September 2017 Archives by subject
      
      Starting: Fri Sep  1 00:29:42 UTC 2017
         Ending: Sat Sep 30 23:22:12 UTC 2017
         Messages: 388
     
- [BUG] security_release_secctx seems broken
 
Konstantin Khlebnikov
 - [BUG] security_release_secctx seems broken
 
Casey Schaufler
 - [BUG] security_release_secctx seems broken
 
Casey Schaufler
 - [Fwd: [PATCH] usb,signal,security: only pass the cred, not the	secid, to kill_pid_info_as_cred and security_task_kill]
 
John Johansen
 - [GIT PULL] KEYS: Fixes and crypto fixes
 
David Howells
 - [GIT PULL] KEYS: Fixes and crypto fixes
 
James Morris
 - [GIT PULL] KEYS: Fixes and crypto fixes
 
Eric Biggers
 - [GIT PULL] KEYS: Fixes and crypto fixes
 
James Morris
 - [GIT PULL] KEYS: Fixes and crypto fixes
 
Herbert Xu
 - [GIT PULL] Security subsystem updates for 4.14
 
James Morris
 - [GIT PULL] Security subsystem updates for 4.14
 
Linus Torvalds
 - [GIT PULL] Security subsystem updates for 4.14
 
James Morris
 - [GIT PULL] Security subsystem updates for 4.14
 
Christoph Hellwig
 - [GIT PULL] Security subsystem updates for 4.14
 
Linus Torvalds
 - [GIT PULL] Security subsystem updates for 4.14
 
Paul Moore
 - [GIT PULL] Security subsystem updates for 4.14
 
James Morris
 - [GIT PULL] Security subsystem updates for 4.14
 
Theodore Ts'o
 - [GIT PULL] Security subsystem updates for 4.14
 
James Morris
 - [GIT PULL] Security subsystem updates for 4.14
 
James Morris
 - [GIT PULL] Security subsystem updates for 4.14
 
James Morris
 - [GIT PULL] Security subsystem updates for 4.14
 
Mimi Zohar
 - [GIT PULL] Security subsystem updates for 4.14
 
Mimi Zohar
 - [GIT PULL] Security subsystem updates for 4.14
 
Christoph Hellwig
 - [GIT PULL] Security subsystem updates for 4.14
 
Theodore Ts'o
 - [GIT PULL] Security subsystem updates for 4.14
 
Mimi Zohar
 - [GIT PULL] Security subsystem updates for 4.14
 
Christoph Hellwig
 - [GIT PULL] Security subsystem updates for 4.14
 
Mimi Zohar
 - [GIT PULL] Security subsystem updates for 4.14
 
Paul Moore
 - [GIT PULL] Security subsystem updates for 4.14
 
Kees Cook
 - [GIT PULL] Security subsystem updates for 4.14
 
James Morris
 - [GIT PULL] Security subsystem updates for 4.14
 
Kees Cook
 - [GIT PULL] Security subsystem updates for 4.14
 
Mimi Zohar
 - [GIT PULL] Security susbsystem updates for v4.14 (v2)
 
James Morris
 - [GIT PULL] Security susbsystem updates for v4.14 (v2)
 
James Morris
 - [GIT PULL] security: general update for v4.14
 
James Morris
 - [GIT PULL] security: keys fixes for v4.14-rc3
 
James Morris
 - [GIT PULL] security: keys fixes for v4.14-rc3
 
Jason A. Donenfeld
 - [GIT PULL] security: keys fixes for v4.14-rc3
 
James Morris
 - [GIT PULL] SELinux patches for v4.14
 
James Morris
 - [GIT PULL] SELinux patches for v4.14
 
Paul Moore
 - [GIT PULL] SELinux patches for v4.14
 
Linus Torvalds
 - [GIT PULL] SELinux patches for v4.14
 
Paul Moore
 - [GIT PULL] TPM updates for v4.14
 
James Morris
 - [integrity:next-read-iter 8/10]	drivers/staging/android/ashmem.c:824:15: error: initialization from	incompatible pointer type
 
kbuild test robot
 - [integrity:next-read-iter 8/10] drivers//vhost/net.c:1348:9: error:	too many arguments to function 'vhost_chr_read_iter'
 
kbuild test robot
 - [kernel-hardening] [RFC v3 0/9] S.A.R.A. a new stacked LSM
 
Salvatore Mesoraca
 - [kernel-hardening] Re: [PATCH v4] security/keys: rewrite all of	big_key crypto
 
Greg KH
 - [kernel-hardening] Re: [PATCH v4] security/keys: rewrite all of	big_key crypto
 
Stephan Mueller
 - [kernel-hardening] Re: [PATCH v4] security/keys: rewrite all of	big_key crypto
 
Sandy Harris
 - [kernel-hardening] Re: [PATCH v4] security/keys: rewrite all of	big_key crypto
 
Jason A. Donenfeld
 - [kernel-hardening] Re: [PATCH v4] security/keys: rewrite all of	big_key crypto
 
Theodore Ts'o
 - [Linux-ima-devel] New ML for TPM and IMA
 
Ken Goldman
 - [Linux-ima-devel] New ML for TPM and IMA
 
Jarkko Sakkinen
 - [PATCH 0/3] Fix y2038 issues for security/keys subsystem
 
Baolin Wang
 - [PATCH 0/3] ima: only call integrity_kernel_read to calc file hash
 
Mimi Zohar
 - [PATCH 0/3] tpm: retrieve digest size of unknown algorithms from TPM
 
Roberto Sassu
 - [PATCH 0/7] Fix dereferencing payload of revoked keys
 
Eric Biggers
 - [PATCH 1/2] vfs: constify path argument to	kernel_read_file_from_path
 
Christoph Hellwig
 - [PATCH 1/2] vfs: constify path argument to kernel_read_file_from_path
 
Mimi Zohar
 - [PATCH 1/3] security: bpf: Add eBPF LSM hooks to security module
 
Stephen Smalley
 - [PATCH 1/3] security: bpf: Add eBPF LSM hooks to security module
 
Chenbo Feng
 - [PATCH 1/3] security: bpf: Add eBPF LSM hooks to security module
 
Stephen Smalley
 - [PATCH 1/3] tpm: fix type of a local variable in	tpm2_get_cc_attrs_tbl()
 
Jarkko Sakkinen
 - [PATCH 1/3] tpm: fix type of a local variable in	tpm2_get_cc_attrs_tbl()
 
Jason Gunthorpe
 - [PATCH 1/3] tpm: fix type of a local variable in	tpm2_get_cc_attrs_tbl()
 
Jarkko Sakkinen
 - [PATCH 1/3] tpm: move PCR read code to static function	tpm2_pcr_read_common()
 
Roberto Sassu
 - [PATCH 1/3] vfs: constify path argument to	kernel_read_file_from_path
 
Linus Torvalds
 - [PATCH 1/3] vfs: constify path argument to kernel_read_file_from_path
 
Mimi Zohar
 - [PATCH 1/4] tpm: ignore burstcount to improve tpm_tis send()	performance.
 
Nayna Jain
 - [PATCH 1/4] tpm: ignore burstcount to improve tpm_tis send()	performance.
 
Nayna
 - [PATCH 1/7] KEYS: encrypted: fix dereference of NULL user_key_payload
 
Eric Biggers
 - [PATCH 2/2] integrity: replace call to integrity_read_file with	kernel version
 
Mimi Zohar
 - [PATCH 2/2] integrity: replace call to integrity_read_file with	kernel version
 
James Morris
 - [PATCH 2/2] integrity: replace call to integrity_read_file with	kernel version
 
Christoph Hellwig
 - [PATCH 2/2] integrity: replace call to integrity_read_file with	kernel version
 
James Morris
 - [PATCH 2/2] integrity: replace call to integrity_read_file with	kernel version
 
James Morris
 - [PATCH 2/3] integrity: replace call to integrity_read_file with	kernel version
 
Mimi Zohar
 - [PATCH 2/3] security: bpf: Add eBPF LSM hooks and security field	to eBPF map
 
Chenbo Feng
 - [PATCH 2/3] security: bpf: Add eBPF LSM hooks and security field	to eBPF map
 
Alexei Starovoitov
 - [PATCH 2/3] security: bpf: Add eBPF LSM hooks and security field	to eBPF map
 
Jeffrey Vander Stoep
 - [PATCH 2/3] security: bpf: Add eBPF LSM hooks and security field	to eBPF map
 
Chenbo Feng
 - [PATCH 2/3] security: bpf: Add eBPF LSM hooks and security field	to eBPF map
 
Alexei Starovoitov
 - [PATCH 2/3] tpm: fix type of a local variable in tpm2_map_command()
 
Jarkko Sakkinen
 - [PATCH 2/3] tpm: retrieve digest size of unknown algorithms with PCR	read
 
Roberto Sassu
 - [PATCH 2/4] tpm: define __wait_for_tpm_stat to specify variable	polling sleep time
 
Nayna Jain
 - [PATCH 2/4] tpm: define __wait_for_tpm_stat to specify variable	polling sleep time
 
Nayna
 - [PATCH 2/7] FS-Cache: fix dereference of NULL user_key_payload
 
Eric Biggers
 - [PATCH 3/3] ima: use fs method to read integrity data
 
Mimi Zohar
 - [PATCH 3/3] ima: use fs method to read integrity data
 
Mimi Zohar
 - [PATCH 3/3] ima: use fs method to read integrity data
 
Mimi Zohar
 - [PATCH 3/3] ima: use fs method to read integrity data
 
Christoph Hellwig
 - [PATCH 3/3] ima: use fs method to read integrity data
 
Mimi Zohar
 - [PATCH 3/3] ima: use fs method to read integrity data
 
Linus Torvalds
 - [PATCH 3/3] ima: use fs method to read integrity data (updated	patch description)
 
Mimi Zohar
 - [PATCH 3/3] ima: use fs method to read integrity data (updated	patch description)
 
Linus Torvalds
 - [PATCH 3/3] ima: use fs method to read integrity data (updated	patch description)
 
Mimi Zohar
 - [PATCH 3/3] ima: use fs method to read integrity data (updated	patch description)
 
Christoph Hellwig
 - [PATCH 3/3] ima: use fs method to read integrity data (updated	patch description)
 
Linus Torvalds
 - [PATCH 3/3] ima: use fs method to read integrity data (updated	patch description)
 
Christoph Hellwig
 - [PATCH 3/3] ima: use fs method to read integrity data (updated	patch description)
 
Mimi Zohar
 - [PATCH 3/3] ima: use fs method to read integrity data (updated	patch description)
 
Linus Torvalds
 - [PATCH 3/3] ima: use fs method to read integrity data (updated	patch description)
 
Al Viro
 - [PATCH 3/3] ima: use fs method to read integrity data (updated	patch description)
 
Steven Whitehouse
 - [PATCH 3/3] ima: use fs method to read integrity data (updated	patch description)
 
Jan Kara
 - [PATCH 3/3] ima: use fs method to read integrity data (updated	patch description)
 
Mimi Zohar
 - [PATCH 3/3] ima: use fs method to read integrity data (updated	patch description)
 
Mimi Zohar
 - [PATCH 3/3] tpm: add the crypto algorithm identifier to	active_bank_info
 
Roberto Sassu
 - [PATCH 3/3] tpm: fix type of a local variables in tpm_tis_spi.c
 
Jarkko Sakkinen
 - [PATCH 3/3] tpm: fix type of a local variables in tpm_tis_spi.c
 
Jarkko Sakkinen
 - [PATCH 3/7] lib/digsig: fix dereference of NULL user_key_payload
 
Eric Biggers
 - [PATCH 4/7] fscrypt: fix dereference of NULL user_key_payload
 
Eric Biggers
 - [PATCH 5/7] ecryptfs: fix dereference of NULL user_key_payload
 
Eric Biggers
 - [PATCH 6/7] ecryptfs: fix out-of-bounds read of key payload
 
Eric Biggers
 - [PATCH 7/7] ecryptfs: move key payload accessor functions into	keystore.c
 
Eric Biggers
 - [PATCH net-next v7 08/10] bpf: Add a Landlock sandbox example
 
Alban Crequy
 - [PATCH RESEND v2 0/3] tpm2-cmd: Improve self test execution
 
Jarkko Sakkinen
 - [PATCH RESEND v2 0/3] tpm2-cmd: Improve self test execution
 
Jarkko Sakkinen
 - [PATCH RESEND v2 0/3] tpm2-cmd: Improve self test execution
 
Jarkko Sakkinen
 - [PATCH RESEND v3 0/2] tpm_tis_spi: Use DMA-safe memory
 
Jarkko Sakkinen
 - [PATCH RESEND v3 0/2] tpm_tis_spi: Use DMA-safe memory
 
Jarkko Sakkinen
 - [PATCH RESEND v3 0/2] tpm_tis_spi: Use DMA-safe memory
 
Jarkko Sakkinen
 - [PATCH v2 0/2] Fix y2038 issues for security/keys subsystem
 
Baolin Wang
 - [PATCH v2 0/2] Fix y2038 issues for security/keys subsystem
 
James Morris
 - [PATCH v2 0/2] Fix y2038 issues for security/keys subsystem
 
David Howells
 - [PATCH v2 0/2] Fix y2038 issues for security/keys subsystem
 
James Morris
 - [PATCH v2 0/2] Fix y2038 issues for security/keys subsystem
 
Baolin Wang
 - [PATCH v2 0/3] KEYS: fix error handling in request_key_auth_new()
 
Eric Biggers
 - [PATCH v2 0/4] additional TPM performance improvements
 
Jarkko Sakkinen
 - [PATCH v2 0/4] additional TPM performance improvements 
 
Nayna Jain
 - [PATCH v2 0/6] KEYS: fix atomicity issues with key flags
 
Eric Biggers
 - [PATCH v2 1/2] security: keys: Replace time_t/timespec with time64_t
 
Baolin Wang
 - [PATCH v2 1/3] KEYS: fix cred refcount leak in	request_key_auth_new()
 
David Howells
 - [PATCH v2 1/3] KEYS: fix cred refcount leak in request_key_auth_new()
 
Eric Biggers
 - [PATCH v2 1/4] tpm: ignore burstcount to improve tpm_tis send()	performance.
 
Nayna Jain
 - [PATCH v2 1/4] tpm: ignore burstcount to improve tpm_tis send()	performance.
 
Jason Gunthorpe
 - [PATCH v2 1/4] tpm: ignore burstcount to improve tpm_tis send()	performance.
 
Jarkko Sakkinen
 - [PATCH v2 1/4] tpm: ignore burstcount to improve tpm_tis send()	performance.
 
Peter Huewe
 - [PATCH v2 1/4] tpm: ignore burstcount to improve tpm_tis send()	performance.
 
Jarkko Sakkinen
 - [PATCH v2 1/4] tpm: ignore burstcount to improve tpm_tis send()	performance.
 
Nayna Jain
 - [PATCH v2 1/4] tpm: ignore burstcount to improve tpm_tis send()	performance.
 
Jarkko Sakkinen
 - [PATCH v2 1/6] KEYS: fix race between updating and finding	negative key
 
Eric Biggers
 - [PATCH v2 1/6] KEYS: fix race between updating and finding negative	key
 
Eric Biggers
 - [PATCH v2 2/2] security: keys: Replace time_t with time64_t for	struct key_preparsed_payload
 
Baolin Wang
 - [PATCH v2 2/3] KEYS: don't revoke uninstantiated key in	request_key_auth_new()
 
Eric Biggers
 - [PATCH v2 2/3] KEYS: don't revoke uninstantiated key in	request_key_auth_new()
 
David Howells
 - [PATCH v2 2/4] tpm: define __wait_for_tpm_stat to specify	variable polling sleep time
 
Jarkko Sakkinen
 - [PATCH v2 2/4] tpm: define __wait_for_tpm_stat to specify	variable polling sleep time
 
Nayna Jain
 - [PATCH v2 2/4] tpm: define __wait_for_tpm_stat to specify	variable polling sleep time
 
Jarkko Sakkinen
 - [PATCH v2 2/4] tpm: define __wait_for_tpm_stat to specify variable	polling sleep time
 
Nayna Jain
 - [PATCH v2 2/6] KEYS: load key flags atomically in	key_is_instantiated()
 
Eric Biggers
 - [PATCH v2 3/3] KEYS: use kmemdup() in request_key_auth_new()
 
Eric Biggers
 - [PATCH v2 3/4] tpm: reduce tpm_msleep() time in get_burstcount()
 
Nayna Jain
 - [PATCH v2 3/4] tpm: reduce tpm_msleep() time in get_burstcount()
 
Jarkko Sakkinen
 - [PATCH v2 3/4] tpm: reduce tpm_msleep() time in get_burstcount()
 
Nayna Jain
 - [PATCH v2 3/6] KEYS: load key flags and expiry time atomically in	key_validate()
 
Eric Biggers
 - [PATCH v2 4/4] tpm: use tpm_msleep() value as max delay
 
Nayna Jain
 - [PATCH v2 4/4] tpm: use tpm_msleep() value as max delay
 
Jarkko Sakkinen
 - [PATCH v2 4/4] tpm: use tpm_msleep() value as max delay
 
Nayna Jain
 - [PATCH v2 4/4] tpm: use tpm_msleep() value as max delay
 
Jarkko Sakkinen
 - [PATCH v2 4/6] KEYS: load key flags and expiry time atomically in	keyring_search_iterator()
 
Eric Biggers
 - [PATCH v2 5/6] KEYS: load key flags and expiry time atomically in	proc_keys_show()
 
Eric Biggers
 - [PATCH v2 6/6] KEYS: remove KEY_FLAG_NEGATIVE
 
Eric Biggers
 - [PATCH v2] tpm-dev-common: Reject too short writes
 
Alexander Steffen
 - [PATCH v2] tpm-dev-common: Reject too short writes
 
Jarkko Sakkinen
 - [PATCH v2] tpm-dev-common: Reject too short writes
 
Jarkko Sakkinen
 - [PATCH v2] tpm-dev-common: Reject too short writes
 
Jarkko Sakkinen
 - [PATCH v2] tpm-dev-common: Reject too short writes
 
Alexander.Steffen at infineon.com
 - [PATCH v2] tpm-dev-common: Reject too short writes
 
Jarkko Sakkinen
 - [PATCH v2] tpm-dev-common: Reject too short writes
 
Alexander.Steffen at infineon.com
 - [PATCH v2] tpm-dev-common: Reject too short writes
 
Jarkko Sakkinen
 - [PATCH v3 0/7] KEYS: instantiation and atomicity fixes
 
Eric Biggers
 - [PATCH V3 02/10] capabilities: intuitive names for cap gain status
 
Richard Guy Briggs
 - [PATCH V3 02/10] capabilities: intuitive names for cap gain status
 
Serge E. Hallyn
 - [PATCH V3 02/10] capabilities: intuitive names for cap gain status
 
Richard Guy Briggs
 - [PATCH V3 02/10] capabilities: intuitive names for cap gain status
 
Richard Guy Briggs
 - [PATCH v3 1/7] KEYS: don't let add_key() update an uninstantiated key
 
Eric Biggers
 - [PATCH v3 2/7] KEYS: fix race between updating and finding negative	key
 
Eric Biggers
 - [PATCH v3 3/7] KEYS: load key flags atomically in	key_is_instantiated()
 
Eric Biggers
 - [PATCH v3 4/7] KEYS: load key flags and expiry time atomically in	key_validate()
 
Eric Biggers
 - [PATCH v3 5/7] KEYS: load key flags and expiry time atomically in	keyring_search_iterator()
 
Eric Biggers
 - [PATCH v3 6/7] KEYS: load key flags and expiry time atomically in	proc_keys_show()
 
Eric Biggers
 - [PATCH v3 7/7] KEYS: remove KEY_FLAG_NEGATIVE
 
Eric Biggers
 - [PATCH v3] tpm-dev-common: Reject too short writes
 
Alexander Steffen
 - [PATCH v3] tpm-dev-common: Reject too short writes
 
Jarkko Sakkinen
 - [PATCH v3] tpm-dev-common: Reject too short writes
 
Jarkko Sakkinen
 - [PATCH v3] tpm-dev-common: Reject too short writes
 
Alexander.Steffen at infineon.com
 - [PATCH V4 00/10] capabilities: do not audit log BPRM_FCAPS on	set*id
 
Paul Moore
 - [PATCH V4 00/10] capabilities: do not audit log BPRM_FCAPS on	set*id
 
Richard Guy Briggs
 - [PATCH V4 00/10] capabilities: do not audit log BPRM_FCAPS on	set*id
 
Paul Moore
 - [PATCH V4 00/10] capabilities: do not audit log BPRM_FCAPS on	set*id
 
Paul Moore
 - [PATCH V4 00/10] capabilities: do not audit log BPRM_FCAPS on set*id
 
Richard Guy Briggs
 - [PATCH V4 01/10] capabilities: factor out cap_bprm_set_creds	privileged root
 
Richard Guy Briggs
 - [PATCH V4 01/10] capabilities: factor out cap_bprm_set_creds	privileged root
 
James Morris
 - [PATCH V4 01/10] capabilities: factor out cap_bprm_set_creds	privileged root
 
Kees Cook
 - [PATCH V4 02/10] capabilities: intuitive names for cap gain status
 
Richard Guy Briggs
 - [PATCH V4 02/10] capabilities: intuitive names for cap gain status
 
Kees Cook
 - [PATCH V4 03/10] capabilities: rename has_cap to has_fcap
 
Richard Guy Briggs
 - [PATCH V4 03/10] capabilities: rename has_cap to has_fcap
 
Kees Cook
 - [PATCH V4 04/10] capabilities: use root_priveleged inline to	clarify logic
 
Kees Cook
 - [PATCH V4 04/10] capabilities: use root_priveleged inline to clarify	logic
 
Richard Guy Briggs
 - [PATCH V4 05/10] capabilities: use intuitive names for id changes
 
Richard Guy Briggs
 - [PATCH V4 05/10] capabilities: use intuitive names for id changes
 
Kees Cook
 - [PATCH V4 06/10] capabilities: move audit log decision to function
 
Richard Guy Briggs
 - [PATCH V4 06/10] capabilities: move audit log decision to function
 
Kees Cook
 - [PATCH V4 07/10] capabilities: remove a layer of conditional logic
 
Richard Guy Briggs
 - [PATCH V4 07/10] capabilities: remove a layer of conditional logic
 
Kees Cook
 - [PATCH V4 08/10] capabilities: invert logic for clarity
 
Richard Guy Briggs
 - [PATCH V4 08/10] capabilities: invert logic for clarity
 
Kees Cook
 - [PATCH V4 09/10] capabilities: fix logic for effective root or	real root
 
Kees Cook
 - [PATCH V4 09/10] capabilities: fix logic for effective root or	real root
 
Paul Moore
 - [PATCH V4 09/10] capabilities: fix logic for effective root or	real root
 
Kees Cook
 - [PATCH V4 09/10] capabilities: fix logic for effective root or	real root
 
Paul Moore
 - [PATCH V4 09/10] capabilities: fix logic for effective root or real	root
 
Richard Guy Briggs
 - [PATCH V4 10/10] capabilities: audit log other surprising	conditions
 
Kees Cook
 - [PATCH V4 10/10] capabilities: audit log other surprising	conditions
 
Paul Moore
 - [PATCH V4 10/10] capabilities: audit log other surprising conditions
 
Richard Guy Briggs
 - [PATCH v4 next 1/3] modules:capabilities: allow	__request_module() to take a capability argument
 
Djalal Harouni
 - [PATCH v4] security/keys: rewrite all of big_key crypto
 
Jason A. Donenfeld
 - [PATCH v4] security/keys: rewrite all of big_key crypto
 
Stephan Mueller
 - [PATCH v4] security/keys: rewrite all of big_key crypto
 
Jason A. Donenfeld
 - [PATCH v4] security/keys: rewrite all of big_key crypto
 
Theodore Ts'o
 - [PATCH v4] tpm_tis_spi: Use DMA-safe memory for SPI transfers
 
Alexander Steffen
 - [PATCH v4] tpm_tis_spi: Use DMA-safe memory for SPI transfers
 
Jarkko Sakkinen
 - [PATCH v5 0/4] Certificate insertion support for x86 bzImages
 
Mike Rapoport
 - [PATCH v5] security/keys: rewrite all of big_key crypto
 
Jason A. Donenfeld
 - [PATCH v5] security/keys: rewrite all of big_key crypto
 
Eric Biggers
 - [PATCH v5] security/keys: rewrite all of big_key crypto
 
Jason A. Donenfeld
 - [PATCH v6] security/keys: rewrite all of big_key crypto
 
Jason A. Donenfeld
 - [PATCH v6] security/keys: rewrite all of big_key crypto
 
David Howells
 - [PATCH v6] security/keys: rewrite all of big_key crypto
 
Stephan Mueller
 - [PATCH v6] security/keys: rewrite all of big_key crypto
 
Jason A. Donenfeld
 - [PATCH v6] security/keys: rewrite all of big_key crypto
 
Stephan Mueller
 - [PATCH v6] security/keys: rewrite all of big_key crypto
 
Jason A. Donenfeld
 - [PATCH v6] security/keys: rewrite all of big_key crypto
 
Stephan Mueller
 - [PATCH v6] security/keys: rewrite all of big_key crypto
 
Jason A. Donenfeld
 - [PATCH v6] security/keys: rewrite all of big_key crypto
 
Jason A. Donenfeld
 - [PATCH v7 00/19] simplify crypto wait for async op
 
Gilad Ben-Yossef
 - [PATCH v7 00/19] simplify crypto wait for async op
 
Harsh Jain
 - [PATCH v7 00/19] simplify crypto wait for async op
 
Gilad Ben-Yossef
 - [PATCH v7 1/2] security/keys: properly zero out sensitive key	material in big_key
 
Jason A. Donenfeld
 - [PATCH v7 2/2] security/keys: rewrite all of big_key crypto
 
Jason A. Donenfeld
 - [PATCH v7 2/2] security/keys: rewrite all of big_key crypto
 
David Howells
 - [PATCH v7 2/2] security/keys: rewrite all of big_key crypto
 
Jason A. Donenfeld
 - [PATCH v8 00/20] simplify crypto wait for async op
 
Gilad Ben-Yossef
 - [PATCH v8 01/20] crypto: change transient busy return code to -EAGAIN
 
Gilad Ben-Yossef
 - [PATCH v8 02/20] crypto: ccp: use -EAGAIN for transient busy	indication
 
Gilad Ben-Yossef
 - [PATCH v8 03/20] net: use -EAGAIN for transient busy indication
 
Gilad Ben-Yossef
 - [PATCH v8 04/20] crypto: remove redundant backlog checks on EBUSY
 
Gilad Ben-Yossef
 - [PATCH v8 05/20] crypto: marvell/cesa: remove redundant backlog	checks on EBUSY
 
Gilad Ben-Yossef
 - [PATCH v8 06/20] crypto: introduce crypto wait for async op
 
Gilad Ben-Yossef
 - [PATCH v8 07/20] crypto: move algif to generic async completion
 
Gilad Ben-Yossef
 - [PATCH v8 08/20] crypto: move pub key to generic async completion
 
Gilad Ben-Yossef
 - [PATCH v8 09/20] crypto: move drbg to generic async completion
 
Gilad Ben-Yossef
 - [PATCH v8 10/20] crypto: move gcm to generic async completion
 
Gilad Ben-Yossef
 - [PATCH v8 11/20] crypto: move testmgr to generic async completion
 
Gilad Ben-Yossef
 - [PATCH v8 12/20] fscrypt: move to generic async completion
 
Gilad Ben-Yossef
 - [PATCH v8 13/20] dm: move dm-verity to generic async completion
 
Gilad Ben-Yossef
 - [PATCH v8 14/20] cifs: move to generic async completion
 
Gilad Ben-Yossef
 - [PATCH v8 15/20] ima: move to generic async completion
 
Gilad Ben-Yossef
 - [PATCH v8 16/20] crypto: tcrypt: move to generic async completion
 
Gilad Ben-Yossef
 - [PATCH v8 17/20] crypto: talitos: move to generic async completion
 
Gilad Ben-Yossef
 - [PATCH v8 18/20] crypto: qce: move to generic async completion
 
Gilad Ben-Yossef
 - [PATCH v8 19/20] crypto: mediatek: move to generic async completion
 
Gilad Ben-Yossef
 - [PATCH v8 20/20] crypto: adapt api sample to use async. op wait
 
Gilad Ben-Yossef
 - [PATCH] apparmor: Fix harmless off by one in map_signal_num()
 
Dan Carpenter
 - [PATCH] apparmor: Fix harmless off by one in map_signal_num()
 
John Johansen
 - [PATCH] apparmor: Fix harmless off by one in map_signal_num()
 
Dan Carpenter
 - [PATCH] apparmor: Fix harmless off by one in map_signal_num()
 
John Johansen
 - [PATCH] apparmor: fix off-by-one comparison on MAXMAPPED_SIG
 
John Johansen
 - [PATCH] apparmor: fix spelling mistake: "resoure" -> "resource"
 
John Johansen
 - [PATCH] apparmor: initialized returned struct aa_perms
 
Arnd Bergmann
 - [PATCH] apparmor: initialized returned struct aa_perms
 
Geert Uytterhoeven
 - [PATCH] apparmor: initialized returned struct aa_perms
 
John Johansen
 - [PATCH] apparmor: make allperms structure const
 
Bhumika Goyal
 - [PATCH] fix security_release_secctx seems broken
 
Casey Schaufler
 - [PATCH] fix security_release_secctx seems broken
 
Konstantin Khlebnikov
 - [PATCH] KEYS: fix cred refcount leak in request_key_auth_new()
 
Eric Biggers
 - [PATCH] KEYS: fix cred refcount leak in request_key_auth_new()
 
David Howells
 - [PATCH] KEYS: fix cred refcount leak in request_key_auth_new()
 
Eric Biggers
 - [PATCH] KEYS: fix key refcount leak in keyctl_assume_authority()
 
Eric Biggers
 - [PATCH] KEYS: fix key refcount leak in keyctl_read_key()
 
Eric Biggers
 - [PATCH] KEYS: fix race between updating and finding negative key
 
Eric Biggers
 - [PATCH] KEYS: fix race between updating and finding negative key
 
David Howells
 - [PATCH] KEYS: fix writing past end of user-supplied buffer in	keyring_read()
 
Eric Biggers
 - [PATCH] KEYS: key refcounting cleanup in keyctl_read_key
 
Vasily Averin
 - [PATCH] KEYS: key refcounting cleanup in keyctl_read_key
 
David Howells
 - [PATCH] KEYS: prevent creating a different user's keyrings
 
Eric Biggers
 - [PATCH] KEYS: prevent creating a different user's keyrings
 
David Howells
 - [PATCH] KEYS: prevent creating a different user's keyrings
 
Eric Biggers
 - [PATCH] KEYS: prevent creating a different user's keyrings
 
David Howells
 - [PATCH] KEYS: prevent KEYCTL_READ on negative key
 
Eric Biggers
 - [PATCH] KEYS: prevent KEYCTL_READ on negative key
 
David Howells
 - [PATCH] KEYS: prevent KEYCTL_READ on negative key
 
Eric Biggers
 - [PATCH] KEYS: prevent KEYCTL_READ on negative key
 
David Howells
 - [PATCH] KEYS: prevent KEYCTL_READ on negative key
 
Eric Biggers
 - [PATCH] KEYS: reset parent each time before searching key_user_tree
 
Eric Biggers
 - [PATCH] KEYS: restrict /proc/keys by credentials at open time
 
Eric Biggers
 - [PATCH] KEYS: use kmemdup() in request_key_auth_new()
 
Eric Biggers
 - [PATCH] security/keys: Adding newline after declaration
 
Pushkar Jambhlekar
 - [PATCH] security/keys: Adding newline after declaration
 
Joe Perches
 - [PATCH] security: commoncap: fix styling
 
Ahmad A Alobaid
 - [PATCH] security: keys: switch big_key encryption to AES in CTR	mode
 
Eric Biggers
 - [PATCH] security: keys: switch big_key encryption to AES in CTR	mode
 
Ard Biesheuvel
 - [PATCH] security: keys: switch big_key encryption to AES in CTR	mode
 
Jason A. Donenfeld
 - [PATCH] security: keys: switch big_key encryption to AES in CTR mode
 
Ard Biesheuvel
 - [PATCH] selinux: Use kmem_cache for hashtab_node
 
Kyeongdon Kim
 - [PATCH] selinux: Use kmem_cache for hashtab_node
 
Paul Moore
 - [PATCH] selinux: Use kmem_cache for hashtab_node
 
Paul Moore
 - [PATCH] Smack: Base support for overlayfs
 
Casey Schaufler
 - [PATCH] tpm: remove some recent additions to the authors lists
 
Jarkko Sakkinen
 - [PATCH] usb, signal, security: only pass the cred, not the secid,	to kill_pid_info_as_cred and security_task_kill
 
Stephen Smalley
 - [PATCH] usb,signal,security: only pass the cred, not the secid,	to kill_pid_info_as_cred and security_task_kill
 
Casey Schaufler
 - [PATCH] usb,signal,security: only pass the cred, not the secid,	to kill_pid_info_as_cred and security_task_kill
 
Paul Moore
 - [PATCH] usb,signal,security: only pass the cred, not the secid,	to kill_pid_info_as_cred and security_task_kill
 
James Morris
 - [PATCH] usb,signal,security: only pass the cred, not the secid,	to kill_pid_info_as_cred and security_task_kill
 
Casey Schaufler
 - [PATCH] usb,signal,security: only pass the cred, not the secid,	to kill_pid_info_as_cred and security_task_kill
 
Greg KH
 - [PATCH][capabilities-next] commoncap: move assignment of fs_ns	to avoid null pointer dereference
 
Serge E. Hallyn
 - [PATCH][capabilities-next] commoncap: move assignment of fs_ns to	avoid null pointer dereference
 
Colin King
 - [RFC PATCH 0/3] define new read_iter file operation rwf flag
 
Mimi Zohar
 - [RFC PATCH 1/3] fs: define new read_iter rwf flag
 
Mimi Zohar
 - [RFC PATCH 1/3] fs: define new read_iter rwf flag
 
Matthew Wilcox
 - [RFC PATCH 1/3] fs: define new read_iter rwf flag
 
Mimi Zohar
 - [RFC PATCH 1/3] fs: define new read_iter rwf flag
 
Linus Torvalds
 - [RFC PATCH 2/3] integrity: use call_read_iter to calculate the file	hash
 
Mimi Zohar
 - [RFC PATCH 3/3] fs: detect that the i_rwsem has already been	taken exclusively
 
Dave Chinner
 - [RFC PATCH 3/3] fs: detect that the i_rwsem has already been	taken exclusively
 
Linus Torvalds
 - [RFC PATCH 3/3] fs: detect that the i_rwsem has already been	taken exclusively
 
Mimi Zohar
 - [RFC PATCH 3/3] fs: detect that the i_rwsem has already been	taken exclusively
 
Linus Torvalds
 - [RFC PATCH 3/3] fs: detect that the i_rwsem has already been	taken exclusively
 
Mimi Zohar
 - [RFC PATCH 3/3] fs: detect that the i_rwsem has already been	taken exclusively
 
Linus Torvalds
 - [RFC PATCH 3/3] fs: detect that the i_rwsem has already been taken	exclusively
 
Mimi Zohar
 - [RFC v3 0/9] S.A.R.A. a new stacked LSM
 
Salvatore Mesoraca
 - [RFC v3 0/9] S.A.R.A. a new stacked LSM
 
Salvatore Mesoraca
 - [RFC v3 1/9] S.A.R.A. Documentation
 
Salvatore Mesoraca
 - [RFC v3 2/9] S.A.R.A. framework creation
 
Salvatore Mesoraca
 - [RFC v3 3/9] Creation of "check_vmflags" LSM hook
 
Salvatore Mesoraca
 - [RFC v3 4/9] S.A.R.A. cred blob management
 
Salvatore Mesoraca
 - [RFC v3 5/9] S.A.R.A. WX Protection
 
Salvatore Mesoraca
 - [RFC v3 6/9] Creation of "pagefault_handler" LSM hook
 
Salvatore Mesoraca
 - [RFC v3 7/9] Trampoline emulation
 
Salvatore Mesoraca
 - [RFC v3 8/9] Allowing for stacking procattr support in S.A.R.A.
 
Salvatore Mesoraca
 - [RFC v3 9/9] S.A.R.A. WX Protection procattr interface
 
Salvatore Mesoraca
 - [RFC][PATCH] KEYS: Replace uid/gid/perm permissions checking with	ACL
 
David Howells
 - [RFC][PATCH] KEYS: Replace uid/gid/perm permissions checking with ACL
 
David Howells
 - [RFC][PATCH] keyutils: Add key/keyring ACL support
 
David Howells
 - [RFC][PATCH] security: Make the selinux setxattr and	removexattr hooks behave
 
Stephen Smalley
 - [RFC][PATCH] security: Make the selinux setxattr and	removexattr hooks behave
 
Stephen Smalley
 - [RFC][PATCH] security: Make the selinux setxattr and removexattr	hooks behave
 
Eric W. Biederman
 - [RFC][PATCH] security: Make the selinux setxattr and removexattr	hooks behave
 
Casey Schaufler
 - [RFC][PATCH] security: Make the selinux setxattr and removexattr	hooks behave
 
Casey Schaufler
 - [RFC][PATCH] security: Make the selinux setxattr and removexattr	hooks behave
 
Eric W. Biederman
 - [RFC][PATCH] security: Make the selinux setxattr and removexattr	hooks behave
 
Casey Schaufler
 - [RFC][PATCH] security: Make the selinux setxattr and removexattr	hooks behave
 
Eric W. Biederman
 - [RFC][PATCH] security: Make the selinux setxattr and removexattr	hooks behave
 
Casey Schaufler
 - [tpmdd-devel] [PATCH RESEND 3/3] tpm-chip: Export TPM device to	user space even when startup failed
 
Jarkko Sakkinen
 - [tpmdd-devel] [PATCH RESEND 3/3] tpm-chip: Export TPM device to	user space even when startup failed
 
Jarkko Sakkinen
 - [tpmdd-devel] [PATCH v2 0/4] additional TPM performance	improvements
 
Alexander.Steffen at infineon.com
 - [tpmdd-devel] [PATCH v2 1/4] tpm: ignore burstcount to improve	tpm_tis send() performance.
 
Ken Goldman
 - [tpmdd-devel] [PATCH v2 1/4] tpm: ignore burstcount to improve	tpm_tis send() performance.
 
Peter Huewe
 - [tpmdd-devel] New ML for TPM and IMA
 
Peter Huewe
 - [tpmdd-devel] New ML for TPM and IMA
 
Jarkko Sakkinen
 - [tpmdd-devel] New ML for TPM and IMA
 
Peter Huewe
 - [tpmdd-devel] New ML for TPM and IMA
 
Jarkko Sakkinen
 - [tpmdd-devel] New ML for TPM and IMA
 
Joe Perches
 - [tpmdd-devel] New ML for TPM and IMA
 
Ken Goldman
 - [tpmdd-devel] New ML for TPM and IMA
 
Peter Huewe
 - [tpmdd-devel] New ML for TPM and IMA
 
Jarkko Sakkinen
 - [tpmdd-devel] New ML for TPM and IMA
 
Joe Perches
 - A potential issue in security_inode_init_security function
 
Boshi Wang
 - A potential issue in security_inode_init_security function
 
Casey Schaufler
 - A potential issue in security_inode_init_security function
 
Boshi Wang
 - about context gap
 
Jarkko Sakkinen
 - about context gap
 
Jarkko Sakkinen
 - about context gap
 
Ken Goldman
 - about context gap
 
Ken Goldman
 - My notes from the 2017 Linux Security Summit
 
Paul Moore
 - New ML for TPM and IMA
 
Jarkko Sakkinen
 - New ML for TPM and IMA
 
Joe Perches
 - New ML for TPM and IMA
 
Jarkko Sakkinen
 - New ML for TPM and IMA
 
Joe Perches
 - Security updates for v4.15 and beyond
 
Casey Schaufler
 - Security updates for v4.15 and beyond
 
James Morris
 - Security updates for v4.15 and beyond
 
Paul Moore
 - Security updates for v4.15 and beyond
 
John Johansen
 - Security updates for v4.15 and beyond
 
James Morris
 - Security updates for v4.15 and beyond
 
Casey Schaufler
 - setcap/getcap limitations
 
Richard Guy Briggs
 - Sync to v4.14-rc2
 
James Morris
    
 
    
      Last message date: 
       Sat Sep 30 23:22:12 UTC 2017
    Archived on: Sat Sep 30 23:22:28 UTC 2017
    
   
     
     
     This archive was generated by
     Pipermail 0.09 (Mailman edition).