Linux Crypto
[Prev Page][Next Page]
- [PATCH v2 0/9] crypto: qat - improve recovery flows
- From: Mun Chun Yep <mun.chun.yep@xxxxxxxxx>
- [PATCH v2 6/6] ubsan: Get x86_64 booting with unsigned wrap-around sanitizer
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 5/6] ubsan: Split wrapping sanitizer Makefile rules
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 3/6] ubsan: Introduce CONFIG_UBSAN_POINTER_WRAP
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 4/6] ubsan: Remove CONFIG_UBSAN_SANITIZE_ALL
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 1/6] ubsan: Use Clang's -fsanitize-trap=undefined option
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 0/6] ubsan: Introduce wrap-around sanitizers
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 2/6] ubsan: Reintroduce signed and unsigned overflow sanitizers
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] crypto: ahash - unexport crypto_hash_alg_has_setkey()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - Fix null pointer dereference in __sev_platform_shutdown_locked
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] some updates and cleanups for hisilicon/sec2.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon/zip - Modify some data type and code cleanup
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 3/5] crypto: tegra: Add Tegra Security Engine driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/5] crypto: starfive: Add sm3 support for JH8100
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: (subset) [PATCH v4 0/8] Add UFS support for SC7180/SM7125
- From: Bjorn Andersson <andersson@xxxxxxxxxx>
- Re: [PATCH v2 03/20] drviers: crypto: meson: add platform data
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH v4 13/15] dt-bindings: crypto: ice: document the hwkm property
- From: Konrad Dybcio <konrad.dybcio@xxxxxxxxxx>
- Re: [GIT PULL] Crypto Fixes for 6.8
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v2 03/20] drviers: crypto: meson: add platform data
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] crypto: padlock-sha: Matches CPU with Family with 6 explicitly
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v4 02/15] qcom_scm: scm call for deriving a software secret
- From: Konrad Dybcio <konrad.dybcio@xxxxxxxxxx>
- [PATCH 10/10] vfio/qat: Add vfio_pci driver for Intel QAT VF devices
- From: Xin Zeng <xin.zeng@xxxxxxxxx>
- [PATCH 09/10] crypto: qat - implement interface for live migration
- From: Xin Zeng <xin.zeng@xxxxxxxxx>
- [PATCH 08/10] crypto: qat - add interface for live migration
- From: Xin Zeng <xin.zeng@xxxxxxxxx>
- [PATCH 07/10] crypto: qat - add bank save and restore flows
- From: Xin Zeng <xin.zeng@xxxxxxxxx>
- [PATCH 06/10] crypto: qat - expand CSR operations for QAT GEN4 devices
- From: Xin Zeng <xin.zeng@xxxxxxxxx>
- [PATCH 05/10] crypto: qat - rename get_sla_arr_of_type()
- From: Xin Zeng <xin.zeng@xxxxxxxxx>
- [PATCH 02/10] crypto: qat - relocate and rename 4xxx PF2VM definitions
- From: Xin Zeng <xin.zeng@xxxxxxxxx>
- [PATCH 04/10] crypto: qat - relocate CSR access code
- From: Xin Zeng <xin.zeng@xxxxxxxxx>
- [PATCH 03/10] crypto: qat - move PFVF compat checker to a function
- From: Xin Zeng <xin.zeng@xxxxxxxxx>
- [PATCH 01/10] crypto: qat - adf_get_etr_base() helper
- From: Xin Zeng <xin.zeng@xxxxxxxxx>
- [PATCH 00/10] crypto: qat - enable SRIOV VF live migration for
- From: Xin Zeng <xin.zeng@xxxxxxxxx>
- Re: [PATCH v4 15/15] arm64: dts: qcom: sm8550: add hwkm support to ufs ice
- From: neil.armstrong@xxxxxxxxxx
- Re: [PATCH v4 15/15] arm64: dts: qcom: sm8550: add hwkm support to ufs ice
- From: Om Prakash Singh <quic_omprsing@xxxxxxxxxxx>
- RE: [PATCH v2 4/5] crypto: starfive: Add sm3 support for JH8100
- From: JiaJie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- RE: [PATCH v2 4/5] crypto: starfive: Add sm3 support for JH8100
- From: JiaJie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH RESEND] virtio_crypto: remove duplicate check if queue is broken
- From: Li RongQing <lirongqing@xxxxxxxxx>
- RE: [PATCH v2 4/5] crypto: starfive: Add sm3 support for JH8100
- From: JiaJie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- RE: [PATCH v2 4/5] crypto: starfive: Add sm3 support for JH8100
- From: JiaJie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/9] crypto: qat - add heartbeat error simulator
- From: Tero Kristo <tero.kristo@xxxxxxxxx>
- Re: [PATCH v2 4/5] crypto: starfive: Add sm3 support for JH8100
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: algif_hash - Remove bogus SGL free on zero-length error path
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: adjust file entries after crypto vmx file movement
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: virtio/akcipher - Fix stack overflow on memcpy
- From: Jason Wang <jasowang@xxxxxxxxxx>
- [PATCH] crypto: algif_hash - Remove bogus SGL free on zero-length error path
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/5] crypto: starfive: Add sm3 support for JH8100
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [GIT PULL] Crypto Fixes for 6.8
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] crypto: padlock-sha: Matches CPU with Family with 6 explicitly
- From: Tony W Wang-oc <TonyWWang-oc@xxxxxxxxxxx>
- Re: [PATCH v2 0/4] some updates and cleanups for hisilicon/sec2.
- From: taoqi <taoqi10@xxxxxxxxxx>
- Re: [PATCH] crypto: virtio/akcipher - Fix stack overflow on memcpy
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v7 02/13] Documentation/x86: Secure Launch kernel documentation
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: virtio/akcipher - Fix stack overflow on memcpy
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH v2 1/3] crypto: padlock-sha: Matches CPU with Family with 6 explicitly
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v5.10.y] crypto: caam/jr - Fix possible caam_jr crash
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v2 1/3] crypto: padlock-sha: Matches CPU with Family with 6 explicitly
- From: Tony W Wang-oc <TonyWWang-oc@xxxxxxxxxxx>
- Re: [PATCH v2 2/3] x86/cpufeatures: Add CPU feature flags for Zhaoxin Hash Engine
- From: Tony W Wang-oc <TonyWWang-oc@xxxxxxxxxxx>
- Re: [PATCH RFC gmem v1 8/8] KVM: x86: Determine shared/private faults based on vm_type
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] crypto: qat - use kcalloc() instead of kzalloc()
- From: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
- Re: [PATCH v2 00/25] Add AMD Secure Nested Paging (SEV-SNP) Initialization Support
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH] crypto: virtio/akcipher - Fix stack overflow on memcpy
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- Re: [PATCH v4 02/15] qcom_scm: scm call for deriving a software secret
- From: Bjorn Andersson <quic_bjorande@xxxxxxxxxxx>
- Help needed to understand the mailing group for networking user questions
- From: "Jayalakshmi Manunath Bhat ," <bhat.jayalakshmi@xxxxxxxxx>
- Re: [PATCH v2 25/25] crypto: ccp: Add the SNP_SET_CONFIG command
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v2 10/25] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 10/25] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 25/25] crypto: ccp: Add the SNP_SET_CONFIG command
- From: Liam Merwick <liam.merwick@xxxxxxxxxx>
- Re: [PATCH v2 10/25] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
- From: Liam Merwick <liam.merwick@xxxxxxxxxx>
- Re: [PATCH v2 13/25] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] RISC-V: fix check for zvkb with tip-of-tree clang
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH v2 11/25] x86/sev: Adjust directmap to avoid inadvertant RMP faults
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH v2 17/25] crypto: ccp: Handle non-volatile INIT_EX data when SNP is enabled
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 16/25] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 15/25] x86/sev: Introduce snp leaked pages list
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 15/25] x86/sev: Introduce snp leaked pages list
- From: Vlastimil Babka <vbabka@xxxxxxx>
- [PATCH] crypto: cbc - Ensure statesize is zero
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] crypto: hisilicon/qm - obtain stop queue status
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH] MAINTAINERS: adjust file entries after crypto vmx file movement
- From: Lukas Bulwahn <lukas.bulwahn@xxxxxxxxx>
- [PATCH] crypto: qat - use kcalloc() instead of kzalloc()
- From: Lenko Donchev <lenko.donchev@xxxxxxxxx>
- [syzbot] [crypto?] BUG: unable to handle kernel NULL pointer dereference in crypto_arc4_crypt
- From: syzbot <syzbot+050eeedd6c285d8c42f2@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 11/25] x86/sev: Adjust directmap to avoid inadvertant RMP faults
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: Re: [PATCH 5.10 000/286] 5.10.209-rc1 review
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- Re: [PATCH 5.10 000/286] 5.10.209-rc1 review
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v4 13/15] dt-bindings: crypto: ice: document the hwkm property
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH v4 14/15] arm64: dts: qcom: sm8650: add hwkm support to ufs ice
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH 2/3] crypto: hisilicon/qm - obtain stop queue status
- From: liulongfang <liulongfang@xxxxxxxxxx>
- Re: [PATCH] X.509: Introduce scope-based x509_certificate allocation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] X.509: Introduce scope-based x509_certificate allocation
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH 5.10 000/286] 5.10.209-rc1 review
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- [PATCH] crypto: xilinx: call finalize with bh disabled
- From: quanyang.wang@xxxxxxxxxxxxx
- Re: [PATCH v4 15/15] arm64: dts: qcom: sm8550: add hwkm support to ufs ice
- From: Dmitry Baryshkov <dmitry.baryshkov@xxxxxxxxxx>
- [PATCH v4 06/15] soc: qcom: ice: support for generate, import and prepare key
- From: Gaurav Kashyap <quic_gaurkash@xxxxxxxxxxx>
- [PATCH v4 14/15] arm64: dts: qcom: sm8650: add hwkm support to ufs ice
- From: Gaurav Kashyap <quic_gaurkash@xxxxxxxxxxx>
- [PATCH v4 00/15] Hardware wrapped key support for qcom ice and ufs
- From: Gaurav Kashyap <quic_gaurkash@xxxxxxxxxxx>
- [PATCH v4 07/15] ufs: core: support wrapped keys in ufs core
- From: Gaurav Kashyap <quic_gaurkash@xxxxxxxxxxx>
- [PATCH v4 03/15] qcom_scm: scm call for create, prepare and import keys
- From: Gaurav Kashyap <quic_gaurkash@xxxxxxxxxxx>
- [PATCH v4 02/15] qcom_scm: scm call for deriving a software secret
- From: Gaurav Kashyap <quic_gaurkash@xxxxxxxxxxx>
- [PATCH v4 09/15] ufs: core: add support for generate, import and prepare keys
- From: Gaurav Kashyap <quic_gaurkash@xxxxxxxxxxx>
- [PATCH v4 04/15] soc: qcom: ice: add hwkm support in ice
- From: Gaurav Kashyap <quic_gaurkash@xxxxxxxxxxx>
- [PATCH v4 10/15] ufs: host: wrapped keys support in ufs qcom
- From: Gaurav Kashyap <quic_gaurkash@xxxxxxxxxxx>
- [PATCH v4 13/15] dt-bindings: crypto: ice: document the hwkm property
- From: Gaurav Kashyap <quic_gaurkash@xxxxxxxxxxx>
- [PATCH v4 11/15] ufs: host: implement derive sw secret vop in ufs qcom
- From: Gaurav Kashyap <quic_gaurkash@xxxxxxxxxxx>
- [PATCH v4 08/15] ufs: core: add support to derive software secret
- From: Gaurav Kashyap <quic_gaurkash@xxxxxxxxxxx>
- [PATCH v4 15/15] arm64: dts: qcom: sm8550: add hwkm support to ufs ice
- From: Gaurav Kashyap <quic_gaurkash@xxxxxxxxxxx>
- [PATCH v4 12/15] ufs: host: support for generate, import and prepare key
- From: Gaurav Kashyap <quic_gaurkash@xxxxxxxxxxx>
- [PATCH v4 01/15] ice, ufs, mmc: use blk_crypto_key for program_key
- From: Gaurav Kashyap <quic_gaurkash@xxxxxxxxxxx>
- [PATCH v4 05/15] soc: qcom: ice: support for hardware wrapped keys
- From: Gaurav Kashyap <quic_gaurkash@xxxxxxxxxxx>
- Re: [PATCH] RISC-V: fix check for zvkb with tip-of-tree clang
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH v2 11/25] x86/sev: Adjust directmap to avoid inadvertant RMP faults
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 11/25] x86/sev: Adjust directmap to avoid inadvertant RMP faults
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v4 2/6] mm/zswap: reuse dstmem when decompress
- From: Barry Song <21cnbao@xxxxxxxxx>
- [PATCH 2/3] crypto: hisilicon/qm - obtain stop queue status
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH 1/3] crypto: hisilicon/qm - add stop function by hardware
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH 3/3] crypto: hisilicon/qm - change function type to void
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH 0/3] crypto: hisilicon/qm - add stop function and obtain queue status
- From: Weili Qian <qianweili@xxxxxxxxxx>
- Re: [PATCH v2 11/25] x86/sev: Adjust directmap to avoid inadvertant RMP faults
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH] RISC-V: fix check for zvkb with tip-of-tree clang
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: ahash - unexport crypto_hash_alg_has_setkey()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: hisilicon/zip - Modify some data type and code cleanup
- From: Chenghai Huang <huangchenghai2@xxxxxxxxxx>
- Re: [PATCH 5.10 000/286] 5.10.209-rc1 review
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH 5.10 000/286] 5.10.209-rc1 review
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH v2 11/25] x86/sev: Adjust directmap to avoid inadvertant RMP faults
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH 5.10 000/286] 5.10.209-rc1 review
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH v2 11/25] x86/sev: Adjust directmap to avoid inadvertant RMP faults
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH bpf-next v8 1/3] bpf: make common crypto API for TC/XDP programs
- From: Vadim Fedorenko <vadim.fedorenko@xxxxxxxxx>
- Re: [PATCH v2 11/25] x86/sev: Adjust directmap to avoid inadvertant RMP faults
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH] crypto: ccp - Fix null pointer dereference in __sev_platform_shutdown_locked
- From: John Allen <john.allen@xxxxxxx>
- Re: [PATCH] crypto: ccp - Fix null pointer dereference in __sev_platform_shutdown_locked
- From: Kim Phillips <kim.phillips@xxxxxxx>
- Re: [PATCH v2 11/25] x86/sev: Adjust directmap to avoid inadvertant RMP faults
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 21/26] crypto: ccp: Add panic notifier for SEV/SNP firmware shutdown on kdump
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v1 26/26] crypto: ccp: Add the SNP_SET_CONFIG command
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v1 18/26] crypto: ccp: Handle legacy SEV commands when SNP is enabled
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [syzbot] [crypto?] KMSAN: uninit-value in af_alg_free_sg (2)
- From: xingwei lee <xrivendell7@xxxxxxxxx>
- Re: [PATCH] crypto: ccp - Fix null pointer dereference in __sev_platform_shutdown_locked
- From: Liam Merwick <liam.merwick@xxxxxxxxxx>
- Re: [PATCH] crypto:vmx: Move ppc vmx diirectory to arch/powerpc/crypto.
- From: Danny Tsen <dtsen@xxxxxxxxxxxxx>
- [PATCH v2 2/4] crypto: hisilicon/sec2 - modify nested macro call
- From: Qi Tao <taoqi10@xxxxxxxxxx>
- Re: [PATCH v2 21/25] KVM: SEV: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KEYS: include header for EINVAL definition
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH bpf-next v8 1/3] bpf: make common crypto API for TC/XDP programs
- From: Vadim Fedorenko <vadim.fedorenko@xxxxxxxxx>
- Re: [PATCH v1] crypto: iaa - Remove unnecessary debugfs_create_dir() error check in iaa_crypto_debugfs_init()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 3/4] crypto: hisilicon/sec2 - fix some cleanup issues
- From: Qi Tao <taoqi10@xxxxxxxxxx>
- [PATCH v2 1/4] crypto: hisilicon/sec2 - updates the sec DFX function register
- From: Qi Tao <taoqi10@xxxxxxxxxx>
- [PATCH v2 4/4] crypto: hisilicon/sec - remove unused parameter
- From: Qi Tao <taoqi10@xxxxxxxxxx>
- [PATCH v2 0/4] some updates and cleanups for hisilicon/sec2.
- From: Qi Tao <taoqi10@xxxxxxxxxx>
- [PATCH v2 4/4] crypto: hisilicon/sec - remove unused parameter
- From: Qi Tao <taoqi10@xxxxxxxxxx>
- [PATCH v2 1/4] crypto: hisilicon/sec2 - updates the sec DFX function register
- From: Qi Tao <taoqi10@xxxxxxxxxx>
- Re: [PATCH] crypto: iaa - Remove header table code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 2/4] crypto: hisilicon/sec2 - modify nested macro call
- From: Qi Tao <taoqi10@xxxxxxxxxx>
- [PATCH v2 0/4] some updates and cleanups for hisilicon/sec2.
- From: Qi Tao <taoqi10@xxxxxxxxxx>
- [PATCH v2 3/4] crypto: hisilicon/sec2 - fix some cleanup issues
- From: Qi Tao <taoqi10@xxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon - Fix smp_processor_id() warnings
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: sun8i-ce - Use kcalloc() instead of kzalloc()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: remove unused xts4096 and xts512 algorithms from testmgr.c
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/8] crypto: Clean up arm64 AES-CCM code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/8] dt-bindings: crypto: ice: Document SC7180 inline crypto engine
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - fix arbiter mapping generation algorithm for QAT 402xx
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - use kcalloc_node() instead of kzalloc_node()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH][next] crypto: asymmetric_keys: remove redundant pointer secs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - fix arbiter mapping generation algorithm for QAT 402xx
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: caam: fix asynchronous hash
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH][next] crypto: pcbc: remove redundant assignment to nbytes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] crypto: hisilicon/qm - add debugfs qm_state for hisilicon driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] dt-bindings: qcom-qce: Add compatible for SM6350
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - avoid memcpy() overflow warning
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto:vmx: Move ppc vmx diirectory to arch/powerpc/crypto.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: virtio - Less function calls in __virtio_crypto_akcipher_do_req() after error detection
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/4] crypto: hisilicon/sec2 - fix some cleanup issues
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/4] crypto: hisilicon/sec2 - fix some cleanup issues
- From: taoqi <taoqi10@xxxxxxxxxx>
- Re: [PATCH] crypto: rsa - restrict plaintext/ciphertext values more in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: rsa - restrict plaintext/ciphertext values more in FIPS mode
- From: Joachim Vandersmissen <git@xxxxxxxxx>
- Re: [PATCH] crypto: rsa - restrict plaintext/ciphertext values more in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] X.509: Introduce scope-based x509_certificate allocation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/5] crypto: starfive: Add sm3 support for JH8100
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 08/25] x86/traps: Define RMP violation #PF error code
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v2 07/25] x86/fault: Add helper for dumping RMP entries
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v2 06/25] x86/sev: Add RMP entry lookup helpers
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v2 05/25] x86/mtrr: Don't print errors if MtrrFixDramModEn is set when SNP enabled
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v2 04/25] x86/sev: Add the host SEV-SNP initialization support
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v2 03/25] iommu/amd: Don't rely on external callers to enable IOMMU SNP support
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v2 02/25] x86/speculation: Do not enable Automatic IBRS if SEV SNP is enabled
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v2 25/25] crypto: ccp: Add the SNP_SET_CONFIG command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v2 24/25] crypto: ccp: Add the SNP_COMMIT command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v2 23/25] crypto: ccp: Add the SNP_PLATFORM_STATUS command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v2 22/25] x86/cpufeatures: Enable/unmask SEV-SNP CPU feature
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v2 21/25] KVM: SEV: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v2 01/25] x86/cpufeatures: Add SEV-SNP CPU feature
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v2 20/25] crypto: ccp: Add panic notifier for SEV/SNP firmware shutdown on kdump
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v2 19/25] iommu/amd: Clean up RMP entries for IOMMU pages during SNP shutdown
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v2 18/25] crypto: ccp: Handle legacy SEV commands when SNP is enabled
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v2 17/25] crypto: ccp: Handle non-volatile INIT_EX data when SNP is enabled
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v2 16/25] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v2 15/25] x86/sev: Introduce snp leaked pages list
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v2 14/25] crypto: ccp: Provide API to issue SEV and SNP commands
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v2 13/25] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v2 12/25] crypto: ccp: Define the SEV-SNP commands
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v2 11/25] x86/sev: Adjust directmap to avoid inadvertant RMP faults
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v2 00/25] Add AMD Secure Nested Paging (SEV-SNP) Initialization Support
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v2 10/25] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v2 09/25] x86/fault: Dump RMP table information when RMP page faults occur
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v1 22/26] KVM: SEV: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v1 24/26] crypto: ccp: Add the SNP_PLATFORM_STATUS command
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v1 13/26] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v1 12/26] crypto: ccp: Define the SEV-SNP commands
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v1 21/26] crypto: ccp: Add panic notifier for SEV/SNP firmware shutdown on kdump
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH] crypto: ccp - Fix null pointer dereference in __sev_platform_shutdown_locked
- From: Kim Phillips <kim.phillips@xxxxxxx>
- Re: [PATCH bpf-next v8 1/3] bpf: make common crypto API for TC/XDP programs
- From: Martin KaFai Lau <martin.lau@xxxxxxxxx>
- Re: [PATCH bpf-next v8 1/3] bpf: make common crypto API for TC/XDP programs
- From: Vadim Fedorenko <vadim.fedorenko@xxxxxxxxx>
- Re: [PATCH 3/3] crypto: scompress: remove memcpy if sg_nents is 1
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH bpf-next v8 2/3] bpf: crypto: add skcipher to bpf crypto
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/9] crypto: qat - add heartbeat error simulator
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/6] mm/zswap: reuse dstmem when decompress
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/4] crypto: hisilicon/sec2 - fix some cleanup issues
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH bpf-next v8 3/3] selftests: bpf: crypto skcipher algo selftests
- From: Martin KaFai Lau <martin.lau@xxxxxxxxx>
- Re: [PATCH bpf-next v8 2/3] bpf: crypto: add skcipher to bpf crypto
- From: Martin KaFai Lau <martin.lau@xxxxxxxxx>
- Re: [PATCH bpf-next v8 1/3] bpf: make common crypto API for TC/XDP programs
- From: Martin KaFai Lau <martin.lau@xxxxxxxxx>
- Re: [PATCH v2] crypto: caam: fix asynchronous hash
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] virtio_crypto: remove duplicate check if queue is broken
- From: Stefan Hajnoczi <stefanha@xxxxxxxxx>
- Re: [PATCH v2 00/20] Support more Amlogic SoC families in crypto driver
- From: neil.armstrong@xxxxxxxxxx
- [PATCH v4 5/5] arm64: tegra: Add Tegra Security Engine DT nodes
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- [PATCH v4 4/5] arm64: defconfig: Enable Tegra Security Engine
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- [PATCH v4 3/5] crypto: tegra: Add Tegra Security Engine driver
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- [PATCH v4 2/5] gpu: host1x: Add Tegra SE to SID table
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- [PATCH v4 1/5] dt-bindings: crypto: Add Tegra Security Engine
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- [PATCH v4 0/5] Add Tegra Security Engine driver
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- Re: [PATCH v2 02/20] drivers: crypto: meson: make CLK controller optional
- From: Jerome Brunet <jbrunet@xxxxxxxxxxxx>
- Re: [PATCH v2 03/20] drviers: crypto: meson: add platform data
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH v2 20/20] arch: arm64: dts: meson: axg: add crypto node
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH v2 16/20] dt-bindings: crypto: meson: add new compatibles
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH bpf-next v8 1/3] bpf: make common crypto API for TC/XDP programs
- From: Martin KaFai Lau <martin.lau@xxxxxxxxx>
- Re: [PATCH v2 16/20] dt-bindings: crypto: meson: add new compatibles
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH bpf-next v8 1/3] bpf: make common crypto API for TC/XDP programs
- From: Vadim Fedorenko <vadim.fedorenko@xxxxxxxxx>
- Re: [PATCH v3 00/10] RISC-V crypto with reworked asm files
- From: patchwork-bot+linux-riscv@xxxxxxxxxx
- Re: [PATCH] crypto: sun8i-ce - Use kcalloc() instead of kzalloc()
- From: Jernej Škrabec <jernej.skrabec@xxxxxxxxx>
- [PATCH v2 06/20] drivers: crypto: meson: drop status field from meson_flow
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v2 17/20] arch: arm64: dts: meson: a1: add crypto node
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v2 01/20] drivers: crypto: meson: don't hardcode IRQ count
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v2 03/20] drviers: crypto: meson: add platform data
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v2 18/20] arch: arm64: dts: meson: s4: add crypto node
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v2 04/20] drivers: crypto: meson: add MMIO helpers
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v2 08/20] drivers: crypto: meson: cleanup defines
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v2 15/20] drivers: crypto: meson: add support for AXG-series
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v2 20/20] arch: arm64: dts: meson: axg: add crypto node
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v2 19/20] arch: arm64: dts: meson: g12: add crypto node
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v2 16/20] dt-bindings: crypto: meson: add new compatibles
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v2 14/20] drivers: crypto: meson: add support for G12-series
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v2 13/20] drivers: crypto: meson: use fallback for 192-bit keys
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v2 11/20] drivers: crypto: meson: introduce hasher
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v2 12/20] drivers: crypto: meson: add support for AES-CTR
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v2 10/20] drivers: crypto: meson: avoid kzalloc in engine thread
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v2 09/20] drivers: crypto: meson: process more than MAXDESCS descriptors
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v2 07/20] drivers: crypto: meson: move algs definition and cipher API to cipher.c
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v2 05/20] drivers: crypto: meson: move get_engine_number()
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v2 00/20] Support more Amlogic SoC families in crypto driver
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v2 02/20] drivers: crypto: meson: make CLK controller optional
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] crypto: padlock-sha: Matches CPU with Family with 6 explicitly
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v2 2/3] x86/cpufeatures: Add CPU feature flags for Zhaoxin Hash Engine
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 2/3] x86/cpufeatures: Add CPU feature flags for Zhaoxin Hash Engine
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH v3 00/10] RISC-V crypto with reworked asm files
- From: Christoph Müllner <christoph.muellner@xxxxxxxx>
- Re: Build regressions/improvements in v6.8-rc1
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: (subset) [PATCH v4 0/8] Add UFS support for SC7180/SM7125
- From: Vinod Koul <vkoul@xxxxxxxxxx>
- Re: [PATCH] crypto: qat - use kcalloc_node() instead of kzalloc_node()
- From: "Cabiddu, Giovanni" <giovanni.cabiddu@xxxxxxxxx>
- Re: Build regressions/improvements in v6.8-rc1
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/3] x86/cpufeatures: Add CPU feature flags for Zhaoxin Hash Engine
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 46/82] crypto: Refactor intentional wrap-around test
- From: Kees Cook <kees@xxxxxxxxxx>
- Re: [PATCH 46/82] crypto: Refactor intentional wrap-around test
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 2/3] x86/cpufeatures: Add CPU feature flags for Zhaoxin Hash Engine
- From: Tony W Wang-oc <TonyWWang-oc@xxxxxxxxxxx>
- [PATCH v2 1/3] crypto: padlock-sha: Matches CPU with Family with 6 explicitly
- From: Tony W Wang-oc <TonyWWang-oc@xxxxxxxxxxx>
- [PATCH v2 3/3] crypto: Zhaoxin: Hardware Engine Driver for SHA1/256/384/512
- From: Tony W Wang-oc <TonyWWang-oc@xxxxxxxxxxx>
- [PATCH v2 0/3] Add Zhaoxin hardware engine driver support for SHA
- From: Tony W Wang-oc <TonyWWang-oc@xxxxxxxxxxx>
- Re: [PATCH v3 00/10] RISC-V crypto with reworked asm files
- From: Palmer Dabbelt <palmer@xxxxxxxxxxx>
- [PATCH 46/82] crypto: Refactor intentional wrap-around test
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 39/82] crypto: Refactor intentional wrap-around test
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] X.509: Introduce scope-based x509_certificate allocation
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] crypto: qat - use kcalloc_node() instead of kzalloc_node()
- From: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: sun8i-ce - Use kcalloc() instead of kzalloc()
- From: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: remove unused xts4096 and xts512 algorithms from testmgr.c
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 10/10] crypto: riscv - add vector crypto accelerated SM4
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 09/10] crypto: riscv - add vector crypto accelerated SM3
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 08/10] crypto: riscv - add vector crypto accelerated SHA-{512,384}
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 06/10] crypto: riscv - add vector crypto accelerated GHASH
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 07/10] crypto: riscv - add vector crypto accelerated SHA-{256,224}
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 04/10] crypto: riscv - add vector crypto accelerated AES-{ECB,CBC,CTR,XTS}
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 05/10] crypto: riscv - add vector crypto accelerated ChaCha20
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 03/10] RISC-V: hook new crypto subdir into build-system
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 02/10] RISC-V: add TOOLCHAIN_HAS_VECTOR_CRYPTO
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 01/10] RISC-V: add helper function to read the vector VLEN
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 00/10] RISC-V crypto with reworked asm files
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: remove unused xts4096 and xts512 algorithms from testmgr.c
- From: Joachim Vandersmissen <git@xxxxxxxxx>
- [PATCH] crypto: rsa - restrict plaintext/ciphertext values more in FIPS mode
- From: Joachim Vandersmissen <git@xxxxxxxxx>
- [PATCH] X.509: Introduce scope-based x509_certificate allocation
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH v4 8/8] arm64: dts: qcom: Add support for Xiaomi Redmi Note 9S
- From: David Wronek <davidwronek@xxxxxxxxx>
- [PATCH v4 7/8] arm64: dts: qcom: sm7125-xiaomi-common: Add UFS nodes
- From: David Wronek <davidwronek@xxxxxxxxx>
- [PATCH v4 6/8] arm64: dts: qcom: sc7180: Add UFS nodes
- From: David Wronek <davidwronek@xxxxxxxxx>
- [PATCH v4 5/8] phy: qcom: qmp-ufs: Add SC7180 support
- From: David Wronek <davidwronek@xxxxxxxxx>
- [PATCH v4 4/8] dt-bindings: arm: qcom: Add Xiaomi Redmi Note 9S
- From: David Wronek <davidwronek@xxxxxxxxx>
- [PATCH v4 3/8] dt-bindings: phy: Add QMP UFS PHY compatible for SC7180
- From: David Wronek <davidwronek@xxxxxxxxx>
- [PATCH v4 2/8] dt-bindings: ufs: qcom: Add SC7180 compatible string
- From: David Wronek <davidwronek@xxxxxxxxx>
- [PATCH v4 1/8] dt-bindings: crypto: ice: Document SC7180 inline crypto engine
- From: David Wronek <davidwronek@xxxxxxxxx>
- [PATCH v4 0/8] Add UFS support for SC7180/SM7125
- From: David Wronek <davidwronek@xxxxxxxxx>
- [PATCH] crypto: qat - use kcalloc_node() instead of kzalloc_node()
- From: Erick Archer <erick.archer@xxxxxxx>
- [PATCH] crypto: sun8i-ce - Use kcalloc() instead of kzalloc()
- From: Erick Archer <erick.archer@xxxxxxx>
- Re: [PATCH v1 26/26] crypto: ccp: Add the SNP_SET_CONFIG command
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 25/26] crypto: ccp: Add the SNP_COMMIT command
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 24/26] crypto: ccp: Add the SNP_PLATFORM_STATUS command
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 22/26] KVM: SEV: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 21/26] crypto: ccp: Add panic notifier for SEV/SNP firmware shutdown on kdump
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v9 02/13] dt-bindings: treewide: add access-controllers description
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH][next] crypto: asymmetric_keys: remove redundant pointer secs
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v1 18/26] crypto: ccp: Handle legacy SEV commands when SNP is enabled
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 18/26] crypto: ccp: Handle legacy SEV commands when SNP is enabled
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v1 18/26] crypto: ccp: Handle legacy SEV commands when SNP is enabled
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 3/3] crypto: Zhaoxin: Hardware Engine Driver for SHA1/256/384/512
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] crypto: qat - fix arbiter mapping generation algorithm for QAT 402xx
- From: "Cabiddu, Giovanni" <giovanni.cabiddu@xxxxxxxxx>
- [PATCH] crypto: qat - fix arbiter mapping generation algorithm for QAT 402xx
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- [PATCH] crypto: hisilicon - Fix smp_processor_id() warnings
- From: Wenkai Lin <linwenkai6@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] some updates and cleanups for hisilicon/sec2.
- From: taoqi <taoqi10@xxxxxxxxxx>
- [PATCH v2 8/8] crypto: arm64/aes-ccm - Merge finalization into en/decrypt asm helpers
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH v2 7/8] crypto: arm64/aes-ccm - Merge encrypt and decrypt tail handling
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH v2 6/8] crypto: arm64/aes-ccm - Cache round keys and unroll AES loops
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH v2 4/8] crypto: arm64/aes-ccm - Replace bytewise tail handling with NEON permute
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH v2 5/8] crypto: arm64/aes-ccm - Reuse existing MAC update for AAD input
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH v2 3/8] crypto: arm64/aes-ccm - Pass short inputs via stack buffer
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH v2 2/8] crypto: arm64/aes-ccm - Keep NEON enabled during skcipher walk
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH v2 0/8] crypto: Clean up arm64 AES-CCM code
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH v2 1/8] crypto: arm64/aes-ccm - Revert "Rewrite skcipher walker loop"
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [PATCH v1 17/26] crypto: ccp: Handle non-volatile INIT_EX data when SNP is enabled
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH][next] crypto: asymmetric_keys: remove redundant pointer secs
- From: Colin Ian King <colin.i.king@xxxxxxxxx>
- RE: [EXT] Re: [PATCH] crypto: caam/hash - fix asynchronous hash
- From: Gaurav Jain <gaurav.jain@xxxxxxx>
- [PATCH v2] crypto: caam: fix asynchronous hash
- From: Gaurav Jain <gaurav.jain@xxxxxxx>
- Re: [EXT] Re: [PATCH] crypto: caam/hash - fix asynchronous hash
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- RE: [EXT] Re: [PATCH] crypto: caam/hash - fix asynchronous hash
- From: Gaurav Jain <gaurav.jain@xxxxxxx>
- Re: [PATCH v1 14/26] crypto: ccp: Provide API to issue SEV and SNP commands
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] crypto: caam/hash - fix asynchronous hash
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 3/3] crypto: Zhaoxin: Hardware Engine Driver for SHA1/256/384/512
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH][next] crypto: pcbc: remove redundant assignment to nbytes
- From: Colin Ian King <colin.i.king@xxxxxxxxx>
- Re: [PATCH v1] imx_v6_v7_defconfig: Enable sm3, sm4, polyval, xctr cipher test support
- From: Fabio Estevam <festevam@xxxxxxxxx>
- RE: [PATCH v1] imx_v6_v7_defconfig: Enable sm3, sm4, polyval, xctr cipher test support
- From: Kshitiz Varshney <kshitiz.varshney@xxxxxxx>
- [PATCH] crypto: caam/hash - fix asynchronous hash
- From: Gaurav Jain <gaurav.jain@xxxxxxx>
- [PATCH v2 5/5] crypto: starfive: Add sm4 support for JH8100
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH v2 2/5] crypto: starfive: Update hash dma usage
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH v2 0/5] crypto: starfive: Add support for JH8100
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH v2 3/5] crypto: starfive: Use dma for aes requests
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH v2 1/5] dt-bindings: crypto: starfive: Add jh8100 compatible string
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH v2 4/5] crypto: starfive: Add sm3 support for JH8100
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/5] gpu: host1x: Add Tegra SE to SID table
- From: Mikko Perttunen <cyndis@xxxxxxxx>
- [PATCH 1/3] crypto: padlock-sha: Matches CPU with Family with 6 explicitly
- From: Tony W Wang-oc <TonyWWang-oc@xxxxxxxxxxx>
- [PATCH 2/3] x86/cpufeatures: Add CPU feature flags for Zhaoxin Hash Engine
- From: Tony W Wang-oc <TonyWWang-oc@xxxxxxxxxxx>
- [PATCH 3/3] crypto: Zhaoxin: Hardware Engine Driver for SHA1/256/384/512
- From: Tony W Wang-oc <TonyWWang-oc@xxxxxxxxxxx>
- [PATCH 0/3] Add Zhaoxin hardware engine driver support for SHA
- From: Tony W Wang-oc <TonyWWang-oc@xxxxxxxxxxx>
- Re: [PATCH v11 18/35] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_UPDATE command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH AUTOSEL 4.19 08/12] crypto: stm32/crc32 - fix parsing list of devices
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.4 08/12] crypto: stm32/crc32 - fix parsing list of devices
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.10 08/12] crypto: stm32/crc32 - fix parsing list of devices
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.15 09/13] crypto: stm32/crc32 - fix parsing list of devices
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.15 08/13] crypto: octeontx2 - Fix cptvf driver cleanup
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.1 10/14] crypto: stm32/crc32 - fix parsing list of devices
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.1 08/14] crypto: octeontx2 - Fix cptvf driver cleanup
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.6 14/19] crypto: stm32/crc32 - fix parsing list of devices
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.6 12/19] crypto: octeontx2 - Fix cptvf driver cleanup
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.6 11/19] crypto: starfive - Fix dev_err_probe return error
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.6 08/19] crypto: p10-aes-gcm - Avoid -Wstringop-overflow warnings
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.6 07/19] hwrng: starfive - Fix dev_err_probe return error
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.7 14/19] crypto: stm32/crc32 - fix parsing list of devices
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.7 12/19] crypto: octeontx2 - Fix cptvf driver cleanup
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.7 11/19] crypto: starfive - Fix dev_err_probe return error
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.7 08/19] crypto: p10-aes-gcm - Avoid -Wstringop-overflow warnings
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.7 07/19] hwrng: starfive - Fix dev_err_probe return error
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH bpf-next v8 2/3] bpf: crypto: add skcipher to bpf crypto
- From: Vadim Fedorenko <vadfed@xxxxxxxx>
- [PATCH bpf-next v8 1/3] bpf: make common crypto API for TC/XDP programs
- From: Vadim Fedorenko <vadfed@xxxxxxxx>
- [PATCH bpf-next v8 3/3] selftests: bpf: crypto skcipher algo selftests
- From: Vadim Fedorenko <vadfed@xxxxxxxx>
- Re: [PATCH v1 13/26] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 13/26] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 12/26] crypto: ccp: Define the SEV-SNP commands
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Borislav Petkov <bp@xxxxxxxxx>
- RE: [PATCH v6 RESEND 5/5] crypto: LEA block cipher x86_64 optimization
- From: Dongsoo Lee <letrhee@xxxxxxxxx>
- [syzbot] [crypto?] KMSAN: uninit-value in af_alg_free_sg (2)
- From: syzbot <syzbot+3266db0c26d1fbbe3abb@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [syzbot] [crypto?] KMSAN: uninit-value in lzo1x_1_do_compress (2)
- From: syzbot <syzbot+9a049ebdaacbb076e50a@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: include header for EINVAL definition
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 3/5] crypto: tegra: Add Tegra Security Engine driver
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 0/3] Update LLVM Phabricator and Bugzilla links
- From: Alex Deucher <alexdeucher@xxxxxxxxx>
- Re: [PATCH v1 10/26] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
- From: Borislav Petkov <bp@xxxxxxxxx>
- RE: [PATCH v6 RESEND 5/5] crypto: LEA block cipher x86_64 optimization
- From: David Laight <David.Laight@xxxxxxxxxx>
- [PATCH 2/2] crypto: hisilicon/qm - dump important registers values before resetting
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH 1/2] crypto: hisilicon/qm - support get device state
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH 0/2] crypto: hisilicon/qm - add debugfs qm_state for hisilicon driver
- From: Weili Qian <qianweili@xxxxxxxxxx>
- Re: [PATCH] KEYS: include header for EINVAL definition
- From: Clay Chang <clayc@xxxxxxx>
- [PATCH v6 RESEND 5/5] crypto: LEA block cipher x86_64 optimization
- From: Dongsoo Lee <letrhee@xxxxxxxxx>
- [PATCH v6 RESEND 4/5] fscrypt: Add LEA-256-XTS, LEA-256-CTS support
- From: Dongsoo Lee <letrhee@xxxxxxxxx>
- [PATCH v6 RESEND 3/5] blk-crypto: Add LEA-256-XTS blk-crypto support
- From: Dongsoo Lee <letrhee@xxxxxxxxx>
- [PATCH v6 RESEND 2/5] crypto: add LEA testmgr tests
- From: Dongsoo Lee <letrhee@xxxxxxxxx>
- [PATCH v6 RESEND 1/5] crypto: LEA block cipher implementation
- From: Dongsoo Lee <letrhee@xxxxxxxxx>
- [PATCH v6 RESEND 0/5] crypto: LEA block cipher implementation
- From: Dongsoo Lee <letrhee@xxxxxxxxx>
- Re: [PATCH 0/3] Update LLVM Phabricator and Bugzilla links
- From: Fangrui Song <maskray@xxxxxxxxxx>
- Re: [PATCH 1/3] selftests/bpf: Update LLVM Phabricator links
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH 1/3] selftests/bpf: Update LLVM Phabricator links
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH 1/3] selftests/bpf: Update LLVM Phabricator links
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Rebuilding at least part of my krb5 crypto lib on crypto-aead
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] docs: admin-guide: hw_random: update rng-tools website
- From: Jonathan Corbet <corbet@xxxxxxx>
- Re: [PATCH 4/8] crypto: arm64/aes-ccm - Replace bytewise tail handling with NEON permute
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 8/8] crypto: arm64/aes-ccm - Merge finalization into en/decrypt asm helper
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH 7/8] crypto: arm64/aes-ccm - Merge encrypt and decrypt asm routines
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH 6/8] crypto: arm64/aes-ccm - Cache round keys and unroll AES loops
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH 5/8] crypto: arm64/aes-ccm - Reuse existing MAC update for AAD input
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH 4/8] crypto: arm64/aes-ccm - Replace bytewise tail handling with NEON permute
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH 3/8] crypto: arm64/aes-ccm - Pass short inputs via stack buffer
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH 2/8] crypto: arm64/aes-ccm - Keep NEON enabled during skcipher walk
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH 1/8] crypto: arm64/aes-ccm - Revert "Rewrite skcipher walker loop"
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH 0/8] crypto: Clean up arm64 AES-CCM code
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- RE: [PATCH v3 1/5] dt-bindings: crypto: Add Tegra Security Engine
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- RE: [EXT] RE: [PATCH v5.10.y] crypto: caam/jr - Fix possible caam_jr crash
- From: Gaurav Jain <gaurav.jain@xxxxxxx>
- Re: [PATCH v1 00/24] Support more Amlogic SoC families in crypto driver
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 00/24] Support more Amlogic SoC families in crypto driver
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH v1 00/24] Support more Amlogic SoC families in crypto driver
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH v1 00/24] Support more Amlogic SoC families in crypto driver
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 01/24] drivers: crypto: meson: don't hardcode IRQ count
- From: neil.armstrong@xxxxxxxxxx
- Re: [PATCH v1 02/24] drivers: crypto: meson: make CLK controller optional
- From: neil.armstrong@xxxxxxxxxx
- Re: [PATCH v1 00/24] Support more Amlogic SoC families in crypto driver
- From: neil.armstrong@xxxxxxxxxx
- Re: [PATCH v1 17/24] arch: arm64: dts: meson: a1: add crypto node
- From: neil.armstrong@xxxxxxxxxx
- Re: [PATCH v1 16/24] dt-bindings: crypto: meson: add new compatibles
- From: neil.armstrong@xxxxxxxxxx
- Re: [PATCH 1/3] selftests/bpf: Update LLVM Phabricator links
- From: Yonghong Song <yonghong.song@xxxxxxxxx>
- Re: [PATCH v1 16/24] dt-bindings: crypto: meson: add new compatibles
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v1 20/26] crypto: ccp: Add debug support for decrypting pages
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH 0/3] Update LLVM Phabricator and Bugzilla links
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v1 07/26] x86/fault: Add helper for dumping RMP entries
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 16/24] dt-bindings: crypto: meson: add new compatibles
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v1 00/24] Support more Amlogic SoC families in crypto driver
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [GIT PULL] Crypto Update for 6.8
- From: pr-tracker-bot@xxxxxxxxxx
- [PATCH v1 04/24] drivers: crypto: meson: add MMIO helpers
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v1 00/24] Support more Amlogic SoC families in crypto driver
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v1 02/24] drivers: crypto: meson: make CLK controller optional
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v1 06/24] drivers: crypto: meson: drop status field from meson_flow
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 07/26] x86/fault: Add helper for dumping RMP entries
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH v1 24/24] arch: arm64: dts: meson: g12a-u200: enable crypto node
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v1 23/24] arch: arm64: dts: meson: axg-s400: enable crypto node
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v1 22/24] arch: arm64: dts: meson: a1-ad401: enable crypto node
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v1 21/24] arch: arm64: dts: meson: s4-s805x2-aq222: enable crypto node
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v1 20/24] arch: arm64: dts: meson: axg: add crypto node
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v1 19/24] arch: arm64: dts: meson: g12: add crypto node
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v1 18/24] arch: arm64: dts: meson: s4: add crypto node
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v1 17/24] arch: arm64: dts: meson: a1: add crypto node
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v1 16/24] dt-bindings: crypto: meson: add new compatibles
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v1 15/24] drivers: crypto: meson: add support for AXG-series
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v1 14/24] drivers: crypto: meson: add support for G12-series
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v1 11/24] drivers: crypto: meson: introduce hasher
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v1 13/24] drivers: crypto: meson: use fallback for 192-bit keys
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v1 12/24] drivers: crypto: meson: add support for AES-CTR
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v1 05/24] drivers: crypto: meson: move get_engine_number()
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v1 03/24] drviers: crypto: meson: add platform data
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v1 10/24] drivers: crypto: meson: avoid kzalloc in engine thread
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v1 09/24] drivers: crypto: meson: process more than MAXDESCS descriptors
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v1 07/24] drivers: crypto: meson: move algs definition and cipher API to cipher.c
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v1 01/24] drivers: crypto: meson: don't hardcode IRQ count
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v1 08/24] drivers: crypto: meson: cleanup defines
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: include header for EINVAL definition
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v1 07/26] x86/fault: Add helper for dumping RMP entries
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 07/26] x86/fault: Add helper for dumping RMP entries
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v11 18/35] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_UPDATE command
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v1 07/26] x86/fault: Add helper for dumping RMP entries
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 07/26] x86/fault: Add helper for dumping RMP entries
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v1 07/26] x86/fault: Add helper for dumping RMP entries
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v1 20/26] crypto: ccp: Add debug support for decrypting pages
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/3] arch and include: Update LLVM Phabricator links
- From: Conor Dooley <conor@xxxxxxxxxx>
- RE: [PATCH v5.10.y] crypto: caam/jr - Fix possible caam_jr crash
- From: Kun Song <Kun.Song@xxxxxxxxxxxxx>
- Re: [PATCH v1 07/26] x86/fault: Add helper for dumping RMP entries
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 0/2] Add Crypto Engine support for SM6350
- From: Konrad Dybcio <konrad.dybcio@xxxxxxxxxx>
- Re: [PATCH v1 07/26] x86/fault: Add helper for dumping RMP entries
- From: Borislav Petkov <bp@xxxxxxxxx>
- RE: [EXT] RE: [PATCH v5.10.y] crypto: caam/jr - Fix possible caam_jr crash
- From: Gaurav Jain <gaurav.jain@xxxxxxx>
- Re: [PATCH v1 15/26] x86/sev: Introduce snp leaked pages list
- From: Vlastimil Babka <vbabka@xxxxxxx>
- RE: [PATCH v5.10.y] crypto: caam/jr - Fix possible caam_jr crash
- From: Kun Song <Kun.Song@xxxxxxxxxxxxx>
- Re: crypto: virtio - Less function calls in __virtio_crypto_akcipher_do_req() after error detection
- From: Markus Elfring <Markus.Elfring@xxxxxx>
- RE: [REMINDER] Re: [PATCH v5.10.y] crypto: caam/jr - Fix possible caam_jr crash
- From: Gaurav Jain <gaurav.jain@xxxxxxx>
- Recall: [REMINDER] Re: [PATCH v5.10.y] crypto: caam/jr - Fix possible caam_jr crash
- From: "Gaurav Jain (OSS)" <gaurav.jain@xxxxxxxxxxx>
- RE: [REMINDER] Re: [PATCH v5.10.y] crypto: caam/jr - Fix possible caam_jr crash
- From: "Gaurav Jain (OSS)" <gaurav.jain@xxxxxxxxxxx>
- [REMINDER] Re: [PATCH v5.10.y] crypto: caam/jr - Fix possible caam_jr crash
- From: Kun Song <Kun.Song@xxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: virtio - Less function calls in __virtio_crypto_akcipher_do_req() after error detection
- From: Justin Stitt <justinstitt@xxxxxxxxxx>
- Re: [PATCH v1 15/26] x86/sev: Introduce snp leaked pages list
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- [GIT PULL] Crypto Update for 6.8
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3/3] treewide: Update LLVM Bugzilla links
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- [PATCH 2/3] arch and include: Update LLVM Phabricator links
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- [PATCH 1/3] selftests/bpf: Update LLVM Phabricator links
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- [PATCH 0/3] Update LLVM Phabricator and Bugzilla links
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH v10 07/50] x86/sev: Add RMP entry lookup helpers
- From: Borislav Petkov <bp@xxxxxxxxx>
- [syzbot] [crypto?] KMSAN: uninit-value in chksum_update
- From: syzbot <syzbot+9c0d9ba56264f1602420@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1] crypto: iaa - Remove unnecessary debugfs_create_dir() error check in iaa_crypto_debugfs_init()
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/5] dt-bindings: crypto: Add Tegra Security Engine
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH v1 04/26] x86/sev: Add the host SEV-SNP initialization support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 04/26] x86/sev: Add the host SEV-SNP initialization support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 04/26] x86/sev: Add the host SEV-SNP initialization support
- From: Jeremi Piotrowski <jpiotrowski@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] Add Crypto Engine support for SM6350
- From: "Luca Weiss" <luca.weiss@xxxxxxxxxxxxx>
- [PATCH v3 5/5] arm64: tegra: Add Tegra Security Engine DT nodes
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- [PATCH v3 4/5] arm64: defconfig: Enable Tegra Security Engine
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- [PATCH v3 3/5] crypto: tegra: Add Tegra Security Engine driver
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- [PATCH v3 2/5] gpu: host1x: Add Tegra SE to SID table
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- [PATCH v3 1/5] dt-bindings: crypto: Add Tegra Security Engine
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- [PATCH v3 0/5] Add Tegra Security Engine driver
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- Re: [PATCH 1/3] crypto: introduce acomp_is_async to expose if a acomp has a scomp backend
- From: Barry Song <21cnbao@xxxxxxxxx>
- [PATCH v1] crypto: iaa - Remove unnecessary debugfs_create_dir() error check in iaa_crypto_debugfs_init()
- From: Minjie Du <duminjie@xxxxxxxx>
- Re: [PATCH] KEYS: include header for EINVAL definition
- From: Clay Chang <clayc@xxxxxxx>
- Re: [PATCH] crypto: iaa - Remove header table code
- From: Dave Jiang <dave.jiang@xxxxxxxxx>
- [PATCH] crypto: iaa - Remove header table code
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] mm/zswap: remove the memcpy if acomp is not asynchronous
- From: Yosry Ahmed <yosryahmed@xxxxxxxxxx>
- Re: [PATCH 1/3] crypto: introduce acomp_is_async to expose if a acomp has a scomp backend
- From: Yosry Ahmed <yosryahmed@xxxxxxxxxx>
- Re: [bug report] crypto: iaa - Add compression mode management along with fixed mode
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- Re: [PATCH v1 04/26] x86/sev: Add the host SEV-SNP initialization support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 04/26] x86/sev: Add the host SEV-SNP initialization support
- From: Jeremi Piotrowski <jpiotrowski@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v11 26/35] KVM: SEV: Support SEV-SNP AP Creation NAE event
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KEYS: include header for EINVAL definition
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH] docs: admin-guide: hw_random: update rng-tools website
- From: Baruch Siach <baruch@xxxxxxxxxx>
- Re: [PATCH 0/2] Add Crypto Engine support for SM6350
- From: Konrad Dybcio <konrad.dybcio@xxxxxxxxxx>
- Re: [PATCH v1 15/26] x86/sev: Introduce snp leaked pages list
- From: Vlastimil Babka <vbabka@xxxxxxx>
- [bug report] crypto: iaa - Add compression mode management along with fixed mode
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- RE: [EXT] caam test failures with libkcapi
- From: Gaurav Jain <gaurav.jain@xxxxxxx>
- [PATCH] KEYS: include header for EINVAL definition
- Re: [PATCH 1/2] dt-bindings: qcom-qce: Add compatible for SM6350
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH] crypto: asymmetric_keys/pkcs7.asn1 - remove the duplicated contentType pkcs7_note_OID processing logic
- From: "YiLin.Li" <YiLin.Li@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v11 26/35] KVM: SEV: Support SEV-SNP AP Creation NAE event
- From: Jacob Xu <jacobhxu@xxxxxxxxxx>
- Re: [PATCH v1 04/26] x86/sev: Add the host SEV-SNP initialization support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 04/26] x86/sev: Add the host SEV-SNP initialization support
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH v2 12/12] crypto: riscv - add vector crypto accelerated SM4
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 11/12] crypto: riscv - add vector crypto accelerated SM3
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 10/12] crypto: riscv - add vector crypto accelerated SHA-{512,384}
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 09/12] crypto: riscv - add vector crypto accelerated SHA-{256,224}
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 08/12] crypto: riscv - add vector crypto accelerated GHASH
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 07/12] crypto: riscv - add vector crypto accelerated ChaCha20
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 06/12] crypto: riscv - add vector crypto accelerated AES-{ECB,CBC,CTR,XTS}
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 05/12] RISC-V: hook new crypto subdir into build-system
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 04/12] RISC-V: add TOOLCHAIN_HAS_VECTOR_CRYPTO
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 03/12] RISC-V: add helper function to read the vector VLEN
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 02/12] riscv: vector: make Vector always available for softirq context
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 01/12] riscv: Add support for kernel mode vector
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 00/12] RISC-V crypto with reworked asm files
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 5/5] crypto: qat - add support for 420xx devices
- From: "Cabiddu, Giovanni" <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH 2/2] arm64: dts: qcom: sm6350: Add Crypto Engine
- From: Stephan Gerhold <stephan@xxxxxxxxxxx>
- Re: [PATCH v1 04/26] x86/sev: Add the host SEV-SNP initialization support
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH 2/2] arm64: dts: qcom: sm6350: Add Crypto Engine
- From: Luca Weiss <luca.weiss@xxxxxxxxxxxxx>
- [PATCH 1/2] dt-bindings: qcom-qce: Add compatible for SM6350
- From: Luca Weiss <luca.weiss@xxxxxxxxxxxxx>
- [PATCH 0/2] Add Crypto Engine support for SM6350
- From: Luca Weiss <luca.weiss@xxxxxxxxxxxxx>
- Re: [PATCH v1 04/26] x86/sev: Add the host SEV-SNP initialization support
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH v9 12/13] ARM: dts: stm32: add ETZPC as a system bus for STM32MP13x boards
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- [PATCH v9 13/13] ARM: dts: stm32: put ETZPC as an access controller for STM32MP13x boards
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- [PATCH v9 09/13] bus: etzpc: introduce ETZPC firewall controller driver
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- [PATCH v9 08/13] arm64: dts: st: add RIFSC as an access controller for STM32MP25x boards
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- [PATCH v9 10/13] ARM: dts: stm32: add ETZPC as a system bus for STM32MP15x boards
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- [PATCH v9 11/13] ARM: dts: stm32: put ETZPC as an access controller for STM32MP15x boards
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- [PATCH v9 06/13] of: property: fw_devlink: Add support for "access-controller"
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- [PATCH v9 07/13] bus: rifsc: introduce RIFSC firewall controller driver
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- [PATCH v9 04/13] dt-bindings: bus: document ETZPC
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- [PATCH v9 05/13] firewall: introduce stm32_firewall framework
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- [PATCH v9 01/13] dt-bindings: document generic access controllers
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- [PATCH v9 02/13] dt-bindings: treewide: add access-controllers description
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- [PATCH v9 03/13] dt-bindings: bus: document RIFSC
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- [PATCH v9 00/13] Introduce STM32 Firewall framework
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- Re: [PATCH v8 03/13] dt-bindings: bus: document RIFSC
- From: Gatien CHEVALLIER <gatien.chevallier@xxxxxxxxxxx>
- Re: [RFC PATCH 00/13] RISC-V crypto with reworked asm files
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC PATCH 07/13] crypto: riscv - add vector crypto accelerated AES-{ECB,CBC,CTR,XTS}
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v1 04/26] x86/sev: Add the host SEV-SNP initialization support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 04/26] x86/sev: Add the host SEV-SNP initialization support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 04/26] x86/sev: Add the host SEV-SNP initialization support
- From: Jeremi Piotrowski <jpiotrowski@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 03/26] iommu/amd: Don't rely on external callers to enable IOMMU SNP support
- From: Joerg Roedel <jroedel@xxxxxxx>
- Re: [PATCH v1 03/26] iommu/amd: Don't rely on external callers to enable IOMMU SNP support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH 00/13] RISC-V crypto with reworked asm files
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- Re: [RFC PATCH 07/13] crypto: riscv - add vector crypto accelerated AES-{ECB,CBC,CTR,XTS}
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- Re: [EXT] caam test failures with libkcapi
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2 0/4] some updates and cleanups for hisilicon/sec2.
- From: liulongfang <liulongfang@xxxxxxxxxx>
- Re: [PATCH] crypto: af_alg/hash: Fix uninit-value access in af_alg_free_sg()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] mm/zswap: remove the memcpy if acomp is not asynchronous
- From: Nhat Pham <nphamcs@xxxxxxxxx>
- Re: [PATCH] crypto: qat - avoid memcpy() overflow warning
- From: "Cabiddu, Giovanni" <giovanni.cabiddu@xxxxxxxxx>
- [PATCH] crypto: qat - avoid memcpy() overflow warning
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCH] crypto: af_alg/hash: Fix uninit-value access in af_alg_free_sg()
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [RFC PATCH 07/13] crypto: riscv - add vector crypto accelerated AES-{ECB,CBC,CTR,XTS}
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC PATCH 00/13] RISC-V crypto with reworked asm files
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC PATCH 00/13] RISC-V crypto with reworked asm files
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- RE: [EXT] caam test failures with libkcapi
- From: Gaurav Jain <gaurav.jain@xxxxxxx>
- [PATCH 3/3] crypto: scompress: remove memcpy if sg_nents is 1
- From: Barry Song <21cnbao@xxxxxxxxx>
- [PATCH 2/3] mm/zswap: remove the memcpy if acomp is not asynchronous
- From: Barry Song <21cnbao@xxxxxxxxx>
- [PATCH 1/3] crypto: introduce acomp_is_async to expose if a acomp has a scomp backend
- From: Barry Song <21cnbao@xxxxxxxxx>
- [PATCH 0/3] mm/zswap & crypto/acompress: remove a couple of memcpy
- From: Barry Song <21cnbao@xxxxxxxxx>
- RE: [PATCH v1] imx_v6_v7_defconfig: Enable sm3, sm4, polyval, xctr cipher test support
- From: Gaurav Jain <gaurav.jain@xxxxxxx>
- Re: [syzbot] [crypto?] general protection fault in scatterwalk_copychunks (5)
- From: Chengming Zhou <zhouchengming@xxxxxxxxxxxxx>
- Re: [syzbot] [crypto?] general protection fault in scatterwalk_copychunks (5)
- From: Barry Song <21cnbao@xxxxxxxxx>
- [PATCH RFC] crypto: scompress: remove memcpy if sg_nents is 1
- From: Barry Song <21cnbao@xxxxxxxxx>
- [PATCH 9/9] crypto: qat - improve aer error reset handling
- From: Mun Chun Yep <mun.chun.yep@xxxxxxxxx>
- [PATCH 8/9] crypto: qat - limit heartbeat notifications
- From: Mun Chun Yep <mun.chun.yep@xxxxxxxxx>
- [PATCH 7/9] crypto: qat - add auto reset on error
- From: Mun Chun Yep <mun.chun.yep@xxxxxxxxx>
- [PATCH 5/9] crypto: qat - re-enable sriov after pf reset
- From: Mun Chun Yep <mun.chun.yep@xxxxxxxxx>
- [PATCH 6/9] crypto: qat - add fatal error notification
- From: Mun Chun Yep <mun.chun.yep@xxxxxxxxx>
- [PATCH 3/9] crypto: qat - disable arbitration before reset
- From: Mun Chun Yep <mun.chun.yep@xxxxxxxxx>
- [PATCH 4/9] crypto: qat - update PFVF protocol for recovery
- From: Mun Chun Yep <mun.chun.yep@xxxxxxxxx>
- [PATCH 2/9] crypto: qat - add fatal error notify method
- From: Mun Chun Yep <mun.chun.yep@xxxxxxxxx>
- [PATCH 1/9] crypto: qat - add heartbeat error simulator
- From: Mun Chun Yep <mun.chun.yep@xxxxxxxxx>
- [PATCH 0/9] crypto: qat - improve recovery flows
- From: Mun Chun Yep <mun.chun.yep@xxxxxxxxx>
- Re: [PATCH] crypto: af_alg/hash: Fix uninit-value access in af_alg_free_sg()
- From: xingwei lee <xrivendell7@xxxxxxxxx>
- Re: [PATCH v4 2/6] mm/zswap: reuse dstmem when decompress
- From: Barry Song <21cnbao@xxxxxxxxx>
- [PATCH RFC 2/2] mm/zswap: remove the memcpy if acomp is not asynchronous
- From: Barry Song <21cnbao@xxxxxxxxx>
- [PATCH RFC 1/2] crypto: introduce acomp_is_async to expose if a acomp has a scomp backend
- From: Barry Song <21cnbao@xxxxxxxxx>
- [PATCH] crypto:vmx: Move ppc vmx diirectory to arch/powerpc/crypto.
- From: Danny Tsen <dtsen@xxxxxxxxxxxxx>
- Re: [PATCH RFC] dt-bindings: crypto: inside-secure,safexcel: make eip/mem IRQs optional
- From: Rob Herring <robh@xxxxxxxxxx>
- [RFC PATCH 13/13] crypto: riscv - add vector crypto accelerated SM4
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 12/13] crypto: riscv - add vector crypto accelerated SM3
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 11/13] crypto: riscv - add vector crypto accelerated SHA-{512,384}
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 10/13] crypto: riscv - add vector crypto accelerated SHA-{256,224}
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 09/13] crypto: riscv - add vector crypto accelerated GHASH
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 08/13] crypto: riscv - add vector crypto accelerated ChaCha20
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 07/13] crypto: riscv - add vector crypto accelerated AES-{ECB,CBC,CTR,XTS}
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 06/13] crypto: riscv - add vector crypto accelerated AES
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 05/13] RISC-V: hook new crypto subdir into build-system
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 04/13] RISC-V: add TOOLCHAIN_HAS_VECTOR_CRYPTO
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 03/13] RISC-V: add helper function to read the vector VLEN
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 02/13] riscv: vector: make Vector always available for softirq context
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 01/13] riscv: Add support for kernel mode vector
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 00/13] RISC-V crypto with reworked asm files
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v3 00/12] RISC-V: provide some accelerated cryptography implementations using vector extensions
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- RE: [PATCH v2 1/5] dt-bindings: crypto: Add Tegra Security Engine
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- [PATCH RFC] dt-bindings: crypto: inside-secure,safexcel: make eip/mem IRQs optional
- From: Rafał Miłecki <zajec5@xxxxxxxxx>
- Re: [PATCH v1 01/26] x86/cpufeatures: Add SEV-SNP CPU feature
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v4 11/11] RISC-V: crypto: add Zvkb accelerated ChaCha20 implementation
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- [PATCH v4 10/11] RISC-V: crypto: add Zvksh accelerated SM3 implementation
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- [PATCH v4 09/11] RISC-V: crypto: add Zvksed accelerated SM4 implementation
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- [PATCH v4 08/11] RISC-V: crypto: add Zvknhb accelerated SHA384/512 implementations
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- [PATCH v4 07/11] RISC-V: crypto: add Zvknha/b accelerated SHA224/256 implementations
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- [PATCH v4 06/11] RISC-V: crypto: add Zvkg accelerated GCM GHASH implementation
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- [PATCH v4 05/11] RISC-V: crypto: add accelerated AES-CBC/CTR/ECB/XTS implementations
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- [PATCH v4 04/11] RISC-V: crypto: add Zvkned accelerated AES implementation
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- [PATCH v4 03/11] RISC-V: add TOOLCHAIN_HAS_VECTOR_CRYPTO in kconfig
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- [PATCH v4 02/11] RISC-V: hook new crypto subdir into build-system
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- [PATCH v4 01/11] RISC-V: add helper function to read the vector VLEN
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- [PATCH v4 00/11] RISC-V: provide some accelerated cryptography implementations using vector extensions
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- Re: [PATCH v1 01/26] x86/cpufeatures: Add SEV-SNP CPU feature
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH v11 08/35] KVM: x86: Define RMP page fault error bits for #NPF
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 07/35] KVM: x86: Add KVM_X86_SNP_VM vm_type
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 06/35] KVM: x86/mmu: Pass around full 64-bit error code for KVM page faults
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 05/35] KVM: x86: Add gmem hook for invalidating memory
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 04/35] KVM: x86: Add gmem hook for initializing memory
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 03/35] KVM: Use AS_INACCESSIBLE when creating guest_memfd inode
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 35/35] KVM: SEV: Provide support for SNP_EXTENDED_GUEST_REQUEST NAE event
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 34/35] crypto: ccp: Add the SNP_SET_CONFIG_{START,END} commands
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 33/35] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 32/35] KVM: SVM: Add module parameter to enable the SEV-SNP
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 31/35] KVM: SEV: Avoid WBINVD for HVA-based MMU notifications for SNP
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 02/35] mm: Introduce AS_INACCESSIBLE for encrypted/confidential memory
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 30/35] KVM: x86: Add gmem hook for determining max NPT mapping level
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 29/35] KVM: SEV: Implement gmem hook for invalidating private pages
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 28/35] KVM: SEV: Implement gmem hook for initializing private pages
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 27/35] KVM: SEV: Add support for GHCB-based termination requests
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 26/35] KVM: SEV: Support SEV-SNP AP Creation NAE event
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 25/35] KVM: SEV: Use a VMSA physical address variable for populating VMCB
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 24/35] KVM: SEV: Add support to handle RMP nested page faults
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 23/35] KVM: x86: Export the kvm_zap_gfn_range() for the SNP use
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 22/35] KVM: SEV: Add support to handle Page State Change VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 21/35] KVM: SEV: Add support to handle MSR based Page State Change VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 01/35] KVM: Add hugepage support for dedicated guest memory
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 20/35] KVM: SEV: Add support to handle GHCB GPA register VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 19/35] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_FINISH command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 18/35] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_UPDATE command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 17/35] KVM: Add HVA range operator
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 16/35] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_START command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 15/35] KVM: SEV: Add KVM_SNP_INIT command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 14/35] KVM: SEV: Add initial SEV-SNP support
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 13/35] KVM: SEV: Add GHCB handling for Hypervisor Feature Support requests
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 12/35] KVM: SEV: Add support to handle AP reset MSR protocol
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 11/35] KVM: SEV: Select KVM_GENERIC_PRIVATE_MEM when CONFIG_KVM_AMD_SEV=y
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 00/35] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 10/35] KVM: SEV: Do not intercept accesses to MSR_IA32_XSS for SEV-ES guests
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 09/35] KVM: x86: Determine shared/private faults based on vm_type
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v1 05/26] x86/mtrr: Don't print errors if MtrrFixDramModEn is set when SNP enabled
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v1 04/26] x86/sev: Add the host SEV-SNP initialization support
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v1 03/26] iommu/amd: Don't rely on external callers to enable IOMMU SNP support
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v1 02/26] x86/speculation: Do not enable Automatic IBRS if SEV SNP is enabled
- From: Michael Roth <michael.roth@xxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]