July 2021 Archives by date
      
      Starting: Thu Jul  1 07:56:24 UTC 2021
         Ending: Sat Jul 31 11:02:27 UTC 2021
         Messages: 373
     
- [PATCH] perf: Require CAP_KILL if sigtrap is requested
 
Ondrej Mosnacek
- [PATCH v2] perf: Require CAP_KILL if sigtrap is requested
 
Marco Elver
- [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
 
Dr. David Alan Gilbert
- [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
 
Vivek Goyal
- [PATCH v2 0/3] ima: Provide more info about buffer measurement
 
Roberto Sassu
- [PATCH v2 1/3] ima: Introduce ima_get_current_hash_algo()
 
Roberto Sassu
- [PATCH v2 2/3] ima: Return int in the functions to measure a buffer
 
Roberto Sassu
- [PATCH v2 3/3] ima: Add digest and digest_len params to the functions to measure a buffer
 
Roberto Sassu
- [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
 
Vivek Goyal
- [PATCH v2 1/3] ima: Introduce ima_get_current_hash_algo()
 
Lakshmi Ramasubramanian
- [PATCH v2 2/3] ima: Return int in the functions to measure a buffer
 
Lakshmi Ramasubramanian
- [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
 
Casey Schaufler
- [PATCH v2 3/3] ima: Add digest and digest_len params to the functions to measure a buffer
 
Lakshmi Ramasubramanian
- [PATCH v2 6/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
 
Richard Weinberger
- [PATCH v2] perf: Require CAP_KILL if sigtrap is requested
 
Eric W. Biederman
- [PATCH v8 3/8] security/brute: Detect a brute force attack
 
Alexander Lobakin
- [PATCH v8 1/2] certs: Trigger creation of RSA module signing key if it's not an RSA key
 
Jarkko Sakkinen
- [PATCH v8 0/2] Add support for ECDSA-signed kernel modules
 
Jarkko Sakkinen
- [PATCH v2] perf: Require CAP_KILL if sigtrap is requested
 
Marco Elver
- [PATCH v2 6/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
 
Ahmad Fatoum
- [PATCH v2 5/6] crypto: caam - add in-kernel interface for blob generator
 
Ahmad Fatoum
- [PATCH v2 2/3] ima: Return int in the functions to measure a buffer
 
Roberto Sassu
- [PATCH v2 6/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
 
Richard Weinberger
- [PATCH v2 3/3] ima: Add digest and digest_len params to the functions to measure a buffer
 
Roberto Sassu
- [PATCH v2 6/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
 
Ahmad Fatoum
- [PATCH v8 3/8] security/brute: Detect a brute force attack
 
John Wood
- [PATCH v8 3/8] security/brute: Detect a brute force attack
 
Alexander Lobakin
- [syzbot] general protection fault in legacy_parse_param
 
Dmitry Vyukov
- [PATCH v8 3/8] security/brute: Detect a brute force attack
 
John Wood
- [syzbot] general protection fault in legacy_parse_param
 
Casey Schaufler
- [PATCH v8 3/8] security/brute: Detect a brute force attack
 
John Wood
- [syzbot] general protection fault in legacy_parse_param
 
Paul Moore
- [PATCH AUTOSEL 5.13 38/85] ima: Don't remove security.ima if file must not be appraised
 
Sasha Levin
- [PATCH AUTOSEL 5.12 36/80] ima: Don't remove security.ima if file must not be appraised
 
Sasha Levin
- [syzbot] general protection fault in legacy_parse_param
 
Dmitry Vyukov
- [PATCH v3 1/2] perf: Fix required permissions if sigtrap is requested
 
Marco Elver
- [PATCH v3 2/2] perf: Refactor permissions check into perf_check_permission()
 
Marco Elver
- [PATCH v3 0/3] ima: Provide more info about buffer measurement
 
Roberto Sassu
- [PATCH v3 1/3] ima: Introduce ima_get_current_hash_algo()
 
Roberto Sassu
- [PATCH v3 2/3] ima: Return int in the functions to measure a buffer
 
Roberto Sassu
- [PATCH v3 3/3] ima: Add digest and digest_len params to the functions to measure a buffer
 
Roberto Sassu
- [PATCH] ima: Support euid keyword for buffer measurement
 
Roberto Sassu
- [PATCH v8 3/8] security/brute: Detect a brute force attack
 
Alexander Lobakin
- [PATCH v3 1/2] perf: Fix required permissions if sigtrap is requested
 
Dmitry Vyukov
- [PATCH v3 2/2] perf: Refactor permissions check into perf_check_permission()
 
Dmitry Vyukov
- Refinanzierung *Heimwerkerdarlehen *Erfinderdarlehen
 
sms at Integrity-funds.com
- [syzbot] general protection fault in legacy_parse_param
 
Paul Moore
- [PATCH v1 0/4] Add Landlock man pages
 
Mickaël Salaün
- [PATCH v1 1/4] landlock.7: Add a new page to introduce Landlock
 
Mickaël Salaün
- [PATCH v1 2/4] landlock_create_ruleset.2: Document new syscall
 
Mickaël Salaün
- [PATCH v1 3/4] landlock_add_rule.2: Document new syscall
 
Mickaël Salaün
- [PATCH v1 4/4] landlock_restrict_self.2: Document new syscall
 
Mickaël Salaün
- [PATCH v3 2/3] ima: Return int in the functions to measure a buffer
 
Lakshmi Ramasubramanian
- [PATCH v3 3/3] ima: Add digest and digest_len params to the functions to measure a buffer
 
Lakshmi Ramasubramanian
- [PATCH] ima: Support euid keyword for buffer measurement
 
Lakshmi Ramasubramanian
- [PATCH 0/1] NAX (No Anonymous Execution) LSM
 
Igor Zhbanov
- [PATCH 1/1] NAX LSM: Add initial support support
 
Igor Zhbanov
- [PATCH RFC 00/12] Enroll kernel keys thru MOK
 
Eric Snowberg
- [PATCH RFC 01/12] KEYS: Add KEY_ALLOC_BYPASS_RESTRICTION option to key_move
 
Eric Snowberg
- [PATCH RFC 02/12] KEYS: Allow unrestricted keys to be moved to the secondary keyring
 
Eric Snowberg
- [PATCH RFC 03/12] KEYS: CA link restriction
 
Eric Snowberg
- [PATCH RFC 04/12] integrity: add integrity_destroy_keyring
 
Eric Snowberg
- [PATCH RFC 05/12] integrity: Introduce mok keyring
 
Eric Snowberg
- [PATCH RFC 06/12] integrity: Trust mok keys if MokListTrustedRT found
 
Eric Snowberg
- [PATCH RFC 07/12] integrity: add add_to_mok_keyring
 
Eric Snowberg
- [PATCH RFC 08/12] integrity: restrict INTEGRITY_KEYRING_MOK to restrict_link_by_secondary_trusted_or_ca
 
Eric Snowberg
- [PATCH RFC 09/12] integrity: accessor function to get trust_moklist
 
Eric Snowberg
- [PATCH RFC 10/12] integrity: add new keyring handler
 
Eric Snowberg
- [PATCH RFC 11/12] integrity: move keys from the mok keyring into the secondary keyring
 
Eric Snowberg
- [PATCH RFC 12/12] integrity: Suppress error message for keys added to the mok keyring
 
Eric Snowberg
- [PATCH RFC 00/12] Enroll kernel keys thru MOK
 
Christoph Hellwig
- [PATCH] ima: Support euid keyword for buffer measurement
 
Roberto Sassu
- [PATCH] smack: mark 'smack_enabled' global variable as __initdata
 
Austin Kim
- [PATCH] ima: check control characters in policy path
 
Tianxing Zhang
- [PATCH RFC 00/12] Enroll kernel keys thru MOK
 
Mimi Zohar
- [PATCH] smack: mark 'smack_enabled' global variable as __initdata
 
Casey Schaufler
- [PATCH RFC 00/12] Enroll kernel keys thru MOK
 
Eric Snowberg
- [PATCH RFC 00/12] Enroll kernel keys thru MOK
 
Eric Snowberg
- [PATCH RFC 00/12] Enroll kernel keys thru MOK
 
Christoph Hellwig
- [PATCH RFC 00/12] Enroll kernel keys thru MOK
 
Eric Snowberg
- [PATCH RFC 00/12] Enroll kernel keys thru MOK
 
Mimi Zohar
- [PATCH RFC 05/12] integrity: Introduce mok keyring
 
Linus Torvalds
- [PATCH RFC 05/12] integrity: Introduce mok keyring
 
Jarkko Sakkinen
- [PATCH RFC 00/12] Enroll kernel keys thru MOK
 
Eric Snowberg
- [PATCH RFC 05/12] integrity: Introduce mok keyring
 
Eric Snowberg
- Zdravstvuyte Vas interesuyut bazy dannykh kontaktov kompaniy dlya prodazhi vashikh tovarov i uslug?
 
ce2e946fce77 at mail.ru
- WORK OF GOD.
 
MARY JOHNSON
- [PATCH RFC 00/12] Enroll kernel keys thru MOK
 
Mimi Zohar
- [RFC PATCH v2 0/1] Relax restrictions on user.* xattr
 
Vivek Goyal
- [PATCH v2 1/1] xattr: Allow user.* xattr on symlink and special files
 
Vivek Goyal
- [PATCH RFC 00/12] Enroll kernel keys thru MOK
 
Eric Snowberg
- [PATCH RFC 00/12] Enroll kernel keys thru MOK
 
Mimi Zohar
- [PATCH RFC 00/12] Enroll kernel keys thru MOK
 
Eric Snowberg
- [PATCH RFC 00/12] Enroll kernel keys thru MOK
 
Mimi Zohar
- [PATCH v2 1/1] xattr: Allow user.* xattr on symlink and special files
 
Christian Brauner
- [PATCH v2 1/1] xattr: Allow user.* xattr on symlink and special files
 
Vivek Goyal
- [PATCH v2 1/1] xattr: Allow user.* xattr on symlink and special files
 
Casey Schaufler
- [PATCH RFC 00/12] Enroll kernel keys thru MOK
 
Nayna
- [RFC PATCH v2 0/1] Relax restrictions on user.* xattr
 
Daniel Walsh
- [PATCH v2 1/1] xattr: Allow user.* xattr on symlink and special files
 
Vivek Goyal
- [PATCH v2 1/1] xattr: Allow user.* xattr on symlink and special files
 
Bruce Fields
- [PATCH v2 1/1] xattr: Allow user.* xattr on symlink and special files
 
Theodore Ts'o
- [PATCH 0/2] net: cipso: bug fixes
 
Pavel Skripkin
- [PATCH 1/2] net: cipso: fix warnings in netlbl_cipsov4_add_std
 
Pavel Skripkin
- [PATCH 2/2] net: cipso: fix memory leak in cipso_v4_doi_free
 
Pavel Skripkin
- [PATCH 2/2] net: cipso: fix memory leak in cipso_v4_doi_free
 
Dongliang Mu
- [PATCH 2/2] net: cipso: fix memory leak in cipso_v4_doi_free
 
Pavel Skripkin
- [PATCH 2/2] net: cipso: fix memory leak in cipso_v4_doi_free
 
Dongliang Mu
- [PATCH v1 1/4] landlock.7: Add a new page to introduce Landlock
 
Alejandro Colomar (man-pages)
- [PATCH v3 1/2] perf: Fix required permissions if sigtrap is requested
 
Marco Elver
- [Virtio-fs] [PATCH v2 1/1] xattr: Allow user.* xattr on symlink and special files
 
Greg Kurz
- [PATCH v2 1/1] xattr: Allow user.* xattr on symlink and special files
 
Vivek Goyal
- [PATCH 1/2] net: cipso: fix warnings in netlbl_cipsov4_add_std
 
Paul Moore
- [PATCH v2 1/1] xattr: Allow user.* xattr on symlink and special files
 
J. Bruce Fields
- [PATCH v2 0/4] Add Landlock man pages
 
Mickaël Salaün
- [PATCH v2 1/4] landlock.7: Add a new page to introduce Landlock
 
Mickaël Salaün
- [PATCH v2 2/4] landlock_create_ruleset.2: Document new syscall
 
Mickaël Salaün
- [PATCH v2 3/4] landlock_add_rule.2: Document new syscall
 
Mickaël Salaün
- [PATCH v2 4/4] landlock_restrict_self.2: Document new syscall
 
Mickaël Salaün
- [PATCH] tpm: ibmvtpm: Avoid error message when process gets signal while waiting
 
Stefan Berger
- [PATCH v8 0/5] Enable root to update the blacklist keyring
 
Mickaël Salaün
- [PATCH v8 1/5] tools/certs: Add print-cert-tbs-hash.sh
 
Mickaël Salaün
- [PATCH v8 2/5] certs: Check that builtin blacklist hashes are valid
 
Mickaël Salaün
- [PATCH v8 3/5] certs: Make blacklist_vet_description() more strict
 
Mickaël Salaün
- [PATCH v8 4/5] certs: Factor out the blacklist hash creation
 
Mickaël Salaün
- [PATCH v8 5/5] certs: Allow root user to append signed hashes to the blacklist keyring
 
Mickaël Salaün
- [PATCH v2 1/1] xattr: Allow user.* xattr on symlink and special files
 
Vivek Goyal
- [PATCH v2 1/1] xattr: Allow user.* xattr on symlink and special files
 
Vivek Goyal
- [PATCH v2 1/1] xattr: Allow user.* xattr on symlink and special files
 
J. Bruce Fields
- [PATCH v2 1/1] xattr: Allow user.* xattr on symlink and special files
 
Vivek Goyal
- [PATCH] LSM: add NULL check for kcalloc()
 
Austin Kim
- [PATCH v3] lockdown,selinux: fix wrong subject in some SELinux lockdown checks
 
Paul Moore
- [PATCH v3 3/3] ima: Add digest and digest_len params to the functions to measure a buffer
 
Paul Moore
- [PATCH] tpm: ibmvtpm: Avoid error message when process gets signal while waiting
 
Nageswara Sastry
- [PATCH v3 1/2] perf: Fix required permissions if sigtrap is requested
 
Peter Zijlstra
- apparmor: global buffers spin lock may get contended
 
Sergey Senozhatsky
- [PATCH v2 1/1] xattr: Allow user.* xattr on symlink and special files
 
Casey Schaufler
- [Virtio-fs] [PATCH v2 1/1] xattr: Allow user.* xattr on symlink and special files
 
Casey Schaufler
- [syzbot] memory leak in dev_exception_add
 
syzbot
- [PATCH v2 0/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
 
Ahmad Fatoum
- [PATCH 1/3] crypto: mxs-dcp: Add support for hardware provided keys
 
Ahmad Fatoum
- [PATCH 2/3] KEYS: trusted: Introduce support for NXP DCP-based trusted keys
 
Ahmad Fatoum
- [PATCH 3/3] doc: trusted-encrypted: add DCP as new trust source
 
Ahmad Fatoum
- [PATCH 1/3] crypto: mxs-dcp: Add support for hardware provided keys
 
Richard Weinberger
- [PATCH 2/3] KEYS: trusted: Introduce support for NXP DCP-based trusted keys
 
Richard Weinberger
- [PATCH 1/3] crypto: mxs-dcp: Add support for hardware provided keys
 
Ahmad Fatoum
- [PATCH] LSM: add NULL check for kcalloc()
 
James Morris
- [PATCH] LSM: add NULL check for kcalloc()
 
Austin Kim
- [PATCH v2] LSM: add NULL check for kcalloc()
 
Austin Kim
- [PATCH v2] hardening: Introduce CONFIG_ZERO_CALL_USED_REGS
 
Kees Cook
- [PATCH] Smack: Fix wrong semantics in smk_access_entry()
 
Tianjia Zhang
- [PATCH] Smack: Fix wrong semantics in smk_access_entry()
 
Casey Schaufler
- Hello Dear
 
Ms Fatima Muhammad
- [PATCH] KEYS: trusted: Fix trusted key backends when building as module
 
Andreas Rammhold
- [PATCH] KEYS: trusted: Fix trusted key backends when building as module
 
Sumit Garg
- [PATCH] KEYS: trusted: Fix trusted key backends when building as module
 
Ahmad Fatoum
- [PATCH v2 1/6] KEYS: trusted: allow use of TEE as backend without TCG_TPM support
 
Sumit Garg
- [PATCH] KEYS: trusted: Fix trusted key backends when building as module
 
Sumit Garg
- [PATCH v2 1/6] KEYS: trusted: allow use of TEE as backend without TCG_TPM support
 
Ahmad Fatoum
- [PATCH] KEYS: trusted: Fix trusted key backends when building as module
 
andreas at rammhold.de
- issues about selinux namespace
 
xiujianfeng
- [PATCH v3 2/3] ima: Return int in the functions to measure a buffer
 
Mimi Zohar
- [PATCH v3 3/3] ima: Add digest and digest_len params to the functions to measure a buffer
 
Mimi Zohar
- [PATCH] ima: Support euid keyword for buffer measurement
 
Mimi Zohar
- issues about selinux namespace
 
Paul Moore
- I WANT TO INVESTMENT IN YOUR COUNTRY?
 
Mrs. Hajia Hannah Ahmed
- [PATCH v3 2/3] ima: Return int in the functions to measure a buffer
 
Roberto Sassu
- [PATCH v3 2/3] ima: Return int in the functions to measure a buffer
 
Mimi Zohar
- [PATCH] Smack: Fix wrong semantics in smk_access_entry()
 
Casey Schaufler
- [PATCH] smack: mark 'smack_enabled' global variable as __initdata
 
Casey Schaufler
- [PATCH v2 6/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
 
Richard Weinberger
- [PATCH v2 6/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
 
Mimi Zohar
- [PATCH v2 6/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
 
Richard Weinberger
- [PATCH] hardening: Clarify Kconfig text for auto-var-init
 
Kees Cook
- [PATCH] hardening: Clarify Kconfig text for auto-var-init
 
Gustavo A. R. Silva
- [PATCH] Smack: Fix wrong semantics in smk_access_entry()
 
Tianjia Zhang
- issues about selinux namespace
 
xiujianfeng
- [PATCH v2] KEYS: trusted: fix use as module when CONFIG_TCG_TPM=m
 
Ahmad Fatoum
- [PATCH RFC 0/9] sk_buff: optimize layout for GRO
 
Paolo Abeni
- [PATCH RFC 1/9] sk_buff: track nfct status in newly added skb->_state
 
Paolo Abeni
- [PATCH RFC 2/9] sk_buff: track dst status in skb->_state
 
Paolo Abeni
- [PATCH RFC 3/9] sk_buff: move the active_extensions into the state bitfield
 
Paolo Abeni
- [PATCH RFC 4/9] net: optimize GRO for the common case.
 
Paolo Abeni
- [PATCH RFC 5/9] skbuff: introduce has_sk state bit.
 
Paolo Abeni
- [PATCH RFC 6/9] veth: use skb_prepare_for_gro()
 
Paolo Abeni
- [PATCH RFC 7/9] sk_buff: move inner header fields after tail
 
Paolo Abeni
- [PATCH RFC 8/9] sk_buff: move vlan field after tail.
 
Paolo Abeni
- [PATCH RFC 9/9] sk_buff: access secmark via getter/setter
 
Paolo Abeni
- [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
 
Ahmad Fatoum
- [PATCH 1/4] KEYS: trusted: allow users to use kernel RNG for key material
 
Ahmad Fatoum
- [PATCH 2/4] KEYS: trusted: allow trust sources to use kernel RNG for key material
 
Ahmad Fatoum
- [PATCH 3/4] crypto: caam - add in-kernel interface for blob generator
 
Ahmad Fatoum
- [PATCH 4/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
 
Ahmad Fatoum
- [PATCH v2 6/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
 
Ahmad Fatoum
- [PATCH 2/3] KEYS: trusted: Introduce support for NXP DCP-based trusted keys
 
Ahmad Fatoum
- [PATCH RFC 0/9] sk_buff: optimize layout for GRO
 
Casey Schaufler
- AVC denied for docker while trying to set labels for tmpfs mounts
 
Sujithra P
- [PATCH v2] KEYS: trusted: fix use as module when CONFIG_TCG_TPM=m
 
Andreas Rammhold
- AVC denied for docker while trying to set labels for tmpfs mounts
 
Paul Moore
- AVC denied for docker while trying to set labels for tmpfs mounts
 
Sujithra P
- [PATCH v28 00/25] LSM: Module stacking for AppArmor
 
Casey Schaufler
- [PATCH v28 01/25] LSM: Infrastructure management of the sock security
 
Casey Schaufler
- [PATCH v28 00/25] LSM: Module stacking for AppArmor
 
Casey Schaufler
- [PATCH v28 01/25] LSM: Infrastructure management of the sock security
 
Casey Schaufler
- [PATCH v28 02/25] LSM: Add the lsmblob data structure.
 
Casey Schaufler
- [PATCH v28 03/25] LSM: provide lsm name and id slot mappings
 
Casey Schaufler
- [PATCH v28 04/25] IMA: avoid label collisions with stacked LSMs
 
Casey Schaufler
- [PATCH v28 05/25] LSM: Use lsmblob in security_audit_rule_match
 
Casey Schaufler
- [PATCH v28 06/25] LSM: Use lsmblob in security_kernel_act_as
 
Casey Schaufler
- [PATCH v28 07/25] LSM: Use lsmblob in security_secctx_to_secid
 
Casey Schaufler
- [PATCH v28 08/25] LSM: Use lsmblob in security_secid_to_secctx
 
Casey Schaufler
- [PATCH v28 09/25] LSM: Use lsmblob in security_ipc_getsecid
 
Casey Schaufler
- [PATCH v28 10/25] LSM: Use lsmblob in security_task_getsecid
 
Casey Schaufler
- [PATCH v28 11/25] LSM: Use lsmblob in security_inode_getsecid
 
Casey Schaufler
- [PATCH v28 12/25] LSM: Use lsmblob in security_cred_getsecid
 
Casey Schaufler
- [PATCH v28 13/25] IMA: Change internal interfaces to use lsmblobs
 
Casey Schaufler
- [PATCH v28 14/25] LSM: Specify which LSM to display
 
Casey Schaufler
- [PATCH v28 15/25] LSM: Ensure the correct LSM context releaser
 
Casey Schaufler
- [PATCH v28 16/25] LSM: Use lsmcontext in security_secid_to_secctx
 
Casey Schaufler
- [PATCH v28 17/25] LSM: Use lsmcontext in security_inode_getsecctx
 
Casey Schaufler
- [PATCH v28 18/25] LSM: security_secid_to_secctx in netlink netfilter
 
Casey Schaufler
- [PATCH v28 19/25] NET: Store LSM netlabel data in a lsmblob
 
Casey Schaufler
- [PATCH v28 20/25] LSM: Verify LSM display sanity in binder
 
Casey Schaufler
- [PATCH v28 21/25] audit: support non-syscall auxiliary records
 
Casey Schaufler
- [PATCH v28 22/25] Audit: Add record for multiple process LSM attributes
 
Casey Schaufler
- [PATCH v28 23/25] Audit: Add record for multiple object LSM attributes
 
Casey Schaufler
- [PATCH v28 24/25] LSM: Add /proc attr entry for full LSM context
 
Casey Schaufler
- [PATCH v28 25/25] AppArmor: Remove the exclusive flag
 
Casey Schaufler
- [PATCH v2] KEYS: trusted: fix use as module when CONFIG_TCG_TPM=m
 
Sumit Garg
- [PATCH 1/4] KEYS: trusted: allow users to use kernel RNG for key material
 
Sumit Garg
- [PATCH 2/4] KEYS: trusted: allow trust sources to use kernel RNG for key material
 
Sumit Garg
- [PATCH RFC 0/9] sk_buff: optimize layout for GRO
 
Paolo Abeni
- [RFC PATCH v1 0/4] keys: introduce key_extract_material helper
 
Ahmad Fatoum
- [RFC PATCH v1 1/4] keys: introduce key_extract_material helper
 
Ahmad Fatoum
- [RFC PATCH v1 2/4] dm: crypt: use new key_extract_material helper
 
Ahmad Fatoum
- [RFC PATCH v1 3/4] ubifs: auth: remove never hit key type error check
 
Ahmad Fatoum
- [RFC PATCH v1 4/4] ubifs: auth: consult encrypted and trusted keys if no logon key was found
 
Ahmad Fatoum
- AVC denied for docker while trying to set labels for tmpfs mounts
 
Daniel Walsh
- [PATCH RFC 0/9] sk_buff: optimize layout for GRO
 
Casey Schaufler
- [PATCH RFC 0/9] sk_buff: optimize layout for GRO
 
Paolo Abeni
- [PATCH v28 21/25] audit: support non-syscall auxiliary records
 
kernel test robot
- [PATCH RFC 0/9] sk_buff: optimize layout for GRO
 
Paul Moore
- AVC denied for docker while trying to set labels for tmpfs mounts
 
Sujithra P
- [RFC PATCH] userfaultfd: open userfaultfds with O_RDONLY
 
Ondrej Mosnacek
- [PATCH v4 0/3] ima: Provide more info about buffer measurement
 
Roberto Sassu
- [PATCH v4 1/3] ima: Introduce ima_get_current_hash_algo()
 
Roberto Sassu
- [PATCH v4 2/3] ima: Return int in the functions to measure a buffer
 
Roberto Sassu
- [PATCH v4 3/3] ima: Add digest and digest_len params to the functions to measure a buffer
 
Roberto Sassu
- [PATCH v4 1/3] ima: Introduce ima_get_current_hash_algo()
 
Mimi Zohar
- [PATCH v4 1/3] ima: Introduce ima_get_current_hash_algo()
 
Roberto Sassu
- [PATCH] security: keys: trusted: Fix memory leaks on allocated blob
 
Colin King
- [PATCH v28 12/25] LSM: Use lsmblob in security_cred_getsecid
 
kernel test robot
- [PATCH RFC 0/9] sk_buff: optimize layout for GRO
 
Florian Westphal
- [PATCH RFC 0/9] sk_buff: optimize layout for GRO
 
Paul Moore
- [PATCH RFC 0/9] sk_buff: optimize layout for GRO
 
Florian Westphal
- [PATCH RFC 0/9] sk_buff: optimize layout for GRO
 
Casey Schaufler
- [PATCH RFC 0/9] sk_buff: optimize layout for GRO
 
Florian Westphal
- [PATCH] security: keys: trusted: Fix memory leaks on allocated blob
 
Sumit Garg
- [PATCH] security: keys: trusted: Fix memory leaks on allocated blob
 
Dan Carpenter
- [PATCH] security: keys: trusted: Fix memory leaks on allocated blob
 
Colin Ian King
- [PATCH 1/2] net: cipso: fix warnings in netlbl_cipsov4_add_std
 
Pavel Skripkin
- [PATCH][V2] security: keys: trusted: Fix memory leaks on allocated blob
 
Colin King
- [PATCH RFC 0/9] sk_buff: optimize layout for GRO
 
Casey Schaufler
- [RFC][PATCH v2 00/12] integrity: Introduce DIGLIM
 
Roberto Sassu
- [RFC][PATCH v2 01/12] diglim: Overview
 
Roberto Sassu
- [RFC][PATCH v2 02/12] diglim: Basic definitions
 
Roberto Sassu
- [RFC][PATCH v2 03/12] diglim: Objects
 
Roberto Sassu
- [RFC][PATCH v2 04/12] diglim: Methods
 
Roberto Sassu
- [RFC][PATCH v2 05/12] diglim: Parser
 
Roberto Sassu
- [RFC][PATCH v2 06/12] diglim: Interfaces - digest_list_add, digest_list_del
 
Roberto Sassu
- [RFC][PATCH v2 07/12] diglim: Interfaces - digest_lists_loaded
 
Roberto Sassu
- [RFC][PATCH v2 08/12] diglim: Interfaces - digest_label
 
Roberto Sassu
- [RFC][PATCH v2 09/12] diglim: Interfaces - digest_query
 
Roberto Sassu
- [RFC][PATCH v2 10/12] diglim: Interfaces - digests_count
 
Roberto Sassu
- [RFC][PATCH v2 11/12] diglim: Remote Attestation
 
Roberto Sassu
- [RFC][PATCH v2 12/12] diglim: Tests
 
Roberto Sassu
- [PATCH RFC v2 00/12] Enroll kernel keys thru MOK
 
Eric Snowberg
- [PATCH RFC v2 01/12] integrity: Introduce a Linux keyring for the Machine Owner Key (MOK)
 
Eric Snowberg
- [PATCH RFC v2 02/12] KEYS: CA link restriction
 
Eric Snowberg
- [PATCH RFC v2 03/12] integrity: Trust MOK keys if MokListTrustedRT found
 
Eric Snowberg
- [PATCH RFC v2 04/12] integrity: add add_to_mok_keyring
 
Eric Snowberg
- [PATCH RFC v2 05/12] integrity: restrict INTEGRITY_KEYRING_MOK to restrict_link_by_system_trusted_or_ca
 
Eric Snowberg
- [PATCH RFC v2 06/12] integrity: accessor function to get trust_moklist
 
Eric Snowberg
- [PATCH RFC v2 07/12] integrity: add new keyring handler for mok keys
 
Eric Snowberg
- [PATCH RFC v2 08/12] integrity: Suppress error message for keys added to the mok keyring
 
Eric Snowberg
- [PATCH RFC v2 09/12] KEYS: add a reference to mok keyring
 
Eric Snowberg
- [PATCH RFC v2 10/12] KEYS: link system_trusted_keys to mok_trusted_keys
 
Eric Snowberg
- [PATCH RFC v2 11/12] integrity: Do not allow mok keyring updates following init
 
Eric Snowberg
- [PATCH RFC v2 12/12] integrity: store reference to mok keyring
 
Eric Snowberg
- [PATCH 1/2] net: cipso: fix warnings in netlbl_cipsov4_add_std
 
Paul Moore
- [PATCH] tpm: ibmvtpm: Avoid error message when process gets signal while waiting
 
Jarkko Sakkinen
- [PATCH RFC 0/9] sk_buff: optimize layout for GRO
 
Paul Moore
- [PATCH] KEYS: trusted: Fix trusted key backends when building as module
 
Jarkko Sakkinen
- [PATCH] KEYS: trusted: Fix trusted key backends when building as module
 
Jarkko Sakkinen
- [PATCH] tpm: ibmvtpm: Avoid error message when process gets signal while waiting
 
Stefan Berger
- [PATCH v2] KEYS: trusted: fix use as module when CONFIG_TCG_TPM=m
 
Jarkko Sakkinen
- [PATCH] security: keys: trusted: Fix memory leaks on allocated blob
 
Jarkko Sakkinen
- [PATCH][V2] security: keys: trusted: Fix memory leaks on allocated blob
 
Jarkko Sakkinen
- [PATCH v2] KEYS: trusted: fix use as module when CONFIG_TCG_TPM=m
 
Ahmad Fatoum
- [RFC][PATCH v2 02/12] diglim: Basic definitions
 
Greg KH
- [RFC PATCH v1] fscrypt: support encrypted and trusted keys
 
Ahmad Fatoum
- [RFC][PATCH v2 02/12] diglim: Basic definitions
 
Roberto Sassu
- [RFC][PATCH v2 02/12] diglim: Basic definitions
 
Greg KH
- [RFC][PATCH v2 02/12] diglim: Basic definitions
 
Roberto Sassu
- [RFC][PATCH v2 02/12] diglim: Basic definitions
 
Greg KH
- [PATCH RESEND] net: cipso: fix warnings in netlbl_cipsov4_add_std
 
Pavel Skripkin
- [RFC PATCH v1] fscrypt: support encrypted and trusted keys
 
Eric Biggers
- [PATCH RESEND] net: cipso: fix warnings in netlbl_cipsov4_add_std
 
patchwork-bot+netdevbpf at kernel.org
- It's very urgent, please reply immediately
 
Godwin Pete
- [RFC][PATCH v2 02/12] diglim: Basic definitions
 
Roberto Sassu
- [RFC PATCH v1] fscrypt: support encrypted and trusted keys
 
Ahmad Fatoum
- [PATCH 1/1] NAX LSM: Add initial support support
 
THOBY Simon
- [RFC][PATCH v2 01/12] diglim: Overview
 
Mauro Carvalho Chehab
- [RFC][PATCH v2 02/12] diglim: Basic definitions
 
Mauro Carvalho Chehab
- [RFC][PATCH v2 03/12] diglim: Objects
 
Mauro Carvalho Chehab
- [RFC][PATCH v2 01/12] diglim: Overview
 
Roberto Sassu
- [RFC][PATCH v2 02/12] diglim: Basic definitions
 
Roberto Sassu
- [RFC][PATCH v2 03/12] diglim: Objects
 
Roberto Sassu
- [RFC][PATCH v2 04/12] diglim: Methods
 
Mauro Carvalho Chehab
- [RFC][PATCH v2 04/12] diglim: Methods
 
Roberto Sassu
- [RFC][PATCH v2 05/12] diglim: Parser
 
Mauro Carvalho Chehab
- [RFC][PATCH v2 06/12] diglim: Interfaces - digest_list_add, digest_list_del
 
Mauro Carvalho Chehab
- [RFC][PATCH v2 10/12] diglim: Interfaces - digests_count
 
Mauro Carvalho Chehab
- [RFC][PATCH v2 11/12] diglim: Remote Attestation
 
Mauro Carvalho Chehab
- [RFC][PATCH v2 11/12] diglim: Remote Attestation
 
Roberto Sassu
- [RFC][PATCH v2 02/12] diglim: Basic definitions
 
Mauro Carvalho Chehab
- [RFC][PATCH v2 02/12] diglim: Basic definitions
 
Roberto Sassu
- [RFC PATCH v1] fscrypt: support encrypted and trusted keys
 
Eric Biggers
- [PATCH RFC 0/9] sk_buff: optimize layout for GRO
 
Paolo Abeni
- [PATCH v10 4/8] PCI/sysfs: Allow userspace to query and set device reset mechanism
 
Bjorn Helgaas
- [PATCH] tpm: ibmvtpm: Avoid error message when process gets signal while waiting
 
Jarkko Sakkinen
- [PATCH v2] KEYS: trusted: fix use as module when CONFIG_TCG_TPM=m
 
Jarkko Sakkinen
- [RFC PATCH v1] fscrypt: support encrypted and trusted keys
 
Jarkko Sakkinen
- [RFC PATCH v1] fscrypt: support encrypted and trusted keys
 
Ahmad Fatoum
- [PATCH v2] KEYS: trusted: fix use as module when CONFIG_TCG_TPM=m
 
Ahmad Fatoum
- [syzbot] kernel BUG in assoc_array_insert (2)
 
syzbot
- [RFC PATCH v1] fscrypt: support encrypted and trusted keys
 
Sumit Garg
- [RFC PATCH v1] fscrypt: support encrypted and trusted keys
 
Ahmad Fatoum
- [PATCH] tpm: ibmvtpm: Avoid error message when process gets signal while waiting
 
Stefan Berger
- [PATCH v2 1/4] landlock.7: Add a new page to introduce Landlock
 
Alejandro Colomar (man-pages)
- [PATCH] tpm: ibmvtpm: Avoid error message when process gets signal while waiting
 
Stefan Berger
- [RFC PATCH v1] fscrypt: support encrypted and trusted keys
 
Eric Biggers
- [PATCH v2] KEYS: trusted: Fix trusted key backends when building as module
 
Andreas Rammhold
- [RFC][PATCH v2 06/12] diglim: Interfaces - digest_list_add, digest_list_del
 
Mimi Zohar
- [PATCH v2 1/4] landlock.7: Add a new page to introduce Landlock
 
Alejandro Colomar (man-pages)
- [PATCH v2] KEYS: trusted: fix use as module when CONFIG_TCG_TPM=m
 
Jarkko Sakkinen
- [PATCH] tpm: ibmvtpm: Avoid error message when process gets signal while waiting
 
Jarkko Sakkinen
- [PATCH v2] KEYS: trusted: Fix trusted key backends when building as module
 
Jarkko Sakkinen
- [PATCH v3] KEYS: trusted: Fix trusted key backends when building as module
 
Andreas Rammhold
- [PATCH] tpm: ibmvtpm: Avoid error message when process gets signal while waiting
 
Nageswara Sastry
- [PATCH v3] KEYS: trusted: Fix trusted key backends when building as module
 
Sumit Garg
- [PATCH] apparmor: use per file locks for transactional queries
 
Hamza Mahfooz
- [PATCH v3] KEYS: trusted: Fix trusted key backends when building as module
 
Ahmad Fatoum
- [PATCH v2] KEYS: trusted: fix use as module when CONFIG_TCG_TPM=m
 
Ahmad Fatoum
- [RFC][PATCH v2 06/12] diglim: Interfaces - digest_list_add, digest_list_del
 
Roberto Sassu
- [PATCH] tpm: ibmvtpm: Avoid error message when process gets signal while waiting
 
Stefan Berger
- [PATCH v2 1/4] landlock.7: Add a new page to introduce Landlock
 
Mickaël Salaün
- [RFC][PATCH v2 06/12] diglim: Interfaces - digest_list_add, digest_list_del
 
Mimi Zohar
- [PATCH v2 1/4] landlock.7: Add a new page to introduce Landlock
 
Alejandro Colomar (man-pages)
- [PATCH v2 1/4] landlock.7: Add a new page to introduce Landlock
 
Alejandro Colomar (man-pages)
- [RFC][PATCH v2 06/12] diglim: Interfaces - digest_list_add, digest_list_del
 
Roberto Sassu
- [RFC][PATCH v2 06/12] diglim: Interfaces - digest_list_add, digest_list_del
 
Mimi Zohar
- [RFC][PATCH v2 06/12] diglim: Interfaces - digest_list_add, digest_list_del
 
Roberto Sassu
- [PATCH v2 1/4] landlock.7: Add a new page to introduce Landlock
 
Mickaël Salaün
- [PATCH v3 0/4] Add Landlock man pages
 
Mickaël Salaün
- [PATCH v3 1/4] landlock.7: Add a new page to introduce Landlock
 
Mickaël Salaün
- [PATCH v3 2/4] landlock_create_ruleset.2: Document new syscall
 
Mickaël Salaün
- [PATCH v3 3/4] landlock_add_rule.2: Document new syscall
 
Mickaël Salaün
- [PATCH v3 4/4] landlock_restrict_self.2: Document new syscall
 
Mickaël Salaün
- [PATCH] apparmor: use per file locks for transactional queries
 
John Johansen
- [PATCH] security: remove unneeded subdir-$(CONFIG_...)
 
Masahiro Yamada
- [PATCH v2 1/4] landlock.7: Add a new page to introduce Landlock
 
Alejandro Colomar (man-pages)
- [PATCH v2 1/4] landlock.7: Add a new page to introduce Landlock
 
Alejandro Colomar (man-pages)
    
      Last message date: 
       Sat Jul 31 11:02:27 UTC 2021
    Archived on: Sat Jul 31 10:55:24 UTC 2021
    
   
     
     
     This archive was generated by
     Pipermail 0.09 (Mailman edition).