Linux EFI/UEFI Development
Thread Index
[
Prev Page
][
Next Page
]
[PATCH v7 5/5] docs: security: Add coco/efi_secret documentation
From
: Dov Murik <dovmurik@xxxxxxxxxxxxx>
[PATCH v7 3/5] virt: Add efi_secret module to expose confidential computing secrets
From
: Dov Murik <dovmurik@xxxxxxxxxxxxx>
[PATCH v7 4/5] efi: Load efi_secret module if EFI secret area is populated
From
: Dov Murik <dovmurik@xxxxxxxxxxxxx>
[PATCH v7 2/5] efi/libstub: Reserve confidential computing secret area
From
: Dov Murik <dovmurik@xxxxxxxxxxxxx>
[PATCH v7 1/5] efi: Save location of EFI confidential computing area
From
: Dov Murik <dovmurik@xxxxxxxxxxxxx>
[PATCH v7 0/5] Allow guest access to EFI confidential computing secret area
From
: Dov Murik <dovmurik@xxxxxxxxxxxxx>
Re: [PATCHv3.1 1/7] mm: Add support for unaccepted memory
From
: David Hildenbrand <david@xxxxxxxxxx>
Re: [PATCHv3.1 1/7] mm: Add support for unaccepted memory
From
: David Hildenbrand <david@xxxxxxxxxx>
Re: [PATCHv3 2/7] efi/x86: Get full memory map in allocate_e820()
From
: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
Re: [PATCHv3 2/7] efi/x86: Get full memory map in allocate_e820()
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCHv3.1 1/7] mm: Add support for unaccepted memory
From
: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
Re: [PATCHv3.1 1/7] mm: Add support for unaccepted memory
From
: David Hildenbrand <david@xxxxxxxxxx>
Re: [PATCH v4 12/20] power: supply: bq25890: Support higher charging voltages through Pump Express+ protocol
From
: Andy Shevchenko <andriy.shevchenko@xxxxxxxxx>
Re: [PATCH v4 18/20] extcon: intel-cht-wc: Refactor cht_wc_extcon_get_charger()
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
Re: [PATCH v4 17/20] extcon: intel-cht-wc: Support devs with Micro-B / USB-2 only Type-C connectors
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
Re: [PATCH v4 12/20] power: supply: bq25890: Support higher charging voltages through Pump Express+ protocol
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
Re: [PATCH v4 01/20] power: supply: core: Refactor power_supply_set_input_current_limit_from_supplier()
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
Re: [PATCH v4 18/20] extcon: intel-cht-wc: Refactor cht_wc_extcon_get_charger()
From
: Andy Shevchenko <andriy.shevchenko@xxxxxxxxx>
Re: [PATCH v4 17/20] extcon: intel-cht-wc: Support devs with Micro-B / USB-2 only Type-C connectors
From
: Andy Shevchenko <andriy.shevchenko@xxxxxxxxx>
Re: [PATCH v4 15/20] i2c: cht-wc: Make charger i2c-client instantiation board/device-model specific
From
: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
Re: [PATCH v4 12/20] power: supply: bq25890: Support higher charging voltages through Pump Express+ protocol
From
: Andy Shevchenko <andriy.shevchenko@xxxxxxxxx>
Re: [PATCH v4 01/20] power: supply: core: Refactor power_supply_set_input_current_limit_from_supplier()
From
: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
Re: [PATCH v4 01/20] power: supply: core: Refactor power_supply_set_input_current_limit_from_supplier()
From
: Andy Shevchenko <andriy.shevchenko@xxxxxxxxx>
Re: [PATCHv3.1 1/7] mm: Add support for unaccepted memory
From
: David Hildenbrand <david@xxxxxxxxxx>
Re: [PATCH] efi: Move error message to warning
From
: arshad hussain <arshad.super@xxxxxxxxx>
[PATCH] efi: Move error message to warning
From
: arshad hussain <arshad.super@xxxxxxxxx>
[PATCH v4 16/20] extcon: intel-cht-wc: Use new cht_wc_model intel_soc_pmic field
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v4 14/20] mfd: intel_soc_pmic_chtwc: Add cht_wc_model data to struct intel_soc_pmic
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v4 12/20] power: supply: bq25890: Support higher charging voltages through Pump Express+ protocol
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v4 20/20] extcon: intel-cht-wc: Report RID_A for ACA adapters
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v4 19/20] extcon: intel-cht-wc: Add support for registering a power_supply class-device
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v4 18/20] extcon: intel-cht-wc: Refactor cht_wc_extcon_get_charger()
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v4 17/20] extcon: intel-cht-wc: Support devs with Micro-B / USB-2 only Type-C connectors
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v4 15/20] i2c: cht-wc: Make charger i2c-client instantiation board/device-model specific
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v4 13/20] power: supply: bq25890: Use the devm_regmap_field_bulk_alloc() helper
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v4 11/20] power: supply: bq25890: On the bq25892 set the IINLIM based on external charger detection
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v4 10/20] power: supply: bq25890: Add support for registering the Vbus boost converter as a regulator
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v4 09/20] power: supply: bq25890: Add bq25890_set_otg_cfg() helper
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v4 08/20] power: supply: bq25890: Drop dev->platform_data == NULL check
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v4 07/20] power: supply: bq25890: Enable charging on boards where we skip reset
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v4 06/20] power: supply: bq25890: Add support to read back the settings from the chip
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v4 05/20] power: supply: bq25890: Add support to skip reset at probe() / remove()
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v4 04/20] power: supply: bq25890: Add a bq25890_rw_init_data() helper
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v4 03/20] power: supply: bq25890: Reduce reported CONSTANT_CHARGE_CURRENT_MAX for low temperatures
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v4 01/20] power: supply: core: Refactor power_supply_set_input_current_limit_from_supplier()
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v4 02/20] power: supply: bq25890: Rename IILIM field to IINLIM
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v4 resend 00/20] power-suppy/i2c/extcon: Fix charger setup on Xiaomi Mi Pad 2 and Lenovo Yogabook
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCHv3.1 5/7] x86/mm: Reserve unaccepted memory bitmap
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
[PATCHv3.1 1/7] mm: Add support for unaccepted memory
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
Re: [PATCHv3 5/7] x86/mm: Reserve unaccepted memory bitmap
From
: Mike Rapoport <rppt@xxxxxxxxxx>
Re: [PATCHv3 1/7] mm: Add support for unaccepted memory
From
: Mike Rapoport <rppt@xxxxxxxxxx>
Re: [PATCH 1/3] memblock: define functions to set the usable memory range
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v5 2/2] EDAC/ghes: use cper functions to avoid code duplication
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v8 36/40] x86/sev: Provide support for SNP guest request NAEs
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v8 36/40] x86/sev: Provide support for SNP guest request NAEs
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH v8 36/40] x86/sev: Provide support for SNP guest request NAEs
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v8 29/40] x86/compressed/64: add support for SEV-SNP CPUID table in #VC handlers
From
: Borislav Petkov <bp@xxxxxxxxx>
[PATCHv3 5/7] x86/mm: Reserve unaccepted memory bitmap
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
[PATCHv3 7/7] x86/tdx: Unaccepted memory support
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
[PATCHv3 6/7] x86/mm: Provide helpers for unaccepted memory
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
[PATCHv3 2/7] efi/x86: Get full memory map in allocate_e820()
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
[PATCHv3 3/7] efi/x86: Implement support for unaccepted memory
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
[PATCHv3 1/7] mm: Add support for unaccepted memory
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
[PATCHv3 0/7] Implement support for unaccepted memory
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
[PATCHv3 4/7] x86/boot/compressed: Handle unaccepted memory
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
Re: [GIT PULL] EFI fixes for v5.17
From
: pr-tracker-bot@xxxxxxxxxx
[PATCH v9 43/43] virt: sevguest: Add support to get extended report
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v9 41/43] virt: Add SEV-SNP guest driver
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v9 42/43] virt: sevguest: Add support to derive key
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v9 39/43] x86/sev: Provide support for SNP guest request NAEs
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v9 40/43] x86/sev: Register SEV-SNP guest request platform device
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v9 38/43] x86/sev: Use firmware-validated CPUID for SEV-SNP guests
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v9 37/43] x86/sev: Add SEV-SNP feature detection/setup
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v9 35/43] x86/compressed: Export and rename add_identity_map()
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v9 36/43] x86/compressed/64: Add identity mapping for Confidential Computing blob
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v9 34/43] x86/compressed: Use firmware-validated CPUID leaves for SEV-SNP guests
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v9 19/43] x86/mm: Add support to validate memory when changing C-bit
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v9 25/43] x86/compressed/acpi: Move EFI system table lookup to helper
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v9 26/43] x86/compressed/acpi: Move EFI config table lookup to helper
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v9 27/43] x86/compressed/acpi: Move EFI vendor table lookup to helper
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v9 30/43] KVM: SEV: Add documentation for SEV-SNP CPUID Enforcement
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v9 32/43] x86/boot: Add a pointer to Confidential Computing blob in bootparams
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v9 33/43] x86/compressed: Add SEV-SNP feature detection/setup
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v9 31/43] x86/compressed/64: Add support for SEV-SNP CPUID table in #VC handlers
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v9 29/43] x86/boot: Add Confidential Computing type to setup_data
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v9 28/43] x86/compressed/acpi: Move EFI kexec handling into common code
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v9 24/43] x86/compressed/acpi: Move EFI detection to helper
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v9 22/43] x86/sev: Move MSR-based VMGEXITs for CPUID to helper
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v9 23/43] KVM: x86: Move lookup of indexed CPUID leafs to helper
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v9 21/43] x86/head/64: Re-enable stack protection
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v9 20/43] x86/sev: Use SEV-SNP AP creation to start secondary CPUs
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v9 17/43] x86/kernel: Make the .bss..decrypted section shared in RMP table
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v9 16/43] x86/sev: Add helper for validating pages in early enc attribute changes
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v9 18/43] x86/kernel: Validate ROM memory before accessing when SEV-SNP is active
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v9 15/43] x86/sev: Register GHCB memory when SEV-SNP is active
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v9 14/43] x86/compressed: Register GHCB memory when SEV-SNP is active
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v9 13/43] x86/compressed: Add helper for validating pages in the decompression stage
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v9 10/43] x86/sev: Check SEV-SNP features support
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v9 11/43] x86/sev: Add a helper for the PVALIDATE instruction
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v9 12/43] x86/sev: Check the vmpl level
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v9 06/43] x86/sev: Detect/setup SEV/SME features earlier in boot
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v9 07/43] x86/mm: Extend cc_attr to include AMD SEV-SNP
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v9 08/43] x86/sev: Define the Linux specific guest termination reasons
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v9 09/43] x86/sev: Save the negotiated GHCB version
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v9 05/43] x86/compressed/64: Detect/setup SEV/SME features earlier in boot
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v9 03/43] KVM: SVM: Create a separate mapping for the GHCB save area
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v9 04/43] KVM: SVM: Update the SEV-ES save area mapping
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v9 02/43] KVM: SVM: Create a separate mapping for the SEV-ES save area
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v9 01/43] KVM: SVM: Define sev_features and vmpl field in the VMSA
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v9 00/43] Add AMD Secure Nested Paging (SEV-SNP) Guest Support
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[GIT PULL] EFI fixes for v5.17
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] riscv/efi_stub: Fix get_boot_hartid_from_fdt() return value
From
: Heinrich Schuchardt <heinrich.schuchardt@xxxxxxxxxxxxx>
Re: [RFC PATCH 1/1] riscv/efi_stub: Add support for RISCV_EFI_BOOT_PROTOCOL
From
: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
[PATCH] riscv/efi_stub: Fix get_boot_hartid_from_fdt() return value
From
: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
Re: [PATCH v8 29/40] x86/compressed/64: add support for SEV-SNP CPUID table in #VC handlers
From
: Michael Roth <michael.roth@xxxxxxx>
Re: [PATCH v8 36/40] x86/sev: Provide support for SNP guest request NAEs
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH v8 29/40] x86/compressed/64: add support for SEV-SNP CPUID table in #VC handlers
From
: Michael Roth <michael.roth@xxxxxxx>
Re: [PATCH v8 36/40] x86/sev: Provide support for SNP guest request NAEs
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [RFC PATCH 1/1] riscv/efi_stub: Add support for RISCV_EFI_BOOT_PROTOCOL
From
: Heinrich Schuchardt <xypron.glpk@xxxxxx>
Re: [PATCH v5 0/2] EDAC/ghes: refactor memory error reporting to avoid code duplication
From
: Shuai Xue <xueshuai@xxxxxxxxxxxxxxxxx>
Re: [PATCH v10 0/8] Enroll kernel keys thru MOK
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v8 35/40] x86/sev: use firmware-validated CPUID for SEV-SNP guests
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v5 3/5] x86/e820: Tag e820_entry with crypto capabilities
From
: Martin Fernandez <martin.fernandez@xxxxxxxxxxxxx>
Re: [PATCH v10 0/8] Enroll kernel keys thru MOK
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v10 0/8] Enroll kernel keys thru MOK
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [RFC PATCH 1/1] riscv/efi_stub: Add support for RISCV_EFI_BOOT_PROTOCOL
From
: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
Re: [RFC PATCH 1/1] riscv/efi_stub: Add support for RISCV_EFI_BOOT_PROTOCOL
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[RFC PATCH 1/1] riscv/efi_stub: Add support for RISCV_EFI_BOOT_PROTOCOL
From
: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
[RFC PATCH 0/1] RISCV_EFI_BOOT_PROTOCOL support in linux
From
: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
Re: [PATCH v5 0/2] EDAC/ghes: refactor memory error reporting to avoid code duplication
From
: Boris Petkov <bp@xxxxxxxxx>
Re: [PATCH v5 0/2] EDAC/ghes: refactor memory error reporting to avoid code duplication
From
: Shuai Xue <xueshuai@xxxxxxxxxxxxxxxxx>
Re: [PATCH v5 0/2] EDAC/ghes: refactor memory error reporting to avoid code duplication
From
: Borislav Petkov <bp@xxxxxxxxx>
[PATCH v5 1/2] efi/cper: add cper_mem_err_status_str to decode error description
From
: Shuai Xue <xueshuai@xxxxxxxxxxxxxxxxx>
[PATCH v5 2/2] EDAC/ghes: use cper functions to avoid code duplication
From
: Shuai Xue <xueshuai@xxxxxxxxxxxxxxxxx>
[PATCH v5 0/2] EDAC/ghes: refactor memory error reporting to avoid code duplication
From
: Shuai Xue <xueshuai@xxxxxxxxxxxxxxxxx>
Re: [PATCH v4 1/2] efi/cper: add cper_mem_err_status_str to decode error description
From
: Shuai Xue <xueshuai@xxxxxxxxxxxxxxxxx>
[PATCH v10 7/8] integrity: Trust MOK keys if MokListTrustedRT found
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v10 1/8] integrity: Fix warning about missing prototypes
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v10 3/8] integrity: add new keyring handler for mok keys
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v10 4/8] KEYS: store reference to machine keyring
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v10 0/8] Enroll kernel keys thru MOK
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v10 2/8] integrity: Introduce a Linux keyring called machine
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v10 5/8] KEYS: Introduce link restriction for machine keys
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v10 8/8] integrity: Only use machine keyring when uefi_check_trust_mok_keys is true
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v10 6/8] efi/mokvar: move up init order
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH v4 1/2] efi/cper: add cper_mem_err_status_str to decode error description
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v8 34/40] x86/sev: add SEV-SNP feature detection/setup
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [RESEND PATCH v3 1/2] efi/cper: add cper_mem_err_status_str to decode error description
From
: Shuai Xue <xueshuai@xxxxxxxxxxxxxxxxx>
Re: [PATCH v8 33/40] x86/compressed/64: add identity mapping for Confidential Computing blob
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [RESEND PATCH v3 1/2] efi/cper: add cper_mem_err_status_str to decode error description
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [RESEND PATCH v3 1/2] efi/cper: add cper_mem_err_status_str to decode error description
From
: Shuai Xue <xueshuai@xxxxxxxxxxxxxxxxx>
Re: [RESEND PATCH v3 1/2] efi/cper: add cper_mem_err_status_str to decode error description
From
: Borislav Petkov <bp@xxxxxxxxx>
[PATCH v4 1/2] efi/cper: add cper_mem_err_status_str to decode error description
From
: Shuai Xue <xueshuai@xxxxxxxxxxxxxxxxx>
[PATCH v4 2/2] EDAC/ghes: use cper functions to avoid code duplication
From
: Shuai Xue <xueshuai@xxxxxxxxxxxxxxxxx>
[PATCH v4 0/2] EDAC/ghes: refactor memory error reporting to avoid code duplication
From
: Shuai Xue <xueshuai@xxxxxxxxxxxxxxxxx>
Re: [RESEND PATCH v3 1/2] efi/cper: add cper_mem_err_status_str to decode error description
From
: Shuai Xue <xueshuai@xxxxxxxxxxxxxxxxx>
[PATCH 5.16 0502/1039] of: fdt: Aggregate the processing of "linux,usable-memory-range"
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [RESEND PATCH v3 1/2] efi/cper: add cper_mem_err_status_str to decode error description
From
: Borislav Petkov <bp@xxxxxxxxx>
[PATCH 5.15 427/846] of: fdt: Aggregate the processing of "linux,usable-memory-range"
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
[PATCH 5.16 0503/1039] efi: apply memblock cap after memblock_add()
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 1/3] memblock: define functions to set the usable memory range
From
: Frank van der Linden <fllinden@xxxxxxxxxx>
[PATCH 5.15 428/846] efi: apply memblock cap after memblock_add()
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
[efi:urgent] BUILD SUCCESS f5390cd0b43c2e54c7cf5506c7da4a37c5cef746
From
: kernel test robot <lkp@xxxxxxxxx>
[RESEND PATCH v3 1/2] efi/cper: add cper_mem_err_status_str to decode error description
From
: Shuai Xue <xueshuai@xxxxxxxxxxxxxxxxx>
[RESEND PATCH v3 2/2] EDAC/ghes: use cper functions to avoid code duplication
From
: Shuai Xue <xueshuai@xxxxxxxxxxxxxxxxx>
[RESEND PATCH v3 0/2] EDAC/ghes: refactor memory error reporting to avoid
From
: Shuai Xue <xueshuai@xxxxxxxxxxxxxxxxx>
Re: [PATCH v8 32/40] x86/compressed: use firmware-validated CPUID for SEV-SNP guests
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v3 00/13] Introduce sv48 support without relocatable kernel
From
: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
Re: [PATCH v3 00/13] Introduce sv48 support without relocatable kernel
From
: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
Re: [PATCH v3 00/13] Introduce sv48 support without relocatable kernel
From
: Palmer Dabbelt <palmer@xxxxxxxxxxx>
Re: [PATCH] efi/libstub: arm64: Fix image check alignment at entry
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH] efi/libstub: arm64: Fix image check alignment at entry
From
: Mihai Carabas <mihai.carabas@xxxxxxxxxx>
Re: [PATCH v8 31/40] x86/compressed: add SEV-SNP feature detection/setup
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v8 29/40] x86/compressed/64: add support for SEV-SNP CPUID table in #VC handlers
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v8 29/40] x86/compressed/64: add support for SEV-SNP CPUID table in #VC handlers
From
: Michael Roth <michael.roth@xxxxxxx>
Re: [PATCHv2 0/7] Implement support for unaccepted memory
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH v8 29/40] x86/compressed/64: add support for SEV-SNP CPUID table in #VC handlers
From
: Michael Roth <michael.roth@xxxxxxx>
Re: [PATCH v8 29/40] x86/compressed/64: add support for SEV-SNP CPUID table in #VC handlers
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v8 29/40] x86/compressed/64: add support for SEV-SNP CPUID table in #VC handlers
From
: Michael Roth <michael.roth@xxxxxxx>
Re: [PATCH v8 29/40] x86/compressed/64: add support for SEV-SNP CPUID table in #VC handlers
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v9 2/8] integrity: Introduce a Linux keyring called machine
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH v8 29/40] x86/compressed/64: add support for SEV-SNP CPUID table in #VC handlers
From
: Michael Roth <michael.roth@xxxxxxx>
Re: [PATCH v8 29/40] x86/compressed/64: add support for SEV-SNP CPUID table in #VC handlers
From
: Michael Roth <michael.roth@xxxxxxx>
Re: [PATCH v8 29/40] x86/compressed/64: add support for SEV-SNP CPUID table in #VC handlers
From
: Michael Roth <michael.roth@xxxxxxx>
Re: [PATCH v8 29/40] x86/compressed/64: add support for SEV-SNP CPUID table in #VC handlers
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH] efi: runtime: avoid EFIv2 runtime services on Apple x86 machines
From
: Aditya Garg <gargaditya08@xxxxxxxx>
Re: [PATCH v8 29/40] x86/compressed/64: add support for SEV-SNP CPUID table in #VC handlers
From
: Michael Roth <michael.roth@xxxxxxx>
Re: [PATCH v8 30/40] x86/boot: add a pointer to Confidential Computing blob in bootparams
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v5 3/5] x86/e820: Tag e820_entry with crypto capabilities
From
: Martin Fernandez <martin.fernandez@xxxxxxxxxxxxx>
Re: [PATCH v9 2/8] integrity: Introduce a Linux keyring called machine
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
[PATCH v3 0/2] EDAC/ghes: refactor memory error reporting to avoid
From
: Shuai Xue <xueshuai@xxxxxxxxxxxxxxxxx>
[PATCH v3 1/2] efi/cper: add cper_mem_err_status_str to decode error description
From
: Shuai Xue <xueshuai@xxxxxxxxxxxxxxxxx>
[PATCH v3 2/2] EDAC/ghes: use cper functions to avoid code duplication
From
: Shuai Xue <xueshuai@xxxxxxxxxxxxxxxxx>
Re: [PATCH v9 2/8] integrity: Introduce a Linux keyring called machine
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v9 2/8] integrity: Introduce a Linux keyring called machine
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v9 2/8] integrity: Introduce a Linux keyring called machine
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v9 2/8] integrity: Introduce a Linux keyring called machine
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCHv2 5/7] x86/mm: Reserve unaccepted memory bitmap
From
: Mike Rapoport <rppt@xxxxxxxxxx>
Re: [PATCH v9 2/8] integrity: Introduce a Linux keyring called machine
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH 1/3] memblock: define functions to set the usable memory range
From
: Frank van der Linden <fllinden@xxxxxxxxxx>
Re: [PATCH v5 3/5] x86/e820: Tag e820_entry with crypto capabilities
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH v8 29/40] x86/compressed/64: add support for SEV-SNP CPUID table in #VC handlers
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCHv2 1/7] mm: Add support for unaccepted memory
From
: David Hildenbrand <david@xxxxxxxxxx>
Re: [PATCH v5 1/5] mm/memblock: Tag memblocks with crypto capabilities
From
: Martin Fernandez <martin.fernandez@xxxxxxxxxxxxx>
Re: [PATCH v5 1/5] mm/memblock: Tag memblocks with crypto capabilities
From
: Mike Rapoport <rppt@xxxxxxxxxx>
Re: [PATCH 1/3] memblock: define functions to set the usable memory range
From
: Frank van der Linden <fllinden@xxxxxxxxxx>
Re: [PATCH 1/3] memblock: define functions to set the usable memory range
From
: Frank van der Linden <fllinden@xxxxxxxxxx>
Re: [PATCH 1/3] memblock: define functions to set the usable memory range
From
: Mike Rapoport <rppt@xxxxxxxxxx>
Re: [PATCH v8 29/40] x86/compressed/64: add support for SEV-SNP CPUID table in #VC handlers
From
: Michael Roth <michael.roth@xxxxxxx>
Re: [PATCH v8 29/40] x86/compressed/64: add support for SEV-SNP CPUID table in #VC handlers
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v8 20/40] x86/sev: Use SEV-SNP AP creation to start secondary CPUs
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v8 20/40] x86/sev: Use SEV-SNP AP creation to start secondary CPUs
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCHv2 1/7] mm: Add support for unaccepted memory
From
: Mike Rapoport <rppt@xxxxxxxxxx>
Re: [PATCH v9 2/8] integrity: Introduce a Linux keyring called machine
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCHv2 5/7] x86/mm: Reserve unaccepted memory bitmap
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCHv2 6/7] x86/mm: Provide helpers for unaccepted memory
From
: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
Re: [PATCH v9 2/8] integrity: Introduce a Linux keyring called machine
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCHv2 5/7] x86/mm: Reserve unaccepted memory bitmap
From
: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
Re: [PATCH v9 2/8] integrity: Introduce a Linux keyring called machine
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCHv2 3/7] efi/x86: Implement support for unaccepted memory
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCHv2 3/7] efi/x86: Implement support for unaccepted memory
From
: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
Re: [PATCHv2 1/7] mm: Add support for unaccepted memory
From
: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
Re: [PATCHv2 1/7] mm: Add support for unaccepted memory
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCHv2 1/7] mm: Add support for unaccepted memory
From
: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
Re: [PATCH 1/3] memblock: define functions to set the usable memory range
From
: Mike Rapoport <rppt@xxxxxxxxxx>
Re: [PATCH v8 20/40] x86/sev: Use SEV-SNP AP creation to start secondary CPUs
From
: Tom Lendacky <thomas.lendacky@xxxxxxx>
Re: [PATCH v8 20/40] x86/sev: Use SEV-SNP AP creation to start secondary CPUs
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH v8 20/40] x86/sev: Use SEV-SNP AP creation to start secondary CPUs
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCHv2 1/7] mm: Add support for unaccepted memory
From
: David Hildenbrand <david@xxxxxxxxxx>
Re: [PATCH] efi: runtime: avoid EFIv2 runtime services on Apple x86 machines
From
: Aditya Garg <gargaditya08@xxxxxxxx>
[PATCH] efi: runtime: avoid EFIv2 runtime services on Apple x86 machines
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [BUG][SEVERE] Enabling EFI runtime services causes panics in the T2 security chip on Macs equipped with it.
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [BUG][SEVERE] Enabling EFI runtime services causes panics in the T2 security chip on Macs equipped with it.
From
: Orlando Chamberlain <redecorating@xxxxxxxxxxxxxx>
Re: [BUG][SEVERE] Enabling EFI runtime services causes panics in the T2 security chip on Macs equipped with it.
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [BUG][SEVERE] Enabling EFI runtime services causes panics in the T2 security chip on Macs equipped with it.
From
: Aditya Garg <gargaditya08@xxxxxxxx>
Re: [PATCH v9 2/8] integrity: Introduce a Linux keyring called machine
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [GIT PULL] EFI updates for v5.17
From
: pr-tracker-bot@xxxxxxxxxx
Re: [PATCH v8 12/40] x86/sev: Add helper for validating pages in early enc attribute changes
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v8 12/40] x86/sev: Add helper for validating pages in early enc attribute changes
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH v8 12/40] x86/sev: Add helper for validating pages in early enc attribute changes
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v9 2/8] integrity: Introduce a Linux keyring called machine
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH v8 12/40] x86/sev: Add helper for validating pages in early enc attribute changes
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH 1/3] memblock: define functions to set the usable memory range
From
: Frank van der Linden <fllinden@xxxxxxxxxx>
Re: [PATCHv2 6/7] x86/mm: Provide helpers for unaccepted memory
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCHv2 1/7] mm: Add support for unaccepted memory
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCHv2 5/7] x86/mm: Reserve unaccepted memory bitmap
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH v9 2/8] integrity: Introduce a Linux keyring called machine
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCHv2 3/7] efi/x86: Implement support for unaccepted memory
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
[PATCHv2 6/7] x86/mm: Provide helpers for unaccepted memory
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
[PATCHv2 7/7] x86/tdx: Unaccepted memory support
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
[PATCHv2 5/7] x86/mm: Reserve unaccepted memory bitmap
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
[PATCHv2 4/7] x86/boot/compressed: Handle unaccepted memory
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
[PATCHv2 3/7] efi/x86: Implement support for unaccepted memory
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
[PATCHv2 2/7] efi/x86: Get full memory map in allocate_e820()
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
[PATCHv2 1/7] mm: Add support for unaccepted memory
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
[PATCHv2 0/7] Implement support for unaccepted memory
From
: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
Re: [PATCH 1/3] memblock: define functions to set the usable memory range
From
: Mike Rapoport <rppt@xxxxxxxxxx>
Re: [PATCH v8 24/40] x86/compressed/acpi: move EFI system table lookup to helper
From
: Chao Fan <fanchao.njupt@xxxxxxxxx>
Re: [BUG][SEVERE] Enabling EFI runtime services causes panics in the T2 security chip on Macs equipped with it.
From
: Aditya Garg <gargaditya08@xxxxxxxx>
Re: [BUG][SEVERE] Enabling EFI runtime services causes panics in the T2 security chip on Macs equipped with it.
From
: Aditya Garg <gargaditya08@xxxxxxxx>
Re: [BUG][SEVERE] Enabling EFI runtime services causes panics in the T2 security chip on Macs equipped with it.
From
: Orlando Chamberlain <redecorating@xxxxxxxxxxxxxx>
Re: [PATCH v9 8/8] integrity: Only use machine keyring when uefi_check_trust_mok_keys is true
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v9 5/8] KEYS: Introduce link restriction for machine keys
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH v9 2/8] integrity: Introduce a Linux keyring called machine
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
[PATCH 3/3] efi: enforce usable memory range after reserving regions
From
: Frank van der Linden <fllinden@xxxxxxxxxx>
[PATCH 2/3] of: fdt: use memblock usable range interface
From
: Frank van der Linden <fllinden@xxxxxxxxxx>
[PATCH 1/3] memblock: define functions to set the usable memory range
From
: Frank van der Linden <fllinden@xxxxxxxxxx>
[PATCH 0/3] usable memory range fixes (arm64/fdt/efi)
From
: Frank van der Linden <fllinden@xxxxxxxxxx>
[GIT PULL] EFI updates for v5.17
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [BUG][SEVERE] Enabling EFI runtime services causes panics in the T2 security chip on Macs equipped with it.
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [BUG][SEVERE] Enabling EFI runtime services causes panics in the T2 security chip on Macs equipped with it.
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [BUG][SEVERE] Enabling EFI runtime services causes panics in the T2 security chip on Macs equipped with it.
From
: Aditya Garg <gargaditya08@xxxxxxxx>
Re: [PATCH v6 0/5] Allow guest access to EFI confidential computing secret area
From
: "Dr. David Alan Gilbert" <dgilbert@xxxxxxxxxx>
Re: [BUG][SEVERE] Enabling EFI runtime services causes panics in the T2 security chip on Macs equipped with it.
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[BUG][SEVERE] Enabling EFI runtime services causes panics in the T2 security chip on Macs equipped with it.
From
: Aditya Garg <gargaditya08@xxxxxxxx>
Re: [PATCH v6 0/5] Allow guest access to EFI confidential computing secret area
From
: Dov Murik <dovmurik@xxxxxxxxxxxxx>
Re: [PATCH v3 12/13] riscv: Initialize thread pointer before calling C functions
From
: Alexandre ghiti <alex@xxxxxxxx>
Re: [PATCH v9 8/8] integrity: Only use machine keyring when uefi_check_trust_mok_keys is true
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v9 5/8] KEYS: Introduce link restriction for machine keys
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v9 2/8] integrity: Introduce a Linux keyring called machine
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v9 8/8] integrity: Only use machine keyring when uefi_check_trust_mok_keys is true
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v9 8/8] integrity: Only use machine keyring when uefi_check_trust_mok_keys is true
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v9 7/8] integrity: Trust MOK keys if MokListTrustedRT found
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v9 6/8] efi/mokvar: move up init order
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v9 5/8] KEYS: Introduce link restriction for machine keys
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v9 4/8] KEYS: store reference to machine keyring
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v9 3/8] integrity: add new keyring handler for mok keys
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v9 1/8] integrity: Fix warning about missing prototypes
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
[efi:next] BUILD SUCCESS 42f4046bc4ba56c6e4d2af7a9d7f70eaa563daec
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v6 0/5] Allow guest access to EFI confidential computing secret area
From
: Peter Gonda <pgonda@xxxxxxxxxx>
Re: [PATCH v8 28/40] KVM: SEV: Add documentation for SEV-SNP CPUID Enforcement
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v6 0/5] Allow guest access to EFI confidential computing secret area
From
: Borislav Petkov <bp@xxxxxxx>
Re: [PATCH v8 27/40] x86/boot: Add Confidential Computing type to setup_data
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v8 27/40] x86/boot: Add Confidential Computing type to setup_data
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v8 13/40] x86/kernel: Make the bss.decrypted section shared in RMP table
From
: Tom Lendacky <thomas.lendacky@xxxxxxx>
Re: [PATCH v8 26/40] x86/compressed/acpi: move EFI vendor table lookup to helper
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v8 22/40] x86/sev: move MSR-based VMGEXITs for CPUID to helper
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v8 25/40] x86/compressed/acpi: move EFI config table lookup to helper
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v8 22/40] x86/sev: move MSR-based VMGEXITs for CPUID to helper
From
: Michael Roth <michael.roth@xxxxxxx>
Re: [PATCH v8 13/40] x86/kernel: Make the bss.decrypted section shared in RMP table
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v8 24/40] x86/compressed/acpi: move EFI system table lookup to helper
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v8 13/40] x86/kernel: Make the bss.decrypted section shared in RMP table
From
: Tom Lendacky <thomas.lendacky@xxxxxxx>
Re: [PATCH v8 23/40] KVM: x86: move lookup of indexed CPUID leafs to helper
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v8 22/40] x86/sev: move MSR-based VMGEXITs for CPUID to helper
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v8 13/40] x86/kernel: Make the bss.decrypted section shared in RMP table
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH] efi: use default_groups in kobj_type
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v9 3/8] integrity: add new keyring handler for mok keys
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v9 0/8] Enroll kernel keys thru MOK
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v9 2/8] integrity: Introduce a Linux keyring called machine
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v9 8/8] integrity: Only use machine keyring when uefi_check_trust_mok_keys is true
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v9 1/8] integrity: Fix warning about missing prototypes
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v9 5/8] KEYS: Introduce link restriction for machine keys
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v9 4/8] KEYS: store reference to machine keyring
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v9 7/8] integrity: Trust MOK keys if MokListTrustedRT found
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v9 6/8] efi/mokvar: move up init order
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH v8 24/40] x86/compressed/acpi: move EFI system table lookup to helper
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v8 13/40] x86/kernel: Make the bss.decrypted section shared in RMP table
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH v8 13/40] x86/kernel: Make the bss.decrypted section shared in RMP table
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH v6 0/5] Allow guest access to EFI confidential computing secret area
From
: "Dr. David Alan Gilbert" <dgilbert@xxxxxxxxxx>
Re: [PATCH v8 13/40] x86/kernel: Make the bss.decrypted section shared in RMP table
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH v6 0/5] Allow guest access to EFI confidential computing secret area
From
: Borislav Petkov <bp@xxxxxxx>
Re: [PATCH v8 19/40] KVM: SVM: Update the SEV-ES save area mapping
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v8 18/40] KVM: SVM: Create a separate mapping for the GHCB save area
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
[PATCH] efi: use default_groups in kobj_type
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v6 0/5] Allow guest access to EFI confidential computing secret area
From
: "Dr. David Alan Gilbert" <dgilbert@xxxxxxxxxx>
Re: [PATCH v8 17/40] KVM: SVM: Create a separate mapping for the SEV-ES save area
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v8 22/40] x86/sev: move MSR-based VMGEXITs for CPUID to helper
From
: Michael Roth <michael.roth@xxxxxxx>
Re: [PATCH v8 16/40] KVM: SVM: Define sev_features and vmpl field in the VMSA
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v8 15/40] x86/mm: Add support to validate memory when changing C-bit
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v8 22/40] x86/sev: move MSR-based VMGEXITs for CPUID to helper
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v6 0/5] Allow guest access to EFI confidential computing secret area
From
: Borislav Petkov <bp@xxxxxxx>
Re: [PATCH v2] builddeb: Support signing kernels with the module signing key
From
: Matthew Wilcox <willy@xxxxxxxxxxxxx>
Re: [PATCH v8 13/40] x86/kernel: Make the bss.decrypted section shared in RMP table
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v2] builddeb: Support signing kernels with the module signing key
From
: Masahiro Yamada <masahiroy@xxxxxxxxxx>
Re: [PATCH v8 12/40] x86/sev: Add helper for validating pages in early enc attribute changes
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH v8 08/40] x86/sev: Check the vmpl level
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH v4] random: fix crash on multiple early calls to add_bootloader_randomness()
From
: "Ivan T. Ivanov" <iivanov@xxxxxxx>
Re: [PATCH v3 07/13] riscv: Implement sv48 support
From
: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
Re: [PATCH v3 07/13] riscv: Implement sv48 support
From
: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
Re: [PATCH v6 0/5] Allow guest access to EFI confidential computing secret area
From
: Dov Murik <dovmurik@xxxxxxxxxxxxx>
Re: [PATCH v8 12/40] x86/sev: Add helper for validating pages in early enc attribute changes
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v8 11/40] x86/sev: Register GHCB memory when SEV-SNP is active
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v8 10/40] x86/compressed: Register GHCB memory when SEV-SNP is active
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v6 0/5] Allow guest access to EFI confidential computing secret area
From
: Borislav Petkov <bp@xxxxxxx>
Re: [PATCH v8 09/40] x86/compressed: Add helper for validating pages in the decompression stage
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v8 20/40] x86/sev: Use SEV-SNP AP creation to start secondary CPUs
From
: Vlastimil Babka <vbabka@xxxxxxx>
Re: [PATCH v8 21/40] x86/head: re-enable stack protection for 32/64-bit builds
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v8 20/40] x86/sev: Use SEV-SNP AP creation to start secondary CPUs
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v2 1/3] ghes_edac: unify memory error report format with cper
From
: Shuai Xue <xueshuai@xxxxxxxxxxxxxxxxx>
Re: [PATCH v8 22/40] x86/sev: move MSR-based VMGEXITs for CPUID to helper
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH v4] random: fix crash on multiple early calls to add_bootloader_randomness()
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH v2 1/3] ghes_edac: unify memory error report format with cper
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v8.1 7/7] random: move NUMA-related code to CONFIG_NUMA section
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH v8 6/7] random: early initialization of ChaCha constants
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH v8 5/7] random: harmonize "crng init done" messages
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH v8 4/7] random: mix bootloader randomness into pool
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH v8 3/7] random: do not throw away excess input to crng_fast_load
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH v8 2/7] random: do not re-init if crng_reseed completes before primary init
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH v8 1/7] random: fix crash on multiple early calls to add_bootloader_randomness()
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH v8 17/40] KVM: SVM: Create a separate mapping for the SEV-ES save area
From
: Borislav Petkov <bp@xxxxxxxxx>
[PATCH v8.1 7/7] random: move NUMA-related code to CONFIG_NUMA section
From
: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
[PATCH v8 6/7] random: early initialization of ChaCha constants
From
: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
[PATCH v8 4/7] random: mix bootloader randomness into pool
From
: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
[PATCH v8 1/7] random: fix crash on multiple early calls to add_bootloader_randomness()
From
: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
[PATCH v8 5/7] random: harmonize "crng init done" messages
From
: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
[PATCH v8 2/7] random: do not re-init if crng_reseed completes before primary init
From
: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
[PATCH v8 7/7] random: move crng_initialize_secondary to CONFIG_NUMA section
From
: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
[PATCH v8 3/7] random: do not throw away excess input to crng_fast_load
From
: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v8 15/40] x86/mm: Add support to validate memory when changing C-bit
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v3 07/13] riscv: Implement sv48 support
From
: Guo Ren <guoren@xxxxxxxxxx>
Re: [PATCH v2 1/3] ghes_edac: unify memory error report format with cper
From
: Shuai Xue <xueshuai@xxxxxxxxxxxxxxxxx>
Re: [PATCH v2 1/3] ghes_edac: unify memory error report format with cper
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v8 14/40] x86/kernel: Validate rom memory before accessing when SEV-SNP is active
From
: Borislav Petkov <bp@xxxxxxxxx>
[PATCH v7 4/4] random: mix bootloader randomness into pool
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH v7 3/4] random: do not throw away excess input to crng_fast_load
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH v7 2/4] random: do not re-init if crng_reseed completes before primary init
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH v7 1/4] random: fix crash on multiple early calls to add_bootloader_randomness()
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH v6] random: fix crash on multiple early calls to add_bootloader_randomness()
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH v8 13/40] x86/kernel: Make the bss.decrypted section shared in RMP table
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [GIT PULL] EFI fix for 5.16 (#2)
From
: pr-tracker-bot@xxxxxxxxxx
[GIT PULL] EFI fix for 5.16 (#2)
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v3 07/13] riscv: Implement sv48 support
From
: Jisheng Zhang <jszhang3@xxxxxxxxxxxxxxxx>
[PATCH v6] random: fix crash on multiple early calls to add_bootloader_randomness()
From
: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v8 12/40] x86/sev: Add helper for validating pages in early enc attribute changes
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCHv3] efi: apply memblock cap after memblock_add()
From
: "Leizhen (ThunderTown)" <thunder.leizhen@xxxxxxxxxx>
Re: [PATCH v4 3/5] x86/e820: Tag e820_entry with crypto capabilities
From
: Martin Fernandez <martin.fernandez@xxxxxxxxxxxxx>
Re: [PATCH v8 11/40] x86/sev: Register GHCB memory when SEV-SNP is active
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH v8 11/40] x86/sev: Register GHCB memory when SEV-SNP is active
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCHv3] efi: apply memblock cap after memblock_add()
From
: "Leizhen (ThunderTown)" <thunder.leizhen@xxxxxxxxxx>
[PATCH v13 1/4] efi: Introduce EFI_FIRMWARE_MANAGEMENT_CAPSULE_HEADER and corresponding structures
From
: Chen Yu <yu.c.chen@xxxxxxxxx>
Re: [PATCHv3] efi: apply memblock cap after memblock_add()
From
: Rob Herring <robh@xxxxxxxxxx>
Re: [PATCH v8 09/40] x86/compressed: Add helper for validating pages in the decompression stage
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v4 3/5] x86/e820: Tag e820_entry with crypto capabilities
From
: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v4 3/5] x86/e820: Tag e820_entry with crypto capabilities
From
: Martin Fernandez <martin.fernandez@xxxxxxxxxxxxx>
Re: [PATCH v8 08/40] x86/sev: Check the vmpl level
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v4 3/5] x86/e820: Tag e820_entry with crypto capabilities
From
: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v5] random: fix crash on multiple early calls to add_bootloader_randomness()
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH 4.19 15/56] x86: Make ARCH_USE_MEMREMAP_PROT a generic Kconfig symbol
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
[PATCH 4.14 15/45] x86: Make ARCH_USE_MEMREMAP_PROT a generic Kconfig symbol
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v3 12/13] riscv: Initialize thread pointer before calling C functions
From
: Guo Ren <guoren@xxxxxxxxxx>
Re: [PATCH v3 12/13] riscv: Initialize thread pointer before calling C functions
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v3 12/13] riscv: Initialize thread pointer before calling C functions
From
: Guo Ren <guoren@xxxxxxxxxx>
[PATCH v2] builddeb: Support signing kernels with the module signing key
From
: "Matthew Wilcox (Oracle)" <willy@xxxxxxxxxxxxx>
Re: [PATCH v8 09/40] x86/compressed: Add helper for validating pages in the decompression stage
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH v8 08/40] x86/sev: Check the vmpl level
From
: Tom Lendacky <thomas.lendacky@xxxxxxx>
Re: [PATCH v8 08/40] x86/sev: Check the vmpl level
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH v8 09/40] x86/compressed: Add helper for validating pages in the decompression stage
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH] builddeb: Support signing kernels with a Machine Owner Key
From
: Masahiro Yamada <masahiroy@xxxxxxxxxx>
Re: [PATCHv3] efi: apply memblock cap after memblock_add()
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCHv3] efi: apply memblock cap after memblock_add()
From
: Rob Herring <robh+dt@xxxxxxxxxx>
Re: [PATCH v4 14/20] mfd: intel_soc_pmic_chtwc: Add cht_wc_model data to struct intel_soc_pmic
From
: Lee Jones <lee.jones@xxxxxxxxxx>
Re: [PATCH v8 08/40] x86/sev: Check the vmpl level
From
: Mikolaj Lisik <lisik@xxxxxxxxxx>
Re: [PATCH] builddeb: Support signing kernels with a Machine Owner Key
From
: Matthew Wilcox <willy@xxxxxxxxxxxxx>
Re: [PATCH v8 08/40] x86/sev: Check the vmpl level
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v8 07/40] x86/sev: Add a helper for the PVALIDATE instruction
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v8 06/40] x86/sev: Check SEV-SNP features support
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH RFC 0/5] Handle UEFI NX-restricted page tables
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v8 06/40] x86/sev: Check SEV-SNP features support
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v8 06/40] x86/sev: Check SEV-SNP features support
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v12 1/4] efi: Introduce EFI_FIRMWARE_MANAGEMENT_CAPSULE_HEADER and corresponding structures
From
: Chen Yu <yu.c.chen@xxxxxxxxx>
Re: [PATCH v8 06/40] x86/sev: Check SEV-SNP features support
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCHv3] efi: apply memblock cap after memblock_add()
From
: "Leizhen (ThunderTown)" <thunder.leizhen@xxxxxxxxxx>
Re: [PATCH v2 0/3] ghes_edac: refactor memory error reporting to avoid code duplication
From
: Shuai Xue <xueshuai@xxxxxxxxxxxxxxxxx>
[efi:next] BUILD SUCCESS 21e42b00f779ceeac0eb022c747d8f0953805897
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v4 20/20] extcon: intel-cht-wc: Report RID_A for ACA adapters
From
: Chanwoo Choi <cw00.choi@xxxxxxxxxxx>
Re: [PATCH v4 19/20] extcon: intel-cht-wc: Add support for registering a power_supply class-device
From
: Chanwoo Choi <cw00.choi@xxxxxxxxxxx>
Re: [PATCH v4 18/20] extcon: intel-cht-wc: Refactor cht_wc_extcon_get_charger()
From
: Chanwoo Choi <cw00.choi@xxxxxxxxxxx>
Re: [PATCH v4 17/20] extcon: intel-cht-wc: Support devs with Micro-B / USB-2 only Type-C connectors
From
: Chanwoo Choi <cw00.choi@xxxxxxxxxxx>
Re: [PATCH v4 16/20] extcon: intel-cht-wc: Use new cht_wc_model intel_soc_pmic field
From
: Chanwoo Choi <cw00.choi@xxxxxxxxxxx>
[PATCH] efi: fix unmet dependency on CRYPTO for CRYPTO_LIB_SHA256
From
: Julian Braha <julianbraha@xxxxxxxxx>
Re: [PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
From
: Michael Roth <michael.roth@xxxxxxx>
Re: [PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
From
: Michael Roth <michael.roth@xxxxxxx>
Re: [PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
From
: Michael Roth <michael.roth@xxxxxxx>
Re: [PATCH v8 09/17] KEYS: Rename get_builtin_and_secondary_restriction
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v8 09/17] KEYS: Rename get_builtin_and_secondary_restriction
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
From
: Michael Roth <michael.roth@xxxxxxx>
Re: [PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
From
: Michael Roth <michael.roth@xxxxxxx>
Re: [PATCHv3] efi: apply memblock cap after memblock_add()
From
: Rob Herring <robh+dt@xxxxxxxxxx>
Re: [PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
From
: Tom Lendacky <thomas.lendacky@xxxxxxx>
Re: [PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v6 0/5] Allow guest access to EFI confidential computing secret area
From
: Dov Murik <dovmurik@xxxxxxxxxxxxx>
Re: [PATCHv3] efi: apply memblock cap after memblock_add()
From
: Pingfan Liu <kernelfans@xxxxxxxxx>
Re: [PATCHv3] efi: apply memblock cap after memblock_add()
From
: "Leizhen (ThunderTown)" <thunder.leizhen@xxxxxxxxxx>
Re: [PATCHv3] efi: apply memblock cap after memblock_add()
From
: Pingfan Liu <kernelfans@xxxxxxxxx>
Re: [PATCHv3] efi: apply memblock cap after memblock_add()
From
: "Leizhen (ThunderTown)" <thunder.leizhen@xxxxxxxxxx>
[PATCHv3] efi: apply memblock cap after memblock_add()
From
: Pingfan Liu <kernelfans@xxxxxxxxx>
Re: [PATCHv2 2/2] efi: apply memblock cap after memblock_add()
From
: Pingfan Liu <kernelfans@xxxxxxxxx>
Re: [PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v8 04/40] x86/sev: Define the Linux specific guest termination reasons
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v8 03/40] x86/mm: Extend cc_attr to include AMD SEV-SNP
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCHv2 2/2] efi: apply memblock cap after memblock_add()
From
: Rob Herring <robh+dt@xxxxxxxxxx>
[PATCHv2 2/2] efi: apply memblock cap after memblock_add()
From
: Pingfan Liu <kernelfans@xxxxxxxxx>
[PATCHv2 1/2] of: fdt: Aggregate the processing of "linux,usable-memory-range"
From
: Pingfan Liu <kernelfans@xxxxxxxxx>
[PATCHv2 0/2] arm64: fdt: fix membock add/cap ordering
From
: Pingfan Liu <kernelfans@xxxxxxxxx>
[efi:urgent] BUILD SUCCESS 4bc5e64e6cf37007e436970024e5998ee0935651
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v8 05/40] x86/sev: Save the negotiated GHCB version
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v8 04/40] x86/sev: Define the Linux specific guest termination reasons
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v8 03/40] x86/mm: Extend cc_attr to include AMD SEV-SNP
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v8 02/40] x86/sev: detect/setup SEV/SME features earlier in boot
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v8 24/40] x86/compressed/acpi: move EFI system table lookup to helper
From
: Michael Roth <michael.roth@xxxxxxx>
Re: [PATCH v8 33/40] x86/compressed/64: add identity mapping for Confidential Computing blob
From
: Michael Roth <michael.roth@xxxxxxx>
Re: [PATCH v8 24/40] x86/compressed/acpi: move EFI system table lookup to helper
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH v8 27/40] x86/boot: Add Confidential Computing type to setup_data
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH v8 24/40] x86/compressed/acpi: move EFI system table lookup to helper
From
: Michael Roth <michael.roth@xxxxxxx>
Re: [PATCH 0/4 v3] measure initrd data loaded by the EFI stub
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v8 27/40] x86/boot: Add Confidential Computing type to setup_data
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH v8 27/40] x86/boot: Add Confidential Computing type to setup_data
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH v8 39/40] virt: sevguest: Add support to derive key
From
: Liam Merwick <liam.merwick@xxxxxxxxxx>
Re: [PATCH v8 27/40] x86/boot: Add Confidential Computing type to setup_data
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH v8 00/40] Add AMD Secure Nested Paging (SEV-SNP) Guest Support
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH v8 27/40] x86/boot: Add Confidential Computing type to setup_data
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH v8 00/40] Add AMD Secure Nested Paging (SEV-SNP) Guest Support
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH v8 33/40] x86/compressed/64: add identity mapping for Confidential Computing blob
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH v8 27/40] x86/boot: Add Confidential Computing type to setup_data
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v8 24/40] x86/compressed/acpi: move EFI system table lookup to helper
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH v8 20/40] x86/sev: Use SEV-SNP AP creation to start secondary CPUs
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
[PATCH v8 06/40] x86/sev: Check SEV-SNP features support
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 07/40] x86/sev: Add a helper for the PVALIDATE instruction
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 08/40] x86/sev: Check the vmpl level
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 10/40] x86/compressed: Register GHCB memory when SEV-SNP is active
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 00/40] Add AMD Secure Nested Paging (SEV-SNP) Guest Support
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 34/40] x86/sev: add SEV-SNP feature detection/setup
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 32/40] x86/compressed: use firmware-validated CPUID for SEV-SNP guests
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 35/40] x86/sev: use firmware-validated CPUID for SEV-SNP guests
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 36/40] x86/sev: Provide support for SNP guest request NAEs
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 39/40] virt: sevguest: Add support to derive key
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 40/40] virt: sevguest: Add support to get extended report
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 37/40] x86/sev: Register SNP guest request platform device
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 38/40] virt: Add SEV-SNP guest driver
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 33/40] x86/compressed/64: add identity mapping for Confidential Computing blob
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 11/40] x86/sev: Register GHCB memory when SEV-SNP is active
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 31/40] x86/compressed: add SEV-SNP feature detection/setup
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 30/40] x86/boot: add a pointer to Confidential Computing blob in bootparams
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 25/40] x86/compressed/acpi: move EFI config table lookup to helper
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 29/40] x86/compressed/64: add support for SEV-SNP CPUID table in #VC handlers
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 12/40] x86/sev: Add helper for validating pages in early enc attribute changes
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 26/40] x86/compressed/acpi: move EFI vendor table lookup to helper
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 28/40] KVM: SEV: Add documentation for SEV-SNP CPUID Enforcement
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 27/40] x86/boot: Add Confidential Computing type to setup_data
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 18/40] KVM: SVM: Create a separate mapping for the GHCB save area
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 21/40] x86/head: re-enable stack protection for 32/64-bit builds
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 23/40] KVM: x86: move lookup of indexed CPUID leafs to helper
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 24/40] x86/compressed/acpi: move EFI system table lookup to helper
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 20/40] x86/sev: Use SEV-SNP AP creation to start secondary CPUs
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 22/40] x86/sev: move MSR-based VMGEXITs for CPUID to helper
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 19/40] KVM: SVM: Update the SEV-ES save area mapping
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 14/40] x86/kernel: Validate rom memory before accessing when SEV-SNP is active
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 13/40] x86/kernel: Make the bss.decrypted section shared in RMP table
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 17/40] KVM: SVM: Create a separate mapping for the SEV-ES save area
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 16/40] KVM: SVM: Define sev_features and vmpl field in the VMSA
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 15/40] x86/mm: Add support to validate memory when changing C-bit
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 09/40] x86/compressed: Add helper for validating pages in the decompression stage
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 04/40] x86/sev: Define the Linux specific guest termination reasons
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 05/40] x86/sev: Save the negotiated GHCB version
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 03/40] x86/mm: Extend cc_attr to include AMD SEV-SNP
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 02/40] x86/sev: detect/setup SEV/SME features earlier in boot
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v2 3/3] ghes_edac: refactor error status fields decoding
From
: Shuai Xue <xueshuai@xxxxxxxxxxxxxxxxx>
[PATCH v2 2/3] ghes_edac: refactor memory error location processing
From
: Shuai Xue <xueshuai@xxxxxxxxxxxxxxxxx>
[PATCH v2 1/3] ghes_edac: unify memory error report format with cper
From
: Shuai Xue <xueshuai@xxxxxxxxxxxxxxxxx>
[PATCH v2 0/3] ghes_edac: refactor memory error reporting to avoid code duplication
From
: Shuai Xue <xueshuai@xxxxxxxxxxxxxxxxx>
Re: [BUG] Enabling EFI runtime services causes panics in the T2 security chip on Macs equipped with it.
From
: Orlando Chamberlain <redecorating@xxxxxxxxxxxxxx>
[BUG] Enabling EFI runtime services causes panics in the T2 security chip on Macs equipped with it.
From
: Aditya Garg <gargaditya08@xxxxxxxx>
Re: [PATCH v3 07/13] riscv: Implement sv48 support
From
: 潘庆霖 <panqinglin2020@xxxxxxxxxxx>
Re: [PATCH v7 16/45] x86/sev: Register GHCB memory when SEV-SNP is active
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v3 0/5] x86: Show in sysfs if a memory node is able to do encryption
From
: Richard Hughes <hughsient@xxxxxxxxx>
Re: [PATCH 2/2] ghes_edac: refactor error status fields decoding
From
: Shuai Xue <xueshuai@xxxxxxxxxxxxxxxxx>
Re: [PATCH 2/2] ghes_edac: refactor error status fields decoding
From
: Robert Richter <rric@xxxxxxxxxx>
Re: [PATCH v3 0/5] x86: Show in sysfs if a memory node is able to do encryption
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH v3 0/5] x86: Show in sysfs if a memory node is able to do encryption
From
: Mike Rapoport <rppt@xxxxxxxxxx>
Re: [PATCH v3 0/5] x86: Show in sysfs if a memory node is able to do encryption
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH v3 0/5] x86: Show in sysfs if a memory node is able to do encryption
From
: Martin Fernandez <martin.fernandez@xxxxxxxxxxxxx>
Re: [PATCH v7 14/45] x86/compressed: Add helper for validating pages in the decompression stage
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH v5] random: fix crash on multiple early calls to add_bootloader_randomness()
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH v7 09/45] x86/sev: Save the negotiated GHCB version
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH 2/2] ghes_edac: refactor error status fields decoding
From
: Shuai Xue <xueshuai@xxxxxxxxxxxxxxxxx>
Re: [PATCH v7 09/45] x86/sev: Save the negotiated GHCB version
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH 1/2] ghes_edac: refactor memory error location processing
From
: Shuai Xue <xueshuai@xxxxxxxxxxxxxxxxx>
Re: [PATCH v7 09/45] x86/sev: Save the negotiated GHCB version
From
: Tianyu Lan <ltykernel@xxxxxxxxx>
Re: [PATCH v7 14/45] x86/compressed: Add helper for validating pages in the decompression stage
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH 2/2] ghes_edac: refactor error status fields decoding
From
: Robert Richter <rric@xxxxxxxxxx>
Re: [PATCH 1/2] ghes_edac: refactor memory error location processing
From
: Robert Richter <rric@xxxxxxxxxx>
Re: [PATCH v3 0/5] x86: Show in sysfs if a memory node is able to do encryption
From
: Mike Rapoport <rppt@xxxxxxxxxx>
Re: [PATCH v5] random: fix crash on multiple early calls to add_bootloader_randomness()
From
: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v5] random: fix crash on multiple early calls to add_bootloader_randomness()
From
: Hsin-Yi Wang <hsinyi@xxxxxxxxxxxx>
[PATCH 0/2] ghes_edac: refactor memory error reporting to avoid code duplication
From
: Shuai Xue <xueshuai@xxxxxxxxxxxxxxxxx>
[PATCH 2/2] ghes_edac: refactor error status fields decoding
From
: Shuai Xue <xueshuai@xxxxxxxxxxxxxxxxx>
[PATCH 1/2] ghes_edac: refactor memory error location processing
From
: Shuai Xue <xueshuai@xxxxxxxxxxxxxxxxx>
Re: [PATCH v7 02/45] x86/sev: detect/setup SEV/SME features earlier in boot
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v4 14/20] mfd: intel_soc_pmic_chtwc: Add cht_wc_model data to struct intel_soc_pmic
From
: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
Re: [PATCH v4 14/20] mfd: intel_soc_pmic_chtwc: Add cht_wc_model data to struct intel_soc_pmic
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v5] random: fix crash on multiple early calls to add_bootloader_randomness()
From
: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v3 0/5] x86: Show in sysfs if a memory node is able to do encryption
From
: Richard Hughes <hughsient@xxxxxxxxx>
Re: [PATCH v4 14/20] mfd: intel_soc_pmic_chtwc: Add cht_wc_model data to struct intel_soc_pmic
From
: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
Re: [GIT PULL] EFI fix for v5.16
From
: pr-tracker-bot@xxxxxxxxxx
Re: [PATCH v7 13/45] x86/sev: Check the vmpl level
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v3 01/13] riscv: Move KASAN mapping next to the kernel mapping
From
: Jisheng Zhang <jszhang@xxxxxxxxxx>
Re: [PATCH v7 10/45] x86/sev: Add support for hypervisor feature VMGEXIT
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[GIT PULL] EFI fix for v5.16
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v2 00/10] Introduce sv48 support without relocatable kernel
From
: Heiko Stübner <heiko@xxxxxxxxx>
Re: [PATCH v3 00/13] Introduce sv48 support without relocatable kernel
From
: Alexandre ghiti <alex@xxxxxxxx>
Re: [PATCH v3 07/13] riscv: Implement sv48 support
From
: Alexandre ghiti <alex@xxxxxxxx>
[PATCH v3 13/13] riscv: Allow user to downgrade to sv39 when hw supports sv48 if !KASAN
From
: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
[PATCH v3 12/13] riscv: Initialize thread pointer before calling C functions
From
: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
[PATCH v3 11/13] Documentation: riscv: Add sv48 description to VM layout
From
: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
[PATCH v3 10/13] riscv: Improve virtual kernel memory layout dump
From
: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
[PATCH v3 09/13] riscv: Explicit comment about user virtual address space size
From
: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
[PATCH v3 08/13] riscv: Use pgtable_l4_enabled to output mmu_type in cpuinfo
From
: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
[PATCH v3 07/13] riscv: Implement sv48 support
From
: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
[PATCH v3 06/13] asm-generic: Prepare for riscv use of pud_alloc_one and pud_free
From
: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
[PATCH v3 04/13] riscv: Allow to dynamically define VA_BITS
From
: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
[PATCH v3 05/13] riscv: Get rid of MAXPHYSMEM configs
From
: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
[PATCH v3 03/13] riscv: Introduce functions to switch pt_ops
From
: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
Re: [PATCH v2 00/10] Introduce sv48 support without relocatable kernel
From
: Alexandre ghiti <alex@xxxxxxxx>
[PATCH v3 02/13] riscv: Split early kasan mapping to prepare sv48 introduction
From
: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
[PATCH v3 01/13] riscv: Move KASAN mapping next to the kernel mapping
From
: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
[PATCH v3 00/13] Introduce sv48 support without relocatable kernel
From
: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
[PATCH v4 17/20] extcon: intel-cht-wc: Support devs with Micro-B / USB-2 only Type-C connectors
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v4 20/20] extcon: intel-cht-wc: Report RID_A for ACA adapters
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v4 19/20] extcon: intel-cht-wc: Add support for registering a power_supply class-device
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v4 18/20] extcon: intel-cht-wc: Refactor cht_wc_extcon_get_charger()
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v4 16/20] extcon: intel-cht-wc: Use new cht_wc_model intel_soc_pmic field
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v4 15/20] i2c: cht-wc: Make charger i2c-client instantiation board/device-model specific
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v4 13/20] power: supply: bq25890: Use the devm_regmap_field_bulk_alloc() helper
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v4 14/20] mfd: intel_soc_pmic_chtwc: Add cht_wc_model data to struct intel_soc_pmic
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v4 08/20] power: supply: bq25890: Drop dev->platform_data == NULL check
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v4 09/20] power: supply: bq25890: Add bq25890_set_otg_cfg() helper
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v4 07/20] power: supply: bq25890: Enable charging on boards where we skip reset
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v4 11/20] power: supply: bq25890: On the bq25892 set the IINLIM based on external charger detection
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v4 12/20] power: supply: bq25890: Support higher charging voltages through Pump Express+ protocol
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v4 10/20] power: supply: bq25890: Add support for registering the Vbus boost converter as a regulator
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v4 06/20] power: supply: bq25890: Add support to read back the settings from the chip
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v4 05/20] power: supply: bq25890: Add support to skip reset at probe() / remove()
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v4 04/20] power: supply: bq25890: Add a bq25890_rw_init_data() helper
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v4 03/20] power: supply: bq25890: Reduce reported CONSTANT_CHARGE_CURRENT_MAX for low temperatures
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v4 02/20] power: supply: bq25890: Rename IILIM field to IINLIM
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v4 01/20] power: supply: core: Refactor power_supply_set_input_current_limit_from_supplier()
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v4 00/20] power-suppy/i2c/extcon: Fix charger setup on Xiaomi Mi Pad 2 and Lenovo Yogabook
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
Re: [PATCH v4] random: fix crash on multiple early calls to add_bootloader_randomness()
From
: "Ivan T. Ivanov" <iivanov@xxxxxxx>
Re: [PATCH v6 3/5] virt: Add efi_secret module to expose confidential computing secrets
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v4] random: fix crash on multiple early calls to add_bootloader_randomness()
From
: Hsin-Yi Wang <hsinyi@xxxxxxxxxxxx>
[efi:urgent] BUILD SUCCESS 1ff2fc02862d52e18fd3daabcfe840ec27e920a8
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v3 0/5] x86: Show in sysfs if a memory node is able to do encryption
From
: Mike Rapoport <rppt@xxxxxxxxxx>
Re: [PATCH v3 5/5] drivers/node: Show in sysfs node's crypto capabilities
From
: Martin Fernandez <martin.fernandez@xxxxxxxxxxxxx>
Re: [PATCH v8 09/17] KEYS: Rename get_builtin_and_secondary_restriction
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v3 5/5] drivers/node: Show in sysfs node's crypto capabilities
From
: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v3 5/5] drivers/node: Show in sysfs node's crypto capabilities
From
: Martin Fernandez <martin.fernandez@xxxxxxxxxxxxx>
Re: [PATCH v3 3/5] Tag e820_entry with crypto capabilities
From
: Mike Rapoport <rppt@xxxxxxxxxx>
Re: [PATCH v3 5/5] drivers/node: Show in sysfs node's crypto capabilities
From
: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v3 3/5] Tag e820_entry with crypto capabilities
From
: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
[efi:urgent] BUILD SUCCESS 5538a0e5e4da583f494fcf9f0db830bee942a979
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v11 1/4] efi: Introduce EFI_FIRMWARE_MANAGEMENT_CAPSULE_HEADER and corresponding structures
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v11 1/4] efi: Introduce EFI_FIRMWARE_MANAGEMENT_CAPSULE_HEADER and corresponding structures
From
: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
Re: [PATCH v2] x86/sme: Explicitly map new EFI memmap table as encrypted
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4] random: fix crash on multiple early calls to add_bootloader_randomness()
From
: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v4] random: fix crash on multiple early calls to add_bootloader_randomness()
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH v2] x86/sme: Explicitly map new EFI memmap table as encrypted
From
: Tom Lendacky <thomas.lendacky@xxxxxxx>
Re: [PATCH v4] random: fix crash on multiple early calls to add_bootloader_randomness()
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH v2] x86/sme: Explicitly map new EFI memmap table as encrypted
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v4] random: fix crash on multiple early calls to add_bootloader_randomness()
From
: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
[efi:urgent] BUILD SUCCESS 8f1dd76c9b552aa5a53e4c0b6f6499251b02078c
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v7 10/45] x86/sev: Add support for hypervisor feature VMGEXIT
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v3, resend] random: fix crash on multiple early calls to add_bootloader_randomness()
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH v3, resend] random: fix crash on multiple early calls to add_bootloader_randomness()
From
: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] x86/sme: Explicitly map new EFI memmap table as encrypted
From
: Tom Lendacky <thomas.lendacky@xxxxxxx>
Re: [PATCH v8 09/17] KEYS: Rename get_builtin_and_secondary_restriction
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v8 09/17] KEYS: Rename get_builtin_and_secondary_restriction
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v8 09/17] KEYS: Rename get_builtin_and_secondary_restriction
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH v8 03/17] integrity: Introduce a Linux keyring called machine
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH] efi: Move efifb_setup_from_dmi() prototype from arch headers
From
: Thomas Zimmermann <tzimmermann@xxxxxxx>
[PATCH v6 0/5] Allow guest access to EFI confidential computing secret area
From
: Dov Murik <dovmurik@xxxxxxxxxxxxx>
[PATCH v6 2/5] efi/libstub: Reserve confidential computing secret area
From
: Dov Murik <dovmurik@xxxxxxxxxxxxx>
[PATCH v6 1/5] efi: Save location of EFI confidential computing area
From
: Dov Murik <dovmurik@xxxxxxxxxxxxx>
[PATCH v6 3/5] virt: Add efi_secret module to expose confidential computing secrets
From
: Dov Murik <dovmurik@xxxxxxxxxxxxx>
[PATCH v6 5/5] docs: security: Add coco/efi_secret documentation
From
: Dov Murik <dovmurik@xxxxxxxxxxxxx>
[PATCH v6 4/5] efi: Load efi_secret module if EFI secret area is populated
From
: Dov Murik <dovmurik@xxxxxxxxxxxxx>
Re: [PATCH v2 10/20] power: supply: bq25890: Add bq25890_set_otg_cfg() helper
From
: Yauhen Kharuzhy <jekhor@xxxxxxxxx>
[PATCH v3 20/20] extcon: intel-cht-wc: Report RID_A for ACA adapters
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v3 19/20] extcon: intel-cht-wc: Add support for registering a power_supply class-device
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v3 18/20] extcon: intel-cht-wc: Refactor cht_wc_extcon_get_charger()
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v3 17/20] extcon: intel-cht-wc: Support devs with Micro-B / USB-2 only Type-C connectors
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v3 16/20] extcon: intel-cht-wc: Use new cht_wc_model intel_soc_pmic field
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v3 15/20] i2c: cht-wc: Make charger i2c-client instantiation board/device-model specific
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v3 14/20] mfd: intel_soc_pmic_chtwc: Add cht_wc_model data to struct intel_soc_pmic
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v3 13/20] power: supply: bq25890: Use the devm_regmap_field_bulk_alloc() helper
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v3 12/20] power: supply: bq25890: Support higher charging voltages through Pump Express+ protocol
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v3 11/20] power: supply: bq25890: On the bq25892 set the IINLIM based on external charger detection
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v3 10/20] power: supply: bq25890: Add support for registering the Vbus boost converter as a regulator
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[Index of Archives]
[Linux Kernel Development]
[Security]
[Linux ARM Kernel]
[Tools]
[Linux MIPS]
[Linux S390]
[Bugtraq]
[Share Photos]>
[Fedora ARM]