replace open coded strnchrnul()
From
: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
Re: [PATCH v2 2/2] efi: Put Linux specific magic number in the DOS header
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v3 11/14] RISC-V: fix auipc-jalr addresses in patched alternatives
From
: Emil Renner Berthing <emil.renner.berthing@xxxxxxxxxxxxx>
Re: [PATCH v3 11/14] RISC-V: fix auipc-jalr addresses in patched alternatives
From
: Emil Renner Berthing <emil.renner.berthing@xxxxxxxxxxxxx>
Re: [PATCH v3 11/14] RISC-V: fix auipc-jalr addresses in patched alternatives
From
: Emil Renner Berthing <emil.renner.berthing@xxxxxxxxxxxxx>
Re: [PATCH v3 11/14] RISC-V: fix auipc-jalr addresses in patched alternatives
From
: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
Re: [PATCH v2 2/2] efi: Put Linux specific magic number in the DOS header
From
: Xiaotian Wu <wuxiaotian@xxxxxxxxxxx>
Re: [PATCH v3 11/14] RISC-V: fix auipc-jalr addresses in patched alternatives
From
: Heiko Stübner <heiko@xxxxxxxxx>
Re: [PATCH v2 2/2] efi: Put Linux specific magic number in the DOS header
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v2 2/2] efi: Put Linux specific magic number in the DOS header
From
: Xiaotian Wu <wuxiaotian@xxxxxxxxxxx>
[PATCHv8 13/14] x86/tdx: Refactor try_accept_one()
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
[PATCHv8 07/14] x86/boot/compressed: Handle unaccepted memory
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
[PATCHv8 10/14] x86/mm: Avoid load_unaligned_zeropad() stepping into unaccepted memory
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
[PATCHv8 14/14] x86/tdx: Add unaccepted memory support
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
[PATCHv8 09/14] x86/mm: Provide helpers for unaccepted memory
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
[PATCHv8 05/14] x86/boot: Add infrastructure required for unaccepted memory support
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
[PATCHv8 11/14] x86: Disable kexec if system has unaccepted memory
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
[PATCHv8 08/14] x86/mm: Reserve unaccepted memory bitmap
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
[PATCHv8 06/14] efi/x86: Implement support for unaccepted memory
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
[PATCHv8 12/14] x86/tdx: Make _tdx_hypercall() and __tdx_module_call() available in boot stub
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
[PATCHv8 02/14] mm: Add support for unaccepted memory
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
[PATCHv8 01/14] x86/boot: Centralize __pa()/__va() definitions
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
[PATCHv8 03/14] mm: Report unaccepted memory in meminfo
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
[PATCHv8 04/14] efi/x86: Get full memory map in allocate_e820()
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
[PATCHv8 00/14] mm, x86/cc: Implement support for unaccepted memory
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
Re: [PATCH v2 6/6] efi: Apply allowlist to EFI configuration tables when running under Xen
From
: Demi Marie Obenour <demi@xxxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v3 11/14] RISC-V: fix auipc-jalr addresses in patched alternatives
From
: Heiko Stübner <heiko@xxxxxxxxx>
Re: [PATCH v3 11/14] RISC-V: fix auipc-jalr addresses in patched alternatives
From
: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
[PATCH] x86/boot: Check if the input parameter (buffer) of the function is a null pointer
From
: Liam Ni <zhiguangni01@xxxxxxxxx>
Re: [PATCH v2 2/2] efi: Put Linux specific magic number in the DOS header
From
: Atish Patra <atishp@xxxxxxxxxxxxxx>
[PATCH 1/2] arm64: efi: Execute runtime services from a dedicated stack
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH 2/2] arm64: efi: Recover from synchronous exceptions occurring in firmware
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH 0/2] arm64: efi: Robustify EFI runtime wrapper code
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH] arm64: efi: Limit allocations to 48-bit addressable physical region
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v3 02/14] RISC-V: add prefix to all constants/macros in parse_asm.h
From
: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
Re: [PATCH v3 02/14] RISC-V: add prefix to all constants/macros in parse_asm.h
From
: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
Re: [PATCH v3 02/14] RISC-V: add prefix to all constants/macros in parse_asm.h
From
: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
Re: [PATCH v8 2/3] freezer: refactor pm_freezing into a function.
From
: Ricardo Ribalda <ribalda@xxxxxxxxxxxx>
[efi:next] BUILD SUCCESS 6736ebb6e18898978f8e49d6ee9662e34993e176
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v8 2/3] freezer: refactor pm_freezing into a function.
From
: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
Re: [PATCH v3 12/14] efi/riscv: libstub: mark when compiling libstub
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v3 13/14] RISC-V: add infrastructure to allow different str* implementations
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[efi:urgent] BUILD SUCCESS 7572ac3c979d4d0fb42d73a72d2608656516ff4f
From
: kernel test robot <lkp@xxxxxxxxx>
[efi:next] BUILD SUCCESS 327b555ed078dde9e119fee497d7ae60b5b1dd62
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v3 13/14] RISC-V: add infrastructure to allow different str* implementations
From
: Palmer Dabbelt <palmer@xxxxxxxxxxx>
Re: [PATCH] arm64: efi: Make runtime service wrapper more robust
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] arm64: efi: Make runtime service wrapper more robust
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] arm64: efi: Make runtime service wrapper more robust
From
: Kees Cook <keescook@xxxxxxxxxxxx>
Re: [PATCH v3 12/14] efi/riscv: libstub: mark when compiling libstub
From
: Heiko Stübner <heiko@xxxxxxxxx>
Re: [PATCH v3 12/14] efi/riscv: libstub: mark when compiling libstub
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v3 13/14] RISC-V: add infrastructure to allow different str* implementations
From
: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
Re: [PATCH v3 13/14] RISC-V: add infrastructure to allow different str* implementations
From
: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
Re: [GIT PULL] EFI fix for v6.1 (#4)
From
: pr-tracker-bot@xxxxxxxxxx
Re: [PATCH v3 12/14] efi/riscv: libstub: mark when compiling libstub
From
: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
Re: [PATCH v3 11/14] RISC-V: fix auipc-jalr addresses in patched alternatives
From
: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
Re: [PATCH v2 2/2] efi: Put Linux specific magic number in the DOS header
From
: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
[GIT PULL] EFI fix for v6.1 (#4)
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v3 03/14] RISC-V: detach funct-values from their offset
From
: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
Re: [PATCH v3 01/14] RISC-V: fix funct4 definition for c.jalr in parse_asm.h
From
: Heiko Stübner <heiko@xxxxxxxxx>
Re: [PATCH v3 01/14] RISC-V: fix funct4 definition for c.jalr in parse_asm.h
From
: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
Re: [PATCH v3 01/14] RISC-V: fix funct4 definition for c.jalr in parse_asm.h
From
: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
Re: [PATCH v2 2/2] efi: Put Linux specific magic number in the DOS header
From
: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
Re: [PATCH v2 2/2] efi: Put Linux specific magic number in the DOS header
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v2 2/2] efi: Put Linux specific magic number in the DOS header
From
: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
Re: [PATCHv7 08/14] x86/mm: Reserve unaccepted memory bitmap
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
Re: [PATCH v8 3/3] ASoC: SOF: Fix deadlock when shutdown a frozen userspace
From
: Ricardo Ribalda <ribalda@xxxxxxxxxxxx>
Re: [PATCH v8 3/3] ASoC: SOF: Fix deadlock when shutdown a frozen userspace
From
: Takashi Iwai <tiwai@xxxxxxx>
Re: [PATCH v8 3/3] ASoC: SOF: Fix deadlock when shutdown a frozen userspace
From
: Oliver Neukum <oneukum@xxxxxxxx>
Re: [PATCH v8 3/3] ASoC: SOF: Fix deadlock when shutdown a frozen userspace
From
: Ricardo Ribalda <ribalda@xxxxxxxxxxxx>
Re: [PATCH v8 3/3] ASoC: SOF: Fix deadlock when shutdown a frozen userspace
From
: Oliver Neukum <oneukum@xxxxxxxx>
Re: [PATCH v3 0/14] Zbb string optimizations and call support in alternatives
From
: Heiko Stübner <heiko@xxxxxxxxx>
[PATCH v8 3/3] ASoC: SOF: Fix deadlock when shutdown a frozen userspace
From
: Ricardo Ribalda <ribalda@xxxxxxxxxxxx>
[PATCH v8 2/3] freezer: refactor pm_freezing into a function.
From
: Ricardo Ribalda <ribalda@xxxxxxxxxxxx>
[PATCH v8 1/3] kexec: Refactor kexec_in_progress into a function
From
: Ricardo Ribalda <ribalda@xxxxxxxxxxxx>
[PATCH v8 0/3] ASoC: SOF: Fix deadlock when shutdown a frozen userspace
From
: Ricardo Ribalda <ribalda@xxxxxxxxxxxx>
Re: [PATCHv7 08/14] x86/mm: Reserve unaccepted memory bitmap
From
: Mike Rapoport <rppt@xxxxxxxxxx>
[efi:urgent] BUILD SUCCESS 1feda1dfb58149bd8a90b1c1fabb18e7c8af0c65
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v3 0/14] Zbb string optimizations and call support in alternatives
From
: Conor Dooley <conor@xxxxxxxxxx>
[PATCH v3 11/14] RISC-V: fix auipc-jalr addresses in patched alternatives
From
: Heiko Stuebner <heiko@xxxxxxxxx>
[PATCH v3 13/14] RISC-V: add infrastructure to allow different str* implementations
From
: Heiko Stuebner <heiko@xxxxxxxxx>
[PATCH v3 10/14] RISC-V: add rd reg parsing to insn.h header
From
: Heiko Stuebner <heiko@xxxxxxxxx>
[PATCH v3 12/14] efi/riscv: libstub: mark when compiling libstub
From
: Heiko Stuebner <heiko@xxxxxxxxx>
[PATCH v3 14/14] RISC-V: add zbb support to string functions
From
: Heiko Stuebner <heiko@xxxxxxxxx>
[PATCH v3 07/14] RISC-V: rename parse_asm.h to insn.h
From
: Heiko Stuebner <heiko@xxxxxxxxx>
[PATCH v3 03/14] RISC-V: detach funct-values from their offset
From
: Heiko Stuebner <heiko@xxxxxxxxx>
[PATCH v3 08/14] RISC-V: kprobes: use central defined funct3 constants
From
: Heiko Stuebner <heiko@xxxxxxxxx>
[PATCH v3 0/14] Zbb string optimizations and call support in alternatives
From
: Heiko Stuebner <heiko@xxxxxxxxx>
[PATCH v3 06/14] RISC-V: Move riscv_insn_is_* macros into a common header
From
: Heiko Stuebner <heiko@xxxxxxxxx>
[PATCH v3 09/14] RISC-V: add U-type imm parsing to insn.h header
From
: Heiko Stuebner <heiko@xxxxxxxxx>
[PATCH v3 02/14] RISC-V: add prefix to all constants/macros in parse_asm.h
From
: Heiko Stuebner <heiko@xxxxxxxxx>
[PATCH v3 04/14] RISC-V: add ebreak instructions to definitions
From
: Heiko Stuebner <heiko@xxxxxxxxx>
[PATCH v3 05/14] RISC-V: add auipc elements to parse_asm header
From
: Heiko Stuebner <heiko@xxxxxxxxx>
[PATCH v3 01/14] RISC-V: fix funct4 definition for c.jalr in parse_asm.h
From
: Heiko Stuebner <heiko@xxxxxxxxx>
[PATCH] arm64: efi: Move runtime services asm wrapper out of .text
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[efi:urgent] BUILD SUCCESS be2cf04496bb8a608e54d8259531ccdf72123dbc
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCHv7 08/14] x86/mm: Reserve unaccepted memory bitmap
From
: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
Re: [PATCH v2 0/2] efi: Add generic magic number in header
From
: Leif Lindholm <quic_llindhol@xxxxxxxxxxx>
[PATCH v2 1/2] efi: libstub: Always enable initrd command line loader and bump version
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v2 2/2] efi: Put Linux specific magic number in the DOS header
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v2 0/2] efi: Add generic magic number in header
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] riscv: Sync efi page table's kernel mappings before switching
From
: patchwork-bot+linux-riscv@xxxxxxxxxx
Re: [PATCH] riscv: Sync efi page table's kernel mappings before switching
From
: Palmer Dabbelt <palmer@xxxxxxxxxxxx>
[PATCH] arm64: efi: Make runtime service wrapper more robust
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v3 2/5] efi: stub: use random seed from EFI variable
From
: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
Re: [PATCH v3 2/5] efi: stub: use random seed from EFI variable
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH v3 1/5] efi: vars: prohibit reading random seed variables
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH RFC v1 5/6] efi: efivarfs: prohibit reading random seed variables
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v3 1/5] efi: vars: prohibit reading random seed variables
From
: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
Re: [PATCH v3 2/5] efi: stub: use random seed from EFI variable
From
: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
Re: [PATCH v5 0/7] arm64: efi: leave MMU and caches on at boot
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v5 0/7] arm64: efi: leave MMU and caches on at boot
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] riscv: Sync efi page table's kernel mappings before switching
From
: Atish Patra <atishp@xxxxxxxxxxxxxx>
Re: [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
From
: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
Re: [PATCH] riscv: Sync efi page table's kernel mappings before switching
From
: Emil Renner Berthing <emil.renner.berthing@xxxxxxxxxxxxx>
Re: [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
From
: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v3 00/17] x86: head_64.S spring cleaning
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v3 00/17] x86: head_64.S spring cleaning
From
: Tom Lendacky <thomas.lendacky@xxxxxxx>
Re: [PATCH v3 00/17] x86: head_64.S spring cleaning
From
: Tom Lendacky <thomas.lendacky@xxxxxxx>
Re: [PATCH 0/4] firmware: Add support for Qualcomm UEFI Secure Application
From
: Maximilian Luz <luzmaximilian@xxxxxxxxx>
Re: [PATCH 0/4] firmware: Add support for Qualcomm UEFI Secure Application
From
: Srinivas Kandagatla <srinivas.kandagatla@xxxxxxxxxx>
Re: [PATCH v3 00/17] x86: head_64.S spring cleaning
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v3 00/17] x86: head_64.S spring cleaning
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v3 00/17] x86: head_64.S spring cleaning
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v3 00/17] x86: head_64.S spring cleaning
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
From
: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v3 00/17] x86: head_64.S spring cleaning
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v3 00/17] x86: head_64.S spring cleaning
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v3 00/17] x86: head_64.S spring cleaning
From
: Tom Lendacky <thomas.lendacky@xxxxxxx>
Re: [PATCH v3 00/17] x86: head_64.S spring cleaning
From
: Tom Lendacky <thomas.lendacky@xxxxxxx>
Re: [PATCH v3 00/17] x86: head_64.S spring cleaning
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v3 00/17] x86: head_64.S spring cleaning
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v3 00/17] x86: head_64.S spring cleaning
From
: Tom Lendacky <thomas.lendacky@xxxxxxx>
Re: [PATCH v3 17/17] efi: x86: Make the deprecated EFI handover protocol optional
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
Re: [PATCH printk v5 00/40] reduce console_lock scope
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
[PATCH v2 1/3] x86/realmode: test real_mode_header outside of real_mode_size_needed()
From
: Juergen Gross <jgross@xxxxxxxx>
[PATCH v2 0/3] x86/realmode: use a dummy trampoline for Xen PV guests
From
: Juergen Gross <jgross@xxxxxxxx>
[PATCH v3 17/17] efi: x86: Make the deprecated EFI handover protocol optional
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 16/17] x86/compressed: only build mem_encrypt.S if AMD_MEM_ENCRYPT=y
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 15/17] x86/compressed: adhere to calling convention in get_sev_encryption_bit()
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 08/17] x86/compressed: efi-mixed: simplify IDT/GDT preserve/restore
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 05/17] x86/compressed: efi-mixed: move efi32_entry out of head_64.S
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 14/17] x86/compressed: move startup32_check_sev_cbit() out of head_64.S
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 07/17] x86/compressed: efi: merge multiple definitions of image_offset into one
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 12/17] x86/compressed: move startup32_load_idt() out of head_64.S
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 10/17] x86/compressed: pull global variable ref up into startup32_load_idt()
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 03/17] x86/compressed: efi-mixed: move bootargs parsing out of 32-bit startup code
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 01/17] x86/compressed: efi-mixed: rename efi_thunk_64.S to efi-mixed.S
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 02/17] x86/compressed: efi-mixed: move 32-bit entrypoint code into .text section
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 11/17] x86/compressed: move startup32_load_idt() into .text section
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 13/17] x86/compressed: move startup32_check_sev_cbit() into .text
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 04/17] x86/compressed: efi-mixed: move efi32_pe_entry into .text section
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 09/17] x86/compressed: avoid touching ECX in startup32_set_idt_entry()
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 06/17] x86/compressed: efi-mixed: move efi32_pe_entry() out of head_64.S
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 00/17] x86: head_64.S spring cleaning
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v2 5/5] efi: random: refresh non-volatile random seed when RNG is initialized
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 23/24] efi/libstub: Use memory attribute protocol
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 19/24] x86/build: Cleanup tools/build.c
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 20/24] x86/build: Make generated PE more spec compliant
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 21/24] efi/x86: Explicitly set sections memory attributes
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 24/24] efi/libstub: Make memory protection warnings include newlines
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 17/24] x86/boot: Reduce size of the DOS stub
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 22/24] efi/libstub: Add memory attribute protocol definitions
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 14/24] x86/boot: Add EFI kernel extraction interface
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 16/24] x86/boot: Reduce lower limit of physical KASLR
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 18/24] tools/include: Add simplified version of pe.h
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 15/24] efi/x86: Support extracting kernel from libstub
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 09/24] x86/boot: Remove mapping from page fault handler
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 10/24] efi/libstub: Move helper function to related file
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 04/24] x86/boot: Increase boot page table size
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 07/24] x86/build: Check W^X of vmlinux during build
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 13/24] x86/boot: Split trampoline and pt init code
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 12/24] x86/boot: Make kernel_add_identity_map() a pointer
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 06/24] x86/boot: Setup memory protection for bzImage code
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 05/24] x86/boot: Support 4KB pages for identity mapping
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 08/24] x86/boot: Map memory explicitly
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 03/24] x86/boot: Set cr0 to known state in trampoline
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 01/24] x86/boot: Align vmlinuz sections on page size
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 02/24] x86/build: Remove RWX sections and align on 4KB
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 00/24] x86_64: Improvements at compressed kernel stage
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 11/24] x86/boot: Make console interface more abstract
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH] riscv: Sync efi page table's kernel mappings before switching
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
Re: [PATCH] riscv: Sync efi page table's kernel mappings before switching
From
: Conor Dooley <conor.dooley@xxxxxxxxxxxxx>
[PATCH v3 4/5] vsprintf: initialize siphash key using notifier
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH v3 3/5] random: add back async readiness notifier
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH v3 2/5] efi: stub: use random seed from EFI variable
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH v3 5/5] efi: random: refresh non-volatile random seed when RNG is initialized
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH v3 1/5] efi: vars: prohibit reading random seed variables
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH v3 0/5] Use EFI variables for random seed
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
From
: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
Re: [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
RE: [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
From
: David Laight <David.Laight@xxxxxxxxxx>
Re: [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH] riscv: Sync efi page table's kernel mappings before switching
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
Re: [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 00/23] x86_64: Improvements at compressed kernel stage
From
: joeyli <jlee@xxxxxxxx>
Re: [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 00/23] x86_64: Improvements at compressed kernel stage
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH v2 00/23] x86_64: Improvements at compressed kernel stage
From
: joeyli <jlee@xxxxxxxx>
Re: [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
From
: "Ritesh Harjani (IBM)" <ritesh.list@xxxxxxxxx>
Re: [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
From
: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 5/6] efi: xen: Implement memory descriptor lookup based on hypercall
From
: Demi Marie Obenour <demi@xxxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 00/16] x86: head_64.S spring cleaning
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v2 00/16] x86: head_64.S spring cleaning
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v2 11/16] x86/compressed: move startup32_load_idt() into .text section
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH printk v5 00/40] reduce console_lock scope
From
: Petr Mladek <pmladek@xxxxxxxx>
Re: [PATCH RFC v1 2/6] vsprintf: initialize siphash key using notifier
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH RFC v1 2/6] vsprintf: initialize siphash key using notifier
From
: Petr Mladek <pmladek@xxxxxxxx>
[PATCH v2 5/5] efi: random: refresh non-volatile random seed when RNG is initialized
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH v2 4/5] vsprintf: initialize siphash key using notifier
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH v2 2/5] efi: stub: use random seed from EFI variable
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH v2 1/5] efi: vars: prohibit reading random seed variables
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH v2 3/5] random: add back async readiness notifier
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH v2 0/5] Use EFI variables for random seed
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH printk v5 00/40] reduce console_lock scope
From
: Petr Mladek <pmladek@xxxxxxxx>
Re: Efi-stub-kernel with embedded initramfs does not boot
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v2] efi: random: zero out secret after use and do not take minimum
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 04/16] x86/compressed: efi-mixed: move efi32_pe_entry into .text section
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v2 04/16] x86/compressed: efi-mixed: move efi32_pe_entry into .text section
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v2 04/16] x86/compressed: efi-mixed: move efi32_pe_entry into .text section
From
: Borislav Petkov <bp@xxxxxxxxx>
[PATCH] efi: random: remove extraneous dmesg notice
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH v2] efi: random: zero out secret after use and do not take minimum
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH] efi: random: zero out secret after use and do not take minimum
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH v4 2/3] powerpc/pseries: PLPKS SED Opal keystore support
From
: Greg Joyce <gjoyce@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v4 3/3] block: sed-opal: keystore access for SED Opal keys
From
: Greg Joyce <gjoyce@xxxxxxxxxxxxxxxxxx>
Re: [PATCH] efi: random: zero out secret after use and do not take minimum
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH RFC v1 5/6] efi: efivarfs: prohibit reading random seed variables
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH] efi: random: zero out secret after use and do not take minimum
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH RFC v1 5/6] efi: efivarfs: prohibit reading random seed variables
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH RFC v1 0/6] Use EFI variables for random seed
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH RFC v1 5/6] efi: efivarfs: prohibit reading random seed variables
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH RFC v1 0/6] Use EFI variables for random seed
From
: Lennart Poettering <lennart@xxxxxxxxxxxxxx>
Re: [PATCH RFC v1 5/6] efi: efivarfs: prohibit reading random seed variables
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH printk v5 24/40] efi: earlycon: use console_is_registered()
From
: John Ogness <john.ogness@xxxxxxxxxxxxx>
[PATCH printk v5 00/40] reduce console_lock scope
From
: John Ogness <john.ogness@xxxxxxxxxxxxx>
[PATCH RFC v1 0/6] Use EFI variables for random seed
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH RFC v1 2/6] vsprintf: initialize siphash key using notifier
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH RFC v1 4/6] efi: stub: use random seed from EFI variable
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH RFC v1 1/6] random: add back async readiness notifier
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH RFC v1 6/6] efi: refresh non-volatile random seed when RNG is initialized
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH RFC v1 5/6] efi: efivarfs: prohibit reading random seed variables
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH RFC v1 3/6] efi: random: combine bootloader provided RNG seed with RNG protocol output
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH v5 0/7] arm64: efi: leave MMU and caches on at boot
From
: Will Deacon <will@xxxxxxxxxx>
Re: [PATCH v5 0/7] arm64: efi: leave MMU and caches on at boot
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v5 0/7] arm64: efi: leave MMU and caches on at boot
From
: Will Deacon <will@xxxxxxxxxx>
Re: [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
From
: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
[PATCH printk v4 23/39] efi: earlycon: use console_is_registered()
From
: John Ogness <john.ogness@xxxxxxxxxxxxx>
[PATCH printk v4 00/39] reduce console_lock scope
From
: John Ogness <john.ogness@xxxxxxxxxxxxx>
[efi:next] BUILD SUCCESS c5fa6df0a498e363200988cb4d2146ac168fcc0e
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [Issue] EFI runtime-wrapper is broken #forregzbot
From
: Thorsten Leemhuis <regressions@xxxxxxxxxxxxx>
Re: [BUG] rtc-efi: Error in efi.get_time() spams dmesg with error message #forregzbot
From
: Thorsten Leemhuis <regressions@xxxxxxxxxxxxx>
Re: [GIT PULL] EFI fixes for v6.1 (#3)
From
: pr-tracker-bot@xxxxxxxxxx
[efi:next] BUILD SUCCESS 2b3df554c475872aa1bf9125428a56aaeb7a0aac
From
: kernel test robot <lkp@xxxxxxxxx>
[GIT PULL] EFI fixes for v6.1 (#3)
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: Regression in Linux 6.0.8 in Lenovo T14 Gen 3 when adding EFI boot entries
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: Regression in Linux 6.0.8 in Lenovo T14 Gen 3 when adding EFI boot entries
From
: Ulrich Gemkow <ulrich.gemkow@xxxxxxxxxxxxxxxxxxxx>
Re: Regression in Linux 6.0.8 in Lenovo T14 Gen 3 when adding EFI boot entries
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: Regression in Linux 6.0.8 in Lenovo T14 Gen 3 when adding EFI boot entries
From
: Ulrich Gemkow <ulrich.gemkow@xxxxxxxxxxxxxxxxxxxx>
Re: Regression in Linux 6.0.8 in Lenovo T14 Gen 3 when adding EFI boot entries
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: Regression in Linux 6.0.8 in Lenovo T14 Gen 3 when adding EFI boot entries
From
: Ulrich Gemkow <ulrich.gemkow@xxxxxxxxxxxxxxxxxxxx>
Re: Regression in Linux 6.0.8 in Lenovo T14 Gen 3 when adding EFI boot entries
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Regression in Linux 6.0.8 in Lenovo T14 Gen 3 when adding EFI boot entries
From
: Ulrich Gemkow <ulrich.gemkow@xxxxxxxxxxxxxxxxxxxx>
[efi:next] BUILD SUCCESS 82da66a9913ef37c300d2e44ebc3b4814120d24b
From
: kernel test robot <lkp@xxxxxxxxx>
[linux-next:master] BUILD REGRESSION f8f60f322f0640c8edda2942ca5f84b7a27c417a
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v5 0/7] arm64: efi: leave MMU and caches on at boot
From
: Mark Rutland <mark.rutland@xxxxxxx>
Re: [PATCH printk v3 00/40] reduce console_lock scope
From
: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
[efi:urgent] BUILD SUCCESS 9b9eaee9828fe98b030cf43ac50065a54a2f5d52
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH] efi: Override runtime supported mask from a EFI variable if present
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4 4/5] mtd_blkdevs: add option to enable scanning for partitions
From
: Daniel Golle <daniel@xxxxxxxxxxxxxx>
[linux-next:master] BUILD REGRESSION 382d2f9e739bc6f151c718b38537ae522ff848cd
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v4 4/5] mtd_blkdevs: add option to enable scanning for partitions
From
: Richard Weinberger <richard@xxxxxx>
Re: [PATCH v4 4/5] mtd_blkdevs: add option to enable scanning for partitions
From
: Daniel Golle <daniel@xxxxxxxxxxxxxx>
Re: [PATCH v4 4/5] mtd_blkdevs: add option to enable scanning for partitions
From
: Richard Weinberger <richard@xxxxxx>
Re: [PATCH v4 5/5] mtd: ubi: block: add option to enable scanning for partitions
From
: Richard Weinberger <richard@xxxxxx>
Re: [PATCH] arm64: efi: Force the use of SetVirtualAddressMap() on Altra machines
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [BUG] rtc-efi: Error in efi.get_time() spams dmesg with error message
From
: Alexandru Elisei <alexandru.elisei@xxxxxxx>
[PATCH] efi: vars: allow passing fmode= and dmode= when mounting
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH] arm64: efi: Force the use of SetVirtualAddressMap() on Altra machines
From
: Alexandru Elisei <alexandru.elisei@xxxxxxx>
Re: [PATCH v8 16/17] integrity: Trust MOK keys if MokListTrustedRT found
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v8 16/17] integrity: Trust MOK keys if MokListTrustedRT found
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v8 16/17] integrity: Trust MOK keys if MokListTrustedRT found
From
: Morten Linderud <morten@xxxxxxxxxxx>
Re: [PATCH v4 2/5] block: add partition parser for U-Boot uImage.FIT
From
: Matthew Wilcox <willy@xxxxxxxxxxxxx>
Re: [PATCH] arm64: efi: Force the use of SetVirtualAddressMap() on Altra machines
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] arm64: efi: Force the use of SetVirtualAddressMap() on Altra machines
From
: Alexandru Elisei <alexandru.elisei@xxxxxxx>
Re: [PATCH] efi: Override runtime supported mask from a EFI variable if present
From
: Alexandru Elisei <alexandru.elisei@xxxxxxx>
[Index of Archives]
[Linux Kernel Development]
[Security]
[Linux ARM Kernel]
[Tools]
[Linux MIPS]
[Linux S390]
[Bugtraq]
[Share Photos]>
[Fedora ARM]