August 2021 Archives by author
Starting: Mon Aug 2 04:24:31 UTC 2021
Ending: Tue Aug 31 20:06:37 UTC 2021
Messages: 368
- [REGRESSION?] Simultaneous writes to a reader-less, non-full pipe can hang
Alex Xu (Hello71)
- [REGRESSION?] Simultaneous writes to a reader-less, non-full pipe can hang
Alex Xu (Hello71)
- Documenting the requirement of CAP_SETFCAP to map UID 0
Michael Kerrisk (man-pages)
- Documenting the requirement of CAP_SETFCAP to map UID 0
Michael Kerrisk (man-pages)
- [syzbot] BUG: unable to handle kernel paging request in cap_capable
Nikolay Aleksandrov
- Hello
Theresa Bangurah
- [PATCH v2] tpm: ibmvtpm: Avoid error message when process gets signal while waiting
Stefan Berger
- [PATCH v3 0/2] ibmvtpm: Avoid error message when process gets signal while waiting
Stefan Berger
- [PATCH v3 1/2] tpm: ibmvtpm: Rename tpm_process_cmd to tpm_status and define flag
Stefan Berger
- [PATCH v3 2/2] tpm: ibmvtpm: Avoid error message when process gets signal while waiting
Stefan Berger
- [PATCH v3 1/2] tpm: ibmvtpm: Rename tpm_process_cmd to tpm_status and define flag
Stefan Berger
- [PATCH v4 0/2] ibmvtpm: Avoid error message when process gets signal while waiting
Stefan Berger
- [PATCH v4 1/2] tpm: ibmvtpm: Avoid error message when process gets signal while waiting
Stefan Berger
- [PATCH v4 2/2] tpm: ibmvtpm: Rename tpm_process_cmd to tpm_status and define flag
Stefan Berger
- [PATCH v4 2/2] tpm: ibmvtpm: Rename tpm_process_cmd to tpm_status and define flag
Stefan Berger
- [PATCH v4 2/2] tpm: ibmvtpm: Rename tpm_process_cmd to tpm_status and define flag
Stefan Berger
- [PATCH 3/3] virt: Add sev_secret module to expose confidential computing secrets
Ard Biesheuvel
- [PATCH v1] efi: Don't use knowledge about efi_guid_t internals
Ard Biesheuvel
- [PATCH v2] fscrypt: support trusted keys
Eric Biggers
- [PATCH v2] fscrypt: support trusted keys
Eric Biggers
- [PATCH v2] fscrypt: support trusted keys
Eric Biggers
- [PATCH v2] fscrypt: support trusted keys
Eric Biggers
- [PATCH v2] fscrypt: support trusted keys
Eric Biggers
- [PATCH v2] fscrypt: support trusted keys
Eric Biggers
- [PATCH 0/1] ima: check control characters in policy path
James Bottomley
- [PATCH v4 00/12] Enroll kernel keys thru MOK
James Bottomley
- [syzbot] general protection fault in legacy_parse_param
Christian Brauner
- [syzbot] general protection fault in legacy_parse_param
Christian Brauner
- [syzbot] general protection fault in legacy_parse_param
Christian Brauner
- [syzbot] general protection fault in legacy_parse_param
Christian Brauner
- [syzbot] general protection fault in legacy_parse_param
Christian Brauner
- [RFC PATCH v2 0/9] Add LSM access controls and auditing to io_uring
Richard Guy Briggs
- [RFC PATCH 2/9] audit, io_uring, io-wq: add some basic audit support to io_uring
Richard Guy Briggs
- [RFC PATCH v2 0/9] Add LSM access controls and auditing to io_uring
Richard Guy Briggs
- [RFC PATCH v2 0/9] Add LSM access controls and auditing to io_uring
Richard Guy Briggs
- [RFC PATCH v2 0/9] Add LSM access controls and auditing to io_uring
Richard Guy Briggs
- [RFC PATCH v2 0/9] Add LSM access controls and auditing to io_uring
Richard Guy Briggs
- [RFC PATCH v2 0/9] Add LSM access controls and auditing to io_uring
Richard Guy Briggs
- [GIT PULL] hardening updates for v5.15-rc1
Kees Cook
- [PATCH v3 1/1] NAX LSM: Add initial support
Randy Dunlap
- [PATCH bpf-next RFC v1 0/5] Implement file local storage
Kumar Kartikeya Dwivedi
- [PATCH bpf-next RFC v1 1/5] bpf: Implement file local storage
Kumar Kartikeya Dwivedi
- [PATCH bpf-next RFC v1 2/5] tools: sync bpf.h header
Kumar Kartikeya Dwivedi
- [PATCH bpf-next RFC v1 3/5] libbpf: Add bpf_probe_map_type support for file local storage
Kumar Kartikeya Dwivedi
- [PATCH bpf-next RFC v1 4/5] tools: bpf: update bpftool for file_storage map
Kumar Kartikeya Dwivedi
- [PATCH bpf-next RFC v1 5/5] tools: testing: Add selftest for file local storage map
Kumar Kartikeya Dwivedi
- [PATCH bpf-next v2 0/5] Implement file local storage
Kumar Kartikeya Dwivedi
- [PATCH bpf-next v2 1/5] bpf: Implement file local storage
Kumar Kartikeya Dwivedi
- [PATCH bpf-next v2 2/5] tools: sync bpf.h header
Kumar Kartikeya Dwivedi
- [PATCH bpf-next v2 3/5] libbpf: Add bpf_probe_map_type support for file local storage
Kumar Kartikeya Dwivedi
- [PATCH bpf-next v2 4/5] tools: bpf: update bpftool for file_storage map
Kumar Kartikeya Dwivedi
- [PATCH bpf-next v2 5/5] tools: testing: Add selftest for file local storage map
Kumar Kartikeya Dwivedi
- [PATCH bpf-next v2 1/5] bpf: Implement file local storage
Kumar Kartikeya Dwivedi
- [PATCH bpf-next v2 1/5] bpf: Implement file local storage
Kumar Kartikeya Dwivedi
- Linux Kernel vulnerability scripting
Denis Efremov
- [RFC PATCH v1 0/4] keys: introduce key_extract_material helper
Ahmad Fatoum
- [PATCH v2] fscrypt: support trusted keys
Ahmad Fatoum
- [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Ahmad Fatoum
- [PATCH 2/4] KEYS: trusted: allow trust sources to use kernel RNG for key material
Ahmad Fatoum
- [PATCH v2] fscrypt: support trusted keys
Ahmad Fatoum
- [PATCH v2] fscrypt: support trusted keys
Ahmad Fatoum
- [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Ahmad Fatoum
- [PATCH v2] fscrypt: support trusted keys
Ahmad Fatoum
- [PATCH 3/4] crypto: caam - add in-kernel interface for blob generator
Ahmad Fatoum
- [PATCH v2] fscrypt: support trusted keys
Ahmad Fatoum
- [PATCH v2] fscrypt: support trusted keys
Ahmad Fatoum
- [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Ahmad Fatoum
- [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Ahmad Fatoum
- [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Ahmad Fatoum
- [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Ahmad Fatoum
- [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Ahmad Fatoum
- [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Ahmad Fatoum
- [PATCH 1/1] NAX LSM: Add initial support support
J Freyensee
- [PATCH v5 1/1] NAX LSM: Add initial support
J Freyensee
- [PATCH 2/4] KEYS: trusted: allow trust sources to use kernel RNG for key material
Sumit Garg
- [PATCH v2] fscrypt: support trusted keys
Sumit Garg
- [PATCH v2 1/1] xattr: Allow user.* xattr on symlink and special files
Vivek Goyal
- LSM policy options for new GPIO kernel driver interface
Dominick Grift
- [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
David Gstir
- [PATCH 3/4] crypto: caam - add in-kernel interface for blob generator
David Gstir
- [PATCH 3/4] crypto: caam - add in-kernel interface for blob generator
David Gstir
- Documenting the requirement of CAP_SETFCAP to map UID 0
Serge E. Hallyn
- [PATCH v1] efi: Don't use knowledge about efi_guid_t internals
Serge E. Hallyn
- [PATCH bpf-next v2 1/5] bpf: Implement file local storage
Serge E. Hallyn
- [PATCH bpf-next v2 1/5] bpf: Implement file local storage
Serge E. Hallyn
- [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Tim Harvey
- [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Tim Harvey
- [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Tim Harvey
- [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Tim Harvey
- [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Tim Harvey
- apparmor: global buffers spin lock may get contended
John Johansen
- More Authentic Information
Abdoulahi Kazim
- [PATCH v2] net: fix NULL pointer reference in cipso_v4_doi_free
Jakub Kicinski
- [PATCH] apparmor: remove unused argument of aa_umount()
Austin Kim
- Urgent
John Kumor
- [PATCH AUTOSEL 5.13 13/14] net: fix NULL pointer reference in cipso_v4_doi_free
Sasha Levin
- [PATCH AUTOSEL 5.10 10/11] net: fix NULL pointer reference in cipso_v4_doi_free
Sasha Levin
- [PATCH AUTOSEL 5.4 09/10] net: fix NULL pointer reference in cipso_v4_doi_free
Sasha Levin
- [PATCH AUTOSEL 4.19 7/8] net: fix NULL pointer reference in cipso_v4_doi_free
Sasha Levin
- [PATCH AUTOSEL 4.14 6/7] net: fix NULL pointer reference in cipso_v4_doi_free
Sasha Levin
- [PATCH AUTOSEL 4.9 4/5] net: fix NULL pointer reference in cipso_v4_doi_free
Sasha Levin
- [PATCH AUTOSEL 4.4 2/3] net: fix NULL pointer reference in cipso_v4_doi_free
Sasha Levin
- hi
Rihab Manyang
- lsm-stacking: fix broken lsm audit
Dmitry Mastykin
- [PATCH 1/3] security/security: remove extra address-of in hook.audit_rule_match call
Dmitry Mastykin
- [PATCH 2/3] security/security: get rid of a duplicated condition
Dmitry Mastykin
- [PATCH 3/3] kernel/auditsc: use correct blob for files in security_audit_rule_match call
Dmitry Mastykin
- [GIT PULL] SELinux fixes for v5.14 (#1)
Paul Moore
- [RFC PATCH v2 0/9] Add LSM access controls and auditing to io_uring
Paul Moore
- [RFC PATCH v2 1/9] audit: prepare audit_context for use in calling contexts beyond syscalls
Paul Moore
- [RFC PATCH v2 2/9] audit, io_uring, io-wq: add some basic audit support to io_uring
Paul Moore
- [RFC PATCH v2 3/9] audit: dev/test patch to force io_uring auditing
Paul Moore
- [RFC PATCH v2 4/9] audit: add filtering for io_uring records
Paul Moore
- [RFC PATCH v2 5/9] fs: add anon_inode_getfile_secure() similar to anon_inode_getfd_secure()
Paul Moore
- [RFC PATCH v2 6/9] io_uring: convert io_uring to the secure anon inode interface
Paul Moore
- [RFC PATCH v2 7/9] lsm,io_uring: add LSM hooks to io_uring
Paul Moore
- [RFC PATCH v2 8/9] selinux: add support for the io_uring access controls
Paul Moore
- [RFC PATCH v2 9/9] Smack: Brutalist io_uring support with debug
Paul Moore
- [RFC PATCH v2 5/9] fs: add anon_inode_getfile_secure() similar to anon_inode_getfd_secure()
Paul Moore
- [PATCH v28 22/25] Audit: Add record for multiple process LSM attributes
Paul Moore
- [PATCH v28 22/25] Audit: Add record for multiple process LSM attributes
Paul Moore
- [PATCH v28 22/25] Audit: Add record for multiple process LSM attributes
Paul Moore
- [PATCH v28 22/25] Audit: Add record for multiple process LSM attributes
Paul Moore
- [PATCH v28 22/25] Audit: Add record for multiple process LSM attributes
Paul Moore
- [PATCH v28 22/25] Audit: Add record for multiple process LSM attributes
Paul Moore
- [PATCH v28 22/25] Audit: Add record for multiple process LSM attributes
Paul Moore
- [PATCH v28 22/25] Audit: Add record for multiple process LSM attributes
Paul Moore
- [RFC PATCH v2 0/9] Add LSM access controls and auditing to io_uring
Paul Moore
- [syzbot] KASAN: use-after-free Read in netlbl_catmap_walk
Paul Moore
- [RFC PATCH 2/9] audit, io_uring, io-wq: add some basic audit support to io_uring
Paul Moore
- [RFC PATCH v2 0/9] Add LSM access controls and auditing to io_uring
Paul Moore
- [RFC PATCH v2 0/9] Add LSM access controls and auditing to io_uring
Paul Moore
- [PATCH] net: fix NULL pointer reference in cipso_v4_doi_free
Paul Moore
- [RFC PATCH v2 0/9] Add LSM access controls and auditing to io_uring
Paul Moore
- [RFC PATCH v2 0/9] Add LSM access controls and auditing to io_uring
Paul Moore
- [PATCH v2] net: fix NULL pointer reference in cipso_v4_doi_free
Paul Moore
- [PATCH AUTOSEL 5.13 13/14] net: fix NULL pointer reference in cipso_v4_doi_free
Paul Moore
- [GIT PULL] SELinux patches for v5.15
Paul Moore
- [PATCH v2] net: fix NULL pointer reference in cipso_v4_doi_free
Paul Moore
- [PATCH v2] net: fix NULL pointer reference in cipso_v4_doi_free
Paul Moore
- [PATCH v3] lockdown,selinux: fix wrong subject in some SELinux lockdown checks
Paul Moore
- [PATCH v3] lockdown,selinux: fix wrong subject in some SELinux lockdown checks
Paul Moore
- [RFC PATCH v2 9/9] Smack: Brutalist io_uring support with debug
Paul Moore
- [RFC PATCH v2 9/9] Smack: Brutalist io_uring support with debug
Paul Moore
- [PATCH v3] lockdown,selinux: fix wrong subject in some SELinux lockdown checks
Paul Moore
- [PATCH v3] lockdown,selinux: fix wrong subject in some SELinux lockdown checks
Ondrej Mosnacek
- [PATCH v3] lockdown,selinux: fix wrong subject in some SELinux lockdown checks
Ondrej Mosnacek
- [PATCH AUTOSEL 5.13 13/14] net: fix NULL pointer reference in cipso_v4_doi_free
Dongliang Mu
- [PATCH 0/3] Allow access to confidential computing secret area in SEV guests
Dov Murik
- [PATCH 1/3] efi/libstub: Copy confidential computing secret area
Dov Murik
- [PATCH 2/3] efi: Reserve confidential computing secret area
Dov Murik
- [PATCH 3/3] virt: Add sev_secret module to expose confidential computing secrets
Dov Murik
- [PATCH 3/3] virt: Add sev_secret module to expose confidential computing secrets
Dov Murik
- Proposal
Majid Muzaffar
- [PATCH v3 01/14] integrity: Introduce a Linux keyring for the Machine Owner Key (MOK)
Nayna
- [PATCH v4 00/12] Enroll kernel keys thru MOK
Nayna
- [PATCH v4 00/12] Enroll kernel keys thru MOK
Nayna
- Hello
Deedee Paul
- For your information
Godwin Pete
- [PATCH v2] tpm: ibmvtpm: Avoid error message when process gets signal while waiting
Jarkko Sakkinen
- [PATCH v3 1/2] tpm: ibmvtpm: Rename tpm_process_cmd to tpm_status and define flag
Jarkko Sakkinen
- [PATCH v3 1/2] tpm: ibmvtpm: Rename tpm_process_cmd to tpm_status and define flag
Jarkko Sakkinen
- [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Jarkko Sakkinen
- [PATCH v2] fscrypt: support trusted keys
Jarkko Sakkinen
- [PATCH 2/4] KEYS: trusted: allow trust sources to use kernel RNG for key material
Jarkko Sakkinen
- [PATCH v4 2/2] tpm: ibmvtpm: Rename tpm_process_cmd to tpm_status and define flag
Jarkko Sakkinen
- [PATCH v2] fscrypt: support trusted keys
Jarkko Sakkinen
- [PATCH v2] fscrypt: support trusted keys
Jarkko Sakkinen
- [PATCH v2] fscrypt: support trusted keys
Jarkko Sakkinen
- [PATCH v2] fscrypt: support trusted keys
Jarkko Sakkinen
- [PATCH v4 2/2] tpm: ibmvtpm: Rename tpm_process_cmd to tpm_status and define flag
Jarkko Sakkinen
- [PATCH v3 01/14] integrity: Introduce a Linux keyring for the Machine Owner Key (MOK)
Jarkko Sakkinen
- [PATCH v3 04/14] integrity: add add_to_mok_keyring
Jarkko Sakkinen
- [PATCH v4 2/2] tpm: ibmvtpm: Rename tpm_process_cmd to tpm_status and define flag
Jarkko Sakkinen
- [PATCH v2] fscrypt: support trusted keys
Jarkko Sakkinen
- [PATCH v4 00/12] Enroll kernel keys thru MOK
Jarkko Sakkinen
- [PATCH v4 00/12] Enroll kernel keys thru MOK
Jarkko Sakkinen
- [PATCH v4 00/12] Enroll kernel keys thru MOK
Jarkko Sakkinen
- [PATCH v4 00/12] Enroll kernel keys thru MOK
Jarkko Sakkinen
- [PATCH v4 00/12] Enroll kernel keys thru MOK
Jarkko Sakkinen
- [RFC PATCH v2 5/9] fs: add anon_inode_getfile_secure() similar to anon_inode_getfd_secure()
Mickaël Salaün
- [RFC PATCH v2 5/9] fs: add anon_inode_getfile_secure() similar to anon_inode_getfd_secure()
Mickaël Salaün
- [PATCH v4 0/4] Add Landlock man pages
Mickaël Salaün
- [PATCH v4 1/4] landlock.7: Add a new page to introduce Landlock
Mickaël Salaün
- [PATCH v4 2/4] landlock_create_ruleset.2: Document new syscall
Mickaël Salaün
- [PATCH v4 3/4] landlock_add_rule.2: Document new syscall
Mickaël Salaün
- [PATCH v4 4/4] landlock_restrict_self.2: Document new syscall
Mickaël Salaün
- [RFC][PATCH v2 06/12] diglim: Interfaces - digest_list_add, digest_list_del
Roberto Sassu
- [RFC][PATCH v2 06/12] diglim: Interfaces - digest_list_add, digest_list_del
Roberto Sassu
- [RFC][PATCH v2 06/12] diglim: Interfaces - digest_list_add, digest_list_del
Roberto Sassu
- [RFC][PATCH v2 06/12] diglim: Interfaces - digest_list_add, digest_list_del
Roberto Sassu
- [PATCH v2] tpm: ibmvtpm: Avoid error message when process gets signal while waiting
Nageswara Sastry
- [PATCH v4 1/2] tpm: ibmvtpm: Avoid error message when process gets signal while waiting
Nageswara Sastry
- lsm-stacking: fix broken lsm audit
Casey Schaufler
- [PATCH v28 22/25] Audit: Add record for multiple process LSM attributes
Casey Schaufler
- [PATCH v28 22/25] Audit: Add record for multiple process LSM attributes
Casey Schaufler
- [PATCH v28 22/25] Audit: Add record for multiple process LSM attributes
Casey Schaufler
- [PATCH v28 22/25] Audit: Add record for multiple process LSM attributes
Casey Schaufler
- [PATCH v28 22/25] Audit: Add record for multiple process LSM attributes
Casey Schaufler
- [PATCH v28 22/25] Audit: Add record for multiple process LSM attributes
Casey Schaufler
- [PATCH v28 22/25] Audit: Add record for multiple process LSM attributes
Casey Schaufler
- [PATCH v28 22/25] Audit: Add record for multiple process LSM attributes
Casey Schaufler
- [PATCH v28 22/25] Audit: Add record for multiple process LSM attributes
Casey Schaufler
- [syzbot] KASAN: use-after-free Read in netlbl_catmap_walk
Casey Schaufler
- There is an interesting conversation going on about virtiofsd and SELinux
Casey Schaufler
- There is an interesting conversation going on about virtiofsd and SELinux
Casey Schaufler
- There is an interesting conversation going on about virtiofsd and SELinux
Casey Schaufler
- [syzbot] general protection fault in legacy_parse_param
Casey Schaufler
- [syzbot] general protection fault in legacy_parse_param
Casey Schaufler
- [syzbot] general protection fault in legacy_parse_param
Casey Schaufler
- [syzbot] general protection fault in legacy_parse_param
Casey Schaufler
- [RFC PATCH v2 9/9] Smack: Brutalist io_uring support with debug
Casey Schaufler
- [GIT PULL] Smack patches for v5.15
Casey Schaufler
- [PATCH 3/3] virt: Add sev_secret module to expose confidential computing secrets
Andrew Scull
- [PATCH 3/3] virt: Add sev_secret module to expose confidential computing secrets
Andrew Scull
- [PATCH 3/3] virt: Add sev_secret module to expose confidential computing secrets
Andrew Scull
- Good morning,
Medinat Sherrif
- [PATCH v1] efi: Don't use knowledge about efi_guid_t internals
Andy Shevchenko
- [PATCH 1/1] NAX LSM: Add initial support support
THOBY Simon
- [PATCH 1/1] NAX LSM: Add initial support support
THOBY Simon
- [PATCH 1/1] NAX LSM: Add initial support support
THOBY Simon
- [PATCH 1/1] NAX LSM: Add initial support support
THOBY Simon
- [PATCH 1/1] NAX LSM: Add initial support support
THOBY Simon
- [PATCH 1/1] NAX LSM: Add initial support support
THOBY Simon
- [PATCH v2 1/1] NAX LSM: Add initial support support
THOBY Simon
- [PATCH] ima: fix infinite loop within "ima_match_policy" function.
THOBY Simon
- [PATCH] ima: fix infinite loop within "ima_match_policy" function.
THOBY Simon
- [PATCH v3 0/1] NAX (No Anonymous Execution) LSM
THOBY Simon
- [PATCH] ima: fix infinite loop within "ima_match_policy" function.
THOBY Simon
- [PATCH] ima: fix infinite loop within "ima_match_policy" function.
THOBY Simon
- [PATCH] ima: fix infinite loop within "ima_match_policy" function.
THOBY Simon
- [PATCH] ima: fix deadlock within "ima_match_policy" function.
THOBY Simon
- [PATCH] ima: fix deadlock within RCU list of ima_rules
THOBY Simon
- [PATCH] ima: fix deadlock within RCU list of ima_rules
THOBY Simon
- [PATCH] ima: fix deadlock within RCU list of ima_rules
THOBY Simon
- [PATCH] ima: fix deadlock within RCU list of ima_rules
THOBY Simon
- [PATCH v5 1/1] NAX LSM: Add initial support
THOBY Simon
- [PATCH bpf-next v2 1/5] bpf: Implement file local storage
KP Singh
- [External] Re: LSM policy options for new GPIO kernel driver interface
Stephen Smalley
- There is an interesting conversation going on about virtiofsd and SELinux
Stephen Smalley
- There is an interesting conversation going on about virtiofsd and SELinux
Stephen Smalley
- There is an interesting conversation going on about virtiofsd and SELinux
Stephen Smalley
- [PATCH RFC v2 00/12] Enroll kernel keys thru MOK
Eric Snowberg
- [PATCH RFC v2 00/12] Enroll kernel keys thru MOK
Eric Snowberg
- [PATCH RFC v2 10/12] KEYS: link system_trusted_keys to mok_trusted_keys
Eric Snowberg
- [PATCH RFC v2 10/12] KEYS: link system_trusted_keys to mok_trusted_keys
Eric Snowberg
- [PATCH RFC v2 10/12] KEYS: link system_trusted_keys to mok_trusted_keys
Eric Snowberg
- [PATCH v3 00/14] Enroll kernel keys thru MOK
Eric Snowberg
- [PATCH v3 01/14] integrity: Introduce a Linux keyring for the Machine Owner Key (MOK)
Eric Snowberg
- [PATCH v3 02/14] KEYS: CA link restriction
Eric Snowberg
- [PATCH v3 03/14] integrity: Trust MOK keys if MokListTrustedRT found
Eric Snowberg
- [PATCH v3 04/14] integrity: add add_to_mok_keyring
Eric Snowberg
- [PATCH v3 05/14] integrity: restrict INTEGRITY_KEYRING_MOK to restrict_link_by_ca
Eric Snowberg
- [PATCH v3 06/14] integrity: accessor function to get trust_moklist
Eric Snowberg
- [PATCH v3 07/14] integrity: add new keyring handler for mok keys
Eric Snowberg
- [PATCH v3 08/14] KEYS: add a reference to mok keyring
Eric Snowberg
- [PATCH v3 09/14] KEYS: Introduce link restriction to include builtin, secondary and mok keys
Eric Snowberg
- [PATCH v3 10/14] KEYS: change link restriction for secondary to also trust mok
Eric Snowberg
- [PATCH v3 11/14] KEYS: link secondary_trusted_keys to mok trusted keys
Eric Snowberg
- [PATCH v3 12/14] integrity: Do not allow mok keyring updates following init
Eric Snowberg
- [PATCH v3 13/14] integrity: store reference to mok keyring
Eric Snowberg
- [PATCH v3 14/14] integrity: change ima link restriction to include mok keys
Eric Snowberg
- [PATCH v3 04/14] integrity: add add_to_mok_keyring
Eric Snowberg
- [PATCH v3 10/14] KEYS: change link restriction for secondary to also trust mok
Eric Snowberg
- [PATCH v3 01/14] integrity: Introduce a Linux keyring for the Machine Owner Key (MOK)
Eric Snowberg
- [PATCH v3 01/14] integrity: Introduce a Linux keyring for the Machine Owner Key (MOK)
Eric Snowberg
- [PATCH v4 00/12] Enroll kernel keys thru MOK
Eric Snowberg
- [PATCH v4 01/12] integrity: Introduce a Linux keyring for the Machine Owner Key (MOK)
Eric Snowberg
- [PATCH v4 02/12] integrity: Do not allow mok keyring updates following init
Eric Snowberg
- [PATCH v4 03/12] KEYS: CA link restriction
Eric Snowberg
- [PATCH v4 04/12] integrity: restrict INTEGRITY_KEYRING_MOK to restrict_link_by_ca
Eric Snowberg
- [PATCH v4 05/12] integrity: add new keyring handler for mok keys
Eric Snowberg
- [PATCH v4 06/12] KEYS: add a reference to mok keyring
Eric Snowberg
- [PATCH v4 07/12] KEYS: Introduce link restriction to include builtin, secondary and mok keys
Eric Snowberg
- [PATCH v4 08/12] KEYS: integrity: change link restriction to trust the mok keyring
Eric Snowberg
- [PATCH v4 09/12] KEYS: link secondary_trusted_keys to mok trusted keys
Eric Snowberg
- [PATCH v4 10/12] integrity: store reference to mok keyring
Eric Snowberg
- [PATCH v4 11/12] integrity: Trust MOK keys if MokListTrustedRT found
Eric Snowberg
- [PATCH v4 12/12] integrity: Only use mok keyring when uefi_check_trust_mok_keys is true
Eric Snowberg
- [PATCH v4 00/12] Enroll kernel keys thru MOK
Eric Snowberg
- [PATCH v4 00/12] Enroll kernel keys thru MOK
Eric Snowberg
- [PATCH v4 00/12] Enroll kernel keys thru MOK
Eric Snowberg
- [PATCH bpf-next v2 1/5] bpf: Implement file local storage
Alexei Starovoitov
- [REGRESSION?] Simultaneous writes to a reader-less, non-full pipe can hang
Linus Torvalds
- [REGRESSION?] Simultaneous writes to a reader-less, non-full pipe can hang
Linus Torvalds
- [GIT PULL] Smack patches for v5.15
Linus Torvalds
- i need your reply
Maxwell Watford
- LSM policy options for new GPIO kernel driver interface
Weber, Matthew L Collins
- [External] Re: LSM policy options for new GPIO kernel driver interface
Weber, Matthew L Collins
- Linux Kernel vulnerability scripting
Weber, Matthew L Collins
- [PATCH v3] lockdown,selinux: fix wrong subject in some SELinux lockdown checks
Dan Williams
- [PATCH] security: remove unneeded subdir-$(CONFIG_...)
Masahiro Yamada
- [PATCH 0/1] ima: check control characters in policy path
Tianxing Zhang
- [PATCH 1/1] ima: check control characters in policy file path
Tianxing Zhang
- [PATCH 1/1] NAX LSM: Add initial support support
Igor Zhbanov
- [PATCH 1/1] NAX LSM: Add initial support support
Igor Zhbanov
- [PATCH 1/1] NAX LSM: Add initial support support
Igor Zhbanov
- [PATCH 1/1] NAX LSM: Add initial support support
Igor Zhbanov
- [PATCH 1/1] NAX LSM: Add initial support support
Igor Zhbanov
- [PATCH v3 0/1] NAX (No Anonymous Execution) LSM
Igor Zhbanov
- [PATCH v3 1/1] NAX LSM: Add initial support
Igor Zhbanov
- [PATCH v4 0/1] NAX (No Anonymous Execution) LSM
Igor Zhbanov
- [PATCH v4 1/1] NAX LSM: Add initial support
Igor Zhbanov
- [PATCH v5 0/1] NAX (No Anonymous Execution) LSM
Igor Zhbanov
- [PATCH v5 1/1] NAX LSM: Add initial support
Igor Zhbanov
- Writes to /proc/self/mem and file_mprotect() LSM hook
Igor Zhbanov
- [RFC][PATCH v2 06/12] diglim: Interfaces - digest_list_add, digest_list_del
Mimi Zohar
- [RFC][PATCH v2 06/12] diglim: Interfaces - digest_list_add, digest_list_del
Mimi Zohar
- [PATCH RFC v2 00/12] Enroll kernel keys thru MOK
Mimi Zohar
- [PATCH RFC v2 00/12] Enroll kernel keys thru MOK
Mimi Zohar
- [PATCH RFC v2 00/12] Enroll kernel keys thru MOK
Mimi Zohar
- [PATCH RFC v2 10/12] KEYS: link system_trusted_keys to mok_trusted_keys
Mimi Zohar
- [PATCH RFC v2 02/12] KEYS: CA link restriction
Mimi Zohar
- [RFC][PATCH v2 06/12] diglim: Interfaces - digest_list_add, digest_list_del
Mimi Zohar
- [PATCH RFC v2 10/12] KEYS: link system_trusted_keys to mok_trusted_keys
Mimi Zohar
- [PATCH RFC v2 10/12] KEYS: link system_trusted_keys to mok_trusted_keys
Mimi Zohar
- [PATCH v2] fscrypt: support trusted keys
Mimi Zohar
- [PATCH v2] fscrypt: support trusted keys
Mimi Zohar
- [PATCH v3 10/14] KEYS: change link restriction for secondary to also trust mok
Mimi Zohar
- [PATCH v3 01/14] integrity: Introduce a Linux keyring for the Machine Owner Key (MOK)
Mimi Zohar
- [PATCH v3 10/14] KEYS: change link restriction for secondary to also trust mok
Mimi Zohar
- [PATCH v3 01/14] integrity: Introduce a Linux keyring for the Machine Owner Key (MOK)
Mimi Zohar
- [PATCH v2] fscrypt: support trusted keys
Mimi Zohar
- [PATCH v2] fscrypt: support trusted keys
Mimi Zohar
- [PATCH 1/1] ima: check control characters in policy file path
Mimi Zohar
- [PATCH v4 00/12] Enroll kernel keys thru MOK
Mimi Zohar
- [PATCH] ima: fix infinite loop within "ima_match_policy" function.
Mimi Zohar
- [PATCH v4 00/12] Enroll kernel keys thru MOK
Mimi Zohar
- [PATCH] ima: fix infinite loop within "ima_match_policy" function.
Mimi Zohar
- [PATCH] ima: fix infinite loop within "ima_match_policy" function.
Mimi Zohar
- [PATCH] ima: fix infinite loop within "ima_match_policy" function.
Mimi Zohar
- [PATCH] ima: fix infinite loop within "ima_match_policy" function.
Mimi Zohar
- [PATCH] ima: fix infinite loop within "ima_match_policy" function.
Mimi Zohar
- [PATCH] ima: fix deadlock within "ima_match_policy" function.
Mimi Zohar
- [PATCH v4 00/12] Enroll kernel keys thru MOK
Mimi Zohar
- [PATCH] ima: fix deadlock when traversing "ima_default_rules".
Mimi Zohar
- [PATCH v2] net: fix NULL pointer reference in cipso_v4_doi_free
patchwork-bot+netdevbpf at kernel.org
- [GIT PULL] SELinux fixes for v5.14 (#1)
pr-tracker-bot at kernel.org
- [GIT PULL] SELinux patches for v5.15
pr-tracker-bot at kernel.org
- [GIT PULL] Smack patches for v5.15
pr-tracker-bot at kernel.org
- [PATCH] ima: fix infinite loop within "ima_match_policy" function.
liqiong
- [PATCH] ima: fix infinite loop within "ima_match_policy" function.
liqiong
- [PATCH] ima: fix infinite loop within "ima_match_policy" function.
liqiong
- [PATCH] ima: fix infinite loop within "ima_match_policy" function.
liqiong
- [PATCH] ima: fix deadlock within "ima_match_policy" function.
liqiong
- [PATCH] ima: fix deadlock within "ima_match_policy" function.
liqiong
- [PATCH] ima: fix deadlock within RCU list of ima_rules
liqiong
- [PATCH] ima: fix deadlock within RCU list of ima_rules
liqiong
- [PATCH] ima: fix deadlock within RCU list of ima_rules
liqiong
- [PATCH] ima: fix deadlock within RCU list of ima_rules
liqiong
- [PATCH] ima: fix deadlock within RCU list of ima_rules
liqiong
- [PATCH] ima: fix deadlock when traversing "ima_default_rules".
liqiong
- [PATCH v4 1/1] NAX LSM: Add initial support
kernel test robot
- [syzbot] BUG: unable to handle kernel paging request in cap_capable
syzbot
- [syzbot] UBSAN: array-index-out-of-bounds in ima_inode_setxattr
syzbot
- [syzbot] KASAN: use-after-free Read in netlbl_catmap_walk
syzbot
- [syzbot] general protection fault in legacy_parse_param
syzbot
- [syzbot] general protection fault in legacy_parse_param
syzbot
- [syzbot] BUG: unable to handle kernel paging request in tomoyo_encode2
syzbot
- CONFIRM YOUR DETAILS TO ENABLE US START,
johno williams
- [PATCH] ima: fix infinite loop within "ima_match_policy" function.
李力琼
- [PATCH] ima: fix infinite loop within "ima_match_policy" function.
李力琼
- [PATCH] ima: fix infinite loop within "ima_match_policy" function.
李力琼
- [PATCH] net: fix NULL pointer reference in cipso_v4_doi_free
王贇
- [PATCH] net: fix NULL pointer reference in cipso_v4_doi_free
王贇
- [PATCH] net: fix NULL pointer reference in cipso_v4_doi_free
王贇
- [PATCH v2] net: fix NULL pointer reference in cipso_v4_doi_free
王贇
- [PATCH v2] net: fix NULL pointer reference in cipso_v4_doi_free
王贇
Last message date:
Tue Aug 31 20:06:37 UTC 2021
Archived on: Tue Aug 31 19:58:21 UTC 2021
This archive was generated by
Pipermail 0.09 (Mailman edition).