July 2021 Archives by date
Starting: Thu Jul 1 07:56:24 UTC 2021
Ending: Sat Jul 31 11:02:27 UTC 2021
Messages: 373
- [PATCH] perf: Require CAP_KILL if sigtrap is requested
Ondrej Mosnacek
- [PATCH v2] perf: Require CAP_KILL if sigtrap is requested
Marco Elver
- [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
Dr. David Alan Gilbert
- [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
Vivek Goyal
- [PATCH v2 0/3] ima: Provide more info about buffer measurement
Roberto Sassu
- [PATCH v2 1/3] ima: Introduce ima_get_current_hash_algo()
Roberto Sassu
- [PATCH v2 2/3] ima: Return int in the functions to measure a buffer
Roberto Sassu
- [PATCH v2 3/3] ima: Add digest and digest_len params to the functions to measure a buffer
Roberto Sassu
- [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
Vivek Goyal
- [PATCH v2 1/3] ima: Introduce ima_get_current_hash_algo()
Lakshmi Ramasubramanian
- [PATCH v2 2/3] ima: Return int in the functions to measure a buffer
Lakshmi Ramasubramanian
- [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
Casey Schaufler
- [PATCH v2 3/3] ima: Add digest and digest_len params to the functions to measure a buffer
Lakshmi Ramasubramanian
- [PATCH v2 6/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Richard Weinberger
- [PATCH v2] perf: Require CAP_KILL if sigtrap is requested
Eric W. Biederman
- [PATCH v8 3/8] security/brute: Detect a brute force attack
Alexander Lobakin
- [PATCH v8 1/2] certs: Trigger creation of RSA module signing key if it's not an RSA key
Jarkko Sakkinen
- [PATCH v8 0/2] Add support for ECDSA-signed kernel modules
Jarkko Sakkinen
- [PATCH v2] perf: Require CAP_KILL if sigtrap is requested
Marco Elver
- [PATCH v2 6/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Ahmad Fatoum
- [PATCH v2 5/6] crypto: caam - add in-kernel interface for blob generator
Ahmad Fatoum
- [PATCH v2 2/3] ima: Return int in the functions to measure a buffer
Roberto Sassu
- [PATCH v2 6/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Richard Weinberger
- [PATCH v2 3/3] ima: Add digest and digest_len params to the functions to measure a buffer
Roberto Sassu
- [PATCH v2 6/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Ahmad Fatoum
- [PATCH v8 3/8] security/brute: Detect a brute force attack
John Wood
- [PATCH v8 3/8] security/brute: Detect a brute force attack
Alexander Lobakin
- [syzbot] general protection fault in legacy_parse_param
Dmitry Vyukov
- [PATCH v8 3/8] security/brute: Detect a brute force attack
John Wood
- [syzbot] general protection fault in legacy_parse_param
Casey Schaufler
- [PATCH v8 3/8] security/brute: Detect a brute force attack
John Wood
- [syzbot] general protection fault in legacy_parse_param
Paul Moore
- [PATCH AUTOSEL 5.13 38/85] ima: Don't remove security.ima if file must not be appraised
Sasha Levin
- [PATCH AUTOSEL 5.12 36/80] ima: Don't remove security.ima if file must not be appraised
Sasha Levin
- [syzbot] general protection fault in legacy_parse_param
Dmitry Vyukov
- [PATCH v3 1/2] perf: Fix required permissions if sigtrap is requested
Marco Elver
- [PATCH v3 2/2] perf: Refactor permissions check into perf_check_permission()
Marco Elver
- [PATCH v3 0/3] ima: Provide more info about buffer measurement
Roberto Sassu
- [PATCH v3 1/3] ima: Introduce ima_get_current_hash_algo()
Roberto Sassu
- [PATCH v3 2/3] ima: Return int in the functions to measure a buffer
Roberto Sassu
- [PATCH v3 3/3] ima: Add digest and digest_len params to the functions to measure a buffer
Roberto Sassu
- [PATCH] ima: Support euid keyword for buffer measurement
Roberto Sassu
- [PATCH v8 3/8] security/brute: Detect a brute force attack
Alexander Lobakin
- [PATCH v3 1/2] perf: Fix required permissions if sigtrap is requested
Dmitry Vyukov
- [PATCH v3 2/2] perf: Refactor permissions check into perf_check_permission()
Dmitry Vyukov
- Refinanzierung *Heimwerkerdarlehen *Erfinderdarlehen
sms at Integrity-funds.com
- [syzbot] general protection fault in legacy_parse_param
Paul Moore
- [PATCH v1 0/4] Add Landlock man pages
Mickaël Salaün
- [PATCH v1 1/4] landlock.7: Add a new page to introduce Landlock
Mickaël Salaün
- [PATCH v1 2/4] landlock_create_ruleset.2: Document new syscall
Mickaël Salaün
- [PATCH v1 3/4] landlock_add_rule.2: Document new syscall
Mickaël Salaün
- [PATCH v1 4/4] landlock_restrict_self.2: Document new syscall
Mickaël Salaün
- [PATCH v3 2/3] ima: Return int in the functions to measure a buffer
Lakshmi Ramasubramanian
- [PATCH v3 3/3] ima: Add digest and digest_len params to the functions to measure a buffer
Lakshmi Ramasubramanian
- [PATCH] ima: Support euid keyword for buffer measurement
Lakshmi Ramasubramanian
- [PATCH 0/1] NAX (No Anonymous Execution) LSM
Igor Zhbanov
- [PATCH 1/1] NAX LSM: Add initial support support
Igor Zhbanov
- [PATCH RFC 00/12] Enroll kernel keys thru MOK
Eric Snowberg
- [PATCH RFC 01/12] KEYS: Add KEY_ALLOC_BYPASS_RESTRICTION option to key_move
Eric Snowberg
- [PATCH RFC 02/12] KEYS: Allow unrestricted keys to be moved to the secondary keyring
Eric Snowberg
- [PATCH RFC 03/12] KEYS: CA link restriction
Eric Snowberg
- [PATCH RFC 04/12] integrity: add integrity_destroy_keyring
Eric Snowberg
- [PATCH RFC 05/12] integrity: Introduce mok keyring
Eric Snowberg
- [PATCH RFC 06/12] integrity: Trust mok keys if MokListTrustedRT found
Eric Snowberg
- [PATCH RFC 07/12] integrity: add add_to_mok_keyring
Eric Snowberg
- [PATCH RFC 08/12] integrity: restrict INTEGRITY_KEYRING_MOK to restrict_link_by_secondary_trusted_or_ca
Eric Snowberg
- [PATCH RFC 09/12] integrity: accessor function to get trust_moklist
Eric Snowberg
- [PATCH RFC 10/12] integrity: add new keyring handler
Eric Snowberg
- [PATCH RFC 11/12] integrity: move keys from the mok keyring into the secondary keyring
Eric Snowberg
- [PATCH RFC 12/12] integrity: Suppress error message for keys added to the mok keyring
Eric Snowberg
- [PATCH RFC 00/12] Enroll kernel keys thru MOK
Christoph Hellwig
- [PATCH] ima: Support euid keyword for buffer measurement
Roberto Sassu
- [PATCH] smack: mark 'smack_enabled' global variable as __initdata
Austin Kim
- [PATCH] ima: check control characters in policy path
Tianxing Zhang
- [PATCH RFC 00/12] Enroll kernel keys thru MOK
Mimi Zohar
- [PATCH] smack: mark 'smack_enabled' global variable as __initdata
Casey Schaufler
- [PATCH RFC 00/12] Enroll kernel keys thru MOK
Eric Snowberg
- [PATCH RFC 00/12] Enroll kernel keys thru MOK
Eric Snowberg
- [PATCH RFC 00/12] Enroll kernel keys thru MOK
Christoph Hellwig
- [PATCH RFC 00/12] Enroll kernel keys thru MOK
Eric Snowberg
- [PATCH RFC 00/12] Enroll kernel keys thru MOK
Mimi Zohar
- [PATCH RFC 05/12] integrity: Introduce mok keyring
Linus Torvalds
- [PATCH RFC 05/12] integrity: Introduce mok keyring
Jarkko Sakkinen
- [PATCH RFC 00/12] Enroll kernel keys thru MOK
Eric Snowberg
- [PATCH RFC 05/12] integrity: Introduce mok keyring
Eric Snowberg
- Zdravstvuyte Vas interesuyut bazy dannykh kontaktov kompaniy dlya prodazhi vashikh tovarov i uslug?
ce2e946fce77 at mail.ru
- WORK OF GOD.
MARY JOHNSON
- [PATCH RFC 00/12] Enroll kernel keys thru MOK
Mimi Zohar
- [RFC PATCH v2 0/1] Relax restrictions on user.* xattr
Vivek Goyal
- [PATCH v2 1/1] xattr: Allow user.* xattr on symlink and special files
Vivek Goyal
- [PATCH RFC 00/12] Enroll kernel keys thru MOK
Eric Snowberg
- [PATCH RFC 00/12] Enroll kernel keys thru MOK
Mimi Zohar
- [PATCH RFC 00/12] Enroll kernel keys thru MOK
Eric Snowberg
- [PATCH RFC 00/12] Enroll kernel keys thru MOK
Mimi Zohar
- [PATCH v2 1/1] xattr: Allow user.* xattr on symlink and special files
Christian Brauner
- [PATCH v2 1/1] xattr: Allow user.* xattr on symlink and special files
Vivek Goyal
- [PATCH v2 1/1] xattr: Allow user.* xattr on symlink and special files
Casey Schaufler
- [PATCH RFC 00/12] Enroll kernel keys thru MOK
Nayna
- [RFC PATCH v2 0/1] Relax restrictions on user.* xattr
Daniel Walsh
- [PATCH v2 1/1] xattr: Allow user.* xattr on symlink and special files
Vivek Goyal
- [PATCH v2 1/1] xattr: Allow user.* xattr on symlink and special files
Bruce Fields
- [PATCH v2 1/1] xattr: Allow user.* xattr on symlink and special files
Theodore Ts'o
- [PATCH 0/2] net: cipso: bug fixes
Pavel Skripkin
- [PATCH 1/2] net: cipso: fix warnings in netlbl_cipsov4_add_std
Pavel Skripkin
- [PATCH 2/2] net: cipso: fix memory leak in cipso_v4_doi_free
Pavel Skripkin
- [PATCH 2/2] net: cipso: fix memory leak in cipso_v4_doi_free
Dongliang Mu
- [PATCH 2/2] net: cipso: fix memory leak in cipso_v4_doi_free
Pavel Skripkin
- [PATCH 2/2] net: cipso: fix memory leak in cipso_v4_doi_free
Dongliang Mu
- [PATCH v1 1/4] landlock.7: Add a new page to introduce Landlock
Alejandro Colomar (man-pages)
- [PATCH v3 1/2] perf: Fix required permissions if sigtrap is requested
Marco Elver
- [Virtio-fs] [PATCH v2 1/1] xattr: Allow user.* xattr on symlink and special files
Greg Kurz
- [PATCH v2 1/1] xattr: Allow user.* xattr on symlink and special files
Vivek Goyal
- [PATCH 1/2] net: cipso: fix warnings in netlbl_cipsov4_add_std
Paul Moore
- [PATCH v2 1/1] xattr: Allow user.* xattr on symlink and special files
J. Bruce Fields
- [PATCH v2 0/4] Add Landlock man pages
Mickaël Salaün
- [PATCH v2 1/4] landlock.7: Add a new page to introduce Landlock
Mickaël Salaün
- [PATCH v2 2/4] landlock_create_ruleset.2: Document new syscall
Mickaël Salaün
- [PATCH v2 3/4] landlock_add_rule.2: Document new syscall
Mickaël Salaün
- [PATCH v2 4/4] landlock_restrict_self.2: Document new syscall
Mickaël Salaün
- [PATCH] tpm: ibmvtpm: Avoid error message when process gets signal while waiting
Stefan Berger
- [PATCH v8 0/5] Enable root to update the blacklist keyring
Mickaël Salaün
- [PATCH v8 1/5] tools/certs: Add print-cert-tbs-hash.sh
Mickaël Salaün
- [PATCH v8 2/5] certs: Check that builtin blacklist hashes are valid
Mickaël Salaün
- [PATCH v8 3/5] certs: Make blacklist_vet_description() more strict
Mickaël Salaün
- [PATCH v8 4/5] certs: Factor out the blacklist hash creation
Mickaël Salaün
- [PATCH v8 5/5] certs: Allow root user to append signed hashes to the blacklist keyring
Mickaël Salaün
- [PATCH v2 1/1] xattr: Allow user.* xattr on symlink and special files
Vivek Goyal
- [PATCH v2 1/1] xattr: Allow user.* xattr on symlink and special files
Vivek Goyal
- [PATCH v2 1/1] xattr: Allow user.* xattr on symlink and special files
J. Bruce Fields
- [PATCH v2 1/1] xattr: Allow user.* xattr on symlink and special files
Vivek Goyal
- [PATCH] LSM: add NULL check for kcalloc()
Austin Kim
- [PATCH v3] lockdown,selinux: fix wrong subject in some SELinux lockdown checks
Paul Moore
- [PATCH v3 3/3] ima: Add digest and digest_len params to the functions to measure a buffer
Paul Moore
- [PATCH] tpm: ibmvtpm: Avoid error message when process gets signal while waiting
Nageswara Sastry
- [PATCH v3 1/2] perf: Fix required permissions if sigtrap is requested
Peter Zijlstra
- apparmor: global buffers spin lock may get contended
Sergey Senozhatsky
- [PATCH v2 1/1] xattr: Allow user.* xattr on symlink and special files
Casey Schaufler
- [Virtio-fs] [PATCH v2 1/1] xattr: Allow user.* xattr on symlink and special files
Casey Schaufler
- [syzbot] memory leak in dev_exception_add
syzbot
- [PATCH v2 0/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Ahmad Fatoum
- [PATCH 1/3] crypto: mxs-dcp: Add support for hardware provided keys
Ahmad Fatoum
- [PATCH 2/3] KEYS: trusted: Introduce support for NXP DCP-based trusted keys
Ahmad Fatoum
- [PATCH 3/3] doc: trusted-encrypted: add DCP as new trust source
Ahmad Fatoum
- [PATCH 1/3] crypto: mxs-dcp: Add support for hardware provided keys
Richard Weinberger
- [PATCH 2/3] KEYS: trusted: Introduce support for NXP DCP-based trusted keys
Richard Weinberger
- [PATCH 1/3] crypto: mxs-dcp: Add support for hardware provided keys
Ahmad Fatoum
- [PATCH] LSM: add NULL check for kcalloc()
James Morris
- [PATCH] LSM: add NULL check for kcalloc()
Austin Kim
- [PATCH v2] LSM: add NULL check for kcalloc()
Austin Kim
- [PATCH v2] hardening: Introduce CONFIG_ZERO_CALL_USED_REGS
Kees Cook
- [PATCH] Smack: Fix wrong semantics in smk_access_entry()
Tianjia Zhang
- [PATCH] Smack: Fix wrong semantics in smk_access_entry()
Casey Schaufler
- Hello Dear
Ms Fatima Muhammad
- [PATCH] KEYS: trusted: Fix trusted key backends when building as module
Andreas Rammhold
- [PATCH] KEYS: trusted: Fix trusted key backends when building as module
Sumit Garg
- [PATCH] KEYS: trusted: Fix trusted key backends when building as module
Ahmad Fatoum
- [PATCH v2 1/6] KEYS: trusted: allow use of TEE as backend without TCG_TPM support
Sumit Garg
- [PATCH] KEYS: trusted: Fix trusted key backends when building as module
Sumit Garg
- [PATCH v2 1/6] KEYS: trusted: allow use of TEE as backend without TCG_TPM support
Ahmad Fatoum
- [PATCH] KEYS: trusted: Fix trusted key backends when building as module
andreas at rammhold.de
- issues about selinux namespace
xiujianfeng
- [PATCH v3 2/3] ima: Return int in the functions to measure a buffer
Mimi Zohar
- [PATCH v3 3/3] ima: Add digest and digest_len params to the functions to measure a buffer
Mimi Zohar
- [PATCH] ima: Support euid keyword for buffer measurement
Mimi Zohar
- issues about selinux namespace
Paul Moore
- I WANT TO INVESTMENT IN YOUR COUNTRY?
Mrs. Hajia Hannah Ahmed
- [PATCH v3 2/3] ima: Return int in the functions to measure a buffer
Roberto Sassu
- [PATCH v3 2/3] ima: Return int in the functions to measure a buffer
Mimi Zohar
- [PATCH] Smack: Fix wrong semantics in smk_access_entry()
Casey Schaufler
- [PATCH] smack: mark 'smack_enabled' global variable as __initdata
Casey Schaufler
- [PATCH v2 6/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Richard Weinberger
- [PATCH v2 6/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Mimi Zohar
- [PATCH v2 6/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Richard Weinberger
- [PATCH] hardening: Clarify Kconfig text for auto-var-init
Kees Cook
- [PATCH] hardening: Clarify Kconfig text for auto-var-init
Gustavo A. R. Silva
- [PATCH] Smack: Fix wrong semantics in smk_access_entry()
Tianjia Zhang
- issues about selinux namespace
xiujianfeng
- [PATCH v2] KEYS: trusted: fix use as module when CONFIG_TCG_TPM=m
Ahmad Fatoum
- [PATCH RFC 0/9] sk_buff: optimize layout for GRO
Paolo Abeni
- [PATCH RFC 1/9] sk_buff: track nfct status in newly added skb->_state
Paolo Abeni
- [PATCH RFC 2/9] sk_buff: track dst status in skb->_state
Paolo Abeni
- [PATCH RFC 3/9] sk_buff: move the active_extensions into the state bitfield
Paolo Abeni
- [PATCH RFC 4/9] net: optimize GRO for the common case.
Paolo Abeni
- [PATCH RFC 5/9] skbuff: introduce has_sk state bit.
Paolo Abeni
- [PATCH RFC 6/9] veth: use skb_prepare_for_gro()
Paolo Abeni
- [PATCH RFC 7/9] sk_buff: move inner header fields after tail
Paolo Abeni
- [PATCH RFC 8/9] sk_buff: move vlan field after tail.
Paolo Abeni
- [PATCH RFC 9/9] sk_buff: access secmark via getter/setter
Paolo Abeni
- [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Ahmad Fatoum
- [PATCH 1/4] KEYS: trusted: allow users to use kernel RNG for key material
Ahmad Fatoum
- [PATCH 2/4] KEYS: trusted: allow trust sources to use kernel RNG for key material
Ahmad Fatoum
- [PATCH 3/4] crypto: caam - add in-kernel interface for blob generator
Ahmad Fatoum
- [PATCH 4/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Ahmad Fatoum
- [PATCH v2 6/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Ahmad Fatoum
- [PATCH 2/3] KEYS: trusted: Introduce support for NXP DCP-based trusted keys
Ahmad Fatoum
- [PATCH RFC 0/9] sk_buff: optimize layout for GRO
Casey Schaufler
- AVC denied for docker while trying to set labels for tmpfs mounts
Sujithra P
- [PATCH v2] KEYS: trusted: fix use as module when CONFIG_TCG_TPM=m
Andreas Rammhold
- AVC denied for docker while trying to set labels for tmpfs mounts
Paul Moore
- AVC denied for docker while trying to set labels for tmpfs mounts
Sujithra P
- [PATCH v28 00/25] LSM: Module stacking for AppArmor
Casey Schaufler
- [PATCH v28 01/25] LSM: Infrastructure management of the sock security
Casey Schaufler
- [PATCH v28 00/25] LSM: Module stacking for AppArmor
Casey Schaufler
- [PATCH v28 01/25] LSM: Infrastructure management of the sock security
Casey Schaufler
- [PATCH v28 02/25] LSM: Add the lsmblob data structure.
Casey Schaufler
- [PATCH v28 03/25] LSM: provide lsm name and id slot mappings
Casey Schaufler
- [PATCH v28 04/25] IMA: avoid label collisions with stacked LSMs
Casey Schaufler
- [PATCH v28 05/25] LSM: Use lsmblob in security_audit_rule_match
Casey Schaufler
- [PATCH v28 06/25] LSM: Use lsmblob in security_kernel_act_as
Casey Schaufler
- [PATCH v28 07/25] LSM: Use lsmblob in security_secctx_to_secid
Casey Schaufler
- [PATCH v28 08/25] LSM: Use lsmblob in security_secid_to_secctx
Casey Schaufler
- [PATCH v28 09/25] LSM: Use lsmblob in security_ipc_getsecid
Casey Schaufler
- [PATCH v28 10/25] LSM: Use lsmblob in security_task_getsecid
Casey Schaufler
- [PATCH v28 11/25] LSM: Use lsmblob in security_inode_getsecid
Casey Schaufler
- [PATCH v28 12/25] LSM: Use lsmblob in security_cred_getsecid
Casey Schaufler
- [PATCH v28 13/25] IMA: Change internal interfaces to use lsmblobs
Casey Schaufler
- [PATCH v28 14/25] LSM: Specify which LSM to display
Casey Schaufler
- [PATCH v28 15/25] LSM: Ensure the correct LSM context releaser
Casey Schaufler
- [PATCH v28 16/25] LSM: Use lsmcontext in security_secid_to_secctx
Casey Schaufler
- [PATCH v28 17/25] LSM: Use lsmcontext in security_inode_getsecctx
Casey Schaufler
- [PATCH v28 18/25] LSM: security_secid_to_secctx in netlink netfilter
Casey Schaufler
- [PATCH v28 19/25] NET: Store LSM netlabel data in a lsmblob
Casey Schaufler
- [PATCH v28 20/25] LSM: Verify LSM display sanity in binder
Casey Schaufler
- [PATCH v28 21/25] audit: support non-syscall auxiliary records
Casey Schaufler
- [PATCH v28 22/25] Audit: Add record for multiple process LSM attributes
Casey Schaufler
- [PATCH v28 23/25] Audit: Add record for multiple object LSM attributes
Casey Schaufler
- [PATCH v28 24/25] LSM: Add /proc attr entry for full LSM context
Casey Schaufler
- [PATCH v28 25/25] AppArmor: Remove the exclusive flag
Casey Schaufler
- [PATCH v2] KEYS: trusted: fix use as module when CONFIG_TCG_TPM=m
Sumit Garg
- [PATCH 1/4] KEYS: trusted: allow users to use kernel RNG for key material
Sumit Garg
- [PATCH 2/4] KEYS: trusted: allow trust sources to use kernel RNG for key material
Sumit Garg
- [PATCH RFC 0/9] sk_buff: optimize layout for GRO
Paolo Abeni
- [RFC PATCH v1 0/4] keys: introduce key_extract_material helper
Ahmad Fatoum
- [RFC PATCH v1 1/4] keys: introduce key_extract_material helper
Ahmad Fatoum
- [RFC PATCH v1 2/4] dm: crypt: use new key_extract_material helper
Ahmad Fatoum
- [RFC PATCH v1 3/4] ubifs: auth: remove never hit key type error check
Ahmad Fatoum
- [RFC PATCH v1 4/4] ubifs: auth: consult encrypted and trusted keys if no logon key was found
Ahmad Fatoum
- AVC denied for docker while trying to set labels for tmpfs mounts
Daniel Walsh
- [PATCH RFC 0/9] sk_buff: optimize layout for GRO
Casey Schaufler
- [PATCH RFC 0/9] sk_buff: optimize layout for GRO
Paolo Abeni
- [PATCH v28 21/25] audit: support non-syscall auxiliary records
kernel test robot
- [PATCH RFC 0/9] sk_buff: optimize layout for GRO
Paul Moore
- AVC denied for docker while trying to set labels for tmpfs mounts
Sujithra P
- [RFC PATCH] userfaultfd: open userfaultfds with O_RDONLY
Ondrej Mosnacek
- [PATCH v4 0/3] ima: Provide more info about buffer measurement
Roberto Sassu
- [PATCH v4 1/3] ima: Introduce ima_get_current_hash_algo()
Roberto Sassu
- [PATCH v4 2/3] ima: Return int in the functions to measure a buffer
Roberto Sassu
- [PATCH v4 3/3] ima: Add digest and digest_len params to the functions to measure a buffer
Roberto Sassu
- [PATCH v4 1/3] ima: Introduce ima_get_current_hash_algo()
Mimi Zohar
- [PATCH v4 1/3] ima: Introduce ima_get_current_hash_algo()
Roberto Sassu
- [PATCH] security: keys: trusted: Fix memory leaks on allocated blob
Colin King
- [PATCH v28 12/25] LSM: Use lsmblob in security_cred_getsecid
kernel test robot
- [PATCH RFC 0/9] sk_buff: optimize layout for GRO
Florian Westphal
- [PATCH RFC 0/9] sk_buff: optimize layout for GRO
Paul Moore
- [PATCH RFC 0/9] sk_buff: optimize layout for GRO
Florian Westphal
- [PATCH RFC 0/9] sk_buff: optimize layout for GRO
Casey Schaufler
- [PATCH RFC 0/9] sk_buff: optimize layout for GRO
Florian Westphal
- [PATCH] security: keys: trusted: Fix memory leaks on allocated blob
Sumit Garg
- [PATCH] security: keys: trusted: Fix memory leaks on allocated blob
Dan Carpenter
- [PATCH] security: keys: trusted: Fix memory leaks on allocated blob
Colin Ian King
- [PATCH 1/2] net: cipso: fix warnings in netlbl_cipsov4_add_std
Pavel Skripkin
- [PATCH][V2] security: keys: trusted: Fix memory leaks on allocated blob
Colin King
- [PATCH RFC 0/9] sk_buff: optimize layout for GRO
Casey Schaufler
- [RFC][PATCH v2 00/12] integrity: Introduce DIGLIM
Roberto Sassu
- [RFC][PATCH v2 01/12] diglim: Overview
Roberto Sassu
- [RFC][PATCH v2 02/12] diglim: Basic definitions
Roberto Sassu
- [RFC][PATCH v2 03/12] diglim: Objects
Roberto Sassu
- [RFC][PATCH v2 04/12] diglim: Methods
Roberto Sassu
- [RFC][PATCH v2 05/12] diglim: Parser
Roberto Sassu
- [RFC][PATCH v2 06/12] diglim: Interfaces - digest_list_add, digest_list_del
Roberto Sassu
- [RFC][PATCH v2 07/12] diglim: Interfaces - digest_lists_loaded
Roberto Sassu
- [RFC][PATCH v2 08/12] diglim: Interfaces - digest_label
Roberto Sassu
- [RFC][PATCH v2 09/12] diglim: Interfaces - digest_query
Roberto Sassu
- [RFC][PATCH v2 10/12] diglim: Interfaces - digests_count
Roberto Sassu
- [RFC][PATCH v2 11/12] diglim: Remote Attestation
Roberto Sassu
- [RFC][PATCH v2 12/12] diglim: Tests
Roberto Sassu
- [PATCH RFC v2 00/12] Enroll kernel keys thru MOK
Eric Snowberg
- [PATCH RFC v2 01/12] integrity: Introduce a Linux keyring for the Machine Owner Key (MOK)
Eric Snowberg
- [PATCH RFC v2 02/12] KEYS: CA link restriction
Eric Snowberg
- [PATCH RFC v2 03/12] integrity: Trust MOK keys if MokListTrustedRT found
Eric Snowberg
- [PATCH RFC v2 04/12] integrity: add add_to_mok_keyring
Eric Snowberg
- [PATCH RFC v2 05/12] integrity: restrict INTEGRITY_KEYRING_MOK to restrict_link_by_system_trusted_or_ca
Eric Snowberg
- [PATCH RFC v2 06/12] integrity: accessor function to get trust_moklist
Eric Snowberg
- [PATCH RFC v2 07/12] integrity: add new keyring handler for mok keys
Eric Snowberg
- [PATCH RFC v2 08/12] integrity: Suppress error message for keys added to the mok keyring
Eric Snowberg
- [PATCH RFC v2 09/12] KEYS: add a reference to mok keyring
Eric Snowberg
- [PATCH RFC v2 10/12] KEYS: link system_trusted_keys to mok_trusted_keys
Eric Snowberg
- [PATCH RFC v2 11/12] integrity: Do not allow mok keyring updates following init
Eric Snowberg
- [PATCH RFC v2 12/12] integrity: store reference to mok keyring
Eric Snowberg
- [PATCH 1/2] net: cipso: fix warnings in netlbl_cipsov4_add_std
Paul Moore
- [PATCH] tpm: ibmvtpm: Avoid error message when process gets signal while waiting
Jarkko Sakkinen
- [PATCH RFC 0/9] sk_buff: optimize layout for GRO
Paul Moore
- [PATCH] KEYS: trusted: Fix trusted key backends when building as module
Jarkko Sakkinen
- [PATCH] KEYS: trusted: Fix trusted key backends when building as module
Jarkko Sakkinen
- [PATCH] tpm: ibmvtpm: Avoid error message when process gets signal while waiting
Stefan Berger
- [PATCH v2] KEYS: trusted: fix use as module when CONFIG_TCG_TPM=m
Jarkko Sakkinen
- [PATCH] security: keys: trusted: Fix memory leaks on allocated blob
Jarkko Sakkinen
- [PATCH][V2] security: keys: trusted: Fix memory leaks on allocated blob
Jarkko Sakkinen
- [PATCH v2] KEYS: trusted: fix use as module when CONFIG_TCG_TPM=m
Ahmad Fatoum
- [RFC][PATCH v2 02/12] diglim: Basic definitions
Greg KH
- [RFC PATCH v1] fscrypt: support encrypted and trusted keys
Ahmad Fatoum
- [RFC][PATCH v2 02/12] diglim: Basic definitions
Roberto Sassu
- [RFC][PATCH v2 02/12] diglim: Basic definitions
Greg KH
- [RFC][PATCH v2 02/12] diglim: Basic definitions
Roberto Sassu
- [RFC][PATCH v2 02/12] diglim: Basic definitions
Greg KH
- [PATCH RESEND] net: cipso: fix warnings in netlbl_cipsov4_add_std
Pavel Skripkin
- [RFC PATCH v1] fscrypt: support encrypted and trusted keys
Eric Biggers
- [PATCH RESEND] net: cipso: fix warnings in netlbl_cipsov4_add_std
patchwork-bot+netdevbpf at kernel.org
- It's very urgent, please reply immediately
Godwin Pete
- [RFC][PATCH v2 02/12] diglim: Basic definitions
Roberto Sassu
- [RFC PATCH v1] fscrypt: support encrypted and trusted keys
Ahmad Fatoum
- [PATCH 1/1] NAX LSM: Add initial support support
THOBY Simon
- [RFC][PATCH v2 01/12] diglim: Overview
Mauro Carvalho Chehab
- [RFC][PATCH v2 02/12] diglim: Basic definitions
Mauro Carvalho Chehab
- [RFC][PATCH v2 03/12] diglim: Objects
Mauro Carvalho Chehab
- [RFC][PATCH v2 01/12] diglim: Overview
Roberto Sassu
- [RFC][PATCH v2 02/12] diglim: Basic definitions
Roberto Sassu
- [RFC][PATCH v2 03/12] diglim: Objects
Roberto Sassu
- [RFC][PATCH v2 04/12] diglim: Methods
Mauro Carvalho Chehab
- [RFC][PATCH v2 04/12] diglim: Methods
Roberto Sassu
- [RFC][PATCH v2 05/12] diglim: Parser
Mauro Carvalho Chehab
- [RFC][PATCH v2 06/12] diglim: Interfaces - digest_list_add, digest_list_del
Mauro Carvalho Chehab
- [RFC][PATCH v2 10/12] diglim: Interfaces - digests_count
Mauro Carvalho Chehab
- [RFC][PATCH v2 11/12] diglim: Remote Attestation
Mauro Carvalho Chehab
- [RFC][PATCH v2 11/12] diglim: Remote Attestation
Roberto Sassu
- [RFC][PATCH v2 02/12] diglim: Basic definitions
Mauro Carvalho Chehab
- [RFC][PATCH v2 02/12] diglim: Basic definitions
Roberto Sassu
- [RFC PATCH v1] fscrypt: support encrypted and trusted keys
Eric Biggers
- [PATCH RFC 0/9] sk_buff: optimize layout for GRO
Paolo Abeni
- [PATCH v10 4/8] PCI/sysfs: Allow userspace to query and set device reset mechanism
Bjorn Helgaas
- [PATCH] tpm: ibmvtpm: Avoid error message when process gets signal while waiting
Jarkko Sakkinen
- [PATCH v2] KEYS: trusted: fix use as module when CONFIG_TCG_TPM=m
Jarkko Sakkinen
- [RFC PATCH v1] fscrypt: support encrypted and trusted keys
Jarkko Sakkinen
- [RFC PATCH v1] fscrypt: support encrypted and trusted keys
Ahmad Fatoum
- [PATCH v2] KEYS: trusted: fix use as module when CONFIG_TCG_TPM=m
Ahmad Fatoum
- [syzbot] kernel BUG in assoc_array_insert (2)
syzbot
- [RFC PATCH v1] fscrypt: support encrypted and trusted keys
Sumit Garg
- [RFC PATCH v1] fscrypt: support encrypted and trusted keys
Ahmad Fatoum
- [PATCH] tpm: ibmvtpm: Avoid error message when process gets signal while waiting
Stefan Berger
- [PATCH v2 1/4] landlock.7: Add a new page to introduce Landlock
Alejandro Colomar (man-pages)
- [PATCH] tpm: ibmvtpm: Avoid error message when process gets signal while waiting
Stefan Berger
- [RFC PATCH v1] fscrypt: support encrypted and trusted keys
Eric Biggers
- [PATCH v2] KEYS: trusted: Fix trusted key backends when building as module
Andreas Rammhold
- [RFC][PATCH v2 06/12] diglim: Interfaces - digest_list_add, digest_list_del
Mimi Zohar
- [PATCH v2 1/4] landlock.7: Add a new page to introduce Landlock
Alejandro Colomar (man-pages)
- [PATCH v2] KEYS: trusted: fix use as module when CONFIG_TCG_TPM=m
Jarkko Sakkinen
- [PATCH] tpm: ibmvtpm: Avoid error message when process gets signal while waiting
Jarkko Sakkinen
- [PATCH v2] KEYS: trusted: Fix trusted key backends when building as module
Jarkko Sakkinen
- [PATCH v3] KEYS: trusted: Fix trusted key backends when building as module
Andreas Rammhold
- [PATCH] tpm: ibmvtpm: Avoid error message when process gets signal while waiting
Nageswara Sastry
- [PATCH v3] KEYS: trusted: Fix trusted key backends when building as module
Sumit Garg
- [PATCH] apparmor: use per file locks for transactional queries
Hamza Mahfooz
- [PATCH v3] KEYS: trusted: Fix trusted key backends when building as module
Ahmad Fatoum
- [PATCH v2] KEYS: trusted: fix use as module when CONFIG_TCG_TPM=m
Ahmad Fatoum
- [RFC][PATCH v2 06/12] diglim: Interfaces - digest_list_add, digest_list_del
Roberto Sassu
- [PATCH] tpm: ibmvtpm: Avoid error message when process gets signal while waiting
Stefan Berger
- [PATCH v2 1/4] landlock.7: Add a new page to introduce Landlock
Mickaël Salaün
- [RFC][PATCH v2 06/12] diglim: Interfaces - digest_list_add, digest_list_del
Mimi Zohar
- [PATCH v2 1/4] landlock.7: Add a new page to introduce Landlock
Alejandro Colomar (man-pages)
- [PATCH v2 1/4] landlock.7: Add a new page to introduce Landlock
Alejandro Colomar (man-pages)
- [RFC][PATCH v2 06/12] diglim: Interfaces - digest_list_add, digest_list_del
Roberto Sassu
- [RFC][PATCH v2 06/12] diglim: Interfaces - digest_list_add, digest_list_del
Mimi Zohar
- [RFC][PATCH v2 06/12] diglim: Interfaces - digest_list_add, digest_list_del
Roberto Sassu
- [PATCH v2 1/4] landlock.7: Add a new page to introduce Landlock
Mickaël Salaün
- [PATCH v3 0/4] Add Landlock man pages
Mickaël Salaün
- [PATCH v3 1/4] landlock.7: Add a new page to introduce Landlock
Mickaël Salaün
- [PATCH v3 2/4] landlock_create_ruleset.2: Document new syscall
Mickaël Salaün
- [PATCH v3 3/4] landlock_add_rule.2: Document new syscall
Mickaël Salaün
- [PATCH v3 4/4] landlock_restrict_self.2: Document new syscall
Mickaël Salaün
- [PATCH] apparmor: use per file locks for transactional queries
John Johansen
- [PATCH] security: remove unneeded subdir-$(CONFIG_...)
Masahiro Yamada
- [PATCH v2 1/4] landlock.7: Add a new page to introduce Landlock
Alejandro Colomar (man-pages)
- [PATCH v2 1/4] landlock.7: Add a new page to introduce Landlock
Alejandro Colomar (man-pages)
Last message date:
Sat Jul 31 11:02:27 UTC 2021
Archived on: Sat Jul 31 10:55:24 UTC 2021
This archive was generated by
Pipermail 0.09 (Mailman edition).