Linux EFI/UEFI Development
Thread Index
[
Prev Page
][
Next Page
]
[PATCH v3 05/17] x86/compressed: efi-mixed: move efi32_entry out of head_64.S
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 14/17] x86/compressed: move startup32_check_sev_cbit() out of head_64.S
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 07/17] x86/compressed: efi: merge multiple definitions of image_offset into one
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 12/17] x86/compressed: move startup32_load_idt() out of head_64.S
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 10/17] x86/compressed: pull global variable ref up into startup32_load_idt()
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 03/17] x86/compressed: efi-mixed: move bootargs parsing out of 32-bit startup code
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 01/17] x86/compressed: efi-mixed: rename efi_thunk_64.S to efi-mixed.S
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 02/17] x86/compressed: efi-mixed: move 32-bit entrypoint code into .text section
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 11/17] x86/compressed: move startup32_load_idt() into .text section
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 13/17] x86/compressed: move startup32_check_sev_cbit() into .text
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 04/17] x86/compressed: efi-mixed: move efi32_pe_entry into .text section
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 09/17] x86/compressed: avoid touching ECX in startup32_set_idt_entry()
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 06/17] x86/compressed: efi-mixed: move efi32_pe_entry() out of head_64.S
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 00/17] x86: head_64.S spring cleaning
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v2 5/5] efi: random: refresh non-volatile random seed when RNG is initialized
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 23/24] efi/libstub: Use memory attribute protocol
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 19/24] x86/build: Cleanup tools/build.c
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 20/24] x86/build: Make generated PE more spec compliant
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 21/24] efi/x86: Explicitly set sections memory attributes
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 24/24] efi/libstub: Make memory protection warnings include newlines
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 17/24] x86/boot: Reduce size of the DOS stub
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 22/24] efi/libstub: Add memory attribute protocol definitions
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 14/24] x86/boot: Add EFI kernel extraction interface
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 16/24] x86/boot: Reduce lower limit of physical KASLR
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 18/24] tools/include: Add simplified version of pe.h
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 15/24] efi/x86: Support extracting kernel from libstub
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 09/24] x86/boot: Remove mapping from page fault handler
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 10/24] efi/libstub: Move helper function to related file
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 04/24] x86/boot: Increase boot page table size
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 07/24] x86/build: Check W^X of vmlinux during build
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 13/24] x86/boot: Split trampoline and pt init code
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 12/24] x86/boot: Make kernel_add_identity_map() a pointer
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 06/24] x86/boot: Setup memory protection for bzImage code
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 05/24] x86/boot: Support 4KB pages for identity mapping
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 08/24] x86/boot: Map memory explicitly
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 03/24] x86/boot: Set cr0 to known state in trampoline
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 01/24] x86/boot: Align vmlinuz sections on page size
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 02/24] x86/build: Remove RWX sections and align on 4KB
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 00/24] x86_64: Improvements at compressed kernel stage
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v3 11/24] x86/boot: Make console interface more abstract
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH] riscv: Sync efi page table's kernel mappings before switching
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
Re: [PATCH] riscv: Sync efi page table's kernel mappings before switching
From
: Conor Dooley <conor.dooley@xxxxxxxxxxxxx>
[PATCH v3 4/5] vsprintf: initialize siphash key using notifier
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH v3 3/5] random: add back async readiness notifier
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH v3 2/5] efi: stub: use random seed from EFI variable
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH v3 5/5] efi: random: refresh non-volatile random seed when RNG is initialized
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH v3 1/5] efi: vars: prohibit reading random seed variables
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH v3 0/5] Use EFI variables for random seed
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
From
: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
Re: [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
RE: [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
From
: David Laight <David.Laight@xxxxxxxxxx>
Re: [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH] riscv: Sync efi page table's kernel mappings before switching
From
: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
Re: [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 00/23] x86_64: Improvements at compressed kernel stage
From
: joeyli <jlee@xxxxxxxx>
Re: [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 00/23] x86_64: Improvements at compressed kernel stage
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH v2 00/23] x86_64: Improvements at compressed kernel stage
From
: joeyli <jlee@xxxxxxxx>
Re: [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
From
: "Ritesh Harjani (IBM)" <ritesh.list@xxxxxxxxx>
Re: [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
From
: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 5/6] efi: xen: Implement memory descriptor lookup based on hypercall
From
: Demi Marie Obenour <demi@xxxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 00/16] x86: head_64.S spring cleaning
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v2 00/16] x86: head_64.S spring cleaning
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v2 11/16] x86/compressed: move startup32_load_idt() into .text section
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH printk v5 00/40] reduce console_lock scope
From
: Petr Mladek <pmladek@xxxxxxxx>
Re: [PATCH RFC v1 2/6] vsprintf: initialize siphash key using notifier
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH RFC v1 2/6] vsprintf: initialize siphash key using notifier
From
: Petr Mladek <pmladek@xxxxxxxx>
[PATCH v2 5/5] efi: random: refresh non-volatile random seed when RNG is initialized
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH v2 4/5] vsprintf: initialize siphash key using notifier
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH v2 2/5] efi: stub: use random seed from EFI variable
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH v2 1/5] efi: vars: prohibit reading random seed variables
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH v2 3/5] random: add back async readiness notifier
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH v2 0/5] Use EFI variables for random seed
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH printk v5 00/40] reduce console_lock scope
From
: Petr Mladek <pmladek@xxxxxxxx>
Re: Efi-stub-kernel with embedded initramfs does not boot
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v2] efi: random: zero out secret after use and do not take minimum
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 04/16] x86/compressed: efi-mixed: move efi32_pe_entry into .text section
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v2 04/16] x86/compressed: efi-mixed: move efi32_pe_entry into .text section
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v2 04/16] x86/compressed: efi-mixed: move efi32_pe_entry into .text section
From
: Borislav Petkov <bp@xxxxxxxxx>
[PATCH] efi: random: remove extraneous dmesg notice
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH v2] efi: random: zero out secret after use and do not take minimum
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH] efi: random: zero out secret after use and do not take minimum
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH v4 2/3] powerpc/pseries: PLPKS SED Opal keystore support
From
: Greg Joyce <gjoyce@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v4 3/3] block: sed-opal: keystore access for SED Opal keys
From
: Greg Joyce <gjoyce@xxxxxxxxxxxxxxxxxx>
Re: [PATCH] efi: random: zero out secret after use and do not take minimum
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH RFC v1 5/6] efi: efivarfs: prohibit reading random seed variables
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH] efi: random: zero out secret after use and do not take minimum
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH RFC v1 5/6] efi: efivarfs: prohibit reading random seed variables
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH RFC v1 0/6] Use EFI variables for random seed
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH RFC v1 5/6] efi: efivarfs: prohibit reading random seed variables
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH RFC v1 0/6] Use EFI variables for random seed
From
: Lennart Poettering <lennart@xxxxxxxxxxxxxx>
Re: [PATCH RFC v1 5/6] efi: efivarfs: prohibit reading random seed variables
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH printk v5 24/40] efi: earlycon: use console_is_registered()
From
: John Ogness <john.ogness@xxxxxxxxxxxxx>
[PATCH printk v5 00/40] reduce console_lock scope
From
: John Ogness <john.ogness@xxxxxxxxxxxxx>
[PATCH RFC v1 0/6] Use EFI variables for random seed
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH RFC v1 2/6] vsprintf: initialize siphash key using notifier
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH RFC v1 4/6] efi: stub: use random seed from EFI variable
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH RFC v1 1/6] random: add back async readiness notifier
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH RFC v1 6/6] efi: refresh non-volatile random seed when RNG is initialized
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH RFC v1 5/6] efi: efivarfs: prohibit reading random seed variables
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH RFC v1 3/6] efi: random: combine bootloader provided RNG seed with RNG protocol output
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH v5 0/7] arm64: efi: leave MMU and caches on at boot
From
: Will Deacon <will@xxxxxxxxxx>
Re: [PATCH v5 0/7] arm64: efi: leave MMU and caches on at boot
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v5 0/7] arm64: efi: leave MMU and caches on at boot
From
: Will Deacon <will@xxxxxxxxxx>
Re: [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
From
: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
[PATCH printk v4 23/39] efi: earlycon: use console_is_registered()
From
: John Ogness <john.ogness@xxxxxxxxxxxxx>
[PATCH printk v4 00/39] reduce console_lock scope
From
: John Ogness <john.ogness@xxxxxxxxxxxxx>
[efi:next] BUILD SUCCESS c5fa6df0a498e363200988cb4d2146ac168fcc0e
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [Issue] EFI runtime-wrapper is broken #forregzbot
From
: Thorsten Leemhuis <regressions@xxxxxxxxxxxxx>
Re: [BUG] rtc-efi: Error in efi.get_time() spams dmesg with error message #forregzbot
From
: Thorsten Leemhuis <regressions@xxxxxxxxxxxxx>
Re: [GIT PULL] EFI fixes for v6.1 (#3)
From
: pr-tracker-bot@xxxxxxxxxx
[efi:next] BUILD SUCCESS 2b3df554c475872aa1bf9125428a56aaeb7a0aac
From
: kernel test robot <lkp@xxxxxxxxx>
[GIT PULL] EFI fixes for v6.1 (#3)
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: Regression in Linux 6.0.8 in Lenovo T14 Gen 3 when adding EFI boot entries
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: Regression in Linux 6.0.8 in Lenovo T14 Gen 3 when adding EFI boot entries
From
: Ulrich Gemkow <ulrich.gemkow@xxxxxxxxxxxxxxxxxxxx>
Re: Regression in Linux 6.0.8 in Lenovo T14 Gen 3 when adding EFI boot entries
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: Regression in Linux 6.0.8 in Lenovo T14 Gen 3 when adding EFI boot entries
From
: Ulrich Gemkow <ulrich.gemkow@xxxxxxxxxxxxxxxxxxxx>
Re: Regression in Linux 6.0.8 in Lenovo T14 Gen 3 when adding EFI boot entries
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: Regression in Linux 6.0.8 in Lenovo T14 Gen 3 when adding EFI boot entries
From
: Ulrich Gemkow <ulrich.gemkow@xxxxxxxxxxxxxxxxxxxx>
Re: Regression in Linux 6.0.8 in Lenovo T14 Gen 3 when adding EFI boot entries
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Regression in Linux 6.0.8 in Lenovo T14 Gen 3 when adding EFI boot entries
From
: Ulrich Gemkow <ulrich.gemkow@xxxxxxxxxxxxxxxxxxxx>
[efi:next] BUILD SUCCESS 82da66a9913ef37c300d2e44ebc3b4814120d24b
From
: kernel test robot <lkp@xxxxxxxxx>
[linux-next:master] BUILD REGRESSION f8f60f322f0640c8edda2942ca5f84b7a27c417a
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v5 0/7] arm64: efi: leave MMU and caches on at boot
From
: Mark Rutland <mark.rutland@xxxxxxx>
Re: [PATCH printk v3 00/40] reduce console_lock scope
From
: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
[efi:urgent] BUILD SUCCESS 9b9eaee9828fe98b030cf43ac50065a54a2f5d52
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH] efi: Override runtime supported mask from a EFI variable if present
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4 4/5] mtd_blkdevs: add option to enable scanning for partitions
From
: Daniel Golle <daniel@xxxxxxxxxxxxxx>
[linux-next:master] BUILD REGRESSION 382d2f9e739bc6f151c718b38537ae522ff848cd
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v4 4/5] mtd_blkdevs: add option to enable scanning for partitions
From
: Richard Weinberger <richard@xxxxxx>
Re: [PATCH v4 4/5] mtd_blkdevs: add option to enable scanning for partitions
From
: Daniel Golle <daniel@xxxxxxxxxxxxxx>
Re: [PATCH v4 4/5] mtd_blkdevs: add option to enable scanning for partitions
From
: Richard Weinberger <richard@xxxxxx>
Re: [PATCH v4 5/5] mtd: ubi: block: add option to enable scanning for partitions
From
: Richard Weinberger <richard@xxxxxx>
Re: [PATCH] arm64: efi: Force the use of SetVirtualAddressMap() on Altra machines
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [BUG] rtc-efi: Error in efi.get_time() spams dmesg with error message
From
: Alexandru Elisei <alexandru.elisei@xxxxxxx>
[PATCH] efi: vars: allow passing fmode= and dmode= when mounting
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH] arm64: efi: Force the use of SetVirtualAddressMap() on Altra machines
From
: Alexandru Elisei <alexandru.elisei@xxxxxxx>
Re: [PATCH v8 16/17] integrity: Trust MOK keys if MokListTrustedRT found
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v8 16/17] integrity: Trust MOK keys if MokListTrustedRT found
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v8 16/17] integrity: Trust MOK keys if MokListTrustedRT found
From
: Morten Linderud <morten@xxxxxxxxxxx>
Re: [PATCH v4 2/5] block: add partition parser for U-Boot uImage.FIT
From
: Matthew Wilcox <willy@xxxxxxxxxxxxx>
Re: [PATCH] arm64: efi: Force the use of SetVirtualAddressMap() on Altra machines
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] arm64: efi: Force the use of SetVirtualAddressMap() on Altra machines
From
: Alexandru Elisei <alexandru.elisei@xxxxxxx>
Re: [PATCH] efi: Override runtime supported mask from a EFI variable if present
From
: Alexandru Elisei <alexandru.elisei@xxxxxxx>
Re: [PATCH printk v3 25/40] efi: earlycon: use console_is_registered()
From
: Petr Mladek <pmladek@xxxxxxxx>
Re: [PATCH v8 16/17] integrity: Trust MOK keys if MokListTrustedRT found
From
: Morten Linderud <morten@xxxxxxxxxxx>
Re: [PATCH v8 16/17] integrity: Trust MOK keys if MokListTrustedRT found
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
[PATCH] arm64: efi: Force the use of SetVirtualAddressMap() on Altra machines
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [RFC PATCH] efi: Put Linux specific magic number in the DOS header
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v8 16/17] integrity: Trust MOK keys if MokListTrustedRT found
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4 2/5] block: add partition parser for U-Boot uImage.FIT
From
: Daniel Golle <daniel@xxxxxxxxxxxxxx>
Re: [PATCH v8 16/17] integrity: Trust MOK keys if MokListTrustedRT found
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH v8 16/17] integrity: Trust MOK keys if MokListTrustedRT found
From
: Morten Linderud <morten@xxxxxxxxxxx>
Re: [RFC PATCH] efi: Put Linux specific magic number in the DOS header
From
: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
Re: [BUG] rtc-efi: Error in efi.get_time() spams dmesg with error message
From
: Alexandre Belloni <alexandre.belloni@xxxxxxxxxxx>
Re: [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
From
: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
[PATCH] efi: Override runtime supported mask from a EFI variable if present
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] arm64: efi: Disable only the misbehaving runtime service on sync exceptions
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4 2/5] block: add partition parser for U-Boot uImage.FIT
From
: Matthew Wilcox <willy@xxxxxxxxxxxxx>
Re: [PATCH] arm64: efi: Disable only the misbehaving runtime service on sync exceptions
From
: Alexandru Elisei <alexandru.elisei@xxxxxxx>
Re: [PATCH] arm64: efi: Disable only the misbehaving runtime service on sync exceptions
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [BUG] rtc-efi: Error in efi.get_time() spams dmesg with error message #forregzbot
From
: Thorsten Leemhuis <regressions@xxxxxxxxxxxxx>
Re: [Issue] EFI runtime-wrapper is broken #forregzbot
From
: Thorsten Leemhuis <regressions@xxxxxxxxxxxxx>
Re: [RFC PATCH] efi: Put Linux specific magic number in the DOS header
From
: Heinrich Schuchardt <heinrich.schuchardt@xxxxxxxxxxxxx>
Re: [BUG] rtc-efi: Error in efi.get_time() spams dmesg with error message
From
: Alexandru Elisei <alexandru.elisei@xxxxxxx>
Re: [PATCH] arm64: efi: Disable only the misbehaving runtime service on sync exceptions
From
: Alexandru Elisei <alexandru.elisei@xxxxxxx>
Re: [PATCH v4 2/5] block: add partition parser for U-Boot uImage.FIT
From
: Daniel Golle <daniel@xxxxxxxxxxxxxx>
[RFC PATCH] efi: Put Linux specific magic number in the DOS header
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4 2/5] block: add partition parser for U-Boot uImage.FIT
From
: Matthew Wilcox <willy@xxxxxxxxxxxxx>
Re: [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v4 4/5] mtd_blkdevs: add option to enable scanning for partitions
From
: Daniel Golle <daniel@xxxxxxxxxxxxxx>
Re: [PATCH v4 4/5] mtd_blkdevs: add option to enable scanning for partitions
From
: Miquel Raynal <miquel.raynal@xxxxxxxxxxx>
Re: [PATCH v4 3/5] partitions/efi: add support for uImage.FIT sub-partitions
From
: Daniel Golle <daniel@xxxxxxxxxxxxxx>
Re: [PATCH v4] efi: random: combine bootloader provided RNG seed with RNG protocol output
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4] efi: random: combine bootloader provided RNG seed with RNG protocol output
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [Possible BUG] arm64: efi: efi_runtime_fixup_exception() and efi_call_virt_check_flags() both taint the kernel
From
: Alexandru Elisei <alexandru.elisei@xxxxxxx>
[PATCH v4] efi: random: combine bootloader provided RNG seed with RNG protocol output
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v2 0/2] efi/cper, cxl: Decode CXL Protocol Errors CPER
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] efi: libstub: fix efi_load_initrd_dev_path() kernel-doc comment
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4 3/5] partitions/efi: add support for uImage.FIT sub-partitions
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [Possible BUG] arm64: efi: efi_runtime_fixup_exception() and efi_call_virt_check_flags() both taint the kernel
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 0/2] efi/x86: Move runtime map sysfs code into arch/x86
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v2 00/23] x86_64: Improvements at compressed kernel stage
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v4 5/5] mtd: ubi: block: add option to enable scanning for partitions
From
: Daniel Golle <daniel@xxxxxxxxxxxxxx>
[PATCH v4 3/5] partitions/efi: add support for uImage.FIT sub-partitions
From
: Daniel Golle <daniel@xxxxxxxxxxxxxx>
[PATCH v4 4/5] mtd_blkdevs: add option to enable scanning for partitions
From
: Daniel Golle <daniel@xxxxxxxxxxxxxx>
[PATCH v4 2/5] block: add partition parser for U-Boot uImage.FIT
From
: Daniel Golle <daniel@xxxxxxxxxxxxxx>
[PATCH v4 1/5] block: add new flag to add partitions read-only
From
: Daniel Golle <daniel@xxxxxxxxxxxxxx>
[PATCH v4 0/5] partition parser for U-Boot's uImage.FIT
From
: Daniel Golle <daniel@xxxxxxxxxxxxxx>
Re: [PATCH v5 5/7] arm64: head: Clean the ID map and the HYP text to the PoC if needed
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [BUG] rtc-efi: Error in efi.get_time() spams dmesg with error message
From
: Alexandre Belloni <alexandre.belloni@xxxxxxxxxxx>
[PATCH v5 7/7] efi: arm64: enter with MMU and caches enabled
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v5 6/7] arm64: lds: reduce effective minimum image alignment to 64k
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v5 1/7] arm64: head: Move all finalise_el2 calls to after __enable_mmu
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v5 3/7] arm64: head: record the MMU state at primary entry
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v5 4/7] arm64: head: avoid cache invalidation when entering with the MMU on
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v5 5/7] arm64: head: Clean the ID map and the HYP text to the PoC if needed
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v5 2/7] arm64: kernel: move identity map out of .text mapping
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v5 0/7] arm64: efi: leave MMU and caches on at boot
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v2 00/23] x86_64: Improvements at compressed kernel stage
From
: "Limonciello, Mario" <mario.limonciello@xxxxxxx>
[PATCH] arm64: efi: Disable only the misbehaving runtime service on sync exceptions
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [Issue] EFI runtime-wrapper is broken
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [Issue] EFI runtime-wrapper is broken
From
: Thorsten Leemhuis <regressions@xxxxxxxxxxxxx>
Re: [Possible BUG] arm64: efi: efi_runtime_fixup_exception() and efi_call_virt_check_flags() both taint the kernel #forregzbot
From
: Thorsten Leemhuis <regressions@xxxxxxxxxxxxx>
[BUG] rtc-efi: Error in efi.get_time() spams dmesg with error message
From
: Alexandru Elisei <alexandru.elisei@xxxxxxx>
Re: [Possible BUG] arm64: efi: efi_runtime_fixup_exception() and efi_call_virt_check_flags() both taint the kernel
From
: Alexandru Elisei <alexandru.elisei@xxxxxxx>
Re: [PATCH v2 00/23] x86_64: Improvements at compressed kernel stage
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH 0/2] efi/x86: Move runtime map sysfs code into arch/x86
From
: Dave Young <dyoung@xxxxxxxxxx>
[PATCH] efi: libstub: fix efi_load_initrd_dev_path() kernel-doc comment
From
: Jialin Zhang <zhangjialin11@xxxxxxxxxx>
Re: [Possible BUG] arm64: efi: efi_runtime_fixup_exception() and efi_call_virt_check_flags() both taint the kernel
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[Possible BUG] arm64: efi: efi_runtime_fixup_exception() and efi_call_virt_check_flags() both taint the kernel
From
: Alexandru Elisei <alexandru.elisei@xxxxxxx>
Re: [PATCH v4 0/6] arm64: efi: leave MMU and caches on at boot
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4 0/6] arm64: efi: leave MMU and caches on at boot
From
: Will Deacon <will@xxxxxxxxxx>
[PATCH printk v3 25/40] efi: earlycon: use console_is_registered()
From
: John Ogness <john.ogness@xxxxxxxxxxxxx>
[PATCH printk v3 00/40] reduce console_lock scope
From
: John Ogness <john.ogness@xxxxxxxxxxxxx>
[efi:urgent] BUILD SUCCESS 1bf039df2f63402adb365f59383fe9d34e2ef641
From
: kernel test robot <lkp@xxxxxxxxx>
[PATCH 0/2] efi/x86: Move runtime map sysfs code into arch/x86
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH 2/2] efi: x86: Move EFI runtime map sysfs code to arch/x86
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH 1/2] efi: runtime-maps: Clarify purpose and enable by default for kexec
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: Bug: kexec on Lenovo ThinkPad T480 disables EFI mode
From
: Dave Young <dyoung@xxxxxxxxxx>
Re: Bug: kexec on Lenovo ThinkPad T480 disables EFI mode
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: Bug: kexec on Lenovo ThinkPad T480 disables EFI mode
From
: Dave Young <dyoung@xxxxxxxxxx>
Re: Bug: kexec on Lenovo ThinkPad T480 disables EFI mode
From
: Dave Young <dyoung@xxxxxxxxxx>
Re: Bug: kexec on Lenovo ThinkPad T480 disables EFI mode
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: Bug: kexec on Lenovo ThinkPad T480 disables EFI mode
From
: Dave Young <dyoung@xxxxxxxxxx>
[efi:next] BUILD SUCCESS 27e80a1f89b1b7f6af2f6a46bcb4a3fd9c2b8a14
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v2] arm64: efi: Fix handling of misaligned runtime regions and drop warning
From
: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] arm64: efi: Fix handling of misaligned runtime regions and drop warning
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH 0/4] powerpc/pseries: expose firmware security variables via filesystem
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH 3/4] powerpc/pseries: initialize fwsecurityfs with plpks arch-specific structure
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH 4/4] powerpc/pseries: expose authenticated variables stored in LPAR PKS
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH 1/4] powerpc/pseries: Add new functions to PLPKS driver
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
Re: [PATCH v2] arm64: efi: Fix handling of misaligned runtime regions and drop warning
From
: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
[PATCH v2] arm64: efi: Fix handling of misaligned runtime regions and drop warning
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] arm64: efi: Make runtime region misalignment warning less noisy
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] arm64: efi: Make runtime region misalignment warning less noisy
From
: Heinrich Schuchardt <heinrich.schuchardt@xxxxxxxxxxxxx>
Re: [PATCH] arm64: efi: Make runtime region misalignment warning less noisy
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] arm64: efi: Make runtime region misalignment warning less noisy
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: Remove WARN_ONCE for unaligned UEFI region?
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] arm64: efi: Make runtime region misalignment warning less noisy
From
: Heinrich Schuchardt <heinrich.schuchardt@xxxxxxxxxxxxx>
Re: Remove WARN_ONCE for unaligned UEFI region?
From
: Heinrich Schuchardt <heinrich.schuchardt@xxxxxxxxxxxxx>
Re: [PATCH] arm64: efi: Make runtime region misalignment warning less noisy
From
: Heinrich Schuchardt <heinrich.schuchardt@xxxxxxxxxxxxx>
Re: Remove WARN_ONCE for unaligned UEFI region?
From
: Heinrich Schuchardt <heinrich.schuchardt@xxxxxxxxxxxxx>
[PATCH] arm64: efi: Make runtime region misalignment warning less noisy
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: Remove WARN_ONCE for unaligned UEFI region?
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: Remove WARN_ONCE for unaligned UEFI region?
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: Remove WARN_ONCE for unaligned UEFI region?
From
: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
Re: Remove WARN_ONCE for unaligned UEFI region?
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Remove WARN_ONCE for unaligned UEFI region?
From
: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
Re: Bug: kexec on Lenovo ThinkPad T480 disables EFI mode
From
: ns@xxxxxxxx
[efi:next] BUILD SUCCESS c804d4906e8a3749aa2aa91219362862ad54c8c0
From
: kernel test robot <lkp@xxxxxxxxx>
Re: Bug: kexec on Lenovo ThinkPad T480 disables EFI mode
From
: Dave Young <dyoung@xxxxxxxxxx>
Re: Bug: kexec on Lenovo ThinkPad T480 disables EFI mode
From
: Baoquan He <bhe@xxxxxxxxxx>
Re: [GIT PULL] EFI fixes for v6.1 (#2)
From
: pr-tracker-bot@xxxxxxxxxx
Re: [PATCH v2 00/23] x86_64: Improvements at compressed kernel stage
From
: "Limonciello, Mario" <mario.limonciello@xxxxxxx>
[GIT PULL] EFI fixes for v6.1 (#2)
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[efi:urgent] BUILD SUCCESS 23715a26c8d812912a70c6ac1ce67af649b95914
From
: kernel test robot <lkp@xxxxxxxxx>
[efi:next] BUILD SUCCESS 1abdc82f0c773bef2f58b9f00b03e75e9d4dd28b
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH V3] efi: pstore: Add module parameter for setting the record size
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH V3] efi: pstore: Add module parameter for setting the record size
From
: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
Re: [PATCH v2 2/2] efi/cper, cxl: Decode CXL Error Log
From
: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
Re: [PATCH v2 1/2] efi/cper, cxl: Decode CXL Protocol Error Section
From
: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
Re: [PATCH V3] efi: pstore: Add module parameter for setting the record size
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] arm64: efi: Recover from synchronous exceptions occurring in firmware
From
: Catalin Marinas <catalin.marinas@xxxxxxx>
Re: [PATCH] arm64: efi: Recover from synchronous exceptions occurring in firmware
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH 5.10 87/91] arm64/mm: Fix __enable_mmu() for new TGRAN range values
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 5.10 0/2] arm64: backport two patches to 5.10-stable
From
: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
[PATCH V3] efi: pstore: Add module parameter for setting the record size
From
: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
[PATCH 5.10 2/2] arm64/kexec: Test page size support with new TGRAN range values
From
: Zenghui Yu <yuzenghui@xxxxxxxxxx>
[PATCH 5.10 1/2] arm64/mm: Fix __enable_mmu() for new TGRAN range values
From
: Zenghui Yu <yuzenghui@xxxxxxxxxx>
[PATCH 5.10 0/2] arm64: backport two patches to 5.10-stable
From
: Zenghui Yu <yuzenghui@xxxxxxxxxx>
Re: [Issue] EFI runtime-wrapper is broken #forregzbot
From
: Thorsten Leemhuis <regressions@xxxxxxxxxxxxx>
[efi:urgent] BUILD SUCCESS 4e1c390e882d6f1d8c25221d041dfb832e460787
From
: kernel test robot <lkp@xxxxxxxxx>
[efi:next] BUILD SUCCESS 53ec9ccd138f6504fd5227a73dd8c6ab7a91f80f
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH V2] arm64/mm: Fix __enable_mmu() for new TGRAN range values
From
: Catalin Marinas <catalin.marinas@xxxxxxx>
[PATCH v2 2/2] efi/cper, cxl: Decode CXL Error Log
From
: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
[PATCH v2 1/2] efi/cper, cxl: Decode CXL Protocol Error Section
From
: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
[PATCH v2 0/2] efi/cper, cxl: Decode CXL Protocol Errors CPER
From
: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
Re: [PATCH] efi: efivars: Fix variable writes with unsupported query_variable_store()
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] MAINTAINERS: adjust entry after arm64 efi-entry.S file movement
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH] arm64: efi: Recover from synchronous exceptions occurring in firmware
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Bug: kexec on Lenovo ThinkPad T480 disables EFI mode
From
: ns@xxxxxxxx
Re: [PATCH] efi: efivars: Fix variable writes with unsupported query_variable_store()
From
: Aditya Garg <gargaditya08@xxxxxxxx>
[PATCH] MAINTAINERS: adjust entry after arm64 efi-entry.S file movement
From
: Lukas Bulwahn <lukas.bulwahn@xxxxxxxxx>
Re: [Issue] EFI runtime-wrapper is broken
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [Issue] EFI runtime-wrapper is broken
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [Issue] EFI runtime-wrapper is broken
From
: Gavin Shan <gshan@xxxxxxxxxx>
Re: [Issue] EFI runtime-wrapper is broken
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[efi:urgent] BUILD SUCCESS 4f50f041554c78aaa821585ce583946ecdae91b3
From
: kernel test robot <lkp@xxxxxxxxx>
[efi:next] BUILD SUCCESS 7f8342cdfdfc644a58a10db13d1cfb9f159f8f43
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH V2] arm64/mm: Fix __enable_mmu() for new TGRAN range values
From
: Zenghui Yu <yuzenghui@xxxxxxxxxx>
Re: [PATCH v9 0/9] x86: Show in sysfs if a memory node is able to do encryption
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v9 0/9] x86: Show in sysfs if a memory node is able to do encryption
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
[PATCH] efi: efivars: Fix variable writes with unsupported query_variable_store()
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v9 0/9] x86: Show in sysfs if a memory node is able to do encryption
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [REGRESSION] Failure to write the NVRAM variables starting from kernel 6.0 on T2 Macs
From
: Aditya Garg <gargaditya08@xxxxxxxx>
Re: [REGRESSION] Failure to write the NVRAM variables starting from kernel 6.0 on T2 Macs
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [REGRESSION] Failure to write the NVRAM variables starting from kernel 6.0 on T2 Macs
From
: Aditya Garg <gargaditya08@xxxxxxxx>
RE: [PATCH v10 0/7] Make ghes_edac a proper module
From
: Justin He <Justin.He@xxxxxxx>
Re: [PATCH] apei/ghes: Use xchg_release() for updating new cache slot instead of cmpxchg()
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH] apei/ghes: Use xchg_release() for updating new cache slot instead of cmpxchg()
From
: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
[PATCH v2 22/23] efi/libstub: Add memory attribute protocol definitions
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v2 23/23] efi/libstub: Use memory attribute protocol
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v2 20/23] x86/build: Make generated PE more spec compliant
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v2 21/23] efi/x86: Explicitly set sections memory attributes
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v2 08/23] x86/boot: Map memory explicitly
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v2 02/23] x86/build: Remove RWX sections and align on 4KB
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v2 12/23] x86/boot: Make kernel_add_identity_map() a pointer
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v2 05/23] x86/boot: Support 4KB pages for identity mapping
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v2 01/23] x86/boot: Align vmlinuz sections on page size
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v2 14/23] x86/boot: Add EFI kernel extraction interface
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v2 06/23] x86/boot: Setup memory protection for bzImage code
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v2 18/23] tools/include: Add simplified version of pe.h
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v2 19/23] x86/build: Cleanup tools/build.c
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v2 07/23] x86/build: Check W^X of vmlinux during build
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v2 10/23] efi/libstub: Move helper function to related file
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v2 09/23] x86/boot: Remove mapping from page fault handler
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v2 16/23] x86/boot: Reduce lower limit of physical KASLR
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v2 13/23] x86/boot: Split trampoline and pt init code
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v2 11/23] x86/boot: Make console interface more abstract
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v2 03/23] x86/boot: Set cr0 to known state in trampoline
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v2 00/23] x86_64: Improvements at compressed kernel stage
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v2 04/23] x86/boot: Increase boot page table size
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v2 15/23] efi/x86: Support extracting kernel from libstub
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
[PATCH v2 17/23] x86/boot: Reduce size of the DOS stub
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH v10 0/7] Make ghes_edac a proper module
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH] apei/ghes: Use xchg_release() for updating new cache slot instead of cmpxchg()
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[efi:urgent] BUILD SUCCESS 7d866e38c7e9ece8a096d0d098fa9d92b9d4f97e
From
: kernel test robot <lkp@xxxxxxxxx>
[PATCH] apei/ghes: Use xchg_release() for updating new cache slot instead of cmpxchg()
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH] efi/tpm: Pass correct address to memblock_reserve
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] efi/tpm: Pass correct address to memblock_reserve
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH] efi/libstub: arm64: avoid SetVirtualAddressMap() when possible #forregzbot
From
: Thorsten Leemhuis <regressions@xxxxxxxxxxxxx>
[PATCH] efi/tpm: Pass correct address to memblock_reserve
From
: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
Re: [PATCH v10 6/7] apei/ghes: Use xchg_release() for updating new cache slot instead of cmpxchg()
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v10 6/7] apei/ghes: Use xchg_release() for updating new cache slot instead of cmpxchg()
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v10 6/7] apei/ghes: Use xchg_release() for updating new cache slot instead of cmpxchg()
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[efi:next] BUILD SUCCESS 32d3f1d8ba584936cce0e874f6df0177f2169a37
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [GIT PULL] EFI fixes for v6.1 #1
From
: pr-tracker-bot@xxxxxxxxxx
[efi:urgent] BUILD SUCCESS 37926f96302d8b6c2bc97990d33e316a3ed6d67f
From
: kernel test robot <lkp@xxxxxxxxx>
[GIT PULL] EFI fixes for v6.1 #1
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH printk v2 08/38] efi: earlycon: use console_is_enabled()
From
: Petr Mladek <pmladek@xxxxxxxx>
Re: [PATCH v3 1/3] efi: random: reduce seed size to 32 bytes
From
: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
Re: [PATCH v3 2/3] efi: random: Use 'ACPI reclaim' memory for random seed
From
: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
[efi:urgent] BUILD SUCCESS 83f923d99cdf079f66fc5fac7d1634a03f229036
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH] efi/libstub: arm64: avoid SetVirtualAddressMap() when possible
From
: Yicong Yang <yangyicong@xxxxxxxxxx>
[PATCH] efi: runtime: Don't assume virtual mappings are missing if VA == PA == 0
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v3 0/3] efi: consume random seed provided by loader
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH v3 0/3] efi: consume random seed provided by loader
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v3 3/3] efi: random: combine bootloader provided RNG seed with RNG protocol output
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH v3 0/3] efi: consume random seed provided by loader
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH v3 3/3] efi: random: combine bootloader provided RNG seed with RNG protocol output
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v3 0/3] efi: consume random seed provided by loader
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v3 3/3] efi: random: combine bootloader provided RNG seed with RNG protocol output
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH 06/16] x86/boot: Setup memory protection for bzImage code
From
: Andrew Cooper <Andrew.Cooper3@xxxxxxxxxx>
Re: [PATCH v3 0/3] efi: consume random seed provided by loader
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH 06/16] x86/boot: Setup memory protection for bzImage code
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH 03/16] x86/boot: Set cr0 to known state in trampoline
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH 16/16] efi/libstub: Use memory attribute protocol
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH 14/16] x86/build: Make generated PE more spec compliant
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH] efi/libstub: arm64: avoid SetVirtualAddressMap() when possible
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] efi/libstub: arm64: avoid SetVirtualAddressMap() when possible
From
: Thorsten Leemhuis <regressions@xxxxxxxxxxxxx>
Re: [PATCH 13/16] efi/x86: Support extracting kernel from libstub
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH 12/16] x86/boot: Add EFI kernel extraction interface
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH 10/16] x86/boot: Make console interface more abstract
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH 06/16] x86/boot: Setup memory protection for bzImage code
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH 05/16] x86/boot: Support 4KB pages for identity mapping
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH 04/16] x86/boot: Increase boot page table size
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH 03/16] x86/boot: Set cr0 to known state in trampoline
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH 02/16] x86/build: Remove RWX sections and align on 4KB
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH 01/16] x86/boot: Align vmlinuz sections on page size
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [PATCH 00/16] x86_64: Improvements at compressed kernel stage
From
: Evgeniy Baskov <baskov@xxxxxxxxx>
Re: [REGRESSION] Failure to write the NVRAM variables starting from kernel 6.0 on T2 Macs
From
: Aditya Garg <gargaditya08@xxxxxxxx>
[PATCH] efi: libstub: Fix incorrect payload size in zboot header
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 1/3] efi: random: reduce seed size to 32 bytes
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 2/3] efi: random: Use 'ACPI reclaim' memory for random seed
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 3/3] efi: random: combine bootloader provided RNG seed with RNG protocol output
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3 0/3] efi: consume random seed provided by loader
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH] efi: efivars: Fix variable writes without query_variable_store()
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [REGRESSION] Failure to write the NVRAM variables starting from kernel 6.0 on T2 Macs
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[REGRESSION] Failure to write the NVRAM variables starting from kernel 6.0 on T2 Macs
From
: Aditya Garg <gargaditya08@xxxxxxxx>
Re: [PATCH printk v2 08/38] efi: earlycon: use console_is_enabled()
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH printk v2 08/38] efi: earlycon: use console_is_enabled()
From
: John Ogness <john.ogness@xxxxxxxxxxxxx>
[PATCH printk v2 00/38] reduce console_lock scope
From
: John Ogness <john.ogness@xxxxxxxxxxxxx>
Re: [PATCH 06/16] x86/boot: Setup memory protection for bzImage code
From
: Andrew Cooper <Andrew.Cooper3@xxxxxxxxxx>
Re: [PATCH 03/16] x86/boot: Set cr0 to known state in trampoline
From
: Andrew Cooper <Andrew.Cooper3@xxxxxxxxxx>
Re: [PATCH] efi/libstub: make memory protection warnings include newlines.
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 16/16] efi/libstub: Use memory attribute protocol
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 15/16] efi/libstub: Add memory attribute protocol definitions
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 14/16] x86/build: Make generated PE more spec compliant
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 13/16] efi/x86: Support extracting kernel from libstub
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 12/16] x86/boot: Add EFI kernel extraction interface
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 10/16] x86/boot: Make console interface more abstract
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 09/16] efi/libstub: Move helper function to related file
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 08/16] x86/boot: Remove mapping from page fault handler
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 06/16] x86/boot: Setup memory protection for bzImage code
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 05/16] x86/boot: Support 4KB pages for identity mapping
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 04/16] x86/boot: Increase boot page table size
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 03/16] x86/boot: Set cr0 to known state in trampoline
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 02/16] x86/build: Remove RWX sections and align on 4KB
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 01/16] x86/boot: Align vmlinuz sections on page size
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH for-stable] efi: libstub: drop pointless get_memory_map() call
From
: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] efi/libstub: arm64: avoid SetVirtualAddressMap() when possible
From
: Yicong Yang <yangyicong@xxxxxxxxxx>
Re: [PATCH 00/16] x86_64: Improvements at compressed kernel stage
From
: Peter Jones <pjones@xxxxxxxxxx>
[PATCH] efi/libstub: make memory protection warnings include newlines.
From
: Peter Jones <pjones@xxxxxxxxxx>
[efi:next] BUILD SUCCESS d005710d183ce611beabf04e30b3eeee02470cc9
From
: kernel test robot <lkp@xxxxxxxxx>
[efi:urgent] BUILD SUCCESS 46a904dc27c826846cba6200b076514379802447
From
: kernel test robot <lkp@xxxxxxxxx>
[PATCH for-stable] efi: libstub: drop pointless get_memory_map() call
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 02/21] arm64: efi: Avoid dcache_clean_poc() altogether in efi_enter_kernel()
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 03/21] arm64: efi: Move efi-entry.S into the libstub source directory
From
: Catalin Marinas <catalin.marinas@xxxxxxx>
Re: [PATCH 02/21] arm64: efi: Avoid dcache_clean_poc() altogether in efi_enter_kernel()
From
: Catalin Marinas <catalin.marinas@xxxxxxx>
Re: [PATCH 01/21] arm64: efi: Move dcache cleaning of loaded image out of efi_enter_kernel()
From
: Catalin Marinas <catalin.marinas@xxxxxxx>
Re: [PATCH 01/21] arm64: efi: Move dcache cleaning of loaded image out of efi_enter_kernel()
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 01/21] arm64: efi: Move dcache cleaning of loaded image out of efi_enter_kernel()
From
: Catalin Marinas <catalin.marinas@xxxxxxx>
[PATCH v4 6/6] arm64: efi/libstub: enter with the MMU on
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v4 5/6] arm64: head: clean the ID map page to the PoC
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v4 4/6] arm64: head: avoid cache invalidation when entering with the MMU on
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v4 3/6] arm64: head: record the MMU state at primary entry
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v4 2/6] arm64: kernel: move identity map out of .text mapping
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v4 1/6] arm64: lds: reduce effective minimum image alignment to 64k
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v4 0/6] arm64: efi: leave MMU and caches on at boot
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v10 7/7] EDAC/igen6: Return consistent errno when another edac driver is enabled
From
: Jia He <justin.he@xxxxxxx>
[PATCH v10 6/7] apei/ghes: Use xchg_release() for updating new cache slot instead of cmpxchg()
From
: Jia He <justin.he@xxxxxxx>
[PATCH v10 4/7] EDAC/ghes: Make ghes_edac a proper module to remove the dependency on ghes
From
: Jia He <justin.he@xxxxxxx>
[PATCH v10 5/7] EDAC: Add the ghes_get_devices() check for chipset-specific edac drivers
From
: Jia He <justin.he@xxxxxxx>
[PATCH v10 2/7] EDAC/ghes: Add a notifier for reporting memory errors
From
: Jia He <justin.he@xxxxxxx>
[PATCH v10 1/7] efi/cper: export several helpers for ghes_edac to use
From
: Jia He <justin.he@xxxxxxx>
[PATCH v10 3/7] EDAC/ghes: Prepare to make ghes_edac a proper module
From
: Jia He <justin.he@xxxxxxx>
[PATCH v10 0/7] Make ghes_edac a proper module
From
: Jia He <justin.he@xxxxxxx>
[PATCH AUTOSEL 5.15 15/21] kmsan: disable instrumentation of unsupported common kernel code
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 5.19 20/29] kmsan: disable instrumentation of unsupported common kernel code
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 6.0 22/32] kmsan: disable instrumentation of unsupported common kernel code
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH 21/21] efi: libstub: Merge zboot decompressor with the ordinary stub
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH 20/21] efi/loongarch: libstub: Split off kernel image relocation for builtin stub
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH 19/21] efi/loongarch: Don't jump to kernel entry via the old image
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH 17/21] efi/riscv: libstub: Split off kernel image relocation for builtin stub
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH 18/21] efi/arm64: libstub: Split off kernel image relocation for builtin stub
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH 16/21] efi: libstub: Factor out min alignment and preferred kernel load address
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH 15/21] efi: libstub: Add image code and data size to the zimage metadata
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH 14/21] efi: libstub: Factor out EFI stub entrypoint into separate file
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH 13/21] efi: libstub: Provide local implementations of strrchr() and memchr()
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH 12/21] efi: libstub: Move screen_info handling to common code
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH 11/21] efi: loongarch: Drop exports of unused string routines
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH 10/21] efi: libstub: Enable efi_printk() in zboot decompressor
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH 09/21] efi: libstub: Clone memcmp() into the stub
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH 08/21] efi: libstub: Use local strncmp() implementation unconditionally
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH 07/21] efi: libstub: Deduplicate ftrace command line argument filtering
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH 05/21] efi: libstub: Drop randomization of runtime memory map
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH 06/21] efi: libstub: Drop handling of EFI properties table
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH 04/21] efi: libstub: Remove zboot signing from build options
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH 03/21] arm64: efi: Move efi-entry.S into the libstub source directory
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH 02/21] arm64: efi: Avoid dcache_clean_poc() altogether in efi_enter_kernel()
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH 01/21] arm64: efi: Move dcache cleaning of loaded image out of efi_enter_kernel()
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH 00/21] efi: Combine stub functionality with zboot decompressor
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v9 6/7] apei/ghes: Use xchg_release() for updating new cache slot instead of cmpxchg()
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v9 7/7] EDAC/igen6: Return consistent errno when another edac driver is enabled
From
: Jia He <justin.he@xxxxxxx>
[PATCH v9 6/7] apei/ghes: Use xchg_release() for updating new cache slot instead of cmpxchg()
From
: Jia He <justin.he@xxxxxxx>
[PATCH v9 5/7] EDAC: Add the ghes_get_devices() check for chipset-specific edac drivers
From
: Jia He <justin.he@xxxxxxx>
[PATCH v9 3/7] EDAC/ghes: Prepare to make ghes_edac a proper module
From
: Jia He <justin.he@xxxxxxx>
[PATCH v9 4/7] EDAC/ghes: Make ghes_edac a proper module to remove the dependency on ghes
From
: Jia He <justin.he@xxxxxxx>
[PATCH v9 2/7] EDAC/ghes: Add a notifier for reporting memory errors
From
: Jia He <justin.he@xxxxxxx>
[PATCH v9 1/7] efi/cper: export several helpers for ghes_edac to use
From
: Jia He <justin.he@xxxxxxx>
[PATCH v9 0/7] Make ghes_edac a proper module
From
: Jia He <justin.he@xxxxxxx>
RE: [PATCH v8 6/7] apei/ghes: Use unrcu_pointer for cmpxchg
From
: Justin He <Justin.He@xxxxxxx>
Re: [PATCH v8 6/7] apei/ghes: Use unrcu_pointer for cmpxchg
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
RE: [PATCH v8 6/7] apei/ghes: Use unrcu_pointer for cmpxchg
From
: Justin He <Justin.He@xxxxxxx>
Re: [PATCH v8 6/7] apei/ghes: Use unrcu_pointer for cmpxchg
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH V2 3/3] efi: pstore: Add module parameter for setting the record size
From
: Kees Cook <keescook@xxxxxxxxxxxx>
Re: (subset) [PATCH V2 1/3] pstore: Alert on backend write error
From
: Kees Cook <keescook@xxxxxxxxxxxx>
Re: (subset) [PATCH 7/8] efi: pstore: Follow convention for the efi-pstore backend name
From
: Kees Cook <keescook@xxxxxxxxxxxx>
Re: [PATCH v8 6/7] apei/ghes: Use unrcu_pointer for cmpxchg
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH V2 3/3] efi: pstore: Add module parameter for setting the record size
From
: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
Re: [PATCH v8 6/7] apei/ghes: Use unrcu_pointer for cmpxchg
From
: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
Re: [PATCH V2 3/3] efi: pstore: Add module parameter for setting the record size
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH V2 3/3] efi: pstore: Add module parameter for setting the record size
From
: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
Re: [PATCH V2 1/3] pstore: Alert on backend write error
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH V2 3/3] efi: pstore: Add module parameter for setting the record size
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v8 6/7] apei/ghes: Use unrcu_pointer for cmpxchg
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
RE: [PATCH v8 6/7] apei/ghes: Use unrcu_pointer for cmpxchg
From
: Justin He <Justin.He@xxxxxxx>
[PATCH] efi: ssdt: Don't free memory if ACPI table was loaded successfully
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v8 6/7] apei/ghes: Use unrcu_pointer for cmpxchg
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v9 0/9] x86: Show in sysfs if a memory node is able to do encryption
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
[PATCH V2 3/3] efi: pstore: Add module parameter for setting the record size
From
: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
[PATCH V2 1/3] pstore: Alert on backend write error
From
: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
[PATCH V2 2/3] efi: pstore: Follow convention for the efi-pstore backend name
From
: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
[PATCH V2 0/3] Some pstore improvements V2
From
: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
Re: [PATCH v9 0/9] x86: Show in sysfs if a memory node is able to do encryption
From
: Martin Fernandez <martin.fernandez@xxxxxxxxxxxxx>
Re: [PATCH v9 0/9] x86: Show in sysfs if a memory node is able to do encryption
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v8 6/7] apei/ghes: Use unrcu_pointer for cmpxchg
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v8 6/7] apei/ghes: Use unrcu_pointer for cmpxchg
From
: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
Re: [PATCH v8 6/7] apei/ghes: Use unrcu_pointer for cmpxchg
From
: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
Re: [PATCH v8 6/7] apei/ghes: Use unrcu_pointer for cmpxchg
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v8 6/7] apei/ghes: Use unrcu_pointer for cmpxchg
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v8 6/7] apei/ghes: Use unrcu_pointer for cmpxchg
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [RFC PATCH] efi: zboot: Expose decompressed image via EFI_FIRMWARE_VOLUME2 protocol
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: KASAN on SSDT override
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
KASAN on SSDT override
From
: Amadeusz Sławiński <amadeuszx.slawinski@xxxxxxxxxxxxxxx>
Re: [PATCH 0/8] Some pstore improvements
From
: Kees Cook <keescook@xxxxxxxxxxxx>
Re: [PATCH 0/8] Some pstore improvements
From
: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
RE: [PATCH v8 6/7] apei/ghes: Use unrcu_pointer for cmpxchg
From
: Justin He <Justin.He@xxxxxxx>
Re: [PATCH v2] efi/arm: dump UEFI runtime page tables for ARM
From
: Catalin Marinas <catalin.marinas@xxxxxxx>
RE: [PATCH v8 6/7] apei/ghes: Use unrcu_pointer for cmpxchg
From
: Justin He <Justin.He@xxxxxxx>
Re: [PATCH v9 2/9] mm/mmzone: Tag pg_data_t with crypto capabilities
From
: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
Re: [PATCH v8 6/7] apei/ghes: Use unrcu_pointer for cmpxchg
From
: Borislav Petkov <bp@xxxxxxxxx>
RE: [PATCH v8 6/7] apei/ghes: Use unrcu_pointer for cmpxchg
From
: Justin He <Justin.He@xxxxxxx>
Re: [PATCH v9 2/9] mm/mmzone: Tag pg_data_t with crypto capabilities
From
: Martin Fernandez <martin.fernandez@xxxxxxxxxxxxx>
Re: [PATCH v8 6/7] apei/ghes: Use unrcu_pointer for cmpxchg
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v2] efi/arm: dump UEFI runtime page tables for ARM
From
: Kefeng Wang <wangkefeng.wang@xxxxxxxxxx>
Re: [PATCH v2] efi/arm: dump UEFI runtime page tables for ARM
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] efi: x86: Make the deprecated EFI handover protocol optional
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH] efi: x86: Make the deprecated EFI handover protocol optional
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v8 3/7] EDAC/ghes: Prepare to make ghes_edac a proper module
From
: Jia He <justin.he@xxxxxxx>
[PATCH v8 7/7] EDAC/igen6: Return consistent errno when another edac driver is enabled
From
: Jia He <justin.he@xxxxxxx>
[PATCH v8 6/7] apei/ghes: Use unrcu_pointer for cmpxchg
From
: Jia He <justin.he@xxxxxxx>
[PATCH v8 4/7] EDAC/ghes: Make ghes_edac a proper module to remove the dependency on ghes
From
: Jia He <justin.he@xxxxxxx>
[PATCH v8 5/7] EDAC: Add the ghes_get_devices() check for chipset-specific edac drivers
From
: Jia He <justin.he@xxxxxxx>
[PATCH v8 2/7] EDAC/ghes: Add a notifier for reporting memory errors
From
: Jia He <justin.he@xxxxxxx>
[PATCH v8 1/7] efi/cper: export several helpers for ghes_edac to use
From
: Jia He <justin.he@xxxxxxx>
[PATCH v8 0/7] Make ghes_edac a proper module
From
: Jia He <justin.he@xxxxxxx>
Re: [GIT PULL] EFI updates for v6.1
From
: pr-tracker-bot@xxxxxxxxxx
Re: [PATCH] efi: x86: Make the deprecated EFI handover protocol optional
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH] efi: x86: Make the deprecated EFI handover protocol optional
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] efi: x86: Make the deprecated EFI handover protocol optional
From
: Borislav Petkov <bp@xxxxxxxxx>
RE: [PATCH v7 3/8] EDAC:ghes: Move ghes_edac.force_load to ghes module parameter
From
: Justin He <Justin.He@xxxxxxx>
Re: [PATCH v2] efi/arm: dump UEFI runtime page tables for ARM
From
: Kefeng Wang <wangkefeng.wang@xxxxxxxxxx>
Re: [PATCH 8/8] efi: pstore: Add module parameter for setting the record size
From
: Kees Cook <keescook@xxxxxxxxxxxx>
Re: [PATCH] RISC-V: Add STACKLEAK erasing the kernel stack at the end of syscalls
From
: Guo Ren <guoren@xxxxxxxxxx>
Re: [PATCH 8/8] efi: pstore: Add module parameter for setting the record size
From
: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
Re: [PATCH 8/8] efi: pstore: Add module parameter for setting the record size
From
: Kees Cook <keescook@xxxxxxxxxxxx>
RE: [PATCH v4 2/3] powerpc/pseries: PLPKS SED Opal keystore support
From
: "Elliott, Robert (Servers)" <elliott@xxxxxxx>
Re: [PATCH v4 1/3] block: sed-opal: SED Opal keystore
From
: Jonathan Derrick <jonathan.derrick@xxxxxxxxx>
Re: [PATCH v4 2/3] powerpc/pseries: PLPKS SED Opal keystore support
From
: Jonathan Derrick <jonathan.derrick@xxxxxxxxx>
Re: [PATCH v4 3/3] block: sed-opal: keystore access for SED Opal keys
From
: Jonathan Derrick <jonathan.derrick@xxxxxxxxx>
Re: [PATCH v2 3/3 RESEND] block: sed-opal: keyring support for SED keys
From
: Jonathan Derrick <jonathan.derrick@xxxxxxxxx>
Re: [PATCH v2 2/3 RESEND] block: sed-opal: Implement IOC_OPAL_REVERT_LSP
From
: Jonathan Derrick <jonathan.derrick@xxxxxxxxx>
Re: [PATCH v2 1/3 RESEND] block: sed-opal: Implement IOC_OPAL_DISCOVERY
From
: Jonathan Derrick <jonathan.derrick@xxxxxxxxx>
[PATCH] efi: x86: Make the deprecated EFI handover protocol optional
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 8/8] efi: pstore: Add module parameter for setting the record size
From
: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
Re: [PATCH v9 2/9] mm/mmzone: Tag pg_data_t with crypto capabilities
From
: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
Re: [PATCH 8/8] efi: pstore: Add module parameter for setting the record size
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 8/8] efi: pstore: Add module parameter for setting the record size
From
: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
Re: [PATCH 8/8] efi: pstore: Add module parameter for setting the record size
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 8/8] efi: pstore: Add module parameter for setting the record size
From
: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
Re: [PATCH] RISC-V: Add STACKLEAK erasing the kernel stack at the end of syscalls
From
: Mark Rutland <mark.rutland@xxxxxxx>
Re: [PATCH v2 03/16] x86/compressed: efi-mixed: move bootargs parsing out of 32-bit startup code
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH 8/8] efi: pstore: Add module parameter for setting the record size
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v2 02/16] x86/compressed: efi-mixed: move 32-bit entrypoint code into .text section
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH 7/8] efi: pstore: Follow convention for the efi-pstore backend name
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] RISC-V: Add STACKLEAK erasing the kernel stack at the end of syscalls
From
: Palmer Dabbelt <palmer@xxxxxxxxxxx>
Re: [PATCH 0/8] Some pstore improvements
From
: Kees Cook <keescook@xxxxxxxxxxxx>
Re: [PATCH 7/8] efi: pstore: Follow convention for the efi-pstore backend name
From
: Kees Cook <keescook@xxxxxxxxxxxx>
Re: [PATCH 8/8] efi: pstore: Add module parameter for setting the record size
From
: Kees Cook <keescook@xxxxxxxxxxxx>
[PATCH 8/8] efi: pstore: Add module parameter for setting the record size
From
: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
[PATCH 7/8] efi: pstore: Follow convention for the efi-pstore backend name
From
: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
[PATCH 0/8] Some pstore improvements
From
: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
Re: [PATCH v4 1/2] Avoid using EFI tables Xen may have clobbered
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4 1/2] Avoid using EFI tables Xen may have clobbered
From
: Demi Marie Obenour <demi@xxxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v4 1/2] Avoid using EFI tables Xen may have clobbered
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4 1/2] Avoid using EFI tables Xen may have clobbered
From
: Demi Marie Obenour <demi@xxxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 02/16] x86/compressed: efi-mixed: move 32-bit entrypoint code into .text section
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v2 03/16] x86/compressed: efi-mixed: move bootargs parsing out of 32-bit startup code
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v2 02/16] x86/compressed: efi-mixed: move 32-bit entrypoint code into .text section
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v2 02/16] x86/compressed: efi-mixed: move 32-bit entrypoint code into .text section
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v2 03/16] x86/compressed: efi-mixed: move bootargs parsing out of 32-bit startup code
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v2 02/16] x86/compressed: efi-mixed: move 32-bit entrypoint code into .text section
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v2 02/16] x86/compressed: efi-mixed: move 32-bit entrypoint code into .text section
From
: Borislav Petkov <bp@xxxxxxxxx>
[RFC PATCH] efi: zboot: Expose decompressed image via EFI_FIRMWARE_VOLUME2 protocol
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4 1/2] Avoid using EFI tables Xen may have clobbered
From
: Jan Beulich <jbeulich@xxxxxxxx>
Re: [PATCH v4 1/2] Avoid using EFI tables Xen may have clobbered
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4 1/2] Avoid using EFI tables Xen may have clobbered
From
: Demi Marie Obenour <demi@xxxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v4 1/2] Avoid using EFI tables Xen may have clobbered
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4 1/2] Avoid using EFI tables Xen may have clobbered
From
: Demi Marie Obenour <demi@xxxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v7 3/8] EDAC:ghes: Move ghes_edac.force_load to ghes module parameter
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v4 1/2] Avoid using EFI tables Xen may have clobbered
From
: Jan Beulich <jbeulich@xxxxxxxx>
[tip: x86/mm] x86/mm: Disable W^X detection and enforcement on 32-bit
From
: "tip-bot2 for Dave Hansen" <tip-bot2@xxxxxxxxxxxxx>
Re: [PATCH v4 1/2] Avoid using EFI tables Xen may have clobbered
From
: Demi Marie Obenour <demi@xxxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v4 1/2] Avoid using EFI tables Xen may have clobbered
From
: Jan Beulich <jbeulich@xxxxxxxx>
Re: [PATCH v2 5/6] efi: xen: Implement memory descriptor lookup based on hypercall
From
: Marek Marczykowski-Górecki <marmarek@xxxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 5/6] efi: xen: Implement memory descriptor lookup based on hypercall
From
: Demi Marie Obenour <demi@xxxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 5/6] efi: xen: Implement memory descriptor lookup based on hypercall
From
: Marek Marczykowski-Górecki <marmarek@xxxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 5/6] efi: xen: Implement memory descriptor lookup based on hypercall
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v2 5/6] efi: xen: Implement memory descriptor lookup based on hypercall
From
: Demi Marie Obenour <demi@xxxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 5/6] efi: xen: Implement memory descriptor lookup based on hypercall
From
: Marek Marczykowski-Górecki <marmarek@xxxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 5/6] efi: xen: Implement memory descriptor lookup based on hypercall
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v2 4/6] efi: memmap: Disregard bogus entries instead of returning them
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v2 5/6] efi: xen: Implement memory descriptor lookup based on hypercall
From
: Demi Marie Obenour <demi@xxxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 4/6] efi: memmap: Disregard bogus entries instead of returning them
From
: Demi Marie Obenour <demi@xxxxxxxxxxxxxxxxxxxxxx>
[GIT PULL] EFI updates for v6.1
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v2 6/6] efi: Apply allowlist to EFI configuration tables when running under Xen
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v2 5/6] efi: xen: Implement memory descriptor lookup based on hypercall
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v2 4/6] efi: memmap: Disregard bogus entries instead of returning them
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v2 2/6] efi: memmap: Move manipulation routines into x86 arch tree
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v2 3/6] efi: xen: Set EFI_PARAVIRT for Xen dom0 boot on all architectures
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v2 1/6] efi: Move EFI fake memmap support into x86 arch tree
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v2 0/6] efi/x86: Avoid corrupted config tables under Xen
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [RFC PATCH 5/5] efi: esrt: Omit region sanity check when no memory map is available
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: Disable lockdown while keeping SecureBoot enabled
From
: Antoine Damhet <antoine@xxxxxxxxx>
Re: [RFC PATCH 4/5] efi: Apply allowlist to EFI configuration tables when running under Xen
From
: Demi Marie Obenour <demi@xxxxxxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH 5/5] efi: esrt: Omit region sanity check when no memory map is available
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [RFC PATCH 4/5] efi: Apply allowlist to EFI configuration tables when running under Xen
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: Disable lockdown while keeping SecureBoot enabled
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: Disable lockdown while keeping SecureBoot enabled
From
: Antoine Damhet <antoine@xxxxxxxxx>
Re: [RFC PATCH 4/5] efi: Apply allowlist to EFI configuration tables when running under Xen
From
: Demi Marie Obenour <demi@xxxxxxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH 5/5] efi: esrt: Omit region sanity check when no memory map is available
From
: Demi Marie Obenour <demi@xxxxxxxxxxxxxxxxxxxxxx>
Re: Disable lockdown while keeping SecureBoot enabled
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Disable lockdown while keeping SecureBoot enabled
From
: Antoine Damhet <antoine@xxxxxxxxx>
Re: [PATCH] x86/mm: Disable W^X detection and enforcement on 32-bit
From
: Pavel Machek <pavel@xxxxxx>
[RFC PATCH 5/5] efi: esrt: Omit region sanity check when no memory map is available
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[RFC PATCH 4/5] efi: Apply allowlist to EFI configuration tables when running under Xen
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[RFC PATCH 3/5] efi: xen: Set EFI_PARAVIRT for Xen dom0 boot on all architectures
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[RFC PATCH 2/5] efi: memmap: Move manipulation routines into x86 arch tree
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[RFC PATCH 1/5] efi: Move EFI fake memmap support into x86 arch tree
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[RFC PATCH 0/5] efi/x86: Avoid corrupted config tables under Xen
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4 1/2] Avoid using EFI tables Xen may have clobbered
From
: Demi Marie Obenour <demi@xxxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v4 2/2] Support ESRT in Xen dom0
From
: Demi Marie Obenour <demi@xxxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v4 2/2] Support ESRT in Xen dom0
From
: Demi Marie Obenour <demi@xxxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v4 2/2] Support ESRT in Xen dom0
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4 2/2] Support ESRT in Xen dom0
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4 2/2] Support ESRT in Xen dom0
From
: Demi Marie Obenour <demi@xxxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v4 2/2] Support ESRT in Xen dom0
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4 1/2] Avoid using EFI tables Xen may have clobbered
From
: Demi Marie Obenour <demi@xxxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v4 1/2] Avoid using EFI tables Xen may have clobbered
From
: Demi Marie Obenour <demi@xxxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v4 1/2] Avoid using EFI tables Xen may have clobbered
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4 1/2] Avoid using EFI tables Xen may have clobbered
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4 2/2] Support ESRT in Xen dom0
From
: Demi Marie Obenour <demi@xxxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v4 1/2] Avoid using EFI tables Xen may have clobbered
From
: Demi Marie Obenour <demi@xxxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v4 1/2] Avoid using EFI tables Xen may have clobbered
From
: Demi Marie Obenour <demi@xxxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v4 1/2] Avoid using EFI tables Xen may have clobbered
From
: Demi Marie Obenour <demi@xxxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v4 2/2] Support ESRT in Xen dom0
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4 1/2] Avoid using EFI tables Xen may have clobbered
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4 1/2] Avoid using EFI tables Xen may have clobbered
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4 1/2] Avoid using EFI tables Xen may have clobbered
From
: Jan Beulich <jbeulich@xxxxxxxx>
Re: [PATCH] efi/arm: dump UEFI runtime page tables for ARM
From
: Kefeng Wang <wangkefeng.wang@xxxxxxxxxx>
[PATCH] efi/arm: dump UEFI runtime page tables for ARM
From
: Kefeng Wang <wangkefeng.wang@xxxxxxxxxx>
[PATCH v4 2/2] Support ESRT in Xen dom0
From
: Demi Marie Obenour <demi@xxxxxxxxxxxxxxxxxxxxxx>
[PATCH v4 1/2] Avoid using EFI tables Xen may have clobbered
From
: Demi Marie Obenour <demi@xxxxxxxxxxxxxxxxxxxxxx>
[PATCH v4 0/2] EFI improvements for Xen dom0
From
: Demi Marie Obenour <demi@xxxxxxxxxxxxxxxxxxxxxx>
[PATCH v7 7/8] apei/ghes: Use unrcu_pointer for cmpxchg
From
: Jia He <justin.he@xxxxxxx>
[PATCH v7 8/8] EDAC/igen6: Return consistent errno when another edac driver is enabled
From
: Jia He <justin.he@xxxxxxx>
[PATCH v7 6/8] EDAC: Add the ghes_get_devices() check for chipset-specific edac drivers
From
: Jia He <justin.he@xxxxxxx>
[PATCH v7 5/8] EDAC/ghes: Make ghes_edac a proper module to remove the dependency on ghes
From
: Jia He <justin.he@xxxxxxx>
[PATCH v7 4/8] ghes: Introduce a helper ghes_get_devices()
From
: Jia He <justin.he@xxxxxxx>
[PATCH v7 3/8] EDAC:ghes: Move ghes_edac.force_load to ghes module parameter
From
: Jia He <justin.he@xxxxxxx>
[PATCH v7 2/8] EDAC/ghes: Add a notifier for reporting memory errors
From
: Jia He <justin.he@xxxxxxx>
[PATCH v7 1/8] efi/cper: export several helpers for ghes_edac to use
From
: Jia He <justin.he@xxxxxxx>
[PATCH v7 0/8] Make ghes_edac a proper module
From
: Jia He <justin.he@xxxxxxx>
[PATCH 5/8] drivers: firmware: efi: libstub: enable generic commandline
From
: Daniel Walker <danielwa@xxxxxxxxx>
[PATCH 0/8] generic command line v5
From
: Daniel Walker <danielwa@xxxxxxxxx>
[efi:next] BUILD SUCCESS d3549a938b73f203ef522562ae9f2d38aa43d234
From
: kernel test robot <lkp@xxxxxxxxx>
[efi:next] BUILD SUCCESS a9f6d5f1a4a88289535e0942b0e600c8e36278ff
From
: kernel test robot <lkp@xxxxxxxxx>
[PATCH 3/4] efi: libstub: Add mixed mode support to command line initrd loader
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH 4/4] efi: libstub: Undeprecate the command line initrd loader
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH 2/4] efi: libstub: Permit mixed mode return types other than efi_status_t
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH 1/4] efi: libstub: Implement devicepath support for initrd commandline loader
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH 0/4] efi: Improve command line initrd loader support
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 0/8] generic command line v4
From
: Daniel Walker <danielwa@xxxxxxxxx>
Re: [PATCH 0/8] generic command line v4
From
: Daniel Walker <danielwa@xxxxxxxxx>
Re: [PATCH 0/8] generic command line v4
From
: Rob Herring <robh@xxxxxxxxxx>
Re: [PATCHv7 02/14] mm: Add support for unaccepted memory
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
Re: [PATCHv7 02/14] mm: Add support for unaccepted memory
From
: Tom Lendacky <thomas.lendacky@xxxxxxx>
Re: [PATCHv7 02/14] mm: Add support for unaccepted memory
From
: Tom Lendacky <thomas.lendacky@xxxxxxx>
[Index of Archives]
[Linux Kernel Development]
[Security]
[Linux ARM Kernel]
[Tools]
[Linux MIPS]
[Linux S390]
[Bugtraq]
[Share Photos]>
[Fedora ARM]