Linux Crypto
Thread Index
[
Prev Page
][
Next Page
]
Re: [RFC v1 1/2] crypto: tcrypt: minimal conversion to run under KUnit
From
: David Gow <davidgow@xxxxxxxxxx>
Re: [PATCH v1 0/5] PCI: Drop duplicated tracking of a pci_dev's bound driver
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [RESEND] crypto: atmel-aes: use swap()
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: ecc: handle unaligned input buffer in ecc_swap_digits
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] padata: Convert from atomic_t to refcount_t on parallel_data->refcnt
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: sun8i-ss - Use kfree_sensitive
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v3 0/4] Introduce x86 assembler accelerated implementation for SM4 algorithm
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 0/9] crypto: atmel-{aes, tdes}: Fix corner cases - crypto self tests
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [RFC v1 1/2] crypto: tcrypt: minimal conversion to run under KUnit
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] KEYS: trusted: fix use as module when CONFIG_TCG_TPM=m
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH 10/12] dt-bindings: watchdog: Add compatible for Mediatek MT7986
From
: Rob Herring <robh@xxxxxxxxxx>
Re: [PATCH 08/12] dt-bindings: rng: mediatek: add mt7986 to mtk rng binding
From
: Rob Herring <robh@xxxxxxxxxx>
Re: [PATCH 07/12] dt-bindings: arm64: dts: mediatek: Add mt7986 series
From
: Rob Herring <robh@xxxxxxxxxx>
Re: [PATCH 05/12] dt-bindings: pinctrl: update bindings for MT7986 SoC
From
: Rob Herring <robh@xxxxxxxxxx>
Re: [PATCH 02/12] clk: mediatek: add mt7986 clock IDs
From
: Rob Herring <robh@xxxxxxxxxx>
[PATCH v1 4/5] PCI: Adapt all code locations to not use struct pci_dev::driver directly
From
: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
[PATCH v1 0/5] PCI: Drop duplicated tracking of a pci_dev's bound driver
From
: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
Re: [PATCH v3 01/17] dt-bindings: qcom-bam: Convert binding to YAML
From
: Rob Herring <robh@xxxxxxxxxx>
Re: [RFC PATCH v1] fscrypt: support encrypted and trusted keys
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: Extending CRYPTO_ALG_OPTIONAL_KEY for cipher algorithms
From
: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
Re: [RFC PATCH v1] fscrypt: support encrypted and trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [RFC PATCH v1] fscrypt: support encrypted and trusted keys
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [PATCH v2] KEYS: trusted: fix use as module when CONFIG_TCG_TPM=m
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [RFC PATCH v1] fscrypt: support encrypted and trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [RFC PATCH v1] fscrypt: support encrypted and trusted keys
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v2] KEYS: trusted: fix use as module when CONFIG_TCG_TPM=m
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH] crypto: ccp: shutdown SEV firmware on kexec
From
: Tom Lendacky <thomas.lendacky@xxxxxxx>
Re: [PATCH 04/12] pinctrl: mediatek: moore: use pin number in mtk_pin_desc instead of array index
From
: Sean Wang <sean.wang@xxxxxxxxxx>
Re: [RFC PATCH v1] fscrypt: support encrypted and trusted keys
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH] crypto: ccp: shutdown SEV firmware on kexec
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [RFC PATCH v1] fscrypt: support encrypted and trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [RFC] tcp: Initial support for RFC5925 auth option
From
: Leonard Crestez <cdleonard@xxxxxxxxx>
Re: [RFC] tcp: Initial support for RFC5925 auth option
From
: Francesco Ruggeri <fruggeri@xxxxxxxxxx>
Re: [RFC] tcp: Initial support for RFC5925 auth option
From
: Leonard Crestez <cdleonard@xxxxxxxxx>
Re: [RFC PATCH v1] fscrypt: support encrypted and trusted keys
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[RFC PATCH v1] fscrypt: support encrypted and trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
[PATCH 5/6] crypto: omap-sham - drop suspend and resume functions
From
: Tony Lindgren <tony@xxxxxxxxxxx>
[PATCH 4/6] crypto: omap-sham - drop old hw_init and unused FLAGS_INIT
From
: Tony Lindgren <tony@xxxxxxxxxxx>
[PATCH 6/6] crypto: omap-sham - drop pm_runtime_irqsafe() usage
From
: Tony Lindgren <tony@xxxxxxxxxxx>
[PATCH 2/6] crypto: omap-sham - initialize req only after omap_sham_hw_init()
From
: Tony Lindgren <tony@xxxxxxxxxxx>
[PATCH 3/6] crypto: omap-sham - add missing pm_runtime_dontuse_autosuspend()
From
: Tony Lindgren <tony@xxxxxxxxxxx>
[PATCH 1/6] crypto: omap-sham - clear dma flags only after omap_sham_update_dma_stop()
From
: Tony Lindgren <tony@xxxxxxxxxxx>
Re: [PATCH v2] crypto: ccm - avoid negative wrapping of integers
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] crypto: ccm - avoid negative wrapping of integers
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] KEYS: trusted: fix use as module when CONFIG_TCG_TPM=m
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [RFC] tcp: Initial support for RFC5925 auth option
From
: Francesco Ruggeri <fruggeri@xxxxxxxxxx>
Re: [PATCH v2] KEYS: trusted: fix use as module when CONFIG_TCG_TPM=m
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v3 2/2] hwrng: Add Arm SMCCC TRNG based driver
From
: Mark Brown <broonie@xxxxxxxxxx>
Re: [PATCH v3 2/2] hwrng: Add Arm SMCCC TRNG based driver
From
: Andre Przywara <andre.przywara@xxxxxxx>
Re: [PATCH v3 2/2] hwrng: Add Arm SMCCC TRNG based driver
From
: Mark Brown <broonie@xxxxxxxxxx>
[PATCH v3 2/2] hwrng: Add Arm SMCCC TRNG based driver
From
: Andre Przywara <andre.przywara@xxxxxxx>
[PATCH v3 1/2] firmware: smccc: Register smccc_trng platform device
From
: Andre Przywara <andre.przywara@xxxxxxx>
[PATCH v3 0/2] hwrng: Add Arm SMCCC TRNG based driver
From
: Andre Przywara <andre.przywara@xxxxxxx>
Re: [PATCH v2] crypto: ccm - avoid negative wrapping of integers
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH RFC v2 06/12] integrity: accessor function to get trust_moklist
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH RFC v2 08/12] integrity: Suppress error message for keys added to the mok keyring
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH RFC v2 09/12] KEYS: add a reference to mok keyring
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH RFC v2 02/12] KEYS: CA link restriction
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH RFC v2 01/12] integrity: Introduce a Linux keyring for the Machine Owner Key (MOK)
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH RFC v2 00/12] Enroll kernel keys thru MOK
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH RFC v2 05/12] integrity: restrict INTEGRITY_KEYRING_MOK to restrict_link_by_system_trusted_or_ca
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH RFC v2 12/12] integrity: store reference to mok keyring
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH RFC v2 10/12] KEYS: link system_trusted_keys to mok_trusted_keys
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH RFC v2 11/12] integrity: Do not allow mok keyring updates following init
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH RFC v2 07/12] integrity: add new keyring handler for mok keys
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH RFC v2 03/12] integrity: Trust MOK keys if MokListTrustedRT found
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH RFC v2 04/12] integrity: add add_to_mok_keyring
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v2] crypto: ccm - avoid negative wrapping of integers
From
: Jordy Zomer <jordy@xxxxxxxxxxxxxxxxxxxx>
[PATCH] crypto: avoid negative wrapping of integers
From
: Jordy Zomer <jordy@xxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v4] crypto: sun8i-ss: fix multiple memory leaks in sun8i_ss_hash_run
From
: Dongliang Mu <mudongliangabcd@xxxxxxxxx>
[PATCH] crypto: sun8i-ce: fix multiple memory leaks in sun8i_ce_hash_run
From
: Dongliang Mu <mudongliangabcd@xxxxxxxxx>
[PATCH v4] crypto: sun8i-ss: fix multiple memory leaks in sun8i_ss_hash_run
From
: Dongliang Mu <mudongliangabcd@xxxxxxxxx>
[PATCH v3] crypto: sun8i-ce: fix memory leak and return value of sun8i_ce_hash_run
From
: Dongliang Mu <mudongliangabcd@xxxxxxxxx>
Re: [PATCH 01/12] dt-bindings: clock: mediatek: document clk bindings for mediatek mt7986 SoC
From
: Chen-Yu Tsai <wenst@xxxxxxxxxxxx>
Re: [PATCH v2] crypto: sun8i-ce: fix memory leak and return value of sun8i_ce_hash_run
From
: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
[PATCH v2] crypto: sun8i-ce: fix memory leak and return value of sun8i_ce_hash_run
From
: Dongliang Mu <mudongliangabcd@xxxxxxxxx>
[PATCH 12/12] arm64: dts: mediatek: add mt7986b support
From
: Sam Shih <sam.shih@xxxxxxxxxxxx>
[PATCH 11/12] arm64: dts: mediatek: add mt7986a support
From
: Sam Shih <sam.shih@xxxxxxxxxxxx>
[PATCH 10/12] dt-bindings: watchdog: Add compatible for Mediatek MT7986
From
: Sam Shih <sam.shih@xxxxxxxxxxxx>
[PATCH 09/12] dt-bindings: serial: Add compatible for Mediatek MT7986
From
: Sam Shih <sam.shih@xxxxxxxxxxxx>
[PATCH 08/12] dt-bindings: rng: mediatek: add mt7986 to mtk rng binding
From
: Sam Shih <sam.shih@xxxxxxxxxxxx>
[PATCH 07/12] dt-bindings: arm64: dts: mediatek: Add mt7986 series
From
: Sam Shih <sam.shih@xxxxxxxxxxxx>
[PATCH 06/12] pinctrl: mediatek: add support for MT7986 SoC
From
: Sam Shih <sam.shih@xxxxxxxxxxxx>
[PATCH 05/12] dt-bindings: pinctrl: update bindings for MT7986 SoC
From
: Sam Shih <sam.shih@xxxxxxxxxxxx>
[PATCH 04/12] pinctrl: mediatek: moore: use pin number in mtk_pin_desc instead of array index
From
: Sam Shih <sam.shih@xxxxxxxxxxxx>
[PATCH 03/12] clk: mediatek: add mt7986 clock support
From
: Sam Shih <sam.shih@xxxxxxxxxxxx>
[PATCH 02/12] clk: mediatek: add mt7986 clock IDs
From
: Sam Shih <sam.shih@xxxxxxxxxxxx>
[PATCH 01/12] dt-bindings: clock: mediatek: document clk bindings for mediatek mt7986 SoC
From
: Sam Shih <sam.shih@xxxxxxxxxxxx>
[PATCH 00/12] Add basic SoC support for mediatek mt7986
From
: Sam Shih <sam.shih@xxxxxxxxxxxx>
Re: [PATCH] crypto: sun8i-ce: fix memory leak and return value of sun8i_ce_hash_run
From
: Dongliang Mu <mudongliangabcd@xxxxxxxxx>
Re: [PATCH] crypto: sun8i-ce: fix memory leak and return value of sun8i_ce_hash_run
From
: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
[PATCH] crypto: sun8i-ce: fix memory leak and return value of sun8i_ce_hash_run
From
: Dongliang Mu <mudongliangabcd@xxxxxxxxx>
Re: [RFC PATCH 00/11] nvme: In-band authentication support
From
: Hannes Reinecke <hare@xxxxxxx>
Re: Extending CRYPTO_ALG_OPTIONAL_KEY for cipher algorithms
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: [RFC PATCH 00/11] nvme: In-band authentication support
From
: Vladislav Bolkhovitin <vst@xxxxxxxx>
Re: [PATCH 09/11] nvmet: Implement basic In-Band Authentication
From
: Vladislav Bolkhovitin <vst@xxxxxxxx>
Re: [RFC v1 1/2] crypto: tcrypt: minimal conversion to run under KUnit
From
: Daniel Latypov <dlatypov@xxxxxxxxxx>
Re: Extending CRYPTO_ALG_OPTIONAL_KEY for cipher algorithms
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Extending CRYPTO_ALG_OPTIONAL_KEY for cipher algorithms
From
: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
Re: [RESEND] gpu: ipu-v3: use swap()
From
: Nicolas Ferre <nicolas.ferre@xxxxxxxxxxxxx>
Re: [PATCH] crypto: x86/aes-ni - add missing error checks in XTS code
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [RFC v1 1/2] crypto: tcrypt: minimal conversion to run under KUnit
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [RESEND] crypto: atmel-aes: use swap()
From
: <Tudor.Ambarus@xxxxxxxxxxxxx>
Re: [RESEND] crypto: atmel-aes: use swap()
From
: <Tudor.Ambarus@xxxxxxxxxxxxx>
[RESEND] crypto: atmel-aes: use swap()
From
: Salah Triki <salah.triki@xxxxxxxxx>
[RESEND] gpu: ipu-v3: use swap()
From
: Salah Triki <salah.triki@xxxxxxxxx>
Re: [PATCH 2/4] KEYS: trusted: allow trust sources to use kernel RNG for key material
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [PATCH 1/4] KEYS: trusted: allow users to use kernel RNG for key material
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [PATCH v2] KEYS: trusted: fix use as module when CONFIG_TCG_TPM=m
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [PATCH v2] KEYS: trusted: fix use as module when CONFIG_TCG_TPM=m
From
: Andreas Rammhold <andreas@xxxxxxxxxxx>
Re: [PATCH Part2 RFC v4 37/40] KVM: SVM: Add support to handle the RMP nested page fault
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 40/40] KVM: SVM: Support SEV-SNP AP Creation NAE event
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 26/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
From
: Marc Orr <marcorr@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 40/40] KVM: SVM: Support SEV-SNP AP Creation NAE event
From
: Tom Lendacky <thomas.lendacky@xxxxxxx>
Re: [PATCH 2/3] KEYS: trusted: Introduce support for NXP DCP-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH v2 6/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
[PATCH 2/4] KEYS: trusted: allow trust sources to use kernel RNG for key material
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
[PATCH 4/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
[PATCH 1/4] KEYS: trusted: allow users to use kernel RNG for key material
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
[PATCH 3/4] crypto: caam - add in-kernel interface for blob generator
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
[PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH Part2 RFC v4 39/40] KVM: SVM: Use a VMSA physical address variable for populating VMCB
From
: Tom Lendacky <thomas.lendacky@xxxxxxx>
[PATCH v2] KEYS: trusted: fix use as module when CONFIG_TCG_TPM=m
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH 06/11] nvme: Implement In-Band authentication
From
: Vladislav Bolkhovitin <vst@xxxxxxxx>
Re: [RFC PATCH 00/11] nvme: In-band authentication support
From
: Vladislav Bolkhovitin <vst@xxxxxxxx>
Re: [PATCH] crypto: ecc: handle unaligned input buffer in ecc_swap_digits
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v2] hwrng: Add Arm SMCCC TRNG based driver
From
: Mark Brown <broonie@xxxxxxxxxx>
[PATCH] crypto: ecc: handle unaligned input buffer in ecc_swap_digits
From
: Mian Yousaf Kaukab <ykaukab@xxxxxxx>
Re: [PATCH 06/11] nvme: Implement In-Band authentication
From
: Hannes Reinecke <hare@xxxxxxx>
Re: [PATCH 06/11] nvme: Implement In-Band authentication
From
: Hannes Reinecke <hare@xxxxxxx>
Re: [RFC PATCH 00/11] nvme: In-band authentication support
From
: Hannes Reinecke <hare@xxxxxxx>
Re: [PATCH Part2 RFC v4 39/40] KVM: SVM: Use a VMSA physical address variable for populating VMCB
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 40/40] KVM: SVM: Support SEV-SNP AP Creation NAE event
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 37/40] KVM: SVM: Add support to handle the RMP nested page fault
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH v2] hwrng: Add Arm SMCCC TRNG based driver
From
: Andre Przywara <andre.przywara@xxxxxxx>
Re: [PATCH Part2 RFC v4 05/40] x86/sev: Add RMP entry lookup helpers
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 37/40] KVM: SVM: Add support to handle the RMP nested page fault
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 38/40] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH v2] hwrng: Add Arm SMCCC TRNG based driver
From
: Benjamin Herrenschmidt <benh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH Part2 RFC v4 05/40] x86/sev: Add RMP entry lookup helpers
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH v2 6/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Richard Weinberger <richard.weinberger@xxxxxxxxx>
Re: [PATCH 05/11] nvme: add definitions for NVMe In-Band authentication
From
: Vladislav Bolkhovitin <vst@xxxxxxxx>
Re: [PATCH 06/11] nvme: Implement In-Band authentication
From
: Vladislav Bolkhovitin <vst@xxxxxxxx>
Re: [PATCH 06/11] nvme: Implement In-Band authentication
From
: Vladislav Bolkhovitin <vst@xxxxxxxx>
Re: [RFC PATCH 00/11] nvme: In-band authentication support
From
: Vladislav Bolkhovitin <vst@xxxxxxxx>
Re: [PATCH v2 6/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH Part2 RFC v4 27/40] KVM: X86: Add kvm_x86_ops to get the max page level for the TDP
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 27/40] KVM: X86: Add kvm_x86_ops to get the max page level for the TDP
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH v2 6/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Richard Weinberger <richard.weinberger@xxxxxxxxx>
Re: [PATCH Part2 RFC v4 25/40] KVM: SVM: Reclaim the guest pages when SEV-SNP VM terminates
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 38/40] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 20/40] KVM: SVM: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 37/40] KVM: SVM: Add support to handle the RMP nested page fault
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 25/40] KVM: SVM: Reclaim the guest pages when SEV-SNP VM terminates
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 38/40] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH v2] hwrng: Add Arm SMCCC TRNG based driver
From
: Andre Przywara <andre.przywara@xxxxxxx>
Re: [PATCH v2] hwrng: Add Arm SMCCC TRNG based driver
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 35/40] KVM: Add arch hooks to track the host write to guest memory
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v2] hwrng: Add Arm SMCCC TRNG based driver
From
: Andre Przywara <andre.przywara@xxxxxxx>
[PATCH] padata: Convert from atomic_t to refcount_t on parallel_data->refcnt
From
: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
Re: [PATCH 09/11] nvmet: Implement basic In-Band Authentication
From
: Simo Sorce <simo@xxxxxxxxxx>
Re: [PATCH 09/11] nvmet: Implement basic In-Band Authentication
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 38/40] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH 07/11] nvme-auth: augmented challenge support
From
: Hannes Reinecke <hare@xxxxxxx>
[PATCH] crypto: sun8i-ss - Use kfree_sensitive
From
: Jason Wang <wangborong@xxxxxxxxxx>
Re: [PATCH 09/11] nvmet: Implement basic In-Band Authentication
From
: Hannes Reinecke <hare@xxxxxxx>
Re: [PATCH 09/11] nvmet: Implement basic In-Band Authentication
From
: Simo Sorce <simo@xxxxxxxxxx>
Re: [PATCH 09/11] nvmet: Implement basic In-Band Authentication
From
: Hannes Reinecke <hare@xxxxxxx>
[PATCH 8/9] crypto: atmel-aes: Add fallback to XTS software implementation
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
[PATCH 0/9] crypto: atmel-{aes, tdes}: Fix corner cases - crypto self tests
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
[PATCH 4/9] crypto: atmel-aes: Add XTS input length constraint
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
[PATCH 2/9] crypto: atmel-tdes: Handle error messages
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
[PATCH 5/9] crypto: atmel-aes: Add NIST 800-38A's zero length cryptlen constraint
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
[PATCH 7/9] crypto: atmel-{aes, tdes}: Set OFB's blocksize to 1
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
[PATCH 9/9] crypto: atmel-aes: Allocate aes dev at tfm init time
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
[PATCH 6/9] crypto: atmel-tdes: Add FIPS81's zero length cryptlen constraint
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
[PATCH 3/9] crypto: atmel-aes: Add blocksize constraint for ECB and CBC modes
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
[PATCH 1/9] crypto: atmel-tdes: Clarify how tdes dev gets allocated to the tfm
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
Re: [PATCH 09/11] nvmet: Implement basic In-Band Authentication
From
: Hannes Reinecke <hare@xxxxxxx>
[PATCH v3 1/4] crypto: sm4 - create SM4 library based on sm4 generic code
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
[PATCH v3 2/4] crypto: arm64/sm4-ce - Make dependent on sm4 library instead of sm4-generic
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
[PATCH v3 3/4] crypto: x86/sm4 - add AES-NI/AVX/x86_64 implementation
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
[PATCH v3 0/4] Introduce x86 assembler accelerated implementation for SM4 algorithm
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
[PATCH v3 4/4] crypto: tcrypt - add the asynchronous speed test for SM4
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
Re: [PATCH Part2 RFC v4 35/40] KVM: Add arch hooks to track the host write to guest memory
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 37/40] KVM: SVM: Add support to handle the RMP nested page fault
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 38/40] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH] padata: Convert from atomic_t to refcount_t on parallel_data->refcnt
From
: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
Re: [RFC] tcp: Initial support for RFC5925 auth option
From
: David Ahern <dsahern@xxxxxxxxx>
Re: [RFC] tcp: Initial support for RFC5925 auth option
From
: Leonard Crestez <cdleonard@xxxxxxxxx>
Re: [PATCH Part2 RFC v4 24/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_UPDATE command
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 24/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_UPDATE command
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH v2 0/2] crypto: mxs_dcp: Fix an Oops on i.MX6ULL
From
: Richard Weinberger <richard@xxxxxx>
Re: [PATCH Part2 RFC v4 24/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_UPDATE command
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH 09/11] nvmet: Implement basic In-Band Authentication
From
: Sagi Grimberg <sagi@xxxxxxxxxxx>
Re: [PATCH Part2 RFC v4 22/40] KVM: SVM: Add KVM_SNP_INIT command
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 26/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 32/40] KVM: SVM: Add support to handle GHCB GPA register VMGEXIT
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 26/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 25/40] KVM: SVM: Reclaim the guest pages when SEV-SNP VM terminates
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 33/40] KVM: SVM: Add support to handle MSR based Page State Change VMGEXIT
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 25/40] KVM: SVM: Reclaim the guest pages when SEV-SNP VM terminates
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 26/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 25/40] KVM: SVM: Reclaim the guest pages when SEV-SNP VM terminates
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 33/40] KVM: SVM: Add support to handle MSR based Page State Change VMGEXIT
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 25/40] KVM: SVM: Reclaim the guest pages when SEV-SNP VM terminates
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 26/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 25/40] KVM: SVM: Reclaim the guest pages when SEV-SNP VM terminates
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH] replace if with min
From
: Segher Boessenkool <segher@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH Part2 RFC v4 26/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH] replace if with min
From
: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
Re: [RFC] tcp: Initial support for RFC5925 auth option
From
: Kuniyuki Iwashima <kuniyu@xxxxxxxxxxxx>
Re: [PATCH Part2 RFC v4 34/40] KVM: SVM: Add support to handle Page State Change VMGEXIT
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 33/40] KVM: SVM: Add support to handle MSR based Page State Change VMGEXIT
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 25/40] KVM: SVM: Reclaim the guest pages when SEV-SNP VM terminates
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH 09/11] nvmet: Implement basic In-Band Authentication
From
: Hannes Reinecke <hare@xxxxxxx>
Re: [PATCH 09/11] nvmet: Implement basic In-Band Authentication
From
: Stephan Mueller <smueller@xxxxxxxxxx>
[RFC] tcp: Initial support for RFC5925 auth option
From
: Leonard Crestez <cdleonard@xxxxxxxxx>
Re: [RFC PATCH 00/11] nvme: In-band authentication support
From
: Hannes Reinecke <hare@xxxxxxx>
Re: [PATCH 09/11] nvmet: Implement basic In-Band Authentication
From
: Hannes Reinecke <hare@xxxxxxx>
Re: [PATCH 09/11] nvmet: Implement basic In-Band Authentication
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [RFC PATCH 00/11] nvme: In-band authentication support
From
: Simo Sorce <simo@xxxxxxxxxx>
Re: [PATCH 09/11] nvmet: Implement basic In-Band Authentication
From
: Hannes Reinecke <hare@xxxxxxx>
Re: [PATCH 11/11] nvme: add non-standard ECDH and curve25517 algorithms
From
: Hannes Reinecke <hare@xxxxxxx>
Re: [PATCH 09/11] nvmet: Implement basic In-Band Authentication
From
: Hannes Reinecke <hare@xxxxxxx>
Re: [PATCH v2 1/6] KEYS: trusted: allow use of TEE as backend without TCG_TPM support
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH 11/11] nvme: add non-standard ECDH and curve25517 algorithms
From
: Sagi Grimberg <sagi@xxxxxxxxxxx>
Re: [PATCH 08/11] nvmet: Parse fabrics commands on all queues
From
: Sagi Grimberg <sagi@xxxxxxxxxxx>
Re: [PATCH 07/11] nvme-auth: augmented challenge support
From
: Sagi Grimberg <sagi@xxxxxxxxxxx>
Re: [PATCH 06/11] nvme: Implement In-Band authentication
From
: Sagi Grimberg <sagi@xxxxxxxxxxx>
Re: [PATCH 09/11] nvmet: Implement basic In-Band Authentication
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [PATCH v2 1/6] KEYS: trusted: allow use of TEE as backend without TCG_TPM support
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [PATCH] crypto: x86/aes-ni - add missing error checks in XTS code
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 4/6 v2] MOST: cdev: rename 'mod_init' & 'mod_exit' functions to be module-specific
From
: <Christian.Gromm@xxxxxxxxxxxxx>
Re: [PATCH 5/6 v2] net: hdlc: rename 'mod_init' & 'mod_exit' functions to be module-specific
From
: Krzysztof Hałasa <khalasa@xxxxxxx>
Re: linux-next: Fixes tag needs some work in the crypto tree
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: linux-next: Fixes tag needs some work in the crypto tree
From
: Stephan Mueller <smueller@xxxxxxxxxx>
linux-next: Fixes tag needs some work in the crypto tree
From
: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
Re: [PATCH 09/11] nvmet: Implement basic In-Band Authentication
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 07/11] nvme-auth: augmented challenge support
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: [PATCH 09/11] nvmet: Implement basic In-Band Authentication
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: [PATCH 06/11] nvme: Implement In-Band authentication
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: [PATCH 11/11] nvme: add non-standard ECDH and curve25517 algorithms
From
: Hannes Reinecke <hare@xxxxxxx>
Re: [PATCH 06/11] nvme: Implement In-Band authentication
From
: Hannes Reinecke <hare@xxxxxxx>
Re: [PATCH 09/11] nvmet: Implement basic In-Band Authentication
From
: Hannes Reinecke <hare@xxxxxxx>
Re: [PATCH 07/11] nvme-auth: augmented challenge support
From
: Hannes Reinecke <hare@xxxxxxx>
Re: [PATCH 10/11] nvmet-auth: implement support for augmented challenge
From
: Hannes Reinecke <hare@xxxxxxx>
Re: [PATCH 03/11] crypto/ffdhe: Finite Field DH Ephemeral Parameters
From
: Hannes Reinecke <hare@xxxxxxx>
Re: [PATCH 06/11] nvme: Implement In-Band authentication
From
: Hannes Reinecke <hare@xxxxxxx>
Re: [PATCH 4/4] dt-bindings: Remove PicoXcell bindings
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
Re: [PATCH 11/11] nvme: add non-standard ECDH and curve25517 algorithms
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: [PATCH 06/11] nvme: Implement In-Band authentication
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: [PATCH 09/11] nvmet: Implement basic In-Band Authentication
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: [PATCH 07/11] nvme-auth: augmented challenge support
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: [PATCH 10/11] nvmet-auth: implement support for augmented challenge
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: [PATCH 03/11] crypto/ffdhe: Finite Field DH Ephemeral Parameters
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: [PATCH 04/11] lib/base64: RFC4648-compliant base64 encoding
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH 04/11] lib/base64: RFC4648-compliant base64 encoding
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH 05/11] nvme: add definitions for NVMe In-Band authentication
From
: Hannes Reinecke <hare@xxxxxxx>
Re: [PATCH 04/11] lib/base64: RFC4648-compliant base64 encoding
From
: Hannes Reinecke <hare@xxxxxxx>
Re: [PATCH 03/11] crypto/ffdhe: Finite Field DH Ephemeral Parameters
From
: Hannes Reinecke <hare@xxxxxxx>
Re: [PATCH 06/11] nvme: Implement In-Band authentication
From
: Sagi Grimberg <sagi@xxxxxxxxxxx>
Re: [PATCH 05/11] nvme: add definitions for NVMe In-Band authentication
From
: Sagi Grimberg <sagi@xxxxxxxxxxx>
Re: [PATCH 04/11] lib/base64: RFC4648-compliant base64 encoding
From
: Sagi Grimberg <sagi@xxxxxxxxxxx>
Re: [PATCH 03/11] crypto/ffdhe: Finite Field DH Ephemeral Parameters
From
: Sagi Grimberg <sagi@xxxxxxxxxxx>
Re: [PATCH 02/11] crypto: add crypto_has_kpp()
From
: Sagi Grimberg <sagi@xxxxxxxxxxx>
Re: [PATCH 01/11] crypto: add crypto_has_shash()
From
: Sagi Grimberg <sagi@xxxxxxxxxxx>
Re: [RFC PATCH 00/11] nvme: In-band authentication support
From
: Sagi Grimberg <sagi@xxxxxxxxxxx>
Re: [PATCH Part2 RFC v4 25/40] KVM: SVM: Reclaim the guest pages when SEV-SNP VM terminates
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 32/40] KVM: SVM: Add support to handle GHCB GPA register VMGEXIT
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 31/40] KVM: X86: update page-fault trace to log the 64-bit error code
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 30/40] KVM: X86: Define new RMP check related #NPF error bits
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH] crypto: x86/aes-ni - add missing error checks in XTS code
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 26/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 25/40] KVM: SVM: Reclaim the guest pages when SEV-SNP VM terminates
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 24/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_UPDATE command
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 23/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_START command
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 22/40] KVM: SVM: Add KVM_SNP_INIT command
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 34/40] KVM: SVM: Add support to handle Page State Change VMGEXIT
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 21/40] KVM: SVM: Add initial SEV-SNP support
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 33/40] KVM: SVM: Add support to handle MSR based Page State Change VMGEXIT
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 32/40] KVM: SVM: Add support to handle GHCB GPA register VMGEXIT
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 27/40] KVM: X86: Add kvm_x86_ops to get the max page level for the TDP
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 31/40] KVM: X86: update page-fault trace to log the 64-bit error code
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 30/40] KVM: X86: Define new RMP check related #NPF error bits
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 26/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 25/40] KVM: SVM: Reclaim the guest pages when SEV-SNP VM terminates
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 24/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_UPDATE command
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 23/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_START command
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 22/40] KVM: SVM: Add KVM_SNP_INIT command
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 21/40] KVM: SVM: Add initial SEV-SNP support
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 27/40] KVM: X86: Add kvm_x86_ops to get the max page level for the TDP
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 21/40] KVM: SVM: Add initial SEV-SNP support
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 28/40] KVM: X86: Introduce kvm_mmu_map_tdp_page() for use by SEV
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 21/40] KVM: SVM: Add initial SEV-SNP support
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 05/40] x86/sev: Add RMP entry lookup helpers
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH] crypto: x86/aes-ni - add missing error checks in XTS code
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 15/40] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 15/40] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 15/40] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH 10/11] nvmet-auth: implement support for augmented challenge
From
: Hannes Reinecke <hare@xxxxxxx>
[PATCH 07/11] nvme-auth: augmented challenge support
From
: Hannes Reinecke <hare@xxxxxxx>
[PATCH 11/11] nvme: add non-standard ECDH and curve25517 algorithms
From
: Hannes Reinecke <hare@xxxxxxx>
[PATCH 09/11] nvmet: Implement basic In-Band Authentication
From
: Hannes Reinecke <hare@xxxxxxx>
[PATCH 06/11] nvme: Implement In-Band authentication
From
: Hannes Reinecke <hare@xxxxxxx>
[PATCH 05/11] nvme: add definitions for NVMe In-Band authentication
From
: Hannes Reinecke <hare@xxxxxxx>
[PATCH 01/11] crypto: add crypto_has_shash()
From
: Hannes Reinecke <hare@xxxxxxx>
[PATCH 03/11] crypto/ffdhe: Finite Field DH Ephemeral Parameters
From
: Hannes Reinecke <hare@xxxxxxx>
[PATCH 08/11] nvmet: Parse fabrics commands on all queues
From
: Hannes Reinecke <hare@xxxxxxx>
[PATCH 04/11] lib/base64: RFC4648-compliant base64 encoding
From
: Hannes Reinecke <hare@xxxxxxx>
[RFC PATCH 00/11] nvme: In-band authentication support
From
: Hannes Reinecke <hare@xxxxxxx>
[PATCH 02/11] crypto: add crypto_has_kpp()
From
: Hannes Reinecke <hare@xxxxxxx>
Re: [PATCH v2 2/4] crypto: arm64/sm4-ce - Make dependent on sm4 library instead of sm4-generic
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
Re: [PATCH 0/6 v2] treewide: rename 'mod_init' & 'mod_exit' functions to be module-specific
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 0/2] crypto: mxs_dcp: Fix an Oops on i.MX6ULL
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: DRBG - select SHA512
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 2/4] crypto: arm64/sm4-ce - Make dependent on sm4 library instead of sm4-generic
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: crypto: prefix additional module autoloading with "crypto-"
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: sun8i-ss - Use kfree_sensitive
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: fix flexible_array.cocci warnings
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH Part2 RFC v4 15/40] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 07/40] x86/sev: Split the physmap when adding the page in RMP table
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 07/40] x86/sev: Split the physmap when adding the page in RMP table
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 10/40] x86/fault: Add support to handle the RMP fault for user address
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
[RFC v1 2/2] crypto: tcrypt: call KUNIT_FAIL() instead of pr_err()
From
: Daniel Latypov <dlatypov@xxxxxxxxxx>
[RFC v1 1/2] crypto: tcrypt: minimal conversion to run under KUnit
From
: Daniel Latypov <dlatypov@xxxxxxxxxx>
[RFC v1 0/2] crypto: tcrypt: small changes to run under KUnit
From
: Daniel Latypov <dlatypov@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 06/40] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 07/40] x86/sev: Split the physmap when adding the page in RMP table
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 05/40] x86/sev: Add RMP entry lookup helpers
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 08/40] x86/traps: Define RMP violation #PF error code
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH Part2 RFC v4 08/40] x86/traps: Define RMP violation #PF error code
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 06/40] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH Part2 RFC v4 06/40] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 07/40] x86/sev: Split the physmap when adding the page in RMP table
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 05/40] x86/sev: Add RMP entry lookup helpers
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 07/40] x86/sev: Split the physmap when adding the page in RMP table
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 07/40] x86/sev: Split the physmap when adding the page in RMP table
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 07/40] x86/sev: Split the physmap when adding the page in RMP table
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 01/40] KVM: SVM: Add support to handle AP reset MSR protocol
From
: Tom Lendacky <thomas.lendacky@xxxxxxx>
Re: [PATCH Part2 RFC v4 01/40] KVM: SVM: Add support to handle AP reset MSR protocol
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH v2 0/2] crypto: mxs_dcp: Fix an Oops on i.MX6ULL
From
: Sean Anderson <sean.anderson@xxxxxxxx>
Re: [PATCH Part2 RFC v4 01/40] KVM: SVM: Add support to handle AP reset MSR protocol
From
: Tom Lendacky <thomas.lendacky@xxxxxxx>
Re: [PATCH Part2 RFC v4 01/40] KVM: SVM: Add support to handle AP reset MSR protocol
From
: Joerg Roedel <jroedel@xxxxxxx>
Re: [PATCH v41 01/13] Linux Random Number Generator
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: [PATCH v41 01/13] Linux Random Number Generator
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH Part2 RFC v4 07/40] x86/sev: Split the physmap when adding the page in RMP table
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 04/40] x86/sev: Add the host SEV-SNP initialization support
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 04/40] x86/sev: Add the host SEV-SNP initialization support
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 04/40] x86/sev: Add the host SEV-SNP initialization support
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 04/40] x86/sev: Add the host SEV-SNP initialization support
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 02/40] KVM: SVM: Provide the Hypervisor Feature support VMGEXIT
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 02/40] KVM: SVM: Provide the Hypervisor Feature support VMGEXIT
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 01/40] KVM: SVM: Add support to handle AP reset MSR protocol
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 15/40] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
From
: Marc Orr <marcorr@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 20/40] KVM: SVM: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 15/40] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 20/40] KVM: SVM: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
From
: Marc Orr <marcorr@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 15/40] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
From
: Marc Orr <marcorr@xxxxxxxxxx>
Re: [PATCH v41 00/13] /dev/random - a new approach
From
: Alexander Lobakin <alobakin@xxxxx>
Re: [PATCH 1/3] crypto: mxs-dcp: Add support for hardware provided keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH 2/3] KEYS: trusted: Introduce support for NXP DCP-based trusted keys
From
: Richard Weinberger <richard@xxxxxx>
Re: [PATCH 1/3] crypto: mxs-dcp: Add support for hardware provided keys
From
: Richard Weinberger <richard@xxxxxx>
Re: [PATCH 3/3] doc: trusted-encrypted: add DCP as new trust source
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH 2/3] KEYS: trusted: Introduce support for NXP DCP-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH 1/3] crypto: mxs-dcp: Add support for hardware provided keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH v2 0/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
[PATCH v41 01/13] Linux Random Number Generator
From
: Stephan Müller <smueller@xxxxxxxxxx>
[PATCH v41 04/13] LRNG - add switchable DRNG support
From
: Stephan Müller <smueller@xxxxxxxxxx>
[PATCH v41 10/13] LRNG - add Jitter RNG fast noise source
From
: Stephan Müller <smueller@xxxxxxxxxx>
[PATCH v41 02/13] LRNG - allocate one DRNG instance per NUMA node
From
: Stephan Müller <smueller@xxxxxxxxxx>
[PATCH v41 12/13] LRNG - add interface for gathering of raw entropy
From
: Stephan Müller <smueller@xxxxxxxxxx>
[PATCH v41 13/13] LRNG - add power-on and runtime self-tests
From
: Stephan Müller <smueller@xxxxxxxxxx>
[PATCH v41 08/13] LRNG - add kernel crypto API PRNG extension
From
: Stephan Müller <smueller@xxxxxxxxxx>
[PATCH v41 06/13] crypto: DRBG - externalize DRBG functions for LRNG
From
: Stephan Müller <smueller@xxxxxxxxxx>
[PATCH v41 03/13] LRNG - sysctls and /proc interface
From
: Stephan Müller <smueller@xxxxxxxxxx>
[PATCH v41 11/13] LRNG - add SP800-90B compliant health tests
From
: Stephan Müller <smueller@xxxxxxxxxx>
[PATCH v41 09/13] crypto: provide access to a static Jitter RNG state
From
: Stephan Müller <smueller@xxxxxxxxxx>
[PATCH v41 05/13] LRNG - add common generic hash support
From
: Stephan Müller <smueller@xxxxxxxxxx>
[PATCH v41 07/13] LRNG - add SP800-90A DRBG extension
From
: Stephan Müller <smueller@xxxxxxxxxx>
[PATCH v41 00/13] /dev/random - a new approach
From
: Stephan Müller <smueller@xxxxxxxxxx>
[PATCH] use swap()
From
: Salah Triki <salah.triki@xxxxxxxxx>
[PATCH] replace if with min
From
: Salah Triki <salah.triki@xxxxxxxxx>
Re: [PATCH Part2 RFC v4 06/40] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH Part2 RFC v4 23/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_START command
From
: Peter Gonda <pgonda@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 06/40] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
From
: Peter Gonda <pgonda@xxxxxxxxxx>
[PATCH v8 5/5] certs: Allow root user to append signed hashes to the blacklist keyring
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[PATCH v8 4/5] certs: Factor out the blacklist hash creation
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[PATCH v8 3/5] certs: Make blacklist_vet_description() more strict
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[PATCH v8 2/5] certs: Check that builtin blacklist hashes are valid
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[PATCH v8 1/5] tools/certs: Add print-cert-tbs-hash.sh
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[PATCH v8 0/5] Enable root to update the blacklist keyring
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [PATCH Part2 RFC v4 10/40] x86/fault: Add support to handle the RMP fault for user address
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 10/40] x86/fault: Add support to handle the RMP fault for user address
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH Part2 RFC v4 10/40] x86/fault: Add support to handle the RMP fault for user address
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 10/40] x86/fault: Add support to handle the RMP fault for user address
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH Part2 RFC v4 10/40] x86/fault: Add support to handle the RMP fault for user address
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 10/40] x86/fault: Add support to handle the RMP fault for user address
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH Part2 RFC v4 10/40] x86/fault: Add support to handle the RMP fault for user address
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH 0/3] crypto: qat - Fixes and clean-ups
From
: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
Re: [PATCH 1/3] crypto: qat - Simplify code and axe the use of a deprecated API
From
: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
[PATCH] X.509: Support parsing certificate using SM2 algorithm
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
[PATCH 5/6 v2] net: hdlc: rename 'mod_init' & 'mod_exit' functions to be module-specific
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
[PATCH 1/6 v2] arm: crypto: rename 'mod_init' & 'mod_exit' functions to be module-specific
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
[PATCH 0/6 v2] treewide: rename 'mod_init' & 'mod_exit' functions to be module-specific
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
[PATCH 6/6 v2] wireguard: main: rename 'mod_init' & 'mod_exit' functions to be module-specific
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
[PATCH 4/6 v2] MOST: cdev: rename 'mod_init' & 'mod_exit' functions to be module-specific
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
[PATCH 2/6 v2] hw_random: rename 'mod_init' & 'mod_exit' functions to be module-specific
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
[PATCH 3/6 v2] lib: crypto: rename 'mod_init' & 'mod_exit' functions to be module-specific
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
[PATCH 1/3] crypto: qat - Simplify code and axe the use of a deprecated API
From
: Christophe JAILLET <christophe.jaillet@xxxxxxxxxx>
[PATCH 3/3] crypto: qat - Fix a typo in a comment
From
: Christophe JAILLET <christophe.jaillet@xxxxxxxxxx>
[PATCH 2/3] crypto: qat - Disable AER if an error occurs in probe functions
From
: Christophe JAILLET <christophe.jaillet@xxxxxxxxxx>
[PATCH 0/3] crypto: qat - Fixes and clean-ups
From
: Christophe JAILLET <christophe.jaillet@xxxxxxxxxx>
Re: [GIT PULL] Crypto Fixes for 5.14
From
: pr-tracker-bot@xxxxxxxxxx
Re: [PATCH RFC 00/12] Enroll kernel keys thru MOK
From
: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
Re: [PATCH 6/6] net: wireguard: rename 'mod_init' & 'mod_exit' functions to be module-specific
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH 1/6] arm: crypto: rename 'mod_init' & 'mod_exit' functions to be module-specific
From
: "Russell King (Oracle)" <linux@xxxxxxxxxxxxxxx>
[PATCH 3/6] lib: crypto: rename 'mod_init' & 'mod_exit' functions to be module-specific
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
[PATCH 4/6] MOST: cdev: rename 'mod_init' & 'mod_exit' functions to be module-specific
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
[PATCH 5/6] net: hdlc: rename 'mod_init' & 'mod_exit' functions to be module-specific
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
[PATCH 0/6] treewide: rename 'mod_init' & 'mod_exit' functions to be module-specific
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
[PATCH 2/6] hw_random: rename 'mod_init' & 'mod_exit' functions to be module-specific
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
[PATCH 1/6] arm: crypto: rename 'mod_init' & 'mod_exit' functions to be module-specific
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
[PATCH 6/6] net: wireguard: rename 'mod_init' & 'mod_exit' functions to be module-specific
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
Re: [PATCH RFC 00/12] Enroll kernel keys thru MOK
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH RFC 00/12] Enroll kernel keys thru MOK
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH v3] pkcs7: make parser enable SM2 and SM3 algorithms combination
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH RFC 00/12] Enroll kernel keys thru MOK
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH Part2 RFC v4 14/40] crypto:ccp: Provide APIs to issue SEV-SNP commands
From
: "Dr. David Alan Gilbert" <dgilbert@xxxxxxxxxx>
Re: [PATCH RFC 00/12] Enroll kernel keys thru MOK
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 09/40] x86/fault: Add support to dump RMP entry on fault
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH Part2 RFC v4 09/40] x86/fault: Add support to dump RMP entry on fault
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 09/40] x86/fault: Add support to dump RMP entry on fault
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH Part2 RFC v4 09/40] x86/fault: Add support to dump RMP entry on fault
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 10/40] x86/fault: Add support to handle the RMP fault for user address
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH Part2 RFC v4 00/40] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH Part2 RFC v4 09/40] x86/fault: Add support to dump RMP entry on fault
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH Part2 RFC v4 09/40] x86/fault: Add support to dump RMP entry on fault
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH RFC 00/12] Enroll kernel keys thru MOK
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH Part1 RFC v4 04/36] x86/mm: Add sev_feature_enabled() helper
From
: Paolo Bonzini <pbonzini@xxxxxxxxxx>
Re: [PATCH Part1 RFC v4 04/36] x86/mm: Add sev_feature_enabled() helper
From
: "Dr. David Alan Gilbert" <dgilbert@xxxxxxxxxx>
crypto: prefix additional module autoloading with "crypto-"
From
: iLifetruth <yixiaonn@xxxxxxxxx>
[GIT PULL] Crypto Fixes for 5.14
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH RFC 05/12] integrity: Introduce mok keyring
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH RFC 00/12] Enroll kernel keys thru MOK
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH RFC 05/12] integrity: Introduce mok keyring
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH RFC 05/12] integrity: Introduce mok keyring
From
: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
Re: [PATCH Part2 RFC v4 09/40] x86/fault: Add support to dump RMP entry on fault
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
[PATCH Part2 RFC v4 39/40] KVM: SVM: Use a VMSA physical address variable for populating VMCB
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 32/40] KVM: SVM: Add support to handle GHCB GPA register VMGEXIT
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 38/40] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 31/40] KVM: X86: update page-fault trace to log the 64-bit error code
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 37/40] KVM: SVM: Add support to handle the RMP nested page fault
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 35/40] KVM: Add arch hooks to track the host write to guest memory
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 30/40] KVM: X86: Define new RMP check related #NPF error bits
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 29/40] KVM: X86: Introduce kvm_mmu_get_tdp_walk() for SEV-SNP use
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 40/40] KVM: SVM: Support SEV-SNP AP Creation NAE event
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 23/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_START command
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 22/40] KVM: SVM: Add KVM_SNP_INIT command
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 34/40] KVM: SVM: Add support to handle Page State Change VMGEXIT
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 28/40] KVM: X86: Introduce kvm_mmu_map_tdp_page() for use by SEV
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 27/40] KVM: X86: Add kvm_x86_ops to get the max page level for the TDP
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 36/40] KVM: X86: Export the kvm_zap_gfn_range() for the SNP use
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 21/40] KVM: SVM: Add initial SEV-SNP support
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 20/40] KVM: SVM: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 33/40] KVM: SVM: Add support to handle MSR based Page State Change VMGEXIT
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 26/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 25/40] KVM: SVM: Reclaim the guest pages when SEV-SNP VM terminates
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 19/40] crypto: ccp: provide APIs to query extended attestation report
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 18/40] crypto: ccp: Add the SNP_{SET,GET}_EXT_CONFIG command
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 24/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_UPDATE command
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 17/40] crypto: ccp: Add the SNP_PLATFORM_STATUS command
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 07/40] x86/sev: Split the physmap when adding the page in RMP table
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 14/40] crypto:ccp: Provide APIs to issue SEV-SNP commands
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 16/40] crypto: ccp: Handle the legacy SEV command when SNP is enabled
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 12/40] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 11/40] crypto:ccp: Define the SEV-SNP commands
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 15/40] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 10/40] x86/fault: Add support to handle the RMP fault for user address
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 09/40] x86/fault: Add support to dump RMP entry on fault
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 13/40] crypto: ccp: Shutdown SNP firmware on kexec
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 08/40] x86/traps: Define RMP violation #PF error code
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 06/40] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 05/40] x86/sev: Add RMP entry lookup helpers
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 04/40] x86/sev: Add the host SEV-SNP initialization support
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 03/40] x86/cpufeatures: Add SEV-SNP CPU feature
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 02/40] KVM: SVM: Provide the Hypervisor Feature support VMGEXIT
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 01/40] KVM: SVM: Add support to handle AP reset MSR protocol
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 00/40] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 34/36] virt: Add SEV-SNP guest driver
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 33/36] x86/sev: Register SNP guest request platform device
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 24/36] x86/compressed/acpi: move EFI config table access to common code
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 32/36] x86/sev: Add snp_msg_seqno() helper
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 31/36] x86/sev: Provide support for SNP guest request NAEs
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 36/36] virt: sevguest: Add support to get extended report
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 23/36] KVM: x86: move lookup of indexed CPUID leafs to helper
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 30/36] x86/sev: enable SEV-SNP-validated CPUID in #VC handlers
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 22/36] x86/sev: move MSR-based VMGEXITs for CPUID to helper
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 29/36] x86/compressed/64: add identity mapping for Confidential Computing blob
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 35/36] virt: sevguest: Add support to derive key
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 16/36] KVM: SVM: define new SEV_FEATURES field in the VMCB Save State Area
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 26/36] x86/compressed/64: enable SEV-SNP-validated CPUID in #VC handler
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 20/36] x86/sev: Use SEV-SNP AP creation to start secondary CPUs
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 21/36] x86/head/64: set up a startup %gs for stack protector
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 27/36] x86/boot: add a pointer to Confidential Computing blob in bootparams
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 28/36] x86/compressed/64: store Confidential Computing blob address in bootparams
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 19/36] KVM: SVM: Update the SEV-ES save area mapping
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 18/36] KVM: SVM: Create a separate mapping for the GHCB save area
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 25/36] x86/boot: Add Confidential Computing type to setup_data
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 15/36] x86/mm: Add support to validate memory when changing C-bit
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 17/36] KVM: SVM: Create a separate mapping for the SEV-ES save area
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 14/36] x86/kernel: Validate rom memory before accessing when SEV-SNP is active
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 12/36] x86/sev: Add helper for validating pages in early enc attribute changes
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 13/36] x86/kernel: Make the bss.decrypted section shared in RMP table
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 11/36] x86/sev: Register GHCB memory when SEV-SNP is active
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 09/36] x86/compressed: Add helper for validating pages in the decompression stage
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 10/36] x86/compressed: Register GHCB memory when SEV-SNP is active
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 08/36] x86/sev: check the vmpl level
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 07/36] x86/sev: Add a helper for the PVALIDATE instruction
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 06/36] x86/sev: check SEV-SNP features support
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 04/36] x86/mm: Add sev_feature_enabled() helper
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 05/36] x86/sev: Define the Linux specific guest termination reasons
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 03/36] x86/sev: Add support for hypervisor feature VMGEXIT
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 02/36] x86/sev: Save the negotiated GHCB version
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 01/36] x86/sev: shorten GHCB terminate macro names
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 00/36] Add AMD Secure Nested Paging (SEV-SNP) Guest Support
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH RFC 00/12] Enroll kernel keys thru MOK
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH RFC 00/12] Enroll kernel keys thru MOK
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH RFC 00/12] Enroll kernel keys thru MOK
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
Re: [PATCH RFC 00/12] Enroll kernel keys thru MOK
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH RFC 00/12] Enroll kernel keys thru MOK
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH RFC 00/12] Enroll kernel keys thru MOK
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH RFC 00/12] Enroll kernel keys thru MOK
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
[PATCH RFC 10/12] integrity: add new keyring handler
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH RFC 07/12] integrity: add add_to_mok_keyring
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH RFC 06/12] integrity: Trust mok keys if MokListTrustedRT found
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH RFC 11/12] integrity: move keys from the mok keyring into the secondary keyring
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH RFC 08/12] integrity: restrict INTEGRITY_KEYRING_MOK to restrict_link_by_secondary_trusted_or_ca
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH RFC 12/12] integrity: Suppress error message for keys added to the mok keyring
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH RFC 01/12] KEYS: Add KEY_ALLOC_BYPASS_RESTRICTION option to key_move
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH RFC 00/12] Enroll kernel keys thru MOK
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH RFC 03/12] KEYS: CA link restriction
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH RFC 04/12] integrity: add integrity_destroy_keyring
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH RFC 09/12] integrity: accessor function to get trust_moklist
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH RFC 05/12] integrity: Introduce mok keyring
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH RFC 02/12] KEYS: Allow unrestricted keys to be moved to the secondary keyring
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[syzbot] INFO: task hung in set_current_rng
From
: syzbot <syzbot+681da20be7291be15dca@xxxxxxxxxxxxxxxxxxxxxxxxx>
[PATCH] arm64: dts: qcom/sm8150: Add UFS ICE capability
From
: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
Re: [RFC v2 1/4] hisi-acc-vfio-pci: add new vfio_pci driver for HiSilicon ACC devices
From
: Jason Gunthorpe <jgg@xxxxxxxxxx>
Re: [RFC v2 1/4] hisi-acc-vfio-pci: add new vfio_pci driver for HiSilicon ACC devices
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
Re: [RFC v2 1/4] hisi-acc-vfio-pci: add new vfio_pci driver for HiSilicon ACC devices
From
: Leon Romanovsky <leon@xxxxxxxxxx>
Re: [RFC v2 1/4] hisi-acc-vfio-pci: add new vfio_pci driver for HiSilicon ACC devices
From
: Jason Gunthorpe <jgg@xxxxxxxxxx>
Re: [RFC v2 1/4] hisi-acc-vfio-pci: add new vfio_pci driver for HiSilicon ACC devices
From
: Leon Romanovsky <leon@xxxxxxxxxx>
Re: [PATCH Part1 RFC v3 22/22] virt: Add SEV-SNP guest driver
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
RE: [RFC v2 3/4] crypto: hisilicon/qm - Export mailbox functions for common use
From
: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
RE: [RFC v2 1/4] hisi-acc-vfio-pci: add new vfio_pci driver for HiSilicon ACC devices
From
: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
Re: [RFC v2 1/4] hisi-acc-vfio-pci: add new vfio_pci driver for HiSilicon ACC devices
From
: Max Gurtovoy <mgurtovoy@xxxxxxxxxx>
Re: [PATCH v3 13/18] crypto: rsa-psspad: Get signature parameters from a given signature
From
: Varad Gautam <varad.gautam@xxxxxxxx>
RE: [RFC v2 1/4] hisi-acc-vfio-pci: add new vfio_pci driver for HiSilicon ACC devices
From
: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
RE: [RFC v2 2/4] hisi_acc_vfio_pci: Override ioctl method to limit BAR2 region size
From
: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
RE: [RFC v2 1/4] hisi-acc-vfio-pci: add new vfio_pci driver for HiSilicon ACC devices
From
: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
[PATCH AUTOSEL 5.4 20/50] crypto: qat - check return code of qat_hal_rd_rel_reg()
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 4.4 11/15] crypto: shash - avoid comparing pointers to exported functions under CFI
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 4.4 03/15] crypto: nx - add missing MODULE_DEVICE_TABLE
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 4.4 07/15] crypto: qat - remove unused macro in FW loader
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 4.9 14/20] crypto: shash - avoid comparing pointers to exported functions under CFI
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 4.4 06/15] crypto: qat - check return code of qat_hal_rd_rel_reg()
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 4.9 09/20] crypto: qat - remove unused macro in FW loader
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 4.9 08/20] crypto: qat - check return code of qat_hal_rd_rel_reg()
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 4.9 04/20] crypto: nx - add missing MODULE_DEVICE_TABLE
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 4.14 18/25] crypto: shash - avoid comparing pointers to exported functions under CFI
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 4.14 11/25] crypto: qat - remove unused macro in FW loader
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 4.14 10/25] crypto: qat - check return code of qat_hal_rd_rel_reg()
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 4.14 06/25] crypto: nx - add missing MODULE_DEVICE_TABLE
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 4.19 22/31] crypto: shash - avoid comparing pointers to exported functions under CFI
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 4.19 14/31] crypto: qat - remove unused macro in FW loader
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 4.19 09/31] crypto: nx - add missing MODULE_DEVICE_TABLE
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 4.19 13/31] crypto: qat - check return code of qat_hal_rd_rel_reg()
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 5.4 32/50] crypto: shash - avoid comparing pointers to exported functions under CFI
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 5.4 21/50] crypto: qat - remove unused macro in FW loader
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 5.4 13/50] hwrng: exynos - Fix runtime PM imbalance on error
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 5.4 14/50] crypto: nx - add missing MODULE_DEVICE_TABLE
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 5.10 50/70] crypto: shash - avoid comparing pointers to exported functions under CFI
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 5.10 42/70] crypto: hisilicon/sec - fixup 3des minimum key size declaration
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 5.12 21/80] hwrng: exynos - Fix runtime PM imbalance on error
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 5.12 22/80] crypto: nx - add missing MODULE_DEVICE_TABLE
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 5.10 20/70] hwrng: exynos - Fix runtime PM imbalance on error
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 5.10 21/70] crypto: nx - add missing MODULE_DEVICE_TABLE
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 5.10 31/70] crypto: qce: skcipher: Fix incorrect sg count for dma transfers
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 5.10 30/70] crypto: qat - remove unused macro in FW loader
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 5.10 29/70] crypto: qat - check return code of qat_hal_rd_rel_reg()
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 5.12 31/80] crypto: qat - check return code of qat_hal_rd_rel_reg()
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 5.12 33/80] crypto: qce: skcipher: Fix incorrect sg count for dma transfers
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 5.12 32/80] crypto: qat - remove unused macro in FW loader
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 5.12 45/80] crypto: hisilicon/sec - fixup 3des minimum key size declaration
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 5.12 55/80] crypto: shash - avoid comparing pointers to exported functions under CFI
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 5.13 58/85] crypto: shash - avoid comparing pointers to exported functions under CFI
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 5.13 47/85] crypto: hisilicon/sec - fixup 3des minimum key size declaration
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 5.13 35/85] crypto: ecdh - fix 'ecdh_init'
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 5.13 34/85] crypto: ecdh - fix ecdh-nist-p192's entry in testmgr
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 5.13 31/85] crypto: qat - check return code of qat_hal_rd_rel_reg()
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 5.13 33/85] crypto: qce: skcipher: Fix incorrect sg count for dma transfers
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 5.13 32/85] crypto: qat - remove unused macro in FW loader
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 5.13 22/85] crypto: nx - add missing MODULE_DEVICE_TABLE
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 5.13 21/85] hwrng: exynos - Fix runtime PM imbalance on error
From
: Sasha Levin <sashal@xxxxxxxxxx>
Re: [RFC v2 3/4] crypto: hisilicon/qm - Export mailbox functions for common use
From
: Max Gurtovoy <mgurtovoy@xxxxxxxxxx>
Re: [RFC v2 1/4] hisi-acc-vfio-pci: add new vfio_pci driver for HiSilicon ACC devices
From
: Leon Romanovsky <leon@xxxxxxxxxx>
random(4) thoughts
From
: Sandy Harris <sandyinchina@xxxxxxxxx>
Re: [PATCH Part1 RFC v3 22/22] virt: Add SEV-SNP guest driver
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH] pkcs7: support EC-RDSA/streebog in SignerInfo
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
Re: [PATCH v3] pkcs7: make parser enable SM2 and SM3 algorithms combination
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
Re: [RFC v2 2/4] hisi_acc_vfio_pci: Override ioctl method to limit BAR2 region size
From
: Alex Williamson <alex.williamson@xxxxxxxxxx>
Re: [RFC v2 1/4] hisi-acc-vfio-pci: add new vfio_pci driver for HiSilicon ACC devices
From
: Alex Williamson <alex.williamson@xxxxxxxxxx>
Re: [PATCH v3] pkcs7: make parser enable SM2 and SM3 algorithms combination
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH v2 6/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH v2 6/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Richard Weinberger <richard@xxxxxx>
[RFC v2 4/4] hisi_acc_vfio_pci: Add support for vfio live migration
From
: Shameer Kolothum <shameerali.kolothum.thodi@xxxxxxxxxx>
[RFC v2 3/4] crypto: hisilicon/qm - Export mailbox functions for common use
From
: Shameer Kolothum <shameerali.kolothum.thodi@xxxxxxxxxx>
[RFC v2 2/4] hisi_acc_vfio_pci: Override ioctl method to limit BAR2 region size
From
: Shameer Kolothum <shameerali.kolothum.thodi@xxxxxxxxxx>
[RFC v2 1/4] hisi-acc-vfio-pci: add new vfio_pci driver for HiSilicon ACC devices
From
: Shameer Kolothum <shameerali.kolothum.thodi@xxxxxxxxxx>
[RFC v2 0/4] vfio/hisilicon: add acc live migration driver
From
: Shameer Kolothum <shameerali.kolothum.thodi@xxxxxxxxxx>
Re: [PATCH v2 5/6] crypto: caam - add in-kernel interface for blob generator
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH v2 6/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH Part1 RFC v3 22/22] virt: Add SEV-SNP guest driver
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH v2 6/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Richard Weinberger <richard@xxxxxx>
Re: [PATCH v2 0/2] crypto: mxs_dcp: Fix an Oops on i.MX6ULL
From
: Sean Anderson <sean.anderson@xxxxxxxx>
Re: [PATCH v2 2/2] crypto: mxs_dcp: Use sg_mapping_iter to copy data
From
: Sean Anderson <sean.anderson@xxxxxxxx>
Re: [PATCH v2 0/2] crypto: mxs_dcp: Fix an Oops on i.MX6ULL
From
: Sean Anderson <sean.anderson@xxxxxxxx>
Re: [PATCH v2 1/2] crypto: mxs-dcp: Check for DMA mapping errors
From
: Richard Weinberger <richard@xxxxxx>
Re: [PATCH v2 2/2] crypto: mxs_dcp: Use sg_mapping_iter to copy data
From
: Richard Weinberger <richard@xxxxxx>
Re: [PATCH v2 0/2] crypto: mxs_dcp: Fix an Oops on i.MX6ULL
From
: Richard Weinberger <richard@xxxxxx>
[PATCH v2 2/2] crypto: mxs_dcp: Use sg_mapping_iter to copy data
From
: Sean Anderson <sean.anderson@xxxxxxxx>
[PATCH v2 1/2] crypto: mxs-dcp: Check for DMA mapping errors
From
: Sean Anderson <sean.anderson@xxxxxxxx>
[PATCH v2 0/2] crypto: mxs_dcp: Fix an Oops on i.MX6ULL
From
: Sean Anderson <sean.anderson@xxxxxxxx>
Re: [PATCH Part1 RFC v3 22/22] virt: Add SEV-SNP guest driver
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [syzbot] BUG: scheduling while atomic: syz-executor/ADDR
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[syzbot] BUG: scheduling while atomic: syz-executor/ADDR
From
: syzbot <syzbot+20191dc583eff8602d2d@xxxxxxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH Part1 RFC v3 22/22] virt: Add SEV-SNP guest driver
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part1 RFC v3 22/22] virt: Add SEV-SNP guest driver
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v2 0/4] Introduce x86 assembler accelerated implementation for SM4 algorithm
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: DRBG - select SHA512
From
: Sachin Sant <sachinp@xxxxxxxxxxxxxxxxxx>
[PATCH] crypto: DRBG - select SHA512
From
: Stephan Mueller <smueller@xxxxxxxxxx>
[powerpc][5.13.0-next20210629] Kernel WARN crypto/testmgr.c:5653 during boot
From
: Sachin Sant <sachinp@xxxxxxxxxxxxxxxxxx>
[PATCH] crypto: fix flexible_array.cocci warnings
From
: Julia Lawall <julia.lawall@xxxxxxxx>
Re: [GIT PULL] Crypto Update for 5.14
From
: pr-tracker-bot@xxxxxxxxxx
Re: [PATCH 2/2] crypto: mxs_dcp: Use sg_mapping_iter to copy data
From
: Sean Anderson <sean.anderson@xxxxxxxx>
Re: [PATCH Part1 RFC v3 20/22] x86/boot: Add Confidential Computing address to setup_header
From
: Borislav Petkov <bp@xxxxxxxxx>
[GIT PULL] Crypto Update for 5.14
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 1/2] crypto: Typo s/Stormlink/Storlink/
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: hisilicon/sec - fix the process of disabling sva prefetching
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: DRBG - self test for HMAC(SHA-512)
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: qat: ratelimit invalid ioctl message and print the invalid cmd
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 2/2] crypto: mxs_dcp: Use sg_mapping_iter to copy data
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: Lockless /dev/random - Performance/Security/Stability improvement
From
: Mike Brooks <m@xxxxx>
Re: [PATCH 2/2] crypto: mxs_dcp: Use sg_mapping_iter to copy data
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[PATCH] crypto: hisilicon/sec - fix the process of disabling sva prefetching
From
: Kai Ye <yekai13@xxxxxxxxxx>
Re: [PATCH Part1 RFC v3 20/22] x86/boot: Add Confidential Computing address to setup_header
From
: Michael Roth <michael.roth@xxxxxxx>
Re: [PATCH Part1 RFC v3 20/22] x86/boot: Add Confidential Computing address to setup_header
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH Part1 RFC v3 20/22] x86/boot: Add Confidential Computing address to setup_header
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH v1] crypto: Make the DRBG compliant with NIST SP800-90A rev1
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [PATCH 2/2] crypto: mxs_dcp: Use sg_mapping_iter to copy data
From
: Sean Anderson <sean.anderson@xxxxxxxx>
Re: [PATCH Part1 RFC v3 20/22] x86/boot: Add Confidential Computing address to setup_header
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v1] crypto: Make the DRBG compliant with NIST SP800-90A rev1
From
: Stephan Müller <smueller@xxxxxxxxxx>
[PATCH 2/2] crypto: CRYPTO_DEV_SL3516 should depend on ARCH_GEMINI
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
[PATCH 1/2] crypto: Typo s/Stormlink/Storlink/
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
Re: [PATCH 1/3] crypto: mxs-dcp: Add support for hardware provided keys
From
: Richard Weinberger <richard.weinberger@xxxxxxxxx>
Re: [PATCH 1/3] crypto: mxs-dcp: Add support for hardware provided keys
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 1/3] crypto: mxs-dcp: Add support for hardware provided keys
From
: Richard Weinberger <richard.weinberger@xxxxxxxxx>
Re: [PATCH v1] crypto: Make the DRBG compliant with NIST SP800-90A rev1
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [PATCH] dt-bindings: crypto: ccree: Convert to json-schema
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: [PATCH 2/2] crypto: mxs_dcp: Use sg_mapping_iter to copy data
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] dt-bindings: crypto: ccree: Convert to json-schema
From
: Rob Herring <robh@xxxxxxxxxx>
Re: [PATCH] crypto: DRBG - self test for HMAC(SHA-512)
From
: Vlad Dronov <vdronov@xxxxxxxxxx>
[PATCH] crypto: DRBG - self test for HMAC(SHA-512)
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: [PATCH 2/2] crypto: mxs_dcp: Use sg_mapping_iter to copy data
From
: Sean Anderson <sean.anderson@xxxxxxxx>
Re: [PATCH] crypto: DRBG - switch to HMAC SHA512 DRBG as default DRBG
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [PATCH] crypto: DRBG - switch to HMAC SHA512 DRBG as default DRBG
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH Part1 RFC v3 20/22] x86/boot: Add Confidential Computing address to setup_header
From
: Michael Roth <michael.roth@xxxxxxx>
Re: [PATCH v6 00/17] Enable VAS and NX-GZIP support on PowerVM
From
: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
Re: [PATCH Part1 RFC v3 20/22] x86/boot: Add Confidential Computing address to setup_header
From
: "Kuppuswamy, Sathyanarayanan" <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
Re: [PATCH Part1 RFC v3 20/22] x86/boot: Add Confidential Computing address to setup_header
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH Part1 RFC v3 20/22] x86/boot: Add Confidential Computing address to setup_header
From
: Michael Roth <michael.roth@xxxxxxx>
Re: [PATCH Part1 RFC v3 20/22] x86/boot: Add Confidential Computing address to setup_header
From
: Michael Roth <michael.roth@xxxxxxx>
Re: [PATCH v1] crypto: Make the DRBG compliant with NIST SP800-90A rev1
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [PATCH v1] crypto: Make the DRBG compliant with NIST SP800-90A rev1
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[PATCH v3] pkcs7: make parser enable SM2 and SM3 algorithms combination
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
[PATCH v2 0/4] Introduce x86 assembler accelerated implementation for SM4 algorithm
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
[PATCH v2 2/4] crypto: arm64/sm4-ce - Make dependent on sm4 library instead of sm4-generic
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]