Linux Crypto
Thread Index
[
Prev Page
][
Next Page
]
Re: [PATCH 07/11] nvme-auth: augmented challenge support
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: [PATCH 10/11] nvmet-auth: implement support for augmented challenge
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: [PATCH 03/11] crypto/ffdhe: Finite Field DH Ephemeral Parameters
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: [PATCH 04/11] lib/base64: RFC4648-compliant base64 encoding
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH 04/11] lib/base64: RFC4648-compliant base64 encoding
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH 05/11] nvme: add definitions for NVMe In-Band authentication
From
: Hannes Reinecke <hare@xxxxxxx>
Re: [PATCH 04/11] lib/base64: RFC4648-compliant base64 encoding
From
: Hannes Reinecke <hare@xxxxxxx>
Re: [PATCH 03/11] crypto/ffdhe: Finite Field DH Ephemeral Parameters
From
: Hannes Reinecke <hare@xxxxxxx>
Re: [PATCH 06/11] nvme: Implement In-Band authentication
From
: Sagi Grimberg <sagi@xxxxxxxxxxx>
Re: [PATCH 05/11] nvme: add definitions for NVMe In-Band authentication
From
: Sagi Grimberg <sagi@xxxxxxxxxxx>
Re: [PATCH 04/11] lib/base64: RFC4648-compliant base64 encoding
From
: Sagi Grimberg <sagi@xxxxxxxxxxx>
Re: [PATCH 03/11] crypto/ffdhe: Finite Field DH Ephemeral Parameters
From
: Sagi Grimberg <sagi@xxxxxxxxxxx>
Re: [PATCH 02/11] crypto: add crypto_has_kpp()
From
: Sagi Grimberg <sagi@xxxxxxxxxxx>
Re: [PATCH 01/11] crypto: add crypto_has_shash()
From
: Sagi Grimberg <sagi@xxxxxxxxxxx>
Re: [RFC PATCH 00/11] nvme: In-band authentication support
From
: Sagi Grimberg <sagi@xxxxxxxxxxx>
Re: [PATCH Part2 RFC v4 25/40] KVM: SVM: Reclaim the guest pages when SEV-SNP VM terminates
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 32/40] KVM: SVM: Add support to handle GHCB GPA register VMGEXIT
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 31/40] KVM: X86: update page-fault trace to log the 64-bit error code
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 30/40] KVM: X86: Define new RMP check related #NPF error bits
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH] crypto: x86/aes-ni - add missing error checks in XTS code
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 26/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 25/40] KVM: SVM: Reclaim the guest pages when SEV-SNP VM terminates
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 24/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_UPDATE command
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 23/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_START command
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 22/40] KVM: SVM: Add KVM_SNP_INIT command
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 34/40] KVM: SVM: Add support to handle Page State Change VMGEXIT
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 21/40] KVM: SVM: Add initial SEV-SNP support
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 33/40] KVM: SVM: Add support to handle MSR based Page State Change VMGEXIT
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 32/40] KVM: SVM: Add support to handle GHCB GPA register VMGEXIT
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 27/40] KVM: X86: Add kvm_x86_ops to get the max page level for the TDP
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 31/40] KVM: X86: update page-fault trace to log the 64-bit error code
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 30/40] KVM: X86: Define new RMP check related #NPF error bits
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 26/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 25/40] KVM: SVM: Reclaim the guest pages when SEV-SNP VM terminates
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 24/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_UPDATE command
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 23/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_START command
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 22/40] KVM: SVM: Add KVM_SNP_INIT command
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 21/40] KVM: SVM: Add initial SEV-SNP support
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 27/40] KVM: X86: Add kvm_x86_ops to get the max page level for the TDP
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 21/40] KVM: SVM: Add initial SEV-SNP support
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 28/40] KVM: X86: Introduce kvm_mmu_map_tdp_page() for use by SEV
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 21/40] KVM: SVM: Add initial SEV-SNP support
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 05/40] x86/sev: Add RMP entry lookup helpers
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH] crypto: x86/aes-ni - add missing error checks in XTS code
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 15/40] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 15/40] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 15/40] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH 10/11] nvmet-auth: implement support for augmented challenge
From
: Hannes Reinecke <hare@xxxxxxx>
[PATCH 07/11] nvme-auth: augmented challenge support
From
: Hannes Reinecke <hare@xxxxxxx>
[PATCH 11/11] nvme: add non-standard ECDH and curve25517 algorithms
From
: Hannes Reinecke <hare@xxxxxxx>
[PATCH 09/11] nvmet: Implement basic In-Band Authentication
From
: Hannes Reinecke <hare@xxxxxxx>
[PATCH 06/11] nvme: Implement In-Band authentication
From
: Hannes Reinecke <hare@xxxxxxx>
[PATCH 05/11] nvme: add definitions for NVMe In-Band authentication
From
: Hannes Reinecke <hare@xxxxxxx>
[PATCH 01/11] crypto: add crypto_has_shash()
From
: Hannes Reinecke <hare@xxxxxxx>
[PATCH 03/11] crypto/ffdhe: Finite Field DH Ephemeral Parameters
From
: Hannes Reinecke <hare@xxxxxxx>
[PATCH 08/11] nvmet: Parse fabrics commands on all queues
From
: Hannes Reinecke <hare@xxxxxxx>
[PATCH 04/11] lib/base64: RFC4648-compliant base64 encoding
From
: Hannes Reinecke <hare@xxxxxxx>
[RFC PATCH 00/11] nvme: In-band authentication support
From
: Hannes Reinecke <hare@xxxxxxx>
[PATCH 02/11] crypto: add crypto_has_kpp()
From
: Hannes Reinecke <hare@xxxxxxx>
Re: [PATCH v2 2/4] crypto: arm64/sm4-ce - Make dependent on sm4 library instead of sm4-generic
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
Re: [PATCH 0/6 v2] treewide: rename 'mod_init' & 'mod_exit' functions to be module-specific
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 0/2] crypto: mxs_dcp: Fix an Oops on i.MX6ULL
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: DRBG - select SHA512
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 2/4] crypto: arm64/sm4-ce - Make dependent on sm4 library instead of sm4-generic
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: crypto: prefix additional module autoloading with "crypto-"
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: sun8i-ss - Use kfree_sensitive
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: fix flexible_array.cocci warnings
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH Part2 RFC v4 15/40] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 07/40] x86/sev: Split the physmap when adding the page in RMP table
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 07/40] x86/sev: Split the physmap when adding the page in RMP table
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 10/40] x86/fault: Add support to handle the RMP fault for user address
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
[RFC v1 2/2] crypto: tcrypt: call KUNIT_FAIL() instead of pr_err()
From
: Daniel Latypov <dlatypov@xxxxxxxxxx>
[RFC v1 1/2] crypto: tcrypt: minimal conversion to run under KUnit
From
: Daniel Latypov <dlatypov@xxxxxxxxxx>
[RFC v1 0/2] crypto: tcrypt: small changes to run under KUnit
From
: Daniel Latypov <dlatypov@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 06/40] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 07/40] x86/sev: Split the physmap when adding the page in RMP table
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 05/40] x86/sev: Add RMP entry lookup helpers
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 08/40] x86/traps: Define RMP violation #PF error code
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH Part2 RFC v4 08/40] x86/traps: Define RMP violation #PF error code
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 06/40] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH Part2 RFC v4 06/40] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 07/40] x86/sev: Split the physmap when adding the page in RMP table
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 05/40] x86/sev: Add RMP entry lookup helpers
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 07/40] x86/sev: Split the physmap when adding the page in RMP table
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 07/40] x86/sev: Split the physmap when adding the page in RMP table
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 07/40] x86/sev: Split the physmap when adding the page in RMP table
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 01/40] KVM: SVM: Add support to handle AP reset MSR protocol
From
: Tom Lendacky <thomas.lendacky@xxxxxxx>
Re: [PATCH Part2 RFC v4 01/40] KVM: SVM: Add support to handle AP reset MSR protocol
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH v2 0/2] crypto: mxs_dcp: Fix an Oops on i.MX6ULL
From
: Sean Anderson <sean.anderson@xxxxxxxx>
Re: [PATCH Part2 RFC v4 01/40] KVM: SVM: Add support to handle AP reset MSR protocol
From
: Tom Lendacky <thomas.lendacky@xxxxxxx>
Re: [PATCH Part2 RFC v4 01/40] KVM: SVM: Add support to handle AP reset MSR protocol
From
: Joerg Roedel <jroedel@xxxxxxx>
Re: [PATCH v41 01/13] Linux Random Number Generator
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: [PATCH v41 01/13] Linux Random Number Generator
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH Part2 RFC v4 07/40] x86/sev: Split the physmap when adding the page in RMP table
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 04/40] x86/sev: Add the host SEV-SNP initialization support
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 04/40] x86/sev: Add the host SEV-SNP initialization support
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 04/40] x86/sev: Add the host SEV-SNP initialization support
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 04/40] x86/sev: Add the host SEV-SNP initialization support
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 02/40] KVM: SVM: Provide the Hypervisor Feature support VMGEXIT
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 02/40] KVM: SVM: Provide the Hypervisor Feature support VMGEXIT
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 01/40] KVM: SVM: Add support to handle AP reset MSR protocol
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 15/40] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
From
: Marc Orr <marcorr@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 20/40] KVM: SVM: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 15/40] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 20/40] KVM: SVM: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
From
: Marc Orr <marcorr@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 15/40] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
From
: Marc Orr <marcorr@xxxxxxxxxx>
Re: [PATCH v41 00/13] /dev/random - a new approach
From
: Alexander Lobakin <alobakin@xxxxx>
Re: [PATCH 1/3] crypto: mxs-dcp: Add support for hardware provided keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH 2/3] KEYS: trusted: Introduce support for NXP DCP-based trusted keys
From
: Richard Weinberger <richard@xxxxxx>
Re: [PATCH 1/3] crypto: mxs-dcp: Add support for hardware provided keys
From
: Richard Weinberger <richard@xxxxxx>
Re: [PATCH 3/3] doc: trusted-encrypted: add DCP as new trust source
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH 2/3] KEYS: trusted: Introduce support for NXP DCP-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH 1/3] crypto: mxs-dcp: Add support for hardware provided keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH v2 0/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
[PATCH v41 01/13] Linux Random Number Generator
From
: Stephan Müller <smueller@xxxxxxxxxx>
[PATCH v41 04/13] LRNG - add switchable DRNG support
From
: Stephan Müller <smueller@xxxxxxxxxx>
[PATCH v41 10/13] LRNG - add Jitter RNG fast noise source
From
: Stephan Müller <smueller@xxxxxxxxxx>
[PATCH v41 02/13] LRNG - allocate one DRNG instance per NUMA node
From
: Stephan Müller <smueller@xxxxxxxxxx>
[PATCH v41 12/13] LRNG - add interface for gathering of raw entropy
From
: Stephan Müller <smueller@xxxxxxxxxx>
[PATCH v41 13/13] LRNG - add power-on and runtime self-tests
From
: Stephan Müller <smueller@xxxxxxxxxx>
[PATCH v41 08/13] LRNG - add kernel crypto API PRNG extension
From
: Stephan Müller <smueller@xxxxxxxxxx>
[PATCH v41 06/13] crypto: DRBG - externalize DRBG functions for LRNG
From
: Stephan Müller <smueller@xxxxxxxxxx>
[PATCH v41 03/13] LRNG - sysctls and /proc interface
From
: Stephan Müller <smueller@xxxxxxxxxx>
[PATCH v41 11/13] LRNG - add SP800-90B compliant health tests
From
: Stephan Müller <smueller@xxxxxxxxxx>
[PATCH v41 09/13] crypto: provide access to a static Jitter RNG state
From
: Stephan Müller <smueller@xxxxxxxxxx>
[PATCH v41 05/13] LRNG - add common generic hash support
From
: Stephan Müller <smueller@xxxxxxxxxx>
[PATCH v41 07/13] LRNG - add SP800-90A DRBG extension
From
: Stephan Müller <smueller@xxxxxxxxxx>
[PATCH v41 00/13] /dev/random - a new approach
From
: Stephan Müller <smueller@xxxxxxxxxx>
[PATCH] use swap()
From
: Salah Triki <salah.triki@xxxxxxxxx>
[PATCH] replace if with min
From
: Salah Triki <salah.triki@xxxxxxxxx>
Re: [PATCH Part2 RFC v4 06/40] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH Part2 RFC v4 23/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_START command
From
: Peter Gonda <pgonda@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 06/40] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
From
: Peter Gonda <pgonda@xxxxxxxxxx>
[PATCH v8 5/5] certs: Allow root user to append signed hashes to the blacklist keyring
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[PATCH v8 4/5] certs: Factor out the blacklist hash creation
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[PATCH v8 3/5] certs: Make blacklist_vet_description() more strict
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[PATCH v8 2/5] certs: Check that builtin blacklist hashes are valid
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[PATCH v8 1/5] tools/certs: Add print-cert-tbs-hash.sh
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[PATCH v8 0/5] Enable root to update the blacklist keyring
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [PATCH Part2 RFC v4 10/40] x86/fault: Add support to handle the RMP fault for user address
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 10/40] x86/fault: Add support to handle the RMP fault for user address
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH Part2 RFC v4 10/40] x86/fault: Add support to handle the RMP fault for user address
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 10/40] x86/fault: Add support to handle the RMP fault for user address
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH Part2 RFC v4 10/40] x86/fault: Add support to handle the RMP fault for user address
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 10/40] x86/fault: Add support to handle the RMP fault for user address
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH Part2 RFC v4 10/40] x86/fault: Add support to handle the RMP fault for user address
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH 0/3] crypto: qat - Fixes and clean-ups
From
: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
Re: [PATCH 1/3] crypto: qat - Simplify code and axe the use of a deprecated API
From
: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
[PATCH] X.509: Support parsing certificate using SM2 algorithm
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
[PATCH 5/6 v2] net: hdlc: rename 'mod_init' & 'mod_exit' functions to be module-specific
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
[PATCH 1/6 v2] arm: crypto: rename 'mod_init' & 'mod_exit' functions to be module-specific
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
[PATCH 0/6 v2] treewide: rename 'mod_init' & 'mod_exit' functions to be module-specific
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
[PATCH 6/6 v2] wireguard: main: rename 'mod_init' & 'mod_exit' functions to be module-specific
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
[PATCH 4/6 v2] MOST: cdev: rename 'mod_init' & 'mod_exit' functions to be module-specific
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
[PATCH 2/6 v2] hw_random: rename 'mod_init' & 'mod_exit' functions to be module-specific
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
[PATCH 3/6 v2] lib: crypto: rename 'mod_init' & 'mod_exit' functions to be module-specific
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
[PATCH 1/3] crypto: qat - Simplify code and axe the use of a deprecated API
From
: Christophe JAILLET <christophe.jaillet@xxxxxxxxxx>
[PATCH 3/3] crypto: qat - Fix a typo in a comment
From
: Christophe JAILLET <christophe.jaillet@xxxxxxxxxx>
[PATCH 2/3] crypto: qat - Disable AER if an error occurs in probe functions
From
: Christophe JAILLET <christophe.jaillet@xxxxxxxxxx>
[PATCH 0/3] crypto: qat - Fixes and clean-ups
From
: Christophe JAILLET <christophe.jaillet@xxxxxxxxxx>
Re: [GIT PULL] Crypto Fixes for 5.14
From
: pr-tracker-bot@xxxxxxxxxx
Re: [PATCH RFC 00/12] Enroll kernel keys thru MOK
From
: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
Re: [PATCH 6/6] net: wireguard: rename 'mod_init' & 'mod_exit' functions to be module-specific
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH 1/6] arm: crypto: rename 'mod_init' & 'mod_exit' functions to be module-specific
From
: "Russell King (Oracle)" <linux@xxxxxxxxxxxxxxx>
[PATCH 3/6] lib: crypto: rename 'mod_init' & 'mod_exit' functions to be module-specific
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
[PATCH 4/6] MOST: cdev: rename 'mod_init' & 'mod_exit' functions to be module-specific
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
[PATCH 5/6] net: hdlc: rename 'mod_init' & 'mod_exit' functions to be module-specific
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
[PATCH 0/6] treewide: rename 'mod_init' & 'mod_exit' functions to be module-specific
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
[PATCH 2/6] hw_random: rename 'mod_init' & 'mod_exit' functions to be module-specific
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
[PATCH 1/6] arm: crypto: rename 'mod_init' & 'mod_exit' functions to be module-specific
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
[PATCH 6/6] net: wireguard: rename 'mod_init' & 'mod_exit' functions to be module-specific
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
Re: [PATCH RFC 00/12] Enroll kernel keys thru MOK
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH RFC 00/12] Enroll kernel keys thru MOK
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH v3] pkcs7: make parser enable SM2 and SM3 algorithms combination
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH RFC 00/12] Enroll kernel keys thru MOK
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH Part2 RFC v4 14/40] crypto:ccp: Provide APIs to issue SEV-SNP commands
From
: "Dr. David Alan Gilbert" <dgilbert@xxxxxxxxxx>
Re: [PATCH RFC 00/12] Enroll kernel keys thru MOK
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 09/40] x86/fault: Add support to dump RMP entry on fault
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH Part2 RFC v4 09/40] x86/fault: Add support to dump RMP entry on fault
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 09/40] x86/fault: Add support to dump RMP entry on fault
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH Part2 RFC v4 09/40] x86/fault: Add support to dump RMP entry on fault
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 10/40] x86/fault: Add support to handle the RMP fault for user address
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH Part2 RFC v4 00/40] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH Part2 RFC v4 09/40] x86/fault: Add support to dump RMP entry on fault
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH Part2 RFC v4 09/40] x86/fault: Add support to dump RMP entry on fault
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH RFC 00/12] Enroll kernel keys thru MOK
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH Part1 RFC v4 04/36] x86/mm: Add sev_feature_enabled() helper
From
: Paolo Bonzini <pbonzini@xxxxxxxxxx>
Re: [PATCH Part1 RFC v4 04/36] x86/mm: Add sev_feature_enabled() helper
From
: "Dr. David Alan Gilbert" <dgilbert@xxxxxxxxxx>
crypto: prefix additional module autoloading with "crypto-"
From
: iLifetruth <yixiaonn@xxxxxxxxx>
[GIT PULL] Crypto Fixes for 5.14
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH RFC 05/12] integrity: Introduce mok keyring
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH RFC 00/12] Enroll kernel keys thru MOK
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH RFC 05/12] integrity: Introduce mok keyring
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH RFC 05/12] integrity: Introduce mok keyring
From
: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
Re: [PATCH Part2 RFC v4 09/40] x86/fault: Add support to dump RMP entry on fault
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
[PATCH Part2 RFC v4 39/40] KVM: SVM: Use a VMSA physical address variable for populating VMCB
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 32/40] KVM: SVM: Add support to handle GHCB GPA register VMGEXIT
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 38/40] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 31/40] KVM: X86: update page-fault trace to log the 64-bit error code
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 37/40] KVM: SVM: Add support to handle the RMP nested page fault
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 35/40] KVM: Add arch hooks to track the host write to guest memory
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 30/40] KVM: X86: Define new RMP check related #NPF error bits
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 29/40] KVM: X86: Introduce kvm_mmu_get_tdp_walk() for SEV-SNP use
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 40/40] KVM: SVM: Support SEV-SNP AP Creation NAE event
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 23/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_START command
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 22/40] KVM: SVM: Add KVM_SNP_INIT command
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 34/40] KVM: SVM: Add support to handle Page State Change VMGEXIT
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 28/40] KVM: X86: Introduce kvm_mmu_map_tdp_page() for use by SEV
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 27/40] KVM: X86: Add kvm_x86_ops to get the max page level for the TDP
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 36/40] KVM: X86: Export the kvm_zap_gfn_range() for the SNP use
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 21/40] KVM: SVM: Add initial SEV-SNP support
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 20/40] KVM: SVM: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 33/40] KVM: SVM: Add support to handle MSR based Page State Change VMGEXIT
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 26/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 25/40] KVM: SVM: Reclaim the guest pages when SEV-SNP VM terminates
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 19/40] crypto: ccp: provide APIs to query extended attestation report
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 18/40] crypto: ccp: Add the SNP_{SET,GET}_EXT_CONFIG command
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 24/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_UPDATE command
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 17/40] crypto: ccp: Add the SNP_PLATFORM_STATUS command
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 07/40] x86/sev: Split the physmap when adding the page in RMP table
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 14/40] crypto:ccp: Provide APIs to issue SEV-SNP commands
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 16/40] crypto: ccp: Handle the legacy SEV command when SNP is enabled
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 12/40] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 11/40] crypto:ccp: Define the SEV-SNP commands
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 15/40] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 10/40] x86/fault: Add support to handle the RMP fault for user address
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 09/40] x86/fault: Add support to dump RMP entry on fault
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 13/40] crypto: ccp: Shutdown SNP firmware on kexec
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 08/40] x86/traps: Define RMP violation #PF error code
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 06/40] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 05/40] x86/sev: Add RMP entry lookup helpers
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 04/40] x86/sev: Add the host SEV-SNP initialization support
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 03/40] x86/cpufeatures: Add SEV-SNP CPU feature
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 02/40] KVM: SVM: Provide the Hypervisor Feature support VMGEXIT
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 01/40] KVM: SVM: Add support to handle AP reset MSR protocol
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part2 RFC v4 00/40] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 34/36] virt: Add SEV-SNP guest driver
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 33/36] x86/sev: Register SNP guest request platform device
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 24/36] x86/compressed/acpi: move EFI config table access to common code
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 32/36] x86/sev: Add snp_msg_seqno() helper
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 31/36] x86/sev: Provide support for SNP guest request NAEs
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 36/36] virt: sevguest: Add support to get extended report
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 23/36] KVM: x86: move lookup of indexed CPUID leafs to helper
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 30/36] x86/sev: enable SEV-SNP-validated CPUID in #VC handlers
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 22/36] x86/sev: move MSR-based VMGEXITs for CPUID to helper
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 29/36] x86/compressed/64: add identity mapping for Confidential Computing blob
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 35/36] virt: sevguest: Add support to derive key
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 16/36] KVM: SVM: define new SEV_FEATURES field in the VMCB Save State Area
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 26/36] x86/compressed/64: enable SEV-SNP-validated CPUID in #VC handler
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 20/36] x86/sev: Use SEV-SNP AP creation to start secondary CPUs
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 21/36] x86/head/64: set up a startup %gs for stack protector
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 27/36] x86/boot: add a pointer to Confidential Computing blob in bootparams
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 28/36] x86/compressed/64: store Confidential Computing blob address in bootparams
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 19/36] KVM: SVM: Update the SEV-ES save area mapping
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 18/36] KVM: SVM: Create a separate mapping for the GHCB save area
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 25/36] x86/boot: Add Confidential Computing type to setup_data
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 15/36] x86/mm: Add support to validate memory when changing C-bit
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 17/36] KVM: SVM: Create a separate mapping for the SEV-ES save area
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 14/36] x86/kernel: Validate rom memory before accessing when SEV-SNP is active
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 12/36] x86/sev: Add helper for validating pages in early enc attribute changes
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 13/36] x86/kernel: Make the bss.decrypted section shared in RMP table
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 11/36] x86/sev: Register GHCB memory when SEV-SNP is active
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 09/36] x86/compressed: Add helper for validating pages in the decompression stage
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 10/36] x86/compressed: Register GHCB memory when SEV-SNP is active
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 08/36] x86/sev: check the vmpl level
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 07/36] x86/sev: Add a helper for the PVALIDATE instruction
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 06/36] x86/sev: check SEV-SNP features support
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 04/36] x86/mm: Add sev_feature_enabled() helper
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 05/36] x86/sev: Define the Linux specific guest termination reasons
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 03/36] x86/sev: Add support for hypervisor feature VMGEXIT
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 02/36] x86/sev: Save the negotiated GHCB version
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 01/36] x86/sev: shorten GHCB terminate macro names
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH Part1 RFC v4 00/36] Add AMD Secure Nested Paging (SEV-SNP) Guest Support
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH RFC 00/12] Enroll kernel keys thru MOK
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH RFC 00/12] Enroll kernel keys thru MOK
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH RFC 00/12] Enroll kernel keys thru MOK
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
Re: [PATCH RFC 00/12] Enroll kernel keys thru MOK
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH RFC 00/12] Enroll kernel keys thru MOK
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH RFC 00/12] Enroll kernel keys thru MOK
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH RFC 00/12] Enroll kernel keys thru MOK
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
[PATCH RFC 10/12] integrity: add new keyring handler
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH RFC 07/12] integrity: add add_to_mok_keyring
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH RFC 06/12] integrity: Trust mok keys if MokListTrustedRT found
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH RFC 11/12] integrity: move keys from the mok keyring into the secondary keyring
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH RFC 08/12] integrity: restrict INTEGRITY_KEYRING_MOK to restrict_link_by_secondary_trusted_or_ca
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH RFC 12/12] integrity: Suppress error message for keys added to the mok keyring
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH RFC 01/12] KEYS: Add KEY_ALLOC_BYPASS_RESTRICTION option to key_move
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH RFC 00/12] Enroll kernel keys thru MOK
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH RFC 03/12] KEYS: CA link restriction
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH RFC 04/12] integrity: add integrity_destroy_keyring
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH RFC 09/12] integrity: accessor function to get trust_moklist
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH RFC 05/12] integrity: Introduce mok keyring
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH RFC 02/12] KEYS: Allow unrestricted keys to be moved to the secondary keyring
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[syzbot] INFO: task hung in set_current_rng
From
: syzbot <syzbot+681da20be7291be15dca@xxxxxxxxxxxxxxxxxxxxxxxxx>
[PATCH] arm64: dts: qcom/sm8150: Add UFS ICE capability
From
: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
Re: [RFC v2 1/4] hisi-acc-vfio-pci: add new vfio_pci driver for HiSilicon ACC devices
From
: Jason Gunthorpe <jgg@xxxxxxxxxx>
Re: [RFC v2 1/4] hisi-acc-vfio-pci: add new vfio_pci driver for HiSilicon ACC devices
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
Re: [RFC v2 1/4] hisi-acc-vfio-pci: add new vfio_pci driver for HiSilicon ACC devices
From
: Leon Romanovsky <leon@xxxxxxxxxx>
Re: [RFC v2 1/4] hisi-acc-vfio-pci: add new vfio_pci driver for HiSilicon ACC devices
From
: Jason Gunthorpe <jgg@xxxxxxxxxx>
Re: [RFC v2 1/4] hisi-acc-vfio-pci: add new vfio_pci driver for HiSilicon ACC devices
From
: Leon Romanovsky <leon@xxxxxxxxxx>
Re: [PATCH Part1 RFC v3 22/22] virt: Add SEV-SNP guest driver
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
RE: [RFC v2 3/4] crypto: hisilicon/qm - Export mailbox functions for common use
From
: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
RE: [RFC v2 1/4] hisi-acc-vfio-pci: add new vfio_pci driver for HiSilicon ACC devices
From
: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
Re: [RFC v2 1/4] hisi-acc-vfio-pci: add new vfio_pci driver for HiSilicon ACC devices
From
: Max Gurtovoy <mgurtovoy@xxxxxxxxxx>
Re: [PATCH v3 13/18] crypto: rsa-psspad: Get signature parameters from a given signature
From
: Varad Gautam <varad.gautam@xxxxxxxx>
RE: [RFC v2 1/4] hisi-acc-vfio-pci: add new vfio_pci driver for HiSilicon ACC devices
From
: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
RE: [RFC v2 2/4] hisi_acc_vfio_pci: Override ioctl method to limit BAR2 region size
From
: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
RE: [RFC v2 1/4] hisi-acc-vfio-pci: add new vfio_pci driver for HiSilicon ACC devices
From
: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
[PATCH AUTOSEL 5.4 20/50] crypto: qat - check return code of qat_hal_rd_rel_reg()
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 4.4 11/15] crypto: shash - avoid comparing pointers to exported functions under CFI
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 4.4 03/15] crypto: nx - add missing MODULE_DEVICE_TABLE
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 4.4 07/15] crypto: qat - remove unused macro in FW loader
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 4.9 14/20] crypto: shash - avoid comparing pointers to exported functions under CFI
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 4.4 06/15] crypto: qat - check return code of qat_hal_rd_rel_reg()
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 4.9 09/20] crypto: qat - remove unused macro in FW loader
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 4.9 08/20] crypto: qat - check return code of qat_hal_rd_rel_reg()
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 4.9 04/20] crypto: nx - add missing MODULE_DEVICE_TABLE
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 4.14 18/25] crypto: shash - avoid comparing pointers to exported functions under CFI
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 4.14 11/25] crypto: qat - remove unused macro in FW loader
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 4.14 10/25] crypto: qat - check return code of qat_hal_rd_rel_reg()
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 4.14 06/25] crypto: nx - add missing MODULE_DEVICE_TABLE
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 4.19 22/31] crypto: shash - avoid comparing pointers to exported functions under CFI
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 4.19 14/31] crypto: qat - remove unused macro in FW loader
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 4.19 09/31] crypto: nx - add missing MODULE_DEVICE_TABLE
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 4.19 13/31] crypto: qat - check return code of qat_hal_rd_rel_reg()
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 5.4 32/50] crypto: shash - avoid comparing pointers to exported functions under CFI
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 5.4 21/50] crypto: qat - remove unused macro in FW loader
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 5.4 13/50] hwrng: exynos - Fix runtime PM imbalance on error
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 5.4 14/50] crypto: nx - add missing MODULE_DEVICE_TABLE
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 5.10 50/70] crypto: shash - avoid comparing pointers to exported functions under CFI
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 5.10 42/70] crypto: hisilicon/sec - fixup 3des minimum key size declaration
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 5.12 21/80] hwrng: exynos - Fix runtime PM imbalance on error
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 5.12 22/80] crypto: nx - add missing MODULE_DEVICE_TABLE
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 5.10 20/70] hwrng: exynos - Fix runtime PM imbalance on error
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 5.10 21/70] crypto: nx - add missing MODULE_DEVICE_TABLE
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 5.10 31/70] crypto: qce: skcipher: Fix incorrect sg count for dma transfers
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 5.10 30/70] crypto: qat - remove unused macro in FW loader
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 5.10 29/70] crypto: qat - check return code of qat_hal_rd_rel_reg()
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 5.12 31/80] crypto: qat - check return code of qat_hal_rd_rel_reg()
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 5.12 33/80] crypto: qce: skcipher: Fix incorrect sg count for dma transfers
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 5.12 32/80] crypto: qat - remove unused macro in FW loader
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 5.12 45/80] crypto: hisilicon/sec - fixup 3des minimum key size declaration
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 5.12 55/80] crypto: shash - avoid comparing pointers to exported functions under CFI
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 5.13 58/85] crypto: shash - avoid comparing pointers to exported functions under CFI
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 5.13 47/85] crypto: hisilicon/sec - fixup 3des minimum key size declaration
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 5.13 35/85] crypto: ecdh - fix 'ecdh_init'
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 5.13 34/85] crypto: ecdh - fix ecdh-nist-p192's entry in testmgr
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 5.13 31/85] crypto: qat - check return code of qat_hal_rd_rel_reg()
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 5.13 33/85] crypto: qce: skcipher: Fix incorrect sg count for dma transfers
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 5.13 32/85] crypto: qat - remove unused macro in FW loader
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 5.13 22/85] crypto: nx - add missing MODULE_DEVICE_TABLE
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH AUTOSEL 5.13 21/85] hwrng: exynos - Fix runtime PM imbalance on error
From
: Sasha Levin <sashal@xxxxxxxxxx>
Re: [RFC v2 3/4] crypto: hisilicon/qm - Export mailbox functions for common use
From
: Max Gurtovoy <mgurtovoy@xxxxxxxxxx>
Re: [RFC v2 1/4] hisi-acc-vfio-pci: add new vfio_pci driver for HiSilicon ACC devices
From
: Leon Romanovsky <leon@xxxxxxxxxx>
random(4) thoughts
From
: Sandy Harris <sandyinchina@xxxxxxxxx>
Re: [PATCH Part1 RFC v3 22/22] virt: Add SEV-SNP guest driver
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH] pkcs7: support EC-RDSA/streebog in SignerInfo
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
Re: [PATCH v3] pkcs7: make parser enable SM2 and SM3 algorithms combination
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
Re: [RFC v2 2/4] hisi_acc_vfio_pci: Override ioctl method to limit BAR2 region size
From
: Alex Williamson <alex.williamson@xxxxxxxxxx>
Re: [RFC v2 1/4] hisi-acc-vfio-pci: add new vfio_pci driver for HiSilicon ACC devices
From
: Alex Williamson <alex.williamson@xxxxxxxxxx>
Re: [PATCH v3] pkcs7: make parser enable SM2 and SM3 algorithms combination
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH v2 6/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH v2 6/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Richard Weinberger <richard@xxxxxx>
[RFC v2 4/4] hisi_acc_vfio_pci: Add support for vfio live migration
From
: Shameer Kolothum <shameerali.kolothum.thodi@xxxxxxxxxx>
[RFC v2 3/4] crypto: hisilicon/qm - Export mailbox functions for common use
From
: Shameer Kolothum <shameerali.kolothum.thodi@xxxxxxxxxx>
[RFC v2 2/4] hisi_acc_vfio_pci: Override ioctl method to limit BAR2 region size
From
: Shameer Kolothum <shameerali.kolothum.thodi@xxxxxxxxxx>
[RFC v2 1/4] hisi-acc-vfio-pci: add new vfio_pci driver for HiSilicon ACC devices
From
: Shameer Kolothum <shameerali.kolothum.thodi@xxxxxxxxxx>
[RFC v2 0/4] vfio/hisilicon: add acc live migration driver
From
: Shameer Kolothum <shameerali.kolothum.thodi@xxxxxxxxxx>
Re: [PATCH v2 5/6] crypto: caam - add in-kernel interface for blob generator
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH v2 6/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH Part1 RFC v3 22/22] virt: Add SEV-SNP guest driver
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH v2 6/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Richard Weinberger <richard@xxxxxx>
Re: [PATCH v2 0/2] crypto: mxs_dcp: Fix an Oops on i.MX6ULL
From
: Sean Anderson <sean.anderson@xxxxxxxx>
Re: [PATCH v2 2/2] crypto: mxs_dcp: Use sg_mapping_iter to copy data
From
: Sean Anderson <sean.anderson@xxxxxxxx>
Re: [PATCH v2 0/2] crypto: mxs_dcp: Fix an Oops on i.MX6ULL
From
: Sean Anderson <sean.anderson@xxxxxxxx>
Re: [PATCH v2 1/2] crypto: mxs-dcp: Check for DMA mapping errors
From
: Richard Weinberger <richard@xxxxxx>
Re: [PATCH v2 2/2] crypto: mxs_dcp: Use sg_mapping_iter to copy data
From
: Richard Weinberger <richard@xxxxxx>
Re: [PATCH v2 0/2] crypto: mxs_dcp: Fix an Oops on i.MX6ULL
From
: Richard Weinberger <richard@xxxxxx>
[PATCH v2 2/2] crypto: mxs_dcp: Use sg_mapping_iter to copy data
From
: Sean Anderson <sean.anderson@xxxxxxxx>
[PATCH v2 1/2] crypto: mxs-dcp: Check for DMA mapping errors
From
: Sean Anderson <sean.anderson@xxxxxxxx>
[PATCH v2 0/2] crypto: mxs_dcp: Fix an Oops on i.MX6ULL
From
: Sean Anderson <sean.anderson@xxxxxxxx>
Re: [PATCH Part1 RFC v3 22/22] virt: Add SEV-SNP guest driver
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [syzbot] BUG: scheduling while atomic: syz-executor/ADDR
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[syzbot] BUG: scheduling while atomic: syz-executor/ADDR
From
: syzbot <syzbot+20191dc583eff8602d2d@xxxxxxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH Part1 RFC v3 22/22] virt: Add SEV-SNP guest driver
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part1 RFC v3 22/22] virt: Add SEV-SNP guest driver
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v2 0/4] Introduce x86 assembler accelerated implementation for SM4 algorithm
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: DRBG - select SHA512
From
: Sachin Sant <sachinp@xxxxxxxxxxxxxxxxxx>
[PATCH] crypto: DRBG - select SHA512
From
: Stephan Mueller <smueller@xxxxxxxxxx>
[powerpc][5.13.0-next20210629] Kernel WARN crypto/testmgr.c:5653 during boot
From
: Sachin Sant <sachinp@xxxxxxxxxxxxxxxxxx>
[PATCH] crypto: fix flexible_array.cocci warnings
From
: Julia Lawall <julia.lawall@xxxxxxxx>
Re: [GIT PULL] Crypto Update for 5.14
From
: pr-tracker-bot@xxxxxxxxxx
Re: [PATCH 2/2] crypto: mxs_dcp: Use sg_mapping_iter to copy data
From
: Sean Anderson <sean.anderson@xxxxxxxx>
Re: [PATCH Part1 RFC v3 20/22] x86/boot: Add Confidential Computing address to setup_header
From
: Borislav Petkov <bp@xxxxxxxxx>
[GIT PULL] Crypto Update for 5.14
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 1/2] crypto: Typo s/Stormlink/Storlink/
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: hisilicon/sec - fix the process of disabling sva prefetching
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: DRBG - self test for HMAC(SHA-512)
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: qat: ratelimit invalid ioctl message and print the invalid cmd
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 2/2] crypto: mxs_dcp: Use sg_mapping_iter to copy data
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: Lockless /dev/random - Performance/Security/Stability improvement
From
: Mike Brooks <m@xxxxx>
Re: [PATCH 2/2] crypto: mxs_dcp: Use sg_mapping_iter to copy data
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[PATCH] crypto: hisilicon/sec - fix the process of disabling sva prefetching
From
: Kai Ye <yekai13@xxxxxxxxxx>
Re: [PATCH Part1 RFC v3 20/22] x86/boot: Add Confidential Computing address to setup_header
From
: Michael Roth <michael.roth@xxxxxxx>
Re: [PATCH Part1 RFC v3 20/22] x86/boot: Add Confidential Computing address to setup_header
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH Part1 RFC v3 20/22] x86/boot: Add Confidential Computing address to setup_header
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH v1] crypto: Make the DRBG compliant with NIST SP800-90A rev1
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [PATCH 2/2] crypto: mxs_dcp: Use sg_mapping_iter to copy data
From
: Sean Anderson <sean.anderson@xxxxxxxx>
Re: [PATCH Part1 RFC v3 20/22] x86/boot: Add Confidential Computing address to setup_header
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v1] crypto: Make the DRBG compliant with NIST SP800-90A rev1
From
: Stephan Müller <smueller@xxxxxxxxxx>
[PATCH 2/2] crypto: CRYPTO_DEV_SL3516 should depend on ARCH_GEMINI
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
[PATCH 1/2] crypto: Typo s/Stormlink/Storlink/
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
Re: [PATCH 1/3] crypto: mxs-dcp: Add support for hardware provided keys
From
: Richard Weinberger <richard.weinberger@xxxxxxxxx>
Re: [PATCH 1/3] crypto: mxs-dcp: Add support for hardware provided keys
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 1/3] crypto: mxs-dcp: Add support for hardware provided keys
From
: Richard Weinberger <richard.weinberger@xxxxxxxxx>
Re: [PATCH v1] crypto: Make the DRBG compliant with NIST SP800-90A rev1
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [PATCH] dt-bindings: crypto: ccree: Convert to json-schema
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: [PATCH 2/2] crypto: mxs_dcp: Use sg_mapping_iter to copy data
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] dt-bindings: crypto: ccree: Convert to json-schema
From
: Rob Herring <robh@xxxxxxxxxx>
Re: [PATCH] crypto: DRBG - self test for HMAC(SHA-512)
From
: Vlad Dronov <vdronov@xxxxxxxxxx>
[PATCH] crypto: DRBG - self test for HMAC(SHA-512)
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: [PATCH 2/2] crypto: mxs_dcp: Use sg_mapping_iter to copy data
From
: Sean Anderson <sean.anderson@xxxxxxxx>
Re: [PATCH] crypto: DRBG - switch to HMAC SHA512 DRBG as default DRBG
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [PATCH] crypto: DRBG - switch to HMAC SHA512 DRBG as default DRBG
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH Part1 RFC v3 20/22] x86/boot: Add Confidential Computing address to setup_header
From
: Michael Roth <michael.roth@xxxxxxx>
Re: [PATCH v6 00/17] Enable VAS and NX-GZIP support on PowerVM
From
: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
Re: [PATCH Part1 RFC v3 20/22] x86/boot: Add Confidential Computing address to setup_header
From
: "Kuppuswamy, Sathyanarayanan" <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
Re: [PATCH Part1 RFC v3 20/22] x86/boot: Add Confidential Computing address to setup_header
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH Part1 RFC v3 20/22] x86/boot: Add Confidential Computing address to setup_header
From
: Michael Roth <michael.roth@xxxxxxx>
Re: [PATCH Part1 RFC v3 20/22] x86/boot: Add Confidential Computing address to setup_header
From
: Michael Roth <michael.roth@xxxxxxx>
Re: [PATCH v1] crypto: Make the DRBG compliant with NIST SP800-90A rev1
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [PATCH v1] crypto: Make the DRBG compliant with NIST SP800-90A rev1
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[PATCH v3] pkcs7: make parser enable SM2 and SM3 algorithms combination
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
[PATCH v2 0/4] Introduce x86 assembler accelerated implementation for SM4 algorithm
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
[PATCH v2 2/4] crypto: arm64/sm4-ce - Make dependent on sm4 library instead of sm4-generic
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
[PATCH v2 1/4] crypto: sm4 - create SM4 library based on sm4 generic code
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
[PATCH v2 4/4] crypto: tcrypt - add the asynchronous speed test for SM4
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
[PATCH v2 3/4] crypto: x86/sm4 - add AES-NI/AVX/x86_64 implementation
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: sl3516: depends on HAS_IOMEM
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 -next] crypto: sl3516 - Fix build warning without CONFIG_PM
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: hisilicon/qm - implement for querying hardware tasks status.
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: nx: Fix memcpy() over-reading in nonce
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] MAINTAINERS: update caam crypto driver maintainers list
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH][next] crypto: hisilicon/sec: Fix spelling mistake "fallbcak" -> "fallback"
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH cryptodev] crypto: fix duplicated inclusion
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH Part1 RFC v3 20/22] x86/boot: Add Confidential Computing address to setup_header
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH 2/2] crypto: mxs_dcp: Use sg_mapping_iter to copy data
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[PATCH] crypto: omap - Drop obsolete PageSlab check
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[PATCH] crypto: scatterwalk - Remove obsolete PageSlab check
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH Part1 RFC v3 20/22] x86/boot: Add Confidential Computing address to setup_header
From
: Michael Roth <michael.roth@xxxxxxx>
Re: [PATCH v1] crypto: Make the DRBG compliant with NIST SP800-90A rev1
From
: "H. Peter Anvin" <hpa@xxxxxxxxx>
Re: [PATCH v1] crypto: Make the DRBG compliant with NIST SP800-90A rev1
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [PATCH v1] crypto: Make the DRBG compliant with NIST SP800-90A rev1
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [PATCH v1] crypto: Make the DRBG compliant with NIST SP800-90A rev1
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: [PATCH v1] crypto: Make the DRBG compliant with NIST SP800-90A rev1
From
: James Morris <jamorris@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v1] crypto: Make the DRBG compliant with NIST SP800-90A rev1
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [PATCH] crypto: qat: ratelimit invalid ioctl message and print the invalid cmd
From
: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
[PATCH v1] crypto: Make the DRBG compliant with NIST SP800-90A rev1
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [PATCH Part1 RFC v3 20/22] x86/boot: Add Confidential Computing address to setup_header
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: swiotlb/caamjr regression (Was: [GIT PULL] (swiotlb) stable/for-linus-5.12)
From
: "'Dominique MARTINET'" <dominique.martinet@xxxxxxxxxxxxxxxxx>
Re: swiotlb/caamjr regression (Was: [GIT PULL] (swiotlb) stable/for-linus-5.12)
From
: Konrad Rzeszutek Wilk <konrad@xxxxxxxxxx>
[PATCH] crypto: qat: ratelimit invalid ioctl message and print the invalid cmd
From
: Colin King <colin.king@xxxxxxxxxxxxx>
Re: [PATCH] dt-bindings: Drop redundant minItems/maxItems
From
: Rob Herring <robh@xxxxxxxxxx>
[PATCH v2 2/6] KEYS: trusted: Allow import from existing key material for development
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
[PATCH v2 6/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
[PATCH v2 0/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
[PATCH v2 5/6] crypto: caam - add in-kernel interface for blob generator
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
[PATCH v2 3/6] KEYS: trusted: allow users to use kernel RNG for key material
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
[PATCH v2 4/6] KEYS: trusted: allow trust sources to use kernel RNG for key material
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
[PATCH v2 1/6] KEYS: trusted: allow use of TEE as backend without TCG_TPM support
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH] dt-bindings: Drop redundant minItems/maxItems
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
Re: swiotlb/caamjr regression (Was: [GIT PULL] (swiotlb) stable/for-linus-5.12)
From
: "'Dominique MARTINET'" <dominique.martinet@xxxxxxxxxxxxxxxxx>
Re: [ANNOUNCE][CFP] Linux Security Summit 2021
From
: James Morris <jmorris@xxxxxxxxx>
[PATCH] crypto: sl3516: depends on HAS_IOMEM
From
: Corentin Labbe <clabbe@xxxxxxxxxxxx>
Re: swiotlb/caamjr regression (Was: [GIT PULL] (swiotlb) stable/for-linus-5.12)
From
: Konrad Rzeszutek Wilk <konrad@xxxxxxxxxx>
Re: swiotlb/caamjr regression (Was: [GIT PULL] (swiotlb) stable/for-linus-5.12)
From
: "'Dominique MARTINET'" <dominique.martinet@xxxxxxxxxxxxxxxxx>
RE: swiotlb/caamjr regression (Was: [GIT PULL] (swiotlb) stable/for-linus-5.12)
From
: "Chanho Park" <chanho61.park@xxxxxxxxxxx>
Re: swiotlb/caamjr regression (Was: [GIT PULL] (swiotlb) stable/for-linus-5.12)
From
: Dominique MARTINET <dominique.martinet@xxxxxxxxxxxxxxxxx>
Re: [PATCH v6 13/17] powerpc/pseries/vas: Setup IRQ and fault handling
From
: Nicholas Piggin <npiggin@xxxxxxxxx>
Re: [PATCH v6 12/17] powerpc/pseries/vas: Integrate API with open/close windows
From
: Nicholas Piggin <npiggin@xxxxxxxxx>
Re: [PATCH] crypto: nx: Fix memcpy() over-reading in nonce
From
: Kees Cook <keescook@xxxxxxxxxxxx>
[PATCH 2/2] crypto: mxs_dcp: Use sg_mapping_iter to copy data
From
: Sean Anderson <sean.anderson@xxxxxxxx>
[PATCH 1/2] crypto: mxs-dcp: Check for DMA mapping errors
From
: Sean Anderson <sean.anderson@xxxxxxxx>
[syzbot] inconsistent lock state in padata_do_serial
From
: syzbot <syzbot+5952f5d2983bea3ff2ba@xxxxxxxxxxxxxxxxxxxxxxxxx>
Re: swiotlb/caamjr regression (Was: [GIT PULL] (swiotlb) stable/for-linus-5.12)
From
: Jianxiong Gao <jxgao@xxxxxxxxxx>
Re: [PATCH Part1 RFC v3 20/22] x86/boot: Add Confidential Computing address to setup_header
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH Part1 RFC v3 21/22] x86/sev: Register SNP guest request platform device
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part1 RFC v3 20/22] x86/boot: Add Confidential Computing address to setup_header
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part1 RFC v3 21/22] x86/sev: Register SNP guest request platform device
From
: Borislav Petkov <bp@xxxxxxxxx>
[PATCH v2 -next] crypto: sl3516 - Fix build warning without CONFIG_PM
From
: YueHaibing <yuehaibing@xxxxxxxxxx>
[PATCH] crypto: hisilicon/qm - implement for querying hardware tasks status.
From
: Wenkai Lin <linwenkai6@xxxxxxxxxxxxx>
Re: [PATCH] dt-bindings: Drop redundant minItems/maxItems
From
: Arnaud POULIQUEN <arnaud.pouliquen@xxxxxxxxxxx>
Re: [PATCH -next] crypto: sl3516 - Fix build warning without CONFIG_PM
From
: YueHaibing <yuehaibing@xxxxxxxxxx>
Re: [PATCH v6 12/17] powerpc/pseries/vas: Integrate API with open/close windows
From
: Haren Myneni <haren@xxxxxxxxxxxxx>
Re: [PATCH Part1 RFC v3 20/22] x86/boot: Add Confidential Computing address to setup_header
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH Part1 RFC v3 06/22] x86/sev: check SEV-SNP features support
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v6 13/17] powerpc/pseries/vas: Setup IRQ and fault handling
From
: Haren Myneni <haren@xxxxxxxxxxxxx>
Re: [PATCH v6 16/17] crypto/nx: Add sysfs interface to export NX capabilities
From
: Nicholas Piggin <npiggin@xxxxxxxxx>
Re: [PATCH v6 15/17] crypto/nx: Get NX capabilities for GZIP coprocessor type
From
: Nicholas Piggin <npiggin@xxxxxxxxx>
Re: [PATCH v6 13/17] powerpc/pseries/vas: Setup IRQ and fault handling
From
: Nicholas Piggin <npiggin@xxxxxxxxx>
Re: [PATCH v6 04/17] powerpc/vas: Add platform specific user window operations
From
: Nicholas Piggin <npiggin@xxxxxxxxx>
Re: [PATCH v6 11/17] powerpc/pseries/vas: Implement getting capabilities from hypervisor
From
: Nicholas Piggin <npiggin@xxxxxxxxx>
Re: [PATCH v6 12/17] powerpc/pseries/vas: Integrate API with open/close windows
From
: Nicholas Piggin <npiggin@xxxxxxxxx>
Re: [PATCH v6 06/17] powerpc/vas: Move update_csb/dump_crb to common book3s platform
From
: Nicholas Piggin <npiggin@xxxxxxxxx>
Re: [PATCH] dt-bindings: Drop redundant minItems/maxItems
From
: Rob Herring <robh@xxxxxxxxxx>
[PATCH v6 17/17] crypto/nx: Register and unregister VAS interface on PowerVM
From
: Haren Myneni <haren@xxxxxxxxxxxxx>
[PATCH v6 16/17] crypto/nx: Add sysfs interface to export NX capabilities
From
: Haren Myneni <haren@xxxxxxxxxxxxx>
[PATCH v6 15/17] crypto/nx: Get NX capabilities for GZIP coprocessor type
From
: Haren Myneni <haren@xxxxxxxxxxxxx>
[PATCH v6 14/17] crypto/nx: Rename nx-842-pseries file name to nx-common-pseries
From
: Haren Myneni <haren@xxxxxxxxxxxxx>
[PATCH v6 13/17] powerpc/pseries/vas: Setup IRQ and fault handling
From
: Haren Myneni <haren@xxxxxxxxxxxxx>
[PATCH v6 12/17] powerpc/pseries/vas: Integrate API with open/close windows
From
: Haren Myneni <haren@xxxxxxxxxxxxx>
[PATCH v6 11/17] powerpc/pseries/vas: Implement getting capabilities from hypervisor
From
: Haren Myneni <haren@xxxxxxxxxxxxx>
[PATCH v6 10/17] powerpc/pseries/vas: Add hcall wrappers for VAS handling
From
: Haren Myneni <haren@xxxxxxxxxxxxx>
[PATCH v6 09/17] powerpc/vas: Define QoS credit flag to allocate window
From
: Haren Myneni <haren@xxxxxxxxxxxxx>
[PATCH v6 08/17] powerpc/pseries/vas: Define VAS/NXGZIP hcalls and structs
From
: Haren Myneni <haren@xxxxxxxxxxxxx>
[PATCH v6 07/17] powerpc/vas: Define and use common vas_window struct
From
: Haren Myneni <haren@xxxxxxxxxxxxx>
[PATCH v6 06/17] powerpc/vas: Move update_csb/dump_crb to common book3s platform
From
: Haren Myneni <haren@xxxxxxxxxxxxx>
[PATCH v6 05/17] powerpc/vas: Create take/drop pid and mm reference functions
From
: Haren Myneni <haren@xxxxxxxxxxxxx>
[PATCH v6 04/17] powerpc/vas: Add platform specific user window operations
From
: Haren Myneni <haren@xxxxxxxxxxxxx>
[PATCH v6 03/17] powerpc/powernv/vas: Rename register/unregister functions
From
: Haren Myneni <haren@xxxxxxxxxxxxx>
[PATCH v6 02/17] powerpc/vas: Move VAS API to book3s common platform
From
: Haren Myneni <haren@xxxxxxxxxxxxx>
[PATCH v6 01/17] powerpc/powernv/vas: Release reference to tgid during window close
From
: Haren Myneni <haren@xxxxxxxxxxxxx>
[PATCH v6 00/17] Enable VAS and NX-GZIP support on PowerVM
From
: Haren Myneni <haren@xxxxxxxxxxxxx>
Re: [PATCH Part1 RFC v3 06/22] x86/sev: check SEV-SNP features support
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH] dt-bindings: Drop redundant minItems/maxItems
From
: Suman Anna <s-anna@xxxxxx>
Re: [PATCH] dt-bindings: Drop redundant minItems/maxItems
From
: Jassi Brar <jassisinghbrar@xxxxxxxxx>
Re: [PATCH -next] crypto: sl3516 - Fix build warning without CONFIG_PM
From
: LABBE Corentin <clabbe@xxxxxxxxxxxx>
Re: swiotlb/caamjr regression (Was: [GIT PULL] (swiotlb) stable/for-linus-5.12)
From
: Christoph Hellwig <hch@xxxxxx>
Re: [PATCH v2 2/4] kgdb: Fix spelling mistakes
From
: Daniel Thompson <daniel.thompson@xxxxxxxxxx>
[PATCH] MAINTAINERS: update caam crypto driver maintainers list
From
: Horia Geantă <horia.geanta@xxxxxxx>
Re: [PATCH] dt-bindings: Drop redundant minItems/maxItems
From
: Ulf Hansson <ulf.hansson@xxxxxxxxxx>
Re: [PATCH 04/11] crypto: marvell: cesa: change FPGA indirect article to an
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 0/8] crypto: hisilicon - supports to configure function's QoS for ACC
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH -next v2] crypto: remove CRYPTOA_U32 and related functions
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH -next v2] crypto: ccp - Use list_move_tail instead of list_del/list_add_tail in ccp-dmaengine.c
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v3] crypto: shash - avoid comparing pointers to exported functions under CFI
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[PATCH] crypto: nx - Fix numerous sparse byte-order warnings
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[PATCH] crypto: nx - Fix RCU warning in nx842_OF_upd_status
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[PATCH] crypto: api - Move crypto attr definitions out of crypto.h
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: sl3516 - Fix duplicate included linux/io.h
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: nx: Fix memcpy() over-reading in nonce
From
: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
Re: swiotlb/caamjr regression (Was: [GIT PULL] (swiotlb) stable/for-linus-5.12)
From
: Dominique MARTINET <dominique.martinet@xxxxxxxxxxxxxxxxx>
Re: swiotlb/caamjr regression (Was: [GIT PULL] (swiotlb) stable/for-linus-5.12)
From
: Christoph Hellwig <hch@xxxxxx>
[PATCH -next] crypto: sl3516 - Fix build warning without CONFIG_PM
From
: YueHaibing <yuehaibing@xxxxxxxxxx>
Re: swiotlb/caamjr regression (Was: [GIT PULL] (swiotlb) stable/for-linus-5.12)
From
: Dominique MARTINET <dominique.martinet@xxxxxxxxxxxxxxxxx>
Re: swiotlb/caamjr regression (Was: [GIT PULL] (swiotlb) stable/for-linus-5.12)
From
: Konrad Rzeszutek Wilk <konrad@xxxxxxxxxx>
Re: swiotlb/caamjr regression (Was: [GIT PULL] (swiotlb) stable/for-linus-5.12)
From
: Jianxiong Gao <jxgao@xxxxxxxxxx>
[PATCH] crypto: nx: Fix memcpy() over-reading in nonce
From
: Kees Cook <keescook@xxxxxxxxxxxx>
Re: [PATCH] dt-bindings: Drop redundant minItems/maxItems
From
: Wolfram Sang <wsa@xxxxxxxxxx>
Re: [PATCH Part1 RFC v3 19/22] x86/sev-snp: SEV-SNP AP creation support
From
: Tom Lendacky <thomas.lendacky@xxxxxxx>
Re: [PATCH v2] dt-bindings: crypto: ccree: Convert to json-schema
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: [PATCH Part1 RFC v3 11/22] x86/sev: Add helper for validating pages in early enc attribute changes
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part1 RFC v3 11/22] x86/sev: Add helper for validating pages in early enc attribute changes
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part1 RFC v3 11/22] x86/sev: Add helper for validating pages in early enc attribute changes
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part1 RFC v3 19/22] x86/sev-snp: SEV-SNP AP creation support
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH Part1 RFC v3 11/22] x86/sev: Add helper for validating pages in early enc attribute changes
From
: "Dr. David Alan Gilbert" <dgilbert@xxxxxxxxxx>
Re: [PATCH Part1 RFC v3 11/22] x86/sev: Add helper for validating pages in early enc attribute changes
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH Part1 RFC v3 11/22] x86/sev: Add helper for validating pages in early enc attribute changes
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH] dt-bindings: Drop redundant minItems/maxItems
From
: Jonathan Cameron <jic23@xxxxxxxxxx>
Re: [PATCH Part1 RFC v3 11/22] x86/sev: Add helper for validating pages in early enc attribute changes
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH] dt-bindings: Drop redundant minItems/maxItems
From
: Mark Brown <broonie@xxxxxxxxxx>
Re: [PATCH] dt-bindings: Drop redundant minItems/maxItems
From
: Philipp Zabel <p.zabel@xxxxxxxxxxxxxx>
Re: [PATCH Part1 RFC v3 11/22] x86/sev: Add helper for validating pages in early enc attribute changes
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH] dt-bindings: Drop redundant minItems/maxItems
From
: Marc Kleine-Budde <mkl@xxxxxxxxxxxxxx>
Re: [PATCH] dt-bindings: Drop redundant minItems/maxItems
From
: Vinod Koul <vkoul@xxxxxxxxxx>
Re: [PATCH Part1 RFC v3 08/22] x86/compressed: Add helper for validating pages in the decompression stage
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH Part1 RFC v3 11/22] x86/sev: Add helper for validating pages in early enc attribute changes
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v5 13/17] powerpc/pseries/vas: Setup IRQ and fault handling
From
: Nicholas Piggin <npiggin@xxxxxxxxx>
Re: [PATCH v5 12/17] powerpc/pseries/vas: Integrate API with open/close windows
From
: Nicholas Piggin <npiggin@xxxxxxxxx>
[PATCH v2] dt-bindings: crypto: ccree: Convert to json-schema
From
: Geert Uytterhoeven <geert+renesas@xxxxxxxxx>
Re: [PATCH v5 04/17] powerpc/vas: Add platform specific user window operations
From
: Nicholas Piggin <npiggin@xxxxxxxxx>
Re: [PATCH] dt-bindings: Drop redundant minItems/maxItems
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
[PATCH] crypto: sl3516 - Fix duplicate included linux/io.h
From
: Jiapeng Chong <jiapeng.chong@xxxxxxxxxxxxxxxxx>
[PATCH] dt-bindings: Drop redundant minItems/maxItems
From
: Rob Herring <robh@xxxxxxxxxx>
Re: [PATCH Part2 RFC v3 14/37] crypto:ccp: Provide APIs to issue SEV-SNP commands
From
: "Dr. David Alan Gilbert" <dgilbert@xxxxxxxxxx>
[PATCH][next] crypto: hisilicon/sec: Fix spelling mistake "fallbcak" -> "fallback"
From
: Colin King <colin.king@xxxxxxxxxxxxx>
Re: [PATCH v5 13/17] powerpc/pseries/vas: Setup IRQ and fault handling
From
: Haren Myneni <haren@xxxxxxxxxxxxx>
Re: [PATCH v5 12/17] powerpc/pseries/vas: Integrate API with open/close windows
From
: Haren Myneni <haren@xxxxxxxxxxxxx>
Re: [PATCH v5 12/17] powerpc/pseries/vas: Integrate API with open/close windows
From
: Haren Myneni <haren@xxxxxxxxxxxxx>
Re: [PATCH v5 04/17] powerpc/vas: Add platform specific user window operations
From
: Haren Myneni <haren@xxxxxxxxxxxxx>
[PATCH] crypto: sa2ul - Remove unused auth_len variable
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[RFC PATCH cryptodev] crypto: fix duplicated inclusion
From
: kernel test robot <rong.a.chen@xxxxxxxxx>
[cryptodev:master 110/119] drivers/crypto/gemini/sl3516-ce-cipher.c: linux/io.h is included more than once.
From
: kernel test robot <rong.a.chen@xxxxxxxxx>
linux-next: manual merge of the crypto tree with Linus' tree
From
: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
Re: [PATCH v5 16/17] crypto/nx: Get NX capabilities for GZIP coprocessor type
From
: Haren Myneni <haren@xxxxxxxxxxxxx>
Re: [PATCH Part1 RFC v3 11/22] x86/sev: Add helper for validating pages in early enc attribute changes
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part1 RFC v3 21/22] x86/sev: Register SNP guest request platform device
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH 0/3] DCP as trusted keys backend
From
: Richard Weinberger <richard@xxxxxx>
[PATCH 2/3] KEYS: trusted: Introduce support for NXP DCP-based trusted keys
From
: Richard Weinberger <richard@xxxxxx>
[PATCH 1/3] crypto: mxs-dcp: Add support for hardware provided keys
From
: Richard Weinberger <richard@xxxxxx>
[PATCH 3/3] doc: trusted-encrypted: add DCP as new trust source
From
: Richard Weinberger <richard@xxxxxx>
Re: [PATCH Part1 RFC v3 16/22] KVM: SVM: Create a separate mapping for the SEV-ES save area
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH Part1 RFC v3 16/22] KVM: SVM: Create a separate mapping for the SEV-ES save area
From
: Tom Lendacky <thomas.lendacky@xxxxxxx>
Re: [PATCH Part1 RFC v3 14/22] x86/mm: Add support to validate memory when changing C-bit
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH Part1 RFC v3 11/22] x86/sev: Add helper for validating pages in early enc attribute changes
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH Part1 RFC v3 21/22] x86/sev: Register SNP guest request platform device
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part1 RFC v3 21/22] x86/sev: Register SNP guest request platform device
From
: "Dr. David Alan Gilbert" <dgilbert@xxxxxxxxxx>
Re: [PATCH Part1 RFC v3 21/22] x86/sev: Register SNP guest request platform device
From
: "Dr. David Alan Gilbert" <dgilbert@xxxxxxxxxx>
Re: [PATCH Part1 RFC v3 21/22] x86/sev: Register SNP guest request platform device
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part1 RFC v3 14/22] x86/mm: Add support to validate memory when changing C-bit
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part1 RFC v3 11/22] x86/sev: Add helper for validating pages in early enc attribute changes
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part1 RFC v3 10/22] x86/sev: Register GHCB memory when SEV-SNP is active
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part1 RFC v3 09/22] x86/compressed: Register GHCB memory when SEV-SNP is active
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part1 RFC v3 16/22] KVM: SVM: Create a separate mapping for the SEV-ES save area
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH] dt-bindings: crypto: ccree: Convert to json-schema
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: [PATCH v5 17/17] crypto/nx: Add sysfs interface to export NX capabilities
From
: Nicholas Piggin <npiggin@xxxxxxxxx>
Re: [PATCH v5 16/17] crypto/nx: Get NX capabilities for GZIP coprocessor type
From
: Nicholas Piggin <npiggin@xxxxxxxxx>
Re: [PATCH v5 15/17] crypto/nx: Register and unregister VAS interface on PowerVM
From
: Nicholas Piggin <npiggin@xxxxxxxxx>
Re: [PATCH v5 06/17] powerpc/vas: Move update_csb/dump_crb to common book3s platform
From
: Nicholas Piggin <npiggin@xxxxxxxxx>
Re: [PATCH v5 14/17] crypto/nx: Rename nx-842-pseries file name to nx-common-pseries
From
: Nicholas Piggin <npiggin@xxxxxxxxx>
Re: [PATCH v5 13/17] powerpc/pseries/vas: Setup IRQ and fault handling
From
: Nicholas Piggin <npiggin@xxxxxxxxx>
Re: [PATCH v5 12/17] powerpc/pseries/vas: Integrate API with open/close windows
From
: Nicholas Piggin <npiggin@xxxxxxxxx>
Re: [PATCH v5 11/17] powerpc/pseries/vas: Implement getting capabilities from hypervisor
From
: Nicholas Piggin <npiggin@xxxxxxxxx>
Re: [PATCH v5 09/17] powerpc/vas: Define QoS credit flag to allocate window
From
: Nicholas Piggin <npiggin@xxxxxxxxx>
Re: [PATCH v5 08/17] powerpc/pseries/vas: Define VAS/NXGZIP hcalls and structs
From
: Nicholas Piggin <npiggin@xxxxxxxxx>
Re: [PATCH v5 07/17] powerpc/vas: Define and use common vas_window struct
From
: Nicholas Piggin <npiggin@xxxxxxxxx>
Re: [PATCH v5 05/17] powerpc/vas: Create take/drop pid and mm reference functions
From
: Nicholas Piggin <npiggin@xxxxxxxxx>
Re: [PATCH v5 04/17] powerpc/vas: Add platform specific user window operations
From
: Nicholas Piggin <npiggin@xxxxxxxxx>
Re: [PATCH v5 01/17] powerpc/powernv/vas: Release reference to tgid during window close
From
: Nicholas Piggin <npiggin@xxxxxxxxx>
Re: [PATCH v5 02/17] powerpc/vas: Move VAS API to book3s common platform
From
: Nicholas Piggin <npiggin@xxxxxxxxx>
[PATCH v5 17/17] crypto/nx: Add sysfs interface to export NX capabilities
From
: Haren Myneni <haren@xxxxxxxxxxxxx>
[PATCH v5 16/17] crypto/nx: Get NX capabilities for GZIP coprocessor type
From
: Haren Myneni <haren@xxxxxxxxxxxxx>
[PATCH v5 15/17] crypto/nx: Register and unregister VAS interface on PowerVM
From
: Haren Myneni <haren@xxxxxxxxxxxxx>
[PATCH v5 14/17] crypto/nx: Rename nx-842-pseries file name to nx-common-pseries
From
: Haren Myneni <haren@xxxxxxxxxxxxx>
[PATCH v5 13/17] powerpc/pseries/vas: Setup IRQ and fault handling
From
: Haren Myneni <haren@xxxxxxxxxxxxx>
[PATCH v5 12/17] powerpc/pseries/vas: Integrate API with open/close windows
From
: Haren Myneni <haren@xxxxxxxxxxxxx>
[PATCH v5 11/17] powerpc/pseries/vas: Implement getting capabilities from hypervisor
From
: Haren Myneni <haren@xxxxxxxxxxxxx>
[PATCH v5 10/17] powerpc/pseries/vas: Add hcall wrappers for VAS handling
From
: Haren Myneni <haren@xxxxxxxxxxxxx>
[PATCH v5 09/17] powerpc/vas: Define QoS credit flag to allocate window
From
: Haren Myneni <haren@xxxxxxxxxxxxx>
[PATCH v5 08/17] powerpc/pseries/vas: Define VAS/NXGZIP hcalls and structs
From
: Haren Myneni <haren@xxxxxxxxxxxxx>
[PATCH v5 07/17] powerpc/vas: Define and use common vas_window struct
From
: Haren Myneni <haren@xxxxxxxxxxxxx>
[PATCH v5 06/17] powerpc/vas: Move update_csb/dump_crb to common book3s platform
From
: Haren Myneni <haren@xxxxxxxxxxxxx>
[PATCH v5 05/17] powerpc/vas: Create take/drop pid and mm reference functions
From
: Haren Myneni <haren@xxxxxxxxxxxxx>
[PATCH v5 04/17] powerpc/vas: Add platform specific user window operations
From
: Haren Myneni <haren@xxxxxxxxxxxxx>
[PATCH v5 03/17] powerpc/powernv/vas: Rename register/unregister functions
From
: Haren Myneni <haren@xxxxxxxxxxxxx>
[PATCH v5 02/17] powerpc/vas: Move VAS API to book3s common platform
From
: Haren Myneni <haren@xxxxxxxxxxxxx>
[PATCH v5 01/17] powerpc/powernv/vas: Release reference to tgid during window close
From
: Haren Myneni <haren@xxxxxxxxxxxxx>
[PATCH v5 00/17] Enable VAS and NX-GZIP support on PowerVM
From
: Haren Myneni <haren@xxxxxxxxxxxxx>
Re: [PATCH 3/3] crypto: x86/sm4 - add AES-NI/AVX/x86_64 assembler implementation
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
Re: [PATCH 1/3] crypto: sm4 - create SM4 library based on sm4 generic code
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
Re: [GIT PULL][PATCH v11 0/4] Update to zstd-1.4.10
From
: Jean-Denis Girard <jd.girard@xxxxxxxxx>
Re: swiotlb/caamjr regression (Was: [GIT PULL] (swiotlb) stable/for-linus-5.12)
From
: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
Re: swiotlb/caamjr regression (Was: [GIT PULL] (swiotlb) stable/for-linus-5.12)
From
: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
Re: [PATCH Part1 RFC v3 21/22] x86/sev: Register SNP guest request platform device
From
: Tom Lendacky <thomas.lendacky@xxxxxxx>
Re: [PATCH] crypto: x86/curve25519 - fix cpu feature checking logic in mod_exit
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[PATCH] dt-bindings: crypto: ccree: Convert to json-schema
From
: Geert Uytterhoeven <geert+renesas@xxxxxxxxx>
Re: swiotlb/caamjr regression (Was: [GIT PULL] (swiotlb) stable/for-linus-5.12)
From
: Horia Geantă <horia.geanta@xxxxxxx>
Re: swiotlb/caamjr regression (Was: [GIT PULL] (swiotlb) stable/for-linus-5.12)
From
: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx>
Re: [PATCH] crypto: x86/curve25519 - fix cpu feature checking logic in mod_exit
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: Lockless /dev/random - Performance/Security/Stability improvement
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [PATCH Part1 RFC v3 14/22] x86/mm: Add support to validate memory when changing C-bit
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: Lockless /dev/random - Performance/Security/Stability improvement
From
: Sandy Harris <sandyinchina@xxxxxxxxx>
[PATCH 4/8] crypto: hisilicon/qm - add pf ping single vf function
From
: Kai Ye <yekai13@xxxxxxxxxx>
[PATCH 8/8] crypto: hisilicon/zip - adds the max shaper type rate
From
: Kai Ye <yekai13@xxxxxxxxxx>
[PATCH 5/8] crypto: hisilicon/qm - supports to inquiry each function's QoS
From
: Kai Ye <yekai13@xxxxxxxxxx>
[PATCH 7/8] crypto: hisilicon/hpre - adds the max shaper type rate
From
: Kai Ye <yekai13@xxxxxxxxxx>
[PATCH 6/8] crypto: hisilicon/sec - adds the max shaper type rate
From
: Kai Ye <yekai13@xxxxxxxxxx>
[PATCH 2/8] crypto: hisilicon/qm - add the "alg_qos" file node
From
: Kai Ye <yekai13@xxxxxxxxxx>
[PATCH 0/8] crypto: hisilicon - supports to configure function's QoS for ACC
From
: Kai Ye <yekai13@xxxxxxxxxx>
[PATCH 3/8] crypto: hisilicon/qm - merges the work initialization process into a single function
From
: Kai Ye <yekai13@xxxxxxxxxx>
[PATCH 1/8] crypto: hisilicon/qm - supports writing QoS int the host
From
: Kai Ye <yekai13@xxxxxxxxxx>
Re: [PATCH] crypto: cavium/nitrox - Fix an erro rhandling path in 'nitrox_probe()'
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] crypto: sm2 - fix a memory leak in sm2
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 0/4] crypto: hisilicon - supports new aeads for new hardware
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: x86/curve25519 - fix cpu feature checking logic in mod_exit
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH -next] crypto: qce: skcipher: fix error return code in qce_skcipher_async_req_handle()
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 0/5] crypto: add gemini/sl3516 crypto driver
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH -next 0/2] Fix error handling in omap sham ops
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH -next] crypto: nitrox - fix unchecked variable in nitrox_register_interrupts
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH -next] hwrng: omap - Using pm_runtime_resume_and_get instead of pm_runtime_get_sync
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: swiotlb/caamjr regression (Was: [GIT PULL] (swiotlb) stable/for-linus-5.12)
From
: Christoph Hellwig <hch@xxxxxx>
Re: Lockless /dev/random - Performance/Security/Stability improvement
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: Lockless /dev/random - Performance/Security/Stability improvement
From
: Sandy Harris <sandyinchina@xxxxxxxxx>
[PATCH -next v2] crypto: remove CRYPTOA_U32 and related functions
From
: Liu Shixin <liushixin2@xxxxxxxxxx>
Re: [PATCH 3/3] crypto: x86/sm4 - add AES-NI/AVX/x86_64 assembler implementation
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: swiotlb/caamjr regression (Was: [GIT PULL] (swiotlb) stable/for-linus-5.12)
From
: Horia Geantă <horia.geanta@xxxxxxx>
Re: [PATCH 1/3] crypto: sm4 - create SM4 library based on sm4 generic code
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH -next] crypto: remove CRYPTOA_U32 and related functions
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v3] crypto: shash - avoid comparing pointers to exported functions under CFI
From
: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
Re: swiotlb/caamjr regression (Was: [GIT PULL] (swiotlb) stable/for-linus-5.12)
From
: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v3] crypto: shash - avoid comparing pointers to exported functions under CFI
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH Part1 RFC v3 12/22] x86/kernel: Make the bss.decrypted section shared in RMP table
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH Part1 RFC v3 11/22] x86/sev: Add helper for validating pages in early enc attribute changes
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: swiotlb/caamjr regression (Was: [GIT PULL] (swiotlb) stable/for-linus-5.12)
From
: Horia Geantă <horia.geanta@xxxxxxx>
[PATCH 0/3] Introduce x86 assembler accelerated implementation for SM4 algorithm
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
[PATCH 1/3] crypto: sm4 - create SM4 library based on sm4 generic code
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
[PATCH 2/3] crypto: arm64/sm4-ce - Make dependent on sm4 library instead of sm4-generic
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
[PATCH 3/3] crypto: x86/sm4 - add AES-NI/AVX/x86_64 assembler implementation
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]