Linux EFI/UEFI Development
[Prev Page][Next Page]
- Re: [PATCH 6/6] efivarfs: fix error on write to new variable leaving remnants
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 5/5] acpi/ghes, cxl/pci: Process CXL CPER Protocol Errors
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v4 3/5] efi/cper, cxl: Remove cper_cxl.h
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [RFC PATCH v3 08/13] clavis: Introduce new LSM called clavis
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 11/12] cxl/pmem: Remove is_cxl_nvdimm_bridge()
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v5 10/12] cxl/pmem: Replace match_nvdimm_bridge() with API device_match_type()
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v5 04/12] driver core: Constify API device_find_child() and adapt for various usages
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH 6/6] efivarfs: fix error on write to new variable leaving remnants
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v5 12/12] usb: typec: class: Remove both cable_match() and partner_match()
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- [PATCH v5 10/12] cxl/pmem: Replace match_nvdimm_bridge() with API device_match_type()
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- [PATCH v5 09/12] driver core: Introduce an device matching API device_match_type()
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- [PATCH v5 11/12] cxl/pmem: Remove is_cxl_nvdimm_bridge()
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- [PATCH v5 08/12] gpio: sim: Remove gpio_sim_dev_match_fwnode()
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- [PATCH v5 07/12] slimbus: core: Remove of_slim_match_dev()
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- [PATCH v5 06/12] driver core: Remove match_any()
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- [PATCH v5 05/12] driver core: Simplify API device_find_child_by_name() implementation
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- Re: [PATCH 6/6] efivarfs: fix error on write to new variable leaving remnants
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v5 04/12] driver core: Constify API device_find_child() and adapt for various usages
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- [PATCH v5 03/12] bus: fsl-mc: Constify fsl_mc_device_match()
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- [PATCH v5 02/12] slimbus: core: Constify slim_eaddr_equal()
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- [PATCH v5 01/12] libnvdimm: Replace namespace_match() with device_find_child_by_name()
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- [PATCH v5 00/12] driver core: Constify API device_find_child()
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- Re: [PATCH v4 10/11] cxl/pmem: Replace match_nvdimm_bridge() with API device_match_type()
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- Re: [PATCH v4 05/11] driver core: Simplify API device_find_child_by_name() implementation
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- Re: [PATCH v4 04/11] driver core: Constify API device_find_child() then adapt for various usages
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- Re: [PATCH v4 03/11] bus: fsl-mc: Constify fsl_mc_device_match()
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- Re: [PATCH 6/6] efivarfs: fix error on write to new variable leaving remnants
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 6/6] efivarfs: fix error on write to new variable leaving remnants
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 13/13] clavis: Kunit support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v3 04/13] keys: Add new verification type (VERIFYING_CLAVIS_SIGNATURE)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v3 03/13] clavis: Introduce a new system keyring called clavis
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 6/6] efivarfs: fix error on write to new variable leaving remnants
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 6/6] efivarfs: fix error on write to new variable leaving remnants
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/6] efivarfs: make variable_is_present use dcache lookup
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 6/6] efivarfs: fix error on write to new variable leaving remnants
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 11/11] usb: typec: class: Remove both cable_match() and partner_match()
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v4 10/11] cxl/pmem: Replace match_nvdimm_bridge() with API device_match_type()
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v4 09/11] driver core: Introduce an device matching API device_match_type()
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v4 08/11] gpio: sim: Remove gpio_sim_dev_match_fwnode()
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v4 07/11] slimbus: core: Remove of_slim_match_dev()
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v4 06/11] driver core: Remove match_any()
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v4 05/11] driver core: Simplify API device_find_child_by_name() implementation
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [no subject]
- Re: [PATCH v4 04/11] driver core: Constify API device_find_child() then adapt for various usages
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v4 03/11] bus: fsl-mc: Constify fsl_mc_device_match()
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v4 02/11] slimbus: core: Constify slim_eaddr_equal()
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v4 01/11] libnvdimm: Replace namespace_match() with device_find_child_by_name()
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH 3/6] efivarfs: make variable_is_present use dcache lookup
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 6/6] efivarfs: fix error on write to new variable leaving remnants
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 6/6] efivarfs: fix error on write to new variable leaving remnants
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 6/6] efivarfs: fix error on write to new variable leaving remnants
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 02/13] certs: Introduce ability to link to a system key
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v3 01/13] certs: Remove CONFIG_INTEGRITY_PLATFORM_KEYRING check
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 04/11] driver core: Constify API device_find_child() then adapt for various usages
- From: Uwe Kleine-König <ukleinek@xxxxxxxxxx>
- Re: [PATCH 6/6] efivarfs: fix error on write to new variable leaving remnants
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH] efi: Fix missing `efi_handover_entry` prototype
- From: kernel test robot <lkp@xxxxxxxxx>
- [efi:next] BUILD SUCCESS 7f0158f3ee12403c26e815c9df4f00d41ee3bb41
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] efi: Fix missing `efi_handover_entry` prototype
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 3/7] efi/libstub: Simplify GOP handling code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 3/7] efi/libstub: Simplify GOP handling code
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [efi:next] BUILD SUCCESS ec4696925da6b9baec38345184403ce9e29a2e48
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH 7/7] efi/libstub: Use __free() helper for pool deallocations
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH 6/7] efi/libstub: Use cleanup helpers for freeing copies of the memory map
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH 5/7] efi/libstub: Simplify PCI I/O handle buffer traversal
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH 4/7] efi/libstub: Refactor and cleanup GOP resolution picker code
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH 3/7] efi/libstub: Simplify GOP handling code
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH 2/7] efi/libstub: Use C99-style for loop to traverse handle buffer
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH 1/7] x86/efistub: Drop long obsolete UGA support
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH 0/7] EFI stub cleanup work
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH v12 19/19] x86/efi: EFI stub DRTM launch support for Secure Launch
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 16/19] tpm, tpm_tis: Allow locality to be set to a different value
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 14/19] tpm, tpm_tis: Close all localities
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 18/19] x86: Secure Launch late initcall platform module
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 13/19] x86/reboot: Secure Launch SEXIT support on reboot paths
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 12/19] kexec: Secure Launch kexec SEXIT support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 17/19] tpm, sysfs: Show locality used by kernel
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 08/19] x86/boot: Place TXT MLE header in the kernel_info section
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 15/19] tpm, tpm_tis: Address positive localities in tpm_tis_request_locality()
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 05/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 11/19] x86: Secure Launch SMP bringup support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 09/19] x86: Secure Launch kernel early boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 10/19] x86: Secure Launch kernel late boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 03/19] x86: Secure Launch Resource Table header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 02/19] x86: Secure Launch Kconfig
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 07/19] x86/msr: Add variable MTRR base/mask and x2apic ID registers
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 01/19] Documentation/x86: Secure Launch kernel documentation
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 00/19] x86: Trenchboot secure dynamic launch Linux kernel support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 04/19] x86: Secure Launch main header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 06/19] x86: Add early SHA-256 support for Secure Launch early measurements
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH 6/6] efivarfs: fix error on write to new variable leaving remnants
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 02/28] Documentation: Bump minimum GCC version to 8.1
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [RFC PATCH 02/28] Documentation: Bump minimum GCC version to 8.1
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH] efi: bump up EFI_MMAP_NR_SLACK_SLOTS to 32
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [RFC PATCH 2/4] efi/zboot: Add support for ELF payloads
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [RFC PATCH 0/4] efi/zboot: Encapsulate ELF image for arm64
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [RFC PATCH 4/4] efi/arm64: Use ELF payload for EFI zboot
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [RFC PATCH 3/4] arm64/boot: Populate vmlinux ELF program headers
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [RFC PATCH 1/4] efi/libstub: Avoid legacy decompressor zlib/zstd wrappers
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH v4 5/5] acpi/ghes, cxl/pci: Process CXL CPER Protocol Errors
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- [PATCH v4 4/5] acpi/ghes, cper: Recognize and cache CXL Protocol errors
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- [PATCH v4 2/5] efi/cper, cxl: Make definitions and structures global
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- [PATCH v4 3/5] efi/cper, cxl: Remove cper_cxl.h
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- [PATCH v4 1/5] efi/cper, cxl: Prefix protocol error struct and function names with cxl_
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- [PATCH v4 0/5] acpi/ghes, cper, cxl: Process CXL CPER Protocol errors
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- Re: [GIT PULL] First batch of EFI fixes for v6.13
- From: pr-tracker-bot@xxxxxxxxxx
- [PATCH] efi/mokvar: Use const 'struct bin_attribute' callback
- From: Thomas Weißschuh <linux@xxxxxxxxxxxxxx>
- [GIT PULL] First batch of EFI fixes for v6.13
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [efi:urgent] BUILD SUCCESS 145ac100b63732291c0612528444d7f5ab593fb2
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: TPM/EFI issue [Was: Linux 6.12]
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- [PATCH] efi: Fix missing `efi_handover_entry` prototype
- From: Zhou Ding <zhouding@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] efi/esrt: remove esre_attribute::store()
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] efi: make the min and max mmap slack slots configurable
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH AUTOSEL 6.6 10/23] LoongArch: Fix reserving screen info memory for above-4G firmware
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.12 17/36] LoongArch: Fix reserving screen info memory for above-4G firmware
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH 6/6] efivarfs: fix error on write to new variable leaving remnants
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/6] efivarfs: move freeing of variable entry into evict_inode
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH 6/6] efivarfs: fix error on write to new variable leaving remnants
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v4 08/11] gpio: sim: Remove gpio_sim_dev_match_fwnode()
- From: Bartosz Golaszewski <brgl@xxxxxxxx>
- [PATCH] efi/esrt: remove esre_attribute::store()
- From: "Jiri Slaby (SUSE)" <jirislaby@xxxxxxxxxx>
- [PATCH v4 11/11] usb: typec: class: Remove both cable_match() and partner_match()
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- [PATCH v4 10/11] cxl/pmem: Replace match_nvdimm_bridge() with API device_match_type()
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- [PATCH v4 09/11] driver core: Introduce an device matching API device_match_type()
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- [PATCH v4 08/11] gpio: sim: Remove gpio_sim_dev_match_fwnode()
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- [PATCH v4 07/11] slimbus: core: Remove of_slim_match_dev()
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- [PATCH v4 06/11] driver core: Remove match_any()
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- [PATCH v4 05/11] driver core: Simplify API device_find_child_by_name() implementation
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- [PATCH v4 04/11] driver core: Constify API device_find_child() then adapt for various usages
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- [PATCH v4 03/11] bus: fsl-mc: Constify fsl_mc_device_match()
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- [PATCH v4 02/11] slimbus: core: Constify slim_eaddr_equal()
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- [PATCH v4 01/11] libnvdimm: Replace namespace_match() with device_find_child_by_name()
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- [PATCH v4 00/11] driver core: Constify API device_find_child()
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- Re: [PATCH 3/6] efivarfs: make variable_is_present use dcache lookup
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/6] efivarfs: make variable_is_present use dcache lookup
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- [PATCH 6/6] efivarfs: fix error on write to new variable leaving remnants
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 5/6] efivarfs: remove unused efivarfs_list
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 4/6] efivarfs: move freeing of variable entry into evict_inode
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 3/6] efivarfs: make variable_is_present use dcache lookup
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 2/6] efivarfs: add helper to convert from UC16 name and GUID to utf8 name
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 1/6] efivarfs: remove unused efi_varaible.Attributes and .kobj
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 0/6] convert efivarfs to manage object data correctly
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: UEFI EBS() failures on Lenovo T14s
- From: Johan Hovold <johan@xxxxxxxxxx>
- [efi:urgent] BUILD SUCCESS 2ab0837cb91b7de507daa145d17b3b6b2efb3abf
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: TPM/EFI issue [Was: Linux 6.12]
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] efi: bump up EFI_MMAP_NR_SLACK_SLOTS to 32
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: TPM/EFI issue [Was: Linux 6.12]
- From: Jiri Slaby <jirislaby@xxxxxxxxxx>
- [PATCH] efi: bump up EFI_MMAP_NR_SLACK_SLOTS to 32
- From: Hamza Mahfooz <hamzamahfooz@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] efi: make the min and max mmap slack slots configurable
- From: Hamza Mahfooz <hamzamahfooz@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] efi: make the min and max mmap slack slots configurable
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 0/3] efivarfs: bug fixes
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi: make the min and max mmap slack slots configurable
- From: Hamza Mahfooz <hamzamahfooz@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] efi: make the min and max mmap slack slots configurable
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] efi: make the min and max mmap slack slots configurable
- From: Hamza Mahfooz <hamzamahfooz@xxxxxxxxxxxxxxxxxxx>
- MODERN CLERGY AND POLITICS FOR SUBJECTS: PROMOTION OF SCIENTIFICALLY DETAILED TRUTH
- From: Andank Sinyatkin <andanksinyatkin@xxxxxxxxx>
- Re: [PATCH 0/3] efivarfs: bug fixes
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] efivarfs: bug fixes
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 0/3] efivarfs: bug fixes
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: TPM/EFI issue [Was: Linux 6.12]
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/2] Makefile.zboot: Sign Image before packing into EFI-STUB shell
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH 0/3] efivarfs: bug fixes
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: TPM/EFI issue [Was: Linux 6.12]
- From: Jiri Slaby <jirislaby@xxxxxxxxxx>
- Re: [PATCH 1/2] Makefile.zboot: Sign Image before packing into EFI-STUB shell
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- Re: [PATCH 1/2] Makefile.zboot: Sign Image before packing into EFI-STUB shell
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- [PATCH 3/3] efivarfs: fix incorrect variable creation
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 2/3] efivarfs: fix memory leak on variable removal
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 1/3] efivarfs: fix error on non-existent file
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 0/3] efivarfs: bug fixes
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 04/11] driver core: Constify API device_find_child() then adapt for various usages
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- [efi:urgent] BUILD SUCCESS 0b2c29fb68f8bf3e87a9d88404aa6fdd486223e5
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: TPM/EFI issue [Was: Linux 6.12]
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 7/7] acpi/ghes, cxl/pci: Process CXL CPER Protocol Errors
- From: "Koralahalli Channabasappa, Smita" <Smita.KoralahalliChannabasappa@xxxxxxx>
- Re: [PATCH v3 6/7] acpi/ghes, cper: Recognize and cache CXL Protocol errors
- From: "Koralahalli Channabasappa, Smita" <Smita.KoralahalliChannabasappa@xxxxxxx>
- Re: [PATCH] efi/zboot: Limit compression options to GZIP and ZSTD
- From: Gerd Hoffmann <kraxel@xxxxxxxxxx>
- [PATCH] efi/zboot: Limit compression options to GZIP and ZSTD
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [PATCH v3 04/11] driver core: Constify API device_find_child() then adapt for various usages
- From: Takashi Sakamoto <o-takashi@xxxxxxxxxxxxx>
- Re: [PATCH v3 04/11] driver core: Constify API device_find_child() then adapt for various usages
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- Re: [PATCH 1/2] Makefile.zboot: Sign Image before packing into EFI-STUB shell
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 1/2] Makefile.zboot: Sign Image before packing into EFI-STUB shell
- From: Gerd Hoffmann <kraxel@xxxxxxxxxx>
- Re: [PATCH 1/2] Makefile.zboot: Sign Image before packing into EFI-STUB shell
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v3 04/11] driver core: Constify API device_find_child() then adapt for various usages
- From: Uwe Kleine-König <ukleinek@xxxxxxxxxx>
- [PATCH] efi/cper: Remove extra space in cper message
- From: Ruidong Tian <tianruidong@xxxxxxxxxxxxxxxxx>
- [PATCH 1/2] Makefile.zboot: Sign Image before packing into EFI-STUB shell
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- [PATCH 0/2] Kexec: Sign Image before packing into EFI STUB
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- Re: [PATCH v3 10/11] cxl/pmem: Remove match_nvdimm_bridge()
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- Re: [PATCH v3 08/11] gpio: sim: Remove gpio_sim_dev_match_fwnode()
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- Re: [PATCH v3 01/11] libnvdimm: Simplify nd_namespace_store() implementation
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- Re: [PATCH v3 01/11] libnvdimm: Simplify nd_namespace_store() implementation
- From: Alison Schofield <alison.schofield@xxxxxxxxx>
- Re: [PATCH v3 10/11] cxl/pmem: Remove match_nvdimm_bridge()
- From: Alison Schofield <alison.schofield@xxxxxxxxx>
- Re: [PATCH v3 04/11] driver core: Constify API device_find_child() then adapt for various usages
- From: Alison Schofield <alison.schofield@xxxxxxxxx>
- Re: [PATCH v3 08/11] gpio: sim: Remove gpio_sim_dev_match_fwnode()
- From: Bartosz Golaszewski <brgl@xxxxxxxx>
- Re: [PATCH v3 08/11] gpio: sim: Remove gpio_sim_dev_match_fwnode()
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- Re: [PATCH v3 04/11] driver core: Constify API device_find_child() then adapt for various usages
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- Re: [PATCH v3 04/11] driver core: Constify API device_find_child() then adapt for various usages
- From: Uwe Kleine-König <ukleinek@xxxxxxxxxx>
- Re: [PATCH v3 08/11] gpio: sim: Remove gpio_sim_dev_match_fwnode()
- From: Uwe Kleine-König <ukleinek@xxxxxxxxxx>
- Re: [PATCH v3 08/11] gpio: sim: Remove gpio_sim_dev_match_fwnode()
- From: quic_zijuhu <quic_zijuhu@xxxxxxxxxxx>
- Re: [PATCH v3 08/11] gpio: sim: Remove gpio_sim_dev_match_fwnode()
- From: Uwe Kleine-König <ukleinek@xxxxxxxxxx>
- Re: [PATCH v3 00/11] driver core: Constify API device_find_child()
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- [PATCH v3 03/11] bus: fsl-mc: Constify fsl_mc_device_match()
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- [PATCH v3 11/11] usb: typec: class: Remove both cable_match() and partner_match()
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- [PATCH v3 09/11] driver core: Introduce an device matching API device_match_type()
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- [PATCH v3 10/11] cxl/pmem: Remove match_nvdimm_bridge()
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- [PATCH v3 08/11] gpio: sim: Remove gpio_sim_dev_match_fwnode()
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- [PATCH v3 07/11] slimbus: core: Simplify of_find_slim_device() implementation
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- [PATCH v3 06/11] driver core: Remove match_any()
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- [PATCH v3 05/11] driver core: Simplify API device_find_child_by_name() implementation
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- [PATCH v3 04/11] driver core: Constify API device_find_child() then adapt for various usages
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- [PATCH v3 02/11] slimbus: core: Constify slim_eaddr_equal()
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- [PATCH v3 01/11] libnvdimm: Simplify nd_namespace_store() implementation
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- [PATCH v3 00/11] driver core: Constify API device_find_child()
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- Re: [PATCH v2 00/32] driver core: Constify API device_find_child() and adapt for various existing usages
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- Re: [PATCH v2 00/32] driver core: Constify API device_find_child() and adapt for various existing usages
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/32] driver core: Constify API device_find_child() and adapt for various existing usages
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- Re: [PATCH v2 00/32] driver core: Constify API device_find_child() and adapt for various existing usages
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/32] driver core: Constify API device_find_child() and adapt for various existing usages
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/32] driver core: Constify API device_find_child() and adapt for various existing usages
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- Re: [PATCH v2 00/32] driver core: Constify API device_find_child() and adapt for various existing usages
- From: Thomas Weißschuh <thomas@xxxxxxxx>
- Re: [PATCH v2 00/32] driver core: Constify API device_find_child() and adapt for various existing usages
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- Re: [PATCH v2 00/32] driver core: Constify API device_find_child() and adapt for various existing usages
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/32] driver core: Constify API device_find_child() and adapt for various existing usages
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- Re: [PATCH v2 00/32] driver core: Constify API device_find_child() and adapt for various existing usages
- From: Uwe Kleine-König <ukleinek@xxxxxxxxxx>
- Re: [PATCH v2 00/32] driver core: Constify API device_find_child() and adapt for various existing usages
- From: quic_zijuhu <quic_zijuhu@xxxxxxxxxxx>
- [PATCH v2 11/32] libnvdimm: Simplify nd_namespace_store() implementation
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- [PATCH v2 10/32] nvdimm: Adapt for constified device_find_child()
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- [PATCH v2 09/32] pwm: Adapt for constified device_find_child()
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- [PATCH v2 08/32] net: dsa: Adapt for constified device_find_child()
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- [PATCH v2 07/32] gpio: sim: Remove gpio_sim_dev_match_fwnode()
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- [PATCH v2 06/32] thunderbolt: Adapt for constified device_find_child()
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- [PATCH v2 05/32] media: pci: mgb4: Adapt for constified device_find_child()
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- [PATCH v2 04/32] hwmon: Adapt for constified device_find_child()
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- [PATCH v2 03/32] drm/mediatek: Adapt for constified device_find_child()
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- [PATCH v2 02/32] driver core: Introduce device_match_type() to match device with a device type
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- [PATCH v2 01/32] driver core: Constify API device_find_child()
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- [PATCH v2 00/32] driver core: Constify API device_find_child() and adapt for various existing usages
- From: Zijun Hu <zijun_hu@xxxxxxxxxx>
- Re: [PATCH v3 1/7] efi/cper, cxl: Prefix protocol error struct and function names with cxl_
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH v3 7/7] acpi/ghes, cxl/pci: Process CXL CPER Protocol Errors
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH v3 6/7] acpi/ghes, cper: Recognize and cache CXL Protocol errors
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH v3 2/7] efi/cper, cxl: Make definitions and structures global
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH v3 3/7] efi/cper, cxl: Remove cper_cxl.h
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: TPM/EFI issue [Was: Linux 6.12]
- From: Jiri Slaby <jirislaby@xxxxxxxxxx>
- Re: TPM/EFI issue [Was: Linux 6.12]
- From: Jiri Slaby <jirislaby@xxxxxxxxxx>
- Re: TPM/EFI issue [Was: Linux 6.12]
- From: Jiri Slaby <jirislaby@xxxxxxxxxx>
- Re: TPM/EFI issue [Was: Linux 6.12]
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: TPM/EFI issue [Was: Linux 6.12]
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: TPM/EFI issue [Was: Linux 6.12]
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] x86/efi: Apply EFI Memory Attributes after kexec
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- Re: TPM/EFI issue [Was: Linux 6.12]
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] x86/efi: Apply EFI Memory Attributes after kexec
- From: Dave Young <dyoung@xxxxxxxxxx>
- [no subject]
- Re: [PATCH v2 2/2] x86/efi: Apply EFI Memory Attributes after kexec
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: TPM/EFI issue [Was: Linux 6.12]
- From: Jiri Slaby <jirislaby@xxxxxxxxxx>
- Re: UEFI EBS() failures on Lenovo T14s
- From: Johan Hovold <johan@xxxxxxxxxx>
- Re: TPM/EFI issue [Was: Linux 6.12]
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] x86/efi: Apply EFI Memory Attributes after kexec
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- Re: UEFI EBS() failures on Lenovo T14s
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: UEFI EBS() failures on Lenovo T14s
- From: Johan Hovold <johan@xxxxxxxxxx>
- Re: UEFI EBS() failures on Lenovo T14s
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: UEFI EBS() failures on Lenovo T14s
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: UEFI EBS() failures on Lenovo T14s
- From: Johan Hovold <johan@xxxxxxxxxx>
- Re: UEFI EBS() failures on Lenovo T14s
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- UEFI EBS() failures on Lenovo T14s
- From: Johan Hovold <johan@xxxxxxxxxx>
- Re: TPM/EFI issue [Was: Linux 6.12]
- From: Jiri Slaby <jirislaby@xxxxxxxxxx>
- Re: [PATCH v3 7/7] acpi/ghes, cxl/pci: Process CXL CPER Protocol Errors
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- Re: [PATCH v3 5/7] acpi/ghes, cxl: Refactor work registration functions to support multiple workqueues
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- Re: [PATCH v3 3/7] efi/cper, cxl: Remove cper_cxl.h
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- Re: TPM/EFI issue [Was: Linux 6.12]
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] hack: efi/libstub: fix t14s exit_boot_services() failure
- From: Johan Hovold <johan+linaro@xxxxxxxxxx>
- TPM/EFI issue [Was: Linux 6.12]
- From: Jiri Slaby <jirislaby@xxxxxxxxxx>
- Re: [PATCH v3 6/7] acpi/ghes, cper: Recognize and cache CXL Protocol errors
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v3 7/7] acpi/ghes, cxl/pci: Process CXL CPER Protocol Errors
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v3 5/7] acpi/ghes, cxl: Refactor work registration functions to support multiple workqueues
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v3 4/7] acpi/ghes, cxl: Rename cxl_cper_register_work to cxl_cper_register_event_work
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v3 3/7] efi/cper, cxl: Remove cper_cxl.h
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v3 2/7] efi/cper, cxl: Make definitions and structures global
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v3 1/7] efi/cper, cxl: Prefix protocol error struct and function names with cxl_
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [RFC PATCH v2 0/9] Use ERST for persistent storage of MCE and APEI errors
- From: Shuai Xue <xueshuai@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] efi/fdt: ignore dtb when acpi option is used with force
- From: Levi Yun <yeoreum.yun@xxxxxxx>
- Re: [PATCH v2 2/2] efi/fdt: ignore dtb when acpi option is used with force
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 2/2] efi/fdt: ignore dtb when acpi option is used with force
- From: Levi Yun <yeoreum.yun@xxxxxxx>
- Re: [PATCH v2 1/2] arm64/acpi: panic when failed to init acpi table with acpi=force option
- From: Levi Yun <yeoreum.yun@xxxxxxx>
- Re: [PATCH v2 2/2] efi/fdt: ignore dtb when acpi option is used with force
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 2/2] efi/fdt: ignore dtb when acpi option is used with force
- From: Levi Yun <yeoreum.yun@xxxxxxx>
- Re: [PATCH v2 1/2] arm64/acpi: panic when failed to init acpi table with acpi=force option
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v2 2/2] efi/fdt: ignore dtb when acpi option is used with force
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v2 1/2] arm64/acpi: panic when failed to init acpi table with acpi=force option
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 2/2] efi/fdt: ignore dtb when acpi option is used with force
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 2/2] efi/fdt: ignore dtb when acpi option is used with force
- From: Yeoreum Yun <yeoreum.yun@xxxxxxx>
- [PATCH v2 0/2] small fixes when boot with acpi=force option
- From: Yeoreum Yun <yeoreum.yun@xxxxxxx>
- [PATCH v2 1/2] arm64/acpi: panic when failed to init acpi table with acpi=force option
- From: Yeoreum Yun <yeoreum.yun@xxxxxxx>
- Re: [PATCH 1/2] arm64/acpi: panic when failed to init acpi table with acpi=force option
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH 2/2] efi/fdt: ignore dtb when acpi option is used with force
- From: Yeoreum Yun <yeoreum.yun@xxxxxxx>
- [PATCH 1/2] arm64/acpi: panic when failed to init acpi table with acpi=force option
- From: Yeoreum Yun <yeoreum.yun@xxxxxxx>
- [PATCH 0/2] small fixes when boot with acpi=force option
- From: Yeoreum Yun <yeoreum.yun@xxxxxxx>
- Re: [PATCH v2 0/4] Enable measuring the kernel's Source-based Code Coverage and MC/DC with Clang
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH v2 0/4] Enable measuring the kernel's Source-based Code Coverage and MC/DC with Clang
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: ross.philipson@xxxxxxxxxx
- Re: [EXTERNAL] Re: [PATCH v2 0/4] Enable measuring the kernel's Source-based Code Coverage and MC/DC with Clang
- From: "Wolber (US), Chuck" <chuck.wolber@xxxxxxxxxx>
- Re: [PATCH v2 2/2] x86/efi: Apply EFI Memory Attributes after kexec
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH v2 0/4] Enable measuring the kernel's Source-based Code Coverage and MC/DC with Clang
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH] efi: rci2: mark bin_attribute as __ro_after_init
- From: Thomas Weißschuh <linux@xxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] Enable measuring the kernel's Source-based Code Coverage and MC/DC with Clang
- From: Jinghao Jia <jinghao7@xxxxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: ross.philipson@xxxxxxxxxx
- Re: [GIT PULL] EFI updates for v6.13
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] EFI updates for v6.13
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH v3 6/7] acpi/ghes, cper: Recognize and cache CXL Protocol errors
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- [PATCH v3 7/7] acpi/ghes, cxl/pci: Process CXL CPER Protocol Errors
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- [PATCH v3 5/7] acpi/ghes, cxl: Refactor work registration functions to support multiple workqueues
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- [PATCH v3 3/7] efi/cper, cxl: Remove cper_cxl.h
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- [PATCH v3 1/7] efi/cper, cxl: Prefix protocol error struct and function names with cxl_
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- [PATCH v3 2/7] efi/cper, cxl: Make definitions and structures global
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- [PATCH v3 4/7] acpi/ghes, cxl: Rename cxl_cper_register_work to cxl_cper_register_event_work
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- [PATCH v3 0/7] acpi/ghes, cper, cxl: Process CXL CPER Protocol errors
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] x86/efi: Apply EFI Memory Attributes after kexec
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [efi:next] BUILD SUCCESS c5d91b16f525ea8c98b3fd8efc5105106d17fe9a
- From: kernel test robot <lkp@xxxxxxxxx>
- [efi:next 14/16] drivers/firmware/efi/libstub/file.c:221:3: error: expected expression
- From: kernel test robot <lkp@xxxxxxxxx>
- [efi:next 14/16] drivers/firmware/efi/libstub/file.c:221:3: warning: label followed by a declaration is a C23 extension
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2] efi: Fix memory leak in efivar_ssdt_load
- From: Cyrill Gorcunov <gorcunov@xxxxxxxxx>
- Re: [PATCH v2] efi: Fix memory leak in efivar_ssdt_load
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 2/2] x86/efi: Apply EFI Memory Attributes after kexec
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2] efi/memattr: Ignore table if the size is clearly bogus
- From: Breno Leitao <leitao@xxxxxxxxxx>
- Re: [PATCH v2] efi/memattr: Ignore table if the size is clearly bogus
- From: Breno Leitao <leitao@xxxxxxxxxx>
- Re: [PATCH v2] efi/memattr: Ignore table if the size is clearly bogus
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2] efi/memattr: Ignore table if the size is clearly bogus
- From: Jiri Slaby <jirislaby@xxxxxxxxxx>
- Re: [PATCH v2] efi/memattr: Ignore table if the size is clearly bogus
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2] efi/memattr: Ignore table if the size is clearly bogus
- From: Breno Leitao <leitao@xxxxxxxxxx>
- Re: [PATCH v2] efi: sysfb_efi: Fix unused const variable 'efifb_fwnode_ops'
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 4/4] efi/libstub: Take command line overrides into account for loaded files
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH 3/4] efi/libstub: Fix command line fallback handling when loading files
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH 2/4] efi/libstub: Parse builtin command line after bootloader provided one
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH 1/4] efi/libstub: Free correct pointer on failure
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH] efi/zboot: Fix outdated comment about using LoadImage/StartImage
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: optee-based efi runtime variable service on TI j784s4 platforms
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- [PATCH v2 2/2] x86/efi: Apply EFI Memory Attributes after kexec
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [PATCH v2 1/2] x86/efi: Drop support for the EFI_PROPERTIES_TABLE
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- Re: optee-based efi runtime variable service on TI j784s4 platforms
- From: Enric Balletbo i Serra <eballetb@xxxxxxxxxx>
- Re: optee-based efi runtime variable service on TI j784s4 platforms
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: optee-based efi runtime variable service on TI j784s4 platforms
- From: Enric Balletbo i Serra <eballetb@xxxxxxxxxx>
- Re: optee-based efi runtime variable service on TI j784s4 platforms
- From: Enric Balletbo i Serra <eballetb@xxxxxxxxxx>
- Re: optee-based efi runtime variable service on TI j784s4 platforms
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: optee-based efi runtime variable service on TI j784s4 platforms
- From: Enric Balletbo i Serra <eballetb@xxxxxxxxxx>
- Re: optee-based efi runtime variable service on TI j784s4 platforms
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: optee-based efi runtime variable service on TI j784s4 platforms
- From: Enric Balletbo i Serra <eballetb@xxxxxxxxxx>
- Re: [PATCH] x86/efi: Apply EFI Memory Attributes after kexec
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- Re: optee-based efi runtime variable service on TI j784s4 platforms
- From: Enric Balletbo i Serra <eballetb@xxxxxxxxxx>
- Re: [PATCH] x86/efi: Apply EFI Memory Attributes after kexec
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] x86/efi: Apply EFI Memory Attributes after kexec
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- Re: optee-based efi runtime variable service on TI j784s4 platforms
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: optee-based efi runtime variable service on TI j784s4 platforms
- From: Enric Balletbo i Serra <eballetb@xxxxxxxxxx>
- Re: optee-based efi runtime variable service on TI j784s4 platforms
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: optee-based efi runtime variable service on TI j784s4 platforms
- From: Enric Balletbo i Serra <eballetb@xxxxxxxxxx>
- Re: optee-based efi runtime variable service on TI j784s4 platforms
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: optee-based efi runtime variable service on TI j784s4 platforms
- From: Enric Balletbo i Serra <eballetb@xxxxxxxxxx>
- Re: optee-based efi runtime variable service on TI j784s4 platforms
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- optee-based efi runtime variable service on TI j784s4 platforms
- From: Enric Balletbo i Serra <eballetb@xxxxxxxxxx>
- [PATCH v2] efi: Fix memory leak in efivar_ssdt_load
- From: Cyrill Gorcunov <gorcunov@xxxxxxxxx>
- Re: [PATCH] efi: Fix memory leak in efivar_ssdt_load
- From: Cyrill Gorcunov <gorcunov@xxxxxxxxx>
- [PATCH] efi: Fix memory leak in efivar_ssdt_load
- From: Cyrill Gorcunov <gorcunov@xxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v11 16/20] tpm: Make locality requests return consistent values
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 1/2] tpm, tpm_tis: Introduce TPM_IOC_SET_LOCALITY
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v11 15/20] tpm: Ensure tpm is in known state at startup
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 1/2] tpm, tpm_tis: Introduce TPM_IOC_SET_LOCALITY
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 1/2] tpm, tpm_tis: Introduce TPM_IOC_SET_LOCALITY
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH v2 1/2] tpm, tpm_tis: Introduce TPM_IOC_SET_LOCALITY
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 1/2] tpm, tpm_tis: Introduce TPM_IOC_SET_LOCALITY
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 1/2] tpm, tpm_tis: Introduce TPM_IOC_SET_LOCALITY
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH v2 1/2] tpm, tpm_tis: Introduce TPM_IOC_SET_LOCALITY
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [RFC PATCH v2 2/2] tpm: show the default locality in sysfs
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [RFC PATCH v2 1/2] tpm, tpm_tis: Introduce TPM_IOC_SET_LOCALITY
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH] tpm, tpm_tis: Introduce TPM_IOC_SET_LOCALITY
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [RFC PATCH] tpm, tpm_tis: Introduce TPM_IOC_SET_LOCALITY
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v11 00/20] x86: Trenchboot secure dynamic launch Linux kernel support
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v11 00/20] x86: Trenchboot secure dynamic launch Linux kernel support
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v11 18/20] tpm: Add sysfs interface to allow setting and querying the default locality
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v11 18/20] tpm: Add sysfs interface to allow setting and querying the default locality
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v11 00/20] x86: Trenchboot secure dynamic launch Linux kernel support
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v11 00/20] x86: Trenchboot secure dynamic launch Linux kernel support
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v11 00/20] x86: Trenchboot secure dynamic launch Linux kernel support
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- RE: [PATCH v11 01/20] Documentation/x86: Secure Launch kernel documentation
- From: "Elliott, Robert (Servers)" <elliott@xxxxxxx>
- Re: [PATCH v11 00/20] x86: Trenchboot secure dynamic launch Linux kernel support
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v11 00/20] x86: Trenchboot secure dynamic launch Linux kernel support
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v11 18/20] tpm: Add sysfs interface to allow setting and querying the default locality
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v11 17/20] tpm: Add ability to set the default locality the TPM chip uses
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v11 16/20] tpm: Make locality requests return consistent values
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v11 15/20] tpm: Ensure tpm is in known state at startup
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v11 14/20] tpm: Protect against locality counter underflow
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v11 00/20] x86: Trenchboot secure dynamic launch Linux kernel support
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v11 00/20] x86: Trenchboot secure dynamic launch Linux kernel support
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v11 00/20] x86: Trenchboot secure dynamic launch Linux kernel support
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v11 18/20] tpm: Add sysfs interface to allow setting and querying the default locality
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v11 00/20] x86: Trenchboot secure dynamic launch Linux kernel support
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v11 00/20] x86: Trenchboot secure dynamic launch Linux kernel support
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v11 00/20] x86: Trenchboot secure dynamic launch Linux kernel support
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v11 00/20] x86: Trenchboot secure dynamic launch Linux kernel support
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v11 00/20] x86: Trenchboot secure dynamic launch Linux kernel support
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- [PATCH v2] efi/memattr: Ignore table if the size is clearly bogus
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [PATCH 0/3] x86: Make 5-level paging support unconditional for x86-64
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH] efi/memattr: Ignore table if the size is clearly bogus
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi/memattr: Ignore table if the size is clearly bogus
- From: Breno Leitao <leitao@xxxxxxxxxx>
- [PATCH] efi/memattr: Ignore table if the size is clearly bogus
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [PATCH] efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption
- From: Jiri Slaby <jirislaby@xxxxxxxxxx>
- Re: [PATCH] efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption
- From: Jiri Slaby <jirislaby@xxxxxxxxxx>
- Re: [PATCH] efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption
- From: Jiri Slaby <jirislaby@xxxxxxxxxx>
- Re: [PATCH v5 14/16] x86/cpu: Make LAM depend on LASS
- From: Sohil Mehta <sohil.mehta@xxxxxxxxx>
- Re: [PATCH] efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption
- From: Gregory Price <gourry@xxxxxxxxxx>
- Re: [PATCH] efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption
- From: Gregory Price <gourry@xxxxxxxxxx>
- Re: [PATCH] efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption
- From: Usama Arif <usamaarif642@xxxxxxxxx>
- Re: [PATCH] efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption
- From: Gregory Price <gourry@xxxxxxxxxx>
- Re: [PATCH] efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption
- From: Usama Arif <usamaarif642@xxxxxxxxx>
- Re: [PATCH] efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption
- From: Gregory Price <gourry@xxxxxxxxxx>
- Re: [PATCH v5 05/16] x86/cpu: Defer CR pinning setup until after EFI initialization
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 03/16] x86/alternatives: Disable LASS when patching kernel alternatives
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 04/16] init/main.c: Move EFI runtime service initialization to x86/cpu
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v5 00/16] Enable Linear Address Space Separation support
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- Re: [PATCH] efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption
- From: Jiri Slaby <jirislaby@xxxxxxxxxx>
- Re: [PATCH v5 05/16] x86/cpu: Defer CR pinning setup until after EFI initialization
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH v5 11/16] x86/vsyscall: Document the fact that vsyscall=emulate disables LASS
- From: Sohil Mehta <sohil.mehta@xxxxxxxxx>
- RE: [PATCH v5 05/16] x86/cpu: Defer CR pinning setup until after EFI initialization
- From: "Luck, Tony" <tony.luck@xxxxxxxxx>
- Re: [PATCH v5 05/16] x86/cpu: Defer CR pinning setup until after EFI initialization
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH v5 05/16] x86/cpu: Defer CR pinning setup until after EFI initialization
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH v5 05/16] x86/cpu: Defer CR pinning setup until after EFI initialization
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- RE: [PATCH v5 05/16] x86/cpu: Defer CR pinning setup until after EFI initialization
- From: "Luck, Tony" <tony.luck@xxxxxxxxx>
- Re: [PATCH v5 05/16] x86/cpu: Defer CR pinning setup until after EFI initialization
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v5 04/16] init/main.c: Move EFI runtime service initialization to x86/cpu
- From: Sohil Mehta <sohil.mehta@xxxxxxxxx>
- RE: [PATCH v5 05/16] x86/cpu: Defer CR pinning setup until after EFI initialization
- From: "Luck, Tony" <tony.luck@xxxxxxxxx>
- Re: [PATCH v5 05/16] x86/cpu: Defer CR pinning setup until after EFI initialization
- From: Sohil Mehta <sohil.mehta@xxxxxxxxx>
- Re: [PATCH v5 01/16] x86/cpu: Enumerate the LASS feature bits
- From: Sohil Mehta <sohil.mehta@xxxxxxxxx>
- Re: [PATCH v5 03/16] x86/alternatives: Disable LASS when patching kernel alternatives
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v5 00/16] Enable Linear Address Space Separation support
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH v5 06/16] efi: Disable LASS around set_virtual_address_map call
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 01/16] x86/cpu: Enumerate the LASS feature bits
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 03/16] x86/alternatives: Disable LASS when patching kernel alternatives
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v5 16/16] Revert "x86/lam: Disable ADDRESS_MASKING in most cases"
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 16/16] Revert "x86/lam: Disable ADDRESS_MASKING in most cases"
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH v5 03/16] x86/alternatives: Disable LASS when patching kernel alternatives
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH v5 16/16] Revert "x86/lam: Disable ADDRESS_MASKING in most cases"
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v5 15/16] x86/cpu: Enable LASS during CPU initialization
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v5 14/16] x86/cpu: Make LAM depend on LASS
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v5 13/16] x86/traps: Communicate a LASS violation in #GP message
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v5 12/16] x86/cpu: Set LASS CR4 bit as pinning sensitive
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v5 11/16] x86/vsyscall: Document the fact that vsyscall=emulate disables LASS
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v5 10/16] x86/vsyscall: Disable LASS if vsyscall mode is set to EMULATE
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v5 09/16] x86/vsyscall: Add vsyscall emulation for #GP
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v5 08/16] x86/traps: Consolidate user fixups in exc_general_protection()
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v5 07/16] x86/vsyscall: Reorganize the #PF emulation code
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v5 06/16] efi: Disable LASS around set_virtual_address_map call
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v5 05/16] x86/cpu: Defer CR pinning setup until after EFI initialization
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v5 04/16] init/main.c: Move EFI runtime service initialization to x86/cpu
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v5 03/16] x86/alternatives: Disable LASS when patching kernel alternatives
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v5 02/16] x86/asm: Introduce inline memcpy and memset
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v5 01/16] x86/cpu: Enumerate the LASS feature bits
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v5 00/16] Enable Linear Address Space Separation support
- From: Alexander Shishkin <alexander.shishkin@xxxxxxxxxxxxxxx>
- [PATCH v2] efi: sysfb_efi: Fix unused const variable 'efifb_fwnode_ops'
- From: Zeng Heng <zengheng4@xxxxxxxxxx>
- Re: [PATCH] efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption
- From: Usama Arif <usamaarif642@xxxxxxxxx>
- Re: [PATCH] efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption
- From: Jiri Slaby <jirislaby@xxxxxxxxxx>
- Re: [PATCH] efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption
- From: Jiri Slaby <jirislaby@xxxxxxxxxx>
- Re: [PATCH] drivers/firmware: Fix unused const variable 'efifb_fwnode_ops'
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [RFC PATCH v3 08/13] clavis: Introduce new LSM called clavis
- Re: [PATCH] efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption
- From: Jiri Slaby <jirislaby@xxxxxxxxxx>
- [PATCH] drivers/firmware: Fix unused const variable 'efifb_fwnode_ops'
- From: Zeng Heng <zengheng4@xxxxxxxxxx>
- Re: [RFC PATCH v3 08/13] clavis: Introduce new LSM called clavis
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [RFC PATCH v3 08/13] clavis: Introduce new LSM called clavis
- Re: [PATCH V10] acpi/prmt: find block with specific type
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- Re: [RFC PATCH v3 05/13] clavis: Introduce a new key type called clavis_key_acl
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [RFC PATCH v3 05/13] clavis: Introduce a new key type called clavis_key_acl
- From: Ben Boeckel <me@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 05/13] clavis: Introduce a new key type called clavis_key_acl
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [RFC PATCH v3 05/13] clavis: Introduce a new key type called clavis_key_acl
- From: Ben Boeckel <me@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 04/13] keys: Add new verification type (VERIFYING_CLAVIS_SIGNATURE)
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v3 04/13] keys: Add new verification type (VERIFYING_CLAVIS_SIGNATURE)
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [RFC PATCH v3 03/13] clavis: Introduce a new system keyring called clavis
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v3 03/13] clavis: Introduce a new system keyring called clavis
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [RFC PATCH v3 06/13] clavis: Populate clavis keyring acl with kernel module signature
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v3 04/13] keys: Add new verification type (VERIFYING_CLAVIS_SIGNATURE)
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v3 01/13] certs: Remove CONFIG_INTEGRITY_PLATFORM_KEYRING check
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [RFC PATCH v3 02/13] certs: Introduce ability to link to a system key
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [RFC PATCH v3 03/13] clavis: Introduce a new system keyring called clavis
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v3 02/13] certs: Introduce ability to link to a system key
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v3 01/13] certs: Remove CONFIG_INTEGRITY_PLATFORM_KEYRING check
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [RFC PATCH v3 01/13] certs: Remove CONFIG_INTEGRITY_PLATFORM_KEYRING check
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC PATCH v3 07/13] keys: Add ability to track intended usage of the public key
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC PATCH v3 08/13] clavis: Introduce new LSM called clavis
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC PATCH v3 13/13] clavis: Kunit support
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC PATCH v3 09/13] clavis: Allow user to define acl at build time
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC PATCH v3 02/13] certs: Introduce ability to link to a system key
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC PATCH v3 04/13] keys: Add new verification type (VERIFYING_CLAVIS_SIGNATURE)
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC PATCH v3 11/13] clavis: Prevent boot param change during kexec
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC PATCH v3 05/13] clavis: Introduce a new key type called clavis_key_acl
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC PATCH v3 06/13] clavis: Populate clavis keyring acl with kernel module signature
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC PATCH v3 12/13] clavis: Add function redirection for Kunit support
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC PATCH v3 10/13] efi: Make clavis boot param persist across kexec
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC PATCH v3 03/13] clavis: Introduce a new system keyring called clavis
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC PATCH v3 00/13] Clavis LSM
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [efi:next] BUILD SUCCESS 63971b0f51faff0ff844a85d297e27861555c328
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [RFC PATCH v1 57/57] arm64: Enable boot-time page size selection
- From: Zi Yan <ziy@xxxxxxxxxx>
- Re: [RFC PATCH v1 57/57] arm64: Enable boot-time page size selection
- From: Ryan Roberts <ryan.roberts@xxxxxxx>
- [no subject]
- Re: [RFC PATCH v1 57/57] arm64: Enable boot-time page size selection
- From: Zi Yan <ziy@xxxxxxxxxx>
- Re: [RFC PATCH v1 57/57] arm64: Enable boot-time page size selection
- From: Ryan Roberts <ryan.roberts@xxxxxxx>
- Re: [RFC PATCH v1 57/57] arm64: Enable boot-time page size selection
- From: Ryan Roberts <ryan.roberts@xxxxxxx>
- Re: [PATCH v2 0/4] libstub,tpm: fix small bugs and improve error reporting
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi/libstub: measure initrd to PCR9 independent of source
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 4/4] efi/libstub: Take command line overrides into account for loaded files
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH 3/4] efi/libstub: Fix command line fallback handling when loading files
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH 2/4] efi/libstub: Parse builtin command line after bootloader provided one
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH 1/4] efi/libstub: Free correct pointer on failure
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH 0/4] efi/libstub: Clean up command line handling
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- RE: [RFC PATCH v1 57/57] arm64: Enable boot-time page size selection
- From: Michael Kelley <mhklinux@xxxxxxxxxxx>
- Re: [RFC PATCH v1 57/57] arm64: Enable boot-time page size selection
- From: Zi Yan <ziy@xxxxxxxxxx>
- Re: [PATCH 3/3] efi/libstub: consider CONFIG_CMDLINE for initrd= and dtb= options
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 3/3] efi/libstub: consider CONFIG_CMDLINE for initrd= and dtb= options
- From: kernel test robot <lkp@xxxxxxxxx>
- [RFC PATCH v1 57/57] arm64: Enable boot-time page size selection
- From: Ryan Roberts <ryan.roberts@xxxxxxx>
- [RFC PATCH v1 56/57] arm64: Determine THREAD_SIZE at boot-time
- From: Ryan Roberts <ryan.roberts@xxxxxxx>
- Re: [PATCH v3 0/5] Fix issues with ARM Processor CPER records
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 0/2] efi/libstub: fix efi_parse_options() ignoring the default command line
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 0/2] efi/libstub: fix efi_parse_options() ignoring the default command line
- From: Jonathan Marek <jonathan@xxxxxxxx>
- Re: [PATCH v2 0/2] efi/libstub: fix efi_parse_options() ignoring the default command line
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 2/2] efi/libstub: remove unnecessary cmd_line_len from efi_convert_cmdline()
- From: Jonathan Marek <jonathan@xxxxxxxx>
- [PATCH v2 1/2] efi/libstub: fix efi_parse_options() ignoring the default command line
- From: Jonathan Marek <jonathan@xxxxxxxx>
- [PATCH v2 0/2] efi/libstub: fix efi_parse_options() ignoring the default command line
- From: Jonathan Marek <jonathan@xxxxxxxx>
- [PATCH V10] acpi/prmt: find block with specific type
- From: KobaK <kobak@xxxxxxxxxx>
- Re: [PATCH V9] acpi/prmt: find block with specific type
- From: Koba Ko <kobak@xxxxxxxxxx>
- Re: [PATCH V9] acpi/prmt: find block with specific type
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH V9] acpi/prmt: find block with specific type
- From: KobaK <kobak@xxxxxxxxxx>
- Re: [PATCH V8] acpi/prmt: find block with specific type
- From: Koba Ko <kobak@xxxxxxxxxx>
- Re: [PATCH V8] acpi/prmt: find block with specific type
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH V8] acpi/prmt: find block with specific type
- From: KobaK <kobak@xxxxxxxxxx>
- Re: [PATCH V7] acpi/prmt: find block with specific type
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH V7] acpi/prmt: find block with specific type
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 3/3] efi/libstub: consider CONFIG_CMDLINE for initrd= and dtb= options
- From: Jonathan Marek <jonathan@xxxxxxxx>
- Re: [PATCH 3/3] efi/libstub: consider CONFIG_CMDLINE for initrd= and dtb= options
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 3/3] efi/libstub: consider CONFIG_CMDLINE for initrd= and dtb= options
- From: Jonathan Marek <jonathan@xxxxxxxx>
- Re: [PATCH 3/3] efi/libstub: consider CONFIG_CMDLINE for initrd= and dtb= options
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 1/3] efi/libstub: fix efi_parse_options() ignoring the default command line
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 3/3] efi/libstub: consider CONFIG_CMDLINE for initrd= and dtb= options
- From: Jonathan Marek <jonathan@xxxxxxxx>
- Re: [PATCH 1/3] efi/libstub: fix efi_parse_options() ignoring the default command line
- From: Jonathan Marek <jonathan@xxxxxxxx>
- Re: [PATCH 3/3] efi/libstub: consider CONFIG_CMDLINE for initrd= and dtb= options
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 2/3] efi/libstub: remove uneccessary cmdline_size init/check
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 1/3] efi/libstub: fix efi_parse_options() ignoring the default command line
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 3/3] efi/libstub: consider CONFIG_CMDLINE for initrd= and dtb= options
- From: Jonathan Marek <jonathan@xxxxxxxx>
- [PATCH 2/3] efi/libstub: remove uneccessary cmdline_size init/check
- From: Jonathan Marek <jonathan@xxxxxxxx>
- [PATCH 1/3] efi/libstub: fix efi_parse_options() ignoring the default command line
- From: Jonathan Marek <jonathan@xxxxxxxx>
- Re: [PATCH v3 0/5] Fix issues with ARM Processor CPER records
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: Possible overflow of TPM log
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Possible overflow of TPM log
- From: Usama Arif <usamaarif642@xxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Jonathan McDowell <noodles@xxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Breno Leitao <leitao@xxxxxxxxxx>
- Re: [RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
- From: Jonathan McDowell <noodles@xxxxxxxx>
- Re: [PATCH V7] acpi/prmt: find block with specific type
- From: Koba Ko <kobak@xxxxxxxxxx>
- Re: [PATCH V7] acpi/prmt: find block with specific type
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH V7] acpi/prmt: find block with specific type
- From: KobaK <kobak@xxxxxxxxxx>
- Re: [PATCH v2 0/4] Enable measuring the kernel's Source-based Code Coverage and MC/DC with Clang
- From: Wentao Zhang <wentaoz5@xxxxxxxxxxxx>
- Re: [RFC PATCH 05/28] x86: Define the stack protector guard symbol explicitly
- From: Brian Gerst <brgerst@xxxxxxxxx>
- Re: [RFCv2 0/9] UEFI emulator for kexec
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- Re: [PATCH 2/2 V6] acpi/prmt: refactor acpi_platformrt_space_handler to drop gotos
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 1/2 V6] acpi/prmt: find block with specific type
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 1/2 V6] acpi/prmt: find block with specific type
- From: "Zhang, Rui" <rui.zhang@xxxxxxxxx>
- Re: [PATCH 2/2 V6] acpi/prmt: refactor acpi_platformrt_space_handler to drop gotos
- From: "Zhang, Rui" <rui.zhang@xxxxxxxxx>
- Re: [RFC PATCH 25/28] x86: Use PIE codegen for the core kernel
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [RFC PATCH 25/28] x86: Use PIE codegen for the core kernel
- From: Uros Bizjak <ubizjak@xxxxxxxxx>
- RE: [RFC PATCH 25/28] x86: Use PIE codegen for the core kernel
- From: David Laight <David.Laight@xxxxxxxxxx>
- [PATCH 2/2 V6] acpi/prmt: refactor acpi_platformrt_space_handler to drop gotos
- From: KobaK <kobak@xxxxxxxxxx>
- [PATCH 1/2 V6] acpi/prmt: find block with specific type
- From: KobaK <kobak@xxxxxxxxxx>
- Re: [RFC PATCH 25/28] x86: Use PIE codegen for the core kernel
- From: Uros Bizjak <ubizjak@xxxxxxxxx>
- Re: [RFC PATCH 25/28] x86: Use PIE codegen for the core kernel
- From: Uros Bizjak <ubizjak@xxxxxxxxx>
- Re: [RFC PATCH 25/28] x86: Use PIE codegen for the core kernel
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 25/28] x86: Use PIE codegen for the core kernel
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [RFC PATCH 25/28] x86: Use PIE codegen for the core kernel
- From: Uros Bizjak <ubizjak@xxxxxxxxx>
- Re: [RFC PATCH 25/28] x86: Use PIE codegen for the core kernel
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [RFC PATCH 05/28] x86: Define the stack protector guard symbol explicitly
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH 05/28] x86: Define the stack protector guard symbol explicitly
- From: Uros Bizjak <ubizjak@xxxxxxxxx>
- Re: [PATCH v2 0/4] Enable measuring the kernel's Source-based Code Coverage and MC/DC with Clang
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH v2 3/4] acpi/ghes, efi/cper: Recognize and process CXL Protocol Errors.
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v2 4/4] acpi/ghes, cxl/pci: Trace FW-First CXL Protocol Errors
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- Re: [PATCH v2 4/4] acpi/ghes, cxl/pci: Trace FW-First CXL Protocol Errors
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- Re: [PATCH v2 3/4] acpi/ghes, efi/cper: Recognize and process CXL Protocol Errors.
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- Re: [PATCH v2 3/4] acpi/ghes, efi/cper: Recognize and process CXL Protocol Errors.
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- Re: [PATCH v2 2/4] cxl/pci: Define a common function get_cxl_devstate()
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- Re: [RFC PATCH 25/28] x86: Use PIE codegen for the core kernel
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 1/4] efi/cper, cxl: Make definitions and structures global
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH V5] acpi/prmt: find block with specific type
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH V5] acpi/prmt: find block with specific type
- From: Koba Ko <kobak@xxxxxxxxxx>
- Re: [PATCH V5] acpi/prmt: find block with specific type
- From: Koba Ko <kobak@xxxxxxxxxx>
- Re: [PATCH v2 2/4] llvm-cov: add Clang's MC/DC support
- From: Wentao Zhang <wentaoz5@xxxxxxxxxxxx>
- Re: [PATCH v2 4/4] acpi/ghes, cxl/pci: Trace FW-First CXL Protocol Errors
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v2 3/4] acpi/ghes, efi/cper: Recognize and process CXL Protocol Errors.
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v2 2/4] cxl/pci: Define a common function get_cxl_devstate()
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v2 1/4] efi/cper, cxl: Make definitions and structures global
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH V5] acpi/prmt: find block with specific type
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH 25/28] x86: Use PIE codegen for the core kernel
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] efi/libstub: measure initrd to PCR9 independent of source
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH V5] acpi/prmt: find block with specific type
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- Re: [PATCH] efi/libstub: measure initrd to PCR9 independent of source
- From: Jeremy Linton <jeremy.linton@xxxxxxx>
- Re: [PATCH] efi/libstub: measure initrd to PCR9 independent of source
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH] efi/libstub: measure initrd to PCR9 independent of source
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi/libstub: measure initrd to PCR9 independent of source
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH] efi/libstub: measure initrd to PCR9 independent of source
- From: Jeremy Linton <jeremy.linton@xxxxxxx>
- Re: [RFC PATCH 25/28] x86: Use PIE codegen for the core kernel
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 0/4] Enable measuring the kernel's Source-based Code Coverage and MC/DC with Clang
- From: Wentao Zhang <wentaoz5@xxxxxxxxxxxx>
- Re: [PATCH v2 0/4] Enable measuring the kernel's Source-based Code Coverage and MC/DC with Clang
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH v2 4/4] x86: enable llvm-cov support
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH v2 3/4] x86: disable llvm-cov instrumentation
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH v2 2/4] llvm-cov: add Clang's MC/DC support
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- [no subject]
- Re: [PATCH v2 1/4] llvm-cov: add Clang's Source-based Code Coverage support
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [RFC PATCH 25/28] x86: Use PIE codegen for the core kernel
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH v2 3/4] acpi/ghes, efi/cper: Recognize and process CXL Protocol Errors.
- From: Fan Ni <nifan.cxl@xxxxxxxxx>
- Re: [PATCH v2 4/4] acpi/ghes, cxl/pci: Trace FW-First CXL Protocol Errors
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH v2 3/4] acpi/ghes, efi/cper: Recognize and process CXL Protocol Errors.
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH v2 2/4] cxl/pci: Define a common function get_cxl_devstate()
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [RFC PATCH 24/28] tools/objtool: Treat indirect ftrace calls as direct calls
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi/libstub: measure initrd to PCR9 independent of source
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [RFC PATCH 24/28] tools/objtool: Treat indirect ftrace calls as direct calls
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [RFC PATCH 04/28] x86/boot: Permit GOTPCREL relocations for x86_64 builds
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi/libstub: measure initrd to PCR9 independent of source
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH 04/28] x86/boot: Permit GOTPCREL relocations for x86_64 builds
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- [PATCH] efi/libstub: measure initrd to PCR9 independent of source
- From: Jeremy Linton <jeremy.linton@xxxxxxx>
- [PATCH v2 4/4] acpi/ghes, cxl/pci: Trace FW-First CXL Protocol Errors
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- [PATCH v2 2/4] cxl/pci: Define a common function get_cxl_devstate()
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- [PATCH v2 3/4] acpi/ghes, efi/cper: Recognize and process CXL Protocol Errors.
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- [PATCH v2 1/4] efi/cper, cxl: Make definitions and structures global
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- [PATCH v2 0/4] acpi/ghes, cper, cxl: Trace FW-First CXL Protocol Errors
- From: Smita Koralahalli <Smita.KoralahalliChannabasappa@xxxxxxx>
- Re: [PATCH 6/6] Add Propeller configuration for kernel build.
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH 6/6] Add Propeller configuration for kernel build.
- From: Rong Xu <xur@xxxxxxxxxx>
- Re: [PATCH 6/6] Add Propeller configuration for kernel build.
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH 6/6] Add Propeller configuration for kernel build.
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH 6/6] Add Propeller configuration for kernel build.
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [RFC PATCH 05/28] x86: Define the stack protector guard symbol explicitly
- From: Brian Gerst <brgerst@xxxxxxxxx>
- Re: [PATCH 6/6] Add Propeller configuration for kernel build.
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [RFC PATCH 02/28] Documentation: Bump minimum GCC version to 8.1
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [RFC PATCH 02/28] Documentation: Bump minimum GCC version to 8.1
- From: Miguel Ojeda <miguel.ojeda.sandonis@xxxxxxxxx>
- Re: [GIT PULL] EFI updates for v6.12
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] EFI updates for v6.12
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [RFC PATCH 27/28] x86/kernel: Switch to PIE linking for the core kernel
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH 11/28] x86/pvh: Avoid absolute symbol references in .head.text
- From: Jason Andryuk <jason.andryuk@xxxxxxx>
- Re: [RFC PATCH 11/28] x86/pvh: Avoid absolute symbol references in .head.text
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH 01/28] x86/pvh: Call C code via the kernel virtual mapping
- From: Jason Andryuk <jason.andryuk@xxxxxxx>
- Re: [RFC PATCH 11/28] x86/pvh: Avoid absolute symbol references in .head.text
- From: Jason Andryuk <jason.andryuk@xxxxxxx>
- Re: [RFC PATCH 27/28] x86/kernel: Switch to PIE linking for the core kernel
- From: Vegard Nossum <vegard.nossum@xxxxxxxxxx>
- Re: [RFC PATCH 27/28] x86/kernel: Switch to PIE linking for the core kernel
- From: Uros Bizjak <ubizjak@xxxxxxxxx>
- Re: [RFC PATCH 27/28] x86/kernel: Switch to PIE linking for the core kernel
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH 27/28] x86/kernel: Switch to PIE linking for the core kernel
- From: Uros Bizjak <ubizjak@xxxxxxxxx>
- Re: [RFC PATCH 27/28] x86/kernel: Switch to PIE linking for the core kernel
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH 27/28] x86/kernel: Switch to PIE linking for the core kernel
- From: Uros Bizjak <ubizjak@xxxxxxxxx>
- Re: [RFC PATCH 05/28] x86: Define the stack protector guard symbol explicitly
- From: Uros Bizjak <ubizjak@xxxxxxxxx>
- Re: [RFC PATCH 06/28] x86/percpu: Get rid of absolute per-CPU variable placement
- From: "Christoph Lameter (Ampere)" <cl@xxxxxxxxxx>
- Re: [RFC PATCH 05/28] x86: Define the stack protector guard symbol explicitly
- From: Ian Rogers <irogers@xxxxxxxxxx>
- Re: [RFC PATCH 05/28] x86: Define the stack protector guard symbol explicitly
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH 14/28] x86/rethook: Use RIP-relative reference for return address
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 14/28] x86/rethook: Use RIP-relative reference for return address
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [RFC PATCH 14/28] x86/rethook: Use RIP-relative reference for return address
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [RFC PATCH 02/28] Documentation: Bump minimum GCC version to 8.1
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [RFC PATCH 05/28] x86: Define the stack protector guard symbol explicitly
- From: Ian Rogers <irogers@xxxxxxxxxx>
- [RFC PATCH 25/28] x86: Use PIE codegen for the core kernel
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
[Index of Archives]
[Linux Kernel Development]
[Security]
[Linux ARM Kernel]
[Tools]
[Linux MIPS]
[Linux S390]
[Bugtraq]
[Share Photos]>
[Fedora ARM]