January 2022 Archives by subject
Starting: Sat Jan 1 10:41:17 UTC 2022
Ending: Mon Jan 31 23:43:12 UTC 2022
Messages: 460
- "kernel NULL pointer dereference" crash when attempting a write
Paul Moore
- "kernel NULL pointer dereference" crash when attempting a write
Paul Moore
- "kernel NULL pointer dereference" crash when attempting a write
Casey Schaufler
- "kernel NULL pointer dereference" crash when attempting a write
Vivek Goyal
- "kernel NULL pointer dereference" crash when attempting a write
Casey Schaufler
- "kernel NULL pointer dereference" crash when attempting a write
Stephen Muth
- "kernel NULL pointer dereference" crash when attempting a write
Serge E. Hallyn
- [GIT PULL] security, lsm: dentry_init_security() Handle multi LSM registration
James Morris
- [GIT PULL] security, lsm: dentry_init_security() Handle multi LSM registration
pr-tracker-bot at kernel.org
- [GIT PULL] SELinux patches for v5.17
Paul Moore
- [GIT PULL] SELinux patches for v5.17
pr-tracker-bot at kernel.org
- [Intel-gfx] [PATCH 0/3] lib/string_helpers: Add a few string helpers
Lucas De Marchi
- [Intel-gfx] [PATCH 0/3] lib/string_helpers: Add a few string helpers
Andy Shevchenko
- [Intel-gfx] [PATCH 1/3] lib/string_helpers: Consolidate yesno() implementation
Lucas De Marchi
- [Intel-gfx] [PATCH v2 09/11] drm: Convert open-coded yes/no strings to yesno()
Lucas De Marchi
- [Intel-gfx] [PATCH v2 09/11] drm: Convert open-coded yes/no strings to yesno()
Andy Shevchenko
- [PATCH -next 1/3] apparmor: Fix match_mnt_path_str() and match_mnt() kernel-doc comment
Yang Li
- [PATCH -next 1/3] apparmor: Fix match_mnt_path_str() and match_mnt() kernel-doc comment
John Johansen
- [PATCH -next 2/3] apparmor: Fix some kernel-doc comments
Yang Li
- [PATCH -next 2/3] apparmor: Fix some kernel-doc comments
John Johansen
- [PATCH -next 3/3] apparmor: Fix some kernel-doc comments
Yang Li
- [PATCH -next 3/3] apparmor: Fix some kernel-doc comments
John Johansen
- [PATCH 0/3] lib/string_helpers: Add a few string helpers
Lucas De Marchi
- [PATCH 0/3] lib/string_helpers: Add a few string helpers
Jani Nikula
- [PATCH 0/3] lib/string_helpers: Add a few string helpers
Petr Mladek
- [PATCH 0/3] lib/string_helpers: Add a few string helpers
Jani Nikula
- [PATCH 0/3] lib/string_helpers: Add a few string helpers
Daniel Vetter
- [PATCH 0/3] lib/string_helpers: Add a few string helpers
Petr Mladek
- [PATCH 0/3] lib/string_helpers: Add a few string helpers
David Laight
- [PATCH 0/3] lib/string_helpers: Add a few string helpers
Jani Nikula
- [PATCH 0/3] lib/string_helpers: Add a few string helpers
Petr Mladek
- [PATCH 00/10] selftests: Fix separate output directory builds
Muhammad Usama Anjum
- [PATCH 01/10] selftests: set the BUILD variable to absolute path
Muhammad Usama Anjum
- [PATCH 02/10] selftests: Add and export a kernel uapi headers path
Muhammad Usama Anjum
- [PATCH 03/10] selftests: Correct the headers install path
Muhammad Usama Anjum
- [PATCH 04/10] selftests: futex: Add the uapi headers include variable
Muhammad Usama Anjum
- [PATCH 05/10] selftests: kvm: Add the uapi headers include variable
Muhammad Usama Anjum
- [PATCH 06/10] selftests: landlock: Add the uapi headers include variable
Muhammad Usama Anjum
- [PATCH 06/10] selftests: landlock: Add the uapi headers include variable
Mickaël Salaün
- [PATCH 06/10] selftests: landlock: Add the uapi headers include variable
Muhammad Usama Anjum
- [PATCH 07/10] selftests: net: Add the uapi headers include variable
Muhammad Usama Anjum
- [PATCH 08/10] selftests: mptcp: Add the uapi headers include variable
Muhammad Usama Anjum
- [PATCH 08/10] selftests: mptcp: Add the uapi headers include variable
Matthieu Baerts
- [PATCH 08/10] selftests: mptcp: Add the uapi headers include variable
Muhammad Usama Anjum
- [PATCH 09/10] selftests: vm: Add the uapi headers include variable
Muhammad Usama Anjum
- [PATCH 09/10] selftests: vm: Add the uapi headers include variable
Paolo Bonzini
- [PATCH 1/3] lib/string_helpers: Consolidate yesno() implementation
Lucas De Marchi
- [PATCH 1/3] lib/string_helpers: Consolidate yesno() implementation
Sakari Ailus
- [PATCH 1/3] lib/string_helpers: Consolidate yesno() implementation
Steven Rostedt
- [PATCH 1/3] lib/string_helpers: Consolidate yesno() implementation
Steven Rostedt
- [PATCH 1/3] lib/string_helpers: Consolidate yesno() implementation
David Laight
- [PATCH 1/3] lib/string_helpers: Consolidate yesno() implementation
David Laight
- [PATCH 1/3] lib/string_helpers: Consolidate yesno() implementation
Andy Shevchenko
- [PATCH 1/3] lib/string_helpers: Consolidate yesno() implementation
Andy Shevchenko
- [PATCH 1/3] lib/string_helpers: Consolidate yesno() implementation
Steven Rostedt
- [PATCH 1/3] lib/string_helpers: Consolidate yesno() implementation
Steven Rostedt
- [PATCH 1/3] lib/string_helpers: Consolidate yesno() implementation
Andy Shevchenko
- [PATCH 1/3] lib/string_helpers: Consolidate yesno() implementation
David Laight
- [PATCH 1/3] lib/string_helpers: Consolidate yesno() implementation
Joe Perches
- [PATCH 10/10] selftests: vm: remove dependecy from internal kernel macros
Muhammad Usama Anjum
- [PATCH 2/3] lib/string_helpers: Add helpers for enable[d]/disable[d]
Lucas De Marchi
- [PATCH 2/3] lib/string_helpers: Add helpers for enable[d]/disable[d]
Lucas De Marchi
- [PATCH 3/3] apparmor: Fix some kernel-doc comments
Yang Li
- [PATCH 3/3] apparmor: Fix some kernel-doc comments
John Johansen
- [PATCH 3/3] drm: Convert open yes/no strings to yesno()
Lucas De Marchi
- [PATCH 3/3] drm: Convert open yes/no strings to yesno()
Andy Shevchenko
- [PATCH 3/3] drm: Convert open yes/no strings to yesno()
Lucas De Marchi
- [PATCH][next] apparmor: Use struct_size() helper in kmalloc()
Gustavo A. R. Silva
- [PATCH][next] apparmor: Use struct_size() helper in kmalloc()
John Johansen
- [PATCH] ima: Allow template selection with ima_template[_fmt]= after ima_hash=
Roberto Sassu
- [PATCH] ima: Allow template selection with ima_template[_fmt]= after ima_hash=
Mimi Zohar
- [PATCH] ima: Fix trivial typos in the comments
Austin Kim
- [PATCH] ima: Fix trivial typos in the comments
Mimi Zohar
- [PATCH] ima: Fix trivial typos in the comments
Joe Perches
- [PATCH] ima: Fix trivial typos in the comments
Austin Kim
- [PATCH] ima: Fix trivial typos in the comments
Mimi Zohar
- [PATCH] ima: Fix trivial typos in the comments
Joe Perches
- [PATCH] integrity: check the return value of audit_log_start()
Paul Moore
- [PATCH] integrity: check the return value of audit_log_start()
Mimi Zohar
- [PATCH] KEYS: remove support for asym_tpm keys
Eric Biggers
- [PATCH] KEYS: remove support for asym_tpm keys
Ard Biesheuvel
- [PATCH] KEYS: trusted: Avoid calling null function trusted_key_exit
Dave Kleikamp
- [PATCH] KEYS: trusted: Avoid calling null function trusted_key_exit
Jarkko Sakkinen
- [PATCH] LSM: general protection fault in legacy_parse_param
Paul Moore
- [PATCH] LSM: general protection fault in legacy_parse_param
Casey Schaufler
- [PATCH] LSM: general protection fault in legacy_parse_param
Paul Moore
- [PATCH] LSM: general protection fault in legacy_parse_param
Christian Brauner
- [PATCH] LSM: general protection fault in legacy_parse_param
Paul Moore
- [PATCH] MAINTAINERS: add missing "security/integrity" directory
Mimi Zohar
- [PATCH] MAINTAINERS: add missing "security/integrity" directory
Petr Vorel
- [PATCH] security, lsm: dentry_init_security() Handle multi LSM registration
Vivek Goyal
- [PATCH] security, lsm: dentry_init_security() Handle multi LSM registration
Jeff Layton
- [PATCH] security, lsm: dentry_init_security() Handle multi LSM registration
Paul Moore
- [PATCH] security, lsm: dentry_init_security() Handle multi LSM registration
Christian Brauner
- [PATCH] security/apparmor: remove redundant ret variable
cgel.zte at gmail.com
- [PATCH] security/apparmor: remove redundant ret variable
John Johansen
- [PATCH v10 0/8] Enroll kernel keys thru MOK
Eric Snowberg
- [PATCH v10 0/8] Enroll kernel keys thru MOK
Jarkko Sakkinen
- [PATCH v10 0/8] Enroll kernel keys thru MOK
Jarkko Sakkinen
- [PATCH v10 0/8] Enroll kernel keys thru MOK
Mimi Zohar
- [PATCH v10 1/8] integrity: Fix warning about missing prototypes
Eric Snowberg
- [PATCH v10 2/8] integrity: Introduce a Linux keyring called machine
Eric Snowberg
- [PATCH v10 3/8] integrity: add new keyring handler for mok keys
Eric Snowberg
- [PATCH v10 4/8] KEYS: store reference to machine keyring
Eric Snowberg
- [PATCH v10 5/8] KEYS: Introduce link restriction for machine keys
Eric Snowberg
- [PATCH v10 6/8] efi/mokvar: move up init order
Eric Snowberg
- [PATCH v10 7/8] integrity: Trust MOK keys if MokListTrustedRT found
Eric Snowberg
- [PATCH v10 8/8] integrity: Only use machine keyring when uefi_check_trust_mok_keys is true
Eric Snowberg
- [PATCH v18 0/4] Add trusted_for(2) (was O_MAYEXEC)
Mickaël Salaün
- [PATCH v18 1/4] printk: Move back proc_dointvec_minmax_sysadmin() to sysctl.c
Mickaël Salaün
- [PATCH v18 2/4] fs: Add trusted_for(2) syscall implementation and related sysctl
Mickaël Salaün
- [PATCH v18 3/4] arch: Wire up trusted_for(2)
Mickaël Salaün
- [PATCH v18 4/4] selftest/interpreter: Add tests for trusted_for(2) policies
Mickaël Salaün
- [PATCH V2 00/10] selftests: Fix separate output directory builds
Muhammad Usama Anjum
- [PATCH v2 00/11] lib/string_helpers: Add a few string helpers
Lucas De Marchi
- [PATCH v2 00/11] lib/string_helpers: Add a few string helpers
Andy Shevchenko
- [PATCH V2 01/10] selftests: set the BUILD variable to absolute path
Muhammad Usama Anjum
- [PATCH v2 01/11] lib/string_helpers: Consolidate string helpers implementation
Lucas De Marchi
- [PATCH V2 02/10] selftests: Add and export a kernel uapi headers path
Muhammad Usama Anjum
- [PATCH v2 02/11] drm/i915: Fix trailing semicolon
Lucas De Marchi
- [PATCH v2 02/11] drm/i915: Fix trailing semicolon
Jani Nikula
- [PATCH V2 03/10] selftests: Correct the headers install path
Muhammad Usama Anjum
- [PATCH v2 03/11] drm/i915: Use str_yes_no()
Lucas De Marchi
- [PATCH V2 04/10] selftests: futex: Add the uapi headers include variable
Muhammad Usama Anjum
- [PATCH v2 04/11] drm/i915: Use str_enable_disable()
Lucas De Marchi
- [PATCH V2 05/10] selftests: kvm: Add the uapi headers include variable
Muhammad Usama Anjum
- [PATCH v2 05/11] drm/i915: Use str_enabled_disabled()
Lucas De Marchi
- [PATCH V2 06/10] selftests: landlock: Add the uapi headers include variable
Muhammad Usama Anjum
- [PATCH V2 06/10] selftests: landlock: Add the uapi headers include variable
Mickaël Salaün
- [PATCH v2 06/11] drm/i915: Use str_on_off()
Lucas De Marchi
- [PATCH V2 07/10] selftests: net: Add the uapi headers include variable
Muhammad Usama Anjum
- [PATCH v2 07/11] drm/amd/display: Use str_yes_no()
Lucas De Marchi
- [PATCH v2 07/11] drm/amd/display: Use str_yes_no()
Harry Wentland
- [PATCH V2 08/10] selftests: mptcp: Add the uapi headers include variable
Muhammad Usama Anjum
- [PATCH V2 08/10] selftests: mptcp: Add the uapi headers include variable
Matthieu Baerts
- [PATCH v2 08/11] drm/gem: Sort includes alphabetically
Lucas De Marchi
- [PATCH v2 08/11] drm/gem: Sort includes alphabetically
Jani Nikula
- [PATCH V2 09/10] selftests: vm: Add the uapi headers include variable
Muhammad Usama Anjum
- [PATCH V2 09/10] selftests: vm: Add the uapi headers include variable
Alistair Popple
- [PATCH v2 09/11] drm: Convert open-coded yes/no strings to yesno()
Lucas De Marchi
- [PATCH v2 09/11] drm: Convert open-coded yes/no strings to yesno()
Andy Shevchenko
- [PATCH v2 09/11] drm: Convert open-coded yes/no strings to yesno()
Jani Nikula
- [PATCH V2 10/10] selftests: vm: remove dependecy from internal kernel macros
Muhammad Usama Anjum
- [PATCH V2 10/10] selftests: vm: remove dependecy from internal kernel macros
Alistair Popple
- [PATCH v2 10/11] tomoyo: Use str_yes_no()
Lucas De Marchi
- [PATCH v2 11/11] cxgb4: Use str_yes_no()
Lucas De Marchi
- [PATCHv2] integrity: check the return value of audit_log_start()
xkernel.wang at foxmail.com
- [PATCHv2] integrity: check the return value of audit_log_start()
Paul Moore
- [PATCH v2] KEYS: trusted: Avoid calling null function trusted_key_exit
Dave Kleikamp
- [PATCH v2] KEYS: trusted: Avoid calling null function trusted_key_exit
Sumit Garg
- [PATCH v2] LSM: general protection fault in legacy_parse_param
Casey Schaufler
- [PATCH v2] LSM: general protection fault in legacy_parse_param
James Morris
- [PATCH v2] LSM: general protection fault in legacy_parse_param
Paul Moore
- [PATCH v2] LSM: general protection fault in legacy_parse_param
Casey Schaufler
- [PATCH v2] LSM: general protection fault in legacy_parse_param
Christian Brauner
- [PATCH v3 0/6] KEXEC_SIG with appended signature
Michal Suchanek
- [PATCH v3 1/6] s390/kexec_file: Don't opencode appended signature check.
Michal Suchanek
- [PATCH v3 2/6] powerpc/kexec_file: Add KEXEC_SIG support.
Michal Suchanek
- [PATCH v3 3/6] kexec_file: Don't opencode appended signature verification.
Michal Suchanek
- [PATCH v3 4/6] module: strip the signature marker in the verification function.
Michal Suchanek
- [PATCH v3 5/6] module: Use key_being_used_for for log messages in verify_appended_signature
Michal Suchanek
- [PATCH v3 6/6] module: Move duplicate mod_check_sig users code to mod_parse_sig
Michal Suchanek
- [PATCH v3] integrity: check the return value of audit_log_start()
xkernel.wang at foxmail.com
- [PATCH v4 0/6] KEXEC_SIG with appended signature
Michal Suchanek
- [PATCH V40 12/29] x86: Lock down IO port access when the kernel is locked down
Kai-Heng Feng
- [PATCH V40 12/29] x86: Lock down IO port access when the kernel is locked down
Matthew Garrett
- [PATCH V40 12/29] x86: Lock down IO port access when the kernel is locked down
Kai-Heng Feng
- [PATCH V40 12/29] x86: Lock down IO port access when the kernel is locked down
Matthew Garrett
- [PATCH V40 12/29] x86: Lock down IO port access when the kernel is locked down
Kai-Heng Feng
- [PATCH V40 12/29] x86: Lock down IO port access when the kernel is locked down
Matthew Garrett
- [PATCH v4 1/6] s390/kexec_file: Don't opencode appended signature check.
Michal Suchanek
- [PATCH v4 1/6] s390/kexec_file: Don't opencode appended signature check.
Luis Chamberlain
- [PATCH v4 2/6] powerpc/kexec_file: Add KEXEC_SIG support.
Michal Suchanek
- [PATCH v4 3/6] kexec_file: Don't opencode appended signature verification.
Michal Suchanek
- [PATCH v4 4/6] module: strip the signature marker in the verification function.
Michal Suchanek
- [PATCH v4 5/6] module: Use key_being_used_for for log messages in verify_appended_signature
Michal Suchanek
- [PATCH v4 6/6] module: Move duplicate mod_check_sig users code to mod_parse_sig
Michal Suchanek
- [PATCH v4] integrity: check the return value of audit_log_start()
Xiaoke Wang
- [PATCH v4] integrity: check the return value of audit_log_start()
Mimi Zohar
- [PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
Sumit Garg
- [PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
Jarkko Sakkinen
- [PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
Yael Tiomkin
- [PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
Yael Tiomkin
- [PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
Sumit Garg
- [PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
Yael Tiomkin
- [PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
Sumit Garg
- [PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
Jarkko Sakkinen
- [PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
Nayna
- [PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
Yael Tiomkin
- [PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
Yael Tiomkin
- [PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
Sumit Garg
- [PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
Martin Ross
- [PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
Nayna
- [PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
Jarkko Sakkinen
- [PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
Jarkko Sakkinen
- [PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
Yael Tiomkin
- [PATCH v5 0/6] KEXEC_SIG with appended signature
Michal Suchanek
- [PATCH v5 0/6] KEXEC_SIG with appended signature
Luis Chamberlain
- [PATCH v5 1/6] s390/kexec_file: Don't opencode appended signature check.
Michal Suchanek
- [PATCH v5 2/6] powerpc/kexec_file: Add KEXEC_SIG support.
Michal Suchanek
- [PATCH v5 3/6] kexec_file: Don't opencode appended signature verification.
Michal Suchanek
- [PATCH v5 3/6] kexec_file: Don't opencode appended signature verification.
Luis Chamberlain
- [PATCH v5 4/6] module: strip the signature marker in the verification function.
Michal Suchanek
- [PATCH v5 4/6] module: strip the signature marker in the verification function.
Luis Chamberlain
- [PATCH v5 5/6] module: Use key_being_used_for for log messages in verify_appended_signature
Michal Suchanek
- [PATCH v5 5/6] module: Use key_being_used_for for log messages in verify_appended_signature
Luis Chamberlain
- [PATCH v5 6/6] module: Move duplicate mod_check_sig users code to mod_parse_sig
Michal Suchanek
- [PATCH v5 6/6] module: Move duplicate mod_check_sig users code to mod_parse_sig
Luis Chamberlain
- [PATCH v6 0/5] Allow guest access to EFI confidential computing secret area
Borislav Petkov
- [PATCH v6 0/5] Allow guest access to EFI confidential computing secret area
Dov Murik
- [PATCH v6 0/5] Allow guest access to EFI confidential computing secret area
Borislav Petkov
- [PATCH v6 0/5] Allow guest access to EFI confidential computing secret area
Dr. David Alan Gilbert
- [PATCH v6 0/5] Allow guest access to EFI confidential computing secret area
Borislav Petkov
- [PATCH v6 0/5] Allow guest access to EFI confidential computing secret area
Dr. David Alan Gilbert
- [PATCH v6 0/5] Allow guest access to EFI confidential computing secret area
Borislav Petkov
- [PATCH v6 0/5] Allow guest access to EFI confidential computing secret area
Peter Gonda
- [PATCH v6 0/5] Allow guest access to EFI confidential computing secret area
Dov Murik
- [PATCH v6 0/5] Allow guest access to EFI confidential computing secret area
Dr. David Alan Gilbert
- [PATCH v7 0/3] integrity: support including firmware ".platform" keys at build time
Nayna Jain
- [PATCH v7 1/3] certs: export load_certificate_list() to be used outside certs/
Nayna Jain
- [PATCH v7 1/3] certs: export load_certificate_list() to be used outside certs/
Jarkko Sakkinen
- [PATCH v7 1/3] certs: export load_certificate_list() to be used outside certs/
Jarkko Sakkinen
- [PATCH v7 1/3] certs: export load_certificate_list() to be used outside certs/
Mimi Zohar
- [PATCH v7 1/3] certs: export load_certificate_list() to be used outside certs/
Nayna
- [PATCH v7 1/3] certs: export load_certificate_list() to be used outside certs/
Jarkko Sakkinen
- [PATCH v7 1/3] certs: export load_certificate_list() to be used outside certs/
Jarkko Sakkinen
- [PATCH v7 1/3] certs: export load_certificate_list() to be used outside certs/
Jarkko Sakkinen
- [PATCH v7 10/14] securityfs: Extend securityfs with namespacing support
Stefan Berger
- [PATCH v7 2/3] integrity: make integrity_keyring_from_id() non-static
Nayna Jain
- [PATCH v7 3/3] integrity: support including firmware ".platform" keys at build time
Nayna Jain
- [PATCH v8 0/3] integrity: support including firmware ".platform" keys at build time
Nayna Jain
- [PATCH v8 0/5] Enable root to update the blacklist keyring
Mickaël Salaün
- [PATCH v8 0/5] Enable root to update the blacklist keyring
Jarkko Sakkinen
- [PATCH v8 0/5] Enable root to update the blacklist keyring
Jarkko Sakkinen
- [PATCH v8 0/5] Enable root to update the blacklist keyring
Mickaël Salaün
- [PATCH v8 0/5] Enable root to update the blacklist keyring
Mickaël Salaün
- [PATCH v8 00/19] ima: Namespace IMA with audit support in IMA-ns
Stefan Berger
- [PATCH v8 01/19] securityfs: Extend securityfs with namespacing support
Stefan Berger
- [PATCH v8 01/19] securityfs: Extend securityfs with namespacing support
Al Viro
- [PATCH v8 01/19] securityfs: Extend securityfs with namespacing support
Christian Brauner
- [PATCH v8 01/19] securityfs: Extend securityfs with namespacing support
Mimi Zohar
- [PATCH v8 01/19] securityfs: Extend securityfs with namespacing support
Christian Brauner
- [PATCH v8 02/19] ima: Define ima_namespace structure and implement basic functions
Stefan Berger
- [PATCH v8 03/19] ima: Move policy related variables into ima_namespace
Stefan Berger
- [PATCH v8 03/19] ima: Move policy related variables into ima_namespace
Mimi Zohar
- [PATCH v8 03/19] ima: Move policy related variables into ima_namespace
Christian Brauner
- [PATCH v8 03/19] ima: Move policy related variables into ima_namespace
Stefan Berger
- [PATCH v8 04/19] ima: Move ima_htable into ima_namespace
Stefan Berger
- [PATCH v8 05/19] ima: Move measurement list related variables into ima_namespace
Stefan Berger
- [PATCH v8 05/19] ima: Move measurement list related variables into ima_namespace
Mimi Zohar
- [PATCH v8 05/19] ima: Move measurement list related variables into ima_namespace
Stefan Berger
- [PATCH v8 06/19] ima: Move some IMA policy and filesystem related variables into ima_namespace
Stefan Berger
- [PATCH v8 07/19] ima: Move dentry into ima_namespace and others onto stack
Stefan Berger
- [PATCH v8 07/19] ima: Move dentry into ima_namespace and others onto stack
Mimi Zohar
- [PATCH v8 07/19] ima: Move dentry into ima_namespace and others onto stack
Stefan Berger
- [PATCH v8 07/19] ima: Move dentry into ima_namespace and others onto stack
Mimi Zohar
- [PATCH v8 07/19] ima: Move dentry into ima_namespace and others onto stack
Stefan Berger
- [PATCH v8 08/19] ima: Use mac_admin_ns_capable() to check corresponding capability
Stefan Berger
- [PATCH v8 08/19] ima: Use mac_admin_ns_capable() to check corresponding capability
Mimi Zohar
- [PATCH v8 09/19] ima: Only accept AUDIT rules for non-init_ima_ns namespaces for now
Stefan Berger
- [PATCH v8 1/3] certs: export load_certificate_list() to be used outside certs/
Nayna Jain
- [PATCH v8 1/3] certs: export load_certificate_list() to be used outside certs/
Mimi Zohar
- [PATCH v8 10/19] ima: Implement hierarchical processing of file accesses
Stefan Berger
- [PATCH v8 10/19] ima: Implement hierarchical processing of file accesses
Christian Brauner
- [PATCH v8 10/19] ima: Implement hierarchical processing of file accesses
Stefan Berger
- [PATCH v8 11/19] ima: Implement ima_free_policy_rules() for freeing of an ima_namespace
Stefan Berger
- [PATCH v8 12/19] userns: Add pointer to ima_namespace to user_namespace
Stefan Berger
- [PATCH v8 13/19] ima: Add functions for creation and freeing of an ima_namespace
Stefan Berger
- [PATCH v8 13/19] ima: Add functions for creation and freeing of an ima_namespace
Christian Brauner
- [PATCH v8 14/19] integrity/ima: Define ns_status for storing namespaced iint data
Stefan Berger
- [PATCH v8 15/19] ima: Namespace audit status flags
Stefan Berger
- [PATCH v8 16/19] ima: Enable re-auditing of modified files
Stefan Berger
- [PATCH v8 16/19] ima: Enable re-auditing of modified files
Stefan Berger
- [PATCH v8 17/19] ima: Setup securityfs for IMA namespace
Stefan Berger
- [PATCH v8 18/19] ima: Show owning user namespace's uid and gid when displaying policy
Stefan Berger
- [PATCH v8 18/19] ima: Show owning user namespace's uid and gid when displaying policy
Christian Brauner
- [PATCH v8 18/19] ima: Show owning user namespace's uid and gid when displaying policy
Stefan Berger
- [PATCH v8 18/19] ima: Show owning user namespace's uid and gid when displaying policy
Christian Brauner
- [PATCH v8 19/19] ima: Enable IMA namespaces
Stefan Berger
- [PATCH v8 19/19] ima: Enable IMA namespaces
Christian Brauner
- [PATCH v8 19/19] ima: Enable IMA namespaces
Christian Brauner
- [PATCH v8 19/19] ima: Enable IMA namespaces
Stefan Berger
- [PATCH v8 19/19] ima: Enable IMA namespaces
Stefan Berger
- [PATCH v8 19/19] ima: Enable IMA namespaces
Christian Brauner
- [PATCH v8 19/19] ima: Enable IMA namespaces
Stefan Berger
- [PATCH v8 19/19] ima: Enable IMA namespaces
Christian Brauner
- [PATCH v8 2/3] integrity: make integrity_keyring_from_id() non-static
Nayna Jain
- [PATCH v8 3/3] integrity: support including firmware ".platform" keys at build time
Nayna Jain
- [PATCH v9 0/8] Enroll kernel keys thru MOK
Eric Snowberg
- [PATCH v9 00/23] ima: Namespace IMA with audit support in IMA-ns
Stefan Berger
- [PATCH v9 00/23] ima: Namespace IMA with audit support in IMA-ns
Christian Brauner
- [PATCH v9 00/23] ima: Namespace IMA with audit support in IMA-ns
Stefan Berger
- [PATCH v9 00/23] ima: Namespace IMA with audit support in IMA-ns
Stefan Berger
- [PATCH v9 01/23] ima: Remove ima_policy file before directory
Stefan Berger
- [PATCH v9 01/23] ima: Remove ima_policy file before directory
Christian Brauner
- [PATCH v9 02/23] ima: Do not print policy rule with inactive LSM labels
Stefan Berger
- [PATCH v9 02/23] ima: Do not print policy rule with inactive LSM labels
Christian Brauner
- [PATCH v9 02/23] ima: Do not print policy rule with inactive LSM labels
Mimi Zohar
- [PATCH v9 03/23] securityfs: rework dentry creation
Stefan Berger
- [PATCH v9 04/23] securityfs: Extend securityfs with namespacing support
Stefan Berger
- [PATCH v9 04/23] securityfs: Extend securityfs with namespacing support
Mimi Zohar
- [PATCH v9 04/23] securityfs: Extend securityfs with namespacing support
Stefan Berger
- [PATCH v9 04/23] securityfs: Extend securityfs with namespacing support
Mimi Zohar
- [PATCH v9 05/23] ima: Define ima_namespace struct and start moving variables into it
Stefan Berger
- [PATCH v9 05/23] ima: Define ima_namespace struct and start moving variables into it
Christian Brauner
- [PATCH v9 06/23] ima: Move arch_policy_entry into ima_namespace
Stefan Berger
- [PATCH v9 06/23] ima: Move arch_policy_entry into ima_namespace
Christian Brauner
- [PATCH v9 06/23] ima: Move arch_policy_entry into ima_namespace
Mimi Zohar
- [PATCH v9 07/23] ima: Move ima_htable into ima_namespace
Stefan Berger
- [PATCH v9 07/23] ima: Move ima_htable into ima_namespace
Christian Brauner
- [PATCH v9 08/23] ima: Move measurement list related variables into ima_namespace
Stefan Berger
- [PATCH v9 08/23] ima: Move measurement list related variables into ima_namespace
Christian Brauner
- [PATCH v9 08/23] ima: Move measurement list related variables into ima_namespace
Stefan Berger
- [PATCH v9 08/23] ima: Move measurement list related variables into ima_namespace
Mimi Zohar
- [PATCH v9 08/23] ima: Move measurement list related variables into ima_namespace
Stefan Berger
- [PATCH v9 09/23] ima: Move some IMA policy and filesystem related variables into ima_namespace
Stefan Berger
- [PATCH v9 09/23] ima: Move some IMA policy and filesystem related variables into ima_namespace
Christian Brauner
- [PATCH v9 09/23] ima: Move some IMA policy and filesystem related variables into ima_namespace
Mimi Zohar
- [PATCH v9 09/23] ima: Move some IMA policy and filesystem related variables into ima_namespace
Stefan Berger
- [PATCH v9 09/23] ima: Move some IMA policy and filesystem related variables into ima_namespace
Mimi Zohar
- [PATCH v9 1/8] integrity: Fix warning about missing prototypes
Eric Snowberg
- [PATCH v9 1/8] integrity: Fix warning about missing prototypes
Jarkko Sakkinen
- [PATCH v9 10/23] ima: Move IMA securityfs files into ima_namespace or onto stack
Stefan Berger
- [PATCH v9 10/23] ima: Move IMA securityfs files into ima_namespace or onto stack
Christian Brauner
- [PATCH v9 10/23] ima: Move IMA securityfs files into ima_namespace or onto stack
Stefan Berger
- [PATCH v9 10/23] ima: Move IMA securityfs files into ima_namespace or onto stack
Mimi Zohar
- [PATCH v9 11/23] ima: Move ima_lsm_policy_notifier into ima_namespace
Stefan Berger
- [PATCH v9 11/23] ima: Move ima_lsm_policy_notifier into ima_namespace
Christian Brauner
- [PATCH v9 11/23] ima: Move ima_lsm_policy_notifier into ima_namespace
Stefan Berger
- [PATCH v9 12/23] ima: Define mac_admin_ns_capable() as a wrapper for ns_capable()
Stefan Berger
- [PATCH v9 12/23] ima: Define mac_admin_ns_capable() as a wrapper for ns_capable()
Christian Brauner
- [PATCH v9 13/23] ima: Only accept AUDIT rules for non-init_ima_ns namespaces for now
Stefan Berger
- [PATCH v9 13/23] ima: Only accept AUDIT rules for non-init_ima_ns namespaces for now
Christian Brauner
- [PATCH v9 14/23] userns: Add pointer to ima_namespace to user_namespace
Stefan Berger
- [PATCH v9 14/23] userns: Add pointer to ima_namespace to user_namespace
Christian Brauner
- [PATCH v9 15/23] ima: Implement hierarchical processing of file accesses
Stefan Berger
- [PATCH v9 15/23] ima: Implement hierarchical processing of file accesses
Christian Brauner
- [PATCH v9 15/23] ima: Implement hierarchical processing of file accesses
Stefan Berger
- [PATCH v9 16/23] ima: Implement ima_free_policy_rules() for freeing of an ima_namespace
Stefan Berger
- [PATCH v9 16/23] ima: Implement ima_free_policy_rules() for freeing of an ima_namespace
Mimi Zohar
- [PATCH v9 16/23] ima: Implement ima_free_policy_rules() for freeing of an ima_namespace
Stefan Berger
- [PATCH v9 17/23] ima: Add functions for creating and freeing of an ima_namespace
Stefan Berger
- [PATCH v9 17/23] ima: Add functions for creating and freeing of an ima_namespace
Christian Brauner
- [PATCH v9 18/23] integrity/ima: Define ns_status for storing namespaced iint data
Stefan Berger
- [PATCH v9 19/23] ima: Namespace audit status flags
Stefan Berger
- [PATCH v9 2/8] integrity: Introduce a Linux keyring called machine
Eric Snowberg
- [PATCH v9 2/8] integrity: Introduce a Linux keyring called machine
Mimi Zohar
- [PATCH v9 2/8] integrity: Introduce a Linux keyring called machine
Eric Snowberg
- [PATCH v9 2/8] integrity: Introduce a Linux keyring called machine
Mimi Zohar
- [PATCH v9 2/8] integrity: Introduce a Linux keyring called machine
Eric Snowberg
- [PATCH v9 2/8] integrity: Introduce a Linux keyring called machine
Mimi Zohar
- [PATCH v9 2/8] integrity: Introduce a Linux keyring called machine
Mimi Zohar
- [PATCH v9 2/8] integrity: Introduce a Linux keyring called machine
Mimi Zohar
- [PATCH v9 2/8] integrity: Introduce a Linux keyring called machine
Eric Snowberg
- [PATCH v9 2/8] integrity: Introduce a Linux keyring called machine
Jarkko Sakkinen
- [PATCH v9 2/8] integrity: Introduce a Linux keyring called machine
Eric Snowberg
- [PATCH v9 2/8] integrity: Introduce a Linux keyring called machine
Jarkko Sakkinen
- [PATCH v9 2/8] integrity: Introduce a Linux keyring called machine
Jarkko Sakkinen
- [PATCH v9 2/8] integrity: Introduce a Linux keyring called machine
Mimi Zohar
- [PATCH v9 2/8] integrity: Introduce a Linux keyring called machine
Jarkko Sakkinen
- [PATCH v9 2/8] integrity: Introduce a Linux keyring called machine
Eric Snowberg
- [PATCH v9 20/23] ima: Setup securityfs for IMA namespace
Stefan Berger
- [PATCH v9 20/23] ima: Setup securityfs for IMA namespace
Christian Brauner
- [PATCH v9 21/23] ima: Introduce securityfs file to activate an IMA namespace
Stefan Berger
- [PATCH v9 21/23] ima: Introduce securityfs file to activate an IMA namespace
Christian Brauner
- [PATCH v9 21/23] ima: Introduce securityfs file to activate an IMA namespace
Stefan Berger
- [PATCH v9 22/23] ima: Show owning user namespace's uid and gid when displaying policy
Stefan Berger
- [PATCH v9 22/23] ima: Show owning user namespace's uid and gid when displaying policy
Christian Brauner
- [PATCH v9 22/23] ima: Show owning user namespace's uid and gid when displaying policy
Christian Brauner
- [PATCH v9 22/23] ima: Show owning user namespace's uid and gid when displaying policy
Stefan Berger
- [PATCH v9 23/23] ima: Enable IMA namespaces
Stefan Berger
- [PATCH v9 23/23] ima: Enable IMA namespaces
Christian Brauner
- [PATCH v9 3/8] integrity: add new keyring handler for mok keys
Eric Snowberg
- [PATCH v9 3/8] integrity: add new keyring handler for mok keys
Jarkko Sakkinen
- [PATCH v9 4/8] KEYS: store reference to machine keyring
Eric Snowberg
- [PATCH v9 4/8] KEYS: store reference to machine keyring
Jarkko Sakkinen
- [PATCH v9 5/8] KEYS: Introduce link restriction for machine keys
Eric Snowberg
- [PATCH v9 5/8] KEYS: Introduce link restriction for machine keys
Jarkko Sakkinen
- [PATCH v9 5/8] KEYS: Introduce link restriction for machine keys
Mimi Zohar
- [PATCH v9 5/8] KEYS: Introduce link restriction for machine keys
Eric Snowberg
- [PATCH v9 6/8] efi/mokvar: move up init order
Eric Snowberg
- [PATCH v9 6/8] efi/mokvar: move up init order
Jarkko Sakkinen
- [PATCH v9 7/8] integrity: Trust MOK keys if MokListTrustedRT found
Eric Snowberg
- [PATCH v9 7/8] integrity: Trust MOK keys if MokListTrustedRT found
Jarkko Sakkinen
- [PATCH v9 8/8] integrity: Only use machine keyring when uefi_check_trust_mok_keys is true
Eric Snowberg
- [PATCH v9 8/8] integrity: Only use machine keyring when uefi_check_trust_mok_keys is true
Jarkko Sakkinen
- [PATCH v9 8/8] integrity: Only use machine keyring when uefi_check_trust_mok_keys is true
Mimi Zohar
- [PATCH v9 8/8] integrity: Only use machine keyring when uefi_check_trust_mok_keys is true
Mimi Zohar
- [PATCH v9 8/8] integrity: Only use machine keyring when uefi_check_trust_mok_keys is true
Jarkko Sakkinen
- [RFC PATCH 0/1] Landlock network PoC
Mickaël Salaün
- [RFC PATCH 0/2] landlock network implementation cover letter
Konstantin Meskhidze
- [RFC PATCH 0/8] signals: Support more than 64 signals
Walt Drummond
- [RFC PATCH 0/8] signals: Support more than 64 signals
Al Viro
- [RFC PATCH 0/8] signals: Support more than 64 signals
Walt Drummond
- [RFC PATCH 0/8] signals: Support more than 64 signals
Al Viro
- [RFC PATCH 0/8] signals: Support more than 64 signals
Al Viro
- [RFC PATCH 0/8] signals: Support more than 64 signals
Eric W. Biederman
- [RFC PATCH 0/8] signals: Support more than 64 signals
Theodore Ts'o
- [RFC PATCH 0/8] signals: Support more than 64 signals
Walt Drummond
- [RFC PATCH 0/8] signals: Support more than 64 signals
Eric W. Biederman
- [RFC PATCH 0/8] signals: Support more than 64 signals
Theodore Ts'o
- [RFC PATCH 0/8] signals: Support more than 64 signals
Walt Drummond
- [RFC PATCH 1/2] landlock: TCP network hooks implementation
Konstantin Meskhidze
- [RFC PATCH 1/2] landlock: TCP network hooks implementation
Willem de Bruijn
- [RFC PATCH 1/2] landlock: TCP network hooks implementation
Konstantin Meskhidze
- [RFC PATCH 1/2] landlock: TCP network hooks implementation
Willem de Bruijn
- [RFC PATCH 1/2] landlock: TCP network hooks implementation
Konstantin Meskhidze
- [RFC PATCH 1/2] landlock: TCP network hooks implementation
Willem de Bruijn
- [RFC PATCH 2/2] landlock: selftests for bind and connect hooks
Konstantin Meskhidze
- [RFC PATCH 3/8] signals: Use a helper function to test if a signal is a real-time signal.
Walt Drummond
- [RFC PATCH] mm: create security context for memfd_secret inodes
Christian Göttsche
- [RFC PATCH] mm: create security context for memfd_secret inodes
Paul Moore
- [RFC PATCH v1 1/2] capability: Add cap_strings.
Serge E. Hallyn
- [RFC PATCH v1 1/2] capability: Add cap_strings.
Francis Laniel
- [RFC PATCH v2 0/2] Add capabilities file to sysfs
Francis Laniel
- [RFC PATCH v2 1/2] capability: Add cap_strings.
Francis Laniel
- [RFC PATCH v2 2/2] kernel/ksysfs.c: Add capabilities attribute.
Francis Laniel
- [RFC PATCH v3 0/2] Add capabilities file to sysfs
Francis Laniel
- [RFC PATCH v3 0/2] Add capabilities file to sysfs
Casey Schaufler
- [RFC PATCH v3 0/2] Add capabilities file to sysfs
Francis Laniel
- [RFC PATCH v3 0/2] Add capabilities file to sysfs
Eric W. Biederman
- [RFC PATCH v3 0/2] Add capabilities file to sysfs
Francis Laniel
- [RFC PATCH v3 1/2] capability: Add cap_string.
Francis Laniel
- [RFC PATCH v3 2/2] security/inode.c: Add capabilities file.
Francis Laniel
- [RFC PATCH v3 2/2] security/inode.c: Add capabilities file.
Francis Laniel
- Ahoj
Mrs daniell akyle
- brauchen sie schnell geld?
Obrist Nicolas
- Contact GT Bank-Benin to receive your transfer amount of $18.5m US Dollars.
Barr Robert Richter
- Custom LSM: getting a null pointer dereference when trying to access a task security blob
Denis Obrezkov
- Custom LSM: getting a null pointer dereference when trying to access a task security blob
Casey Schaufler
- Custom LSM: getting a null pointer dereference when trying to access a task security blob
Denis Obrezkov
- Custom LSM: getting a null pointer dereference when trying to access a task security blob
Denis Obrezkov
- Custom LSM: getting a null pointer dereference when trying to access a task security blob
Casey Schaufler
- Custom LSM: getting a null pointer dereference when trying to access a task security blob
Denis Obrezkov
- Custom LSM: getting a null pointer dereference when trying to access a task security blob
Casey Schaufler
- Dear Email ID Owner.(USD$4000 IMF COMPENSATION FUND TO PICK UP TODAY).
Antonia Lloyd.
- EXPO 2020 BUSINESS PROPOSAL
Nasser Rashid
- Flush the hold queue fall into an infinite loop.
Paul Moore
- Flush the hold queue fall into an infinite loop.
cuigaosheng
- Flush the hold queue fall into an infinite loop.
Paul Moore
- Greetings,
Asil Ajwad
- Greetings My Dear,
Anderson Thereza
- Hello,
Seyba Daniel
- Hello....
Mrs.Bill.Chantal
- I NEED YOUR URGENT RESPOND PLEASE
Mohamed Allyson
- My name is Lisa Williams
Lisa Williams
- No subject
hyaibe56 at gmail.com
- No subject
yalaiibrahim818 at gmail.com
- No subject
Fiona Hill
- No subject
Fredrik Elvebakk
- No subject
Fredrik Elvebakk
- Prezentacja
Mateusz Talaga
- SMACK: how are smack blobs getting into cred->security and inode->i_security?
Denis Obrezkov
- SMACK: how are smack blobs getting into cred->security and inode->i_security?
Casey Schaufler
- Urgent Reply
Mrs Anna Edward
- Why is there an alignment from cred->security?
Denis Obrezkov
- Why is there an alignment from cred->security?
Casey Schaufler
- Wycena paneli fotowoltaicznych
Jakub Daroch
- Wycena paneli fotowoltaicznych
Maciej Nitycz
- Good day,
rashid.shamsi at hyproptic.com
Last message date:
Mon Jan 31 23:43:12 UTC 2022
Archived on: Mon Jan 31 23:30:30 UTC 2022
This archive was generated by
Pipermail 0.09 (Mailman edition).