Filesystem Crypto
[Prev Page][Next Page]
- [PATCH v2 14/36] btrfs: adapt readdir for encrypted and nokey names
- [PATCH v2 20/36] btrfs: set file extent encryption excplicitly
- [PATCH v2 19/36] btrfs: turn on inlinecrypt mount option for encrypt
- [PATCH v2 18/36] btrfs: add get_devices hook for fscrypt
- [PATCH v2 17/36] btrfs: add encryption to CONFIG_BTRFS_DEBUG
- [PATCH v2 16/36] btrfs: implement fscrypt ioctls
- [PATCH v2 15/36] btrfs: handle nokey names.
- [PATCH v2 12/36] btrfs: add inode encryption contexts
- [PATCH v2 13/36] btrfs: add new FEATURE_INCOMPAT_ENCRYPT flag
- [PATCH v2 11/36] btrfs: start using fscrypt hooks
- [PATCH v2 10/36] btrfs: disable verity on encrypted inodes
- [PATCH v2 09/36] btrfs: disable various operations on encrypted inodes
- [PATCH v2 07/36] fscrypt: add documentation about extent encryption
- [PATCH v2 08/36] btrfs: add infrastructure for safe em freeing
- [PATCH v2 06/36] fscrypt: expose fscrypt_nokey_name
- [PATCH v2 05/36] blk-crypto: add a process bio callback
- [PATCH v2 03/36] fscrypt: add per-extent encryption support
- [PATCH v2 04/36] fscrypt: disable all but standard v2 policies for extent encryption
- [PATCH v2 02/36] fscrypt: don't wipe mk secret until the last active user is gone
- [PATCH v2 01/36] fscrypt: use a flag to indicate that the master key is being evicted
- [PATCH v2 00/36] btrfs: add fscrypt support
- [PATCH 03/12] common/encrypt: add btrfs to get_ciphertext_filename
- [PATCH 05/12] common/verity: explicitly don't allow btrfs encryption
- [PATCH 11/12] fstests: split generic/613 into two tests
- [PATCH 02/12] common/encrypt: add btrfs to get_encryption_*nonce
- [PATCH 08/12] fstests: properly test for v1 encryption policies in encrypt tests
- [PATCH 06/12] btrfs: add simple test of reflink of encrypted data
- [PATCH 09/12] fstests: split generic/580 into two tests
- [PATCH 12/12] fstest: add a fsstress+fscrypt test
- [PATCH 04/12] common/encrypt: enable making a encrypted btrfs filesystem
- [PATCH 10/12] fstests: split generic/581 into two tests
- [PATCH 07/12] btrfs: test snapshotting encrypted subvol
- [PATCH 00/12] fstests: fscrypt test updates
- [PATCH 01/12] common/encrypt: separate data and inode nonces
- Re: [PATCH] fscrypt: rename fscrypt_info => fscrypt_inode_info
- Re: [PATCH] fscrypt: rename fscrypt_info => fscrypt_inode_info
- Re: [PATCH] fscrypt: rename fscrypt_info => fscrypt_inode_info
- Re: [PATCH 13/35] btrfs: adapt readdir for encrypted and nokey names
- Re: [RFC PATCH v11 15/19] fsverity: consume builtin signature via LSM hook
- Re: Master key removal semantics
- [PATCH] fscrypt: rename fscrypt_info => fscrypt_inode_info
- Re: [RFC PATCH v11 16/19] ipe: enable support for fs-verity as a trust provider
- Re: [RFC PATCH v11 15/19] fsverity: consume builtin signature via LSM hook
- Re: [RFC PATCH v11 16/19] ipe: enable support for fs-verity as a trust provider
- [RFC PATCH v11 02/19] ipe: add policy parser
- [RFC PATCH v11 10/19] block|security: add LSM blob to block_device
- [RFC PATCH v11 19/19] documentation: add ipe documentation
- [RFC PATCH v11 11/19] dm verity: set DM_TARGET_SINGLETON feature flag
- [RFC PATCH v11 05/19] ipe: introduce 'boot_verified' as a trust provider
- [RFC PATCH v11 17/19] scripts: add boot policy generation program
- [RFC PATCH v11 04/19] ipe: add LSM hooks on execution and kernel read
- [RFC PATCH v11 12/19] dm: add finalize hook to target_type
- [RFC PATCH v11 00/19] Integrity Policy Enforcement LSM (IPE)
- [RFC PATCH v11 06/19] security: add new securityfs delete function
- [RFC PATCH v11 01/19] security: add ipe lsm
- [RFC PATCH v11 13/19] dm verity: consume root hash digest and signature data via LSM hook
- [RFC PATCH v11 18/19] ipe: kunit test for parser
- [RFC PATCH v11 07/19] ipe: add userspace interface
- [RFC PATCH v11 15/19] fsverity: consume builtin signature via LSM hook
- [RFC PATCH v11 14/19] ipe: add support for dm-verity as a trust provider
- [RFC PATCH v11 09/19] ipe: add permissive toggle
- [RFC PATCH v11 03/19] ipe: add evaluation loop
- [RFC PATCH v11 08/19] uapi|audit|ipe: add ipe auditing support
- [RFC PATCH v11 16/19] ipe: enable support for fs-verity as a trust provider
- Master key removal semantics
- Re: [RFC PATCH v3 2/9] common/encrypt: add btrfs to get_encryption_*nonce
- Re: [RFC PATCH v3 6/9] tests: adjust generic/429 for extent encryption
- [PATCH 35/35] btrfs: implement process_bio cb for fscrypt
- [PATCH 14/35] btrfs: handle nokey names.
- [PATCH 31/35] btrfs: populate ordered_extent with the orig offset
- [PATCH 23/35] btrfs: populate the ordered_extent with the fscrypt context
- [PATCH 32/35] btrfs: set the bio fscrypt context when applicable
- [PATCH 34/35] btrfs: add orig_logical to btrfs_bio
- [PATCH 12/35] btrfs: add new FEATURE_INCOMPAT_ENCRYPT flag
- [PATCH 17/35] btrfs: add get_devices hook for fscrypt
- [PATCH 10/35] btrfs: start using fscrypt hooks
- [PATCH 28/35] btrfs: pass the fscrypt_info through the replace extent infrastructure
- [PATCH 13/35] btrfs: adapt readdir for encrypted and nokey names
- [PATCH 25/35] btrfs: add an optional encryption context to the end of file extents
- [PATCH 18/35] btrfs: turn on inlinecrypt mount option for encrypt
- [PATCH 15/35] btrfs: implement fscrypt ioctls
- [PATCH 26/35] btrfs: explicitly track file extent length for replace and drop
- [PATCH 24/35] btrfs: keep track of fscrypt info and orig_start for dio reads
- [PATCH 20/35] btrfs: add fscrypt_info and encryption_type to extent_map
- [PATCH 11/35] btrfs: add inode encryption contexts
- [PATCH 22/35] btrfs: plumb through setting the fscrypt_info for ordered extents
- [PATCH 19/35] btrfs: set file extent encryption excplicitly
- [PATCH 21/35] btrfs: add fscrypt_info and encryption_type to ordered_extent
- [PATCH 30/35] btrfs: setup fscrypt_extent_info for new extents
- [PATCH 33/35] btrfs: add a bio argument to btrfs_csum_one_bio
- [PATCH 29/35] btrfs: implement the fscrypt extent encryption hooks
- [PATCH 27/35] btrfs: pass through fscrypt_extent_info to the file extent helpers
- [PATCH 16/35] btrfs: add encryption to CONFIG_BTRFS_DEBUG
- [PATCH 09/35] btrfs: disable verity on encrypted inodes
- [PATCH 08/35] btrfs: disable various operations on encrypted inodes
- [PATCH 07/35] btrfs: add infrastructure for safe em freeing
- [PATCH 06/35] fscrypt: add documentation about extent encryption
- [PATCH 05/35] fscrypt: expose fscrypt_nokey_name
- [PATCH 03/35] fscrypt: disable all but standard v2 policies for extent encryption
- [PATCH 01/35] fscrypt: rename fscrypt_info => fscrypt_inode_info
- [PATCH 02/35] fscrypt: add per-extent encryption support
- [PATCH 04/35] blk-crypto: add a process bio callback
- [PATCH 00/35] btrfs: add fscrypt support
- [PATCH v3 5/5] fscrypt: support crypto data unit size less than filesystem block size
- [PATCH v3 1/5] fscrypt: make it clearer that key_prefix is deprecated
- [PATCH v3 3/5] fscrypt: compute max_lblk_bits from s_maxbytes and block size
- [PATCH v3 2/5] fscrypt: make the bounce page pool opt-in instead of opt-out
- [PATCH v3 0/5] fscrypt: add support for data_unit_size < fs_block_size
- [PATCH v3 4/5] fscrypt: replace get_ino_and_lblk_bits with just has_32bit_inodes
- RE: [PATCH v2 00/10] Hardware wrapped key support for qcom ice and ufs
- Re: [RFC PATCH 0/4] fscrypt: add support for per-extent encryption
- Re: [RFC PATCH 0/4] fscrypt: add support for per-extent encryption
- Re: [PATCH 2/4] fscrypt: add per-extent encryption support
- Re: [PATCH 2/4] fscrypt: add per-extent encryption support
- [PATCH 1/4] fscrypt: rename fscrypt_info => fscrypt_inode_info
- [PATCH 4/4] blk-crypto: add a process bio callback
- [PATCH 3/4] fscrypt: disable all but standard v2 policies for extent encryption
- [PATCH 2/4] fscrypt: add per-extent encryption support
- [RFC PATCH 0/4] fscrypt: add support for per-extent encryption
- [PATCH v2 5/5] fscrypt: support crypto data unit size less than filesystem block size
- [PATCH v2 4/5] fscrypt: replace get_ino_and_lblk_bits with just has_32bit_inodes
- [PATCH v2 3/5] fscrypt: use s_maxbytes instead of filesystem lblk_bits
- [PATCH v2 2/5] fscrypt: make the bounce page pool opt-in instead of opt-out
- [PATCH v2 1/5] fscrypt: make it extra clear that key_prefix is deprecated
- [PATCH v2 0/5] fscrypt: add support for data_unit_size < fs_block_size
- Re: [PATCH v2 00/10] Hardware wrapped key support for qcom ice and ufs
- From: Srinivas Kandagatla
- Re: [RFC PATCH 00/13] fscrypt: add extent encryption
- Re: [RFC PATCH 07/13] fscrypt: store full fscrypt_contexts for each extent
- Re: [RFC PATCH 00/13] fscrypt: add extent encryption
- Re: [PATCH] quota: explicitly forbid quota files from being encrypted
- [PATCH 3/5] fscrypt: use s_maxbytes instead of filesystem lblk_bits
- [PATCH 1/5] fscrypt: make it extra clear that key_prefix is deprecated
- [PATCH 0/5] fscrypt: add support for data_unit_size < fs_block_size
- [PATCH 5/5] fscrypt: support crypto data unit size less than filesystem block size
- [PATCH 4/5] fscrypt: replace get_ino_and_lblk_bits with just has_32bit_inodes
- [PATCH 2/5] fscrypt: make the bounce page pool opt-in instead of opt-out
- [PATCH] quota: explicitly forbid quota files from being encrypted
- [RFC PATCH 13/13] fscrypt: update documentation for per-extent keys
- [RFC PATCH 12/13] fscrypt: allow asynchronous info freeing
- [RFC PATCH 10/13] fscrypt: allow multiple extents to reference one info
- [RFC PATCH 11/13] fscrypt: cache list of inlinecrypt devices
- [RFC PATCH 09/13] fscrypt: revamp key removal for extent encryption
- [RFC PATCH 08/13] fscrypt: save session key credentials for extent infos
- [RFC PATCH 06/13] fscrypt: allow load/save of extent contexts
- [RFC PATCH 07/13] fscrypt: store full fscrypt_contexts for each extent
- [RFC PATCH 04/13] fscrypt: split fscrypt_info into general and inode specific parts
- [RFC PATCH 05/13] fscrypt: add creation/usage/freeing of per-extent infos
- [RFC PATCH 03/13] fscrypt: move function call warning of busy inodes
- [RFC PATCH 02/13] fscrypt: adjust effective lblks based on extents
- [RFC PATCH 01/13] fscrypt: factor getting info for a specific block
- [RFC PATCH 00/13] fscrypt: add extent encryption
- Re: [PATCH v2 04/10] soc: qcom: ice: support for hardware wrapped keys
- Re: [PATCH v2 03/10] soc: qcom: ice: add hwkm support in ice
- Re: [PATCH v2 00/10] Hardware wrapped key support for qcom ice and ufs
- From: Srinivas Kandagatla
- Re: [PATCH v2 00/10] Hardware wrapped key support for qcom ice and ufs
- Re: [PATCH v2 00/10] Hardware wrapped key support for qcom ice and ufs
- From: Srinivas Kandagatla
- Re: [PATCH v2 00/10] Hardware wrapped key support for qcom ice and ufs
- Re: [PATCH v2 00/10] Hardware wrapped key support for qcom ice and ufs
- Re: [PATCH v2 00/10] Hardware wrapped key support for qcom ice and ufs
- From: Srinivas Kandagatla
- Re: [GIT PULL] fscrypt update for 6.6
- Re: [PATCH] KEYS: Include linux/errno.h in linux/verification.h
- [GIT PULL] fscrypt update for 6.6
- Re: [PATCH 2/12] ubifs: Do not include crypto/algapi.h
- [PATCH] KEYS: Include linux/errno.h in linux/verification.h
- Re: [PATCH 2/12] ubifs: Do not include crypto/algapi.h
- Re: [PATCH 3/12] Bluetooth: Do not include crypto/algapi.h
- From: Luiz Augusto von Dentz
- Re: [PATCH 1/12] fscrypt: Do not include crypto/algapi.h
- Re: [PATCH v2 00/10] Hardware wrapped key support for qcom ice and ufs
- Re: [PATCH v2 00/10] Hardware wrapped key support for qcom ice and ufs
- From: Srinivas Kandagatla
- Re: [PATCH 9/12] evm: Do not include crypto/algapi.h
- Re: [PATCH 10/12] KEYS: encrypted: Do not include crypto/algapi.h
- Re: [PATCH 6/12] wifi: mac80211: Do not include crypto/algapi.h
- Re: [PATCH 6/12] wifi: mac80211: Do not include crypto/algapi.h
- Re: [PATCH 6/12] wifi: mac80211: Do not include crypto/algapi.h
- Re: [PATCH 4/12] ceph: Do not include crypto/algapi.h
- Re: [PATCH 8/12] SUNRPC: Do not include crypto/algapi.h
- Re: [PATCH 7/12] mptcp: Do not include crypto/algapi.h
- Re: [PATCH 11/12] wireguard: Do not include crypto/algapi.h
- Re: [PATCH 6/12] wifi: mac80211: Do not include crypto/algapi.h
- [PATCH 0/12] Do not include crypto/algapi.h
- Re: [PATCH v4 0/4] crypto: LEA block cipher implementation
- RE: [PATCH v4 0/4] crypto: LEA block cipher implementation
- Re: [PATCH v3 00/16] fscrypt: add extent encryption
- Re: [PATCH v3 00/16] fscrypt: add extent encryption
- Re: [PATCH v3 00/16] fscrypt: add extent encryption
- Re: [PATCH v3 09/16] fscrypt: revamp key removal for extent encryption
- Re: [PATCH v3 15/16] fscrypt: allow asynchronous info freeing
- Re: [PATCH v3 14/16] fscrypt: cache list of inlinecrypt devices
- Re: [PATCH v3 12/16] fscrypt: save session key credentials for extent infos
- Re: [PATCH v3 00/16] fscrypt: add extent encryption
- Re: [PATCH v3 13/16] fscrypt: allow multiple extents to reference one info
- Re: [PATCH v2 00/10] Hardware wrapped key support for qcom ice and ufs
- RE: [PATCH v2 00/10] Hardware wrapped key support for qcom ice and ufs
- From: Gaurav Kashyap (QUIC)
- Re: [PATCH v3 00/16] fscrypt: add extent encryption
- Re: [PATCH v3 13/16] fscrypt: allow multiple extents to reference one info
- Re: [PATCH v3 00/16] fscrypt: add extent encryption
- Re: [PATCH v3 00/16] fscrypt: add extent encryption
- Re: [PATCH v6 8/8] fscrypt: make prepared keys record their type
- Re: [PATCH v6 6/8] fscrypt: move all the shared mode key setup deeper
- Re: [PATCH v6 5/8] fscrypt: reduce special-casing of IV_INO_LBLK_32
- Re: [PATCH v6 3/8] fscrypt: split setup_per_mode_enc_key()
- Re: [PATCH v6 2/8] fscrypt: split and rename setup_file_encryption_key()
- Re: [PATCH v2 00/10] Hardware wrapped key support for qcom ice and ufs
- Re: [PATCH v3 00/16] fscrypt: add extent encryption
- Re: [PATCH v6 8/8] fscrypt: make prepared keys record their type
- Re: [PATCH v3 00/17] btrfs: add encryption feature
- Re: [PATCH v3 17/17] btrfs: save and load fscrypt extent contexts
- Re: [PATCH v3 08/17] btrfs: handle nokey names.
- Re: [PATCH v3 05/17] btrfs: add inode encryption contexts
- Re: [PATCH v3 00/16] fscrypt: add extent encryption
- Re: [PATCH v3 07/16] fscrypt: use an optional ino equivalent for per-extent infos
- Re: [RFC PATCH v10 11/17] dm-verity: consume root hash digest and signature data via LSM hook
- Re: [PATCH v3 01/16] fscrypt: factor helper for locking master key
- Re: [PATCH v6 8/8] fscrypt: make prepared keys record their type
- Re: [PATCH v6 7/8] fscrypt: make infos have a pointer to prepared keys
- Re: [PATCH v6 6/8] fscrypt: move all the shared mode key setup deeper
- Re: [PATCH v6 4/8] fscrypt: move dirhash key setup away from IO key setup
- Re: [PATCH v6 3/8] fscrypt: split setup_per_mode_enc_key()
- Re: [PATCH v6 1/8] fscrypt: move inline crypt decision to info setup
- Re: [PATCH v6 2/8] fscrypt: split and rename setup_file_encryption_key()
- Re: [PATCH v6 5/8] fscrypt: reduce special-casing of IV_INO_LBLK_32
- Re: [RFC PATCH v10 11/17] dm-verity: consume root hash digest and signature data via LSM hook
- Re: [RFC PATCH v10 11/17] dm-verity: consume root hash digest and signature data via LSM hook
- Re: [RFC PATCH v3 9/9] btrfs: test snapshotting encrypted subvol
- [PATCH v3 01/17] btrfs: disable various operations on encrypted inodes
- [PATCH v3 09/17] btrfs: implement fscrypt ioctls
- [PATCH v3 02/17] btrfs: disable verity on encrypted inodes
- [PATCH v3 00/17] btrfs: add encryption feature
- [PATCH v3 06/17] btrfs: add new FEATURE_INCOMPAT_ENCRYPT flag
- [PATCH v3 05/17] btrfs: add inode encryption contexts
- [PATCH v3 08/17] btrfs: handle nokey names.
- [PATCH v3 04/17] btrfs: start using fscrypt hooks
- [PATCH v3 03/17] fscrypt: expose fscrypt_nokey_name
- [PATCH v3 16/16] fscrypt: update documentation for per-extent keys
- [PATCH v3 14/16] fscrypt: cache list of inlinecrypt devices
- [PATCH v3 15/16] fscrypt: allow asynchronous info freeing
- [PATCH v3 07/17] btrfs: adapt readdir for encrypted and nokey names
- [PATCH v3 13/16] fscrypt: allow multiple extents to reference one info
- [PATCH v3 12/16] fscrypt: save session key credentials for extent infos
- [PATCH v3 11/16] fscrypt: allow load/save of extent contexts
- [PATCH v6 5/8] fscrypt: reduce special-casing of IV_INO_LBLK_32
- [PATCH v6 6/8] fscrypt: move all the shared mode key setup deeper
- [PATCH v6 4/8] fscrypt: move dirhash key setup away from IO key setup
- [PATCH v6 3/8] fscrypt: split setup_per_mode_enc_key()
- [PATCH v6 2/8] fscrypt: split and rename setup_file_encryption_key()
- [PATCH v6 8/8] fscrypt: make prepared keys record their type
- [PATCH v6 1/8] fscrypt: move inline crypt decision to info setup
- [PATCH v6 7/8] fscrypt: make infos have a pointer to prepared keys
- [RFC PATCH v3 9/9] btrfs: test snapshotting encrypted subvol
- [RFC PATCH v3 6/9] tests: adjust generic/429 for extent encryption
- [RFC PATCH v3 5/9] generic/613: write some actual data for btrfs
- [RFC PATCH v3 4/9] common/encrypt: enable making a encrypted btrfs filesystem
- [RFC PATCH v3 3/9] common/encrypt: add btrfs to get_ciphertext_filename
- [RFC PATCH v3 7/9] common/verity: explicitly don't allow btrfs encryption
- [RFC PATCH v3 2/9] common/encrypt: add btrfs to get_encryption_*nonce
- [RFC PATCH v3 1/9] common/encrypt: separate data and inode nonces
- [RFC PATCH v3 0/9] fstests: add btrfs encryption testing
- [RFC PATCH v3 8/9] btrfs: add simple test of reflink of encrypted data
- [PATCH v3 12/17] btrfs: turn on inlinecrypt mount option for encrypt
- [PATCH v3 11/17] btrfs: add get_devices hook for fscrypt
- [PATCH v3 10/17] btrfs: add encryption to CONFIG_BTRFS_DEBUG
- [PATCH v3 17/17] btrfs: save and load fscrypt extent contexts
- [PATCH v3 16/17] btrfs: explicitly track file extent length and encryption
- [PATCH v3 15/17] btrfs: start tracking extent encryption context info
- [PATCH v3 14/17] btrfs: create and free extent fscrypt_infos
- [PATCH v3 13/17] btrfs: turn on the encryption ioctls
- [PATCH v3 05/16] fscrypt: setup leaf inodes for extent encryption
- [PATCH v3 09/16] fscrypt: revamp key removal for extent encryption
- [PATCH v3 06/16] fscrypt: allow infos to be owned by extents
- [PATCH v3 08/16] fscrypt: move function call warning of busy inodes
- [PATCH v3 07/16] fscrypt: use an optional ino equivalent for per-extent infos
- [PATCH v3 10/16] fscrypt: add creation/usage/freeing of per-extent infos
- [PATCH v3 03/16] fscrypt: adjust effective lblks based on extents
- [PATCH v3 04/16] fscrypt: add a super_block pointer to fscrypt_info
- [PATCH v3 02/16] fscrypt: factor getting info for a specific block
- [PATCH v3 01/16] fscrypt: factor helper for locking master key
- [PATCH v3 00/16] fscrypt: add extent encryption
- [PATCH v6 0/8] fscrypt: preliminary rearrangmeents of key setup
- Re: [PATCH RFC v10 7/17] ipe: add userspace interface
- Re: [PATCH RFC v10 8/17] uapi|audit|ipe: add ipe auditing support
- RE: [PATCH v2 00/10] Hardware wrapped key support for qcom ice and ufs
- From: Gaurav Kashyap (QUIC)
- Re: [RFC PATCH v10 11/17] dm-verity: consume root hash digest and signature data via LSM hook
- Re: [PATCH v5 8/8] fscrypt: make prepared keys record their type
- Re: [PATCH v2 07/10] qcom_scm: scm call for create, prepare and import keys
- Re: [PATCH v2 02/10] qcom_scm: scm call for deriving a software secret
- Re: [PATCH v2 02/10] qcom_scm: scm call for deriving a software secret
- Re: [PATCH v2 07/10] qcom_scm: scm call for create, prepare and import keys
- Re: [PATCH v2 09/10] soc: qcom: support for generate, import and prepare key
- Re: [PATCH v2 02/10] qcom_scm: scm call for deriving a software secret
- Re: [PATCH v2 07/10] qcom_scm: scm call for create, prepare and import keys
- Re: [PATCH v2 00/10] Hardware wrapped key support for qcom ice and ufs
- Re: [PATCH v2 07/10] qcom_scm: scm call for create, prepare and import keys
- [PATCH v2 09/10] soc: qcom: support for generate, import and prepare key
- [PATCH v2 10/10] ufs: host: support for generate, import and prepare key
- [PATCH v2 08/10] ufs: core: add support for generate, import and prepare keys
- [PATCH v2 07/10] qcom_scm: scm call for create, prepare and import keys
- [PATCH v2 04/10] soc: qcom: ice: support for hardware wrapped keys
- [PATCH v2 03/10] soc: qcom: ice: add hwkm support in ice
- [PATCH v2 06/10] ufs: host: wrapped keys support in ufs qcom
- [PATCH v2 05/10] ufs: core: support wrapped keys in ufs core
- [PATCH v2 02/10] qcom_scm: scm call for deriving a software secret
- [PATCH v2 01/10] ice, ufs, mmc: use blk_crypto_key for program_key
- [PATCH v2 00/10] Hardware wrapped key support for qcom ice and ufs
- Re: [PATCH v2 04/17] btrfs: start using fscrypt hooks
- Re: [PATCH v2 17/17] btrfs: save and load fscrypt extent contexts
- Re: [PATCH v2 16/17] btrfs: explicitly track file extent length and encryption
- Re: [PATCH v2 15/17] btrfs: start tracking extent encryption context info
- Re: [PATCH v2 14/17] btrfs: create and free extent fscrypt_infos
- Re: [PATCH v2 12/17] btrfs: turn on inlinecrypt mount option for encrypt
- Re: [PATCH v2 11/17] btrfs: add get_devices hook for fscrypt
- Re: [PATCH v2 07/17] btrfs: adapt readdir for encrypted and nokey names
- Re: [PATCH v2 04/17] btrfs: start using fscrypt hooks
- Re: [PATCH v2 06/17] btrfs: add new FEATURE_INCOMPAT_ENCRYPT flag
- Re: [PATCH v2 05/17] btrfs: add inode encryption contexts
- Re: [PATCH v2 12/17] btrfs: turn on inlinecrypt mount option for encrypt
- Re: [PATCH v2 07/17] btrfs: adapt readdir for encrypted and nokey names
- Re: [PATCH v2 04/17] btrfs: start using fscrypt hooks
- Re: [PATCH v2 16/17] btrfs: explicitly track file extent length and encryption
- Re: [PATCH v2 12/14] fscrypt: allow load/save of extent contexts
- Re: [PATCH v2 11/14] fscrypt: add creation/usage/freeing of per-extent infos
- Re: [PATCH v2 10/14] fscrypt: revamp key removal for extent encryption
- Re: [PATCH v2 09/14] fscrypt: move function call warning of busy inodes
- Re: [PATCH v2 07/14] fscrypt: notify per-extent infos if master key vanishes
- Re: [PATCH v2 13/14] fscrypt: save session key credentials for extent infos
- [PATCH v2 11/17] btrfs: add get_devices hook for fscrypt
- [PATCH v2 15/17] btrfs: start tracking extent encryption context info
- [PATCH v2 13/17] btrfs: turn on the encryption ioctls
- [PATCH v2 14/17] btrfs: create and free extent fscrypt_infos
- [PATCH v2 16/17] btrfs: explicitly track file extent length and encryption
- [PATCH v2 17/17] btrfs: save and load fscrypt extent contexts
- [PATCH v2 10/17] btrfs: add encryption to CONFIG_BTRFS_DEBUG
- [PATCH v2 12/17] btrfs: turn on inlinecrypt mount option for encrypt
- [PATCH v2 09/17] btrfs: implement fscrypt ioctls
- [PATCH v2 08/17] btrfs: use correct name hash for nokey names
- [PATCH v2 07/17] btrfs: adapt readdir for encrypted and nokey names
- [PATCH v2 05/17] btrfs: add inode encryption contexts
- [PATCH v2 06/17] btrfs: add new FEATURE_INCOMPAT_ENCRYPT flag
- [PATCH v2 04/17] btrfs: start using fscrypt hooks
- [PATCH v2 03/17] fscrypt: expose fscrypt_nokey_name
- [PATCH v2 01/17] btrfs: disable various operations on encrypted inodes
- [PATCH v2 02/17] btrfs: disable verity on encrypted inodes
- [PATCH v2 00/17] btrfs: add encryption feature
- Re: [PATCH v1 05/17] btrfs: add inode encryption contexts
- Re: [PATCH v1 01/17] btrfs: disable various operations on encrypted inodes
- Re: [PATCH RFC v10 9/17] ipe: add permissive toggle
- Re: [PATCH RFC v10 8/17] uapi|audit|ipe: add ipe auditing support
- Re: [PATCH RFC v10 7/17] ipe: add userspace interface
- Re: [PATCH RFC v10 6/17] security: add new securityfs delete function
- Re: [PATCH RFC v10 5/17] ipe: introduce 'boot_verified' as a trust provider
- Re: [PATCH RFC v10 4/17] ipe: add LSM hooks on execution and kernel read
- Re: [PATCH RFC v10 3/17] ipe: add evaluation loop
- Re: [PATCH v2 05/14] fscrypt: setup leaf inodes for extent encryption
- Re: [PATCH v2 03/14] fscrypt: adjust effective lblks based on extents
- Re: [PATCH RFC v10 2/17] ipe: add policy parser
- Re: [PATCH RFC v10 1/17] security: add ipe lsm
- Re: [RFC PATCH v10 11/17] dm-verity: consume root hash digest and signature data via LSM hook
- Re: [RFC PATCH v2 1/8] common/encrypt: separate data and inode nonces
- [RFC PATCH v2 8/8] btrfs: add simple test of reflink of encrypted data
- [RFC PATCH v2 7/8] common/verity: explicitly don't allow btrfs encryption
- [RFC PATCH v2 6/8] tests: adjust generic/429 for extent encryption
- [RFC PATCH v2 5/8] generic/613: write some actual data for btrfs
- [RFC PATCH v2 4/8] common/encrypt: enable making a encrypted btrfs filesystem
- [RFC PATCH v2 2/8] common/encrypt: add btrfs to get_encryption_*nonce
- [RFC PATCH v2 3/8] common/encrypt: add btrfs to get_ciphertext_filename
- [RFC PATCH v2 1/8] common/encrypt: separate data and inode nonces
- [RFC PATCH v2 0/8] fstests: add btrfs encryption testing
- [PATCH v5 7/8] fscrypt: make infos have a pointer to prepared keys
- [PATCH v5 6/8] fscrypt: move all the shared mode key setup deeper
- [PATCH v5 5/8] fscrypt: reduce special-casing of IV_INO_LBLK_32
- [PATCH v2 10/14] fscrypt: revamp key removal for extent encryption
- [PATCH v2 12/14] fscrypt: allow load/save of extent contexts
- [PATCH v2 11/14] fscrypt: add creation/usage/freeing of per-extent infos
- [PATCH v2 14/14] fscrypt: update documentation for per-extent keys
- [PATCH v2 13/14] fscrypt: save session key credentials for extent infos
- [PATCH v2 09/14] fscrypt: move function call warning of busy inodes
- [PATCH v2 08/14] fscrypt: use an optional ino equivalent for per-extent infos
- [PATCH v2 06/14] fscrypt: allow infos to be owned by extents
- [PATCH v2 07/14] fscrypt: notify per-extent infos if master key vanishes
- [PATCH v2 05/14] fscrypt: setup leaf inodes for extent encryption
- [PATCH v2 02/14] fscrypt: factor getting info for a specific block
- [PATCH v2 03/14] fscrypt: adjust effective lblks based on extents
- [PATCH v2 04/14] fscrypt: add a super_block pointer to fscrypt_info
- [PATCH v2 01/14] fscrypt: factor helper for locking master key
- [PATCH v2 00/14] fscrypt: add extent encryption
- [PATCH v5 8/8] fscrypt: make prepared keys record their type
- [PATCH v5 4/8] fscrypt: move dirhash key setup away from IO key setup
- [PATCH v5 3/8] fscrypt: split setup_per_mode_enc_key()
- [PATCH v5 2/8] fscrypt: split and rename setup_file_encryption_key()
- [PATCH v5 0/8] fscrypt: some rearrangements of key setup
- [PATCH v5 1/8] fscrypt: move inline crypt decision to info setup
- Re: [PATCH RFC v10 12/17] ipe: add support for dm-verity as a trust provider
- Re: [PATCH RFC v10 8/17] uapi|audit|ipe: add ipe auditing support
- Re: [PATCH RFC v10 9/17] ipe: add permissive toggle
- Re: [PATCH RFC v10 7/17] ipe: add userspace interface
- Re: [PATCH RFC v10 6/17] security: add new securityfs delete function
- Re: [PATCH RFC v10 5/17] ipe: introduce 'boot_verified' as a trust provider
- Re: [PATCH RFC v10 3/17] ipe: add evaluation loop
- Re: [PATCH RFC v10 4/17] ipe: add LSM hooks on execution and kernel read
- Re: [PATCH RFC v10 2/17] ipe: add policy parser
- Re: [PATCH RFC v10 1/17] security: add ipe lsm
- Re: [PATCH v1 01/17] btrfs: disable various operations on encrypted inodes
- Re: [PATCH v1 05/17] btrfs: add inode encryption contexts
- Re: [RFC PATCH v10 11/17] dm-verity: consume root hash digest and signature data via LSM hook
- Re: [PATCH v1 00/12] fscrypt: add extent encryption
- Re: [PATCH v1 00/12] fscrypt: add extent encryption
- Re: [PATCH v1 00/12] fscrypt: add extent encryption
- Re: [PATCH v1 00/12] fscrypt: add extent encryption
- Re: [PATCH v1 00/12] fscrypt: add extent encryption
- Re: [PATCH v1 00/12] fscrypt: add extent encryption
- Re: [PATCH v1 00/12] fscrypt: add extent encryption
- Re: [PATCH v1 00/12] fscrypt: add extent encryption
- Re: [RFC PATCH 8/8] btrfs: add simple test of reflink of encrypted data
- Re: [PATCH v1 00/12] fscrypt: add extent encryption
- Re: [PATCH v1 00/12] fscrypt: add extent encryption
- RE: [PATCH v3 4/4] fscrypt: Add LEA-256-XTS, LEA-256-CTS support
- Re: [PATCH v3 4/4] fscrypt: Add LEA-256-XTS, LEA-256-CTS support
- [PATCH 2/2] fscrypt: document the LEA support
- [PATCH 1/2] fscrypt: improve the "Encryption modes and usage" section
- [PATCH 0/2] fscrypt: update the encryption mode docs
- [PATCH v4 1/4] crypto: LEA block cipher implementation
- [PATCH v4 2/4] crypto: add LEA testmgr tests
- [PATCH v4 4/4] fscrypt: Add LEA-256-XTS, LEA-256-CTS support
- [PATCH v4 0/4] crypto: LEA block cipher implementation
- [PATCH v4 3/4] blk-crypto: Add LEA-256-XTS blk-crypto support
- RE: [PATCH v3 4/4] fscrypt: Add LEA-256-XTS, LEA-256-CTS support
- Re: [PATCH v3 4/4] fscrypt: Add LEA-256-XTS, LEA-256-CTS support
- [RFC PATCH 8/8] btrfs: add simple test of reflink of encrypted data
- [RFC PATCH 7/8] common/verity: explicitly don't allow btrfs encryption
- [RFC PATCH 5/8] generic/613: write some actual data for btrfs
- [RFC PATCH 6/8] tests: adjust encryption tests for extent encryption
- [RFC PATCH 4/8] common/encrypt: enable making a encrypted btrfs filesystem
- [RFC PATCH 3/8] common/encrypt: add btrfs to get_ciphertext_filename
- [RFC PATCH 1/8] common/encrypt: separate data and inode nonces
- [RFC PATCH 2/8] common/encrypt: add btrfs to get_encryption_*nonce
- [RFC PATCH 0/8] fstests: add btrfs encryption testing
- Re: [PATCH v1 11/17] btrfs: add get_devices hook for fscrypt
- RE: [PATCH v3 4/4] fscrypt: Add LEA-256-XTS, LEA-256-CTS support
- Re: [PATCH v4 3/8] fscrypt: split setup_per_mode_enc_key()
- Re: [PATCH v1 09/12] fscrypt: add creation/usage/freeing of per-extent infos
- [PATCH v1 02/17] btrfs: disable verity on encrypted inodes
- [PATCH v1 15/17] btrfs: start tracking extent encryption context info
- [PATCH v1 01/17] btrfs: disable various operations on encrypted inodes
- [PATCH v1 12/17] btrfs: turn on inlinecrypt mount option for encrypt
- [PATCH v1 14/17] btrfs: create and free extent fscrypt_infos
- [PATCH v1 03/17] fscrypt: expose fscrypt_nokey_name
- [PATCH v4 1/8] fscrypt: move inline crypt decision to info setup
- [PATCH v1 00/17] btrfs: add encryption feature
- [PATCH v1 13/17] btrfs: turn on the encryption ioctls
- [PATCH v1 05/17] btrfs: add inode encryption contexts
- [PATCH v1 07/17] btrfs: adapt readdir for encrypted and nokey names
- [PATCH v1 06/17] btrfs: add new FEATURE_INCOMPAT_ENCRYPT flag
- [PATCH v1 17/17] btrfs: save and load fscrypt extent contexts
- [PATCH v1 09/17] btrfs: implement fscrypt ioctls
- [PATCH v1 11/17] btrfs: add get_devices hook for fscrypt
- [PATCH v1 10/17] btrfs: add encryption to CONFIG_BTRFS_DEBUG
- [PATCH v1 08/17] btrfs: use correct name hash for nokey names
- [PATCH v4 2/8] fscrypt: split and rename setup_file_encryption_key()
- [PATCH v1 16/17] btrfs: explicitly track file extent length and encryption
- [PATCH v1 04/17] btrfs: start using fscrypt hooks
- [PATCH v4 7/8] fscrypt: make infos have a pointer to prepared keys
- [PATCH v4 0/8] fscrypt: some rearrangements of key setup
- [PATCH v4 4/8] fscrypt: move dirhash key setup away from IO key setup
- [PATCH v4 8/8] fscrypt: make prepared keys record their type
- [PATCH v4 3/8] fscrypt: split setup_per_mode_enc_key()
- [PATCH v4 5/8] fscrypt: reduce special-casing of IV_INO_LBLK_32
- [PATCH v4 6/8] fscrypt: move all the shared mode key setup deeper
- [PATCH v1 11/12] fscrypt: save session key credentials for extent infos
- [PATCH v1 12/12] fscrypt: update documentation for per-extent keys
- [PATCH v1 10/12] fscrypt: allow load/save of extent contexts
- [PATCH v1 09/12] fscrypt: add creation/usage/freeing of per-extent infos
- [PATCH v1 08/12] fscrypt: use an optional ino equivalent for per-extent infos
- [PATCH v1 05/12] fscrypt: setup leaf inodes for extent encryption
- [PATCH v1 07/12] fscrypt: notify per-extent infos if master key vanishes
- [PATCH v1 06/12] fscrypt: allow infos to be owned by extents
- [PATCH v1 04/12] fscrypt: add a super_block pointer to fscrypt_info
- [PATCH v1 03/12] fscrypt: adjust effective lblks based on extents
- [PATCH v1 02/12] fscrypt: factor getting info for a specific block
- [PATCH v1 01/12] fscrypt: factor helper for locking master key
- [PATCH v1 00/12] fscrypt: add extent encryption
- [RFC PATCH v10 04/17] ipe: add LSM hooks on execution and kernel read
- [RFC PATCH v10 03/17] ipe: add evaluation loop
- [RFC PATCH v10 13/17] fsverity: consume builtin signature via LSM hook
- [RFC PATCH v10 11/17] dm-verity: consume root hash digest and signature data via LSM hook
- [RFC PATCH v10 05/17] ipe: introduce 'boot_verified' as a trust provider
- [RFC PATCH v10 12/17] ipe: add support for dm-verity as a trust provider
- [RFC PATCH v10 08/17] uapi|audit|ipe: add ipe auditing support
- [RFC PATCH v10 16/17] ipe: kunit test for parser
- [RFC PATCH v10 09/17] ipe: add permissive toggle
- [RFC PATCH v10 14/17] ipe: enable support for fs-verity as a trust provider
- [RFC PATCH v10 00/17] Integrity Policy Enforcement LSM (IPE)
- [RFC PATCH v10 10/17] block|security: add LSM blob to block_device
- [RFC PATCH v10 06/17] security: add new securityfs delete function
- [RFC PATCH v10 02/17] ipe: add policy parser
- [RFC PATCH v10 15/17] scripts: add boot policy generation program
- [RFC PATCH v10 07/17] ipe: add userspace interface
- [RFC PATCH v10 01/17] security: add ipe lsm
- [RFC PATCH v10 17/17] documentation: add ipe documentation
- Re: [PATCH v3 4/4] fscrypt: Add LEA-256-XTS, LEA-256-CTS support
- Re: [GIT PULL] fscrypt updates for 6.5
- [PATCH v3 0/4] crypto: LEA block cipher implementation
- [PATCH v3 3/4] blk-crypto: Add LEA-256-XTS blk-crypto support
- [PATCH v3 2/4] crypto: add LEA testmgr tests
- [PATCH v3 1/4] crypto: LEA block cipher implementation
- [PATCH v3 4/4] fscrypt: Add LEA-256-XTS, LEA-256-CTS support
- [GIT PULL] fscrypt updates for 6.5
- Re: [PATCH v2] fscrypt: Replace 1-element array with flexible array
- [PATCH v2] fscrypt: Replace 1-element array with flexible array
- Re: [PATCH] fscrypt: Replace 1-element array with flexible array
- Re: [PATCH] fscrypt: Replace 1-element array with flexible array
- Re: [PATCH] fscrypt: Replace 1-element array with flexible array
- Re: [PATCH] fscrypt: Replace 1-element array with flexible array
- [PATCH] fscrypt: Replace 1-element array with flexible array
- Re: [PATCH v1 0/7] fscrypt: add pooled prepared keys facility
- Re: [PATCH v1 0/7] fscrypt: add pooled prepared keys facility
- Re: fscrypt - Bug or Feature - mv file from encrypted to nonencrypted folder?
- Re: [PATCH v1 0/7] fscrypt: add pooled prepared keys facility
- Re: [PATCH v1 0/7] fscrypt: add pooled prepared keys facility
- Re: [PATCH v1 0/7] fscrypt: add pooled prepared keys facility
- Re: [PATCH v1 0/7] fscrypt: add pooled prepared keys facility
- Re: [GIT PULL] fscrypt updates for 6.4
- [GIT PULL] fscrypt updates for 6.4
- [PATCH v1 7/7] fscrypt: add lru mechanism to choose pooled key
- [PATCH v1 6/7] fscrypt: add facility to shrink a pool of keys
- [PATCH v1 5/7] fscrypt: reclaim pooled prepared keys under pressure
- [PATCH v1 4/7] fscrypt: add pooled prepared key locking around use
- [PATCH v1 3/7] fscrypt: add pooling of pooled prepared keys.
- [PATCH v1 2/7] fscrypt: set up pooled keys upon first use
- [PATCH v1 1/7] fscrypt: add new pooled prepared keys.
- [PATCH v1 0/7] fscrypt: add pooled prepared keys facility
- [PATCH v3 11/11] fscrypt: factor helper for locking master key
- [PATCH v3 10/11] fscrypt: split key alloc and preparation
- [PATCH v3 08/11] fscrypt: make prepared keys record their type.
- [PATCH v3 07/11] fscrypt: move all the shared mode key setup deeper
- [PATCH v3 09/11] fscrypt: lock every time a info needs a mode key
- [PATCH v3 06/11] fscrypt: make infos have a pointer to prepared keys
- [PATCH v3 05/11] fscrypt: reduce special-casing of IV_INO_LBLK_32
- [PATCH v3 04/11] fscrypt: move dirhash key setup away from IO key setup
- [PATCH v3 03/11] fscrypt: split setup_per_mode_enc_key()
- [PATCH v3 02/11] fscrypt: split and rename setup_file_encryption_key()
- [PATCH v3 01/11] fscrypt: move inline crypt decision to info setup.
- [PATCH v3 00/11] fscrypt: rearrangements preliminary to extent encryption
- [PATCH 11/11] fscrypt: factor helper for locking master key
- [PATCH 10/11] fscrypt: split key alloc and preparation
- [PATCH 09/11] fscrypt: lock every time a info needs a mode key
- [PATCH 08/11] fscrypt: make prepared keys record their type.
- [PATCH 07/11] fscrypt: move all the shared mode key setup deeper
- [PATCH 05/11] fscrypt: reduce special-casing of IV_INO_LBLK_32
- [PATCH 06/11] fscrypt: make infos have a pointer to prepared keys
- [PATCH 04/11] fscrypt: move dirhash key setup away from IO key setup
- [PATCH 02/11] fscrypt: split and rename setup_file_encryption_key()
- [PATCH 03/11] fscrypt: split setup_per_mode_enc_key()
- [PATCH 01/11] fscrypt: move inline crypt decision to info setup.
- Re: [RFC PATCH v9 05/16] ipe: add userspace interface
- Re: [RFC PATCH v9 05/16] ipe: add userspace interface
- Re: [RFC PATCH v9 05/16] ipe: add userspace interface
- Re: [RFC PATCH v9 05/16] ipe: add userspace interface
- Re: [RFC PATCH v9 05/16] ipe: add userspace interface
- Re: [RFC PATCH v9 05/16] ipe: add userspace interface
- Re: [RFC PATCH v9 07/16] uapi|audit|ipe: add ipe auditing support
- Re: [RFC PATCH v9 07/16] uapi|audit|ipe: add ipe auditing support
- Re: [RFC PATCH v9 05/16] ipe: add userspace interface
- Re: [PATCH v2 10/11] fscrypt: explicitly track prepared parts of key
- Re: [RFC PATCH v9 03/16] ipe: add evaluation loop and introduce 'boot_verified' as a trust provider
- Re: [RFC PATCH v9 02/16] ipe: add policy parser
- Re: [PATCH v2 10/11] fscrypt: explicitly track prepared parts of key
- Re: [PATCH v2 06/11] fscrypt: make infos have a pointer to prepared keys
- Re: [PATCH v2 10/11] fscrypt: explicitly track prepared parts of key
- Re: [PATCH v2 08/11] fscrypt: make ci->ci_direct_key a bool not a pointer
- Re: [PATCH v2 07/11] fscrypt: move all the shared mode key setup deeper
- Re: [PATCH v2 06/11] fscrypt: make infos have a pointer to prepared keys
- Re: [PATCH v2 05/11] fscrypt: reduce special-casing of IV_INO_LBLK_32
- Re: [PATCH v2 04/11] fscrypt: move dirhash key setup away from IO key setup
- Re: [PATCH v2 03/11] fscrypt: split and rename setup_per_mode_enc_key()
- Re: [PATCH v2 02/11] fscrypt: split and rename setup_file_encryption_key()
- Re: [PATCH v2 00/11] fscrypt: rearrangements preliminary to extent encryption
- Re: [RFC PATCH v9 06/16] ipe: add LSM hooks on execution and kernel read
- Re: [PATCH v1 00/10] fscrypt: rearrangements preliminary to extent encryption
- [PATCH v2 11/11] fscrypt: split key alloc and preparation
- [PATCH v2 10/11] fscrypt: explicitly track prepared parts of key
- [PATCH v2 09/11] fscrypt: make prepared keys record their type.
- [PATCH v2 08/11] fscrypt: make ci->ci_direct_key a bool not a pointer
- [PATCH v2 07/11] fscrypt: move all the shared mode key setup deeper
- [PATCH v2 06/11] fscrypt: make infos have a pointer to prepared keys
- [PATCH v2 05/11] fscrypt: reduce special-casing of IV_INO_LBLK_32
- [PATCH v2 04/11] fscrypt: move dirhash key setup away from IO key setup
- [PATCH v2 03/11] fscrypt: split and rename setup_per_mode_enc_key()
- [PATCH v2 02/11] fscrypt: split and rename setup_file_encryption_key()
- [PATCH v2 01/11] fscrypt: move inline crypt decision to info setup.
- [PATCH v2 00/11] fscrypt: rearrangements preliminary to extent encryption
- Re: [PATCH v1 00/10] fscrypt: rearrangements preliminary to extent encryption
- Re: [RFC PATCH v9 05/16] ipe: add userspace interface
- Re: [RFC PATCH v9 03/16] ipe: add evaluation loop and introduce 'boot_verified' as a trust provider
- [PATCH v1 02/10] fscrypt: split and rename setup_per_mode_enc_key()
- [PATCH v1 10/10] fscrypt: split key alloc and preparation
- [PATCH v1 09/10] fscrypt: explicitly track prepared parts of key
- [PATCH v1 01/10] fscrypt: split and rename setup_file_encryption_key()
- [PATCH v1 07/10] fscrypt: make ci->ci_direct_key a bool not a pointer
- [PATCH v1 05/10] fscrypt: make infos have a pointer to prepared keys
- [PATCH v1 04/10] fscrypt: reduce special-casing of IV_INO_LBLK_32
- [PATCH v1 06/10] fscrypt: move all the shared mode key setup deeper
- [PATCH v1 00/10] fscrypt: rearrangements preliminary to extent encryption
- [PATCH v1 03/10] fscrypt: move dirhash key setup away from IO key setup
- [PATCH v1 08/10] fscrypt: make prepared keys record their type.
- Re: [RFC PATCH v9 02/16] ipe: add policy parser
- Re: [RFC PATCH v9 01/16] security: add ipe lsm
- [PATCH] fscrypt: optimize fscrypt_initialize()
- Re: [GIT PULL] fscrypt fix for v6.3-rc4
- Re: [PATCH v3 0/3] ceph: fscrypt: fix atomic open bug for encrypted directories
- Re: [GIT PULL] fscrypt fix for v6.3-rc4
- Re: Is there any userland implementations of fscrypt
- Re: Is there any userland implementations of fscrypt
- [PATCH] fscrypt: use WARN_ON_ONCE instead of WARN_ON
- Re: [GIT PULL] fscrypt fix for v6.3-rc4
- Re: [GIT PULL] fscrypt fix for v6.3-rc4
- Re: [GIT PULL] fscrypt fix for v6.3-rc4
- Re: [PATCH v3 0/3] ceph: fscrypt: fix atomic open bug for encrypted directories
- [PATCH v4] fscrypt: new helper function - fscrypt_prepare_lookup_partial()
- Re: Is there any userland implementations of fscrypt
- [GIT PULL] fscrypt fix for v6.3-rc4
- Re: [PATCH 0/3] xfstests: make fscrypt-crypt-util self-tests work with OpenSSL 3.0
- Re: [PATCH v3 0/3] ceph: fscrypt: fix atomic open bug for encrypted directories
- Re: [PATCH 0/3] xfstests: make fscrypt-crypt-util self-tests work with OpenSSL 3.0
- Re: [PATCH v3 0/3] ceph: fscrypt: fix atomic open bug for encrypted directories
- Re: [PATCH v3 0/3] ceph: fscrypt: fix atomic open bug for encrypted directories
- Re: [PATCH v3 0/3] ceph: fscrypt: fix atomic open bug for encrypted directories
- [PATCH 0/3] xfstests: make fscrypt-crypt-util self-tests work with OpenSSL 3.0
- [PATCH 1/3] fscrypt-crypt-util: fix HKDF self-test with latest OpenSSL
- [PATCH 2/3] fscrypt-crypt-util: use OpenSSL EVP API for AES self-tests
- [PATCH 3/3] fscrypt-crypt-util: fix XTS self-test with latest OpenSSL
- Re: [RFC PATCH v9 07/16] uapi|audit|ipe: add ipe auditing support
- Re: [RFC PATCH v9 11/16] ipe: add support for dm-verity as a trust provider
- [PATCH v3 3/3] ceph: switch ceph_open_atomic() to use the new fscrypt helper
- [PATCH v3 2/3] ceph: switch ceph_open() to use new fscrypt helper
- [PATCH v3 1/3] fscrypt: new helper function - fscrypt_prepare_lookup_partial()
- [PATCH v3 0/3] ceph: fscrypt: fix atomic open bug for encrypted directories
- Re: [PATCH v3 0/6] Fix blk-crypto keyslot race condition
- Re: [PATCH v3 5/6] blk-mq: return actual keyslot error in blk_insert_cloned_request()
- Re: [PATCH v3 4/6] blk-crypto: remove blk_crypto_insert_cloned_request()
- Re: [PATCH v3 3/6] blk-crypto: make blk_crypto_evict_key() more robust
- Re: [PATCH v3 2/6] blk-crypto: make blk_crypto_evict_key() return void
- Re: [PATCH v3 5/6] blk-mq: return actual keyslot error in blk_insert_cloned_request()
- Re: [PATCH v3 5/6] blk-mq: return actual keyslot error in blk_insert_cloned_request()
- Re: [PATCH v3 5/6] blk-mq: return actual keyslot error in blk_insert_cloned_request()
- Re: [PATCH v3 5/6] blk-mq: return actual keyslot error in blk_insert_cloned_request()
- [PATCH v3 6/6] blk-crypto: drop the NULL check from blk_crypto_put_keyslot()
- [PATCH v3 2/6] blk-crypto: make blk_crypto_evict_key() return void
- [PATCH v3 4/6] blk-crypto: remove blk_crypto_insert_cloned_request()
- [PATCH v3 1/6] blk-mq: release crypto keyslot before reporting I/O complete
- [PATCH v3 3/6] blk-crypto: make blk_crypto_evict_key() more robust
- [PATCH v3 5/6] blk-mq: return actual keyslot error in blk_insert_cloned_request()
- [PATCH v3 0/6] Fix blk-crypto keyslot race condition
- Re: [PATCH v2 3/4] blk-crypto: remove blk_crypto_insert_cloned_request()
- Re: [PATCH v2 2/4] blk-crypto: make blk_crypto_evict_key() more robust
- Re: [PATCH 1/2] fscrypt: new helper function - fscrypt_prepare_atomic_open()
- Re: [PATCH 1/2] fscrypt: new helper function - fscrypt_prepare_atomic_open()
- Re: [PATCH v2 4/4] blk-crypto: drop the NULL check from blk_crypto_put_keyslot()
- Re: [PATCH v2 3/4] blk-crypto: remove blk_crypto_insert_cloned_request()
- Re: [PATCH v2 2/4] blk-crypto: make blk_crypto_evict_key() more robust
- Re: [PATCH v2 1/4] blk-mq: release crypto keyslot before reporting I/O complete
- Re: [PATCH v2 1/4] blk-mq: release crypto keyslot before reporting I/O complete
- Re: [PATCH 1/2] fscrypt: new helper function - fscrypt_prepare_atomic_open()
- Re: [PATCH v2 1/4] blk-mq: release crypto keyslot before reporting I/O complete
- Re: [PATCH 1/2] fscrypt: new helper function - fscrypt_prepare_atomic_open()
- Re: [PATCH v2 1/2] fscrypt: new helper function - fscrypt_prepare_atomic_open()
- [PATCH v2 2/2] ceph: switch atomic open to use new fscrypt helper
- [PATCH v2 1/2] fscrypt: new helper function - fscrypt_prepare_atomic_open()
[Index of Archives]
[linux Cryptography]
[Asterisk App Development]
[PJ SIP]
[Gnu Gatekeeper]
[Linux Kernel]
[Fedora Users]
[Yosemite Campsites]