Linux Crypto
[Prev Page][Next Page]
- Re: [RFC][PATCH 07/12] percpu: Wire up cmpxchg128
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [RFC][PATCH 11/12] slub: Replace cmpxchg_double()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: ccp: Sanitize sev_platform_init() error messages
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v14 2/7] mm: add VM_DROPPABLE for designating always lazily freeable mappings
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - Failure on re-initialization due to duplicate sysfs filename
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: Bug report: the extended PCI config space is missed with 6.2-rc2
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH] crypto: ccp - Failure on re-initialization due to duplicate sysfs filename
- From: Vladis Dronov <vdronov@xxxxxxxxxx>
- Re: [PATCH v14 2/7] mm: add VM_DROPPABLE for designating always lazily freeable mappings
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: crypto: aria-avx - add AES-NI/AVX/x86_64/GFNI assembler implementation of aria cipher
- From: Jan Beulich <jbeulich@xxxxxxxx>
- Re: [PATCH] crypto: talitos - Remove GFP_DMA and add DMA alignment padding
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: talitos - Remove GFP_DMA and add DMA alignment padding
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- RE: [PATCH v2 2/3] hwrng: starfive - Add TRNG driver for StarFive SoC
- From: JiaJie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/3] hwrng: starfive - Add TRNG driver for StarFive SoC
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH v2 2/3] hwrng: starfive - Add TRNG driver for StarFive SoC
- From: JiaJie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- Re: [PATCH RFC v7 52/64] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH v2 2/3] hwrng: starfive - Add TRNG driver for StarFive SoC
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH v2 2/3] hwrng: starfive - Add TRNG driver for StarFive SoC
- From: JiaJie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH] crypto: ccp - Failure on re-initialization due to duplicate sysfs filename
- From: Koba Ko <koba.ko@xxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: ccp: Sanitize sev_platform_init() error messages
- From: David Rientjes <rientjes@xxxxxxxxxx>
- [PATCH v2] crypto: ccp: Sanitize sev_platform_init() error messages
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxxx>
- Re: [PATCH] crypto: ccp: Improve sev_platform_init() error messages
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxxx>
- Re: [PATCH 1/7] dt-bindings: crypto: Let STM32 define Ux500 HASH
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH] crypto: talitos - Remove GFP_DMA and add DMA alignment padding
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - Remove GFP_DMA and add DMA alignment padding
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: sun8i-ss - Remove GFP_DMA and add DMA alignment padding
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- RE: [PATCH v2 2/3] hwrng: starfive - Add TRNG driver for StarFive SoC
- From: JiaJie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2] MAINTAINERS: Update email of Tudor Ambarus
- From: Miquel Raynal <miquel.raynal@xxxxxxxxxxx>
- Re: [PATCH v2] MAINTAINERS: Update email of Tudor Ambarus
- From: Miquel Raynal <miquel.raynal@xxxxxxxxxxx>
- Re: [PATCH v2 5/5] crypto/Documentation: Add crypto_pool kernel API
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [PATCH v2 3/5] crypto/net/tcp: Use crypto_pool for TCP-MD5
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [PATCH v2 2/5] crypto/pool: Add crypto_pool_reserve_scratch()
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon: Wipe entire pool on error
- From: Weili Qian <qianweili@xxxxxxxxxx>
- Re: [PATCH v2 1/5] crypto: Introduce crypto_pool
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [PATCH v2] MAINTAINERS: Update email of Tudor Ambarus
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v14 2/7] mm: add VM_DROPPABLE for designating always lazily freeable mappings
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v14 2/7] mm: add VM_DROPPABLE for designating always lazily freeable mappings
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH v14 2/7] mm: add VM_DROPPABLE for designating always lazily freeable mappings
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [GIT PULL] Crypto Fixes for 6.2
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v14 2/7] mm: add VM_DROPPABLE for designating always lazily freeable mappings
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v14 2/7] mm: add VM_DROPPABLE for designating always lazily freeable mappings
- From: "Andy Lutomirski" <luto@xxxxxxxxxx>
- Re: [PATCH v3 2/6] crypto/realtek: core functions
- From: Markus Stockhausen <markus.stockhausen@xxxxxx>
- Re: [PATCH v3 3/6] crypto/realtek: hash algorithms
- From: Markus Stockhausen <markus.stockhausen@xxxxxx>
- Re: [PATCH] crypto: hisilicon: Wipe entire pool on error
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH v2] MAINTAINERS: Update email of Tudor Ambarus
- From: Nicolas Ferre <nicolas.ferre@xxxxxxxxxxxxx>
- Re: [PATCH v2] MAINTAINERS: Update email of Tudor Ambarus
- From: Miquel Raynal <miquel.raynal@xxxxxxxxxxx>
- Re: [PATCH v2] MAINTAINERS: Update email of Tudor Ambarus
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxx>
- Re: [PATCH v3 0/6] Trivial set of FIPS 140-3 related changes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 0/4] crypto: aria: implement aria-avx2 and aria-avx512
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [patch] crypto: ccp - Avoid page allocation failure warning for SEV_GET_ID2
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/2] lib/mpi: Fix buffer overrun when SG is too long
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [GIT PULL] Crypto Fixes for 6.2
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/6] crypto/realtek: core functions
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/6] crypto/realtek: hash algorithms
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/3] hwrng: starfive - Add TRNG driver for StarFive SoC
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [Bug 216888] New: "sysfs: cannot create duplicate filename /dma/dma0chan0" with 68dbe80f ("crypto: ccp - Release dma channels before dmaengine unrgister")
- From: "Linux kernel regression tracking (#adding)" <regressions@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] dt-bindings: crypto: sun8i-ce: Add compatible for D1
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH v2 2/3] crypto: sun8i-ce - Add TRNG clock to the D1 variant
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH] crypto: hisilicon: Wipe entire pool on error
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v14 2/7] mm: add VM_DROPPABLE for designating always lazily freeable mappings
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v14 2/7] mm: add VM_DROPPABLE for designating always lazily freeable mappings
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v14 2/7] mm: add VM_DROPPABLE for designating always lazily freeable mappings
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v14 2/7] mm: add VM_DROPPABLE for designating always lazily freeable mappings
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC v7 37/64] KVM: SVM: Add KVM_SNP_INIT command
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v14 2/7] mm: add VM_DROPPABLE for designating always lazily freeable mappings
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH RFC v7 25/64] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH RFC v7 25/64] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH Part2 v6 07/49] x86/sev: Invalid pages from direct map when adding it to RMP table
- From: Marc Orr <marcorr@xxxxxxxxxx>
- Re: [PATCH Part2 v6 07/49] x86/sev: Invalid pages from direct map when adding it to RMP table
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH Part2 v6 07/49] x86/sev: Invalid pages from direct map when adding it to RMP table
- From: Marc Orr <marcorr@xxxxxxxxxx>
- Re: [PATCH v14 2/7] mm: add VM_DROPPABLE for designating always lazily freeable mappings
- From: Yann Droneaud <ydroneaud@xxxxxxxxxx>
- Re: [PATCH Part2 v6 07/49] x86/sev: Invalid pages from direct map when adding it to RMP table
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH RFC v7 03/64] KVM: SVM: Advertise private memory support to KVM
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [Bug 216888] New: "sysfs: cannot create duplicate filename /dma/dma0chan0" with 68dbe80f ("crypto: ccp - Release dma channels before dmaengine unrgister")
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: [PATCH v2 3/3] riscv: dts: allwinner: d1: Add crypto engine node
- From: Jernej Škrabec <jernej.skrabec@xxxxxxxxx>
- Re: [PATCH v2 2/3] crypto: sun8i-ce - Add TRNG clock to the D1 variant
- From: Jernej Škrabec <jernej.skrabec@xxxxxxxxx>
- Re: [patch] crypto: ccp - Avoid page allocation failure warning for SEV_GET_ID2
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH RFC v7 03/64] KVM: SVM: Advertise private memory support to KVM
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH RFC v7 02/64] KVM: x86: Add KVM_CAP_UNMAPPED_PRIVATE_MEMORY
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3 2/6] crypto: xts - drop xts_check_key()
- From: Nicolai Stange <nstange@xxxxxxx>
- Re: [PATCH v3 3/6] crypto: xts - drop redundant xts key check
- From: Nicolai Stange <nstange@xxxxxxx>
- Re: [PATCH RFC v7 01/64] KVM: Fix memslot boundary condition for large page
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH RFC v7 01/64] KVM: Fix memslot boundary condition for large page
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH RFC v7 01/64] KVM: Fix memslot boundary condition for large page
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH RFC v7 01/64] KVM: Fix memslot boundary condition for large page
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH RFC v7 04/64] KVM: x86: Add 'fault_is_private' x86 op
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH RFC v7 06/64] KVM: x86: Add platform hooks for private memory invalidations
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH RFC v7 03/64] KVM: SVM: Advertise private memory support to KVM
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH RFC v7 02/64] KVM: x86: Add KVM_CAP_UNMAPPED_PRIVATE_MEMORY
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH RFC v7 02/64] KVM: x86: Add KVM_CAP_UNMAPPED_PRIVATE_MEMORY
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH RFC v7 00/64] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [patch] crypto: ccp - Avoid page allocation failure warning for SEV_GET_ID2
- From: David Rientjes <rientjes@xxxxxxxxxx>
- Re: [PATCH v3 03/10] KEYS: X.509: Parse Basic Constraints for CA
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 04/10] KEYS: X.509: Parse Key Usage
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v14 1/7] x86: lib: Separate instruction decoder MMIO type from MMIO trace
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v14 1/7] x86: lib: Separate instruction decoder MMIO type from MMIO trace
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH v3 03/10] KEYS: X.509: Parse Basic Constraints for CA
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [patch] crypto: ccp - Avoid page allocation failure warning for SEV_GET_ID2
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC][PATCH 05/12] arch: Introduce arch_{,try_}_cmpxchg128{,_local}()
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v2 5/5] crypto/Documentation: Add crypto_pool kernel API
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] crypto: certs: fix FIPS selftest depenency
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 03/10] KEYS: X.509: Parse Basic Constraints for CA
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC v7 25/64] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC][PATCH 07/12] percpu: Wire up cmpxchg128
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- Re: [RFC][PATCH 11/12] slub: Replace cmpxchg_double()
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- Re: [PATCH RFC v7 02/64] KVM: x86: Add KVM_CAP_UNMAPPED_PRIVATE_MEMORY
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC v7 01/64] KVM: Fix memslot boundary condition for large page
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 09/10] KEYS: CA link restriction
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 09/10] KEYS: CA link restriction
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 05/10] KEYS: Introduce a CA endorsed flag
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 04/10] KEYS: X.509: Parse Key Usage
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 03/10] KEYS: X.509: Parse Basic Constraints for CA
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC][PATCH 05/12] arch: Introduce arch_{,try_}_cmpxchg128{,_local}()
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v3 02/10] KEYS: Add missing function documentation
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 01/10] KEYS: Create static version of public_key_verify_signature
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: xor_blocks() assumptions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2] crypto: ccp - Allocate TEE ring and cmd buffer using DMA APIs
- From: Rijo Thomas <Rijo-john.Thomas@xxxxxxx>
- [PATCH v5 4/4] dt-bindings: bus: add documentation for Aspeed AHBC
- From: Neal Liu <neal_liu@xxxxxxxxxxxxxx>
- [PATCH v5 3/4] dt-bindings: crypto: add documentation for Aspeed ACRY
- From: Neal Liu <neal_liu@xxxxxxxxxxxxxx>
- [PATCH v5 1/4] crypto: aspeed: Add ACRY RSA driver
- From: Neal Liu <neal_liu@xxxxxxxxxxxxxx>
- [PATCH v5 2/4] ARM: dts: aspeed: Add ACRY/AHBC device controller node
- From: Neal Liu <neal_liu@xxxxxxxxxxxxxx>
- [PATCH v5 0/4] Add Aspeed ACRY driver for hardware acceleration
- From: Neal Liu <neal_liu@xxxxxxxxxxxxxx>
- Re: [patch] crypto: ccp - Avoid page allocation failure warning for SEV_GET_ID2
- From: David Rientjes <rientjes@xxxxxxxxxx>
- Re: [PATCH v14 2/7] mm: add VM_DROPPABLE for designating always lazily freeable mappings
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v14 2/7] mm: add VM_DROPPABLE for designating always lazily freeable mappings
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v14 2/7] mm: add VM_DROPPABLE for designating always lazily freeable mappings
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v14 2/7] mm: add VM_DROPPABLE for designating always lazily freeable mappings
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v14 2/7] mm: add VM_DROPPABLE for designating always lazily freeable mappings
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v14 2/7] mm: add VM_DROPPABLE for designating always lazily freeable mappings
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v14 2/7] mm: add VM_DROPPABLE for designating always lazily freeable mappings
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v14 2/7] mm: add VM_DROPPABLE for designating always lazily freeable mappings
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC][PATCH 11/12] slub: Replace cmpxchg_double()
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v14 2/7] mm: add VM_DROPPABLE for designating always lazily freeable mappings
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v14 2/7] mm: add VM_DROPPABLE for designating always lazily freeable mappings
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v2 5/5] crypto/Documentation: Add crypto_pool kernel API
- From: Dmitry Safonov <dima@xxxxxxxxxx>
- [PATCH v2 2/5] crypto/pool: Add crypto_pool_reserve_scratch()
- From: Dmitry Safonov <dima@xxxxxxxxxx>
- [PATCH v2 3/5] crypto/net/tcp: Use crypto_pool for TCP-MD5
- From: Dmitry Safonov <dima@xxxxxxxxxx>
- [PATCH v2 4/5] crypto/net/ipv6: sr: Switch to using crypto_pool
- From: Dmitry Safonov <dima@xxxxxxxxxx>
- [PATCH v2 1/5] crypto: Introduce crypto_pool
- From: Dmitry Safonov <dima@xxxxxxxxxx>
- [PATCH v2 0/5] net/crypto: Introduce crypto_pool
- From: Dmitry Safonov <dima@xxxxxxxxxx>
- Re: [PATCH v14 2/7] mm: add VM_DROPPABLE for designating always lazily freeable mappings
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v14 2/7] mm: add VM_DROPPABLE for designating always lazily freeable mappings
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH v14 1/7] x86: lib: Separate instruction decoder MMIO type from MMIO trace
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v14 1/7] x86: lib: Separate instruction decoder MMIO type from MMIO trace
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH v14 1/7] x86: lib: Separate instruction decoder MMIO type from MMIO trace
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v14 1/7] x86: lib: Separate instruction decoder MMIO type from MMIO trace
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC][PATCH 11/12] slub: Replace cmpxchg_double()
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- Re: [RFC][PATCH 05/12] arch: Introduce arch_{,try_}_cmpxchg128{,_local}()
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- Re: [PATCH v14 1/7] x86: lib: Separate instruction decoder MMIO type from MMIO trace
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [RFC][PATCH 05/12] arch: Introduce arch_{,try_}_cmpxchg128{,_local}()
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH v2 3/6] An accelerated AES/GCM stitched implementation.
- From: Danny Tsen <dtsen@xxxxxxxxxxxxx>
- Re: [RFC][PATCH 05/12] arch: Introduce arch_{,try_}_cmpxchg128{,_local}()
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [RFC][PATCH 11/12] slub: Replace cmpxchg_double()
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH v2 0/6] crypto: Accelerated AES/GCM stitched implementation
- From: Danny Tsen <dtsen@xxxxxxxxxxxxx>
- Re: [PATCH v14 2/7] mm: add VM_DROPPABLE for designating always lazily freeable mappings
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v14 1/7] x86: lib: Separate instruction decoder MMIO type from MMIO trace
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [patch] crypto: ccp - Avoid page allocation failure warning for SEV_GET_ID2
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC][PATCH 05/12] arch: Introduce arch_{,try_}_cmpxchg128{,_local}()
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: xor_blocks() assumptions
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC][PATCH 05/12] arch: Introduce arch_{,try_}_cmpxchg128{,_local}()
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: xor_blocks() assumptions
- From: Lukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- Re: [PATCH v14 2/7] mm: add VM_DROPPABLE for designating always lazily freeable mappings
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH v14 1/7] x86: lib: Separate instruction decoder MMIO type from MMIO trace
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- RE: [PATCH 2/7] crypto: stm32/hash: Simplify code
- From: <lionel.debieve@xxxxxxxxxxx>
- RE: [PATCH 3/7] crypto: stm32/hash: Use existing busy poll function
- From: <lionel.debieve@xxxxxxxxxxx>
- Re: [PATCH] crypto: sun8i-ss - Remove GFP_DMA and add DMA alignment padding
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: sun8i-ss - Remove GFP_DMA and add DMA alignment padding
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- RE: [PATCH v4 1/4] crypto: aspeed: Add ACRY RSA driver
- From: Neal Liu <neal_liu@xxxxxxxxxxxxxx>
- Re: xor_blocks() assumptions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- xor_blocks() assumptions
- From: Lukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- [PATCH] crypto: skcipher - Use scatterwalk (un)map interface for dst and src buffers
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] async_tx: fix kernel-doc notation warnings
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp: Improve sev_platform_init() error messages
- From: David Rientjes <rientjes@xxxxxxxxxx>
- [PATCH v14 7/7] x86: vdso: Wire up getrandom() vDSO implementation
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v14 5/7] arch: allocate vgetrandom_alloc() syscall number
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v14 6/7] random: introduce generic vDSO getrandom() implementation
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v14 4/7] random: add vgetrandom_alloc() syscall
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v14 1/7] x86: lib: Separate instruction decoder MMIO type from MMIO trace
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v14 3/7] x86: mm: Skip faulting instruction for VM_DROPPABLE faults
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v14 2/7] mm: add VM_DROPPABLE for designating always lazily freeable mappings
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v14 0/7] implement getrandom() in vDSO
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v13 7/7] x86: vdso: Wire up getrandom() vDSO implementation
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v2 1/3] dt-bindings: crypto: sun8i-ce: Add compatible for D1
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH v13 6/7] random: introduce generic vDSO getrandom() implementation
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v8 4/4] crypto: aria: implement aria-avx512
- From: Taehee Yoo <ap420073@xxxxxxxxx>
- [PATCH v8 3/4] crypto: aria: implement aria-avx2
- From: Taehee Yoo <ap420073@xxxxxxxxx>
- [PATCH v8 2/4] crypto: aria: do not use magic number offsets of aria_ctx
- From: Taehee Yoo <ap420073@xxxxxxxxx>
- [PATCH v8 1/4] crypto: aria: add keystream array into request ctx
- From: Taehee Yoo <ap420073@xxxxxxxxx>
- [PATCH v8 0/4] crypto: aria: implement aria-avx2 and aria-avx512
- From: Taehee Yoo <ap420073@xxxxxxxxx>
- [PATCH v2 1/3] dt-bindings: crypto: sun8i-ce: Add compatible for D1
- From: Samuel Holland <samuel@xxxxxxxxxxxx>
- [PATCH v2 3/3] riscv: dts: allwinner: d1: Add crypto engine node
- From: Samuel Holland <samuel@xxxxxxxxxxxx>
- [PATCH v2 0/3] crypto: Allwinner D1 crypto support
- From: Samuel Holland <samuel@xxxxxxxxxxxx>
- [PATCH v2 2/3] crypto: sun8i-ce - Add TRNG clock to the D1 variant
- From: Samuel Holland <samuel@xxxxxxxxxxxx>
- RE: [PATCH] crypto: caam - Avoid GCC memset bug warning
- From: David Laight <David.Laight@xxxxxxxxxx>
- [PATCH v3 6/6] crypto/realtek: add devicetree documentation
- From: Markus Stockhausen <markus.stockhausen@xxxxxx>
- [PATCH v4 4/6] crypto/realtek: skcipher algorithms
- From: Markus Stockhausen <markus.stockhausen@xxxxxx>
- [PATCH v3 3/6] crypto/realtek: hash algorithms
- From: Markus Stockhausen <markus.stockhausen@xxxxxx>
- [PATCH v3 5/6] crypto/realtek: enable module
- From: Markus Stockhausen <markus.stockhausen@xxxxxx>
- [PATCH v3 2/6] crypto/realtek: core functions
- From: Markus Stockhausen <markus.stockhausen@xxxxxx>
- [PATCH v3 1/6] crypto/realtek: header definitions
- From: Markus Stockhausen <markus.stockhausen@xxxxxx>
- [PATCH v3 0/6] crypto/realtek: add new driver
- From: Markus Stockhausen <markus.stockhausen@xxxxxx>
- Re: [PATCH RFC v7 25/64] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC v7 37/64] KVM: SVM: Add KVM_SNP_INIT command
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] crypto: ccp: Improve sev_platform_init() error messages
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxxx>
- Re: [PATCH RFC v7 37/64] KVM: SVM: Add KVM_SNP_INIT command
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC v7 37/64] KVM: SVM: Add KVM_SNP_INIT command
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- RE: [PATCH v5 1/2] lib/mpi: Fix buffer overrun when SG is too long
- From: David Laight <David.Laight@xxxxxxxxxx>
- [patch] crypto: ccp - Avoid page allocation failure warning for SEV_GET_ID2
- From: David Rientjes <rientjes@xxxxxxxxxx>
- Re: [PATCH] crypto: ccp - Limit memory allocation in SEV_GET_ID2 ioctl
- From: David Rientjes <rientjes@xxxxxxxxxx>
- Re: [PATCH v5 1/2] lib/mpi: Fix buffer overrun when SG is too long
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH Part2 v6 07/49] x86/sev: Invalid pages from direct map when adding it to RMP table
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH] crypto: ux500: update debug config after ux500 cryp driver removal
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: arm64/sm4 - fix possible crash with CFI enabled
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: caam: blob_gen.c: fix CAAM io mem access
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] crypto: x86/ghash cleanups
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: wp512: disable kmsan checks in wp512_process_buffer()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: arm/ghash - implement fused AES/GHASH implementation of GCM
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] crypto: use kmap_local() not kmap_atomic()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: atmel: Add capability case for the 0x600 SHA and AES IP versions
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: arm/ghash - implement fused AES/GHASH implementation of GCM
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/6] crypto: Accelerated AES/GCM stitched implementation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH v5 1/2] lib/mpi: Fix buffer overrun when SG is too long
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH RFC v7 06/64] KVM: x86: Add platform hooks for private memory invalidations
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH RFC v7 05/64] KVM: x86: Add 'update_mem_attr' x86 op
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 3/3] crypto: x86/ghash - add comment and fix broken link
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 03/13] crypto: x86/sha - yield FPU context during long loops
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 07/13] crypto: x86/ghash - restructure FPU context saving
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/6] crypto/realtek: hash algorithms
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] crypto: tcrypt - suppress RCU stall warnings during speed tests
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/6] crypto/realtek: hash algorithms
- From: Markus Stockhausen <markus.stockhausen@xxxxxx>
- Re: [PATCH v4 1/4] crypto: aspeed: Add ACRY RSA driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: ccp - Allocate TEE ring and cmd buffer using DMA APIs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/6] crypto/realtek: hash algorithms
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: talitos - Remove GFP_DMA and add DMA alignment padding
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/6] crypto/realtek: add new driver
- From: Markus Stockhausen <markus.stockhausen@xxxxxx>
- [PATCH] crypto: caam - Remove GFP_DMA and add DMA alignment padding
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v5 1/2] lib/mpi: Fix buffer overrun when SG is too long
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 4/6] crypto: testmgr - disallow plain cbcmac(aes) in FIPS mode
- From: Vladis Dronov <vdronov@xxxxxxxxxx>
- [PATCH v3 6/6] crypto: testmgr - allow ecdsa-nist-p256 and -p384 in FIPS mode
- From: Vladis Dronov <vdronov@xxxxxxxxxx>
- [PATCH v3 5/6] crypto: testmgr - disallow plain ghash in FIPS mode
- From: Vladis Dronov <vdronov@xxxxxxxxxx>
- [PATCH v3 1/6] crypto: xts - restrict key lengths to approved values in FIPS mode
- From: Vladis Dronov <vdronov@xxxxxxxxxx>
- [PATCH v3 3/6] crypto: xts - drop redundant xts key check
- From: Vladis Dronov <vdronov@xxxxxxxxxx>
- [PATCH v3 0/6] Trivial set of FIPS 140-3 related changes
- From: Vladis Dronov <vdronov@xxxxxxxxxx>
- [PATCH v3 2/6] crypto: xts - drop xts_check_key()
- From: Vladis Dronov <vdronov@xxxxxxxxxx>
- Re: [PATCH v2 6/6] crypto: testmgr - allow ecdsa-nist-p256 and -p384 in FIPS mode
- From: Vladis Dronov <vdronov@xxxxxxxxxx>
- Re: [PATCH v2 6/6] crypto: testmgr - allow ecdsa-nist-p256 and -p384 in FIPS mode
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 0/6] Trivial set of FIPS 140-3 related changes
- From: Vladis Dronov <vdronov@xxxxxxxxxx>
- [PATCH v2 3/6] crypto: xts - drop redundant xts key check
- From: Vladis Dronov <vdronov@xxxxxxxxxx>
- [PATCH v2 4/6] crypto: testmgr - disallow plain cbcmac(aes) in FIPS mode
- From: Vladis Dronov <vdronov@xxxxxxxxxx>
- [PATCH v2 1/6] crypto: xts - restrict key lengths to approved values in FIPS mode
- From: Vladis Dronov <vdronov@xxxxxxxxxx>
- [PATCH v2 6/6] crypto: testmgr - allow ecdsa-nist-p256 and -p384 in FIPS mode
- From: Vladis Dronov <vdronov@xxxxxxxxxx>
- [PATCH v2 2/6] crypto: xts - drop xts_check_key()
- From: Vladis Dronov <vdronov@xxxxxxxxxx>
- [PATCH v2 5/6] crypto: testmgr - disallow plain ghash in FIPS mode
- From: Vladis Dronov <vdronov@xxxxxxxxxx>
- Re: [PATCH Part2 v6 07/49] x86/sev: Invalid pages from direct map when adding it to RMP table
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH RFC v7 04/64] KVM: x86: Add 'fault_is_private' x86 op
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC][PATCH 07/12] percpu: Wire up cmpxchg128
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- [PATCH] crypto: sun8i-ss - Remove GFP_DMA and add DMA alignment padding
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC][PATCH 04/12] types: Introduce [us]128
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH] crypto: caam - Avoid GCC memset bug warning
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 1/1] dma: qcom: bam_dma: Add support to initialize interconnect path
- From: Dmitry Baryshkov <dmitry.baryshkov@xxxxxxxxxx>
- Re: [PATCH] crypto: certs: fix FIPS selftest depenency
- From: Ben Boeckel <me@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - Avoid GCC memset bug warning
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [v2 PATCH] crypto: caam - Avoid GCC memset bug warning
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - Avoid GCC memset bug warning
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - Limit memory allocation in SEV_GET_ID2 ioctl
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: caam - Avoid GCC memset bug warning
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC][PATCH 09/12] x86,amd_iommu: Replace cmpxchg_double()
- From: Vasant Hegde <vasant.hegde@xxxxxxx>
- Re: [PATCH] crypto: caam - Prevent fortify error
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 0/3] hwrng: starfive - Add driver for TRNG module
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH v2 1/3] dt-bindings: rng: Add StarFive TRNG module
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH v2 2/3] hwrng: starfive - Add TRNG driver for StarFive SoC
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH v2 3/3] riscv: dts: starfive: Add TRNG node for VisionFive 2
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - Limit memory allocation in SEV_GET_ID2 ioctl
- From: David Rientjes <rientjes@xxxxxxxxxx>
- [PATCH 5/7] crypto: stm32/hash: Wait for idle before final CPU xmit
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- [PATCH 6/7] crypto: stm32/hash: Support Ux500 hash
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- [PATCH 7/7] crypto: ux500/hash - delete driver
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- [PATCH 4/7] crypto: stm32/hash: Make dma_mode a bool
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- [PATCH 2/7] crypto: stm32/hash: Simplify code
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- [PATCH 3/7] crypto: stm32/hash: Use existing busy poll function
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- [PATCH 1/7] dt-bindings: crypto: Let STM32 define Ux500 HASH
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- [PATCH 0/7] crypto: stm32 hash - reuse for Ux500
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- Re: [PATCH Part2 v6 07/49] x86/sev: Invalid pages from direct map when adding it to RMP table
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH] crypto: certs: fix FIPS selftest depenency
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v5 2/2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 0/2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 1/2] lib/mpi: Fix buffer overrun when SG is too long
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 2/2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 1/2] lib/mpi: Fix buffer overrun when SG is too long
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] MAINTAINERS: Update email of Tudor Ambarus
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxx>
- [PATCH v2] MAINTAINERS: Update email of Tudor Ambarus
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxx>
- Re: [PATCH RFC v7 00/64] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3 00/10] Add CA enforcement keyring restrictions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 00/10] Add CA enforcement keyring restrictions
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH] crypto: caam - Prevent fortify error
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v7 03/64] KVM: SVM: Advertise private memory support to KVM
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3 00/10] Add CA enforcement keyring restrictions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 00/10] Add CA enforcement keyring restrictions
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v2] crypto: ccp - Allocate TEE ring and cmd buffer using DMA APIs
- From: Rijo Thomas <Rijo-john.Thomas@xxxxxxx>
- Re: [PATCH RFC v7 11/64] KVM: SEV: Support private pages in LAUNCH_UPDATE_DATA
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH] crypto: caam - Prevent fortify error
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [v2 PATCH] lib/mpi: Fix buffer overrun when SG is too long
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] ARM: Reduce __thumb2__ definition to crypto files that require it
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- [PATCH] ARM: Reduce __thumb2__ definition to crypto files that require it
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH RFC v7 11/64] KVM: SEV: Support private pages in LAUNCH_UPDATE_DATA
- Re: [PATCH 2/6] crypto: xts - drop xts_check_key()
- From: Vladis Dronov <vdronov@xxxxxxxxxx>
- [PATCH] crypto: caam - Prevent fortify error
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [PATCH v3 00/10] Add CA enforcement keyring restrictions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 00/10] Add CA enforcement keyring restrictions
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH RFC v7 62/64] x86/sev: Add KVM commands for instance certs
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- Re: [RFC][PATCH 05/12] arch: Introduce arch_{,try_}_cmpxchg128{,_local}()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH RFC v7 02/64] KVM: x86: Add KVM_CAP_UNMAPPED_PRIVATE_MEMORY
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH RFC v7 01/64] KVM: Fix memslot boundary condition for large page
- From: Borislav Petkov <bp@xxxxxxxxx>
- RE: [PATCH 2/3] hwrng: starfive - Add TRNG driver for StarFive SoC
- From: JiaJie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] hwrng: starfive - Add TRNG driver for StarFive SoC
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- RE: [PATCH 2/3] hwrng: starfive - Add TRNG driver for StarFive SoC
- From: JiaJie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- RE: [PATCH 1/3] dt-bindings: rng: Add StarFive TRNG module
- From: JiaJie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- RE: [PATCH 3/3] riscv: dts: starfive: Add TRNG node for VisionFive 2
- From: JiaJie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- Re: [RFC][PATCH 05/12] arch: Introduce arch_{,try_}_cmpxchg128{,_local}()
- From: Boqun Feng <boqun.feng@xxxxxxxxx>
- Re: [RFC][PATCH 00/12] Introduce cmpxchg128() -- aka. the demise of cmpxchg_double()
- From: Boqun Feng <boqun.feng@xxxxxxxxx>
- Re: [PATCH 2/6] crypto: xts - drop xts_check_key()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v13 7/7] x86: vdso: Wire up getrandom() vDSO implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 0/4] Trivial set of FIPS 140-3 related changes
- From: Vladis Dronov <vdronov@xxxxxxxxxx>
- [PATCH 6/6] crypto: testmgr - allow ecdsa-nist-p256 and -p384 in FIPS mode
- From: Vladis Dronov <vdronov@xxxxxxxxxx>
- [PATCH 5/6] crypto: testmgr - disallow plain ghash in FIPS mode
- From: Vladis Dronov <vdronov@xxxxxxxxxx>
- [PATCH 4/6] crypto: testmgr - disallow plain cbcmac(aes) in FIPS mode
- From: Vladis Dronov <vdronov@xxxxxxxxxx>
- [PATCH 3/6] crypto: xts - drop redundant xts key check
- From: Vladis Dronov <vdronov@xxxxxxxxxx>
- [PATCH 2/6] crypto: xts - drop xts_check_key()
- From: Vladis Dronov <vdronov@xxxxxxxxxx>
- [PATCH 1/6] crypto: xts - restrict key lengths to approved values in FIPS mode
- From: Vladis Dronov <vdronov@xxxxxxxxxx>
- [PATCH 0/6] Trivial set of FIPS 140-3 related changes
- From: Vladis Dronov <vdronov@xxxxxxxxxx>
- Re: [PATCH v13 6/7] random: introduce generic vDSO getrandom() implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [v2 PATCH] lib/mpi: Fix buffer overrun when SG is too long
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v3 2/2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v12 0/6] implement getrandom() in vDSO
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 0/4] Trivial set of FIPS 140-3 related changes
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v3 00/10] Add CA enforcement keyring restrictions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] rcu: print first CPU on expedited stall line
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH 1/3] rcu: genericize RCU stall suppression functions
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH v3 00/10] Add CA enforcement keyring restrictions
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH 6/6] crypto: xts - drop redundant xts key check
- From: Vladis Dronov <vdronov@xxxxxxxxxx>
- [PATCH 5/6] crypto: xts - drop xts_check_key()
- From: Vladis Dronov <vdronov@xxxxxxxxxx>
- Re: [PATCH 0/4] Trivial set of FIPS 140-3 related changes
- From: Vladis Dronov <vdronov@xxxxxxxxxx>
- Re: [PATCH v12 0/6] implement getrandom() in vDSO
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v13 7/7] x86: vdso: Wire up getrandom() vDSO implementation
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v13 6/7] random: introduce generic vDSO getrandom() implementation
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v13 5/7] arch: allocate vgetrandom_alloc() syscall number
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v13 4/7] random: add vgetrandom_alloc() syscall
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v13 3/7] x86: mm: Skip faulting instruction for VM_DROPPABLE faults
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v13 2/7] mm: add VM_DROPPABLE for designating always lazily freeable mappings
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v13 1/7] x86: lib: Separate instruction decoder MMIO type from MMIO trace
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v13 0/7] implement getrandom() in vDSO
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v12 0/6] implement getrandom() in vDSO
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v3 2/2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 1/2] lib/mpi: Fix buffer overrun when SG is too long
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] hwrng: starfive - Add TRNG driver for StarFive SoC
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH 3/3] riscv: dts: starfive: Add TRNG node for VisionFive 2
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH 1/3] dt-bindings: rng: Add StarFive TRNG module
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- [PATCH 3/3] riscv: dts: starfive: Add TRNG node for VisionFive 2
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH 2/3] hwrng: starfive - Add TRNG driver for StarFive SoC
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH 0/3] hwrng: starfive - Add driver for TRNG module
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH 1/3] dt-bindings: rng: Add StarFive TRNG module
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH] crypto: arm64/sm4 - fix possible crash with CFI enabled
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [v2 PATCH] crypto: lib/blake2s - Split up test function to halve stack usage
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [v2 PATCH] lib/mpi: Fix buffer overrun when SG is too long
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: lib/blake2s - Split up test function to halve stack usage
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] lib/mpi: Fix buffer overrun when SG is too long
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v12 0/6] implement getrandom() in vDSO
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 00/13] crypto: x86 - yield FPU context during long loops
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v12 0/6] implement getrandom() in vDSO
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [RFC][PATCH 05/12] arch: Introduce arch_{,try_}_cmpxchg128{,_local}()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [RFC][PATCH 05/12] arch: Introduce arch_{,try_}_cmpxchg128{,_local}()
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC v7 40/64] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC][PATCH 05/12] arch: Introduce arch_{,try_}_cmpxchg128{,_local}()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH] lib/mpi: Fix buffer overrun when SG is too long
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ux500: update debug config after ux500 cryp driver removal
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- Re: [PATCH 3/3] crypto: x86/ghash - add comment and fix broken link
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] crypto: x86/ghash cleanups
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v2] crypto: caam: blob_gen.c: fix CAAM io mem access
- From: Nikolaus Voss <nikolaus.voss@xxxxxxxxxxxxxxx>
- [PATCH] crypto: ux500: update debug config after ux500 cryp driver removal
- From: Lukas Bulwahn <lukas.bulwahn@xxxxxxxxx>
- [PATCH] lib/mpi: Fix buffer overrun when SG is too long
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] sched/isolation: Add HK_TYPE_WQ to isolcpus=domain
- From: Leonardo Brás <leobras@xxxxxxxxxx>
- Re: [PATCH v2 8/8] crypto: x86/chacha - add kernel-doc comments to assembly
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 6/8] crypto: x86/ghash - add kernel-doc comments to assembly
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC][PATCH 03/12] cyrpto/b128ops: Remove struct u128
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC][PATCH 02/12] crypto/ghash-clmulni: Use (struct) be128
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 2/3] crypto: x86/ghash - use le128 instead of u128
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 3/3] crypto: x86/ghash - add comment and fix broken link
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 1/3] crypto: x86/ghash - fix unaligned access in ghash_setkey()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 0/3] crypto: x86/ghash cleanups
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC][PATCH 01/12] crypto: Remove u128 usage
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [RFC][PATCH 01/12] crypto: Remove u128 usage
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 03/13] crypto: x86/sha - yield FPU context during long loops
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] crypto: tcrypt - yield at end of test
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] crypto: aead/shash - yield at end of operations
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: skcipher - always yield at end of walk
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC][PATCH 01/12] crypto: Remove u128 usage
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH AUTOSEL 5.15 1/9] crypto: hisilicon/hpre - fix resource leak in remove process
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.0 04/16] crypto: hisilicon/qm - increase the memory of local variables
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.0 01/16] crypto: hisilicon/hpre - fix resource leak in remove process
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.1 04/16] crypto: hisilicon/qm - increase the memory of local variables
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.1 01/16] crypto: hisilicon/hpre - fix resource leak in remove process
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH RFC v7 40/64] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- [PATCH 01/13] x86: protect simd.h header file
- From: Robert Elliott <elliott@xxxxxxx>
- [PATCH 06/13] crypto: x86/ghash - use u8 rather than char
- From: Robert Elliott <elliott@xxxxxxx>
- [PATCH 00/13] crypto: x86 - yield FPU context during long loops
- From: Robert Elliott <elliott@xxxxxxx>
- [PATCH 07/13] crypto: x86/ghash - restructure FPU context saving
- From: Robert Elliott <elliott@xxxxxxx>
- [PATCH 12/13] crypto: x86/chacha - yield FPU context only when needed
- From: Robert Elliott <elliott@xxxxxxx>
- [PATCH 11/13] crypto: x86/blake - yield FPU context only when needed
- From: Robert Elliott <elliott@xxxxxxx>
- [PATCH 02/13] x86: add yield FPU context utility function
- From: Robert Elliott <elliott@xxxxxxx>
- [PATCH 13/13] crypto: x86/aria - yield FPU context only when needed
- From: Robert Elliott <elliott@xxxxxxx>
- [PATCH 04/13] crypto: x86/crc - yield FPU context during long loops
- From: Robert Elliott <elliott@xxxxxxx>
- [PATCH 08/13] crypto: x86/ghash - yield FPU context during long loops
- From: Robert Elliott <elliott@xxxxxxx>
- [PATCH 10/13] crypto: x86/aegis - yield FPU context during long loops
- From: Robert Elliott <elliott@xxxxxxx>
- [PATCH 09/13] crypto: x86/poly - yield FPU context only when needed
- From: Robert Elliott <elliott@xxxxxxx>
- [PATCH 03/13] crypto: x86/sha - yield FPU context during long loops
- From: Robert Elliott <elliott@xxxxxxx>
- [PATCH 05/13] crypto: x86/sm3 - yield FPU context during long loops
- From: Robert Elliott <elliott@xxxxxxx>
- [PATCH 0/3] crypto: yield at end of operations
- From: Robert Elliott <elliott@xxxxxxx>
- [PATCH 3/3] crypto: tcrypt - yield at end of test
- From: Robert Elliott <elliott@xxxxxxx>
- [PATCH 2/3] crypto: aead/shash - yield at end of operations
- From: Robert Elliott <elliott@xxxxxxx>
- [PATCH 1/3] crypto: skcipher - always yield at end of walk
- From: Robert Elliott <elliott@xxxxxxx>
- [PATCH 1/3] rcu: genericize RCU stall suppression functions
- From: Robert Elliott <elliott@xxxxxxx>
- [PATCH 3/3] crypto: tcrypt - suppress RCU stall warnings during speed tests
- From: Robert Elliott <elliott@xxxxxxx>
- [PATCH 2/3] rcu: print first CPU on expedited stall line
- From: Robert Elliott <elliott@xxxxxxx>
- [PATCH 0/3] crypto/rcu: suppress unnecessary CPU stall warnings
- From: Robert Elliott <elliott@xxxxxxx>
- Re: [PATCH Part2 v6 07/49] x86/sev: Invalid pages from direct map when adding it to RMP table
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC][PATCH 05/12] arch: Introduce arch_{,try_}_cmpxchg128{,_local}()
- From: Boqun Feng <boqun.feng@xxxxxxxxx>
- [PATCH v2 8/8] crypto: x86/chacha - add kernel-doc comments to assembly
- From: Robert Elliott <elliott@xxxxxxx>
- [PATCH v2 7/8] crypto: x86/blake2s - add kernel-doc comments to assembly
- From: Robert Elliott <elliott@xxxxxxx>
- [PATCH v2 6/8] crypto: x86/ghash - add kernel-doc comments to assembly
- From: Robert Elliott <elliott@xxxxxxx>
- [PATCH v2 2/8] doc: support kernel-doc for asm functions
- From: Robert Elliott <elliott@xxxxxxx>
- [PATCH v2 5/8] crypto: x86/sm3 - add kernel-doc comments to assembly
- From: Robert Elliott <elliott@xxxxxxx>
- [PATCH v2 4/8] crypto: x86/crc - add kernel-doc comments to assembly
- From: Robert Elliott <elliott@xxxxxxx>
- [PATCH v2 3/8] crypto: x86/sha - add kernel-doc comments to assembly
- From: Robert Elliott <elliott@xxxxxxx>
- [PATCH v2 1/8] crypto: clean up kernel-doc headers
- From: Robert Elliott <elliott@xxxxxxx>
- [PATCH v2 0/8] crypto: kernel-doc for assembly language
- From: Robert Elliott <elliott@xxxxxxx>
- Re: [PATCH RFC v7 40/64] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC][PATCH 01/12] crypto: Remove u128 usage
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [RFC][PATCH 01/12] crypto: Remove u128 usage
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [RFC][PATCH 09/12] x86,amd_iommu: Replace cmpxchg_double()
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- Re: [RFC][PATCH 01/12] crypto: Remove u128 usage
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [RFC][PATCH 07/12] percpu: Wire up cmpxchg128
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [RFC][PATCH 11/12] slub: Replace cmpxchg_double()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [RFC][PATCH 12/12] arch: Remove cmpxchg_double
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [RFC][PATCH 05/12] arch: Introduce arch_{,try_}_cmpxchg128{,_local}()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [RFC][PATCH 01/12] crypto: Remove u128 usage
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [RFC][PATCH 03/12] cyrpto/b128ops: Remove struct u128
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [RFC][PATCH 10/12] x86,intel_iommu: Replace cmpxchg_double()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [RFC][PATCH 06/12] instrumentation: Wire up cmpxchg128()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [RFC][PATCH 08/12] s390: Replace cmpxchg_double() with cmpxchg128()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [RFC][PATCH 09/12] x86,amd_iommu: Replace cmpxchg_double()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [RFC][PATCH 02/12] crypto/ghash-clmulni: Use (struct) be128
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [RFC][PATCH 00/12] Introduce cmpxchg128() -- aka. the demise of cmpxchg_double()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [RFC][PATCH 04/12] types: Introduce [us]128
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH Part2 v6 07/49] x86/sev: Invalid pages from direct map when adding it to RMP table
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Announce loop-AES-v3.7z file/swap crypto package
- From: Jari Ruusu <jariruusu@xxxxxxxxxxxxxx>
- Re: [PATCH v3 00/10] Add CA enforcement keyring restrictions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/4] sched/isolation: Improve documentation
- From: Leonardo Brás <leobras@xxxxxxxxxx>
- RE: [PATCH v4 10/24] crypto: x86/poly - limit FPU preemption
- From: "Elliott, Robert (Servers)" <elliott@xxxxxxx>
- Re: [PATCH] crypto: wp512: disable kmsan checks in wp512_process_buffer()
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH v2] crypto: ccp - Allocate TEE ring and cmd buffer using DMA APIs
- From: Alex Deucher <alexdeucher@xxxxxxxxx>
- Re: [PATCH] crypto: wp512: disable kmsan checks in wp512_process_buffer()
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- Re: [PATCH v3 00/10] Add CA enforcement keyring restrictions
- From: Coiby Xu <coxu@xxxxxxxxxx>
- Re: [PATCH v3 00/10] Add CA enforcement keyring restrictions
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v3 00/10] Add CA enforcement keyring restrictions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 00/10] Add CA enforcement keyring restrictions
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v3 00/10] Add CA enforcement keyring restrictions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] crypto: certs: fix FIPS selftest depenency
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH] crypto: wp512: disable kmsan checks in wp512_process_buffer()
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCH v3 00/10] Add CA enforcement keyring restrictions
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v2] crypto: ccp - Allocate TEE ring and cmd buffer using DMA APIs
- From: Jeremi Piotrowski <jpiotrowski@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] ARM: permit non-nested kernel mode NEON in softirq context
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v3 04/10] KEYS: X.509: Parse Key Usage
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 3/8] crypto: x86/sha - add kernel-doc comments to assembly
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v3 03/10] KEYS: X.509: Parse Basic Constraints for CA
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] ARM: permit non-nested kernel mode NEON in softirq context
- From: "Russell King (Oracle)" <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] ARM: permit non-nested kernel mode NEON in softirq context
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 3/8] crypto: x86/sha - add kernel-doc comments to assembly
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 2/2] ARM: permit non-nested kernel mode NEON in softirq context
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- Re: [PATCH v2 1/2] ARM: vfp: Manipulate VFP state with softirqs disabled
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- Re: [PATCH v3 07/10] KEYS: X.509: Flag Intermediate CA certs as endorsed
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 00/10] Add CA enforcement keyring restrictions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - Limit memory allocation in SEV_GET_ID2 ioctl
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3/8] crypto: x86/sha - add kernel-doc comments to assembly
- From: Robert Elliott <elliott@xxxxxxx>
- [PATCH 7/8] crypto: x86/blake2s - add kernel-doc comments to assembly
- From: Robert Elliott <elliott@xxxxxxx>
- [PATCH 6/8] crypto: x86/ghash - add kernel-doc comments to assembly
- From: Robert Elliott <elliott@xxxxxxx>
- [PATCH 4/8] crypto: x86/crc - add kernel-doc comments to assembly
- From: Robert Elliott <elliott@xxxxxxx>
- [PATCH 8/8] crypto: x86/chacha - add kernel-doc comments to assembly
- From: Robert Elliott <elliott@xxxxxxx>
- [PATCH 5/8] crypto: x86/sm3 - add kernel-doc comments to assembly
- From: Robert Elliott <elliott@xxxxxxx>
- [PATCH 2/8] doc: support kernel-doc for asm functions
- From: Robert Elliott <elliott@xxxxxxx>
- [PATCH 1/8] crypto: clean up kernel-doc headers
- From: Robert Elliott <elliott@xxxxxxx>
- [PATCH 0/8] crypto: kernel-doc for assembly language
- From: Robert Elliott <elliott@xxxxxxx>
- Re: [PATCH RFC v7 21/64] x86/fault: fix handle_split_page_fault() to work with memfd backed pages
- From: Hugh Dickins <hughd@xxxxxxxxxx>
- Re: [GIT PULL] Crypto Update for 6.2
- From: pr-tracker-bot@xxxxxxxxxx
- [PATCH] crypto: ccp - Limit memory allocation in SEV_GET_ID2 ioctl
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- [PATCH RFC v7 08/64] KVM: Move kvm_for_each_memslot_in_hva_range() to be used in SVM
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 07/64] KVM: SEV: Handle KVM_HC_MAP_GPA_RANGE hypercall
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 06/64] KVM: x86: Add platform hooks for private memory invalidations
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 64/64] iommu/amd: Add IOMMU_SNP_SHUTDOWN support
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 63/64] x86/sev: Document KVM_SEV_SNP_{G,S}ET_CERTS
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 62/64] x86/sev: Add KVM commands for instance certs
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 61/64] KVM: SVM: Make VMSAVE target area memory allocation SNP safe
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 05/64] KVM: x86: Add 'update_mem_attr' x86 op
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 60/64] KVM: SVM: Sync the GHCB scratch buffer using already mapped ghcb
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 59/64] ccp: Add support to decrypt the page
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 55/64] KVM: SVM: Add SNP-specific handling for memory attribute updates
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 57/64] KVM: SEV: Handle restricted memory invalidations for SNP
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 58/64] KVM: SVM: Add module parameter to enable the SEV-SNP
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 56/64] KVM: x86/mmu: Generate KVM_EXIT_MEMORY_FAULT for implicit conversions for SNP
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 54/64] KVM: SVM: Support SEV-SNP AP Creation NAE event
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 53/64] KVM: SVM: Use a VMSA physical address variable for populating VMCB
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 04/64] KVM: x86: Add 'fault_is_private' x86 op
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 52/64] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 50/64] KVM: x86: Export the kvm_zap_gfn_range() for the SNP use
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 51/64] KVM: SVM: Add support to handle the RMP nested page fault
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 49/64] KVM: SVM: Introduce ops for the post gfn map and unmap
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 47/64] KVM: SVM: Add support to handle MSR based Page State Change VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 46/64] KVM: SVM: Add KVM_EXIT_VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 48/64] KVM: SVM: Add support to handle Page State Change VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 45/64] KVM: SVM: Add support to handle GHCB GPA register VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 44/64] KVM: SVM: Remove the long-lived GHCB host map
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 43/64] KVM: SVM: Do not use long-lived GHCB map while setting scratch area
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 42/64] KVM: x86: Define RMP page fault error bits for #NPF
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 41/64] KVM: X86: Keep the NPT and RMP page level in sync
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 03/64] KVM: SVM: Advertise private memory support to KVM
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 40/64] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 39/64] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_UPDATE command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 38/64] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_START command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 37/64] KVM: SVM: Add KVM_SNP_INIT command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 36/64] KVM: SVM: Add initial SEV-SNP support
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 34/64] KVM: SVM: Provide the Hypervisor Feature support VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 35/64] KVM: SVM: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 33/64] KVM: SVM: Add support to handle AP reset MSR protocol
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 30/64] crypto: ccp: Add the SNP_PLATFORM_STATUS command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 29/64] crypto: ccp: Handle the legacy SEV command when SNP is enabled
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 32/64] crypto: ccp: Provide APIs to query extended attestation report
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 02/64] KVM: x86: Add KVM_CAP_UNMAPPED_PRIVATE_MEMORY
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 31/64] crypto: ccp: Add the SNP_{SET,GET}_EXT_CONFIG command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 28/64] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 27/64] crypto: ccp: Introduce snp leaked pages list
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 23/64] x86/fault: Add support to dump RMP entry on fault
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 25/64] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 26/64] crypto:ccp: Provide API to issue SEV and SNP commands
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 24/64] crypto:ccp: Define the SEV-SNP commands
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 22/64] x86/fault: Return pfn from dump_pagetable() for SEV-specific fault handling.
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 21/64] x86/fault: fix handle_split_page_fault() to work with memfd backed pages
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 20/64] x86/fault: Add support to handle the RMP fault for user address
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 01/64] KVM: Fix memslot boundary condition for large page
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 19/64] x86/traps: Define RMP violation #PF error code
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 18/64] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 17/64] x86/mm/pat: Introduce set_memory_p
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 15/64] x86/sev: Add RMP entry lookup helpers
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 16/64] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 14/64] x86/sev: Add the host SEV-SNP initialization support
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 13/64] x86/cpufeatures: Add SEV-SNP CPU feature
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 12/64] KVM: SEV: Implement .fault_is_private callback
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 11/64] KVM: SEV: Support private pages in LAUNCH_UPDATE_DATA
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 10/64] KVM: SEV: Populate private memory fd during LAUNCH_UPDATE_DATA
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 00/64] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 09/64] KVM: Add HVA range operator
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v2 4/4] crypto: aead - fix inaccurate documentation
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 2/4] crypto: arm64/gcm - add RFC4106 support
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 1/4] crypto: arm/ghash - implement fused AES/GHASH version of AES-GCM
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 3/4] crypto: tcrypt - include larger key sizes in RFC4106 benchmark
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 0/4] crypto: Accelerated GCM for IPSec on ARM/arm64
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [GIT PULL] Crypto Update for 6.2
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 2/4] ARM: dts: aspeed: Add ACRY/AHBC device controller node
- From: Neal Liu <neal_liu@xxxxxxxxxxxxxx>
- [PATCH v4 0/4] Add Aspeed ACRY driver for hardware acceleration
- From: Neal Liu <neal_liu@xxxxxxxxxxxxxx>
- [PATCH v4 1/4] crypto: aspeed: Add ACRY RSA driver
- From: Neal Liu <neal_liu@xxxxxxxxxxxxxx>
- [PATCH v4 3/4] dt-bindings: crypto: add documentation for Aspeed ACRY
- From: Neal Liu <neal_liu@xxxxxxxxxxxxxx>
- [PATCH v4 4/4] dt-bindings: bus: add documentation for Aspeed AHBC
- From: Neal Liu <neal_liu@xxxxxxxxxxxxxx>
- Re: [PATCH v3 0/2] Fix lack of section mismatch warnings with LTO
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- [PATCH v3 08/10] integrity: Use root of trust signature restriction
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 06/10] KEYS: Introduce keyring restriction that validates ca trust
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 09/10] KEYS: CA link restriction
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 10/10] integrity: restrict INTEGRITY_KEYRING_MACHINE to restrict_link_by_ca
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 03/10] KEYS: X.509: Parse Basic Constraints for CA
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 02/10] KEYS: Add missing function documentation
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 05/10] KEYS: Introduce a CA endorsed flag
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 07/10] KEYS: X.509: Flag Intermediate CA certs as endorsed
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 00/10] Add CA enforcement keyring restrictions
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 04/10] KEYS: X.509: Parse Key Usage
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 01/10] KEYS: Create static version of public_key_verify_signature
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [RFC PATCH] crypto: use kmap_local() not kmap_atomic()
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH] crypto: use kmap_local() not kmap_atomic()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: arm/sha1 - Fix clang function cast warnings
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 1/2] padata: Mark padata_work_init() as __ref
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- [PATCH v3 0/2] Fix lack of section mismatch warnings with LTO
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH v2 0/2] ARM: allow kernel mode NEON in softirq context
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 1/2] padata: Mark padata_work_init() as __ref
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- [RFC PATCH] crypto: use kmap_local() not kmap_atomic()
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- RE: [PATCH] crypto: arm/sha1 - Fix clang function cast warnings
- From: "Elliott, Robert (Servers)" <elliott@xxxxxxx>
- Re: [PATCH] crypto: arm/sha1 - Fix clang function cast warnings
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2] crypto: ccp - Allocate TEE ring and cmd buffer using DMA APIs
- From: Rijo Thomas <Rijo-john.Thomas@xxxxxxx>
- Re: [PATCH 1/1] crypto: ccp - Allocate TEE ring and cmd buffer using DMA APIs
- From: Rijo Thomas <Rijo-john.Thomas@xxxxxxx>
- [PATCH] crypto: arm/sha1 - Fix clang function cast warnings
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH 0/6] crypto: starfive: Add driver for cryptographic engine
- From: JiaJie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- RE: [PATCH 0/6] crypto: starfive: Add driver for cryptographic engine
- From: Palmer Dabbelt <palmer@xxxxxxxxxxx>
- Re: [PATCH v2 00/10] Add CA enforcement keyring restrictions
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v2 00/10] Add CA enforcement keyring restrictions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH RFC v12 2/6] x86: mm: Skip faulting instruction for VM_DROPPABLE faults
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v2 1/2] padata: Mark padata_work_init() as __ref
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH v2 1/2] padata: Mark padata_work_init() as __ref
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH v12 3/6] random: add vgetrandom_alloc() syscall
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v12 4/6] arch: allocate vgetrandom_alloc() syscall number
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v12 6/6] x86: vdso: Wire up getrandom() vDSO implementation
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v12 5/6] random: introduce generic vDSO getrandom() implementation
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH RFC v12 2/6] x86: mm: Skip faulting instruction for VM_DROPPABLE faults
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v12 0/6] implement getrandom() in vDSO
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH RFC v12 1/6] mm: add VM_DROPPABLE for designating always lazily freeable mappings
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH] crypto: arm/ghash - implement fused AES/GHASH implementation of GCM
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 1/2] padata: Mark padata_work_init() as __ref
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: (subset) [PATCH 000/606] i2c: Complete conversion to i2c_probe_new
- From: Robert Foss <robert.foss@xxxxxxxxxx>
- Re: [PATCH 1/1] crypto: ccp - Allocate TEE ring and cmd buffer using DMA APIs
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v2 0/2] ARM: allow kernel mode NEON in softirq context
- From: Martin Willi <martin@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] padata: Mark padata_work_init() as __ref
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH v10 28/33] arm64: dts: rockchip: rk3399: add crypto node
- From: Corentin LABBE <clabbe@xxxxxxxxxxxx>
- Re: [PATCH 1/1] crypto: ccp - Allocate TEE ring and cmd buffer using DMA APIs
- From: Rijo Thomas <Rijo-john.Thomas@xxxxxxx>
- Re: [PATCH v2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 28/33] arm64: dts: rockchip: rk3399: add crypto node
- From: Rob Herring <robh+dt@xxxxxxxxxx>
- [PATCH] crypto: lib/blake2s - Split up test function to halve stack usage
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 3/3] crypto: hisilicon/qm - define the device isolation strategy
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 3/4] crypto: aria: implement aria-avx2
- From: Taehee Yoo <ap420073@xxxxxxxxx>
- Re: [PATCH v3] char: tpm: Protect tpm_pm_suspend with locks
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- RE: [PATCH v4 10/24] crypto: x86/poly - limit FPU preemption
- From: "Elliott, Robert (Servers)" <elliott@xxxxxxx>
- Re: [PATCH 1/1] crypto: ccp - Allocate TEE ring and cmd buffer using DMA APIs
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- RE: [PATCH v7 3/4] crypto: aria: implement aria-avx2
- From: "Elliott, Robert (Servers)" <elliott@xxxxxxx>
- Re: [PATCH v2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 00/10] Add CA enforcement keyring restrictions
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v10 0/3] crypto: hisilicon - supports device isolation feature
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: asymmetric: Make a copy of sig and digest in vmalloced stack
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: asymmetric: Make a copy of sig and digest in vmalloced stack
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: (subset) [PATCH 000/606] i2c: Complete conversion to i2c_probe_new
- From: Robert Foss <robert.foss@xxxxxxxxxx>
- Re: [PATCH v3 0/4] crypto: stm32 - reuse for Ux500
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] hwrng: Fix PCI device refcount leak
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: img-hash - Fix variable dereferenced before check 'hdev->req'
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] crypto: arm64 - use frame_push/pop macros
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 00/12] crypto: qat - enable compression deflate algorithm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/10] Add CA enforcement keyring restrictions
- From: Coiby Xu <coxu@xxxxxxxxxx>
- Re: [PATCH v10 0/3] crypto: hisilicon - supports device isolation feature
- From: "yekai (A)" <yekai13@xxxxxxxxxx>
- Re: [PATCH] KEYS: asymmetric: Make a copy of sig and digest in vmalloced stack
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v3 5/5] lib/cpumask: reorganize cpumask_local_spread() logic
- From: Peter Lafreniere <peter@xxxxxxxx>
- Re: [PATCH v3 0/5] cpumask: improve on cpumask_local_spread() locality
- From: Yury Norov <yury.norov@xxxxxxxxx>
- Re: [PATCH v3 5/5] lib/cpumask: reorganize cpumask_local_spread() logic
- From: Yury Norov <yury.norov@xxxxxxxxx>
- Re: [PATCH v3 0/5] cpumask: improve on cpumask_local_spread() locality
- From: Tariq Toukan <ttoukan.linux@xxxxxxxxx>
- Re: [PATCH v3 5/5] lib/cpumask: reorganize cpumask_local_spread() logic
- From: Peter Lafreniere <peter@xxxxxxxx>
- Re: [PATCH v3 0/5] cpumask: improve on cpumask_local_spread() locality
- From: Jacob Keller <jacob.e.keller@xxxxxxxxx>
- [PATCH v3 5/5] lib/cpumask: reorganize cpumask_local_spread() logic
- From: Yury Norov <yury.norov@xxxxxxxxx>
- [PATCH v3 4/5] cpumask: improve on cpumask_local_spread() locality
- From: Yury Norov <yury.norov@xxxxxxxxx>
- [PATCH v3 3/5] sched: add sched_numa_find_nth_cpu()
- From: Yury Norov <yury.norov@xxxxxxxxx>
- [PATCH v3 2/5] cpumask: introduce cpumask_nth_and_andnot
- From: Yury Norov <yury.norov@xxxxxxxxx>
- [PATCH v3 1/5] lib/find: introduce find_nth_and_andnot_bit
- From: Yury Norov <yury.norov@xxxxxxxxx>
- [PATCH v3 0/5] cpumask: improve on cpumask_local_spread() locality
- From: Yury Norov <yury.norov@xxxxxxxxx>
- Re: arch/arm/crypto/sha1_glue.c:34:8: warning: cast from 'void (*)(u32 *, const unsigned char *, unsigned int)' (aka 'void (*)(unsigned int *, const unsigned char *, unsigned int)') to 'sha1_block_fn *' (aka 'void (*)(struct sha1_state *, const unsigned char ...
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] KEYS: asymmetric: Make a copy of sig and digest in vmalloced stack
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [REGESSION] Bug 216502 - slow crng initialization on Rockchip 3399 (Friendyarm NanoPi M4) #forregzbot
- From: Thorsten Leemhuis <regressions@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam: blob_gen.c: fix CAAM io mem access
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: atmel: Add capability case for the 0x600 SHA and AES IP versions
- From: Nicolas Ferre <nicolas.ferre@xxxxxxxxxxxxx>
- Re: [PATCH v3] char: tpm: Protect tpm_pm_suspend with locks
- From: Vlastimil Babka <vbabka@xxxxxxx>
- RE: [PATCH 0/6] crypto: starfive: Add driver for cryptographic engine
- From: JiaJie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- Re: [PATCH 0/6] crypto: starfive: Add driver for cryptographic engine
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH v3] char: tpm: Protect tpm_pm_suspend with locks
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- RE: [PATCH 0/6] crypto: starfive: Add driver for cryptographic engine
- From: JiaJie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- Re: lib/crypto/blake2s-selftest.c:632:1: warning: the frame size of 1120 bytes is larger than 1024 bytes
- From: "Chen, Rong A" <rong.a.chen@xxxxxxxxx>
- Re: [PATCH v2 02/10] KEYS: Add missing function documentation
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: arch/arm/crypto/sha1_glue.c:34:8: warning: cast from 'void (*)(u32 *, const unsigned char *, unsigned int)' (aka 'void (*)(unsigned int *, const unsigned char *, unsigned int)') to 'sha1_block_fn *' (aka 'void (*)(struct sha1_state *, const unsigned char ...
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: lib/crypto/blake2s-selftest.c:632:1: warning: the frame size of 1120 bytes is larger than 1024 bytes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] sched: add sched_numa_find_nth_cpu()
- From: Yury Norov <yury.norov@xxxxxxxxx>
- Re: [PATCH v2 0/4] cpumask: improve on cpumask_local_spread() locality
- From: Yury Norov <yury.norov@xxxxxxxxx>
- Re: [PATCH v2 1/2] padata: Mark padata_work_init() as __ref
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH v2 1/2] padata: Mark padata_work_init() as __ref
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- [PATCH v2 0/2] Fix lack of section mismatch warnings with LTO
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH 1/2] padata: Do not mark padata_mt_helper() as __init
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH v2 01/10] KEYS: Create static version of public_key_verify_signature
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v2 08/10] integrity: Use root of trust signature restriction
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v2 10/10] integrity: restrict INTEGRITY_KEYRING_MACHINE to restrict_link_by_ca
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v2 03/10] KEYS: X.509: Parse Basic Constraints for CA
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v2 07/10] KEYS: X.509: Flag Intermediate CA certs as endorsed
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v2 09/10] KEYS: CA link restriction
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v2 01/10] KEYS: Create static version of public_key_verify_signature
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v2 04/10] KEYS: X.509: Parse Key Usage
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v2 00/10] Add CA enforcement keyring restrictions
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v2 06/10] KEYS: Introduce keyring restriction that validates ca trust
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v2 05/10] KEYS: Introduce a CA endorsed flag
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v2 02/10] KEYS: Add missing function documentation
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH] crypto: atmel: Add capability case for the 0x600 SHA and AES IP versions
- From: Sergiu Moga <sergiu.moga@xxxxxxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]