Show patches with: Submitter = Eric Biggers       |   900 patches
« 1 2 ... 6 7 8 9 »
Patch Series A/F/R/T S/W/F Date Submitter Delegate State
[v4,05/16] fs-verity: add Kconfig and the helper functions for hashing fs-verity: read-only file-based authenticity protection - - - - --- 2019-06-06 Eric Biggers Not Applicable
[v4,04/16] fs: uapi: define verity bit for FS_IOC_GETFLAGS fs-verity: read-only file-based authenticity protection - - - - --- 2019-06-06 Eric Biggers Not Applicable
[v4,03/16] fs-verity: add UAPI header fs-verity: read-only file-based authenticity protection - - - - --- 2019-06-06 Eric Biggers Not Applicable
[v4,02/16] fs-verity: add MAINTAINERS file entry fs-verity: read-only file-based authenticity protection - - - - --- 2019-06-06 Eric Biggers Not Applicable
[v4,01/16] fs-verity: add a documentation file fs-verity: read-only file-based authenticity protection - - 1 - --- 2019-06-06 Eric Biggers Not Applicable
[e2fsprogs] tests: add test for e2fsck of verity file [e2fsprogs] tests: add test for e2fsck of verity file - - - - --- 2019-05-28 Eric Biggers Accepted
[v2,7/7] generic: verify ciphertext of v1 encryption policies with Adiantum xfstests: verify fscrypt-encrypted contents and filenames - - - - --- 2019-05-24 Eric Biggers Not Applicable
[v2,6/7] generic: verify ciphertext of v1 encryption policies with AES-128 xfstests: verify fscrypt-encrypted contents and filenames - - - - --- 2019-05-24 Eric Biggers Not Applicable
[v2,5/7] generic: verify ciphertext of v1 encryption policies with AES-256 xfstests: verify fscrypt-encrypted contents and filenames - - - - --- 2019-05-24 Eric Biggers Not Applicable
[v2,4/7] common/encrypt: add helper for ciphertext verification tests xfstests: verify fscrypt-encrypted contents and filenames - - - - --- 2019-05-24 Eric Biggers Not Applicable
[v2,3/7] common/encrypt: support requiring other encryption settings xfstests: verify fscrypt-encrypted contents and filenames - - - - --- 2019-05-24 Eric Biggers Not Applicable
[v2,2/7] fscrypt-crypt-util: add utility for reproducing fscrypt encrypted data xfstests: verify fscrypt-encrypted contents and filenames - - - - --- 2019-05-24 Eric Biggers Not Applicable
[v2,1/7] common/encrypt: introduce helpers for set_encpolicy and get_encpolicy xfstests: verify fscrypt-encrypted contents and filenames - - - - --- 2019-05-24 Eric Biggers Not Applicable
[v3,15/15] f2fs: add fs-verity support fs-verity: read-only file-based authenticity protection - - - - --- 2019-05-23 Eric Biggers Not Applicable
[v3,14/15] ext4: add fs-verity read support fs-verity: read-only file-based authenticity protection - - - - --- 2019-05-23 Eric Biggers Not Applicable
[v3,13/15] ext4: add basic fs-verity support fs-verity: read-only file-based authenticity protection - - - - --- 2019-05-23 Eric Biggers Not Applicable
[v3,12/15] fs-verity: support builtin file signatures fs-verity: read-only file-based authenticity protection - - - - --- 2019-05-23 Eric Biggers Not Applicable
[v3,11/15] fs-verity: add SHA-512 support fs-verity: read-only file-based authenticity protection - - - - --- 2019-05-23 Eric Biggers Not Applicable
[v3,10/15] fs-verity: implement FS_IOC_MEASURE_VERITY ioctl fs-verity: read-only file-based authenticity protection - - - - --- 2019-05-23 Eric Biggers Not Applicable
[v3,09/15] fs-verity: implement FS_IOC_ENABLE_VERITY ioctl fs-verity: read-only file-based authenticity protection - - - - --- 2019-05-23 Eric Biggers Not Applicable
[v3,08/15] fs-verity: add data verification hooks for ->readpages() fs-verity: read-only file-based authenticity protection - - - - --- 2019-05-23 Eric Biggers Not Applicable
[v3,07/15] fs-verity: add the hook for file ->setattr() fs-verity: read-only file-based authenticity protection - - - - --- 2019-05-23 Eric Biggers Not Applicable
[v3,06/15] fs-verity: add the hook for file ->open() fs-verity: read-only file-based authenticity protection - - - - --- 2019-05-23 Eric Biggers Not Applicable
[v3,05/15] fs-verity: add inode and superblock fields fs-verity: read-only file-based authenticity protection - - - - --- 2019-05-23 Eric Biggers Not Applicable
[v3,04/15] fs-verity: add Kconfig and the helper functions for hashing fs-verity: read-only file-based authenticity protection - - - - --- 2019-05-23 Eric Biggers Not Applicable
[v3,03/15] fs-verity: add UAPI header fs-verity: read-only file-based authenticity protection - - - - --- 2019-05-23 Eric Biggers Not Applicable
[v3,02/15] fs-verity: add MAINTAINERS file entry fs-verity: read-only file-based authenticity protection - - - - --- 2019-05-23 Eric Biggers Not Applicable
[v3,01/15] fs-verity: add a documentation file fs-verity: read-only file-based authenticity protection - - - - --- 2019-05-23 Eric Biggers Not Applicable
e2fsck: handle verity files in scan_extent_node() e2fsck: handle verity files in scan_extent_node() - 1 - - --- 2019-05-23 Eric Biggers Accepted
[v6,16/16] fscrypt: document the new ioctls and policy version fscrypt: key management improvements - - - - --- 2019-05-20 Eric Biggers Not Applicable
[v6,15/16] ubifs: wire up new fscrypt ioctls fscrypt: key management improvements - - - - --- 2019-05-20 Eric Biggers Not Applicable
[v6,14/16] f2fs: wire up new fscrypt ioctls fscrypt: key management improvements - - - - --- 2019-05-20 Eric Biggers Not Applicable
[v6,13/16] ext4: wire up new fscrypt ioctls fscrypt: key management improvements - - - - --- 2019-05-20 Eric Biggers Not Applicable
[v6,12/16] fscrypt: require that key be added when setting a v2 encryption policy fscrypt: key management improvements - - - - --- 2019-05-20 Eric Biggers Not Applicable
[v6,11/16] fscrypt: allow unprivileged users to add/remove keys for v2 policies fscrypt: key management improvements - - - - --- 2019-05-20 Eric Biggers Not Applicable
[v6,10/16] fscrypt: v2 encryption policy support fscrypt: key management improvements - - - - --- 2019-05-20 Eric Biggers Not Applicable
[v6,09/16] fscrypt: add an HKDF-SHA512 implementation fscrypt: key management improvements - - - - --- 2019-05-20 Eric Biggers Not Applicable
[v6,08/16] fscrypt: add FS_IOC_GET_ENCRYPTION_KEY_STATUS ioctl fscrypt: key management improvements - - - - --- 2019-05-20 Eric Biggers Not Applicable
[v6,07/16] fscrypt: add FS_IOC_REMOVE_ENCRYPTION_KEY ioctl fscrypt: key management improvements - - - - --- 2019-05-20 Eric Biggers Not Applicable
[v6,06/16] fscrypt: add FS_IOC_ADD_ENCRYPTION_KEY ioctl fscrypt: key management improvements - - - - --- 2019-05-20 Eric Biggers Not Applicable
[v6,05/16] fscrypt: refactor v1 policy key setup into keysetup_legacy.c fscrypt: key management improvements - - - - --- 2019-05-20 Eric Biggers Not Applicable
[v6,04/16] fscrypt: add ->ci_inode to fscrypt_info fscrypt: key management improvements - - - - --- 2019-05-20 Eric Biggers Not Applicable
[v6,03/16] fscrypt: use FSCRYPT_* definitions, not FS_* fscrypt: key management improvements - - - - --- 2019-05-20 Eric Biggers Not Applicable
[v6,02/16] fscrypt: use FSCRYPT_ prefix for uapi constants fscrypt: key management improvements - - - - --- 2019-05-20 Eric Biggers Not Applicable
[v6,01/16] fs, fscrypt: move uapi definitions to new header <linux/fscrypt.h> fscrypt: key management improvements - - - - --- 2019-05-20 Eric Biggers Not Applicable
[v2,14/14] ext4: encrypt only up to last block in ext4_bio_write_page() fscrypt, ext4: prepare for blocksize != PAGE_SIZE - - 1 - --- 2019-05-20 Eric Biggers Not Applicable
[v2,13/14] ext4: decrypt only the needed block in __ext4_block_zero_page_range() fscrypt, ext4: prepare for blocksize != PAGE_SIZE - - - - --- 2019-05-20 Eric Biggers Not Applicable
[v2,12/14] ext4: decrypt only the needed blocks in ext4_block_write_begin() fscrypt, ext4: prepare for blocksize != PAGE_SIZE - - - - --- 2019-05-20 Eric Biggers Not Applicable
[v2,11/14] ext4: clear BH_Uptodate flag on decryption error fscrypt, ext4: prepare for blocksize != PAGE_SIZE - - - - --- 2019-05-20 Eric Biggers Not Applicable
[v2,10/14] fscrypt: decrypt only the needed blocks in __fscrypt_decrypt_bio() fscrypt, ext4: prepare for blocksize != PAGE_SIZE - - 1 - --- 2019-05-20 Eric Biggers Not Applicable
[v2,09/14] fscrypt: support decrypting multiple filesystem blocks per page fscrypt, ext4: prepare for blocksize != PAGE_SIZE - - 1 - --- 2019-05-20 Eric Biggers Not Applicable
[v2,08/14] fscrypt: introduce fscrypt_decrypt_block_inplace() fscrypt, ext4: prepare for blocksize != PAGE_SIZE - - 1 - --- 2019-05-20 Eric Biggers Not Applicable
[v2,07/14] fscrypt: handle blocksize < PAGE_SIZE in fscrypt_zeroout_range() fscrypt, ext4: prepare for blocksize != PAGE_SIZE - - 1 - --- 2019-05-20 Eric Biggers Not Applicable
[v2,06/14] fscrypt: support encrypting multiple filesystem blocks per page fscrypt, ext4: prepare for blocksize != PAGE_SIZE - - 1 - --- 2019-05-20 Eric Biggers Not Applicable
[v2,05/14] fscrypt: introduce fscrypt_encrypt_block_inplace() fscrypt, ext4: prepare for blocksize != PAGE_SIZE - - 1 - --- 2019-05-20 Eric Biggers Not Applicable
[v2,04/14] fscrypt: clean up some BUG_ON()s in block encryption/decryption fscrypt, ext4: prepare for blocksize != PAGE_SIZE - - 1 - --- 2019-05-20 Eric Biggers Not Applicable
[v2,03/14] fscrypt: rename fscrypt_do_page_crypto() to fscrypt_crypt_block() fscrypt, ext4: prepare for blocksize != PAGE_SIZE - - 1 - --- 2019-05-20 Eric Biggers Not Applicable
[v2,02/14] fscrypt: remove the "write" part of struct fscrypt_ctx fscrypt, ext4: prepare for blocksize != PAGE_SIZE - - 1 - --- 2019-05-20 Eric Biggers Not Applicable
[v2,01/14] fscrypt: simplify bounce page handling fscrypt, ext4: prepare for blocksize != PAGE_SIZE - - 1 - --- 2019-05-20 Eric Biggers Not Applicable
[13/13] ext4: encrypt only up to last block in ext4_bio_write_page() fscrypt, ext4: prepare for blocksize != PAGE_SIZE - - 1 - --- 2019-05-01 Eric Biggers Not Applicable
[12/13] ext4: decrypt only the needed block in __ext4_block_zero_page_range() fscrypt, ext4: prepare for blocksize != PAGE_SIZE - - - - --- 2019-05-01 Eric Biggers Not Applicable
[11/13] ext4: decrypt only the needed blocks in ext4_block_write_begin() fscrypt, ext4: prepare for blocksize != PAGE_SIZE - - - - --- 2019-05-01 Eric Biggers Not Applicable
[10/13] ext4: clear BH_Uptodate flag on decryption error fscrypt, ext4: prepare for blocksize != PAGE_SIZE - - - - --- 2019-05-01 Eric Biggers Not Applicable
[09/13] fscrypt: support decrypting multiple filesystem blocks per page fscrypt, ext4: prepare for blocksize != PAGE_SIZE - - 1 - --- 2019-05-01 Eric Biggers Not Applicable
[08/13] fscrypt: introduce fscrypt_decrypt_block_inplace() fscrypt, ext4: prepare for blocksize != PAGE_SIZE - - 1 - --- 2019-05-01 Eric Biggers Not Applicable
[07/13] fscrypt: handle blocksize < PAGE_SIZE in fscrypt_zeroout_range() fscrypt, ext4: prepare for blocksize != PAGE_SIZE - - 1 - --- 2019-05-01 Eric Biggers Not Applicable
[06/13] fscrypt: support encrypting multiple filesystem blocks per page fscrypt, ext4: prepare for blocksize != PAGE_SIZE - - 1 - --- 2019-05-01 Eric Biggers Not Applicable
[05/13] fscrypt: introduce fscrypt_encrypt_block_inplace() fscrypt, ext4: prepare for blocksize != PAGE_SIZE - - 1 - --- 2019-05-01 Eric Biggers Not Applicable
[04/13] fscrypt: clean up some BUG_ON()s in block encryption/decryption fscrypt, ext4: prepare for blocksize != PAGE_SIZE - - 1 - --- 2019-05-01 Eric Biggers Not Applicable
[03/13] fscrypt: rename fscrypt_do_page_crypto() to fscrypt_crypt_block() fscrypt, ext4: prepare for blocksize != PAGE_SIZE - - 1 - --- 2019-05-01 Eric Biggers Not Applicable
[02/13] fscrypt: remove the "write" part of struct fscrypt_ctx fscrypt, ext4: prepare for blocksize != PAGE_SIZE - - 1 - --- 2019-05-01 Eric Biggers Not Applicable
[01/13] fscrypt: simplify bounce page handling fscrypt, ext4: prepare for blocksize != PAGE_SIZE - - 1 - --- 2019-05-01 Eric Biggers Not Applicable
[RFC,7/7] generic: verify ciphertext of v1 encryption policies with Adiantum xfstests: verify fscrypt-encrypted contents and filenames - - - - --- 2019-04-26 Eric Biggers Not Applicable
[RFC,6/7] generic: verify ciphertext of v1 encryption policies with AES-128 xfstests: verify fscrypt-encrypted contents and filenames - - - - --- 2019-04-26 Eric Biggers Not Applicable
[RFC,5/7] generic: verify ciphertext of v1 encryption policies with AES-256 xfstests: verify fscrypt-encrypted contents and filenames - - - - --- 2019-04-26 Eric Biggers Not Applicable
[RFC,4/7] common/encrypt: add helper for ciphertext verification tests xfstests: verify fscrypt-encrypted contents and filenames - - - - --- 2019-04-26 Eric Biggers Not Applicable
[RFC,3/7] common/encrypt: support requiring other encryption settings xfstests: verify fscrypt-encrypted contents and filenames - - - - --- 2019-04-26 Eric Biggers Not Applicable
[RFC,2/7] fscrypt-crypt-util: add utility for reproducing fscrypt encrypted data xfstests: verify fscrypt-encrypted contents and filenames - - - - --- 2019-04-26 Eric Biggers Not Applicable
[RFC,1/7] common/encrypt: introduce helpers for set_encpolicy and get_encpolicy xfstests: verify fscrypt-encrypted contents and filenames - - - - --- 2019-04-26 Eric Biggers Not Applicable
debugfs: remove unused variable 'tmp_inode' debugfs: remove unused variable 'tmp_inode' - - - - --- 2019-04-22 Eric Biggers Accepted
libext2fs: remove unused variable 'old_flags' libext2fs: remove unused variable 'old_flags' - - - - --- 2019-04-22 Eric Biggers Accepted
libext2fs: remove unused variable 'buff' libext2fs: remove unused variable 'buff' - - 1 - --- 2019-04-22 Eric Biggers Accepted
debugfs: fix encoding handling in dx_hash command debugfs: fix encoding handling in dx_hash command - 1 1 - --- 2019-04-22 Eric Biggers Accepted
debugfs: avoid ambiguity when printing filenames debugfs: avoid ambiguity when printing filenames - 1 - - --- 2019-04-22 Eric Biggers Accepted
[v5,16/16] fscrypt: document the new ioctls and policy version fscrypt: key management improvements - - - - --- 2019-04-18 Eric Biggers Superseded
[v5,15/16] ubifs: wire up new fscrypt ioctls fscrypt: key management improvements - - - - --- 2019-04-18 Eric Biggers Superseded
[v5,14/16] f2fs: wire up new fscrypt ioctls fscrypt: key management improvements - - - - --- 2019-04-18 Eric Biggers Superseded
[v5,13/16] ext4: wire up new fscrypt ioctls fscrypt: key management improvements - - - - --- 2019-04-18 Eric Biggers Superseded
[v5,12/16] fscrypt: require that key be added when setting a v2 encryption policy fscrypt: key management improvements - - - - --- 2019-04-18 Eric Biggers Superseded
[v5,11/16] fscrypt: allow unprivileged users to add/remove keys for v2 policies fscrypt: key management improvements - - - - --- 2019-04-18 Eric Biggers Superseded
[v5,10/16] fscrypt: v2 encryption policy support fscrypt: key management improvements - - - - --- 2019-04-18 Eric Biggers Superseded
[v5,09/16] fscrypt: add an HKDF-SHA512 implementation fscrypt: key management improvements - - - - --- 2019-04-18 Eric Biggers Superseded
[v5,08/16] fscrypt: add FS_IOC_GET_ENCRYPTION_KEY_STATUS ioctl fscrypt: key management improvements - - - - --- 2019-04-18 Eric Biggers Superseded
[v5,07/16] fscrypt: add FS_IOC_REMOVE_ENCRYPTION_KEY ioctl fscrypt: key management improvements - - - - --- 2019-04-18 Eric Biggers Superseded
[v5,06/16] fscrypt: add FS_IOC_ADD_ENCRYPTION_KEY ioctl fscrypt: key management improvements - - - - --- 2019-04-18 Eric Biggers Superseded
[v5,05/16] fscrypt: refactor v1 policy key setup into keysetup_legacy.c fscrypt: key management improvements - - - - --- 2019-04-18 Eric Biggers Superseded
[v5,04/16] fscrypt: add ->ci_inode to fscrypt_info fscrypt: key management improvements - - - - --- 2019-04-18 Eric Biggers Superseded
[v5,03/16] fscrypt: use FSCRYPT_* definitions, not FS_* fscrypt: key management improvements - - - - --- 2019-04-18 Eric Biggers Superseded
[v5,02/16] fscrypt: use FSCRYPT_ prefix for uapi constants fscrypt: key management improvements - - - - --- 2019-04-18 Eric Biggers Superseded
[v5,01/16] fs, fscrypt: move uapi definitions to new header <linux/fscrypt.h> fscrypt: key management improvements - - - - --- 2019-04-18 Eric Biggers Superseded
« 1 2 ... 6 7 8 9 »