June 2018 Archives by subject
Starting: Fri Jun 1 08:00:05 UTC 2018
Ending: Fri Jun 29 21:47:15 UTC 2018
Messages: 297
- 4.18-rc1 regression in /proc/self xattr handling
Casey Schaufler
- 4.18-rc1 regression in /proc/self xattr handling
Al Viro
- [-next PATCH] security: use octal not symbolic permissions
Joe Perches
- [-next PATCH] security: use octal not symbolic permissions
Casey Schaufler
- [-next PATCH] security: use octal not symbolic permissions
Tetsuo Handa
- [-next PATCH] security: use octal not symbolic permissions
James Morris
- [-next PATCH] security: use octal not symbolic permissions
Paul Moore
- [-next PATCH] security: use octal not symbolic permissions
John Johansen
- [-next PATCH] security: use octal not symbolic permissions
Mimi Zohar
- [-next PATCH] security: use octal not symbolic permissions
Joe Perches
- [-next PATCH] security: use octal not symbolic permissions
Serge E. Hallyn
- [-next PATCH] security: use octal not symbolic permissions
Paul Moore
- [-next PATCH] security: use octal not symbolic permissions
Joe Perches
- [-next PATCH] security: use octal not symbolic permissions
Paul Moore
- [-next PATCH] security: use octal not symbolic permissions
Joe Perches
- [-next PATCH] security: use octal not symbolic permissions
Paul Moore
- [-next PATCH] security: use octal not symbolic permissions
Casey Schaufler
- [-next PATCH] security: use octal not symbolic permissions
Paul Moore
- [-next PATCH] security: use octal not symbolic permissions
Joe Perches
- [12/24] proc: Add fs_context support to procfs [ver #7]
Andrei Vagin
- [12/24] proc: Add fs_context support to procfs [ver #7]
Andrei Vagin
- [12/24] proc: Add fs_context support to procfs [ver #7]
Andrei Vagin
- [12/24] proc: Add fs_context support to procfs [ver #7]
David Howells
- [12/24] proc: Add fs_context support to procfs [ver #7]
Andrei Vagin
- [GIT PULL] linux-integrity fixes for Linux 4.18 (#2)
Mimi Zohar
- [GIT PULL] linux-integrity fixes for Linux 4.18 (#2)
James Morris
- [GIT PULL] apparmor updates for v4.18
John Johansen
- [GIT PULL] Security subsystem: bugfixes for v4.18-rc
James Morris
- [GIT PULL] Security subsystem: general updates for v4.18
James Morris
- [GIT PULL] Security subsystem: Integrity updates for v4.18
James Morris
- [GIT PULL] Security subsystem: more keys fixes for v4.18-rc3
James Morris
- [GIT PULL] Security subsystem: Smack updates for v4.18
James Morris
- [GIT PULL] Security subsystem: TPM updates for v4.18
James Morris
- [GIT PULL] SELinux fixes for v4.18 (#1)
Paul Moore
- [GIT PULL] SELinux patches for v4.18
Paul Moore
- [GIT PULL] tpmdd 4.17 fixes
Jarkko Sakkinen
- [GIT PULL] tpmdd 4.17 fixes
James Morris
- [GIT PULL] tpmdd 4.17 fixes
Jarkko Sakkinen
- [integrity:next-integrity-queued 20/22] security//integrity/iint.c:225:4: note: in expansion of macro 'pr_err'
kbuild test robot
- [integrity:next-integrity-queued 20/22] security/integrity/iint.c:225:4: warning: format '%ld' expects argument of type 'long int', but argument 2 has type 'int'
kbuild test robot
- [integrity:next-integrity-queued 22/22] security/integrity//evm/evm_crypto.c:99:8: warning: assignment to 'struct crypto_shash *' from 'int' makes pointer from integer without a cast
kbuild test robot
- [integrity:next-integrity-queued 22/22] security/integrity/evm/evm_crypto.c:93: undefined reference to `hash_algo_name'
kbuild test robot
- [integrity:next-integrity-queued 22/22] security/integrity/evm/evm_crypto.c:93: undefined reference to `hash_algo_name'
Mimi Zohar
- [integrity:next-integrity-queued 22/22] security/integrity/evm/evm_crypto.c:93: undefined reference to `hash_algo_name'
Mimi Zohar
- [integrity:next-integrity-queued 22/22] security/integrity/evm/evm_crypto.c:99:10: error: implicit declaration of function 'crypto_alloc_shash'; did you mean 'crypto_alloc_base'?
kbuild test robot
- [PATCH 0/2] Convert trusted keys to find and use the default TPM chip
Stefan Berger
- [PATCH 0/3] KEYS: Miscellaneous fixes
David Howells
- [PATCH 0/3] KEYS: Miscellaneous fixes
James Morris
- [PATCH 00/13 selinux-next] selinux: Cleanup printk logging
Peter Enderborg
- [PATCH 01/13] selinux: Cleanup printk logging in conditional
Peter Enderborg
- [PATCH 01/13] selinux: Cleanup printk logging in conditional
Joe Perches
- [PATCH 01/13] selinux: Cleanup printk logging in conditional
peter enderborg
- [PATCH 01/13] selinux: Cleanup printk logging in conditional
J Freyensee
- [PATCH 01/13] selinux: Cleanup printk logging in conditional
Paul Moore
- [PATCH 02/13] selinux: Cleanup printk logging in ebitmap
Peter Enderborg
- [PATCH 02/13] selinux: Cleanup printk logging in ebitmap
Paul Moore
- [PATCH 03/13] selinux: Cleanup printk logging in policydb
Peter Enderborg
- [PATCH 03/13] selinux: Cleanup printk logging in policydb
Paul Moore
- [PATCH 03/13] selinux: Cleanup printk logging in policydb
Joe Perches
- [PATCH 03/13] selinux: Cleanup printk logging in policydb
Paul Moore
- [PATCH 04/13] selinux: Cleanup printk logging in hooks
Peter Enderborg
- [PATCH 04/13] selinux: Cleanup printk logging in hooks
Paul Moore
- [PATCH 05/13] selinux: Cleanup printk logging in avtab
Peter Enderborg
- [PATCH 05/13] selinux: Cleanup printk logging in avtab
Paul Moore
- [PATCH 06/13] selinux: Cleanup printk logging in services
Peter Enderborg
- [PATCH 06/13] selinux: Cleanup printk logging in services
Paul Moore
- [PATCH 07/13] selinux: Cleanup printk logging in selinuxfs
Peter Enderborg
- [PATCH 07/13] selinux: Cleanup printk logging in selinuxfs
Paul Moore
- [PATCH 08/13] selinux: Cleanup printk logging in netlink
Peter Enderborg
- [PATCH 08/13] selinux: Cleanup printk logging in netlink
Paul Moore
- [PATCH 09/13] selinux: Cleanup printk logging in sidtab
Peter Enderborg
- [PATCH 09/13] selinux: Cleanup printk logging in sidtab
Paul Moore
- [PATCH 1/1] Fix memory leak in kernfs_security_xattr_set and kernfs_security_xattr_set
CHANDAN VN
- [PATCH 1/1] Fix memory leak in kernfs_security_xattr_set and kernfs_security_xattr_set
CHANDAN VN
- [PATCH 1/1] Fix memory leak in kernfs_security_xattr_set and kernfs_security_xattr_set
Casey Schaufler
- [PATCH 1/1] Fix memory leak in kernfs_security_xattr_set and kernfs_security_xattr_set
Casey Schaufler
- [PATCH 1/2] tpm: Implement public tpm_put_chip() to release reference to chip
Stefan Berger
- [PATCH 1/3] selinux: make dentry_init_security() return security module name
Yan, Zheng
- [PATCH 1/3] selinux: make dentry_init_security() return security module name
Yan, Zheng
- [PATCH 1/3] selinux: make dentry_init_security() return security module name
Stephen Smalley
- [PATCH 1/3] selinux: make dentry_init_security() return security module name
Yan, Zheng
- [PATCH 1/3] selinux: make dentry_init_security() return security module name
Casey Schaufler
- [PATCH 1/3] selinux: make dentry_init_security() return security module name
Yan, Zheng
- [PATCH 1/3] X.509: unpack RSA signatureValue field from BIT STRING
David Howells
- [PATCH 10/13] selinux: Cleanup printk logging in netport
Peter Enderborg
- [PATCH 10/13] selinux: Cleanup printk logging in netport
Paul Moore
- [PATCH 11/13] selinux: Cleanup printk logging in netif
Peter Enderborg
- [PATCH 11/13] selinux: Cleanup printk logging in netif
Paul Moore
- [PATCH 12/13] selinux: Cleanup printk logging in avc
Peter Enderborg
- [PATCH 12/13] selinux: Cleanup printk logging in avc
Paul Moore
- [PATCH 13/13] selinux: Cleanup printk logging in netnode
Peter Enderborg
- [PATCH 13/13] selinux: Cleanup printk logging in netnode
Paul Moore
- [PATCH 2/2] KEYS: trusted: Find tpm_chip and use it until module shutdown
Stefan Berger
- [PATCH 2/3] ceph: rename struct ceph_acls_info to ceph_acl_sec_ctx
Yan, Zheng
- [PATCH 2/3] certs/blacklist: fix const confusion
David Howells
- [PATCH 3/3] ceph: xattr security label support
Yan, Zheng
- [PATCH 3/3] dh key: fix rounding up KDF output length
David Howells
- [PATCH v2 0/2] tpm: add support for nonblocking operation
Tadeusz Struk
- [PATCH v2 1/2] tpm: add ptr to the tpm_space struct to file_priv
Tadeusz Struk
- [PATCH v2 13/21] ima: use match_string() helper
Andy Shevchenko
- [PATCH v2 2/2] tpm: add support for nonblocking operation
Tadeusz Struk
- [PATCH v2 2/2] tpm: add support for nonblocking operation
kbuild test robot
- [PATCH v2 2/2] tpm: add support for nonblocking operation
Tadeusz Struk
- [PATCH v2 2/2] tpm: add support for nonblocking operation
Tadeusz Struk
- [PATCH v2] integrity: silence warning when CONFIG_SECURITYFS is not enabled
Mimi Zohar
- [PATCH v2] integrity: silence warning when CONFIG_SECURITYFS is not enabled
Sudeep Holla
- [PATCH v2] integrity: silence warning when CONFIG_SECURITYFS is not enabled
Mimi Zohar
- [PATCH v2] integrity: silence warning when CONFIG_SECURITYFS is not enabled
Matthew Garrett
- [PATCH v2] integrity: silence warning when CONFIG_SECURITYFS is not enabled
Sudeep Holla
- [PATCH V2] selinux: make dentry_init_security() return security xattr suffix
Yan, Zheng
- [PATCH v2][RESEND] X.509: unpack RSA signatureValue field from BIT STRING
Maciej S. Szmigiero
- [PATCH v2][RESEND] X.509: unpack RSA signatureValue field from BIT STRING
Maciej S. Szmigiero
- [PATCH v2][RESEND] X.509: unpack RSA signatureValue field from BIT STRING
Herbert Xu
- [PATCH v2][RESEND] X.509: unpack RSA signatureValue field from BIT STRING
James Morris
- [PATCH v2][RESEND] X.509: unpack RSA signatureValue field from BIT STRING
Herbert Xu
- [PATCH v2][RESEND] X.509: unpack RSA signatureValue field from BIT STRING
James Morris
- [PATCH v3 0/1] shiftfs: uid/gid shifting filesystem
James Bottomley
- [PATCH v3 0/2] tpm: add support for nonblocking operation
Tadeusz Struk
- [PATCH v3 0/2] tpm: add support for nonblocking operation
Jarkko Sakkinen
- [PATCH v3 0/2] tpm: add support for nonblocking operation
Tadeusz Struk
- [PATCH v3 0/2] tpm: add support for nonblocking operation
James Bottomley
- [PATCH v3 0/2] tpm: add support for nonblocking operation
Tadeusz Struk
- [PATCH v3 0/2] tpm: add support for nonblocking operation
James Bottomley
- [PATCH v3 0/2] tpm: add support for nonblocking operation
Tadeusz Struk
- [PATCH v3 0/2] tpm: add support for nonblocking operation
Jarkko Sakkinen
- [PATCH v3 0/2] tpm: add support for nonblocking operation
Tadeusz Struk
- [PATCH V3 0/5] selinux:Significant reduce of preempt_disable holds
peter enderborg
- [PATCH v3 04/27] docs: fix broken references with multiple hints
Mauro Carvalho Chehab
- [PATCH v3 04/27] docs: fix broken references with multiple hints
Steven Rostedt
- [PATCH v3 05/27] docs: Fix some broken references
Mauro Carvalho Chehab
- [PATCH v3 05/27] docs: Fix some broken references
Coly Li
- [PATCH v3 1/1] shiftfs: uid/gid shifting bind mount
James Bottomley
- [PATCH v3 1/2] tpm: add ptr to the tpm_space struct to file_priv
Tadeusz Struk
- [PATCH v3 2/2] tpm: add support for nonblocking operation
Tadeusz Struk
- [PATCH v3 2/2] tpm: add support for nonblocking operation
J Freyensee
- [PATCH v3 2/2] tpm: add support for nonblocking operation
Tadeusz Struk
- [PATCH V3 2/5 selinux-next] selinux: Introduce selinux_ruleset struct
kbuild test robot
- [PATCH V3 2/5 selinux-next] selinux: Introduce selinux_ruleset struct
kbuild test robot
- [PATCH v3 2/5] efi: Add embedded peripheral firmware support
Luis R. Rodriguez
- [PATCH v3 2/5] efi: Add embedded peripheral firmware support
Bjorn Andersson
- [PATCH v3 2/5] efi: Add embedded peripheral firmware support
Bjorn Andersson
- [PATCH v3 2/5] efi: Add embedded peripheral firmware support
Luis R. Rodriguez
- [PATCH v3] integrity: silence warning when CONFIG_SECURITYFS is not enabled
Mimi Zohar
- [PATCH v3] integrity: silence warning when CONFIG_SECURITYFS is not enabled
Sudeep Holla
- [PATCH v4 0/8] kexec/firmware: support system wide policy requiring signatures
Mimi Zohar
- [PATCH v4 0/8] kexec/firmware: support system wide policy requiring signatures
Serge E. Hallyn
- [PATCH v4 0/8] kexec/firmware: support system wide policy requiring signatures
Mimi Zohar
- [PATCH v4 0/8] kexec/firmware: support system wide policy requiring signatures
Kees Cook
- [PATCH v4 0/8] kexec/firmware: support system wide policy requiring signatures
Serge E. Hallyn
- [PATCH v4 0/8] kexec/firmware: support system wide policy requiring signatures
Kees Cook
- [PATCH v4 0/8] kexec/firmware: support system wide policy requiring signatures
Serge E. Hallyn
- [PATCH v4 0/8] kexec/firmware: support system wide policy requiring signatures
Kees Cook
- [PATCH v4 0/8] kexec/firmware: support system wide policy requiring signatures
Mimi Zohar
- [PATCH v4 04/26] docs: fix broken references with multiple hints
Mauro Carvalho Chehab
- [PATCH v4 04/26] docs: fix broken references with multiple hints
James Morris
- [PATCH v4 04/26] docs: fix broken references with multiple hints
Rob Herring
- [PATCH v4 05/26] docs: Fix some broken references
Mauro Carvalho Chehab
- [PATCH v4 1/4] tpm: migrate tpm2_shutdown() to use struct tpm_buf
Jarkko Sakkinen
- [PATCH v4 1/8] security: define new LSM hook named security_kernel_load_data
Serge E. Hallyn
- [PATCH v4 2/8] kexec: add call to LSM hook in original kexec_load syscall
Serge E. Hallyn
- [PATCH v4 4/8] firmware: add call to LSM hook before firmware sysfs fallback
Luis R. Rodriguez
- [PATCH v4 5/8] ima: based on policy require signed firmware (sysfs fallback)
Luis R. Rodriguez
- [PATCH v4 5/8] ima: based on policy require signed firmware (sysfs fallback)
Mimi Zohar
- [PATCH v4 5/8] ima: based on policy require signed firmware (sysfs fallback)
Luis R. Rodriguez
- [PATCH v4 5/8] ima: based on policy require signed firmware (sysfs fallback)
Mimi Zohar
- [PATCH v4a 8/8] module: replace the existing LSM hook in init_module
Paul Moore
- [PATCH v4a 8/8] module: replace the existing LSM hook in init_module
Jessica Yu
- [PATCH v4a 8/8] module: replace the existing LSM hook in init_module
Kees Cook
- [PATCH v4a 8/8] module: replace the existing LSM hook in init_module
Mimi Zohar
- [PATCH v4a 8/8] module: replace the existing LSM hook in init_module
Kees Cook
- [PATCH v4a 8/8] module: replace the existing LSM hook in init_module
Mimi Zohar
- [PATCH v5 0/5] Have IMA find and use a tpm_chip until system shutdown
Stefan Berger
- [PATCH v5 1/5] tpm: rename tpm_chip_find_get() to tpm_find_get_ops()
Jarkko Sakkinen
- [PATCH v5 1/5] tpm: rename tpm_chip_find_get() to tpm_find_get_ops()
Jarkko Sakkinen
- [PATCH v5 1/5] tpm: rename tpm_chip_find_get() to tpm_find_get_ops()
Stefan Berger
- [PATCH v5 2/5] tpm: Implement tpm_default_chip() to find a TPM chip
Jarkko Sakkinen
- [PATCH v5 2/5] tpm: Implement tpm_default_chip() to find a TPM chip
Stefan Berger
- [PATCH v5 3/5] tpm: Convert tpm_find_get_ops() to use tpm_default_chip()
Stefan Berger
- [PATCH v5 3/5] tpm: Convert tpm_find_get_ops() to use tpm_default_chip()
Jarkko Sakkinen
- [PATCH v5 4/5] ima: Use tpm_default_chip() and call TPM functions with a tpm_chip
Jarkko Sakkinen
- [PATCH v5 4/5] ima: Use tpm_default_chip() and call TPM functions with a tpm_chip
Stefan Berger
- [PATCH v5 5/5] ima: Get rid of ima_used_chip and use ima_tpm_chip != NULL instead
Jarkko Sakkinen
- [PATCH v5 5/5] ima: Get rid of ima_used_chip and use ima_tpm_chip != NULL instead
Stefan Berger
- [PATCH v6 0/5] Have IMA find and use a tpm_chip until system shutdown
Stefan Berger
- [PATCH v6 1/5] tpm: rename tpm_chip_find_get() to tpm_find_get_ops()
Stefan Berger
- [PATCH v6 2/5] tpm: Implement tpm_default_chip() to find a TPM chip
Stefan Berger
- [PATCH v6 3/5] tpm: Convert tpm_find_get_ops() to use tpm_default_chip()
Stefan Berger
- [PATCH v6 3/5] tpm: Convert tpm_find_get_ops() to use tpm_default_chip()
Stefan Berger
- [PATCH v6 4/5] ima: Use tpm_default_chip() and call TPM functions with a tpm_chip
Stefan Berger
- [PATCH v6 5/5] ima: Get rid of ima_used_chip and use ima_tpm_chip != NULL instead
Stefan Berger
- [PATCH v6] tpm: separate cmd_ready/go_idle from runtime_pm
Tomas Winkler
- [PATCH v6] tpm: separate cmd_ready/go_idle from runtime_pm
Jarkko Sakkinen
- [PATCH v6] tpm: separate cmd_ready/go_idle from runtime_pm
Winkler, Tomas
- [PATCH v6] tpm: separate cmd_ready/go_idle from runtime_pm
Jarkko Sakkinen
- [PATCH v6] tpm: separate cmd_ready/go_idle from runtime_pm
Winkler, Tomas
- [PATCH v6] tpm: separate cmd_ready/go_idle from runtime_pm
Jarkko Sakkinen
- [PATCH v6] tpm: separate cmd_ready/go_idle from runtime_pm
Winkler, Tomas
- [PATCH v7 0/5] Have IMA find and use a tpm_chip until system shutdown
Jarkko Sakkinen
- [PATCH v7 0/5] Have IMA find and use a tpm_chip until system shutdown
Stefan Berger
- [PATCH v7 0/5] Have IMA find and use a tpm_chip until system shutdown
Mimi Zohar
- [PATCH v7 0/5] Have IMA find and use a tpm_chip until system shutdown
Stefan Berger
- [PATCH v7 1/5] tpm: rename tpm_chip_find_get() to tpm_find_get_ops()
Stefan Berger
- [PATCH v7 2/5] tpm: Implement tpm_default_chip() to find a TPM chip
Jarkko Sakkinen
- [PATCH v7 2/5] tpm: Implement tpm_default_chip() to find a TPM chip
Stefan Berger
- [PATCH v7 3/5] tpm: Convert tpm_find_get_ops() to use tpm_default_chip()
Stefan Berger
- [PATCH v7 3/5] tpm: Convert tpm_find_get_ops() to use tpm_default_chip()
Jarkko Sakkinen
- [PATCH v7 4/5] ima: Use tpm_default_chip() and call TPM functions with a tpm_chip
Stefan Berger
- [PATCH v7 5/5] ima: Get rid of ima_used_chip and use ima_tpm_chip != NULL instead
Stefan Berger
- [PATCH v7] tpm: separate cmd_ready/go_idle from runtime_pm
Tomas Winkler
- [PATCH v7] tpm: separate cmd_ready/go_idle from runtime_pm
Jarkko Sakkinen
- [PATCH v7] tpm: separate cmd_ready/go_idle from runtime_pm
Jarkko Sakkinen
- [PATCH v7] tpm: separate cmd_ready/go_idle from runtime_pm
Winkler, Tomas
- [PATCH v7] tpm: separate cmd_ready/go_idle from runtime_pm
Jarkko Sakkinen
- [PATCH v7] tpm: separate cmd_ready/go_idle from runtime_pm
Winkler, Tomas
- [PATCH v7] tpm: separate cmd_ready/go_idle from runtime_pm
Jarkko Sakkinen
- [PATCH v7] tpm: separate cmd_ready/go_idle from runtime_pm
Winkler, Tomas
- [PATCH v7] tpm: separate cmd_ready/go_idle from runtime_pm
Jarkko Sakkinen
- [PATCH v7] tpm: separate cmd_ready/go_idle from runtime_pm
Winkler, Tomas
- [PATCH v8] tpm: separate cmd_ready/go_idle from runtime_pm
Tomas Winkler
- [PATCH v8] tpm: separate cmd_ready/go_idle from runtime_pm
Jarkko Sakkinen
- [PATCH v8] tpm: separate cmd_ready/go_idle from runtime_pm
Jarkko Sakkinen
- [PATCH] cap_inode_getsecurity: use d_find_any_alias() instead of d_find_alias()
Amir Goldstein
- [PATCH] cap_inode_getsecurity: use d_find_any_alias() instead of d_find_alias()
Serge E. Hallyn
- [PATCH] cap_inode_getsecurity: use d_find_any_alias() instead of d_find_alias()
Amir Goldstein
- [PATCH] cap_inode_getsecurity: use d_find_any_alias() instead of d_find_alias()
Serge E. Hallyn
- [PATCH] cap_inode_getsecurity: use d_find_any_alias() instead of d_find_alias()
Amir Goldstein
- [PATCH] cap_inode_getsecurity: use d_find_any_alias() instead of d_find_alias()
Serge E. Hallyn
- [PATCH] cap_inode_getsecurity: use d_find_any_alias() instead of d_find_alias()
Serge E. Hallyn
- [PATCH] dh key: fix rounding up KDF output length
Eric Biggers
- [PATCH] dh key: fix rounding up KDF output length
Kees Cook
- [PATCH] dh key: fix rounding up KDF output length
James Morris
- [PATCH] dh key: fix rounding up KDF output length
Eric Biggers
- [PATCH] dh key: fix rounding up KDF output length
Tycho Andersen
- [PATCH] dh key: fix rounding up KDF output length
David Howells
- [PATCH] dh key: fix rounding up KDF output length
Eric Biggers
- [PATCH] EVM: unlock on error path in evm_read_xattrs()
Dan Carpenter
- [PATCH] integrity: add error handling for kmem_cache_create
Zhouyang Jia
- [PATCH] integrity: add error handling for kmem_cache_create
Mimi Zohar
- [PATCH] integrity: silence warning when CONFIG_SECURITYFS is not enabled
Sudeep Holla
- [PATCH] integrity: silence warning when CONFIG_SECURITYFS is not enabled
Matthew Garrett
- [PATCH] ipv6: avoid copy_from_user() via ipv6_renew_options_kern()
Paul Moore
- [PATCH] ipv6: avoid copy_from_user() via ipv6_renew_options_kern()
David Miller
- [PATCH] ipv6: avoid copy_from_user() via ipv6_renew_options_kern()
David Miller
- [PATCH] ipv6: avoid copy_from_user() via ipv6_renew_options_kern()
Paul Moore
- [PATCH] ipv6: avoid copy_from_user() via ipv6_renew_options_kern()
Al Viro
- [PATCH] ipv6: avoid copy_from_user() via ipv6_renew_options_kern()
Al Viro
- [PATCH] ipv6: avoid copy_from_user() via ipv6_renew_options_kern()
David Miller
- [PATCH] ipv6: avoid copy_from_user() via ipv6_renew_options_kern()
Paul Moore
- [PATCH] kbuild: move bin2c back to scripts/ from scripts/basic/
Masahiro Yamada
- [PATCH] MAINTAINERS: remove the outdated "LINUX SECURITY MODULE (LSM) FRAMEWORK" entry
Paul Moore
- [PATCH] MAINTAINERS: remove the outdated "LINUX SECURITY MODULE (LSM) FRAMEWORK" entry
James Morris
- [PATCH] proc: prevent a task from writing on its own /proc/*/mem
Steve Kemp
- [PATCH] proc: prevent a task from writing on its own /proc/*/mem
Casey Schaufler
- [PATCH] proc: prevent a task from writing on its own /proc/*/mem
Salvatore Mesoraca
- [PATCH] proc: save 2 atomic ops on write to "/proc/*/attr/*"
Alexey Dobriyan
- [PATCH] proc: save 2 atomic ops on write to "/proc/*/attr/*"
Andy Shevchenko
- [PATCH] security: CONFIG_HARDENED_USERCOPY does not need to select BUG
Kees Cook
- [PATCH] security: CONFIG_HARDENED_USERCOPY does not need to select BUG
Kamal Mostafa
- [PATCH] Smack: Fix memory leak in smack_inode_getsecctx
Casey Schaufler
- [PATCH] Smack: Fix memory leak in smack_inode_getsecctx
Casey Schaufler
- [PATCH] Smack: Fix memory leak in smack_inode_getsecctx
Tejun Heo
- [PATCH] Smack: Fix memory leak in smack_inode_getsecctx
CHANDAN VN
- [PATCH] Smack: Fix memory leak in smack_inode_getsecctx
Casey Schaufler
- [PATCH] Smack: Fix memory leak in smack_inode_getsecctx
CHANDAN VN
- [PATCH] Smack: Mark inode instant in smack_task_to_inode
Casey Schaufler
- [PATCH] tpm: replace TPM_TRANSMIT_RAW with TPM_TRANSMIT_NESTED
Jarkko Sakkinen
- [PATCH] tpm: require to compile as part of the kernel
Jarkko Sakkinen
- [PATCH] tpm: require to compile as part of the kernel
Jason Gunthorpe
- [PATCH] tpm: require to compile as part of the kernel
Jarkko Sakkinen
- [PATCH] tpm: require to compile as part of the kernel
Jarkko Sakkinen
- [PATCH] tpm: require to compile as part of the kernel
Jason Gunthorpe
- [PATCH] tpm: require to compile as part of the kernel
Jason Gunthorpe
- [PATCH] tpm: separate cmd_ready/go_idle from runtime_pm
Winkler, Tomas
- [PATCH] tpm: separate cmd_ready/go_idle from runtime_pm
Jarkko Sakkinen
- [PATCH] tpm: separate cmd_ready/go_idle from runtime_pm
Winkler, Tomas
- [PATCH] tpm: separate cmd_ready/go_idle from runtime_pm
Jarkko Sakkinen
- [PULL] Smack: Changes for 4.18
Casey Schaufler
- [PULL] Smack: Changes for 4.18
James Morris
- [PULL] Smack: Mark inode instant in smack_task_to_inode
Casey Schaufler
- [PULL] Smack: Mark inode instant in smack_task_to_inode
James Morris
- [PULL] Smack: Mark inode instant in smack_task_to_inode
Casey Schaufler
- [RFC PATCH ghak86 V1] audit: eliminate audit_enabled magic number comparison
Richard Guy Briggs
- [RFC PATCH ghak86 V1] audit: eliminate audit_enabled magic number comparison
Richard Guy Briggs
- [RFC PATCH ghak86 V1] audit: eliminate audit_enabled magic number comparison
Paul Moore
- [RFC PATCH ghak86 V1] audit: eliminate audit_enabled magic number comparison
Paul Moore
- [RFC PATCH v4 7/8] ima: based on policy prevent loading firmware (pre-allocated buffer)
Luis R. Rodriguez
- [RFC PATCH v4 7/8] ima: based on policy prevent loading firmware (pre-allocated buffer)
Luis R. Rodriguez
- [RFC PATCH v4 7/8] ima: based on policy prevent loading firmware (pre-allocated buffer)
Kees Cook
- [RFC PATCH v4 7/8] ima: based on policy prevent loading firmware (pre-allocated buffer)
Ard Biesheuvel
- [RFC PATCH v4 7/8] ima: based on policy prevent loading firmware (pre-allocated buffer)
Luis R. Rodriguez
- Do Qualcomm drivers use DMA buffers for request_firmware_into_buf()?
Bjorn Andersson
- Do Qualcomm drivers use DMA buffers for request_firmware_into_buf()?
Vlastimil Babka
- Do Qualcomm drivers use DMA buffers for request_firmware_into_buf()?
Luis R. Rodriguez
- I will definately enlighten you more as soon as I hear from you
Raymonde DUPOUY
- RESEND [RFC] KEYS: add a new type "mktme" to kernel key services
David Howells
- RESEND [RFC] KEYS: add a new type "mktme" to kernel key services
Alison Schofield
- Security subsystem tree sync to v4.18-rc2
James Morris
Last message date:
Fri Jun 29 21:47:15 UTC 2018
Archived on: Fri Jun 29 21:47:49 UTC 2018
This archive was generated by
Pipermail 0.09 (Mailman edition).