Toggle navigation
Patchwork
Linux ext4 filesystem development
Patches
Bundles
About this project
Login
Register
Mail settings
Show patches with
: Submitter =
Eric Biggers
| Archived =
No
| 870 patches
Series
Submitter
State
any
Action Required
New
Under Review
Accepted
Rejected
RFC
Not Applicable
Changes Requested
Awaiting Upstream
Superseded
Deferred
Needs Review / ACK
Handled Elsewhere
Search
Archived
No
Yes
Both
Delegate
------
Nobody
jgarzik
arnd
ymano
smfrench
jlayton
tseliot
ogasawara
amitk
awhitcroft
mst
dayangkun
jwboyer
jwboyer
colinking
colinking
azummo
dwmw2
rtg
sconklin
smb
aliguori
bradf
galak
galak
demarchi
ms
bhundven
chbs
kengyu
kadlec
pdp
regit
jabk
laforge
laforge
tonyb
sfr
alai
zecke
zecke
__damien__
luka
luka
prafulla@marvell.com
cyrus
PeterHuewe
kiho
jow
jow
ypwong
nico
dedeckeh
dedeckeh
yousong
yousong
tomcwarren
mb
mrchuck
vineetg76
computersforpeace
Noltari
Noltari
patrick_delaunay
ee07b291
ldir
ldir
stefanct
zhouhan
carldani
blp
ffainelli
ffainelli
regXboi
bbrezillon
pravin
mkp
jpettit
mkresin
mkresin
thess
thess
fbarrat
fbarrat
phil
linville
jesse
tjaalton
esben
abrodkin
abrodkin
diproiettod
tbot
stephenfin
vriera
darball1
sammj
ajd
jogo
jogo
bhelgaas
blogic
blogic
tagr
tagr
tagr
oohal
russellb
ptomsich
agraf
joestringer
davem
davem
davem
mwalle
naveen
pchotard
pepe2k
pepe2k
arj
arj
andmur01
amitay
matttbe
pabeni
istokes
aparcar
Ansuel
goliath
martineau
tytso
danielschwierzeck
hs
mariosix
dcaratti
ovsrobot
ovsrobot
aserdean
XiaoYang
khem
tpetazzoni
mkorpershoek
marex
liwang
robimarko
mmichelson
apritzel
danielhb
groug
npiggin
pareddja
atishp
netdrv
mkubecek
stintel
stintel
jkicinski
cpitchen
maximeh
dsa
jstancek
pm215
bpf
jonhunter
shettyg
lorpie01
acelan
wigyori
wigyori
apopple
dja
alexhung
lynxis
lynxis
brgl
brgl
peda
akodanev
narmstrong
981213
0andriy
chunkeey
snowpatch_ozlabs
snowpatch_ozlabs
snowpatch_ozlabs
aivanov
atishp04
shemminger
blocktrron
monstr
vigneshr
mraynal
horms
stewart
stewart
freenix
kabel
rmilecki
rmilecki
rfried
kevery
akumar
jacmet
xypron
wsa
Jaehoon
rsalvaterra
adrianschmutzler
sjg
hegdevasant
hegdevasant
prom
bmeng
jagan
ukleinek
ukleinek
ag
ehristev
metan
ivanhu
arbab
pablo
pablo
abelloni
chleroy
trini
apconole
svanheule
legoater
legoater
legoater
rw
rw
wbx
Hauke
Hauke
bjonglez
ynezz
aik
sbabic
sbabic
pevik
xback
xback
richiejp
dangole
dangole
forty
next_ghost
anuppatel
anuppatel
echaudron
acer
benh
rgrimm
segher
passgat
pratyush
jms
jms
jms
festevam
mans0n
Andes
ruscur
jmberg
linusw
linusw
ymorin
ymorin
numans
jk
jk
jk
jk
xuyang
matthias_bgg
tambarus
kubu
apalos
dceara
pbrobinson
imaximets
strlen
strlen
spectrum
cazzacarna
neocturne
aldot
TIENFONG
mpe
ktraynor
arnout
calebccff
nbd
nbd
robh
anguy11
paulus
stroese
jm
Apply
«
1
2
...
6
7
8
9
»
Patch
Series
A/F/R/T
S/W/F
Date
Submitter
Delegate
State
[v3,10/15] fs-verity: implement FS_IOC_MEASURE_VERITY ioctl
fs-verity: read-only file-based authenticity protection
- - - -
-
-
-
2019-05-23
Eric Biggers
Not Applicable
[v3,09/15] fs-verity: implement FS_IOC_ENABLE_VERITY ioctl
fs-verity: read-only file-based authenticity protection
- - - -
-
-
-
2019-05-23
Eric Biggers
Not Applicable
[v3,08/15] fs-verity: add data verification hooks for ->readpages()
fs-verity: read-only file-based authenticity protection
- - - -
-
-
-
2019-05-23
Eric Biggers
Not Applicable
[v3,07/15] fs-verity: add the hook for file ->setattr()
fs-verity: read-only file-based authenticity protection
- - - -
-
-
-
2019-05-23
Eric Biggers
Not Applicable
[v3,06/15] fs-verity: add the hook for file ->open()
fs-verity: read-only file-based authenticity protection
- - - -
-
-
-
2019-05-23
Eric Biggers
Not Applicable
[v3,05/15] fs-verity: add inode and superblock fields
fs-verity: read-only file-based authenticity protection
- - - -
-
-
-
2019-05-23
Eric Biggers
Not Applicable
[v3,04/15] fs-verity: add Kconfig and the helper functions for hashing
fs-verity: read-only file-based authenticity protection
- - - -
-
-
-
2019-05-23
Eric Biggers
Not Applicable
[v3,03/15] fs-verity: add UAPI header
fs-verity: read-only file-based authenticity protection
- - - -
-
-
-
2019-05-23
Eric Biggers
Not Applicable
[v3,02/15] fs-verity: add MAINTAINERS file entry
fs-verity: read-only file-based authenticity protection
- - - -
-
-
-
2019-05-23
Eric Biggers
Not Applicable
[v3,01/15] fs-verity: add a documentation file
fs-verity: read-only file-based authenticity protection
- - - -
-
-
-
2019-05-23
Eric Biggers
Not Applicable
[v6,16/16] fscrypt: document the new ioctls and policy version
fscrypt: key management improvements
- - - -
-
-
-
2019-05-20
Eric Biggers
Not Applicable
[v6,15/16] ubifs: wire up new fscrypt ioctls
fscrypt: key management improvements
- - - -
-
-
-
2019-05-20
Eric Biggers
Not Applicable
[v6,14/16] f2fs: wire up new fscrypt ioctls
fscrypt: key management improvements
- - - -
-
-
-
2019-05-20
Eric Biggers
Not Applicable
[v6,13/16] ext4: wire up new fscrypt ioctls
fscrypt: key management improvements
- - - -
-
-
-
2019-05-20
Eric Biggers
Not Applicable
[v6,12/16] fscrypt: require that key be added when setting a v2 encryption policy
fscrypt: key management improvements
- - - -
-
-
-
2019-05-20
Eric Biggers
Not Applicable
[v6,11/16] fscrypt: allow unprivileged users to add/remove keys for v2 policies
fscrypt: key management improvements
- - - -
-
-
-
2019-05-20
Eric Biggers
Not Applicable
[v6,10/16] fscrypt: v2 encryption policy support
fscrypt: key management improvements
- - - -
-
-
-
2019-05-20
Eric Biggers
Not Applicable
[v6,09/16] fscrypt: add an HKDF-SHA512 implementation
fscrypt: key management improvements
- - - -
-
-
-
2019-05-20
Eric Biggers
Not Applicable
[v6,08/16] fscrypt: add FS_IOC_GET_ENCRYPTION_KEY_STATUS ioctl
fscrypt: key management improvements
- - - -
-
-
-
2019-05-20
Eric Biggers
Not Applicable
[v6,07/16] fscrypt: add FS_IOC_REMOVE_ENCRYPTION_KEY ioctl
fscrypt: key management improvements
- - - -
-
-
-
2019-05-20
Eric Biggers
Not Applicable
[v6,06/16] fscrypt: add FS_IOC_ADD_ENCRYPTION_KEY ioctl
fscrypt: key management improvements
- - - -
-
-
-
2019-05-20
Eric Biggers
Not Applicable
[v6,05/16] fscrypt: refactor v1 policy key setup into keysetup_legacy.c
fscrypt: key management improvements
- - - -
-
-
-
2019-05-20
Eric Biggers
Not Applicable
[v6,04/16] fscrypt: add ->ci_inode to fscrypt_info
fscrypt: key management improvements
- - - -
-
-
-
2019-05-20
Eric Biggers
Not Applicable
[v6,03/16] fscrypt: use FSCRYPT_* definitions, not FS_*
fscrypt: key management improvements
- - - -
-
-
-
2019-05-20
Eric Biggers
Not Applicable
[v6,02/16] fscrypt: use FSCRYPT_ prefix for uapi constants
fscrypt: key management improvements
- - - -
-
-
-
2019-05-20
Eric Biggers
Not Applicable
[v6,01/16] fs, fscrypt: move uapi definitions to new header <linux/fscrypt.h>
fscrypt: key management improvements
- - - -
-
-
-
2019-05-20
Eric Biggers
Not Applicable
[v2,14/14] ext4: encrypt only up to last block in ext4_bio_write_page()
fscrypt, ext4: prepare for blocksize != PAGE_SIZE
- - 1 -
-
-
-
2019-05-20
Eric Biggers
Not Applicable
[v2,13/14] ext4: decrypt only the needed block in __ext4_block_zero_page_range()
fscrypt, ext4: prepare for blocksize != PAGE_SIZE
- - - -
-
-
-
2019-05-20
Eric Biggers
Not Applicable
[v2,12/14] ext4: decrypt only the needed blocks in ext4_block_write_begin()
fscrypt, ext4: prepare for blocksize != PAGE_SIZE
- - - -
-
-
-
2019-05-20
Eric Biggers
Not Applicable
[v2,11/14] ext4: clear BH_Uptodate flag on decryption error
fscrypt, ext4: prepare for blocksize != PAGE_SIZE
- - - -
-
-
-
2019-05-20
Eric Biggers
Not Applicable
[v2,10/14] fscrypt: decrypt only the needed blocks in __fscrypt_decrypt_bio()
fscrypt, ext4: prepare for blocksize != PAGE_SIZE
- - 1 -
-
-
-
2019-05-20
Eric Biggers
Not Applicable
[v2,09/14] fscrypt: support decrypting multiple filesystem blocks per page
fscrypt, ext4: prepare for blocksize != PAGE_SIZE
- - 1 -
-
-
-
2019-05-20
Eric Biggers
Not Applicable
[v2,08/14] fscrypt: introduce fscrypt_decrypt_block_inplace()
fscrypt, ext4: prepare for blocksize != PAGE_SIZE
- - 1 -
-
-
-
2019-05-20
Eric Biggers
Not Applicable
[v2,07/14] fscrypt: handle blocksize < PAGE_SIZE in fscrypt_zeroout_range()
fscrypt, ext4: prepare for blocksize != PAGE_SIZE
- - 1 -
-
-
-
2019-05-20
Eric Biggers
Not Applicable
[v2,06/14] fscrypt: support encrypting multiple filesystem blocks per page
fscrypt, ext4: prepare for blocksize != PAGE_SIZE
- - 1 -
-
-
-
2019-05-20
Eric Biggers
Not Applicable
[v2,05/14] fscrypt: introduce fscrypt_encrypt_block_inplace()
fscrypt, ext4: prepare for blocksize != PAGE_SIZE
- - 1 -
-
-
-
2019-05-20
Eric Biggers
Not Applicable
[v2,04/14] fscrypt: clean up some BUG_ON()s in block encryption/decryption
fscrypt, ext4: prepare for blocksize != PAGE_SIZE
- - 1 -
-
-
-
2019-05-20
Eric Biggers
Not Applicable
[v2,03/14] fscrypt: rename fscrypt_do_page_crypto() to fscrypt_crypt_block()
fscrypt, ext4: prepare for blocksize != PAGE_SIZE
- - 1 -
-
-
-
2019-05-20
Eric Biggers
Not Applicable
[v2,02/14] fscrypt: remove the "write" part of struct fscrypt_ctx
fscrypt, ext4: prepare for blocksize != PAGE_SIZE
- - 1 -
-
-
-
2019-05-20
Eric Biggers
Not Applicable
[v2,01/14] fscrypt: simplify bounce page handling
fscrypt, ext4: prepare for blocksize != PAGE_SIZE
- - 1 -
-
-
-
2019-05-20
Eric Biggers
Not Applicable
[13/13] ext4: encrypt only up to last block in ext4_bio_write_page()
fscrypt, ext4: prepare for blocksize != PAGE_SIZE
- - 1 -
-
-
-
2019-05-01
Eric Biggers
Not Applicable
[12/13] ext4: decrypt only the needed block in __ext4_block_zero_page_range()
fscrypt, ext4: prepare for blocksize != PAGE_SIZE
- - - -
-
-
-
2019-05-01
Eric Biggers
Not Applicable
[11/13] ext4: decrypt only the needed blocks in ext4_block_write_begin()
fscrypt, ext4: prepare for blocksize != PAGE_SIZE
- - - -
-
-
-
2019-05-01
Eric Biggers
Not Applicable
[10/13] ext4: clear BH_Uptodate flag on decryption error
fscrypt, ext4: prepare for blocksize != PAGE_SIZE
- - - -
-
-
-
2019-05-01
Eric Biggers
Not Applicable
[09/13] fscrypt: support decrypting multiple filesystem blocks per page
fscrypt, ext4: prepare for blocksize != PAGE_SIZE
- - 1 -
-
-
-
2019-05-01
Eric Biggers
Not Applicable
[08/13] fscrypt: introduce fscrypt_decrypt_block_inplace()
fscrypt, ext4: prepare for blocksize != PAGE_SIZE
- - 1 -
-
-
-
2019-05-01
Eric Biggers
Not Applicable
[07/13] fscrypt: handle blocksize < PAGE_SIZE in fscrypt_zeroout_range()
fscrypt, ext4: prepare for blocksize != PAGE_SIZE
- - 1 -
-
-
-
2019-05-01
Eric Biggers
Not Applicable
[06/13] fscrypt: support encrypting multiple filesystem blocks per page
fscrypt, ext4: prepare for blocksize != PAGE_SIZE
- - 1 -
-
-
-
2019-05-01
Eric Biggers
Not Applicable
[05/13] fscrypt: introduce fscrypt_encrypt_block_inplace()
fscrypt, ext4: prepare for blocksize != PAGE_SIZE
- - 1 -
-
-
-
2019-05-01
Eric Biggers
Not Applicable
[04/13] fscrypt: clean up some BUG_ON()s in block encryption/decryption
fscrypt, ext4: prepare for blocksize != PAGE_SIZE
- - 1 -
-
-
-
2019-05-01
Eric Biggers
Not Applicable
[03/13] fscrypt: rename fscrypt_do_page_crypto() to fscrypt_crypt_block()
fscrypt, ext4: prepare for blocksize != PAGE_SIZE
- - 1 -
-
-
-
2019-05-01
Eric Biggers
Not Applicable
[02/13] fscrypt: remove the "write" part of struct fscrypt_ctx
fscrypt, ext4: prepare for blocksize != PAGE_SIZE
- - 1 -
-
-
-
2019-05-01
Eric Biggers
Not Applicable
[01/13] fscrypt: simplify bounce page handling
fscrypt, ext4: prepare for blocksize != PAGE_SIZE
- - 1 -
-
-
-
2019-05-01
Eric Biggers
Not Applicable
[RFC,7/7] generic: verify ciphertext of v1 encryption policies with Adiantum
xfstests: verify fscrypt-encrypted contents and filenames
- - - -
-
-
-
2019-04-26
Eric Biggers
Not Applicable
[RFC,6/7] generic: verify ciphertext of v1 encryption policies with AES-128
xfstests: verify fscrypt-encrypted contents and filenames
- - - -
-
-
-
2019-04-26
Eric Biggers
Not Applicable
[RFC,5/7] generic: verify ciphertext of v1 encryption policies with AES-256
xfstests: verify fscrypt-encrypted contents and filenames
- - - -
-
-
-
2019-04-26
Eric Biggers
Not Applicable
[RFC,4/7] common/encrypt: add helper for ciphertext verification tests
xfstests: verify fscrypt-encrypted contents and filenames
- - - -
-
-
-
2019-04-26
Eric Biggers
Not Applicable
[RFC,3/7] common/encrypt: support requiring other encryption settings
xfstests: verify fscrypt-encrypted contents and filenames
- - - -
-
-
-
2019-04-26
Eric Biggers
Not Applicable
[RFC,2/7] fscrypt-crypt-util: add utility for reproducing fscrypt encrypted data
xfstests: verify fscrypt-encrypted contents and filenames
- - - -
-
-
-
2019-04-26
Eric Biggers
Not Applicable
[RFC,1/7] common/encrypt: introduce helpers for set_encpolicy and get_encpolicy
xfstests: verify fscrypt-encrypted contents and filenames
- - - -
-
-
-
2019-04-26
Eric Biggers
Not Applicable
[v5,16/16] fscrypt: document the new ioctls and policy version
fscrypt: key management improvements
- - - -
-
-
-
2019-04-18
Eric Biggers
Superseded
[v5,15/16] ubifs: wire up new fscrypt ioctls
fscrypt: key management improvements
- - - -
-
-
-
2019-04-18
Eric Biggers
Superseded
[v5,14/16] f2fs: wire up new fscrypt ioctls
fscrypt: key management improvements
- - - -
-
-
-
2019-04-18
Eric Biggers
Superseded
[v5,13/16] ext4: wire up new fscrypt ioctls
fscrypt: key management improvements
- - - -
-
-
-
2019-04-18
Eric Biggers
Superseded
[v5,12/16] fscrypt: require that key be added when setting a v2 encryption policy
fscrypt: key management improvements
- - - -
-
-
-
2019-04-18
Eric Biggers
Superseded
[v5,11/16] fscrypt: allow unprivileged users to add/remove keys for v2 policies
fscrypt: key management improvements
- - - -
-
-
-
2019-04-18
Eric Biggers
Superseded
[v5,10/16] fscrypt: v2 encryption policy support
fscrypt: key management improvements
- - - -
-
-
-
2019-04-18
Eric Biggers
Superseded
[v5,09/16] fscrypt: add an HKDF-SHA512 implementation
fscrypt: key management improvements
- - - -
-
-
-
2019-04-18
Eric Biggers
Superseded
[v5,08/16] fscrypt: add FS_IOC_GET_ENCRYPTION_KEY_STATUS ioctl
fscrypt: key management improvements
- - - -
-
-
-
2019-04-18
Eric Biggers
Superseded
[v5,07/16] fscrypt: add FS_IOC_REMOVE_ENCRYPTION_KEY ioctl
fscrypt: key management improvements
- - - -
-
-
-
2019-04-18
Eric Biggers
Superseded
[v5,06/16] fscrypt: add FS_IOC_ADD_ENCRYPTION_KEY ioctl
fscrypt: key management improvements
- - - -
-
-
-
2019-04-18
Eric Biggers
Superseded
[v5,05/16] fscrypt: refactor v1 policy key setup into keysetup_legacy.c
fscrypt: key management improvements
- - - -
-
-
-
2019-04-18
Eric Biggers
Superseded
[v5,04/16] fscrypt: add ->ci_inode to fscrypt_info
fscrypt: key management improvements
- - - -
-
-
-
2019-04-18
Eric Biggers
Superseded
[v5,03/16] fscrypt: use FSCRYPT_* definitions, not FS_*
fscrypt: key management improvements
- - - -
-
-
-
2019-04-18
Eric Biggers
Superseded
[v5,02/16] fscrypt: use FSCRYPT_ prefix for uapi constants
fscrypt: key management improvements
- - - -
-
-
-
2019-04-18
Eric Biggers
Superseded
[v5,01/16] fs, fscrypt: move uapi definitions to new header <linux/fscrypt.h>
fscrypt: key management improvements
- - - -
-
-
-
2019-04-18
Eric Biggers
Superseded
[v2,2/2] fscrypt: cache decrypted symlink target in ->i_link
fscrypt: improve encrypted symlink performance
- - - -
-
-
-
2019-04-10
Eric Biggers
Not Applicable
[v2,1/2] vfs: use READ_ONCE() to access ->i_link
fscrypt: improve encrypted symlink performance
- - - -
-
-
-
2019-04-10
Eric Biggers
Not Applicable
fscrypt: cache decrypted symlink target in ->i_link
fscrypt: cache decrypted symlink target in ->i_link
- - - -
-
-
-
2019-04-09
Eric Biggers
Not Applicable
[v4,17/17] fscrypt: document the new ioctls and policy version
fscrypt: key management improvements
- - - -
-
-
-
2019-04-02
Eric Biggers
Not Applicable
[v4,16/17] ubifs: wire up new fscrypt ioctls
fscrypt: key management improvements
- - - -
-
-
-
2019-04-02
Eric Biggers
Not Applicable
[v4,15/17] f2fs: wire up new fscrypt ioctls
fscrypt: key management improvements
- - - -
-
-
-
2019-04-02
Eric Biggers
Not Applicable
[v4,14/17] ext4: wire up new fscrypt ioctls
fscrypt: key management improvements
- - - -
-
-
-
2019-04-02
Eric Biggers
Not Applicable
[v4,13/17] fscrypt: require that key be added when setting a v2 encryption policy
fscrypt: key management improvements
- - - -
-
-
-
2019-04-02
Eric Biggers
Not Applicable
[v4,12/17] fscrypt: allow unprivileged users to add/remove keys for v2 policies
fscrypt: key management improvements
- - - -
-
-
-
2019-04-02
Eric Biggers
Not Applicable
[v4,11/17] fscrypt: v2 encryption policy support
fscrypt: key management improvements
- - - -
-
-
-
2019-04-02
Eric Biggers
Not Applicable
[v4,10/17] fscrypt: add an HKDF-SHA512 implementation
fscrypt: key management improvements
- - - -
-
-
-
2019-04-02
Eric Biggers
Not Applicable
[v4,09/17] fscrypt: add FS_IOC_GET_ENCRYPTION_KEY_STATUS ioctl
fscrypt: key management improvements
- - - -
-
-
-
2019-04-02
Eric Biggers
Not Applicable
[v4,08/17] fscrypt: add FS_IOC_REMOVE_ENCRYPTION_KEY ioctl
fscrypt: key management improvements
- - - -
-
-
-
2019-04-02
Eric Biggers
Not Applicable
[v4,07/17] fs/dcache.c: add shrink_dcache_inode()
fscrypt: key management improvements
- - - -
-
-
-
2019-04-02
Eric Biggers
Not Applicable
[v4,06/17] fscrypt: add FS_IOC_ADD_ENCRYPTION_KEY ioctl
fscrypt: key management improvements
- - - -
-
-
-
2019-04-02
Eric Biggers
Not Applicable
[v4,05/17] fscrypt: refactor v1 policy key setup into keysetup_legacy.c
fscrypt: key management improvements
- - - -
-
-
-
2019-04-02
Eric Biggers
Not Applicable
[v4,04/17] fscrypt: add ->ci_inode to fscrypt_info
fscrypt: key management improvements
- - - -
-
-
-
2019-04-02
Eric Biggers
Not Applicable
[v4,03/17] fscrypt: use FSCRYPT_* definitions, not FS_*
fscrypt: key management improvements
- - - -
-
-
-
2019-04-02
Eric Biggers
Not Applicable
[v4,02/17] fscrypt: use FSCRYPT_ prefix for uapi constants
fscrypt: key management improvements
- - - -
-
-
-
2019-04-02
Eric Biggers
Not Applicable
[v4,01/17] fs, fscrypt: move uapi definitions to new header <linux/fscrypt.h>
fscrypt: key management improvements
- - - -
-
-
-
2019-04-02
Eric Biggers
Not Applicable
[v2,5/5] fscrypt: fix race where ->lookup() marks plaintext dentry as ciphertext
fscrypt: d_revalidate fixes and cleanups
- 1 - -
-
-
-
2019-03-20
Eric Biggers
Not Applicable
[v2,4/5] fscrypt: only set dentry_operations on ciphertext dentries
fscrypt: d_revalidate fixes and cleanups
- - - -
-
-
-
2019-03-20
Eric Biggers
Not Applicable
[v2,3/5] fs, fscrypt: clear DCACHE_ENCRYPTED_NAME when unaliasing directory
fscrypt: d_revalidate fixes and cleanups
- 1 - -
-
-
-
2019-03-20
Eric Biggers
Not Applicable
[v2,2/5] fscrypt: fix race allowing rename() and link() of ciphertext dentries
fscrypt: d_revalidate fixes and cleanups
- - - -
-
-
-
2019-03-20
Eric Biggers
Not Applicable
«
1
2
...
6
7
8
9
»