linux-api.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2019-06-17 17:49:44 to 2019-06-22 22:44:00 UTC [more...]

[PATCH v5 00/16] fs-verity: read-only file-based authenticity protection
 2019-06-22 22:44 UTC  (31+ messages)
` [PATCH v5 01/16] fs-verity: add a documentation file
` [PATCH v5 02/16] fs-verity: add MAINTAINERS file entry
` [PATCH v5 03/16] fs-verity: add UAPI header
` [PATCH v5 04/16] fs: uapi: define verity bit for FS_IOC_GETFLAGS
` [PATCH v5 05/16] fs-verity: add Kconfig and the helper functions for hashing
` [PATCH v5 06/16] fs-verity: add inode and superblock fields
` [PATCH v5 07/16] fs-verity: add the hook for file ->open()
` [PATCH v5 08/16] fs-verity: add the hook for file ->setattr()
` [PATCH v5 09/16] fs-verity: add data verification hooks for ->readpages()
` [PATCH v5 10/16] fs-verity: implement FS_IOC_ENABLE_VERITY ioctl
` [PATCH v5 11/16] fs-verity: implement FS_IOC_MEASURE_VERITY ioctl
` [PATCH v5 12/16] fs-verity: add SHA-512 support
` [PATCH v5 13/16] fs-verity: support builtin file signatures
` [PATCH v5 14/16] ext4: add basic fs-verity support
` [PATCH v5 15/16] ext4: add fs-verity read support
` [PATCH v5 16/16] f2fs: add fs-verity support

[PATCH V34 00/29] Lockdown as an LSM
 2019-06-22 17:52 UTC  (31+ messages)
` [PATCH V34 01/29] security: Support early LSMs
` [PATCH V34 02/29] security: Add a "locked down" LSM hook
` [PATCH V34 03/29] security: Add a static lockdown policy LSM
` [PATCH V34 04/29] Enforce module signatures if the kernel is locked down
` [PATCH V34 05/29] Restrict /dev/{mem,kmem,port} when "
` [PATCH V34 06/29] kexec_load: Disable at runtime if "
` [PATCH V34 07/29] Copy secure_boot flag in boot params across kexec reboot
` [PATCH V34 08/29] kexec_file: split KEXEC_VERIFY_SIG into KEXEC_SIG and KEXEC_SIG_FORCE
  ` [PATCH V34 09/29] kexec_file: Restrict at runtime if the kernel is locked down
` [PATCH V34 10/29] hibernate: Disable when "
` [PATCH V34 11/29] PCI: Lock down BAR access "
` [PATCH V34 12/29] x86: Lock down IO port "
` [PATCH V34 13/29] x86/msr: Restrict MSR "
` [PATCH V34 14/29] ACPI: Limit access to custom_method "
` [PATCH V34 15/29] acpi: Ignore acpi_rsdp kernel param when the kernel has been "
` [PATCH V34 16/29] acpi: Disable ACPI table override if the kernel is "
` [PATCH V34 17/29] Prohibit PCMCIA CIS storage when "
` [PATCH V34 18/29] Lock down TIOCSSERIAL
` [PATCH V34 19/29] Lock down module params that specify hardware parameters (eg. ioport)
` [PATCH V34 20/29] x86/mmiotrace: Lock down the testmmiotrace module
` [PATCH V34 21/29] Lock down /proc/kcore
` [PATCH V34 22/29] Lock down tracing and perf kprobes when in confidentiality mode
` [PATCH V34 23/29] bpf: Restrict bpf when kernel lockdown is "
` [PATCH V34 24/29] Lock down perf when "
` [PATCH V34 25/29] kexec: Allow kexec_file() with appropriate IMA policy when locked down
` [PATCH V34 26/29] debugfs: Restrict debugfs when the kernel is "
` [PATCH V34 27/29] tracefs: Restrict tracefs "
` [PATCH V34 28/29] efi: Restrict efivar_ssdt_load "
` [PATCH V34 29/29] lockdown: Print current->comm in restriction messages

[PATCH V33 00/30] Lockdown as an LSM
 2019-06-21 22:31 UTC  (45+ messages)
` [PATCH V33 01/30] security: Support early LSMs
` [PATCH V33 02/30] security: Add a "locked down" LSM hook
` [PATCH V33 03/30] security: Add a static lockdown policy LSM
` [PATCH V33 04/30] Enforce module signatures if the kernel is locked down
` [PATCH V33 05/30] Restrict /dev/{mem,kmem,port} when "
` [PATCH V33 06/30] kexec_load: Disable at runtime if "
` [PATCH V33 07/30] Copy secure_boot flag in boot params across kexec reboot
  ` [PATCH V33 08/30] kexec_file: split KEXEC_VERIFY_SIG into KEXEC_SIG and KEXEC_SIG_FORCE
  ` [PATCH V33 09/30] kexec_file: Restrict at runtime if the kernel is locked down
` [PATCH V33 10/30] hibernate: Disable when "
` [PATCH V33 11/30] uswsusp: "
` [PATCH V33 12/30] PCI: Lock down BAR access "
` [PATCH V33 13/30] x86: Lock down IO port "
` [PATCH V33 14/30] x86/msr: Restrict MSR "
` [PATCH V33 15/30] ACPI: Limit access to custom_method "
` [PATCH V33 16/30] acpi: Ignore acpi_rsdp kernel param when the kernel has been "
` [PATCH V33 17/30] acpi: Disable ACPI table override if the kernel is "
` [PATCH V33 18/30] Prohibit PCMCIA CIS storage when "
` [PATCH V33 19/30] Lock down TIOCSSERIAL
` [PATCH V33 20/30] Lock down module params that specify hardware parameters (eg. ioport)
` [PATCH V33 21/30] x86/mmiotrace: Lock down the testmmiotrace module
` [PATCH V33 22/30] Lock down /proc/kcore
` [PATCH V33 23/30] Lock down tracing and perf kprobes when in confidentiality mode
` [PATCH V33 24/30] bpf: Restrict bpf when kernel lockdown is "
` [PATCH V33 25/30] Lock down perf when "
` [PATCH V33 26/30] kexec: Allow kexec_file() with appropriate IMA policy when locked down
` [PATCH V33 27/30] lockdown: Print current->comm in restriction messages
` [PATCH V33 28/30] debugfs: Restrict debugfs when the kernel is locked down
` [PATCH V33 29/30] tracefs: Restrict tracefs "
` [PATCH V33 30/30] efi: Restrict efivar_ssdt_load "

[PATCH] samples: make pidfd-metadata fail gracefully on older kernels
 2019-06-21 22:13 UTC  (4+ messages)

[PATCH V31 00/25] Add support for kernel lockdown
 2019-06-21 20:18 UTC  (8+ messages)
` [PATCH V31 06/25] kexec_file: split KEXEC_VERIFY_SIG into KEXEC_SIG and KEXEC_SIG_FORCE
` [PATCH V31 07/25] kexec_file: Restrict at runtime if the kernel is locked down

[PATCH v3 1/2] fork: add clone3
 2019-06-21 15:30 UTC  (8+ messages)
` [PATCH v3 2/2] arch: wire-up clone3() syscall

[PATCH 09/25] vfs: Allow mount information to be queried by fsinfo() [ver #13]
 2019-06-21 14:50 UTC  (18+ messages)
` [PATCH 00/25] VFS: Introduce filesystem information query syscall "
  ` [PATCH 01/25] vfs: syscall: Add fsinfo() to query filesystem information "
  ` [PATCH 02/25] vfs: Allow fsinfo() to query what's in an fs_context "
  ` [PATCH 04/25] vfs: Implement parameter value retrieval with fsinfo() "
  ` [PATCH 25/25] fsinfo: Add API documentation "

[PATCH v1 0/4] Introduce MADV_COLD and MADV_PAGEOUT
 2019-06-20 15:57 UTC  (9+ messages)
` [PATCH v1 1/4] mm: introduce MADV_COLD

[PATCH v2 0/5] Introduce MADV_COLD and MADV_PAGEOUT
 2019-06-20 10:55 UTC  (18+ messages)
` [PATCH v2 1/5] mm: introduce MADV_COLD
` [PATCH v2 2/5] mm: change PAGEREF_RECLAIM_CLEAN with PAGE_REFRECLAIM
` [PATCH v2 4/5] mm: introduce MADV_PAGEOUT

[PATCH 01/13] vfs: verify param type in vfs_parse_sb_flag()
 2019-06-20  4:40 UTC  (14+ messages)
` [PATCH 02/13] vfs: move vfs_parse_sb_flag() calls into filesystems
` [PATCH 03/13] vfs: don't parse forbidden flags
` [PATCH 04/13] vfs: don't parse "posixacl" option
` [PATCH 05/13] vfs: don't parse "silent" option
` [PATCH 06/13] vfs: new helper: vfs_parse_ro_rw()
` [PATCH 07/13] proc: don't ignore options
` [PATCH 08/13] sysfs: "
` [PATCH 09/13] mqueue: "
` [PATCH 10/13] cpuset: "
` [PATCH 11/13] cgroup: "
` [PATCH 12/13] fusectl: "
` [PATCH 13/13] resctrl: "

[PATCH v4 00/16] fs-verity: read-only file-based authenticity protection
 2019-06-19 19:13 UTC  (23+ messages)
` [PATCH v4 01/16] fs-verity: add a documentation file
` [PATCH v4 05/16] fs-verity: add Kconfig and the helper functions for hashing
` [PATCH v4 07/16] fs-verity: add the hook for file ->open()
` [PATCH v4 10/16] fs-verity: implement FS_IOC_ENABLE_VERITY ioctl
` [PATCH v4 13/16] fs-verity: support builtin file signatures
` [PATCH v4 14/16] ext4: add basic fs-verity support

[PATCH v2 05/13] vfs: don't parse "silent" option
 2019-06-19 12:54 UTC 

[PATCH ghak90 V6 02/10] audit: add container id
 2019-06-18 22:46 UTC  (6+ messages)

[PATCH] mm, memcg: Report number of memcg caches in slabinfo
 2019-06-18 19:27 UTC  (6+ messages)

[PATCH v7 00/27] Control-flow Enforcement: Shadow Stack
 2019-06-18 16:50 UTC  (23+ messages)
` [PATCH v7 22/27] binfmt_elf: Extract .note.gnu.property from an ELF file

[PATCH] uapi: avoid namespace conflict in linux/posix_types.h
 2019-06-18  7:44 UTC  (14+ messages)

[PATCH 25/25] fsinfo: Add API documentation [ver #13]
 2019-06-05 12:21 UTC 

[PATCH 01/25] vfs: syscall: Add fsinfo() to query filesystem information [ver #13]
 2019-05-29  7:42 UTC 


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).