Linux EFI/UEFI Development
[Prev Page][Next Page]
- Re: [PATCH Part1 RFC v4 15/36] x86/mm: Add support to validate memory when changing C-bit
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v4 16/36] KVM: SVM: define new SEV_FEATURES field in the VMCB Save State Area
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v4 16/36] KVM: SVM: define new SEV_FEATURES field in the VMCB Save State Area
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v4 15/36] x86/mm: Add support to validate memory when changing C-bit
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v4 3/3] partitions/efi: Support NVIDIA Tegra devices
- From: Dmitry Osipenko <digetx@xxxxxxxxx>
- Re: [PATCH v4 3/3] partitions/efi: Support NVIDIA Tegra devices
- From: Dmitry Osipenko <digetx@xxxxxxxxx>
- Re: [PATCH v4 3/3] partitions/efi: Support NVIDIA Tegra devices
- From: Dmitry Osipenko <digetx@xxxxxxxxx>
- Re: [PATCH v4 2/3] mmc: block: Add mmc_bdev_to_card() helper
- From: Dmitry Osipenko <digetx@xxxxxxxxx>
- Re: [PATCH v2 09/12] mm: Remove the now unused mem_encrypt_active() function
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v2 06/12] x86/sev: Replace occurrences of sev_active() with prot_guest_has()
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v2 03/12] x86/sev: Add an x86 version of prot_guest_has()
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v2 05/12] x86/sme: Replace occurrences of sme_active() with prot_guest_has()
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: Typo in file include/linux/efi.h
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 04/12] powerpc/pseries/svm: Add a powerpc version of prot_guest_has()
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v4 3/3] partitions/efi: Support NVIDIA Tegra devices
- From: Thierry Reding <thierry.reding@xxxxxxxxx>
- Re: [PATCH v2 04/12] powerpc/pseries/svm: Add a powerpc version of prot_guest_has()
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v2 09/12] mm: Remove the now unused mem_encrypt_active() function
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 09/12] mm: Remove the now unused mem_encrypt_active() function
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 07/12] x86/sev: Replace occurrences of sev_es_active() with prot_guest_has()
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 06/12] x86/sev: Replace occurrences of sev_active() with prot_guest_has()
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 05/12] x86/sme: Replace occurrences of sme_active() with prot_guest_has()
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 04/12] powerpc/pseries/svm: Add a powerpc version of prot_guest_has()
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v4 3/3] partitions/efi: Support NVIDIA Tegra devices
- From: Ulf Hansson <ulf.hansson@xxxxxxxxxx>
- Re: [PATCH v4 3/3] partitions/efi: Support NVIDIA Tegra devices
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v4 2/3] mmc: block: Add mmc_bdev_to_card() helper
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] isystem: ship and use stdarg.h
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- [PATCH v4 3/3] partitions/efi: Support NVIDIA Tegra devices
- From: Dmitry Osipenko <digetx@xxxxxxxxx>
- [PATCH v4 2/3] mmc: block: Add mmc_bdev_to_card() helper
- From: Dmitry Osipenko <digetx@xxxxxxxxx>
- [PATCH v4 1/3] mmc: core: Add raw_boot_mult field to mmc_ext_csd
- From: Dmitry Osipenko <digetx@xxxxxxxxx>
- [PATCH v4 0/3] Support EFI partition on NVIDIA Tegra devices
- From: Dmitry Osipenko <digetx@xxxxxxxxx>
- Re: [PATCH 3/3] virt: Add sev_secret module to expose confidential computing secrets
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 03/12] x86/sev: Add an x86 version of prot_guest_has()
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 03/12] x86/sev: Add an x86 version of prot_guest_has()
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v2 03/12] x86/sev: Add an x86 version of prot_guest_has()
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 02/12] mm: Introduce a function to check for virtualization protection features
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v2 02/12] mm: Introduce a function to check for virtualization protection features
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 01/12] x86/ioremap: Selectively build arch override encryption functions
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 07/11] treewide: Replace the use of mem_encrypt_active() with prot_guest_has()
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v2 00/12] Implement generic prot_guest_has() helper function
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v2 02/12] mm: Introduce a function to check for virtualization protection features
- From: "Kuppuswamy, Sathyanarayanan" <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH Part1 RFC v4 13/36] x86/kernel: Make the bss.decrypted section shared in RMP table
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 07/11] treewide: Replace the use of mem_encrypt_active() with prot_guest_has()
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v2 12/12] s390/mm: Remove the now unused mem_encrypt_active() function
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v2 11/12] powerpc/pseries/svm: Remove the now unused mem_encrypt_active() function
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v2 10/12] x86/sev: Remove the now unused mem_encrypt_active() function
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v2 09/12] mm: Remove the now unused mem_encrypt_active() function
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v2 08/12] treewide: Replace the use of mem_encrypt_active() with prot_guest_has()
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v2 07/12] x86/sev: Replace occurrences of sev_es_active() with prot_guest_has()
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v2 06/12] x86/sev: Replace occurrences of sev_active() with prot_guest_has()
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v2 05/12] x86/sme: Replace occurrences of sme_active() with prot_guest_has()
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v2 04/12] powerpc/pseries/svm: Add a powerpc version of prot_guest_has()
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v2 03/12] x86/sev: Add an x86 version of prot_guest_has()
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v2 02/12] mm: Introduce a function to check for virtualization protection features
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v2 01/12] x86/ioremap: Selectively build arch override encryption functions
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v2 00/12] Implement generic prot_guest_has() helper function
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH Part2 RFC v4 33/40] KVM: SVM: Add support to handle MSR based Page State Change VMGEXIT
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v4 09/36] x86/compressed: Add helper for validating pages in the decompression stage
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v4 08/36] x86/sev: check the vmpl level
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v4 09/36] x86/compressed: Add helper for validating pages in the decompression stage
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v4 08/36] x86/sev: check the vmpl level
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH 3/3] virt: Add sev_secret module to expose confidential computing secrets
- From: Andrew Scull <ascull@xxxxxxxxxx>
- Re: [PATCH Part1 RFC v4 12/36] x86/sev: Add helper for validating pages in early enc attribute changes
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v4 10/36] x86/compressed: Register GHCB memory when SEV-SNP is active
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v4 09/36] x86/compressed: Add helper for validating pages in the decompression stage
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v4 08/36] x86/sev: check the vmpl level
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: pass a gendisk instead of block_device in the partitioning code
- From: Jens Axboe <axboe@xxxxxxxxx>
- Re: [PATCH 1/4] block: store a gendisk in struct parsed_partitions
- From: Stefan Haberland <sth@xxxxxxxxxxxxx>
- Re: [PATCH 07/11] treewide: Replace the use of mem_encrypt_active() with prot_guest_has()
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH 07/11] treewide: Replace the use of mem_encrypt_active() with prot_guest_has()
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 01/11] mm: Introduce a function to check for virtualization protection features
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 01/11] mm: Introduce a function to check for virtualization protection features
- From: "Kuppuswamy, Sathyanarayanan" <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH 07/11] treewide: Replace the use of mem_encrypt_active() with prot_guest_has()
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH Part1 RFC v4 05/36] x86/sev: Define the Linux specific guest termination reasons
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 07/11] treewide: Replace the use of mem_encrypt_active() with prot_guest_has()
- From: "Kuppuswamy, Sathyanarayanan" <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH 07/11] treewide: Replace the use of mem_encrypt_active() with prot_guest_has()
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH Part1 RFC v4 05/36] x86/sev: Define the Linux specific guest termination reasons
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 07/11] treewide: Replace the use of mem_encrypt_active() with prot_guest_has()
- From: "Kuppuswamy, Sathyanarayanan" <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- [PATCH 4/4] block: pass a gendisk to bdev_resize_partition
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 3/4] block: pass a gendisk to bdev_del_partition
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 2/4] block: pass a gendisk to bdev_add_partition
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 1/4] block: store a gendisk in struct parsed_partitions
- From: Christoph Hellwig <hch@xxxxxx>
- pass a gendisk instead of block_device in the partitioning code
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH Part1 RFC v4 05/36] x86/sev: Define the Linux specific guest termination reasons
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v4 04/36] x86/mm: Add sev_feature_enabled() helper
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v4 03/36] x86/sev: Add support for hypervisor feature VMGEXIT
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v4 03/36] x86/sev: Add support for hypervisor feature VMGEXIT
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v4 02/36] x86/sev: Save the negotiated GHCB version
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v4 02/36] x86/sev: Save the negotiated GHCB version
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v4 05/36] x86/sev: Define the Linux specific guest termination reasons
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v4 04/36] x86/mm: Add sev_feature_enabled() helper
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v4 03/36] x86/sev: Add support for hypervisor feature VMGEXIT
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v4 02/36] x86/sev: Save the negotiated GHCB version
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v4 02/36] x86/sev: Save the negotiated GHCB version
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 00/11] Implement generic prot_guest_has() helper function
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 06/11] x86/sev: Replace occurrences of sev_es_active() with prot_guest_has()
- From: "Kuppuswamy, Sathyanarayanan" <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH 07/11] treewide: Replace the use of mem_encrypt_active() with prot_guest_has()
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 06/11] x86/sev: Replace occurrences of sev_es_active() with prot_guest_has()
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 07/11] treewide: Replace the use of mem_encrypt_active() with prot_guest_has()
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH 1/3] efi/libstub: Copy confidential computing secret area
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- [PATCH 3/3] virt: Add sev_secret module to expose confidential computing secrets
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- [PATCH 2/3] efi: Reserve confidential computing secret area
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- [PATCH 0/3] Allow access to confidential computing secret area in SEV guests
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- Re: [PATCH 00/11] Implement generic prot_guest_has() helper function
- From: "Kuppuswamy, Sathyanarayanan" <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] isystem: ship and use stdarg.h
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- Re: [PATCH v12 0/5] Enable Linux guests on Hyper-V on ARM64
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH v12 0/5] Enable Linux guests on Hyper-V on ARM64
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- RE: [PATCH v12 5/5] Drivers: hv: Enable Hyper-V code to be built on ARM64
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v12 5/5] Drivers: hv: Enable Hyper-V code to be built on ARM64
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- RE: [PATCH v12 0/5] Enable Linux guests on Hyper-V on ARM64
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v12 0/5] Enable Linux guests on Hyper-V on ARM64
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH v12 0/5] Enable Linux guests on Hyper-V on ARM64
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v12 5/5] Drivers: hv: Enable Hyper-V code to be built on ARM64
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- [PATCH v12 4/5] arm64: efi: Export screen_info
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v12 5/5] Drivers: hv: Enable Hyper-V code to be built on ARM64
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v12 3/5] arm64: hyperv: Initialize hypervisor on boot
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v12 1/5] arm64: hyperv: Add Hyper-V hypercall and register access utilities
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v12 2/5] arm64: hyperv: Add panic handler
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v12 0/5] Enable Linux guests on Hyper-V on ARM64
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [efi:urgent] BUILD SUCCESS c32ac11da3f83bb42b986702a9b92f0a14ed4182
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH Part2 RFC v4 20/40] KVM: SVM: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [GIT PULL] EFI fixes for v5.14-rc4
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 2/3] isystem: ship and use stdarg.h
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2] arm64: Fix EFI loader kernel image allocation
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- RE: [PATCH v11 3/5] arm64: hyperv: Initialize hypervisor on boot
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v11 0/5] Enable Linux guests on Hyper-V on ARM64
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v11 3/5] arm64: hyperv: Initialize hypervisor on boot
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v11 0/5] Enable Linux guests on Hyper-V on ARM64
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v11 3/5] arm64: hyperv: Initialize hypervisor on boot
- From: Marc Zyngier <maz@xxxxxxxxxx>
- RE: [PATCH v11 0/5] Enable Linux guests on Hyper-V on ARM64
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v2] arm64: Fix EFI loader kernel image allocation
- From: Benjamin Herrenschmidt <benh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 07/11] treewide: Replace the use of mem_encrypt_active() with prot_guest_has()
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH v3 0/4] efi/arm64: work around Image placement issues
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v3 0/4] efi/arm64: work around Image placement issues
- From: Benjamin Herrenschmidt <benh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 08/11] mm: Remove the now unused mem_encrypt_active() function
- From: Joerg Roedel <joro@xxxxxxxxxx>
- Re: [PATCH 09/11] x86/sev: Remove the now unused mem_encrypt_active() function
- From: Joerg Roedel <joro@xxxxxxxxxx>
- Re: [PATCH 06/11] x86/sev: Replace occurrences of sev_es_active() with prot_guest_has()
- From: Joerg Roedel <joro@xxxxxxxxxx>
- Re: [PATCH 05/11] x86/sev: Replace occurrences of sev_active() with prot_guest_has()
- From: Joerg Roedel <joro@xxxxxxxxxx>
- Re: [PATCH 04/11] x86/sme: Replace occurrences of sme_active() with prot_guest_has()
- From: Joerg Roedel <joro@xxxxxxxxxx>
- Re: [PATCH 02/11] x86/sev: Add an x86 version of prot_guest_has()
- From: Joerg Roedel <joro@xxxxxxxxxx>
- Re: [PATCH 01/11] mm: Introduce a function to check for virtualization protection features
- From: Joerg Roedel <joro@xxxxxxxxxx>
- [PATCH 2/3] isystem: ship and use stdarg.h
- From: Alexey Dobriyan <adobriyan@xxxxxxxxx>
- [PATCH v3 3/3] partitions/efi: Support NVIDIA Tegra devices
- From: Dmitry Osipenko <digetx@xxxxxxxxx>
- [PATCH v3 2/3] mmc: block: Add mmc_bdev_to_card() helper
- From: Dmitry Osipenko <digetx@xxxxxxxxx>
- [PATCH v3 1/3] mmc: core: Add raw_boot_mult field to mmc_ext_csd
- From: Dmitry Osipenko <digetx@xxxxxxxxx>
- [PATCH v3 0/3] Support EFI partition on NVIDIA Tegra devices
- From: Dmitry Osipenko <digetx@xxxxxxxxx>
- Re: [PATCH v2 3/3] partitions/efi: Support NVIDIA Tegra devices
- From: Dmitry Osipenko <digetx@xxxxxxxxx>
- [PATCH v2 1/3] mmc: core: Add raw_boot_mult field to mmc_ext_csd
- From: Dmitry Osipenko <digetx@xxxxxxxxx>
- [PATCH v2 3/3] partitions/efi: Support NVIDIA Tegra devices
- From: Dmitry Osipenko <digetx@xxxxxxxxx>
- [PATCH v2 2/3] mmc: block: Add mmc_bdev_to_card() helper
- From: Dmitry Osipenko <digetx@xxxxxxxxx>
- [PATCH v2 0/3] Support EFI partition on NVIDIA Tegra devices
- From: Dmitry Osipenko <digetx@xxxxxxxxx>
- Re: [PATCH 07/11] treewide: Replace the use of mem_encrypt_active() with prot_guest_has()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 10/40] x86/fault: Add support to handle the RMP fault for user address
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH Part2 RFC v4 07/40] x86/sev: Split the physmap when adding the page in RMP table
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 RFC v4 10/40] x86/fault: Add support to handle the RMP fault for user address
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH Part2 RFC v4 07/40] x86/sev: Split the physmap when adding the page in RMP table
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH 02/11] x86/sev: Add an x86 version of prot_guest_has()
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 01/11] mm: Introduce a function to check for virtualization protection features
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 02/11] x86/sev: Add an x86 version of prot_guest_has()
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH 01/11] mm: Introduce a function to check for virtualization protection features
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH 00/11] Implement generic prot_guest_has() helper function
- From: Christian König <ckoenig.leichtzumerken@xxxxxxxxx>
- Re: [PATCH] efi: sysfb_efi: fix build when EFI is not set
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi: sysfb_efi: fix build when EFI is not set
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH 00/11] Implement generic prot_guest_has() helper function
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH 11/11] s390/mm: Remove the now unused mem_encrypt_active() function
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH 10/11] powerpc/pseries/svm: Remove the now unused mem_encrypt_active() function
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH 09/11] x86/sev: Remove the now unused mem_encrypt_active() function
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH 08/11] mm: Remove the now unused mem_encrypt_active() function
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH 06/11] x86/sev: Replace occurrences of sev_es_active() with prot_guest_has()
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH 07/11] treewide: Replace the use of mem_encrypt_active() with prot_guest_has()
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH 05/11] x86/sev: Replace occurrences of sev_active() with prot_guest_has()
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH 04/11] x86/sme: Replace occurrences of sme_active() with prot_guest_has()
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH 03/11] powerpc/pseries/svm: Add a powerpc version of prot_guest_has()
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH 02/11] x86/sev: Add an x86 version of prot_guest_has()
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH 01/11] mm: Introduce a function to check for virtualization protection features
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH 00/11] Implement generic prot_guest_has() helper function
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- RE: [PATCH v11 2/5] arm64: hyperv: Add panic handler
- From: Sunil Muthuswamy <sunilmut@xxxxxxxxxxxxx>
- RE: [PATCH v11 3/5] arm64: hyperv: Initialize hypervisor on boot
- From: Sunil Muthuswamy <sunilmut@xxxxxxxxxxxxx>
- Re: [PATCH] efi: sysfb_efi: fix build when EFI is not set
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH AUTOSEL 5.13 15/21] efi/mokvar: Reserve the table only if it is in boot services data
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.10 13/17] efi/mokvar: Reserve the table only if it is in boot services data
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH] efi: sysfb_efi: fix build when EFI is not set
- From: Daniel Vetter <daniel@xxxxxxxx>
- Re: [PATCH] efi: sysfb_efi: fix build when EFI is not set
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [efi:urgent] BUILD SUCCESS 6dec88b1f3caee8c8460ac199a6c6ea702c85603
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] efi: sysfb_efi: fix build when EFI is not set
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH] efi: sysfb_efi: fix build when EFI is not set
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] efi: sysfb_efi: fix build when EFI is not set
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH v3 4/4] efi/libstub: arm64: Double check image alignment at entry
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 3/4] efi/libstub: arm64: Warn when efi_random_alloc() fails
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 2/4] efi/libstub: arm64: Relax 2M alignment again for relocatable kernels
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 1/4] efi/libstub: arm64: Force Image reallocation if BSS was not reserved
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 0/4] efi/arm64: work around Image placement issues
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 1/2] efi/libstub: arm64: Force Image reallocation if BSS was not reserved
- From: "Herrenschmidt, Benjamin" <benh@xxxxxxxxxx>
- Re: [PATCH v2 1/2] efi/libstub: arm64: Force Image reallocation if BSS was not reserved
- From: Benjamin Herrenschmidt <benh@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 2/2] efistub: arm64: relax 2M alignment again for relocatable kernels
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 1/2] efi/libstub: arm64: Force Image reallocation if BSS was not reserved
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 0/2] efi/arm64: work around Image placement issues
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efistub: arm64: relax 2M alignment again for relocatable kernels
- From: Benjamin Herrenschmidt <benh@xxxxxxxxxxxxxxxxxxx>
- [efi:urgent] BUILD SUCCESS 5bb60b28ce5bee48838c3fdc667c7247e722b34d
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH] efistub: arm64: relax 2M alignment again for relocatable kernels
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 1/1] RISC-V: load initrd wherever it fits into memory
- From: Palmer Dabbelt <palmer@xxxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 37/40] KVM: SVM: Add support to handle the RMP nested page fault
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 40/40] KVM: SVM: Support SEV-SNP AP Creation NAE event
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 26/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
- From: Marc Orr <marcorr@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 40/40] KVM: SVM: Support SEV-SNP AP Creation NAE event
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH Part2 RFC v4 39/40] KVM: SVM: Use a VMSA physical address variable for populating VMCB
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v11 3/5] arm64: hyperv: Initialize hypervisor on boot
- From: Boqun Feng <boqun.feng@xxxxxxxxx>
- Re: [PATCH v11 2/5] arm64: hyperv: Add panic handler
- From: Boqun Feng <boqun.feng@xxxxxxxxx>
- Re: [PATCH v11 5/5] Drivers: hv: Enable Hyper-V code to be built on ARM64
- From: Boqun Feng <boqun.feng@xxxxxxxxx>
- Re: [PATCH v3 0/2] allow simple{fb, drm} drivers to be used on non-x86 EFI platforms
- From: Daniel Vetter <daniel@xxxxxxxx>
- Re: [PATCH v3 0/2] allow simple{fb, drm} drivers to be used on non-x86 EFI platforms
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH v3 0/2] allow simple{fb, drm} drivers to be used on non-x86 EFI platforms
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- Re: [PATCH v3 0/2] allow simple{fb, drm} drivers to be used on non-x86 EFI platforms
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 39/40] KVM: SVM: Use a VMSA physical address variable for populating VMCB
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 40/40] KVM: SVM: Support SEV-SNP AP Creation NAE event
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 37/40] KVM: SVM: Add support to handle the RMP nested page fault
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 RFC v4 05/40] x86/sev: Add RMP entry lookup helpers
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 RFC v4 37/40] KVM: SVM: Add support to handle the RMP nested page fault
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 38/40] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 05/40] x86/sev: Add RMP entry lookup helpers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [efi:urgent] BUILD SUCCESS 47e1e233e9d822dfda068383fb9a616451bda703
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH Part2 RFC v4 27/40] KVM: X86: Add kvm_x86_ops to get the max page level for the TDP
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 RFC v4 27/40] KVM: X86: Add kvm_x86_ops to get the max page level for the TDP
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 0/2] allow simple{fb, drm} drivers to be used on non-x86 EFI platforms
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- Re: [PATCH Part2 RFC v4 25/40] KVM: SVM: Reclaim the guest pages when SEV-SNP VM terminates
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 RFC v4 38/40] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 RFC v4 20/40] KVM: SVM: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 37/40] KVM: SVM: Add support to handle the RMP nested page fault
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 RFC v4 25/40] KVM: SVM: Reclaim the guest pages when SEV-SNP VM terminates
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 38/40] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 35/40] KVM: Add arch hooks to track the host write to guest memory
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH 2/2] arm64: efi: kaslr: Fix boot failure if efi_random_alloc() fails
- From: Benjamin Herrenschmidt <benh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] RISC-V: load initrd wherever it fits into memory
- From: Heinrich Schuchardt <xypron.glpk@xxxxxx>
- [PATCH v11 5/5] Drivers: hv: Enable Hyper-V code to be built on ARM64
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v11 4/5] arm64: efi: Export screen_info
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v11 3/5] arm64: hyperv: Initialize hypervisor on boot
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v11 2/5] arm64: hyperv: Add panic handler
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v11 0/5] Enable Linux guests on Hyper-V on ARM64
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] arm64: efi: kaslr: Fix boot failure if efi_random_alloc() fails
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v11 1/5] arm64: hyperv: Add Hyper-V hypercall and register access utilities
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 38/40] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH 2/2] arm64: efi: kaslr: Fix boot failure if efi_random_alloc() fails
- From: Benjamin Herrenschmidt <benh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] arm64: efi: kaslr: Fix boot failure if efi_random_alloc() fails
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v3 0/2] allow simple{fb, drm} drivers to be used on non-x86 EFI platforms
- From: Daniel Vetter <daniel@xxxxxxxx>
- Re: [PATCH 2/2] arm64: efi: kaslr: Fix boot failure if efi_random_alloc() fails
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v3 0/2] allow simple{fb, drm} drivers to be used on non-x86 EFI platforms
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH 2/2] arm64: efi: kaslr: Fix boot failure if efi_random_alloc() fails
- From: Benjamin Herrenschmidt <benh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/2] allow simple{fb, drm} drivers to be used on non-x86 EFI platforms
- From: Daniel Vetter <daniel@xxxxxxxx>
- Re: [PATCH 2/2] arm64: efi: kaslr: Fix boot failure if efi_random_alloc() fails
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 1/2] arm64: efi: kaslr: Fix occasional random alloc (and boot) failure
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [GIT PULL] EFI fixes for v5.14-rc2
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- [PATCH 2/2] arm64: efi: kaslr: Fix boot failure if efi_random_alloc() fails
- From: Benjamin Herrenschmidt <benh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] arm64: efi: kaslr: Fix occasional random alloc (and boot) failure
- From: Benjamin Herrenschmidt <benh@xxxxxxxxxxxxxxxxxxx>
- [GIT PULL] EFI fixes for v5.14-rc2
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 35/40] KVM: Add arch hooks to track the host write to guest memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 37/40] KVM: SVM: Add support to handle the RMP nested page fault
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 38/40] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 24/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_UPDATE command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 RFC v4 24/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_UPDATE command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 RFC v4 24/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_UPDATE command
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 22/40] KVM: SVM: Add KVM_SNP_INIT command
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 26/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 32/40] KVM: SVM: Add support to handle GHCB GPA register VMGEXIT
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 26/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [efi:urgent] BUILD SUCCESS 7c33940e16b6cc297c5648b65180451b404b8a5e
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH Part2 RFC v4 25/40] KVM: SVM: Reclaim the guest pages when SEV-SNP VM terminates
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 RFC v4 26/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 25/40] KVM: SVM: Reclaim the guest pages when SEV-SNP VM terminates
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 33/40] KVM: SVM: Add support to handle MSR based Page State Change VMGEXIT
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 RFC v4 25/40] KVM: SVM: Reclaim the guest pages when SEV-SNP VM terminates
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 33/40] KVM: SVM: Add support to handle MSR based Page State Change VMGEXIT
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 25/40] KVM: SVM: Reclaim the guest pages when SEV-SNP VM terminates
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 RFC v4 26/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 RFC v4 25/40] KVM: SVM: Reclaim the guest pages when SEV-SNP VM terminates
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 26/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 34/40] KVM: SVM: Add support to handle Page State Change VMGEXIT
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 RFC v4 33/40] KVM: SVM: Add support to handle MSR based Page State Change VMGEXIT
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 RFC v4 25/40] KVM: SVM: Reclaim the guest pages when SEV-SNP VM terminates
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v1 0/2] firmware: dmi_scan: Make it work in kexec'ed kernel
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH v1 0/2] firmware: dmi_scan: Make it work in kexec'ed kernel
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH] efi/mokvar: Reserve the table only if it is in boot services data
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v3 0/2] allow simple{fb, drm} drivers to be used on non-x86 EFI platforms
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v3 0/2] allow simple{fb, drm} drivers to be used on non-x86 EFI platforms
- From: Dave Airlie <airlied@xxxxxxxxx>
- [efi:urgent] BUILD SUCCESS 2bab693a608bdf614b9fcd44083c5100f34b9f77
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [RFC PATCH] efi/mokvar: Reserve the table only if it is in boot services data
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part2 RFC v4 25/40] KVM: SVM: Reclaim the guest pages when SEV-SNP VM terminates
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 32/40] KVM: SVM: Add support to handle GHCB GPA register VMGEXIT
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 RFC v4 31/40] KVM: X86: update page-fault trace to log the 64-bit error code
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 RFC v4 30/40] KVM: X86: Define new RMP check related #NPF error bits
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 RFC v4 26/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 RFC v4 25/40] KVM: SVM: Reclaim the guest pages when SEV-SNP VM terminates
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 RFC v4 24/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_UPDATE command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 RFC v4 23/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_START command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 RFC v4 22/40] KVM: SVM: Add KVM_SNP_INIT command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 RFC v4 34/40] KVM: SVM: Add support to handle Page State Change VMGEXIT
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 21/40] KVM: SVM: Add initial SEV-SNP support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 RFC v4 33/40] KVM: SVM: Add support to handle MSR based Page State Change VMGEXIT
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 32/40] KVM: SVM: Add support to handle GHCB GPA register VMGEXIT
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 27/40] KVM: X86: Add kvm_x86_ops to get the max page level for the TDP
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 RFC v4 31/40] KVM: X86: update page-fault trace to log the 64-bit error code
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 30/40] KVM: X86: Define new RMP check related #NPF error bits
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 26/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 25/40] KVM: SVM: Reclaim the guest pages when SEV-SNP VM terminates
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 24/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_UPDATE command
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 23/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_START command
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 22/40] KVM: SVM: Add KVM_SNP_INIT command
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 21/40] KVM: SVM: Add initial SEV-SNP support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 27/40] KVM: X86: Add kvm_x86_ops to get the max page level for the TDP
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 21/40] KVM: SVM: Add initial SEV-SNP support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 RFC v4 28/40] KVM: X86: Introduce kvm_mmu_map_tdp_page() for use by SEV
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 21/40] KVM: SVM: Add initial SEV-SNP support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 1/1] ACPI: utils: Fix reference counting in for_each_acpi_dev_match()
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 05/40] x86/sev: Add RMP entry lookup helpers
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [RFC PATCH] efi/mokvar: Reserve the table only if it is in boot services data
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi/libstub: Fix the efi_load_initrd function description
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi/tpm: Differentiate missing and invalid final event log table.
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 15/40] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 RFC v4 15/40] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 15/40] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 RFC v4 15/40] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 07/40] x86/sev: Split the physmap when adding the page in RMP table
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 RFC v4 07/40] x86/sev: Split the physmap when adding the page in RMP table
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 10/40] x86/fault: Add support to handle the RMP fault for user address
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 06/40] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 07/40] x86/sev: Split the physmap when adding the page in RMP table
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 RFC v4 05/40] x86/sev: Add RMP entry lookup helpers
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 RFC v4 08/40] x86/traps: Define RMP violation #PF error code
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH Part2 RFC v4 08/40] x86/traps: Define RMP violation #PF error code
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 06/40] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH Part2 RFC v4 06/40] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 07/40] x86/sev: Split the physmap when adding the page in RMP table
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 05/40] x86/sev: Add RMP entry lookup helpers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 07/40] x86/sev: Split the physmap when adding the page in RMP table
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 RFC v4 07/40] x86/sev: Split the physmap when adding the page in RMP table
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 07/40] x86/sev: Split the physmap when adding the page in RMP table
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 RFC v4 01/40] KVM: SVM: Add support to handle AP reset MSR protocol
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH Part2 RFC v4 01/40] KVM: SVM: Add support to handle AP reset MSR protocol
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 01/40] KVM: SVM: Add support to handle AP reset MSR protocol
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v3 0/2] allow simple{fb, drm} drivers to be used on non-x86 EFI platforms
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- Re: [PATCH Part2 RFC v4 01/40] KVM: SVM: Add support to handle AP reset MSR protocol
- From: Joerg Roedel <jroedel@xxxxxxx>
- Re: [PATCH Part2 RFC v4 07/40] x86/sev: Split the physmap when adding the page in RMP table
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 04/40] x86/sev: Add the host SEV-SNP initialization support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 RFC v4 04/40] x86/sev: Add the host SEV-SNP initialization support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 04/40] x86/sev: Add the host SEV-SNP initialization support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 RFC v4 04/40] x86/sev: Add the host SEV-SNP initialization support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 02/40] KVM: SVM: Provide the Hypervisor Feature support VMGEXIT
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 RFC v4 02/40] KVM: SVM: Provide the Hypervisor Feature support VMGEXIT
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 01/40] KVM: SVM: Add support to handle AP reset MSR protocol
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 15/40] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: Marc Orr <marcorr@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 20/40] KVM: SVM: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 RFC v4 15/40] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 RFC v4 20/40] KVM: SVM: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
- From: Marc Orr <marcorr@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 15/40] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: Marc Orr <marcorr@xxxxxxxxxx>
- Re: [PATCH v2 1/1] ACPI: utils: Fix reference counting in for_each_acpi_dev_match()
- From: Daniel Scally <djrscally@xxxxxxxxx>
- Re: [PATCH v3 0/2] allow simple{fb,drm} drivers to be used on non-x86 EFI platforms
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH v3] lockdown,selinux: fix wrong subject in some SELinux lockdown checks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 06/40] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH Part2 RFC v4 23/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_START command
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 06/40] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- [PATCH v2 1/1] ACPI: utils: Fix reference counting in for_each_acpi_dev_match()
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH Part2 RFC v4 10/40] x86/fault: Add support to handle the RMP fault for user address
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 RFC v4 10/40] x86/fault: Add support to handle the RMP fault for user address
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH Part2 RFC v4 10/40] x86/fault: Add support to handle the RMP fault for user address
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 RFC v4 10/40] x86/fault: Add support to handle the RMP fault for user address
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH Part2 RFC v4 10/40] x86/fault: Add support to handle the RMP fault for user address
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 RFC v4 10/40] x86/fault: Add support to handle the RMP fault for user address
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH Part2 RFC v4 10/40] x86/fault: Add support to handle the RMP fault for user address
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH 1/1] RISC-V: load initrd wherever it fits into memory
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [PATCH] efi/tpm: Differentiate missing and invalid final event log table.
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 14/40] crypto:ccp: Provide APIs to issue SEV-SNP commands
- From: "Dr. David Alan Gilbert" <dgilbert@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 09/40] x86/fault: Add support to dump RMP entry on fault
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH Part2 RFC v4 09/40] x86/fault: Add support to dump RMP entry on fault
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 RFC v4 09/40] x86/fault: Add support to dump RMP entry on fault
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH Part2 RFC v4 09/40] x86/fault: Add support to dump RMP entry on fault
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 RFC v4 10/40] x86/fault: Add support to handle the RMP fault for user address
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH Part2 RFC v4 00/40] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH Part2 RFC v4 09/40] x86/fault: Add support to dump RMP entry on fault
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH Part2 RFC v4 09/40] x86/fault: Add support to dump RMP entry on fault
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH] efi/tpm: Differentiate missing and invalid final event log table.
- From: Michal Suchanek <msuchanek@xxxxxxx>
- Re: [PATCH Part1 RFC v4 04/36] x86/mm: Add sev_feature_enabled() helper
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH Part1 RFC v4 04/36] x86/mm: Add sev_feature_enabled() helper
- From: "Dr. David Alan Gilbert" <dgilbert@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 09/40] x86/fault: Add support to dump RMP entry on fault
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH Part2 RFC v4 39/40] KVM: SVM: Use a VMSA physical address variable for populating VMCB
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 RFC v4 32/40] KVM: SVM: Add support to handle GHCB GPA register VMGEXIT
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 RFC v4 38/40] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 RFC v4 31/40] KVM: X86: update page-fault trace to log the 64-bit error code
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 RFC v4 37/40] KVM: SVM: Add support to handle the RMP nested page fault
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 RFC v4 35/40] KVM: Add arch hooks to track the host write to guest memory
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 RFC v4 30/40] KVM: X86: Define new RMP check related #NPF error bits
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 RFC v4 29/40] KVM: X86: Introduce kvm_mmu_get_tdp_walk() for SEV-SNP use
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 RFC v4 40/40] KVM: SVM: Support SEV-SNP AP Creation NAE event
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 RFC v4 23/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_START command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 RFC v4 22/40] KVM: SVM: Add KVM_SNP_INIT command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 RFC v4 34/40] KVM: SVM: Add support to handle Page State Change VMGEXIT
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 RFC v4 28/40] KVM: X86: Introduce kvm_mmu_map_tdp_page() for use by SEV
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 RFC v4 27/40] KVM: X86: Add kvm_x86_ops to get the max page level for the TDP
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 RFC v4 36/40] KVM: X86: Export the kvm_zap_gfn_range() for the SNP use
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 RFC v4 21/40] KVM: SVM: Add initial SEV-SNP support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 RFC v4 20/40] KVM: SVM: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 RFC v4 33/40] KVM: SVM: Add support to handle MSR based Page State Change VMGEXIT
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 RFC v4 26/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 RFC v4 25/40] KVM: SVM: Reclaim the guest pages when SEV-SNP VM terminates
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 RFC v4 19/40] crypto: ccp: provide APIs to query extended attestation report
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 RFC v4 18/40] crypto: ccp: Add the SNP_{SET,GET}_EXT_CONFIG command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 RFC v4 24/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_UPDATE command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 RFC v4 17/40] crypto: ccp: Add the SNP_PLATFORM_STATUS command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 RFC v4 07/40] x86/sev: Split the physmap when adding the page in RMP table
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 RFC v4 14/40] crypto:ccp: Provide APIs to issue SEV-SNP commands
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 RFC v4 16/40] crypto: ccp: Handle the legacy SEV command when SNP is enabled
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 RFC v4 12/40] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 RFC v4 11/40] crypto:ccp: Define the SEV-SNP commands
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 RFC v4 15/40] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 RFC v4 10/40] x86/fault: Add support to handle the RMP fault for user address
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 RFC v4 09/40] x86/fault: Add support to dump RMP entry on fault
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 RFC v4 13/40] crypto: ccp: Shutdown SNP firmware on kexec
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 RFC v4 08/40] x86/traps: Define RMP violation #PF error code
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 RFC v4 06/40] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 RFC v4 05/40] x86/sev: Add RMP entry lookup helpers
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 RFC v4 04/40] x86/sev: Add the host SEV-SNP initialization support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 RFC v4 03/40] x86/cpufeatures: Add SEV-SNP CPU feature
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 RFC v4 02/40] KVM: SVM: Provide the Hypervisor Feature support VMGEXIT
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 RFC v4 01/40] KVM: SVM: Add support to handle AP reset MSR protocol
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 RFC v4 00/40] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 34/36] virt: Add SEV-SNP guest driver
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 33/36] x86/sev: Register SNP guest request platform device
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 24/36] x86/compressed/acpi: move EFI config table access to common code
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 32/36] x86/sev: Add snp_msg_seqno() helper
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 31/36] x86/sev: Provide support for SNP guest request NAEs
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 36/36] virt: sevguest: Add support to get extended report
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 23/36] KVM: x86: move lookup of indexed CPUID leafs to helper
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 30/36] x86/sev: enable SEV-SNP-validated CPUID in #VC handlers
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 22/36] x86/sev: move MSR-based VMGEXITs for CPUID to helper
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 29/36] x86/compressed/64: add identity mapping for Confidential Computing blob
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 35/36] virt: sevguest: Add support to derive key
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 21/36] x86/head/64: set up a startup %gs for stack protector
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 20/36] x86/sev: Use SEV-SNP AP creation to start secondary CPUs
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 16/36] KVM: SVM: define new SEV_FEATURES field in the VMCB Save State Area
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 26/36] x86/compressed/64: enable SEV-SNP-validated CPUID in #VC handler
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 27/36] x86/boot: add a pointer to Confidential Computing blob in bootparams
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 28/36] x86/compressed/64: store Confidential Computing blob address in bootparams
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 19/36] KVM: SVM: Update the SEV-ES save area mapping
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 18/36] KVM: SVM: Create a separate mapping for the GHCB save area
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 15/36] x86/mm: Add support to validate memory when changing C-bit
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 25/36] x86/boot: Add Confidential Computing type to setup_data
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 17/36] KVM: SVM: Create a separate mapping for the SEV-ES save area
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 14/36] x86/kernel: Validate rom memory before accessing when SEV-SNP is active
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 12/36] x86/sev: Add helper for validating pages in early enc attribute changes
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 13/36] x86/kernel: Make the bss.decrypted section shared in RMP table
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 11/36] x86/sev: Register GHCB memory when SEV-SNP is active
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 10/36] x86/compressed: Register GHCB memory when SEV-SNP is active
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 09/36] x86/compressed: Add helper for validating pages in the decompression stage
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 08/36] x86/sev: check the vmpl level
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 07/36] x86/sev: Add a helper for the PVALIDATE instruction
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 06/36] x86/sev: check SEV-SNP features support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 04/36] x86/mm: Add sev_feature_enabled() helper
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 05/36] x86/sev: Define the Linux specific guest termination reasons
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 03/36] x86/sev: Add support for hypervisor feature VMGEXIT
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 02/36] x86/sev: Save the negotiated GHCB version
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 01/36] x86/sev: shorten GHCB terminate macro names
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v4 00/36] Add AMD Secure Nested Paging (SEV-SNP) Guest Support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH 1/1] RISC-V: load initrd wherever it fits into memory
- From: Andreas Schwab <schwab@xxxxxxxxxxxxxx>
- Re: [PATCH Part1 RFC v3 22/22] virt: Add SEV-SNP guest driver
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v3 22/22] virt: Add SEV-SNP guest driver
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 1/1] RISC-V: load initrd wherever it fits into memory
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- [PATCH] efi/libstub: Fix the efi_load_initrd function description
- From: Atish Patra <atish.patra@xxxxxxx>
- Re: [PATCH Part1 RFC v3 22/22] virt: Add SEV-SNP guest driver
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH 1/3] x86/setup: always reserve the first 1M of RAM
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH Part1 RFC v3 22/22] virt: Add SEV-SNP guest driver
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 1/3] x86/setup: always reserve the first 1M of RAM
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH Part1 RFC v3 22/22] virt: Add SEV-SNP guest driver
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v3 22/22] virt: Add SEV-SNP guest driver
- From: Borislav Petkov <bp@xxxxxxxxx>
- [RFC PATCH] efi/mokvar: Reserve the table only if it is in boot services data
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 1/1] RISC-V: load initrd wherever it fits into memory
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v3 3/5] mm: x86: Invoke hypercall when page encryption status is changed
- From: Ashish Kalra <ashish.kalra@xxxxxxx>
- Re: [PATCH 1/1] RISC-V: load initrd wherever it fits into memory
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 3/3] virt: Add sev_secret module to expose confidential computing secrets
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [RFC PATCH v2 0/3] Allow access to confidential computing secret area
- From: Borislav Petkov <bp@xxxxxxx>
- [PATCH 1/1] RISC-V: load initrd wherever it fits into memory
- From: Heinrich Schuchardt <xypron.glpk@xxxxxx>
- Re: [RFC PATCH v2 3/3] virt: Add sev_secret module to expose confidential computing secrets
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- Re: [RFC PATCH v2 0/3] Allow access to confidential computing secret area
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- Re: [RFC PATCH v2 2/3] efi: Reserve confidential computing secret area
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- Re: [RFC PATCH v2 2/3] efi: Reserve confidential computing secret area
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [GIT PULL] EFI changes for v5.14
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [RFC PATCH v2 3/3] virt: Add sev_secret module to expose confidential computing secrets
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [RFC PATCH v2 0/3] Allow access to confidential computing secret area
- From: Borislav Petkov <bp@xxxxxxx>
- [RFC PATCH v2 3/3] virt: Add sev_secret module to expose confidential computing secrets
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- [RFC PATCH v2 2/3] efi: Reserve confidential computing secret area
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- [RFC PATCH v2 1/3] efi/libstub: Copy confidential computing secret area
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- [RFC PATCH v2 0/3] Allow access to confidential computing secret area
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- Re: [PATCH Part1 RFC v3 20/22] x86/boot: Add Confidential Computing address to setup_header
- From: Borislav Petkov <bp@xxxxxxxxx>
- [GIT PULL] EFI changes for v5.14
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- RE: [PATCH v10 3/7] arm64: hyperv: Add Hyper-V clocksource/clockevent support
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH Part1 RFC v3 20/22] x86/boot: Add Confidential Computing address to setup_header
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH Part1 RFC v3 20/22] x86/boot: Add Confidential Computing address to setup_header
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v3 20/22] x86/boot: Add Confidential Computing address to setup_header
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v3 20/22] x86/boot: Add Confidential Computing address to setup_header
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3 2/2] drivers/firmware: consolidate EFI framebuffer setup for all arches
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH v3 2/2] drivers/firmware: consolidate EFI framebuffer setup for all arches
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- [PATCH v3 1/2] drivers/firmware: move x86 Generic System Framebuffers support
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- [PATCH v3 0/2] allow simple{fb,drm} drivers to be used on non-x86 EFI platforms
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH Part1 RFC v3 20/22] x86/boot: Add Confidential Computing address to setup_header
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH Part1 RFC v3 20/22] x86/boot: Add Confidential Computing address to setup_header
- From: "Kuppuswamy, Sathyanarayanan" <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH Part1 RFC v3 20/22] x86/boot: Add Confidential Computing address to setup_header
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v3 20/22] x86/boot: Add Confidential Computing address to setup_header
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH Part1 RFC v3 20/22] x86/boot: Add Confidential Computing address to setup_header
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH Part1 RFC v3 20/22] x86/boot: Add Confidential Computing address to setup_header
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v3 20/22] x86/boot: Add Confidential Computing address to setup_header
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v2 2/2] drivers/firmware: consolidate EFI framebuffer setup for all arches
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH Part1 RFC v3 20/22] x86/boot: Add Confidential Computing address to setup_header
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 2/2] drivers/firmware: consolidate EFI framebuffer setup for all arches
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- Re: [PATCH v10 3/7] arm64: hyperv: Add Hyper-V clocksource/clockevent support
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v10 3/7] arm64: hyperv: Add Hyper-V clocksource/clockevent support
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v3] lockdown,selinux: fix wrong subject in some SELinux lockdown checks
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH v3] lockdown,selinux: fix wrong subject in some SELinux lockdown checks
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v3] lockdown,selinux: fix wrong subject in some SELinux lockdown checks
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH Part1 RFC v3 20/22] x86/boot: Add Confidential Computing address to setup_header
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v3 21/22] x86/sev: Register SNP guest request platform device
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v3 20/22] x86/boot: Add Confidential Computing address to setup_header
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v3 21/22] x86/sev: Register SNP guest request platform device
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v3 20/22] x86/boot: Add Confidential Computing address to setup_header
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v3 06/22] x86/sev: check SEV-SNP features support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3] lockdown,selinux: fix wrong subject in some SELinux lockdown checks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH Part1 RFC v3 06/22] x86/sev: check SEV-SNP features support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- RE: [PATCH v10 3/7] arm64: hyperv: Add Hyper-V clocksource/clockevent support
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH Part1 RFC v3 19/22] x86/sev-snp: SEV-SNP AP creation support
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH Part1 RFC v3 11/22] x86/sev: Add helper for validating pages in early enc attribute changes
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v3 11/22] x86/sev: Add helper for validating pages in early enc attribute changes
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: x86 UEFI stub builtin cpio rootfs.
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH Part1 RFC v3 11/22] x86/sev: Add helper for validating pages in early enc attribute changes
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v3 19/22] x86/sev-snp: SEV-SNP AP creation support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v3 11/22] x86/sev: Add helper for validating pages in early enc attribute changes
- From: "Dr. David Alan Gilbert" <dgilbert@xxxxxxxxxx>
- Re: [PATCH Part1 RFC v3 11/22] x86/sev: Add helper for validating pages in early enc attribute changes
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v3 11/22] x86/sev: Add helper for validating pages in early enc attribute changes
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v3 11/22] x86/sev: Add helper for validating pages in early enc attribute changes
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v3 11/22] x86/sev: Add helper for validating pages in early enc attribute changes
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v3 08/22] x86/compressed: Add helper for validating pages in the decompression stage
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v3 11/22] x86/sev: Add helper for validating pages in early enc attribute changes
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH v3] lockdown,selinux: fix wrong subject in some SELinux lockdown checks
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- x86 UEFI stub builtin cpio rootfs.
- From: Christian Melki <christian.melki@xxxxxxxxxx>
- [PATCH 4/4] efi/libstub: measure loaded initrd info into the TPM
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- [PATCH 3/4] efi/libstub: consolidate initrd handling across architectures
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- [PATCH 2/4] efi/libstub: x86/mixed: increase supported argument count
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- [PATCH 1/4] efi/libstub: add prototype of efi_tcg2_protocol::hash_log_extend_event()
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- [PATCH 0/4] efi/libstub: measurement initrd data loaded by the EFI stub
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH Part1 RFC v3 11/22] x86/sev: Add helper for validating pages in early enc attribute changes
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v3 21/22] x86/sev: Register SNP guest request platform device
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v3 16/22] KVM: SVM: Create a separate mapping for the SEV-ES save area
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v3 16/22] KVM: SVM: Create a separate mapping for the SEV-ES save area
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH Part1 RFC v3 14/22] x86/mm: Add support to validate memory when changing C-bit
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v3 11/22] x86/sev: Add helper for validating pages in early enc attribute changes
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v3 21/22] x86/sev: Register SNP guest request platform device
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v1 0/2] firmware: dmi_scan: Make it work in kexec'ed kernel
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH Part1 RFC v3 21/22] x86/sev: Register SNP guest request platform device
- From: "Dr. David Alan Gilbert" <dgilbert@xxxxxxxxxx>
- Re: [PATCH Part1 RFC v3 21/22] x86/sev: Register SNP guest request platform device
- From: "Dr. David Alan Gilbert" <dgilbert@xxxxxxxxxx>
- Re: [PATCH v1 0/2] firmware: dmi_scan: Make it work in kexec'ed kernel
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH v1 0/2] firmware: dmi_scan: Make it work in kexec'ed kernel
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH Part1 RFC v3 21/22] x86/sev: Register SNP guest request platform device
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v3 14/22] x86/mm: Add support to validate memory when changing C-bit
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v3 11/22] x86/sev: Add helper for validating pages in early enc attribute changes
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v3 10/22] x86/sev: Register GHCB memory when SEV-SNP is active
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v3 09/22] x86/compressed: Register GHCB memory when SEV-SNP is active
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v3 16/22] KVM: SVM: Create a separate mapping for the SEV-ES save area
- From: Borislav Petkov <bp@xxxxxxxxx>
- RE: [PATCH v10 3/7] arm64: hyperv: Add Hyper-V clocksource/clockevent support
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v1 0/2] firmware: dmi_scan: Make it work in kexec'ed kernel
- From: Dave Young <dyoung@xxxxxxxxxx>
- [PATCH v4 4/5] EFI: Introduce the new AMD Memory Encryption GUID.
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- Re: [PATCH Part1 RFC v3 21/22] x86/sev: Register SNP guest request platform device
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH Part1 RFC v3 14/22] x86/mm: Add support to validate memory when changing C-bit
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3 5/5] x86/kvm: Add guest support for detecting and enabling SEV Live Migration feature.
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3 3/5] mm: x86: Invoke hypercall when page encryption status is changed
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3 1/5] KVM: X86: Introduce KVM_HC_MAP_GPA_RANGE hypercall
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v10 3/7] arm64: hyperv: Add Hyper-V clocksource/clockevent support
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH Part1 RFC v3 12/22] x86/kernel: Make the bss.decrypted section shared in RMP table
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v3 11/22] x86/sev: Add helper for validating pages in early enc attribute changes
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3 4/5] EFI: Introduce the new AMD Memory Encryption GUID.
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH Part1 RFC v3 10/22] x86/sev: Register GHCB memory when SEV-SNP is active
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v3 21/22] x86/sev: Register SNP guest request platform device
- From: "Dr. David Alan Gilbert" <dgilbert@xxxxxxxxxx>
- Re: [PATCH Part1 RFC v3 09/22] x86/compressed: Register GHCB memory when SEV-SNP is active
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 0/2] firmware: dmi_scan: Make it work in kexec'ed kernel
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [RFC PATCH 0/3] Allow access to confidential computing secret area
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- [PATCH v3 5/5] x86/kvm: Add guest support for detecting and enabling SEV Live Migration feature.
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v3 4/5] EFI: Introduce the new AMD Memory Encryption GUID.
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v3 3/5] mm: x86: Invoke hypercall when page encryption status is changed
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v3 2/5] KVM: x86: invert KVM_HYPERCALL to default to VMMCALL
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v3 1/5] KVM: X86: Introduce KVM_HC_MAP_GPA_RANGE hypercall
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v3 0/5] Add Guest API & Guest Kernel support for SEV live migration.
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- Re: [PATCH Part1 RFC v3 03/22] x86/sev: Save the negotiated GHCB version
- From: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
- Re: [PATCH Part1 RFC v3 02/22] x86/sev: Define the Linux specific guest termination reasons
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v3 02/22] x86/sev: Define the Linux specific guest termination reasons
- From: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
- Re: [PATCH Part1 RFC v3 08/22] x86/compressed: Add helper for validating pages in the decompression stage
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v3 01/22] x86/sev: shorten GHCB terminate macro names
- From: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
- RE: [PATCH v10 3/7] arm64: hyperv: Add Hyper-V clocksource/clockevent support
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v1 0/2] firmware: dmi_scan: Make it work in kexec'ed kernel
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH v1 0/2] firmware: dmi_scan: Make it work in kexec'ed kernel
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH Part1 RFC v3 08/22] x86/compressed: Add helper for validating pages in the decompression stage
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v3 00/22] Add AMD Secure Nested Paging (SEV-SNP) Guest Support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v3 00/22] Add AMD Secure Nested Paging (SEV-SNP) Guest Support
- From: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
- Re: [PATCH v1 0/2] firmware: dmi_scan: Make it work in kexec'ed kernel
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/2] firmware: dmi_scan: Make it work in kexec'ed kernel
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH Part1 RFC v3 06/22] x86/sev: check SEV-SNP features support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v3 07/22] x86/sev: Add a helper for the PVALIDATE instruction
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v3 05/22] x86/sev: Add support for hypervisor feature VMGEXIT
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v3 06/22] x86/sev: check SEV-SNP features support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v3 05/22] x86/sev: Add support for hypervisor feature VMGEXIT
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v3 04/22] x86/mm: Add sev_feature_enabled() helper
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 0/2] firmware: dmi_scan: Make it work in kexec'ed kernel
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH v2 1/2] drivers/firmware: move x86 Generic System Framebuffers support
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH Part1 RFC v3 21/22] x86/sev: Register SNP guest request platform device
- From: Sergio Lopez <slp@xxxxxxxxxx>
- Re: [PATCH v2 0/2] allow simple{fb,drm} drivers to be used on non-x86 EFI platforms
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH v2 0/2] allow simple{fb,drm} drivers to be used on non-x86 EFI platforms
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v3 03/22] x86/sev: Save the negotiated GHCB version
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 1/3] x86/setup: always reserve the first 1M of RAM
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH Part1 RFC v3 19/22] x86/sev-snp: SEV-SNP AP creation support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v3 15/22] KVM: SVM: define new SEV_FEATURES field in the VMCB Save State Area
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v3 16/22] KVM: SVM: Create a separate mapping for the SEV-ES save area
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v3 14/22] x86/mm: Add support to validate memory when changing C-bit
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v3 09/22] x86/compressed: Register GHCB memory when SEV-SNP is active
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v3 22/22] virt: Add SEV-SNP guest driver
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v3 13/22] x86/kernel: Validate rom memory before accessing when SEV-SNP is active
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v3 08/22] x86/compressed: Add helper for validating pages in the decompression stage
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v3 21/22] x86/sev: Register SNP guest request platform device
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v3 18/22] KVM: SVM: Update the SEV-ES save area mapping
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v3 12/22] x86/kernel: Make the bss.decrypted section shared in RMP table
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v3 07/22] x86/sev: Add a helper for the PVALIDATE instruction
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v3 20/22] x86/boot: Add Confidential Computing address to setup_header
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v3 11/22] x86/sev: Add helper for validating pages in early enc attribute changes
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v3 17/22] KVM: SVM: Create a separate mapping for the GHCB save area
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v3 10/22] x86/sev: Register GHCB memory when SEV-SNP is active
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v3 06/22] x86/sev: check SEV-SNP features support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v3 05/22] x86/sev: Add support for hypervisor feature VMGEXIT
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v3 04/22] x86/mm: Add sev_feature_enabled() helper
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v3 03/22] x86/sev: Save the negotiated GHCB version
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v3 02/22] x86/sev: Define the Linux specific guest termination reasons
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v3 01/22] x86/sev: shorten GHCB terminate macro names
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part1 RFC v3 00/22] Add AMD Secure Nested Paging (SEV-SNP) Guest Support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v1 2/2] firmware: dmi_scan: Pass dmi_entry_point to kexec'ed kernel
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH v1 0/2] firmware: dmi_scan: Make it work in kexec'ed kernel
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/2] firmware: dmi_scan: Make it work in kexec'ed kernel
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH v1 2/2] firmware: dmi_scan: Pass dmi_entry_point to kexec'ed kernel
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH 0/3] x86/setup: always resrve the first 1M of RAM
- From: Hugh Dickins <hughd@xxxxxxxxxx>
- Re: [PATCH 1/3] x86/setup: always reserve the first 1M of RAM
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v2 2/2] drivers/firmware: consolidate EFI framebuffer setup for all arches
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- [PATCH v2 1/2] drivers/firmware: move x86 Generic System Framebuffers support
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- [PATCH v2 0/2] allow simple{fb,drm} drivers to be used on non-x86 EFI platforms
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH 1/3] x86/setup: always reserve the first 1M of RAM
- From: Baoquan He <bhe@xxxxxxxxxx>
- [PATCH 3/3] x86/crash: remove crash_reserve_low_1M()
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH 2/3] x86/setup: remove CONFIG_X86_RESERVE_LOW and reservelow options
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH 1/3] x86/setup: always reserve the first 1M of RAM
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH 0/3] x86/setup: always resrve the first 1M of RAM
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v2] x86/efi: unconditionally hold the whole low-1MB memory regions
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2] x86/efi: unconditionally hold the whole low-1MB memory regions
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v2] x86/efi: unconditionally hold the whole low-1MB memory regions
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v2] x86/efi: unconditionally hold the whole low-1MB memory regions
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2] x86/efi: unconditionally hold the whole low-1MB memory regions
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v2] x86/efi: unconditionally hold the whole low-1MB memory regions
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH v2] x86/efi: unconditionally hold the whole low-1MB memory regions
- From: Lianbo Jiang <lijiang@xxxxxxxxxx>
- Re: [PATCH 2/2] drivers/firmware: consolidate EFI framebuffer setup for all arches
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [RFC PATCH 0/3] Allow access to confidential computing secret area
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [RFC PATCH 0/3] Allow access to confidential computing secret area
- From: Andi Kleen <ak@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/3] Allow access to confidential computing secret area
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [RFC PATCH 0/3] Allow access to confidential computing secret area
- From: "Dr. David Alan Gilbert" <dgilbert@xxxxxxxxxx>
- Re: [PATCH 0/2] allow the sysfb support to be used in non-x86 arches
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH 0/2] allow the sysfb support to be used in non-x86 arches
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] x86/efi: Do not release sub-1MB memory regions when the crashkernel option is specified
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [GIT PULL] EFI updates for v5.14
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [GIT PULL] EFI fixes for v5.13-rc
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- [GIT PULL] EFI updates for v5.14
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [GIT PULL] EFI fixes for v5.13-rc
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
[Index of Archives]
[Linux Kernel Development]
[Security]
[Linux ARM Kernel]
[Tools]
[Linux MIPS]
[Linux S390]
[Bugtraq]
[Share Photos]>
[Fedora ARM]