Filesystem Crypto
[Prev Page][Next Page]
- Fwd: Hash algorithm ask for include in linux kernel..
- From: Jorge Alberto Medina Rosas
- Re: [PATCH v10 00/15] Support for hardware-wrapped inline encryption keys
- Re: [PATCH v10 00/15] Support for hardware-wrapped inline encryption keys
- Re: [PATCH v10 00/15] Support for hardware-wrapped inline encryption keys
- Re: [PATCH v10 07/15] mmc: sdhci-msm: convert to use custom crypto profile
- Re: [PATCH v10 06/15] mmc: crypto: add mmc_from_crypto_profile()
- Re: [PATCH v10 05/15] mmc: sdhci-msm: fix crypto key eviction
- [PATCH v2 2/3] common/encrypt: support hardware-wrapped key testing
- [PATCH v2 1/3] fscrypt-crypt-util: add hardware KDF support
- [PATCH v2 3/3] generic: verify ciphertext with hardware-wrapped keys
- [PATCH v2 0/3] xfstests: test the fscrypt hardware-wrapped key support
- [PATCH v10 15/15] ufs: qcom: add support for wrapped keys
- [PATCH v10 14/15] soc: qcom: ice: add HWKM support to the ICE driver
- [PATCH v10 13/15] fscrypt: add support for hardware-wrapped keys
- [PATCH v10 12/15] blk-crypto: add ioctls to create and prepare hardware-wrapped keys
- [PATCH v10 11/15] blk-crypto: show supported key types in sysfs
- [PATCH v10 10/15] blk-crypto: add basic hardware-wrapped key support
- [PATCH v10 08/15] firmware: qcom: scm: add calls for wrapped key support
- [PATCH v10 09/15] soc: qcom: ice: make qcom_ice_program_key() take struct blk_crypto_key
- [PATCH v10 07/15] mmc: sdhci-msm: convert to use custom crypto profile
- [PATCH v10 06/15] mmc: crypto: add mmc_from_crypto_profile()
- [PATCH v10 05/15] mmc: sdhci-msm: fix crypto key eviction
- [PATCH v10 04/15] ufs: crypto: remove ufs_hba_variant_ops::program_key
- [PATCH v10 03/15] ufs: qcom: convert to use UFSHCD_QUIRK_CUSTOM_CRYPTO_PROFILE
- [PATCH v10 02/15] ufs: crypto: add ufs_hba_from_crypto_profile()
- [PATCH v10 01/15] ufs: qcom: fix crypto key eviction
- [PATCH v10 00/15] Support for hardware-wrapped inline encryption keys
- Re: [PATCH v9 00/12] Support for hardware-wrapped inline encryption keys
- From: Bartosz Golaszewski
- Re: [PATCH v9 00/12] Support for hardware-wrapped inline encryption keys
- Re: [PATCH v9 00/12] Support for hardware-wrapped inline encryption keys
- From: Bartosz Golaszewski
- Re: [PATCH v9 00/12] Support for hardware-wrapped inline encryption keys
- From: Bartosz Golaszewski
- Re: [PATCH v9 00/12] Support for hardware-wrapped inline encryption keys
- Re: [PATCH v9 00/12] Support for hardware-wrapped inline encryption keys
- From: Bartosz Golaszewski
- Re: [PATCH v9 04/12] mmc: sdhci-msm: convert to use custom crypto profile
- [PATCH v9 12/12] ufs: qcom: add support for wrapped keys
- [PATCH v9 11/12] soc: qcom: ice: add HWKM support to the ICE driver
- [PATCH v9 10/12] fscrypt: add support for hardware-wrapped keys
- [PATCH v9 09/12] blk-crypto: add ioctls to create and prepare hardware-wrapped keys
- [PATCH v9 08/12] blk-crypto: show supported key types in sysfs
- [PATCH v9 07/12] blk-crypto: add basic hardware-wrapped key support
- [PATCH v9 06/12] soc: qcom: ice: make qcom_ice_program_key() take struct blk_crypto_key
- [PATCH v9 05/12] firmware: qcom: scm: add calls for wrapped key support
- [PATCH v9 04/12] mmc: sdhci-msm: convert to use custom crypto profile
- [PATCH v9 03/12] mmc: crypto: add mmc_from_crypto_profile()
- [PATCH v9 02/12] ufs: qcom: convert to use UFSHCD_QUIRK_CUSTOM_CRYPTO_PROFILE
- [PATCH v9 01/12] ufs: crypto: add ufs_hba_from_crypto_profile()
- [PATCH v9 00/12] Support for hardware-wrapped inline encryption keys
- Re: [PATCH RESEND v7 00/17] Hardware wrapped key support for QCom ICE and UFS core
- Re: [PATCH RESEND v7 00/17] Hardware wrapped key support for QCom ICE and UFS core
- [PATCH RESEND v7 15/17] ufs: host: add support for wrapped keys in QCom UFS
- From: Bartosz Golaszewski
- [PATCH RESEND v7 01/17] blk-crypto: add basic hardware-wrapped key support
- From: Bartosz Golaszewski
- [PATCH RESEND v7 06/17] firmware: qcom: scm: add a call for deriving the software secret
- From: Bartosz Golaszewski
- [PATCH RESEND v7 13/17] ufs: core: add support for deriving the software secret
- From: Bartosz Golaszewski
- [PATCH RESEND v7 02/17] blk-crypto: show supported key types in sysfs
- From: Bartosz Golaszewski
- Re: [PATCH RESEND v7 05/17] ice, ufs, mmc: use the blk_crypto_key struct when programming the key
- Re: [PATCH RESEND v7 10/17] soc: qcom: ice: add support for hardware wrapped keys
- [PATCH RESEND v7 17/17] ufs: host: add support for generating, importing and preparing wrapped keys
- From: Bartosz Golaszewski
- [PATCH RESEND v7 16/17] ufs: host: add a callback for deriving software secrets and use it
- From: Bartosz Golaszewski
- [PATCH RESEND v7 10/17] soc: qcom: ice: add support for hardware wrapped keys
- From: Bartosz Golaszewski
- [PATCH RESEND v7 12/17] ufs: core: add support for wrapped keys to UFS core
- From: Bartosz Golaszewski
- [PATCH RESEND v7 14/17] ufs: core: add support for generating, importing and preparing keys
- From: Bartosz Golaszewski
- [PATCH RESEND v7 04/17] fscrypt: add support for hardware-wrapped keys
- From: Bartosz Golaszewski
- [PATCH RESEND v7 11/17] soc: qcom: ice: add support for generating, importing and preparing keys
- From: Bartosz Golaszewski
- [PATCH RESEND v7 09/17] soc: qcom: ice: add HWKM support to the ICE driver
- From: Bartosz Golaszewski
- [PATCH RESEND v7 08/17] firmware: qcom: scm: add a call for checking wrapped key support
- From: Bartosz Golaszewski
- [PATCH RESEND v7 07/17] firmware: qcom: scm: add calls for creating, preparing and importing keys
- From: Bartosz Golaszewski
- [PATCH RESEND v7 05/17] ice, ufs, mmc: use the blk_crypto_key struct when programming the key
- From: Bartosz Golaszewski
- [PATCH RESEND v7 03/17] blk-crypto: add ioctls to create and prepare hardware-wrapped keys
- From: Bartosz Golaszewski
- [PATCH RESEND v7 00/17] Hardware wrapped key support for QCom ICE and UFS core
- From: Bartosz Golaszewski
- Re: [RFC PATCH 0/4] dm-default-key: target for filesystem metadata encryption
- Re: [RFC PATCH 2/4] block: add the bi_skip_dm_default_key flag
- Re: [RFC PATCH 0/4] dm-default-key: target for filesystem metadata encryption
- Re: [RFC PATCH 2/4] block: add the bi_skip_dm_default_key flag
- [RFC PATCH 4/4] ext4,f2fs: support metadata encryption via dm-default-key
- [RFC PATCH 3/4] dm-default-key: add target for filesystem metadata encryption
- [RFC PATCH 2/4] block: add the bi_skip_dm_default_key flag
- [RFC PATCH 1/4] block: export blk-crypto symbols required by dm-default-key
- [RFC PATCH 0/4] dm-default-key: target for filesystem metadata encryption
- [PATCH v7 17/17] ufs: host: add support for generating, importing and preparing wrapped keys
- From: Bartosz Golaszewski
- [PATCH v7 15/17] ufs: host: add support for wrapped keys in QCom UFS
- From: Bartosz Golaszewski
- [PATCH v7 16/17] ufs: host: add a callback for deriving software secrets and use it
- From: Bartosz Golaszewski
- [PATCH v7 14/17] ufs: core: add support for generating, importing and preparing keys
- From: Bartosz Golaszewski
- [PATCH v7 13/17] ufs: core: add support for deriving the software secret
- From: Bartosz Golaszewski
- [PATCH v7 12/17] ufs: core: add support for wrapped keys to UFS core
- From: Bartosz Golaszewski
- [PATCH v7 10/17] soc: qcom: ice: add support for hardware wrapped keys
- From: Bartosz Golaszewski
- [PATCH v7 09/17] soc: qcom: ice: add HWKM support to the ICE driver
- From: Bartosz Golaszewski
- [PATCH v7 11/17] soc: qcom: ice: add support for generating, importing and preparing keys
- From: Bartosz Golaszewski
- [PATCH v7 08/17] firmware: qcom: scm: add a call for checking wrapped key support
- From: Bartosz Golaszewski
- [PATCH v7 07/17] firmware: qcom: scm: add calls for creating, preparing and importing keys
- From: Bartosz Golaszewski
- [PATCH v7 06/17] firmware: qcom: scm: add a call for deriving the software secret
- From: Bartosz Golaszewski
- [PATCH v7 04/17] fscrypt: add support for hardware-wrapped keys
- From: Bartosz Golaszewski
- [PATCH v7 05/17] ice, ufs, mmc: use the blk_crypto_key struct when programming the key
- From: Bartosz Golaszewski
- [PATCH v7 03/17] blk-crypto: add ioctls to create and prepare hardware-wrapped keys
- From: Bartosz Golaszewski
- [PATCH v7 02/17] blk-crypto: show supported key types in sysfs
- From: Bartosz Golaszewski
- [PATCH v7 01/17] blk-crypto: add basic hardware-wrapped key support
- From: Bartosz Golaszewski
- [PATCH v7 00/17] Hardware wrapped key support for QCom ICE and UFS core
- From: Bartosz Golaszewski
- Re: [PATCH v3 02/19] crypto: testmgr: Include <linux/prandom.h> instead of <linux/random.h>
- Re: [PATCH v3 17/19] netem: Include <linux/prandom.h> in sch_netem.c
- Re: [PATCH v3 00/19] random: Resolve circular include dependency and include <linux/percpu.h>
- [PATCH v3 19/19] prandom: Include <linux/percpu.h> in <linux/prandom.h>
- [PATCH v3 18/19] random: Do not include <linux/prandom.h> in <linux/random.h>
- [PATCH v3 17/19] netem: Include <linux/prandom.h> in sch_netem.c
- [PATCH v3 16/19] lib/test_scanf: Include <linux/prandom.h> instead of <linux/random.h>
- [PATCH v3 15/19] lib/test_parman: Include <linux/prandom.h> instead of <linux/random.h>
- [PATCH v3 14/19] bpf/tests: Include <linux/prandom.h> instead of <linux/random.h>
- [PATCH v3 12/19] random32: Include <linux/prandom.h> instead of <linux/random.h>
- [PATCH v3 13/19] lib/rbtree-test: Include <linux/prandom.h> instead of <linux/random.h>
- [PATCH v3 11/19] kunit: string-stream-test: Include <linux/prandom.h>
- [PATCH v3 10/19] lib/interval_tree_test.c: Include <linux/prandom.h> instead of <linux/random.h>
- [PATCH v3 09/19] bpf: Include <linux/prandom.h> instead of <linux/random.h>
- [PATCH v3 08/19] scsi: libfcoe: Include <linux/prandom.h> instead of <linux/random.h>
- [PATCH v3 07/19] fscrypt: Include <linux/once.h> in fs/crypto/keyring.c
- [PATCH v3 06/19] mtd: tests: Include <linux/prandom.h> instead of <linux/random.h>
- [PATCH v3 05/19] media: vivid: Include <linux/prandom.h> in vivid-vid-cap.c
- [PATCH v3 04/19] drm/lib: Include <linux/prandom.h> instead of <linux/random.h>
- [PATCH v3 03/19] drm/i915/selftests: Include <linux/prandom.h> instead of <linux/random.h>
- [PATCH v3 02/19] crypto: testmgr: Include <linux/prandom.h> instead of <linux/random.h>
- [PATCH v3 01/19] x86/kaslr: Include <linux/prandom.h> instead of <linux/random.h>
- [PATCH v3 00/19] random: Resolve circular include dependency and include <linux/percpu.h>
- Re: [PATCH v6 06/17] firmware: qcom: scm: add a call for deriving the software secret
- From: Bartosz Golaszewski
- Re: [PATCH v6 09/17] soc: qcom: ice: add HWKM support to the ICE driver
- Re: [PATCH v6 09/17] soc: qcom: ice: add HWKM support to the ICE driver
- Re: [PATCH v6 09/17] soc: qcom: ice: add HWKM support to the ICE driver
- Re: [PATCH v6 09/17] soc: qcom: ice: add HWKM support to the ICE driver
- Re: [PATCH v6 09/17] soc: qcom: ice: add HWKM support to the ICE driver
- Re: [PATCH v6 09/17] soc: qcom: ice: add HWKM support to the ICE driver
- Re: [PATCH v6 09/17] soc: qcom: ice: add HWKM support to the ICE driver
- RE: [PATCH v6 09/17] soc: qcom: ice: add HWKM support to the ICE driver
- From: Gaurav Kashyap (QUIC)
- Re: [PATCH RESEND v2 02/19] crypto: testmgr: Include <linux/prandom.h> instead of <linux/random.h>
- Re: [PATCH RESEND v2 08/19] scsi: libfcoe: Include <linux/prandom.h> instead of <linux/random.h>
- Re: [PATCH RESEND v2 07/19] fscrypt: Include <linux/once.h> in fs/crypto/keyring.c
- Re: [PATCH v6 09/17] soc: qcom: ice: add HWKM support to the ICE driver
- RE: [PATCH v6 09/17] soc: qcom: ice: add HWKM support to the ICE driver
- From: Gaurav Kashyap (QUIC)
- Re: [PATCH RESEND v2 00/19] random: Resolve circular include dependency and include <linux/percpu.h>
- Re: [PATCH RESEND v2 00/19] random: Resolve circular include dependency and include <linux/percpu.h>
- Re: [PATCH RESEND v2 00/19] random: Resolve circular include dependency and include <linux/percpu.h>
- Re: [PATCH RESEND v2 16/19] lib/test_scanf: Include <linux/prandom.h> instead of <linux/random.h>
- Re: [PATCH v6 16/17] ufs: host: add a callback for deriving software secrets and use it
- Re: [PATCH v6 10/17] soc: qcom: ice: add support for hardware wrapped keys
- Re: [PATCH RESEND v2 05/19] media: vivid: Include <linux/prandom.h> in vivid-vid-cap.c
- Re: [PATCH v6 08/17] firmware: qcom: scm: add a call for checking wrapped key support
- Re: [PATCH v6 07/17] firmware: qcom: scm: add calls for creating, preparing and importing keys
- Re: [PATCH v6 06/17] firmware: qcom: scm: add a call for deriving the software secret
- Re: [PATCH RESEND v2 06/19] mtd: tests: Include <linux/prandom.h> instead of <linux/random.h>
- Re: [PATCH v6 09/17] soc: qcom: ice: add HWKM support to the ICE driver
- Re: [PATCH v6 09/17] soc: qcom: ice: add HWKM support to the ICE driver
- [PATCH RESEND v2 19/19] prandom: Include <linux/percpu.h> in <linux/prandom.h>
- [PATCH RESEND v2 18/19] random: Do not include <linux/prandom.h> in <linux/random.h>
- [PATCH RESEND v2 17/19] netem: Include <linux/prandom.h> in sch_netem.c
- [PATCH RESEND v2 16/19] lib/test_scanf: Include <linux/prandom.h> instead of <linux/random.h>
- [PATCH RESEND v2 15/19] lib/test_parman: Include <linux/prandom.h> instead of <linux/random.h>
- [PATCH RESEND v2 14/19] bpf/tests: Include <linux/prandom.h> instead of <linux/random.h>
- [PATCH RESEND v2 13/19] lib/rbtree-test: Include <linux/prandom.h> instead of <linux/random.h>
- [PATCH RESEND v2 12/19] random32: Include <linux/prandom.h> instead of <linux/random.h>
- [PATCH RESEND v2 11/19] kunit: string-stream-test: Include <linux/prandom.h> instead of <linux/random.h>
- [PATCH RESEND v2 10/19] lib/interval_tree_test.c: Include <linux/prandom.h> instead of <linux/random.h>
- [PATCH RESEND v2 09/19] bpf: Include <linux/prandom.h> instead of <linux/random.h>
- [PATCH RESEND v2 08/19] scsi: libfcoe: Include <linux/prandom.h> instead of <linux/random.h>
- [PATCH RESEND v2 07/19] fscrypt: Include <linux/once.h> in fs/crypto/keyring.c
- [PATCH RESEND v2 05/19] media: vivid: Include <linux/prandom.h> in vivid-vid-cap.c
- [PATCH RESEND v2 06/19] mtd: tests: Include <linux/prandom.h> instead of <linux/random.h>
- [PATCH RESEND v2 04/19] drm/lib: Include <linux/prandom.h> instead of <linux/random.h>
- [PATCH RESEND v2 03/19] drm/i915/selftests: Include <linux/prandom.h> instead of <linux/random.h>
- [PATCH RESEND v2 02/19] crypto: testmgr: Include <linux/prandom.h> instead of <linux/random.h>
- [PATCH RESEND v2 01/19] x86/kaslr: Include <linux/prandom.h> instead of <linux/random.h>
- [PATCH RESEND v2 00/19] random: Resolve circular include dependency and include <linux/percpu.h>
- [PATCH v2 19/19] prandom: Include <linux/percpu.h> in <linux/prandom.h>
- [PATCH v2 18/19] random: Do not include <linux/prandom.h> in <linux/random.h>
- [PATCH v2 17/19] netem: Include <linux/prandom.h> in sch_netem.c
- [PATCH v2 16/19] lib/test_scanf: Include <linux/prandom.h> instead of <linux/random.h>
- [PATCH v2 15/19] lib/test_parman: Include <linux/prandom.h> instead of <linux/random.h>
- [PATCH v2 14/19] bpf/tests: Include <linux/prandom.h> instead of <linux/random.h>
- [PATCH v2 13/19] lib/rbtree-test: Include <linux/prandom.h> instead of <linux/random.h>
- [PATCH v2 12/19] random32: Include <linux/prandom.h> instead of <linux/random.h>
- [PATCH v2 11/19] kunit: string-stream-test: Include <linux/prandom.h> instead of <linux/random.h>
- [PATCH v2 10/19] lib/interval_tree_test.c: Include <linux/prandom.h> instead of <linux/random.h>
- [PATCH v2 08/19] scsi: libfcoe: Include <linux/prandom.h> instead of <linux/random.h>
- [PATCH v2 09/19] bpf: Include <linux/prandom.h> instead of <linux/random.h>
- [PATCH v2 07/19] fscrypt: Include <linux/once.h> in fs/crypto/keyring.c
- [PATCH v2 06/19] mtd: tests: Include <linux/prandom.h> instead of <linux/random.h>
- [PATCH v2 05/19] media: vivid: Include <linux/prandom.h> in vivid-vid-cap.c
- [PATCH v2 04/19] drm/lib: Include <linux/prandom.h> instead of <linux/random.h>
- [PATCH v2 03/19] drm/i915/selftests: Include <linux/prandom.h> instead of <linux/random.h>
- [PATCH v2 02/19] crypto: testmgr: Include <linux/prandom.h> instead of <linux/random.h>
- [PATCH v2 00/19] random: Resolve circular include dependency and include <linux/percpu.h>
- [PATCH v2 01/19] x86/kaslr: Include <linux/prandom.h> instead of <linux/random.h>
- Re: [PATCH v6 09/17] soc: qcom: ice: add HWKM support to the ICE driver
- [PATCH v6 17/17] ufs: host: add support for generating, importing and preparing wrapped keys
- From: Bartosz Golaszewski
- [PATCH v6 16/17] ufs: host: add a callback for deriving software secrets and use it
- From: Bartosz Golaszewski
- [PATCH v6 14/17] ufs: core: add support for generating, importing and preparing keys
- From: Bartosz Golaszewski
- [PATCH v6 15/17] ufs: host: add support for wrapped keys in QCom UFS
- From: Bartosz Golaszewski
- [PATCH v6 12/17] ufs: core: add support for wrapped keys to UFS core
- From: Bartosz Golaszewski
- [PATCH v6 13/17] ufs: core: add support for deriving the software secret
- From: Bartosz Golaszewski
- [PATCH v6 11/17] soc: qcom: ice: add support for generating, importing and preparing keys
- From: Bartosz Golaszewski
- [PATCH v6 09/17] soc: qcom: ice: add HWKM support to the ICE driver
- From: Bartosz Golaszewski
- [PATCH v6 10/17] soc: qcom: ice: add support for hardware wrapped keys
- From: Bartosz Golaszewski
- [PATCH v6 08/17] firmware: qcom: scm: add a call for checking wrapped key support
- From: Bartosz Golaszewski
- [PATCH v6 07/17] firmware: qcom: scm: add calls for creating, preparing and importing keys
- From: Bartosz Golaszewski
- [PATCH v6 06/17] firmware: qcom: scm: add a call for deriving the software secret
- From: Bartosz Golaszewski
- [PATCH v6 04/17] fscrypt: add support for hardware-wrapped keys
- From: Bartosz Golaszewski
- [PATCH v6 05/17] ice, ufs, mmc: use the blk_crypto_key struct when programming the key
- From: Bartosz Golaszewski
- [PATCH v6 03/17] blk-crypto: add ioctls to create and prepare hardware-wrapped keys
- From: Bartosz Golaszewski
- [PATCH v6 01/17] blk-crypto: add basic hardware-wrapped key support
- From: Bartosz Golaszewski
- [PATCH v6 02/17] blk-crypto: show supported key types in sysfs
- From: Bartosz Golaszewski
- [PATCH v6 00/17] Hardware wrapped key support for QCom ICE and UFS core
- From: Bartosz Golaszewski
- Re: [PATCH 06/18] fscrypt: Include <linux/prandom.h> instead of <linux/random.h>
- Re: [PATCH 06/18] fscrypt: Include <linux/prandom.h> instead of <linux/random.h>
- Re: [PATCH 00/18] random: Include <linux/percpu.h> and resolve circular include dependency
- Re: [PATCH] ext4: Fix error message when rejecting the default hash
- Re: [PATCH 00/18] random: Include <linux/percpu.h> and resolve circular include dependency
- Re: [PATCH 00/18] random: Include <linux/percpu.h> and resolve circular include dependency
- [PATCH 00/18] random: Include <linux/percpu.h> and resolve circular include dependency
- [PATCH] ext4: Fix error message when rejecting the default hash
- From: Gabriel Krisman Bertazi
- Re: [PATCH V6] fs/ext4: Filesystem without casefold feature cannot be mounted with spihash
- Re: Software encryption at fscrypt causing the filesystem access unresponsive
- RE: Software encryption at fscrypt causing the filesystem access unresponsive
- From: Yuvaraj Ranganathan (QUIC)
- Re: Software encryption at fscrypt causing the filesystem access unresponsive
- Software encryption at fscrypt causing the filesystem access unresponsive
- From: Yuvaraj Ranganathan
- Re: [f2fs-dev] [PATCH 0/6] Remove page_mapping()
- Re: [PATCH] scsi: ufs: exynos: Don't resume FMP when crypto support disabled
- Re: [PATCH] scsi: ufs: exynos: Don't resume FMP when crypto support disabled
- [PATCH] scsi: ufs: exynos: Don't resume FMP when crypto support disabled
- Possible kernel bug: Ubuntu Kernel linux-image-6.5.0-44-generic appears to have issues with fscrypt running on CephFS backend.
- Re: [PATCH v3 0/6] Basic inline encryption support for ufs-exynos
- Re: [PATCH v3 0/6] Basic inline encryption support for ufs-exynos
- Re: [PATCH v2 6/6] scsi: ufs: exynos: Add support for Flash Memory Protector (FMP)
- Re: [PATCH v3 6/6] scsi: ufs: exynos: Add support for Flash Memory Protector (FMP)
- RE: [PATCH v3 6/6] scsi: ufs: exynos: Add support for Flash Memory Protector (FMP)
- RE: [PATCH v3 5/6] scsi: ufs: core: Add UFSHCD_QUIRK_KEYS_IN_PRDT
- RE: [PATCH v3 4/6] scsi: ufs: core: Add fill_crypto_prdt variant op
- RE: [PATCH v3 3/6] scsi: ufs: core: Add UFSHCD_QUIRK_BROKEN_CRYPTO_ENABLE
- RE: [PATCH v3 2/6] scsi: ufs: core: fold ufshcd_clear_keyslot() into its caller
- RE: [PATCH v3 1/6] scsi: ufs: core: Add UFSHCD_QUIRK_CUSTOM_CRYPTO_PROFILE
- RE: [PATCH v2 6/6] scsi: ufs: exynos: Add support for Flash Memory Protector (FMP)
- Re: [PATCH v3 6/6] scsi: ufs: exynos: Add support for Flash Memory Protector (FMP)
- Re: [PATCH v3 6/6] scsi: ufs: exynos: Add support for Flash Memory Protector (FMP)
- [PATCH v3 6/6] scsi: ufs: exynos: Add support for Flash Memory Protector (FMP)
- [PATCH v3 5/6] scsi: ufs: core: Add UFSHCD_QUIRK_KEYS_IN_PRDT
- [PATCH v3 4/6] scsi: ufs: core: Add fill_crypto_prdt variant op
- [PATCH v3 3/6] scsi: ufs: core: Add UFSHCD_QUIRK_BROKEN_CRYPTO_ENABLE
- [PATCH v3 1/6] scsi: ufs: core: Add UFSHCD_QUIRK_CUSTOM_CRYPTO_PROFILE
- [PATCH v3 2/6] scsi: ufs: core: fold ufshcd_clear_keyslot() into its caller
- [PATCH v3 0/6] Basic inline encryption support for ufs-exynos
- Re: [PATCH v2 6/6] scsi: ufs: exynos: Add support for Flash Memory Protector (FMP)
- Re: [PATCH v2 6/6] scsi: ufs: exynos: Add support for Flash Memory Protector (FMP)
- Re: [PATCH v2 1/6] scsi: ufs: core: Add UFSHCD_QUIRK_CUSTOM_CRYPTO_PROFILE
- Re: [PATCH v2 2/6] scsi: ufs: core: fold ufshcd_clear_keyslot() into its caller
- Re: [PATCH v2 4/6] scsi: ufs: core: Add fill_crypto_prdt variant op
- Re: [PATCH v2 3/6] scsi: ufs: core: Add UFSHCD_QUIRK_BROKEN_CRYPTO_ENABLE
- Re: [PATCH v2 5/6] scsi: ufs: core: Add UFSHCD_QUIRK_KEYS_IN_PRDT
- Re: [PATCH v2 6/6] scsi: ufs: exynos: Add support for Flash Memory Protector (FMP)
- Re: [PATCH v2 0/6] Basic inline encryption support for ufs-exynos
- Re: [PATCH v2 6/6] scsi: ufs: exynos: Add support for Flash Memory Protector (FMP)
- Re: [PATCH 6/6] scsi: ufs: exynos: Add support for Flash Memory Protector (FMP)
- Re: [PATCH 6/6] scsi: ufs: exynos: Add support for Flash Memory Protector (FMP)
- [PATCH v2 6/6] scsi: ufs: exynos: Add support for Flash Memory Protector (FMP)
- [PATCH v2 5/6] scsi: ufs: core: Add UFSHCD_QUIRK_KEYS_IN_PRDT
- [PATCH v2 4/6] scsi: ufs: core: Add fill_crypto_prdt variant op
- [PATCH v2 3/6] scsi: ufs: core: Add UFSHCD_QUIRK_BROKEN_CRYPTO_ENABLE
- [PATCH v2 2/6] scsi: ufs: core: fold ufshcd_clear_keyslot() into its caller
- [PATCH v2 0/6] Basic inline encryption support for ufs-exynos
- [PATCH v2 1/6] scsi: ufs: core: Add UFSHCD_QUIRK_CUSTOM_CRYPTO_PROFILE
- Re: [PATCH 6/6] scsi: ufs: exynos: Add support for Flash Memory Protector (FMP)
- Re: [PATCH 6/6] scsi: ufs: exynos: Add support for Flash Memory Protector (FMP)
- [PATCH 5/6] scsi: ufs: core: Add UFSHCD_QUIRK_KEYS_IN_PRDT
- [PATCH 6/6] scsi: ufs: exynos: Add support for Flash Memory Protector (FMP)
- [PATCH 4/6] scsi: ufs: core: Add fill_crypto_prdt variant op
- [PATCH 3/6] scsi: ufs: core: Add UFSHCD_QUIRK_BROKEN_CRYPTO_ENABLE
- [PATCH 2/6] scsi: ufs: core: fold ufshcd_clear_keyslot() into its caller
- [PATCH 1/6] scsi: ufs: core: Add UFSHCD_QUIRK_CUSTOM_CRYPTO_PROFILE
- [PATCH 0/6] Basic inline encryption support for ufs-exynos
- Re: [PATCH V5] ext4: check hash version and filesystem casefolded consistent
- [PATCH V6] fs/ext4: Filesystem without casefold feature cannot be mounted with spihash
- Re: [PATCH V5] ext4: check hash version and filesystem casefolded consistent
- Re: [PATCH V5] ext4: check hash version and filesystem casefolded consistent
- From: Gabriel Krisman Bertazi
- Re: [PATCH V3] ext4: check hash version and filesystem casefolded consistent
- Re: [PATCH V3] ext4: check hash version and filesystem casefolded consistent
- Re: [PATCH V5] ext4: check hash version and filesystem casefolded consistent
- Re: [PATCH V5] ext4: check hash version and filesystem casefolded consistent
- From: Gabriel Krisman Bertazi
- [PATCH V5] ext4: check hash version and filesystem casefolded consistent
- Re: [PATCH V4] ext4: check hash version and filesystem casefolded consistent
- [PATCH V4] ext4: check hash version and filesystem casefolded consistent
- Re: [PATCH V2] ext4: add casefolded feature check before setup encrypted info
- [PATCH V3] ext4: check hash version and filesystem casefolded consistent
- Re: [PATCH V2] ext4: add casefolded feature check before setup encrypted info
- Re: [PATCH V2] ext4: add casefolded feature check before setup encrypted info
- Re: [PATCH V2] ext4: add casefolded feature check before setup encrypted info
- [PATCH V2] ext4: add casefolded feature check before setup encrypted info
- Re: [PATCH] ext4: add casefolded file check
- Re: [PATCH] ext4: add casefolded file check
- Re: [PATCH] ext4: add casefolded file check
- [PATCH] ext4: add casefolded file check
- Re: [syzbot] [crypto?] KMSAN: uninit-value in aes_encrypt (5)
- [syzbot] [fscrypt?] WARNING in fscrypt_fname_siphash
- Re: [f2fs-dev] [PATCH 0/6] Remove page_mapping()
- Re: [GIT PULL] fscrypt update for 6.10
- [GIT PULL] fscrypt update for 6.10
- Re: [PATCH v2] fscrypt: try to avoid refing parent dentry in fscrypt_file_open
- [PATCH v2] fscrypt: try to avoid refing parent dentry in fscrypt_file_open
- Re: [PATCH] fscrypto: try to avoid refing parent dentry in fscrypt_file_open
- [PATCH] fscrypto: try to avoid refing parent dentry in fscrypt_file_open
- [linux-next:master] BUILD REGRESSION d04466706db5e241ee026f17b5f920e50dee26b5
- Re: [PATCH 3/6] memory-failure: Remove calls to page_mapping()
- Re: [PATCH 6/6] mm: Remove page_mapping()
- Re: [PATCH 6/6] mm: Remove page_mapping()
- Re: [PATCH 6/6] mm: Remove page_mapping()
- Re: [PATCH 5/6] userfault; Expand folio use in mfill_atomic_install_pte()
- Re: [PATCH 4/6] migrate: Expand the use of folio in __migrate_device_pages()
- Re: [PATCH 3/6] memory-failure: Remove calls to page_mapping()
- Re: [PATCH 2/6] f2fs: Convert f2fs_clear_page_cache_dirty_tag to use a folio
- Re: [PATCH 1/6] fscrypt: Convert bh_get_inode_and_lblk_num to use a folio
- Re: [PATCH 3/6] memory-failure: Remove calls to page_mapping()
- Re: [PATCH 1/6] fscrypt: Convert bh_get_inode_and_lblk_num to use a folio
- [PATCH 5/6] userfault; Expand folio use in mfill_atomic_install_pte()
- From: Matthew Wilcox (Oracle)
- [PATCH 0/6] Remove page_mapping()
- From: Matthew Wilcox (Oracle)
- [PATCH 6/6] mm: Remove page_mapping()
- From: Matthew Wilcox (Oracle)
- [PATCH 1/6] fscrypt: Convert bh_get_inode_and_lblk_num to use a folio
- From: Matthew Wilcox (Oracle)
- [PATCH 2/6] f2fs: Convert f2fs_clear_page_cache_dirty_tag to use a folio
- From: Matthew Wilcox (Oracle)
- [PATCH 4/6] migrate: Expand the use of folio in __migrate_device_pages()
- From: Matthew Wilcox (Oracle)
- [PATCH 3/6] memory-failure: Remove calls to page_mapping()
- From: Matthew Wilcox (Oracle)
- Re: [PATCH v4 00/46] btrfs: add fscrypt support
- Re: [PATCH v4 00/46] btrfs: add fscrypt support
- Re: Debian #1066832: [fsverity-utils] hard Build-Depends on unportable package pandoc
- Bug#1066832: Info received (Debian #1066832: [fsverity-utils] hard Build-Depends on unportable package pandoc)
- From: Debian Bug Tracking System
- Re: Debian #1066832: [fsverity-utils] hard Build-Depends on unportable package pandoc
- Re: [GIT PULL] fscrypt updates for 6.9
- Re: [RFC PATCH v14 15/19] fsverity: consume builtin signature via LSM hook
- Re: [RFC PATCH v14 15/19] fsverity: consume builtin signature via LSM hook
- Re: [RFC PATCH v14 15/19] fsverity: consume builtin signature via LSM hook
- Re: [RFC PATCH v14 15/19] fsverity: consume builtin signature via LSM hook
- Re: [RFC PATCH v14 15/19] fsverity: consume builtin signature via LSM hook
- Re: [RFC PATCH v14 15/19] fsverity: consume builtin signature via LSM hook
- [GIT PULL] fscrypt updates for 6.9
- Re: [RFC PATCH v14 15/19] fsverity: consume builtin signature via LSM hook
- Re: [RFC PATCH v14 15/19] fsverity: consume builtin signature via LSM hook
- Re: [RFC PATCH v14 05/19] initramfs|security: Add a security hook to do_populate_rootfs()
- Re: [RFC PATCH v14 01/19] security: add ipe lsm
- Re: [RFC PATCH v14 05/19] initramfs|security: Add a security hook to do_populate_rootfs()
- Re: [RFC PATCH v14 01/19] security: add ipe lsm
- Re: [RFC PATCH v14 00/19] Integrity Policy Enforcement LSM (IPE)
- Re: [RFC PATCH v14 17/19] scripts: add boot policy generation program
- Re: [RFC PATCH v14 16/19] ipe: enable support for fs-verity as a trust provider
- Re: [RFC PATCH v14 14/19] ipe: add support for dm-verity as a trust provider
- [RFC PATCH v14 19/19] documentation: add ipe documentation
- [RFC PATCH v14 17/19] scripts: add boot policy generation program
- [RFC PATCH v14 08/19] ipe: add userspace interface
- [RFC PATCH v14 16/19] ipe: enable support for fs-verity as a trust provider
- [RFC PATCH v14 11/19] block|security: add LSM blob to block_device
- [RFC PATCH v14 14/19] ipe: add support for dm-verity as a trust provider
- [RFC PATCH v14 18/19] ipe: kunit test for parser
- [RFC PATCH v14 15/19] fsverity: consume builtin signature via LSM hook
- [RFC PATCH v14 13/19] dm verity: consume root hash digest and signature data via LSM hook
- [RFC PATCH v14 09/19] uapi|audit|ipe: add ipe auditing support
- [RFC PATCH v14 12/19] dm: add finalize hook to target_type
- [RFC PATCH v14 06/19] ipe: introduce 'boot_verified' as a trust provider
- [RFC PATCH v14 10/19] ipe: add permissive toggle
- [RFC PATCH v14 07/19] security: add new securityfs delete function
- [RFC PATCH v14 05/19] initramfs|security: Add a security hook to do_populate_rootfs()
- [RFC PATCH v14 02/19] ipe: add policy parser
- [RFC PATCH v14 03/19] ipe: add evaluation loop
- [RFC PATCH v14 00/19] Integrity Policy Enforcement LSM (IPE)
- [RFC PATCH v14 04/19] ipe: add LSM hooks on execution and kernel read
- [RFC PATCH v14 01/19] security: add ipe lsm
- [PATCH] ceph: return -ENODATA when xattr doesn't exist for removexattr
- [syzbot] [fscrypt?] possible deadlock in fscrypt_setup_encryption_info
- Re: [RFC PATCH v13 14/20] dm verity: consume root hash digest and signature data via LSM hook
- Re: [RFC PATCH v13 14/20] dm verity: consume root hash digest and signature data via LSM hook
- Re: [RFC PATCH v13 13/20] dm: add finalize hook to target_type
- Re: [RFC PATCH v13 12/20] dm verity: set DM_TARGET_SINGLETON feature flag
- Re: [RFC PATCH v13 17/20] ipe: enable support for fs-verity as a trust provider
- Re: [RFC PATCH v13 17/20] ipe: enable support for fs-verity as a trust provider
- Re: [RFC PATCH v13 17/20] ipe: enable support for fs-verity as a trust provider
- Re: [RFC PATCH v13 17/20] ipe: enable support for fs-verity as a trust provider
- Re: [RFC PATCH v13 17/20] ipe: enable support for fs-verity as a trust provider
- [RFC PATCH v13 20/20] documentation: add ipe documentation
- [RFC PATCH v13 17/20] ipe: enable support for fs-verity as a trust provider
- [RFC PATCH v13 09/20] uapi|audit|ipe: add ipe auditing support
- [RFC PATCH v13 19/20] ipe: kunit test for parser
- [RFC PATCH v13 15/20] ipe: add support for dm-verity as a trust provider
- [RFC PATCH v13 18/20] scripts: add boot policy generation program
- [RFC PATCH v13 11/20] block|security: add LSM blob to block_device
- [RFC PATCH v13 08/20] ipe: add userspace interface
- [RFC PATCH v13 16/20] fsverity: consume builtin signature via LSM hook
- [RFC PATCH v13 12/20] dm verity: set DM_TARGET_SINGLETON feature flag
- [RFC PATCH v13 14/20] dm verity: consume root hash digest and signature data via LSM hook
- [RFC PATCH v13 13/20] dm: add finalize hook to target_type
- [RFC PATCH v13 10/20] ipe: add permissive toggle
- [RFC PATCH v13 07/20] security: add new securityfs delete function
- [RFC PATCH v13 06/20] ipe: introduce 'boot_verified' as a trust provider
- [RFC PATCH v13 05/20] initramfs|security: Add a security hook to do_populate_rootfs()
- [RFC PATCH v13 01/20] security: add ipe lsm
- [RFC PATCH v13 00/20] Integrity Policy Enforcement LSM (IPE)
- [RFC PATCH v13 04/20] ipe: add LSM hooks on execution and kernel read
- [RFC PATCH v13 02/20] ipe: add policy parser
- [RFC PATCH v13 03/20] ipe: add evaluation loop
- [PATCH] fscrypt: shrink the size of struct fscrypt_inode_info slightly
- [PATCH] fscrypt: write CBC-CTS instead of CTS-CBC
- Re: [PATCH] fscrypt: clear keyring before calling key_put()
- Re: [PATCH] fscrypt: clear keyring before calling key_put()
- Re: [PATCH RFC v12 15/20] ipe: add support for dm-verity as a trust provider
- [PATCH] fscrypt: clear keyring before calling key_put()
- Re: [PATCH RFC v12 8/20] ipe: add userspace interface
- Re: [PATCH RFC v12 15/20] ipe: add support for dm-verity as a trust provider
- Re: [PATCH RFC v12 8/20] ipe: add userspace interface
- Re: [PATCH RFC v12 8/20] ipe: add userspace interface
- Re: [PATCH RFC v12 6/20] ipe: introduce 'boot_verified' as a trust provider
- Re: [PATCH RFC v12 5/20] initramfs|security: Add security hook to initramfs unpack
- Re: [PATCH RFC v12 17/20] ipe: enable support for fs-verity as a trust provider
- Re: [PATCH RFC v12 15/20] ipe: add support for dm-verity as a trust provider
- Re: [PATCH RFC v12 9/20] uapi|audit|ipe: add ipe auditing support
- Re: [PATCH RFC v12 10/20] ipe: add permissive toggle
- Re: [PATCH RFC v12 8/20] ipe: add userspace interface
- Re: [PATCH RFC v12 6/20] ipe: introduce 'boot_verified' as a trust provider
- Re: [PATCH RFC v12 5/20] initramfs|security: Add security hook to initramfs unpack
- Re: [RFC PATCH v12 12/20] dm verity: set DM_TARGET_SINGLETON feature flag
- Re: [RFC PATCH v12 12/20] dm verity: set DM_TARGET_SINGLETON feature flag
- Re: [PATCH v2] fscrypt: to make sure the inode->i_blkbits is correctly set
- Re: [PATCH v2] fscrypt: to make sure the inode->i_blkbits is correctly set
- [PATCH v2] fscrypt: to make sure the inode->i_blkbits is correctly set
- Re: [PATCH] fscrypt: to make sure the inode->i_blkbits is correctly set
- [RFC PATCH v12 20/20] documentation: add ipe documentation
- [RFC PATCH v12 19/20] ipe: kunit test for parser
- [RFC PATCH v12 17/20] ipe: enable support for fs-verity as a trust provider
- [RFC PATCH v12 15/20] ipe: add support for dm-verity as a trust provider
- [RFC PATCH v12 08/20] ipe: add userspace interface
- [RFC PATCH v12 18/20] scripts: add boot policy generation program
- [RFC PATCH v12 11/20] block|security: add LSM blob to block_device
- [RFC PATCH v12 16/20] fsverity: consume builtin signature via LSM hook
- [RFC PATCH v12 14/20] dm verity: consume root hash digest and signature data via LSM hook
- [RFC PATCH v12 12/20] dm verity: set DM_TARGET_SINGLETON feature flag
- [RFC PATCH v12 09/20] uapi|audit|ipe: add ipe auditing support
- [RFC PATCH v12 10/20] ipe: add permissive toggle
- [RFC PATCH v12 13/20] dm: add finalize hook to target_type
- [RFC PATCH v12 07/20] security: add new securityfs delete function
- [RFC PATCH v12 06/20] ipe: introduce 'boot_verified' as a trust provider
- [RFC PATCH v12 05/20] initramfs|security: Add security hook to initramfs unpack
- [RFC PATCH v12 04/20] ipe: add LSM hooks on execution and kernel read
- [RFC PATCH v12 03/20] ipe: add evaluation loop
- [RFC PATCH v12 02/20] ipe: add policy parser
- [RFC PATCH v12 00/20] Integrity Policy Enforcement LSM (IPE)
- [RFC PATCH v12 01/20] security: add ipe lsm
- Re: [PATCH] fscrypt: to make sure the inode->i_blkbits is correctly set
- [PATCH] fscrypt: to make sure the inode->i_blkbits is correctly set
- Re: [PATCH v3 04/10] fscrypt: Drop d_revalidate once the key is added
- From: Gabriel Krisman Bertazi
- Re: [PATCH v3 04/10] fscrypt: Drop d_revalidate once the key is added
- Re: [syzbot] [f2fs?] KASAN: slab-use-after-free Read in kill_f2fs_super
- Re: [GIT PULL] fscrypt fix for 6.8-rc1
- Re: [f2fs-dev] [PATCH v2 0/2] Move fscrypt keyring destruction to after ->put_super
- RE: [PATCH v6 RESEND 5/5] crypto: LEA block cipher x86_64 optimization
- Re: [PATCH v2 4/4] generic: add test for custom crypto data unit size
- [GIT PULL] fscrypt fix for 6.8-rc1
- Re: [syzbot] [f2fs?] KASAN: slab-use-after-free Read in kill_f2fs_super
- Re: [PATCH] f2fs: fix double free of f2fs_sb_info
- Re: [PATCH] f2fs: fix double free of f2fs_sb_info
- Re: [PATCH] f2fs: fix double free of f2fs_sb_info
- Re: [f2fs-dev] [PATCH] f2fs: fix double free of f2fs_sb_info
- Re: [PATCH] f2fs: fix double free of f2fs_sb_info
- [PATCH] f2fs: fix double free of f2fs_sb_info
- Re: [PATCH v2 0/4] xfstests: test custom crypto data unit size
- RE: [PATCH v6 RESEND 5/5] crypto: LEA block cipher x86_64 optimization
- [PATCH v6 RESEND 5/5] crypto: LEA block cipher x86_64 optimization
- [PATCH v6 RESEND 4/5] fscrypt: Add LEA-256-XTS, LEA-256-CTS support
- [PATCH v6 RESEND 3/5] blk-crypto: Add LEA-256-XTS blk-crypto support
- [PATCH v6 RESEND 2/5] crypto: add LEA testmgr tests
- [PATCH v6 RESEND 1/5] crypto: LEA block cipher implementation
- [PATCH v6 RESEND 0/5] crypto: LEA block cipher implementation
- Re: [PATCH v2 0/4] xfstests: test custom crypto data unit size
- Re: [GIT PULL] fscrypt updates for 6.8
- [GIT PULL] fscrypt updates for 6.8
- [PATCH v3 1/2] ubifs: dbg_check_idx_size: Fix kmemleak if loading znode failed
- [PATCH v3 0/2] ubifs: Fix two kmemleaks in error path
- [PATCH v3 2/2] ubifs: ubifs_symlink: Fix memleak of inode->i_link in error path
- Re: [PATCH v2 1/2] ubifs: dbg_check_idx_size: Fix kmemleak if loading znode failed
- Re: [f2fs-dev] [PATCH v2 1/2] f2fs: move release of block devices to after kill_block_super()
- [PATCH v2 1/2] f2fs: move release of block devices to after kill_block_super()
- [PATCH v2 2/2] fs: move fscrypt keyring destruction to after ->put_super
- [PATCH v2 0/2] Move fscrypt keyring destruction to after ->put_super
- Re: [f2fs-dev] [PATCH 2/3] f2fs: move release of block devices to after kill_block_super()
- [PATCH] fscrypt: document that CephFS supports fscrypt now
- Re: [PATCH 2/3] f2fs: move release of block devices to after kill_block_super()
- Re: [PATCH v2 2/2] ubifs: ubifs_symlink: Fix memleak of inode->i_link in error path
- [PATCH v2 0/2] ubifs: Fix two kmemleaks in error path
- [PATCH v2 2/2] ubifs: ubifs_symlink: Fix memleak of inode->i_link in error path
- [PATCH v2 1/2] ubifs: dbg_check_idx_size: Fix kmemleak if loading znode failed
- Re: Performance drop due to alloc_workqueue() misuse and recent change
- Question about CNC
- RE: [PATCH v6 0/5] crypto: LEA block cipher implementation
- Re: [f2fs-dev] [PATCH 1/3] btrfs: call btrfs_close_devices from ->kill_sb
- Re: [f2fs-dev] [PATCH 1/3] btrfs: call btrfs_close_devices from ->kill_sb
- Re: [f2fs-dev] [PATCH 1/3] btrfs: call btrfs_close_devices from ->kill_sb
- Re: [PATCH 1/3] btrfs: call btrfs_close_devices from ->kill_sb
- Re: [PATCH 3/3] fs: move fscrypt keyring destruction to after ->put_super
- Re: [PATCH 3/3] fs: move fscrypt keyring destruction to after ->put_super
- Re: [PATCH 1/3] btrfs: call btrfs_close_devices from ->kill_sb
- Re: [PATCH v3 07/12] qcom_scm: scm call for create, prepare and import keys
- [PATCH 3/3] fs: move fscrypt keyring destruction to after ->put_super
- [PATCH 1/3] btrfs: call btrfs_close_devices from ->kill_sb
- [PATCH 2/3] f2fs: move release of block devices to after kill_block_super()
- [PATCH 0/3] Move fscrypt keyring destruction to after ->put_super
- RE: [PATCH v3 02/12] qcom_scm: scm call for deriving a software secret
- RE: [PATCH v3 04/12] soc: qcom: ice: support for hardware wrapped keys
- RE: [PATCH v3 03/12] soc: qcom: ice: add hwkm support in ice
- RE: [PATCH v3 03/12] soc: qcom: ice: add hwkm support in ice
- Re: [PATCH] fscrypt: move the call to fscrypt_destroy_keyring() into ->put_super()
- Re: [PATCH] fscrypt: move the call to fscrypt_destroy_keyring() into ->put_super()
- Re: [PATCH v3 11/12] arm64: dts: qcom: sm8650: add hwkm support to ufs ice
- Re: [PATCH v3 11/12] arm64: dts: qcom: sm8650: add hwkm support to ufs ice
- Re: [PATCH v3 09/12] soc: qcom: support for generate, import and prepare key
- Re: [PATCH v3 10/12] ufs: host: support for generate, import and prepare key
- Re: [PATCH v3 08/12] ufs: core: add support for generate, import and prepare keys
- Re: [PATCH v3 06/12] ufs: host: wrapped keys support in ufs qcom
- Re: [PATCH v3 04/12] soc: qcom: ice: support for hardware wrapped keys
- Re: [PATCH v3 02/12] qcom_scm: scm call for deriving a software secret
- Re: [PATCH v3 01/12] ice, ufs, mmc: use blk_crypto_key for program_key
- Re: [PATCH v3 03/12] soc: qcom: ice: add hwkm support in ice
- Re: [PATCH v3 03/12] soc: qcom: ice: add hwkm support in ice
- Re: [PATCH v3 03/12] soc: qcom: ice: add hwkm support in ice
- Re: [PATCH v3 12/12] dt-bindings: crypto: ice: document the hwkm property
- Re: [PATCH v3 03/12] soc: qcom: ice: add hwkm support in ice
- Re: [PATCH v3 11/12] arm64: dts: qcom: sm8650: add hwkm support to ufs ice
- Re: [PATCH v3 08/12] ufs: core: add support for generate, import and prepare keys
- Re: [PATCH v3 05/12] ufs: core: support wrapped keys in ufs core
- Re: [PATCH] fscrypt: move the call to fscrypt_destroy_keyring() into ->put_super()
- Re: [PATCH] fscrypt: move the call to fscrypt_destroy_keyring() into ->put_super()
- Re: [PATCH] fscrypt: move the call to fscrypt_destroy_keyring() into ->put_super()
- [PATCH] fscrypt: update comment for do_remove_key()
- Re: [PATCH] fscrypt: move the call to fscrypt_destroy_keyring() into ->put_super()
- [PATCH] fscrypt.rst: update definition of struct fscrypt_context_v2
- [PATCH] fscrypt: move the call to fscrypt_destroy_keyring() into ->put_super()
- Re: [PATCH v3 00/12] Hardware wrapped key support for qcom ice and ufs
- [PATCH v6 0/5] crypto: LEA block cipher implementation
- [PATCH v6 3/5] blk-crypto: Add LEA-256-XTS blk-crypto support
- [PATCH v6 5/5] crypto: LEA block cipher x86_64 optimization
- [PATCH v6 2/5] crypto: add LEA testmgr tests
- [PATCH v6 1/5] crypto: LEA block cipher implementation
- [PATCH v6 4/5] fscrypt: Add LEA-256-XTS, LEA-256-CTS support
- Re: Performance drop due to alloc_workqueue() misuse and recent change
- Performance drop due to alloc_workqueue() misuse and recent change
- Re: [PATCH v4 00/46] btrfs: add fscrypt support
- Re: [xfsprogs PATCH] xfs_io/encrypt: support specifying crypto data unit size
- Re: [syzbot] [fscrypt?] possible deadlock in find_and_lock_process_key
- Re: [syzbot] [fscrypt?] possible deadlock in fscrypt_initialize (2)
- Re: [PATCH 07/12] btrfs: test snapshotting encrypted subvol
- Re: [PATCH 07/12] btrfs: test snapshotting encrypted subvol
- [syzbot] [fscrypt?] possible deadlock in find_and_lock_process_key
- Re: [PATCH] ceph: select FS_ENCRYPTION_ALGS if FS_ENCRYPTION
- Re: [PATCH] ceph: select FS_ENCRYPTION_ALGS if FS_ENCRYPTION
- [PATCH] ceph: select FS_ENCRYPTION_ALGS if FS_ENCRYPTION
- Re: [PATCH v3 02/12] qcom_scm: scm call for deriving a software secret
- Re: [PATCH 09/12] fstests: split generic/580 into two tests
- Re: [PATCH v2 00/36] btrfs: add fscrypt support
- Re: [PATCH v3 00/12] Hardware wrapped key support for qcom ice and ufs
- From: Krzysztof Kozlowski
- Re: [PATCH v3 12/12] dt-bindings: crypto: ice: document the hwkm property
- From: Krzysztof Kozlowski
- [PATCH v3 07/12] qcom_scm: scm call for create, prepare and import keys
- [PATCH v3 12/12] dt-bindings: crypto: ice: document the hwkm property
- [PATCH v3 05/12] ufs: core: support wrapped keys in ufs core
- [PATCH v3 08/12] ufs: core: add support for generate, import and prepare keys
- [PATCH v3 09/12] soc: qcom: support for generate, import and prepare key
- [PATCH v3 11/12] arm64: dts: qcom: sm8650: add hwkm support to ufs ice
- [PATCH v3 06/12] ufs: host: wrapped keys support in ufs qcom
- [PATCH v3 04/12] soc: qcom: ice: support for hardware wrapped keys
- [PATCH v3 10/12] ufs: host: support for generate, import and prepare key
- [PATCH v3 03/12] soc: qcom: ice: add hwkm support in ice
- [PATCH v3 00/12] Hardware wrapped key support for qcom ice and ufs
- [PATCH v3 02/12] qcom_scm: scm call for deriving a software secret
- [PATCH v3 01/12] ice, ufs, mmc: use blk_crypto_key for program_key
- Re: [PATCH v2 00/36] btrfs: add fscrypt support
- [PATCH 02/14] tools headers UAPI: Update tools's copy of fscrypt.h header
- [PATCH v2 4/4] generic: add test for custom crypto data unit size
- [PATCH v2 3/4] common/encrypt: support custom data unit size
- [PATCH v2 0/4] xfstests: test custom crypto data unit size
- [PATCH v2 2/4] common/rc: fix _require_xfs_io_command with digits in argument
- [PATCH v2 1/4] fscrypt-crypt-util: rename block to data unit
- Re: [xfsprogs PATCH] xfs_io/encrypt: support specifying crypto data unit size
- Re: [xfsprogs PATCH] xfs_io/encrypt: support specifying crypto data unit size
- Re: [xfsprogs PATCH] xfs_io/encrypt: support specifying crypto data unit size
- Re: PSA: This list is being migrated (no action required)
- From: Konstantin Ryabitsev
- PSA: This list is being migrated (no action required)
- From: Konstantin Ryabitsev
- Re: [PATCH 09/12] fstests: split generic/580 into two tests
- Re: [PATCH 12/12] fstest: add a fsstress+fscrypt test
- PSA: migrating linux-fscrypt to new vger infrastructure
- From: Konstantin Ryabitsev
- [RFC PATCH v8 4/4] fscrypt: add support for hardware-wrapped keys
- [RFC PATCH v8 1/4] blk-crypto: add basic hardware-wrapped key support
- [RFC PATCH v8 3/4] blk-crypto: add ioctls to create and prepare hardware-wrapped keys
- [RFC PATCH v8 2/4] blk-crypto: show supported key types in sysfs
- [RFC PATCH v8 0/4] Support for hardware-wrapped inline encryption keys
- Re: [PATCH RFC v11 5/19] ipe: introduce 'boot_verified' as a trust provider
- Re: [PATCH RFC v11 5/19] ipe: introduce 'boot_verified' as a trust provider
- Re: [PATCH RFC v11 18/19] ipe: kunit test for parser
- Re: [PATCH RFC v11 17/19] scripts: add boot policy generation program
- Re: [PATCH RFC v11 9/19] ipe: add permissive toggle
- Re: [PATCH RFC v11 8/19] uapi|audit|ipe: add ipe auditing support
- Re: [PATCH RFC v11 5/19] ipe: introduce 'boot_verified' as a trust provider
- Re: [PATCH RFC v11 14/19] ipe: add support for dm-verity as a trust provider
- Re: [PATCH RFC v11 15/19] fsverity: consume builtin signature via LSM hook
- Re: [PATCH RFC v11 15/19] fsverity: consume builtin signature via LSM hook
- Re: [PATCH 09/12] fstests: split generic/580 into two tests
- Re: [PATCH RFC v11 15/19] fsverity: consume builtin signature via LSM hook
- Re: [PATCH RFC v11 13/19] dm verity: consume root hash digest and signature data via LSM hook
- Re: [PATCH RFC v11 12/19] dm: add finalize hook to target_type
- Re: [PATCH RFC v11 11/19] dm verity: set DM_TARGET_SINGLETON feature flag
- Re: [PATCH RFC v11 15/19] fsverity: consume builtin signature via LSM hook
- Re: [PATCH 08/12] fstests: properly test for v1 encryption policies in encrypt tests
- Re: [PATCH 07/12] btrfs: test snapshotting encrypted subvol
- Re: [PATCH 07/12] btrfs: test snapshotting encrypted subvol
- Re: [PATCH 05/12] common/verity: explicitly don't allow btrfs encryption
- Re: [PATCH 04/12] common/encrypt: enable making a encrypted btrfs filesystem
- Re: [PATCH 03/12] common/encrypt: add btrfs to get_ciphertext_filename
- Re: [PATCH 02/12] common/encrypt: add btrfs to get_encryption_*nonce
- Re: [PATCH 01/12] common/encrypt: separate data and inode nonces
- Re: [PATCH 06/12] btrfs: add simple test of reflink of encrypted data
- Re: [GIT PULL] fscrypt updates for 6.7
- [GIT PULL] fscrypt updates for 6.7
- Re: [PATCH RFC v11 5/19] ipe: introduce 'boot_verified' as a trust provider
- Re: [PATCH RFC v11 2/19] ipe: add policy parser
- Re: [PATCH RFC v11 5/19] ipe: introduce 'boot_verified' as a trust provider
- Re: [PATCH RFC v11 3/19] ipe: add evaluation loop
- Re: [PATCH RFC v11 2/19] ipe: add policy parser
- Re: [PATCH RFC v11 18/19] ipe: kunit test for parser
- Re: [PATCH RFC v11 17/19] scripts: add boot policy generation program
- Re: [PATCH RFC v11 14/19] ipe: add support for dm-verity as a trust provider
- Re: [PATCH RFC v11 15/19] fsverity: consume builtin signature via LSM hook
- Re: [PATCH RFC v11 5/19] ipe: introduce 'boot_verified' as a trust provider
- Re: [PATCH RFC v11 16/19] ipe: enable support for fs-verity as a trust provider
- Re: [PATCH RFC v11 12/19] dm: add finalize hook to target_type
- Re: [PATCH RFC v11 9/19] ipe: add permissive toggle
- Re: [PATCH RFC v11 11/19] dm verity: set DM_TARGET_SINGLETON feature flag
- Re: [PATCH RFC v11 13/19] dm verity: consume root hash digest and signature data via LSM hook
- Re: [PATCH RFC v11 8/19] uapi|audit|ipe: add ipe auditing support
- Re: [PATCH RFC v11 4/19] ipe: add LSM hooks on execution and kernel read
- Re: [PATCH RFC v11 3/19] ipe: add evaluation loop
- Re: [PATCH RFC v11 2/19] ipe: add policy parser
- Re: [PATCH 08/12] fstests: properly test for v1 encryption policies in encrypt tests
- Re: [PATCH 12/12] fstest: add a fsstress+fscrypt test
- Re: [PATCH 01/12] common/encrypt: separate data and inode nonces
- Re: [PATCH] fscrypt: track master key presence separately from secret
- Re: [PATCH] fscrypt: track master key presence separately from secret
- Re: [PATCH] fscrypt: track master key presence separately from secret
- Re: [PATCH v2 03/36] fscrypt: add per-extent encryption support
- Re: [PATCH v2 05/36] blk-crypto: add a process bio callback
- Re: [PATCH v2 04/36] fscrypt: disable all but standard v2 policies for extent encryption
- Re: [PATCH v2 02/36] fscrypt: don't wipe mk secret until the last active user is gone
- Re: [PATCH v2 01/36] fscrypt: use a flag to indicate that the master key is being evicted
- [PATCH] fscrypt: track master key presence separately from secret
- [xfsprogs PATCH] xfs_io/encrypt: support specifying crypto data unit size
- [PATCH 3/4] common/encrypt: support custom data unit size
- [PATCH 2/4] common/rc: fix _require_xfs_io_command with digits in argument
- [PATCH 4/4] generic: add test for custom crypto data unit size
- [PATCH 1/4] fscrypt-crypt-util: rename block to data unit
- [PATCH 0/4] xfstests: test custom crypto data unit size
- [PATCH v2 35/36] btrfs: add orig_logical to btrfs_bio
- [PATCH v2 30/36] btrfs: implement the fscrypt extent encryption hooks
- [PATCH v2 32/36] btrfs: populate ordered_extent with the orig offset
- [PATCH v2 31/36] btrfs: setup fscrypt_extent_info for new extents
- [PATCH v2 36/36] btrfs: implement process_bio cb for fscrypt
- [PATCH v2 29/36] btrfs: pass the fscrypt_info through the replace extent infrastructure
- [PATCH v2 34/36] btrfs: add a bio argument to btrfs_csum_one_bio
- [PATCH v2 33/36] btrfs: set the bio fscrypt context when applicable
- [PATCH v2 24/36] btrfs: populate the ordered_extent with the fscrypt context
- [PATCH v2 26/36] btrfs: add an optional encryption context to the end of file extents
- [PATCH v2 27/36] btrfs: explicitly track file extent length for replace and drop
- [PATCH v2 25/36] btrfs: keep track of fscrypt info and orig_start for dio reads
- [PATCH v2 28/36] btrfs: pass through fscrypt_extent_info to the file extent helpers
- [PATCH v2 23/36] btrfs: plumb through setting the fscrypt_info for ordered extents
- [PATCH v2 22/36] btrfs: add fscrypt_info and encryption_type to ordered_extent
- [PATCH v2 21/36] btrfs: add fscrypt_info and encryption_type to extent_map
[Index of Archives]
[linux Cryptography]
[Asterisk App Development]
[PJ SIP]
[Gnu Gatekeeper]
[Linux Kernel]
[Fedora Users]
[Yosemite Campsites]