Filesystem Crypto
[Prev Page][Next Page]
- Re: [RFC PATCH v10 11/17] dm-verity: consume root hash digest and signature data via LSM hook
- Re: [RFC PATCH v10 11/17] dm-verity: consume root hash digest and signature data via LSM hook
- Re: [RFC PATCH v3 9/9] btrfs: test snapshotting encrypted subvol
- [PATCH v3 01/17] btrfs: disable various operations on encrypted inodes
- [PATCH v3 09/17] btrfs: implement fscrypt ioctls
- [PATCH v3 02/17] btrfs: disable verity on encrypted inodes
- [PATCH v3 00/17] btrfs: add encryption feature
- [PATCH v3 06/17] btrfs: add new FEATURE_INCOMPAT_ENCRYPT flag
- [PATCH v3 05/17] btrfs: add inode encryption contexts
- [PATCH v3 08/17] btrfs: handle nokey names.
- [PATCH v3 04/17] btrfs: start using fscrypt hooks
- [PATCH v3 03/17] fscrypt: expose fscrypt_nokey_name
- [PATCH v3 16/16] fscrypt: update documentation for per-extent keys
- [PATCH v3 14/16] fscrypt: cache list of inlinecrypt devices
- [PATCH v3 15/16] fscrypt: allow asynchronous info freeing
- [PATCH v3 07/17] btrfs: adapt readdir for encrypted and nokey names
- [PATCH v3 13/16] fscrypt: allow multiple extents to reference one info
- [PATCH v3 12/16] fscrypt: save session key credentials for extent infos
- [PATCH v3 11/16] fscrypt: allow load/save of extent contexts
- [PATCH v6 5/8] fscrypt: reduce special-casing of IV_INO_LBLK_32
- [PATCH v6 6/8] fscrypt: move all the shared mode key setup deeper
- [PATCH v6 4/8] fscrypt: move dirhash key setup away from IO key setup
- [PATCH v6 3/8] fscrypt: split setup_per_mode_enc_key()
- [PATCH v6 2/8] fscrypt: split and rename setup_file_encryption_key()
- [PATCH v6 8/8] fscrypt: make prepared keys record their type
- [PATCH v6 1/8] fscrypt: move inline crypt decision to info setup
- [PATCH v6 7/8] fscrypt: make infos have a pointer to prepared keys
- [RFC PATCH v3 9/9] btrfs: test snapshotting encrypted subvol
- [RFC PATCH v3 6/9] tests: adjust generic/429 for extent encryption
- [RFC PATCH v3 5/9] generic/613: write some actual data for btrfs
- [RFC PATCH v3 4/9] common/encrypt: enable making a encrypted btrfs filesystem
- [RFC PATCH v3 3/9] common/encrypt: add btrfs to get_ciphertext_filename
- [RFC PATCH v3 7/9] common/verity: explicitly don't allow btrfs encryption
- [RFC PATCH v3 2/9] common/encrypt: add btrfs to get_encryption_*nonce
- [RFC PATCH v3 1/9] common/encrypt: separate data and inode nonces
- [RFC PATCH v3 0/9] fstests: add btrfs encryption testing
- [RFC PATCH v3 8/9] btrfs: add simple test of reflink of encrypted data
- [PATCH v3 12/17] btrfs: turn on inlinecrypt mount option for encrypt
- [PATCH v3 11/17] btrfs: add get_devices hook for fscrypt
- [PATCH v3 10/17] btrfs: add encryption to CONFIG_BTRFS_DEBUG
- [PATCH v3 17/17] btrfs: save and load fscrypt extent contexts
- [PATCH v3 16/17] btrfs: explicitly track file extent length and encryption
- [PATCH v3 15/17] btrfs: start tracking extent encryption context info
- [PATCH v3 14/17] btrfs: create and free extent fscrypt_infos
- [PATCH v3 13/17] btrfs: turn on the encryption ioctls
- [PATCH v3 05/16] fscrypt: setup leaf inodes for extent encryption
- [PATCH v3 09/16] fscrypt: revamp key removal for extent encryption
- [PATCH v3 06/16] fscrypt: allow infos to be owned by extents
- [PATCH v3 08/16] fscrypt: move function call warning of busy inodes
- [PATCH v3 07/16] fscrypt: use an optional ino equivalent for per-extent infos
- [PATCH v3 10/16] fscrypt: add creation/usage/freeing of per-extent infos
- [PATCH v3 03/16] fscrypt: adjust effective lblks based on extents
- [PATCH v3 04/16] fscrypt: add a super_block pointer to fscrypt_info
- [PATCH v3 02/16] fscrypt: factor getting info for a specific block
- [PATCH v3 01/16] fscrypt: factor helper for locking master key
- [PATCH v3 00/16] fscrypt: add extent encryption
- [PATCH v6 0/8] fscrypt: preliminary rearrangmeents of key setup
- Re: [PATCH RFC v10 7/17] ipe: add userspace interface
- Re: [PATCH RFC v10 8/17] uapi|audit|ipe: add ipe auditing support
- RE: [PATCH v2 00/10] Hardware wrapped key support for qcom ice and ufs
- From: Gaurav Kashyap (QUIC)
- Re: [RFC PATCH v10 11/17] dm-verity: consume root hash digest and signature data via LSM hook
- Re: [PATCH v5 8/8] fscrypt: make prepared keys record their type
- Re: [PATCH v2 07/10] qcom_scm: scm call for create, prepare and import keys
- Re: [PATCH v2 02/10] qcom_scm: scm call for deriving a software secret
- Re: [PATCH v2 02/10] qcom_scm: scm call for deriving a software secret
- Re: [PATCH v2 07/10] qcom_scm: scm call for create, prepare and import keys
- Re: [PATCH v2 09/10] soc: qcom: support for generate, import and prepare key
- Re: [PATCH v2 02/10] qcom_scm: scm call for deriving a software secret
- Re: [PATCH v2 07/10] qcom_scm: scm call for create, prepare and import keys
- Re: [PATCH v2 00/10] Hardware wrapped key support for qcom ice and ufs
- Re: [PATCH v2 07/10] qcom_scm: scm call for create, prepare and import keys
- [PATCH v2 09/10] soc: qcom: support for generate, import and prepare key
- [PATCH v2 10/10] ufs: host: support for generate, import and prepare key
- [PATCH v2 08/10] ufs: core: add support for generate, import and prepare keys
- [PATCH v2 07/10] qcom_scm: scm call for create, prepare and import keys
- [PATCH v2 04/10] soc: qcom: ice: support for hardware wrapped keys
- [PATCH v2 03/10] soc: qcom: ice: add hwkm support in ice
- [PATCH v2 06/10] ufs: host: wrapped keys support in ufs qcom
- [PATCH v2 05/10] ufs: core: support wrapped keys in ufs core
- [PATCH v2 02/10] qcom_scm: scm call for deriving a software secret
- [PATCH v2 01/10] ice, ufs, mmc: use blk_crypto_key for program_key
- [PATCH v2 00/10] Hardware wrapped key support for qcom ice and ufs
- Re: [PATCH v2 04/17] btrfs: start using fscrypt hooks
- Re: [PATCH v2 17/17] btrfs: save and load fscrypt extent contexts
- Re: [PATCH v2 16/17] btrfs: explicitly track file extent length and encryption
- Re: [PATCH v2 15/17] btrfs: start tracking extent encryption context info
- Re: [PATCH v2 14/17] btrfs: create and free extent fscrypt_infos
- Re: [PATCH v2 12/17] btrfs: turn on inlinecrypt mount option for encrypt
- Re: [PATCH v2 11/17] btrfs: add get_devices hook for fscrypt
- Re: [PATCH v2 07/17] btrfs: adapt readdir for encrypted and nokey names
- Re: [PATCH v2 04/17] btrfs: start using fscrypt hooks
- Re: [PATCH v2 06/17] btrfs: add new FEATURE_INCOMPAT_ENCRYPT flag
- Re: [PATCH v2 05/17] btrfs: add inode encryption contexts
- Re: [PATCH v2 12/17] btrfs: turn on inlinecrypt mount option for encrypt
- Re: [PATCH v2 07/17] btrfs: adapt readdir for encrypted and nokey names
- Re: [PATCH v2 04/17] btrfs: start using fscrypt hooks
- Re: [PATCH v2 16/17] btrfs: explicitly track file extent length and encryption
- Re: [PATCH v2 12/14] fscrypt: allow load/save of extent contexts
- Re: [PATCH v2 11/14] fscrypt: add creation/usage/freeing of per-extent infos
- Re: [PATCH v2 10/14] fscrypt: revamp key removal for extent encryption
- Re: [PATCH v2 09/14] fscrypt: move function call warning of busy inodes
- Re: [PATCH v2 07/14] fscrypt: notify per-extent infos if master key vanishes
- Re: [PATCH v2 13/14] fscrypt: save session key credentials for extent infos
- [PATCH v2 11/17] btrfs: add get_devices hook for fscrypt
- [PATCH v2 15/17] btrfs: start tracking extent encryption context info
- [PATCH v2 13/17] btrfs: turn on the encryption ioctls
- [PATCH v2 14/17] btrfs: create and free extent fscrypt_infos
- [PATCH v2 16/17] btrfs: explicitly track file extent length and encryption
- [PATCH v2 17/17] btrfs: save and load fscrypt extent contexts
- [PATCH v2 10/17] btrfs: add encryption to CONFIG_BTRFS_DEBUG
- [PATCH v2 12/17] btrfs: turn on inlinecrypt mount option for encrypt
- [PATCH v2 09/17] btrfs: implement fscrypt ioctls
- [PATCH v2 08/17] btrfs: use correct name hash for nokey names
- [PATCH v2 07/17] btrfs: adapt readdir for encrypted and nokey names
- [PATCH v2 05/17] btrfs: add inode encryption contexts
- [PATCH v2 06/17] btrfs: add new FEATURE_INCOMPAT_ENCRYPT flag
- [PATCH v2 04/17] btrfs: start using fscrypt hooks
- [PATCH v2 03/17] fscrypt: expose fscrypt_nokey_name
- [PATCH v2 01/17] btrfs: disable various operations on encrypted inodes
- [PATCH v2 02/17] btrfs: disable verity on encrypted inodes
- [PATCH v2 00/17] btrfs: add encryption feature
- Re: [PATCH v1 05/17] btrfs: add inode encryption contexts
- Re: [PATCH v1 01/17] btrfs: disable various operations on encrypted inodes
- Re: [PATCH RFC v10 9/17] ipe: add permissive toggle
- Re: [PATCH RFC v10 8/17] uapi|audit|ipe: add ipe auditing support
- Re: [PATCH RFC v10 7/17] ipe: add userspace interface
- Re: [PATCH RFC v10 6/17] security: add new securityfs delete function
- Re: [PATCH RFC v10 5/17] ipe: introduce 'boot_verified' as a trust provider
- Re: [PATCH RFC v10 4/17] ipe: add LSM hooks on execution and kernel read
- Re: [PATCH RFC v10 3/17] ipe: add evaluation loop
- Re: [PATCH v2 05/14] fscrypt: setup leaf inodes for extent encryption
- Re: [PATCH v2 03/14] fscrypt: adjust effective lblks based on extents
- Re: [PATCH RFC v10 2/17] ipe: add policy parser
- Re: [PATCH RFC v10 1/17] security: add ipe lsm
- Re: [RFC PATCH v10 11/17] dm-verity: consume root hash digest and signature data via LSM hook
- Re: [RFC PATCH v2 1/8] common/encrypt: separate data and inode nonces
- [RFC PATCH v2 8/8] btrfs: add simple test of reflink of encrypted data
- [RFC PATCH v2 7/8] common/verity: explicitly don't allow btrfs encryption
- [RFC PATCH v2 6/8] tests: adjust generic/429 for extent encryption
- [RFC PATCH v2 5/8] generic/613: write some actual data for btrfs
- [RFC PATCH v2 4/8] common/encrypt: enable making a encrypted btrfs filesystem
- [RFC PATCH v2 2/8] common/encrypt: add btrfs to get_encryption_*nonce
- [RFC PATCH v2 3/8] common/encrypt: add btrfs to get_ciphertext_filename
- [RFC PATCH v2 1/8] common/encrypt: separate data and inode nonces
- [RFC PATCH v2 0/8] fstests: add btrfs encryption testing
- [PATCH v5 7/8] fscrypt: make infos have a pointer to prepared keys
- [PATCH v5 6/8] fscrypt: move all the shared mode key setup deeper
- [PATCH v5 5/8] fscrypt: reduce special-casing of IV_INO_LBLK_32
- [PATCH v2 10/14] fscrypt: revamp key removal for extent encryption
- [PATCH v2 12/14] fscrypt: allow load/save of extent contexts
- [PATCH v2 11/14] fscrypt: add creation/usage/freeing of per-extent infos
- [PATCH v2 14/14] fscrypt: update documentation for per-extent keys
- [PATCH v2 13/14] fscrypt: save session key credentials for extent infos
- [PATCH v2 09/14] fscrypt: move function call warning of busy inodes
- [PATCH v2 08/14] fscrypt: use an optional ino equivalent for per-extent infos
- [PATCH v2 06/14] fscrypt: allow infos to be owned by extents
- [PATCH v2 07/14] fscrypt: notify per-extent infos if master key vanishes
- [PATCH v2 05/14] fscrypt: setup leaf inodes for extent encryption
- [PATCH v2 02/14] fscrypt: factor getting info for a specific block
- [PATCH v2 03/14] fscrypt: adjust effective lblks based on extents
- [PATCH v2 04/14] fscrypt: add a super_block pointer to fscrypt_info
- [PATCH v2 01/14] fscrypt: factor helper for locking master key
- [PATCH v2 00/14] fscrypt: add extent encryption
- [PATCH v5 8/8] fscrypt: make prepared keys record their type
- [PATCH v5 4/8] fscrypt: move dirhash key setup away from IO key setup
- [PATCH v5 3/8] fscrypt: split setup_per_mode_enc_key()
- [PATCH v5 2/8] fscrypt: split and rename setup_file_encryption_key()
- [PATCH v5 0/8] fscrypt: some rearrangements of key setup
- [PATCH v5 1/8] fscrypt: move inline crypt decision to info setup
- Re: [PATCH RFC v10 12/17] ipe: add support for dm-verity as a trust provider
- Re: [PATCH RFC v10 8/17] uapi|audit|ipe: add ipe auditing support
- Re: [PATCH RFC v10 9/17] ipe: add permissive toggle
- Re: [PATCH RFC v10 7/17] ipe: add userspace interface
- Re: [PATCH RFC v10 6/17] security: add new securityfs delete function
- Re: [PATCH RFC v10 5/17] ipe: introduce 'boot_verified' as a trust provider
- Re: [PATCH RFC v10 3/17] ipe: add evaluation loop
- Re: [PATCH RFC v10 4/17] ipe: add LSM hooks on execution and kernel read
- Re: [PATCH RFC v10 2/17] ipe: add policy parser
- Re: [PATCH RFC v10 1/17] security: add ipe lsm
- Re: [PATCH v1 01/17] btrfs: disable various operations on encrypted inodes
- Re: [PATCH v1 05/17] btrfs: add inode encryption contexts
- Re: [RFC PATCH v10 11/17] dm-verity: consume root hash digest and signature data via LSM hook
- Re: [PATCH v1 00/12] fscrypt: add extent encryption
- Re: [PATCH v1 00/12] fscrypt: add extent encryption
- Re: [PATCH v1 00/12] fscrypt: add extent encryption
- Re: [PATCH v1 00/12] fscrypt: add extent encryption
- Re: [PATCH v1 00/12] fscrypt: add extent encryption
- Re: [PATCH v1 00/12] fscrypt: add extent encryption
- Re: [PATCH v1 00/12] fscrypt: add extent encryption
- Re: [PATCH v1 00/12] fscrypt: add extent encryption
- Re: [RFC PATCH 8/8] btrfs: add simple test of reflink of encrypted data
- Re: [PATCH v1 00/12] fscrypt: add extent encryption
- Re: [PATCH v1 00/12] fscrypt: add extent encryption
- RE: [PATCH v3 4/4] fscrypt: Add LEA-256-XTS, LEA-256-CTS support
- Re: [PATCH v3 4/4] fscrypt: Add LEA-256-XTS, LEA-256-CTS support
- [PATCH 2/2] fscrypt: document the LEA support
- [PATCH 1/2] fscrypt: improve the "Encryption modes and usage" section
- [PATCH 0/2] fscrypt: update the encryption mode docs
- [PATCH v4 1/4] crypto: LEA block cipher implementation
- [PATCH v4 2/4] crypto: add LEA testmgr tests
- [PATCH v4 4/4] fscrypt: Add LEA-256-XTS, LEA-256-CTS support
- [PATCH v4 0/4] crypto: LEA block cipher implementation
- [PATCH v4 3/4] blk-crypto: Add LEA-256-XTS blk-crypto support
- RE: [PATCH v3 4/4] fscrypt: Add LEA-256-XTS, LEA-256-CTS support
- Re: [PATCH v3 4/4] fscrypt: Add LEA-256-XTS, LEA-256-CTS support
- [RFC PATCH 8/8] btrfs: add simple test of reflink of encrypted data
- [RFC PATCH 7/8] common/verity: explicitly don't allow btrfs encryption
- [RFC PATCH 5/8] generic/613: write some actual data for btrfs
- [RFC PATCH 6/8] tests: adjust encryption tests for extent encryption
- [RFC PATCH 4/8] common/encrypt: enable making a encrypted btrfs filesystem
- [RFC PATCH 3/8] common/encrypt: add btrfs to get_ciphertext_filename
- [RFC PATCH 1/8] common/encrypt: separate data and inode nonces
- [RFC PATCH 2/8] common/encrypt: add btrfs to get_encryption_*nonce
- [RFC PATCH 0/8] fstests: add btrfs encryption testing
- Re: [PATCH v1 11/17] btrfs: add get_devices hook for fscrypt
- RE: [PATCH v3 4/4] fscrypt: Add LEA-256-XTS, LEA-256-CTS support
- Re: [PATCH v4 3/8] fscrypt: split setup_per_mode_enc_key()
- Re: [PATCH v1 09/12] fscrypt: add creation/usage/freeing of per-extent infos
- [PATCH v1 02/17] btrfs: disable verity on encrypted inodes
- [PATCH v1 15/17] btrfs: start tracking extent encryption context info
- [PATCH v1 01/17] btrfs: disable various operations on encrypted inodes
- [PATCH v1 12/17] btrfs: turn on inlinecrypt mount option for encrypt
- [PATCH v1 14/17] btrfs: create and free extent fscrypt_infos
- [PATCH v1 03/17] fscrypt: expose fscrypt_nokey_name
- [PATCH v4 1/8] fscrypt: move inline crypt decision to info setup
- [PATCH v1 00/17] btrfs: add encryption feature
- [PATCH v1 13/17] btrfs: turn on the encryption ioctls
- [PATCH v1 05/17] btrfs: add inode encryption contexts
- [PATCH v1 07/17] btrfs: adapt readdir for encrypted and nokey names
- [PATCH v1 06/17] btrfs: add new FEATURE_INCOMPAT_ENCRYPT flag
- [PATCH v1 17/17] btrfs: save and load fscrypt extent contexts
- [PATCH v1 09/17] btrfs: implement fscrypt ioctls
- [PATCH v1 11/17] btrfs: add get_devices hook for fscrypt
- [PATCH v1 10/17] btrfs: add encryption to CONFIG_BTRFS_DEBUG
- [PATCH v1 08/17] btrfs: use correct name hash for nokey names
- [PATCH v4 2/8] fscrypt: split and rename setup_file_encryption_key()
- [PATCH v1 16/17] btrfs: explicitly track file extent length and encryption
- [PATCH v1 04/17] btrfs: start using fscrypt hooks
- [PATCH v4 7/8] fscrypt: make infos have a pointer to prepared keys
- [PATCH v4 0/8] fscrypt: some rearrangements of key setup
- [PATCH v4 4/8] fscrypt: move dirhash key setup away from IO key setup
- [PATCH v4 8/8] fscrypt: make prepared keys record their type
- [PATCH v4 3/8] fscrypt: split setup_per_mode_enc_key()
- [PATCH v4 5/8] fscrypt: reduce special-casing of IV_INO_LBLK_32
- [PATCH v4 6/8] fscrypt: move all the shared mode key setup deeper
- [PATCH v1 11/12] fscrypt: save session key credentials for extent infos
- [PATCH v1 12/12] fscrypt: update documentation for per-extent keys
- [PATCH v1 10/12] fscrypt: allow load/save of extent contexts
- [PATCH v1 09/12] fscrypt: add creation/usage/freeing of per-extent infos
- [PATCH v1 08/12] fscrypt: use an optional ino equivalent for per-extent infos
- [PATCH v1 05/12] fscrypt: setup leaf inodes for extent encryption
- [PATCH v1 07/12] fscrypt: notify per-extent infos if master key vanishes
- [PATCH v1 06/12] fscrypt: allow infos to be owned by extents
- [PATCH v1 04/12] fscrypt: add a super_block pointer to fscrypt_info
- [PATCH v1 03/12] fscrypt: adjust effective lblks based on extents
- [PATCH v1 02/12] fscrypt: factor getting info for a specific block
- [PATCH v1 01/12] fscrypt: factor helper for locking master key
- [PATCH v1 00/12] fscrypt: add extent encryption
- [RFC PATCH v10 04/17] ipe: add LSM hooks on execution and kernel read
- [RFC PATCH v10 03/17] ipe: add evaluation loop
- [RFC PATCH v10 13/17] fsverity: consume builtin signature via LSM hook
- [RFC PATCH v10 11/17] dm-verity: consume root hash digest and signature data via LSM hook
- [RFC PATCH v10 05/17] ipe: introduce 'boot_verified' as a trust provider
- [RFC PATCH v10 12/17] ipe: add support for dm-verity as a trust provider
- [RFC PATCH v10 08/17] uapi|audit|ipe: add ipe auditing support
- [RFC PATCH v10 16/17] ipe: kunit test for parser
- [RFC PATCH v10 09/17] ipe: add permissive toggle
- [RFC PATCH v10 14/17] ipe: enable support for fs-verity as a trust provider
- [RFC PATCH v10 00/17] Integrity Policy Enforcement LSM (IPE)
- [RFC PATCH v10 10/17] block|security: add LSM blob to block_device
- [RFC PATCH v10 06/17] security: add new securityfs delete function
- [RFC PATCH v10 02/17] ipe: add policy parser
- [RFC PATCH v10 15/17] scripts: add boot policy generation program
- [RFC PATCH v10 07/17] ipe: add userspace interface
- [RFC PATCH v10 01/17] security: add ipe lsm
- [RFC PATCH v10 17/17] documentation: add ipe documentation
- Re: [PATCH v3 4/4] fscrypt: Add LEA-256-XTS, LEA-256-CTS support
- Re: [GIT PULL] fscrypt updates for 6.5
- [PATCH v3 0/4] crypto: LEA block cipher implementation
- [PATCH v3 3/4] blk-crypto: Add LEA-256-XTS blk-crypto support
- [PATCH v3 2/4] crypto: add LEA testmgr tests
- [PATCH v3 1/4] crypto: LEA block cipher implementation
- [PATCH v3 4/4] fscrypt: Add LEA-256-XTS, LEA-256-CTS support
- [GIT PULL] fscrypt updates for 6.5
- Re: [PATCH v2] fscrypt: Replace 1-element array with flexible array
- [PATCH v2] fscrypt: Replace 1-element array with flexible array
- Re: [PATCH] fscrypt: Replace 1-element array with flexible array
- Re: [PATCH] fscrypt: Replace 1-element array with flexible array
- Re: [PATCH] fscrypt: Replace 1-element array with flexible array
- Re: [PATCH] fscrypt: Replace 1-element array with flexible array
- [PATCH] fscrypt: Replace 1-element array with flexible array
- Re: [PATCH v1 0/7] fscrypt: add pooled prepared keys facility
- Re: [PATCH v1 0/7] fscrypt: add pooled prepared keys facility
- Re: fscrypt - Bug or Feature - mv file from encrypted to nonencrypted folder?
- Re: [PATCH v1 0/7] fscrypt: add pooled prepared keys facility
- Re: [PATCH v1 0/7] fscrypt: add pooled prepared keys facility
- Re: [PATCH v1 0/7] fscrypt: add pooled prepared keys facility
- Re: [PATCH v1 0/7] fscrypt: add pooled prepared keys facility
- Re: [GIT PULL] fscrypt updates for 6.4
- [GIT PULL] fscrypt updates for 6.4
- [PATCH v1 7/7] fscrypt: add lru mechanism to choose pooled key
- [PATCH v1 6/7] fscrypt: add facility to shrink a pool of keys
- [PATCH v1 5/7] fscrypt: reclaim pooled prepared keys under pressure
- [PATCH v1 4/7] fscrypt: add pooled prepared key locking around use
- [PATCH v1 3/7] fscrypt: add pooling of pooled prepared keys.
- [PATCH v1 2/7] fscrypt: set up pooled keys upon first use
- [PATCH v1 1/7] fscrypt: add new pooled prepared keys.
- [PATCH v1 0/7] fscrypt: add pooled prepared keys facility
- [PATCH v3 11/11] fscrypt: factor helper for locking master key
- [PATCH v3 10/11] fscrypt: split key alloc and preparation
- [PATCH v3 08/11] fscrypt: make prepared keys record their type.
- [PATCH v3 07/11] fscrypt: move all the shared mode key setup deeper
- [PATCH v3 09/11] fscrypt: lock every time a info needs a mode key
- [PATCH v3 06/11] fscrypt: make infos have a pointer to prepared keys
- [PATCH v3 05/11] fscrypt: reduce special-casing of IV_INO_LBLK_32
- [PATCH v3 04/11] fscrypt: move dirhash key setup away from IO key setup
- [PATCH v3 03/11] fscrypt: split setup_per_mode_enc_key()
- [PATCH v3 02/11] fscrypt: split and rename setup_file_encryption_key()
- [PATCH v3 01/11] fscrypt: move inline crypt decision to info setup.
- [PATCH v3 00/11] fscrypt: rearrangements preliminary to extent encryption
- [PATCH 11/11] fscrypt: factor helper for locking master key
- [PATCH 10/11] fscrypt: split key alloc and preparation
- [PATCH 09/11] fscrypt: lock every time a info needs a mode key
- [PATCH 08/11] fscrypt: make prepared keys record their type.
- [PATCH 07/11] fscrypt: move all the shared mode key setup deeper
- [PATCH 05/11] fscrypt: reduce special-casing of IV_INO_LBLK_32
- [PATCH 06/11] fscrypt: make infos have a pointer to prepared keys
- [PATCH 04/11] fscrypt: move dirhash key setup away from IO key setup
- [PATCH 02/11] fscrypt: split and rename setup_file_encryption_key()
- [PATCH 03/11] fscrypt: split setup_per_mode_enc_key()
- [PATCH 01/11] fscrypt: move inline crypt decision to info setup.
- Re: [RFC PATCH v9 05/16] ipe: add userspace interface
- Re: [RFC PATCH v9 05/16] ipe: add userspace interface
- Re: [RFC PATCH v9 05/16] ipe: add userspace interface
- Re: [RFC PATCH v9 05/16] ipe: add userspace interface
- Re: [RFC PATCH v9 05/16] ipe: add userspace interface
- Re: [RFC PATCH v9 05/16] ipe: add userspace interface
- Re: [RFC PATCH v9 07/16] uapi|audit|ipe: add ipe auditing support
- Re: [RFC PATCH v9 07/16] uapi|audit|ipe: add ipe auditing support
- Re: [RFC PATCH v9 05/16] ipe: add userspace interface
- Re: [PATCH v2 10/11] fscrypt: explicitly track prepared parts of key
- Re: [RFC PATCH v9 03/16] ipe: add evaluation loop and introduce 'boot_verified' as a trust provider
- Re: [RFC PATCH v9 02/16] ipe: add policy parser
- Re: [PATCH v2 10/11] fscrypt: explicitly track prepared parts of key
- Re: [PATCH v2 06/11] fscrypt: make infos have a pointer to prepared keys
- Re: [PATCH v2 10/11] fscrypt: explicitly track prepared parts of key
- Re: [PATCH v2 08/11] fscrypt: make ci->ci_direct_key a bool not a pointer
- Re: [PATCH v2 07/11] fscrypt: move all the shared mode key setup deeper
- Re: [PATCH v2 06/11] fscrypt: make infos have a pointer to prepared keys
- Re: [PATCH v2 05/11] fscrypt: reduce special-casing of IV_INO_LBLK_32
- Re: [PATCH v2 04/11] fscrypt: move dirhash key setup away from IO key setup
- Re: [PATCH v2 03/11] fscrypt: split and rename setup_per_mode_enc_key()
- Re: [PATCH v2 02/11] fscrypt: split and rename setup_file_encryption_key()
- Re: [PATCH v2 00/11] fscrypt: rearrangements preliminary to extent encryption
- Re: [RFC PATCH v9 06/16] ipe: add LSM hooks on execution and kernel read
- Re: [PATCH v1 00/10] fscrypt: rearrangements preliminary to extent encryption
- [PATCH v2 11/11] fscrypt: split key alloc and preparation
- [PATCH v2 10/11] fscrypt: explicitly track prepared parts of key
- [PATCH v2 09/11] fscrypt: make prepared keys record their type.
- [PATCH v2 08/11] fscrypt: make ci->ci_direct_key a bool not a pointer
- [PATCH v2 07/11] fscrypt: move all the shared mode key setup deeper
- [PATCH v2 06/11] fscrypt: make infos have a pointer to prepared keys
- [PATCH v2 05/11] fscrypt: reduce special-casing of IV_INO_LBLK_32
- [PATCH v2 04/11] fscrypt: move dirhash key setup away from IO key setup
- [PATCH v2 03/11] fscrypt: split and rename setup_per_mode_enc_key()
- [PATCH v2 02/11] fscrypt: split and rename setup_file_encryption_key()
- [PATCH v2 01/11] fscrypt: move inline crypt decision to info setup.
- [PATCH v2 00/11] fscrypt: rearrangements preliminary to extent encryption
- Re: [PATCH v1 00/10] fscrypt: rearrangements preliminary to extent encryption
- Re: [RFC PATCH v9 05/16] ipe: add userspace interface
- Re: [RFC PATCH v9 03/16] ipe: add evaluation loop and introduce 'boot_verified' as a trust provider
- [PATCH v1 02/10] fscrypt: split and rename setup_per_mode_enc_key()
- [PATCH v1 10/10] fscrypt: split key alloc and preparation
- [PATCH v1 09/10] fscrypt: explicitly track prepared parts of key
- [PATCH v1 01/10] fscrypt: split and rename setup_file_encryption_key()
- [PATCH v1 07/10] fscrypt: make ci->ci_direct_key a bool not a pointer
- [PATCH v1 05/10] fscrypt: make infos have a pointer to prepared keys
- [PATCH v1 04/10] fscrypt: reduce special-casing of IV_INO_LBLK_32
- [PATCH v1 06/10] fscrypt: move all the shared mode key setup deeper
- [PATCH v1 00/10] fscrypt: rearrangements preliminary to extent encryption
- [PATCH v1 03/10] fscrypt: move dirhash key setup away from IO key setup
- [PATCH v1 08/10] fscrypt: make prepared keys record their type.
- Re: [RFC PATCH v9 02/16] ipe: add policy parser
- Re: [RFC PATCH v9 01/16] security: add ipe lsm
- [PATCH] fscrypt: optimize fscrypt_initialize()
- Re: [GIT PULL] fscrypt fix for v6.3-rc4
- Re: [PATCH v3 0/3] ceph: fscrypt: fix atomic open bug for encrypted directories
- Re: [GIT PULL] fscrypt fix for v6.3-rc4
- Re: Is there any userland implementations of fscrypt
- Re: Is there any userland implementations of fscrypt
- [PATCH] fscrypt: use WARN_ON_ONCE instead of WARN_ON
- Re: [GIT PULL] fscrypt fix for v6.3-rc4
- Re: [GIT PULL] fscrypt fix for v6.3-rc4
- Re: [GIT PULL] fscrypt fix for v6.3-rc4
- Re: [PATCH v3 0/3] ceph: fscrypt: fix atomic open bug for encrypted directories
- [PATCH v4] fscrypt: new helper function - fscrypt_prepare_lookup_partial()
- Re: Is there any userland implementations of fscrypt
- [GIT PULL] fscrypt fix for v6.3-rc4
- Re: [PATCH 0/3] xfstests: make fscrypt-crypt-util self-tests work with OpenSSL 3.0
- Re: [PATCH v3 0/3] ceph: fscrypt: fix atomic open bug for encrypted directories
- Re: [PATCH 0/3] xfstests: make fscrypt-crypt-util self-tests work with OpenSSL 3.0
- Re: [PATCH v3 0/3] ceph: fscrypt: fix atomic open bug for encrypted directories
- Re: [PATCH v3 0/3] ceph: fscrypt: fix atomic open bug for encrypted directories
- Re: [PATCH v3 0/3] ceph: fscrypt: fix atomic open bug for encrypted directories
- [PATCH 0/3] xfstests: make fscrypt-crypt-util self-tests work with OpenSSL 3.0
- [PATCH 1/3] fscrypt-crypt-util: fix HKDF self-test with latest OpenSSL
- [PATCH 2/3] fscrypt-crypt-util: use OpenSSL EVP API for AES self-tests
- [PATCH 3/3] fscrypt-crypt-util: fix XTS self-test with latest OpenSSL
- Re: [RFC PATCH v9 07/16] uapi|audit|ipe: add ipe auditing support
- Re: [RFC PATCH v9 11/16] ipe: add support for dm-verity as a trust provider
- [PATCH v3 3/3] ceph: switch ceph_open_atomic() to use the new fscrypt helper
- [PATCH v3 2/3] ceph: switch ceph_open() to use new fscrypt helper
- [PATCH v3 1/3] fscrypt: new helper function - fscrypt_prepare_lookup_partial()
- [PATCH v3 0/3] ceph: fscrypt: fix atomic open bug for encrypted directories
- Re: [PATCH v3 0/6] Fix blk-crypto keyslot race condition
- Re: [PATCH v3 5/6] blk-mq: return actual keyslot error in blk_insert_cloned_request()
- Re: [PATCH v3 4/6] blk-crypto: remove blk_crypto_insert_cloned_request()
- Re: [PATCH v3 3/6] blk-crypto: make blk_crypto_evict_key() more robust
- Re: [PATCH v3 2/6] blk-crypto: make blk_crypto_evict_key() return void
- Re: [PATCH v3 5/6] blk-mq: return actual keyslot error in blk_insert_cloned_request()
- Re: [PATCH v3 5/6] blk-mq: return actual keyslot error in blk_insert_cloned_request()
- Re: [PATCH v3 5/6] blk-mq: return actual keyslot error in blk_insert_cloned_request()
- Re: [PATCH v3 5/6] blk-mq: return actual keyslot error in blk_insert_cloned_request()
- [PATCH v3 6/6] blk-crypto: drop the NULL check from blk_crypto_put_keyslot()
- [PATCH v3 2/6] blk-crypto: make blk_crypto_evict_key() return void
- [PATCH v3 4/6] blk-crypto: remove blk_crypto_insert_cloned_request()
- [PATCH v3 1/6] blk-mq: release crypto keyslot before reporting I/O complete
- [PATCH v3 3/6] blk-crypto: make blk_crypto_evict_key() more robust
- [PATCH v3 5/6] blk-mq: return actual keyslot error in blk_insert_cloned_request()
- [PATCH v3 0/6] Fix blk-crypto keyslot race condition
- Re: [PATCH v2 3/4] blk-crypto: remove blk_crypto_insert_cloned_request()
- Re: [PATCH v2 2/4] blk-crypto: make blk_crypto_evict_key() more robust
- Re: [PATCH 1/2] fscrypt: new helper function - fscrypt_prepare_atomic_open()
- Re: [PATCH 1/2] fscrypt: new helper function - fscrypt_prepare_atomic_open()
- Re: [PATCH v2 4/4] blk-crypto: drop the NULL check from blk_crypto_put_keyslot()
- Re: [PATCH v2 3/4] blk-crypto: remove blk_crypto_insert_cloned_request()
- Re: [PATCH v2 2/4] blk-crypto: make blk_crypto_evict_key() more robust
- Re: [PATCH v2 1/4] blk-mq: release crypto keyslot before reporting I/O complete
- Re: [PATCH v2 1/4] blk-mq: release crypto keyslot before reporting I/O complete
- Re: [PATCH 1/2] fscrypt: new helper function - fscrypt_prepare_atomic_open()
- Re: [PATCH v2 1/4] blk-mq: release crypto keyslot before reporting I/O complete
- Re: [PATCH 1/2] fscrypt: new helper function - fscrypt_prepare_atomic_open()
- Re: [PATCH v2 1/2] fscrypt: new helper function - fscrypt_prepare_atomic_open()
- [PATCH v2 2/2] ceph: switch atomic open to use new fscrypt helper
- [PATCH v2 1/2] fscrypt: new helper function - fscrypt_prepare_atomic_open()
- [PATCH v2 0/2] ceph: fscrypt: fix atomic open bug for encrypted directories
- Re: [PATCH 1/2] fscrypt: new helper function - fscrypt_prepare_atomic_open()
- Re: [PATCH 1/3] fscrypt: destroy keyring after security_sb_delete()
- Re: [PATCH 2/2] ceph: switch atomic open to use new fscrypt helper
- Re: [PATCH 1/2] fscrypt: new helper function - fscrypt_prepare_atomic_open()
- Re: [PATCH 1/2] fscrypt: new helper function - fscrypt_prepare_atomic_open()
- Re: [PATCH 1/2] fscrypt: new helper function - fscrypt_prepare_atomic_open()
- Re: [PATCH 1/2] fscrypt: new helper function - fscrypt_prepare_atomic_open()
- Re: [PATCH 2/2] ceph: switch atomic open to use new fscrypt helper
- Re: [syzbot] [fscrypt?] WARNING in fscrypt_destroy_keyring
- [PATCH 3/3] fscrypt: check for NULL keyring in fscrypt_put_master_key_activeref()
- [PATCH 2/3] fscrypt: improve fscrypt_destroy_keyring() documentation
- [PATCH 1/3] fscrypt: destroy keyring after security_sb_delete()
- [PATCH 0/3] Fix crash with fscrypt + Landlock
- Re: [PATCH v2 1/4] blk-mq: release crypto keyslot before reporting I/O complete
- Re: [PATCH 2/2] ceph: switch atomic open to use new fscrypt helper
- Re: [PATCH 2/2] ceph: switch atomic open to use new fscrypt helper
- Re: [PATCH 1/2] fscrypt: new helper function - fscrypt_prepare_atomic_open()
- Re: [PATCH 0/2] ceph: fscrypt: fix atomic open bug for encrypted directories
- [syzbot] [fscrypt?] WARNING in fscrypt_destroy_keyring
- [PATCH 1/2] fscrypt: new helper function - fscrypt_prepare_atomic_open()
- [PATCH 0/2] ceph: fscrypt: fix atomic open bug for encrypted directories
- [PATCH 2/2] ceph: switch atomic open to use new fscrypt helper
- Re: [PATCH 4.19] f2fs: fix cgroup writeback accounting with fs-layer encryption
- Re: [RFC PATCH 1/2] fscrypt: new helper function - __fscrypt_prepare_atomic_open()
- Re: [RFC PATCH 1/2] fscrypt: new helper function - __fscrypt_prepare_atomic_open()
- [RFC PATCH 2/2] ceph: switch atomic open to use new fscrypt helper
- [RFC PATCH 1/2] fscrypt: new helper function - __fscrypt_prepare_atomic_open()
- [RFC PATCH 0/2] ceph: fscrypt: fix atomic open bug for encrypted directories
- [PATCH v2 3/4] blk-crypto: remove blk_crypto_insert_cloned_request()
- [PATCH v2 1/4] blk-mq: release crypto keyslot before reporting I/O complete
- [PATCH v2 4/4] blk-crypto: drop the NULL check from blk_crypto_put_keyslot()
- [PATCH v2 2/4] blk-crypto: make blk_crypto_evict_key() more robust
- [PATCH v2 0/4] Fix blk-crypto keyslot race condition
- Re: [PATCH 1/3] blk-mq: release crypto keyslot before reporting I/O complete
- [PATCH 4.19] f2fs: fix cgroup writeback accounting with fs-layer encryption
- Re: [PATCH] ext4: fix cgroup writeback accounting with fs-layer encryption
- Re: [PATCH] ext4: fix cgroup writeback accounting with fs-layer encryption
- Re: [PATCH] fs/buffer.c: use b_folio for fscrypt work
- Re: [PATCH 2/3] blk-crypto: make blk_crypto_evict_key() more robust
- Re: [PATCH 2/3] blk-crypto: make blk_crypto_evict_key() more robust
- Re: [PATCH 2/3] blk-crypto: make blk_crypto_evict_key() more robust
- Re: [PATCH 1/3] blk-mq: release crypto keyslot before reporting I/O complete
- [PATCH 2/3] blk-crypto: make blk_crypto_evict_key() more robust
- [PATCH 3/3] blk-crypto: remove blk_crypto_insert_cloned_request()
- [PATCH 1/3] blk-mq: release crypto keyslot before reporting I/O complete
- [PATCH 0/3] Fix blk-crypto keyslot race condition
- Re: [PATCH] blk-crypto: make blk_crypto_evict_key() always try to evict
- Re: [PATCH] blk-crypto: make blk_crypto_evict_key() always try to evict
- Re: [RFC PATCH v9 11/16] ipe: add support for dm-verity as a trust provider
- Re: [RFC PATCH v9 09/16] block|security: add LSM blob to block_device
- Re: [RFC PATCH v9 08/16] ipe: add permissive toggle
- Re: [RFC PATCH v9 07/16] uapi|audit|ipe: add ipe auditing support
- Re: [RFC PATCH v9 06/16] ipe: add LSM hooks on execution and kernel read
- Re: [RFC PATCH v9 05/16] ipe: add userspace interface
- Re: [RFC PATCH v9 03/16] ipe: add evaluation loop and introduce 'boot_verified' as a trust provider
- Re: [RFC PATCH v9 02/16] ipe: add policy parser
- Re: [RFC PATCH v9 01/16] security: add ipe lsm
- Re: [RFC PATCH v9 03/16] ipe: add evaluation loop and introduce 'boot_verified' as a trust provider
- Re: [syzbot] [fscrypt?] possible deadlock in fscrypt_initialize (2)
- [syzbot] [fscrypt?] possible deadlock in fscrypt_initialize (2)
- Re: [syzbot] [ext4?] possible deadlock in start_this_handle (4)
- Re: [PATCH v2 00/11] fsverity: support for non-4K pages
- Re: [PATCH v2 00/11] fsverity: support for non-4K pages
- Re: [f2fs-dev] [PATCH] MAINTAINERS: update fscrypt git repo
- Re: [f2fs-dev] [PATCH v2 00/11] fsverity: support for non-4K pages
- Re: [f2fs-dev] [PATCH] MAINTAINERS: update fsverity git repo, list, and patchwork
- Re: [f2fs-dev] [PATCH 0/5] Add the test_dummy_encryption key on-demand
- [PATCH] blk-crypto: make blk_crypto_evict_key() always try to evict
- [PATCH] fs/buffer.c: use b_folio for fscrypt work
- Re: [RFC PATCH 00/17] fscrypt: add per-extent encryption keys
- Re: [RFC PATCH 00/17] fscrypt: add per-extent encryption keys
- Re: [RFC PATCH 00/17] fscrypt: add per-extent encryption keys
- Re: [GIT PULL] fscrypt updates for 6.3
- Re: [GIT PULL] fsverity updates for 6.3
- [GIT PULL] fsverity updates for 6.3
- [GIT PULL] fscrypt updates for 6.3
- Re: Backup/restore of fscrypt files and directories
- Re: [RFC PATCH v9 03/16] ipe: add evaluation loop and introduce 'boot_verified' as a trust provider
- Re: Backup/restore of fscrypt files and directories
- Re: Backup/restore of fscrypt files and directories
- Re: [RFC PATCH v9 06/16] ipe: add LSM hooks on execution and kernel read
- Re: [RFC PATCH v9 12/16] fsverity: consume builtin signature via LSM hook
- Re: [RFC PATCH v9 12/16] fsverity: consume builtin signature via LSM hook
- Re: Backup/restore of fscrypt files and directories
- Re: [PATCH 0/5] Add the test_dummy_encryption key on-demand
- Backup/restore of fscrypt files and directories
- [PATCH 2/5] ext4: stop calling fscrypt_add_test_dummy_key()
- [PATCH 1/5] fscrypt: add the test dummy encryption key on-demand
- [PATCH 3/5] f2fs: stop calling fscrypt_add_test_dummy_key()
- [PATCH 5/5] fscrypt: clean up fscrypt_add_test_dummy_key()
- [PATCH 4/5] fs/super.c: stop calling fscrypt_destroy_keyring() from __put_super()
- [PATCH 0/5] Add the test_dummy_encryption key on-demand
- Re: [RFC PATCH v9 00/16] Integrity Policy Enforcement LSM (IPE)
- Re: [RFC PATCH v9 13/16] ipe: enable support for fs-verity as a trust provider
- Re: [RFC PATCH v9 10/16] dm-verity: consume root hash digest and signature data via LSM hook
- Re: [f2fs-dev] [PATCH] f2fs: fix cgroup writeback accounting with fs-layer encryption
- Re: [PATCH v2 00/11] fsverity: support for non-4K pages
- Re: [PATCH] fscrypt: support decrypting data from large folios
- Re: [PATCH] f2fs: fix cgroup writeback accounting with fs-layer encryption
- Re: [PATCH] ext4: fix cgroup writeback accounting with fs-layer encryption
- Re: [f2fs-dev] [PATCH] f2fs: fix cgroup writeback accounting with fs-layer encryption
- Re: [PATCH] fscrypt: Copy the memcg information to the ciphertext page
- [PATCH] f2fs: fix cgroup writeback accounting with fs-layer encryption
- [PATCH] ext4: fix cgroup writeback accounting with fs-layer encryption
- Re: [PATCH] fscrypt: Copy the memcg information to the ciphertext page
- Re: [RFC PATCH v9 00/16] Integrity Policy Enforcement LSM (IPE)
- Re: [RFC PATCH v9 13/16] ipe: enable support for fs-verity as a trust provider
- Re: [RFC PATCH v9 10/16] dm-verity: consume root hash digest and signature data via LSM hook
- Re: [RFC PATCH v9 16/16] documentation: add ipe documentation
- Re: [RFC PATCH v9 13/16] ipe: enable support for fs-verity as a trust provider
- Re: [RFC PATCH v9 10/16] dm-verity: consume root hash digest and signature data via LSM hook
- Re: [RFC PATCH v9 02/16] ipe: add policy parser
- Re: [RFC PATCH v9 05/16] ipe: add userspace interface
- Re: [PATCH] fscrypt: Copy the memcg information to the ciphertext page
- Re: [RFC PATCH v9 00/16] Integrity Policy Enforcement LSM (IPE)
- Re: [RFC PATCH v9 09/16] block|security: add LSM blob to block_device
- Re: [PATCH] fscrypt: Copy the memcg information to the ciphertext page
- Re: [RFC PATCH v9 07/16] uapi|audit|ipe: add ipe auditing support
- Re: [RFC PATCH v9 03/16] ipe: add evaluation loop and introduce 'boot_verified' as a trust provider
- Re: [RFC PATCH v9 00/16] Integrity Policy Enforcement LSM (IPE)
- Re: [RFC PATCH v9 13/16] ipe: enable support for fs-verity as a trust provider
- Re: [RFC PATCH v9 10/16] dm-verity: consume root hash digest and signature data via LSM hook
- Re: [RFC PATCH v9 07/16] uapi|audit|ipe: add ipe auditing support
- Re: [RFC PATCH v9 06/16] ipe: add LSM hooks on execution and kernel read
- Re: [RFC PATCH v9 03/16] ipe: add evaluation loop and introduce 'boot_verified' as a trust provider
- Re: [RFC PATCH v9 02/16] ipe: add policy parser
- Re: [RFC PATCH v9 05/16] ipe: add userspace interface
- Re: [RFC PATCH v9 09/16] block|security: add LSM blob to block_device
- Re: [RFC PATCH v9 16/16] documentation: add ipe documentation
- [RFC PATCH v9 03/16] ipe: add evaluation loop and introduce 'boot_verified' as a trust provider
- [RFC PATCH v9 10/16] dm-verity: consume root hash digest and signature data via LSM hook
- [RFC PATCH v9 06/16] ipe: add LSM hooks on execution and kernel read
- [RFC PATCH v9 12/16] fsverity: consume builtin signature via LSM hook
- [RFC PATCH v9 08/16] ipe: add permissive toggle
- [RFC PATCH v9 05/16] ipe: add userspace interface
- [RFC PATCH v9 07/16] uapi|audit|ipe: add ipe auditing support
- [RFC PATCH v9 11/16] ipe: add support for dm-verity as a trust provider
- [RFC PATCH v9 16/16] documentation: add ipe documentation
- [RFC PATCH v9 09/16] block|security: add LSM blob to block_device
- [RFC PATCH v9 13/16] ipe: enable support for fs-verity as a trust provider
- [RFC PATCH v9 02/16] ipe: add policy parser
- [RFC PATCH v9 15/16] ipe: kunit test for parser
- [RFC PATCH v9 14/16] scripts: add boot policy generation program
- [RFC PATCH v9 00/16] Integrity Policy Enforcement LSM (IPE)
- [RFC PATCH v9 04/16] security: add new securityfs delete function
- [RFC PATCH v9 01/16] security: add ipe lsm
- Re: [PATCH] fscrypt: Copy the memcg information to the ciphertext page
- Re: [PATCH] fscrypt: Copy the memcg information to the ciphertext page
- [PATCH] fscrypt: Copy the memcg information to the ciphertext page
- From: Matthew Wilcox (Oracle)
- Re: [PATCH] fscrypt: support decrypting data from large folios
- Re: [PATCH] fscrypt: support decrypting data from large folios
- [PATCH] fscrypt: support decrypting data from large folios
- [ANNOUNCE] Moving the fsverity-utils git repo
- Re: [PATCH 4/4] fsverity: pass pos and size to ->write_merkle_tree_block
- Re: Please update fscrypt and fsverity branches in linux-next
- [ANNOUNCE] New mailing list for fsverity development
- Please update fscrypt and fsverity branches in linux-next
- Re: [GIT PULL] fscrypt MAINTAINERS entry update for 6.2-rc6
- Re: [GIT PULL] fsverity MAINTAINERS entry update for 6.2-rc6
- [GIT PULL] fscrypt MAINTAINERS entry update for 6.2-rc6
- [GIT PULL] fsverity MAINTAINERS entry update for 6.2-rc6
- Re: [PATCH v2 10/11] fs/buffer.c: support fsverity in block_read_full_folio()
- Re: [PATCH v2 10/11] fs/buffer.c: support fsverity in block_read_full_folio()
- Re: [e2fsprogs PATCH v2] e2fsck: don't allow journal inode to have encrypt flag
- [linux-next:master] BUILD REGRESSION f3381a7baf5ccbd091eb2c4fd2afd84266fcef24
- Re: [PATCH v3] generic/692: generalize the test for non-4K Merkle tree block sizes
- [PATCH] MAINTAINERS: update fscrypt git repo
- [PATCH] MAINTAINERS: update fsverity git repo, list, and patchwork
- Re: [PATCH v3] generic/692: generalize the test for non-4K Merkle tree block sizes
- [PATCH v3] generic/692: generalize the test for non-4K Merkle tree block sizes
- Re: [PATCH v2] generic/692: generalize the test for non-4K Merkle tree block sizes
- [PATCH v2] generic/692: generalize the test for non-4K Merkle tree block sizes
- Re: [PATCH v2 00/11] fsverity: support for non-4K pages
- Re: [PATCH v2 10/11] fs/buffer.c: support fsverity in block_read_full_folio()
- Re: [PATCH v2 10/11] fs/buffer.c: support fsverity in block_read_full_folio()
- Re: [PATCH v2 00/11] fsverity: support for non-4K pages
- Re: [e2fsprogs PATCH v2] e2fsck: don't allow journal inode to have encrypt flag
- Re: [PATCH v2 00/11] fsverity: support for non-4K pages
- Re: [PATCH v2 00/11] fsverity: support for non-4K pages
- Re: [PATCH v2 00/11] fsverity: support for non-4K pages
- Re: [PATCH] fsverity: remove debug messages and CONFIG_FS_VERITY_DEBUG
- Re: [PATCH 0/4] fsverity cleanups
- Re: [PATCH v2 00/11] fsverity: support for non-4K pages
- Re: Separate mailing list (and git and patchwork) for fsverity?
- Re: [RFC PATCH 15/17] fscrypt: allow load/save of extent contexts
- Re: [RFC PATCH 15/17] fscrypt: allow load/save of extent contexts
- Re: [RFC PATCH 15/17] fscrypt: allow load/save of extent contexts
- Re: [RFC PATCH 15/17] fscrypt: allow load/save of extent contexts
- Re: [RFC PATCH 15/17] fscrypt: allow load/save of extent contexts
- Re: [RFC PATCH 15/17] fscrypt: allow load/save of extent contexts
- Re: [RFC PATCH 01/17] fscrypt: factor accessing inode->i_crypt_info
- Re: [PATCH v3 00/10] xfstests: update verity tests for non-4K block and page size
- [RFC PATCH 13/17] fscrypt: use an optional ino equivalent for per-extent infos
- [RFC PATCH 01/17] fscrypt: factor accessing inode->i_crypt_info
- [RFC PATCH 15/17] fscrypt: allow load/save of extent contexts
- [RFC PATCH 05/17] fscrypt: use parent dir's info for extent-based encryption.
- [RFC PATCH 09/17] fscrypt: make fscrypt_setup_encryption_info generic for extents
- [RFC PATCH 03/17] fscrypt: adjust effective lblks based on extents
- [RFC PATCH 08/17] fscrypt: rename mk->mk_decrypted_inodes*
- [RFC PATCH 00/17] fscrypt: add per-extent encryption keys
- [RFC PATCH 04/17] fscrypt: factor out fscrypt_set_inode_info()
- [RFC PATCH 11/17] fscrypt: update all the *per_file_* function names
- [RFC PATCH 14/17] fscrypt: add creation/usage/freeing of per-extent infos
- [RFC PATCH 17/17] fscrypt: update documentation to mention per-extent keys.
- [RFC PATCH 02/17] fscrypt: separate getting info for a specific block
- [RFC PATCH 06/17] fscrypt: add a super_block pointer to fscrypt_info
- [RFC PATCH 12/17] fscrypt: notify per-extent infos if master key vanishes
- [RFC PATCH 10/17] fscrypt: let fscrypt_infos be owned by an extent
- [RFC PATCH 07/17] fscrypt: update comments about inodes to include extents
- [RFC PATCH 16/17] fscrypt: disable inline encryption for extent-based encryption
- Re: [RFC] fs-verity and encryption for EROFS
- Re: [RFC] fs-verity and encryption for EROFS
- Re: [PATCH] ceph: make sure all the files successfully put before unmounting
- Re: [PATCH] ceph: make sure all the files successfully put before unmounting
- Re: [PATCH v2 08/10] generic/574: test multiple Merkle tree block sizes
- [PATCH v3 03/10] common/verity: use FSV_BLOCK_SIZE by default
- [PATCH v3 01/10] common/verity: add and use _fsv_can_enable()
- [PATCH v3 08/10] generic/574: test multiple Merkle tree block sizes
- [PATCH v3 02/10] common/verity: set FSV_BLOCK_SIZE to an appropriate value
- [PATCH v3 10/10] generic/575: test 1K Merkle tree block size
[Index of Archives]
[linux Cryptography]
[Asterisk App Development]
[PJ SIP]
[Gnu Gatekeeper]
[Linux Kernel]
[Fedora Users]
[Yosemite Campsites]