Toggle navigation
Patchwork
linux-kernel
Patches
Bundles
About this project
Login
Register
Mail settings
Show patches with
: Submitter =
Coiby Xu
| State =
Action Required
| Archived =
No
| 26 patches
Series
Submitter
State
any
Action Required
New
Under Review
Accepted
Rejected
RFC
Not Applicable
Changes Requested
Awaiting Upstream
Superseded
Deferred
Unresolved
Repeat Merge
Corrupt patch
Search
Archived
No
Yes
Both
Delegate
------
Nobody
snail
snail
patchwork-bot
patchwork-bot
patchwork-bot
ww
ww
ww
Apply
Patch
Series
A/R/T
S/W/F
Date
Submitter
Delegate
State
[v2,5/5] x86/crash: make the page that stores the dm crypt key inaccessible
Support kdump with LUKS encryption by reusing LUKS volume key
- - -
-
-
-
2024-01-10
Coiby Xu
New
[v2,4/5] x86/crash: pass the dm crypt key to kdump kernel
Support kdump with LUKS encryption by reusing LUKS volume key
- - -
-
-
-
2024-01-10
Coiby Xu
New
[v2,3/5] crash_dump: retrieve dm crypt key in kdump kernel
Support kdump with LUKS encryption by reusing LUKS volume key
- - -
-
-
-
2024-01-10
Coiby Xu
New
[v2,2/5] crash_dump: save the dm crypt key temporarily
Support kdump with LUKS encryption by reusing LUKS volume key
- - -
-
-
-
2024-01-10
Coiby Xu
New
[v2,1/5] kexec_file: allow to place kexec_buf randomly
Support kdump with LUKS encryption by reusing LUKS volume key
- - -
-
-
-
2024-01-10
Coiby Xu
New
[v2] integrity: eliminate unnecessary "Problem loading X.509 certificate" msg
[v2] integrity: eliminate unnecessary "Problem loading X.509 certificate" msg
- 1 -
-
-
-
2024-01-09
Coiby Xu
New
integrity: don't throw an error immediately when failed to add a cert to the .machine keyring
integrity: don't throw an error immediately when failed to add a cert to the .machine keyring
- 1 -
-
-
-
2023-12-27
Coiby Xu
New
[v2] ima: require signed IMA policy when UEFI secure boot is enabled
[v2] ima: require signed IMA policy when UEFI secure boot is enabled
- - -
-
-
-
2023-07-26
Coiby Xu
New
kexec_file: ima: allow loading a kernel with its IMA signature verified
kexec_file: ima: allow loading a kernel with its IMA signature verified
- - -
-
-
-
2023-07-11
Coiby Xu
New
ima: require signed IMA policy when UEFI secure boot is enabled
ima: require signed IMA policy when UEFI secure boot is enabled
- - -
-
-
-
2023-07-03
Coiby Xu
New
[5/5] x86/crash: make the page that stores the LUKS volume key inaccessible
Support kdump with LUKS encryption by reusing LUKS volume key
- - -
-
-
-
2023-06-01
Coiby Xu
New
[4/5] x86/crash: pass the LUKS volume key to kdump kernel
Support kdump with LUKS encryption by reusing LUKS volume key
- - -
-
-
-
2023-06-01
Coiby Xu
New
[3/5] crash_dump: retrieve LUKS volume key in kdump kernel
Support kdump with LUKS encryption by reusing LUKS volume key
- - -
-
-
-
2023-06-01
Coiby Xu
New
[2/5] crash_dump: save the LUKS volume key temporarily
Support kdump with LUKS encryption by reusing LUKS volume key
- - -
-
-
-
2023-06-01
Coiby Xu
New
[1/5] kexec_file: allow to place kexec_buf randomly
Support kdump with LUKS encryption by reusing LUKS volume key
- - -
-
-
-
2023-06-01
Coiby Xu
New
[v3,2/2] selftests/kexec: enable lockdown tests
[v3,1/2] lockdown: kexec_file: prevent unsigned kernel image when KEXEC_SIG not enabled
- - -
-
-
-
2022-12-30
Coiby Xu
New
[v3,1/2] lockdown: kexec_file: prevent unsigned kernel image when KEXEC_SIG not enabled
[v3,1/2] lockdown: kexec_file: prevent unsigned kernel image when KEXEC_SIG not enabled
- 1 -
-
-
-
2022-12-30
Coiby Xu
New
[v2] lockdown: kexec_file: prevent unsigned kernel image when KEXEC_SIG not enabled
[v2] lockdown: kexec_file: prevent unsigned kernel image when KEXEC_SIG not enabled
- 1 -
-
-
-
2022-11-22
Coiby Xu
New
lockdown: kexec_file: prevent unsigned kernel image when KEXEC_SIG not enabled
lockdown: kexec_file: prevent unsigned kernel image when KEXEC_SIG not enabled
- 1 -
-
-
-
2022-11-21
Coiby Xu
New
lockdown: s390: kexec_file: don't skip signature verification when not secure IPLed
lockdown: s390: kexec_file: don't skip signature verification when not secure IPLed
- - -
-
-
-
2022-11-21
Coiby Xu
New
dm-crypt: fix incorrect use of strcmp when telling if there is no key
dm-crypt: fix incorrect use of strcmp when telling if there is no key
- - -
-
-
-
2022-11-07
Coiby Xu
New
[RFC,v2,5/5] crash_dump: retrieve LUKS volume key in kdump kernel
Support kdump with LUKS encryption by reusing LUKS volume key
- - -
-
-
-
2022-11-04
Coiby Xu
New
[RFC,v2,4/5] x86/crash: make the page that stores the LUKS volume key inaccessible
Support kdump with LUKS encryption by reusing LUKS volume key
- - -
-
-
-
2022-11-04
Coiby Xu
New
[RFC,v2,3/5] x86/crash: pass the LUKS volume key to kdump kernel
Support kdump with LUKS encryption by reusing LUKS volume key
- - -
-
-
-
2022-11-04
Coiby Xu
New
[RFC,v2,2/5] crash_dump: save the LUKS volume key temporarily
Support kdump with LUKS encryption by reusing LUKS volume key
- - -
-
-
-
2022-11-04
Coiby Xu
New
[RFC,v2,1/5] kexec_file: allow to place kexec_buf randomly
Support kdump with LUKS encryption by reusing LUKS volume key
- - -
-
-
-
2022-11-04
Coiby Xu
New