October 2017 Archives by subject
Starting: Sun Oct 1 01:02:01 UTC 2017
Ending: Tue Oct 31 23:08:09 UTC 2017
Messages: 644
- [GIT PULL] vfs i_version fix for Linus
Mimi Zohar
- [GIT PULL] vfs i_version fix for Linus
Al Viro
- [GIT PULL] vfs i_version fix for Linus
Mimi Zohar
- [GIT PULL] Kernel lockdown for secure boot
David Howells
- [GIT PULL] Kernel lockdown for secure boot
Mimi Zohar
- [GIT PULL] Kernel lockdown for secure boot
James Morris
- [GIT PULL] KEYS: Fixes
David Howells
- [GIT PULL] KEYS: Fixes
Eric Biggers
- [GIT PULL] KEYS: Fixes
David Howells
- [GIT PULL] lsm: fix smack_inode_removexattr and xattr_getsecurity memleak
James Morris
- [GIT PULL] Security subystem fixes for v4.14-rc5
James Morris
- [GIT PULL] tpmdd updates for Linux 4.15
Jarkko Sakkinen
- [GIT PULL] tpmdd updates for Linux 4.15
Jarkko Sakkinen
- [GIT PULL] tpmdd updates for Linux 4.15
James Morris
- [kernel-hardening] [RFC PATCH 1/2] security, capabilities: Add CAP_SYS_MOUNT
Nicolas Belouin
- [kernel-hardening] [RFC PATCH 1/2] security, capabilities: create CAP_TRUSTED
nicolas at belouin.fr
- [kernel-hardening] [RFC PATCH 1/2] security, capabilities: Add CAP_SYS_MOUNT
Casey Schaufler
- [kernel-hardening] [RFC PATCH 1/2] security, capabilities: Add CAP_SYS_MOUNT
Casey Schaufler
- [kernel-hardening] [RFC PATCH 1/2] security, capabilities: create CAP_TRUSTED
Casey Schaufler
- [Non-DoD Source] Re: [PATCH net-next v2 5/5] selinux: bpf: Add addtional check for bpf object file receive
Stephen Smalley
- [Non-DoD Source] Re: [PATCH net-next v2 5/5] selinux: bpf: Add addtional check for bpf object file receive
Chenbo Feng
- [PATCH 0/2] ima: change how MODULE_SIG_FORCE is checked on modules checking policy
Bruno E. O. Meneguele
- [PATCH 0/3] tpm: retrieve digest size of unknown algorithms from TPM
Jarkko Sakkinen
- [PATCH 0/4] net-next: security: New file mode and LSM hooks for eBPF object permission control
Chenbo Feng
- [PATCH 0/8] CaitSith LSM module
Tetsuo Handa
- [PATCH 0/8] CaitSith LSM module
Casey Schaufler
- [PATCH 0/8] KEYS: keyctl operations for asymmetric keys [ver #2]
George Wilson
- [PATCH 0/9] LSM: Stacking for major security modules - Based on 4.14-rc2
Casey Schaufler
- [PATCH 00/27] security, efi: Add kernel lockdown
David Howells
- [PATCH 00/27] security, efi: Add kernel lockdown
David Howells
- [PATCH 01/15] KEYS: encrypted: fix dereference of NULL user_key_payload
David Howells
- [PATCH 01/27] Add the ability to lock down access to the running kernel image
David Howells
- [PATCH 01/27] Add the ability to lock down access to the running kernel image
James Morris
- [PATCH 02/14] VFS: Add LSM hooks for filesystem context [ver #6]
Randy Dunlap
- [PATCH 02/15] FS-Cache: fix dereference of NULL user_key_payload
David Howells
- [PATCH 02/27] Add a SysRq option to lift kernel lockdown
David Howells
- [PATCH 02/27] Add a SysRq option to lift kernel lockdown
Randy Dunlap
- [PATCH 02/27] Add a SysRq option to lift kernel lockdown
David Howells
- [PATCH 03/15] lib/digsig: fix dereference of NULL user_key_payload
David Howells
- [PATCH 03/27] Enforce module signatures if the kernel is locked down
joeyli
- [PATCH 03/27] Enforce module signatures if the kernel is locked down
James Morris
- [PATCH 03/27] Enforce module signatures if the kernel is locked down
Mimi Zohar
- [PATCH 03/27] Enforce module signatures if the kernel is locked down
David Howells
- [PATCH 03/27] Enforce module signatures if the kernel is locked down
Mimi Zohar
- [PATCH 03/27] Enforce module signatures if the kernel is locked down
David Howells
- [PATCH 04/15] fscrypt: fix dereference of NULL user_key_payload
David Howells
- [PATCH 04/27] Restrict /dev/mem and /dev/kmem when the kernel is locked down
James Morris
- [PATCH 04/27] Restrict /dev/mem and /dev/kmem when the kernel is locked down
David Howells
- [PATCH 04/27] Restrict /dev/mem and /dev/kmem when the kernel is locked down
joeyli
- [PATCH 04/27] Restrict /dev/mem and /dev/kmem when the kernel is locked down
David Howells
- [PATCH 04/27] Restrict /dev/mem and /dev/kmem when the kernel is locked down
Ethan Zhao
- [PATCH 04/27] Restrict /dev/mem and /dev/kmem when the kernel is locked down
David Howells
- [PATCH 05/15] ecryptfs: fix dereference of NULL user_key_payload
David Howells
- [PATCH 05/27] kexec: Disable at runtime if the kernel is locked down
joeyli
- [PATCH 05/27] kexec: Disable at runtime if the kernel is locked down
James Morris
- [PATCH 05/27] kexec: Disable at runtime if the kernel is locked down
David Howells
- [PATCH 06/15] ecryptfs: fix out-of-bounds read of key payload
David Howells
- [PATCH 06/27] Copy secure_boot flag in boot params across kexec reboot
joeyli
- [PATCH 06/27] Copy secure_boot flag in boot params across kexec reboot
David Howells
- [PATCH 07/15] ecryptfs: move key payload accessor functions into keystore.c
David Howells
- [PATCH 07/27] kexec_file: Disable at runtime if securelevel has been set
Mimi Zohar
- [PATCH 07/27] kexec_file: Disable at runtime if securelevel has been set
David Howells
- [PATCH 07/27] kexec_file: Disable at runtime if securelevel has been set
James Morris
- [PATCH 07/27] kexec_file: Disable at runtime if securelevel has been set
Mimi Zohar
- [PATCH 07/27] kexec_file: Disable at runtime if securelevel has been set
joeyli
- [PATCH 07/27] kexec_file: Disable at runtime if securelevel has been set
Mimi Zohar
- [PATCH 07/27] kexec_file: Disable at runtime if securelevel has been set
David Howells
- [PATCH 07/27] kexec_file: Disable at runtime if securelevel has been set
David Howells
- [PATCH 07/27] kexec_file: Disable at runtime if securelevel has been set
Mimi Zohar
- [PATCH 07/27] kexec_file: Disable at runtime if securelevel has been set
Mimi Zohar
- [PATCH 07/27] kexec_file: Disable at runtime if securelevel has been set
joeyli
- [PATCH 07/27] kexec_file: Disable at runtime if securelevel has been set
Mimi Zohar
- [PATCH 07/27] kexec_file: Disable at runtime if securelevel has been set
David Howells
- [PATCH 07/27] kexec_file: Disable at runtime if securelevel has been set
Mimi Zohar
- [PATCH 07/27] kexec_file: Disable at runtime if securelevel has been set
David Howells
- [PATCH 07/27] kexec_file: Disable at runtime if securelevel has been set
Mimi Zohar
- [PATCH 08/15] security/keys: BIG_KEY requires CONFIG_CRYPTO
David Howells
- [PATCH 08/27] hibernate: Disable when the kernel is locked down
David Howells
- [PATCH 08/27] hibernate: Disable when the kernel is locked down
joeyli
- [PATCH 09/15] KEYS: Fix the wrong index when checking the existence of second id
David Howells
- [PATCH 09/27] uswsusp: Disable when the kernel is locked down
David Howells
- [PATCH 09/27] uswsusp: Disable when the kernel is locked down
joeyli
- [PATCH 09/27] uswsusp: Disable when the kernel is locked down
James Morris
- [PATCH 1/2] module: export module signature enforcement status
Bruno E. O. Meneguele
- [PATCH 1/2] module: export module signature enforcement status
Mimi Zohar
- [PATCH 1/2] security: Add a cred_getsecid hook
Matthew Garrett
- [PATCH 1/2] security: Add a cred_getsecid hook
Casey Schaufler
- [PATCH 1/2] security: Add a cred_getsecid hook
Matthew Garrett
- [PATCH 1/2] security: Add a cred_getsecid hook
Matthew Garrett
- [PATCH 1/2] security: Add a cred_getsecid hook
Casey Schaufler
- [PATCH 1/2] security: Add a cred_getsecid hook
Paul Moore
- [PATCH 1/2] selinux: fix build warning by removing the unused sid variable
Stephen Smalley
- [PATCH 1/2] selinux: fix build warning by removing the unused sid variable
Corentin Labbe
- [PATCH 1/2] selinux: fix build warning by removing the unused sid variable
Paul Moore
- [PATCH 1/3] tpm: move PCR read code to static function tpm2_pcr_read_common()
Jarkko Sakkinen
- [PATCH 1/4] KEYS: Replace uid/gid/perm permissions checking with an ACL
David Howells
- [PATCH 1/7] KEYS: encrypted: fix dereference of NULL user_key_payload
James Morris
- [PATCH 1/9] procfs: add smack subdir to attrs
Casey Schaufler
- [PATCH 10/15] KEYS: checking the input id parameters before finding asymmetric key
David Howells
- [PATCH 10/27] PCI: Lock down BAR access when the kernel is locked down
joeyli
- [PATCH 10/27] PCI: Lock down BAR access when the kernel is locked down
David Howells
- [PATCH 11/15] KEYS: Fix race between updating and finding a negative key
David Howells
- [PATCH 11/27] x86: Lock down IO port access when the kernel is locked down
David Howells
- [PATCH 11/27] x86: Lock down IO port access when the kernel is locked down
joeyli
- [PATCH 12/15] KEYS: don't let add_key() update an uninstantiated key
David Howells
- [PATCH 12/27] x86/msr: Restrict MSR access when the kernel is locked down
David Howells
- [PATCH 12/27] x86/msr: Restrict MSR access when the kernel is locked down
joeyli
- [PATCH 12/27] x86/msr: Restrict MSR access when the kernel is locked down
Alan Cox
- [PATCH 12/27] x86/msr: Restrict MSR access when the kernel is locked down
David Howells
- [PATCH 12/27] x86/msr: Restrict MSR access when the kernel is locked down
joeyli
- [PATCH 12/27] x86/msr: Restrict MSR access when the kernel is locked down
David Howells
- [PATCH 12/27] x86/msr: Restrict MSR access when the kernel is locked down
joeyli
- [PATCH 13/15] KEYS: load key flags and expiry time atomically in key_validate()
David Howells
- [PATCH 13/27] asus-wmi: Restrict debugfs interface when the kernel is locked down
joeyli
- [PATCH 13/27] asus-wmi: Restrict debugfs interface when the kernel is locked down
David Howells
- [PATCH 14/15] KEYS: load key flags and expiry time atomically in keyring_search_iterator()
David Howells
- [PATCH 14/27] ACPI: Limit access to custom_method when the kernel is locked down
joeyli
- [PATCH 14/27] ACPI: Limit access to custom_method when the kernel is locked down
David Howells
- [PATCH 15/15] KEYS: load key flags and expiry time atomically in proc_keys_show()
David Howells
- [PATCH 15/27] acpi: Ignore acpi_rsdp kernel param when the kernel has been locked down
joeyli
- [PATCH 15/27] acpi: Ignore acpi_rsdp kernel param when the kernel has been locked down
David Howells
- [PATCH 16/27] acpi: Disable ACPI table override if the kernel is locked down
David Howells
- [PATCH 16/27] acpi: Disable ACPI table override if the kernel is locked down
joeyli
- [PATCH 17/27] acpi: Disable APEI error injection if the kernel is locked down
joeyli
- [PATCH 17/27] acpi: Disable APEI error injection if the kernel is locked down
David Howells
- [PATCH 18/27] bpf: Restrict kernel image access functions when the kernel is locked down
Alexei Starovoitov
- [PATCH 18/27] bpf: Restrict kernel image access functions when the kernel is locked down
David Howells
- [PATCH 18/27] bpf: Restrict kernel image access functions when the kernel is locked down
Alexei Starovoitov
- [PATCH 18/27] bpf: Restrict kernel image access functions when the kernel is locked down
joeyli
- [PATCH 18/27] bpf: Restrict kernel image access functions when the kernel is locked down
David Howells
- [PATCH 18/27] bpf: Restrict kernel image access functions when the kernel is locked down
jlee at suse.com
- [PATCH 18/27] bpf: Restrict kernel image access functions when the kernel is locked down
David Howells
- [PATCH 18/27] bpf: Restrict kernel image access functions when the kernel is locked down
jlee at suse.com
- [PATCH 18/27] bpf: Restrict kernel image access functions when the kernel is locked down
David Howells
- [PATCH 18/27] bpf: Restrict kernel image access functions when the kernel is locked down
joeyli
- [PATCH 18/27] bpf: Restrict kernel image access functions when the kernel is locked down
David Howells
- [PATCH 19/27] scsi: Lock down the eata driver
David Howells
- [PATCH 2/2] ima: check signature enforcement against cmdline param instead of CONFIG
Mimi Zohar
- [PATCH 2/2] ima: check signature enforcement against cmdline param instead of CONFIG
Bruno E. O. Meneguele
- [PATCH 2/2] IMA: Support using new creds in appraisal policy
Matthew Garrett
- [PATCH 2/2] IMA: Support using new creds in appraisal policy
Mikhail Kurinnoi
- [PATCH 2/2] IMA: Support using new creds in appraisal policy
Matthew Garrett
- [PATCH 2/2] IMA: Support using new creds in appraisal policy
Mimi Zohar
- [PATCH 2/2] IMA: Support using new creds in appraisal policy
Matthew Garrett
- [PATCH 2/2] IMA: Support using new creds in appraisal policy
Matthew Garrett
- [PATCH 2/2] selinux: fix build warning
Corentin Labbe
- [PATCH 2/2] selinux: fix build warning
Stephen Smalley
- [PATCH 2/2] selinux: fix build warning
Paul Moore
- [PATCH 2/3] tpm: retrieve digest size of unknown algorithms with PCR read
Jarkko Sakkinen
- [PATCH 2/4] KEYS: Provide KEYCTL_GET/SET_ACL
David Howells
- [PATCH 2/7] FS-Cache: fix dereference of NULL user_key_payload
James Morris
- [PATCH 2/9] LSM: Manage credential security blobs
Casey Schaufler
- [PATCH 20/27] Prohibit PCMCIA CIS storage when the kernel is locked down
David Howells
- [PATCH 21/27] Lock down TIOCSSERIAL
David Howells
- [PATCH 22/27] Lock down module params that specify hardware parameters (eg. ioport)
David Howells
- [PATCH 23/27] x86/mmiotrace: Lock down the testmmiotrace module
David Howells
- [PATCH 24/27] debugfs: Disallow use of debugfs files when the kernel is locked down
David Howells
- [PATCH 25/27] Lock down /proc/kcore
David Howells
- [PATCH 25/27] Lock down /proc/kcore
James Morris
- [PATCH 25/27] Lock down /proc/kcore
David Howells
- [PATCH 26/27] efi: Add an EFI_SECURE_BOOT flag to indicate secure boot mode
David Howells
- [PATCH 26/27] efi: Add an EFI_SECURE_BOOT flag to indicate secure boot mode
James Morris
- [PATCH 26/27] efi: Add an EFI_SECURE_BOOT flag to indicate secure boot mode
David Howells
- [PATCH 27/27] efi: Lock down the kernel if booted in secure boot mode
David Howells
- [PATCH 3/3] tpm: add the crypto algorithm identifier to active_bank_info
Jarkko Sakkinen
- [PATCH 3/4] KEYS: Add the ability to grant permissions to an administrator
David Howells
- [PATCH 3/7] lib/digsig: fix dereference of NULL user_key_payload
James Morris
- [PATCH 3/9] LSM: Manage file security blobs
Casey Schaufler
- [PATCH 3/9] LSM: Manage file security blobs
Stephen Smalley
- [PATCH 3/9] LSM: Manage file security blobs
Casey Schaufler
- [PATCH 3/9] LSM: Manage file security blobs
John Johansen
- [PATCH 3/9] LSM: Manage file security blobs
Casey Schaufler
- [PATCH 3/9] LSM: Manage file security blobs
Casey Schaufler
- [PATCH 4/4] KEYS: Add support for directly-specified uids and gids in key ACLs
David Howells
- [PATCH 4/7] fscrypt: fix dereference of NULL user_key_payload
James Morris
- [PATCH 4/9] LSM: Manage task security blobs
Casey Schaufler
- [PATCH 5/7] ecryptfs: fix dereference of NULL user_key_payload
James Morris
- [PATCH 5/9] LSM: Manage remaining security blobs
Casey Schaufler
- [PATCH 6/7] ecryptfs: fix out-of-bounds read of key payload
James Morris
- [PATCH 6/9] LSM: General stacking
Casey Schaufler
- [PATCH 7/7] ecryptfs: move key payload accessor functions into keystore.c
James Morris
- [PATCH 7/9] LSM: Shared secids
Casey Schaufler
- [PATCH 8/9] LSM: Multiple security mount options
Casey Schaufler
- [PATCH 8/9] LSM: Multiple security mount options
Stephen Smalley
- [PATCH 8/9] LSM: Multiple security mount options
Casey Schaufler
- [PATCH 9/9] LSM: Full security module stacking
Casey Schaufler
- [PATCH GHAK16 V5 00/10] capabilities: do not audit log BPRM_FCAPS on set*id
Richard Guy Briggs
- [PATCH GHAK16 V5 00/10] capabilities: do not audit log BPRM_FCAPS on set*id
Richard Guy Briggs
- [PATCH GHAK16 V5 00/10] capabilities: do not audit log BPRM_FCAPS on set*id
James Morris
- [PATCH GHAK16 V5 00/10] capabilities: do not audit log BPRM_FCAPS on set*id
James Morris
- [PATCH GHAK16 V5 00/10] capabilities: do not audit log BPRM_FCAPS on set*id
Richard Guy Briggs
- [PATCH GHAK16 V5 01/10] capabilities: factor out cap_bprm_set_creds privileged root
Richard Guy Briggs
- [PATCH GHAK16 V5 02/10] capabilities: intuitive names for cap gain status
Richard Guy Briggs
- [PATCH GHAK16 V5 03/10] capabilities: rename has_cap to has_fcap
Richard Guy Briggs
- [PATCH GHAK16 V5 04/10] capabilities: use root_priveleged inline to clarify logic
Richard Guy Briggs
- [PATCH GHAK16 V5 05/10] capabilities: use intuitive names for id changes
Richard Guy Briggs
- [PATCH GHAK16 V5 06/10] capabilities: move audit log decision to function
Richard Guy Briggs
- [PATCH GHAK16 V5 07/10] capabilities: remove a layer of conditional logic
Richard Guy Briggs
- [PATCH GHAK16 V5 08/10] capabilities: invert logic for clarity
Richard Guy Briggs
- [PATCH GHAK16 V5 09/10] capabilities: fix logic for effective root or real root
Richard Guy Briggs
- [PATCH GHAK16 V5 10/10] capabilities: audit log other surprising conditions
Richard Guy Briggs
- [PATCH net-next 1/4] bpf: Add file mode configuration into bpf maps
Daniel Borkmann
- [PATCH net-next 1/4] bpf: Add file mode configuration into bpf maps
Chenbo Feng
- [PATCH net-next 1/4] bpf: Add file mode configuration into bpf maps
Daniel Borkmann
- [PATCH net-next 1/4] bpf: Add file mode configuration into bpf maps
Chenbo Feng
- [PATCH net-next 2/4] security: bpf: Add LSM hooks for bpf object related syscall
Chenbo Feng
- [PATCH net-next 2/4] security: bpf: Add LSM hooks for bpf object related syscall
James Morris
- [PATCH net-next 3/4] selinux: bpf: Add selinux check for eBPF syscall operations
Stephen Smalley
- [PATCH net-next 3/4] selinux: bpf: Add selinux check for eBPF syscall operations
Daniel Borkmann
- [PATCH net-next 3/4] selinux: bpf: Add selinux check for eBPF syscall operations
Chenbo Feng
- [PATCH net-next 4/4] selinux: bpf: Add addtional check for bpf object file receive
Daniel Borkmann
- [PATCH net-next 4/4] selinux: bpf: Add addtional check for bpf object file receive
Daniel Borkmann
- [PATCH net-next 4/4] selinux: bpf: Add addtional check for bpf object file receive
Stephen Smalley
- [PATCH net-next 4/4] selinux: bpf: Add addtional check for bpf object file receive
Stephen Smalley
- [PATCH net-next 4/4] selinux: bpf: Add addtional check for bpf object file receive
Chenbo Feng
- [PATCH net-next 4/4] selinux: bpf: Add addtional check for bpf object file receive
Chenbo Feng
- [PATCH net-next 4/4] selinux: bpf: Add addtional check for bpf object file receive
Chenbo Feng
- [PATCH net-next v2 0/5] bpf: security: New file mode and LSM hooks for eBPF object permission control
Chenbo Feng
- [PATCH net-next v2 1/5] bpf: Add file mode configuration into bpf maps
Alexei Starovoitov
- [PATCH net-next v2 1/5] bpf: Add file mode configuration into bpf maps
Chenbo Feng
- [PATCH net-next v2 1/5] bpf: Add file mode configuration into bpf maps
Chenbo Feng
- [PATCH net-next v2 2/5] bpf: Add tests for eBPF file mode
Chenbo Feng
- [PATCH net-next v2 3/5] security: bpf: Add LSM hooks for bpf object related syscall
Chenbo Feng
- [PATCH net-next v2 4/5] selinux: bpf: Add selinux check for eBPF syscall operations
Stephen Smalley
- [PATCH net-next v2 4/5] selinux: bpf: Add selinux check for eBPF syscall operations
Stephen Smalley
- [PATCH net-next v2 4/5] selinux: bpf: Add selinux check for eBPF syscall operations
Stephen Smalley
- [PATCH net-next v2 4/5] selinux: bpf: Add selinux check for eBPF syscall operations
Chenbo Feng
- [PATCH net-next v2 4/5] selinux: bpf: Add selinux check for eBPF syscall operations
Chenbo Feng
- [PATCH net-next v2 4/5] selinux: bpf: Add selinux check for eBPF syscall operations
kbuild test robot
- [PATCH net-next v2 4/5] selinux: bpf: Add selinux check for eBPF syscall operations
kbuild test robot
- [PATCH net-next v2 5/5] selinux: bpf: Add addtional check for bpf object file receive
Stephen Smalley
- [PATCH net-next v2 5/5] selinux: bpf: Add addtional check for bpf object file receive
Chenbo Feng
- [PATCH net-next v2 5/5] selinux: bpf: Add addtional check for bpf object file receive
Chenbo Feng
- [PATCH net-next v3 0/5] bpf: security: New file mode and LSM hooks for eBPF object permission control
Chenbo Feng
- [PATCH net-next v3 1/5] bpf: Add file mode configuration into bpf maps
Chenbo Feng
- [PATCH net-next v3 2/5] bpf: Add tests for eBPF file mode
Chenbo Feng
- [PATCH net-next v3 3/5] security: bpf: Add LSM hooks for bpf object related syscall
Chenbo Feng
- [PATCH net-next v3 4/5] selinux: bpf: Add selinux check for eBPF syscall operations
Chenbo Feng
- [PATCH net-next v3 5/5] selinux: bpf: Add addtional check for bpf object file receive
Stephen Smalley
- [PATCH net-next v3 5/5] selinux: bpf: Add addtional check for bpf object file receive
Stephen Smalley
- [PATCH net-next v3 5/5] selinux: bpf: Add addtional check for bpf object file receive
Chenbo Feng
- [PATCH net-next v3 5/5] selinux: bpf: Add addtional check for bpf object file receive
Chenbo Feng
- [PATCH net-next v3 5/5] selinux: bpf: Add addtional check for bpf object file receive
Chenbo Feng
- [PATCH net-next v6 0/5] bpf: security: New file mode and LSM hooks for eBPF object permission control
David Miller
- [PATCH net-next v6 0/5] bpf: security: New file mode and LSM hooks for eBPF object permission control
David Miller
- [PATCH net-next v6 0/5] bpf: security: New file mode and LSM hooks for eBPF object permission control
James Morris
- [PATCH net-next v6 0/5] bpf: security: New file mode and LSM hooks for eBPF object permission control
Daniel Borkmann
- [PATCH net-next v6 0/5] bpf: security: New file mode and LSM hooks for eBPF object permission control
David Miller
- [PATCH net-next v6 0/5] bpf: security: New file mode and LSM hooks for eBPF object permission control
Chenbo Feng
- [PATCH net-next v6 1/5] bpf: Add file mode configuration into bpf maps
Daniel Borkmann
- [PATCH net-next v6 1/5] bpf: Add file mode configuration into bpf maps
Daniel Borkmann
- [PATCH net-next v6 1/5] bpf: Add file mode configuration into bpf maps
Chenbo Feng
- [PATCH net-next v6 2/5] bpf: Add tests for eBPF file mode
Chenbo Feng
- [PATCH net-next v6 2/5] bpf: Add tests for eBPF file mode
Daniel Borkmann
- [PATCH net-next v6 3/5] security: bpf: Add LSM hooks for bpf object related syscall
Chenbo Feng
- [PATCH net-next v6 4/5] selinux: bpf: Add selinux check for eBPF syscall operations
Chenbo Feng
- [PATCH net-next v6 5/5] selinux: bpf: Add addtional check for bpf object file receive
Chenbo Feng
- [PATCH net-next v7 0/5] bpf: security: New file mode and LSM hooks for eBPF object permission control
David Miller
- [PATCH net-next v7 0/5] bpf: security: New file mode and LSM hooks for eBPF object permission control
Chenbo Feng
- [PATCH net-next v7 1/5] bpf: Add file mode configuration into bpf maps
Daniel Borkmann
- [PATCH net-next v7 1/5] bpf: Add file mode configuration into bpf maps
Chenbo Feng
- [PATCH net-next v7 2/5] bpf: Add tests for eBPF file mode
Chenbo Feng
- [PATCH net-next v7 3/5] security: bpf: Add LSM hooks for bpf object related syscall
James Morris
- [PATCH net-next v7 3/5] security: bpf: Add LSM hooks for bpf object related syscall
Chenbo Feng
- [PATCH net-next v7 4/5] selinux: bpf: Add selinux check for eBPF syscall operations
Chenbo Feng
- [PATCH net-next v7 4/5] selinux: bpf: Add selinux check for eBPF syscall operations
James Morris
- [PATCH net-next v7 4/5] selinux: bpf: Add selinux check for eBPF syscall operations
Paul Moore
- [PATCH net-next v7 5/5] selinux: bpf: Add addtional check for bpf object file receive
James Morris
- [PATCH net-next v7 5/5] selinux: bpf: Add addtional check for bpf object file receive
Chenbo Feng
- [PATCH net-next v7 5/5] selinux: bpf: Add addtional check for bpf object file receive
Paul Moore
- [PATCH RFC tip/core/rcu 15/15] keyring: Remove now-redundant smp_read_barrier_depends()
Paul E. McKenney
- [PATCH v10 00/20] simplify crypto wait for async op
Gilad Ben-Yossef
- [PATCH v10 01/20] crypto: change transient busy return code to -ENOSPC
Gilad Ben-Yossef
- [PATCH v10 02/20] crypto: ccp: use -ENOSPC for transient busy indication
Gilad Ben-Yossef
- [PATCH v10 03/20] net: use -ENOSPC for transient busy indication
Gilad Ben-Yossef
- [PATCH v10 04/20] crypto: remove redundant backlog checks on EBUSY
Gilad Ben-Yossef
- [PATCH v10 05/20] crypto: marvell/cesa: remove redundant backlog checks on EBUSY
Gilad Ben-Yossef
- [PATCH v10 06/20] crypto: introduce crypto wait for async op
Gilad Ben-Yossef
- [PATCH v10 07/20] crypto: move algif to generic async completion
Gilad Ben-Yossef
- [PATCH v10 08/20] crypto: move pub key to generic async completion
Gilad Ben-Yossef
- [PATCH v10 09/20] crypto: move drbg to generic async completion
Gilad Ben-Yossef
- [PATCH v10 10/20] crypto: move gcm to generic async completion
Gilad Ben-Yossef
- [PATCH v10 11/20] crypto: move testmgr to generic async completion
Gilad Ben-Yossef
- [PATCH v10 12/20] fscrypt: move to generic async completion
Gilad Ben-Yossef
- [PATCH v10 13/20] dm: move dm-verity to generic async completion
Gilad Ben-Yossef
- [PATCH v10 14/20] cifs: move to generic async completion
Gilad Ben-Yossef
- [PATCH v10 15/20] ima: move to generic async completion
Gilad Ben-Yossef
- [PATCH v10 16/20] crypto: tcrypt: move to generic async completion
Gilad Ben-Yossef
- [PATCH v10 17/20] crypto: talitos: move to generic async completion
Gilad Ben-Yossef
- [PATCH v10 18/20] crypto: qce: move to generic async completion
Gilad Ben-Yossef
- [PATCH v10 19/20] crypto: mediatek: move to generic async completion
Gilad Ben-Yossef
- [PATCH v10 20/20] crypto: adapt api sample to use async. op wait
Gilad Ben-Yossef
- [PATCH v2 0/2] ima: change how MODULE_SIG_FORCE is checked on modules checking policy
Bruno E. O. Meneguele
- [PATCH v2 1/2] module: export module signature enforcement status
Bruno E. O. Meneguele
- [PATCH v2 1/3] ecryptfs: fix dereference of NULL user_key_payload
Eric Biggers
- [PATCH v2 2/2] ima: check signature enforcement against cmdline param instead of CONFIG
kbuild test robot
- [PATCH v2 2/2] ima: check signature enforcement against cmdline param instead of CONFIG
Bruno E. O. Meneguele
- [PATCH v2 2/3] ecryptfs: fix out-of-bounds read of key payload
Eric Biggers
- [PATCH v2 3/3] ecryptfs: move key payload accessor functions into keystore.c
Eric Biggers
- [PATCH v2] FS-Cache: fix dereference of NULL user_key_payload
Eric Biggers
- [PATCH v2] fscrypt: fix dereference of NULL user_key_payload
Eric Biggers
- [PATCH v2] fscrypt: fix dereference of NULL user_key_payload
Theodore Ts'o
- [PATCH v2] fscrypt: fix dereference of NULL user_key_payload
Eric Biggers
- [PATCH v2] fscrypt: fix dereference of NULL user_key_payload
Theodore Ts'o
- [PATCH v2] KEYS: encrypted: fix dereference of NULL user_key_payload
Eric Biggers
- [PATCH v2] lib/digsig: fix dereference of NULL user_key_payload
Eric Biggers
- [PATCH v2] Smack: More sanity in the use of Netlabel
Casey Schaufler
- [PATCH v2] tpm: Move Linux RNG connection to hwrng
Jason Gunthorpe
- [PATCH v2] tpm: use struct tpm_chip for tpm_chip_find_get()
Jarkko Sakkinen
- [PATCH v2] tpm: use struct tpm_chip for tpm_chip_find_get()
PrasannaKumar Muralidharan
- [PATCH v2] tpm: use struct tpm_chip for tpm_chip_find_get()
Jason Gunthorpe
- [PATCH v2] tpm: use struct tpm_chip for tpm_chip_find_get()
Jarkko Sakkinen
- [PATCH v2] tpm: use struct tpm_chip for tpm_chip_find_get()
Jason Gunthorpe
- [PATCH v2] tpm: use struct tpm_chip for tpm_chip_find_get()
Jarkko Sakkinen
- [PATCH v2] tpm: use struct tpm_chip for tpm_chip_find_get()
Jason Gunthorpe
- [PATCH v2] tpm: use struct tpm_chip for tpm_chip_find_get()
Jarkko Sakkinen
- [PATCH v3 0/2] ima: change how MODULE_SIG_FORCE is checked on modules checking policy
Bruno E. O. Meneguele
- [PATCH v3 0/4] additional TPM performance improvements
Nayna Jain
- [PATCH v3 1/2] module: export module signature enforcement status
Bruno E. O. Meneguele
- [PATCH V3 1/2] security: Add a cred_getsecid hook
Matthew Garrett
- [PATCH V3 1/2] security: Add a cred_getsecid hook
James Morris
- [PATCH V3 1/2] security: Add a cred_getsecid hook
Casey Schaufler
- [PATCH V3 1/2] security: Add a cred_getsecid hook
Stephen Smalley
- [PATCH V3 1/2] security: Add a cred_getsecid hook
Matthew Garrett
- [PATCH V3 1/2] security: Add a cred_getsecid hook
Matthew Garrett
- [PATCH V3 1/2] security: Add a cred_getsecid hook
Stephen Smalley
- [PATCH v3 1/5] tpm: move wait_for_tpm_stat() to respective driver files
Jarkko Sakkinen
- [PATCH v3 1/5] tpm: move wait_for_tpm_stat() to respective driver files
Nayna Jain
- [PATCH v3 1/7] KEYS: don't let add_key() update an uninstantiated key
David Howells
- [PATCH v3 1/7] KEYS: don't let add_key() update an uninstantiated key
David Howells
- [PATCH v3 2/2] ima: check signature enforcement against cmdline param instead of CONFIG
Mimi Zohar
- [PATCH v3 2/2] ima: check signature enforcement against cmdline param instead of CONFIG
Mimi Zohar
- [PATCH v3 2/2] ima: check signature enforcement against cmdline param instead of CONFIG
Bruno E. O. Meneguele
- [PATCH V3 2/2] IMA: Support using new creds in appraisal policy
Matthew Garrett
- [PATCH V3 2/2] IMA: Support using new creds in appraisal policy
James Morris
- [PATCH v3 2/5] tpm: ignore burstcount to improve tpm_tis send() performance
Nayna Jain
- [PATCH v3 2/5] tpm: ignore burstcount to improve tpm_tis send() performance
Jarkko Sakkinen
- [PATCH v3 2/5] tpm: ignore burstcount to improve tpm_tis send() performance
Nayna Jain
- [PATCH v3 2/7] KEYS: fix race between updating and finding negative key
David Howells
- [PATCH v3 3/5] tpm: reduce polling delay in tpm_tis wait_for_tpm_stat()
Nayna Jain
- [PATCH v3 3/5] tpm: reduce polling delay in tpm_tis wait_for_tpm_stat()
Jarkko Sakkinen
- [PATCH v3 4/5] tpm: reduce tpm_msleep() time in get_burstcount()
Nayna Jain
- [PATCH v3 4/5] tpm: reduce tpm_msleep() time in get_burstcount()
Jarkko Sakkinen
- [PATCH v3 4/5] tpm: reduce tpm_msleep() time in get_burstcount()
Nayna Jain
- [PATCH v3 5/5] tpm: use tpm_msleep() value as max delay
Nayna Jain
- [PATCH v3 5/5] tpm: use tpm_msleep() value as max delay
Jarkko Sakkinen
- [PATCH v3] tpm: use struct tpm_chip for tpm_chip_find_get()
Jarkko Sakkinen
- [PATCH v3] tpm: use struct tpm_chip for tpm_chip_find_get()
Jarkko Sakkinen
- [PATCH v3] tpm: use struct tpm_chip for tpm_chip_find_get()
PrasannaKumar Muralidharan
- [PATCH v3] tpm: use struct tpm_chip for tpm_chip_find_get()
Jarkko Sakkinen
- [PATCH v3] tpm: use struct tpm_chip for tpm_chip_find_get()
PrasannaKumar Muralidharan
- [PATCH v3] tpm: use struct tpm_chip for tpm_chip_find_get()
Jason Gunthorpe
- [PATCH v3] tpm: use struct tpm_chip for tpm_chip_find_get()
Jason Gunthorpe
- [PATCH v4 0/4] additional TPM performance improvements
Nayna Jain
- [PATCH v4 1/4] tpm: move wait_for_tpm_stat() to respective driver files
Jarkko Sakkinen
- [PATCH v4 1/4] tpm: move wait_for_tpm_stat() to respective driver files
Jarkko Sakkinen
- [PATCH v4 1/4] tpm: move wait_for_tpm_stat() to respective driver files
Jarkko Sakkinen
- [PATCH v4 1/4] tpm: move wait_for_tpm_stat() to respective driver files
Nayna Jain
- [PATCH v4 1/4] tpm: move wait_for_tpm_stat() to respective driver files
Alexander.Steffen at infineon.com
- [PATCH v4 1/4] tpm: move wait_for_tpm_stat() to respective driver files
Nayna Jain
- [PATCH v4 2/4] tpm: ignore burstcount to improve tpm_tis send() performance
Nayna Jain
- [PATCH v4 2/4] tpm: ignore burstcount to improve tpm_tis send() performance
Jarkko Sakkinen
- [PATCH v4 2/4] tpm: ignore burstcount to improve tpm_tis send() performance
Jarkko Sakkinen
- [PATCH v4 2/4] tpm: ignore burstcount to improve tpm_tis send() performance
Alexander.Steffen at infineon.com
- [PATCH v4 2/4] tpm: ignore burstcount to improve tpm_tis send() performance
Ken Goldman
- [PATCH v4 2/4] tpm: ignore burstcount to improve tpm_tis send() performance
Jarkko Sakkinen
- [PATCH v4 3/4] tpm: reduce tpm polling delay in tpm_tis_core
Nayna Jain
- [PATCH v4 3/4] tpm: reduce tpm polling delay in tpm_tis_core
Jarkko Sakkinen
- [PATCH v4 3/4] tpm: reduce tpm polling delay in tpm_tis_core
Jarkko Sakkinen
- [PATCH v4 4/4] tpm: use tpm_msleep() value as max delay
Nayna Jain
- [PATCH v4 4/4] tpm: use tpm_msleep() value as max delay
Jarkko Sakkinen
- [PATCH v5 00/18] Appended signatures support for IMA appraisal
Thiago Jung Bauermann
- [PATCH v5 00/18] Appended signatures support for IMA appraisal
Mimi Zohar
- [PATCH v5 01/18] ima: Remove redundant conditional operator
Thiago Jung Bauermann
- [PATCH v5 02/18] ima: Remove some superfluous parentheses
Thiago Jung Bauermann
- [PATCH v5 03/18] evm, ima: Remove superfluous parentheses
Thiago Jung Bauermann
- [PATCH v5 04/18] evm, ima: Remove more superfluous parentheses
Thiago Jung Bauermann
- [PATCH v5 05/18] ima: Simplify ima_eventsig_init
Thiago Jung Bauermann
- [PATCH v5 06/18] ima: Improvements in ima_appraise_measurement
Thiago Jung Bauermann
- [PATCH v5 07/18] integrity: Introduce struct evm_xattr
Thiago Jung Bauermann
- [PATCH v5 08/18] integrity: Select CONFIG_KEYS instead of depending on it
Thiago Jung Bauermann
- [PATCH v5 09/18] ima: Don't pass xattr value to EVM xattr verification.
Thiago Jung Bauermann
- [PATCH v5 10/18] ima: Store measurement after appraisal
Thiago Jung Bauermann
- [PATCH v5 11/18] ima: Export func_tokens
Thiago Jung Bauermann
- [PATCH v5 12/18] MODSIGN: Export module signature definitions
Thiago Jung Bauermann
- [PATCH v5 12/18] MODSIGN: Export module signature definitions
Mimi Zohar
- [PATCH v5 12/18] MODSIGN: Export module signature definitions
Thiago Jung Bauermann
- [PATCH v5 12/18] MODSIGN: Export module signature definitions
Mimi Zohar
- [PATCH v5 13/18] PKCS#7: Introduce pkcs7_get_message_sig and verify_pkcs7_message_sig
Thiago Jung Bauermann
- [PATCH v5 13/18] PKCS#7: Introduce pkcs7_get_message_sig and verify_pkcs7_message_sig
Mimi Zohar
- [PATCH v5 14/18] integrity: Introduce integrity_keyring_from_id
Thiago Jung Bauermann
- [PATCH v5 15/18] ima: Add modsig appraise_type option for module-style appended signatures
Thiago Jung Bauermann
- [PATCH v5 16/18] ima: Add functions to read and verify a modsig signature
Thiago Jung Bauermann
- [PATCH v5 17/18] ima: Implement support for module-style appended signatures
Mimi Zohar
- [PATCH v5 17/18] ima: Implement support for module-style appended signatures
Thiago Jung Bauermann
- [PATCH v5 18/18] ima: Write modsig to the measurement list
Thiago Jung Bauermann
- [PATCH v5 18/18] ima: Write modsig to the measurement list
Mimi Zohar
- [PATCH v5 18/18] ima: Write modsig to the measurement list
Thiago Jung Bauermann
- [PATCH v8 01/20] crypto: change transient busy return code to -EAGAIN
Herbert Xu
- [PATCH v8 01/20] crypto: change transient busy return code to -EAGAIN
Gilad Ben-Yossef
- [PATCH v8 01/20] crypto: change transient busy return code to -EAGAIN
Herbert Xu
- [PATCH v9 00/20] simplify crypto wait for async op
Gilad Ben-Yossef
- [PATCH v9 00/20] simplify crypto wait for async op
Herbert Xu
- [PATCH v9 00/20] simplify crypto wait for async op
Gilad Ben-Yossef
- [PATCH v9 00/20] simplify crypto wait for async op
Herbert Xu
- [PATCH v9 00/20] simplify crypto wait for async op
Russell King - ARM Linux
- [PATCH v9 00/20] simplify crypto wait for async op
Gilad Ben-Yossef
- [PATCH v9 01/20] crypto: change transient busy return code to -EAGAIN
Gilad Ben-Yossef
- [PATCH v9 02/20] crypto: ccp: use -EAGAIN for transient busy indication
Gilad Ben-Yossef
- [PATCH v9 03/20] net: use -EAGAIN for transient busy indication
Gilad Ben-Yossef
- [PATCH v9 04/20] crypto: remove redundant backlog checks on EBUSY
Gilad Ben-Yossef
- [PATCH v9 05/20] crypto: marvell/cesa: remove redundant backlog checks on EBUSY
Gilad Ben-Yossef
- [PATCH v9 06/20] crypto: introduce crypto wait for async op
Gilad Ben-Yossef
- [PATCH v9 07/20] crypto: move algif to generic async completion
Gilad Ben-Yossef
- [PATCH v9 08/20] crypto: move pub key to generic async completion
Gilad Ben-Yossef
- [PATCH v9 09/20] crypto: move drbg to generic async completion
Gilad Ben-Yossef
- [PATCH v9 10/20] crypto: move gcm to generic async completion
Gilad Ben-Yossef
- [PATCH v9 11/20] crypto: move testmgr to generic async completion
Gilad Ben-Yossef
- [PATCH v9 12/20] fscrypt: move to generic async completion
Gilad Ben-Yossef
- [PATCH v9 13/20] dm: move dm-verity to generic async completion
Gilad Ben-Yossef
- [PATCH v9 14/20] cifs: move to generic async completion
Gilad Ben-Yossef
- [PATCH v9 15/20] ima: move to generic async completion
Gilad Ben-Yossef
- [PATCH v9 16/20] crypto: tcrypt: move to generic async completion
Gilad Ben-Yossef
- [PATCH v9 17/20] crypto: talitos: move to generic async completion
Gilad Ben-Yossef
- [PATCH v9 17/20] crypto: talitos: move to generic async completion
Christophe LEROY
- [PATCH v9 18/20] crypto: qce: move to generic async completion
Gilad Ben-Yossef
- [PATCH v9 19/20] crypto: mediatek: move to generic async completion
Gilad Ben-Yossef
- [PATCH v9 20/20] crypto: adapt api sample to use async. op wait
Gilad Ben-Yossef
- [PATCH] [v2] tomoyo: fix timestamping for y2038
Arnd Bergmann
- [PATCH] [v2] tomoyo: fix timestamping for y2038
James Morris
- [PATCH] apparmor: Fix bool initialization/comparison
Thomas Meyer
- [PATCH] apparmor: Fix bool initialization/comparison
John Johansen
- [PATCH] apparmor: remove unused redundant variable stop
Colin King
- [PATCH] Audit: remove unused audit_log_secctx function
Casey Schaufler
- [PATCH] Audit: remove unused audit_log_secctx function
James Morris
- [PATCH] Audit: remove unused audit_log_secctx function
Paul Moore
- [PATCH] fix security_release_secctx seems broken
James Morris
- [PATCH] fix security_release_secctx seems broken
Konstantin Khlebnikov
- [PATCH] fix security_release_secctx seems broken
James Morris
- [PATCH] ima: Fix bool initialization/comparison
Thomas Meyer
- [PATCH] ima: fix hash algorithm initialization
Boshi Wang
- [PATCH] keys, trusted: fix missing support for TPM 2.0 in trusted_update()
Boshi Wang
- [PATCH] keys, trusted: fix missing support for TPM 2.0 in trusted_update()
Jarkko Sakkinen
- [PATCH] KEYS: remove CONFIG_KEYS_COMPAT
Eric Biggers
- [PATCH] KEYS: trusted: fix writing past end of buffer in trusted_read()
Eric Biggers
- [PATCH] KEYS: trusted: fix writing past end of buffer in trusted_read()
Mimi Zohar
- [PATCH] KEYS: trusted: fix writing past end of buffer in trusted_read()
James Morris
- [PATCH] MAINTAINERS: remove David Safford as maintainer for encrypted+trusted keys
Eric Biggers
- [PATCH] MAINTAINERS: remove David Safford as maintainer for encrypted+trusted keys
James Morris
- [PATCH] security/keys: BIG_KEY requires CONFIG_CRYPTO
Arnd Bergmann
- [PATCH] security/keys: BIG_KEY requires CONFIG_CRYPTO
Serge E. Hallyn
- [PATCH] selinux: check CAP_SETFCAP for a particular inode & mapped user
Serge E. Hallyn
- [PATCH] selinux: check CAP_SETFCAP for a particular inode & mapped user
Lubomir Rintel
- [PATCH] selinux: check CAP_SETFCAP for a particular inode & mapped user
Paul Moore
- [PATCH] selinux: check CAP_SETFCAP for a particular inode & mapped user
Lubomir Rintel
- [PATCH] selinux: Fix bool initialization/comparison
Thomas Meyer
- [PATCH] selinux: Fix bool initialization/comparison
Casey Schaufler
- [PATCH] selinux: Fix bool initialization/comparison
Casey Schaufler
- [PATCH] selinux: Fix bool initialization/comparison
Paul Moore
- [PATCH] selinux: Perform both commoncap and selinux xattr checks
Eric W. Biederman
- [PATCH] selinux: Perform both commoncap and selinux xattr checks
Serge E. Hallyn
- [PATCH] selinux: Perform both commoncap and selinux xattr checks
Stephen Smalley
- [PATCH] selinux: Perform both commoncap and selinux xattr checks
Paul Moore
- [PATCH] selinux: Perform both commoncap and selinux xattr checks
Eric W. Biederman
- [PATCH] selinux: Perform both commoncap and selinux xattr checks
Paul Moore
- [PATCH] selinux: remove extraneous initialization of slots_used and max_chain_len
walter harms
- [PATCH] selinux: remove extraneous initialization of slots_used and max_chain_len
Joe Perches
- [PATCH] selinux: remove extraneous initialization of slots_used and max_chain_len
Colin King
- [PATCH] selinux: remove redundant assignment to len
Colin King
- [PATCH] selinux: remove redundant assignment to len
Paul Moore
- [PATCH] selinux: remove redundant assignment to str
Colin King
- [PATCH] selinux: remove redundant assignment to str
Paul Moore
- [PATCH] tomoyo: fix timestamping for y2038
Arnd Bergmann
- [PATCH] tomoyo: fix timestamping for y2038
Tetsuo Handa
- [PATCH] tomoyo: fix timestamping for y2038
Arnd Bergmann
- [PATCH] tpm: Move Linux RNG connection to hwrng
Jason Gunthorpe
- [PATCH] tpm: Move Linux RNG connection to hwrng
Jason Gunthorpe
- [PATCH] tpm: Move Linux RNG connection to hwrng
Jarkko Sakkinen
- [PATCH] tpm: Move Linux RNG connection to hwrng
PrasannaKumar Muralidharan
- [PATCH] tpm: Move Linux RNG connection to hwrng
Jason Gunthorpe
- [PATCH] tpm: Move Linux RNG connection to hwrng
PrasannaKumar Muralidharan
- [PATCH] tpm: Move Linux RNG connection to hwrng
Jarkko Sakkinen
- [PATCH] tpm: Move Linux RNG connection to hwrng
Jason Gunthorpe
- [PATCH] tpm: Move Linux RNG connection to hwrng
Jarkko Sakkinen
- [PATCH] tpm: Move Linux RNG connection to hwrng
Jason Gunthorpe
- [PATCH] tpm: remove a misleading error message from tpm_get_timeouts()
Jarkko Sakkinen
- [PATCH] tpm: remove chip_num parameter from in-kernel API
Jarkko Sakkinen
- [PATCH] tpm: remove chip_num parameter from in-kernel API
Jason Gunthorpe
- [PATCH] tpm: remove chip_num parameter from in-kernel API
Jarkko Sakkinen
- [PATCH] vfs: fix mounting a filesystem with i_version
Mimi Zohar
- [PATCH] vfs: fix mounting a filesystem with i_version
Christoph Hellwig
- [PATCH] vfs: fix mounting a filesystem with i_version
Mimi Zohar
- [PATCH] vfs: fix mounting a filesystem with i_version
James Morris
- [PATCH] vfs: fix mounting a filesystem with i_version
Mimi Zohar
- [PATCH][capabilities-next] commoncap: move assignment of fs_ns to avoid null pointer dereference
Serge E. Hallyn
- [PATCH][capabilities-next] commoncap: move assignment of fs_ns to avoid null pointer dereference
James Morris
- [PATCH][V2] selinux: remove extraneous initialization of slots_used and max_chain_len
Paul Moore
- [PATCH][V2] selinux: remove extraneous initialization of slots_used and max_chain_len
Colin King
- [RFC PATCH 0/5] Add SELinux SCTP protocol support
Richard Haines
- [RFC PATCH 0/5] Add SELinux SCTP protocol support
Marcelo Ricardo Leitner
- [RFC PATCH 1/2] security, capabilities: Add CAP_SYS_MOUNT
Nicolas Belouin
- [RFC PATCH 1/2] security, capabilities: Add CAP_SYS_MOUNT
Stephen Smalley
- [RFC PATCH 1/2] security, capabilities: create CAP_TRUSTED
Nicolas Belouin
- [RFC PATCH 1/2] security, capabilities: create CAP_TRUSTED
Serge E. Hallyn
- [RFC PATCH 1/2] security, capabilities: create CAP_TRUSTED
nicolas at belouin.fr
- [RFC PATCH 1/5] security: Add support for SCTP security hooks
Richard Haines
- [RFC PATCH 1/5] security: Add support for SCTP security hooks
James Morris
- [RFC PATCH 1/5] security: Add support for SCTP security hooks
Marcelo Ricardo Leitner
- [RFC PATCH 2/2] fs: add the possibility to use CAP_SYS_MOUNT to (u)mount a fs
Nicolas Belouin
- [RFC PATCH 2/2] fs: Grant CAP_TRUSTED rw access to trusted xattrs
Nicolas Belouin
- [RFC PATCH 2/5] sctp: Add ip option support
Richard Haines
- [RFC PATCH 2/5] sctp: Add ip option support
Marcelo Ricardo Leitner
- [RFC PATCH 3/3] fs: detect that the i_rwsem has already been taken exclusively
Eric W. Biederman
- [RFC PATCH 3/3] fs: detect that the i_rwsem has already been taken exclusively
Mimi Zohar
- [RFC PATCH 3/3] fs: detect that the i_rwsem has already been taken exclusively
Linus Torvalds
- [RFC PATCH 3/3] fs: detect that the i_rwsem has already been taken exclusively
Eric W. Biederman
- [RFC PATCH 3/3] fs: detect that the i_rwsem has already been taken exclusively
Linus Torvalds
- [RFC PATCH 3/3] fs: detect that the i_rwsem has already been taken exclusively
Dave Chinner
- [RFC PATCH 3/3] fs: detect that the i_rwsem has already been taken exclusively
Linus Torvalds
- [RFC PATCH 3/3] fs: detect that the i_rwsem has already been taken exclusively
Mimi Zohar
- [RFC PATCH 3/3] fs: detect that the i_rwsem has already been taken exclusively
Mimi Zohar
- [RFC PATCH 3/3] fs: detect that the i_rwsem has already been taken exclusively
Eric W. Biederman
- [RFC PATCH 3/3] fs: detect that the i_rwsem has already been taken exclusively
Dave Chinner
- [RFC PATCH 3/3] fs: detect that the i_rwsem has already been taken exclusively
Dave Chinner
- [RFC PATCH 3/3] fs: detect that the i_rwsem has already been taken exclusively
Mimi Zohar
- [RFC PATCH 3/3] fs: detect that the i_rwsem has already been taken exclusively
Mimi Zohar
- [RFC PATCH 3/3] fs: detect that the i_rwsem has already been taken exclusively
Jeff Layton
- [RFC PATCH 3/5] sctp: Add LSM hooks
Richard Haines
- [RFC PATCH 3/5] sctp: Add LSM hooks
Xin Long
- [RFC PATCH 3/5] sctp: Add LSM hooks
Neil Horman
- [RFC PATCH 3/5] sctp: Add LSM hooks
Richard Haines
- [RFC PATCH 3/5] sctp: Add LSM hooks
Xin Long
- [RFC PATCH 3/5] sctp: Add LSM hooks
Richard Haines
- [RFC PATCH 4/5] netlabel: Add SCTP support
Richard Haines
- [RFC PATCH 5/5] selinux: Add SCTP support
Richard Haines
- [RFC PATCH 5/5] selinux: Add SCTP support
Stephen Smalley
- [RFC PATCH 5/5] selinux: Add SCTP support
Richard Haines
- [RFC PATCH 5/5] selinux: Add SCTP support
Marcelo Ricardo Leitner
- [RFC PATCH] ima: require secure_boot rules in lockdown mode
Mimi Zohar
- [RFC PATCH] ima: require secure_boot rules in lockdown mode
David Howells
- [RFC PATCH] ima: require secure_boot rules in lockdown mode
Mimi Zohar
- [RFC PATCH] ima: require secure_boot rules in lockdown mode
David Howells
- [RFC PATCH] ima: require secure_boot rules in lockdown mode
Mimi Zohar
- [RFC PATCH] ima: require secure_boot rules in lockdown mode
James Morris
- [RFC PATCH] xfrm: fix regression introduced by xdst pcpu cache
Stephen Smalley
- [RFC PATCH] xfrm: fix regression introduced by xdst pcpu cache
Stephen Smalley
- [RFC PATCH] xfrm: fix regression introduced by xdst pcpu cache
Florian Westphal
- [RFC PATCH] xfrm: fix regression introduced by xdst pcpu cache
Stephen Smalley
- [RFC PATCH] xfrm: fix regression introduced by xdst pcpu cache
Stephen Smalley
- [RFC PATCH] xfrm: fix regression introduced by xdst pcpu cache
Florian Westphal
- [RFC PATCH] xfrm: fix regression introduced by xdst pcpu cache
Paul Moore
- [RFC PATCH] xfrm: fix regression introduced by xdst pcpu cache
Florian Westphal
- [RFC v0.1][PATCH] selinuxns: extend namespace support to security.selinux xattrs
James Morris
- [RFC v0.1][PATCH] selinuxns: extend namespace support to security.selinux xattrs
Casey Schaufler
- [RFC v0.1][PATCH] selinuxns: extend namespace support to security.selinux xattrs
Stephen Smalley
- [RFC v0.1][PATCH] selinuxns: extend namespace support to security.selinux xattrs
James Morris
- [RFC v0.1][PATCH] selinuxns: extend namespace support to security.selinux xattrs
Stephen Smalley
- [RFC v0.1][PATCH] selinuxns: extend namespace support to security.selinux xattrs
Stephen Smalley
- [RFC][PATCH 00/15] KEYS: Fixes
David Howells
- [RFC][PATCH 00/15] KEYS: Fixes
David Howells
- [RFC][PATCH 00/15] KEYS: Fixes
Eric Biggers
- [RFC][PATCH 00/15] KEYS: Fixes
David Howells
- [RFC][PATCH 00/15] KEYS: Fixes
David Howells
- [RFC][PATCH 00/15] KEYS: Fixes
Eric Biggers
- [RFC][PATCH 00/15] KEYS: Fixes
David Howells
- [RFC][PATCH 00/15] KEYS: Fixes
David Howells
- [RFC][PATCH 00/15] KEYS: Fixes
Eric Biggers
- [RFC][PATCH 1/2] ima: preserve the integrity of appraised files
Mimi Zohar
- [RFC][PATCH 1/2] ima: preserve the integrity of appraised files
Roberto Sassu
- [RFC][PATCH 1/2] ima: preserve the integrity of appraised files
Mimi Zohar
- [RFC][PATCH 1/2] ima: preserve the integrity of appraised files
Roberto Sassu
- [RFC][PATCH] KEYS: Replace uid/gid/perm permissions checking with ACL
Eric Biggers
- [RFC][PATCH] KEYS: Replace uid/gid/perm permissions checking with ACL
David Howells
- [RFC][PATCH] security: Make the selinux setxattr and removexattr hooks behave
Eric W. Biederman
- [RFC][PATCH] security: Make the selinux setxattr and removexattr hooks behave
Casey Schaufler
- [RFC][PATCH] security: Make the selinux setxattr and removexattr hooks behave
Serge E. Hallyn
- [RFC][PATCH] security: Make the selinux setxattr and removexattr hooks behave
Eric W. Biederman
- [RFC][PATCH] security: Make the selinux setxattr and removexattr hooks behave
Eric W. Biederman
- [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
Stefan Berger
- [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
Jason Gunthorpe
- [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
Jarkko Sakkinen
- [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
Jarkko Sakkinen
- [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
PrasannaKumar Muralidharan
- [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
Jason Gunthorpe
- [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
PrasannaKumar Muralidharan
- [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
Jason Gunthorpe
- [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
PrasannaKumar Muralidharan
- [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
Jarkko Sakkinen
- [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
PrasannaKumar Muralidharan
- [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
Dmitry Torokhov
- [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
Jason Gunthorpe
- [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
PrasannaKumar Muralidharan
- [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
Jason Gunthorpe
- [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
PrasannaKumar Muralidharan
- [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
Dmitry Torokhov
- [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
Jarkko Sakkinen
- [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
Jarkko Sakkinen
- [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
Peter Huewe
- [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
PrasannaKumar Muralidharan
- [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
Jarkko Sakkinen
- [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
PrasannaKumar Muralidharan
- Can we delete audit_log_secctx()?
Casey Schaufler
- Can we delete audit_log_secctx()?
William Roberts
- Can we delete audit_log_secctx()?
Paul Moore
- Digest list extension for IMA
Roberto Sassu
- Draft manpage explaining kernel lockdown
David Howells
- Draft manpage explaining kernel lockdown
Johannes Berg
- Draft manpage explaining kernel lockdown
Florian Weimer
- Draft manpage explaining kernel lockdown
David Howells
- Draft manpage explaining kernel lockdown
David Howells
- Draft manpage explaining kernel lockdown
Ard Biesheuvel
- Draft manpage explaining kernel lockdown
Randy Dunlap
- Draft manpage explaining kernel lockdown
joeyli
- Draft manpage explaining kernel lockdown
Michael Kerrisk (man-pages)
- Fixing CVE-2017-15361
Jarkko Sakkinen
- Fixing CVE-2017-15361
Matthew Garrett
- Fixing CVE-2017-15361
Jarkko Sakkinen
- Fixing CVE-2017-15361
Jerry Snitselaar
- Fixing CVE-2017-15361
Peter Huewe
- Fixing CVE-2017-15361
Jarkko Sakkinen
- Fixing CVE-2017-15361
Jarkko Sakkinen
- Fixing CVE-2017-15361
Jarkko Sakkinen
- Fixing CVE-2017-15361
Michal Suchánek
- Fixing CVE-2017-15361
Jarkko Sakkinen
- Fixing CVE-2017-15361
Michal Suchánek
- Fixing CVE-2017-15361
Alexander.Steffen at infineon.com
- Fixing CVE-2017-15361
Alexander.Steffen at infineon.com
- Fixing CVE-2017-15361
Alexander.Steffen at infineon.com
- Fixing CVE-2017-15361
Jarkko Sakkinen
- Fixing CVE-2017-15361
Jarkko Sakkinen
- Fixing CVE-2017-15361
Jarkko Sakkinen
- Fixing CVE-2017-15361
Jarkko Sakkinen
- Fixing CVE-2017-15361
Jarkko Sakkinen
- Modular BIG_KEYS (was: Re: [PATCH v4] security/keys: rewrite all of big_key crypto)
Eric Biggers
- Modular BIG_KEYS (was: Re: [PATCH v4] security/keys: rewrite all of big_key crypto)
David Howells
- Modular BIG_KEYS (was: Re: [PATCH v4] security/keys: rewrite all of big_key crypto)
David Howells
- Modular BIG_KEYS (was: Re: [PATCH v4] security/keys: rewrite all of big_key crypto)
Geert Uytterhoeven
- Project Funding Program
Daria Yoong Shang
- Proposal: rename tpm1_eventlog.c and tpm2_eventlog.c
Jarkko Sakkinen
- Proposal: rename tpm1_eventlog.c and tpm2_eventlog.c
Thiebaud Weksteen
- Proposal: rename tpm1_eventlog.c and tpm2_eventlog.c
Jarkko Sakkinen
- Proposal: rename tpm1_eventlog.c and tpm2_eventlog.c
Jarkko Sakkinen
- Proposal: rename tpm1_eventlog.c and tpm2_eventlog.c
Thiebaud Weksteen
- Proposal: rename tpm1_eventlog.c and tpm2_eventlog.c
Nayna Jain
Last message date:
Tue Oct 31 23:08:09 UTC 2017
Archived on: Thu Nov 2 16:55:05 UTC 2017
This archive was generated by
Pipermail 0.09 (Mailman edition).