November 2020 Archives by thread
Starting: Sun Nov 1 14:41:08 UTC 2020
Ending: Mon Nov 30 22:52:04 UTC 2020
Messages: 600
- [PATCH 01/34] namespace: take lock_mount_hash() directly when changing flags
Christoph Hellwig
- [PATCH 03/34] fs: add mount_setattr()
Christoph Hellwig
- [PATCH 05/34] fs: introduce MOUNT_ATTR_IDMAP
Christoph Hellwig
- [PATCH 06/34] fs: add id translation helpers
Christoph Hellwig
- [PATCH 07/34] capability: handle idmapped mounts
Christoph Hellwig
- [PATCH v5 0/7] IMA: Infrastructure for measurement of critical kernel data
Tushar Sugandhi
- [PATCH v3 1/3] efi: generalize efi_get_secureboot
Chester Lin
- [PATCH v3 3/3] arm64/ima: add ima_arch support
Chester Lin
- Buggy commit tracked to: "Re: [PATCH 2/9] iov_iter: move rw_copy_check_uvector() into lib/iov_iter.c"
David Laight
- [PATCH v3 1/2] security: add fault injection capability
Marco Elver
- [PATCH 00/34] fs: idmapped mounts
Alban Crequy
- [PATCH v8 0/4] Introduce TEE based Trusted Keys support
Sumit Garg
- [PATCH v22 07/12] landlock: Support filesystem access-control
Mickaël Salaün
- [PATCH v23 00/12] Landlock LSM
Mickaël Salaün
- [PATCH v10 0/3] SELinux support for anonymous inodes and UFFD
Lokesh Gidra
- [PATCH v10 1/3] Add a new LSM-supporting anonymous inode interface
Lokesh Gidra
- [PATCH v10 2/3] Teach SELinux about anonymous inodes
Lokesh Gidra
- [PATCH v10 3/3] Use secure anon inodes for userfaultfd
Lokesh Gidra
- [PATCH v4 1/3,RESEND 2] KEYS: trusted: Fix incorrect handling of tpm_get_random()
Jarkko Sakkinen
- [PATCH v4 2/3,RESEND 2] KEYS: trusted: Fix migratable=1 failing
Jarkko Sakkinen
- [PATCH v4 3/3,RESEND 2] KEYS: trusted: Reserve TPM for seal and unseal operations
Jarkko Sakkinen
- selinux: how to query if selinux is enabled
Olga Kornievskaia
- [PATCH v40 11/24] x86/sgx: Add SGX misc driver interface
Jarkko Sakkinen
- [PATCH v40 15/24] x86/sgx: Add SGX_IOC_ENCLAVE_PROVISION
Jarkko Sakkinen
- [RFC PATCH 2/3] gtp: Add LSM hooks to GPRS Tunneling Protocol (GTP)
Richard Haines
- [PATCH v10 0/3] SELinux support for anonymous inodes and UFFD
Eric Biggers
- [PATCH v10 1/3] Add a new LSM-supporting anonymous inode interface
Eric Biggers
- [PATCH v10 3/3] Use secure anon inodes for userfaultfd
Eric Biggers
- [PATCH v22 00/23] LSM: Module stacking for AppArmor
Casey Schaufler
- [PATCH v22 00/23] LSM: Module stacking for AppArmor
Casey Schaufler
- [PATCH 1/2] [lsm] introduce a new hook to query LSM for functionality
Olga Kornievskaia
- [PATCH] mm, hugetlb: Avoid double clearing for hugetlb pages
Guilherme G. Piccoli
- [PATCH v11 0/4] SELinux support for anonymous inodes and UFFD
Lokesh Gidra
- [PATCH v2 0/8] Fork brute force attack mitigation
John Wood
- [PATCH v12 0/4] SELinux support for anonymous inodes and UFFD
Lokesh Gidra
- [PATCH 1/2] tomoyo: Convert get_user_pages*() to pin_user_pages*()
Souptick Joarder
- [PATCH] security/smack: remove unused varible 'rc'
Alex Shi
- [PATCH] netlabel: fix our progress tracking in netlbl_unlabel_staticlist()
Paul Moore
- [RFC PATCH 0/1] selinux-testsuite: Add GTP tests
Richard Haines
- [PATCH v2 7/8] Documentation: Add documentation for the Brute LSM
Randy Dunlap
- [PATCH v3 0/2] security: add fault injection to LSM hooks
Aleksandr Nogikh
- [PATCH v3 1/2] security: add fault injection capability
Tetsuo Handa
- [security:landlock_lsm 8/12] security/landlock/syscall.c:216:13: warning: Uninitialized variable: ruleset
kernel test robot
- Corporate and Personal Loan/
Investment Corporate
- [RFC PATCH] docs: ABI: ABI documentation for procfs attribute files used by multiple LSMs
Casey Schaufler
- [PATCH v3 1/2] security: add fault injection capability
Andrey Konovalov
- [PATCH 00/13] Introduce seqnum_ops
Shuah Khan
- [PATCH 13/13] security/integrity/ima: converts stats to seqnum_ops
Shuah Khan
- [PATCH v2 0/8] Fork brute force attack mitigation
Kees Cook
- Corporate and Personal Loan *
Investment Corporate
- [PATCH v3 00/11] evm: Improve usability of portable signatures
Roberto Sassu
- [PATCH v4 0/2] security: add fault injection to LSM hooks
Aleksandr Nogikh
- [PATCH] tomoyo: fix clang pointer arithmetic warning
Nick Desaulniers
- [PATCH v1 0/9] Landlock fixes
Mickaël Salaün
- [PATCH v1 2/9] landlock: Cosmetic fixes for filesystem management
Mickaël Salaün
- [PATCH v1 9/9] landlock: Extend documentation about limitations
Mickaël Salaün
- Smack kernel test suite
Casey Schaufler
- [PATCH v13 0/4] SELinux support for anonymous inodes and UFFD
Lokesh Gidra
- [PATCH v13 1/4] security: add inode_init_security_anon() LSM hook
Lokesh Gidra
- [PATCH v13 2/4] fs: add LSM-supporting anon-inode interface
Lokesh Gidra
- [PATCH v13 3/4] selinux: teach SELinux about anonymous inodes
Lokesh Gidra
- [PATCH v13 4/4] userfaultfd: use secure anon inodes for userfaultfd
Lokesh Gidra
- [PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
Roberto Sassu
- [PATCH v24 00/12] Landlock LSM
Mickaël Salaün
- [PATCH v24 01/12] landlock: Add object management
Mickaël Salaün
- [PATCH v24 02/12] landlock: Add ruleset and domain management
Mickaël Salaün
- [PATCH v24 03/12] landlock: Set up the security framework and manage credentials
Mickaël Salaün
- [PATCH v24 04/12] landlock: Add ptrace restrictions
Mickaël Salaün
- [PATCH v24 05/12] LSM: Infrastructure management of the superblock
Mickaël Salaün
- [PATCH v24 06/12] fs,security: Add sb_delete hook
Mickaël Salaün
- [PATCH v24 07/12] landlock: Support filesystem access-control
Mickaël Salaün
- [PATCH v24 08/12] landlock: Add syscall implementations
Mickaël Salaün
- [PATCH v24 09/12] arch: Wire up Landlock syscalls
Mickaël Salaün
- [PATCH v24 10/12] selftests/landlock: Add user space tests
Mickaël Salaün
- [PATCH v24 11/12] samples/landlock: Add a sandbox manager example
Mickaël Salaün
- [PATCH v24 12/12] landlock: Add user and kernel documentation
Mickaël Salaün
- [PATCH v41 11/24] x86/sgx: Add SGX misc driver interface
Jarkko Sakkinen
- [PATCH v41 15/24] x86/sgx: Add SGX_IOC_ENCLAVE_PROVISION
Jarkko Sakkinen
- general protection fault in tomoyo_socket_sendmsg_permission
syzbot
- [PATCH] Smack: fix kernel-doc interface on functions
Alex Shi
- [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
Roberto Sassu
- Corporate and Personal Loan::,
Investment Corporate
- Corporate and Personal Loan::,
Investment Corporate
- general protection fault in tomoyo_socket_sendmsg_permission
Shuah Khan
- [PATCH v2 00/13] Introduce seqnum_ops
Shuah Khan
- [PATCH] netlabel: fix an uninitialized warning in netlbl_unlabel_staticlist()
Paul Moore
- [GIT PULL] SELinux fixes for v5.10 (#1)
Paul Moore
- [PATCH v2 00/39] fs: idmapped mounts
Christian Brauner
- [PATCH v2 01/39] namespace: take lock_mount_hash() directly when changing flags
Christian Brauner
- [PATCH v2 02/39] mount: make {lock,unlock}_mount_hash() static
Christian Brauner
- Rabotu i Rabotnikov ishhite na BIRZhAH FRILANSA
qcsp_educ_ph at yahoo.com.ph
- Corporate and Personal Loan *
Investment Corporate
- Spende
Maria Elisabeth
- [PATCH v22 01/12] landlock: Add object management
Mickaël Salaün
- [PATCH cryptodev] crypto: lib/chacha20poly1305 - allow users to specify 96bit nonce
Antonio Quartulli
- [PATCH] xfrm: redact SA secret with lockdown confidentiality
Antony Antony
- [PATCH ipsec-next v5] xfrm: redact SA secret with lockdown confidentiality
Antony Antony
- Corporate and Personal Loan *
Investment Corporate
- [PATCH] vfs: fix fsconfig(2) LSM mount option handling for btrfs
Ondrej Mosnacek
- Question about security_file_open contract
Martin Kelly
- Question about security_file_open contract
Martin Kelly
- [PATCH] lsm,selinux: pass flowi_common instead of flowi to the LSM hooks
Paul Moore
- [PATCH v6 0/8] IMA: support for measuring kernel integrity critical data
Tushar Sugandhi
- [PATCH] fix namespaced fscaps when !CONFIG_SECURITY
James Morris
- [PATCH] fix namespaced fscaps when !CONFIG_SECURITY
James Morris
- [PATCH] fix namespaced fscaps when !CONFIG_SECURITY
James Morris
- [PATCH bpf-next 1/3] ima: Implement ima_inode_hash
KP Singh
- [PATCH v1 0/9] Enable root to update the blacklist keyring
Mickaël Salaün
- [PATCH v1 1/9] certs: Fix blacklisted hexadecimal hash string check
Mickaël Salaün
- [PATCH 010/141] ima: Fix fall-through warnings for Clang
Gustavo A. R. Silva
- [PATCH 052/141] security: keys: Fix fall-through warnings for Clang
Gustavo A. R. Silva
- [PATCH v22 00/23] LSM: Module stacking for AppArmor
Casey Schaufler
- [PATCH v2 39/39] tests: add vfs/idmapped mounts test suite
Kees Cook
- [PATCH bpf-next v2 1/3] ima: Implement ima_inode_hash
KP Singh
- [PATCH bpf-next v2 3/3] bpf: Update LSM selftests for bpf_ima_inode_hash
KP Singh
- [PATCH v6 0/8] IMA: support for measuring kernel integrity critical data
Tushar Sugandhi
- Hello !!
Adelina Zeuki
- [PATCH v6 0/8] IMA: support for measuring kernel integrity critical data
Mimi Zohar
- [PATCH v6 0/8] IMA: support for measuring kernel integrity critical data
Mimi Zohar
- [PATCH bpf-next v3 0/3] Implement bpf_ima_inode_hash
KP Singh
- [PATCH] tomoyo: Avoid potential null pointer access
Zheng Zengkai
- Please reply to me
Dailborh R.
- [PATCH] ima: Don't modify file descriptor mode on the fly
Roberto Sassu
- [PATCH] tomoyo: Fix null pointer check
Zheng Zengkai
- [PATCH 0/9] keys: Miscellaneous fixes
David Howells
- [PATCH v3 00/38] idmapped mounts
Christian Brauner
- [PATCH v3 01/38] namespace: take lock_mount_hash() directly when changing flags
Christian Brauner
- [PATCH v3 02/38] mount: make {lock,unlock}_mount_hash() static
Christian Brauner
- [PATCH v3 03/38] namespace: only take read lock in do_reconfigure_mnt()
Christian Brauner
- [PATCH v3 04/38] fs: add mount_setattr()
Christian Brauner
- [PATCH v3 05/38] tests: add mount_setattr() selftests
Christian Brauner
- [PATCH v3 06/38] fs: add id translation helpers
Christian Brauner
- [PATCH v3 08/38] capability: handle idmapped mounts
Christian Brauner
- [PATCH v3 09/38] namei: add idmapped mount aware permission helpers
Christian Brauner
- [PATCH v3 10/38] inode: add idmapped mount aware init and permission helpers
Christian Brauner
- [PATCH v3 11/38] attr: handle idmapped mounts
Christian Brauner
- [PATCH v3 12/38] acl: handle idmapped mounts
Christian Brauner
- [PATCH v3 13/38] xattr: handle idmapped mounts
Christian Brauner
- [PATCH v3 14/38] commoncap: handle idmapped mounts
Christian Brauner
- [PATCH v3 15/38] stat: handle idmapped mounts
Christian Brauner
- [PATCH v3 16/38] namei: handle idmapped mounts in may_*() helpers
Christian Brauner
- [PATCH v3 17/38] namei: introduce struct renamedata
Christian Brauner
- [PATCH v3 18/38] namei: prepare for idmapped mounts
Christian Brauner
- [PATCH v3 19/38] open: handle idmapped mounts in do_truncate()
Christian Brauner
- [PATCH v3 20/38] open: handle idmapped mounts
Christian Brauner
- [PATCH v3 21/38] af_unix: handle idmapped mounts
Christian Brauner
- [PATCH v3 22/38] utimes: handle idmapped mounts
Christian Brauner
- [PATCH v3 23/38] fcntl: handle idmapped mounts
Christian Brauner
- [PATCH v3 24/38] notify: handle idmapped mounts
Christian Brauner
- [PATCH v3 25/38] init: handle idmapped mounts
Christian Brauner
- [PATCH v3 26/38] ioctl: handle idmapped mounts
Christian Brauner
- [PATCH v3 27/38] would_dump: handle idmapped mounts
Christian Brauner
- [PATCH v3 28/38] exec: handle idmapped mounts
Christian Brauner
- [PATCH v3 30/38] apparmor: handle idmapped mounts
Christian Brauner
- [PATCH v3 31/38] ima: handle idmapped mounts
Christian Brauner
- [PATCH v3 32/38] fat: handle idmapped mounts
Christian Brauner
- [PATCH v3 33/38] ext4: support idmapped mounts
Christian Brauner
- [PATCH v3 34/38] ecryptfs: do not mount on top of idmapped mounts
Christian Brauner
- [PATCH v3 35/38] overlayfs: do not mount on top of idmapped mounts
Christian Brauner
- [PATCH v3 36/38] fs: introduce MOUNT_ATTR_IDMAP
Christian Brauner
- [PATCH v3 37/38] tests: extend mount_setattr tests
Christian Brauner
- [PATCH AUTOSEL 5.7 03/30] ima: extend boot_aggregate with kernel measurements
Mimi Zohar
- [PATCH net-next 0/3] mptcp: reject invalid mp_join requests right away
Florian Westphal
- [PATCH] proc: Allow pid_revalidate() during LOOKUP_RCU
Stephen Brennan
Last message date:
Mon Nov 30 22:52:04 UTC 2020
Archived on: Mon Nov 30 22:54:24 UTC 2020
This archive was generated by
Pipermail 0.09 (Mailman edition).