December 2020 Archives by subject
Starting: Tue Dec 1 00:21:57 UTC 2020
Ending: Wed Dec 30 22:42:59 UTC 2020
Messages: 370
- $18,991,674 USD...
vikas.vishwakarma at crmnext.in
- [GIT PULL] keys: Collected minor fixes and cleanups
David Howells
- [GIT PULL] keys: Collected minor fixes and cleanups
Linus Torvalds
- [GIT PULL] keys: Collected minor fixes and cleanups
Linus Torvalds
- [GIT PULL] keys: Collected minor fixes and cleanups
Jarkko Sakkinen
- [GIT PULL] SELinux patches for v5.11
Paul Moore
- [GIT PULL] SELinux patches for v5.11
pr-tracker-bot at kernel.org
- [GIT PULL] Smack additional patch for v5.11
Casey Schaufler
- [GIT PULL] Smack additional patch for v5.11
Linus Torvalds
- [GIT PULL] Smack additional patch for v5.11
pr-tracker-bot at kernel.org
- [GIT PULL] Smack patches for v5.11
Casey Schaufler
- [GIT PULL] Smack patches for v5.11
pr-tracker-bot at kernel.org
- [GIT PULL] tomoyo fixes for v5.11
Tetsuo Handa
- [GIT PULL] tomoyo fixes for v5.11
pr-tracker-bot at kernel.org
- [MPTCP] [PATCH net-next 3/3] mptcp: emit tcp reset when a join request fails
Mat Martineau
- [MPTCP] Re: [RFC PATCH] selinux: handle MPTCP consistently with TCP
Paul Moore
- [MPTCP] Re: [RFC PATCH] selinux: handle MPTCP consistently with TCP
Florian Westphal
- [MPTCP] Re: [RFC PATCH] selinux: handle MPTCP consistently with TCP
Paul Moore
- [MPTCP] Re: [RFC PATCH] selinux: handle MPTCP consistently with TCP
Paolo Abeni
- [MPTCP] Re: [RFC PATCH] selinux: handle MPTCP consistently with TCP
Paul Moore
- [MPTCP] Re: [RFC PATCH] selinux: handle MPTCP consistently with TCP
Paolo Abeni
- [MPTCP] Re: [RFC PATCH] selinux: handle MPTCP consistently with TCP
Paul Moore
- [MPTCP] Re: [RFC PATCH] selinux: handle MPTCP consistently with TCP
Paolo Abeni
- [MPTCP] Re: [RFC PATCH] selinux: handle MPTCP consistently with TCP
Paul Moore
- [PATCH 0/9] keys: Miscellaneous fixes
Jarkko Sakkinen
- [PATCH AUTOSEL 5.7 03/30] ima: extend boot_aggregate with kernel measurements
Mimi Zohar
- [PATCH AUTOSEL 5.7 03/30] ima: extend boot_aggregate with kernel measurements
Sasha Levin
- [PATCH AUTOSEL 5.7 03/30] ima: extend boot_aggregate with kernel measurements
Sasha Levin
- [PATCH net-next 1/3] security: add const qualifier to struct sock in various places
Jakub Kicinski
- [PATCH net-next 1/3] security: add const qualifier to struct sock in various places
James Morris
- [PATCH net-next 1/3] security: add const qualifier to struct sock in various places
Jakub Kicinski
- [PATCH v1 0/9] Enable root to update the blacklist keyring
Jarkko Sakkinen
- [PATCH v1 0/9] Enable root to update the blacklist keyring
David Howells
- [PATCH v1 0/9] Enable root to update the blacklist keyring
Jarkko Sakkinen
- [PATCH v1 1/9] certs: Fix blacklisted hexadecimal hash string check
David Howells
- [PATCH v1 1/9] certs: Fix blacklisted hexadecimal hash string check
Mickaël Salaün
- [PATCH v1 2/9] certs: Make blacklist_vet_description() more strict
David Howells
- [PATCH v1 2/9] certs: Make blacklist_vet_description() more strict
Mickaël Salaün
- [PATCH v1 5/9] PKCS#7: Fix missing include
David Howells
- [PATCH v1 5/9] PKCS#7: Fix missing include
Mickaël Salaün
- [PATCH v1 8/9] certs: Replace K{U, G}IDT_INIT() with GLOBAL_ROOT_{U, G}ID
David Howells
- [PATCH v12 0/3] Add trusted_for(2) (was O_MAYEXEC)
Mickaël Salaün
- [PATCH v12 1/3] fs: Add trusted_for(2) syscall implementation and related sysctl
Mickaël Salaün
- [PATCH v12 2/3] arch: Wire up trusted_for(2)
Mickaël Salaün
- [PATCH v12 3/3] selftest/interpreter: Add tests for trusted_for(2) policies
Mickaël Salaün
- [PATCH v2 00/10] allow unprivileged overlay mounts
Miklos Szeredi
- [PATCH v2 01/10] vfs: move cap_convert_nscap() call into vfs_setxattr()
Miklos Szeredi
- [PATCH v2 02/10] vfs: verify source area in vfs_dedupe_file_range_one()
Miklos Szeredi
- [PATCH v2 03/10] ovl: check privs before decoding file handle
Miklos Szeredi
- [PATCH v2 04/10] ovl: make ioctl() safe
Miklos Szeredi
- [PATCH v2 05/10] ovl: simplify file splice
Miklos Szeredi
- [PATCH v2 06/10] ovl: user xattr
Miklos Szeredi
- [PATCH v2 07/10] ovl: do not fail when setting origin xattr
Miklos Szeredi
- [PATCH v2 08/10] ovl: do not fail because of O_NOATIME
Miklos Szeredi
- [PATCH v2 09/10] ovl: do not get metacopy for userxattr
Miklos Szeredi
- [PATCH v2 10/10] ovl: unprivieged mounts
Miklos Szeredi
- [PATCH v25 00/12] Landlock LSM
Mickaël Salaün
- [PATCH v25 01/12] landlock: Add object management
Mickaël Salaün
- [PATCH v25 02/12] landlock: Add ruleset and domain management
Mickaël Salaün
- [PATCH v25 03/12] landlock: Set up the security framework and manage credentials
Mickaël Salaün
- [PATCH v25 04/12] landlock: Add ptrace restrictions
Mickaël Salaün
- [PATCH v25 05/12] LSM: Infrastructure management of the superblock
Mickaël Salaün
- [PATCH v25 06/12] fs,security: Add sb_delete hook
Mickaël Salaün
- [PATCH v25 07/12] landlock: Support filesystem access-control
Mickaël Salaün
- [PATCH v25 08/12] landlock: Add syscall implementations
Mickaël Salaün
- [PATCH v25 09/12] arch: Wire up Landlock syscalls
Mickaël Salaün
- [PATCH v25 10/12] selftests/landlock: Add user space tests
Mickaël Salaün
- [PATCH v25 11/12] samples/landlock: Add a sandbox manager example
Mickaël Salaün
- [PATCH v25 12/12] landlock: Add user and kernel documentation
Mickaël Salaün
- [PATCH v2] proc: Allow pid_revalidate() during LOOKUP_RCU
Stephen Brennan
- [PATCH v3 00/11] evm: Improve usability of portable signatures
Mimi Zohar
- [PATCH v3 00/38] idmapped mounts
Christian Brauner
- [PATCH v3 01/11] evm: Execute evm_inode_init_security() only when an HMAC key is loaded
Mimi Zohar
- [PATCH v3 01/38] namespace: take lock_mount_hash() directly when changing flags
Christoph Hellwig
- [PATCH v3 01/38] namespace: take lock_mount_hash() directly when changing flags
Christian Brauner
- [PATCH v3 02/11] evm: Load EVM key in ima_load_x509() to avoid appraisal
Mimi Zohar
- [PATCH v3 02/38] mount: make {lock,unlock}_mount_hash() static
Christoph Hellwig
- [PATCH v3 02/38] mount: make {lock,unlock}_mount_hash() static
Christian Brauner
- [PATCH v3 03/11] evm: Refuse EVM_ALLOW_METADATA_WRITES only if an HMAC key is loaded
Mimi Zohar
- [PATCH v3 03/38] namespace: only take read lock in do_reconfigure_mnt()
Christoph Hellwig
- [PATCH v3 03/38] namespace: only take read lock in do_reconfigure_mnt()
Christian Brauner
- [PATCH v3 04/11] ima: Move ima_reset_appraise_flags() call to post hooks
Roberto Sassu
- [PATCH v3 04/11] ima: Move ima_reset_appraise_flags() call to post hooks
Mimi Zohar
- [PATCH v3 04/38] fs: add mount_setattr()
Christoph Hellwig
- [PATCH v3 04/38] fs: add mount_setattr()
Christian Brauner
- [PATCH v3 04/38] fs: add mount_setattr()
Christoph Hellwig
- [PATCH v3 04/38] fs: add mount_setattr()
Christoph Hellwig
- [PATCH v3 04/38] fs: add mount_setattr()
Christian Brauner
- [PATCH v3 04/38] fs: add mount_setattr()
Christoph Hellwig
- [PATCH v3 06/11] evm: Ignore INTEGRITY_NOLABEL if no HMAC key is loaded
Mimi Zohar
- [PATCH v3 06/11] evm: Ignore INTEGRITY_NOLABEL if no HMAC key is loaded
Mimi Zohar
- [PATCH v3 06/11] evm: Ignore INTEGRITY_NOLABEL if no HMAC key is loaded
Roberto Sassu
- [PATCH v3 06/11] evm: Ignore INTEGRITY_NOLABEL if no HMAC key is loaded
Roberto Sassu
- [PATCH v3 06/38] fs: add id translation helpers
Christoph Hellwig
- [PATCH v3 06/38] fs: add id translation helpers
Christian Brauner
- [PATCH v3 07/38] mount: attach mappings to mounts
Christoph Hellwig
- [PATCH v3 07/38] mount: attach mappings to mounts
Tycho Andersen
- [PATCH v3 07/38] mount: attach mappings to mounts
Christian Brauner
- [PATCH v3 09/38] namei: add idmapped mount aware permission helpers
Christoph Hellwig
- [PATCH v3 09/38] namei: add idmapped mount aware permission helpers
Christian Brauner
- [PATCH v3 09/38] namei: add idmapped mount aware permission helpers
Christian Brauner
- [PATCH v3 10/38] inode: add idmapped mount aware init and permission helpers
Christoph Hellwig
- [PATCH v3 10/38] inode: add idmapped mount aware init and permission helpers
Christian Brauner
- [PATCH v3 17/38] namei: introduce struct renamedata
Christoph Hellwig
- [PATCH v3 17/38] namei: introduce struct renamedata
Christian Brauner
- [PATCH v3 32/38] fat: handle idmapped mounts
Christian Brauner
- [PATCH v3 33/38] ext4: support idmapped mounts
Christian Brauner
- [PATCH v3 33/38] ext4: support idmapped mounts
Christoph Hellwig
- [PATCH v3 33/38] ext4: support idmapped mounts
Christian Brauner
- [PATCH v3 33/38] ext4: support idmapped mounts
Christoph Hellwig
- [PATCH v3 33/38] ext4: support idmapped mounts
Christian Brauner
- [PATCH v4 00/40] idmapped mounts
Christian Brauner
- [PATCH v4 01/40] namespace: take lock_mount_hash() directly when changing flags
Christian Brauner
- [PATCH v4 02/40] mount: make {lock,unlock}_mount_hash() static
Christian Brauner
- [PATCH v4 03/40] namespace: only take read lock in do_reconfigure_mnt()
Christian Brauner
- [PATCH v4 04/40] fs: split out functions to hold writers
Christian Brauner
- [PATCH v4 04/40] fs: split out functions to hold writers
Christoph Hellwig
- [PATCH v4 05/40] fs: add attr_flags_to_mnt_flags helper
Christian Brauner
- [PATCH v4 05/40] fs: add attr_flags_to_mnt_flags helper
Christoph Hellwig
- [PATCH v4 06/40] fs: add mount_setattr()
Christian Brauner
- [PATCH v4 06/40] fs: add mount_setattr()
Christoph Hellwig
- [PATCH v4 07/40] tests: add mount_setattr() selftests
Christian Brauner
- [PATCH v4 08/40] fs: add id translation helpers
Christian Brauner
- [PATCH v4 09/40] mount: attach mappings to mounts
Christian Brauner
- [PATCH v4 10/40] capability: handle idmapped mounts
Christian Brauner
- [PATCH v4 11/40] namei: make permission helpers idmapped mount aware
Christian Brauner
- [PATCH v4 12/40] inode: make init and permission helpers idmapped mount aware
Christian Brauner
- [PATCH v4 13/40] attr: handle idmapped mounts
Christian Brauner
- [PATCH v4 14/40] acl: handle idmapped mounts
Christian Brauner
- [PATCH v4 15/40] xattr: handle idmapped mounts
Christian Brauner
- [PATCH v4 16/40] commoncap: handle idmapped mounts
Christian Brauner
- [PATCH v4 17/40] stat: handle idmapped mounts
Christian Brauner
- [PATCH v4 18/40] namei: handle idmapped mounts in may_*() helpers
Christian Brauner
- [PATCH v4 19/40] namei: introduce struct renamedata
Christian Brauner
- [PATCH v4 20/40] namei: prepare for idmapped mounts
Christian Brauner
- [PATCH v4 21/40] open: handle idmapped mounts in do_truncate()
Christian Brauner
- [PATCH v4 22/40] open: handle idmapped mounts
Christian Brauner
- [PATCH v4 23/40] af_unix: handle idmapped mounts
Christian Brauner
- [PATCH v4 24/40] utimes: handle idmapped mounts
Christian Brauner
- [PATCH v4 25/40] fcntl: handle idmapped mounts
Christian Brauner
- [PATCH v4 26/40] notify: handle idmapped mounts
Christian Brauner
- [PATCH v4 27/40] init: handle idmapped mounts
Christian Brauner
- [PATCH v4 28/40] ioctl: handle idmapped mounts
Christian Brauner
- [PATCH v4 29/40] would_dump: handle idmapped mounts
Christian Brauner
- [PATCH v4 30/40] exec: handle idmapped mounts
Christian Brauner
- [PATCH v4 32/40] apparmor: handle idmapped mounts
Christian Brauner
- [PATCH v4 33/40] ima: handle idmapped mounts
Christian Brauner
- [PATCH v4 34/40] fat: handle idmapped mounts
Christian Brauner
- [PATCH v4 35/40] ext4: support idmapped mounts
Christian Brauner
- [PATCH v4 36/40] ecryptfs: do not mount on top of idmapped mounts
Christian Brauner
- [PATCH v4 37/40] overlayfs: do not mount on top of idmapped mounts
Christian Brauner
- [PATCH v4 38/40] fs: introduce MOUNT_ATTR_IDMAP
Christian Brauner
- [PATCH v4 39/40] tests: extend mount_setattr tests
Christian Brauner
- [PATCH v8 0/4] Introduce TEE based Trusted Keys support
Jarkko Sakkinen
- [PATCH v8 3/4] doc: trusted-encrypted: updates with TEE as a new trust source
gmail Elaine Palmer
- [PATCH v8 3/4] doc: trusted-encrypted: updates with TEE as a new trust source
Jarkko Sakkinen
- [PATCH v8 3/4] doc: trusted-encrypted: updates with TEE as a new trust source
Randy Dunlap
- [PATCH 00/18] keys: Miscellaneous fixes
David Howells
- [PATCH 00/18] keys: Miscellaneous fixes
Ben Boeckel
- [PATCH 00/18] keys: Miscellaneous fixes
David Howells
- [PATCH 00/18] keys: Miscellaneous fixes
Jarkko Sakkinen
- [PATCH 00/18] keys: Miscellaneous fixes
Jarkko Sakkinen
- [PATCH 00/18] keys: Miscellaneous fixes
Jarkko Sakkinen
- [PATCH 06/18] security: keys: delete repeated words in comments
David Howells
- [PATCH] [RFC] xfs: initialise attr fork on inode create
Christoph Hellwig
- [PATCH] [RFC] xfs: initialise attr fork on inode create
Casey Schaufler
- [PATCH] [RFC] xfs: initialise attr fork on inode create
Christoph Hellwig
- [PATCH] [RFC] xfs: initialise attr fork on inode create
Christoph Hellwig
- [PATCH] [RFC] xfs: initialise attr fork on inode create
Dave Chinner
- [PATCH] [RFC] xfs: initialise attr fork on inode create
Dave Chinner
- [PATCH] fix namespaced fscaps when !CONFIG_SECURITY
James Morris
- [PATCH] proc: Allow pid_revalidate() during LOOKUP_RCU
Stephen Brennan
- [PATCH] apparmor: fix error check
Nick Desaulniers
- [PATCH] linux: handle MPTCP consistently with TCP
Paolo Abeni
- [PATCH] linux: handle MPTCP consistently with TCP
Casey Schaufler
- [PATCH] linux: handle MPTCP consistently with TCP
Paolo Abeni
- [PATCH] linux: handle MPTCP consistently with TCP
Paul Moore
- [PATCH] linux: handle MPTCP consistently with TCP
Paolo Abeni
- [PATCH] linux: handle MPTCP consistently with TCP
Paul Moore
- [PATCH] Security/Apparmor: Fixed a bracket problem in audit.c
Alexander Guril
- [PATCH] selinux: fix inconsistency between inode_getxattr and inode_listsecurity
Amir Goldstein
- [PATCH] Smack: Handle io_uring kernel thread privileges.
Casey Schaufler
- [PATCH] Smack: Handle io_uring kernel thread privileges.
Eric W. Biederman
- [PATCH] Smack: Handle io_uring kernel thread privileges.
Jens Axboe
- [PATCH] vfs: fix fsconfig(2) LSM mount option handling for btrfs
David Sterba
- [PATCH] vfs: fix fsconfig(2) LSM mount option handling for btrfs
Ondrej Mosnacek
- [PATCH AUTOSEL 4.14 02/66] tomoyo: fix clang pointer arithmetic warning
Sasha Levin
- [PATCH AUTOSEL 4.19 02/87] tomoyo: fix clang pointer arithmetic warning
Sasha Levin
- [PATCH AUTOSEL 4.4 02/38] tomoyo: fix clang pointer arithmetic warning
Sasha Levin
- [PATCH AUTOSEL 4.9 02/48] tomoyo: fix clang pointer arithmetic warning
Sasha Levin
- [PATCH AUTOSEL 5.10 008/217] tomoyo: fix clang pointer arithmetic warning
Sasha Levin
- [PATCH AUTOSEL 5.4 003/130] tomoyo: fix clang pointer arithmetic warning
Sasha Levin
- [PATCH AUTOSEL 5.7 03/30] ima: extend boot_aggregate with kernel measurements
Tyler Hicks
- [PATCH AUTOSEL 5.7 03/30] ima: extend boot_aggregate with kernel measurements
Mimi Zohar
- [PATCH AUTOSEL 5.7 03/30] ima: extend boot_aggregate with kernel measurements
James Bottomley
- [PATCH AUTOSEL 5.7 03/30] ima: extend boot_aggregate with kernel measurements
Mimi Zohar
- [PATCH AUTOSEL 5.7 03/30] ima: extend boot_aggregate with kernel measurements
Tyler Hicks
- [PATCH AUTOSEL 5.7 03/30] ima: extend boot_aggregate with kernel measurements
Ken Goldman
- [PATCH AUTOSEL 5.7 03/30] ima: extend boot_aggregate with kernel measurements
Mimi Zohar
- [PATCH v1 2/9] certs: Make blacklist_vet_description() more strict
Mickaël Salaün
- [PATCH v1 4/9] certs: Check that builtin blacklist hashes are valid
David Howells
- [PATCH v1 4/9] certs: Check that builtin blacklist hashes are valid
Mickaël Salaün
- [PATCH v1] apparmor: Remove duplicate macro list_entry_is_head()
Andy Shevchenko
- [PATCH v1] apparmor: Remove duplicate macro list_entry_is_head()
John Johansen
- [PATCH v2 0/5] Enable root to update the blacklist keyring
Mickaël Salaün
- [PATCH v2 00/10] allow unprivileged overlay mounts
Tetsuo Handa
- [PATCH v2 00/10] allow unprivileged overlay mounts
John Johansen
- [PATCH v2 00/10] allow unprivileged overlay mounts
Miklos Szeredi
- [PATCH v2 00/10] allow unprivileged overlay mounts
John Johansen
- [PATCH v2 01/10] vfs: move cap_convert_nscap() call into vfs_setxattr()
James Morris
- [PATCH v2 03/10] ovl: check privs before decoding file handle
Amir Goldstein
- [PATCH v2 03/10] ovl: check privs before decoding file handle
Miklos Szeredi
- [PATCH v2 03/10] ovl: check privs before decoding file handle
Miklos Szeredi
- [PATCH v2 03/10] ovl: check privs before decoding file handle
Amir Goldstein
- [PATCH v2 04/10] ovl: make ioctl() safe
Amir Goldstein
- [PATCH v2 04/10] ovl: make ioctl() safe
James Morris
- [PATCH v2 04/10] ovl: make ioctl() safe
Miklos Szeredi
- [PATCH v2 04/10] ovl: make ioctl() safe
Miklos Szeredi
- [PATCH v2 04/10] ovl: make ioctl() safe
Amir Goldstein
- [PATCH v2 04/10] ovl: make ioctl() safe
Miklos Szeredi
- [PATCH v2 04/10] ovl: make ioctl() safe
Amir Goldstein
- [PATCH v2 06/10] ovl: user xattr
Amir Goldstein
- [PATCH v2 06/10] ovl: user xattr
Miklos Szeredi
- [PATCH v2 08/10] ovl: do not fail because of O_NOATIME
Amir Goldstein
- [PATCH v2 08/10] ovl: do not fail because of O_NOATIME
Miklos Szeredi
- [PATCH v2 08/10] ovl: do not fail because of O_NOATIME
Amir Goldstein
- [PATCH v2 1/5] certs: Make blacklist_vet_description() more strict
Mickaël Salaün
- [PATCH v2 2/5] certs: Factor out the blacklist hash creation
Mickaël Salaün
- [PATCH v2 3/5] certs: Check that builtin blacklist hashes are valid
Mickaël Salaün
- [PATCH v23 02/23] LSM: Create and manage the lsmblob data structure.
Mimi Zohar
- [PATCH v23 02/23] LSM: Create and manage the lsmblob data structure.
Casey Schaufler
- [PATCH v23 02/23] LSM: Create and manage the lsmblob data structure.
Mimi Zohar
- [PATCH v23 02/23] LSM: Create and manage the lsmblob data structure.
Mimi Zohar
- [PATCH v23 02/23] LSM: Create and manage the lsmblob data structure.
Casey Schaufler
- [PATCH v23 02/23] LSM: Create and manage the lsmblob data structure.
Mimi Zohar
- [PATCH v23 02/23] LSM: Create and manage the lsmblob data structure.
Casey Schaufler
- [PATCH v23 02/23] LSM: Create and manage the lsmblob data structure.
Mimi Zohar
- [PATCH v23 02/23] LSM: Create and manage the lsmblob data structure.
Mimi Zohar
- [PATCH v23 02/23] LSM: Create and manage the lsmblob data structure.
Casey Schaufler
- [PATCH v23 02/23] LSM: Create and manage the lsmblob data structure.
Mimi Zohar
- [PATCH v2 4/5] certs: Allow root user to append signed hashes to the blacklist keyring
Mickaël Salaün
- [PATCH v2 5/5] tools/certs: Add print-cert-tbs-hash.sh
Mickaël Salaün
- [PATCH v26 00/12] Landlock LSM
Mickaël Salaün
- [PATCH v26 01/12] landlock: Add object management
Mickaël Salaün
- [PATCH v26 02/12] landlock: Add ruleset and domain management
Mickaël Salaün
- [PATCH v26 03/12] landlock: Set up the security framework and manage credentials
Mickaël Salaün
- [PATCH v26 04/12] landlock: Add ptrace restrictions
Mickaël Salaün
- [PATCH v26 05/12] LSM: Infrastructure management of the superblock
Mickaël Salaün
- [PATCH v26 06/12] fs,security: Add sb_delete hook
Mickaël Salaün
- [PATCH v26 07/12] landlock: Support filesystem access-control
Mickaël Salaün
- [PATCH v26 08/12] landlock: Add syscall implementations
Mickaël Salaün
- [PATCH v26 08/12] landlock: Add syscall implementations
Mickaël Salaün
- [PATCH v26 09/12] arch: Wire up Landlock syscalls
Mickaël Salaün
- [PATCH v26 10/12] selftests/landlock: Add user space tests
Mickaël Salaün
- [PATCH v26 11/12] samples/landlock: Add a sandbox manager example
Mickaël Salaün
- [PATCH v26 12/12] landlock: Add user and kernel documentation
Mickaël Salaün
- [PATCH v2] proc: Allow pid_revalidate() during LOOKUP_RCU
Matthew Wilcox
- [PATCH v2] proc: Allow pid_revalidate() during LOOKUP_RCU
Eric W. Biederman
- [PATCH v2] proc: Allow pid_revalidate() during LOOKUP_RCU
Eric W. Biederman
- [PATCH v2] proc: Allow pid_revalidate() during LOOKUP_RCU
Matthew Wilcox
- [PATCH v2] proc: Allow pid_revalidate() during LOOKUP_RCU
Matthew Wilcox
- [PATCH v2] proc: Allow pid_revalidate() during LOOKUP_RCU
Paul Moore
- [PATCH v2] proc: Allow pid_revalidate() during LOOKUP_RCU
Stephen Brennan
- [PATCH v2] proc: Allow pid_revalidate() during LOOKUP_RCU
Stephen Brennan
- [PATCH v2] proc: Allow pid_revalidate() during LOOKUP_RCU
Casey Schaufler
- [PATCH v2] proc: Allow pid_revalidate() during LOOKUP_RCU
Casey Schaufler
- [PATCH v2] proc: Allow pid_revalidate() during LOOKUP_RCU
Eric W. Biederman
- [PATCH v2] proc: Allow pid_revalidate() during LOOKUP_RCU
Eric W. Biederman
- [PATCH v2] proc: Allow pid_revalidate() during LOOKUP_RCU
Casey Schaufler
- [PATCH v2] proc: Allow pid_revalidate() during LOOKUP_RCU
Stephen Brennan
- [PATCH v2] security: apparmor: delete repeated words in comments
Randy Dunlap
- [PATCH v2] security: apparmor: delete repeated words in comments
John Johansen
- [PATCH v2] security: ima: delete a repeated word in comments
Randy Dunlap
- [PATCH v3 1/2] proc: Allow pid_revalidate() during LOOKUP_RCU
Stephen Brennan
- [PATCH v3 2/2] proc: ensure security hook is called after exec
Stephen Brennan
- [PATCH v4 05/40] fs: add attr_flags_to_mnt_flags helper
Christian Brauner
- [PATCH v4 06/40] fs: add mount_setattr()
Christian Brauner
- [PATCH v4 06/40] fs: add mount_setattr()
Christoph Hellwig
- [PATCH v4 06/40] fs: add mount_setattr()
Christian Brauner
- [PATCH v4 06/40] fs: add mount_setattr()
Christian Brauner
- [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
David Howells
- [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
Eric Snowberg
- [PATCH v7 0/8] IMA: support for measuring kernel integrity critical data
Tushar Sugandhi
- [PATCH v7 1/8] IMA: generalize keyring specific measurement constructs
Tushar Sugandhi
- [PATCH v7 1/8] IMA: generalize keyring specific measurement constructs
Tyler Hicks
- [PATCH v7 1/8] IMA: generalize keyring specific measurement constructs
Tushar Sugandhi
- [PATCH v7 2/8] IMA: add support to measure buffer data hash
Tushar Sugandhi
- [PATCH v7 2/8] IMA: add support to measure buffer data hash
Tyler Hicks
- [PATCH v7 2/8] IMA: add support to measure buffer data hash
Tushar Sugandhi
- [PATCH v7 2/8] IMA: add support to measure buffer data hash
Tyler Hicks
- [PATCH v7 3/8] IMA: define a hook to measure kernel integrity critical data
Tushar Sugandhi
- [PATCH v7 3/8] IMA: define a hook to measure kernel integrity critical data
Tyler Hicks
- [PATCH v7 3/8] IMA: define a hook to measure kernel integrity critical data
Tushar Sugandhi
- [PATCH v7 3/8] IMA: define a hook to measure kernel integrity critical data
Tushar Sugandhi
- [PATCH v7 4/8] IMA: add policy rule to measure critical data
Tushar Sugandhi
- [PATCH v7 4/8] IMA: add policy rule to measure critical data
Tyler Hicks
- [PATCH v7 4/8] IMA: add policy rule to measure critical data
Tushar Sugandhi
- [PATCH v7 5/8] IMA: limit critical data measurement based on a label
Tushar Sugandhi
- [PATCH v7 5/8] IMA: limit critical data measurement based on a label
Tyler Hicks
- [PATCH v7 5/8] IMA: limit critical data measurement based on a label
Tushar Sugandhi
- [PATCH v7 6/8] IMA: extend critical data hook to limit the measurement based on a label
Tushar Sugandhi
- [PATCH v7 6/8] IMA: extend critical data hook to limit the measurement based on a label
Tyler Hicks
- [PATCH v7 6/8] IMA: extend critical data hook to limit the measurement based on a label
Tushar Sugandhi
- [PATCH v7 7/8] IMA: define a builtin critical data measurement policy
Tushar Sugandhi
- [PATCH v7 7/8] IMA: define a builtin critical data measurement policy
Tyler Hicks
- [PATCH v7 7/8] IMA: define a builtin critical data measurement policy
Tushar Sugandhi
- [PATCH v7 8/8] selinux: include a consumer of the new IMA critical data hook
Tushar Sugandhi
- [PATCH v7 8/8] selinux: include a consumer of the new IMA critical data hook
Tyler Hicks
- [PATCH v7 8/8] selinux: include a consumer of the new IMA critical data hook
Tyler Hicks
- [PATCH v7 8/8] selinux: include a consumer of the new IMA critical data hook
Lakshmi Ramasubramanian
- [PATCH v8 0/4] Introduce TEE based Trusted Keys support
Sumit Garg
- [PATCH v8 0/8] IMA: support for measuring kernel integrity critical data
Tushar Sugandhi
- [PATCH v8 1/8] IMA: generalize keyring specific measurement constructs
Tushar Sugandhi
- [PATCH v8 1/8] IMA: generalize keyring specific measurement constructs
Tyler Hicks
- [PATCH v8 2/8] IMA: add support to measure buffer data hash
Tushar Sugandhi
- [PATCH v8 2/8] IMA: add support to measure buffer data hash
Tyler Hicks
- [PATCH v8 3/4] doc: trusted-encrypted: updates with TEE as a new trust source
Mimi Zohar
- [PATCH v8 3/4] doc: trusted-encrypted: updates with TEE as a new trust source
Mimi Zohar
- [PATCH v8 3/4] doc: trusted-encrypted: updates with TEE as a new trust source
Mimi Zohar
- [PATCH v8 3/4] doc: trusted-encrypted: updates with TEE as a new trust source
Jarkko Sakkinen
- [PATCH v8 3/4] doc: trusted-encrypted: updates with TEE as a new trust source
Mimi Zohar
- [PATCH v8 3/4] doc: trusted-encrypted: updates with TEE as a new trust source
Jarkko Sakkinen
- [PATCH v8 3/4] doc: trusted-encrypted: updates with TEE as a new trust source
Mimi Zohar
- [PATCH v8 3/8] IMA: define a hook to measure kernel integrity critical data
Tushar Sugandhi
- [PATCH v8 3/8] IMA: define a hook to measure kernel integrity critical data
Tyler Hicks
- [PATCH v8 4/8] IMA: add policy rule to measure critical data
Tushar Sugandhi
- [PATCH v8 4/8] IMA: add policy rule to measure critical data
Tyler Hicks
- [PATCH v8 4/8] IMA: add policy rule to measure critical data
Tushar Sugandhi
- [PATCH v8 4/8] IMA: add policy rule to measure critical data
Tyler Hicks
- [PATCH v8 4/8] IMA: add policy rule to measure critical data
Tushar Sugandhi
- [PATCH v8 5/8] IMA: limit critical data measurement based on a label
Tushar Sugandhi
- [PATCH v8 6/8] IMA: extend critical data hook to limit the measurement based on a label
Tushar Sugandhi
- [PATCH v8 7/8] IMA: define a builtin critical data measurement policy
Tushar Sugandhi
- [PATCH v8 8/8] selinux: include a consumer of the new IMA critical data hook
Tushar Sugandhi
- [PATCH v8 8/8] selinux: include a consumer of the new IMA critical data hook
Tyler Hicks
- [PATCH v8 8/8] selinux: include a consumer of the new IMA critical data hook
Lakshmi Ramasubramanian
- [PATCH v9 0/8] IMA: support for measuring kernel integrity critical data
Tushar Sugandhi
- [PATCH v9 1/8] IMA: generalize keyring specific measurement constructs
Tushar Sugandhi
- [PATCH v9 1/8] IMA: generalize keyring specific measurement constructs
Mimi Zohar
- [PATCH v9 2/8] IMA: add support to measure buffer data hash
Tushar Sugandhi
- [PATCH v9 2/8] IMA: add support to measure buffer data hash
Mimi Zohar
- [PATCH v9 3/8] IMA: define a hook to measure kernel integrity critical data
Tushar Sugandhi
- [PATCH v9 3/8] IMA: define a hook to measure kernel integrity critical data
Mimi Zohar
- [PATCH v9 4/8] IMA: add policy rule to measure critical data
Tushar Sugandhi
- [PATCH v9 4/8] IMA: add policy rule to measure critical data
Tyler Hicks
- [PATCH v9 4/8] IMA: add policy rule to measure critical data
Tushar Sugandhi
- [PATCH v9 4/8] IMA: add policy rule to measure critical data
Mimi Zohar
- [PATCH v9 5/8] IMA: limit critical data measurement based on a label
Tushar Sugandhi
- [PATCH v9 5/8] IMA: limit critical data measurement based on a label
Tyler Hicks
- [PATCH v9 5/8] IMA: limit critical data measurement based on a label
Tushar Sugandhi
- [PATCH v9 5/8] IMA: limit critical data measurement based on a label
Mimi Zohar
- [PATCH v9 6/8] IMA: extend critical data hook to limit the measurement based on a label
Tushar Sugandhi
- [PATCH v9 7/8] IMA: define a builtin critical data measurement policy
Tushar Sugandhi
- [PATCH v9 7/8] IMA: define a builtin critical data measurement policy
Mimi Zohar
- [PATCH v9 8/8] selinux: include a consumer of the new IMA critical data hook
Tushar Sugandhi
- [PATCH v9 8/8] selinux: include a consumer of the new IMA critical data hook
Paul Moore
- [SECURITY] fix namespaced fscaps when !CONFIG_SECURITY
James Morris
- Disinfection
Diego Sánchez
- failed open: No data available
Amir Goldstein
- failed open: No data available
Michael Labriola
- failed open: No data available
Paul Moore
- failed open: No data available
Amir Goldstein
- I am Vice Chairman of Hang Seng Bank, Dr. Raymond Chien Kuo Fung I have Important Matter to Discuss with you concerning my late client. Died without a NEXT OF KIN. Send me your private email for full details information.
Raymond
- I am Vice Chairman of Hang Seng Bank, Dr. Raymond Chien Kuo Fung I have Important Matter to Discuss with you concerning my late client. Died without a NEXT OF KIN. Send me your private email for full details information.
Dr.Raymond
- MOK variable config table: Kernel Panic in SEV-enabled VMs
Hyunwook (Wooky) Baek
- MOK variable config table: Kernel Panic in SEV-enabled VMs
Lenny Szubowicz
- Sie haben eine Spende von € 5.800.000,00.
Mrs. Mavis
- Vital
Russell Branting
- Vital
Russell Branting
- Wir bieten Ihnen das beste Darlehen Deal 2%
James Charlton
Last message date:
Wed Dec 30 22:42:59 UTC 2020
Archived on: Thu Dec 31 03:19:21 UTC 2020
This archive was generated by
Pipermail 0.09 (Mailman edition).