Linux EFI/UEFI Development
[Prev Page][Next Page]
- [PATCH v3 10/20] power: supply: bq25890: Add support for registering the Vbus boost converter as a regulator
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v3 08/20] power: supply: bq25890: Drop dev->platform_data == NULL check
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v3 09/20] power: supply: bq25890: Add bq25890_set_otg_cfg() helper
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v3 07/20] power: supply: bq25890: Enable charging on boards where we skip reset
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v3 06/20] power: supply: bq25890: Add support to read back the settings from the chip
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v3 05/20] power: supply: bq25890: Add support to skip reset at probe() / remove()
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v3 04/20] power: supply: bq25890: Add a bq25890_rw_init_data() helper
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v3 03/20] power: supply: bq25890: Reduce reported CONSTANT_CHARGE_CURRENT_MAX for low temperatures
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v3 02/20] power: supply: bq25890: Rename IILIM field to IINLIM
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v3 01/20] power: supply: core: Refactor power_supply_set_input_current_limit_from_supplier()
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v3 00/20] power-suppy/i2c/extcon: Fix charger setup on Xiaomi Mi Pad 2 and Lenovo Yogabook
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v2 10/20] power: supply: bq25890: Add bq25890_set_otg_cfg() helper
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v2 18/20] extcon: intel-cht-wc: Refactor cht_wc_extcon_get_charger()
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v2 15/20] i2c: cht-wc: Make charger i2c-client instantiation board/device-model specific
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v2 14/20] mfd: intel_soc_pmic_chtwc: Add intel_cht_wc_get_model() helper function
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v8 09/17] KEYS: Rename get_builtin_and_secondary_restriction
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 08/17] integrity: add new keyring handler for mok keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 06/17] KEYS: CA link restriction
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 05/17] X.509: Parse Basic Constraints for CA
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 04/17] integrity: Do not allow machine keyring updates following init
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 03/17] integrity: Introduce a Linux keyring called machine
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] efi: Move efifb_setup_from_dmi() prototype from arch headers
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH v2 3/5] x86/e820: Tag e820_entry with crypto capabilities
- From: Martin Fernandez <martin.fernandez@xxxxxxxxxxxxx>
- Re: [PATCH RFC 0/5] Handle UEFI NX-restricted page tables
- Re: [PATCH v2 3/5] x86/e820: Tag e820_entry with crypto capabilities
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- Re: [PATCH v8 03/17] integrity: Introduce a Linux keyring called machine
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 00/10] Introduce sv48 support without relocatable kernel
- From: Heiko Stübner <heiko@xxxxxxxxx>
- Re: [PATCH v3] random: fix crash on multiple early calls to add_bootloader_randomness()
- From: "Ivan T. Ivanov" <iivanov@xxxxxxx>
- [PATCH v8 01/17] KEYS: Create static version of public_key_verify_signature
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v8 08/17] integrity: add new keyring handler for mok keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v8 16/17] integrity: Trust MOK keys if MokListTrustedRT found
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v8 03/17] integrity: Introduce a Linux keyring called machine
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v8 15/17] efi/mokvar: move up init order
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v8 13/17] integrity: store reference to machine keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v8 10/17] KEYS: add a reference to machine keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v8 17/17] integrity: Only use machine keyring when uefi_check_trust_mok_keys is true
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v8 02/17] integrity: Fix warning about missing prototypes
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v8 14/17] KEYS: link machine trusted keys to secondary_trusted_keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v8 09/17] KEYS: Rename get_builtin_and_secondary_restriction
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v8 11/17] KEYS: Introduce link restriction for machine keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v8 12/17] KEYS: integrity: change link restriction to trust the machine keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v8 06/17] KEYS: CA link restriction
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v8 05/17] X.509: Parse Basic Constraints for CA
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v8 07/17] integrity: restrict INTEGRITY_KEYRING_MACHINE to restrict_link_by_ca
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v8 04/17] integrity: Do not allow machine keyring updates following init
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v8 00/17] Enroll kernel keys thru MOK
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v7 01/45] x86/compressed/64: detect/setup SEV/SME features earlier in boot
- From: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
- Re: [PATCH v2 15/20] i2c: cht-wc: Make charger i2c-client instantiation board/device-model specific
- From: Wolfram Sang <wsa@xxxxxxxxxxxxx>
- Re: [PATCH 0/4 v3] measure initrd data loaded by the EFI stub
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH 0/4 v3] measure initrd data loaded by the EFI stub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] include/linux/efi.h: Remove unneeded whitespaces before tabs
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v11 1/4] efi: Introduce EFI_FIRMWARE_MANAGEMENT_CAPSULE_HEADER and corresponding structures
- From: Chen Yu <yu.c.chen@xxxxxxxxx>
- Re: [PATCH v7 43/45] virt: Add SEV-SNP guest driver
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v7 43/45] virt: Add SEV-SNP guest driver
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH v2 18/20] extcon: intel-cht-wc: Refactor cht_wc_extcon_get_charger()
- From: Chanwoo Choi <cwchoi00@xxxxxxxxx>
- [PATCH 4/4 v3] efi/libstub: measure loaded initrd info into the TPM
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- [PATCH 3/4 v3] efi/libstub: consolidate initrd handling across architectures
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- [PATCH 2/4 v3] efi/libstub: x86/mixed: increase supported argument count
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- [PATCH 1/4 v3] efi/libstub: add prototype of efi_tcg2_protocol::hash_log_extend_event()
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- [PATCH 0/4 v3] measure initrd data loaded by the EFI stub
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH v7 11/17] KEYS: Introduce link restriction for machine keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v7 12/17] KEYS: integrity: change link restriction to trust the machine keyring
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 11/17] KEYS: Introduce link restriction for machine keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 09/17] KEYS: Rename get_builtin_and_secondary_restriction
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 08/17] integrity: add new keyring handler for mok keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 04/17] X.509: Parse Basic Constraints for CA
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v7 04/17] X.509: Parse Basic Constraints for CA
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 13/17] KEYS: link secondary_trusted_keys to machine trusted keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v7 44/45] virt: sevguest: Add support to derive key
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v7 43/45] virt: Add SEV-SNP guest driver
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v7 43/45] virt: Add SEV-SNP guest driver
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH v7 44/45] virt: sevguest: Add support to derive key
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH v5 3/4] virt: Add efi_secret module to expose confidential computing secrets
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 13/17] KEYS: link secondary_trusted_keys to machine trusted keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v5 2/4] efi/libstub: Reserve confidential computing secret area
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- [PATCH v5 4/4] docs: security: Add coco/efi_secret documentation
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- [PATCH v5 0/4] Allow guest access to EFI confidential computing secret area
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- [PATCH v5 3/4] virt: Add efi_secret module to expose confidential computing secrets
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- [PATCH v5 1/4] efi: Save location of EFI confidential computing area
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- Re: [PATCH v7 00/17] Enroll kernel keys thru MOK
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 43/45] virt: Add SEV-SNP guest driver
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH v2 18/20] extcon: intel-cht-wc: Refactor cht_wc_extcon_get_charger()
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v2 16/20] extcon: intel-cht-wc: Use new intel_cht_wc_get_model() helper
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v2 00/20] power-suppy/i2c/extcon: Fix charger setup on Xiaomi Mi Pad 2 and Lenovo Yogabook
- From: Sebastian Reichel <sebastian.reichel@xxxxxxxxxxxxx>
- Re: [PATCH v7 00/17] Enroll kernel keys thru MOK
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v7 00/17] Enroll kernel keys thru MOK
- From: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx>
- Re: [PATCH v7 07/17] integrity: Fix warning about missing prototypes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 03/17] KEYS: Create static version of public_key_verify_signature
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 03/17] KEYS: Create static version of public_key_verify_signature
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 02/17] integrity: Do not allow machine keyring updates following init
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 02/45] x86/sev: detect/setup SEV/SME features earlier in boot
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v7 01/17] integrity: Introduce a Linux keyring called machine
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 00/17] Enroll kernel keys thru MOK
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 00/17] Enroll kernel keys thru MOK
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 18/20] extcon: intel-cht-wc: Refactor cht_wc_extcon_get_charger()
- From: Chanwoo Choi <cwchoi00@xxxxxxxxx>
- Re: [PATCH v2 16/20] extcon: intel-cht-wc: Use new intel_cht_wc_get_model() helper
- From: Chanwoo Choi <cwchoi00@xxxxxxxxx>
- Re: [PATCH v7 00/17] Enroll kernel keys thru MOK
- From: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx>
- Re: [PATCH v7 00/17] Enroll kernel keys thru MOK
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 00/17] Enroll kernel keys thru MOK
- From: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx>
- Re: [PATCH v7 00/45] Add AMD Secure Nested Paging (SEV-SNP) Guest Support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v7 00/17] Enroll kernel keys thru MOK
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 00/45] Add AMD Secure Nested Paging (SEV-SNP) Guest Support
- From: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
- Re: [PATCH v2 19/20] extcon: intel-cht-wc: Add support for registering a power_supply class-device
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH v2 17/20] extcon: intel-cht-wc: Support devs with Micro-B / USB-2 only Type-C connectors
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v2 15/20] i2c: cht-wc: Make charger i2c-client instantiation board/device-model specific
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v2 14/20] mfd: intel_soc_pmic_chtwc: Add intel_cht_wc_get_model() helper function
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v2 13/20] power: supply: bq25890: Support higher charging voltages through Pump Express+ protocol
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v2 17/20] extcon: intel-cht-wc: Support devs with Micro-B / USB-2 only Type-C connectors
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH v2 17/20] extcon: intel-cht-wc: Support devs with Micro-B / USB-2 only Type-C connectors
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH v2 17/20] extcon: intel-cht-wc: Support devs with Micro-B / USB-2 only Type-C connectors
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH v2 15/20] i2c: cht-wc: Make charger i2c-client instantiation board/device-model specific
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH v2 14/20] mfd: intel_soc_pmic_chtwc: Add intel_cht_wc_get_model() helper function
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH v2 13/20] power: supply: bq25890: Support higher charging voltages through Pump Express+ protocol
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH v2 11/20] power: supply: bq25890: Add support for registering the Vbus boost converter as a regulator
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH v2 00/20] power-suppy/i2c/extcon: Fix charger setup on Xiaomi Mi Pad 2 and Lenovo Yogabook
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v2 09/20] power: supply: bq25890: Drop dev->platform_data == NULL check
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH v2 00/20] power-suppy/i2c/extcon: Fix charger setup on Xiaomi Mi Pad 2 and Lenovo Yogabook
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH v2 04/20] power: supply: bq25890: Reduce reported CONSTANT_CHARGE_CURRENT_MAX for low temperatures
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v2 10/20] power: supply: bq25890: Add bq25890_set_otg_cfg() helper
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v7 02/45] x86/sev: detect/setup SEV/SME features earlier in boot
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH v7 03/17] KEYS: Create static version of public_key_verify_signature
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v7 08/17] integrity: add new keyring handler for mok keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v7 09/17] KEYS: Rename get_builtin_and_secondary_restriction
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v7 17/17] integrity: Only use machine keyring when uefi_check_trust_mok_keys is true
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v7 11/17] KEYS: Introduce link restriction for machine keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v7 10/17] KEYS: add a reference to machine keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v7 16/17] integrity: Trust MOK keys if MokListTrustedRT found
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v7 14/17] integrity: store reference to machine keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v7 15/17] efi/mokvar: move up init order
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v7 13/17] KEYS: link secondary_trusted_keys to machine trusted keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v7 07/17] integrity: Fix warning about missing prototypes
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v7 06/17] integrity: restrict INTEGRITY_KEYRING_MACHINE to restrict_link_by_ca
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v7 00/17] Enroll kernel keys thru MOK
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v7 02/17] integrity: Do not allow machine keyring updates following init
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v7 01/17] integrity: Introduce a Linux keyring called machine
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v7 04/17] X.509: Parse Basic Constraints for CA
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v7 12/17] KEYS: integrity: change link restriction to trust the machine keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v7 05/17] KEYS: CA link restriction
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v7 02/45] x86/sev: detect/setup SEV/SME features earlier in boot
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v7 00/45] Add AMD Secure Nested Paging (SEV-SNP) Guest Support
- From: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
- Re: [PATCH v7 00/45] Add AMD Secure Nested Paging (SEV-SNP) Guest Support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v7 00/45] Add AMD Secure Nested Paging (SEV-SNP) Guest Support
- From: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
- Re: [PATCH v7 00/45] Add AMD Secure Nested Paging (SEV-SNP) Guest Support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v7 00/45] Add AMD Secure Nested Paging (SEV-SNP) Guest Support
- From: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
- [PATCH v10 1/4] efi: Introduce EFI_FIRMWARE_MANAGEMENT_CAPSULE_HEADER and corresponding structures
- From: Chen Yu <yu.c.chen@xxxxxxxxx>
- Re: [PATCH v7 15/45] x86/compressed: Register GHCB memory when SEV-SNP is active
- From: Jörg Rödel <joro@xxxxxxxxxx>
- Re: [PATCH v2 10/20] power: supply: bq25890: Add bq25890_set_otg_cfg() helper
- From: Yauhen Kharuzhy <jekhor@xxxxxxxxx>
- [PATCH v2 17/20] extcon: intel-cht-wc: Support devs with Micro-B / USB-2 only Type-C connectors
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v2 18/20] extcon: intel-cht-wc: Refactor cht_wc_extcon_get_charger()
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v2 19/20] extcon: intel-cht-wc: Add support for registering a power_supply class-device
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v2 20/20] extcon: intel-cht-wc: Report RID_A for ACA adapters
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v2 15/20] i2c: cht-wc: Make charger i2c-client instantiation board/device-model specific
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v2 16/20] extcon: intel-cht-wc: Use new intel_cht_wc_get_model() helper
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v2 14/20] mfd: intel_soc_pmic_chtwc: Add intel_cht_wc_get_model() helper function
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v2 13/20] power: supply: bq25890: Support higher charging voltages through Pump Express+ protocol
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v2 11/20] power: supply: bq25890: Add support for registering the Vbus boost converter as a regulator
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v2 12/20] power: supply: bq25890: On the bq25892 set the IINLIM based on external charger detection
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v2 10/20] power: supply: bq25890: Add bq25890_set_otg_cfg() helper
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v2 03/20] power: supply: bq25890: Rename IILIM field to IINLIM
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v2 08/20] power: supply: bq25890: Enable charging on boards where we skip reset
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v2 04/20] power: supply: bq25890: Reduce reported CONSTANT_CHARGE_CURRENT_MAX for low temperatures
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v2 05/20] power: supply: bq25890: Add a bq25890_rw_init_data() helper
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v2 07/20] power: supply: bq25890: Add support to read back the settings from the chip
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v2 09/20] power: supply: bq25890: Drop dev->platform_data == NULL check
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v2 06/20] power: supply: bq25890: Add support to skip reset at probe() / remove()
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v2 01/20] power: supply: core: Refactor power_supply_set_input_current_limit_from_supplier()
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v2 02/20] power: supply: bq25890: Fix ADC continuous conversion setting when charging
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v2 00/20] power-suppy/i2c/extcon: Fix charger setup on Xiaomi Mi Pad 2 and Lenovo Yogabook
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH] x86/efi: Remove a repeated word in a comment
- From: Jason Wang <wangborong@xxxxxxxxxx>
- Re: [PATCH v7 01/45] x86/compressed/64: detect/setup SEV/SME features earlier in boot
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v7 01/45] x86/compressed/64: detect/setup SEV/SME features earlier in boot
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v7 43/45] virt: Add SEV-SNP guest driver
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v7 43/45] virt: Add SEV-SNP guest driver
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v6 19/42] x86/mm: Add support to validate memory when changing C-bit
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v6 19/42] x86/mm: Add support to validate memory when changing C-bit
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [REGRESSION]: drivers/firmware: move x86 Generic System Framebuffers support
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [REGRESSION]: drivers/firmware: move x86 Generic System Framebuffers support
- From: Ilya Trukhanov <lahvuun@xxxxxxxxx>
- Re: [REGRESSION]: drivers/firmware: move x86 Generic System Framebuffers support
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [REGRESSION]: drivers/firmware: move x86 Generic System Framebuffers support
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [REGRESSION]: drivers/firmware: move x86 Generic System Framebuffers support
- From: Ilya Trukhanov <lahvuun@xxxxxxxxx>
- Re: [REGRESSION]: drivers/firmware: move x86 Generic System Framebuffers support
- From: Ilya Trukhanov <lahvuun@xxxxxxxxx>
- Re: [REGRESSION]: drivers/firmware: move x86 Generic System Framebuffers support
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [REGRESSION]: drivers/firmware: move x86 Generic System Framebuffers support
- From: Ilya Trukhanov <lahvuun@xxxxxxxxx>
- Re: [REGRESSION]: drivers/firmware: move x86 Generic System Framebuffers support
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH v7 43/45] virt: Add SEV-SNP guest driver
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [REGRESSION]: drivers/firmware: move x86 Generic System Framebuffers support
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v7 44/45] virt: sevguest: Add support to derive key
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v7 45/45] virt: sevguest: Add support to get extended report
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v7 33/45] KVM: SEV: Add documentation for SEV-SNP CPUID Enforcement
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v7 36/45] x86/compressed: add SEV-SNP feature detection/setup
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v7 43/45] virt: Add SEV-SNP guest driver
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v7 41/45] x86/sev: Provide support for SNP guest request NAEs
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v7 34/45] x86/compressed/64: add support for SEV-SNP CPUID table in #VC handlers
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v7 42/45] x86/sev: Register SNP guest request platform device
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v7 37/45] x86/compressed: use firmware-validated CPUID for SEV-SNP guests
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v7 30/45] x86/compressed/acpi: move EFI config table lookup to helper
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v7 39/45] x86/sev: add SEV-SNP feature detection/setup
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v7 35/45] x86/boot: add a pointer to Confidential Computing blob in bootparams
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v7 40/45] x86/sev: use firmware-validated CPUID for SEV-SNP guests
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v7 38/45] x86/compressed/64: add identity mapping for Confidential Computing blob
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v7 32/45] x86/boot: Add Confidential Computing type to setup_data
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v7 31/45] x86/compressed/acpi: move EFI vendor table lookup to helper
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v7 17/45] x86/sev: Add helper for validating pages in early enc attribute changes
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v7 13/45] x86/sev: Check the vmpl level
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v7 16/45] x86/sev: Register GHCB memory when SEV-SNP is active
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v7 09/45] x86/sev: Save the negotiated GHCB version
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v7 19/45] x86/kernel: Validate rom memory before accessing when SEV-SNP is active
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v7 15/45] x86/compressed: Register GHCB memory when SEV-SNP is active
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v7 20/45] x86/mm: Add support to validate memory when changing C-bit
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v7 21/45] KVM: SVM: Define sev_features and vmpl field in the VMSA
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v7 24/45] KVM: SVM: Update the SEV-ES save area mapping
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v7 28/45] KVM: x86: move lookup of indexed CPUID leafs to helper
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v7 25/45] x86/sev: Use SEV-SNP AP creation to start secondary CPUs
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v7 27/45] x86/sev: move MSR-based VMGEXITs for CPUID to helper
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v7 29/45] x86/compressed/acpi: move EFI system table lookup to helper
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v7 26/45] x86/head: re-enable stack protection for 32/64-bit builds
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v7 22/45] KVM: SVM: Create a separate mapping for the SEV-ES save area
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v7 23/45] KVM: SVM: Create a separate mapping for the GHCB save area
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v7 14/45] x86/compressed: Add helper for validating pages in the decompression stage
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v7 18/45] x86/kernel: Make the bss.decrypted section shared in RMP table
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v7 11/45] x86/sev: Check SEV-SNP features support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v7 12/45] x86/sev: Add a helper for the PVALIDATE instruction
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v7 10/45] x86/sev: Add support for hypervisor feature VMGEXIT
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v7 08/45] x86/sev: Define the Linux specific guest termination reasons
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v7 07/45] x86/sev: Remove do_early_exception() forward declarations
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v7 06/45] x86/head64: Carve out the guest encryption postprocessing into a helper
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v7 04/45] x86/sev: Shorten GHCB terminate macro names
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v7 05/45] x86/sev: Get rid of excessive use of defines
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v7 03/45] x86/mm: Extend cc_attr to include AMD SEV-SNP
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v7 00/45] Add AMD Secure Nested Paging (SEV-SNP) Guest Support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v7 02/45] x86/sev: detect/setup SEV/SME features earlier in boot
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v7 01/45] x86/compressed/64: detect/setup SEV/SME features earlier in boot
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [REGRESSION]: drivers/firmware: move x86 Generic System Framebuffers support
- From: Ilya Trukhanov <lahvuun@xxxxxxxxx>
- Re: [PATCH v6 19/42] x86/mm: Add support to validate memory when changing C-bit
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v6 19/42] x86/mm: Add support to validate memory when changing C-bit
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH RFC 0/5] Handle UEFI NX-restricted page tables
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH RFC 1/5] efi/x86: Disable paging when booting via efistub
- From: Baskov Evgeniy <baskov@xxxxxxxxx>
- [PATCH RFC 2/5] efi/x86_64: set page table if provided by libstub
- From: Baskov Evgeniy <baskov@xxxxxxxxx>
- [PATCH RFC 3/5] libstub: build temporary page table without NX-bit
- From: Baskov Evgeniy <baskov@xxxxxxxxx>
- [PATCH RFC 0/5] Handle UEFI NX-restricted page tables
- From: Baskov Evgeniy <baskov@xxxxxxxxx>
- [PATCH RFC 4/5] efi: Add option for handling efi memory protection
- From: Baskov Evgeniy <baskov@xxxxxxxxx>
- [PATCH RFC 5/5] Docs: document notemppt option
- From: Baskov Evgeniy <baskov@xxxxxxxxx>
- Re: [PATCH v6 19/42] x86/mm: Add support to validate memory when changing C-bit
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 3/5] Extend e820_table to hold information about memory encryption
- From: Martin Fernandez <martin.fernandez@xxxxxxxxxxxxx>
- Re: [PATCH 3/5] Extend e820_table to hold information about memory encryption
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 3/5] Extend e820_table to hold information about memory encryption
- From: Martin Fernandez <martin.fernandez@xxxxxxxxxxxxx>
- Re: [PATCH 10/13] power: supply: bq25890: Add support for registering the Vbus boost converter as a regulator
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH 11/13] i2c: cht-wc: Add support for devices using a bq25890 charger
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH 09/13] power: supply: bq25890: Add bq25890_set_otg_cfg() helper
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH 06/13] power: supply: bq25890: Add support for skipping initialization
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH 02/13] platform/x86: dmi_device_properties: Add setup info for boards with a CHT Whiskey Cove PMIC
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH 13/13] extcon: intel-cht-wc: Add support for devices with an USB-micro-B connector
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH -next,v2] efi/libstub: arm32: Use "align" for the size alignment
- From: cuigaosheng <cuigaosheng1@xxxxxxxxxx>
- Re: [PATCH -next,v2] efi/libstub: arm32: Use "align" for the size alignment
- From: cuigaosheng <cuigaosheng1@xxxxxxxxxx>
- Re: [PATCH 11/13] i2c: cht-wc: Add support for devices using a bq25890 charger
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH 09/13] power: supply: bq25890: Add bq25890_set_otg_cfg() helper
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH 11/13] i2c: cht-wc: Add support for devices using a bq25890 charger
- From: Yauhen Kharuzhy <jekhor@xxxxxxxxx>
- Re: [PATCH 11/13] i2c: cht-wc: Add support for devices using a bq25890 charger
- From: Yauhen Kharuzhy <jekhor@xxxxxxxxx>
- Re: [PATCH 09/13] power: supply: bq25890: Add bq25890_set_otg_cfg() helper
- From: Yauhen Kharuzhy <jekhor@xxxxxxxxx>
- Re: [PATCH 07/13] power: supply: bq25890: Enable charging on boards where we skip reset
- From: Yauhen Kharuzhy <jekhor@xxxxxxxxx>
- Re: [PATCH 0/5] x86: Show in sysfs if a memory node is able to do encryption
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH v9 1/4] efi: Introduce EFI_FIRMWARE_MANAGEMENT_CAPSULE_HEADER and corresponding structures
- From: Chen Yu <yu.c.chen@xxxxxxxxx>
- Re: [PATCH 0/5] x86: Show in sysfs if a memory node is able to do encryption
- From: "Williams, Dan J" <dan.j.williams@xxxxxxxxx>
- Re: [PATCH 0/5] x86: Show in sysfs if a memory node is able to do encryption
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 5/5] Show in sysfs if a memory node is able to do encryption
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 4/5] Mark e820_entries as crypto capable from EFI memmap
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 3/5] Extend e820_table to hold information about memory encryption
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 2/5] Extend pg_data_t to hold information about memory encryption
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 1/5] Extend memblock to support memory encryption
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH] random: fix crash on multiple early calls to add_bootloader_randomness()
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- [PATCH v3] random: fix crash on multiple early calls to add_bootloader_randomness()
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 14/42] x86/sev: Register GHCB memory when SEV-SNP is active
- From: Boris Petkov <bp@xxxxxxxxx>
- Re: [PATCH v6 14/42] x86/sev: Register GHCB memory when SEV-SNP is active
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v6 14/42] x86/sev: Register GHCB memory when SEV-SNP is active
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] builddeb: Support signing kernels with a Machine Owner Key
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH -next,v2] efi/libstub: arm32: Use "align" for the size alignment
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v6 14/42] x86/sev: Register GHCB memory when SEV-SNP is active
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH] random: fix crash on multiple early calls to add_bootloader_randomness()
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2] random: fix crash on multiple early calls to add_bootloader_randomness()
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] random: fix crash on multiple early calls to add_bootloader_randomness()
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 14/42] x86/sev: Register GHCB memory when SEV-SNP is active
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v6 14/42] x86/sev: Register GHCB memory when SEV-SNP is active
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v6 15/42] x86/sev: Remove do_early_exception() forward declarations
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v6 14/42] x86/sev: Register GHCB memory when SEV-SNP is active
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 03/13] power: supply: bq25890: Fix race causing oops at boot
- From: Sebastian Reichel <sebastian.reichel@xxxxxxxxxxxxx>
- Re: [PATCH 04/13] power: supply: bq25890: Fix initial setting of the F_CONV_RATE field
- From: Sebastian Reichel <sebastian.reichel@xxxxxxxxxxxxx>
- Re: [PATCH v6 13/42] x86/compressed: Register GHCB memory when SEV-SNP is active
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH -next,v2] efi/libstub: arm32: Use "align" for the size alignment
- From: Gaosheng Cui <cuigaosheng1@xxxxxxxxxx>
- Re: [GIT PULL] EFI updates for v5.16
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v2 0/5] [RFC] x86: Export information about hardware memory encryption to sysfs
- From: Martin Fernandez <martin.fernandez@xxxxxxxxxxxxx>
- Re: [RFC 3/5] gpiolib: acpi: Add a new "ignore" module option
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [RFC 0/5] ACPI/power-suppy add fuel-gauge support on cht-wc PMIC without USB-PD support devs
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v2 0/5] [RFC] x86: Export information about hardware memory encryption to sysfs
- From: Martin Fernandez <martin.fernandez@xxxxxxxxxxxxx>
- Re: [PATCH v7 1/4] efi: Introduce EFI_FIRMWARE_MANAGEMENT_CAPSULE_HEADER and corresponding structures
- From: Chen Yu <yu.c.chen@xxxxxxxxx>
- [GIT PULL] EFI updates for v5.16
- From: Borislav Petkov <bp@xxxxxxx>
- [PATCH -next] efi/libstub: arm32: Use "align" for the size alignment
- From: Gaosheng Cui <cuigaosheng1@xxxxxxxxxx>
- Re: [RFC 3/5] gpiolib: acpi: Add a new "ignore" module option
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [RFC 3/5] gpiolib: acpi: Add a new "ignore" module option
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [RFC 0/5] ACPI/power-suppy add fuel-gauge support on cht-wc PMIC without USB-PD support devs
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH 11/13] i2c: cht-wc: Add support for devices using a bq25890 charger
- From: Wolfram Sang <wsa@xxxxxxxxxxxxx>
- [RFC 5/5] power: supply: bq27xxx: Add support for ACPI enumeration
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [RFC 4/5] power: supply: bq27xxx: Add dev helper variable to bq27xxx_battery_i2c_probe()
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [RFC 3/5] gpiolib: acpi: Add a new "ignore" module option
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [RFC 2/5] gpiolib: acpi: Make acpi_gpio_in_ignore_list() more generic
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [RFC 0/5] ACPI/power-suppy add fuel-gauge support on cht-wc PMIC without USB-PD support devs
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [RFC 1/5] ACPI / x86: Add 3 devices on the Xiaomi Mi Pad 2 to the always_present list
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH 13/13] extcon: intel-cht-wc: Add support for devices with an USB-micro-B connector
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH] random: fix crash on multiple early calls to add_bootloader_randomness()
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] random: fix crash on multiple early calls to add_bootloader_randomness()
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 10/13] power: supply: bq25890: Add support for registering the Vbus boost converter as a regulator
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH 09/13] power: supply: bq25890: Add bq25890_set_otg_cfg() helper
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH 06/13] power: supply: bq25890: Add support for skipping initialization
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH 02/13] platform/x86: dmi_device_properties: Add setup info for boards with a CHT Whiskey Cove PMIC
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH 01/13] platform/x86: Rename touchscreen_dmi to dmi_device_properties
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH 13/13] extcon: intel-cht-wc: Add support for devices with an USB-micro-B connector
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH 12/13] extcon: intel-cht-wc: Check new "intel,cht-wc-setup" device-property
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH 11/13] i2c: cht-wc: Add support for devices using a bq25890 charger
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH 10/13] power: supply: bq25890: Add support for registering the Vbus boost converter as a regulator
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH 09/13] power: supply: bq25890: Add bq25890_set_otg_cfg() helper
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH 08/13] power: supply: bq25890: Drop dev->platform_data == NULL check
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH 07/13] power: supply: bq25890: Enable charging on boards where we skip reset
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH 05/13] power: supply: bq25890: Add a bq25890_rw_init_data() helper
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH 06/13] power: supply: bq25890: Add support for skipping initialization
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH 04/13] power: supply: bq25890: Fix initial setting of the F_CONV_RATE field
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH 03/13] power: supply: bq25890: Fix race causing oops at boot
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH 02/13] platform/x86: dmi_device_properties: Add setup info for boards with a CHT Whiskey Cove PMIC
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH 00/13] power-suppy/i2c/extcon: Add support for cht-wc PMIC without USB-PD support
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH 01/13] platform/x86: Rename touchscreen_dmi to dmi_device_properties
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v2 0/5] [RFC] x86: Export information about hardware memory encryption to sysfs
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v2 0/5] [RFC] x86: Export information about hardware memory encryption to sysfs
- From: Richard Hughes <hughsient@xxxxxxxxx>
- [PATCH] include/linux/efi.h: Remove unneeded whitespaces before tabs
- From: Elyes HAOUAS <ehaouas@xxxxxxx>
- Re: [PATCH v2 0/5] [RFC] x86: Export information about hardware memory encryption to sysfs
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v2 0/5] [RFC] x86: Export information about hardware memory encryption to sysfs
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 5/5] Show in sysfs if a memory node is able to do memory encryption
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v2 0/5] [RFC] x86: Export information about hardware memory encryption to sysfs
- From: Martin Fernandez <martin.fernandez@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/5] [RFC] x86: Export information about hardware memory encryption to sysfs
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 0/5] [RFC] x86: Export information about hardware memory encryption to sysfs
- From: Richard Hughes <hughsient@xxxxxxxxx>
- Re: [PATCH v2 0/5] [RFC] x86: Export information about hardware memory encryption to sysfs
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v6 11/42] x86/sev: Check the vmpl level
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 0/5] [RFC] x86: Export information about hardware memory encryption to sysfs
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 0/5] [RFC] x86: Export information about hardware memory encryption to sysfs
- From: Martin Fernandez <martin.fernandez@xxxxxxxxxxxxx>
- Re: [PATCH v6 40/42] virt: Add SEV-SNP guest driver
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH v6 40/42] virt: Add SEV-SNP guest driver
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v6 40/42] virt: Add SEV-SNP guest driver
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH v6 40/42] virt: Add SEV-SNP guest driver
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v2 0/5] [RFC] x86: Export information about hardware memory encryption to sysfs
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v6 40/42] virt: Add SEV-SNP guest driver
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH v2] x86/sme: Explicitly map new EFI memmap table as encrypted
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v2] x86/sme: Explicitly map new EFI memmap table as encrypted
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2] x86/sme: Explicitly map new EFI memmap table as encrypted
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v6 40/42] virt: Add SEV-SNP guest driver
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v2] x86/sme: Explicitly map new EFI memmap table as encrypted
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v6 08/42] x86/sev-es: initialize sev_status/features within #VC handler
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v2] x86/sme: Explicitly map new EFI memmap table as encrypted
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v6 08/42] x86/sev-es: initialize sev_status/features within #VC handler
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v7 1/4] efi: Introduce EFI_FIRMWARE_MANAGEMENT_CAPSULE_HEADER and corresponding structures
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxx>
- [PATCH v7 1/4] efi: Introduce EFI_FIRMWARE_MANAGEMENT_CAPSULE_HEADER and corresponding structures
- From: Chen Yu <yu.c.chen@xxxxxxxxx>
- Re: [PATCH v6 08/42] x86/sev-es: initialize sev_status/features within #VC handler
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v6 08/42] x86/sev-es: initialize sev_status/features within #VC handler
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH v2] x86/sme: Explicitly map new EFI memmap table as encrypted
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH] x86/sme: Explicitly map new EFI memmap table as encrypted
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH] x86/sme: Explicitly map new EFI memmap table as encrypted
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v6 08/42] x86/sev-es: initialize sev_status/features within #VC handler
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v6 08/42] x86/sev-es: initialize sev_status/features within #VC handler
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v6 08/42] x86/sev-es: initialize sev_status/features within #VC handler
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v6 08/42] x86/sev-es: initialize sev_status/features within #VC handler
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v6 08/42] x86/sev-es: initialize sev_status/features within #VC handler
- From: "Dr. David Alan Gilbert" <dgilbert@xxxxxxxxxx>
- Re: [PATCH v6 08/42] x86/sev-es: initialize sev_status/features within #VC handler
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v6 08/42] x86/sev-es: initialize sev_status/features within #VC handler
- From: "Dr. David Alan Gilbert" <dgilbert@xxxxxxxxxx>
- Re: [PATCH v6 08/42] x86/sev-es: initialize sev_status/features within #VC handler
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v6 08/42] x86/sev-es: initialize sev_status/features within #VC handler
- From: "Dr. David Alan Gilbert" <dgilbert@xxxxxxxxxx>
- Re: [PATCH v6 08/42] x86/sev-es: initialize sev_status/features within #VC handler
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v6 08/42] x86/sev-es: initialize sev_status/features within #VC handler
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v6 08/42] x86/sev-es: initialize sev_status/features within #VC handler
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v6 08/42] x86/sev-es: initialize sev_status/features within #VC handler
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] x86/sme: Explicitly map new EFI memmap table as encrypted
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v6 08/42] x86/sev-es: initialize sev_status/features within #VC handler
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v6 08/42] x86/sev-es: initialize sev_status/features within #VC handler
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v6 40/42] virt: Add SEV-SNP guest driver
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH v6 08/42] x86/sev-es: initialize sev_status/features within #VC handler
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH] x86/sme: Explicitly map new EFI memmap table as encrypted
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v6 08/42] x86/sev-es: initialize sev_status/features within #VC handler
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v6 08/42] x86/sev-es: initialize sev_status/features within #VC handler
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v4 1/3] efi/libstub: Copy confidential computing secret area
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/3] efi/libstub: Copy confidential computing secret area
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/3] efi/libstub: Copy confidential computing secret area
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/3] efi/libstub: Copy confidential computing secret area
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH v4 2/3] efi: Reserve confidential computing secret area
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/3] efi/libstub: Copy confidential computing secret area
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] efi: Disable runtime services on RT
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/3] efi/libstub: Copy confidential computing secret area
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v3 2/3] efi: Reserve confidential computing secret area
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] efi: Disable runtime services on RT
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH v4 2/3] efi: Reserve confidential computing secret area
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/3] efi/libstub: Copy confidential computing secret area
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] efi: Disable runtime services on RT
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- [PATCH v4 3/3] virt: Add efi_secret module to expose confidential computing secrets
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- [PATCH v4 2/3] efi: Reserve confidential computing secret area
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- [PATCH v4 1/3] efi/libstub: Copy confidential computing secret area
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- [PATCH v4 0/3] Allow guest access to EFI confidential computing secret area
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] efi: Disable runtime services on RT
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH v6 09/42] x86/sev: Check SEV-SNP features support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: more bdev_nr_sectors / bdev_nr_bytes conversions
- From: Jens Axboe <axboe@xxxxxxxxx>
- Re: [PATCH 3/3] partitions/ibm: use bdev_nr_sectors instead of open coding it
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 3/3] partitions/ibm: use bdev_nr_sectors instead of open coding it
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 2/3] partitions/efi: use bdev_nr_bytes instead of open coding it
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 1/3] block/ioctl: use bdev_nr_sectors and bdev_nr_bytes
- From: Christoph Hellwig <hch@xxxxxx>
- more bdev_nr_sectors / bdev_nr_bytes conversions
- From: Christoph Hellwig <hch@xxxxxx>
- Re: Can EFI memory descriptors overlap? [PING v1]
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v6 08/42] x86/sev-es: initialize sev_status/features within #VC handler
- From: Borislav Petkov <bp@xxxxxxxxx>
- Can EFI memory descriptors overlap? [PING v1]
- From: Martin Fernandez <martin.fernandez@xxxxxxxxxxxxx>
- Re: [PATCH v6 08/42] x86/sev-es: initialize sev_status/features within #VC handler
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v6 08/42] x86/sev-es: initialize sev_status/features within #VC handler
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [GIT PULL] efi/urgent for v5.15-rc6
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v1 0/2] firmware: dmi_scan: Make it work in kexec'ed kernel
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [GIT PULL] efi/urgent for v5.15-rc6
- From: Borislav Petkov <bp@xxxxxxx>
- [PATCH v4 1/4] efi: Introduce EFI_FIRMWARE_MANAGEMENT_CAPSULE_HEADER and corresponding structures
- From: Chen Yu <yu.c.chen@xxxxxxxxx>
- Re: [PATCH] efi: select CRYPTO for EFI_EMBEDDED_FIRMWARE
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] efi: select CRYPTO for EFI_EMBEDDED_FIRMWARE
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] efi: select CRYPTO for EFI_EMBEDDED_FIRMWARE
- From: Vegard Nossum <vegard.nossum@xxxxxxxxxx>
- Re: [GIT PULL] EFI updates for v5.16
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3 3/3] virt: Add efi_secret module to expose confidential computing secrets
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v3 2/3] efi: Reserve confidential computing secret area
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 1/3] efi/libstub: Copy confidential computing secret area
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- [PATCH v3 2/3] efi: Reserve confidential computing secret area
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- [PATCH v3 3/3] virt: Add efi_secret module to expose confidential computing secrets
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- [PATCH v3 0/3] Allow guest access to EFI confidential computing secret area
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- [GIT PULL] EFI updates for v5.16
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [GIT PULL] EFI fixes for v5.15
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] builddeb: Support signing kernels with a Machine Owner Key
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] builddeb: Support signing kernels with a Machine Owner Key
- From: "Matthew Wilcox (Oracle)" <willy@xxxxxxxxxxxxx>
- Re: [PATCH v6 07/42] x86/sev: Add support for hypervisor feature VMGEXIT
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RESEND] [PATCH] Revert "efi/random: Treat EFI_RNG_PROTOCOL output as bootloader randomness"
- From: "Ivan T. Ivanov" <iivanov@xxxxxxx>
- Re: [PATCH v6 40/42] virt: Add SEV-SNP guest driver
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [RESEND] [PATCH] Revert "efi/random: Treat EFI_RNG_PROTOCOL output as bootloader randomness"
- From: "Ivan T. Ivanov" <iivanov@xxxxxxx>
- Re: [RESEND] [PATCH] Revert "efi/random: Treat EFI_RNG_PROTOCOL output as bootloader randomness"
- From: "Ivan T. Ivanov" <iivanov@xxxxxxx>
- Re: [RESEND] Re: [PATCH] Revert "efi/random: Treat EFI_RNG_PROTOCOL output as bootloader randomness"
- From: "Ivan T. Ivanov" <iivanov@xxxxxxx>
- Re: [RESEND] Re: [PATCH] Revert "efi/random: Treat EFI_RNG_PROTOCOL output as bootloader randomness"
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [RESEND] Re: [PATCH] Revert "efi/random: Treat EFI_RNG_PROTOCOL output as bootloader randomness"
- From: "Ivan T. Ivanov" <iivanov@xxxxxxx>
- [PATCH V5 09/22] LoongArch: Add boot and setup routines
- From: Huacai Chen <chenhuacai@xxxxxxxxxxx>
- Re: [PATCH] Revert "efi/random: Treat EFI_RNG_PROTOCOL output as bootloader randomness"
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- [PATCH] Revert "efi/random: Treat EFI_RNG_PROTOCOL output as bootloader randomness"
- From: "Ivan T. Ivanov" <iivanov@xxxxxxx>
- Re: [PATCH v6 02/42] x86/sev: Shorten GHCB terminate macro names
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v6 03/42] x86/sev: Get rid of excessive use of defines
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v6 40/42] virt: Add SEV-SNP guest driver
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- [PATCH v6 34/42] x86/boot: add a pointer to Confidential Computing blob in bootparams
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v6 33/42] boot/compressed/64: use firmware-validated CPUID for SEV-SNP guests
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v6 35/42] x86/compressed/64: store Confidential Computing blob address in bootparams
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v6 32/42] x86/compressed/64: add support for SEV-SNP CPUID table in #VC handlers
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v6 42/42] virt: sevguest: Add support to get extended report
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v6 37/42] x86/sev: use firmware-validated CPUID for SEV-SNP guests
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v6 36/42] x86/compressed/64: add identity mapping for Confidential Computing blob
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v6 40/42] virt: Add SEV-SNP guest driver
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v6 38/42] x86/sev: Provide support for SNP guest request NAEs
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v6 39/42] x86/sev: Register SNP guest request platform device
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v6 41/42] virt: sevguest: Add support to derive key
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v6 31/42] x86/boot: Add Confidential Computing type to setup_data
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v6 29/42] x86/compressed/acpi: move EFI config table lookup to helper
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v6 30/42] x86/compressed/acpi: move EFI vendor table lookup to helper
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v6 27/42] KVM: x86: move lookup of indexed CPUID leafs to helper
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v6 26/42] x86/sev: move MSR-based VMGEXITs for CPUID to helper
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v6 16/42] x86/sev: Add helper for validating pages in early enc attribute changes
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v6 28/42] x86/compressed/acpi: move EFI system table lookup to helper
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v6 25/42] x86/head: re-enable stack protection for 32/64-bit builds
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v6 24/42] x86/sev: Use SEV-SNP AP creation to start secondary CPUs
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v6 23/42] KVM: SVM: Update the SEV-ES save area mapping
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v6 22/42] KVM: SVM: Create a separate mapping for the GHCB save area
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v6 21/42] KVM: SVM: Create a separate mapping for the SEV-ES save area
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v6 15/42] x86/sev: Remove do_early_exception() forward declarations
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v6 14/42] x86/sev: Register GHCB memory when SEV-SNP is active
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v6 19/42] x86/mm: Add support to validate memory when changing C-bit
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v6 18/42] x86/kernel: Validate rom memory before accessing when SEV-SNP is active
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v6 20/42] KVM: SVM: Define sev_features and vmpl field in the VMSA
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v6 17/42] x86/kernel: Make the bss.decrypted section shared in RMP table
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v6 13/42] x86/compressed: Register GHCB memory when SEV-SNP is active
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v6 11/42] x86/sev: Check the vmpl level
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v6 12/42] x86/compressed: Add helper for validating pages in the decompression stage
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v6 10/42] x86/sev: Add a helper for the PVALIDATE instruction
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v6 09/42] x86/sev: Check SEV-SNP features support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v6 07/42] x86/sev: Add support for hypervisor feature VMGEXIT
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v6 08/42] x86/sev-es: initialize sev_status/features within #VC handler
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v6 04/42] x86/head64: Carve out the guest encryption postprocessing into a helper
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v6 06/42] x86/sev: Save the negotiated GHCB version
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v6 05/42] x86/sev: Define the Linux specific guest termination reasons
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v6 03/42] x86/sev: Get rid of excessive use of defines
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v6 02/42] x86/sev: Shorten GHCB terminate macro names
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v6 00/42] Add AMD Secure Nested Paging (SEV-SNP) Guest Support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v6 01/42] x86/mm: Extend cc_attr to include AMD SEV-SNP
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v2 4/4] virt: Add sev_secret module to expose confidential computing secrets
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- Re: [PATCH v2 4/4] virt: Add sev_secret module to expose confidential computing secrets
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- [efi:next] BUILD SUCCESS 720dff78de360ad9742d5f438101cedcdb5dad84
- From: kernel test robot <lkp@xxxxxxxxx>
- [efi:urgent] BUILD SUCCESS 38fa3206bf441911258e5001ac8b6738693f8d82
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 4/4] virt: Add sev_secret module to expose confidential computing secrets
- From: "Dr. David Alan Gilbert" <dgilbert@xxxxxxxxxx>
- Re: [PATCH v2 4/4] virt: Add sev_secret module to expose confidential computing secrets
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v2 4/4] virt: Add sev_secret module to expose confidential computing secrets
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v1 0/2] firmware: dmi_scan: Make it work in kexec'ed kernel
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH v1 0/2] firmware: dmi_scan: Make it work in kexec'ed kernel
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 4/4] virt: Add sev_secret module to expose confidential computing secrets
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- [PATCH v2 1/4] x86: Export clean_cache_range()
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- [PATCH v2 3/4] efi: Reserve confidential computing secret area
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- [PATCH v2 2/4] efi/libstub: Copy confidential computing secret area
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- [PATCH v2 0/4] Allow access to confidential computing secret area in SEV guests
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- Re: [PATCH v1 0/2] firmware: dmi_scan: Make it work in kexec'ed kernel
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH -next] efi: Change down_interruptible() in virt_efi_reset_system() to down_trylock()
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 1/1] efitools: enable RISC-V build
- From: Heinrich Schuchardt <heinrich.schuchardt@xxxxxxxxxxxxx>
- [PATCH 1/1] sbsigntool: add support for RISC-V images
- From: Heinrich Schuchardt <heinrich.schuchardt@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] of, numa: Fetch empty NUMA node ID from distance map
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v2 1/2] Documentation, dt, numa: Add note to empty NUMA node
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v2 04/10] riscv: Implement sv48 support
- From: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
- Re: [PATCH v2 04/10] riscv: Implement sv48 support
- From: Samuel Holland <samuel@xxxxxxxxxxxx>
- Re: [PATCH v2 0/6] memblock: cleanup memblock_free interface
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v2 0/6] memblock: cleanup memblock_free interface
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [PATCH v2 6/6] memblock: use memblock_free for freeing virtual pointers
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v2 5/6] memblock: rename memblock_free to memblock_phys_free
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v2 4/6] memblock: stop aliasing __memblock_free_late with memblock_free_late
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v2 3/6] memblock: drop memblock_free_early_nid() and memblock_free_early()
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v2 2/6] xen/x86: free_p2m_page: use memblock_free_ptr() to free a virtual pointer
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v2 1/6] arch_numa: simplify numa_distance allocation
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v2 0/6] memblock: cleanup memblock_free interface
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v2 10/10] riscv: Allow user to downgrade to sv39 when hw supports sv48
- From: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
- [PATCH v2 09/10] riscv: Initialize thread pointer before calling C functions
- From: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
- [PATCH v2 08/10] Documentation: riscv: Add sv48 description to VM layout
- From: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
- [PATCH v2 07/10] riscv: Improve virtual kernel memory layout dump
- From: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
- [PATCH v2 06/10] riscv: Explicit comment about user virtual address space size
- From: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
- [PATCH v2 05/10] riscv: Use pgtable_l4_enabled to output mmu_type in cpuinfo
- From: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
- [PATCH v2 04/10] riscv: Implement sv48 support
- From: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
- [PATCH v2 03/10] asm-generic: Prepare for riscv use of pud_alloc_one and pud_free
- From: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
- [PATCH v2 02/10] riscv: Get rid of MAXPHYSMEM configs
- From: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
- [PATCH v2 01/10] riscv: Allow to dynamically define VA_BITS
- From: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
- [PATCH v2 00/10] Introduce sv48 support without relocatable kernel
- From: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
- [PATCH] doc: efi-readvar: Fix typo in command examples
- From: Chris Packham <chris.packham@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V4 09/22] LoongArch: Add boot and setup routines
- From: Huacai Chen <chenhuacai@xxxxxxxxx>
- Re: [PATCH v2 2/2] of, numa: Fetch empty NUMA node ID from distance map
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v4 0/8] Implement generic cc_platform_has() helper function
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v4 0/8] Implement generic cc_platform_has() helper function
- From: "Kuppuswamy, Sathyanarayanan" <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/8] Implement generic cc_platform_has() helper function
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v4 0/8] Implement generic cc_platform_has() helper function
- From: "Kuppuswamy, Sathyanarayanan" <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] efi: Disable runtime services on RT
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v4 0/8] Implement generic cc_platform_has() helper function
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 1/2] efi: Disable runtime services on RT
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Can EFI memory descriptors overlap?
- From: Martin Fernandez <martin.fernandez@xxxxxxxxxxxxx>
- Re: [PATCH v4 0/8] Implement generic cc_platform_has() helper function
- From: "Kuppuswamy, Sathyanarayanan" <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- [PATCH 6/8] x86/sev: Replace occurrences of sev_active() with cc_platform_has()
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH 5/8] x86/sme: Replace occurrences of sme_active() with cc_platform_has()
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH 7/8] x86/sev: Replace occurrences of sev_es_active() with cc_platform_has()
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH 8/8] treewide: Replace the use of mem_encrypt_active() with cc_platform_has()
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH 4/8] powerpc/pseries/svm: Add a powerpc version of cc_platform_has()
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH 2/8] arch/cc: Introduce a function to check for confidential computing features
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH 3/8] x86/sev: Add an x86 version of cc_platform_has()
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH v4 0/8] Implement generic cc_platform_has() helper function
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH 1/8] x86/ioremap: Selectively build arch override encryption functions
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 2/2] of, numa: Fetch empty NUMA node ID from distance map
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH 1/2] efi: Disable runtime services on RT
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] efi: Disable runtime services on RT
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] efi: Disable runtime services on RT
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 1/2] efi: Disable runtime services on RT
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 2/2] of, numa: Fetch empty NUMA node ID from distance map
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v3 2/5] efi: Introduce EFI_FIRMWARE_MANAGEMENT_CAPSULE_HEADER and corresponding structures
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- Re: [PATCH v2 2/2] of, numa: Fetch empty NUMA node ID from distance map
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH V4 09/22] LoongArch: Add boot and setup routines
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH V4 09/22] LoongArch: Add boot and setup routines
- From: Huacai Chen <chenhuacai@xxxxxxxxxxx>
- [PATCH v2 2/2] of, numa: Fetch empty NUMA node ID from distance map
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v2 1/2] Documentation, dt, numa: Add note to empty NUMA node
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v2 0/2] Specify empty NUMA node
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH] Documentation, dt, numa: Add note to empty NUMA node
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH 1/2] efi: Disable runtime services on RT
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- [PATCH 2/2] efi: Allow efi=runtime
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- [PATCH 0/2] efi: Disable runtime services on RT
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH v3 5/8] x86/sme: Replace occurrences of sme_active() with cc_platform_has()
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v3 5/8] x86/sme: Replace occurrences of sme_active() with cc_platform_has()
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3 5/8] x86/sme: Replace occurrences of sme_active() with cc_platform_has()
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] memblock: cleanup memblock_free interface
- From: Mike Rapoport <rppt@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] memblock: cleanup memblock_free interface
- From: Mike Rapoport <rppt@xxxxxxxxxxxxx>
- Re: [PATCH v4] lockdown,selinux: fix wrong subject in some SELinux lockdown checks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 5/8] x86/sme: Replace occurrences of sme_active() with cc_platform_has()
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 0/3] memblock: cleanup memblock_free interface
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Documentation, dt, numa: Add note to empty NUMA node
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH 3/3] memblock: cleanup memblock_free interface
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH 3/3] memblock: cleanup memblock_free interface
- From: Shahab Vahedi <Shahab.Vahedi@xxxxxxxxxxxx>
- Re: [PATCH 3/3] memblock: cleanup memblock_free interface
- From: Mike Rapoport <rppt@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] memblock: cleanup memblock_free interface
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH 3/3] memblock: cleanup memblock_free interface
- From: Juergen Gross <jgross@xxxxxxxx>
- Re: [PATCH 2/3] xen/x86: free_p2m_page: use memblock_free_ptr() to free a virtual pointer
- From: Juergen Gross <jgross@xxxxxxxx>
- [PATCH 3/3] memblock: cleanup memblock_free interface
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH 2/3] xen/x86: free_p2m_page: use memblock_free_ptr() to free a virtual pointer
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH 1/3] arch_numa: simplify numa_distance allocation
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH 0/3] memblock: cleanup memblock_free interface
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH] Documentation, dt, numa: Add note to empty NUMA node
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH -next] efi: Change down_interruptible() in virt_efi_reset_system() to down_trylock()
- From: Zhang Jianhua <chris.zjh@xxxxxxxxxx>
- Re: [PATCH v3 5/8] x86/sme: Replace occurrences of sme_active() with cc_platform_has()
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH v3 5/8] x86/sme: Replace occurrences of sme_active() with cc_platform_has()
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3 5/8] x86/sme: Replace occurrences of sme_active() with cc_platform_has()
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH v3 5/8] x86/sme: Replace occurrences of sme_active() with cc_platform_has()
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH] Documentation, dt, numa: Add note to empty NUMA node
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v3 5/8] x86/sme: Replace occurrences of sme_active() with cc_platform_has()
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH v3 5/8] x86/sme: Replace occurrences of sme_active() with cc_platform_has()
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v3 5/8] x86/sme: Replace occurrences of sme_active() with cc_platform_has()
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH v3 5/8] x86/sme: Replace occurrences of sme_active() with cc_platform_has()
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3 5/8] x86/sme: Replace occurrences of sme_active() with cc_platform_has()
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH] Documentation, dt, numa: Add note to empty NUMA node
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v3 5/8] x86/sme: Replace occurrences of sme_active() with cc_platform_has()
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3 5/8] x86/sme: Replace occurrences of sme_active() with cc_platform_has()
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v3 5/8] x86/sme: Replace occurrences of sme_active() with cc_platform_has()
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH V3 09/22] LoongArch: Add boot and setup routines
- From: Huacai Chen <chenhuacai@xxxxxxxxx>
- Re: [PATCH V3 09/22] LoongArch: Add boot and setup routines
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v3 0/8] Implement generic cc_platform_has() helper function
- From: "Kuppuswamy, Sathyanarayanan" <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- [PATCH v3 2/5] efi: Introduce EFI_FIRMWARE_MANAGEMENT_CAPSULE_HEADER and corresponding structures
- From: Chen Yu <yu.c.chen@xxxxxxxxx>
- Re: [PATCH v3 0/8] Implement generic cc_platform_has() helper function
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3 4/8] powerpc/pseries/svm: Add a powerpc version of cc_platform_has()
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v3 4/8] powerpc/pseries/svm: Add a powerpc version of cc_platform_has()
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v4] lockdown,selinux: fix wrong subject in some SELinux lockdown checks
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v4] lockdown,selinux: fix wrong subject in some SELinux lockdown checks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 4/8] powerpc/pseries/svm: Add a powerpc version of cc_platform_has()
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3 0/8] Implement generic cc_platform_has() helper function
- From: "Kuppuswamy, Sathyanarayanan" <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 4/8] powerpc/pseries/svm: Add a powerpc version of cc_platform_has()
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH v3 0/8] Implement generic cc_platform_has() helper function
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 v5 38/38] virt: sevguest: Add support to get extended report
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 v5 38/38] virt: sevguest: Add support to get extended report
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v3 4/8] powerpc/pseries/svm: Add a powerpc version of cc_platform_has()
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 v5 38/38] virt: sevguest: Add support to get extended report
- From: "Dr. David Alan Gilbert" <dgilbert@xxxxxxxxxx>
- Re: [PATCH v3 4/8] powerpc/pseries/svm: Add a powerpc version of cc_platform_has()
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v3 5/8] x86/sme: Replace occurrences of sme_active() with cc_platform_has()
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3 4/8] powerpc/pseries/svm: Add a powerpc version of cc_platform_has()
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3 4/8] powerpc/pseries/svm: Add a powerpc version of cc_platform_has()
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH v3 4/8] powerpc/pseries/svm: Add a powerpc version of cc_platform_has()
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH v2 2/5] efi: Introduce EFI_FIRMWARE_MANAGEMENT_CAPSULE_HEADER and corresponding structures
- From: Chen Yu <yu.c.chen@xxxxxxxxx>
- Re: [PATCH] ARM: decompressor: Avoid UNPREDICTABLE NOP encoding
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- Re: [PATCH v4] lockdown,selinux: fix wrong subject in some SELinux lockdown checks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4] lockdown,selinux: fix wrong subject in some SELinux lockdown checks
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- [PATCH v4] lockdown,selinux: fix wrong subject in some SELinux lockdown checks
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v3 3/8] x86/sev: Add an x86 version of cc_platform_has()
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 0/1] [RFC] x86: Export information about hardware memory encryption to sysfs
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 1/1] x86: Export information about hardware memory encryption to sysfs
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v3 2/8] mm: Introduce a function to check for confidential computing features
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 v5 34/38] x86/sev: Add snp_msg_seqno() helper
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 v5 34/38] x86/sev: Add snp_msg_seqno() helper
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH Part1 v5 34/38] x86/sev: Add snp_msg_seqno() helper
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 v5 34/38] x86/sev: Add snp_msg_seqno() helper
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH Part1 v5 34/38] x86/sev: Add snp_msg_seqno() helper
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 v5 34/38] x86/sev: Add snp_msg_seqno() helper
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH v3 8/8] treewide: Replace the use of mem_encrypt_active() with cc_platform_has()
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v3 0/8] Implement generic cc_platform_has() helper function
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH] ARM: decompressor: Avoid UNPREDICTABLE NOP encoding
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v3 4/8] powerpc/pseries/svm: Add a powerpc version of cc_platform_has()
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH v3 2/8] mm: Introduce a function to check for confidential computing features
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH v3 0/8] Implement generic cc_platform_has() helper function
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- Re: [PATCH v3 8/8] treewide: Replace the use of mem_encrypt_active() with cc_platform_has()
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- [PATCH v3 8/8] treewide: Replace the use of mem_encrypt_active() with cc_platform_has()
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v3 7/8] x86/sev: Replace occurrences of sev_es_active() with cc_platform_has()
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v3 6/8] x86/sev: Replace occurrences of sev_active() with cc_platform_has()
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v3 5/8] x86/sme: Replace occurrences of sme_active() with cc_platform_has()
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v3 4/8] powerpc/pseries/svm: Add a powerpc version of cc_platform_has()
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v3 3/8] x86/sev: Add an x86 version of cc_platform_has()
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v3 2/8] mm: Introduce a function to check for confidential computing features
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v3 1/8] x86/ioremap: Selectively build arch override encryption functions
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v3 0/8] Implement generic cc_platform_has() helper function
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH Part1 v5 37/38] virt: sevguest: Add support to derive key
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 v5 38/38] virt: sevguest: Add support to get extended report
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH] ARM: decompressor: Avoid UNPREDICTABLE NOP encoding
- From: Andre Przywara <andre.przywara@xxxxxxx>
- Re: [PATCH Part1 v5 37/38] virt: sevguest: Add support to derive key
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 v5 36/38] virt: Add SEV-SNP guest driver
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 2/5][RFC] efi: Introduce EFI_FIRMWARE_MANAGEMENT_CAPSULE_HEADER and corresponding structures
- From: Chen Yu <yu.c.chen@xxxxxxxxx>
- Re: [PATCH 2/5][RFC] efi: Introduce EFI_FIRMWARE_MANAGEMENT_CAPSULE_HEADER and corresponding structures
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 2/5][RFC] efi: Introduce EFI_FIRMWARE_MANAGEMENT_CAPSULE_HEADER and corresponding structures
- From: Chen Yu <yu.c.chen@xxxxxxxxx>
- Re: [PATCH Part1 v5 36/38] virt: Add SEV-SNP guest driver
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 v5 36/38] virt: Add SEV-SNP guest driver
- From: Borislav Petkov <bp@xxxxxxxxx>
[Index of Archives]
[Linux Kernel Development]
[Security]
[Linux ARM Kernel]
[Tools]
[Linux MIPS]
[Linux S390]
[Bugtraq]
[Share Photos]>
[Fedora ARM]