Toggle navigation
Patchwork
Linux fscrypt
Patches
Bundles
About this project
Login
Register
Mail settings
Show patches with
: Archived =
No
| 3829 patches
Series
Submitter
State
any
Action Required
New
Under Review
Accepted
Rejected
RFC
Not Applicable
Changes Requested
Awaiting Upstream
Superseded
Deferred
Mainlined
Queued
Needs ACK
Handled Elsewhere
In Next
Search
Archived
No
Yes
Both
Delegate
------
Nobody
holtmann
holtmann
holtmann
agk
mchehab
mchehab
gregkh
gregkh
mtosatti
lethal
lethal
avi
cvaroqui
jbrassow
mikulas
dtor
bmarzins
tmlind
jmberg
jmberg
mcgrof
mcgrof
mcgrof
lenb
lenb
kyle
felipebalbi
varenet
helge
helge
khilman
khilman
khilman
khilman
jwoithe
mlin
Zhang Rui
Zhang Rui
iksaif
cjackiewicz
hmh
jbarnes
jbarnes
jbarnes
willy
snitzer
iwamatsu
dougsland
mjg59
rafael
rafael
rafael
ericvh@gmail.com
ykzhao
venkip
sandeen
pwsan
lucho@ionkov.net
rminnich
anholt
aystarik
roland
shefty
mason
glikely
krh
djbw
djbw
djbw
cmarinas
doyu
jrn
sage
tomba
mmarek
cjb
trondmy
jikos
bcousson
jic23
olof
olof
olof
nsekhar
weiny2
horms
horms
bwidawsk
bwidawsk
shemminger
eulfhan
josef
josef
josef
dianders
jpan9
hal
kdave
bleung
evalenti
jlbec
wsa
bhelgaas
vkoul
vkoul
szlin
davejiang
markgross
tagr
tiwai
vireshk
mmind
dledford
geert
geert
herbert
herbert
kvalo
kvalo
kvalo
bentiss
arend
rzwisler
stellarhopper
stellarhopper
jejb
matthias_bgg
dvhart
axboe
axboe
pcmoore
pcmoore
pcmoore
mkp
mkp
stefan_schmidt
leon
lucvoo
jsakkine
jsakkine
jsakkine
bamse
bamse
demarchi
krzk
groeck
groeck
sboyd
sboyd
mturquette
mturquette
0andriy
carlocaione
luca
dgc
kbingham
derosier
narmstrong
narmstrong
atull
tytso
tytso
djwong
bvanassche
omos
jpirko
jpirko
GustavoARSilva
pkshih
patersonc
brauner
shuahkh
shuahkh
shuahkh
palmer
palmer
jgg
Kishon
idosch
labbott
jsimmons
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
broonie
broonie
broonie
mricon
mricon
mricon
kees
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
arnd
linusw
perfinion
bbrezillon
bachradsusi
rostedt
rostedt
kholk
nbd
ebiggers
ebiggers
pavelm
sds
m0reeze
ganis
jwcart2
matttbe
andmur01
lorpie01
chanwoochoi
dlezcano
jhedberg
vudentz
robertfoss
bgix
tedd_an
tsbogend
wens
wcrobert
robher
kstewart
kwilczynski
hansg
bpf
netdev
dsa
ethtool
netdrv
martineau
abelloni
trix
pabeni
mani_sadhasivam
mlimonci
liusong6
mjp
tohojo
pmalani
prestwoj
prestwoj
dhowells
tzungbi
conchuod
paulmck
jes
mtkaczyk
colyli
cem
pateldipen1984
iweiny
iweiny
bjorn
mhiramat
JanKiszka
jaegeuk
mraynal
aring
konradybcio
ij
Hailan
jstitt007
denkenz
denkenz
mkorenbl
jjohnson
frank_li
geliang
mdraidci
mdraidci
peluse
joelgranados
Apply
«
1
2
...
6
7
8
…
38
39
»
Patch
Series
A/R/T
S/W/F
Date
Submitter
Delegate
State
[01/11] fscrypt: move inline crypt decision to info setup.
[01/11] fscrypt: move inline crypt decision to info setup.
- - -
-
-
-
2023-04-18
Sweet Tea Dorminy
Superseded
[v2,11/11] fscrypt: split key alloc and preparation
fscrypt: rearrangements preliminary to extent encryption
- - -
-
-
-
2023-04-10
Sweet Tea Dorminy
Superseded
[v2,10/11] fscrypt: explicitly track prepared parts of key
fscrypt: rearrangements preliminary to extent encryption
- - -
-
-
-
2023-04-10
Sweet Tea Dorminy
Superseded
[v2,09/11] fscrypt: make prepared keys record their type.
fscrypt: rearrangements preliminary to extent encryption
- - -
-
-
-
2023-04-10
Sweet Tea Dorminy
Superseded
[v2,08/11] fscrypt: make ci->ci_direct_key a bool not a pointer
fscrypt: rearrangements preliminary to extent encryption
- - -
-
-
-
2023-04-10
Sweet Tea Dorminy
Superseded
[v2,07/11] fscrypt: move all the shared mode key setup deeper
fscrypt: rearrangements preliminary to extent encryption
- - -
-
-
-
2023-04-10
Sweet Tea Dorminy
Superseded
[v2,06/11] fscrypt: make infos have a pointer to prepared keys
fscrypt: rearrangements preliminary to extent encryption
- - -
-
-
-
2023-04-10
Sweet Tea Dorminy
Superseded
[v2,05/11] fscrypt: reduce special-casing of IV_INO_LBLK_32
fscrypt: rearrangements preliminary to extent encryption
- - -
-
-
-
2023-04-10
Sweet Tea Dorminy
Superseded
[v2,04/11] fscrypt: move dirhash key setup away from IO key setup
fscrypt: rearrangements preliminary to extent encryption
- - -
-
-
-
2023-04-10
Sweet Tea Dorminy
Superseded
[v2,03/11] fscrypt: split and rename setup_per_mode_enc_key()
fscrypt: rearrangements preliminary to extent encryption
- - -
-
-
-
2023-04-10
Sweet Tea Dorminy
Superseded
[v2,02/11] fscrypt: split and rename setup_file_encryption_key()
fscrypt: rearrangements preliminary to extent encryption
- - -
-
-
-
2023-04-10
Sweet Tea Dorminy
Superseded
[v2,01/11] fscrypt: move inline crypt decision to info setup.
fscrypt: rearrangements preliminary to extent encryption
- - -
-
-
-
2023-04-10
Sweet Tea Dorminy
Superseded
[v1,10/10] fscrypt: split key alloc and preparation
fscrypt: rearrangements preliminary to extent encryption
- - -
-
-
-
2023-04-10
Sweet Tea Dorminy
Superseded
[v1,09/10] fscrypt: explicitly track prepared parts of key
fscrypt: rearrangements preliminary to extent encryption
- - -
-
-
-
2023-04-10
Sweet Tea Dorminy
Superseded
[v1,08/10] fscrypt: make prepared keys record their type.
fscrypt: rearrangements preliminary to extent encryption
- - -
-
-
-
2023-04-10
Sweet Tea Dorminy
Superseded
[v1,07/10] fscrypt: make ci->ci_direct_key a bool not a pointer
fscrypt: rearrangements preliminary to extent encryption
- - -
-
-
-
2023-04-10
Sweet Tea Dorminy
Superseded
[v1,06/10] fscrypt: move all the shared mode key setup deeper
fscrypt: rearrangements preliminary to extent encryption
- - -
-
-
-
2023-04-10
Sweet Tea Dorminy
Superseded
[v1,05/10] fscrypt: make infos have a pointer to prepared keys
fscrypt: rearrangements preliminary to extent encryption
- - -
-
-
-
2023-04-10
Sweet Tea Dorminy
Superseded
[v1,04/10] fscrypt: reduce special-casing of IV_INO_LBLK_32
fscrypt: rearrangements preliminary to extent encryption
- - -
-
-
-
2023-04-10
Sweet Tea Dorminy
Superseded
[v1,03/10] fscrypt: move dirhash key setup away from IO key setup
fscrypt: rearrangements preliminary to extent encryption
- - -
-
-
-
2023-04-10
Sweet Tea Dorminy
Superseded
[v1,02/10] fscrypt: split and rename setup_per_mode_enc_key()
fscrypt: rearrangements preliminary to extent encryption
- - -
-
-
-
2023-04-10
Sweet Tea Dorminy
Superseded
[v1,01/10] fscrypt: split and rename setup_file_encryption_key()
fscrypt: rearrangements preliminary to extent encryption
- - -
-
-
-
2023-04-10
Sweet Tea Dorminy
Superseded
fscrypt: optimize fscrypt_initialize()
fscrypt: optimize fscrypt_initialize()
- - -
-
-
-
2023-04-06
Eric Biggers
Accepted
fscrypt: use WARN_ON_ONCE instead of WARN_ON
fscrypt: use WARN_ON_ONCE instead of WARN_ON
- - -
-
-
-
2023-03-20
Eric Biggers
Accepted
[v4] fscrypt: new helper function - fscrypt_prepare_lookup_partial()
[v4] fscrypt: new helper function - fscrypt_prepare_lookup_partial()
- 1 1
-
-
-
2023-03-20
Eric Biggers
Accepted
[GIT,PULL] fscrypt fix for v6.3-rc4
[GIT,PULL] fscrypt fix for v6.3-rc4
- - -
-
-
-
2023-03-20
Eric Biggers
Accepted
[3/3] fscrypt-crypt-util: fix XTS self-test with latest OpenSSL
xfstests: make fscrypt-crypt-util self-tests work with OpenSSL 3.0
- - -
-
-
-
2023-03-19
Eric Biggers
Accepted
[2/3] fscrypt-crypt-util: use OpenSSL EVP API for AES self-tests
xfstests: make fscrypt-crypt-util self-tests work with OpenSSL 3.0
- - -
-
-
-
2023-03-19
Eric Biggers
Accepted
[1/3] fscrypt-crypt-util: fix HKDF self-test with latest OpenSSL
xfstests: make fscrypt-crypt-util self-tests work with OpenSSL 3.0
- - -
-
-
-
2023-03-19
Eric Biggers
Accepted
[v3,3/3] ceph: switch ceph_open_atomic() to use the new fscrypt helper
ceph: fscrypt: fix atomic open bug for encrypted directories
- - -
-
-
-
2023-03-16
Luis Henriques
Not Applicable
[v3,2/3] ceph: switch ceph_open() to use new fscrypt helper
ceph: fscrypt: fix atomic open bug for encrypted directories
- - -
-
-
-
2023-03-16
Luis Henriques
Not Applicable
[v3,1/3] fscrypt: new helper function - fscrypt_prepare_lookup_partial()
ceph: fscrypt: fix atomic open bug for encrypted directories
- - -
-
-
-
2023-03-16
Luis Henriques
Superseded
[v3,6/6] blk-crypto: drop the NULL check from blk_crypto_put_keyslot()
Fix blk-crypto keyslot race condition
- 1 -
-
-
-
2023-03-15
Eric Biggers
Accepted
[v3,5/6] blk-mq: return actual keyslot error in blk_insert_cloned_request()
Fix blk-crypto keyslot race condition
- 1 -
-
-
-
2023-03-15
Eric Biggers
Accepted
[v3,4/6] blk-crypto: remove blk_crypto_insert_cloned_request()
Fix blk-crypto keyslot race condition
- 1 -
-
-
-
2023-03-15
Eric Biggers
Accepted
[v3,3/6] blk-crypto: make blk_crypto_evict_key() more robust
Fix blk-crypto keyslot race condition
- 1 -
-
-
-
2023-03-15
Eric Biggers
Accepted
[v3,2/6] blk-crypto: make blk_crypto_evict_key() return void
Fix blk-crypto keyslot race condition
- 1 -
-
-
-
2023-03-15
Eric Biggers
Accepted
[v3,1/6] blk-mq: release crypto keyslot before reporting I/O complete
Fix blk-crypto keyslot race condition
- 2 -
-
-
-
2023-03-15
Eric Biggers
Accepted
[v2,2/2] ceph: switch atomic open to use new fscrypt helper
ceph: fscrypt: fix atomic open bug for encrypted directories
- - -
-
-
-
2023-03-14
Luis Henriques
Superseded
[v2,1/2] fscrypt: new helper function - fscrypt_prepare_atomic_open()
ceph: fscrypt: fix atomic open bug for encrypted directories
- 1 -
-
-
-
2023-03-14
Luis Henriques
Superseded
[3/3] fscrypt: check for NULL keyring in fscrypt_put_master_key_activeref()
Fix crash with fscrypt + Landlock
- - -
-
-
-
2023-03-13
Eric Biggers
Accepted
[2/3] fscrypt: improve fscrypt_destroy_keyring() documentation
Fix crash with fscrypt + Landlock
- - -
-
-
-
2023-03-13
Eric Biggers
Accepted
[1/3] fscrypt: destroy keyring after security_sb_delete()
Fix crash with fscrypt + Landlock
- 1 -
-
-
-
2023-03-13
Eric Biggers
Accepted
[2/2] ceph: switch atomic open to use new fscrypt helper
ceph: fscrypt: fix atomic open bug for encrypted directories
- - -
-
-
-
2023-03-13
Luis Henriques
Superseded
[1/2] fscrypt: new helper function - fscrypt_prepare_atomic_open()
ceph: fscrypt: fix atomic open bug for encrypted directories
- - -
-
-
-
2023-03-13
Luis Henriques
Superseded
[RFC,2/2] ceph: switch atomic open to use new fscrypt helper
ceph: fscrypt: fix atomic open bug for encrypted directories
- - -
-
-
-
2023-03-09
Luis Henriques
Superseded
[RFC,1/2] fscrypt: new helper function - __fscrypt_prepare_atomic_open()
ceph: fscrypt: fix atomic open bug for encrypted directories
- - -
-
-
-
2023-03-09
Luis Henriques
Superseded
[v2,4/4] blk-crypto: drop the NULL check from blk_crypto_put_keyslot()
Fix blk-crypto keyslot race condition
- 1 -
-
-
-
2023-03-08
Eric Biggers
Superseded
[v2,3/4] blk-crypto: remove blk_crypto_insert_cloned_request()
Fix blk-crypto keyslot race condition
- - -
-
-
-
2023-03-08
Eric Biggers
Superseded
[v2,2/4] blk-crypto: make blk_crypto_evict_key() more robust
Fix blk-crypto keyslot race condition
- 1 -
-
-
-
2023-03-08
Eric Biggers
Superseded
[v2,1/4] blk-mq: release crypto keyslot before reporting I/O complete
Fix blk-crypto keyslot race condition
- 2 -
-
-
-
2023-03-08
Eric Biggers
Superseded
[4.19] f2fs: fix cgroup writeback accounting with fs-layer encryption
[4.19] f2fs: fix cgroup writeback accounting with fs-layer encryption
1 1 -
-
-
-
2023-03-08
Eric Biggers
Accepted
[3/3] blk-crypto: remove blk_crypto_insert_cloned_request()
Fix blk-crypto keyslot race condition
- - -
-
-
-
2023-03-03
Eric Biggers
Superseded
[2/3] blk-crypto: make blk_crypto_evict_key() more robust
Fix blk-crypto keyslot race condition
- 2 -
-
-
-
2023-03-03
Eric Biggers
Superseded
[1/3] blk-mq: release crypto keyslot before reporting I/O complete
Fix blk-crypto keyslot race condition
- 1 -
-
-
-
2023-03-03
Eric Biggers
Superseded
blk-crypto: make blk_crypto_evict_key() always try to evict
blk-crypto: make blk_crypto_evict_key() always try to evict
- - -
-
-
-
2023-02-26
Eric Biggers
Superseded
fs/buffer.c: use b_folio for fscrypt work
fs/buffer.c: use b_folio for fscrypt work
- - -
-
-
-
2023-02-24
Eric Biggers
Accepted
[GIT,PULL] fsverity updates for 6.3
[GIT,PULL] fsverity updates for 6.3
- - -
-
-
-
2023-02-19
Eric Biggers
Not Applicable
[GIT,PULL] fscrypt updates for 6.3
[GIT,PULL] fscrypt updates for 6.3
- - -
-
-
-
2023-02-19
Eric Biggers
Accepted
[5/5] fscrypt: clean up fscrypt_add_test_dummy_key()
Add the test_dummy_encryption key on-demand
- - -
-
-
-
2023-02-08
Eric Biggers
Accepted
[4/5] fs/super.c: stop calling fscrypt_destroy_keyring() from __put_super()
Add the test_dummy_encryption key on-demand
- - -
-
-
-
2023-02-08
Eric Biggers
Accepted
[3/5] f2fs: stop calling fscrypt_add_test_dummy_key()
Add the test_dummy_encryption key on-demand
- - -
-
-
-
2023-02-08
Eric Biggers
Accepted
[2/5] ext4: stop calling fscrypt_add_test_dummy_key()
Add the test_dummy_encryption key on-demand
- - -
-
-
-
2023-02-08
Eric Biggers
Accepted
[1/5] fscrypt: add the test dummy encryption key on-demand
Add the test_dummy_encryption key on-demand
- - -
-
-
-
2023-02-08
Eric Biggers
Accepted
f2fs: fix cgroup writeback accounting with fs-layer encryption
f2fs: fix cgroup writeback accounting with fs-layer encryption
1 1 -
-
-
-
2023-02-03
Eric Biggers
Accepted
ext4: fix cgroup writeback accounting with fs-layer encryption
ext4: fix cgroup writeback accounting with fs-layer encryption
1 - -
-
-
-
2023-02-03
Eric Biggers
Accepted
[RFC,v9,16/16] documentation: add ipe documentation
Integrity Policy Enforcement LSM (IPE)
- - -
-
-
-
2023-01-30
Fan Wu
Not Applicable
[RFC,v9,15/16] ipe: kunit test for parser
Integrity Policy Enforcement LSM (IPE)
- - -
-
-
-
2023-01-30
Fan Wu
Not Applicable
[RFC,v9,14/16] scripts: add boot policy generation program
Integrity Policy Enforcement LSM (IPE)
- - -
-
-
-
2023-01-30
Fan Wu
Not Applicable
[RFC,v9,13/16] ipe: enable support for fs-verity as a trust provider
Integrity Policy Enforcement LSM (IPE)
- - -
-
-
-
2023-01-30
Fan Wu
Not Applicable
[RFC,v9,12/16] fsverity: consume builtin signature via LSM hook
Integrity Policy Enforcement LSM (IPE)
- - -
-
-
-
2023-01-30
Fan Wu
Not Applicable
[RFC,v9,11/16] ipe: add support for dm-verity as a trust provider
Integrity Policy Enforcement LSM (IPE)
- - -
-
-
-
2023-01-30
Fan Wu
Not Applicable
[RFC,v9,10/16] dm-verity: consume root hash digest and signature data via LSM hook
Integrity Policy Enforcement LSM (IPE)
- - -
-
-
-
2023-01-30
Fan Wu
Not Applicable
[RFC,v9,09/16] block|security: add LSM blob to block_device
Integrity Policy Enforcement LSM (IPE)
- 1 -
-
-
-
2023-01-30
Fan Wu
Not Applicable
[RFC,v9,08/16] ipe: add permissive toggle
Integrity Policy Enforcement LSM (IPE)
- - -
-
-
-
2023-01-30
Fan Wu
Not Applicable
[RFC,v9,07/16] uapi|audit|ipe: add ipe auditing support
Integrity Policy Enforcement LSM (IPE)
- - -
-
-
-
2023-01-30
Fan Wu
Not Applicable
[RFC,v9,06/16] ipe: add LSM hooks on execution and kernel read
Integrity Policy Enforcement LSM (IPE)
- - -
-
-
-
2023-01-30
Fan Wu
Not Applicable
[RFC,v9,05/16] ipe: add userspace interface
Integrity Policy Enforcement LSM (IPE)
- - -
-
-
-
2023-01-30
Fan Wu
Not Applicable
[RFC,v9,04/16] security: add new securityfs delete function
Integrity Policy Enforcement LSM (IPE)
- - -
-
-
-
2023-01-30
Fan Wu
Not Applicable
[RFC,v9,03/16] ipe: add evaluation loop and introduce 'boot_verified' as a trust provider
Integrity Policy Enforcement LSM (IPE)
- - -
-
-
-
2023-01-30
Fan Wu
Not Applicable
[RFC,v9,02/16] ipe: add policy parser
Integrity Policy Enforcement LSM (IPE)
- - -
-
-
-
2023-01-30
Fan Wu
Not Applicable
[RFC,v9,01/16] security: add ipe lsm
Integrity Policy Enforcement LSM (IPE)
- - -
-
-
-
2023-01-30
Fan Wu
Not Applicable
fscrypt: Copy the memcg information to the ciphertext page
fscrypt: Copy the memcg information to the ciphertext page
- - -
-
-
-
2023-01-29
Matthew Wilcox (Oracle)
Superseded
fscrypt: support decrypting data from large folios
fscrypt: support decrypting data from large folios
- 1 -
-
-
-
2023-01-27
Eric Biggers
Accepted
[GIT,PULL] fscrypt MAINTAINERS entry update for 6.2-rc6
[GIT,PULL] fscrypt MAINTAINERS entry update for 6.2-rc6
- - -
-
-
-
2023-01-24
Eric Biggers
Accepted
[GIT,PULL] fsverity MAINTAINERS entry update for 6.2-rc6
[GIT,PULL] fsverity MAINTAINERS entry update for 6.2-rc6
- - -
-
-
-
2023-01-24
Eric Biggers
Accepted
MAINTAINERS: update fscrypt git repo
MAINTAINERS: update fscrypt git repo
- - -
-
-
-
2023-01-16
Eric Biggers
Accepted
MAINTAINERS: update fsverity git repo, list, and patchwork
MAINTAINERS: update fsverity git repo, list, and patchwork
- - -
-
-
-
2023-01-16
Eric Biggers
Accepted
[v3] generic/692: generalize the test for non-4K Merkle tree block sizes
[v3] generic/692: generalize the test for non-4K Merkle tree block sizes
- 1 -
-
-
-
2023-01-11
Eric Biggers
Accepted
[v2] generic/692: generalize the test for non-4K Merkle tree block sizes
[v2] generic/692: generalize the test for non-4K Merkle tree block sizes
- - -
-
-
-
2023-01-11
Eric Biggers
Superseded
[RFC,17/17] fscrypt: update documentation to mention per-extent keys.
fscrypt: add per-extent encryption keys
- - -
-
-
-
2023-01-01
Sweet Tea Dorminy
Superseded
[RFC,16/17] fscrypt: disable inline encryption for extent-based encryption
fscrypt: add per-extent encryption keys
- - -
-
-
-
2023-01-01
Sweet Tea Dorminy
Superseded
[RFC,15/17] fscrypt: allow load/save of extent contexts
fscrypt: add per-extent encryption keys
- - -
-
-
-
2023-01-01
Sweet Tea Dorminy
Superseded
[RFC,14/17] fscrypt: add creation/usage/freeing of per-extent infos
fscrypt: add per-extent encryption keys
- - -
-
-
-
2023-01-01
Sweet Tea Dorminy
Superseded
[RFC,13/17] fscrypt: use an optional ino equivalent for per-extent infos
fscrypt: add per-extent encryption keys
- - -
-
-
-
2023-01-01
Sweet Tea Dorminy
Superseded
[RFC,12/17] fscrypt: notify per-extent infos if master key vanishes
fscrypt: add per-extent encryption keys
- - -
-
-
-
2023-01-01
Sweet Tea Dorminy
Superseded
[RFC,11/17] fscrypt: update all the *per_file_* function names
fscrypt: add per-extent encryption keys
- - -
-
-
-
2023-01-01
Sweet Tea Dorminy
Superseded
[RFC,10/17] fscrypt: let fscrypt_infos be owned by an extent
fscrypt: add per-extent encryption keys
- - -
-
-
-
2023-01-01
Sweet Tea Dorminy
Superseded
[RFC,09/17] fscrypt: make fscrypt_setup_encryption_info generic for extents
fscrypt: add per-extent encryption keys
- - -
-
-
-
2023-01-01
Sweet Tea Dorminy
Superseded
[RFC,08/17] fscrypt: rename mk->mk_decrypted_inodes*
fscrypt: add per-extent encryption keys
- - -
-
-
-
2023-01-01
Sweet Tea Dorminy
Superseded
«
1
2
...
6
7
8
…
38
39
»