Filesystem Crypto
[Prev Page][Next Page]
- [PATCH v4 5/8] ima: permit fsverity's file digests in the IMA measurement list
- [ANNOUNCE] fsverity-utils v1.5
- Re: [PATCH v3 0/8] ima: support fs-verity digests and signatures
- Re: [PATCH v3 7/8] ima: support fs-verity file digest based version 3 signatures
- Re: [PATCH v11 5/5] fscrypt: update documentation for direct I/O support
- Re: [PATCH v11 1/5] fscrypt: add functions for direct I/O support
- Re: [PATCH v3 7/8] ima: support fs-verity file digest based version 3 signatures
- Re: [PATCH v3 5/8] ima: include fsverity's file digests in the IMA measurement list
- Re: [PATCH v3 3/8] fs-verity: define a function to return the integrity protected file digest
- Re: [PATCH v3 0/8] ima: support fs-verity digests and signatures
- Re: [RFC][PATCH v3a 00/11] ima: support fs-verity digests and signatures (alternative)
- Re: [RFC][PATCH v3a 00/11] ima: support fs-verity digests and signatures (alternative)
- Re: [RFC][PATCH v3a 00/11] ima: support fs-verity digests and signatures (alternative)
- Re: [RFC][PATCH v3a 00/11] ima: support fs-verity digests and signatures (alternative)
- RE: [RFC][PATCH v3a 00/11] ima: support fs-verity digests and signatures (alternative)
- Re: [PATCH v11 4/5] f2fs: support direct I/O with fscrypt using blk-crypto
- [PATCH v11 2/5] iomap: support direct I/O with fscrypt using blk-crypto
- [PATCH v11 4/5] f2fs: support direct I/O with fscrypt using blk-crypto
- [PATCH v11 5/5] fscrypt: update documentation for direct I/O support
- [PATCH v11 3/5] ext4: support direct I/O with fscrypt using blk-crypto
- [PATCH v11 1/5] fscrypt: add functions for direct I/O support
- [PATCH v11 0/5] add support for direct I/O with fscrypt using blk-crypto
- Re: [RFC PATCH v10 00/48] ceph+fscrypt: full support
- Re: [RFC PATCH v10 00/48] ceph+fscrypt: full support
- Re: [RFC][PATCH v3a 00/11] ima: support fs-verity digests and signatures (alternative)
- RE: [RFC][PATCH v3a 00/11] ima: support fs-verity digests and signatures (alternative)
- Re: [RFC][PATCH v3a 00/11] ima: support fs-verity digests and signatures (alternative)
- Re: [RFC][PATCH v3a 00/11] ima: support fs-verity digests and signatures (alternative)
- [RFC][PATCH v3a 10/11] evm: Include fsverity formatted digest in the HMAC/digest calculation
- [RFC][PATCH v3a 09/11] ima: Add support for fsverity signatures
- [RFC][PATCH v3a 00/11] ima: support fs-verity digests and signatures (alternative)
- [RFC][PATCH v3a 06/11] fsverity: Introduce fsverity_get_formatted_digest()
- [RFC][PATCH v3a 07/11] fsverity: Introduce fsverity_get_signature()
- [RFC][PATCH v3a 08/11] fsverity: Completely disable signature verification if not requested
- Re: [RFC PATCH v10 00/48] ceph+fscrypt: full support
- Re: [RFC PATCH v10 00/48] ceph+fscrypt: full support
- Re: [RFC PATCH v10 03/48] fscrypt: export fscrypt_fname_encrypt and fscrypt_fname_encrypted_size
- Re: [PATCH 00/10] Add wrapped key support for Qualcomm ICE
- Re: fscrypt and potential issues from file sparseness
- fscrypt and potential issues from file sparseness
- [PATCH v3 7/8] ima: support fs-verity file digest based version 3 signatures
- [PATCH v3 6/8] ima: define signature version 3
- [PATCH v3 8/8] fsverity: update the documentation
- [PATCH v3 5/8] ima: include fsverity's file digests in the IMA measurement list
- [PATCH v3 3/8] fs-verity: define a function to return the integrity protected file digest
- [PATCH v3 4/8] ima: define a new template field 'd-type' and a new template 'ima-ngv2'
- [PATCH v3 2/8] ima: define ima_max_digest_data struct without a flexible array variable
- [PATCH v3 1/8] ima: rename IMA_ACTION_FLAGS to IMA_NONACTION_FLAGS
- [PATCH v3 0/8] ima: support fs-verity digests and signatures
- Re: [PATCH v10 0/5] add support for direct I/O with fscrypt using blk-crypto
- Re: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
- RE: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
- Re: [PATCH v10 0/5] add support for direct I/O with fscrypt using blk-crypto
- Re: [PATCH v10 1/5] fscrypt: add functions for direct I/O support
- Re: [PATCH v10 0/5] add support for direct I/O with fscrypt using blk-crypto
- Re: [PATCH v10 0/5] add support for direct I/O with fscrypt using blk-crypto
- Re: [PATCH v10 0/5] add support for direct I/O with fscrypt using blk-crypto
- Re: [PATCH v10 0/5] add support for direct I/O with fscrypt using blk-crypto
- Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
- Re: [PATCH v10 0/5] add support for direct I/O with fscrypt using blk-crypto
- Re: [PATCH v10 0/5] add support for direct I/O with fscrypt using blk-crypto
- Re: [PATCH v10 0/5] add support for direct I/O with fscrypt using blk-crypto
- Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
- Re: [PATCH v10 1/5] fscrypt: add functions for direct I/O support
- Re: [PATCH v10 0/5] add support for direct I/O with fscrypt using blk-crypto
- Re: [PATCH v10 2/5] iomap: support direct I/O with fscrypt using blk-crypto
- Re: [PATCH v10 1/5] fscrypt: add functions for direct I/O support
- [PATCH v10 3/5] ext4: support direct I/O with fscrypt using blk-crypto
- [PATCH v10 5/5] fscrypt: update documentation for direct I/O support
- [PATCH v10 4/5] f2fs: support direct I/O with fscrypt using blk-crypto
- [PATCH v10 2/5] iomap: support direct I/O with fscrypt using blk-crypto
- [PATCH v10 1/5] fscrypt: add functions for direct I/O support
- [PATCH v10 0/5] add support for direct I/O with fscrypt using blk-crypto
- Re: [RFC PATCH v10 44/48] ceph: plumb in decryption during sync reads
- Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
- RE: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
- RE: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
- Re: [RFC PATCH v10 43/48] ceph: add read/modify/write to ceph_sync_write
- Re: [RFC PATCH v10 44/48] ceph: plumb in decryption during sync reads
- Re: [RFC PATCH v10 43/48] ceph: add read/modify/write to ceph_sync_write
- Re: [RFC PATCH v10 43/48] ceph: add read/modify/write to ceph_sync_write
- Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
- Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
- Re: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
- Re: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
- Re: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
- Re: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
- From: Konstantin Ryabitsev
- Re: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
- From: Maciej S. Szmigiero
- Re: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
- From: Konstantin Ryabitsev
- Re: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
- From: Konstantin Ryabitsev
- RE: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
- Re: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
- Re: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
- Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
- Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
- Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
- Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
- Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
- RE: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
- Re: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
- From: Maciej S. Szmigiero
- RE: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
- Re: [RFC PATCH v10 36/48] ceph: add truncate size handling support for fscrypt
- [PATCH v8] ceph: add truncate size handling support for fscrypt
- Re: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
- From: Maciej S. Szmigiero
- Re: [RFC PATCH v10 00/48] ceph+fscrypt: full support
- [RFC PATCH v10 45/48] ceph: set i_blkbits to crypto block size for encrypted inodes
- [RFC PATCH v10 48/48] ceph: fscrypt support for writepages
- [RFC PATCH v10 46/48] ceph: add fscrypt decryption support to ceph_netfs_issue_op
- [RFC PATCH v10 27/48] libceph: add CEPH_OSD_OP_ASSERT_VER support
- [RFC PATCH v10 33/48] ceph: add __ceph_sync_read helper support
- [RFC PATCH v10 37/48] libceph: allow ceph_osdc_new_request to accept a multi-op read
- [RFC PATCH v10 36/48] ceph: add truncate size handling support for fscrypt
- [RFC PATCH v10 34/48] ceph: add object version support for sync read
- [RFC PATCH v10 35/48] ceph: add infrastructure for file encryption and decryption
- [RFC PATCH v10 40/48] ceph: don't use special DIO path for encrypted inodes
- [RFC PATCH v10 38/48] ceph: disable fallocate for encrypted inodes
- [RFC PATCH v10 44/48] ceph: plumb in decryption during sync reads
- [RFC PATCH v10 42/48] ceph: align data in pages in ceph_sync_write
- [RFC PATCH v10 43/48] ceph: add read/modify/write to ceph_sync_write
- [RFC PATCH v10 41/48] ceph: set encryption context on open
- [RFC PATCH v10 39/48] ceph: disable copy offload on encrypted inodes
- [RFC PATCH v10 32/48] ceph: add __ceph_get_caps helper support
- [RFC PATCH v10 30/48] ceph: get file size from fscrypt_file when present in inode traces
- [RFC PATCH v10 31/48] ceph: handle fscrypt fields in cap messages from MDS
- [RFC PATCH v10 29/48] ceph: fscrypt_file field handling in MClientRequest messages
- [RFC PATCH v10 28/48] ceph: size handling for encrypted inodes in cap updates
- [RFC PATCH v10 20/48] ceph: add fscrypt support to ceph_fill_trace
- [RFC PATCH v10 18/48] ceph: make d_revalidate call fscrypt revalidator for encrypted dentries
- [RFC PATCH v10 19/48] ceph: add helpers for converting names for userland presentation
- [RFC PATCH v10 22/48] ceph: create symlinks with encrypted and base64-encoded targets
- [RFC PATCH v10 23/48] ceph: make ceph_get_name decrypt filenames
- [RFC PATCH v10 25/48] ceph: add some fscrypt guardrails
- [RFC PATCH v10 21/48] ceph: add support to readdir for encrypted filenames
- [RFC PATCH v10 47/48] ceph: add encryption support to writepage
- [RFC PATCH v10 15/48] ceph: send altname in MClientRequest
- [RFC PATCH v10 17/48] ceph: properly set DCACHE_NOKEY_NAME flag in lookup
- [RFC PATCH v10 16/48] ceph: encode encrypted name in dentry release
- [RFC PATCH v10 11/48] ceph: decode alternate_name in lease info
- [RFC PATCH v10 26/48] ceph: don't allow changing layout on encrypted files/directories
- [RFC PATCH v10 24/48] ceph: add a new ceph.fscrypt.auth vxattr
- [RFC PATCH v10 14/48] ceph: add encrypted fname handling to ceph_mdsc_build_path
- [RFC PATCH v10 13/48] ceph: make ceph_msdc_build_path use ref-walk
- [RFC PATCH v10 12/48] ceph: add fscrypt ioctls
- [RFC PATCH v10 08/48] ceph: add fscrypt_* handling to caps.c
- [RFC PATCH v10 10/48] ceph: implement -o test_dummy_encryption mount option
- [RFC PATCH v10 09/48] ceph: add ability to set fscrypt_auth via setattr
- [RFC PATCH v10 07/48] ceph: parse new fscrypt_auth and fscrypt_file fields in inode traces
- [RFC PATCH v10 05/48] ceph: preallocate inode for ops that may create one
- [RFC PATCH v10 06/48] ceph: crypto context handling for ceph
- [RFC PATCH v10 02/48] fscrypt: export fscrypt_base64url_encode and fscrypt_base64url_decode
- [RFC PATCH v10 04/48] fscrypt: add fscrypt_context_for_new_inode
- [RFC PATCH v10 03/48] fscrypt: export fscrypt_fname_encrypt and fscrypt_fname_encrypted_size
- [RFC PATCH v10 00/48] ceph+fscrypt: full support
- [RFC PATCH v10 01/48] vfs: export new_inode_pseudo
- [PATCH 14/14] KEYS: Introduce load_pgp_public_keyring()
- [PATCH 05/14] PGPLIB: Signature parser
- [PATCH 08/14] KEYS: PGP-based public key signature verification
- [PATCH 12/14] PGP: Provide a key type for testing PGP signatures
- [PATCH 11/14] verification: introduce verify_pgp_signature()
- [PATCH 06/14] KEYS: PGP data parser
- [PATCH 07/14] KEYS: Provide PGP key description autogeneration
- [PATCH 04/14] PGPLIB: Basic packet parser
- [PATCH 03/14] PGPLIB: PGP definitions (RFC 4880)
- [PATCH 13/14] KEYS: Provide a function to load keys from a PGP keyring blob
- [PATCH 10/14] KEYS: Calculate key digest and get signature of the key
- [PATCH 02/14] rsa: add parser of raw format
- [PATCH 09/14] KEYS: Retry asym key search with partial ID in restrict_link_by_signature()
- [PATCH 00/14] KEYS: Add support for PGP keys and signatures
- [PATCH 01/14] mpi: Introduce mpi_key_length()
- Re: [PATCH v2 5/6] ima: support fs-verity file digest based signatures
- Re: [PATCH v2 5/6] ima: support fs-verity file digest based signatures
- Re: [PATCH v2 5/6] ima: support fs-verity file digest based signatures
- Re: [PATCH v2 2/6] fs-verity: define a function to return the integrity protected file digest
- Re: [PATCH v2 2/6] fs-verity: define a function to return the integrity protected file digest
- Re: [PATCH v2 5/6] ima: support fs-verity file digest based signatures
- Re: [PATCH v2 5/6] ima: support fs-verity file digest based signatures
- Re: [PATCH v2 2/6] fs-verity: define a function to return the integrity protected file digest
- Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
- Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
- [PATCH v2 5/6] ima: support fs-verity file digest based signatures
- [PATCH v2 6/6] fsverity: update the documentation
- [PATCH v2 3/6] ima: define a new template field 'd-type' and a new template 'ima-ngv2'
- [PATCH v2 4/6] ima: include fsverity's file digests in the IMA measurement list
- [PATCH v2 2/6] fs-verity: define a function to return the integrity protected file digest
- [PATCH v2 1/6] ima: rename IMA_ACTION_FLAGS to IMA_NONACTION_FLAGS
- [PATCH v2 0/6] ima: support fs-verity digests and signatures
- RE: [PATCH 00/10] Add wrapped key support for Qualcomm ICE
- Re: [PATCH 00/10] Add wrapped key support for Qualcomm ICE
- Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
- Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
- Re: [PATCH 05/36] fscrypt: uninline and export fscrypt_require_key
- Re: [PATCH 09/10] soc: qcom: support for generate, import and prepare key
- Re: [PATCH 08/10] scsi: ufs: add support for generate, import and prepare keys
- Re: [PATCH 07/10] qcom_scm: scm call for create, prepare and import keys
- Re: [PATCH 06/10] soc: qcom: add wrapped key support for ICE
- Re: [PATCH 05/10] scsi: ufs: prepare to support wrapped keys
- Re: [PATCH 04/10] soc: qcom: add HWKM library for storage encryption
- Re: [PATCH 03/10] qcom_scm: scm call for deriving a software secret
- Re: [PATCH 02/10] scsi: ufs: qcom: move ICE functionality to common library
- Re: [PATCH 01/10] soc: qcom: new common library for ICE functionality
- Re: [PATCH 02/36] fscrypt: export fscrypt_base64url_encode and fscrypt_base64url_decode
- Re: [PATCH 05/36] fscrypt: uninline and export fscrypt_require_key
- Re: [PATCH 05/36] fscrypt: uninline and export fscrypt_require_key
- Re: [PATCH 05/36] fscrypt: uninline and export fscrypt_require_key
- Re: [PATCH 05/36] fscrypt: uninline and export fscrypt_require_key
- Re: [PATCH 00/36] ceph+fscrypt: context, filename, symlink and size handling support
- Re: [PATCH 05/36] fscrypt: uninline and export fscrypt_require_key
- Re: [PATCH 04/36] fscrypt: add fscrypt_context_for_new_inode
- Re: [PATCH 00/36] ceph+fscrypt: context, filename, symlink and size handling support
- Re: [PATCH 03/36] fscrypt: export fscrypt_fname_encrypt and fscrypt_fname_encrypted_size
- Re: [PATCH 02/36] fscrypt: export fscrypt_base64url_encode and fscrypt_base64url_decode
- Re: [PATCH 00/36] ceph+fscrypt: context, filename, symlink and size handling support
- [PATCH 32/36] ceph: handle fscrypt fields in cap messages from MDS
- [PATCH 34/36] ceph: add __ceph_sync_read helper support
- [PATCH 36/36] ceph: add truncate size handling support for fscrypt
- [PATCH 33/36] ceph: add __ceph_get_caps helper support
- [PATCH 35/36] ceph: add object version support for sync read
- [PATCH 31/36] ceph: get file size from fscrypt_file when present in inode traces
- [PATCH 29/36] ceph: size handling for encrypted inodes in cap updates
- [PATCH 27/36] ceph: don't allow changing layout on encrypted files/directories
- [PATCH 30/36] ceph: fscrypt_file field handling in MClientRequest messages
- [PATCH 28/36] libceph: add CEPH_OSD_OP_ASSERT_VER support
- [PATCH 26/36] ceph: add some fscrypt guardrails
- [PATCH 25/36] ceph: add a new ceph.fscrypt.auth vxattr
- [PATCH 24/36] ceph: make ceph_get_name decrypt filenames
- [PATCH 23/36] ceph: create symlinks with encrypted and base64-encoded targets
- [PATCH 20/36] ceph: add helpers for converting names for userland presentation
- [PATCH 21/36] ceph: add fscrypt support to ceph_fill_trace
- [PATCH 22/36] ceph: add support to readdir for encrypted filenames
- [PATCH 18/36] ceph: properly set DCACHE_NOKEY_NAME flag in lookup
- [PATCH 17/36] ceph: encode encrypted name in dentry release
- [PATCH 16/36] ceph: send altname in MClientRequest
- [PATCH 19/36] ceph: make d_revalidate call fscrypt revalidator for encrypted dentries
- [PATCH 15/36] ceph: add encrypted fname handling to ceph_mdsc_build_path
- [PATCH 14/36] ceph: make ceph_msdc_build_path use ref-walk
- [PATCH 11/36] ceph: implement -o test_dummy_encryption mount option
- [PATCH 10/36] ceph: add ability to set fscrypt_auth via setattr
- [PATCH 13/36] ceph: add fscrypt ioctls
- [PATCH 12/36] ceph: decode alternate_name in lease info
- [PATCH 09/36] ceph: add fscrypt_* handling to caps.c
- [PATCH 08/36] ceph: parse new fscrypt_auth and fscrypt_file fields in inode traces
- [PATCH 07/36] ceph: crypto context handling for ceph
- [PATCH 05/36] fscrypt: uninline and export fscrypt_require_key
- [PATCH 06/36] ceph: preallocate inode for ops that may create one
- [PATCH 04/36] fscrypt: add fscrypt_context_for_new_inode
- [PATCH 03/36] fscrypt: export fscrypt_fname_encrypt and fscrypt_fname_encrypted_size
- [PATCH 02/36] fscrypt: export fscrypt_base64url_encode and fscrypt_base64url_decode
- [PATCH 01/36] vfs: export new_inode_pseudo
- [PATCH 00/36] ceph+fscrypt: context, filename, symlink and size handling support
- RE: [PATCH 0/4] Adds wrapped key support for inline storage encryption
- Re: [PATCH 0/4] Adds wrapped key support for inline storage encryption
- RE: [PATCH 0/4] Adds wrapped key support for inline storage encryption
- Re: [PATCH 01/10] soc: qcom: new common library for ICE functionality
- [PATCH 09/10] soc: qcom: support for generate, import and prepare key
- [PATCH 10/10] arm64: dts: qcom: sm8350: add ice and hwkm mappings
- [PATCH 08/10] scsi: ufs: add support for generate, import and prepare keys
- [PATCH 07/10] qcom_scm: scm call for create, prepare and import keys
- [PATCH 06/10] soc: qcom: add wrapped key support for ICE
- [PATCH 05/10] scsi: ufs: prepare to support wrapped keys
- [PATCH 04/10] soc: qcom: add HWKM library for storage encryption
- [PATCH 03/10] qcom_scm: scm call for deriving a software secret
- [PATCH 02/10] scsi: ufs: qcom: move ICE functionality to common library
- [PATCH 01/10] soc: qcom: new common library for ICE functionality
- [PATCH 00/10] Add wrapped key support for Qualcomm ICE
- RE: [RFC][PATCH] device mapper: Add builtin function dm_get_status()
- RE: [RFC][PATCH] device mapper: Add builtin function dm_get_status()
- Re: [RFC][PATCH] device mapper: Add builtin function dm_get_status()
- Re: [PATCH v1 3/5] ima: limit including fs-verity's file digest in measurement list
- Re: [PATCH v1 3/5] ima: limit including fs-verity's file digest in measurement list
- Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
- Re: [PATCH v1 1/5] fs-verity: define a function to return the integrity protected file digest
- Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
- Re: [PATCH v1 5/5] fsverity: update the documentation
- Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
- [PATCH v1 0/5] ima: support fs-verity signatures stored as
- Re: [PATCH 2/4] ima: define a new signature type named IMA_VERITY_DIGSIG
- [PATCH v1 5/5] fsverity: update the documentation
- [PATCH v1 4/5] ima: support fs-verity file digest based signatures
- [PATCH v1 3/5] ima: limit including fs-verity's file digest in measurement list
- [PATCH v1 2/5] ima: define a new signature type named IMA_VERITY_DIGSIG
- [PATCH v1 1/5] fs-verity: define a function to return the integrity protected file digest
- Re: [PATCH 2/4] ima: define a new signature type named IMA_VERITY_DIGSIG
- Re: [PATCH 2/4] ima: define a new signature type named IMA_VERITY_DIGSIG
- RE: [RFC][PATCH] device mapper: Add builtin function dm_get_status()
- Re: [RFC][PATCH] device mapper: Add builtin function dm_get_status()
- RE: [RFC][PATCH] device mapper: Add builtin function dm_get_status()
- Re: [RFC][PATCH] device mapper: Add builtin function dm_get_status()
- RE: [RFC][PATCH] device mapper: Add builtin function dm_get_status()
- [RFC][PATCH] device mapper: Add builtin function dm_get_status()
- Re: [PATCH 0/4] ima: support fs-verity signatures stored as
- Re: [RFC PATCH v7 11/16] ipe: add support for dm-verity as a trust provider
- Re: [PATCH 2/4] ima: define a new signature type named IMA_VERITY_DIGSIG
- Re: [PATCH 4/4] ima: support fs-verity file digest based signatures
- Re: [PATCH 3/4] ima: limit including fs-verity's file digest in measurement list
- Re: [PATCH 0/4] ima: support fs-verity signatures stored as
- Re: [PATCH 1/4] fs-verity: define a function to return the integrity protected file digest
- Re: [PATCH 4/4] ima: support fs-verity file digest based signatures
- From: Lakshmi Ramasubramanian
- Re: [PATCH 3/4] ima: limit including fs-verity's file digest in measurement list
- From: Lakshmi Ramasubramanian
- Re: [PATCH 1/4] fs-verity: define a function to return the integrity protected file digest
- From: Lakshmi Ramasubramanian
- Re: [PATCH 0/4] ima: support fs-verity signatures stored as
- Re: [PATCH 3/4] ima: limit including fs-verity's file digest in measurement list
- Re: [PATCH 2/4] ima: define a new signature type named IMA_VERITY_DIGSIG
- Re: [PATCH 1/4] fs-verity: define a function to return the integrity protected file digest
- Re: [PATCH 1/4] fs-verity: define a function to return the integrity protected file digest
- Re: [PATCH 1/4] fs-verity: define a function to return the integrity protected file digest
- [PATCH 1/4] fs-verity: define a function to return the integrity protected file digest
- [PATCH 2/4] ima: define a new signature type named IMA_VERITY_DIGSIG
- [PATCH 4/4] ima: support fs-verity file digest based signatures
- [PATCH 3/4] ima: limit including fs-verity's file digest in measurement list
- [PATCH 0/4] ima: support fs-verity signatures stored as
- RE: [RFC PATCH v7 11/16] ipe: add support for dm-verity as a trust provider
- RE: [RFC][PATCH 5/5] shmem: Add fsverity support
- [RFC PATCH v4 1/3] block: add basic hardware-wrapped key support
- [RFC PATCH v4 3/3] fscrypt: add support for hardware-wrapped keys
- [RFC PATCH v4 2/3] block: add ioctls to create and prepare hardware-wrapped keys
- [RFC PATCH v4 0/3] Support for hardware-wrapped inline encryption keys
- Re: [RFC][PATCH 5/5] shmem: Add fsverity support
- RE: [RFC][PATCH 2/5] fsverity: Revalidate built-in signatures at file open
- RE: [RFC][PATCH 5/5] shmem: Add fsverity support
- RE: [RFC][PATCH 4/5] shmem: Avoid segfault in shmem_read_mapping_page_gfp()
- Re: [PATCH AUTOSEL 5.10 021/101] fscrypt: allow 256-bit master keys with AES-256-XTS
- Re: [RFC][PATCH 2/5] fsverity: Revalidate built-in signatures at file open
- Re: [RFC][PATCH 5/5] shmem: Add fsverity support
- Re: [RFC][PATCH 4/5] shmem: Avoid segfault in shmem_read_mapping_page_gfp()
- RE: [RFC][PATCH 4/5] shmem: Avoid segfault in shmem_read_mapping_page_gfp()
- Re: [RFC][PATCH 4/5] shmem: Avoid segfault in shmem_read_mapping_page_gfp()
- [RFC][PATCH 5/5] shmem: Add fsverity support
- [RFC][PATCH 2/5] fsverity: Revalidate built-in signatures at file open
- [RFC][PATCH 4/5] shmem: Avoid segfault in shmem_read_mapping_page_gfp()
- [RFC][PATCH 3/5] fsverity: Do initialization earlier
- [RFC][PATCH 1/5] fsverity: Introduce fsverity_get_file_digest()
- [RFC][PATCH 0/5] shmem/fsverity: Prepare for mandatory integrity enforcement
- Re: [PATCH AUTOSEL 5.10 021/101] fscrypt: allow 256-bit master keys with AES-256-XTS
- [PATCH AUTOSEL 5.10 021/101] fscrypt: allow 256-bit master keys with AES-256-XTS
- [PATCH AUTOSEL 5.14 025/138] fscrypt: allow 256-bit master keys with AES-256-XTS
- [PATCH AUTOSEL 5.15 027/146] fscrypt: allow 256-bit master keys with AES-256-XTS
- [PATCH] generic/574: remove invalid test of read completely past EOF
- Re: [PATCH 4/4] soc: qcom: add wrapped key support for ICE
- Re: [PATCH 3/4] soc: qcom: add HWKM library for storage encryption
- Re: [PATCH 2/4] qcom_scm: scm call for deriving a software secret
- Re: [PATCH 1/4] ufs: move ICE functionality to a common library
- Re: [PATCH 0/4] Adds wrapped key support for inline storage encryption
- Re: [RFC PATCH v7 12/16] fsverity|security: add security hooks to fsverity digest and signature
- Re: [RFC PATCH v7 07/16] ipe: add auditing support
- Re: [RFC PATCH v7 14/16] scripts: add boot policy generation program
- Re: [RFC PATCH v7 04/16] ipe: add userspace interface
- [PATCH 4/4] soc: qcom: add wrapped key support for ICE
- [PATCH 3/4] soc: qcom: add HWKM library for storage encryption
- [PATCH 2/4] qcom_scm: scm call for deriving a software secret
- [PATCH 1/4] ufs: move ICE functionality to a common library
- [PATCH 0/4] Adds wrapped key support for inline storage encryption
- RE: [RFC PATCH v7 14/16] scripts: add boot policy generation program
- RE: [RFC PATCH v7 14/16] scripts: add boot policy generation program
- RE: [RFC PATCH v7 12/16] fsverity|security: add security hooks to fsverity digest and signature
- RE: [RFC PATCH v7 04/16] ipe: add userspace interface
- Re: [RFC PATCH v7 07/16] ipe: add auditing support
- Re: [GIT PULL] fscrypt updates for 5.16
- [GIT PULL] fscrypt updates for 5.16
- Re: [RFC PATCH v7 00/16] Integrity Policy Enforcement (IPE)
- Re: [RFC PATCH v7 12/16] fsverity|security: add security hooks to fsverity digest and signature
- Re: [RFC PATCH v7 12/16] fsverity|security: add security hooks to fsverity digest and signature
- RE: [RFC PATCH v7 12/16] fsverity|security: add security hooks to fsverity digest and signature
- RE: [RFC PATCH v7 05/16] ipe: add LSM hooks on execution and kernel read
- RE: [RFC PATCH v7 12/16] fsverity|security: add security hooks to fsverity digest and signature
- RE: [RFC PATCH v7 00/16] Integrity Policy Enforcement (IPE)
- Re: [RFC PATCH v7 12/16] fsverity|security: add security hooks to fsverity digest and signature
- Re: [RFC PATCH v7 12/16] fsverity|security: add security hooks to fsverity digest and signature
- Re: [RFC PATCH v7 05/16] ipe: add LSM hooks on execution and kernel read
- Re: [RFC PATCH v7 00/16] Integrity Policy Enforcement (IPE)
- Re: [RFC PATCH v7 07/16] ipe: add auditing support
- Re: Btrfs Fscrypt Design Document
- Re: Btrfs Fscrypt Design Document
- Re: Btrfs Fscrypt Design Document
- [PATCH] fscrypt: improve a few comments
- Re: Btrfs Fscrypt Design Document
- Re: Btrfs Fscrypt Design Document
- RE: [RFC PATCH v7 05/16] ipe: add LSM hooks on execution and kernel read
- RE: [RFC PATCH v7 00/16] Integrity Policy Enforcement (IPE)
- Re: Btrfs Fscrypt Design Document
- RE: [RFC PATCH v7 12/16] fsverity|security: add security hooks to fsverity digest and signature
- Re: Btrfs Fscrypt Design Document
- Btrfs Fscrypt Design Document
- [RFC PATCH v3 3/3] fscrypt: add support for hardware-wrapped keys
- [RFC PATCH v3 2/3] block: add ioctls to create and prepare hardware-wrapped keys
- [RFC PATCH v3 1/3] block: add basic hardware-wrapped key support
- [RFC PATCH v3 0/3] Support for hardware-wrapped inline encryption keys
- RE: [RFC PATCH v7 12/16] fsverity|security: add security hooks to fsverity digest and signature
- Re: [RFC PATCH v7 12/16] fsverity|security: add security hooks to fsverity digest and signature
- Re: [RFC PATCH v7 07/16] ipe: add auditing support
- Re: [RFC PATCH v7 05/16] ipe: add LSM hooks on execution and kernel read
- Re: [RFC PATCH v7 12/16] fsverity|security: add security hooks to fsverity digest and signature
- Re: [RFC PATCH v7 07/16] ipe: add auditing support
- Re: [RFC PATCH v7 07/16] ipe: add auditing support
- Re: [RFC PATCH v7 07/16] ipe: add auditing support
- Re: [RFC PATCH v7 05/16] ipe: add LSM hooks on execution and kernel read
- Re: [RFC PATCH v7 07/16] ipe: add auditing support
- Re: [RFC PATCH v7 12/16] fsverity|security: add security hooks to fsverity digest and signature
- [RFC PATCH v7 08/16] ipe: add permissive toggle
- [RFC PATCH v7 06/16] uapi|audit: add trust audit message definitions
- [RFC PATCH v7 07/16] ipe: add auditing support
- [RFC PATCH v7 05/16] ipe: add LSM hooks on execution and kernel read
- [RFC PATCH v7 09/16] ipe: introduce 'boot_verified' as a trust provider
- [RFC PATCH v7 11/16] ipe: add support for dm-verity as a trust provider
- [RFC PATCH v7 12/16] fsverity|security: add security hooks to fsverity digest and signature
- [RFC PATCH v7 14/16] scripts: add boot policy generation program
- [RFC PATCH v7 13/16] ipe: enable support for fs-verity as a trust provider
- [RFC PATCH v7 16/16] documentation: add ipe documentation
- [RFC PATCH v7 15/16] ipe: kunit tests
- [RFC PATCH v7 10/16] fs|dm-verity: add block_dev LSM blob and submit dm-verity data
- [RFC PATCH v7 02/16] ipe: add policy parser
- [RFC PATCH v7 03/16] ipe: add evaluation loop
- [RFC PATCH v7 00/16] Integrity Policy Enforcement (IPE)
- [RFC PATCH v7 04/16] ipe: add userspace interface
- [RFC PATCH v7 01/16] security: add ipe lsm & initial context creation
- Re: [GIT PULL] fsverity fix for 5.15-rc4
- Re: [GIT PULL] fsverity fix for 5.15-rc4
- [GIT PULL] fsverity fix for 5.15-rc4
- Re: [RFC PATCH v2 0/5] Support for hardware-wrapped inline encryption keys
- Re: [fsverity-utils] 1.4: test suite does not build
- Re: [PATCH] fs-verity: fix signed integer overflow with i_size near S64_MAX
- Re: [PATCH] fscrypt: clean up comments in bio.c
- Re: [PATCH] fscrypt: remove fscrypt_operations::max_namelen
- Re: [RFC PATCH v2 4/5] fscrypt: allow 256-bit master keys with AES-256-XTS
- Re: [RFC PATCH v2 3/5] fscrypt: improve documentation for inline encryption
- [PATCH v3] fscrypt: allow 256-bit master keys with AES-256-XTS
- Re: [fsverity-utils] 1.4: test suite does not build
- From: Aleksander Adamowski
- Re: [fsverity-utils] 1.4: test suite does not build
- Re: [fsverity-utils] 1.4: test suite does not build
- From: Aleksander Adamowski
- Re: [fsverity-utils] 1.4: test suite does not build
- 1.4: test suite does not build
- Re: [RFC PATCH v2 4/5] fscrypt: allow 256-bit master keys with AES-256-XTS
- Re: [PATCH v5 4/4] generic: test fs-verity EFBIG scenarios
- [PATCH] fs-verity: fix signed integer overflow with i_size near S64_MAX
- [RFC PATCH v2 5/5] fscrypt: add support for hardware-wrapped keys
- [RFC PATCH v2 3/5] fscrypt: improve documentation for inline encryption
- [RFC PATCH v2 4/5] fscrypt: allow 256-bit master keys with AES-256-XTS
- [RFC PATCH v2 2/5] block: add ioctls to create and prepare hardware-wrapped keys
- [RFC PATCH v2 1/5] block: add basic hardware-wrapped key support
- [RFC PATCH v2 0/5] Support for hardware-wrapped inline encryption keys
- Re: [PATCH v6 2/3] btrfs: initial fsverity support
- Re: [PATCH v6 2/3] btrfs: initial fsverity support
- Re: [PATCH v6 2/3] btrfs: initial fsverity support
- Re: [PATCH v6 2/3] btrfs: initial fsverity support
- Re: [RFC PATCH] fsverity: add enable sysctl
- Re: [RFC PATCH] fsverity: add enable sysctl
- Re: [PATCH v6 2/3] btrfs: initial fsverity support
- Re: [PATCH v6 2/3] btrfs: initial fsverity support
- Re: [PATCH v6 2/3] btrfs: initial fsverity support
- Re: [PATCH v6 2/3] btrfs: initial fsverity support
- Re: [PATCH v6 2/3] btrfs: initial fsverity support
- Re: [PATCH v6 2/3] btrfs: initial fsverity support
- Re: [RFC PATCH] fsverity: add enable sysctl
- [RFC PATCH] fsverity: add enable sysctl
- [PATCH v5 4/4] generic: test fs-verity EFBIG scenarios
- [PATCH v5 3/4] btrfs: test verity orphans with dmlogwrites
- [PATCH v5 2/4] generic/574: corrupt btrfs merkle tree data
- [PATCH v5 1/4] btrfs: test btrfs specific fsverity corruption
- [PATCH v5 0/4] tests for btrfs fsverity
- Re: [fsverity-utils PATCH v5] Implement PKCS#11 opaque keys support through OpenSSL pkcs11 engine
- Re: [PATCH 0/4] backport fscrypt symlink fixes to 4.19
- Re: [PATCH v4 4/4] generic: test fs-verity EFBIG scenarios
- Re: [PATCH v4 4/4] generic: test fs-verity EFBIG scenarios
- [fsverity-utils PATCH v5] Implement PKCS#11 opaque keys support through OpenSSL pkcs11 engine
- From: Aleksander Adamowski
- Re: [fsverity-utils PATCH v4] Implement PKCS#11 opaque keys support through OpenSSL pkcs11 engine
- From: Aleksander Adamowski
- [PATCH] fscrypt: clean up comments in bio.c
- [PATCH] fscrypt: remove fscrypt_operations::max_namelen
- Re: [fsverity-utils PATCH v4] Implement PKCS#11 opaque keys support through OpenSSL pkcs11 engine
- [fsverity-utils PATCH v4] Implement PKCS#11 opaque keys support through OpenSSL pkcs11 engine
- From: Aleksander Adamowski
- Re: [fsverity-utils PATCH v2] Implement PKCS#11 opaque keys support through OpenSSL pkcs11 engine
- From: Aleksander Adamowski
- Re: [fsverity-utils PATCH v2] Implement PKCS#11 opaque keys support through OpenSSL pkcs11 engine
- Re: [fsverity-utils PATCH v3] Implement PKCS#11 opaque keys support through OpenSSL pkcs11 engine
- From: Aleksander Adamowski
- Re: [fsverity-utils PATCH v2] Implement PKCS#11 opaque keys support through OpenSSL pkcs11 engine
- From: Aleksander Adamowski
- [fsverity-utils PATCH v3] Implement PKCS#11 opaque keys support through OpenSSL pkcs11 engine
- From: Aleksander Adamowski
- Re: [fsverity-utils PATCH v2] Implement PKCS#11 opaque keys support through OpenSSL pkcs11 engine
- Re: [fsverity-utils PATCH v2] Implement PKCS#11 opaque keys support through OpenSSL pkcs11 engine
- From: Aleksander Adamowski
- Re: [fsverity-utils PATCH v2] Implement PKCS#11 opaque keys support through OpenSSL pkcs11 engine
- [PATCH 4/4] ubifs: report correct st_size for encrypted symlinks
- [PATCH 3/4] f2fs: report correct st_size for encrypted symlinks
- [PATCH 2/4] ext4: report correct st_size for encrypted symlinks
- [PATCH 1/4] fscrypt: add fscrypt_symlink_getattr() for computing st_size
- [PATCH 0/4] backport fscrypt symlink fixes to 4.19
- [PATCH 5.10 05/29] ubifs: report correct st_size for encrypted symlinks
- [PATCH 5.10 04/29] f2fs: report correct st_size for encrypted symlinks
- [PATCH 5.10 03/29] ext4: report correct st_size for encrypted symlinks
- [PATCH 5.10 02/29] fscrypt: add fscrypt_symlink_getattr() for computing st_size
- Re: [PATCH 5.10 0/4] backport fscrypt symlink fixes to 5.10
- Re: [PATCH 5.4 0/4] backport fscrypt symlink fixes to 5.4
- Re: [RFC PATCH v8 09/24] ceph: add ability to set fscrypt_auth via setattr
- [PATCH 5.4 3/4] f2fs: report correct st_size for encrypted symlinks
- [PATCH 5.4 2/4] ext4: report correct st_size for encrypted symlinks
- [PATCH 5.4 4/4] ubifs: report correct st_size for encrypted symlinks
- [PATCH 5.4 1/4] fscrypt: add fscrypt_symlink_getattr() for computing st_size
- [PATCH 5.4 0/4] backport fscrypt symlink fixes to 5.4
- Re: [PATCH 5.10 0/4] backport fscrypt symlink fixes to 5.10
- [PATCH 5.10 2/4] ext4: report correct st_size for encrypted symlinks
- [PATCH 5.10 4/4] ubifs: report correct st_size for encrypted symlinks
- [PATCH 5.10 3/4] f2fs: report correct st_size for encrypted symlinks
- [PATCH 5.10 1/4] fscrypt: add fscrypt_symlink_getattr() for computing st_size
- [PATCH 5.10 0/4] backport fscrypt symlink fixes to 5.10
- Re: [RFC PATCH v8 09/24] ceph: add ability to set fscrypt_auth via setattr
- Re: [RFC PATCH v8 09/24] ceph: add ability to set fscrypt_auth via setattr
- Re: [RFC PATCH v8 09/24] ceph: add ability to set fscrypt_auth via setattr
- Re: [GIT PULL] fscrypt updates for 5.15
- Re: [RFC PATCH v8 09/24] ceph: add ability to set fscrypt_auth via setattr
- Re: [RFC PATCH v8 09/24] ceph: add ability to set fscrypt_auth via setattr
- Re: [RFC PATCH v8 09/24] ceph: add ability to set fscrypt_auth via setattr
- Re: [RFC PATCH v8 09/24] ceph: add ability to set fscrypt_auth via setattr
- Re: [RFC PATCH v8 09/24] ceph: add ability to set fscrypt_auth via setattr
- [GIT PULL] fscrypt updates for 5.15
- [fsverity-utils PATCH v2] Implement PKCS#11 opaque keys support through OpenSSL pkcs11 engine
- From: Aleksander Adamowski
- Re: [PATCH] Implement PKCS#11 opaque keys support through OpenSSL pkcs11 engine
- Re: [PATCH] Implement PKCS#11 opaque keys support through OpenSSL pkcs11 engine
- From: Aleksander Adamowski
- [RFC PATCH 3/4] fscrypt: allow 256-bit master keys with AES-256-XTS
- [RFC PATCH 4/4] fscrypt: add support for hardware-wrapped keys
- [RFC PATCH 2/4] fscrypt: improve documentation for inline encryption
- [RFC PATCH 1/4] block: add hardware-wrapped key support
- [RFC PATCH 0/4] Support for hardware-wrapped inline encryption keys
- Re: [PATCH] Implement PKCS#11 opaque keys support through OpenSSL pkcs11 engine
- [RFC PATCH v8 17/24] ceph: properly set DCACHE_NOKEY_NAME flag in lookup
- [RFC PATCH v8 16/24] ceph: encode encrypted name in dentry release
- [RFC PATCH v8 18/24] ceph: make d_revalidate call fscrypt revalidator for encrypted dentries
- [RFC PATCH v8 22/24] ceph: create symlinks with encrypted and base64-encoded targets
- [RFC PATCH v8 21/24] ceph: add support to readdir for encrypted filenames
- [RFC PATCH v8 24/24] ceph: add a new ceph.fscrypt.auth vxattr
- [RFC PATCH v8 23/24] ceph: make ceph_get_name decrypt filenames
- [RFC PATCH v8 19/24] ceph: add helpers for converting names for userland presentation
- [RFC PATCH v8 20/24] ceph: add fscrypt support to ceph_fill_trace
- [RFC PATCH v8 15/24] ceph: send altname in MClientRequest
- [RFC PATCH v8 14/24] ceph: add encrypted fname handling to ceph_mdsc_build_path
- [RFC PATCH v8 13/24] ceph: make ceph_msdc_build_path use ref-walk
- [RFC PATCH v8 12/24] ceph: decode alternate_name in lease info
- [RFC PATCH v8 10/24] ceph: implement -o test_dummy_encryption mount option
- [RFC PATCH v8 11/24] ceph: add fscrypt ioctls
- [RFC PATCH v8 08/24] ceph: crypto context handling for ceph
- [RFC PATCH v8 09/24] ceph: add ability to set fscrypt_auth via setattr
- [RFC PATCH v8 07/24] ceph: add fscrypt_* handling to caps.c
- [RFC PATCH v8 05/24] ceph: preallocate inode for ops that may create one
- [RFC PATCH v8 06/24] ceph: parse new fscrypt_auth and fscrypt_file fields in inode traces
- [RFC PATCH v8 04/24] fscrypt: add fscrypt_context_for_new_inode
- [RFC PATCH v8 03/24] fscrypt: export fscrypt_fname_encrypt and fscrypt_fname_encrypted_size
- [RFC PATCH v8 02/24] fscrypt: export fscrypt_base64url_encode and fscrypt_base64url_decode
- [RFC PATCH v8 01/24] vfs: export new_inode_pseudo
- [RFC PATCH v8 00/24] ceph+fscrypt: context, filename and symlink support
- [PATCH] Implement PKCS#11 opaque keys support through OpenSSL pkcs11 engine
- From: Aleksander Adamowski
- Re: [PATCH v2] fscrypt: support trusted keys
- Re: [PATCH v2] fscrypt: support trusted keys
- Re: [PATCH v2] fscrypt: support trusted keys
- Re: [PATCH v2] fscrypt: support trusted keys
- Re: [PATCH v2] fscrypt: support trusted keys
- Re: [PATCH v2] fscrypt: support trusted keys
- Re: [PATCH v2] fscrypt: support trusted keys
- Re: [PATCH v2] fscrypt: support trusted keys
- Re: [PATCH v2] fscrypt: support trusted keys
- Re: [PATCH v2] fscrypt: support trusted keys
- Re: [PATCH v2] fscrypt: support trusted keys
- Re: [PATCH v2] fscrypt: support trusted keys
- Re: [PATCH v2] fscrypt: support trusted keys
- Re: [PATCH v2] fscrypt: support trusted keys
- Re: [PATCH v2] fscrypt: support trusted keys
- Re: [PATCH v2] fscrypt: support trusted keys
- Re: [PATCH v2] fscrypt: support trusted keys
- Re: [PATCH v2] fscrypt: support trusted keys
- Re: [PATCH v2] fscrypt: support trusted keys
- Re: [PATCH v2] fscrypt: support trusted keys
- Re: [PATCH v2] fscrypt: support trusted keys
- Re: [PATCH v2] fscrypt: support trusted keys
- Re: [PATCH] fscrypt: document struct fscrypt_operations
- [PATCH v2] fscrypt: support trusted keys
- Re: [PATCH v9 0/9] add support for direct I/O with fscrypt using blk-crypto
- Re: [RFC PATCH v1] fscrypt: support encrypted and trusted keys
- Re: [PATCH] fs: reduce pointers while using file_ra_state_init()
- Re: [PATCH] fs: reduce pointers while using file_ra_state_init()
- Re: [RFC PATCH v1] fscrypt: support encrypted and trusted keys
- Re: [RFC PATCH v1] fscrypt: support encrypted and trusted keys
- Re: [PATCH] fs: reduce pointers while using file_ra_state_init()
- [PATCH] fscrypt: document struct fscrypt_operations
- Re: [RFC PATCH v1] fscrypt: support encrypted and trusted keys
- Re: [RFC PATCH v1] fscrypt: support encrypted and trusted keys
- Re: [RFC PATCH v1] fscrypt: support encrypted and trusted keys
- Re: [PATCH v6 0/3] btrfs: support fsverity
- Re: [PATCH v6 2/3] btrfs: initial fsverity support
- Re: [PATCH v6 2/3] btrfs: initial fsverity support
- Re: [RFC PATCH v1] fscrypt: support encrypted and trusted keys
- Re: [RFC PATCH v1] fscrypt: support encrypted and trusted keys
- [RFC PATCH v1] fscrypt: support encrypted and trusted keys
- Re: [PATCH] fs: reduce pointers while using file_ra_state_init()
- Re: [PATCH] fs: reduce pointers while using file_ra_state_init()
- Re: [PATCH] fs: reduce pointers while using file_ra_state_init()
- Re: [PATCH] fs: reduce pointers while using file_ra_state_init()
- Re: [PATCH] fs: reduce pointers while using file_ra_state_init()
- Re: [PATCH] fs: reduce pointers while using file_ra_state_init()
- [PATCH] fs: reduce pointers while using file_ra_state_init()
- Re: [PATCH] fscrypt: align Base64 encoding with RFC 4648 base64url
- Re: [PATCH 0/5] fscrypt: report correct st_size for encrypted symlinks
- Re: [PATCH v9 5/9] block: Make bio_iov_iter_get_pages() respect bio_required_sector_alignment()
- Re: [PATCH v9 5/9] block: Make bio_iov_iter_get_pages() respect bio_required_sector_alignment()
- Re: [PATCH v9 3/9] fscrypt: add functions for direct I/O support
- Re: [PATCH] fscrypt: align Base64 encoding with RFC 4648 base64url
- Re: [PATCH] fscrypt: align Base64 encoding with RFC 4648 base64url
- Re: [PATCH v9 6/9] iomap: support direct I/O with fscrypt using blk-crypto
- Re: [PATCH v9 0/9] add support for direct I/O with fscrypt using blk-crypto
- Re: [PATCH 4.9] fscrypt: don't ignore minor_hash when hash is 0
- Re: [PATCH] fscrypt: align Base64 encoding with RFC 4648 base64url
- [PATCH 2/3] common/encrypt: add helper function for filtering no-key names
- [PATCH 3/3] common/encrypt: accept '-' character in no-key names
- [PATCH 1/3] generic: update encryption tests to use term "no-key names"
- [PATCH 0/3] xfstests: fscrypt no-key name updates
- [PATCH] fscrypt: align Base64 encoding with RFC 4648 base64url
- [PATCH 4.9] fscrypt: don't ignore minor_hash when hash is 0
- Re: [PATCH 5.4/4.19/4.14] fscrypt: don't ignore minor_hash when hash is 0
- [PATCH 5.4/4.19/4.14] fscrypt: don't ignore minor_hash when hash is 0
- Re: [RFC PATCH v7 02/24] fscrypt: export fscrypt_base64_encode and fscrypt_base64_decode
- Re: [RFC PATCH v7 02/24] fscrypt: export fscrypt_base64_encode and fscrypt_base64_decode
- Re: [RFC PATCH v7 07/24] ceph: add fscrypt_* handling to caps.c
- Re: [RFC PATCH v7 15/24] ceph: add encrypted fname handling to ceph_mdsc_build_path
- Re: [RFC PATCH v7 02/24] fscrypt: export fscrypt_base64_encode and fscrypt_base64_decode
- Re: [RFC PATCH v7 07/24] ceph: add fscrypt_* handling to caps.c
- Re: [RFC PATCH v7 15/24] ceph: add encrypted fname handling to ceph_mdsc_build_path
- Re: [RFC PATCH v7 04/24] fscrypt: add fscrypt_context_for_new_inode
- Re: [RFC PATCH v7 03/24] fscrypt: export fscrypt_fname_encrypt and fscrypt_fname_encrypted_size
- Re: [RFC PATCH v7 02/24] fscrypt: export fscrypt_base64_encode and fscrypt_base64_decode
- Re: [PATCH v6 2/3] btrfs: initial fsverity support
- Re: [RFC PATCH v7 12/24] ceph: add fscrypt ioctls
- Re: [RFC PATCH v7 06/24] ceph: parse new fscrypt_auth and fscrypt_file fields in inode traces
- Re: [RFC PATCH v7 12/24] ceph: add fscrypt ioctls
- Re: [RFC PATCH v7 12/24] ceph: add fscrypt ioctls
- Re: [RFC PATCH v7 06/24] ceph: parse new fscrypt_auth and fscrypt_file fields in inode traces
- Re: [RFC PATCH v7 06/24] ceph: parse new fscrypt_auth and fscrypt_file fields in inode traces
- Re: [RFC PATCH v7 06/24] ceph: parse new fscrypt_auth and fscrypt_file fields in inode traces
- Re: [RFC PATCH v7 07/24] ceph: add fscrypt_* handling to caps.c
- Re: [RFC PATCH v7 06/24] ceph: parse new fscrypt_auth and fscrypt_file fields in inode traces
- Re: [RFC PATCH v7 11/24] ceph: add routine to create fscrypt context prior to RPC
- Re: [RFC PATCH v7 08/24] ceph: add ability to set fscrypt_auth via setattr
- Re: [RFC PATCH v7 06/24] ceph: parse new fscrypt_auth and fscrypt_file fields in inode traces
- Re: [RFC PATCH v7 08/24] ceph: add ability to set fscrypt_auth via setattr
- Re: [RFC PATCH v7 06/24] ceph: parse new fscrypt_auth and fscrypt_file fields in inode traces
- Re: [RFC PATCH v7 05/24] ceph: preallocate inode for ops that may create one
- Re: [RFC PATCH v7 07/24] ceph: add fscrypt_* handling to caps.c
- Re: [RFC PATCH v7 06/24] ceph: parse new fscrypt_auth and fscrypt_file fields in inode traces
- Re: [RFC PATCH v7 11/24] ceph: add routine to create fscrypt context prior to RPC
- Re: [RFC PATCH v7 08/24] ceph: add ability to set fscrypt_auth via setattr
- Re: [RFC PATCH v7 06/24] ceph: parse new fscrypt_auth and fscrypt_file fields in inode traces
- Re: [RFC PATCH v7 08/24] ceph: add ability to set fscrypt_auth via setattr
- Re: [RFC PATCH v7 07/24] ceph: add fscrypt_* handling to caps.c
- Re: [RFC PATCH v7 06/24] ceph: parse new fscrypt_auth and fscrypt_file fields in inode traces
- Re: [RFC PATCH v7 05/24] ceph: preallocate inode for ops that may create one
- [PATCH 5/5] fscrypt: remove mention of symlink st_size quirk from documentation
- [PATCH 4/5] ubifs: report correct st_size for encrypted symlinks
- [PATCH 2/5] ext4: report correct st_size for encrypted symlinks
- [PATCH 3/5] f2fs: report correct st_size for encrypted symlinks
- [PATCH 1/5] fscrypt: add fscrypt_symlink_getattr() for computing st_size
- [PATCH 0/5] fscrypt: report correct st_size for encrypted symlinks
- [PATCH v6 3/3] btrfs: verity metadata orphan items
- [PATCH v6 2/3] btrfs: initial fsverity support
- [PATCH v6 1/3] btrfs: add ro compat flags to inodes
- [PATCH v6 0/3] btrfs: support fsverity
- Re: [PATCH v5 2/3] btrfs: initial fsverity support
- Re: [PATCH v8 0/8] add support for direct I/O with fscrypt using blk-crypto
- Re: [GIT PULL] fscrypt updates for 5.14
- [GIT PULL] fscrypt updates for 5.14
- Re: [PATCH v5 2/3] btrfs: initial fsverity support
- [RFC PATCH v7 24/24] ceph: add a new ceph.fscrypt.auth vxattr
- [RFC PATCH v7 23/24] ceph: make ceph_get_name decrypt filenames
- [RFC PATCH v7 22/24] ceph: create symlinks with encrypted and base64-encoded targets
- [RFC PATCH v7 21/24] ceph: add support to readdir for encrypted filenames
- [RFC PATCH v7 20/24] ceph: add fscrypt support to ceph_fill_trace
[Index of Archives]
[linux Cryptography]
[Asterisk App Development]
[PJ SIP]
[Gnu Gatekeeper]
[Linux Kernel]
[Fedora Users]
[Yosemite Campsites]