August 2018 Archives by author
Starting: Wed Aug 1 09:23:57 UTC 2018
Ending: Fri Aug 31 22:38:12 UTC 2018
Messages: 302
- TRADING ACCOUNT
KELLY ALAN
- Should we split the network filesystem setup into two phases?
Aurélien Aptel
- [PATCH] apparmor: remove unused label
Thiago Jung Bauermann
- [PATCH] apparmor: remove unused label
Arnd Bergmann
- [PATCH] apparmor: remove unused label
Arnd Bergmann
- BUG: Mount ignores mount options
Eric W. Biederman
- BUG: Mount ignores mount options
Eric W. Biederman
- BUG: Mount ignores mount options
Eric W. Biederman
- BUG: Mount ignores mount options
Eric W. Biederman
- BUG: Mount ignores mount options
Eric W. Biederman
- BUG: Mount ignores mount options
Eric W. Biederman
- BUG: Mount ignores mount options
Eric W. Biederman
- BUG: Mount ignores mount options
Eric W. Biederman
- BUG: Mount ignores mount options
Eric W. Biederman
- BUG: Mount ignores mount options
Eric W. Biederman
- Should we split the network filesystem setup into two phases?
Eric W. Biederman
- Should we split the network filesystem setup into two phases?
Eric W. Biederman
- [PATCH v2 1/2] security/keys/secure_key: Adds the secure key support based on CAAM.
James Bottomley
- [PATCH v2 1/2] security/keys/secure_key: Adds the secure key support based on CAAM.
James Bottomley
- [PATCH v2 1/2] security/keys/secure_key: Adds the secure key support based on CAAM.
James Bottomley
- [PATCH v3 RESEND 2/2] tpm: add support for nonblocking operation
James Bottomley
- [PATCH v3 RESEND 2/2] tpm: add support for nonblocking operation
James Bottomley
- [PATCH v4 2/2] tpm: add support for nonblocking operation
James Bottomley
- [PATCH v4 2/2] tpm: add support for nonblocking operation
James Bottomley
- [PATCH 0/9] libcap: add user namespace fscaps support
Christian Brauner
- [PATCH 1/9] cap_file: use v3 xattr macros
Christian Brauner
- [PATCH 2/9] capability: update to new uapi header
Christian Brauner
- [PATCH 3/9] cap_file: use struct vfs_ns_cap_data if possible
Christian Brauner
- [PATCH 4/9] cap_file: add new rootid argument
Christian Brauner
- [PATCH 5/9] cap_file: initialize rootid in _fcaps_load()
Christian Brauner
- [PATCH 6/9] capability: add cap_get_nsowner()
Christian Brauner
- [PATCH 7/9] cap_file: save rootid in _fcaps_save()
Christian Brauner
- [PATCH 8/9] cap_file: handle run- vs buildtime vfs cap support
Christian Brauner
- [PATCH 9/9] capability: add cap_set_nsowner()
Christian Brauner
- [PATCH] security/capabilities: remove check for -EINVAL
Christian Brauner
- [PATCH v1] security/capabilities: remove check for -EINVAL
Christian Brauner
- [PATCH] apparmor: fix an error code in __aa_create_ns()
Dan Carpenter
- [PATCH v1 00/22] LSM: Full security module stacking
Kees Cook
- [PATCH] apparmor: remove unused label
Kees Cook
- BUG: Mount ignores mount options
Alan Cox
- [PATCH v1 00/22] LSM: Full security module stacking
Sargun Dhillon
- [PATCH resend] uapi/linux/keyctl.h: don't use C++ reserved keyword as a struct member name
Randy Dunlap
- YOUR PRODUCT
Rafaa Esawi
- [PATCH 3/4] ima: add support for KEXEC_ORIG_KERNEL_CHECK
Seth Forshee
- [PATCH 3/4] ima: add support for KEXEC_ORIG_KERNEL_CHECK
Seth Forshee
- Should we split the network filesystem setup into two phases?
Steve French
- Should we split the network filesystem setup into two phases?
Steve French
- Should we split the network filesystem setup into two phases?
Steve French
- [PATCH v1 00/22] LSM: Full security module stacking
Jordan Glover
- Fwd: [PATCH v3] cap_inode_getsecurity: use d_find_any_alias() instead of d_find_alias()
Amir Goldstein
- [PATCH v3 RESEND 2/2] tpm: add support for nonblocking operation
Jason Gunthorpe
- [PATCH 01/23] TPM: Add new TPMs to the tail of the list to prevent inadvertent change of dev
Jason Gunthorpe
- [PATCH 04/23] TPM: Expose struct tpm_chip and related find_get and put functions
Jason Gunthorpe
- [PATCH 02/23] TPM: Provide a facility for a userspace TPM emulator
Jason Gunthorpe
- [PATCH 1/9] cap_file: use v3 xattr macros
Serge E. Hallyn
- BUG: Mount ignores mount options
Serge E. Hallyn
- [PATCH v1] security/capabilities: remove check for -EINVAL
Serge E. Hallyn
- BUG: Mount ignores mount options
Tetsuo Handa
- [PATCH] apparmor: remove unused label
Tetsuo Handa
- [PATCH] selinux: stricter parsing in mls_context_to_sid()
Jann Horn
- [PATCH] selinux: stricter parsing in mls_context_to_sid()
Jann Horn
- [PATCH] selinux: refactor mls_context_to_sid() and make it stricter
Jann Horn
- [PATCH] selinux: refactor mls_context_to_sid() and make it stricter
Jann Horn
- [PATCH RFC 2/5] X86: Support LSM determination of side-channel vulnerability
Jann Horn
- [PATCH RFC 3/5] LSM: Security module checking for side-channel dangers
Jann Horn
- [PATCH RFC 5/5] SELinux: Support SELinux determination of side-channel vulnerability
Jann Horn
- [PATCH RFC v2 3/5] LSM: Security module checking for side-channel dangers
Jann Horn
- [PATCH RFC v2 2/5] X86: Support LSM determination of side-channel vulnerability
Jann Horn
- [PATCH RFC v2 2/5] X86: Support LSM determination of side-channel vulnerability
Jann Horn
- [PATCH v3 3/5] LSM: Security module checking for side-channel dangers
Jann Horn
- [PATCH RFC v2 2/5] X86: Support LSM determination of side-channel vulnerability
Jann Horn
- [PATCH v3 3/5] LSM: Security module checking for side-channel dangers
Jann Horn
- [PATCH v3 3/5] LSM: Security module checking for side-channel dangers
Jann Horn
- [PATCH v4 3/5] LSM: Security module checking for side-channel dangers
Jann Horn
- [PATCH] selinux: refactor mls_context_to_sid() and make it stricter
Jann Horn
- [PATCH 00/33] VFS: Introduce filesystem context [ver #11]
David Howells
- [PATCH 08/33] vfs: Add LSM hooks for the new mount API [ver #11]
David Howells
- [PATCH 09/33] selinux: Implement the new mount API LSM hooks [ver #11]
David Howells
- [PATCH 10/33] smack: Implement filesystem context security hooks [ver #11]
David Howells
- [PATCH 11/33] apparmor: Implement security hooks for the new mount API [ver #11]
David Howells
- [PATCH 12/33] tomoyo: Implement security hooks for the new mount API [ver #11]
David Howells
- LSM hook for mount, superblock and keys watch notifications
David Howells
- LSM hook for mount, superblock and keys watch notifications
David Howells
- [PATCH 08/33] vfs: Add LSM hooks for the new mount API [ver #11]
David Howells
- [PATCH v2 1/2] security/keys/secure_key: Adds the secure key support based on CAAM.
David Howells
- [PATCH v2 1/2] security/keys/secure_key: Adds the secure key support based on CAAM.
David Howells
- BUG: Mount ignores mount options
David Howells
- BUG: Mount ignores mount options
David Howells
- BUG: Mount ignores mount options
David Howells
- BUG: Mount ignores mount options
David Howells
- BUG: Mount ignores mount options
David Howells
- Should we split the network filesystem setup into two phases?
David Howells
- [PATCH 1/2] Replace magic for trusting the secondary keyring with #define
David Howells
- [PATCH 2/2] Fix kexec forbidding kernels signed with keys in the secondary keyring to boot
David Howells
- [PATCH 1/2] Replace magic for trusting the secondary keyring with #define
David Howells
- tpm: Provide a TPM access library
David Howells
- [PATCH 01/23] TPM: Add new TPMs to the tail of the list to prevent inadvertent change of dev
David Howells
- [PATCH 02/23] TPM: Provide a facility for a userspace TPM emulator
David Howells
- [PATCH 03/23] TPM: Provide a platform driver for the user emulator driver
David Howells
- [PATCH 04/23] TPM: Expose struct tpm_chip and related find_get and put functions
David Howells
- [PATCH 05/23] TPM: Use struct tpm_chip rather than chip number as interface parameter
David Howells
- [PATCH 06/23] TPM: Move ordinal values from interface file to header with other ordinals
David Howells
- [PATCH 07/23] TPM: Consolidate tpm_send(), transmit_cmd() and tpm_transmit()
David Howells
- [PATCH 08/23] TPMLIB: Break TPM bits out of security/keys/trusted.c
David Howells
- [PATCH 09/23] TPMLIB: Do some source cleanups
David Howells
- [PATCH 10/23] TPMLIB: Better format calls to TSS_*hmac*()
David Howells
- [PATCH 11/23] TPMLIB: Put banner comments on public TPM library functions
David Howells
- [PATCH 12/23] TPMLIB: Create tpm_{even, odd}_nonce structs to represent nonces
David Howells
- [PATCH 13/23] TPMLIB: Rename store8() and storebytes()
David Howells
- [PATCH 14/23] TPMLIB: Make store_s() take a void* data argument, not unsigned char*
David Howells
- [PATCH 15/23] TPMLIB: Use __be32 rather than int32_t and use cpu_to_beX() and co.
David Howells
- [PATCH 16/23] TPMLIB: Put more comments into the HMAC generation functions
David Howells
- [PATCH 17/23] TPMLIB: Provide a wrapper to load bytes out of the reply
David Howells
- [PATCH 18/23] TPMLIB: Encapsulate XOR-based encryption with authkey derivative
David Howells
- [PATCH 19/23] TPMLIB: Add some debugging code
David Howells
- [PATCH 20/23] TPMLIB: Implement call to TPM_CreateWrapKey
David Howells
- [PATCH 21/23] TPMLIB: Implement call to TPM_LoadKey2
David Howells
- [PATCH 22/23] TPMLIB: Provide call for TPM_FlushSpecific
David Howells
- [PATCH 23/23] TPM: Add an asymmetric key subtype for handling TPM-based keys
David Howells
- [PATCH 04/23] TPM: Expose struct tpm_chip and related find_get and put functions
David Howells
- tpm: Provide a TPM access library
David Howells
- [PATCH 08/23] TPMLIB: Break TPM bits out of security/keys/trusted.c
David Howells
- [RFC] KEYS: inject an MKTME specific safety check in the keyctl revoke path
Huang, Kai
- [PATCH 1/4] ima: add support for arch specific policies
Nayna Jain
- [PATCH] apparmor: fix an error code in __aa_create_ns()
John Johansen
- [PATCH] apparmor: remove dead code
John Johansen
- [PATCH] apparmor: remove unused label
John Johansen
- [GIT PULL] apparmor updates for v4.19
John Johansen
- editing the images
Julian Jones
- [PATCH 1/2] Replace magic for trusting the secondary keyring with #define
Greg KH
- [PATCH resend] uapi/linux/keyctl.h: don't use C++ reserved keyword as a struct member name
Greg KH
- Hi, pretty
Larry
- Fwd: PROBLEM: tpm_cpg can't request region with AMD/Dell fTPM
Harlan Lieberman-Berg
- Fwd: PROBLEM: tpm_cpg can't request region with AMD/Dell fTPM
Harlan Lieberman-Berg
- BUG: Mount ignores mount options
Andy Lutomirski
- BUG: Mount ignores mount options
Andy Lutomirski
- BUG: Mount ignores mount options
Andy Lutomirski
- BUG: Mount ignores mount options
Andy Lutomirski
- Should we split the network filesystem setup into two phases?
Andy Lutomirski
- Spende von $ 4,800,000.00!
Gloria Adelaida Elias Mejia
- [PATCH v1 00/22] LSM: Full security module stacking
Salvatore Mesoraca
- maybe resource leak in security/selinux/selinuxfs.c
Paul Moore
- [PATCH] selinux: stricter parsing in mls_context_to_sid()
Paul Moore
- [PATCH] selinuxfs: Fix the resource leak in the failed branch of sel_make_inode
Paul Moore
- [PATCH] selinuxfs: Fix the resource leak in the failed branch of sel_make_inode
Paul Moore
- [PATCH] selinux: refactor mls_context_to_sid() and make it stricter
Paul Moore
- [PATCH] selinux: refactor mls_context_to_sid() and make it stricter
Paul Moore
- [PATCH] selinux: refactor mls_context_to_sid() and make it stricter
Paul Moore
- [GIT PULL] SELinux patches for v4.19
Paul Moore
- [PATCH] SELinux: allow other LSMs to use custom mount args
Paul Moore
- WARNING in apparmor_secid_to_secctx
Paul Moore
- [PATCH v2] security: Add LSM fixup hooks to set*gid syscalls.
James Morris
- [PATCH 08/33] vfs: Add LSM hooks for the new mount API [ver #11]
James Morris
- BUG: Mount ignores mount options
James Morris
- [GIT PULL] security subsystem: general update for v4.19
James Morris
- [GIT PULL] security subsystem: general update for v4.19
James Morris
- [GIT PULL] security subsystem: Smack updates for v4.19
James Morris
- [GIT PULL] security subsystem: TPM updates for v4.19
James Morris
- [GIT PULL] security subsystem: Integrity updates for v4.19
James Morris
- [PATCH v1 00/22] LSM: Full security module stacking
James Morris
- [PATCH v1] security/capabilities: remove check for -EINVAL
James Morris
- [PATCH v1] security/capabilities: remove check for -EINVAL
James Morris
- [PATCH resend] uapi/linux/keyctl.h: don't use C++ reserved keyword as a struct member name
Andrew Morton
- [PATCH] SELinux: allow other LSMs to use custom mount args
Micah Morton
- [PATCH] SELinux: allow other LSMs to use custom mount args
Micah Morton
- maybe resource leak in security/selinux/selinuxfs.c
Nixiaoming
- maybe resource leak in security/selinux/selinuxfs.c
Nixiaoming
- We design apps
Ray
- apparmor unaligned accesses on sparc64 in 4.18+git
Meelis Roos
- Your reply
Ruby
- [PATCH v4 1/2] tpm: add ptr to the tpm_space struct to file_priv
Jarkko Sakkinen
- [PATCH v4 2/2] tpm: add support for nonblocking operation
Jarkko Sakkinen
- [PATCH v4 1/2] tpm: add ptr to the tpm_space struct to file_priv
Jarkko Sakkinen
- Fwd: PROBLEM: tpm_cpg can't request region with AMD/Dell fTPM
Jarkko Sakkinen
- [PATCH v4 2/2] tpm: add support for nonblocking operation
Jarkko Sakkinen
- [PATCH v5 1/2] tpm: add ptr to the tpm_space struct to file_priv
Jarkko Sakkinen
- [PATCH v5 1/2] tpm: add ptr to the tpm_space struct to file_priv
Jarkko Sakkinen
- tpm: Provide a TPM access library
Jarkko Sakkinen
- tpm: Provide a TPM access library
Jarkko Sakkinen
- [PATCH 01/23] TPM: Add new TPMs to the tail of the list to prevent inadvertent change of dev
Jarkko Sakkinen
- [PATCH 01/23] TPM: Add new TPMs to the tail of the list to prevent inadvertent change of dev
Jarkko Sakkinen
- [PATCH 01/23] TPM: Add new TPMs to the tail of the list to prevent inadvertent change of dev
Jarkko Sakkinen
- [PATCH 02/23] TPM: Provide a facility for a userspace TPM emulator
Jarkko Sakkinen
- [PATCH 03/23] TPM: Provide a platform driver for the user emulator driver
Jarkko Sakkinen
- [PATCH 05/23] TPM: Use struct tpm_chip rather than chip number as interface parameter
Jarkko Sakkinen
- [PATCH 08/23] TPMLIB: Break TPM bits out of security/keys/trusted.c
Jarkko Sakkinen
- [PATCH 08/23] TPMLIB: Break TPM bits out of security/keys/trusted.c
Jarkko Sakkinen
- [PATCH] tpm: factor out TPM 1.x duration calculation to tpm1-cmd.c
Jarkko Sakkinen
- [PATCH 08/23] TPMLIB: Break TPM bits out of security/keys/trusted.c
Jarkko Sakkinen
- [RFC] KEYS: add a new type "mktme" to kernel key services
Jarkko Sakkinen
- [RFC] KEYS: add a new type "mktme" to kernel key services
Jarkko Sakkinen
- [PATCH v5 0/2] tpm: add support for nonblocking operation
Jarkko Sakkinen
- [PATCH v5 0/2] tpm: add support for nonblocking operation
Jarkko Sakkinen
- [PATCH v5 2/2] tpm: add support for nonblocking operation
Jarkko Sakkinen
- [RFC] KEYS: inject an MKTME specific safety check in the keyctl revoke path
Jarkko Sakkinen
- [RFC] KEYS: inject an MKTME specific safety check in the keyctl revoke path
Jarkko Sakkinen
- your photos need edit
Sam
- [PATCH v1 20/22] Move common usercopy into security_getpeersec_stream
Piotr Sawicki
- LSM hook for mount, superblock and keys watch notifications
Casey Schaufler
- [PATCH] Smack: Mark expected switch fall-through
Casey Schaufler
- [PATCH v1 20/22] Move common usercopy into security_getpeersec_stream
Casey Schaufler
- BUG: Mount ignores mount options
Casey Schaufler
- BUG: Mount ignores mount options
Casey Schaufler
- BUG: Mount ignores mount options
Casey Schaufler
- [PATCH v1 00/22] LSM: Full security module stacking
Casey Schaufler
- [PATCH v1 00/22] LSM: Full security module stacking
Casey Schaufler
- [PATCH RFC 0/5] LSM: Add and use a hook for side-channel safety checks
Casey Schaufler
- [PATCH RFC 1/5] LSM: Introduce a hook for side-channel danger
Casey Schaufler
- [PATCH RFC 2/5] X86: Support LSM determination of side-channel vulnerability
Casey Schaufler
- [PATCH RFC 3/5] LSM: Security module checking for side-channel dangers
Casey Schaufler
- [PATCH RFC 4/5] Smack: Support determination of side-channel vulnerability
Casey Schaufler
- [PATCH RFC 5/5] SELinux: Support SELinux determination of side-channel vulnerability
Casey Schaufler
- [PATCH RFC v2 0/5] LSM: Add and use a hook for side-channel safety checks
Casey Schaufler
- [PATCH RFC v2 1/5] LSM: Introduce a hook for side-channel danger
Casey Schaufler
- [PATCH RFC v2 2/5] X86: Support LSM determination of side-channel vulnerability
Casey Schaufler
- [PATCH RFC v2 3/5] LSM: Security module checking for side-channel dangers
Casey Schaufler
- [PATCH RFC v2 4/5] Smack: Support determination of side-channel vulnerability
Casey Schaufler
- [PATCH RFC v2 5/5] SELinux: Support SELinux determination of side-channel vulnerability
Casey Schaufler
- [PATCH RFC v2 2/5] X86: Support LSM determination of side-channel vulnerability
Schaufler, Casey
- [PATCH RFC v2 3/5] LSM: Security module checking for side-channel dangers
Schaufler, Casey
- [PATCH RFC v2 5/5] SELinux: Support SELinux determination of side-channel vulnerability
Schaufler, Casey
- [PATCH RFC v2 5/5] SELinux: Support SELinux determination of side-channel vulnerability
Schaufler, Casey
- [PATCH RFC v3 0/5] LSM: Add and use a hook for side-channel safety checks
Casey Schaufler
- [PATCH v3 1/5] LSM: Introduce a hook for side-channel danger
Casey Schaufler
- [PATCH v3 2/5] X86: Support LSM determination of side-channel
Casey Schaufler
- [PATCH v3 3/5] LSM: Security module checking for side-channel dangers
Casey Schaufler
- [PATCH v3 4/5] Smack: Support determination of side-channel
Casey Schaufler
- [PATCH v3 5/5] SELinux: Support SELinux determination of side-channel
Casey Schaufler
- [PATCH RFC v2 2/5] X86: Support LSM determination of side-channel vulnerability
Schaufler, Casey
- [PATCH v3 3/5] LSM: Security module checking for side-channel dangers
Schaufler, Casey
- [PATCH v3 3/5] LSM: Security module checking for side-channel dangers
Schaufler, Casey
- [PATCH v3 3/5] LSM: Security module checking for side-channel dangers
Schaufler, Casey
- [PATCH v4 0/5] LSM: Add and use a hook for side-channel safety checks
Casey Schaufler
- [PATCH v4 1/5] LSM: Introduce a hook for side-channel danger
Casey Schaufler
- [PATCH v4 2/5] X86: Support LSM determination of side-channel
Casey Schaufler
- [PATCH v4 3/5] LSM: Security module checking for side-channel dangers
Casey Schaufler
- [PATCH v4 4/5] Smack: Support determination of side-channel
Casey Schaufler
- [PATCH v4 5/5] SELinux: Support SELinux determination of side-channel
Casey Schaufler
- [PATCH] SELinux: allow other LSMs to use custom mount args
Casey Schaufler
- [PATCH] SELinux: allow other LSMs to use custom mount args
Casey Schaufler
- [RFC] KEYS: inject an MKTME specific safety check in the keyctl revoke path
Alison Schofield
- [RFC] KEYS: inject an MKTME specific safety check in the keyctl revoke path
Alison Schofield
- [RFC] KEYS: inject an MKTME specific safety check in the keyctl revoke path
Alison Schofield
- [RFC] KEYS: inject an MKTME specific safety check in the keyctl revoke path
Alison Schofield
- [PATCH 1/2] Replace magic for trusting the secondary keyring with #define
Yannik Sembritzki
- REPLY AS SOON AS POSSIBLE
Dr Chien Direktor von Hang Seng
- [PATCH] Smack: Mark expected switch fall-through
Gustavo A. R. Silva
- [PATCH] apparmor: remove dead code
Gustavo A. R. Silva
- [PATCH] apparmor: remove dead code
Gustavo A. R. Silva
- [PATCH] selinux: stricter parsing in mls_context_to_sid()
Stephen Smalley
- [PATCH RFC 5/5] SELinux: Support SELinux determination of side-channel vulnerability
Stephen Smalley
- [PATCH RFC v2 5/5] SELinux: Support SELinux determination of side-channel vulnerability
Stephen Smalley
- [PATCH RFC v2 5/5] SELinux: Support SELinux determination of side-channel vulnerability
Stephen Smalley
- WARNING in apparmor_secid_to_secctx
Stephen Smalley
- WARNING in apparmor_secid_to_secctx
Stephen Smalley
- WARNING in apparmor_secid_to_secctx
Stephen Smalley
- [PATCH] SELinux: allow other LSMs to use custom mount args
Stephen Smalley
- [PATCH v3 RESEND 0/2] tpm: add support for nonblocking operation
Tadeusz Struk
- [PATCH v3 RESEND 1/2] tpm: add ptr to the tpm_space struct to file_priv
Tadeusz Struk
- [PATCH v3 RESEND 2/2] tpm: add support for nonblocking operation
Tadeusz Struk
- [PATCH v3 RESEND 2/2] tpm: add support for nonblocking operation
Tadeusz Struk
- [PATCH v3 RESEND 2/2] tpm: add support for nonblocking operation
Tadeusz Struk
- [PATCH v3 RESEND 2/2] tpm: add support for nonblocking operation
Tadeusz Struk
- [PATCH v4 0/2] tpm: add support for nonblocking operation
Tadeusz Struk
- [PATCH v4 1/2] tpm: add ptr to the tpm_space struct to file_priv
Tadeusz Struk
- [PATCH v4 2/2] tpm: add support for nonblocking operation
Tadeusz Struk
- [PATCH v4 1/2] tpm: add ptr to the tpm_space struct to file_priv
Tadeusz Struk
- [PATCH v4 2/2] tpm: add support for nonblocking operation
Tadeusz Struk
- [PATCH v4 2/2] tpm: add support for nonblocking operation
Tadeusz Struk
- [PATCH v4 2/2] tpm: add support for nonblocking operation
Tadeusz Struk
- [PATCH v5 0/2] tpm: add support for nonblocking operation
Tadeusz Struk
- [PATCH v5 1/2] tpm: add ptr to the tpm_space struct to file_priv
Tadeusz Struk
- [PATCH v5 2/2] tpm: add support for nonblocking operation
Tadeusz Struk
- BUG: Mount ignores mount options
Miklos Szeredi
- BUG: Mount ignores mount options
Theodore Y. Ts'o
- BUG: Mount ignores mount options
Theodore Y. Ts'o
- BUG: Mount ignores mount options
Theodore Y. Ts'o
- BUG: Mount ignores mount options
Theodore Y. Ts'o
- BUG: Mount ignores mount options
Theodore Y. Ts'o
- BUG: Mount ignores mount options
Al Viro
- BUG: Mount ignores mount options
Al Viro
- BUG: Mount ignores mount options
Al Viro
- BUG: Mount ignores mount options
Al Viro
- BUG: Mount ignores mount options
Al Viro
- BUG: Mount ignores mount options
Al Viro
- Should we split the network filesystem setup into two phases?
Al Viro
- WARNING in apparmor_secid_to_secctx
Dmitry Vyukov
- WARNING in apparmor_secid_to_secctx
Dmitry Vyukov
- Fwd: PROBLEM: tpm_cpg can't request region with AMD/Dell fTPM
Tomas Winkler
- BUG: Mount ignores mount options
Darrick J. Wong
- BUG: Mount ignores mount options
Darrick J. Wong
- [PATCH v2 1/2] security/keys/secure_key: Adds the secure key support based on CAAM.
Mimi Zohar
- [PATCH v2 1/2] security/keys/secure_key: Adds the secure key support based on CAAM.
Mimi Zohar
- [PATCH 3/4] ima: add support for KEXEC_ORIG_KERNEL_CHECK
Mimi Zohar
- [PATCH v2 1/2] security/keys/secure_key: Adds the secure key support based on CAAM.
Mimi Zohar
- [PATCH v2 1/2] security/keys/secure_key: Adds the secure key support based on CAAM.
Mimi Zohar
- [PATCH 3/4] ima: add support for KEXEC_ORIG_KERNEL_CHECK
Mimi Zohar
- [PATCH 01/23] TPM: Add new TPMs to the tail of the list to prevent inadvertent change of dev
Mimi Zohar
- [PATCH] selinuxfs: Fix the resource leak in the failed branch of sel_make_inode
nixiaoming
- [PATCH] apparmor: remove dead code
kbuild test robot
- WARNING in apparmor_secid_to_secctx
syzbot
- WARNING in apparmor_secid_to_secctx
syzbot
Last message date:
Fri Aug 31 22:38:12 UTC 2018
Archived on: Fri Aug 31 22:38:38 UTC 2018
This archive was generated by
Pipermail 0.09 (Mailman edition).