Linux EFI/UEFI Development
Thread Index
[
Prev Page
][
Next Page
]
Re: [PATCH v3 0/3] Add generic framebuffer support to EFI earlycon driver
From
: Markuss Broks <markuss.broks@xxxxxxxxx>
Re: [PATCH v3 0/3] Add generic framebuffer support to EFI earlycon driver
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] efi: fix NULL-deref in init error path
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: Queries about disabling EFI runtime services late
From
: Dave Young <dyoung@xxxxxxxxxx>
Re: Queries about disabling EFI runtime services late
From
: Dave Young <dyoung@xxxxxxxxxx>
Re: [PATCH 0/6] RISC-V kasan rework
From
: Conor Dooley <conor@xxxxxxxxxx>
Re: [PATCH 0/2] Recover from failure to probe GPU
From
: Javier Martinez Canillas <javierm@xxxxxxxxxx>
[PATCH 1/2] firmware: sysfb: Allow re-creating system framebuffer after init
From
: Mario Limonciello <mario.limonciello@xxxxxxx>
[PATCH 0/2] Recover from failure to probe GPU
From
: Mario Limonciello <mario.limonciello@xxxxxxx>
Re: Queries about disabling EFI runtime services late
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 4/6] riscv: Fix EFI stub usage of KASAN instrumented string functions
From
: Conor Dooley <conor@xxxxxxxxxx>
Re: [PATCH 4/6] riscv: Fix EFI stub usage of KASAN instrumented string functions
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
Re: [PATCH 4/6] riscv: Fix EFI stub usage of KASAN instrumented string functions
From
: Conor Dooley <conor@xxxxxxxxxx>
[PATCH v3 3/3] efi: earlycon: Add support for generic framebuffers
From
: Markuss Broks <markuss.broks@xxxxxxxxx>
[PATCH v3 2/3] efi: earlycon: move to video/console to prepare for changes
From
: Markuss Broks <markuss.broks@xxxxxxxxx>
[PATCH v3 1/3] drivers: serial: earlycon: Pass device-tree node
From
: Markuss Broks <markuss.broks@xxxxxxxxx>
[PATCH v3 0/3] Add generic framebuffer support to EFI earlycon driver
From
: Markuss Broks <markuss.broks@xxxxxxxxx>
Re: Queries about disabling EFI runtime services late
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Queries about disabling EFI runtime services late
From
: Dave Young <dyoung@xxxxxxxxxx>
Re: [PATCH v2] efi: random: fix NULL-deref when refreshing seed
From
: Steev Klimaszewski <steev@xxxxxxxx>
Re: [PATCH v4 00/26] x86_64: Improvements at compressed kernel stage
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH v2] efi: random: fix NULL-deref when refreshing seed
From
: Johan Hovold <johan@xxxxxxxxxx>
Re: [PATCH v2] efi: random: fix NULL-deref when refreshing seed
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH] efi: random: fix NULL-deref when refreshing seed
From
: Johan Hovold <johan@xxxxxxxxxx>
[PATCH v2] efi: random: fix NULL-deref when refreshing seed
From
: Johan Hovold <johan+linaro@xxxxxxxxxx>
[PATCH] efi: fix NULL-deref in init error path
From
: Johan Hovold <johan+linaro@xxxxxxxxxx>
Re: [PATCH] efi: random: fix NULL-deref when refreshing seed
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH] efi: random: fix NULL-deref when refreshing seed
From
: Andrew Halaney <ahalaney@xxxxxxxxxx>
[PATCH 6/6] riscv: Unconditionnally select KASAN_VMALLOC if KASAN
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
[PATCH 5/6] riscv: Fix ptdump when KASAN is enabled
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
[PATCH 4/6] riscv: Fix EFI stub usage of KASAN instrumented string functions
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
[PATCH 3/6] riscv: Move DTB_EARLY_BASE_VA to the kernel address space
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
[PATCH 1/6] riscv: Split early and final KASAN population functions
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
[PATCH 2/6] riscv: Rework kasan population functions
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
[PATCH 0/6] RISC-V kasan rework
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
[PATCH] efi: random: fix NULL-deref when refreshing seed
From
: Johan Hovold <johan+linaro@xxxxxxxxxx>
Re: [PATCH v4 00/26] x86_64: Improvements at compressed kernel stage
From
: Peter Jones <pjones@xxxxxxxxxx>
[PATCH v4 19/26] x86/build: Cleanup tools/build.c
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v4 18/26] tools/include: Add simplified version of pe.h
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v4 25/26] efi/x86: don't try to set page attributes on 0-sized regions.
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v4 24/26] efi/libstub: make memory protection warnings include newlines.
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v4 20/26] x86/build: Make generated PE more spec compliant
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v4 21/26] efi/x86: Explicitly set sections memory attributes
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v4 26/26] efi/x86: don't set unsupported memory attributes
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v4 22/26] efi/libstub: Add memory attribute protocol definitions
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v4 23/26] efi/libstub: Use memory attribute protocol
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v4 17/26] x86/boot: Reduce size of the DOS stub
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v4 14/26] x86/boot: Add EFI kernel extraction interface
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v4 12/26] x86/boot: Make kernel_add_identity_map() a pointer
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v4 10/26] efi/libstub: Move helper function to related file
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v4 16/26] x86/boot: Reduce lower limit of physical KASLR
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v4 11/26] x86/boot: Make console interface more abstract
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v4 13/26] x86/boot: Split trampoline and pt init code
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v4 15/26] efi/x86: Support extracting kernel from libstub
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v4 09/26] x86/boot: Remove mapping from page fault handler
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v4 03/26] x86/boot: Set cr0 to known state in trampoline
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v4 01/26] x86/boot: Align vmlinuz sections on page size
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v4 04/26] x86/boot: Increase boot page table size
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v4 02/26] x86/build: Remove RWX sections and align on 4KB
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v4 08/26] x86/boot: Map memory explicitly
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v4 00/26] x86_64: Improvements at compressed kernel stage
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v4 06/26] x86/boot: Setup memory protection for bzImage code
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v4 07/26] x86/build: Check W^X of vmlinux during build
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v4 05/26] x86/boot: Support 4KB pages for identity mapping
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH] efitools: Include <strings.h> for the strcasecmp function
From
: Lukas Wunner <lukas@xxxxxxxxx>
[PATCH] Define _GNU_SOURCE for a declaration of strptime
From
: Florian Weimer <fweimer@xxxxxxxxxx>
[PATCH] efitools: Include <strings.h> for the strcasecmp function
From
: Florian Weimer <fweimer@xxxxxxxxxx>
Re: [PATCH v3 00/24] x86_64: Improvements at compressed kernel stage
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH v3 00/24] x86_64: Improvements at compressed kernel stage
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [GIT PULL] EFI updates for v6.2
From
: pr-tracker-bot@xxxxxxxxxx
Re: [PATCH v3 00/24] x86_64: Improvements at compressed kernel stage
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH v3 00/24] x86_64: Improvements at compressed kernel stage
From
: Peter Jones <pjones@xxxxxxxxxx>
[PATCH 2/2] efi/x86: don't try to set page attributes on 0-sized regions.
From
: Peter Jones <pjones@xxxxxxxxxx>
[PATCH 1/2] efi/x86: don't set unsupported memory attributes
From
: Peter Jones <pjones@xxxxxxxxxx>
Re: [PATCH v3 00/24] x86_64: Improvements at compressed kernel stage
From
: Peter Jones <pjones@xxxxxxxxxx>
[GIT PULL] EFI updates for v6.2
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH] drivers: correct parameters passed to strncmp
From
: "Seija K." <doremylover123@xxxxxxxxx>
Re: [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[efi:next] BUILD SUCCESS c2530a04a73e6b75ed71ed14d09d7b42d6300013
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCHv8 02/14] mm: Add support for unaccepted memory
From
: Vlastimil Babka <vbabka@xxxxxxx>
Re: [PATCHv8 02/14] mm: Add support for unaccepted memory
From
: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
Re: [PATCHv8 02/14] mm: Add support for unaccepted memory
From
: Vlastimil Babka <vbabka@xxxxxxx>
Re: [PATCH] arm64: efi: Account for the EFI runtime stack in stack unwinder
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] arm64: efi: Account for the EFI runtime stack in stack unwinder
From
: Mark Rutland <mark.rutland@xxxxxxx>
Re: [PATCH] arm64: efi: Account for the EFI runtime stack in stack unwinder
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] arm64: efi: Account for the EFI runtime stack in stack unwinder
From
: Mark Rutland <mark.rutland@xxxxxxx>
[PATCH] arm64: efi: Account for the EFI runtime stack in stack unwinder
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v8 3/3] ASoC: SOF: Fix deadlock when shutdown a frozen userspace
From
: Kai Vehmanen <kai.vehmanen@xxxxxxxxxxxxxxx>
Re: [PATCH 1/2] arm64: efi: Execute runtime services from a dedicated stack
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 1/2] arm64: efi: Execute runtime services from a dedicated stack
From
: Mark Rutland <mark.rutland@xxxxxxx>
[efi:next] BUILD SUCCESS e8dfdf3162eb549d064b8c10b1564f7e8ee82591
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v4 3/5] partitions/efi: add support for uImage.FIT sub-partitions
From
: Davidlohr Bueso <dave@xxxxxxxxxxxx>
[PATCH v1 2/2] efi/earlycon: Speed up scrolling by skiping moving empty space
From
: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
[PATCH v1 1/2] efi/earlycon: Replace open coded strnchrnul()
From
: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
Re: [PATCH v2 2/2] efi: Put Linux specific magic number in the DOS header
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v3 11/14] RISC-V: fix auipc-jalr addresses in patched alternatives
From
: Emil Renner Berthing <emil.renner.berthing@xxxxxxxxxxxxx>
Re: [PATCH v3 11/14] RISC-V: fix auipc-jalr addresses in patched alternatives
From
: Emil Renner Berthing <emil.renner.berthing@xxxxxxxxxxxxx>
Re: [PATCH v3 11/14] RISC-V: fix auipc-jalr addresses in patched alternatives
From
: Emil Renner Berthing <emil.renner.berthing@xxxxxxxxxxxxx>
Re: [PATCH v3 11/14] RISC-V: fix auipc-jalr addresses in patched alternatives
From
: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
Re: [PATCH v2 2/2] efi: Put Linux specific magic number in the DOS header
From
: Xiaotian Wu <wuxiaotian@xxxxxxxxxxx>
Re: [PATCH v3 11/14] RISC-V: fix auipc-jalr addresses in patched alternatives
From
: Heiko Stübner <heiko@xxxxxxxxx>
Re: [PATCH v2 2/2] efi: Put Linux specific magic number in the DOS header
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v2 2/2] efi: Put Linux specific magic number in the DOS header
From
: Xiaotian Wu <wuxiaotian@xxxxxxxxxxx>
[PATCHv8 13/14] x86/tdx: Refactor try_accept_one()
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
[PATCHv8 07/14] x86/boot/compressed: Handle unaccepted memory
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
[PATCHv8 10/14] x86/mm: Avoid load_unaligned_zeropad() stepping into unaccepted memory
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
[PATCHv8 14/14] x86/tdx: Add unaccepted memory support
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
[PATCHv8 09/14] x86/mm: Provide helpers for unaccepted memory
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
[PATCHv8 05/14] x86/boot: Add infrastructure required for unaccepted memory support
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
[PATCHv8 11/14] x86: Disable kexec if system has unaccepted memory
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
[PATCHv8 08/14] x86/mm: Reserve unaccepted memory bitmap
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
[PATCHv8 06/14] efi/x86: Implement support for unaccepted memory
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
[PATCHv8 12/14] x86/tdx: Make _tdx_hypercall() and __tdx_module_call() available in boot stub
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
[PATCHv8 02/14] mm: Add support for unaccepted memory
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
[PATCHv8 01/14] x86/boot: Centralize __pa()/__va() definitions
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
[PATCHv8 03/14] mm: Report unaccepted memory in meminfo
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
[PATCHv8 04/14] efi/x86: Get full memory map in allocate_e820()
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
[PATCHv8 00/14] mm, x86/cc: Implement support for unaccepted memory
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
Re: [PATCH v2 6/6] efi: Apply allowlist to EFI configuration tables when running under Xen
From
: Demi Marie Obenour <demi@xxxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v3 11/14] RISC-V: fix auipc-jalr addresses in patched alternatives
From
: Heiko Stübner <heiko@xxxxxxxxx>
Re: [PATCH v3 11/14] RISC-V: fix auipc-jalr addresses in patched alternatives
From
: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
[PATCH] x86/boot: Check if the input parameter (buffer) of the function is a null pointer
From
: Liam Ni <zhiguangni01@xxxxxxxxx>
Re: [PATCH v2 2/2] efi: Put Linux specific magic number in the DOS header
From
: Atish Patra <atishp@xxxxxxxxxxxxxx>
[PATCH 1/2] arm64: efi: Execute runtime services from a dedicated stack
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH 2/2] arm64: efi: Recover from synchronous exceptions occurring in firmware
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH 0/2] arm64: efi: Robustify EFI runtime wrapper code
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH] arm64: efi: Limit allocations to 48-bit addressable physical region
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v3 02/14] RISC-V: add prefix to all constants/macros in parse_asm.h
From
: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
Re: [PATCH v3 02/14] RISC-V: add prefix to all constants/macros in parse_asm.h
From
: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
Re: [PATCH v3 02/14] RISC-V: add prefix to all constants/macros in parse_asm.h
From
: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
Re: [PATCH v8 2/3] freezer: refactor pm_freezing into a function.
From
: Ricardo Ribalda <ribalda@xxxxxxxxxxxx>
[efi:next] BUILD SUCCESS 6736ebb6e18898978f8e49d6ee9662e34993e176
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v8 2/3] freezer: refactor pm_freezing into a function.
From
: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
Re: [PATCH v3 12/14] efi/riscv: libstub: mark when compiling libstub
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v3 13/14] RISC-V: add infrastructure to allow different str* implementations
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[efi:urgent] BUILD SUCCESS 7572ac3c979d4d0fb42d73a72d2608656516ff4f
From
: kernel test robot <lkp@xxxxxxxxx>
[efi:next] BUILD SUCCESS 327b555ed078dde9e119fee497d7ae60b5b1dd62
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v3 13/14] RISC-V: add infrastructure to allow different str* implementations
From
: Palmer Dabbelt <palmer@xxxxxxxxxxx>
Re: [PATCH] arm64: efi: Make runtime service wrapper more robust
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] arm64: efi: Make runtime service wrapper more robust
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] arm64: efi: Make runtime service wrapper more robust
From
: Kees Cook <keescook@xxxxxxxxxxxx>
Re: [PATCH v3 12/14] efi/riscv: libstub: mark when compiling libstub
From
: Heiko Stübner <heiko@xxxxxxxxx>
Re: [PATCH v3 12/14] efi/riscv: libstub: mark when compiling libstub
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v3 13/14] RISC-V: add infrastructure to allow different str* implementations
From
: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
Re: [PATCH v3 13/14] RISC-V: add infrastructure to allow different str* implementations
From
: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
Re: [GIT PULL] EFI fix for v6.1 (#4)
From
: pr-tracker-bot@xxxxxxxxxx
Re: [PATCH v3 12/14] efi/riscv: libstub: mark when compiling libstub
From
: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
Re: [PATCH v3 11/14] RISC-V: fix auipc-jalr addresses in patched alternatives
From
: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
Re: [PATCH v2 2/2] efi: Put Linux specific magic number in the DOS header
From
: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
[GIT PULL] EFI fix for v6.1 (#4)
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v3 03/14] RISC-V: detach funct-values from their offset
From
: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
Re: [PATCH v3 01/14] RISC-V: fix funct4 definition for c.jalr in parse_asm.h
From
: Heiko Stübner <heiko@xxxxxxxxx>
Re: [PATCH v3 01/14] RISC-V: fix funct4 definition for c.jalr in parse_asm.h
From
: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
Re: [PATCH v3 01/14] RISC-V: fix funct4 definition for c.jalr in parse_asm.h
From
: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
Re: [PATCH v2 2/2] efi: Put Linux specific magic number in the DOS header
From
: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
Re: [PATCH v2 2/2] efi: Put Linux specific magic number in the DOS header
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v2 2/2] efi: Put Linux specific magic number in the DOS header
From
: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
Re: [PATCHv7 08/14] x86/mm: Reserve unaccepted memory bitmap
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
Re: [PATCH v8 3/3] ASoC: SOF: Fix deadlock when shutdown a frozen userspace
From
: Ricardo Ribalda <ribalda@xxxxxxxxxxxx>
Re: [PATCH v8 3/3] ASoC: SOF: Fix deadlock when shutdown a frozen userspace
From
: Takashi Iwai <tiwai@xxxxxxx>
Re: [PATCH v8 3/3] ASoC: SOF: Fix deadlock when shutdown a frozen userspace
From
: Oliver Neukum <oneukum@xxxxxxxx>
Re: [PATCH v8 3/3] ASoC: SOF: Fix deadlock when shutdown a frozen userspace
From
: Ricardo Ribalda <ribalda@xxxxxxxxxxxx>
Re: [PATCH v8 3/3] ASoC: SOF: Fix deadlock when shutdown a frozen userspace
From
: Oliver Neukum <oneukum@xxxxxxxx>
Re: [PATCH v3 0/14] Zbb string optimizations and call support in alternatives
From
: Heiko Stübner <heiko@xxxxxxxxx>
[PATCH v8 3/3] ASoC: SOF: Fix deadlock when shutdown a frozen userspace
From
: Ricardo Ribalda <ribalda@xxxxxxxxxxxx>
[PATCH v8 2/3] freezer: refactor pm_freezing into a function.
From
: Ricardo Ribalda <ribalda@xxxxxxxxxxxx>
[PATCH v8 1/3] kexec: Refactor kexec_in_progress into a function
From
: Ricardo Ribalda <ribalda@xxxxxxxxxxxx>
[PATCH v8 0/3] ASoC: SOF: Fix deadlock when shutdown a frozen userspace
From
: Ricardo Ribalda <ribalda@xxxxxxxxxxxx>
Re: [PATCHv7 08/14] x86/mm: Reserve unaccepted memory bitmap
From
: Mike Rapoport <rppt@xxxxxxxxxx>
[efi:urgent] BUILD SUCCESS 1feda1dfb58149bd8a90b1c1fabb18e7c8af0c65
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v3 0/14] Zbb string optimizations and call support in alternatives
From
: Conor Dooley <conor@xxxxxxxxxx>
[PATCH v3 11/14] RISC-V: fix auipc-jalr addresses in patched alternatives
From
: Heiko Stuebner <heiko@xxxxxxxxx>
[PATCH v3 13/14] RISC-V: add infrastructure to allow different str* implementations
From
: Heiko Stuebner <heiko@xxxxxxxxx>
[PATCH v3 10/14] RISC-V: add rd reg parsing to insn.h header
From
: Heiko Stuebner <heiko@xxxxxxxxx>
[PATCH v3 12/14] efi/riscv: libstub: mark when compiling libstub
From
: Heiko Stuebner <heiko@xxxxxxxxx>
[PATCH v3 14/14] RISC-V: add zbb support to string functions
From
: Heiko Stuebner <heiko@xxxxxxxxx>
[PATCH v3 07/14] RISC-V: rename parse_asm.h to insn.h
From
: Heiko Stuebner <heiko@xxxxxxxxx>
[PATCH v3 03/14] RISC-V: detach funct-values from their offset
From
: Heiko Stuebner <heiko@xxxxxxxxx>
[PATCH v3 08/14] RISC-V: kprobes: use central defined funct3 constants
From
: Heiko Stuebner <heiko@xxxxxxxxx>
[PATCH v3 0/14] Zbb string optimizations and call support in alternatives
From
: Heiko Stuebner <heiko@xxxxxxxxx>
[PATCH v3 06/14] RISC-V: Move riscv_insn_is_* macros into a common header
From
: Heiko Stuebner <heiko@xxxxxxxxx>
[PATCH v3 09/14] RISC-V: add U-type imm parsing to insn.h header
From
: Heiko Stuebner <heiko@xxxxxxxxx>
[PATCH v3 02/14] RISC-V: add prefix to all constants/macros in parse_asm.h
From
: Heiko Stuebner <heiko@xxxxxxxxx>
[PATCH v3 04/14] RISC-V: add ebreak instructions to definitions
From
: Heiko Stuebner <heiko@xxxxxxxxx>
[PATCH v3 05/14] RISC-V: add auipc elements to parse_asm header
From
: Heiko Stuebner <heiko@xxxxxxxxx>
[PATCH v3 01/14] RISC-V: fix funct4 definition for c.jalr in parse_asm.h
From
: Heiko Stuebner <heiko@xxxxxxxxx>
[PATCH] arm64: efi: Move runtime services asm wrapper out of .text
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[efi:urgent] BUILD SUCCESS be2cf04496bb8a608e54d8259531ccdf72123dbc
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCHv7 08/14] x86/mm: Reserve unaccepted memory bitmap
From
: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
Re: [PATCH v2 0/2] efi: Add generic magic number in header
From
: Leif Lindholm <quic_llindhol@xxxxxxxxxxx>
[PATCH v2 1/2] efi: libstub: Always enable initrd command line loader and bump version
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v2 2/2] efi: Put Linux specific magic number in the DOS header
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v2 0/2] efi: Add generic magic number in header
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] riscv: Sync efi page table's kernel mappings before switching
From
: patchwork-bot+linux-riscv@xxxxxxxxxx
Re: [PATCH] riscv: Sync efi page table's kernel mappings before switching
From
: Palmer Dabbelt <palmer@xxxxxxxxxxxx>
[PATCH] arm64: efi: Make runtime service wrapper more robust
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v3 2/5] efi: stub: use random seed from EFI variable
From
: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
Re: [PATCH v3 2/5] efi: stub: use random seed from EFI variable
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH v3 1/5] efi: vars: prohibit reading random seed variables
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH RFC v1 5/6] efi: efivarfs: prohibit reading random seed variables
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v3 1/5] efi: vars: prohibit reading random seed variables
From
: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
Re: [PATCH v3 2/5] efi: stub: use random seed from EFI variable
From
: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
Re: [PATCH v5 0/7] arm64: efi: leave MMU and caches on at boot
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v5 0/7] arm64: efi: leave MMU and caches on at boot
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] riscv: Sync efi page table's kernel mappings before switching
From
: Atish Patra <atishp@xxxxxxxxxxxxxx>
Re: [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
From
: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
Re: [PATCH] riscv: Sync efi page table's kernel mappings before switching
From
: Emil Renner Berthing <emil.renner.berthing@xxxxxxxxxxxxx>
Re: [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
From
: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v3 00/17] x86: head_64.S spring cleaning
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v3 00/17] x86: head_64.S spring cleaning
From
: Tom Lendacky <thomas.lendacky@xxxxxxx>
Re: [PATCH v3 00/17] x86: head_64.S spring cleaning
From
: Tom Lendacky <thomas.lendacky@xxxxxxx>
Re: [PATCH 0/4] firmware: Add support for Qualcomm UEFI Secure Application
From
: Maximilian Luz <luzmaximilian@xxxxxxxxx>
Re: [PATCH 0/4] firmware: Add support for Qualcomm UEFI Secure Application
From
: Srinivas Kandagatla <srinivas.kandagatla@xxxxxxxxxx>
Re: [PATCH v3 00/17] x86: head_64.S spring cleaning
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v3 00/17] x86: head_64.S spring cleaning
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v3 00/17] x86: head_64.S spring cleaning
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v3 00/17] x86: head_64.S spring cleaning
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
From
: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v3 00/17] x86: head_64.S spring cleaning
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v3 00/17] x86: head_64.S spring cleaning
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v3 00/17] x86: head_64.S spring cleaning
From
: Tom Lendacky <thomas.lendacky@xxxxxxx>
Re: [PATCH v3 00/17] x86: head_64.S spring cleaning
From
: Tom Lendacky <thomas.lendacky@xxxxxxx>
Re: [PATCH v3 00/17] x86: head_64.S spring cleaning
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v3 00/17] x86: head_64.S spring cleaning
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v3 00/17] x86: head_64.S spring cleaning
From
: Tom Lendacky <thomas.lendacky@xxxxxxx>
Re: [PATCH v3 17/17] efi: x86: Make the deprecated EFI handover protocol optional
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
Re: [PATCH printk v5 00/40] reduce console_lock scope
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
[PATCH v2 1/3] x86/realmode: test real_mode_header outside of real_mode_size_needed()
From
: Juergen Gross <jgross@xxxxxxxx>
[PATCH v2 0/3] x86/realmode: use a dummy trampoline for Xen PV guests
From
: Juergen Gross <jgross@xxxxxxxx>
[PATCH v3 17/17] efi: x86: Make the deprecated EFI handover protocol optional
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 16/17] x86/compressed: only build mem_encrypt.S if AMD_MEM_ENCRYPT=y
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 15/17] x86/compressed: adhere to calling convention in get_sev_encryption_bit()
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 08/17] x86/compressed: efi-mixed: simplify IDT/GDT preserve/restore
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 05/17] x86/compressed: efi-mixed: move efi32_entry out of head_64.S
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 14/17] x86/compressed: move startup32_check_sev_cbit() out of head_64.S
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 07/17] x86/compressed: efi: merge multiple definitions of image_offset into one
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 12/17] x86/compressed: move startup32_load_idt() out of head_64.S
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 10/17] x86/compressed: pull global variable ref up into startup32_load_idt()
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 03/17] x86/compressed: efi-mixed: move bootargs parsing out of 32-bit startup code
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 01/17] x86/compressed: efi-mixed: rename efi_thunk_64.S to efi-mixed.S
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 02/17] x86/compressed: efi-mixed: move 32-bit entrypoint code into .text section
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 11/17] x86/compressed: move startup32_load_idt() into .text section
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 13/17] x86/compressed: move startup32_check_sev_cbit() into .text
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 04/17] x86/compressed: efi-mixed: move efi32_pe_entry into .text section
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 09/17] x86/compressed: avoid touching ECX in startup32_set_idt_entry()
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 06/17] x86/compressed: efi-mixed: move efi32_pe_entry() out of head_64.S
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 00/17] x86: head_64.S spring cleaning
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v2 5/5] efi: random: refresh non-volatile random seed when RNG is initialized
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 23/24] efi/libstub: Use memory attribute protocol
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 19/24] x86/build: Cleanup tools/build.c
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 20/24] x86/build: Make generated PE more spec compliant
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 21/24] efi/x86: Explicitly set sections memory attributes
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 24/24] efi/libstub: Make memory protection warnings include newlines
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 17/24] x86/boot: Reduce size of the DOS stub
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 22/24] efi/libstub: Add memory attribute protocol definitions
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 14/24] x86/boot: Add EFI kernel extraction interface
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 16/24] x86/boot: Reduce lower limit of physical KASLR
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 18/24] tools/include: Add simplified version of pe.h
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 15/24] efi/x86: Support extracting kernel from libstub
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 09/24] x86/boot: Remove mapping from page fault handler
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 10/24] efi/libstub: Move helper function to related file
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 04/24] x86/boot: Increase boot page table size
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 07/24] x86/build: Check W^X of vmlinux during build
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 13/24] x86/boot: Split trampoline and pt init code
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 12/24] x86/boot: Make kernel_add_identity_map() a pointer
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 06/24] x86/boot: Setup memory protection for bzImage code
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 05/24] x86/boot: Support 4KB pages for identity mapping
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 08/24] x86/boot: Map memory explicitly
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 03/24] x86/boot: Set cr0 to known state in trampoline
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 01/24] x86/boot: Align vmlinuz sections on page size
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 02/24] x86/build: Remove RWX sections and align on 4KB
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 00/24] x86_64: Improvements at compressed kernel stage
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 11/24] x86/boot: Make console interface more abstract
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH] riscv: Sync efi page table's kernel mappings before switching
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
Re: [PATCH] riscv: Sync efi page table's kernel mappings before switching
From
: Conor Dooley <conor.dooley@xxxxxxxxxxxxx>
[PATCH v3 4/5] vsprintf: initialize siphash key using notifier
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH v3 3/5] random: add back async readiness notifier
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH v3 2/5] efi: stub: use random seed from EFI variable
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH v3 5/5] efi: random: refresh non-volatile random seed when RNG is initialized
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH v3 1/5] efi: vars: prohibit reading random seed variables
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH v3 0/5] Use EFI variables for random seed
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
From
: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
Re: [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
RE: [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
From
: David Laight <David.Laight@xxxxxxxxxx>
Re: [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH] riscv: Sync efi page table's kernel mappings before switching
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
Re: [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 00/23] x86_64: Improvements at compressed kernel stage
From
: joeyli <jlee@xxxxxxxx>
Re: [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 00/23] x86_64: Improvements at compressed kernel stage
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH v2 00/23] x86_64: Improvements at compressed kernel stage
From
: joeyli <jlee@xxxxxxxx>
Re: [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
From
: "Ritesh Harjani (IBM)" <ritesh.list@xxxxxxxxx>
Re: [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
From
: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 5/6] efi: xen: Implement memory descriptor lookup based on hypercall
From
: Demi Marie Obenour <demi@xxxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 00/16] x86: head_64.S spring cleaning
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v2 00/16] x86: head_64.S spring cleaning
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v2 11/16] x86/compressed: move startup32_load_idt() into .text section
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH printk v5 00/40] reduce console_lock scope
From
: Petr Mladek <pmladek@xxxxxxxx>
Re: [PATCH RFC v1 2/6] vsprintf: initialize siphash key using notifier
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH RFC v1 2/6] vsprintf: initialize siphash key using notifier
From
: Petr Mladek <pmladek@xxxxxxxx>
[PATCH v2 5/5] efi: random: refresh non-volatile random seed when RNG is initialized
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH v2 4/5] vsprintf: initialize siphash key using notifier
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH v2 2/5] efi: stub: use random seed from EFI variable
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH v2 1/5] efi: vars: prohibit reading random seed variables
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH v2 3/5] random: add back async readiness notifier
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH v2 0/5] Use EFI variables for random seed
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH printk v5 00/40] reduce console_lock scope
From
: Petr Mladek <pmladek@xxxxxxxx>
Re: Efi-stub-kernel with embedded initramfs does not boot
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v2] efi: random: zero out secret after use and do not take minimum
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 04/16] x86/compressed: efi-mixed: move efi32_pe_entry into .text section
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v2 04/16] x86/compressed: efi-mixed: move efi32_pe_entry into .text section
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v2 04/16] x86/compressed: efi-mixed: move efi32_pe_entry into .text section
From
: Borislav Petkov <bp@xxxxxxxxx>
[PATCH] efi: random: remove extraneous dmesg notice
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH v2] efi: random: zero out secret after use and do not take minimum
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH] efi: random: zero out secret after use and do not take minimum
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH v4 2/3] powerpc/pseries: PLPKS SED Opal keystore support
From
: Greg Joyce <gjoyce@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v4 3/3] block: sed-opal: keystore access for SED Opal keys
From
: Greg Joyce <gjoyce@xxxxxxxxxxxxxxxxxx>
Re: [PATCH] efi: random: zero out secret after use and do not take minimum
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH RFC v1 5/6] efi: efivarfs: prohibit reading random seed variables
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH] efi: random: zero out secret after use and do not take minimum
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH RFC v1 5/6] efi: efivarfs: prohibit reading random seed variables
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH RFC v1 0/6] Use EFI variables for random seed
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH RFC v1 5/6] efi: efivarfs: prohibit reading random seed variables
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH RFC v1 0/6] Use EFI variables for random seed
From
: Lennart Poettering <lennart@xxxxxxxxxxxxxx>
Re: [PATCH RFC v1 5/6] efi: efivarfs: prohibit reading random seed variables
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH printk v5 24/40] efi: earlycon: use console_is_registered()
From
: John Ogness <john.ogness@xxxxxxxxxxxxx>
[PATCH printk v5 00/40] reduce console_lock scope
From
: John Ogness <john.ogness@xxxxxxxxxxxxx>
[PATCH RFC v1 0/6] Use EFI variables for random seed
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH RFC v1 2/6] vsprintf: initialize siphash key using notifier
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH RFC v1 4/6] efi: stub: use random seed from EFI variable
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH RFC v1 1/6] random: add back async readiness notifier
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH RFC v1 6/6] efi: refresh non-volatile random seed when RNG is initialized
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH RFC v1 5/6] efi: efivarfs: prohibit reading random seed variables
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH RFC v1 3/6] efi: random: combine bootloader provided RNG seed with RNG protocol output
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH v5 0/7] arm64: efi: leave MMU and caches on at boot
From
: Will Deacon <will@xxxxxxxxxx>
Re: [PATCH v5 0/7] arm64: efi: leave MMU and caches on at boot
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v5 0/7] arm64: efi: leave MMU and caches on at boot
From
: Will Deacon <will@xxxxxxxxxx>
Re: [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
From
: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
[PATCH printk v4 23/39] efi: earlycon: use console_is_registered()
From
: John Ogness <john.ogness@xxxxxxxxxxxxx>
[PATCH printk v4 00/39] reduce console_lock scope
From
: John Ogness <john.ogness@xxxxxxxxxxxxx>
[efi:next] BUILD SUCCESS c5fa6df0a498e363200988cb4d2146ac168fcc0e
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [Issue] EFI runtime-wrapper is broken #forregzbot
From
: Thorsten Leemhuis <regressions@xxxxxxxxxxxxx>
Re: [BUG] rtc-efi: Error in efi.get_time() spams dmesg with error message #forregzbot
From
: Thorsten Leemhuis <regressions@xxxxxxxxxxxxx>
Re: [GIT PULL] EFI fixes for v6.1 (#3)
From
: pr-tracker-bot@xxxxxxxxxx
[efi:next] BUILD SUCCESS 2b3df554c475872aa1bf9125428a56aaeb7a0aac
From
: kernel test robot <lkp@xxxxxxxxx>
[GIT PULL] EFI fixes for v6.1 (#3)
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: Regression in Linux 6.0.8 in Lenovo T14 Gen 3 when adding EFI boot entries
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: Regression in Linux 6.0.8 in Lenovo T14 Gen 3 when adding EFI boot entries
From
: Ulrich Gemkow <ulrich.gemkow@xxxxxxxxxxxxxxxxxxxx>
Re: Regression in Linux 6.0.8 in Lenovo T14 Gen 3 when adding EFI boot entries
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: Regression in Linux 6.0.8 in Lenovo T14 Gen 3 when adding EFI boot entries
From
: Ulrich Gemkow <ulrich.gemkow@xxxxxxxxxxxxxxxxxxxx>
Re: Regression in Linux 6.0.8 in Lenovo T14 Gen 3 when adding EFI boot entries
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: Regression in Linux 6.0.8 in Lenovo T14 Gen 3 when adding EFI boot entries
From
: Ulrich Gemkow <ulrich.gemkow@xxxxxxxxxxxxxxxxxxxx>
Re: Regression in Linux 6.0.8 in Lenovo T14 Gen 3 when adding EFI boot entries
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Regression in Linux 6.0.8 in Lenovo T14 Gen 3 when adding EFI boot entries
From
: Ulrich Gemkow <ulrich.gemkow@xxxxxxxxxxxxxxxxxxxx>
[efi:next] BUILD SUCCESS 82da66a9913ef37c300d2e44ebc3b4814120d24b
From
: kernel test robot <lkp@xxxxxxxxx>
[linux-next:master] BUILD REGRESSION f8f60f322f0640c8edda2942ca5f84b7a27c417a
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v5 0/7] arm64: efi: leave MMU and caches on at boot
From
: Mark Rutland <mark.rutland@xxxxxxx>
Re: [PATCH printk v3 00/40] reduce console_lock scope
From
: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
[efi:urgent] BUILD SUCCESS 9b9eaee9828fe98b030cf43ac50065a54a2f5d52
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH] efi: Override runtime supported mask from a EFI variable if present
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4 4/5] mtd_blkdevs: add option to enable scanning for partitions
From
: Daniel Golle <daniel@xxxxxxxxxxxxxx>
[linux-next:master] BUILD REGRESSION 382d2f9e739bc6f151c718b38537ae522ff848cd
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v4 4/5] mtd_blkdevs: add option to enable scanning for partitions
From
: Richard Weinberger <richard@xxxxxx>
Re: [PATCH v4 4/5] mtd_blkdevs: add option to enable scanning for partitions
From
: Daniel Golle <daniel@xxxxxxxxxxxxxx>
Re: [PATCH v4 4/5] mtd_blkdevs: add option to enable scanning for partitions
From
: Richard Weinberger <richard@xxxxxx>
Re: [PATCH v4 5/5] mtd: ubi: block: add option to enable scanning for partitions
From
: Richard Weinberger <richard@xxxxxx>
Re: [PATCH] arm64: efi: Force the use of SetVirtualAddressMap() on Altra machines
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [BUG] rtc-efi: Error in efi.get_time() spams dmesg with error message
From
: Alexandru Elisei <alexandru.elisei@xxxxxxx>
[PATCH] efi: vars: allow passing fmode= and dmode= when mounting
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH] arm64: efi: Force the use of SetVirtualAddressMap() on Altra machines
From
: Alexandru Elisei <alexandru.elisei@xxxxxxx>
Re: [PATCH v8 16/17] integrity: Trust MOK keys if MokListTrustedRT found
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v8 16/17] integrity: Trust MOK keys if MokListTrustedRT found
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v8 16/17] integrity: Trust MOK keys if MokListTrustedRT found
From
: Morten Linderud <morten@xxxxxxxxxxx>
Re: [PATCH v4 2/5] block: add partition parser for U-Boot uImage.FIT
From
: Matthew Wilcox <willy@xxxxxxxxxxxxx>
Re: [PATCH] arm64: efi: Force the use of SetVirtualAddressMap() on Altra machines
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] arm64: efi: Force the use of SetVirtualAddressMap() on Altra machines
From
: Alexandru Elisei <alexandru.elisei@xxxxxxx>
Re: [PATCH] efi: Override runtime supported mask from a EFI variable if present
From
: Alexandru Elisei <alexandru.elisei@xxxxxxx>
Re: [PATCH printk v3 25/40] efi: earlycon: use console_is_registered()
From
: Petr Mladek <pmladek@xxxxxxxx>
Re: [PATCH v8 16/17] integrity: Trust MOK keys if MokListTrustedRT found
From
: Morten Linderud <morten@xxxxxxxxxxx>
Re: [PATCH v8 16/17] integrity: Trust MOK keys if MokListTrustedRT found
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
[PATCH] arm64: efi: Force the use of SetVirtualAddressMap() on Altra machines
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [RFC PATCH] efi: Put Linux specific magic number in the DOS header
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v8 16/17] integrity: Trust MOK keys if MokListTrustedRT found
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4 2/5] block: add partition parser for U-Boot uImage.FIT
From
: Daniel Golle <daniel@xxxxxxxxxxxxxx>
Re: [PATCH v8 16/17] integrity: Trust MOK keys if MokListTrustedRT found
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH v8 16/17] integrity: Trust MOK keys if MokListTrustedRT found
From
: Morten Linderud <morten@xxxxxxxxxxx>
Re: [RFC PATCH] efi: Put Linux specific magic number in the DOS header
From
: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
Re: [BUG] rtc-efi: Error in efi.get_time() spams dmesg with error message
From
: Alexandre Belloni <alexandre.belloni@xxxxxxxxxxx>
Re: [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
From
: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
[PATCH] efi: Override runtime supported mask from a EFI variable if present
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] arm64: efi: Disable only the misbehaving runtime service on sync exceptions
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4 2/5] block: add partition parser for U-Boot uImage.FIT
From
: Matthew Wilcox <willy@xxxxxxxxxxxxx>
Re: [PATCH] arm64: efi: Disable only the misbehaving runtime service on sync exceptions
From
: Alexandru Elisei <alexandru.elisei@xxxxxxx>
Re: [PATCH] arm64: efi: Disable only the misbehaving runtime service on sync exceptions
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [BUG] rtc-efi: Error in efi.get_time() spams dmesg with error message #forregzbot
From
: Thorsten Leemhuis <regressions@xxxxxxxxxxxxx>
Re: [Issue] EFI runtime-wrapper is broken #forregzbot
From
: Thorsten Leemhuis <regressions@xxxxxxxxxxxxx>
Re: [RFC PATCH] efi: Put Linux specific magic number in the DOS header
From
: Heinrich Schuchardt <heinrich.schuchardt@xxxxxxxxxxxxx>
Re: [BUG] rtc-efi: Error in efi.get_time() spams dmesg with error message
From
: Alexandru Elisei <alexandru.elisei@xxxxxxx>
Re: [PATCH] arm64: efi: Disable only the misbehaving runtime service on sync exceptions
From
: Alexandru Elisei <alexandru.elisei@xxxxxxx>
Re: [PATCH v4 2/5] block: add partition parser for U-Boot uImage.FIT
From
: Daniel Golle <daniel@xxxxxxxxxxxxxx>
[RFC PATCH] efi: Put Linux specific magic number in the DOS header
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4 2/5] block: add partition parser for U-Boot uImage.FIT
From
: Matthew Wilcox <willy@xxxxxxxxxxxxx>
Re: [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v4 4/5] mtd_blkdevs: add option to enable scanning for partitions
From
: Daniel Golle <daniel@xxxxxxxxxxxxxx>
Re: [PATCH v4 4/5] mtd_blkdevs: add option to enable scanning for partitions
From
: Miquel Raynal <miquel.raynal@xxxxxxxxxxx>
Re: [PATCH v4 3/5] partitions/efi: add support for uImage.FIT sub-partitions
From
: Daniel Golle <daniel@xxxxxxxxxxxxxx>
Re: [PATCH v4] efi: random: combine bootloader provided RNG seed with RNG protocol output
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4] efi: random: combine bootloader provided RNG seed with RNG protocol output
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [Possible BUG] arm64: efi: efi_runtime_fixup_exception() and efi_call_virt_check_flags() both taint the kernel
From
: Alexandru Elisei <alexandru.elisei@xxxxxxx>
[PATCH v4] efi: random: combine bootloader provided RNG seed with RNG protocol output
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v2 0/2] efi/cper, cxl: Decode CXL Protocol Errors CPER
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] efi: libstub: fix efi_load_initrd_dev_path() kernel-doc comment
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4 3/5] partitions/efi: add support for uImage.FIT sub-partitions
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [Possible BUG] arm64: efi: efi_runtime_fixup_exception() and efi_call_virt_check_flags() both taint the kernel
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 0/2] efi/x86: Move runtime map sysfs code into arch/x86
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v2 00/23] x86_64: Improvements at compressed kernel stage
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v4 5/5] mtd: ubi: block: add option to enable scanning for partitions
From
: Daniel Golle <daniel@xxxxxxxxxxxxxx>
[PATCH v4 3/5] partitions/efi: add support for uImage.FIT sub-partitions
From
: Daniel Golle <daniel@xxxxxxxxxxxxxx>
[PATCH v4 4/5] mtd_blkdevs: add option to enable scanning for partitions
From
: Daniel Golle <daniel@xxxxxxxxxxxxxx>
[PATCH v4 2/5] block: add partition parser for U-Boot uImage.FIT
From
: Daniel Golle <daniel@xxxxxxxxxxxxxx>
[PATCH v4 1/5] block: add new flag to add partitions read-only
From
: Daniel Golle <daniel@xxxxxxxxxxxxxx>
[PATCH v4 0/5] partition parser for U-Boot's uImage.FIT
From
: Daniel Golle <daniel@xxxxxxxxxxxxxx>
Re: [PATCH v5 5/7] arm64: head: Clean the ID map and the HYP text to the PoC if needed
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [BUG] rtc-efi: Error in efi.get_time() spams dmesg with error message
From
: Alexandre Belloni <alexandre.belloni@xxxxxxxxxxx>
[PATCH v5 7/7] efi: arm64: enter with MMU and caches enabled
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v5 6/7] arm64: lds: reduce effective minimum image alignment to 64k
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v5 1/7] arm64: head: Move all finalise_el2 calls to after __enable_mmu
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v5 3/7] arm64: head: record the MMU state at primary entry
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v5 4/7] arm64: head: avoid cache invalidation when entering with the MMU on
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v5 5/7] arm64: head: Clean the ID map and the HYP text to the PoC if needed
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v5 2/7] arm64: kernel: move identity map out of .text mapping
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v5 0/7] arm64: efi: leave MMU and caches on at boot
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v2 00/23] x86_64: Improvements at compressed kernel stage
From
: "Limonciello, Mario" <mario.limonciello@xxxxxxx>
[PATCH] arm64: efi: Disable only the misbehaving runtime service on sync exceptions
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [Issue] EFI runtime-wrapper is broken
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [Issue] EFI runtime-wrapper is broken
From
: Thorsten Leemhuis <regressions@xxxxxxxxxxxxx>
Re: [Possible BUG] arm64: efi: efi_runtime_fixup_exception() and efi_call_virt_check_flags() both taint the kernel #forregzbot
From
: Thorsten Leemhuis <regressions@xxxxxxxxxxxxx>
[BUG] rtc-efi: Error in efi.get_time() spams dmesg with error message
From
: Alexandru Elisei <alexandru.elisei@xxxxxxx>
Re: [Possible BUG] arm64: efi: efi_runtime_fixup_exception() and efi_call_virt_check_flags() both taint the kernel
From
: Alexandru Elisei <alexandru.elisei@xxxxxxx>
Re: [PATCH v2 00/23] x86_64: Improvements at compressed kernel stage
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH 0/2] efi/x86: Move runtime map sysfs code into arch/x86
From
: Dave Young <dyoung@xxxxxxxxxx>
[PATCH] efi: libstub: fix efi_load_initrd_dev_path() kernel-doc comment
From
: Jialin Zhang <zhangjialin11@xxxxxxxxxx>
Re: [Possible BUG] arm64: efi: efi_runtime_fixup_exception() and efi_call_virt_check_flags() both taint the kernel
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[Possible BUG] arm64: efi: efi_runtime_fixup_exception() and efi_call_virt_check_flags() both taint the kernel
From
: Alexandru Elisei <alexandru.elisei@xxxxxxx>
Re: [PATCH v4 0/6] arm64: efi: leave MMU and caches on at boot
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4 0/6] arm64: efi: leave MMU and caches on at boot
From
: Will Deacon <will@xxxxxxxxxx>
[PATCH printk v3 25/40] efi: earlycon: use console_is_registered()
From
: John Ogness <john.ogness@xxxxxxxxxxxxx>
[PATCH printk v3 00/40] reduce console_lock scope
From
: John Ogness <john.ogness@xxxxxxxxxxxxx>
[efi:urgent] BUILD SUCCESS 1bf039df2f63402adb365f59383fe9d34e2ef641
From
: kernel test robot <lkp@xxxxxxxxx>
[PATCH 0/2] efi/x86: Move runtime map sysfs code into arch/x86
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH 2/2] efi: x86: Move EFI runtime map sysfs code to arch/x86
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH 1/2] efi: runtime-maps: Clarify purpose and enable by default for kexec
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: Bug: kexec on Lenovo ThinkPad T480 disables EFI mode
From
: Dave Young <dyoung@xxxxxxxxxx>
Re: Bug: kexec on Lenovo ThinkPad T480 disables EFI mode
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: Bug: kexec on Lenovo ThinkPad T480 disables EFI mode
From
: Dave Young <dyoung@xxxxxxxxxx>
Re: Bug: kexec on Lenovo ThinkPad T480 disables EFI mode
From
: Dave Young <dyoung@xxxxxxxxxx>
Re: Bug: kexec on Lenovo ThinkPad T480 disables EFI mode
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: Bug: kexec on Lenovo ThinkPad T480 disables EFI mode
From
: Dave Young <dyoung@xxxxxxxxxx>
[efi:next] BUILD SUCCESS 27e80a1f89b1b7f6af2f6a46bcb4a3fd9c2b8a14
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v2] arm64: efi: Fix handling of misaligned runtime regions and drop warning
From
: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] arm64: efi: Fix handling of misaligned runtime regions and drop warning
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH 0/4] powerpc/pseries: expose firmware security variables via filesystem
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH 3/4] powerpc/pseries: initialize fwsecurityfs with plpks arch-specific structure
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH 4/4] powerpc/pseries: expose authenticated variables stored in LPAR PKS
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH 1/4] powerpc/pseries: Add new functions to PLPKS driver
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
Re: [PATCH v2] arm64: efi: Fix handling of misaligned runtime regions and drop warning
From
: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
[PATCH v2] arm64: efi: Fix handling of misaligned runtime regions and drop warning
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] arm64: efi: Make runtime region misalignment warning less noisy
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] arm64: efi: Make runtime region misalignment warning less noisy
From
: Heinrich Schuchardt <heinrich.schuchardt@xxxxxxxxxxxxx>
Re: [PATCH] arm64: efi: Make runtime region misalignment warning less noisy
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] arm64: efi: Make runtime region misalignment warning less noisy
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: Remove WARN_ONCE for unaligned UEFI region?
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] arm64: efi: Make runtime region misalignment warning less noisy
From
: Heinrich Schuchardt <heinrich.schuchardt@xxxxxxxxxxxxx>
Re: Remove WARN_ONCE for unaligned UEFI region?
From
: Heinrich Schuchardt <heinrich.schuchardt@xxxxxxxxxxxxx>
Re: [PATCH] arm64: efi: Make runtime region misalignment warning less noisy
From
: Heinrich Schuchardt <heinrich.schuchardt@xxxxxxxxxxxxx>
Re: Remove WARN_ONCE for unaligned UEFI region?
From
: Heinrich Schuchardt <heinrich.schuchardt@xxxxxxxxxxxxx>
[PATCH] arm64: efi: Make runtime region misalignment warning less noisy
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: Remove WARN_ONCE for unaligned UEFI region?
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: Remove WARN_ONCE for unaligned UEFI region?
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: Remove WARN_ONCE for unaligned UEFI region?
From
: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
Re: Remove WARN_ONCE for unaligned UEFI region?
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Remove WARN_ONCE for unaligned UEFI region?
From
: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
Re: Bug: kexec on Lenovo ThinkPad T480 disables EFI mode
From
: ns@xxxxxxxx
[efi:next] BUILD SUCCESS c804d4906e8a3749aa2aa91219362862ad54c8c0
From
: kernel test robot <lkp@xxxxxxxxx>
Re: Bug: kexec on Lenovo ThinkPad T480 disables EFI mode
From
: Dave Young <dyoung@xxxxxxxxxx>
Re: Bug: kexec on Lenovo ThinkPad T480 disables EFI mode
From
: Baoquan He <bhe@xxxxxxxxxx>
Re: [GIT PULL] EFI fixes for v6.1 (#2)
From
: pr-tracker-bot@xxxxxxxxxx
Re: [PATCH v2 00/23] x86_64: Improvements at compressed kernel stage
From
: "Limonciello, Mario" <mario.limonciello@xxxxxxx>
[GIT PULL] EFI fixes for v6.1 (#2)
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[efi:urgent] BUILD SUCCESS 23715a26c8d812912a70c6ac1ce67af649b95914
From
: kernel test robot <lkp@xxxxxxxxx>
[efi:next] BUILD SUCCESS 1abdc82f0c773bef2f58b9f00b03e75e9d4dd28b
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH V3] efi: pstore: Add module parameter for setting the record size
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH V3] efi: pstore: Add module parameter for setting the record size
From
: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
Re: [PATCH v2 2/2] efi/cper, cxl: Decode CXL Error Log
From
: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
Re: [PATCH v2 1/2] efi/cper, cxl: Decode CXL Protocol Error Section
From
: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
Re: [PATCH V3] efi: pstore: Add module parameter for setting the record size
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] arm64: efi: Recover from synchronous exceptions occurring in firmware
From
: Catalin Marinas <catalin.marinas@xxxxxxx>
Re: [PATCH] arm64: efi: Recover from synchronous exceptions occurring in firmware
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH 5.10 87/91] arm64/mm: Fix __enable_mmu() for new TGRAN range values
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 5.10 0/2] arm64: backport two patches to 5.10-stable
From
: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
[PATCH V3] efi: pstore: Add module parameter for setting the record size
From
: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
[PATCH 5.10 2/2] arm64/kexec: Test page size support with new TGRAN range values
From
: Zenghui Yu <yuzenghui@xxxxxxxxxx>
[PATCH 5.10 1/2] arm64/mm: Fix __enable_mmu() for new TGRAN range values
From
: Zenghui Yu <yuzenghui@xxxxxxxxxx>
[PATCH 5.10 0/2] arm64: backport two patches to 5.10-stable
From
: Zenghui Yu <yuzenghui@xxxxxxxxxx>
Re: [Issue] EFI runtime-wrapper is broken #forregzbot
From
: Thorsten Leemhuis <regressions@xxxxxxxxxxxxx>
[efi:urgent] BUILD SUCCESS 4e1c390e882d6f1d8c25221d041dfb832e460787
From
: kernel test robot <lkp@xxxxxxxxx>
[efi:next] BUILD SUCCESS 53ec9ccd138f6504fd5227a73dd8c6ab7a91f80f
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH V2] arm64/mm: Fix __enable_mmu() for new TGRAN range values
From
: Catalin Marinas <catalin.marinas@xxxxxxx>
[PATCH v2 2/2] efi/cper, cxl: Decode CXL Error Log
From
: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
[PATCH v2 1/2] efi/cper, cxl: Decode CXL Protocol Error Section
From
: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
[PATCH v2 0/2] efi/cper, cxl: Decode CXL Protocol Errors CPER
From
: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
Re: [PATCH] efi: efivars: Fix variable writes with unsupported query_variable_store()
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] MAINTAINERS: adjust entry after arm64 efi-entry.S file movement
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH] arm64: efi: Recover from synchronous exceptions occurring in firmware
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Bug: kexec on Lenovo ThinkPad T480 disables EFI mode
From
: ns@xxxxxxxx
Re: [PATCH] efi: efivars: Fix variable writes with unsupported query_variable_store()
From
: Aditya Garg <gargaditya08@xxxxxxxx>
[PATCH] MAINTAINERS: adjust entry after arm64 efi-entry.S file movement
From
: Lukas Bulwahn <lukas.bulwahn@xxxxxxxxx>
Re: [Issue] EFI runtime-wrapper is broken
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [Issue] EFI runtime-wrapper is broken
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [Issue] EFI runtime-wrapper is broken
From
: Gavin Shan <gshan@xxxxxxxxxx>
Re: [Issue] EFI runtime-wrapper is broken
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[efi:urgent] BUILD SUCCESS 4f50f041554c78aaa821585ce583946ecdae91b3
From
: kernel test robot <lkp@xxxxxxxxx>
[efi:next] BUILD SUCCESS 7f8342cdfdfc644a58a10db13d1cfb9f159f8f43
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH V2] arm64/mm: Fix __enable_mmu() for new TGRAN range values
From
: Zenghui Yu <yuzenghui@xxxxxxxxxx>
Re: [PATCH v9 0/9] x86: Show in sysfs if a memory node is able to do encryption
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v9 0/9] x86: Show in sysfs if a memory node is able to do encryption
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
[PATCH] efi: efivars: Fix variable writes with unsupported query_variable_store()
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v9 0/9] x86: Show in sysfs if a memory node is able to do encryption
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [REGRESSION] Failure to write the NVRAM variables starting from kernel 6.0 on T2 Macs
From
: Aditya Garg <gargaditya08@xxxxxxxx>
Re: [REGRESSION] Failure to write the NVRAM variables starting from kernel 6.0 on T2 Macs
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [REGRESSION] Failure to write the NVRAM variables starting from kernel 6.0 on T2 Macs
From
: Aditya Garg <gargaditya08@xxxxxxxx>
RE: [PATCH v10 0/7] Make ghes_edac a proper module
From
: Justin He <Justin.He@xxxxxxx>
Re: [PATCH] apei/ghes: Use xchg_release() for updating new cache slot instead of cmpxchg()
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH] apei/ghes: Use xchg_release() for updating new cache slot instead of cmpxchg()
From
: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
[PATCH v2 22/23] efi/libstub: Add memory attribute protocol definitions
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v2 23/23] efi/libstub: Use memory attribute protocol
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v2 20/23] x86/build: Make generated PE more spec compliant
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v2 21/23] efi/x86: Explicitly set sections memory attributes
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v2 08/23] x86/boot: Map memory explicitly
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v2 02/23] x86/build: Remove RWX sections and align on 4KB
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v2 12/23] x86/boot: Make kernel_add_identity_map() a pointer
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v2 05/23] x86/boot: Support 4KB pages for identity mapping
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v2 01/23] x86/boot: Align vmlinuz sections on page size
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v2 14/23] x86/boot: Add EFI kernel extraction interface
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v2 06/23] x86/boot: Setup memory protection for bzImage code
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v2 18/23] tools/include: Add simplified version of pe.h
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v2 19/23] x86/build: Cleanup tools/build.c
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v2 07/23] x86/build: Check W^X of vmlinux during build
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v2 10/23] efi/libstub: Move helper function to related file
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v2 09/23] x86/boot: Remove mapping from page fault handler
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v2 16/23] x86/boot: Reduce lower limit of physical KASLR
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v2 13/23] x86/boot: Split trampoline and pt init code
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v2 11/23] x86/boot: Make console interface more abstract
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v2 03/23] x86/boot: Set cr0 to known state in trampoline
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v2 00/23] x86_64: Improvements at compressed kernel stage
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v2 04/23] x86/boot: Increase boot page table size
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v2 15/23] efi/x86: Support extracting kernel from libstub
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v2 17/23] x86/boot: Reduce size of the DOS stub
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH v10 0/7] Make ghes_edac a proper module
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH] apei/ghes: Use xchg_release() for updating new cache slot instead of cmpxchg()
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[efi:urgent] BUILD SUCCESS 7d866e38c7e9ece8a096d0d098fa9d92b9d4f97e
From
: kernel test robot <lkp@xxxxxxxxx>
[PATCH] apei/ghes: Use xchg_release() for updating new cache slot instead of cmpxchg()
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH] efi/tpm: Pass correct address to memblock_reserve
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] efi/tpm: Pass correct address to memblock_reserve
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH] efi/libstub: arm64: avoid SetVirtualAddressMap() when possible #forregzbot
From
: Thorsten Leemhuis <regressions@xxxxxxxxxxxxx>
[PATCH] efi/tpm: Pass correct address to memblock_reserve
From
: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
Re: [PATCH v10 6/7] apei/ghes: Use xchg_release() for updating new cache slot instead of cmpxchg()
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v10 6/7] apei/ghes: Use xchg_release() for updating new cache slot instead of cmpxchg()
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v10 6/7] apei/ghes: Use xchg_release() for updating new cache slot instead of cmpxchg()
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[efi:next] BUILD SUCCESS 32d3f1d8ba584936cce0e874f6df0177f2169a37
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [GIT PULL] EFI fixes for v6.1 #1
From
: pr-tracker-bot@xxxxxxxxxx
[efi:urgent] BUILD SUCCESS 37926f96302d8b6c2bc97990d33e316a3ed6d67f
From
: kernel test robot <lkp@xxxxxxxxx>
[GIT PULL] EFI fixes for v6.1 #1
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH printk v2 08/38] efi: earlycon: use console_is_enabled()
From
: Petr Mladek <pmladek@xxxxxxxx>
Re: [PATCH v3 1/3] efi: random: reduce seed size to 32 bytes
From
: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
Re: [PATCH v3 2/3] efi: random: Use 'ACPI reclaim' memory for random seed
From
: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
[efi:urgent] BUILD SUCCESS 83f923d99cdf079f66fc5fac7d1634a03f229036
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH] efi/libstub: arm64: avoid SetVirtualAddressMap() when possible
From
: Yicong Yang <yangyicong@xxxxxxxxxx>
[PATCH] efi: runtime: Don't assume virtual mappings are missing if VA == PA == 0
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v3 0/3] efi: consume random seed provided by loader
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH v3 0/3] efi: consume random seed provided by loader
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v3 3/3] efi: random: combine bootloader provided RNG seed with RNG protocol output
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH v3 0/3] efi: consume random seed provided by loader
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH v3 3/3] efi: random: combine bootloader provided RNG seed with RNG protocol output
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v3 0/3] efi: consume random seed provided by loader
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v3 3/3] efi: random: combine bootloader provided RNG seed with RNG protocol output
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH 06/16] x86/boot: Setup memory protection for bzImage code
From
: Andrew Cooper <Andrew.Cooper3@xxxxxxxxxx>
Re: [PATCH v3 0/3] efi: consume random seed provided by loader
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH 06/16] x86/boot: Setup memory protection for bzImage code
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH 03/16] x86/boot: Set cr0 to known state in trampoline
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH 16/16] efi/libstub: Use memory attribute protocol
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH 14/16] x86/build: Make generated PE more spec compliant
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH] efi/libstub: arm64: avoid SetVirtualAddressMap() when possible
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] efi/libstub: arm64: avoid SetVirtualAddressMap() when possible
From
: Thorsten Leemhuis <regressions@xxxxxxxxxxxxx>
Re: [PATCH 13/16] efi/x86: Support extracting kernel from libstub
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH 12/16] x86/boot: Add EFI kernel extraction interface
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH 10/16] x86/boot: Make console interface more abstract
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH 06/16] x86/boot: Setup memory protection for bzImage code
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH 05/16] x86/boot: Support 4KB pages for identity mapping
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH 04/16] x86/boot: Increase boot page table size
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH 03/16] x86/boot: Set cr0 to known state in trampoline
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH 02/16] x86/build: Remove RWX sections and align on 4KB
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH 01/16] x86/boot: Align vmlinuz sections on page size
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH 00/16] x86_64: Improvements at compressed kernel stage
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [REGRESSION] Failure to write the NVRAM variables starting from kernel 6.0 on T2 Macs
From
: Aditya Garg <gargaditya08@xxxxxxxx>
[PATCH] efi: libstub: Fix incorrect payload size in zboot header
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 1/3] efi: random: reduce seed size to 32 bytes
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 2/3] efi: random: Use 'ACPI reclaim' memory for random seed
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 3/3] efi: random: combine bootloader provided RNG seed with RNG protocol output
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 0/3] efi: consume random seed provided by loader
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH] efi: efivars: Fix variable writes without query_variable_store()
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [REGRESSION] Failure to write the NVRAM variables starting from kernel 6.0 on T2 Macs
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[REGRESSION] Failure to write the NVRAM variables starting from kernel 6.0 on T2 Macs
From
: Aditya Garg <gargaditya08@xxxxxxxx>
Re: [PATCH printk v2 08/38] efi: earlycon: use console_is_enabled()
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH printk v2 08/38] efi: earlycon: use console_is_enabled()
From
: John Ogness <john.ogness@xxxxxxxxxxxxx>
[PATCH printk v2 00/38] reduce console_lock scope
From
: John Ogness <john.ogness@xxxxxxxxxxxxx>
Re: [PATCH 06/16] x86/boot: Setup memory protection for bzImage code
From
: Andrew Cooper <Andrew.Cooper3@xxxxxxxxxx>
Re: [PATCH 03/16] x86/boot: Set cr0 to known state in trampoline
From
: Andrew Cooper <Andrew.Cooper3@xxxxxxxxxx>
Re: [PATCH] efi/libstub: make memory protection warnings include newlines.
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 16/16] efi/libstub: Use memory attribute protocol
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 15/16] efi/libstub: Add memory attribute protocol definitions
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 14/16] x86/build: Make generated PE more spec compliant
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 13/16] efi/x86: Support extracting kernel from libstub
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 12/16] x86/boot: Add EFI kernel extraction interface
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 10/16] x86/boot: Make console interface more abstract
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 09/16] efi/libstub: Move helper function to related file
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 08/16] x86/boot: Remove mapping from page fault handler
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 06/16] x86/boot: Setup memory protection for bzImage code
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 05/16] x86/boot: Support 4KB pages for identity mapping
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 04/16] x86/boot: Increase boot page table size
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 03/16] x86/boot: Set cr0 to known state in trampoline
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 02/16] x86/build: Remove RWX sections and align on 4KB
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 01/16] x86/boot: Align vmlinuz sections on page size
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH for-stable] efi: libstub: drop pointless get_memory_map() call
From
: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] efi/libstub: arm64: avoid SetVirtualAddressMap() when possible
From
: Yicong Yang <yangyicong@xxxxxxxxxx>
Re: [PATCH 00/16] x86_64: Improvements at compressed kernel stage
From
: Peter Jones <pjones@xxxxxxxxxx>
[PATCH] efi/libstub: make memory protection warnings include newlines.
From
: Peter Jones <pjones@xxxxxxxxxx>
[efi:next] BUILD SUCCESS d005710d183ce611beabf04e30b3eeee02470cc9
From
: kernel test robot <lkp@xxxxxxxxx>
[efi:urgent] BUILD SUCCESS 46a904dc27c826846cba6200b076514379802447
From
: kernel test robot <lkp@xxxxxxxxx>
[PATCH for-stable] efi: libstub: drop pointless get_memory_map() call
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 02/21] arm64: efi: Avoid dcache_clean_poc() altogether in efi_enter_kernel()
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 03/21] arm64: efi: Move efi-entry.S into the libstub source directory
From
: Catalin Marinas <catalin.marinas@xxxxxxx>
Re: [PATCH 02/21] arm64: efi: Avoid dcache_clean_poc() altogether in efi_enter_kernel()
From
: Catalin Marinas <catalin.marinas@xxxxxxx>
Re: [PATCH 01/21] arm64: efi: Move dcache cleaning of loaded image out of efi_enter_kernel()
From
: Catalin Marinas <catalin.marinas@xxxxxxx>
Re: [PATCH 01/21] arm64: efi: Move dcache cleaning of loaded image out of efi_enter_kernel()
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 01/21] arm64: efi: Move dcache cleaning of loaded image out of efi_enter_kernel()
From
: Catalin Marinas <catalin.marinas@xxxxxxx>
[PATCH v4 6/6] arm64: efi/libstub: enter with the MMU on
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v4 5/6] arm64: head: clean the ID map page to the PoC
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v4 4/6] arm64: head: avoid cache invalidation when entering with the MMU on
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v4 3/6] arm64: head: record the MMU state at primary entry
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v4 2/6] arm64: kernel: move identity map out of .text mapping
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v4 1/6] arm64: lds: reduce effective minimum image alignment to 64k
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v4 0/6] arm64: efi: leave MMU and caches on at boot
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v10 7/7] EDAC/igen6: Return consistent errno when another edac driver is enabled
From
: Jia He <justin.he@xxxxxxx>
[PATCH v10 6/7] apei/ghes: Use xchg_release() for updating new cache slot instead of cmpxchg()
From
: Jia He <justin.he@xxxxxxx>
[PATCH v10 4/7] EDAC/ghes: Make ghes_edac a proper module to remove the dependency on ghes
From
: Jia He <justin.he@xxxxxxx>
[PATCH v10 5/7] EDAC: Add the ghes_get_devices() check for chipset-specific edac drivers
From
: Jia He <justin.he@xxxxxxx>
[PATCH v10 2/7] EDAC/ghes: Add a notifier for reporting memory errors
From
: Jia He <justin.he@xxxxxxx>
[Index of Archives]
[Linux Kernel Development]
[Security]
[Linux ARM Kernel]
[Tools]
[Linux MIPS]
[Linux S390]
[Bugtraq]
[Share Photos]>
[Fedora ARM]