January 2021 Archives by subject
Starting: Fri Jan 1 17:35:16 UTC 2021
Ending: Sun Jan 31 18:14:39 UTC 2021
Messages: 544
- [PATCH 0/2] capability conversion fixes
Miklos Szeredi
- [PATCH 0/2] capability conversion fixes
Eric W. Biederman
- [PATCH 0/2] capability conversion fixes
Miklos Szeredi
- [PATCH 0/3] support for duplicate measurement of integrity critical data
Tushar Sugandhi
- [PATCH 05/11] iov_iter: merge the compat case into rw_copy_check_uvector
David Laight
- [PATCH 1/1] process_madvise.2: Add process_madvise man page
Suren Baghdasaryan
- [PATCH 1/1] process_madvise.2: Add process_madvise man page
Michal Hocko
- [PATCH 1/1] process_madvise.2: Add process_madvise man page
Suren Baghdasaryan
- [PATCH 1/1] process_madvise.2: Add process_madvise man page
Michael Kerrisk (man-pages)
- [PATCH 1/1] process_madvise.2: Add process_madvise man page
Michael Kerrisk (man-pages)
- [PATCH 1/1] process_madvise.2: Add process_madvise man page
Suren Baghdasaryan
- [PATCH 1/1] process_madvise.2: Add process_madvise man page
Suren Baghdasaryan
- [PATCH 1/2] ecryptfs: fix uid translation for setxattr on security.capability
Miklos Szeredi
- [PATCH 1/2] ecryptfs: fix uid translation for setxattr on security.capability
Eric W. Biederman
- [PATCH 1/2] ecryptfs: fix uid translation for setxattr on security.capability
Miklos Szeredi
- [PATCH 1/2] ecryptfs: fix uid translation for setxattr on security.capability
Tyler Hicks
- [PATCH 1/2] ecryptfs: fix uid translation for setxattr on security.capability
Tyler Hicks
- [PATCH 1/2] ecryptfs: fix uid translation for setxattr on security.capability
Miklos Szeredi
- [PATCH 1/2] ecryptfs: fix uid translation for setxattr on security.capability
Miklos Szeredi
- [PATCH 1/2] ecryptfs: fix uid translation for setxattr on security.capability
Tyler Hicks
- [PATCH 1/3] IMA: add policy condition to measure duplicate critical data
Tushar Sugandhi
- [PATCH 2/2] security.capability: fix conversions on getxattr
Miklos Szeredi
- [PATCH 2/2] security.capability: fix conversions on getxattr
Eric W. Biederman
- [PATCH 2/2] security.capability: fix conversions on getxattr
Miklos Szeredi
- [PATCH 2/2] security.capability: fix conversions on getxattr
kernel test robot
- [PATCH 2/2] security.capability: fix conversions on getxattr
kernel test robot
- [PATCH 2/2] security.capability: fix conversions on getxattr
Serge E. Hallyn
- [PATCH 2/2] security.capability: fix conversions on getxattr
Eric W. Biederman
- [PATCH 2/2] security.capability: fix conversions on getxattr
Miklos Szeredi
- [PATCH 2/2] security.capability: fix conversions on getxattr
Eric W. Biederman
- [PATCH 2/2] security.capability: fix conversions on getxattr
Eric W. Biederman
- [PATCH 2/2] security.capability: fix conversions on getxattr
Eric W. Biederman
- [PATCH 2/2] security.capability: fix conversions on getxattr
Serge E. Hallyn
- [PATCH 2/2] security.capability: fix conversions on getxattr
Serge E. Hallyn
- [PATCH 2/2] security.capability: fix conversions on getxattr
Eric W. Biederman
- [PATCH 2/3] IMA: update functions to read allow_dup policy condition
Tushar Sugandhi
- [PATCH 3/3] IMA: add support to measure duplicate buffer for critical data hook
Tushar Sugandhi
- [PATCH] [v2] evm: Fix memleak in init_desc
Dinghao Liu
- [PATCH] [v2] evm: Fix memleak in init_desc
Mimi Zohar
- [PATCH] certs: Add EFI_CERT_X509_GUID support for dbx entries
David Howells
- [PATCH] certs: Add EFI_CERT_X509_GUID support for dbx entries
David Howells
- [PATCH] certs: Add EFI_CERT_X509_GUID support for dbx entries
James Bottomley
- [PATCH] evm: Fix memleak in init_desc
Dinghao Liu
- [PATCH] evm: Fix memleak in init_desc
Eric Biggers
- [PATCH] evm: Fix memleak in init_desc
dinghao.liu at zju.edu.cn
- [PATCH] evm: Fix memleak in init_desc
Eric Biggers
- [PATCH] evm: Fix memleak in init_desc
dinghao.liu at zju.edu.cn
- [PATCH] fs: anon_inodes: rephrase to appropriate kernel-doc
Lukas Bulwahn
- [PATCH] fs: anon_inodes: rephrase to appropriate kernel-doc
Paul Moore
- [PATCH] linux: handle MPTCP consistently with TCP
Paul Moore
- [PATCH] NFSv4.2: fix return value of _nfs4_get_security_label()
Ondrej Mosnacek
- [PATCH] NFSv4.2: fix return value of _nfs4_get_security_label()
James Morris
- [PATCH] NFSv4.2: fix return value of _nfs4_get_security_label()
Paul Moore
- [PATCH] selinux: fix inconsistency between inode_getxattr and inode_listsecurity
Ondrej Mosnacek
- [PATCH] selinux: fix inconsistency between inode_getxattr and inode_listsecurity
Paul Moore
- [PATCH] selinux: include a consumer of the new IMA critical data hook
Lakshmi Ramasubramanian
- [PATCH] selinux: include a consumer of the new IMA critical data hook
Paul Moore
- [PATCH] selinux: include a consumer of the new IMA critical data hook
Tyler Hicks
- [PATCH] selinux: include a consumer of the new IMA critical data hook
Lakshmi Ramasubramanian
- [PATCH] selinux: include a consumer of the new IMA critical data hook
Paul Moore
- [PATCH] selinux: include a consumer of the new IMA critical data hook
Mimi Zohar
- [PATCH] selinux: measure state and policy capabilities
Lakshmi Ramasubramanian
- [PATCH] selinux: measure state and policy capabilities
Paul Moore
- [PATCH] selinux: measure state and policy capabilities
Lakshmi Ramasubramanian
- [PATCH] selinux: measure state and policy capabilities
Paul Moore
- [PATCH] smackfs: restrict bytes count in smackfs write functions
Sabyrzhan Tasbolatov
- [PATCH] smackfs: restrict bytes count in smackfs write functions
Casey Schaufler
- [PATCH] smackfs: restrict bytes count in smackfs write functions
Tetsuo Handa
- [PATCH] vfs: fix fsconfig(2) LSM mount option handling for btrfs
Paul Moore
- [PATCH] X.509: Fix crash caused by NULL pointer
David Howells
- [PATCH] X.509: Fix crash caused by NULL pointer
David Howells
- [PATCH] X.509: Fix crash caused by NULL pointer
David Howells
- [PATCH AUTOSEL 5.7 03/30] ima: extend boot_aggregate with kernel measurements
Tyler Hicks
- [PATCH AUTOSEL 5.7 03/30] ima: extend boot_aggregate with kernel measurements
Mimi Zohar
- [PATCH v10 0/8] IMA: support for measuring kernel integrity critical data
Tushar Sugandhi
- [PATCH v10 0/8] IMA: support for measuring kernel integrity critical data
Mimi Zohar
- [PATCH v10 0/8] IMA: support for measuring kernel integrity critical data
Tushar Sugandhi
- [PATCH v10 1/8] IMA: generalize keyring specific measurement constructs
Tushar Sugandhi
- [PATCH v10 2/8] IMA: add support to measure buffer data hash
Tushar Sugandhi
- [PATCH v10 3/8] IMA: define a hook to measure kernel integrity critical data
Tushar Sugandhi
- [PATCH v10 4/8] IMA: add policy rule to measure critical data
Tushar Sugandhi
- [PATCH v10 5/8] IMA: limit critical data measurement based on a label
Tushar Sugandhi
- [PATCH v10 5/8] IMA: limit critical data measurement based on a label
Mimi Zohar
- [PATCH v10 5/8] IMA: limit critical data measurement based on a label
Tushar Sugandhi
- [PATCH v10 6/8] IMA: extend critical data hook to limit the measurement based on a label
Tushar Sugandhi
- [PATCH v10 7/8] IMA: define a builtin critical data measurement policy
Tushar Sugandhi
- [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
Tushar Sugandhi
- [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
Paul Moore
- [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
Lakshmi Ramasubramanian
- [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
Mimi Zohar
- [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
Paul Moore
- [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
Mimi Zohar
- [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
Paul Moore
- [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
Mimi Zohar
- [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
Paul Moore
- [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
Mimi Zohar
- [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
Lakshmi Ramasubramanian
- [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
Mimi Zohar
- [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
Mimi Zohar
- [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
Paul Moore
- [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
Lakshmi Ramasubramanian
- [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
Lakshmi Ramasubramanian
- [PATCH v13 2/4] fs: add LSM-supporting anon-inode interface
Paul Moore
- [PATCH v13 2/4] fs: add LSM-supporting anon-inode interface
dancol
- [PATCH v13 2/4] fs: add LSM-supporting anon-inode interface
Lokesh Gidra
- [PATCH v13 2/4] fs: add LSM-supporting anon-inode interface
Paul Moore
- [PATCH v13 2/4] fs: add LSM-supporting anon-inode interface
Paul Moore
- [PATCH v13 3/4] selinux: teach SELinux about anonymous inodes
Paul Moore
- [PATCH v13 3/4] selinux: teach SELinux about anonymous inodes
Lokesh Gidra
- [PATCH v13 3/4] selinux: teach SELinux about anonymous inodes
Paul Moore
- [PATCH v13 3/4] selinux: teach SELinux about anonymous inodes
Lokesh Gidra
- [PATCH v13 3/4] selinux: teach SELinux about anonymous inodes
Stephen Smalley
- [PATCH v13 3/4] selinux: teach SELinux about anonymous inodes
Lokesh Gidra
- [PATCH v13 3/4] selinux: teach SELinux about anonymous inodes
Paul Moore
- [PATCH v13 3/4] selinux: teach SELinux about anonymous inodes
Stephen Smalley
- [PATCH v13 3/4] selinux: teach SELinux about anonymous inodes
Lokesh Gidra
- [PATCH v14 0/4] SELinux support for anonymous inodes and UFFD
Lokesh Gidra
- [PATCH v14 1/4] security: add inode_init_security_anon() LSM hook
Lokesh Gidra
- [PATCH v14 2/4] fs: add LSM-supporting anon-inode interface
Lokesh Gidra
- [PATCH v14 3/4] selinux: teach SELinux about anonymous inodes
Lokesh Gidra
- [PATCH v14 3/4] selinux: teach SELinux about anonymous inodes
Stephen Smalley
- [PATCH v14 4/4] userfaultfd: use secure anon inodes for userfaultfd
Lokesh Gidra
- [PATCH v15 0/4] SELinux support for anonymous inodes and UFFD
Lokesh Gidra
- [PATCH v15 0/4] SELinux support for anonymous inodes and UFFD
Paul Moore
- [PATCH v15 0/4] SELinux support for anonymous inodes and UFFD
Paul Moore
- [PATCH v15 0/4] SELinux support for anonymous inodes and UFFD
Lokesh Gidra
- [PATCH v15 1/4] security: add inode_init_security_anon() LSM hook
Lokesh Gidra
- [PATCH v15 2/4] fs: add LSM-supporting anon-inode interface
Lokesh Gidra
- [PATCH v15 3/4] selinux: teach SELinux about anonymous inodes
Lokesh Gidra
- [PATCH v15 4/4] userfaultfd: use secure anon inodes for userfaultfd
Lokesh Gidra
- [PATCH v1] efi: Don't use knowledge about efi_guid_t internals
Andy Shevchenko
- [PATCH v2 0/5] Enable root to update the blacklist keyring
Mickaël Salaün
- [PATCH v2 0/5] Enable root to update the blacklist keyring
Jarkko Sakkinen
- [PATCH v2 0/5] Enable root to update the blacklist keyring
Jarkko Sakkinen
- [PATCH v2 01/10] vfs: move cap_convert_nscap() call into vfs_setxattr()
Eric W. Biederman
- [PATCH v2 01/10] vfs: move cap_convert_nscap() call into vfs_setxattr()
Miklos Szeredi
- [PATCH v2 01/10] vfs: move cap_convert_nscap() call into vfs_setxattr()
Eric W. Biederman
- [PATCH v2 01/10] vfs: move cap_convert_nscap() call into vfs_setxattr()
Miklos Szeredi
- [PATCH v2 01/10] vfs: move cap_convert_nscap() call into vfs_setxattr()
Miklos Szeredi
- [PATCH v2 01/10] vfs: move cap_convert_nscap() call into vfs_setxattr()
Eric W. Biederman
- [PATCH v2 01/10] vfs: move cap_convert_nscap() call into vfs_setxattr()
Eric W. Biederman
- [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
James Morris
- [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
Jann Horn
- [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
Suren Baghdasaryan
- [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
Suren Baghdasaryan
- [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
Suren Baghdasaryan
- [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
Michal Hocko
- [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
Suren Baghdasaryan
- [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
Suren Baghdasaryan
- [PATCH v2 1/1] process_madvise.2: Add process_madvise man page
Suren Baghdasaryan
- [PATCH v2 1/1] process_madvise.2: Add process_madvise man page
Suren Baghdasaryan
- [PATCH v2 1/1] process_madvise.2: Add process_madvise man page
Michael Kerrisk (man-pages)
- [PATCH v24 00/25] LSM: Module stacking for AppArmor
Casey Schaufler
- [PATCH v24 01/25] LSM: Infrastructure management of the sock security
Casey Schaufler
- [PATCH v24 02/25] LSM: Add the lsmblob data structure.
Casey Schaufler
- [PATCH v24 03/25] LSM: provide lsm name and id slot mappings
Casey Schaufler
- [PATCH v24 04/25] IMA: avoid label collisions with stacked LSMs
Casey Schaufler
- [PATCH v24 05/25] LSM: Use lsmblob in security_audit_rule_match
Casey Schaufler
- [PATCH v24 06/25] LSM: Use lsmblob in security_kernel_act_as
Casey Schaufler
- [PATCH v24 07/25] LSM: Use lsmblob in security_secctx_to_secid
Casey Schaufler
- [PATCH v24 08/25] LSM: Use lsmblob in security_secid_to_secctx
Casey Schaufler
- [PATCH v24 09/25] LSM: Use lsmblob in security_ipc_getsecid
Casey Schaufler
- [PATCH v24 10/25] LSM: Use lsmblob in security_task_getsecid
Casey Schaufler
- [PATCH v24 11/25] LSM: Use lsmblob in security_inode_getsecid
Casey Schaufler
- [PATCH v24 12/25] LSM: Use lsmblob in security_cred_getsecid
Casey Schaufler
- [PATCH v24 13/25] IMA: Change internal interfaces to use lsmblobs
Casey Schaufler
- [PATCH v24 14/25] LSM: Specify which LSM to display
Casey Schaufler
- [PATCH v24 15/25] LSM: Ensure the correct LSM context releaser
Casey Schaufler
- [PATCH v24 16/25] LSM: Use lsmcontext in security_secid_to_secctx
Casey Schaufler
- [PATCH v24 17/25] LSM: Use lsmcontext in security_inode_getsecctx
Casey Schaufler
- [PATCH v24 18/25] LSM: security_secid_to_secctx in netlink netfilter
Casey Schaufler
- [PATCH v24 19/25] NET: Store LSM netlabel data in a lsmblob
Casey Schaufler
- [PATCH v24 20/25] LSM: Verify LSM display sanity in binder
Casey Schaufler
- [PATCH v24 21/25] audit: add support for non-syscall auxiliary records
Casey Schaufler
- [PATCH v24 21/25] audit: add support for non-syscall auxiliary records
Richard Guy Briggs
- [PATCH v24 21/25] audit: add support for non-syscall auxiliary records
Casey Schaufler
- [PATCH v24 21/25] audit: add support for non-syscall auxiliary records
Paul Moore
- [PATCH v24 21/25] audit: add support for non-syscall auxiliary records
Richard Guy Briggs
- [PATCH v24 22/25] Audit: Add new record for multiple process LSM attributes
Casey Schaufler
- [PATCH v24 23/25] Audit: Add a new record for multiple object LSM attributes
Casey Schaufler
- [PATCH v24 24/25] LSM: Add /proc attr entry for full LSM context
Casey Schaufler
- [PATCH v24 25/25] AppArmor: Remove the exclusive flag
Casey Schaufler
- [PATCH v26 00/12] Landlock LSM
Jann Horn
- [PATCH v26 00/12] Landlock LSM
Mickaël Salaün
- [PATCH v26 02/12] landlock: Add ruleset and domain management
Jann Horn
- [PATCH v26 07/12] landlock: Support filesystem access-control
Jann Horn
- [PATCH v26 07/12] landlock: Support filesystem access-control
Mickaël Salaün
- [PATCH v26 07/12] landlock: Support filesystem access-control
Jann Horn
- [PATCH v26 07/12] landlock: Support filesystem access-control
Mickaël Salaün
- [PATCH v26 07/12] landlock: Support filesystem access-control
Jann Horn
- [PATCH v26 07/12] landlock: Support filesystem access-control
Mickaël Salaün
- [PATCH v26 11/12] samples/landlock: Add a sandbox manager example
Jann Horn
- [PATCH v26 11/12] samples/landlock: Add a sandbox manager example
Mickaël Salaün
- [PATCH v27 00/12] Landlock LSM
Mickaël Salaün
- [PATCH v27 01/12] landlock: Add object management
Mickaël Salaün
- [PATCH v27 02/12] landlock: Add ruleset and domain management
Mickaël Salaün
- [PATCH v27 03/12] landlock: Set up the security framework and manage credentials
Mickaël Salaün
- [PATCH v27 04/12] landlock: Add ptrace restrictions
Mickaël Salaün
- [PATCH v27 05/12] LSM: Infrastructure management of the superblock
Mickaël Salaün
- [PATCH v27 06/12] fs,security: Add sb_delete hook
Mickaël Salaün
- [PATCH v27 07/12] landlock: Support filesystem access-control
Mickaël Salaün
- [PATCH v27 07/12] landlock: Support filesystem access-control
Mickaël Salaün
- [PATCH v27 08/12] landlock: Add syscall implementations
Mickaël Salaün
- [PATCH v27 08/12] landlock: Add syscall implementations
Mickaël Salaün
- [PATCH v27 09/12] arch: Wire up Landlock syscalls
Mickaël Salaün
- [PATCH v27 11/12] samples/landlock: Add a sandbox manager example
Mickaël Salaün
- [PATCH v27 12/12] landlock: Add user and kernel documentation
Mickaël Salaün
- [PATCH v27 12/12] landlock: Add user and kernel documentation
Michael Kerrisk (man-pages)
- [PATCH v27 12/12] landlock: Add user and kernel documentation
Mickaël Salaün
- [PATCH v2] evm: Fix memory leak in init_desc
Mimi Zohar
- [PATCH v2] selinux: measure state and policy capabilities
Lakshmi Ramasubramanian
- [PATCH v2] smackfs: restrict bytes count in smackfs write functions
Sabyrzhan Tasbolatov
- [PATCH v2] smackfs: restrict bytes count in smackfs write functions
Tetsuo Handa
- [PATCH v2] smackfs: restrict bytes count in smackfs write functions
Sabyrzhan Tasbolatov
- [PATCH v2] smackfs: restrict bytes count in smackfs write functions
Tetsuo Handa
- [PATCH v2] smackfs: restrict bytes count in smackfs write functions
Casey Schaufler
- [PATCH v3 00/10] Enable root to update the blacklist keyring
Mickaël Salaün
- [PATCH v3 00/10] Enable root to update the blacklist keyring
Jarkko Sakkinen
- [PATCH v3 01/10] certs/blacklist: fix kernel doc interface issue
Mickaël Salaün
- [PATCH v3 01/10] certs/blacklist: fix kernel doc interface issue
Jarkko Sakkinen
- [PATCH v3 02/10] certs: Fix blacklisted hexadecimal hash string check
Mickaël Salaün
- [PATCH v3 02/10] certs: Fix blacklisted hexadecimal hash string check
Jarkko Sakkinen
- [PATCH v3 02/10] certs: Fix blacklisted hexadecimal hash string check
Mickaël Salaün
- [PATCH v3 02/10] certs: Fix blacklisted hexadecimal hash string check
Jarkko Sakkinen
- [PATCH v3 03/10] PKCS#7: Fix missing include
Mickaël Salaün
- [PATCH v3 03/10] PKCS#7: Fix missing include
Jarkko Sakkinen
- [PATCH v3 04/10] certs: Fix blacklist flag type confusion
Mickaël Salaün
- [PATCH v3 04/10] certs: Fix blacklist flag type confusion
Jarkko Sakkinen
- [PATCH v3 04/10] certs: Fix blacklist flag type confusion
Mickaël Salaün
- [PATCH v3 04/10] certs: Fix blacklist flag type confusion
Jarkko Sakkinen
- [PATCH v3 05/10] certs: Replace K{U, G}IDT_INIT() with GLOBAL_ROOT_{U, G}ID
Mickaël Salaün
- [PATCH v3 05/10] certs: Replace K{U,G}IDT_INIT() with GLOBAL_ROOT_{U,G}ID
Jarkko Sakkinen
- [PATCH v3 05/10] certs: Replace K{U,G}IDT_INIT() with GLOBAL_ROOT_{U,G}ID
Mickaël Salaün
- [PATCH v3 05/10] certs: Replace K{U,G}IDT_INIT() with GLOBAL_ROOT_{U,G}ID
Jarkko Sakkinen
- [PATCH v3 06/10] certs: Make blacklist_vet_description() more strict
Mickaël Salaün
- [PATCH v3 06/10] certs: Make blacklist_vet_description() more strict
Jarkko Sakkinen
- [PATCH v3 06/10] certs: Make blacklist_vet_description() more strict
Mickaël Salaün
- [PATCH v3 07/10] certs: Factor out the blacklist hash creation
Mickaël Salaün
- [PATCH v3 08/10] certs: Check that builtin blacklist hashes are valid
Mickaël Salaün
- [PATCH v3 08/10] certs: Check that builtin blacklist hashes are valid
Jarkko Sakkinen
- [PATCH v3 08/10] certs: Check that builtin blacklist hashes are valid
Mickaël Salaün
- [PATCH v3 08/10] certs: Check that builtin blacklist hashes are valid
Jarkko Sakkinen
- [PATCH v3 08/10] certs: Check that builtin blacklist hashes are valid
Mickaël Salaün
- [PATCH v3 08/10] certs: Check that builtin blacklist hashes are valid
Jarkko Sakkinen
- [PATCH v3 09/10] certs: Allow root user to append signed hashes to the blacklist keyring
Mickaël Salaün
- [PATCH v3 09/10] certs: Allow root user to append signed hashes to the blacklist keyring
Mimi Zohar
- [PATCH v3 09/10] certs: Allow root user to append signed hashes to the blacklist keyring
Jarkko Sakkinen
- [PATCH v3 09/10] certs: Allow root user to append signed hashes to the blacklist keyring
Mickaël Salaün
- [PATCH v3 10/10] tools/certs: Add print-cert-tbs-hash.sh
Mickaël Salaün
- [PATCH v3 2/2] proc: ensure security hook is called after exec
Stephen Smalley
- [PATCH v3 2/2] proc: ensure security hook is called after exec
Stephen Smalley
- [PATCH v3 2/2] proc: ensure security hook is called after exec
Stephen Brennan
- [PATCH v4 00/10] Enable root to update the blacklist keyring
Mickaël Salaün
- [PATCH v4 00/10] Enable root to update the blacklist keyring
David Howells
- [PATCH v4 00/10] Enable root to update the blacklist keyring
Mickaël Salaün
- [PATCH v4 00/10] Enable root to update the blacklist keyring
Mickaël Salaün
- [PATCH v4 00/10] Enable root to update the blacklist keyring
Jarkko Sakkinen
- [PATCH v4 01/10] tools/certs: Add print-cert-tbs-hash.sh
Mickaël Salaün
- [PATCH v4 02/10] certs: Check that builtin blacklist hashes are valid
Mickaël Salaün
- [PATCH v4 03/10] certs: Fix blacklisted hexadecimal hash string check
Mickaël Salaün
- [PATCH v4 04/10] certs: Fix blacklist flag type confusion
Mickaël Salaün
- [PATCH v4 05/10] certs: Replace K{U, G}IDT_INIT() with GLOBAL_ROOT_{U, G}ID
Mickaël Salaün
- [PATCH v4 06/10] certs: Make blacklist_vet_description() more strict
Mickaël Salaün
- [PATCH v4 07/10] certs/blacklist: fix kernel doc interface issue
Mickaël Salaün
- [PATCH v4 08/10] certs: Factor out the blacklist hash creation
Mickaël Salaün
- [PATCH v4 09/10] PKCS#7: Fix missing include
Mickaël Salaün
- [PATCH v4 10/10] certs: Allow root user to append signed hashes to the blacklist keyring
Mickaël Salaün
- [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
David Howells
- [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
David Howells
- [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
Eric Snowberg
- [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
Jarkko Sakkinen
- [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
Eric Snowberg
- [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
Jarkko Sakkinen
- [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
Eric Snowberg
- [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
James Bottomley
- [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
Eric Snowberg
- [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
Jarkko Sakkinen
- [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
Eric Snowberg
- [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
Jarkko Sakkinen
- [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
David Howells
- [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
Mimi Zohar
- [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
Eric Snowberg
- [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
Nayna
- [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
Jarkko Sakkinen
- [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
Jarkko Sakkinen
- [PATCH v4] proc: Allow pid_revalidate() during LOOKUP_RCU
Stephen Brennan
- [PATCH v4] proc: Allow pid_revalidate() during LOOKUP_RCU
Al Viro
- [PATCH v4] proc: Allow pid_revalidate() during LOOKUP_RCU
Al Viro
- [PATCH v4] proc: Allow pid_revalidate() during LOOKUP_RCU
Al Viro
- [PATCH v4] proc: Allow pid_revalidate() during LOOKUP_RCU
Al Viro
- [PATCH v4] proc: Allow pid_revalidate() during LOOKUP_RCU
Linus Torvalds
- [PATCH v4] proc: Allow pid_revalidate() during LOOKUP_RCU
Al Viro
- [PATCH v4] proc: Allow pid_revalidate() during LOOKUP_RCU
Stephen Brennan
- [PATCH v4] proc: Allow pid_revalidate() during LOOKUP_RCU
Paul Moore
- [PATCH v4] proc: Allow pid_revalidate() during LOOKUP_RCU
Al Viro
- [PATCH v4] proc: Allow pid_revalidate() during LOOKUP_RCU
Stephen Brennan
- [PATCH v4] proc: Allow pid_revalidate() during LOOKUP_RCU
Paul Moore
- [PATCH v4] proc: Allow pid_revalidate() during LOOKUP_RCU
Stephen Brennan
- [PATCH v5 0/4] Add EFI_CERT_X509_GUID support for dbx/mokx entries
Eric Snowberg
- [PATCH v5 0/4] Add EFI_CERT_X509_GUID support for dbx/mokx entries
David Howells
- [PATCH v5 0/4] Add EFI_CERT_X509_GUID support for dbx/mokx entries
Mimi Zohar
- [PATCH v5 0/4] Add EFI_CERT_X509_GUID support for dbx/mokx entries
Mimi Zohar
- [PATCH v5 0/4] Add EFI_CERT_X509_GUID support for dbx/mokx entries
Eric Snowberg
- [PATCH v5 0/5] Enable root to update the blacklist keyring
Jarkko Sakkinen
- [PATCH v5 00/42] idmapped mounts
Christian Brauner
- [PATCH v5 00/42] idmapped mounts
Darrick J. Wong
- [PATCH v5 00/42] idmapped mounts
Christian Brauner
- [PATCH v5 00/42] idmapped mounts
Dave Chinner
- [PATCH v5 00/42] idmapped mounts
Christoph Hellwig
- [PATCH v5 00/42] idmapped mounts
Theodore Ts'o
- [PATCH v5 00/42] idmapped mounts
Christian Brauner
- [PATCH v5 01/42] namespace: take lock_mount_hash() directly when changing flags
Christian Brauner
- [PATCH v5 02/42] mount: make {lock,unlock}_mount_hash() static
Christian Brauner
- [PATCH v5 03/42] namespace: only take read lock in do_reconfigure_mnt()
Christian Brauner
- [PATCH v5 04/42] fs: split out functions to hold writers
Christian Brauner
- [PATCH v5 05/42] fs: add attr_flags_to_mnt_flags helper
Christian Brauner
- [PATCH v5 06/42] fs: add mount_setattr()
Christian Brauner
- [PATCH v5 07/42] tests: add mount_setattr() selftests
Christian Brauner
- [PATCH v5 08/42] fs: add id translation helpers
Christian Brauner
- [PATCH v5 09/42] mount: attach mappings to mounts
Christian Brauner
- [PATCH v5 09/42] mount: attach mappings to mounts
Christoph Hellwig
- [PATCH v5 1/4] certs: Add EFI_CERT_X509_GUID support for dbx entries
Eric Snowberg
- [PATCH v5 1/4] certs: Add EFI_CERT_X509_GUID support for dbx entries
Nayna
- [PATCH v5 1/4] certs: Add EFI_CERT_X509_GUID support for dbx entries
Eric Snowberg
- [PATCH v5 1/4] certs: Add EFI_CERT_X509_GUID support for dbx entries
Nayna
- [PATCH v5 1/4] certs: Add EFI_CERT_X509_GUID support for dbx entries
David Howells
- [PATCH v5 1/4] certs: Add EFI_CERT_X509_GUID support for dbx entries
Eric Snowberg
- [PATCH v5 10/42] capability: handle idmapped mounts
Christian Brauner
- [PATCH v5 10/42] capability: handle idmapped mounts
Christoph Hellwig
- [PATCH v5 11/42] namei: make permission helpers idmapped mount aware
Christian Brauner
- [PATCH v5 11/42] namei: make permission helpers idmapped mount aware
Christoph Hellwig
- [PATCH v5 12/42] inode: make init and permission helpers idmapped mount aware
Christian Brauner
- [PATCH v5 12/42] inode: make init and permission helpers idmapped mount aware
Christoph Hellwig
- [PATCH v5 13/42] attr: handle idmapped mounts
Christian Brauner
- [PATCH v5 13/42] attr: handle idmapped mounts
Christoph Hellwig
- [PATCH v5 14/42] acl: handle idmapped mounts
Christian Brauner
- [PATCH v5 14/42] acl: handle idmapped mounts
Christoph Hellwig
- [PATCH v5 15/42] fs: add file_user_ns() helper
Christian Brauner
- [PATCH v5 15/42] fs: add file_user_ns() helper
Christoph Hellwig
- [PATCH v5 15/42] fs: add file_user_ns() helper
Jann Horn
- [PATCH v5 15/42] fs: add file_user_ns() helper
Christian Brauner
- [PATCH v5 16/42] xattr: handle idmapped mounts
Christian Brauner
- [PATCH v5 16/42] xattr: handle idmapped mounts
Christoph Hellwig
- [PATCH v5 17/42] commoncap: handle idmapped mounts
Christian Brauner
- [PATCH v5 17/42] commoncap: handle idmapped mounts
Christoph Hellwig
- [PATCH v5 18/42] stat: handle idmapped mounts
Christian Brauner
- [PATCH v5 18/42] stat: handle idmapped mounts
Christoph Hellwig
- [PATCH v5 19/42] namei: handle idmapped mounts in may_*() helpers
Christian Brauner
- [PATCH v5 19/42] namei: handle idmapped mounts in may_*() helpers
Christoph Hellwig
- [PATCH v5 2/4] certs: Move load_system_certificate_list to a common function
Eric Snowberg
- [PATCH v5 20/42] namei: introduce struct renamedata
Christian Brauner
- [PATCH v5 20/42] namei: introduce struct renamedata
Christoph Hellwig
- [PATCH v5 21/42] namei: prepare for idmapped mounts
Christian Brauner
- [PATCH v5 21/42] namei: prepare for idmapped mounts
Christoph Hellwig
- [PATCH v5 22/42] open: handle idmapped mounts in do_truncate()
Christian Brauner
- [PATCH v5 22/42] open: handle idmapped mounts in do_truncate()
Christoph Hellwig
- [PATCH v5 23/42] open: handle idmapped mounts
Christian Brauner
- [PATCH v5 23/42] open: handle idmapped mounts
Christoph Hellwig
- [PATCH v5 23/42] open: handle idmapped mounts
Christian Brauner
- [PATCH v5 24/42] af_unix: handle idmapped mounts
Christian Brauner
- [PATCH v5 24/42] af_unix: handle idmapped mounts
Christoph Hellwig
- [PATCH v5 25/42] utimes: handle idmapped mounts
Christian Brauner
- [PATCH v5 25/42] utimes: handle idmapped mounts
Christoph Hellwig
- [PATCH v5 26/42] fcntl: handle idmapped mounts
Christian Brauner
- [PATCH v5 26/42] fcntl: handle idmapped mounts
Christoph Hellwig
- [PATCH v5 27/42] notify: handle idmapped mounts
Christian Brauner
- [PATCH v5 27/42] notify: handle idmapped mounts
Christoph Hellwig
- [PATCH v5 28/42] init: handle idmapped mounts
Christian Brauner
- [PATCH v5 29/42] ioctl: handle idmapped mounts
Christian Brauner
- [PATCH v5 29/42] ioctl: handle idmapped mounts
Christoph Hellwig
- [PATCH v5 3/4] certs: Add ability to preload revocation certs
Eric Snowberg
- [PATCH v5 30/42] would_dump: handle idmapped mounts
Christian Brauner
- [PATCH v5 30/42] would_dump: handle idmapped mounts
Christoph Hellwig
- [PATCH v5 31/42] exec: handle idmapped mounts
Christian Brauner
- [PATCH v5 31/42] exec: handle idmapped mounts
Christoph Hellwig
- [PATCH v5 32/42] fs: make helpers idmap mount aware
Christoph Hellwig
- [PATCH v5 33/42] apparmor: handle idmapped mounts
Christian Brauner
- [PATCH v5 34/42] ima: handle idmapped mounts
Christian Brauner
- [PATCH v5 35/42] fat: handle idmapped mounts
Christian Brauner
- [PATCH v5 36/42] ext4: support idmapped mounts
Christian Brauner
- [PATCH v5 37/42] xfs: support idmapped mounts
Christian Brauner
- [PATCH v5 37/42] xfs: support idmapped mounts
Dave Chinner
- [PATCH v5 37/42] xfs: support idmapped mounts
Christian Brauner
- [PATCH v5 37/42] xfs: support idmapped mounts
Christoph Hellwig
- [PATCH v5 37/42] xfs: support idmapped mounts
Dave Chinner
- [PATCH v5 38/42] ecryptfs: do not mount on top of idmapped mounts
Christian Brauner
- [PATCH v5 39/42] overlayfs: do not mount on top of idmapped mounts
Christian Brauner
- [PATCH v5 4/4] integrity: Load mokx variables into the blacklist keyring
Eric Snowberg
- [PATCH v5 40/42] fs: introduce MOUNT_ATTR_IDMAP
Christian Brauner
- [PATCH v5 40/42] fs: introduce MOUNT_ATTR_IDMAP
Christoph Hellwig
- [PATCH v5 40/42] fs: introduce MOUNT_ATTR_IDMAP
Christian Brauner
- [PATCH v5 41/42] tests: extend mount_setattr tests
Christian Brauner
- [PATCH v5 41/42] tests: extend mount_setattr tests
Randy Dunlap
- [PATCH v5] proc: Allow pid_revalidate() during LOOKUP_RCU
Stephen Brennan
- [PATCH v6 00/40] idmapped mounts
Christian Brauner
- [PATCH v6 00/40] idmapped mounts
Serge E. Hallyn
- [PATCH v6 01/40] mount: attach mappings to mounts
Christian Brauner
- [PATCH v6 02/40] fs: add id translation helpers
Christian Brauner
- [PATCH v6 03/40] fs: add file and path permissions helpers
Christian Brauner
- [PATCH v6 03/40] fs: add file and path permissions helpers
James Morris
- [PATCH v6 04/40] capability: handle idmapped mounts
Christian Brauner
- [PATCH v6 04/40] capability: handle idmapped mounts
James Morris
- [PATCH v6 05/39] namei: make permission helpers idmapped mount aware
Christian Brauner
- [PATCH v6 05/39] namei: make permission helpers idmapped mount aware
James Morris
- [PATCH v6 05/39] namei: make permission helpers idmapped mount aware
J. Bruce Fields
- [PATCH v6 05/39] namei: make permission helpers idmapped mount aware
Christian Brauner
- [PATCH v6 05/39] namei: make permission helpers idmapped mount aware
J. Bruce Fields
- [PATCH v6 05/39] namei: make permission helpers idmapped mount aware
Christian Brauner
- [PATCH v6 06/40] inode: make init and permission helpers idmapped mount aware
Christian Brauner
- [PATCH v6 06/40] inode: make init and permission helpers idmapped mount aware
James Morris
- [PATCH v6 07/40] attr: handle idmapped mounts
Christian Brauner
- [PATCH v6 08/40] acl: handle idmapped mounts
Christian Brauner
- [PATCH v6 09/40] xattr: handle idmapped mounts
Christian Brauner
- [PATCH v6 09/40] xattr: handle idmapped mounts
James Morris
- [PATCH v6 10/40] commoncap: handle idmapped mounts
Christian Brauner
- [PATCH v6 10/40] commoncap: handle idmapped mounts
James Morris
- [PATCH v6 11/40] stat: handle idmapped mounts
Christian Brauner
- [PATCH v6 11/40] stat: handle idmapped mounts
James Morris
- [PATCH v6 12/40] namei: handle idmapped mounts in may_*() helpers
Christian Brauner
- [PATCH v6 12/40] namei: handle idmapped mounts in may_*() helpers
James Morris
- [PATCH v6 13/40] namei: introduce struct renamedata
Christian Brauner
- [PATCH v6 14/40] namei: prepare for idmapped mounts
Christian Brauner
- [PATCH v6 15/40] open: handle idmapped mounts in do_truncate()
Christian Brauner
- [PATCH v6 15/40] open: handle idmapped mounts in do_truncate()
Christoph Hellwig
- [PATCH v6 16/40] open: handle idmapped mounts
Christian Brauner
- [PATCH v6 16/40] open: handle idmapped mounts
James Morris
- [PATCH v6 16/40] open: handle idmapped mounts
Christoph Hellwig
- [PATCH v6 17/40] af_unix: handle idmapped mounts
Christian Brauner
- [PATCH v6 17/40] af_unix: handle idmapped mounts
James Morris
- [PATCH v6 18/40] utimes: handle idmapped mounts
Christian Brauner
- [PATCH v6 18/40] utimes: handle idmapped mounts
James Morris
- [PATCH v6 19/40] fcntl: handle idmapped mounts
Christian Brauner
- [PATCH v6 19/40] fcntl: handle idmapped mounts
James Morris
- [PATCH v6 20/40] init: handle idmapped mounts
Christian Brauner
- [PATCH v6 20/40] init: handle idmapped mounts
Christoph Hellwig
- [PATCH v6 21/40] ioctl: handle idmapped mounts
Christian Brauner
- [PATCH v6 21/40] ioctl: handle idmapped mounts
James Morris
- [PATCH v6 22/40] would_dump: handle idmapped mounts
Christian Brauner
- [PATCH v6 23/40] exec: handle idmapped mounts
Christian Brauner
- [PATCH v6 23/40] exec: handle idmapped mounts
James Morris
- [PATCH v6 23/40] exec: handle idmapped mounts
Eric W. Biederman
- [PATCH v6 23/40] exec: handle idmapped mounts
Christian Brauner
- [PATCH v6 23/40] exec: handle idmapped mounts
Serge E. Hallyn
- [PATCH v6 23/40] exec: handle idmapped mounts
Christian Brauner
- [PATCH v6 23/40] exec: handle idmapped mounts
Serge E. Hallyn
- [PATCH v6 25/40] apparmor: handle idmapped mounts
Christian Brauner
- [PATCH v6 26/39] ima: handle idmapped mounts
Christian Brauner
- [PATCH v6 27/40] ecryptfs: do not mount on top of idmapped mounts
Christian Brauner
- [PATCH v6 27/40] ecryptfs: do not mount on top of idmapped mounts
James Morris
- [PATCH v6 28/40] overlayfs: do not mount on top of idmapped mounts
Christian Brauner
- [PATCH v6 28/40] overlayfs: do not mount on top of idmapped mounts
James Morris
- [PATCH v6 29/40] namespace: take lock_mount_hash() directly when changing flags
Christian Brauner
- [PATCH v6 30/40] mount: make {lock,unlock}_mount_hash() static
Christian Brauner
- [PATCH v6 31/40] namespace: only take read lock in do_reconfigure_mnt()
Christian Brauner
- [PATCH v6 32/40] fs: split out functions to hold writers
Christian Brauner
- [PATCH v6 33/40] fs: add attr_flags_to_mnt_flags helper
Christian Brauner
- [PATCH v6 34/40] fs: add mount_setattr()
Christian Brauner
- [PATCH v6 35/40] fs: introduce MOUNT_ATTR_IDMAP
Christian Brauner
- [PATCH v6 35/40] fs: introduce MOUNT_ATTR_IDMAP
Christoph Hellwig
- [PATCH v6 35/40] fs: introduce MOUNT_ATTR_IDMAP
Christoph Hellwig
- [PATCH v6 36/40] tests: add mount_setattr() selftests
Christian Brauner
- [PATCH v6 37/40] fat: handle idmapped mounts
Christian Brauner
- [PATCH v6 38/40] ext4: support idmapped mounts
Christian Brauner
- [PATCH v6 39/40] xfs: support idmapped mounts
Christian Brauner
- [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
Jarkko Sakkinen
- [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
Sumit Garg
- [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
Jarkko Sakkinen
- [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
Sumit Garg
- [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
Jarkko Sakkinen
- [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
Jarkko Sakkinen
- [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
Sumit Garg
- [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
Ahmad Fatoum
- [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
Jarkko Sakkinen
- [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
Jerome Forissier
- [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
Jarkko Sakkinen
- [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
Jarkko Sakkinen
- [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
Jerome Forissier
- [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
Jarkko Sakkinen
- [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
Jarkko Sakkinen
- [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
Jarkko Sakkinen
- [PATCH v9 1/8] IMA: generalize keyring specific measurement constructs
Tushar Sugandhi
- [PATCH v9 2/8] IMA: add support to measure buffer data hash
Tushar Sugandhi
- [PATCH v9 2/8] IMA: add support to measure buffer data hash
Tushar Sugandhi
- [PATCH v9 3/8] IMA: define a hook to measure kernel integrity critical data
Tushar Sugandhi
- [PATCH v9 3/8] IMA: define a hook to measure kernel integrity critical data
Mimi Zohar
- [PATCH v9 3/8] IMA: define a hook to measure kernel integrity critical data
Tushar Sugandhi
- [PATCH v9 4/8] IMA: add policy rule to measure critical data
Tushar Sugandhi
- [PATCH v9 5/8] IMA: limit critical data measurement based on a label
Tushar Sugandhi
- [PATCH v9 7/8] IMA: define a builtin critical data measurement policy
Tushar Sugandhi
- [PATCH v9 8/8] selinux: include a consumer of the new IMA critical data hook
Lakshmi Ramasubramanian
- [PATCH v9 8/8] selinux: include a consumer of the new IMA critical data hook
Paul Moore
- [PATCH v9 8/8] selinux: include a consumer of the new IMA critical data hook
Lakshmi Ramasubramanian
- [RFC][PATCH] apparmor: Enforce progressively tighter permissions for no_new_privs
Eric W. Biederman
- [RFC][PATCH] apparmor: Enforce progressively tighter permissions for no_new_privs
Eric W. Biederman
- [RFC][PATCH] apparmor: Enforce progressively tighter permissions for no_new_privs
John Johansen
- [RFC][PATCH] apparmor: Enforce progressively tighter permissions for no_new_privs
Eric W. Biederman
- [RFC][PATCH] apparmor: Enforce progressively tighter permissions for no_new_privs
John Johansen
- [RFC PATCH] selinux: ARM64: Move selinux_state to a separate page
Preeti Nagar
- [RFC PATCH v2] selinux: security: Move selinux_state to a separate page
Preeti Nagar
- [RFC PATCH v2] selinux: security: Move selinux_state to a separate page
Miguel Ojeda
- [RFC PATCH v2] selinux: security: Move selinux_state to a separate page
Miguel Ojeda
- [RFC PATCH v2] selinux: security: Move selinux_state to a separate page
Casey Schaufler
- [RFC PATCH v2] selinux: security: Move selinux_state to a separate page
Nick Desaulniers
- [RFC PATCH v2] selinux: security: Move selinux_state to a separate page
pnagar at codeaurora.org
- [RFC PATCH v2] selinux: security: Move selinux_state to a separate page
pnagar at codeaurora.org
- [RFC PATCH v2] selinux: security: Move selinux_state to a separate page
pnagar at codeaurora.org
- [RFC PATCH v2] selinux: security: Move selinux_state to a separate page
Casey Schaufler
- [RFC PATCH v2] selinux: security: Move selinux_state to a separate page
David Howells
- [RFC PATCH v2] selinux: security: Move selinux_state to a separate page
pnagar at codeaurora.org
- [RFC PATCH v2] selinux: security: Move selinux_state to a separate page
pnagar at codeaurora.org
- Account Details for 10.000 US-Dollar Erfolgsgeschichte pro Woche. So erhalten Sie ein passives Einkommen von 10000 USD / Monat >>>>>>>>>>>>>> https://www.google.com/url?q=https%3A%2F%2Fvk.cc%2FbW9Ahb%3Fq%3Dq&sa=D&ldp=lua&usg=AFQjCNHVxvk2YmHpOxS9HBrvNR92fr6sBw at Verity Scott
Root User
- general protection fault in tomoyo_socket_sendmsg_permission
Tetsuo Handa
- general protection fault in tomoyo_socket_sendmsg_permission
Tetsuo Handa
- general protection fault in tomoyo_socket_sendmsg_permission
Tetsuo Handa
- general protection fault in tomoyo_socket_sendmsg_permission
Shuah Khan
- general protection fault in tomoyo_socket_sendmsg_permission
Tetsuo Handa
- Migration to trusted keys: sealing user-provided key?
Ahmad Fatoum
- Migration to trusted keys: sealing user-provided key?
Jarkko Sakkinen
- Migration to trusted keys: sealing user-provided key?
James Bottomley
- Migration to trusted keys: sealing user-provided key?
Mimi Zohar
- Migration to trusted keys: sealing user-provided key?
Jan Lübbe
- Migration to trusted keys: sealing user-provided key?
Mimi Zohar
- Migration to trusted keys: sealing user-provided key?
James Bottomley
- No subject
David Howells
- No subject
Jarkko Sakkinen
- possible deadlock in process_measurement (2)
syzbot
- Question about inode security blob
Fan Wu
- Question about inode security blob
Casey Schaufler
- Question about inode security blob
Fan Wu
- Question about inode security blob
James Morris
- Question about inode security blob
KP Singh
- read
Ms. Reem
- Update
GREENLIGHT
- VSOCK & getpeercon()
Casey Schaufler
- VSOCK & getpeercon()
Paul Moore
- WARNING in memdup_user_nul
syzbot
- WARNING in smk_set_cipso
syzbot
- WARNING in smk_write_net4addr
syzbot
- WARNING in smk_write_net4addr
syzbot
- WARNING in smk_write_net6addr
syzbot
- WARNING in smk_write_relabel_self
syzbot
- WARNING in smk_write_relabel_self
syzbot
- WARNING in smk_write_syslog
syzbot
- YOUR URGENT RESPONSE !!!!
Mr. Kim Leang
Last message date:
Sun Jan 31 18:14:39 UTC 2021
Archived on: Tue Feb 2 22:33:35 UTC 2021
This archive was generated by
Pipermail 0.09 (Mailman edition).