November 2017 Archives by author
Starting: Wed Nov 1 06:40:00 UTC 2017
Ending: Thu Nov 30 18:37:23 UTC 2017
Messages: 495
- Hello Dear...
M,Shakour Rosarita
- Documentation patch for namespaced file capabilities
Michael Kerrisk (man-pages)
- Firmware signing -- Re: [PATCH 00/27] security, efi: Add kernel lockdown
AKASHI, Takahiro
- Firmware signing -- Re: [PATCH 00/27] security, efi: Add kernel lockdown
AKASHI, Takahiro
- Firmware signing -- Re: [PATCH 00/27] security, efi: Add kernel lockdown
AKASHI, Takahiro
- [BUG] kernel stack corruption during/after Netlabel error
David Ahern
- [BUG] kernel stack corruption during/after Netlabel error
David Ahern
- [BUG] kernel stack corruption during/after Netlabel error
David Ahern
- [PATCH 02/27] Add a SysRq option to lift kernel lockdown
Thiago Jung Bauermann
- [PATCH] apparmor: initialized returned struct aa_perms
Arnd Bergmann
- [PATCH] apparmor: initialized returned struct aa_perms
Arnd Bergmann
- Documentation patch for namespaced file capabilities
Eric W. Biederman
- [kernel-hardening] Re: [PATCH v5 next 5/5] net: modules: use request_module_cap() to load 'netdev-%s' modules
Eric W. Biederman
- [PATCH] KEYS: fix out-of-bounds read during ASN.1 parsing
Eric Biggers
- [PATCH] KEYS: fix NULL pointer dereference during ASN.1 parsing
Eric Biggers
- [PATCH] KEYS: remove CONFIG_KEYS_COMPAT
Eric Biggers
- [PATCH] KEYS: remove unnecessary get/put of explicit dest_keyring
Eric Biggers
- [PATCH] KEYS: add missing permission check for request_key() destination
Eric Biggers
- [PATCH] KEYS: remove unnecessary get/put of explicit dest_keyring
Eric Biggers
- [PATCH] KEYS: add missing permission check for request_key() destination
Eric Biggers
- [PATCH v2] KEYS: add missing permission check for request_key() destination
Eric Biggers
- [paul at keyserver.paulfurley.com: PGP key expires in 3 days: 0x7179B76704ABA18B (it can be extended)]
James Bottomley
- Firmware signing -- Re: [PATCH 00/27] security, efi: Add kernel lockdown
James Bottomley
- Firmware signing -- Re: [PATCH 00/27] security, efi: Add kernel lockdown
James Bottomley
- [PATCH v2 00/15] ima: digest list feature
Kees Cook
- [PATCH v5 next 5/5] net: modules: use request_module_cap() to load 'netdev-%s' modules
Kees Cook
- [PATCH v5 next 0/5] Improve Module autoloading infrastructure
Kees Cook
- [PATCH v5 next 5/5] net: modules: use request_module_cap() to load 'netdev-%s' modules
Kees Cook
- [PATCH v5 next 5/5] net: modules: use request_module_cap() to load 'netdev-%s' modules
Kees Cook
- [kernel-hardening] Re: [PATCH v5 next 5/5] net: modules: use request_module_cap() to load 'netdev-%s' modules
Kees Cook
- [PATCH v5 next 1/5] modules:capabilities: add request_module_cap()
Kees Cook
- [kernel-hardening] Re: [PATCH v5 next 5/5] net: modules: use request_module_cap() to load 'netdev-%s' modules
Kees Cook
- [kernel-hardening] Re: [PATCH v5 next 5/5] net: modules: use request_module_cap() to load 'netdev-%s' modules
Kees Cook
- [PATCH v5 next 1/5] modules:capabilities: add request_module_cap()
Kees Cook
- [PATCH v5 next 1/5] modules:capabilities: add request_module_cap()
Kees Cook
- [kernel-hardening] Re: [PATCH v5 next 5/5] net: modules: use request_module_cap() to load 'netdev-%s' modules
Kees Cook
- [kernel-hardening] Re: [PATCH v5 next 5/5] net: modules: use request_module_cap() to load 'netdev-%s' modules
Kees Cook
- [kernel-hardening] Re: [PATCH v5 next 5/5] net: modules: use request_module_cap() to load 'netdev-%s' modules
Kees Cook
- [GIT PULL] seccomp updates for next
Kees Cook
- [kernel-hardening] Re: [PATCH v5 next 5/5] net: modules: use request_module_cap() to load 'netdev-%s' modules
Kees Cook
- [kernel-hardening] Re: [PATCH v5 next 5/5] net: modules: use request_module_cap() to load 'netdev-%s' modules
Kees Cook
- [PATCH v5 next 1/5] modules:capabilities: add request_module_cap()
Kees Cook
- [kernel-hardening] Re: [PATCH v5 next 5/5] net: modules: use request_module_cap() to load 'netdev-%s' modules
Kees Cook
- Firmware signing -- Re: [PATCH 00/27] security, efi: Add kernel lockdown
Alan Cox
- Firmware signing -- Re: [PATCH 00/27] security, efi: Add kernel lockdown
Alan Cox
- Firmware signing -- Re: [PATCH 00/27] security, efi: Add kernel lockdown
Alan Cox
- [PATCH v5 next 1/5] modules:capabilities: add request_module_cap()
Alan Cox
- Spende von 4.800.000,00 EUR
Herr Tom Crist
- [RFC 0/3] Safe, dynamically (un)loadable LSMs
Sargun Dhillon
- [RFC 1/3] security: Add safe, dynamic (runtime-loadable) hook support
Sargun Dhillon
- [RFC 2/3] LSM: Add statistics about the invocation of dynamic hooks
Sargun Dhillon
- [RFC 3/3] LSM: Add an example sample dynamic LSM
Sargun Dhillon
- [PATCH RFC v3 1/7] proc: add proc_fs_info struct to store proc information
Alexey Dobriyan
- [PATCH RFC v3 2/7] proc: move /proc/{self|thread-self} dentries to proc_fs_info
Alexey Dobriyan
- [PATCH RFC v3 3/7] proc: add helpers to set and get proc hidepid and gid mount options
Alexey Dobriyan
- [PATCH v4 2/4] tpm: ignore burstcount to improve tpm_tis send() performance
Leendert van Doorn
- [BUG] kernel stack corruption during/after Netlabel error
Eric Dumazet
- [BUG] kernel stack corruption during/after Netlabel error
Eric Dumazet
- [PATCH v5 next 1/5] modules:capabilities: add request_module_cap()
Randy Dunlap
- [PATCH 0/2] security/keys/trusted: Fine-tuning for two function implementations
SF Markus Elfring
- [PATCH 1/2] KEYS: trusted: Use common error handling code in trusted_update()
SF Markus Elfring
- [PATCH 2/2] KEYS: trusted: Use common error handling code in tpm_unseal()
SF Markus Elfring
- KEYS: trusted: Use common error handling code in trusted_update()
SF Markus Elfring
- [PATCH v2 00/15] ima: digest list feature
Matthew Garrett
- [PATCH v2 00/15] ima: digest list feature
Matthew Garrett
- [PATCH v2 00/15] ima: digest list feature
Matthew Garrett
- [PATCH v2 00/15] ima: digest list feature
Matthew Garrett
- [PATCH v2 00/15] ima: digest list feature
Matthew Garrett
- [PATCH V3 1/2] security: Add a cred_getsecid hook
Matthew Garrett
- Firmware signing -- Re: [PATCH 00/27] security, efi: Add kernel lockdown
Matthew Garrett
- Firmware signing -- Re: [PATCH 00/27] security, efi: Add kernel lockdown
Matthew Garrett
- Firmware signing -- Re: [PATCH 00/27] security, efi: Add kernel lockdown
Matthew Garrett
- Firmware signing -- Re: [PATCH 00/27] security, efi: Add kernel lockdown
Matthew Garrett
- Firmware signing -- Re: [PATCH 00/27] security, efi: Add kernel lockdown
Matthew Garrett
- Firmware signing -- Re: [PATCH 00/27] security, efi: Add kernel lockdown
Matthew Garrett
- [PATCH V3 2/2] IMA: Support using new creds in appraisal policy
Matthew Garrett
- [PATCH V3 2/2] IMA: Support using new creds in appraisal policy
Matthew Garrett
- [PATCH v2] tpm: Move Linux RNG connection to hwrng
Jason Gunthorpe
- [PATCH v2] tpm: Move Linux RNG connection to hwrng
Jason Gunthorpe
- [PATCH] tpm: Update MAINTAINERS for Jason Gunthorpe
Jason Gunthorpe
- [PATCH v2] tpm: Move Linux RNG connection to hwrng
Jason Gunthorpe
- [RFC PATCH 2/5] sctp: Add ip option support
Richard Haines
- [RFC PATCH 5/5] selinux: Add SCTP support
Richard Haines
- [RFC PATCH 1/5] security: Add support for SCTP security hooks
Richard Haines
- [RFC PATCH 4/5] netlabel: Add SCTP support
Richard Haines
- [RFC PATCH 5/5] selinux: Add SCTP support
Richard Haines
- [RFC PATCH 5/5] selinux: Add SCTP support
Richard Haines
- [RFC PATCH 5/5] selinux: Add SCTP support
Richard Haines
- [PATCH 0/4] Add SELinux SCTP protocol support
Richard Haines
- [PATCH 1/4] security: Add support for SCTP security hooks
Richard Haines
- [PATCH 2/4] sctp: Add ip option support
Richard Haines
- [PATCH 3/4] sctp: Add LSM hooks
Richard Haines
- [PATCH 4/4] selinux: Add SCTP support
Richard Haines
- [PATCH] security: replace FSF address with web source in license notices
Serge E. Hallyn
- [PATCH v2 06/15] ima: add parser of digest lists metadata
Serge E. Hallyn
- [PATCH v2 12/15] ima: do not update security.ima if appraisal status is not INTEGRITY_PASS
Serge E. Hallyn
- [PATCH v2 06/15] ima: add parser of digest lists metadata
Serge E. Hallyn
- [PATCH v5 next 1/5] modules:capabilities: add request_module_cap()
Serge E. Hallyn
- Documentation patch for namespaced file capabilities
Serge E. Hallyn
- [PATCH v5 next 1/5] modules:capabilities: add request_module_cap()
Serge E. Hallyn
- [PATCH 5/9] LSM: Manage remaining security blobs
Tetsuo Handa
- [PATCH] net/netlabel: Add list_next_rcu() in rcu_dereference().
Tim Hansen
- [PATCH RFC v3 0/7] proc: modernize proc to support multiple private instances
Djalal Harouni
- [PATCH RFC v3 1/7] proc: add proc_fs_info struct to store proc information
Djalal Harouni
- [PATCH RFC v3 2/7] proc: move /proc/{self|thread-self} dentries to proc_fs_info
Djalal Harouni
- [PATCH RFC v3 3/7] proc: add helpers to set and get proc hidepid and gid mount options
Djalal Harouni
- [PATCH RFC v3 4/7] proc: support mounting private procfs instances inside same pid namespace
Djalal Harouni
- [PATCH RFC v3 5/7] proc: move hidepid definitions to proc files
Djalal Harouni
- [PATCH RFC v3 6/7] proc: support new 'pids=all|ptraceable' mount option
Djalal Harouni
- [PATCH RFC v3 7/7] proc: flush dcache entries from all procfs instances
Djalal Harouni
- [PATCH RFC v3 1/7] proc: add proc_fs_info struct to store proc information
Djalal Harouni
- [PATCH RFC v3 4/7] proc: support mounting private procfs instances inside same pid namespace
Djalal Harouni
- [PATCH RFC v3 6/7] proc: support new 'pids=all|ptraceable' mount option
Djalal Harouni
- [PATCH RFC v3 3/7] proc: add helpers to set and get proc hidepid and gid mount options
Djalal Harouni
- [PATCH RFC v3 2/7] proc: move /proc/{self|thread-self} dentries to proc_fs_info
Djalal Harouni
- [PATCH v5 next 0/5] Improve Module autoloading infrastructure
Djalal Harouni
- [PATCH v5 next 1/5] modules:capabilities: add request_module_cap()
Djalal Harouni
- [PATCH v5 next 2/5] modules:capabilities: add cap_kernel_module_request() permission check
Djalal Harouni
- [PATCH v5 next 3/5] modules:capabilities: automatic module loading restriction
Djalal Harouni
- [PATCH v5 next 4/5] modules:capabilities: add a per-task modules auto-load mode
Djalal Harouni
- [PATCH v5 next 5/5] net: modules: use request_module_cap() to load 'netdev-%s' modules
Djalal Harouni
- [PATCH v5 next 0/5] Improve Module autoloading infrastructure
Djalal Harouni
- [PATCH v5 next 1/5] modules:capabilities: add request_module_cap()
Djalal Harouni
- [PATCH v5 next 5/5] net: modules: use request_module_cap() to load 'netdev-%s' modules
Djalal Harouni
- [PATCH v5 next 1/5] modules:capabilities: add request_module_cap()
Djalal Harouni
- [kernel-hardening] Re: [PATCH v5 next 5/5] net: modules: use request_module_cap() to load 'netdev-%s' modules
Djalal Harouni
- [PATCH v5 next 1/5] modules:capabilities: add request_module_cap()
Djalal Harouni
- [PATCH v5 next 1/5] modules:capabilities: add request_module_cap()
Djalal Harouni
- [kernel-hardening] Re: [PATCH v5 next 5/5] net: modules: use request_module_cap() to load 'netdev-%s' modules
Djalal Harouni
- [kernel-hardening] Re: [PATCH v5 next 5/5] net: modules: use request_module_cap() to load 'netdev-%s' modules
Djalal Harouni
- [PATCH v5 next 3/5] modules:capabilities: automatic module loading restriction
Djalal Harouni
- [kernel-hardening] Re: [PATCH v5 next 5/5] net: modules: use request_module_cap() to load 'netdev-%s' modules
Djalal Harouni
- [RFC][PATCH] Lock down kprobes
Masami Hiramatsu
- [PATCH 1/3] KEYS: return full count in keyring_read() if buffer is too small
David Howells
- [PATCH 2/3] KEYS: trusted: fix writing past end of buffer in trusted_read()
David Howells
- [PATCH 3/3] KEYS: fix out-of-bounds read during ASN.1 parsing
David Howells
- [PATCH 1/3] KEYS: return full count in keyring_read() if buffer is too small
David Howells
- [PATCH 07/27] kexec_file: Disable at runtime if securelevel has been set
David Howells
- [RFC PATCH] ima: require secure_boot rules in lockdown mode
David Howells
- [PATCH 03/27] Enforce module signatures if the kernel is locked down
David Howells
- [PATCH 07/27] kexec_file: Disable at runtime if securelevel has been set
David Howells
- [PATCH 03/27] Enforce module signatures if the kernel is locked down
David Howells
- [RFC PATCH] ima: require secure_boot rules in lockdown mode
David Howells
- [PATCH 03/27] Enforce module signatures if the kernel is locked down
David Howells
- Firmware signing -- Re: [PATCH 00/27] security, efi: Add kernel lockdown
David Howells
- [PATCH] KEYS: fix NULL pointer dereference during ASN.1 parsing
David Howells
- [PATCH] KEYS: fix NULL pointer dereference during ASN.1 parsing
David Howells
- [PATCH] KEYS: fix NULL pointer dereference during ASN.1 parsing [ver #2]
David Howells
- [PATCH] KEYS: fix NULL pointer dereference during ASN.1 parsing [ver #2]
David Howells
- [PATCH 02/27] Add a SysRq option to lift kernel lockdown
David Howells
- [PATCH v5 2/4] KEYS: Add ELF class-independent certificate insertion support
David Howells
- [RFC][PATCH] Lock down kprobes
David Howells
- [RFC][PATCH] Lock down kprobes
David Howells
- [RFC][PATCH] Lock down ftrace
David Howells
- [RFC][PATCH] Lock down kprobes
David Howells
- [RFC][PATCH] Lock down kprobes
David Howells
- [RFC][PATCH] Lock down kprobes
David Howells
- [RFC][PATCH] Lock down kprobes
David Howells
- [PATCH 18/27] bpf: Restrict kernel image access functions when the kernel is locked down
David Howells
- [PATCH 00/30] security, efi: Add kernel lockdown
David Howells
- [PATCH 01/30] Add the ability to lock down access to the running kernel image
David Howells
- [PATCH 02/30] Add a SysRq option to lift kernel lockdown
David Howells
- [PATCH 03/30] ima: require secure_boot rules in lockdown mode
David Howells
- [PATCH 04/30] Enforce module signatures if the kernel is locked down
David Howells
- [PATCH 05/30] Restrict /dev/{mem, kmem, port} when the kernel is locked down
David Howells
- [PATCH 06/30] kexec: Disable at runtime if the kernel is locked down
David Howells
- [PATCH 07/30] Copy secure_boot flag in boot params across kexec reboot
David Howells
- [PATCH 08/30] kexec_file: Restrict at runtime if the kernel is locked down
David Howells
- [PATCH 09/30] hibernate: Disable when the kernel is locked down
David Howells
- [PATCH 10/30] uswsusp: Disable when the kernel is locked down
David Howells
- [PATCH 11/30] PCI: Lock down BAR access when the kernel is locked down
David Howells
- [PATCH 12/30] x86: Lock down IO port access when the kernel is locked down
David Howells
- [PATCH 13/30] x86/msr: Restrict MSR access when the kernel is locked down
David Howells
- [PATCH 14/30] asus-wmi: Restrict debugfs interface when the kernel is locked down
David Howells
- [PATCH 15/30] ACPI: Limit access to custom_method when the kernel is locked down
David Howells
- [PATCH 16/30] acpi: Ignore acpi_rsdp kernel param when the kernel has been locked down
David Howells
- [PATCH 17/30] acpi: Disable ACPI table override if the kernel is locked down
David Howells
- [PATCH 18/30] acpi: Disable APEI error injection if the kernel is locked down
David Howells
- [PATCH 19/30] scsi: Lock down the eata driver
David Howells
- [PATCH 20/30] Prohibit PCMCIA CIS storage when the kernel is locked down
David Howells
- [PATCH 21/30] Lock down TIOCSSERIAL
David Howells
- [PATCH 22/30] Lock down module params that specify hardware parameters (eg. ioport)
David Howells
- [PATCH 23/30] x86/mmiotrace: Lock down the testmmiotrace module
David Howells
- [PATCH 24/30] debugfs: Disallow use of debugfs files when the kernel is locked down
David Howells
- [PATCH 25/30] Lock down /proc/kcore
David Howells
- [PATCH 26/30] Lock down ftrace
David Howells
- [PATCH 27/30] Lock down kprobes
David Howells
- [PATCH 28/30] bpf: Restrict kernel image access functions when the kernel is locked down
David Howells
- [PATCH 29/30] efi: Add an EFI_SECURE_BOOT flag to indicate secure boot mode
David Howells
- [PATCH 30/30] efi: Lock down the kernel if booted in secure boot mode
David Howells
- [RFC][PATCH] Lock down ftrace
David Howells
- [RFC][PATCH] Lock down kprobes
David Howells
- [PATCH 26/30] Lock down ftrace
David Howells
- [PATCH 26/30] Lock down ftrace
David Howells
- [PATCH 26/30] Lock down ftrace
David Howells
- Firmware signing -- Re: [PATCH 00/27] security, efi: Add kernel lockdown
David Howells
- [GIT PULL] Keyrings bits
David Howells
- [PATCH] KEYS: remove unnecessary get/put of explicit dest_keyring
David Howells
- [PATCH] KEYS: remove unnecessary get/put of explicit dest_keyring
David Howells
- [PATCH] KEYS: remove unnecessary get/put of explicit dest_keyring
David Howells
- [PATCH] KEYS: add missing permission check for request_key() destination
David Howells
- [PATCH] tpm: Update MAINTAINERS for Jason Gunthorpe
Peter Huewe
- [PATCH] tpm: Update MAINTAINERS for Jason Gunthorpe
Peter Huewe
- [PATCH v4 2/4] tpm: ignore burstcount to improve tpm_tis send() performance
Nayna Jain
- [PATCH v4 2/4] tpm: ignore burstcount to improve tpm_tis send() performance
Nayna Jain
- [PATCH 0/9] LSM: Stacking for major security modules - Based on 4.14-rc2
John Johansen
- [apparmor_mmap_file] WARNING: bad unlock balance detected!
John Johansen
- [PATCH] apparmor: initialized returned struct aa_perms
John Johansen
- Project Funding Program
Austin Jonas
-
Amos Kalonzo
- [PATCH] security: replace FSF address with web source in license notices
Martin Kepplinger
- [PATCH 26/30] Lock down ftrace
Jiri Kosina
- [PATCH 26/30] Lock down ftrace
Jiri Kosina
- [PATCH 26/30] Lock down ftrace
Jiri Kosina
- [kernel-hardening] Re: [PATCH v5 next 5/5] net: modules: use request_module_cap() to load 'netdev-%s' modules
Geo Kozey
- [kernel-hardening] Re: [PATCH v5 next 5/5] net: modules: use request_module_cap() to load 'netdev-%s' modules
Geo Kozey
- [kernel-hardening] Re: [PATCH v5 next 5/5] net: modules: use request_module_cap() to load 'netdev-%s' modules
Geo Kozey
- [kernel-hardening] Re: [PATCH v5 next 5/5] net: modules: use request_module_cap() to load 'netdev-%s' modules
Geo Kozey
- Firmware signing -- Re: [PATCH 00/27] security, efi: Add kernel lockdown
Greg Kroah-Hartman
- [PATCH v5 next 1/5] modules:capabilities: add request_module_cap()
Michal Kubecek
- [PATCH 1/2] KEYS: trusted: Use common error handling code in trusted_update()
Julia Lawall
- [PATCH RFC v3 6/7] proc: support new 'pids=all|ptraceable' mount option
Andy Lutomirski
- Hello Dear...
M,Shakour Rosarita
- [RFC][PATCH] Lock down kprobes
Ananth N Mavinakayanahalli
- [RFC][PATCH] Lock down kprobes
Ananth N Mavinakayanahalli
- [RFC][PATCH] Lock down kprobes
Ananth N Mavinakayanahalli
- [RFC v4 00/10] S.A.R.A. a new stacked LSM
Salvatore Mesoraca
- [RFC v4 01/10] S.A.R.A. Documentation
Salvatore Mesoraca
- [RFC v4 02/10] S.A.R.A. framework creation
Salvatore Mesoraca
- [RFC v4 03/10] Creation of "check_vmflags" LSM hook
Salvatore Mesoraca
- [RFC v4 04/10] S.A.R.A. cred blob management
Salvatore Mesoraca
- [RFC v4 05/10] S.A.R.A. WX Protection
Salvatore Mesoraca
- [RFC v4 06/10] Creation of "pagefault_handler" LSM hook
Salvatore Mesoraca
- [RFC v4 07/10] Trampoline emulation
Salvatore Mesoraca
- [RFC v4 08/10] Allowing for stacking procattr support in S.A.R.A.
Salvatore Mesoraca
- [RFC v4 09/10] S.A.R.A. WX Protection procattr interface
Salvatore Mesoraca
- [RFC v4 10/10] XATTRs support
Salvatore Mesoraca
- [kernel-hardening] Re: [PATCH v5 next 5/5] net: modules: use request_module_cap() to load 'netdev-%s' modules
Daniel Micay
- [PATCH] net/netlabel: Add list_next_rcu() in rcu_dereference().
David Miller
- [PATCH v5 next 0/5] Improve Module autoloading infrastructure
David Miller
- [PATCH v5 next 1/5] modules:capabilities: add request_module_cap()
David Miller
- [PATCH v5 next 1/5] modules:capabilities: add request_module_cap()
David Miller
- [RFC PATCH] xfrm: fix regression introduced by xdst pcpu cache
Paul Moore
- [RFC PATCH] xfrm: fix regression introduced by xdst pcpu cache
Paul Moore
- KASAN: use-after-free Read in do_raw_spin_lock
Paul Moore
- [RFC PATCH 1/5] security: Add support for SCTP security hooks
Paul Moore
- [RFC PATCH 4/5] netlabel: Add SCTP support
Paul Moore
- [RFC PATCH 5/5] selinux: Add SCTP support
Paul Moore
- [PATCH 0/9] LSM: Stacking for major security modules - Based on 4.14-rc2
Paul Moore
- [GIT PULL] SELinux patches for v4.15
Paul Moore
- [RFC PATCH 4/5] netlabel: Add SCTP support
Paul Moore
- [RFC PATCH 5/5] selinux: Add SCTP support
Paul Moore
- [PATCH] net/netlabel: Add list_next_rcu() in rcu_dereference().
Paul Moore
- [PATCH] security: replace FSF address with web source in license notices
Paul Moore
- [RFC PATCH 5/5] selinux: Add SCTP support
Paul Moore
- [BUG] kernel stack corruption during/after Netlabel error
Paul Moore
- [BUG] kernel stack corruption during/after Netlabel error
Paul Moore
- [RFC v0.1][PATCH] selinuxns: extend namespace support to security.selinux xattrs
James Morris
- [PATCH] KEYS: trusted: fix writing past end of buffer in trusted_read()
James Morris
- [PULL] Smack: Changes for 4.15
James Morris
- [GIT PULL] Keys fixes for v4.15
James Morris
- [PATCH] MAINTAINERS: update the IMA, EVM, trusted-keys, encrypted-keys entries
James Morris
- [PATCH 0/9] LSM: Stacking for major security modules - Based on 4.14-rc2
James Morris
- [GIT PULL] linux-integrity patches for 4.15-security-next-testing
James Morris
- [GIT PULL] linux-integrity patches for 4.15-security-next-testing
James Morris
- [RFC PATCH] ima: require secure_boot rules in lockdown mode
James Morris
- [RFC PATCH] ima: require secure_boot rules in lockdown mode
James Morris
- [PATCH RFC v3 4/7] proc: support mounting private procfs instances inside same pid namespace
James Morris
- [PATCH RFC v3 6/7] proc: support new 'pids=all|ptraceable' mount option
James Morris
- [GIT PULL] Security subsystem general updates for 4.15
James Morris
- [GIT PULL] Security subsystem: integrity updates for v4.15
James Morris
- [RFC v0.1][PATCH] selinuxns: extend namespace support to security.selinux xattrs
James Morris
- [RFC v0.1][PATCH] selinuxns: extend namespace support to security.selinux xattrs
James Morris
- IMA appraisal master plan?
James Morris
- [GIT PULL] security subsystem: IMA bugfix
James Morris
- [RFC][PATCH][v0.2] selinuxns: extend namespace support to security.selinux xattrs
James Morris
- IMA appraisal master plan?
James Morris
- [PATCH v5 next 0/5] Improve Module autoloading infrastructure
James Morris
- [PATCH v5 next 0/5] Improve Module autoloading infrastructure
James Morris
- [GIT PULL] seccomp updates for next
James Morris
- [BUG] kernel stack corruption during/after Netlabel error
James Morris
- [PATCH v2] tpm: Move Linux RNG connection to hwrng
PrasannaKumar Muralidharan
- [PATCH v2] tpm: Move Linux RNG connection to hwrng
PrasannaKumar Muralidharan
- [PATCH v3] tpm: use struct tpm_chip for tpm_chip_find_get()
PrasannaKumar Muralidharan
- [PATCH v2] tpm: Move Linux RNG connection to hwrng
PrasannaKumar Muralidharan
- IMA appraisal master plan?
Patrick Ohly
- IMA appraisal master plan?
Patrick Ohly
- [PATCH 0/4] treewide: Fix line continuation formats
Joe Perches
- [PATCH 4/4] ima: Fix line continuation format
Joe Perches
- [PATCH 0/4] treewide: Fix line continuation formats
Joe Perches
- Firmware signing -- Re: [PATCH 00/27] security, efi: Add kernel lockdown
Luis R. Rodriguez
- Firmware signing -- Re: [PATCH 00/27] security, efi: Add kernel lockdown
Luis R. Rodriguez
- Firmware signing -- Re: [PATCH 00/27] security, efi: Add kernel lockdown
Luis R. Rodriguez
- Firmware signing -- Re: [PATCH 00/27] security, efi: Add kernel lockdown
Luis R. Rodriguez
- [RFC PATCH] fw_lockdown: new micro LSM module to prevent loading unsigned firmware
Luis R. Rodriguez
- [RFC PATCH] fw_lockdown: new micro LSM module to prevent loading unsigned firmware
Luis R. Rodriguez
- [RFC PATCH v1] fw_lockdown: new micro LSM module to prevent loading unsigned firmware
Luis R. Rodriguez
- Firmware signing -- Re: [PATCH 00/27] security, efi: Add kernel lockdown
Luis R. Rodriguez
- Firmware signing -- Re: [PATCH 00/27] security, efi: Add kernel lockdown
Luis R. Rodriguez
- Firmware signing -- Re: [PATCH 00/27] security, efi: Add kernel lockdown
Luis R. Rodriguez
- Firmware signing -- Re: [PATCH 00/27] security, efi: Add kernel lockdown
Luis R. Rodriguez
- Firmware signing -- Re: [PATCH 00/27] security, efi: Add kernel lockdown
Luis R. Rodriguez
- Firmware signing -- Re: [PATCH 00/27] security, efi: Add kernel lockdown
Luis R. Rodriguez
- [PATCH v5 next 1/5] modules:capabilities: add request_module_cap()
Luis R. Rodriguez
- [PATCH v5 next 1/5] modules:capabilities: add request_module_cap()
Luis R. Rodriguez
- [PATCH v5 next 1/5] modules:capabilities: add request_module_cap()
Luis R. Rodriguez
- [PATCH v5 next 1/5] modules:capabilities: add request_module_cap()
Luis R. Rodriguez
- [PATCH v5 next 1/5] modules:capabilities: add request_module_cap()
Luis R. Rodriguez
- [PATCH v5 next 3/5] modules:capabilities: automatic module loading restriction
Luis R. Rodriguez
- [PATCH v5 next 2/5] modules:capabilities: add cap_kernel_module_request() permission check
Luis R. Rodriguez
- [RFC][PATCH] Lock down ftrace
Steven Rostedt
- [RFC PATCH] ima: require secure_boot rules in lockdown mode
Stephen Rothwell
- [RFC PATCH] ima: require secure_boot rules in lockdown mode
Stephen Rothwell
- [PATCH v2 00/15] ima: digest list feature
Safford, David (GE Global Research, US)
- [PATCH] tpm: Update MAINTAINERS for Jason Gunthorpe
Jarkko Sakkinen
- [PATCH v2] tpm: Move Linux RNG connection to hwrng
Jarkko Sakkinen
- [PATCH 3,RESEND] tpm: use struct tpm_chip for tpm_chip_find_get()
Jarkko Sakkinen
- [PATCH] tpm: Update MAINTAINERS for Jason Gunthorpe
Jarkko Sakkinen
- [PATCH v2] tpm: Move Linux RNG connection to hwrng
Jarkko Sakkinen
- [PATCH] tpm: Update MAINTAINERS for Jason Gunthorpe
Jarkko Sakkinen
- [paul at keyserver.paulfurley.com: PGP key expires in 3 days: 0x7179B76704ABA18B (it can be extended)]
Jarkko Sakkinen
- [PATCH] tpm: Update MAINTAINERS for Jason Gunthorpe
Jarkko Sakkinen
- [PATCH] tpm: Update MAINTAINERS for Jason Gunthorpe
Jarkko Sakkinen
- [PATCH v3] tpm: use struct tpm_chip for tpm_chip_find_get()
Jarkko Sakkinen
- [PATCH v2] tpm: Move Linux RNG connection to hwrng
Jarkko Sakkinen
- [PATCH v2] tpm: Move Linux RNG connection to hwrng
Jarkko Sakkinen
- [PATCH v2] tpm: Move Linux RNG connection to hwrng
Jarkko Sakkinen
- [PATCH v4 2/4] tpm: ignore burstcount to improve tpm_tis send() performance
Jarkko Sakkinen
- [PATCH v4 2/4] tpm: ignore burstcount to improve tpm_tis send() performance
Jarkko Sakkinen
- [PATCH v6 0/2] Fix corner cases with disabling CLKRUN in tpm_tis
Jarkko Sakkinen
- [PATCH v2 00/15] ima: digest list feature
Roberto Sassu
- [PATCH v2 01/15] ima: generalize ima_read_policy()
Roberto Sassu
- [PATCH v2 02/15] ima: generalize ima_write_policy()
Roberto Sassu
- [PATCH v2 03/15] ima: generalize policy file operations
Roberto Sassu
- [PATCH v2 04/15] ima: use ima_show_htable_value to show hash table data
Roberto Sassu
- [PATCH v2 05/15] ima: add functions to manage digest lists
Roberto Sassu
- [PATCH v2 06/15] ima: add parser of digest lists metadata
Roberto Sassu
- [PATCH v2 07/15] ima: add parser of compact digest list
Roberto Sassu
- [PATCH v2 08/15] ima: add parser of RPM package headers
Roberto Sassu
- [PATCH v2 09/15] ima: introduce securityfs interfaces for digest lists
Roberto Sassu
- [PATCH v2 10/15] ima: disable digest lookup if digest lists are not checked
Roberto Sassu
- [PATCH v2 11/15] ima: add policy action digest_list
Roberto Sassu
- [PATCH v2 12/15] ima: do not update security.ima if appraisal status is not INTEGRITY_PASS
Roberto Sassu
- [PATCH v2 13/15] evm: add kernel command line option to select protected xattrs
Roberto Sassu
- [PATCH v2 14/15] ima: add support for appraisal with digest lists
Roberto Sassu
- [PATCH v2 15/15] ima: add Documentation/security/IMA-digest-lists.txt
Roberto Sassu
- [PATCH v2 00/15] ima: digest list feature
Roberto Sassu
- [PATCH v2 00/15] ima: digest list feature
Roberto Sassu
- [PATCH v2 00/15] ima: digest list feature
Roberto Sassu
- [PATCH v2 00/15] ima: digest list feature
Roberto Sassu
- [PATCH v2 00/15] ima: digest list feature
Roberto Sassu
- [PATCH v2 00/15] ima: digest list feature
Roberto Sassu
- [PATCH v2 00/15] ima: digest list feature
Roberto Sassu
- [USER SPACE][RFC][PATCH 0/5] ima: digest-list-tools package
Roberto Sassu
- [USER SPACE][RFC][PATCH 1/5] digest-list-tools: headers
Roberto Sassu
- [USER SPACE][RFC][PATCH 2/5] digest-list-tools: library
Roberto Sassu
- [USER SPACE][RFC][PATCH 3/5] digest-list-tools: tools
Roberto Sassu
- [USER SPACE][RFC][PATCH 4/5] digest-list-tools: documentation
Roberto Sassu
- [USER SPACE][RFC][PATCH 5/5] digest-list-tools: package
Roberto Sassu
- [PATCH v2 00/15] ima: digest list feature
Roberto Sassu
- IMA appraisal master plan?
Roberto Sassu
- IMA appraisal master plan?
Roberto Sassu
- [PATCH v2 06/15] ima: add parser of digest lists metadata
Roberto Sassu
- IMA appraisal master plan?
Roberto Sassu
- IMA appraisal master plan?
Roberto Sassu
- [RFC][PATCH v2 0/9] ima: integrity models for appraised files
Roberto Sassu
- [RFC][PATCH v2 1/9] ima: pass filename to ima_rdwr_violation_check()
Roberto Sassu
- [RFC][PATCH v2 2/9] ima: preserve flags in ima_inode_post_setattr() if file must be appraised
Roberto Sassu
- [RFC][PATCH v2 3/9] ima: preserve iint flags if security.ima update is successful
Roberto Sassu
- [RFC][PATCH v2 4/9] ima: introduce ima_mk_null_file()
Roberto Sassu
- [RFC][PATCH v2 5/9] ima: measure/appraise/audit inherited file descriptors
Roberto Sassu
- [RFC][PATCH v2 6/9] ima: enforce the Biba strict policy on appraised files
Roberto Sassu
- [RFC][PATCH v2 7/9] ima: enforce the Biba low watermark for objects policy on appraised files
Roberto Sassu
- [RFC][PATCH v2 8/9] ima: introduce policy action try_appraise
Roberto Sassu
- [RFC][PATCH v2 9/9] ima: don't measure files with valid appraisal status
Roberto Sassu
- [PULL] Smack: Changes for 4.15
Casey Schaufler
- [PULL] Smack: Changes for 4.15
Casey Schaufler
- [PATCH 0/9] LSM: Stacking for major security modules - Based on 4.14-rc2
Casey Schaufler
- [RFC PATCH v1] fw_lockdown: new micro LSM module to prevent loading unsigned firmware
Casey Schaufler
- [PATCH 0/9] LSM: Stacking for major security modules - Based on 4.14-rc2
Casey Schaufler
- [PATCH 5/9] LSM: Manage remaining security blobs
Casey Schaufler
- [BUG] kernel stack corruption during/after Netlabel error
Casey Schaufler
- [RFC 0/3] Safe, dynamically (un)loadable LSMs
Casey Schaufler
- [BUG] kernel stack corruption during/after Netlabel error
Casey Schaufler
- [BUG] kernel stack corruption during/after Netlabel error
Casey Schaufler
- [BUG] kernel stack corruption during/after Netlabel error
Casey Schaufler
- [BUG] kernel stack corruption during/after Netlabel error
Casey Schaufler
- [PATCH v4 0/2] ] Fix corner cases with disabling CLKRUN in tpm_tis
Azhar Shaikh
- [PATCH v4 1/2] tpm: Keep CLKRUN enabled throughout the duration of transmit_cmd()
Azhar Shaikh
- [PATCH v4 2/2] tpm_tis: Move ilb_base_addr to tpm_tis_tcg_phy
Azhar Shaikh
- [PATCH v4 1/2] tpm: Keep CLKRUN enabled throughout the duration of transmit_cmd()
Shaikh, Azhar
- [PATCH v5 0/2] Fix corner cases with disabling CLKRUN in tpm_tis
Azhar Shaikh
- [PATCH v5 1/2] tpm_tis: Move ilb_base_addr to tpm_tis_data
Azhar Shaikh
- [PATCH v5 2/2] tpm: Keep CLKRUN enabled throughout the duration of transmit_cmd()
Azhar Shaikh
- [PATCH v6 0/2] Fix corner cases with disabling CLKRUN in tpm_tis
Azhar Shaikh
- [PATCH v6 1/2] tpm_tis: Move ilb_base_addr to tpm_tis_data
Azhar Shaikh
- [PATCH v6 2/2] tpm: Keep CLKRUN enabled throughout the duration of transmit_cmd()
Azhar Shaikh
- [PATCH v6 0/2] Fix corner cases with disabling CLKRUN in tpm_tis
Shaikh, Azhar
- [PATCH 3/9] LSM: Manage file security blobs
Stephen Smalley
- [RFC PATCH] xfrm: fix regression introduced by xdst pcpu cache
Stephen Smalley
- [RFC v0.1][PATCH] selinuxns: extend namespace support to security.selinux xattrs
Stephen Smalley
- [RFC PATCH] xfrm: fix regression introduced by xdst pcpu cache
Stephen Smalley
- [RFC v0.1][PATCH] selinuxns: extend namespace support to security.selinux xattrs
Stephen Smalley
- [RFC PATCH 5/5] selinux: Add SCTP support
Stephen Smalley
- IMA appraisal master plan?
Stephen Smalley
- [RFC][PATCH][v0.2] selinuxns: extend namespace support to security.selinux xattrs
Stephen Smalley
- [PATCH 4/4] selinux: Add SCTP support
Stephen Smalley
- [PATCH 4/4] selinux: Add SCTP support
Stephen Smalley
- Firmware signing -- Re: [PATCH 00/27] security, efi: Add kernel lockdown
Linus Torvalds
- Firmware signing -- Re: [PATCH 00/27] security, efi: Add kernel lockdown
Linus Torvalds
- Firmware signing -- Re: [PATCH 00/27] security, efi: Add kernel lockdown
Linus Torvalds
- Firmware signing -- Re: [PATCH 00/27] security, efi: Add kernel lockdown
Linus Torvalds
- [PATCH v5 next 0/5] Improve Module autoloading infrastructure
Linus Torvalds
- [PATCH v5 next 5/5] net: modules: use request_module_cap() to load 'netdev-%s' modules
Linus Torvalds
- [PATCH v5 next 0/5] Improve Module autoloading infrastructure
Linus Torvalds
- [PATCH v5 next 0/5] Improve Module autoloading infrastructure
Linus Torvalds
- [PATCH v5 next 5/5] net: modules: use request_module_cap() to load 'netdev-%s' modules
Linus Torvalds
- [PATCH v5 next 5/5] net: modules: use request_module_cap() to load 'netdev-%s' modules
Linus Torvalds
- [PATCH v5 next 5/5] net: modules: use request_module_cap() to load 'netdev-%s' modules
Linus Torvalds
- [kernel-hardening] Re: [PATCH v5 next 5/5] net: modules: use request_module_cap() to load 'netdev-%s' modules
Linus Torvalds
- [kernel-hardening] Re: [PATCH v5 next 5/5] net: modules: use request_module_cap() to load 'netdev-%s' modules
Linus Torvalds
- [kernel-hardening] Re: [PATCH v5 next 5/5] net: modules: use request_module_cap() to load 'netdev-%s' modules
Linus Torvalds
- [kernel-hardening] Re: [PATCH v5 next 5/5] net: modules: use request_module_cap() to load 'netdev-%s' modules
Linus Torvalds
- [kernel-hardening] Re: [PATCH v5 next 5/5] net: modules: use request_module_cap() to load 'netdev-%s' modules
Linus Torvalds
- [kernel-hardening] Re: [PATCH v5 next 5/5] net: modules: use request_module_cap() to load 'netdev-%s' modules
Linus Torvalds
- [kernel-hardening] Re: [PATCH v5 next 5/5] net: modules: use request_module_cap() to load 'netdev-%s' modules
Linus Torvalds
- [kernel-hardening] Re: [PATCH v5 next 5/5] net: modules: use request_module_cap() to load 'netdev-%s' modules
Linus Torvalds
- [PATCH v5 next 1/5] modules:capabilities: add request_module_cap()
Linus Torvalds
- [kernel-hardening] Re: [PATCH v5 next 5/5] net: modules: use request_module_cap() to load 'netdev-%s' modules
Linus Torvalds
- [kernel-hardening] Re: [PATCH v5 next 5/5] net: modules: use request_module_cap() to load 'netdev-%s' modules
Theodore Ts'o
- [kernel-hardening] Re: [PATCH v5 next 5/5] net: modules: use request_module_cap() to load 'netdev-%s' modules
Theodore Ts'o
- [kernel-hardening] Re: [PATCH v5 next 5/5] net: modules: use request_module_cap() to load 'netdev-%s' modules
Theodore Ts'o
- [kernel-hardening] Re: [PATCH v5 next 5/5] net: modules: use request_module_cap() to load 'netdev-%s' modules
Theodore Ts'o
- [PATCH v5 next 1/5] modules:capabilities: add request_module_cap()
Theodore Ts'o
- [PATCH v5 next 1/5] modules:capabilities: add request_module_cap()
Theodore Ts'o
- [PATCH v5 next 1/5] modules:capabilities: add request_module_cap()
Theodore Ts'o
- [kernel-hardening] Re: [PATCH v5 next 5/5] net: modules: use request_module_cap() to load 'netdev-%s' modules
Theodore Ts'o
- KASAN: use-after-free Read in do_raw_spin_lock
Dmitry Vyukov
- KASAN: use-after-free Read in do_raw_spin_lock
Dmitry Vyukov
- [apparmor_mmap_file] WARNING: bad unlock balance detected!
Fengguang Wu
- [apparmor_mmap_file] WARNING: bad unlock balance detected!
Fengguang Wu
- [PATCH v10 00/20] simplify crypto wait for async op
Herbert Xu
- [PATCH 03/27] Enforce module signatures if the kernel is locked down
Mimi Zohar
- [RFC PATCH] ima: require secure_boot rules in lockdown mode
Mimi Zohar
- [PATCH 03/27] Enforce module signatures if the kernel is locked down
Mimi Zohar
- [PATCH 00/27] security, efi: Add kernel lockdown
Mimi Zohar
- Firmware signing -- Re: [PATCH 00/27] security, efi: Add kernel lockdown
Mimi Zohar
- [PATCH 03/27] Enforce module signatures if the kernel is locked down
Mimi Zohar
- [PATCH] MAINTAINERS: update the IMA, EVM, trusted-keys, encrypted-keys entries
Mimi Zohar
- [PATCH v2 00/15] ima: digest list feature
Mimi Zohar
- Firmware signing -- Re: [PATCH 00/27] security, efi: Add kernel lockdown
Mimi Zohar
- [RFC PATCH] ima: require secure_boot rules in lockdown mode
Mimi Zohar
- [RFC PATCH] ima: require secure_boot rules in lockdown mode
Mimi Zohar
- [GIT PULL] linux-integrity patches for 4.15-security-next-testing
Mimi Zohar
- [GIT PULL] linux-integrity patches for 4.15-security-next-testing
Mimi Zohar
- Firmware signing -- Re: [PATCH 00/27] security, efi: Add kernel lockdown
Mimi Zohar
- [RFC PATCH] ima: require secure_boot rules in lockdown mode
Mimi Zohar
- [GIT PULL] linux-integrity patches for 4.15-security-next-testing
Mimi Zohar
- [RFC PATCH] ima: require secure_boot rules in lockdown mode
Mimi Zohar
- [PATCH v2 00/15] ima: digest list feature
Mimi Zohar
- Firmware signing -- Re: [PATCH 00/27] security, efi: Add kernel lockdown
Mimi Zohar
- Firmware signing -- Re: [PATCH 00/27] security, efi: Add kernel lockdown
Mimi Zohar
- [RFC PATCH] fw_lockdown: new micro LSM module to prevent loading unsigned firmware
Mimi Zohar
- [RFC PATCH] fw_lockdown: new micro LSM module to prevent loading unsigned firmware
Mimi Zohar
- [RFC PATCH] fw_lockdown: new micro LSM module to prevent loading unsigned firmware
Mimi Zohar
- [RFC PATCH v1] fw_lockdown: new micro LSM module to prevent loading unsigned firmware
Mimi Zohar
- [RFC PATCH v1] fw_lockdown: new micro LSM module to prevent loading unsigned firmware
Mimi Zohar
- Firmware signing -- Re: [PATCH 00/27] security, efi: Add kernel lockdown
Mimi Zohar
- Firmware signing -- Re: [PATCH 00/27] security, efi: Add kernel lockdown
Mimi Zohar
- Firmware signing -- Re: [PATCH 00/27] security, efi: Add kernel lockdown
Mimi Zohar
- Firmware signing -- Re: [PATCH 00/27] security, efi: Add kernel lockdown
Mimi Zohar
- [GIT PULL] Security subsystem: integrity updates for v4.15
Mimi Zohar
- Firmware signing -- Re: [PATCH 00/27] security, efi: Add kernel lockdown
Mimi Zohar
- Firmware signing -- Re: [PATCH 00/27] security, efi: Add kernel lockdown
Mimi Zohar
- [PATCH 0/4] treewide: Fix line continuation formats
Mimi Zohar
- [PATCH 0/4] treewide: Fix line continuation formats
Mimi Zohar
- [PATCH v2 00/15] ima: digest list feature
Mimi Zohar
- IMA appraisal master plan?
Mimi Zohar
- [PATCH v2 06/15] ima: add parser of digest lists metadata
Mimi Zohar
- [GIT PULL] integrity: fixes
Mimi Zohar
- [PATCH v2 06/15] ima: add parser of digest lists metadata
Mimi Zohar
- IMA appraisal master plan?
Mimi Zohar
- IMA appraisal master plan?
Mimi Zohar
- IMA appraisal master plan?
Mimi Zohar
- [RFC PATCH v2] fw_lockdown: new micro LSM module to prevent loading unsigned firmware
Mimi Zohar
- [PATCH v4 2/4] tpm: ignore burstcount to improve tpm_tis send() performance
Mimi Zohar
- [PATCH v4 2/4] tpm: ignore burstcount to improve tpm_tis send() performance
Mimi Zohar
- [PATCH V3 2/2] IMA: Support using new creds in appraisal policy
Mimi Zohar
- [PATCH V3 2/2] IMA: Support using new creds in appraisal policy
Mimi Zohar
- [PATCH V3 2/2] IMA: Support using new creds in appraisal policy
Mimi Zohar
- [PATCH v4 2/4] tpm: ignore burstcount to improve tpm_tis send() performance
Alexander.Steffen at infineon.com
- [PATCH v4 2/4] tpm: ignore burstcount to improve tpm_tis send() performance
Alexander.Steffen at infineon.com
- [PATCH v4 2/4] tpm: ignore burstcount to improve tpm_tis send() performance
Alexander.Steffen at infineon.com
- [PATCH v4 2/4] tpm: ignore burstcount to improve tpm_tis send() performance
Alexander.Steffen at infineon.com
- [PATCH 4/4] selinux: Add SCTP support
kbuild test robot
Last message date:
Thu Nov 30 18:37:23 UTC 2017
Archived on: Thu Nov 30 18:37:32 UTC 2017
This archive was generated by
Pipermail 0.09 (Mailman edition).