linux-fscrypt.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2024-03-06 23:34:52 to 2024-09-09 07:56:52 UTC [more...]

[PATCH RESEND v2 00/19] random: Resolve circular include dependency and include <linux/percpu.h>
 2024-09-09  7:53 UTC  (3+ messages)
` [PATCH RESEND v2 01/19] x86/kaslr: Include <linux/prandom.h> instead of <linux/random.h>
` [PATCH RESEND v2 02/19] crypto: testmgr: "

[PATCH v2 00/19] random: Resolve circular include dependency and include <linux/percpu.h>
 2024-09-09  7:05 UTC  (20+ messages)
` [PATCH v2 01/19] x86/kaslr: Include <linux/prandom.h> instead of <linux/random.h>
` [PATCH v2 02/19] crypto: testmgr: "
` [PATCH v2 03/19] drm/i915/selftests: "
` [PATCH v2 04/19] drm/lib: "
` [PATCH v2 05/19] media: vivid: Include <linux/prandom.h> in vivid-vid-cap.c
` [PATCH v2 06/19] mtd: tests: Include <linux/prandom.h> instead of <linux/random.h>
` [PATCH v2 07/19] fscrypt: Include <linux/once.h> in fs/crypto/keyring.c
` [PATCH v2 08/19] scsi: libfcoe: Include <linux/prandom.h> instead of <linux/random.h>
` [PATCH v2 09/19] bpf: "
` [PATCH v2 10/19] lib/interval_tree_test.c: "
` [PATCH v2 11/19] kunit: string-stream-test: "
` [PATCH v2 12/19] random32: "
` [PATCH v2 13/19] lib/rbtree-test: "
` [PATCH v2 14/19] bpf/tests: "
` [PATCH v2 15/19] lib/test_parman: "
` [PATCH v2 16/19] lib/test_scanf: "
` [PATCH v2 17/19] netem: Include <linux/prandom.h> in sch_netem.c
` [PATCH v2 18/19] random: Do not include <linux/prandom.h> in <linux/random.h>
` [PATCH v2 19/19] prandom: Include <linux/percpu.h> in <linux/prandom.h>

[PATCH v6 00/17] Hardware wrapped key support for QCom ICE and UFS core
 2024-09-06 22:07 UTC  (19+ messages)
` [PATCH v6 01/17] blk-crypto: add basic hardware-wrapped key support
` [PATCH v6 02/17] blk-crypto: show supported key types in sysfs
` [PATCH v6 03/17] blk-crypto: add ioctls to create and prepare hardware-wrapped keys
` [PATCH v6 04/17] fscrypt: add support for "
` [PATCH v6 05/17] ice, ufs, mmc: use the blk_crypto_key struct when programming the key
` [PATCH v6 06/17] firmware: qcom: scm: add a call for deriving the software secret
` [PATCH v6 07/17] firmware: qcom: scm: add calls for creating, preparing and importing keys
` [PATCH v6 08/17] firmware: qcom: scm: add a call for checking wrapped key support
` [PATCH v6 09/17] soc: qcom: ice: add HWKM support to the ICE driver
` [PATCH v6 10/17] soc: qcom: ice: add support for hardware wrapped keys
` [PATCH v6 11/17] soc: qcom: ice: add support for generating, importing and preparing keys
` [PATCH v6 12/17] ufs: core: add support for wrapped keys to UFS core
` [PATCH v6 13/17] ufs: core: add support for deriving the software secret
` [PATCH v6 14/17] ufs: core: add support for generating, importing and preparing keys
` [PATCH v6 15/17] ufs: host: add support for wrapped keys in QCom UFS
` [PATCH v6 16/17] ufs: host: add a callback for deriving software secrets and use it
` [PATCH v6 17/17] ufs: host: add support for generating, importing and preparing wrapped keys

[PATCH 00/18] random: Include <linux/percpu.h> and resolve circular include dependency
 2024-09-06  8:09 UTC  (6+ messages)
  ` [PATCH 06/18] fscrypt: Include <linux/prandom.h> instead of <linux/random.h>

[syzbot] [fscrypt?] WARNING in fscrypt_fname_siphash
 2024-09-05 14:53 UTC  (25+ messages)
` [PATCH] ext4: add casefolded file check
    ` [PATCH V2] ext4: add casefolded feature check before setup encrypted info
        ` [PATCH V4] ext4: check hash version and filesystem casefolded consistent
            ` [PATCH V5] "
                    ` [PATCH V6] fs/ext4: Filesystem without casefold feature cannot be mounted with spihash
                        ` [PATCH] ext4: Fix error message when rejecting the default hash
        ` [PATCH V3] ext4: check hash version and filesystem casefolded consistent

Software encryption at fscrypt causing the filesystem access unresponsive
 2024-07-25  7:51 UTC  (4+ messages)

[PATCH 0/6] Remove page_mapping()
 2024-07-24  2:16 UTC  (20+ messages)
` [PATCH 1/6] fscrypt: Convert bh_get_inode_and_lblk_num to use a folio
` [PATCH 2/6] f2fs: Convert f2fs_clear_page_cache_dirty_tag "
` [PATCH 3/6] memory-failure: Remove calls to page_mapping()
` [PATCH 4/6] migrate: Expand the use of folio in __migrate_device_pages()
` [PATCH 5/6] userfault; Expand folio use in mfill_atomic_install_pte()
` [PATCH 6/6] mm: Remove page_mapping()
` [f2fs-dev] [PATCH 0/6] "

[PATCH] scsi: ufs: exynos: Don't resume FMP when crypto support disabled
 2024-07-23  0:52 UTC  (3+ messages)

Possible kernel bug: Ubuntu Kernel linux-image-6.5.0-44-generic appears to have issues with fscrypt running on CephFS backend
 2024-07-20 22:48 UTC 

[PATCH v3 0/6] Basic inline encryption support for ufs-exynos
 2024-07-16  2:29 UTC  (18+ messages)
` [PATCH v3 1/6] scsi: ufs: core: Add UFSHCD_QUIRK_CUSTOM_CRYPTO_PROFILE
` [PATCH v3 2/6] scsi: ufs: core: fold ufshcd_clear_keyslot() into its caller
` [PATCH v3 3/6] scsi: ufs: core: Add UFSHCD_QUIRK_BROKEN_CRYPTO_ENABLE
` [PATCH v3 4/6] scsi: ufs: core: Add fill_crypto_prdt variant op
` [PATCH v3 5/6] scsi: ufs: core: Add UFSHCD_QUIRK_KEYS_IN_PRDT
` [PATCH v3 6/6] scsi: ufs: exynos: Add support for Flash Memory Protector (FMP)

[PATCH v2 0/6] Basic inline encryption support for ufs-exynos
 2024-07-10 22:27 UTC  (19+ messages)
` [PATCH v2 1/6] scsi: ufs: core: Add UFSHCD_QUIRK_CUSTOM_CRYPTO_PROFILE
` [PATCH v2 2/6] scsi: ufs: core: fold ufshcd_clear_keyslot() into its caller
` [PATCH v2 3/6] scsi: ufs: core: Add UFSHCD_QUIRK_BROKEN_CRYPTO_ENABLE
` [PATCH v2 4/6] scsi: ufs: core: Add fill_crypto_prdt variant op
` [PATCH v2 5/6] scsi: ufs: core: Add UFSHCD_QUIRK_KEYS_IN_PRDT
` [PATCH v2 6/6] scsi: ufs: exynos: Add support for Flash Memory Protector (FMP)

[PATCH 0/6] Basic inline encryption support for ufs-exynos
 2024-07-02  7:28 UTC  (11+ messages)
` [PATCH 1/6] scsi: ufs: core: Add UFSHCD_QUIRK_CUSTOM_CRYPTO_PROFILE
` [PATCH 2/6] scsi: ufs: core: fold ufshcd_clear_keyslot() into its caller
` [PATCH 3/6] scsi: ufs: core: Add UFSHCD_QUIRK_BROKEN_CRYPTO_ENABLE
` [PATCH 4/6] scsi: ufs: core: Add fill_crypto_prdt variant op
` [PATCH 5/6] scsi: ufs: core: Add UFSHCD_QUIRK_KEYS_IN_PRDT
` [PATCH 6/6] scsi: ufs: exynos: Add support for Flash Memory Protector (FMP)

[syzbot] [crypto?] KMSAN: uninit-value in aes_encrypt (5)
 2024-05-30  4:31 UTC 

[GIT PULL] fscrypt update for 6.10
 2024-05-15  0:53 UTC  (2+ messages)

[PATCH v2] fscrypt: try to avoid refing parent dentry in fscrypt_file_open
 2024-05-08 17:38 UTC  (2+ messages)

[PATCH] fscrypto: try to avoid refing parent dentry in fscrypt_file_open
 2024-05-07 17:56 UTC  (2+ messages)

[linux-next:master] BUILD REGRESSION d04466706db5e241ee026f17b5f920e50dee26b5
 2024-04-30 20:14 UTC 

[PATCH v4 00/46] btrfs: add fscrypt support
 2024-04-11 18:45 UTC  (2+ messages)

Debian #1066832: [fsverity-utils] hard Build-Depends on unportable package pandoc
 2024-03-20 22:37 UTC  (3+ messages)
  ` Bug#1066832: Info received (Debian #1066832: [fsverity-utils] hard Build-Depends on unportable package pandoc)

[GIT PULL] fscrypt updates for 6.9
 2024-03-12 22:24 UTC  (2+ messages)

[RFC PATCH v14 00/19] Integrity Policy Enforcement LSM (IPE)
 2024-03-12 20:07 UTC  (36+ messages)
` [RFC PATCH v14 01/19] security: add ipe lsm
` [RFC PATCH v14 02/19] ipe: add policy parser
` [RFC PATCH v14 03/19] ipe: add evaluation loop
` [RFC PATCH v14 04/19] ipe: add LSM hooks on execution and kernel read
` [RFC PATCH v14 05/19] initramfs|security: Add a security hook to do_populate_rootfs()
` [RFC PATCH v14 06/19] ipe: introduce 'boot_verified' as a trust provider
` [RFC PATCH v14 07/19] security: add new securityfs delete function
` [RFC PATCH v14 08/19] ipe: add userspace interface
` [RFC PATCH v14 09/19] uapi|audit|ipe: add ipe auditing support
` [RFC PATCH v14 10/19] ipe: add permissive toggle
` [RFC PATCH v14 11/19] block|security: add LSM blob to block_device
` [RFC PATCH v14 12/19] dm: add finalize hook to target_type
` [RFC PATCH v14 13/19] dm verity: consume root hash digest and signature data via LSM hook
` [RFC PATCH v14 14/19] ipe: add support for dm-verity as a trust provider
` [RFC PATCH v14 15/19] fsverity: consume builtin signature via LSM hook
` [RFC PATCH v14 16/19] ipe: enable support for fs-verity as a trust provider
` [RFC PATCH v14 17/19] scripts: add boot policy generation program
` [RFC PATCH v14 18/19] ipe: kunit test for parser
` [RFC PATCH v14 19/19] documentation: add ipe documentation


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).