Linux Crypto
[Prev Page][Next Page]
- [PATCH v8 08/12] x86/PM/keylocker: Restore the wrapping key on the resume from ACPI S3/4
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v8 02/12] x86/cpufeature: Enumerate Key Locker feature
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v8 00/12] x86: Support Key Locker
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v8 04/12] x86/asm: Add a wrapper function for the LOADIWKEY instruction
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v8 01/12] Documentation/x86: Document Key Locker
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v8 03/12] x86/insn: Add Key Locker instructions to the opcode map
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v8 05/12] x86/msr-index: Add MSRs for Key Locker wrapping key
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH] crypto: Fix checkpatch issues
- From: Franziska Naepelt <franziska.naepelt@xxxxxxxxxxxxxx>
- Re: [GIT PULL] Asymmetric keys fix for v6.4-rc5
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH] crypto: qat - add missing function declaration in adf_dbgfs.h
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [herbert-cryptodev-2.6:master 45/47] drivers/crypto/intel/qat/qat_dh895xcc/adf_drv.c:69:9: error: implicit declaration of function 'adf_dbgfs_exit'; did you mean 'adf_dbgfs_init'?
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [GIT PULL] Asymmetric keys fix for v6.4-rc5
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [herbert-cryptodev-2.6:master 45/47] drivers/crypto/intel/qat/qat_dh895xcc/adf_drv.c:69:9: error: implicit declaration of function 'adf_dbgfs_exit'; did you mean 'adf_dbgfs_init'?
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 0/2] crypto: LEA block cipher implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 07/12] parisc/percpu: Work around the lack of __SIZEOF_INT128__
- From: Helge Deller <deller@xxxxxx>
- Re: [PATCH v2 07/12] parisc/percpu: Work around the lack of __SIZEOF_INT128__
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 07/12] parisc/percpu: Work around the lack of __SIZEOF_INT128__
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v2 07/12] parisc/percpu: Work around the lack of __SIZEOF_INT128__
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH v2 07/12] parisc/percpu: Work around the lack of __SIZEOF_INT128__
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [GIT PULL] Asymmetric keys fix for v6.4-rc5
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [GIT PULL] Asymmetric keys fix for v6.4-rc5
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 07/12] parisc/percpu: Work around the lack of __SIZEOF_INT128__
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH v2 07/12] parisc/percpu: Work around the lack of __SIZEOF_INT128__
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: (subset) [PATCH V6 00/21] Add basic ACPI support for RISC-V
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: (subset) [PATCH V6 00/21] Add basic ACPI support for RISC-V
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: (subset) [PATCH V6 00/21] Add basic ACPI support for RISC-V
- From: Palmer Dabbelt <palmer@xxxxxxxxxxx>
- Re: (subset) [PATCH V6 00/21] Add basic ACPI support for RISC-V
- From: Palmer Dabbelt <palmer@xxxxxxxxxxxx>
- Re: [PATCH V6 00/21] Add basic ACPI support for RISC-V
- From: patchwork-bot+linux-riscv@xxxxxxxxxx
- Re: [PATCH v2 07/12] parisc/percpu: Work around the lack of __SIZEOF_INT128__
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [GIT PULL] Asymmetric keys fix for v6.4-rc5
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 07/12] parisc/percpu: Work around the lack of __SIZEOF_INT128__
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v5 2/2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2] crypto: qat - add internal timer for qat 4xxx
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- Re: [PATCH v8 05/11] dt-bindings: qcom-qce: Fix compatible combinations for SM8150 and IPQ4019 SoCs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - move dbgfs init to separate file
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: Switch i2c drivers back to use .probe()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: jitter - correct health test during initialization
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] hwrng: cn10k: Add extended trng register support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: marvell/cesa - Fix type mismatch warning
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] New hardware support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Crypto module : rearrange the default functions of akcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v1 1/7] dt-bindings: mmc: fsl-imx-esdhc: Add imx6ul support
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- RE: [PATCH v2 0/2] crypto: LEA block cipher implementation
- From: Dongsoo Lee <letrhee@xxxxxxxxx>
- [PATCH v2 0/2] crypto: starfive - Add RSA algo to drivers
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH v2 2/2] crypto: starfive - Add RSA algo support
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH v2 1/2] crypto: starfive - Update hash module irq handling
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 07/12] parisc/percpu: Work around the lack of __SIZEOF_INT128__
- From: Sam James <sam@xxxxxxxxxx>
- Re: [PATCH v5 2/2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: dm crypt: Avoid using MAX_CIPHER_BLOCKSIZE
- From: Mike Snitzer <snitzer@xxxxxxxxxx>
- Re: [PATCH] [RFC] ubsan: disallow bounds checking with gcov on broken gcc
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH] [RFC] ubsan: disallow bounds checking with gcov on broken gcc
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v1 4/7] dt-bindings: crypto: fsl-dcp: Add i.MX6SL, i.MX6SLL, and i.MX6ULL support
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH v1 3/7] dt-bindings: timer: gpt: Support 3rd clock for i.MX6DL
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH v1 2/7] dt-bindings: timer: gpt: Add i.MX6UL support
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH v1 1/7] dt-bindings: mmc: fsl-imx-esdhc: Add imx6ul support
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH v1 1/7] dt-bindings: mmc: fsl-imx-esdhc: Add imx6ul support
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH] [RFC] ubsan: disallow bounds checking with gcov on broken gcc
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH v2 07/12] parisc/percpu: Work around the lack of __SIZEOF_INT128__
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH] [RFC] ubsan: disallow bounds checking with gcov on broken gcc
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH] [RFC] ubsan: disallow bounds checking with gcov on broken gcc
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCH] crypto: marvell/cesa - Fix type mismatch warning
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 07/12] parisc/percpu: Work around the lack of __SIZEOF_INT128__
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH net-next v2 08/10] crypto: af_alg: Support MSG_SPLICE_PAGES
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 0/5] Remove CRYPTO_ALG_ALLOCATES_MEMORY flag
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH] crypto: qat - add fw_counters debugfs file
- From: Lucas Segarra Fernandez <lucas.segarra.fernandez@xxxxxxxxx>
- Re: [PATCH v2 07/12] parisc/percpu: Work around the lack of __SIZEOF_INT128__
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: marvell/cesa - Fix type mismatch warning
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/5] Remove CRYPTO_ALG_ALLOCATES_MEMORY flag
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] crypto: LEA block cipher implementation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 07/12] parisc/percpu: Work around the lack of __SIZEOF_INT128__
- From: Helge Deller <deller@xxxxxx>
- [PATCH v1 7/7] dt-bindings: input: touchscreen: edt-ft5x06: Add 'threshold' property
- From: Oleksij Rempel <o.rempel@xxxxxxxxxxxxxx>
- [PATCH v1 3/7] dt-bindings: timer: gpt: Support 3rd clock for i.MX6DL
- From: Oleksij Rempel <o.rempel@xxxxxxxxxxxxxx>
- [PATCH v1 4/7] dt-bindings: crypto: fsl-dcp: Add i.MX6SL, i.MX6SLL, and i.MX6ULL support
- From: Oleksij Rempel <o.rempel@xxxxxxxxxxxxxx>
- [PATCH v1 2/7] dt-bindings: timer: gpt: Add i.MX6UL support
- From: Oleksij Rempel <o.rempel@xxxxxxxxxxxxxx>
- [PATCH v1 5/7] dt-bindings: clock: imx6ul: Support optional enet*_ref_pad clocks
- From: Oleksij Rempel <o.rempel@xxxxxxxxxxxxxx>
- [PATCH v1 0/7] Add support for various features to i.MX6 bindings
- From: Oleksij Rempel <o.rempel@xxxxxxxxxxxxxx>
- [PATCH v1 1/7] dt-bindings: mmc: fsl-imx-esdhc: Add imx6ul support
- From: Oleksij Rempel <o.rempel@xxxxxxxxxxxxxx>
- [PATCH v1 6/7] dt-bindings: clock: imx6q: Allow single optional clock and add enet_ref_pad
- From: Oleksij Rempel <o.rempel@xxxxxxxxxxxxxx>
- [PATCH v2 07/12] parisc/percpu: Work around the lack of __SIZEOF_INT128__
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH 2/2] crypto: qat - unmap buffers before free for RSA
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 0/2] crypto: qat - unmap buffers before free
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 1/2] crypto: qat - unmap buffer before free for DH
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH net-next v2 08/10] crypto: af_alg: Support MSG_SPLICE_PAGES
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- [PATCH] crypto: qat - add internal timer for qat 4xxx
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- dm crypt: Avoid using MAX_CIPHER_BLOCKSIZE
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: How to get my krb5 crypto lib upstream?
- From: Jeffrey E Altman <jaltman@xxxxxxxxxxxx>
- Re: [PATCH 3/3] crypto: ccp - Add support for PCI device 0x156E
- From: John Allen <john.allen@xxxxxxx>
- Re: [PATCH v2 5/7] crypto: update some Arm documentation references
- From: Jernej Škrabec <jernej.skrabec@xxxxxxxxx>
- Re: How to get my krb5 crypto lib upstream?
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: How to get my krb5 crypto lib upstream?
- From: Chuck Lever III <chuck.lever@xxxxxxxxxx>
- How to get my krb5 crypto lib upstream?
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] crypto: marvell/cesa - Fix type mismatch warning
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 07/12] percpu: #ifndef __SIZEOF_INT128__
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 00/12] Introduce cmpxchg128() -- aka. the demise of cmpxchg_double()
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH 07/12] percpu: #ifndef __SIZEOF_INT128__
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- [PATCH 08/12] x86,amd_iommu: Replace cmpxchg_double()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH 06/12] percpu: Wire up cmpxchg128
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH 02/12] types: Introduce [us]128
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH 01/12] cyrpto/b128ops: Remove struct u128
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH 10/12] slub: Replace cmpxchg_double()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH 07/12] percpu: #ifndef __SIZEOF_INT128__
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH 03/12] arch: Introduce arch_{,try_}_cmpxchg128{,_local}()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH 00/12] Introduce cmpxchg128() -- aka. the demise of cmpxchg_double()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH 05/12] percpu: Add {raw,this}_cpu_try_cmpxchg()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH 11/12] arch: Remove cmpxchg_double
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH 09/12] x86,intel_iommu: Replace cmpxchg_double()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH 12/12] s390/cpum_sf: Convert to cmpxchg128()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH 04/12] instrumentation: Wire up cmpxchg128()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: marvell/cesa - Fix type mismatch warning
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 3/3] mmc: sdhci-msm: Switch to the new ICE API
- From: Abel Vesa <abel.vesa@xxxxxxxxxx>
- Re: build error while building arch/x86/purgatory/sha256.o: invalid 'asm': operand is not a condition code [...]
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- RE: [PATCH 0/6] bus: fsl-mc: Make remove function return void
- From: Leo Li <leoyang.li@xxxxxxx>
- Re: [PATCH] crypto: marvell/cesa - Fix type mismatch warning
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v7 10/12] crypto: x86/aesni - Use the proper data type in struct aesni_xts_ctx
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- Re: [PATCH v7 12/12] crypto: x86/aes-kl - Implement the AES-XTS algorithm
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- Re: [PATCH net-next v2 02/10] Fix a couple of spelling mistakes
- From: Simon Horman <simon.horman@xxxxxxxxxxxx>
- Re: [PATCH v5 13/15] crypto: iaa - Add support for default IAA 'canned' compression mode
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 08/11] slub: Replace cmpxchg_double()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH] crypto: qat - update slice mask for 4xxx devices
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH] crypto: qat - set deprecated capabilities as reserved
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH v3 08/11] slub: Replace cmpxchg_double()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH net-next v2 08/10] crypto: af_alg: Support MSG_SPLICE_PAGES
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH net-next v2 09/10] crypto: af_alg: Convert af_alg_sendpage() to use MSG_SPLICE_PAGES
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH net-next v2 10/10] crypto: af_alg/hash: Support MSG_SPLICE_PAGES
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH net-next v2 06/10] crypto: af_alg: Use extract_iter_to_sg() to create scatterlists
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH net-next v2 07/10] crypto: af_alg: Indent the loop in af_alg_sendmsg()
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH net-next v2 03/10] Wrap lines at 80
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH net-next v2 05/10] crypto: af_alg: Pin pages rather than ref'ing if appropriate
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH net-next v2 01/10] Drop the netfs_ prefix from netfs_extract_iter_to_sg()
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH net-next v2 04/10] Move netfs_extract_iter_to_sg() to lib/scatterlist.c
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH net-next v2 02/10] Fix a couple of spelling mistakes
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH net-next v2 00/10] crypto, splice, net: Make AF_ALG handle sendmsg(MSG_SPLICE_PAGES)
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 0/6] bus: fsl-mc: Make remove function return void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH V4 0/2] dt-bindings: imx: Fix dtbs_check warnings
- From: Stefan Wahren <stefan.wahren@xxxxxxxx>
- [PATCH V4 1/2] dt-bindings: crypto: fsl-dcp: add imx6sl and imx6ull compatible
- From: Stefan Wahren <stefan.wahren@xxxxxxxx>
- [PATCH V4 2/2] dt-bindings: imxgpt: add imx6ul compatible
- From: Stefan Wahren <stefan.wahren@xxxxxxxx>
- build failure in crypto/twofish_common.c
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: build error while building arch/x86/purgatory/sha256.o: invalid 'asm': operand is not a condition code [...]
- From: Kees Cook <kees@xxxxxxxxxx>
- [PATCH] virt: sev-guest: fix kconfig warnings
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH v2 5/7] crypto: update some Arm documentation references
- From: Jonathan Corbet <corbet@xxxxxxx>
- Re: [GIT PULL] Crypto Fixes for 6.4
- From: pr-tracker-bot@xxxxxxxxxx
- [PATCH] docs: crypto: async-tx-api: fix typo in struct name
- From: Baruch Siach <baruch@xxxxxxxxxx>
- Re: [PATCH v8 05/11] dt-bindings: qcom-qce: Fix compatible combinations for SM8150 and IPQ4019 SoCs
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- Re: [PATCH v8 01/11] dt-bindings: dma: Add support for SM6115 and QCM2290 SoCs
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- [GIT PULL] Crypto Fixes for 6.4
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: build error while building arch/x86/purgatory/sha256.o: invalid 'asm': operand is not a condition code [...]
- From: Joan Bruguera Micó <joanbrugueram@xxxxxxxxx>
- Re: build error while building arch/x86/purgatory/sha256.o: invalid 'asm': operand is not a condition code [...]
- From: Joan Bruguera Micó <joanbrugueram@xxxxxxxxx>
- Re: [PATCH net-next 1/8] Move netfs_extract_iter_to_sg() to lib/scatterlist.c
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH net-next 2/8] Drop the netfs_ prefix from netfs_extract_iter_to_sg()
- From: Simon Horman <simon.horman@xxxxxxxxxxxx>
- Re: [PATCH net-next 1/8] Move netfs_extract_iter_to_sg() to lib/scatterlist.c
- From: Simon Horman <simon.horman@xxxxxxxxxxxx>
- Re: (subset) [PATCH v8 00/11] arm64: qcom: Enable Crypto Engine for a few Qualcomm SoCs
- From: Bjorn Andersson <andersson@xxxxxxxxxx>
- Re: [PATCH v2 4/4] crypto/pcrypt: Do not use isolated CPUs for callback
- From: Leonardo Bras Soares Passos <leobras@xxxxxxxxxx>
- Re: [PATCH v3 2/2] crypto: hisilicon/advca - Add SHA support
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v3 1/2] crypto: hisilicon - Add HiSilicon ADVCA Subsystem
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v8 07/11] arm64: dts: qcom: sm6115: Add Crypto Engine support
- From: Konrad Dybcio <konrad.dybcio@xxxxxxxxxx>
- Re: [PATCH v8 11/11] arm64: dts: qcom: sm8450: add crypto nodes
- From: Konrad Dybcio <konrad.dybcio@xxxxxxxxxx>
- [PATCH v8 11/11] arm64: dts: qcom: sm8450: add crypto nodes
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- [PATCH v8 10/11] arm64: dts: qcom: sm8350: Add Crypto Engine support
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- [PATCH v8 09/11] arm64: dts: qcom: sm8250: Add Crypto Engine support
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- [PATCH v8 08/11] arm64: dts: qcom: sm8150: Add Crypto Engine support
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- [PATCH v8 07/11] arm64: dts: qcom: sm6115: Add Crypto Engine support
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- [PATCH v8 06/11] dt-bindings: qcom-qce: Add compatibles for SM6115 and QCM2290
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- [PATCH v8 05/11] dt-bindings: qcom-qce: Fix compatible combinations for SM8150 and IPQ4019 SoCs
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- [PATCH v8 04/11] arm64: dts: qcom: sdm845: Fix the slimbam DMA engine compatible string
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- [PATCH v8 03/11] arm64: dts: qcom: sdm8550: Fix the BAM DMA engine compatible string
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- [PATCH v8 01/11] dt-bindings: dma: Add support for SM6115 and QCM2290 SoCs
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- [PATCH v8 02/11] dt-bindings: dma: Increase iommu maxItems for BAM DMA
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- [PATCH v8 00/11] arm64: qcom: Enable Crypto Engine for a few Qualcomm SoCs
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- Re: [PATCH v7 07/11] arm64: dts: qcom: sm6115: Add Crypto Engine support
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- [PATCH] crypto: qat - move dbgfs init to separate file
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH V4 4/4] arm64: dts: qcom: ipq9574: Enable crypto nodes
- From: Anusha Rao <quic_anusha@xxxxxxxxxxx>
- [PATCH V4 3/4] dt-bindings: qcom-qce: add SoC compatible string for ipq9574
- From: Anusha Rao <quic_anusha@xxxxxxxxxxx>
- [PATCH V4 2/4] clk: qcom: gcc-ipq9574: Enable crypto clocks
- From: Anusha Rao <quic_anusha@xxxxxxxxxxx>
- [PATCH V4 1/4] dt-bindings: clock: Add crypto clock and reset definitions
- From: Anusha Rao <quic_anusha@xxxxxxxxxxx>
- [PATCH V4 0/4] Enable crypto for ipq9574
- From: Anusha Rao <quic_anusha@xxxxxxxxxxx>
- [PATCH net-next 3/8] crypto: af_alg: Pin pages rather than ref'ing if appropriate
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH net-next 7/8] crypto: af_alg: Convert af_alg_sendpage() to use MSG_SPLICE_PAGES
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH net-next 8/8] crypto: af_alg/hash: Support MSG_SPLICE_PAGES
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH net-next 1/8] Move netfs_extract_iter_to_sg() to lib/scatterlist.c
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH net-next 6/8] crypto: af_alg: Support MSG_SPLICE_PAGES
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH net-next 4/8] crypto: af_alg: Use extract_iter_to_sg() to create scatterlists
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH net-next 5/8] crypto: af_alg: Indent the loop in af_alg_sendmsg()
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH net-next 2/8] Drop the netfs_ prefix from netfs_extract_iter_to_sg()
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH net-next 0/8] crypto, splice, net: Make AF_ALG handle sendmsg(MSG_SPLICE_PAGES)
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] crypto: Switch i2c drivers back to use .probe()
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxx>
- Re: [PATCH v5 2/2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 12/12] crypto: x86/aes-kl - Implement the AES-XTS algorithm
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v7 10/12] crypto: x86/aesni - Use the proper data type in struct aesni_xts_ctx
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- RE: [PATCH 0/5] Remove CRYPTO_ALG_ALLOCATES_MEMORY flag
- From: Meenakshi Aggarwal <meenakshi.aggarwal@xxxxxxx>
- Re: [PATCH v3 05/11] percpu: Wire up cmpxchg128
- From: Petr Tesařík <petr@xxxxxxxxxxx>
- [PATCH] crypto: Switch i2c drivers back to use .probe()
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH] crypto: jitter - correct health test during initialization
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v3 2/2] crypto: hisilicon/advca - Add SHA support
- From: David Yang <mmyangfl@xxxxxxxxx>
- [PATCH v3 1/2] crypto: hisilicon - Add HiSilicon ADVCA Subsystem
- From: David Yang <mmyangfl@xxxxxxxxx>
- [PATCH v3 0/2] crypto: hisilicon - Add HiSilicon ADVCA Subsystem
- From: David Yang <mmyangfl@xxxxxxxxx>
- Re: [PATCH v3 08/11] slub: Replace cmpxchg_double()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3 05/11] percpu: Wire up cmpxchg128
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v2 2/2] crypto: add LEA testmgr tests
- From: Dongsoo Lee <letrhee@xxxxxxxxx>
- [PATCH v2 1/2] crypto: LEA block cipher implementation
- From: Dongsoo Lee <letrhee@xxxxxxxxx>
- [PATCH v2 0/2] crypto: LEA block cipher implementation
- From: Dongsoo Lee <letrhee@xxxxxxxxx>
- Re: [PATCH v3 08/11] slub: Replace cmpxchg_double()
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH v3 08/11] slub: Replace cmpxchg_double()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v2] hwrng: cn10k: Add extended trng register support
- From: Bharat Bhushan <bbhushan2@xxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: starfive - Add RSA algo support
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: starfive - Depend on AMBA_PL08X instead of selecting it
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 13/15] crypto: iaa - Add support for default IAA 'canned' compression mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 07/11] arm64: dts: qcom: sm6115: Add Crypto Engine support
- From: Stephan Gerhold <stephan@xxxxxxxxxxx>
- Re: [PATCH v6 11/12] crypto: x86/aes-kl - Support AES algorithm using Key Locker instructions
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v7 12/12] crypto: x86/aes-kl - Implement the AES-XTS algorithm
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v7 11/12] crypto: x86/aes - Prepare for a new AES implementation
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v7 10/12] crypto: x86/aesni - Use the proper data type in struct aesni_xts_ctx
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v7 09/12] x86/cpu: Add a configuration and command line option for Key Locker
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v7 07/12] x86/cpu/keylocker: Load a wrapping key at boot-time
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v7 08/12] x86/PM/keylocker: Restore the wrapping key on the resume from ACPI S3/4
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v7 05/12] x86/msr-index: Add MSRs for Key Locker wrapping key
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v7 04/12] x86/asm: Add a wrapper function for the LOADIWKEY instruction
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v7 01/12] Documentation/x86: Document Key Locker
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v7 06/12] x86/keylocker: Define Key Locker CPUID leaf
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v7 02/12] x86/cpufeature: Enumerate Key Locker feature
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v7 03/12] x86/insn: Add Key Locker instructions to the opcode map
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v7 00/12] x86: Support Key Locker
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- Re: [PATCH v5 13/15] crypto: iaa - Add support for default IAA 'canned' compression mode
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 09/11] mm/slub: Fold slab_update_freelist()
- From: Vlastimil Babka <vbabka@xxxxxxx>
- RE: [EXT] Re: [PATCH] hwrng: cn10k: Add extended trng register support
- From: Bharat Bhushan <bbhushan2@xxxxxxxxxxx>
- build error while building arch/x86/purgatory/sha256.o: invalid 'asm': operand is not a condition code [...]
- From: Thorsten Leemhuis <linux@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: hisilicon - Add HiSilicon ADVCA Subsystem
- From: Philipp Zabel <p.zabel@xxxxxxxxxxxxxx>
- Re: [PATCH] powerpc/crypto: fix build warnings when DEBUG_FS is not enabled
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto/Kconfig: warn about performance overhead of CRYPTO_STATS
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: hisilicon/advca - Add SHA support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] hwrng: imx-rngc - two simple cleanups
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] hwrng: imx-rngc - simplify register definitions
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: x86/aria - Use 16 byte alignment for GFNI constant vectors
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aegis: add header for internal prototypes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 08/11] slub: Replace cmpxchg_double()
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH] hwrng: cn10k: Add extended trng register support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 13/15] crypto: iaa - Add support for default IAA 'canned' compression mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: starfive - Add RSA algo support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 00/11] Introduce cmpxchg128() -- aka. the demise of cmpxchg_double()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3 08/11] slub: Replace cmpxchg_double()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH V3 2/4] clk: qcom: gcc-ipq9574: Enable crypto clocks
- From: Anusha Canchi <quic_anusha@xxxxxxxxxxx>
- Re: [PATCH V3 4/4] arm64: dts: qcom: ipq9574: Enable crypto nodes
- From: Anusha Canchi <quic_anusha@xxxxxxxxxxx>
- Re: [PATCH v6 08/14] x86: Secure Launch kernel late boot stub
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 2/3] integrity: Enforce digitalSignature usage in the ima and evm keyrings
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 2/3] integrity: Enforce digitalSignature usage in the ima and evm keyrings
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 2/3] integrity: Enforce digitalSignature usage in the ima and evm keyrings
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] KEYS: DigitalSignature link restriction
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 04/10] crypto: ccp: move setting PSP master to earlier in the init
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH] crypto: marvell/cesa - Fix type mismatch warning
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 0/5] Remove CRYPTO_ALG_ALLOCATES_MEMORY flag
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 5/5] crypto: caam/qi2 - avoid allocating memory at crypto request runtime
- From: meenakshi.aggarwal@xxxxxxx
- [PATCH 2/5] crypto:caam - avoid allocating memory at crypto request runtime for aead
- From: meenakshi.aggarwal@xxxxxxx
- [PATCH 4/5] crypto: caam/qi - avoid allocating memory at crypto request runtime
- From: meenakshi.aggarwal@xxxxxxx
- [PATCH 1/5] crypto:caam - avoid allocating memory at crypto request runtime for skcipher
- From: meenakshi.aggarwal@xxxxxxx
- [PATCH 3/5] crypto: caam - avoid allocating memory at crypto request runtime for hash
- From: meenakshi.aggarwal@xxxxxxx
- [PATCH 0/5] Remove CRYPTO_ALG_ALLOCATES_MEMORY flag
- From: meenakshi.aggarwal@xxxxxxx
- Re: [PATCH V6 09/21] RISC-V: ACPI: Cache and retrieve the RINTC structure
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- [PATCH] crypto: marvell/cesa - Fix type mismatch warning
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCH] crypto: starfive - Depend on AMBA_PL08X instead of selecting it
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: starfive - Depend on AMBA_PL08X instead of selecting it
- From: Conor Dooley <conor.dooley@xxxxxxxxxxxxx>
- [PATCH] crypto: starfive - Depend on AMBA_PL08X instead of selecting it
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: linux-next: build failure after merge of the crypto tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- [PATCH v2 0/3] Add digitalSignature enforcement keyring restrictions
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v2 1/3] KEYS: DigitalSignature link restriction
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v2 2/3] integrity: Enforce digitalSignature usage in the ima and evm keyrings
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v2 3/3] integrity: Remove EXPERIMENTAL from Kconfig
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: Did the in-kernel Camellia or CMAC crypto implementation break?
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 6.1] crypto: testmgr - fix RNG performance in fuzz tests
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v8 2/4] crypto: starfive - Add crypto engine support
- From: Conor Dooley <conor.dooley@xxxxxxxxxxxxx>
- Re: [PATCH V3 2/4] clk: qcom: gcc-ipq9574: Enable crypto clocks
- From: bhupesh.sharma@xxxxxxxxxx
- Re: [PATCH V3 4/4] arm64: dts: qcom: ipq9574: Enable crypto nodes
- From: bhupesh.sharma@xxxxxxxxxx
- Re: [PATCH V3 3/4] dt-bindings: qcom-qce: add SoC compatible string for ipq9574
- From: bhupesh.sharma@xxxxxxxxxx
- Re: [PATCH V3 1/4] dt-bindings: clock: Add crypto clock and reset definitions
- From: bhupesh.sharma@xxxxxxxxxx
- Re: [PATCH] crypto: starfive - Fix driver dependencies
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: linux-next: build failure after merge of the crypto tree
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] Crypto module : rearrange the default functions of akcipher
- From: yangmengfei1394 <yangmengfei1394@xxxxxxxxxxxxxx>
- Re: [PATCH] powerpc/crypto: fix build warnings when DEBUG_FS is not enabled
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- linux-next: build failure after merge of the crypto tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2] fsverity: use shash API instead of ahash API
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] crypto/Kconfig: warn about performance overhead of CRYPTO_STATS
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] crypto/Kconfig: warn about performance overhead of CRYPTO_STATS
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2] fsverity: use shash API instead of ahash API
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- [PATCH] powerpc/crypto: fix build warnings when DEBUG_FS is not enabled
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH v7 09/11] arm64: dts: qcom: sm8250: Add Crypto Engine support
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- [PATCH v7 11/11] arm64: dts: qcom: sm8450: add crypto nodes
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- [PATCH v7 08/11] arm64: dts: qcom: sm8150: Add Crypto Engine support
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- [PATCH v7 10/11] arm64: dts: qcom: sm8350: Add Crypto Engine support
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- [PATCH v7 05/11] dt-bindings: qcom-qce: Fix compatible combinations for SM8150 and IPQ4019 SoCs
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- [PATCH v7 07/11] arm64: dts: qcom: sm6115: Add Crypto Engine support
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- [PATCH v7 06/11] dt-bindings: qcom-qce: Add compatibles for SM6115 and QCM2290
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- [PATCH v7 04/11] arm64: dts: qcom: sdm845: Fix the slimbam DMA engine compatible string
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- [PATCH v7 02/11] dt-bindings: dma: Increase iommu maxItems for BAM DMA
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- [PATCH v7 01/11] dt-bindings: dma: Add support for SM6115 and QCM2290 SoCs
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- [PATCH v7 03/11] arm64: dts: qcom: sdm8550: Fix the BAM DMA engine compatible string
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- [PATCH v7 00/11] arm64: qcom: Enable Crypto Engine for a few Qualcomm SoCs
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- Re: [PATCH 3/3] crypto: ccp - Add support for PCI device 0x156E
- From: John Allen <john.allen@xxxxxxx>
- Re: [PATCH v2 2/2] crypto: hisilicon/advca - Add SHA support
- From: Yangfl <mmyangfl@xxxxxxxxx>
- Re: [PATCH 3/3] crypto: ccp - Add support for PCI device 0x156E
- From: "Limonciello, Mario" <mario.limonciello@xxxxxxx>
- [PATCH v3 08/10] crypto: ccp: Add a sample script for Dynamic Boost Control
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH v3 10/10] crypto: ccp: Add Mario to MAINTAINERS
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH v3 00/10] Add dynamic boost control support
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH v3 04/10] crypto: ccp: move setting PSP master to earlier in the init
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH v3 07/10] crypto: ccp: Add support for getting and setting DBC parameters
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH v3 02/10] crypto: ccp: Add support for displaying PSP firmware versions
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH v3 06/10] crypto: ccp: Add support for setting user ID for dynamic boost control
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH v3 05/10] crypto: ccp: Add support for fetching a nonce for dynamic boost control
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH v3 03/10] crypto: ccp: Add bootloader and TEE version offsets
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH v3 09/10] crypto: ccp: Add unit tests for dynamic boost control
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH v3 01/10] crypto: ccp: Rename macro for security attributes
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH 1/3] crypto: ccp - Validate that platform access mailbox registers are declared
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH 0/3] New hardware support
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH 2/3] crypto: ccp - Add support for PCI device 0x17E0
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH 3/3] crypto: ccp - Add support for PCI device 0x156E
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH 5/7] crypto: update some Arm documentation references
- From: Jonathan Corbet <corbet@xxxxxxx>
- [PATCH 1/2] hwrng: imx-rngc - mark the probe function as __init
- From: Martin Kaiser <martin@xxxxxxxxx>
- [PATCH 2/2] hwrng: imx-rngc - don't init of_device_id's data
- From: Martin Kaiser <martin@xxxxxxxxx>
- [PATCH 0/2] hwrng: imx-rngc - two simple cleanups
- From: Martin Kaiser <martin@xxxxxxxxx>
- [PATCH v2 3/3] hwrng: imx-rngc - use BIT(x) for register bit defines
- From: Martin Kaiser <martin@xxxxxxxxx>
- [PATCH v2 2/3] hwrng: imx-rngc - use bitfield macros to read rng type
- From: Martin Kaiser <martin@xxxxxxxxx>
- [PATCH v2 1/3] hwrng: imx-rngc - simpler check for available random bytes
- From: Martin Kaiser <martin@xxxxxxxxx>
- [PATCH v2 0/3] hwrng: imx-rngc - simplify register definitions
- From: Martin Kaiser <martin@xxxxxxxxx>
- [herbert-cryptodev-2.6:master 17/23] arch/arm64/crypto/sha256-glue.c:18:20: error: expected declaration specifiers or '...' before string constant
- From: kernel test robot <lkp@xxxxxxxxx>
- [herbert-cryptodev-2.6:master 21/22] drivers/dma/pl330.c:1053:13: error: '_start' redeclared as different kind of symbol
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 3/3] crypto: cmac - Add support for cloning
- From: Dmitry Safonov <dima@xxxxxxxxxx>
- [PATCH] crypto: starfive - Fix driver dependencies
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] crypto: cipher - Add crypto_clone_cipher
- From: Simon Horman <simon.horman@xxxxxxxxxxxx>
- Re: [herbert-cryptodev-2.6:master 21/22] drivers/tty/serial/amba-pl011.c:379:30: error: implicit declaration of function 'phys_to_page'; did you mean 'pfn_to_page'?
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [herbert-cryptodev-2.6:master 21/22] drivers/tty/serial/amba-pl011.c:379:30: error: implicit declaration of function 'phys_to_page'; did you mean 'pfn_to_page'?
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- Re: [herbert-cryptodev-2.6:master 21/22] drivers/tty/serial/amba-pl011.c:379:30: error: implicit declaration of function 'phys_to_page'; did you mean 'pfn_to_page'?
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: arm64/sha256-glue - Include module.h
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [herbert-cryptodev-2.6:master 21/22] drivers/tty/serial/amba-pl011.c:379:30: error: implicit declaration of function 'phys_to_page'; did you mean 'pfn_to_page'?
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [herbert-cryptodev-2.6:master 17/22] arch/arm64/crypto/sha256-glue.c:18:20: error: expected parameter declarator
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH] crypto: api - Include moduleparam.h in algapi.h
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [herbert-cryptodev-2.6:master 17/22] arch/arm64/crypto/sha256-glue.c:194:1: warning: data definition has no type or storage class
- From: kernel test robot <lkp@xxxxxxxxx>
- [herbert-cryptodev-2.6:master 21/22] drivers/tty/serial/amba-pl011.c:379:30: error: implicit declaration of function 'phys_to_page'; did you mean 'pfn_to_page'?
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v6 07/11] arm64: dts: qcom: sm6115: Add Crypto Engine support
- From: Konrad Dybcio <konrad.dybcio@xxxxxxxxxx>
- Re: [PATCH v6 07/11] arm64: dts: qcom: sm6115: Add Crypto Engine support
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- Re: [PATCH v6 07/11] arm64: dts: qcom: sm6115: Add Crypto Engine support
- From: Konrad Dybcio <konrad.dybcio@xxxxxxxxxx>
- Re: [PATCH v6 09/11] arm64: dts: qcom: sm8250: Add Crypto Engine support
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- Re: [PATCH v6 08/11] arm64: dts: qcom: sm8150: Add Crypto Engine support
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- Re: [PATCH v6 07/11] arm64: dts: qcom: sm6115: Add Crypto Engine support
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- Re: [PATCH v6 07/11] arm64: dts: qcom: sm6115: Add Crypto Engine support
- From: Stephan Gerhold <stephan@xxxxxxxxxxx>
- Re: [PATCH 0/3] crypto: cmac - Add cloning support
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] crypto: shash - Allow cloning on algorithms with no init_tfm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: shash - Allow cloning on algorithms with no init_tfm
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v8 0/4] crypto: starfive - Add drivers for crypto engine
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 0/4] crypto: starfive - Add drivers for crypto engine
- From: Conor Dooley <conor.dooley@xxxxxxxxxxxxx>
- [PATCH] crypto: shash - Allow cloning on algorithms with no init_tfm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] crypto: cmac - Add support for cloning
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v8 0/4] crypto: starfive - Add drivers for crypto engine
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] caam: imx: fix the built-in caam driver cannot match soc_id
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: sa2ul: change unsafe data size limit to 255 bytes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: hisilicon/advca - Add SHA support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Crypto: Fix one bug when use kernel ecdsa algorithm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/3] crypto: cipher - Add crypto_clone_cipher
- From: "Herbert Xu" <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3/3] crypto: cmac - Add support for cloning
- From: "Herbert Xu" <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/3] crypto: cmac - Use modern init_tfm/exit_tfm
- From: "Herbert Xu" <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 0/3] crypto: cmac - Add cloning support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V3 0/6] ARM: dts: imx6ull: Fix dtbs_check warnings
- From: Stefan Wahren <stefan.wahren@xxxxxxxx>
- Re: [PATCH 11/13] crypto: octeontx2: Use alloc_ordered_workqueue() to create ordered workqueues
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [PATCH V3 4/4] arm64: dts: qcom: ipq9574: Enable crypto nodes
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- [PATCH V3 4/4] arm64: dts: qcom: ipq9574: Enable crypto nodes
- From: Anusha Rao <quic_anusha@xxxxxxxxxxx>
- [PATCH V3 3/4] dt-bindings: qcom-qce: add SoC compatible string for ipq9574
- From: Anusha Rao <quic_anusha@xxxxxxxxxxx>
- [PATCH V3 2/4] clk: qcom: gcc-ipq9574: Enable crypto clocks
- From: Anusha Rao <quic_anusha@xxxxxxxxxxx>
- [PATCH V3 1/4] dt-bindings: clock: Add crypto clock and reset definitions
- From: Anusha Rao <quic_anusha@xxxxxxxxxxx>
- [PATCH V3 0/4] Enable crypto for ipq9574
- From: Anusha Rao <quic_anusha@xxxxxxxxxxx>
- Re: [PATCH] dt-bindings: xilinx: Switch xilinx.com emails to amd.com
- From: Michal Simek <michal.simek@xxxxxxx>
- [PATCH] hwrng: cn10k: Add extended trng register support
- From: Bharat Bhushan <bbhushan2@xxxxxxxxxxx>
- Re: [PATCH] dt-bindings: xilinx: Switch xilinx.com emails to amd.com
- From: Jassi Brar <jassisinghbrar@xxxxxxxxx>
- Re: [PATCH] dt-bindings: xilinx: Switch xilinx.com emails to amd.com
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH 2/2] rust: add socket support
- From: FUJITA Tomonori <tomo@xxxxxxxxxx>
- Re: [PATCH 3/3] integrity: Remove EXPERIMENTAL from Kconfig
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] integrity: Enforce digitalSignature usage in the ima and evm keyrings
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] KEYS: DigitalSignature link restriction
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] dt-bindings: xilinx: Switch xilinx.com emails to amd.com
- From: Damien Le Moal <dlemoal@xxxxxxxxxx>
- Re: [PATCH v5 06/15] dmaengine: idxd: Add wq private data accessors
- From: Dave Jiang <dave.jiang@xxxxxxxxx>
- [PATCH v5 15/15] crypto: iaa - Add IAA Compression Accelerator stats
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v5 14/15] crypto: iaa - Add irq support for the crypto async interface
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v5 13/15] crypto: iaa - Add support for default IAA 'canned' compression mode
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v5 12/15] crypto: iaa - Add support for iaa_crypto deflate compression algorithm
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v5 10/15] crypto: iaa - Add per-cpu workqueue table with rebalancing
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v5 11/15] crypto: iaa - Add compression mode management along with fixed mode
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v5 09/15] crypto: iaa - Add Intel IAA Compression Accelerator crypto driver core
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v5 08/15] crypto: iaa - Add IAA Compression Accelerator Documentation
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v5 07/15] dmaengine: idxd: add callback support for iaa crypto
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v5 06/15] dmaengine: idxd: Add wq private data accessors
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v5 05/15] dmaengine: idxd: Export wq resource management functions
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v5 03/15] dmaengine: idxd: Export drv_enable/disable and related functions
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v5 04/15] dmaengine: idxd: Export descriptor management functions
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v5 02/15] dmaengine: idxd: add external module driver support for dsa_bus_type
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v5 01/15] dmaengine: idxd: add wq driver name support for accel-config user tool
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v5 00/15] crypto: Add Intel Analytics Accelerator (IAA) crypto compression driver
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH] crypto: aegis: add header for internal prototypes
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH] crypto: x86/aria - Use 16 byte alignment for GFNI constant vectors
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [syzbot] [crypto?] general protection fault in __aria_aesni_avx_gfni_crypt_16way
- From: syzbot <syzbot+a6abcf08bad8b18fd198@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [syzbot] [crypto?] general protection fault in __aria_aesni_avx_gfni_crypt_16way
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 2/2] rust: add socket support
- From: Wedson Almeida Filho <wedsonaf@xxxxxxxxx>
- Re: [PATCH] dt-bindings: xilinx: Switch xilinx.com emails to amd.com
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH] dt-bindings: xilinx: Switch xilinx.com emails to amd.com
- From: Sebastian Reichel <sebastian.reichel@xxxxxxxxxxxxx>
- Re: [PATCH] dt-bindings: xilinx: Switch xilinx.com emails to amd.com
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH] dt-bindings: xilinx: Switch xilinx.com emails to amd.com
- From: Michal Simek <michal.simek@xxxxxxx>
- Re: [PATCH 2/2] rust: add socket support
- From: Andrew Lunn <andrew@xxxxxxx>
- async import/export for ahash
- From: Simon Richter <Simon.Richter@xxxxxxxxxx>
- Re: [PATCH 1/2] rust: add synchronous message digest support
- From: FUJITA Tomonori <tomo@xxxxxxxxxx>
- Re: [PATCH V2 1/4] dt-bindings: clock: Add crypto clock and reset definitions
- From: Anusha Canchi <quic_anusha@xxxxxxxxxxx>
- [PATCH 1/2] crypto: starfive - Update hash module irq handling
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH 2/2] crypto: starfive - Add RSA algo support
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH 0/2] crypto: starfive - Add RSA algo to drivers
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- Re: [PATCH V2 1/4] dt-bindings: clock: Add crypto clock and reset definitions
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- Re: [PATCH 1/2] rust: add synchronous message digest support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 2/2] rust: add socket support
- From: FUJITA Tomonori <tomo@xxxxxxxxxx>
- [PATCH v2] fsverity: use shash API instead of ahash API
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 6.1] crypto: testmgr - fix RNG performance in fuzz tests
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- RE: [PATCH 3/3] crypto: LEA block cipher AVX2 optimization
- From: Dongsoo Lee <letrhee@xxxxxxxxx>
- RE: [PATCH 0/3] crypto: LEA block cipher implementation
- From: Dongsoo Lee <letrhee@xxxxxxxxx>
- Re: [PATCH v6 07/14] x86: Secure Launch kernel early boot stub
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 04/14] x86: Secure Launch Resource Table header file
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 13/14] tpm: Allow locality 2 to be set when initializing the TPM for Secure Launch
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 11/14] reboot: Secure Launch SEXIT support on reboot paths
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 07/14] x86: Secure Launch kernel early boot stub
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 04/14] x86: Secure Launch Resource Table header file
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 04/14] x86: Secure Launch Resource Table header file
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 04/14] x86: Secure Launch Resource Table header file
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 04/14] x86: Secure Launch Resource Table header file
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 09/14] x86: Secure Launch SMP bringup support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v6 07/14] x86: Secure Launch kernel early boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v6 08/14] x86: Secure Launch kernel late boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v6 11/14] reboot: Secure Launch SEXIT support on reboot paths
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH V2 3/4] dt-bindings: qcom-qce: add SoC compatible string for ipq9574
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH RFC v7 52/64] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH V2 1/4] dt-bindings: clock: Add crypto clock and reset definitions
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- [PATCH V2 4/4] arm64: dts: qcom: ipq9574: Enable crypto nodes
- From: Anusha Rao <quic_anusha@xxxxxxxxxxx>
- [PATCH V2 0/4] Enable crypto for ipq9574
- From: Anusha Rao <quic_anusha@xxxxxxxxxxx>
- [PATCH V2 3/4] dt-bindings: qcom-qce: add SoC compatible string for ipq9574
- From: Anusha Rao <quic_anusha@xxxxxxxxxxx>
- [PATCH V2 1/4] dt-bindings: clock: Add crypto clock and reset definitions
- From: Anusha Rao <quic_anusha@xxxxxxxxxxx>
- [PATCH V2 2/4] clk: qcom: gcc-ipq9574: Enable crypto clocks
- From: Anusha Rao <quic_anusha@xxxxxxxxxxx>
- Re: [PATCH 2/2] rust: add socket support
- From: Andrew Lunn <andrew@xxxxxxx>
- [PATCH v8 4/4] crypto: starfive - Add hash and HMAC support
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH v8 3/4] riscv: dts: starfive: Add crypto and DMA node for VisionFive 2
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH v8 1/4] dt-bindings: crypto: Add StarFive crypto module
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH v8 2/4] crypto: starfive - Add crypto engine support
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH v8 0/4] crypto: starfive - Add drivers for crypto engine
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 00/11] Introduce cmpxchg128() -- aka. the demise of cmpxchg_double()
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH v3 10/11] arch: Remove cmpxchg_double
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- [PATCH v3 10/11] arch: Remove cmpxchg_double
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v3 08/11] slub: Replace cmpxchg_double()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v3 04/11] instrumentation: Wire up cmpxchg128()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v3 11/11] s390/cpum_sf: Convert to cmpxchg128()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v3 02/11] types: Introduce [us]128
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v3 00/11] Introduce cmpxchg128() -- aka. the demise of cmpxchg_double()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v3 07/11] x86,intel_iommu: Replace cmpxchg_double()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v3 03/11] arch: Introduce arch_{,try_}_cmpxchg128{,_local}()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v3 06/11] x86,amd_iommu: Replace cmpxchg_double()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v3 09/11] mm/slub: Fold slab_update_freelist()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v3 05/11] percpu: Wire up cmpxchg128
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v3 01/11] cyrpto/b128ops: Remove struct u128
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] rust: add synchronous message digest support
- From: Kent Overstreet <kent.overstreet@xxxxxxxxx>
- Re: [PATCH v7 4/4] crypto: starfive - Add hash and HMAC support
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- Re: [syzbot] [crypto?] general protection fault in __aria_aesni_avx_gfni_crypt_16way
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V6 03/21] crypto: hisilicon/qm: Fix to enable build with RISC-V clang
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH V6 21/21] MAINTAINERS: Add entry for drivers/acpi/riscv
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V6 20/21] RISC-V: Enable ACPI in defconfig
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V6 19/21] RISC-V: time.c: Add ACPI support for time_init()
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V6 18/21] clocksource/timer-riscv: Add ACPI support
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V6 17/21] clocksource/timer-riscv: Refactor riscv_timer_init_dt()
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V6 16/21] irqchip/riscv-intc: Add ACPI support
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V6 15/21] RISC-V: cpu: Enable cpuinfo for ACPI systems
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V6 14/21] RISC-V: cpufeature: Add ACPI support in riscv_fill_hwcap()
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V6 13/21] RISC-V: only iterate over possible CPUs in ISA string parser
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V6 12/21] RISC-V: smpboot: Add ACPI support in setup_smp()
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V6 11/21] RISC-V: smpboot: Create wrapper setup_smp()
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V6 10/21] drivers/acpi: RISC-V: Add RHCT related code
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V6 09/21] RISC-V: ACPI: Cache and retrieve the RINTC structure
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V6 08/21] RISC-V: Add ACPI initialization in setup_arch()
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V6 07/21] ACPI: processor_core: RISC-V: Enable mapping processor to the hartid
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V6 06/21] RISC-V: Add support to build the ACPI core
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V6 05/21] ACPI: OSL: Make should_use_kmap() 0 for RISC-V
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V6 04/21] ACPI: tables: Print RINTC information when MADT is parsed
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V6 03/21] crypto: hisilicon/qm: Fix to enable build with RISC-V clang
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V6 02/21] platform/surface: Disable for RISC-V
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V6 01/21] riscv: move sbi_init() earlier before jump_label_init()
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V6 00/21] Add basic ACPI support for RISC-V
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH 0/2] rust: networking and crypto abstractions
- From: FUJITA Tomonori <tomo@xxxxxxxxxx>
- [PATCH 2/2] rust: add socket support
- From: FUJITA Tomonori <tomo@xxxxxxxxxx>
- [PATCH 1/2] rust: add synchronous message digest support
- From: FUJITA Tomonori <tomo@xxxxxxxxxx>
- Re: [PATCH v7 4/4] crypto: starfive - Add hash and HMAC support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 4/4] crypto: starfive - Add hash and HMAC support
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- Re: [syzbot] [crypto?] general protection fault in __aria_aesni_avx_gfni_crypt_16way
- From: syzbot <syzbot+a6abcf08bad8b18fd198@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH V3 6/6] ARM: dts: imx6ul: Add clock and PGC node to GPC
- From: Shawn Guo <shawnguo@xxxxxxxxxx>
- Re: [PATCH V3 5/6] ARM: dts: imx: Adjust dma-apbh node name
- From: Shawn Guo <shawnguo@xxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: hisilicon/advca - Add SHA support
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: hisilicon - Add HiSilicon ADVCA Subsystem
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v2 2/2] crypto: hisilicon/advca - Add SHA support
- From: David Yang <mmyangfl@xxxxxxxxx>
- [PATCH v2 1/2] crypto: hisilicon - Add HiSilicon ADVCA Subsystem
- From: David Yang <mmyangfl@xxxxxxxxx>
- [PATCH v2 0/2] crypto: hisilicon - Add HiSilicon ADVCA Subsystem
- From: David Yang <mmyangfl@xxxxxxxxx>
- Re: [PATCH v6 07/14] x86: Secure Launch kernel early boot stub
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 07/14] x86: Secure Launch kernel early boot stub
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v6 02/14] Documentation/x86: Secure Launch kernel documentation
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v6 12/14] x86: Secure Launch late initcall platform module
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v6 12/14] x86: Secure Launch late initcall platform module
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v6 08/14] x86: Secure Launch kernel late boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v6 08/14] x86: Secure Launch kernel late boot stub
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Andrew Cooper <andyhhp@xxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 07/14] x86: Secure Launch kernel early boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v6 09/14] x86: Secure Launch SMP bringup support
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v6 11/12] crypto: x86/aes-kl - Support AES algorithm using Key Locker instructions
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v6 13/14] tpm: Allow locality 2 to be set when initializing the TPM for Secure Launch
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v6 05/14] x86: Secure Launch main header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v6 13/14] tpm: Allow locality 2 to be set when initializing the TPM for Secure Launch
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 11/14] reboot: Secure Launch SEXIT support on reboot paths
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 07/14] x86: Secure Launch kernel early boot stub
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v6 05/14] x86: Secure Launch main header file
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 02/14] Documentation/x86: Secure Launch kernel documentation
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 04/14] x86: Secure Launch Resource Table header file
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v2] hwrng: histb - Move driver to drivers/char/hw_random/histb-rng.c
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] crypto: engine - Fix struct crypto_engine_op doc
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] crypto: octeontx2: hardware configuration for inline IPsec
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/2] crypto: jitter - SHA-3 conditioner and test interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ixp4xx - silence uninitialized variable warning
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] crypto: caam - refactor RNG initialization
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH] caam: imx: fix the built-in caam driver cannot match soc_id
- From: Alice Guo <alice.guo@xxxxxxx>
- Re: [PATCH v7 4/4] crypto: starfive - Add hash and HMAC support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 2/4] crypto: starfive - Add crypto engine support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: sa2ul: change unsafe data size limit to 255 bytes
- From: Jayesh Choudhary <j-choudhary@xxxxxx>
- [PATCH] caam: imx: fix the built-in caam driver cannot match soc_id
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- Re: [PATCH RFC v7 52/64] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 10/12] crypto: x86/aes - Prepare for a new AES implementation
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- Re: [PATCH RFC v7 52/64] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH 1/3] KEYS: DigitalSignature link restriction
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v6 10/12] crypto: x86/aes - Prepare for a new AES implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 10/12] crypto: x86/aes - Prepare for a new AES implementation
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- Re: [PATCH v4 4/4] RISC-V: crypto: add accelerated GCM GHASH implementation
- From: Nathan Huckleberry <nhuck@xxxxxxxxxx>
- Re: [PATCH v6 09/14] x86: Secure Launch SMP bringup support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH] hwrng: virtio - Fix race on data_avail and actual data
- From: Aleksandr Nogikh <nogikh@xxxxxxxxxx>
- Re: [PATCH v4 4/4] RISC-V: crypto: add accelerated GCM GHASH implementation
- From: Heiko Stübner <heiko@xxxxxxxxx>
- [PATCH v2 2/2] uacce: vma_close clears q->qfrs when freeing qfrs
- From: Zhangfei Gao <zhangfei.gao@xxxxxxxxxx>
- [PATCH v2 1/2] uacce: use q->mapping to replace inode->i_mapping
- From: Zhangfei Gao <zhangfei.gao@xxxxxxxxxx>
- [PATCH v2 0/2] uacce misc fix
- From: Zhangfei Gao <zhangfei.gao@xxxxxxxxxx>
- Re: [PATCH] uacce: use filep->f_mapping to replace inode->i_mapping
- From: Zhangfei Gao <zhangfei.gao@xxxxxxxxxx>
- Re: [PATCH 1/3] hwrng: imx-rngc - use bitfield macros to read fifo level
- From: Martin Kaiser <martin@xxxxxxxxx>
- Re: [PATCH 1/3] hwrng: imx-rngc - use bitfield macros to read fifo level
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: lib/sha256 - Use generic code from sha256_base
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: lib/sha256 - Remove redundant and unused sha224_update
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] uacce: use filep->f_mapping to replace inode->i_mapping
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] uacce: use filep->f_mapping to replace inode->i_mapping
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] uacce: use filep->f_mapping to replace inode->i_mapping
- From: Zhangfei Gao <zhangfei.gao@xxxxxxxxxx>
- Re: [PATCH v6 04/14] x86: Secure Launch Resource Table header file
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 08/14] x86: Secure Launch kernel late boot stub
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 09/14] x86: Secure Launch SMP bringup support
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 3/3] integrity: Remove EXPERIMENTAL from Kconfig
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 12/14] x86: Secure Launch late initcall platform module
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 12/14] x86: Secure Launch late initcall platform module
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/3] KEYS: DigitalSignature link restriction
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 0/3] Add digitalSignature enforcement keyring restrictions
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 02/14] Documentation/x86: Secure Launch kernel documentation
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH] Crypto: Fix one bug when use kernel ecdsa algorithm
- From: yangmengfei1394@xxxxxxxxxxxxxx
- Re: [PATCH V5 03/21] crypto: hisilicon/qm: Fix to enable build with RISC-V clang
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- Re: [PATCH V5 08/21] RISC-V: ACPI: Cache and retrieve the RINTC structure
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v4 01/15] dmaengine: idxd: add wq driver name support for accel-config user tool
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- Re: [PATCH V5 08/21] RISC-V: ACPI: Cache and retrieve the RINTC structure
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH v4 01/15] dmaengine: idxd: add wq driver name support for accel-config user tool
- From: Fenghua Yu <fenghua.yu@xxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 3/3] mmc: sdhci-msm: Switch to the new ICE API
- From: Ulf Hansson <ulf.hansson@xxxxxxxxxx>
- Re: [PATCH 0/6] bus: fsl-mc: Make remove function return void
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH 11/13] crypto: octeontx2: Use alloc_ordered_workqueue() to create ordered workqueues
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V5 03/21] crypto: hisilicon/qm: Fix to enable build with RISC-V clang
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 11/13] crypto: octeontx2: Use alloc_ordered_workqueue() to create ordered workqueues
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [PATCH v6 10/12] crypto: x86/aes - Prepare for a new AES implementation
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- Re: [PATCH v6 07/12] x86/cpu/keylocker: Load an internal wrapping key at boot-time
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v6 07/12] x86/cpu/keylocker: Load an internal wrapping key at boot-time
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH 3/3] integrity: Remove EXPERIMENTAL from Kconfig
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH 2/3] integrity: Enforce digitalSignature usage in the ima and evm keyrings
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH 1/3] KEYS: DigitalSignature link restriction
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH 0/3] Add digitalSignature enforcement keyring restrictions
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH 0/6] bus: fsl-mc: Make remove function return void
- From: Li Yang <leoyang.li@xxxxxxx>
- Re: [PATCH v6 07/12] x86/cpu/keylocker: Load an internal wrapping key at boot-time
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v4 06/15] dmaengine: idxd: Add wq private data accessors
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 06/15] dmaengine: idxd: Add wq private data accessors
- From: Dave Jiang <dave.jiang@xxxxxxxxx>
- Re: [PATCH v6 07/12] x86/cpu/keylocker: Load an internal wrapping key at boot-time
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v4 15/15] crypto: iaa - Add IAA Compression Accelerator stats
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v4 14/15] crypto: iaa - Add irq support for the crypto async interface
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v4 13/15] crypto: iaa - Add support for default IAA 'canned' compression mode
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v4 12/15] crypto: iaa - Add support for iaa_crypto deflate compression algorithm
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v4 11/15] crypto: iaa - Add compression mode management along with fixed mode
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v4 10/15] crypto: iaa - Add per-cpu workqueue table with rebalancing
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v4 08/15] crypto: iaa - Add IAA Compression Accelerator Documentation
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v4 09/15] crypto: iaa - Add Intel IAA Compression Accelerator crypto driver core
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v4 07/15] dmaengine: idxd: add callback support for iaa crypto
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v4 06/15] dmaengine: idxd: Add wq private data accessors
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v4 05/15] dmaengine: idxd: Export wq resource management functions
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v4 04/15] dmaengine: idxd: Export descriptor management functions
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v4 03/15] dmaengine: idxd: Export drv_enable/disable and related functions
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v4 02/15] dmaengine: idxd: add external module driver support for dsa_bus_type
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v4 01/15] dmaengine: idxd: add wq driver name support for accel-config user tool
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v4 00/15] crypto: Add Intel Analytics Accelerator (IAA) crypto compression driver
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 11/12] crypto: x86/aes-kl - Support AES algorithm using Key Locker instructions
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- RE: [PATCH v6 11/12] crypto: x86/aes-kl - Support AES algorithm using Key Locker instructions
- From: "Elliott, Robert (Servers)" <elliott@xxxxxxx>
- RE: [PATCH v6 11/12] crypto: x86/aes-kl - Support AES algorithm using Key Locker instructions
- From: "Elliott, Robert (Servers)" <elliott@xxxxxxx>
- RE: [PATCH v6 07/12] x86/cpu/keylocker: Load an internal wrapping key at boot-time
- From: "Elliott, Robert (Servers)" <elliott@xxxxxxx>
- Re: [PATCH v6 07/12] x86/cpu/keylocker: Load an internal wrapping key at boot-time
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- Re: [PATCH v6 08/12] x86/PM/keylocker: Restore internal wrapping key on resume from ACPI S3/4
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- Re: [PATCH v6 11/12] crypto: x86/aes-kl - Support AES algorithm using Key Locker instructions
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- Re: [PATCH v6 12/14] x86: Secure Launch late initcall platform module
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH 0/6] bus: fsl-mc: Make remove function return void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH V5 21/21] MAINTAINERS: Add entry for drivers/acpi/riscv
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V5 20/21] RISC-V: Enable ACPI in defconfig
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V5 19/21] RISC-V: Add ACPI initialization in setup_arch()
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V5 18/21] RISC-V: time.c: Add ACPI support for time_init()
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V5 17/21] clocksource/timer-riscv: Add ACPI support
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V5 15/21] irqchip/riscv-intc: Add ACPI support
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V5 16/21] clocksource/timer-riscv: Refactor riscv_timer_init_dt()
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V5 12/21] RISC-V: only iterate over possible CPUs in ISA string parser
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V5 11/21] RISC-V: smpboot: Add ACPI support in setup_smp()
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V5 13/21] RISC-V: cpufeature: Add ACPI support in riscv_fill_hwcap()
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V5 14/21] RISC-V: cpu: Enable cpuinfo for ACPI systems
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V5 10/21] RISC-V: smpboot: Create wrapper setup_smp()
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V5 09/21] drivers/acpi: RISC-V: Add RHCT related code
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V5 08/21] RISC-V: ACPI: Cache and retrieve the RINTC structure
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V5 07/21] ACPI: processor_core: RISC-V: Enable mapping processor to the hartid
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V5 06/21] RISC-V: Add support to build the ACPI core
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V5 05/21] ACPI: OSL: Make should_use_kmap() 0 for RISC-V
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V5 04/21] ACPI: tables: Print RINTC information when MADT is parsed
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V5 03/21] crypto: hisilicon/qm: Fix to enable build with RISC-V clang
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V5 02/21] platform/surface: Disable for RISC-V
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V5 01/21] riscv: move sbi_init() earlier before jump_label_init()
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V5 00/21] Add basic ACPI support for RISC-V
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: virtio - Fix race on data_avail and actual data
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- [syzbot] [crypto?] general protection fault in __aria_aesni_avx_gfni_crypt_16way
- From: syzbot <syzbot+a6abcf08bad8b18fd198@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 1/3] dt-bindings: ufs: qcom: Add ICE phandle
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH] hwrng: virtio - Fix race on data_avail and actual data
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [GIT PULL] Crypto Fixes for 6.4
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] Crypto Fixes for 6.4
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 02/14] Documentation/x86: Secure Launch kernel documentation
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [PATCH v6 00/14] x86: Trenchboot secure dynamic launch Linux kernel support
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [PATCH v6 11/12] crypto: x86/aes-kl - Support AES algorithm using Key Locker instructions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v6 10/12] crypto: x86/aes - Prepare for a new AES implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v6 08/12] x86/PM/keylocker: Restore internal wrapping key on resume from ACPI S3/4
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v6 07/12] x86/cpu/keylocker: Load an internal wrapping key at boot-time
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v6 07/14] x86: Secure Launch kernel early boot stub
- From: Simon Horman <horms@xxxxxxxxxx>
- Re: [PATCH v6 12/14] x86: Secure Launch late initcall platform module
- From: Simon Horman <horms@xxxxxxxxxx>
- Re: [PATCH v6 09/14] x86: Secure Launch SMP bringup support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v6 08/14] x86: Secure Launch kernel late boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v6 07/14] x86: Secure Launch kernel early boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v7 1/3] dt-bindings: ufs: qcom: Add ICE phandle
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH v6 09/14] x86: Secure Launch SMP bringup support
- From: Simon Horman <horms@xxxxxxxxxx>
- Re: [PATCH v6 08/14] x86: Secure Launch kernel late boot stub
- From: Simon Horman <horms@xxxxxxxxxx>
- Re: [PATCH v6 07/14] x86: Secure Launch kernel early boot stub
- From: Simon Horman <horms@xxxxxxxxxx>
- Re: [PATCH v6 05/14] x86: Secure Launch main header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v6 04/14] x86: Secure Launch Resource Table header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v6 02/14] Documentation/x86: Secure Launch kernel documentation
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Simon Horman <horms@xxxxxxxxxx>
- Re: [PATCH v6 05/14] x86: Secure Launch main header file
- From: Simon Horman <horms@xxxxxxxxxx>
- Re: [PATCH v6 04/14] x86: Secure Launch Resource Table header file
- From: Simon Horman <horms@xxxxxxxxxx>
- Re: [PATCH v6 02/14] Documentation/x86: Secure Launch kernel documentation
- From: Simon Horman <horms@xxxxxxxxxx>
- Re: [PATCH v6 00/14] x86: Trenchboot secure dynamic launch Linux kernel support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v6 00/14] x86: Trenchboot secure dynamic launch Linux kernel support
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [PATCH] hwrng: virtio - Fix race on data_avail and actual data
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- [PATCH AUTOSEL 6.1 21/49] crypto: jitter - permanent and intermittent health errors
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.2 24/53] crypto: jitter - permanent and intermittent health errors
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.3 27/59] crypto: jitter - permanent and intermittent health errors
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH v6 12/14] x86: Secure Launch late initcall platform module
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v6 14/14] x86: EFI stub DRTM launch support for Secure Launch
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v6 11/14] reboot: Secure Launch SEXIT support on reboot paths
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v6 13/14] tpm: Allow locality 2 to be set when initializing the TPM for Secure Launch
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v6 09/14] x86: Secure Launch SMP bringup support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v6 10/14] kexec: Secure Launch kexec SEXIT support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v6 07/14] x86: Secure Launch kernel early boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v6 08/14] x86: Secure Launch kernel late boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v6 02/14] Documentation/x86: Secure Launch kernel documentation
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v6 05/14] x86: Secure Launch main header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]