On Mon, Apr 28, 2025 at 08:40:44PM +0200, Arnaud Lefebvre wrote:
On Mon, Apr 28, 2025 at 05:02:23PM +0800, Coiby Xu wrote:
On Thu, Apr 24, 2025 at 02:08:55AM +0200, Arnaud Lefebvre wrote:
On Fri, Feb 07, 2025 at 04:08:08PM +0800, Coiby Xu wrote:
LUKS is the standard for Linux disk encryption,
On Mon, Apr 28, 2025 at 05:02:23PM +0800, Coiby Xu wrote:
On Thu, Apr 24, 2025 at 02:08:55AM +0200, Arnaud Lefebvre wrote:
On Fri, Feb 07, 2025 at 04:08:08PM +0800, Coiby Xu wrote:
LUKS is the standard for Linux disk encryption, widely adopted by users,
and in some cases, such as Confidential V
On Thu, Apr 24, 2025 at 02:08:55AM +0200, Arnaud Lefebvre wrote:
On Fri, Feb 07, 2025 at 04:08:08PM +0800, Coiby Xu wrote:
LUKS is the standard for Linux disk encryption, widely adopted by users,
and in some cases, such as Confidential VMs, it is a requirement. With
kdump enabled, when the first
On Fri, Feb 07, 2025 at 04:08:08PM +0800, Coiby Xu wrote:
LUKS is the standard for Linux disk encryption, widely adopted by users,
and in some cases, such as Confidential VMs, it is a requirement. With
kdump enabled, when the first kernel crashes, the system can boot into
the kdump/crash kernel t
Hi X86 maintainers, Andrew,
On 02/07/25 at 04:08pm, Coiby Xu wrote:
..snip...
> This patch set only supports x86. There will be patches to support other
> architectures once this patch set gets merged.
who can help pick this patchset? It has been under many rounds of
reviewing, now it's ready
On Mon, Feb 24, 2025 at 09:36:48AM +0800, Baoquan He wrote:
Hi Andrew,
On 02/11/25 at 06:25pm, Baoquan He wrote:
On 02/07/25 at 04:08pm, Coiby Xu wrote:
> LUKS is the standard for Linux disk encryption, widely adopted by users,
> and in some cases, such as Confidential VMs, it is a requirement.
Hi Andrew,
On 02/07/25 at 04:08pm, Coiby Xu wrote:
..snip...
Ping again.
This patchset is adding a generic infrastructure for luks support in
crash dumping, and it adds the support in x86 ARCH. Since the x86
related change is only located in kdump only files, won't impact other
x86 codes. Co
Hi Andrew,
On 02/11/25 at 06:25pm, Baoquan He wrote:
> On 02/07/25 at 04:08pm, Coiby Xu wrote:
> > LUKS is the standard for Linux disk encryption, widely adopted by users,
> > and in some cases, such as Confidential VMs, it is a requirement. With
> > kdump enabled, when the first kernel crashes,
On Tue, Feb 11, 2025 at 06:25:18PM +0800, Baoquan He wrote:
On 02/07/25 at 04:08pm, Coiby Xu wrote:
LUKS is the standard for Linux disk encryption, widely adopted by users,
and in some cases, such as Confidential VMs, it is a requirement. With
kdump enabled, when the first kernel crashes, the sy
On 02/07/25 at 04:08pm, Coiby Xu wrote:
> LUKS is the standard for Linux disk encryption, widely adopted by users,
> and in some cases, such as Confidential VMs, it is a requirement. With
> kdump enabled, when the first kernel crashes, the system can boot into
> the kdump/crash kernel to dump the
LUKS is the standard for Linux disk encryption, widely adopted by users,
and in some cases, such as Confidential VMs, it is a requirement. With
kdump enabled, when the first kernel crashes, the system can boot into
the kdump/crash kernel to dump the memory image (i.e., /proc/vmcore)
to a specifie
11 matches
Mail list logo