Linux EFI/UEFI Development
Thread Index
[
Prev Page
][
Next Page
]
[GIT PULL] EFI updates for v5.17
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [BUG][SEVERE] Enabling EFI runtime services causes panics in the T2 security chip on Macs equipped with it.
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [BUG][SEVERE] Enabling EFI runtime services causes panics in the T2 security chip on Macs equipped with it.
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [BUG][SEVERE] Enabling EFI runtime services causes panics in the T2 security chip on Macs equipped with it.
From
: Aditya Garg <gargaditya08@xxxxxxxx>
Re: [PATCH v6 0/5] Allow guest access to EFI confidential computing secret area
From
: "Dr. David Alan Gilbert" <dgilbert@xxxxxxxxxx>
Re: [BUG][SEVERE] Enabling EFI runtime services causes panics in the T2 security chip on Macs equipped with it.
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[BUG][SEVERE] Enabling EFI runtime services causes panics in the T2 security chip on Macs equipped with it.
From
: Aditya Garg <gargaditya08@xxxxxxxx>
Re: [PATCH v6 0/5] Allow guest access to EFI confidential computing secret area
From
: Dov Murik <dovmurik@xxxxxxxxxxxxx>
Re: [PATCH v3 12/13] riscv: Initialize thread pointer before calling C functions
From
: Alexandre ghiti <alex@xxxxxxxx>
Re: [PATCH v9 8/8] integrity: Only use machine keyring when uefi_check_trust_mok_keys is true
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v9 5/8] KEYS: Introduce link restriction for machine keys
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v9 2/8] integrity: Introduce a Linux keyring called machine
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v9 8/8] integrity: Only use machine keyring when uefi_check_trust_mok_keys is true
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v9 8/8] integrity: Only use machine keyring when uefi_check_trust_mok_keys is true
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v9 7/8] integrity: Trust MOK keys if MokListTrustedRT found
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v9 6/8] efi/mokvar: move up init order
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v9 5/8] KEYS: Introduce link restriction for machine keys
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v9 4/8] KEYS: store reference to machine keyring
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v9 3/8] integrity: add new keyring handler for mok keys
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v9 1/8] integrity: Fix warning about missing prototypes
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
[efi:next] BUILD SUCCESS 42f4046bc4ba56c6e4d2af7a9d7f70eaa563daec
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v6 0/5] Allow guest access to EFI confidential computing secret area
From
: Peter Gonda <pgonda@xxxxxxxxxx>
Re: [PATCH v8 28/40] KVM: SEV: Add documentation for SEV-SNP CPUID Enforcement
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v6 0/5] Allow guest access to EFI confidential computing secret area
From
: Borislav Petkov <bp@xxxxxxx>
Re: [PATCH v8 27/40] x86/boot: Add Confidential Computing type to setup_data
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v8 27/40] x86/boot: Add Confidential Computing type to setup_data
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v8 13/40] x86/kernel: Make the bss.decrypted section shared in RMP table
From
: Tom Lendacky <thomas.lendacky@xxxxxxx>
Re: [PATCH v8 26/40] x86/compressed/acpi: move EFI vendor table lookup to helper
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v8 22/40] x86/sev: move MSR-based VMGEXITs for CPUID to helper
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v8 25/40] x86/compressed/acpi: move EFI config table lookup to helper
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v8 22/40] x86/sev: move MSR-based VMGEXITs for CPUID to helper
From
: Michael Roth <michael.roth@xxxxxxx>
Re: [PATCH v8 13/40] x86/kernel: Make the bss.decrypted section shared in RMP table
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v8 24/40] x86/compressed/acpi: move EFI system table lookup to helper
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v8 13/40] x86/kernel: Make the bss.decrypted section shared in RMP table
From
: Tom Lendacky <thomas.lendacky@xxxxxxx>
Re: [PATCH v8 23/40] KVM: x86: move lookup of indexed CPUID leafs to helper
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v8 22/40] x86/sev: move MSR-based VMGEXITs for CPUID to helper
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v8 13/40] x86/kernel: Make the bss.decrypted section shared in RMP table
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH] efi: use default_groups in kobj_type
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v9 3/8] integrity: add new keyring handler for mok keys
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v9 0/8] Enroll kernel keys thru MOK
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v9 2/8] integrity: Introduce a Linux keyring called machine
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v9 8/8] integrity: Only use machine keyring when uefi_check_trust_mok_keys is true
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v9 1/8] integrity: Fix warning about missing prototypes
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v9 5/8] KEYS: Introduce link restriction for machine keys
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v9 4/8] KEYS: store reference to machine keyring
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v9 7/8] integrity: Trust MOK keys if MokListTrustedRT found
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v9 6/8] efi/mokvar: move up init order
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH v8 24/40] x86/compressed/acpi: move EFI system table lookup to helper
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v8 13/40] x86/kernel: Make the bss.decrypted section shared in RMP table
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH v8 13/40] x86/kernel: Make the bss.decrypted section shared in RMP table
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH v6 0/5] Allow guest access to EFI confidential computing secret area
From
: "Dr. David Alan Gilbert" <dgilbert@xxxxxxxxxx>
Re: [PATCH v8 13/40] x86/kernel: Make the bss.decrypted section shared in RMP table
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH v6 0/5] Allow guest access to EFI confidential computing secret area
From
: Borislav Petkov <bp@xxxxxxx>
Re: [PATCH v8 19/40] KVM: SVM: Update the SEV-ES save area mapping
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v8 18/40] KVM: SVM: Create a separate mapping for the GHCB save area
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
[PATCH] efi: use default_groups in kobj_type
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v6 0/5] Allow guest access to EFI confidential computing secret area
From
: "Dr. David Alan Gilbert" <dgilbert@xxxxxxxxxx>
Re: [PATCH v8 17/40] KVM: SVM: Create a separate mapping for the SEV-ES save area
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v8 22/40] x86/sev: move MSR-based VMGEXITs for CPUID to helper
From
: Michael Roth <michael.roth@xxxxxxx>
Re: [PATCH v8 16/40] KVM: SVM: Define sev_features and vmpl field in the VMSA
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v8 15/40] x86/mm: Add support to validate memory when changing C-bit
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v8 22/40] x86/sev: move MSR-based VMGEXITs for CPUID to helper
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v6 0/5] Allow guest access to EFI confidential computing secret area
From
: Borislav Petkov <bp@xxxxxxx>
Re: [PATCH v2] builddeb: Support signing kernels with the module signing key
From
: Matthew Wilcox <willy@xxxxxxxxxxxxx>
Re: [PATCH v8 13/40] x86/kernel: Make the bss.decrypted section shared in RMP table
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v2] builddeb: Support signing kernels with the module signing key
From
: Masahiro Yamada <masahiroy@xxxxxxxxxx>
Re: [PATCH v8 12/40] x86/sev: Add helper for validating pages in early enc attribute changes
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH v8 08/40] x86/sev: Check the vmpl level
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH v4] random: fix crash on multiple early calls to add_bootloader_randomness()
From
: "Ivan T. Ivanov" <iivanov@xxxxxxx>
Re: [PATCH v3 07/13] riscv: Implement sv48 support
From
: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
Re: [PATCH v3 07/13] riscv: Implement sv48 support
From
: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
Re: [PATCH v6 0/5] Allow guest access to EFI confidential computing secret area
From
: Dov Murik <dovmurik@xxxxxxxxxxxxx>
Re: [PATCH v8 12/40] x86/sev: Add helper for validating pages in early enc attribute changes
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v8 11/40] x86/sev: Register GHCB memory when SEV-SNP is active
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v8 10/40] x86/compressed: Register GHCB memory when SEV-SNP is active
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v6 0/5] Allow guest access to EFI confidential computing secret area
From
: Borislav Petkov <bp@xxxxxxx>
Re: [PATCH v8 09/40] x86/compressed: Add helper for validating pages in the decompression stage
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v8 20/40] x86/sev: Use SEV-SNP AP creation to start secondary CPUs
From
: Vlastimil Babka <vbabka@xxxxxxx>
Re: [PATCH v8 21/40] x86/head: re-enable stack protection for 32/64-bit builds
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v8 20/40] x86/sev: Use SEV-SNP AP creation to start secondary CPUs
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v2 1/3] ghes_edac: unify memory error report format with cper
From
: Shuai Xue <xueshuai@xxxxxxxxxxxxxxxxx>
Re: [PATCH v8 22/40] x86/sev: move MSR-based VMGEXITs for CPUID to helper
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH v4] random: fix crash on multiple early calls to add_bootloader_randomness()
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH v2 1/3] ghes_edac: unify memory error report format with cper
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v8.1 7/7] random: move NUMA-related code to CONFIG_NUMA section
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH v8 6/7] random: early initialization of ChaCha constants
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH v8 5/7] random: harmonize "crng init done" messages
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH v8 4/7] random: mix bootloader randomness into pool
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH v8 3/7] random: do not throw away excess input to crng_fast_load
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH v8 2/7] random: do not re-init if crng_reseed completes before primary init
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH v8 1/7] random: fix crash on multiple early calls to add_bootloader_randomness()
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH v8 17/40] KVM: SVM: Create a separate mapping for the SEV-ES save area
From
: Borislav Petkov <bp@xxxxxxxxx>
[PATCH v8.1 7/7] random: move NUMA-related code to CONFIG_NUMA section
From
: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
[PATCH v8 6/7] random: early initialization of ChaCha constants
From
: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
[PATCH v8 4/7] random: mix bootloader randomness into pool
From
: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
[PATCH v8 1/7] random: fix crash on multiple early calls to add_bootloader_randomness()
From
: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
[PATCH v8 5/7] random: harmonize "crng init done" messages
From
: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
[PATCH v8 2/7] random: do not re-init if crng_reseed completes before primary init
From
: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
[PATCH v8 7/7] random: move crng_initialize_secondary to CONFIG_NUMA section
From
: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
[PATCH v8 3/7] random: do not throw away excess input to crng_fast_load
From
: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v8 15/40] x86/mm: Add support to validate memory when changing C-bit
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v3 07/13] riscv: Implement sv48 support
From
: Guo Ren <guoren@xxxxxxxxxx>
Re: [PATCH v2 1/3] ghes_edac: unify memory error report format with cper
From
: Shuai Xue <xueshuai@xxxxxxxxxxxxxxxxx>
Re: [PATCH v2 1/3] ghes_edac: unify memory error report format with cper
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v8 14/40] x86/kernel: Validate rom memory before accessing when SEV-SNP is active
From
: Borislav Petkov <bp@xxxxxxxxx>
[PATCH v7 4/4] random: mix bootloader randomness into pool
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH v7 3/4] random: do not throw away excess input to crng_fast_load
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH v7 2/4] random: do not re-init if crng_reseed completes before primary init
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH v7 1/4] random: fix crash on multiple early calls to add_bootloader_randomness()
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH v6] random: fix crash on multiple early calls to add_bootloader_randomness()
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH v8 13/40] x86/kernel: Make the bss.decrypted section shared in RMP table
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [GIT PULL] EFI fix for 5.16 (#2)
From
: pr-tracker-bot@xxxxxxxxxx
[GIT PULL] EFI fix for 5.16 (#2)
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v3 07/13] riscv: Implement sv48 support
From
: Jisheng Zhang <jszhang3@xxxxxxxxxxxxxxxx>
[PATCH v6] random: fix crash on multiple early calls to add_bootloader_randomness()
From
: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v8 12/40] x86/sev: Add helper for validating pages in early enc attribute changes
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCHv3] efi: apply memblock cap after memblock_add()
From
: "Leizhen (ThunderTown)" <thunder.leizhen@xxxxxxxxxx>
Re: [PATCH v4 3/5] x86/e820: Tag e820_entry with crypto capabilities
From
: Martin Fernandez <martin.fernandez@xxxxxxxxxxxxx>
Re: [PATCH v8 11/40] x86/sev: Register GHCB memory when SEV-SNP is active
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH v8 11/40] x86/sev: Register GHCB memory when SEV-SNP is active
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCHv3] efi: apply memblock cap after memblock_add()
From
: "Leizhen (ThunderTown)" <thunder.leizhen@xxxxxxxxxx>
[PATCH v13 1/4] efi: Introduce EFI_FIRMWARE_MANAGEMENT_CAPSULE_HEADER and corresponding structures
From
: Chen Yu <yu.c.chen@xxxxxxxxx>
Re: [PATCHv3] efi: apply memblock cap after memblock_add()
From
: Rob Herring <robh@xxxxxxxxxx>
Re: [PATCH v8 09/40] x86/compressed: Add helper for validating pages in the decompression stage
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v4 3/5] x86/e820: Tag e820_entry with crypto capabilities
From
: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v4 3/5] x86/e820: Tag e820_entry with crypto capabilities
From
: Martin Fernandez <martin.fernandez@xxxxxxxxxxxxx>
Re: [PATCH v8 08/40] x86/sev: Check the vmpl level
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v4 3/5] x86/e820: Tag e820_entry with crypto capabilities
From
: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v5] random: fix crash on multiple early calls to add_bootloader_randomness()
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH 4.19 15/56] x86: Make ARCH_USE_MEMREMAP_PROT a generic Kconfig symbol
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
[PATCH 4.14 15/45] x86: Make ARCH_USE_MEMREMAP_PROT a generic Kconfig symbol
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v3 12/13] riscv: Initialize thread pointer before calling C functions
From
: Guo Ren <guoren@xxxxxxxxxx>
Re: [PATCH v3 12/13] riscv: Initialize thread pointer before calling C functions
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v3 12/13] riscv: Initialize thread pointer before calling C functions
From
: Guo Ren <guoren@xxxxxxxxxx>
[PATCH v2] builddeb: Support signing kernels with the module signing key
From
: "Matthew Wilcox (Oracle)" <willy@xxxxxxxxxxxxx>
Re: [PATCH v8 09/40] x86/compressed: Add helper for validating pages in the decompression stage
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH v8 08/40] x86/sev: Check the vmpl level
From
: Tom Lendacky <thomas.lendacky@xxxxxxx>
Re: [PATCH v8 08/40] x86/sev: Check the vmpl level
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH v8 09/40] x86/compressed: Add helper for validating pages in the decompression stage
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH] builddeb: Support signing kernels with a Machine Owner Key
From
: Masahiro Yamada <masahiroy@xxxxxxxxxx>
Re: [PATCHv3] efi: apply memblock cap after memblock_add()
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCHv3] efi: apply memblock cap after memblock_add()
From
: Rob Herring <robh+dt@xxxxxxxxxx>
Re: [PATCH v4 14/20] mfd: intel_soc_pmic_chtwc: Add cht_wc_model data to struct intel_soc_pmic
From
: Lee Jones <lee.jones@xxxxxxxxxx>
Re: [PATCH v8 08/40] x86/sev: Check the vmpl level
From
: Mikolaj Lisik <lisik@xxxxxxxxxx>
Re: [PATCH] builddeb: Support signing kernels with a Machine Owner Key
From
: Matthew Wilcox <willy@xxxxxxxxxxxxx>
Re: [PATCH v8 08/40] x86/sev: Check the vmpl level
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v8 07/40] x86/sev: Add a helper for the PVALIDATE instruction
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v8 06/40] x86/sev: Check SEV-SNP features support
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH RFC 0/5] Handle UEFI NX-restricted page tables
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v8 06/40] x86/sev: Check SEV-SNP features support
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v8 06/40] x86/sev: Check SEV-SNP features support
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v12 1/4] efi: Introduce EFI_FIRMWARE_MANAGEMENT_CAPSULE_HEADER and corresponding structures
From
: Chen Yu <yu.c.chen@xxxxxxxxx>
Re: [PATCH v8 06/40] x86/sev: Check SEV-SNP features support
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCHv3] efi: apply memblock cap after memblock_add()
From
: "Leizhen (ThunderTown)" <thunder.leizhen@xxxxxxxxxx>
Re: [PATCH v2 0/3] ghes_edac: refactor memory error reporting to avoid code duplication
From
: Shuai Xue <xueshuai@xxxxxxxxxxxxxxxxx>
[efi:next] BUILD SUCCESS 21e42b00f779ceeac0eb022c747d8f0953805897
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v4 20/20] extcon: intel-cht-wc: Report RID_A for ACA adapters
From
: Chanwoo Choi <cw00.choi@xxxxxxxxxxx>
Re: [PATCH v4 19/20] extcon: intel-cht-wc: Add support for registering a power_supply class-device
From
: Chanwoo Choi <cw00.choi@xxxxxxxxxxx>
Re: [PATCH v4 18/20] extcon: intel-cht-wc: Refactor cht_wc_extcon_get_charger()
From
: Chanwoo Choi <cw00.choi@xxxxxxxxxxx>
Re: [PATCH v4 17/20] extcon: intel-cht-wc: Support devs with Micro-B / USB-2 only Type-C connectors
From
: Chanwoo Choi <cw00.choi@xxxxxxxxxxx>
Re: [PATCH v4 16/20] extcon: intel-cht-wc: Use new cht_wc_model intel_soc_pmic field
From
: Chanwoo Choi <cw00.choi@xxxxxxxxxxx>
[PATCH] efi: fix unmet dependency on CRYPTO for CRYPTO_LIB_SHA256
From
: Julian Braha <julianbraha@xxxxxxxxx>
Re: [PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
From
: Michael Roth <michael.roth@xxxxxxx>
Re: [PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
From
: Michael Roth <michael.roth@xxxxxxx>
Re: [PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
From
: Michael Roth <michael.roth@xxxxxxx>
Re: [PATCH v8 09/17] KEYS: Rename get_builtin_and_secondary_restriction
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v8 09/17] KEYS: Rename get_builtin_and_secondary_restriction
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
From
: Michael Roth <michael.roth@xxxxxxx>
Re: [PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
From
: Michael Roth <michael.roth@xxxxxxx>
Re: [PATCHv3] efi: apply memblock cap after memblock_add()
From
: Rob Herring <robh+dt@xxxxxxxxxx>
Re: [PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
From
: Tom Lendacky <thomas.lendacky@xxxxxxx>
Re: [PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v6 0/5] Allow guest access to EFI confidential computing secret area
From
: Dov Murik <dovmurik@xxxxxxxxxxxxx>
Re: [PATCHv3] efi: apply memblock cap after memblock_add()
From
: Pingfan Liu <kernelfans@xxxxxxxxx>
Re: [PATCHv3] efi: apply memblock cap after memblock_add()
From
: "Leizhen (ThunderTown)" <thunder.leizhen@xxxxxxxxxx>
Re: [PATCHv3] efi: apply memblock cap after memblock_add()
From
: Pingfan Liu <kernelfans@xxxxxxxxx>
Re: [PATCHv3] efi: apply memblock cap after memblock_add()
From
: "Leizhen (ThunderTown)" <thunder.leizhen@xxxxxxxxxx>
[PATCHv3] efi: apply memblock cap after memblock_add()
From
: Pingfan Liu <kernelfans@xxxxxxxxx>
Re: [PATCHv2 2/2] efi: apply memblock cap after memblock_add()
From
: Pingfan Liu <kernelfans@xxxxxxxxx>
Re: [PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v8 04/40] x86/sev: Define the Linux specific guest termination reasons
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v8 03/40] x86/mm: Extend cc_attr to include AMD SEV-SNP
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCHv2 2/2] efi: apply memblock cap after memblock_add()
From
: Rob Herring <robh+dt@xxxxxxxxxx>
[PATCHv2 2/2] efi: apply memblock cap after memblock_add()
From
: Pingfan Liu <kernelfans@xxxxxxxxx>
[PATCHv2 1/2] of: fdt: Aggregate the processing of "linux,usable-memory-range"
From
: Pingfan Liu <kernelfans@xxxxxxxxx>
[PATCHv2 0/2] arm64: fdt: fix membock add/cap ordering
From
: Pingfan Liu <kernelfans@xxxxxxxxx>
[efi:urgent] BUILD SUCCESS 4bc5e64e6cf37007e436970024e5998ee0935651
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v8 05/40] x86/sev: Save the negotiated GHCB version
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v8 04/40] x86/sev: Define the Linux specific guest termination reasons
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v8 03/40] x86/mm: Extend cc_attr to include AMD SEV-SNP
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v8 02/40] x86/sev: detect/setup SEV/SME features earlier in boot
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v8 24/40] x86/compressed/acpi: move EFI system table lookup to helper
From
: Michael Roth <michael.roth@xxxxxxx>
Re: [PATCH v8 33/40] x86/compressed/64: add identity mapping for Confidential Computing blob
From
: Michael Roth <michael.roth@xxxxxxx>
Re: [PATCH v8 24/40] x86/compressed/acpi: move EFI system table lookup to helper
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH v8 27/40] x86/boot: Add Confidential Computing type to setup_data
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH v8 24/40] x86/compressed/acpi: move EFI system table lookup to helper
From
: Michael Roth <michael.roth@xxxxxxx>
Re: [PATCH 0/4 v3] measure initrd data loaded by the EFI stub
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v8 27/40] x86/boot: Add Confidential Computing type to setup_data
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH v8 27/40] x86/boot: Add Confidential Computing type to setup_data
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH v8 39/40] virt: sevguest: Add support to derive key
From
: Liam Merwick <liam.merwick@xxxxxxxxxx>
Re: [PATCH v8 27/40] x86/boot: Add Confidential Computing type to setup_data
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH v8 00/40] Add AMD Secure Nested Paging (SEV-SNP) Guest Support
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH v8 27/40] x86/boot: Add Confidential Computing type to setup_data
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH v8 00/40] Add AMD Secure Nested Paging (SEV-SNP) Guest Support
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH v8 33/40] x86/compressed/64: add identity mapping for Confidential Computing blob
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH v8 27/40] x86/boot: Add Confidential Computing type to setup_data
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v8 24/40] x86/compressed/acpi: move EFI system table lookup to helper
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH v8 20/40] x86/sev: Use SEV-SNP AP creation to start secondary CPUs
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
[PATCH v8 06/40] x86/sev: Check SEV-SNP features support
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 07/40] x86/sev: Add a helper for the PVALIDATE instruction
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 08/40] x86/sev: Check the vmpl level
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 10/40] x86/compressed: Register GHCB memory when SEV-SNP is active
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 00/40] Add AMD Secure Nested Paging (SEV-SNP) Guest Support
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 34/40] x86/sev: add SEV-SNP feature detection/setup
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 32/40] x86/compressed: use firmware-validated CPUID for SEV-SNP guests
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 35/40] x86/sev: use firmware-validated CPUID for SEV-SNP guests
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 36/40] x86/sev: Provide support for SNP guest request NAEs
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 39/40] virt: sevguest: Add support to derive key
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 40/40] virt: sevguest: Add support to get extended report
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 37/40] x86/sev: Register SNP guest request platform device
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 38/40] virt: Add SEV-SNP guest driver
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 33/40] x86/compressed/64: add identity mapping for Confidential Computing blob
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 11/40] x86/sev: Register GHCB memory when SEV-SNP is active
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 31/40] x86/compressed: add SEV-SNP feature detection/setup
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 30/40] x86/boot: add a pointer to Confidential Computing blob in bootparams
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 25/40] x86/compressed/acpi: move EFI config table lookup to helper
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 29/40] x86/compressed/64: add support for SEV-SNP CPUID table in #VC handlers
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 12/40] x86/sev: Add helper for validating pages in early enc attribute changes
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 26/40] x86/compressed/acpi: move EFI vendor table lookup to helper
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 28/40] KVM: SEV: Add documentation for SEV-SNP CPUID Enforcement
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 27/40] x86/boot: Add Confidential Computing type to setup_data
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 18/40] KVM: SVM: Create a separate mapping for the GHCB save area
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 21/40] x86/head: re-enable stack protection for 32/64-bit builds
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 23/40] KVM: x86: move lookup of indexed CPUID leafs to helper
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 24/40] x86/compressed/acpi: move EFI system table lookup to helper
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 20/40] x86/sev: Use SEV-SNP AP creation to start secondary CPUs
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 22/40] x86/sev: move MSR-based VMGEXITs for CPUID to helper
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 19/40] KVM: SVM: Update the SEV-ES save area mapping
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 14/40] x86/kernel: Validate rom memory before accessing when SEV-SNP is active
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 13/40] x86/kernel: Make the bss.decrypted section shared in RMP table
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 17/40] KVM: SVM: Create a separate mapping for the SEV-ES save area
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 16/40] KVM: SVM: Define sev_features and vmpl field in the VMSA
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 15/40] x86/mm: Add support to validate memory when changing C-bit
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 09/40] x86/compressed: Add helper for validating pages in the decompression stage
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 04/40] x86/sev: Define the Linux specific guest termination reasons
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 05/40] x86/sev: Save the negotiated GHCB version
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 03/40] x86/mm: Extend cc_attr to include AMD SEV-SNP
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 02/40] x86/sev: detect/setup SEV/SME features earlier in boot
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v2 3/3] ghes_edac: refactor error status fields decoding
From
: Shuai Xue <xueshuai@xxxxxxxxxxxxxxxxx>
[PATCH v2 2/3] ghes_edac: refactor memory error location processing
From
: Shuai Xue <xueshuai@xxxxxxxxxxxxxxxxx>
[PATCH v2 1/3] ghes_edac: unify memory error report format with cper
From
: Shuai Xue <xueshuai@xxxxxxxxxxxxxxxxx>
[PATCH v2 0/3] ghes_edac: refactor memory error reporting to avoid code duplication
From
: Shuai Xue <xueshuai@xxxxxxxxxxxxxxxxx>
Re: [BUG] Enabling EFI runtime services causes panics in the T2 security chip on Macs equipped with it.
From
: Orlando Chamberlain <redecorating@xxxxxxxxxxxxxx>
[BUG] Enabling EFI runtime services causes panics in the T2 security chip on Macs equipped with it.
From
: Aditya Garg <gargaditya08@xxxxxxxx>
Re: [PATCH v3 07/13] riscv: Implement sv48 support
From
: 潘庆霖 <panqinglin2020@xxxxxxxxxxx>
Re: [PATCH v7 16/45] x86/sev: Register GHCB memory when SEV-SNP is active
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v3 0/5] x86: Show in sysfs if a memory node is able to do encryption
From
: Richard Hughes <hughsient@xxxxxxxxx>
Re: [PATCH 2/2] ghes_edac: refactor error status fields decoding
From
: Shuai Xue <xueshuai@xxxxxxxxxxxxxxxxx>
Re: [PATCH 2/2] ghes_edac: refactor error status fields decoding
From
: Robert Richter <rric@xxxxxxxxxx>
Re: [PATCH v3 0/5] x86: Show in sysfs if a memory node is able to do encryption
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH v3 0/5] x86: Show in sysfs if a memory node is able to do encryption
From
: Mike Rapoport <rppt@xxxxxxxxxx>
Re: [PATCH v3 0/5] x86: Show in sysfs if a memory node is able to do encryption
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH v3 0/5] x86: Show in sysfs if a memory node is able to do encryption
From
: Martin Fernandez <martin.fernandez@xxxxxxxxxxxxx>
Re: [PATCH v7 14/45] x86/compressed: Add helper for validating pages in the decompression stage
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH v5] random: fix crash on multiple early calls to add_bootloader_randomness()
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH v7 09/45] x86/sev: Save the negotiated GHCB version
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH 2/2] ghes_edac: refactor error status fields decoding
From
: Shuai Xue <xueshuai@xxxxxxxxxxxxxxxxx>
Re: [PATCH v7 09/45] x86/sev: Save the negotiated GHCB version
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH 1/2] ghes_edac: refactor memory error location processing
From
: Shuai Xue <xueshuai@xxxxxxxxxxxxxxxxx>
Re: [PATCH v7 09/45] x86/sev: Save the negotiated GHCB version
From
: Tianyu Lan <ltykernel@xxxxxxxxx>
Re: [PATCH v7 14/45] x86/compressed: Add helper for validating pages in the decompression stage
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH 2/2] ghes_edac: refactor error status fields decoding
From
: Robert Richter <rric@xxxxxxxxxx>
Re: [PATCH 1/2] ghes_edac: refactor memory error location processing
From
: Robert Richter <rric@xxxxxxxxxx>
Re: [PATCH v3 0/5] x86: Show in sysfs if a memory node is able to do encryption
From
: Mike Rapoport <rppt@xxxxxxxxxx>
Re: [PATCH v5] random: fix crash on multiple early calls to add_bootloader_randomness()
From
: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v5] random: fix crash on multiple early calls to add_bootloader_randomness()
From
: Hsin-Yi Wang <hsinyi@xxxxxxxxxxxx>
[PATCH 0/2] ghes_edac: refactor memory error reporting to avoid code duplication
From
: Shuai Xue <xueshuai@xxxxxxxxxxxxxxxxx>
[PATCH 2/2] ghes_edac: refactor error status fields decoding
From
: Shuai Xue <xueshuai@xxxxxxxxxxxxxxxxx>
[PATCH 1/2] ghes_edac: refactor memory error location processing
From
: Shuai Xue <xueshuai@xxxxxxxxxxxxxxxxx>
Re: [PATCH v7 02/45] x86/sev: detect/setup SEV/SME features earlier in boot
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v4 14/20] mfd: intel_soc_pmic_chtwc: Add cht_wc_model data to struct intel_soc_pmic
From
: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
Re: [PATCH v4 14/20] mfd: intel_soc_pmic_chtwc: Add cht_wc_model data to struct intel_soc_pmic
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v5] random: fix crash on multiple early calls to add_bootloader_randomness()
From
: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v3 0/5] x86: Show in sysfs if a memory node is able to do encryption
From
: Richard Hughes <hughsient@xxxxxxxxx>
Re: [PATCH v4 14/20] mfd: intel_soc_pmic_chtwc: Add cht_wc_model data to struct intel_soc_pmic
From
: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
Re: [GIT PULL] EFI fix for v5.16
From
: pr-tracker-bot@xxxxxxxxxx
Re: [PATCH v7 13/45] x86/sev: Check the vmpl level
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v3 01/13] riscv: Move KASAN mapping next to the kernel mapping
From
: Jisheng Zhang <jszhang@xxxxxxxxxx>
Re: [PATCH v7 10/45] x86/sev: Add support for hypervisor feature VMGEXIT
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[GIT PULL] EFI fix for v5.16
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v2 00/10] Introduce sv48 support without relocatable kernel
From
: Heiko Stübner <heiko@xxxxxxxxx>
Re: [PATCH v3 00/13] Introduce sv48 support without relocatable kernel
From
: Alexandre ghiti <alex@xxxxxxxx>
Re: [PATCH v3 07/13] riscv: Implement sv48 support
From
: Alexandre ghiti <alex@xxxxxxxx>
[PATCH v3 13/13] riscv: Allow user to downgrade to sv39 when hw supports sv48 if !KASAN
From
: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
[PATCH v3 12/13] riscv: Initialize thread pointer before calling C functions
From
: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
[PATCH v3 11/13] Documentation: riscv: Add sv48 description to VM layout
From
: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
[PATCH v3 10/13] riscv: Improve virtual kernel memory layout dump
From
: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
[PATCH v3 09/13] riscv: Explicit comment about user virtual address space size
From
: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
[PATCH v3 08/13] riscv: Use pgtable_l4_enabled to output mmu_type in cpuinfo
From
: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
[PATCH v3 07/13] riscv: Implement sv48 support
From
: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
[PATCH v3 06/13] asm-generic: Prepare for riscv use of pud_alloc_one and pud_free
From
: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
[PATCH v3 04/13] riscv: Allow to dynamically define VA_BITS
From
: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
[PATCH v3 05/13] riscv: Get rid of MAXPHYSMEM configs
From
: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
[PATCH v3 03/13] riscv: Introduce functions to switch pt_ops
From
: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
Re: [PATCH v2 00/10] Introduce sv48 support without relocatable kernel
From
: Alexandre ghiti <alex@xxxxxxxx>
[PATCH v3 02/13] riscv: Split early kasan mapping to prepare sv48 introduction
From
: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
[PATCH v3 01/13] riscv: Move KASAN mapping next to the kernel mapping
From
: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
[PATCH v3 00/13] Introduce sv48 support without relocatable kernel
From
: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
[PATCH v4 17/20] extcon: intel-cht-wc: Support devs with Micro-B / USB-2 only Type-C connectors
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v4 20/20] extcon: intel-cht-wc: Report RID_A for ACA adapters
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v4 19/20] extcon: intel-cht-wc: Add support for registering a power_supply class-device
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v4 18/20] extcon: intel-cht-wc: Refactor cht_wc_extcon_get_charger()
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v4 16/20] extcon: intel-cht-wc: Use new cht_wc_model intel_soc_pmic field
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v4 15/20] i2c: cht-wc: Make charger i2c-client instantiation board/device-model specific
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v4 13/20] power: supply: bq25890: Use the devm_regmap_field_bulk_alloc() helper
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v4 14/20] mfd: intel_soc_pmic_chtwc: Add cht_wc_model data to struct intel_soc_pmic
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v4 08/20] power: supply: bq25890: Drop dev->platform_data == NULL check
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v4 09/20] power: supply: bq25890: Add bq25890_set_otg_cfg() helper
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v4 07/20] power: supply: bq25890: Enable charging on boards where we skip reset
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v4 11/20] power: supply: bq25890: On the bq25892 set the IINLIM based on external charger detection
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v4 12/20] power: supply: bq25890: Support higher charging voltages through Pump Express+ protocol
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v4 10/20] power: supply: bq25890: Add support for registering the Vbus boost converter as a regulator
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v4 06/20] power: supply: bq25890: Add support to read back the settings from the chip
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v4 05/20] power: supply: bq25890: Add support to skip reset at probe() / remove()
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v4 04/20] power: supply: bq25890: Add a bq25890_rw_init_data() helper
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v4 03/20] power: supply: bq25890: Reduce reported CONSTANT_CHARGE_CURRENT_MAX for low temperatures
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v4 02/20] power: supply: bq25890: Rename IILIM field to IINLIM
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v4 01/20] power: supply: core: Refactor power_supply_set_input_current_limit_from_supplier()
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v4 00/20] power-suppy/i2c/extcon: Fix charger setup on Xiaomi Mi Pad 2 and Lenovo Yogabook
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
Re: [PATCH v4] random: fix crash on multiple early calls to add_bootloader_randomness()
From
: "Ivan T. Ivanov" <iivanov@xxxxxxx>
Re: [PATCH v6 3/5] virt: Add efi_secret module to expose confidential computing secrets
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v4] random: fix crash on multiple early calls to add_bootloader_randomness()
From
: Hsin-Yi Wang <hsinyi@xxxxxxxxxxxx>
[efi:urgent] BUILD SUCCESS 1ff2fc02862d52e18fd3daabcfe840ec27e920a8
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v3 0/5] x86: Show in sysfs if a memory node is able to do encryption
From
: Mike Rapoport <rppt@xxxxxxxxxx>
Re: [PATCH v3 5/5] drivers/node: Show in sysfs node's crypto capabilities
From
: Martin Fernandez <martin.fernandez@xxxxxxxxxxxxx>
Re: [PATCH v8 09/17] KEYS: Rename get_builtin_and_secondary_restriction
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v3 5/5] drivers/node: Show in sysfs node's crypto capabilities
From
: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v3 5/5] drivers/node: Show in sysfs node's crypto capabilities
From
: Martin Fernandez <martin.fernandez@xxxxxxxxxxxxx>
Re: [PATCH v3 3/5] Tag e820_entry with crypto capabilities
From
: Mike Rapoport <rppt@xxxxxxxxxx>
Re: [PATCH v3 5/5] drivers/node: Show in sysfs node's crypto capabilities
From
: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v3 3/5] Tag e820_entry with crypto capabilities
From
: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
[efi:urgent] BUILD SUCCESS 5538a0e5e4da583f494fcf9f0db830bee942a979
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v11 1/4] efi: Introduce EFI_FIRMWARE_MANAGEMENT_CAPSULE_HEADER and corresponding structures
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v11 1/4] efi: Introduce EFI_FIRMWARE_MANAGEMENT_CAPSULE_HEADER and corresponding structures
From
: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
Re: [PATCH v2] x86/sme: Explicitly map new EFI memmap table as encrypted
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v4] random: fix crash on multiple early calls to add_bootloader_randomness()
From
: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v4] random: fix crash on multiple early calls to add_bootloader_randomness()
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH v2] x86/sme: Explicitly map new EFI memmap table as encrypted
From
: Tom Lendacky <thomas.lendacky@xxxxxxx>
Re: [PATCH v4] random: fix crash on multiple early calls to add_bootloader_randomness()
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH v2] x86/sme: Explicitly map new EFI memmap table as encrypted
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v4] random: fix crash on multiple early calls to add_bootloader_randomness()
From
: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
[efi:urgent] BUILD SUCCESS 8f1dd76c9b552aa5a53e4c0b6f6499251b02078c
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v7 10/45] x86/sev: Add support for hypervisor feature VMGEXIT
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v3, resend] random: fix crash on multiple early calls to add_bootloader_randomness()
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH v3, resend] random: fix crash on multiple early calls to add_bootloader_randomness()
From
: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] x86/sme: Explicitly map new EFI memmap table as encrypted
From
: Tom Lendacky <thomas.lendacky@xxxxxxx>
Re: [PATCH v8 09/17] KEYS: Rename get_builtin_and_secondary_restriction
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v8 09/17] KEYS: Rename get_builtin_and_secondary_restriction
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v8 09/17] KEYS: Rename get_builtin_and_secondary_restriction
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH v8 03/17] integrity: Introduce a Linux keyring called machine
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH] efi: Move efifb_setup_from_dmi() prototype from arch headers
From
: Thomas Zimmermann <tzimmermann@xxxxxxx>
[PATCH v6 0/5] Allow guest access to EFI confidential computing secret area
From
: Dov Murik <dovmurik@xxxxxxxxxxxxx>
[PATCH v6 2/5] efi/libstub: Reserve confidential computing secret area
From
: Dov Murik <dovmurik@xxxxxxxxxxxxx>
[PATCH v6 1/5] efi: Save location of EFI confidential computing area
From
: Dov Murik <dovmurik@xxxxxxxxxxxxx>
[PATCH v6 3/5] virt: Add efi_secret module to expose confidential computing secrets
From
: Dov Murik <dovmurik@xxxxxxxxxxxxx>
[PATCH v6 5/5] docs: security: Add coco/efi_secret documentation
From
: Dov Murik <dovmurik@xxxxxxxxxxxxx>
[PATCH v6 4/5] efi: Load efi_secret module if EFI secret area is populated
From
: Dov Murik <dovmurik@xxxxxxxxxxxxx>
Re: [PATCH v2 10/20] power: supply: bq25890: Add bq25890_set_otg_cfg() helper
From
: Yauhen Kharuzhy <jekhor@xxxxxxxxx>
[PATCH v3 20/20] extcon: intel-cht-wc: Report RID_A for ACA adapters
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v3 19/20] extcon: intel-cht-wc: Add support for registering a power_supply class-device
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v3 18/20] extcon: intel-cht-wc: Refactor cht_wc_extcon_get_charger()
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v3 17/20] extcon: intel-cht-wc: Support devs with Micro-B / USB-2 only Type-C connectors
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v3 16/20] extcon: intel-cht-wc: Use new cht_wc_model intel_soc_pmic field
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v3 15/20] i2c: cht-wc: Make charger i2c-client instantiation board/device-model specific
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v3 14/20] mfd: intel_soc_pmic_chtwc: Add cht_wc_model data to struct intel_soc_pmic
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v3 13/20] power: supply: bq25890: Use the devm_regmap_field_bulk_alloc() helper
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v3 12/20] power: supply: bq25890: Support higher charging voltages through Pump Express+ protocol
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v3 11/20] power: supply: bq25890: On the bq25892 set the IINLIM based on external charger detection
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v3 10/20] power: supply: bq25890: Add support for registering the Vbus boost converter as a regulator
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v3 08/20] power: supply: bq25890: Drop dev->platform_data == NULL check
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v3 09/20] power: supply: bq25890: Add bq25890_set_otg_cfg() helper
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v3 07/20] power: supply: bq25890: Enable charging on boards where we skip reset
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v3 06/20] power: supply: bq25890: Add support to read back the settings from the chip
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v3 05/20] power: supply: bq25890: Add support to skip reset at probe() / remove()
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v3 04/20] power: supply: bq25890: Add a bq25890_rw_init_data() helper
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v3 03/20] power: supply: bq25890: Reduce reported CONSTANT_CHARGE_CURRENT_MAX for low temperatures
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v3 02/20] power: supply: bq25890: Rename IILIM field to IINLIM
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v3 01/20] power: supply: core: Refactor power_supply_set_input_current_limit_from_supplier()
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v3 00/20] power-suppy/i2c/extcon: Fix charger setup on Xiaomi Mi Pad 2 and Lenovo Yogabook
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
Re: [PATCH v2 10/20] power: supply: bq25890: Add bq25890_set_otg_cfg() helper
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
Re: [PATCH v2 18/20] extcon: intel-cht-wc: Refactor cht_wc_extcon_get_charger()
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
Re: [PATCH v2 15/20] i2c: cht-wc: Make charger i2c-client instantiation board/device-model specific
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
Re: [PATCH v2 14/20] mfd: intel_soc_pmic_chtwc: Add intel_cht_wc_get_model() helper function
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
Re: [PATCH v8 09/17] KEYS: Rename get_builtin_and_secondary_restriction
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v8 08/17] integrity: add new keyring handler for mok keys
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v8 06/17] KEYS: CA link restriction
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v8 05/17] X.509: Parse Basic Constraints for CA
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v8 04/17] integrity: Do not allow machine keyring updates following init
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v8 03/17] integrity: Introduce a Linux keyring called machine
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
[PATCH] efi: Move efifb_setup_from_dmi() prototype from arch headers
From
: Javier Martinez Canillas <javierm@xxxxxxxxxx>
Re: [PATCH v2 3/5] x86/e820: Tag e820_entry with crypto capabilities
From
: Martin Fernandez <martin.fernandez@xxxxxxxxxxxxx>
Re: [PATCH RFC 0/5] Handle UEFI NX-restricted page tables
From
: baskov@xxxxxxxxx
Re: [PATCH v2 3/5] x86/e820: Tag e820_entry with crypto capabilities
From
: Dov Murik <dovmurik@xxxxxxxxxxxxx>
Re: [PATCH v8 03/17] integrity: Introduce a Linux keyring called machine
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2 00/10] Introduce sv48 support without relocatable kernel
From
: Heiko Stübner <heiko@xxxxxxxxx>
Re: [PATCH v3] random: fix crash on multiple early calls to add_bootloader_randomness()
From
: "Ivan T. Ivanov" <iivanov@xxxxxxx>
[PATCH v8 01/17] KEYS: Create static version of public_key_verify_signature
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v8 08/17] integrity: add new keyring handler for mok keys
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v8 16/17] integrity: Trust MOK keys if MokListTrustedRT found
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v8 03/17] integrity: Introduce a Linux keyring called machine
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v8 15/17] efi/mokvar: move up init order
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v8 13/17] integrity: store reference to machine keyring
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v8 10/17] KEYS: add a reference to machine keyring
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v8 17/17] integrity: Only use machine keyring when uefi_check_trust_mok_keys is true
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v8 02/17] integrity: Fix warning about missing prototypes
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v8 14/17] KEYS: link machine trusted keys to secondary_trusted_keys
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v8 09/17] KEYS: Rename get_builtin_and_secondary_restriction
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v8 11/17] KEYS: Introduce link restriction for machine keys
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v8 12/17] KEYS: integrity: change link restriction to trust the machine keyring
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v8 06/17] KEYS: CA link restriction
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v8 05/17] X.509: Parse Basic Constraints for CA
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v8 07/17] integrity: restrict INTEGRITY_KEYRING_MACHINE to restrict_link_by_ca
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v8 04/17] integrity: Do not allow machine keyring updates following init
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v8 00/17] Enroll kernel keys thru MOK
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH v7 01/45] x86/compressed/64: detect/setup SEV/SME features earlier in boot
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v2 15/20] i2c: cht-wc: Make charger i2c-client instantiation board/device-model specific
From
: Wolfram Sang <wsa@xxxxxxxxxxxxx>
Re: [PATCH 0/4 v3] measure initrd data loaded by the EFI stub
From
: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
Re: [PATCH 0/4 v3] measure initrd data loaded by the EFI stub
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] include/linux/efi.h: Remove unneeded whitespaces before tabs
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v11 1/4] efi: Introduce EFI_FIRMWARE_MANAGEMENT_CAPSULE_HEADER and corresponding structures
From
: Chen Yu <yu.c.chen@xxxxxxxxx>
Re: [PATCH v7 43/45] virt: Add SEV-SNP guest driver
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH v7 43/45] virt: Add SEV-SNP guest driver
From
: Peter Gonda <pgonda@xxxxxxxxxx>
Re: [PATCH v2 18/20] extcon: intel-cht-wc: Refactor cht_wc_extcon_get_charger()
From
: Chanwoo Choi <cwchoi00@xxxxxxxxx>
[PATCH 4/4 v3] efi/libstub: measure loaded initrd info into the TPM
From
: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
[PATCH 3/4 v3] efi/libstub: consolidate initrd handling across architectures
From
: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
[PATCH 2/4 v3] efi/libstub: x86/mixed: increase supported argument count
From
: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
[PATCH 1/4 v3] efi/libstub: add prototype of efi_tcg2_protocol::hash_log_extend_event()
From
: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
[PATCH 0/4 v3] measure initrd data loaded by the EFI stub
From
: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
Re: [PATCH v7 11/17] KEYS: Introduce link restriction for machine keys
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH v7 12/17] KEYS: integrity: change link restriction to trust the machine keyring
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v7 11/17] KEYS: Introduce link restriction for machine keys
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v7 09/17] KEYS: Rename get_builtin_and_secondary_restriction
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v7 08/17] integrity: add new keyring handler for mok keys
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v7 04/17] X.509: Parse Basic Constraints for CA
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH v7 04/17] X.509: Parse Basic Constraints for CA
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v7 13/17] KEYS: link secondary_trusted_keys to machine trusted keys
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH v7 44/45] virt: sevguest: Add support to derive key
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH v7 43/45] virt: Add SEV-SNP guest driver
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH v7 43/45] virt: Add SEV-SNP guest driver
From
: Peter Gonda <pgonda@xxxxxxxxxx>
Re: [PATCH v7 44/45] virt: sevguest: Add support to derive key
From
: Peter Gonda <pgonda@xxxxxxxxxx>
Re: [PATCH v5 3/4] virt: Add efi_secret module to expose confidential computing secrets
From
: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v7 13/17] KEYS: link secondary_trusted_keys to machine trusted keys
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v5 2/4] efi/libstub: Reserve confidential computing secret area
From
: Dov Murik <dovmurik@xxxxxxxxxxxxx>
[PATCH v5 4/4] docs: security: Add coco/efi_secret documentation
From
: Dov Murik <dovmurik@xxxxxxxxxxxxx>
[PATCH v5 0/4] Allow guest access to EFI confidential computing secret area
From
: Dov Murik <dovmurik@xxxxxxxxxxxxx>
[PATCH v5 3/4] virt: Add efi_secret module to expose confidential computing secrets
From
: Dov Murik <dovmurik@xxxxxxxxxxxxx>
[PATCH v5 1/4] efi: Save location of EFI confidential computing area
From
: Dov Murik <dovmurik@xxxxxxxxxxxxx>
Re: [PATCH v7 00/17] Enroll kernel keys thru MOK
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v7 43/45] virt: Add SEV-SNP guest driver
From
: Peter Gonda <pgonda@xxxxxxxxxx>
Re: [PATCH v2 18/20] extcon: intel-cht-wc: Refactor cht_wc_extcon_get_charger()
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
Re: [PATCH v2 16/20] extcon: intel-cht-wc: Use new intel_cht_wc_get_model() helper
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
Re: [PATCH v2 00/20] power-suppy/i2c/extcon: Fix charger setup on Xiaomi Mi Pad 2 and Lenovo Yogabook
From
: Sebastian Reichel <sebastian.reichel@xxxxxxxxxxxxx>
Re: [PATCH v7 00/17] Enroll kernel keys thru MOK
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH v7 00/17] Enroll kernel keys thru MOK
From
: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx>
Re: [PATCH v7 07/17] integrity: Fix warning about missing prototypes
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v7 03/17] KEYS: Create static version of public_key_verify_signature
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v7 03/17] KEYS: Create static version of public_key_verify_signature
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v7 02/17] integrity: Do not allow machine keyring updates following init
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v7 02/45] x86/sev: detect/setup SEV/SME features earlier in boot
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v7 01/17] integrity: Introduce a Linux keyring called machine
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v7 00/17] Enroll kernel keys thru MOK
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v7 00/17] Enroll kernel keys thru MOK
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v2 18/20] extcon: intel-cht-wc: Refactor cht_wc_extcon_get_charger()
From
: Chanwoo Choi <cwchoi00@xxxxxxxxx>
Re: [PATCH v2 16/20] extcon: intel-cht-wc: Use new intel_cht_wc_get_model() helper
From
: Chanwoo Choi <cwchoi00@xxxxxxxxx>
Re: [PATCH v7 00/17] Enroll kernel keys thru MOK
From
: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx>
Re: [PATCH v7 00/17] Enroll kernel keys thru MOK
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v7 00/17] Enroll kernel keys thru MOK
From
: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx>
Re: [PATCH v7 00/45] Add AMD Secure Nested Paging (SEV-SNP) Guest Support
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH v7 00/17] Enroll kernel keys thru MOK
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v7 00/45] Add AMD Secure Nested Paging (SEV-SNP) Guest Support
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v2 19/20] extcon: intel-cht-wc: Add support for registering a power_supply class-device
From
: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
Re: [PATCH v2 17/20] extcon: intel-cht-wc: Support devs with Micro-B / USB-2 only Type-C connectors
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
Re: [PATCH v2 15/20] i2c: cht-wc: Make charger i2c-client instantiation board/device-model specific
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
Re: [PATCH v2 14/20] mfd: intel_soc_pmic_chtwc: Add intel_cht_wc_get_model() helper function
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
Re: [PATCH v2 13/20] power: supply: bq25890: Support higher charging voltages through Pump Express+ protocol
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
Re: [PATCH v2 17/20] extcon: intel-cht-wc: Support devs with Micro-B / USB-2 only Type-C connectors
From
: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
Re: [PATCH v2 17/20] extcon: intel-cht-wc: Support devs with Micro-B / USB-2 only Type-C connectors
From
: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
Re: [PATCH v2 17/20] extcon: intel-cht-wc: Support devs with Micro-B / USB-2 only Type-C connectors
From
: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
Re: [PATCH v2 15/20] i2c: cht-wc: Make charger i2c-client instantiation board/device-model specific
From
: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
Re: [PATCH v2 14/20] mfd: intel_soc_pmic_chtwc: Add intel_cht_wc_get_model() helper function
From
: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
Re: [PATCH v2 13/20] power: supply: bq25890: Support higher charging voltages through Pump Express+ protocol
From
: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
Re: [PATCH v2 11/20] power: supply: bq25890: Add support for registering the Vbus boost converter as a regulator
From
: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
Re: [PATCH v2 00/20] power-suppy/i2c/extcon: Fix charger setup on Xiaomi Mi Pad 2 and Lenovo Yogabook
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
Re: [PATCH v2 09/20] power: supply: bq25890: Drop dev->platform_data == NULL check
From
: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
Re: [PATCH v2 00/20] power-suppy/i2c/extcon: Fix charger setup on Xiaomi Mi Pad 2 and Lenovo Yogabook
From
: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
Re: [PATCH v2 04/20] power: supply: bq25890: Reduce reported CONSTANT_CHARGE_CURRENT_MAX for low temperatures
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
Re: [PATCH v2 10/20] power: supply: bq25890: Add bq25890_set_otg_cfg() helper
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
Re: [PATCH v7 02/45] x86/sev: detect/setup SEV/SME features earlier in boot
From
: Borislav Petkov <bp@xxxxxxxxx>
[PATCH v7 03/17] KEYS: Create static version of public_key_verify_signature
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v7 08/17] integrity: add new keyring handler for mok keys
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v7 09/17] KEYS: Rename get_builtin_and_secondary_restriction
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v7 17/17] integrity: Only use machine keyring when uefi_check_trust_mok_keys is true
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v7 11/17] KEYS: Introduce link restriction for machine keys
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v7 10/17] KEYS: add a reference to machine keyring
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v7 16/17] integrity: Trust MOK keys if MokListTrustedRT found
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v7 14/17] integrity: store reference to machine keyring
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v7 15/17] efi/mokvar: move up init order
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v7 13/17] KEYS: link secondary_trusted_keys to machine trusted keys
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v7 07/17] integrity: Fix warning about missing prototypes
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v7 06/17] integrity: restrict INTEGRITY_KEYRING_MACHINE to restrict_link_by_ca
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v7 00/17] Enroll kernel keys thru MOK
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v7 02/17] integrity: Do not allow machine keyring updates following init
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v7 01/17] integrity: Introduce a Linux keyring called machine
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v7 04/17] X.509: Parse Basic Constraints for CA
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v7 12/17] KEYS: integrity: change link restriction to trust the machine keyring
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v7 05/17] KEYS: CA link restriction
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH v7 02/45] x86/sev: detect/setup SEV/SME features earlier in boot
From
: Michael Roth <michael.roth@xxxxxxx>
Re: [PATCH v7 00/45] Add AMD Secure Nested Paging (SEV-SNP) Guest Support
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v7 00/45] Add AMD Secure Nested Paging (SEV-SNP) Guest Support
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH v7 00/45] Add AMD Secure Nested Paging (SEV-SNP) Guest Support
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
Re: [PATCH v7 00/45] Add AMD Secure Nested Paging (SEV-SNP) Guest Support
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH v7 00/45] Add AMD Secure Nested Paging (SEV-SNP) Guest Support
From
: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
[PATCH v10 1/4] efi: Introduce EFI_FIRMWARE_MANAGEMENT_CAPSULE_HEADER and corresponding structures
From
: Chen Yu <yu.c.chen@xxxxxxxxx>
Re: [PATCH v7 15/45] x86/compressed: Register GHCB memory when SEV-SNP is active
From
: Jörg Rödel <joro@xxxxxxxxxx>
Re: [PATCH v2 10/20] power: supply: bq25890: Add bq25890_set_otg_cfg() helper
From
: Yauhen Kharuzhy <jekhor@xxxxxxxxx>
[PATCH v2 17/20] extcon: intel-cht-wc: Support devs with Micro-B / USB-2 only Type-C connectors
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v2 18/20] extcon: intel-cht-wc: Refactor cht_wc_extcon_get_charger()
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v2 19/20] extcon: intel-cht-wc: Add support for registering a power_supply class-device
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v2 20/20] extcon: intel-cht-wc: Report RID_A for ACA adapters
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v2 15/20] i2c: cht-wc: Make charger i2c-client instantiation board/device-model specific
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v2 16/20] extcon: intel-cht-wc: Use new intel_cht_wc_get_model() helper
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v2 14/20] mfd: intel_soc_pmic_chtwc: Add intel_cht_wc_get_model() helper function
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v2 13/20] power: supply: bq25890: Support higher charging voltages through Pump Express+ protocol
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v2 11/20] power: supply: bq25890: Add support for registering the Vbus boost converter as a regulator
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v2 12/20] power: supply: bq25890: On the bq25892 set the IINLIM based on external charger detection
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v2 10/20] power: supply: bq25890: Add bq25890_set_otg_cfg() helper
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v2 03/20] power: supply: bq25890: Rename IILIM field to IINLIM
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v2 08/20] power: supply: bq25890: Enable charging on boards where we skip reset
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v2 04/20] power: supply: bq25890: Reduce reported CONSTANT_CHARGE_CURRENT_MAX for low temperatures
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v2 05/20] power: supply: bq25890: Add a bq25890_rw_init_data() helper
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v2 07/20] power: supply: bq25890: Add support to read back the settings from the chip
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v2 09/20] power: supply: bq25890: Drop dev->platform_data == NULL check
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v2 06/20] power: supply: bq25890: Add support to skip reset at probe() / remove()
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v2 01/20] power: supply: core: Refactor power_supply_set_input_current_limit_from_supplier()
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v2 02/20] power: supply: bq25890: Fix ADC continuous conversion setting when charging
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH v2 00/20] power-suppy/i2c/extcon: Fix charger setup on Xiaomi Mi Pad 2 and Lenovo Yogabook
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH] x86/efi: Remove a repeated word in a comment
From
: Jason Wang <wangborong@xxxxxxxxxx>
Re: [PATCH v7 01/45] x86/compressed/64: detect/setup SEV/SME features earlier in boot
From
: Michael Roth <michael.roth@xxxxxxx>
Re: [PATCH v7 01/45] x86/compressed/64: detect/setup SEV/SME features earlier in boot
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v7 43/45] virt: Add SEV-SNP guest driver
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
Re: [PATCH v7 43/45] virt: Add SEV-SNP guest driver
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH v6 19/42] x86/mm: Add support to validate memory when changing C-bit
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v6 19/42] x86/mm: Add support to validate memory when changing C-bit
From
: Tom Lendacky <thomas.lendacky@xxxxxxx>
Re: [REGRESSION]: drivers/firmware: move x86 Generic System Framebuffers support
From
: Javier Martinez Canillas <javierm@xxxxxxxxxx>
Re: [REGRESSION]: drivers/firmware: move x86 Generic System Framebuffers support
From
: Ilya Trukhanov <lahvuun@xxxxxxxxx>
Re: [REGRESSION]: drivers/firmware: move x86 Generic System Framebuffers support
From
: Javier Martinez Canillas <javierm@xxxxxxxxxx>
Re: [REGRESSION]: drivers/firmware: move x86 Generic System Framebuffers support
From
: Javier Martinez Canillas <javierm@xxxxxxxxxx>
Re: [REGRESSION]: drivers/firmware: move x86 Generic System Framebuffers support
From
: Ilya Trukhanov <lahvuun@xxxxxxxxx>
Re: [REGRESSION]: drivers/firmware: move x86 Generic System Framebuffers support
From
: Ilya Trukhanov <lahvuun@xxxxxxxxx>
Re: [REGRESSION]: drivers/firmware: move x86 Generic System Framebuffers support
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [REGRESSION]: drivers/firmware: move x86 Generic System Framebuffers support
From
: Ilya Trukhanov <lahvuun@xxxxxxxxx>
Re: [REGRESSION]: drivers/firmware: move x86 Generic System Framebuffers support
From
: Javier Martinez Canillas <javierm@xxxxxxxxxx>
Re: [PATCH v7 43/45] virt: Add SEV-SNP guest driver
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
Re: [REGRESSION]: drivers/firmware: move x86 Generic System Framebuffers support
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v7 44/45] virt: sevguest: Add support to derive key
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v7 45/45] virt: sevguest: Add support to get extended report
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v7 33/45] KVM: SEV: Add documentation for SEV-SNP CPUID Enforcement
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v7 36/45] x86/compressed: add SEV-SNP feature detection/setup
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v7 43/45] virt: Add SEV-SNP guest driver
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v7 41/45] x86/sev: Provide support for SNP guest request NAEs
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v7 34/45] x86/compressed/64: add support for SEV-SNP CPUID table in #VC handlers
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v7 42/45] x86/sev: Register SNP guest request platform device
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v7 37/45] x86/compressed: use firmware-validated CPUID for SEV-SNP guests
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v7 30/45] x86/compressed/acpi: move EFI config table lookup to helper
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v7 39/45] x86/sev: add SEV-SNP feature detection/setup
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v7 35/45] x86/boot: add a pointer to Confidential Computing blob in bootparams
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v7 40/45] x86/sev: use firmware-validated CPUID for SEV-SNP guests
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v7 38/45] x86/compressed/64: add identity mapping for Confidential Computing blob
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v7 32/45] x86/boot: Add Confidential Computing type to setup_data
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v7 31/45] x86/compressed/acpi: move EFI vendor table lookup to helper
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v7 17/45] x86/sev: Add helper for validating pages in early enc attribute changes
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v7 13/45] x86/sev: Check the vmpl level
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v7 16/45] x86/sev: Register GHCB memory when SEV-SNP is active
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v7 09/45] x86/sev: Save the negotiated GHCB version
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v7 19/45] x86/kernel: Validate rom memory before accessing when SEV-SNP is active
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v7 15/45] x86/compressed: Register GHCB memory when SEV-SNP is active
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v7 20/45] x86/mm: Add support to validate memory when changing C-bit
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v7 21/45] KVM: SVM: Define sev_features and vmpl field in the VMSA
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v7 24/45] KVM: SVM: Update the SEV-ES save area mapping
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v7 28/45] KVM: x86: move lookup of indexed CPUID leafs to helper
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v7 25/45] x86/sev: Use SEV-SNP AP creation to start secondary CPUs
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v7 27/45] x86/sev: move MSR-based VMGEXITs for CPUID to helper
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v7 29/45] x86/compressed/acpi: move EFI system table lookup to helper
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v7 26/45] x86/head: re-enable stack protection for 32/64-bit builds
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v7 22/45] KVM: SVM: Create a separate mapping for the SEV-ES save area
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v7 23/45] KVM: SVM: Create a separate mapping for the GHCB save area
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v7 14/45] x86/compressed: Add helper for validating pages in the decompression stage
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v7 18/45] x86/kernel: Make the bss.decrypted section shared in RMP table
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v7 11/45] x86/sev: Check SEV-SNP features support
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v7 12/45] x86/sev: Add a helper for the PVALIDATE instruction
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v7 10/45] x86/sev: Add support for hypervisor feature VMGEXIT
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v7 08/45] x86/sev: Define the Linux specific guest termination reasons
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v7 07/45] x86/sev: Remove do_early_exception() forward declarations
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v7 06/45] x86/head64: Carve out the guest encryption postprocessing into a helper
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v7 04/45] x86/sev: Shorten GHCB terminate macro names
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v7 05/45] x86/sev: Get rid of excessive use of defines
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v7 03/45] x86/mm: Extend cc_attr to include AMD SEV-SNP
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v7 00/45] Add AMD Secure Nested Paging (SEV-SNP) Guest Support
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v7 02/45] x86/sev: detect/setup SEV/SME features earlier in boot
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v7 01/45] x86/compressed/64: detect/setup SEV/SME features earlier in boot
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[REGRESSION]: drivers/firmware: move x86 Generic System Framebuffers support
From
: Ilya Trukhanov <lahvuun@xxxxxxxxx>
Re: [PATCH v6 19/42] x86/mm: Add support to validate memory when changing C-bit
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v6 19/42] x86/mm: Add support to validate memory when changing C-bit
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH RFC 0/5] Handle UEFI NX-restricted page tables
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH RFC 1/5] efi/x86: Disable paging when booting via efistub
From
: Baskov Evgeniy <baskov@xxxxxxxxx>
[PATCH RFC 2/5] efi/x86_64: set page table if provided by libstub
From
: Baskov Evgeniy <baskov@xxxxxxxxx>
[PATCH RFC 3/5] libstub: build temporary page table without NX-bit
From
: Baskov Evgeniy <baskov@xxxxxxxxx>
[PATCH RFC 0/5] Handle UEFI NX-restricted page tables
From
: Baskov Evgeniy <baskov@xxxxxxxxx>
[PATCH RFC 4/5] efi: Add option for handling efi memory protection
From
: Baskov Evgeniy <baskov@xxxxxxxxx>
[PATCH RFC 5/5] Docs: document notemppt option
From
: Baskov Evgeniy <baskov@xxxxxxxxx>
Re: [PATCH v6 19/42] x86/mm: Add support to validate memory when changing C-bit
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH 3/5] Extend e820_table to hold information about memory encryption
From
: Martin Fernandez <martin.fernandez@xxxxxxxxxxxxx>
Re: [PATCH 3/5] Extend e820_table to hold information about memory encryption
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH 3/5] Extend e820_table to hold information about memory encryption
From
: Martin Fernandez <martin.fernandez@xxxxxxxxxxxxx>
Re: [PATCH 10/13] power: supply: bq25890: Add support for registering the Vbus boost converter as a regulator
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
Re: [PATCH 11/13] i2c: cht-wc: Add support for devices using a bq25890 charger
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
Re: [PATCH 09/13] power: supply: bq25890: Add bq25890_set_otg_cfg() helper
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
Re: [PATCH 06/13] power: supply: bq25890: Add support for skipping initialization
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
Re: [PATCH 02/13] platform/x86: dmi_device_properties: Add setup info for boards with a CHT Whiskey Cove PMIC
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
Re: [PATCH 13/13] extcon: intel-cht-wc: Add support for devices with an USB-micro-B connector
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
Re: [PATCH -next,v2] efi/libstub: arm32: Use "align" for the size alignment
From
: cuigaosheng <cuigaosheng1@xxxxxxxxxx>
Re: [PATCH -next,v2] efi/libstub: arm32: Use "align" for the size alignment
From
: cuigaosheng <cuigaosheng1@xxxxxxxxxx>
Re: [PATCH 11/13] i2c: cht-wc: Add support for devices using a bq25890 charger
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
Re: [PATCH 09/13] power: supply: bq25890: Add bq25890_set_otg_cfg() helper
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
Re: [PATCH 11/13] i2c: cht-wc: Add support for devices using a bq25890 charger
From
: Yauhen Kharuzhy <jekhor@xxxxxxxxx>
Re: [PATCH 11/13] i2c: cht-wc: Add support for devices using a bq25890 charger
From
: Yauhen Kharuzhy <jekhor@xxxxxxxxx>
Re: [PATCH 09/13] power: supply: bq25890: Add bq25890_set_otg_cfg() helper
From
: Yauhen Kharuzhy <jekhor@xxxxxxxxx>
Re: [PATCH 07/13] power: supply: bq25890: Enable charging on boards where we skip reset
From
: Yauhen Kharuzhy <jekhor@xxxxxxxxx>
Re: [PATCH 0/5] x86: Show in sysfs if a memory node is able to do encryption
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
[PATCH v9 1/4] efi: Introduce EFI_FIRMWARE_MANAGEMENT_CAPSULE_HEADER and corresponding structures
From
: Chen Yu <yu.c.chen@xxxxxxxxx>
Re: [PATCH 0/5] x86: Show in sysfs if a memory node is able to do encryption
From
: "Williams, Dan J" <dan.j.williams@xxxxxxxxx>
Re: [PATCH 0/5] x86: Show in sysfs if a memory node is able to do encryption
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH 5/5] Show in sysfs if a memory node is able to do encryption
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH 4/5] Mark e820_entries as crypto capable from EFI memmap
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH 3/5] Extend e820_table to hold information about memory encryption
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH 2/5] Extend pg_data_t to hold information about memory encryption
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH 1/5] Extend memblock to support memory encryption
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH] random: fix crash on multiple early calls to add_bootloader_randomness()
From
: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
[PATCH v3] random: fix crash on multiple early calls to add_bootloader_randomness()
From
: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
[Index of Archives]
[Linux Kernel Development]
[Security]
[Linux ARM Kernel]
[Tools]
[Linux MIPS]
[Linux S390]
[Bugtraq]
[Share Photos]>
[Fedora ARM]