James Bottomley ([email protected])

Number of posts: 249 (0.12 per day)
First post: 2018-09-19 22:31:49
Last post: 2024-04-19 12:47:13

Date List Subject
2024-04-19 12:47:13 linux-kernel Re: [PATCH] scsi: qla2xxx: Use -EIO in qla_get_tmf()
2024-04-10 19:50:35 linux-kernel Re: [REGRESSION] Loss of some SMART information in v6.1.81
2024-02-19 16:27:17 linux-kernel Re: [PATCH 03/10] scsi: NCR5380: Replace snprintf() with the safer scnprintf() variant
2024-02-10 12:57:26 linux-kernel Re: [PATCH 03/10] scsi: NCR5380: Replace snprintf() with the safer scnprintf() variant
2024-02-02 21:43:22 linux-kernel Re: [PATCH 1/2] x86/random: Retry on RDSEED failure
2024-02-02 15:48:50 linux-kernel Re: [PATCH 1/2] x86/random: Retry on RDSEED failure
2023-12-31 14:08:23 linux-kernel Re: scsi: ses: Move a label in ses_enclosure_data_process()
2023-12-30 13:46:34 linux-kernel Re: scsi: ses: Move a label in ses_enclosure_data_process()
2023-12-30 12:42:16 linux-kernel Re: scsi: ses: Move a label in ses_enclosure_data_process()
2023-12-29 17:22:25 linux-kernel Re: [PATCH] scsi: ses: Move a label in ses_enclosure_data_process()
2023-11-29 16:14:53 linux-kernel Re: [PATCH] [scsi] lasi700: Add error handling in lasi700_probe
2023-09-28 18:26:30 linux-kernel Re: [PATCH] scsi: Clean up errors in sni_53c710.c
2023-07-20 12:14:48 linux-kernel Re: [PATCH] scsi: aic7xxx: avoid checkpatch error
2023-05-31 15:06:07 linux-kernel Re: [PATCH][next] scsi: lpfc: Avoid -Wstringop-overflow warning
2023-05-30 21:48:01 linux-kernel Re: [PATCH][next] scsi: lpfc: Avoid -Wstringop-overflow warning
2023-04-27 18:29:51 linux-kernel Re: [PATCH] docs: security: Confidential computing intro and threat model
2023-04-27 16:29:02 linux-kernel Re: [PATCH] docs: security: Confidential computing intro and threat model
2023-04-27 13:26:49 linux-kernel Re: [PATCH] docs: security: Confidential computing intro and threat model
2023-04-26 15:27:39 linux-kernel Re: [PATCH] docs: security: Confidential computing intro and threat model
2023-04-04 20:30:23 linux-kernel Re: [PATCH] scsi: ses: Handle enclosure with just a primary component gracefully
2023-04-03 15:30:47 linux-kernel Re: [PATCH] scsi: megaraid: Fix null dereference
2023-03-15 12:08:25 linux-kernel Re: [PATCH for-next] scsi: Implement host state statistics
2023-03-01 19:52:25 linux-kernel Re: [PATCH-next] scsi: fix use-after-free problem in scsi_remove_target
2023-03-01 19:29:08 linux-kernel Re: [PATCH RESEND] scsi: libfc: Use refcount_* APIs for reference count management
2023-02-07 19:25:37 linux-kernel Re: [PATCH] scsi: FlashPoint: Replace arithmetic addition by bitwise OR
2023-02-07 12:27:17 linux-kernel Re: [PATCH] scsi: FlashPoint: Replace arithmetic addition by bitwise OR
2023-02-02 18:56:23 linux-kernel Re: [dm-devel] [PATCH 0/9] Documentation: correct lots of spelling errors (series 2)
2023-01-31 17:51:12 linux-kernel Re: Linux guest kernel threat model for Confidential Computing
2023-01-31 13:30:06 linux-kernel Re: Linux guest kernel threat model for Confidential Computing
2023-01-31 03:27:05 linux-kernel Re: [PATCH-next v2 2/2] scsi: fix iscsi rescan fails to create block device
2023-01-30 13:18:57 linux-kernel Re: [PATCH-next v2 2/2] scsi: fix iscsi rescan fails to create block device
2023-01-30 12:42:22 linux-kernel Re: Linux guest kernel threat model for Confidential Computing
2023-01-30 03:30:06 linux-kernel Re: [PATCH-next v2 2/2] scsi: fix iscsi rescan fails to create block device
2023-01-29 17:31:34 linux-kernel Re: [PATCH-next v2 2/2] scsi: fix iscsi rescan fails to create block device
2023-01-27 19:26:30 linux-kernel Re: Linux guest kernel threat model for Confidential Computing
2023-01-25 14:31:51 linux-kernel Re: Linux guest kernel threat model for Confidential Computing
2023-01-24 12:38:49 linux-kernel Re: [PATCH v5 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
2023-01-17 23:49:46 linux-kernel Re: [PATCH v5 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
2023-01-14 15:09:53 linux-kernel Re: [PATCH v5 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
2022-12-02 21:50:55 linux-kernel Re: [PATCH v5 04/11] security: keys: trusted: Include TPM2 creation data
2022-11-27 16:58:56 linux-kernel Re: [PATCH v5 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
2022-11-14 18:39:44 linux-kernel Re: [PATCH v5 04/11] security: keys: trusted: Include TPM2 creation data
2022-11-14 17:25:16 linux-kernel Re: [PATCH v5 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
2022-11-14 17:01:59 linux-kernel Re: [PATCH v5 04/11] security: keys: trusted: Include TPM2 creation data
2022-11-14 04:12:55 linux-kernel Re: [PATCH v5 04/11] security: keys: trusted: Include TPM2 creation data
2022-11-04 20:31:37 linux-kernel Re: [PATCH v2 14/15] scsi: ncr53c8xx: replace CCB_MAGIC with bool busy
2022-10-24 22:30:49 linux-kernel Re: Report in downstream Debian: mpt3sas broken with xen dom0 with update to 5.10.149 in 5.10.y.
2022-10-24 15:27:58 linux-kernel Re: Report in downstream Debian: mpt3sas broken with xen dom0 with update to 5.10.149 in 5.10.y.
2022-10-06 12:56:13 linux-crypto Re: [PATCH v0 6/8] KEYS: trusted: caam based black key
2022-07-01 12:01:10 linux-kernel Re: [PATCH] scsi: bfa: use strscpy to replace strlcpy
2022-03-31 16:14:39 linux-kernel Re: [PATCH] scsi: sd: call device_del() if device_add_disk() fails