July 2018 Archives by subject
Starting: Mon Jul 2 03:01:02 UTC 2018
Ending: Tue Jul 31 23:23:51 UTC 2018
Messages: 243
- [bug report] AppArmor: policy routines for loading and unpacking policy
Dan Carpenter
- [bug report] AppArmor: policy routines for loading and unpacking policy
John Johansen
- [GIT PULL] linux-integrity patches for 4.19
Mimi Zohar
- [GIT PULL] linux-integrity patches for 4.19
James Morris
- [GIT PULL] linux-integrity patches for 4.19
James Morris
- [GIT PULL] tpmdd 4.19 updates
Jarkko Sakkinen
- [GIT PULL] tpmdd 4.19 updates
Jarkko Sakkinen
- [GIT PULL] tpmdd 4.19 updates
James Morris
- [lkp-robot] [confidence: ] 7757d607c6 [ 56.996267] BUG: Bad page map in process trinity-c2 pte:0d755065 pmd:0d55b067
Joerg Roedel
- [LKP] [lkp-robot] [confidence: ] 7757d607c6 [ 56.996267] BUG: Bad page map in process trinity-c2 pte:0d755065 pmd:0d55b067
Ye Xiaolong
- [LKP] [lkp-robot] [confidence: ] 7757d607c6 [ 56.996267] BUG: Bad page map in process trinity-c2 pte:0d755065 pmd:0d55b067
Joerg Roedel
- [PATCH -next] EVM: fix return value check in evm_write_xattrs()
Wei Yongjun
- [PATCH -next] EVM: fix return value check in evm_write_xattrs()
Serge E. Hallyn
- [PATCH -next] EVM: fix return value check in evm_write_xattrs()
Mimi Zohar
- [PATCH 0/2] Fix AppArmor issues found through static analysis
Tyler Hicks
- [PATCH 0/4] Add support for architecture-specific IMA policies
Eric Richter
- [PATCH 00/38] VFS: Introduce filesystem context [ver #10]
David Howells
- [PATCH 06/32] vfs: Add LSM hooks for the new mount API [ver #9]
David Howells
- [PATCH 07/32] selinux: Implement the new mount API LSM hooks [ver #9]
Stephen Smalley
- [PATCH 07/32] selinux: Implement the new mount API LSM hooks [ver #9]
David Howells
- [PATCH 08/32] smack: Implement filesystem context security hooks [ver #9]
David Howells
- [PATCH 08/32] smack: Implement filesystem context security hooks [ver #9]
Casey Schaufler
- [PATCH 08/32] smack: Implement filesystem context security hooks [ver #9]
David Howells
- [PATCH 08/32] smack: Implement filesystem context security hooks [ver #9]
Casey Schaufler
- [PATCH 08/38] vfs: Add LSM hooks for the new mount API [ver #10]
David Howells
- [PATCH 09/32] apparmor: Implement security hooks for the new mount API [ver #9]
David Howells
- [PATCH 09/38] selinux: Implement the new mount API LSM hooks [ver #10]
David Howells
- [PATCH 1/2] apparmor: Check buffer bounds when mapping permissions mask
Serge E. Hallyn
- [PATCH 1/2] apparmor: Check buffer bounds when mapping permissions mask
John Johansen
- [PATCH 1/2] apparmor: Check buffer bounds when mapping permissions mask
Tyler Hicks
- [PATCH 1/2] security/keys/secure_key: Adds the secure key support based on CAAM.
Jan Lübbe
- [PATCH 1/2] security/keys/secure_key: Adds the secure key support based on CAAM.
kbuild test robot
- [PATCH 1/2] security/keys/secure_key: Adds the secure key support based on CAAM.
Mimi Zohar
- [PATCH 1/2] security/keys/secure_key: Adds the secure key support based on CAAM.
Jan Lübbe
- [PATCH 1/2] security/keys/secure_key: Adds the secure key support based on CAAM.
Mimi Zohar
- [PATCH 1/2] security/keys/secure_key: Adds the secure key support based on CAAM.
Udit Agarwal
- [PATCH 1/2] security/keys/secure_key: Adds the secure key support based on CAAM.
Udit Agarwal
- [PATCH 1/2] security/keys/secure_key: Adds the secure key support based on CAAM.
Udit Agarwal
- [PATCH 1/2] tpm: Implement public tpm_put_chip() to release reference to chip
Jarkko Sakkinen
- [PATCH 1/4] ima: add support for arch specific policies
Eric Richter
- [PATCH 1/4] ima: add support for arch specific policies
kbuild test robot
- [PATCH 1/5] General notification queue with user mmap()'able ring buffer
David Howells
- [PATCH 10/32] tomoyo: Implement security hooks for the new mount API [ver #9]
David Howells
- [PATCH 10/32] tomoyo: Implement security hooks for the new mount API [ver #9]
Tetsuo Handa
- [PATCH 10/38] smack: Implement filesystem context security hooks [ver #10]
David Howells
- [PATCH 11/38] apparmor: Implement security hooks for the new mount API [ver #10]
David Howells
- [PATCH 13/38] tomoyo: Implement security hooks for the new mount API [ver #10]
David Howells
- [PATCH 13/38] tomoyo: Implement security hooks for the new mount API [ver #10]
Tetsuo Handa
- [PATCH 13/38] tomoyo: Implement security hooks for the new mount API [ver #10]
David Howells
- [PATCH 2/2] apparmor: Fully initialize aa_perms struct when answering userspace query
Serge E. Hallyn
- [PATCH 2/2] apparmor: Fully initialize aa_perms struct when answering userspace query
John Johansen
- [PATCH 2/2] apparmor: Fully initialize aa_perms struct when answering userspace query
Tyler Hicks
- [PATCH 2/2] encrypted_keys: Adds support for secure key-type as master key.
Udit Agarwal
- [PATCH 2/2] KEYS: trusted: Find tpm_chip and use it until module shutdown
Jarkko Sakkinen
- [PATCH 2/2] KEYS: trusted: Find tpm_chip and use it until module shutdown
James Bottomley
- [PATCH 2/2] KEYS: trusted: Find tpm_chip and use it until module shutdown
James Bottomley
- [PATCH 2/2] KEYS: trusted: Find tpm_chip and use it until module shutdown
Jarkko Sakkinen
- [PATCH 2/2] KEYS: trusted: Find tpm_chip and use it until module shutdown
James Morris
- [PATCH 2/2] KEYS: trusted: Find tpm_chip and use it until module shutdown
Jarkko Sakkinen
- [PATCH 2/4] ima: add support for external setting of ima_appraise
Eric Richter
- [PATCH 2/5] KEYS: Add a notification facility
David Howells
- [PATCH 3/4] ima: add support for KEXEC_ORIG_KERNEL_CHECK
Eric Richter
- [PATCH 3/5] vfs: Add a mount-notification facility
David Howells
- [PATCH 4/4] x86/ima: define arch_get_ima_policy() for x86
Eric Richter
- [PATCH 4/4] x86/ima: define arch_get_ima_policy() for x86
kbuild test robot
- [PATCH 4/5] vfs: Add superblock notifications
David Howells
- [PATCH 5/5] Add sample notification program
David Howells
- [PATCH RFC] Smack: Fix handling of IPv4 traffic received by PF_INET6 sockets
Piotr Sawicki
- [PATCH RFC] Smack: Fix handling of IPv4 traffic received by PF_INET6 sockets
Piotr Sawicki
- [PATCH RFC] Smack: Fix handling of IPv4 traffic received by PF_INET6 sockets
Piotr Sawicki
- [PATCH RFC] Smack: Fix handling of IPv4 traffic received by PF_INET6 sockets
Piotr Sawicki
- [PATCH RFC] Smack: Fix handling of IPv4 traffic received by PF_INET6 sockets
Casey Schaufler
- [PATCH RFC] Smack: Fix handling of IPv4 traffic received by PF_INET6 sockets
Piotr Sawicki
- [PATCH RFC] Smack: Fix handling of IPv4 traffic received by PF_INET6 sockets
Casey Schaufler
- [PATCH RFC] Smack: Fix handling of IPv4 traffic received by PF_INET6 sockets
Piotr Sawicki
- [PATCH RFC] Smack: Fix handling of IPv4 traffic received by PF_INET6 sockets
Casey Schaufler
- [PATCH RFC] Smack: Fix handling of IPv4 traffic received by PF_INET6 sockets
Piotr Sawicki
- [PATCH RFC] Smack: Fix handling of IPv4 traffic received by PF_INET6 sockets
Casey Schaufler
- [PATCH v1 00/22] LSM: Full security module stacking
Casey Schaufler
- [PATCH v1 00/22] LSM: Full security module stacking
Casey Schaufler
- [PATCH v1 00/22] LSM: Full security module stacking
James Morris
- [PATCH v1 00/22] LSM: Full security module stacking
Casey Schaufler
- [PATCH v1 01/22] procfs: add smack subdir to attrs
Casey Schaufler
- [PATCH v1 02/22] Smack: Abstract use of cred security blob
Casey Schaufler
- [PATCH v1 03/22] SELinux: Abstract use of cred security blob
Casey Schaufler
- [PATCH v1 04/22] LSM: Infrastructure management of the cred security blob
Casey Schaufler
- [PATCH v1 05/22] SELinux: Abstract use of file security blob
Casey Schaufler
- [PATCH v1 06/22] LSM: Infrastructure management of the file security blob
Casey Schaufler
- [PATCH v1 07/22] LSM: Infrastructure management of the task security blob
Casey Schaufler
- [PATCH v1 09/22] Smack: Abstract use of inode security blob
Casey Schaufler
- [PATCH v1 10/22] LSM: Infrastructure management of the inode security
Casey Schaufler
- [PATCH v1 11/22] LSM: Infrastructure management of the superblock security blob
Casey Schaufler
- [PATCH v1 12/22] LSM: Infrastructure management of the sock security
Casey Schaufler
- [PATCH v1 13/22] LSM: Infrastructure management of the ipc security blob
Casey Schaufler
- [PATCH v1 14/22] LSM: Infrastructure management of the key security blob
Casey Schaufler
- [PATCH v1 15/22] LSM: Mark security blob allocation failures as unlikely
Casey Schaufler
- [PATCH v1 16/22] LSM: Sharing of security blobs
Casey Schaufler
- [PATCH v1 17/22] LSM: Allow mount options from multiple security modules
Casey Schaufler
- [PATCH v1 18/22] LSM: Use multiple secids in security module interfaces
Casey Schaufler
- [PATCH v1 19/22] LSM: Use multiple secids in LSM interfaces
Casey Schaufler
- [PATCH v1 20/22] Move common usercopy into security_getpeersec_stream
Casey Schaufler
- [PATCH v1 21/22] LSM: Multiple concurrent major security modules
Casey Schaufler
- [PATCH v1 22/22] Netfilter: Add a selection for Smack
Casey Schaufler
- [PATCH v1 RFC] Smack: Check UDP-Lite and DCCP protocols during IPv6 handling
Piotr Sawicki
- [PATCH v1 RFC] Smack: Inform peer that IPv6 traffic has been blocked
Piotr Sawicki
- [PATCH v2 1/2] security/keys/secure_key: Adds the secure key support based on CAAM.
Udit Agarwal
- [PATCH v2 2/2] encrypted_keys: Adds support for secure key-type as master key.
Udit Agarwal
- [PATCH v2 RFC] mack: Check UDP-Lite and DCCP protocols during IPv6 handling
Piotr Sawicki
- [PATCH v2 RFC] Smack: Fix handling of IPv4 traffic received by PF_INET6 sockets
Piotr Sawicki
- [PATCH v2 RFC] Smack: Inform peer that IPv6 traffic has been blocked
Piotr Sawicki
- [PATCH v2] cap_inode_getsecurity: use d_find_any_alias() instead of d_find_alias()
Amir Goldstein
- [PATCH v2] security: Add LSM fixup hooks to set*gid syscalls.
Micah Morton
- [PATCH v2] security: Add LSM fixup hooks to set*gid syscalls.
Casey Schaufler
- [PATCH v2] security: Add LSM fixup hooks to set*gid syscalls.
James Morris
- [PATCH v2] security: Add LSM fixup hooks to set*gid syscalls.
Micah Morton
- [PATCH v2] security: Add LSM fixup hooks to set*gid syscalls.
Randy Dunlap
- [PATCH v3 0/1] shiftfs: uid/gid shifting filesystem
Seth Forshee
- [PATCH v3 RFC] Smack: Check UDP-Lite and DCCP protocols during IPv6 handling
Piotr Sawicki
- [PATCH v3 RFC] Smack: Fix handling of IPv4 traffic received by PF_INET6 sockets
Piotr Sawicki
- [PATCH v3 RFC] Smack: Fix handling of IPv4 traffic received by PF_INET6 sockets
Casey Schaufler
- [PATCH v3 RFC] Smack: Fix handling of IPv4 traffic received by PF_INET6 sockets
Casey Schaufler
- [PATCH v3 RFC] Smack: Inform peer that IPv6 traffic has been blocked
Casey Schaufler
- [PATCH v3 RFC] Smack: Inform peer that IPv6 traffic has been blocked
Casey Schaufler
- [PATCH v3 RFC] Smack: Inform peer that IPv6 traffic has been blocked
Piotr Sawicki
- [PATCH v3] cap_inode_getsecurity: use d_find_any_alias() instead of d_find_alias()
Serge E. Hallyn
- [PATCH v4 RFC] Smack: Check UDP-Lite and DCCP protocols during IPv6 handling
Casey Schaufler
- [PATCH v4 RFC] Smack: Check UDP-Lite and DCCP protocols during IPv6 handling
Casey Schaufler
- [PATCH v4 RFC] Smack: Check UDP-Lite and DCCP protocols during IPv6 handling
Piotr Sawicki
- [PATCH v5 0/8] kexec/firmware: support system wide policy requiring signatures
Mimi Zohar
- [PATCH v5 1/8] security: define new LSM hook named security_kernel_load_data
Mimi Zohar
- [PATCH v5 1/8] security: define new LSM hook named security_kernel_load_data
J Freyensee
- [PATCH v5 1/8] security: define new LSM hook named security_kernel_load_data
Mimi Zohar
- [PATCH v5 2/8] kexec: add call to LSM hook in original kexec_load syscall
Mimi Zohar
- [PATCH v5 2/8] kexec: add call to LSM hook in original kexec_load syscall
Mimi Zohar
- [PATCH v5 3/8] ima: based on policy require signed kexec kernel images
J Freyensee
- [PATCH v5 3/8] ima: based on policy require signed kexec kernel images
Mimi Zohar
- [PATCH v5 3/8] ima: based on policy require signed kexec kernel images
Mimi Zohar
- [PATCH v5 4/8] firmware: add call to LSM hook before firmware sysfs fallback
kbuild test robot
- [PATCH v5 4/8] firmware: add call to LSM hook before firmware sysfs fallback
Mimi Zohar
- [PATCH v5 5/8] ima: based on policy require signed firmware (sysfs fallback)
Mimi Zohar
- [PATCH v5 6/8] ima: add build time policy
Mimi Zohar
- [PATCH v5 7/8] ima: based on policy warn about loading firmware (pre-allocated buffer)
Mimi Zohar
- [PATCH v5 7/8] ima: based on policy warn about loading firmware (pre-allocated buffer)
Ard Biesheuvel
- [PATCH v5 7/8] ima: based on policy warn about loading firmware (pre-allocated buffer)
Mimi Zohar
- [PATCH v5 7/8] ima: based on policy warn about loading firmware (pre-allocated buffer)
Ard Biesheuvel
- [PATCH v5 7/8] ima: based on policy warn about loading firmware (pre-allocated buffer)
Ard Biesheuvel
- [PATCH v5 7/8] ima: based on policy warn about loading firmware (pre-allocated buffer)
Mimi Zohar
- [PATCH v5 7/8] ima: based on policy warn about loading firmware (pre-allocated buffer)
Bjorn Andersson
- [PATCH v5 7/8] ima: based on policy warn about loading firmware (pre-allocated buffer)
Ard Biesheuvel
- [PATCH v5 7/8] ima: based on policy warn about loading firmware (pre-allocated buffer)
Mimi Zohar
- [PATCH v5 7/8] ima: based on policy warn about loading firmware (pre-allocated buffer)
Bjorn Andersson
- [PATCH v5 8/8] module: replace the existing LSM hook in init_module
kbuild test robot
- [PATCH v5 8/8] module: replace the existing LSM hook in init_module
Mimi Zohar
- [PATCH v6 0/8] kexec/firmware: support system wide policy requiring signatures
James Morris
- [PATCH v6 0/8] kexec/firmware: support system wide policy requiring signatures
Mimi Zohar
- [PATCH v6 1/8] security: define new LSM hook named security_kernel_load_data
Mimi Zohar
- [PATCH v6 1/8] security: define new LSM hook named security_kernel_load_data
Kees Cook
- [PATCH v6 2/8] kexec: add call to LSM hook in original kexec_load syscall
Mimi Zohar
- [PATCH v6 2/8] kexec: add call to LSM hook in original kexec_load syscall
Kees Cook
- [PATCH v6 3/8] ima: based on policy require signed kexec kernel images
Kees Cook
- [PATCH v6 3/8] ima: based on policy require signed kexec kernel images
Mimi Zohar
- [PATCH v6 4/8] firmware: add call to LSM hook before firmware sysfs fallback
Kees Cook
- [PATCH v6 4/8] firmware: add call to LSM hook before firmware sysfs fallback
Mimi Zohar
- [PATCH v6 5/8] ima: based on policy require signed firmware (sysfs fallback)
Kees Cook
- [PATCH v6 5/8] ima: based on policy require signed firmware (sysfs fallback)
Mimi Zohar
- [PATCH v6 6/8] ima: add build time policy
Mimi Zohar
- [PATCH v6 6/8] ima: add build time policy
Kees Cook
- [PATCH v6 7/8] module: replace the existing LSM hook in init_module
Kees Cook
- [PATCH v6 7/8] module: replace the existing LSM hook in init_module
Mimi Zohar
- [PATCH v6 7/8] module: replace the existing LSM hook in init_module
Mimi Zohar
- [PATCH v6 8/8] ima: based on policy warn about loading firmware (pre-allocated buffer)
Mimi Zohar
- [PATCH v6 8/8] ima: based on policy warn about loading firmware (pre-allocated buffer)
Kees Cook
- [PATCH] apparmor: remove redundant pointer 'info'
Colin King
- [PATCH] apparmor: remove redundant pointer 'info'
John Johansen
- [PATCH] apparmor: remove redundant pointer 'info'
Colin Ian King
- [PATCH] cap_inode_getsecurity: use d_find_any_alias() instead of d_find_alias()
Amir Goldstein
- [PATCH] ima: Remove unused is_ima_appraise_enabled() function.
Stefan Berger
- [PATCH] ima: Remove unused is_ima_appraise_enabled() function.
Mimi Zohar
- [PATCH] ima: Use tpm_default_chip() and call TPM functions with a tpm_chip
Mimi Zohar
- [PATCH] ima: Use tpm_default_chip() and call TPM functions with a tpm_chip
Jarkko Sakkinen
- [PATCH] ima: Use tpm_default_chip() and call TPM functions with a tpm_chip
Mimi Zohar
- [PATCH] ima: Use tpm_default_chip() and call TPM functions with a tpm_chip
Jarkko Sakkinen
- [PATCH] ima: Use tpm_default_chip() and call TPM functions with a tpm_chip
Stefan Berger
- [PATCH] kbuild: move bin2c back to scripts/ from scripts/basic/
Masahiro Yamada
- [PATCH] keys: trusted: remove redundant variable keyhndl
Colin King
- [PATCH] security: Add LSM fixup hooks to set*gid syscalls.
Kees Cook
- [PATCH] security: Add LSM fixup hooks to set*gid syscalls.
Micah Morton
- [PATCH] security: check for kstrdup() failure in lsm_append()
Eric Biggers
- [PATCH] security: check for kstrdup() failure in lsm_append()
James Morris
- [PATCH] security: CONFIG_HARDENED_USERCOPY does not need to select BUG
Kamal Mostafa
- [PATCH] security: CONFIG_HARDENED_USERCOPY does not need to select BUG
Kees Cook
- [PATCH] security: export security_kernel_load_data function
Arnd Bergmann
- [PATCH] security: export security_kernel_load_data function
James Morris
- [PATCH] security: export security_kernel_load_data to fix firmware_loader build
Randy Dunlap
- [PATCH] security: export security_kernel_load_data to fix firmware_loader build
Mimi Zohar
- [PATCH] security: export security_kernel_load_data to fix firmware_loader build
Randy Dunlap
- [PATCH] tpm: add support for partial reads
Tadeusz Struk
- [PATCH] tpm: add support for partial reads
Tadeusz Struk
- [PATCH] tpm: add support for partial reads
James Bottomley
- [PATCH] tpm: add support for partial reads
Tadeusz Struk
- [PATCH] tpm: add support for partial reads
James Bottomley
- [PATCH] tpm: add support for partial reads
Tadeusz Struk
- [PATCH] tpm: add support for partial reads
James Bottomley
- [PATCH] tpm: add support for partial reads
Tadeusz Struk
- [PATCH] tpm: add support for partial reads
James Bottomley
- [PATCH] tpm: add support for partial reads
Tadeusz Struk
- [PATCH] tpm: add support for partial reads
Jarkko Sakkinen
- [PATCH] tpm: add support for partial reads
Tadeusz Struk
- [PATCH] tpm: add support for partial reads
James Bottomley
- [PATCH] tpm: add support for partial reads
Tadeusz Struk
- [PATCH] tpm: add support for partial reads
Jason Gunthorpe
- [PATCH] tpm: add support for partial reads
Jason Gunthorpe
- [PATCH] tpm: add support for partial reads
Tadeusz Struk
- [PATCH] tpm: add support for partial reads
Jason Gunthorpe
- [PATCH] tpm: add support for partial reads
Tadeusz Struk
- [PATCH] tpm: add support for partial reads
Jason Gunthorpe
- [PULL] Smack: Changes for 4.19
Casey Schaufler
- [PULL] Smack: Changes for 4.19
James Morris
- [RFC PATCH v2] ipv6: make ipv6_renew_options() interrupt/kernel safe
David Miller
- [RFC PATCH v2] ipv6: make ipv6_renew_options() interrupt/kernel safe
Paul Moore
- [RFC PATCH v2] ipv6: make ipv6_renew_options() interrupt/kernel safe
Paul Moore
- [RFC PATCH v3] ipv6: make ipv6_renew_options() interrupt/kernel safe
David Miller
- [RFC PATCH v3] ipv6: make ipv6_renew_options() interrupt/kernel safe
Paul Moore
- [RFC PATCH] ima: arch_policy_rules can be static
kbuild test robot
- [RFC PATCH] ipv6: make ipv6_renew_options() interrupt/kernel safe
Paul Moore
- [RFC PATCH] ipv6: make ipv6_renew_options() interrupt/kernel safe
Paul Moore
- [RFC][PATCH 0/5] Mount, Filesystem and Keyrings notifications
David Howells
- [RFC][PATCH 0/5] Mount, Filesystem and Keyrings notifications
Casey Schaufler
- [RFC][PATCH 0/5] Mount, Filesystem and Keyrings notifications
Ian Kent
- [RFC][PATCH 0/5] Mount, Filesystem and Keyrings notifications
David Howells
- [RFC][PATCH 0/5] Mount, Filesystem and Keyrings notifications
Casey Schaufler
- [RFC][PATCH 0/5] Mount, Filesystem and Keyrings notifications
David Howells
- [RFC][PATCH 0/5] Mount, Filesystem and Keyrings notifications
Ian Kent
- [RFC][PATCH 0/5] Mount, Filesystem and Keyrings notifications
Casey Schaufler
- [RFC][PATCH 0/5] Mount, Filesystem and Keyrings notifications
Ian Kent
- [RFC][PATCH 0/5] Mount, Filesystem and Keyrings notifications
Casey Schaufler
- editing for your photos
Roland
- editing of your photos
Simon Dike
- Fwd: [PATCH] security: Add LSM fixup hooks to set*gid syscalls.
Kees Cook
- How are you doing today? Please read my email and reply me!!
Billy Wilfred
- info!!
Lee Morrow
- JÓ HÍREK
Mrs. Ursula Alice Walton
- PATCH v1 08/22] SELinux: Abstract use of inode security blob
Casey Schaufler
Last message date:
Tue Jul 31 23:23:51 UTC 2018
Archived on: Wed Mar 6 19:45:26 UTC 2019
This archive was generated by
Pipermail 0.09 (Mailman edition).