October 2018 Archives by subject
      
      Starting: Mon Oct  1 00:25:21 UTC 2018
         Ending: Wed Oct 31 23:26:20 UTC 2018
         Messages: 678
     
- [bug report] apparmor: Parse secmark policy
 
Dan Carpenter
- [bug report] apparmor: Parse secmark policy
 
Matthew Garrett
- [GIT PULL] linux-integrity patches for Linux 4.20
 
Mimi Zohar
- [GIT PULL] linux-integrity patches for Linux 4.20
 
James Morris
- [GIT PULL] loadpin updates for security-next
 
Kees Cook
- [GIT PULL] loadpin updates for security-next
 
James Morris
- [GIT PULL] security: general updates for 4.20
 
James Morris
- [GIT PULL] security: general updates for 4.20
 
Linus Torvalds
- [GIT PULL] security: integrity subsystem updates for 4.20
 
James Morris
- [GIT PULL] security: integrity subsystem updates for 4.20
 
Linus Torvalds
- [GIT PULL] security: keys updates for v4.20
 
James Morris
- [GIT PULL] security: LoadPin changes for v4.20
 
James Morris
- [GIT PULL] security: LoadPin changes for v4.20
 
Linus Torvalds
- [GIT PULL] security: Smack updates for v4.20
 
James Morris
- [GIT PULL] security: Smack updates for v4.20
 
Linus Torvalds
- [GIT PULL] security: TPM updates for v4.20
 
James Morris
- [GIT PULL] security: TPM updates for v4.20
 
Linus Torvalds
- [GIT PULL] SELinux fixes for v4.19 (#1)
 
Paul Moore
- [GIT PULL] SELinux fixes for v4.19 (#1)
 
Greg KH
- [GIT PULL] SELinux patches for v4.20
 
Paul Moore
- [GIT PULL] SELinux patches for v4.20
 
Linus Torvalds
- [GIT PULL] tpmdd updates for Linux 4.20
 
Jarkko Sakkinen
- [GIT PULL] tpmdd updates for Linux 4.20
 
James Morris
- [PATCH  v2] tpm: add support for partial reads
 
Tadeusz Struk
- [PATCH -next] KEYS: trusted: remove set but not used variable ''
 
YueHaibing
- [PATCH 0/3] namei: implement various scoping AT_* flags
 
James Morris
- [PATCH 00/22] KEYS: Support TPM-wrapped key and crypto ops [ver	#2]
 
James Morris
- [PATCH 00/22] KEYS: Support TPM-wrapped key and crypto ops [ver #2]
 
David Howells
- [PATCH 00/34] VFS: Introduce filesystem context [ver #12]
 
Eric W. Biederman
- [PATCH 01/17] prmem: linker section for static write rare
 
Igor Stoppa
- [PATCH 01/22] KEYS: Provide key type operations for asymmetric key	ops [ver #2]
 
David Howells
- [PATCH 02/17] prmem: write rare for static allocation
 
Igor Stoppa
- [PATCH 02/17] prmem: write rare for static allocation
 
Dave Hansen
- [PATCH 02/17] prmem: write rare for static allocation
 
Peter Zijlstra
- [PATCH 02/17] prmem: write rare for static allocation
 
Igor Stoppa
- [PATCH 02/17] prmem: write rare for static allocation
 
Igor Stoppa
- [PATCH 02/22] KEYS: Provide keyctls to drive the new key type ops	for asymmetric keys [ver #2]
 
David Howells
- [PATCH 03/17] prmem: vmalloc support for dynamic allocation
 
Igor Stoppa
- [PATCH 03/17] prmem: vmalloc support for dynamic allocation
 
Dave Hansen
- [PATCH 03/17] prmem: vmalloc support for dynamic allocation
 
Igor Stoppa
- [PATCH 03/22] KEYS: Provide missing asymmetric key subops for	new key type ops
 
James Morris
- [PATCH 03/22] KEYS: Provide missing asymmetric key subops for new	key type ops
 
David Howells
- [PATCH 03/22] KEYS: Provide missing asymmetric key subops for new	key type ops [ver #2]
 
David Howells
- [PATCH 04/17] prmem: dynamic allocation
 
Igor Stoppa
- [PATCH 04/22] KEYS: Make the X.509 and PKCS7 parsers supply the	sig encoding type
 
James Morris
- [PATCH 04/22] KEYS: Make the X.509 and PKCS7 parsers supply the	sig encoding type
 
David Howells
- [PATCH 04/22] KEYS: Make the X.509 and PKCS7 parsers supply the sig	encoding type [ver #2]
 
David Howells
- [PATCH 05/17] prmem: shorthands for write rare on common types
 
Igor Stoppa
- [PATCH 05/17] prmem: shorthands for write rare on common types
 
Dave Hansen
- [PATCH 05/17] prmem: shorthands for write rare on common types
 
Igor Stoppa
- [PATCH 05/22] KEYS: Provide software public key query function
 
James Morris
- [PATCH 05/22] KEYS: Provide software public key query function
 
David Howells
- [PATCH 05/22] KEYS: Provide software public key query function
 
James Morris
- [PATCH 05/22] KEYS: Provide software public key query function
 
James Morris
- [PATCH 05/22] KEYS: Provide software public key query function
 
David Howells
- [PATCH 05/22] KEYS: Provide software public key query function [ver	#2]
 
David Howells
- [PATCH 06/17] prmem: test cases for memory protection
 
Igor Stoppa
- [PATCH 06/17] prmem: test cases for memory protection
 
Randy Dunlap
- [PATCH 06/17] prmem: test cases for memory protection
 
Igor Stoppa
- [PATCH 06/17] prmem: test cases for memory protection
 
Dave Hansen
- [PATCH 06/17] prmem: test cases for memory protection
 
Igor Stoppa
- [PATCH 06/22] KEYS: Allow the public_key struct to hold a private	key [ver #2]
 
David Howells
- [PATCH 07/17] prmem: lkdtm tests for memory protection
 
Igor Stoppa
- [PATCH 07/22] KEYS: Implement encrypt,	decrypt and sign for software asymmetric key [ver #2]
 
David Howells
- [PATCH 08/17] prmem: struct page: track vmap_area
 
Igor Stoppa
- [PATCH 08/17] prmem: struct page: track vmap_area
 
Matthew Wilcox
- [PATCH 08/17] prmem: struct page: track vmap_area
 
Igor Stoppa
- [PATCH 08/17] prmem: struct page: track vmap_area
 
Matthew Wilcox
- [PATCH 08/17] prmem: struct page: track vmap_area
 
Igor Stoppa
- [PATCH 08/22] KEYS: Implement PKCS#8 RSA Private Key parser [ver #2]
 
David Howells
- [PATCH 09/17] prmem: hardened usercopy
 
Igor Stoppa
- [PATCH 09/17] prmem: hardened usercopy
 
Chris von Recklinghausen
- [PATCH 09/17] prmem: hardened usercopy
 
Igor Stoppa
- [PATCH 09/22] crypto: rsa-pkcs1pad: Allow hash to be optional [ver #2]
 
David Howells
- [PATCH 10/17] prmem: documentation
 
Igor Stoppa
- [PATCH 10/17] prmem: documentation
 
Randy Dunlap
- [PATCH 10/17] prmem: documentation
 
Igor Stoppa
- [PATCH 10/17] prmem: documentation
 
Mike Rapoport
- [PATCH 10/17] prmem: documentation
 
Peter Zijlstra
- [PATCH 10/17] prmem: documentation
 
Matthew Wilcox
- [PATCH 10/17] prmem: documentation
 
Kees Cook
- [PATCH 10/17] prmem: documentation
 
Markus Heiser
- [PATCH 10/17] prmem: documentation
 
Jonathan Corbet
- [PATCH 10/17] prmem: documentation
 
Peter Zijlstra
- [PATCH 10/17] prmem: documentation
 
Igor Stoppa
- [PATCH 10/17] prmem: documentation
 
Igor Stoppa
- [PATCH 10/17] prmem: documentation
 
Igor Stoppa
- [PATCH 10/17] prmem: documentation
 
Igor Stoppa
- [PATCH 10/17] prmem: documentation
 
Igor Stoppa
- [PATCH 10/17] prmem: documentation
 
Igor Stoppa
- [PATCH 10/17] prmem: documentation
 
Peter Zijlstra
- [PATCH 10/17] prmem: documentation
 
Kees Cook
- [PATCH 10/17] prmem: documentation
 
Andy Lutomirski
- [PATCH 10/17] prmem: documentation
 
Matthew Wilcox
- [PATCH 10/17] prmem: documentation
 
Dave Hansen
- [PATCH 10/17] prmem: documentation
 
Tycho Andersen
- [PATCH 10/17] prmem: documentation
 
Andy Lutomirski
- [PATCH 10/17] prmem: documentation
 
Kees Cook
- [PATCH 10/17] prmem: documentation
 
Matthew Wilcox
- [PATCH 10/17] prmem: documentation
 
Igor Stoppa
- [PATCH 10/17] prmem: documentation
 
Andy Lutomirski
- [PATCH 10/17] prmem: documentation
 
Kees Cook
- [PATCH 10/17] prmem: documentation
 
Matthew Wilcox
- [PATCH 10/17] prmem: documentation
 
Igor Stoppa
- [PATCH 10/17] prmem: documentation
 
Matthew Wilcox
- [PATCH 10/17] prmem: documentation
 
Igor Stoppa
- [PATCH 10/17] prmem: documentation
 
Igor Stoppa
- [PATCH 10/17] prmem: documentation
 
Matthew Wilcox
- [PATCH 10/17] prmem: documentation
 
Igor Stoppa
- [PATCH 10/17] prmem: documentation
 
Nadav Amit
- [PATCH 10/17] prmem: documentation
 
Andy Lutomirski
- [PATCH 10/17] prmem: documentation
 
Peter Zijlstra
- [PATCH 10/17] prmem: documentation
 
Igor Stoppa
- [PATCH 10/17] prmem: documentation
 
Peter Zijlstra
- [PATCH 10/17] prmem: documentation
 
Igor Stoppa
- [PATCH 10/17] prmem: documentation
 
Peter Zijlstra
- [PATCH 10/17] prmem: documentation
 
Peter Zijlstra
- [PATCH 10/17] prmem: documentation
 
Peter Zijlstra
- [PATCH 10/17] prmem: documentation
 
Peter Zijlstra
- [PATCH 10/17] prmem: documentation
 
Peter Zijlstra
- [PATCH 10/17] prmem: documentation
 
Matthew Wilcox
- [PATCH 10/17] prmem: documentation
 
Igor Stoppa
- [PATCH 10/17] prmem: documentation
 
Andy Lutomirski
- [PATCH 10/17] prmem: documentation
 
Andy Lutomirski
- [PATCH 10/17] prmem: documentation
 
Andy Lutomirski
- [PATCH 10/17] prmem: documentation
 
Peter Zijlstra
- [PATCH 10/17] prmem: documentation
 
Andy Lutomirski
- [PATCH 10/17] prmem: documentation
 
Igor Stoppa
- [PATCH 10/17] prmem: documentation
 
Andy Lutomirski
- [PATCH 10/17] prmem: documentation
 
Igor Stoppa
- [PATCH 10/22] KEYS: asym_tpm: add skeleton for asym_tpm [ver #2]
 
David Howells
- [PATCH 11/17] prmem: llist: use designated initializer
 
Igor Stoppa
- [PATCH 11/22] KEYS: asym_tpm: extract key size & public key [ver #2]
 
David Howells
- [PATCH 12/17] prmem: linked list: set alignment
 
Igor Stoppa
- [PATCH 12/17] prmem: linked list: set alignment
 
Peter Zijlstra
- [PATCH 12/22] KEYS: Add parser for TPM-based keys [ver #2]
 
David Howells
- [PATCH 13/17] prmem: linked list: disable layout randomization
 
Igor Stoppa
- [PATCH 13/17] prmem: linked list: disable layout randomization
 
Alexey Dobriyan
- [PATCH 13/17] prmem: linked list: disable layout randomization
 
Peter Zijlstra
- [PATCH 13/17] prmem: linked list: disable layout randomization
 
Matthew Wilcox
- [PATCH 13/17] prmem: linked list: disable layout randomization
 
Igor Stoppa
- [PATCH 13/17] prmem: linked list: disable layout randomization
 
Peter Zijlstra
- [PATCH 13/22] KEYS: asym_tpm: Implement pkey_query [ver #2]
 
David Howells
- [PATCH 14/17] prmem: llist, hlist, both plain and rcu
 
Igor Stoppa
- [PATCH 14/17] prmem: llist, hlist, both plain and rcu
 
Mathieu Desnoyers
- [PATCH 14/17] prmem: llist, hlist, both plain and rcu
 
Igor Stoppa
- [PATCH 14/17] prmem: llist, hlist, both plain and rcu
 
Tycho Andersen
- [PATCH 14/17] prmem: llist, hlist, both plain and rcu
 
Igor Stoppa
- [PATCH 14/17] prmem: llist, hlist, both plain and rcu
 
Tycho Andersen
- [PATCH 14/17] prmem: llist, hlist, both plain and rcu
 
Peter Zijlstra
- [PATCH 14/17] prmem: llist, hlist, both plain and rcu
 
Steven Rostedt
- [PATCH 14/17] prmem: llist, hlist, both plain and rcu
 
Igor Stoppa
- [PATCH 14/22] KEYS: asym_tpm: Implement encryption operation [ver #2]
 
David Howells
- [PATCH 15/16] apparmor: Replace spin_is_locked() with lockdep
 
Lance Roy
- [PATCH 15/16] apparmor: Replace spin_is_locked() with lockdep
 
John Johansen
- [PATCH 15/17] prmem: test cases for prlist and prhlist
 
Igor Stoppa
- [PATCH 15/22] KEYS: trusted: Expose common functionality [ver #2]
 
David Howells
- [PATCH 16/17] prmem: pratomic-long
 
Igor Stoppa
- [PATCH 16/17] prmem: pratomic-long
 
Peter Zijlstra
- [PATCH 16/17] prmem: pratomic-long
 
Igor Stoppa
- [PATCH 16/17] prmem: pratomic-long
 
Peter Zijlstra
- [PATCH 16/17] prmem: pratomic-long
 
Will Deacon
- [PATCH 16/17] prmem: pratomic-long
 
Peter Zijlstra
- [PATCH 16/22] KEYS: Move trusted.h to include/keys [ver #2]
 
David Howells
- [PATCH 17/17] prmem: ima: turn the measurements list write rare
 
Igor Stoppa
- [PATCH 17/22] KEYS: asym_tpm: Add loadkey2 and flushspecific [ver #2]
 
David Howells
- [PATCH 18/22] KEYS: asym_tpm: Implement tpm_unbind [ver #2]
 
David Howells
- [PATCH 19/22] KEYS: asym_tpm: Implement the decrypt operation [ver #2]
 
David Howells
- [PATCH 20/22] KEYS: asym_tpm: Implement signature verification [ver	#2]
 
David Howells
- [PATCH 21/19] LSM: Cleanup and fixes from Tetsuo Handa
 
Kees Cook
- [PATCH 21/19] LSM: Cleanup and fixes from Tetsuo Handa
 
Kees Cook
- [PATCH 21/22] KEYS: asym_tpm: Implement tpm_sign [ver #2]
 
David Howells
- [PATCH 22/22] KEYS: asym_tpm: Add support for the sign operation	[ver #2]
 
David Howells
- [PATCH security-next v3 01/29] LSM: Correctly announce start of	LSM initialization
 
James Morris
- [PATCH security-next v3 01/29] LSM: Correctly announce start of	LSM initialization
 
John Johansen
- [PATCH security-next v3 02/29] vmlinux.lds.h: Avoid copy/paste	of security_init section
 
James Morris
- [PATCH security-next v3 02/29] vmlinux.lds.h: Avoid copy/paste of	security_init section
 
John Johansen
- [PATCH security-next v3 03/29] LSM: Rename .security_initcall	section to .lsm_info
 
James Morris
- [PATCH security-next v3 03/29] LSM: Rename .security_initcall	section to .lsm_info
 
John Johansen
- [PATCH security-next v3 04/29] LSM: Remove initcall tracing
 
Kees Cook
- [PATCH security-next v3 04/29] LSM: Remove initcall tracing
 
John Johansen
- [PATCH security-next v3 04/29] LSM: Remove initcall tracing
 
Steven Rostedt
- [PATCH security-next v3 04/29] LSM: Remove initcall tracing
 
Kees Cook
- [PATCH security-next v3 05/29] LSM: Convert from initcall to	struct lsm_info
 
James Morris
- [PATCH security-next v3 05/29] LSM: Convert from initcall to	struct lsm_info
 
John Johansen
- [PATCH security-next v3 06/29] vmlinux.lds.h: Move LSM_TABLE into	INIT_DATA
 
John Johansen
- [PATCH security-next v3 07/29] LSM: Convert security_initcall()	into DEFINE_LSM()
 
John Johansen
- [PATCH security-next v3 08/29] LSM: Record LSM name in struct	lsm_info
 
John Johansen
- [PATCH security-next v3 09/29] LSM: Provide init debugging	infrastructure
 
John Johansen
- [PATCH security-next v3 10/29] LSM: Don't ignore initialization	failures
 
John Johansen
- [PATCH security-next v3 11/29] LSM: Introduce	LSM_FLAG_LEGACY_MAJOR
 
John Johansen
- [PATCH security-next v3 12/29] LSM: Provide separate ordered	initialization
 
John Johansen
- [PATCH security-next v3 12/29] LSM: Provide separate ordered	initialization
 
Kees Cook
- [PATCH security-next v3 13/29] LoadPin: Rename "enable" to	"enforce"
 
John Johansen
- [PATCH security-next v3 14/29] LSM: Plumb visibility into	optional "enabled" state
 
John Johansen
- [PATCH security-next v3 14/29] LSM: Plumb visibility into	optional "enabled" state
 
Kees Cook
- [PATCH security-next v3 14/29] LSM: Plumb visibility into	optional "enabled" state
 
John Johansen
- [PATCH security-next v3 14/29] LSM: Plumb visibility into	optional "enabled" state
 
Kees Cook
- [PATCH security-next v3 14/29] LSM: Plumb visibility into	optional "enabled" state
 
John Johansen
- [PATCH security-next v3 14/29] LSM: Plumb visibility into optional	"enabled" state
 
James Morris
- [PATCH security-next v3 15/29] LSM: Lift LSM selection out of	individual LSMs
 
John Johansen
- [PATCH security-next v3 16/29] LSM: Prepare for arbitrary LSM	enabling
 
John Johansen
- [PATCH security-next v3 17/29] LSM: Introduce CONFIG_LSM_ENABLE
 
John Johansen
- [PATCH security-next v3 18/29] LSM: Introduce lsm.enable= and	lsm.disable=
 
John Johansen
- [PATCH security-next v3 18/29] LSM: Introduce lsm.enable= and	lsm.disable=
 
Kees Cook
- [PATCH security-next v3 18/29] LSM: Introduce lsm.enable= and	lsm.disable=
 
John Johansen
- [PATCH security-next v3 18/29] LSM: Introduce lsm.enable= and	lsm.disable=
 
Kees Cook
- [PATCH security-next v3 18/29] LSM: Introduce lsm.enable= and	lsm.disable=
 
Kees Cook
- [PATCH security-next v3 18/29] LSM: Introduce lsm.enable= and	lsm.disable=
 
John Johansen
- [PATCH security-next v3 18/29] LSM: Introduce lsm.enable= and	lsm.disable=
 
Kees Cook
- [PATCH security-next v3 18/29] LSM: Introduce lsm.enable= and	lsm.disable=
 
John Johansen
- [PATCH security-next v3 19/29] LSM: Prepare for reorganizing	"security=" logic
 
John Johansen
- [PATCH security-next v4 00/32] LSM: Explict LSM ordering
 
Kees Cook
- [PATCH security-next v4 01/32] LSM: Correctly announce start of LSM	initialization
 
Kees Cook
- [PATCH security-next v4 02/32] vmlinux.lds.h: Avoid copy/paste of	security_init section
 
Kees Cook
- [PATCH security-next v4 03/32] LSM: Rename .security_initcall section	to .lsm_info
 
Kees Cook
- [PATCH security-next v4 04/32] LSM: Remove initcall tracing
 
Kees Cook
- [PATCH security-next v4 04/32] LSM: Remove initcall tracing
 
James Morris
- [PATCH security-next v4 05/32] LSM: Convert from initcall to struct	lsm_info
 
Kees Cook
- [PATCH security-next v4 06/32] vmlinux.lds.h: Move LSM_TABLE	into INIT_DATA
 
James Morris
- [PATCH security-next v4 06/32] vmlinux.lds.h: Move LSM_TABLE into	INIT_DATA
 
Kees Cook
- [PATCH security-next v4 07/32] LSM: Convert security_initcall()	into DEFINE_LSM()
 
James Morris
- [PATCH security-next v4 07/32] LSM: Convert security_initcall() into	DEFINE_LSM()
 
Kees Cook
- [PATCH security-next v4 08/32] LSM: Record LSM name in struct lsm_info
 
Kees Cook
- [PATCH security-next v4 09/32] LSM: Provide init debugging	infrastructure
 
Kees Cook
- [PATCH security-next v4 09/32] LSM: Provide init debugging	infrastructure
 
James Morris
- [PATCH security-next v4 10/32] LSM: Don't ignore initialization	failures
 
Kees Cook
- [PATCH security-next v4 10/32] LSM: Don't ignore initialization	failures
 
James Morris
- [PATCH security-next v4 10/32] LSM: Don't ignore initialization	failures
 
Kees Cook
- [PATCH security-next v4 11/32] LSM: Introduce LSM_FLAG_LEGACY_MAJOR
 
Kees Cook
- [PATCH security-next v4 12/32] LSM: Provide separate ordered	initialization
 
Kees Cook
- [PATCH security-next v4 13/32] LoadPin: Rename "enable" to	"enforce"
 
Randy Dunlap
- [PATCH security-next v4 13/32] LoadPin: Rename "enable" to	"enforce"
 
Kees Cook
- [PATCH security-next v4 13/32] LoadPin: Rename "enable" to "enforce"
 
Kees Cook
- [PATCH security-next v4 14/32] LSM: Plumb visibility into optional	"enabled" state
 
Kees Cook
- [PATCH security-next v4 15/32] LSM: Lift LSM selection out of	individual LSMs
 
Kees Cook
- [PATCH security-next v4 16/32] LSM: Prepare for arbitrary LSM enabling
 
Kees Cook
- [PATCH security-next v4 17/32] LSM: Introduce CONFIG_LSM_ENABLE
 
Kees Cook
- [PATCH security-next v4 18/32] LSM: Introduce lsm.enable= and	lsm.disable=
 
Kees Cook
- [PATCH security-next v4 19/32] LSM: Prepare for reorganizing	"security=" logic
 
Kees Cook
- [PATCH security-next v4 20/32] LSM: Refactor "security=" in terms of	enable/disable
 
Kees Cook
- [PATCH security-next v4 21/32] LSM: Finalize centralized LSM	enabling logic
 
Randy Dunlap
- [PATCH security-next v4 21/32] LSM: Finalize centralized LSM	enabling logic
 
Kees Cook
- [PATCH security-next v4 21/32] LSM: Finalize centralized LSM enabling	logic
 
Kees Cook
- [PATCH security-next v4 22/32] apparmor: Remove boot parameter
 
Kees Cook
- [PATCH security-next v4 23/32] selinux: Remove boot parameter
 
Kees Cook
- [PATCH security-next v4 23/32] selinux: Remove boot parameter
 
Paul Moore
- [PATCH security-next v4 23/32] selinux: Remove boot parameter
 
Stephen Smalley
- [PATCH security-next v4 23/32] selinux: Remove boot parameter
 
Kees Cook
- [PATCH security-next v4 23/32] selinux: Remove boot parameter
 
Stephen Smalley
- [PATCH security-next v4 23/32] selinux: Remove boot parameter
 
Jordan Glover
- [PATCH security-next v4 23/32] selinux: Remove boot parameter
 
Kees Cook
- [PATCH security-next v4 23/32] selinux: Remove boot parameter
 
Kees Cook
- [PATCH security-next v4 23/32] selinux: Remove boot parameter
 
Stephen Smalley
- [PATCH security-next v4 23/32] selinux: Remove boot parameter
 
John Johansen
- [PATCH security-next v4 23/32] selinux: Remove boot parameter
 
Kees Cook
- [PATCH security-next v4 23/32] selinux: Remove boot parameter
 
Kees Cook
- [PATCH security-next v4 23/32] selinux: Remove boot parameter
 
John Johansen
- [PATCH security-next v4 23/32] selinux: Remove boot parameter
 
Kees Cook
- [PATCH security-next v4 23/32] selinux: Remove boot parameter
 
John Johansen
- [PATCH security-next v4 23/32] selinux: Remove boot parameter
 
James Morris
- [PATCH security-next v4 23/32] selinux: Remove boot parameter
 
Kees Cook
- [PATCH security-next v4 23/32] selinux: Remove boot parameter
 
John Johansen
- [PATCH security-next v4 23/32] selinux: Remove boot parameter
 
John Johansen
- [PATCH security-next v4 23/32] selinux: Remove boot parameter
 
Kees Cook
- [PATCH security-next v4 23/32] selinux: Remove boot parameter
 
John Johansen
- [PATCH security-next v4 23/32] selinux: Remove boot parameter
 
Kees Cook
- [PATCH security-next v4 23/32] selinux: Remove boot parameter
 
John Johansen
- [PATCH security-next v4 23/32] selinux: Remove boot parameter
 
Stephen Smalley
- [PATCH security-next v4 23/32] selinux: Remove boot parameter
 
Kees Cook
- [PATCH security-next v4 23/32] selinux: Remove boot parameter
 
James Morris
- [PATCH security-next v4 23/32] selinux: Remove boot parameter
 
Kees Cook
- [PATCH security-next v4 23/32] selinux: Remove boot parameter
 
James Morris
- [PATCH security-next v4 23/32] selinux: Remove boot parameter
 
Stephen Smalley
- [PATCH security-next v4 23/32] selinux: Remove boot parameter
 
Kees Cook
- [PATCH security-next v4 23/32] selinux: Remove boot parameter
 
Kees Cook
- [PATCH security-next v4 23/32] selinux: Remove boot parameter
 
James Morris
- [PATCH security-next v4 23/32] selinux: Remove boot parameter
 
James Morris
- [PATCH security-next v4 23/32] selinux: Remove boot parameter
 
Kees Cook
- [PATCH security-next v4 23/32] selinux: Remove boot parameter
 
Randy Dunlap
- [PATCH security-next v4 23/32] selinux: Remove boot parameter
 
Kees Cook
- [PATCH security-next v4 23/32] selinux: Remove boot parameter
 
John Johansen
- [PATCH security-next v4 23/32] selinux: Remove boot parameter
 
John Johansen
- [PATCH security-next v4 23/32] selinux: Remove boot parameter
 
John Johansen
- [PATCH security-next v4 23/32] selinux: Remove boot parameter
 
John Johansen
- [PATCH security-next v4 23/32] selinux: Remove boot parameter
 
Kees Cook
- [PATCH security-next v4 23/32] selinux: Remove boot parameter
 
Kees Cook
- [PATCH security-next v4 23/32] selinux: Remove boot parameter
 
Jordan Glover
- [PATCH security-next v4 23/32] selinux: Remove boot parameter
 
Kees Cook
- [PATCH security-next v4 23/32] selinux: Remove boot parameter
 
James Morris
- [PATCH security-next v4 23/32] selinux: Remove boot parameter
 
Kees Cook
- [PATCH security-next v4 23/32] selinux: Remove boot parameter
 
James Morris
- [PATCH security-next v4 23/32] selinux: Remove boot parameter
 
James Morris
- [PATCH security-next v4 23/32] selinux: Remove boot parameter
 
Kees Cook
- [PATCH security-next v4 23/32] selinux: Remove boot parameter
 
Paul Moore
- [PATCH security-next v4 24/32] LSM: Build ordered list of ordered	LSMs for init
 
Kees Cook
- [PATCH security-next v4 25/32] LSM: Introduce CONFIG_LSM_ORDER
 
Kees Cook
- [PATCH security-next v4 26/32] LSM: Introduce "lsm.order=" for	boottime ordering
 
Kees Cook
- [PATCH security-next v4 27/32] LoadPin: Initialize as ordered LSM
 
Kees Cook
- [PATCH security-next v4 28/32] Yama: Initialize as ordered LSM
 
Kees Cook
- [PATCH security-next v4 29/32] LSM: Introduce enum lsm_order
 
Kees Cook
- [PATCH security-next v4 30/32] capability: Initialize as	LSM_ORDER_FIRST
 
Kees Cook
- [PATCH security-next v4 31/32] LSM: Separate idea of "major" LSM from	"exclusive" LSM
 
Kees Cook
- [PATCH security-next v4 32/32] LSM: Add all exclusive LSMs to ordered	initialization
 
Kees Cook
- [PATCH security-next v5 00/30] LSM: Explict ordering
 
Kees Cook
- [PATCH security-next v5 00/30] LSM: Explict ordering
 
James Morris
- [PATCH security-next v5 00/30] LSM: Explict ordering
 
Kees Cook
- [PATCH security-next v5 00/30] LSM: Explict ordering
 
James Morris
- [PATCH security-next v5 00/30] LSM: Explict ordering
 
Kees Cook
- [PATCH security-next v5 00/30] LSM: Explict ordering
 
Jordan Glover
- [PATCH security-next v5 00/30] LSM: Explict ordering
 
Kees Cook
- [PATCH security-next v5 00/30] LSM: Explict ordering
 
John Johansen
- [PATCH security-next v5 00/30] LSM: Explict ordering
 
Jordan Glover
- [PATCH security-next v5 00/30] LSM: Explict ordering
 
Jordan Glover
- [PATCH security-next v5 00/30] LSM: Explict ordering
 
John Johansen
- [PATCH security-next v5 00/30] LSM: Explict ordering
 
John Johansen
- [PATCH security-next v5 00/30] LSM: Explict ordering
 
Jordan Glover
- [PATCH security-next v5 00/30] LSM: Explict ordering
 
Jordan Glover
- [PATCH security-next v5 00/30] LSM: Explict ordering
 
John Johansen
- [PATCH security-next v5 00/30] LSM: Explict ordering
 
John Johansen
- [PATCH security-next v5 00/30] LSM: Explict ordering
 
Kees Cook
- [PATCH security-next v5 00/30] LSM: Explict ordering
 
Casey Schaufler
- [PATCH security-next v5 00/30] LSM: Explict ordering
 
Kees Cook
- [PATCH security-next v5 00/30] LSM: Explict ordering
 
Casey Schaufler
- [PATCH security-next v5 00/30] LSM: Explict ordering
 
Casey Schaufler
- [PATCH security-next v5 00/30] LSM: Explict ordering
 
Kees Cook
- [PATCH security-next v5 01/30] LSM: Correctly announce start of LSM	initialization
 
Kees Cook
- [PATCH security-next v5 02/30] vmlinux.lds.h: Avoid copy/paste of	security_init section
 
Kees Cook
- [PATCH security-next v5 03/30] LSM: Rename .security_initcall section	to .lsm_info
 
Kees Cook
- [PATCH security-next v5 04/30] LSM: Remove initcall tracing
 
Kees Cook
- [PATCH security-next v5 05/30] LSM: Convert from initcall to struct	lsm_info
 
Kees Cook
- [PATCH security-next v5 06/30] vmlinux.lds.h: Move LSM_TABLE into	INIT_DATA
 
Kees Cook
- [PATCH security-next v5 07/30] LSM: Convert security_initcall() into	DEFINE_LSM()
 
Kees Cook
- [PATCH security-next v5 08/30] LSM: Record LSM name in struct lsm_info
 
Kees Cook
- [PATCH security-next v5 09/30] LSM: Provide init debugging	infrastructure
 
Kees Cook
- [PATCH security-next v5 10/30] LSM: Don't ignore initialization	failures
 
Kees Cook
- [PATCH security-next v5 11/30] LSM: Introduce LSM_FLAG_LEGACY_MAJOR
 
Kees Cook
- [PATCH security-next v5 12/30] LSM: Provide separate ordered	initialization
 
Kees Cook
- [PATCH security-next v5 13/30] LoadPin: Rename boot param "enabled"	to "enforce"
 
Kees Cook
- [PATCH security-next v5 14/30] LSM: Plumb visibility into optional	"enabled" state
 
Kees Cook
- [PATCH security-next v5 15/30] LSM: Lift LSM selection out of	individual LSMs
 
Kees Cook
- [PATCH security-next v5 16/30] LSM: Build ordered list of LSMs to	initialize
 
Kees Cook
- [PATCH security-next v5 17/30] LSM: Introduce CONFIG_LSM
 
Kees Cook
- [PATCH security-next v5 18/30] LSM: Introduce "lsm=" for boottime LSM	selection
 
Kees Cook
- [PATCH security-next v5 19/30] LSM: Tie enabling logic to presence in	ordered list
 
Kees Cook
- [PATCH security-next v5 20/30] LSM: Prepare for reorganizing	"security=" logic
 
Kees Cook
- [PATCH security-next v5 21/30] LSM: Refactor "security=" in terms of	enable/disable
 
Kees Cook
- [PATCH security-next v5 22/30] LSM: Separate idea of "major" LSM from	"exclusive" LSM
 
Kees Cook
- [PATCH security-next v5 23/30] apparmor: Remove	SECURITY_APPARMOR_BOOTPARAM_VALUE
 
Kees Cook
- [PATCH security-next v5 24/30] selinux: Remove	SECURITY_SELINUX_BOOTPARAM_VALUE
 
Kees Cook
- [PATCH security-next v5 25/30] LSM: Add all exclusive LSMs to ordered	initialization
 
Kees Cook
- [PATCH security-next v5 26/30] LSM: Split LSM preparation from	initialization
 
Kees Cook
- [PATCH security-next v5 27/30] LoadPin: Initialize as ordered LSM
 
Kees Cook
- [PATCH security-next v5 28/30] Yama: Initialize as ordered LSM
 
Kees Cook
- [PATCH security-next v5 29/30] LSM: Introduce enum lsm_order
 
Kees Cook
- [PATCH security-next v5 30/30] capability: Initialize as	LSM_ORDER_FIRST
 
Kees Cook
- [PATCH v1 21/22] LSM: Multiple concurrent major security modules
 
Piotr Sawicki
- [PATCH v2 -next] KEYS: trusted: remove set but not used	variable 'keyhndl'
 
James Bottomley
- [PATCH v2 -next] KEYS: trusted: remove set but not used variable	'keyhndl'
 
YueHaibing
- [PATCH v2 -next] KEYS: trusted: remove set but not used variable	'keyhndl'
 
YueHaibing
- [PATCH v2 1/2] security/keys/secure_key: Adds the secure key	support based on CAAM.
 
David Gstir
- [PATCH v2] [PATCH] KEYS: trusted: fix -Wvarags warning
 
ndesaulniers at google.com
- [PATCH v2] [PATCH] KEYS: trusted: fix -Wvarags warning
 
Nathan Chancellor
- [PATCH v2] [PATCH] KEYS: trusted: fix -Wvarags warning
 
Jarkko Sakkinen
- [PATCH v2] [PATCH] KEYS: trusted: fix -Wvarags warning
 
Nick Desaulniers
- [PATCH v2] tpm: fix kdoc for tpm2_flush_context_cmd()
 
Tomas Winkler
- [PATCH v2] tpm: fix kdoc for tpm2_flush_context_cmd()
 
Jarkko Sakkinen
- [PATCH v2] tpm: use tpm_buf in tpm_transmit_cmd() as the IO parameter
 
Jarkko Sakkinen
- [PATCH v3 0/5] tpm: retrieve digest size of unknown algorithms from	TPM
 
Roberto Sassu
- [PATCH v3 1/5] tpm: change the end marker of the active_banks	array to zero
 
Jarkko Sakkinen
- [PATCH v3 1/5] tpm: change the end marker of the active_banks	array to zero
 
Mimi Zohar
- [PATCH v3 1/5] tpm: change the end marker of the active_banks array	to zero
 
Roberto Sassu
- [PATCH v3 2/5] tpm: rename and export tpm2_digest and tpm2_algorithms
 
Roberto Sassu
- [PATCH v3 3/5] tpm: modify tpm_pcr_read() definition to pass a TPM	hash algorithm
 
Roberto Sassu
- [PATCH v3 4/5] tpm: retrieve digest size of unknown algorithms with	PCR read
 
Roberto Sassu
- [PATCH v3 5/5] tpm: ensure that output of PCR read contains the	correct digest size
 
Roberto Sassu
- [PATCH v3 5/5] tpm: ensure that output of PCR read contains the	correct digest size
 
Jarkko Sakkinen
- [PATCH v3 5/5] tpm: ensure that output of PCR read contains the	correct digest size
 
Roberto Sassu
- [PATCH v3] tpm: fix kdoc for tpm2_flush_context_cmd()
 
Tomas Winkler
- [PATCH v3] tpm: fix kdoc for tpm2_flush_context_cmd()
 
Jarkko Sakkinen
- [PATCH v4 0/7] add integrity and security to TPM2 transactions
 
James Bottomley
- [PATCH v4 0/7] add integrity and security to TPM2 transactions
 
Ken Goldman
- [PATCH v4 0/7] add integrity and security to TPM2 transactions
 
James Bottomley
- [PATCH v4 0/7] add integrity and security to TPM2 transactions
 
Ken Goldman
- [PATCH v4 0/7] add integrity and security to TPM2 transactions
 
James Bottomley
- [PATCH v4 0/7] add integrity and security to TPM2 transactions
 
Jarkko Sakkinen
- [PATCH v4 0/7] add integrity and security to TPM2 transactions
 
Jarkko Sakkinen
- [PATCH v4 0/7] add integrity and security to TPM2 transactions
 
Jarkko Sakkinen
- [PATCH v4 0/7] add integrity and security to TPM2 transactions
 
James Bottomley
- [PATCH v4 0/7] add integrity and security to TPM2 transactions
 
James Bottomley
- [PATCH v4 0/7] add integrity and security to TPM2 transactions
 
James Bottomley
- [PATCH v4 0/7] add integrity and security to TPM2 transactions
 
Jarkko Sakkinen
- [PATCH v4 0/7] add integrity and security to TPM2 transactions
 
Jarkko Sakkinen
- [PATCH v4 00/19] LSM: Module stacking for SARA and Landlock
 
James Morris
- [PATCH v4 1/7] tpm-buf: create new functions for handling TPM	buffers
 
Jarkko Sakkinen
- [PATCH v4 1/7] tpm-buf: create new functions for handling TPM	buffers
 
Jarkko Sakkinen
- [PATCH v4 1/7] tpm-buf: create new functions for handling TPM buffers
 
James Bottomley
- [Patch v4 13/18] security: Update security level of a process	when modifying its dumpability
 
Schaufler, Casey
- [Patch v4 13/18] security: Update security level of a process	when modifying its dumpability
 
Tim Chen
- [Patch v4 13/18] security: Update security level of a process	when modifying its dumpability
 
Schaufler, Casey
- [PATCH v4 14/19] LSM: Infrastructure management of the inode	security
 
James Morris
- [PATCH v4 14/19] LSM: Infrastructure management of the inode	security
 
Casey Schaufler
- [PATCH v4 2/7] tpm2-sessions: Add full HMAC and encrypt/decrypt	session handling
 
James Bottomley
- [PATCH v4 2/7] tpm2-sessions: Add full HMAC and encrypt/decrypt	session handling
 
Ard Biesheuvel
- [PATCH v4 2/7] tpm2-sessions: Add full HMAC and encrypt/decrypt	session handling
 
James Bottomley
- [PATCH v4 2/7] tpm2-sessions: Add full HMAC and encrypt/decrypt	session handling
 
Ard Biesheuvel
- [PATCH v4 2/7] tpm2-sessions: Add full HMAC and encrypt/decrypt	session handling
 
Jarkko Sakkinen
- [PATCH v4 2/7] tpm2-sessions: Add full HMAC and encrypt/decrypt	session handling
 
Jarkko Sakkinen
- [PATCH v4 2/7] tpm2-sessions: Add full HMAC and encrypt/decrypt	session handling
 
James Bottomley
- [PATCH v4 2/7] tpm2-sessions: Add full HMAC and encrypt/decrypt	session handling
 
Jarkko Sakkinen
- [PATCH v4 20/19] LSM: Correct file blob free empty blob check
 
Kees Cook
- [PATCH v4 3/7] tpm2: add hmac checks to tpm2_pcr_extend()
 
James Bottomley
- [PATCH v4 4/7] tpm2: add session encryption protection to	tpm2_get_random()
 
James Bottomley
- [PATCH v4 5/6] ima: add support for external setting of	ima_appraise
 
Nayna Jain
- [PATCH v4 5/7] trusted keys: Add session encryption protection	to the seal/unseal path
 
Jarkko Sakkinen
- [PATCH v4 5/7] trusted keys: Add session encryption protection to	the seal/unseal path
 
James Bottomley
- [PATCH v4 6/7] tpm: add the null key name as a tpm2 sysfs variable
 
James Bottomley
- [PATCH v4 7/7] tpm2-sessions: NOT FOR COMMITTING add sessions testing
 
James Bottomley
- [PATCH v5 0/6] Add support for architecture specific IMA policies
 
Mimi Zohar
- [PATCH v5 0/6] Add support for architecture specific IMA policies 
 
Nayna Jain
- [PATCH v5 00/21] tpm: separate tpm 1.x and tpm 2.x commands
 
Jarkko Sakkinen
- [PATCH v5 01/21] tpm2: add new tpm2 commands according to TCG 1.36
 
Jarkko Sakkinen
- [PATCH v5 01/21] tpm2: add new tpm2 commands according to TCG 1.36
 
Jarkko Sakkinen
- [PATCH v5 03/21] tpm: factor out tpm 1.x duration calculation to	tpm1-cmd.c
 
Nayna Jain
- [PATCH v5 05/21] tpm: factor out tpm_get_timeouts()
 
Nayna Jain
- [PATCH v5 05/21] tpm: factor out tpm_get_timeouts()
 
Winkler, Tomas
- [PATCH v5 06/21] tpm: move tpm1_pcr_extend to tpm1-cmd.c
 
Jarkko Sakkinen
- [PATCH v5 06/21] tpm: move tpm1_pcr_extend to tpm1-cmd.c
 
Nayna Jain
- [PATCH v5 06/21] tpm: move tpm1_pcr_extend to tpm1-cmd.c
 
Jarkko Sakkinen
- [PATCH v5 06/21] tpm: move tpm1_pcr_extend to tpm1-cmd.c
 
Nayna Jain
- [PATCH v5 06/21] tpm: move tpm1_pcr_extend to tpm1-cmd.c
 
Jarkko Sakkinen
- [PATCH v5 08/21] tpm: factor out tpm1_get_random into tpm1-cmd.c
 
Jarkko Sakkinen
- [PATCH v5 1/5] x86/ima: define arch_ima_get_secureboot
 
Nayna Jain
- [PATCH v5 10/21] tpm: factor out tpm 1.x pm suspend flow into	tpm1-cmd.c
 
Jarkko Sakkinen
- [PATCH v5 11/21] tpm: factor out tpm_startup function
 
Jarkko Sakkinen
- [PATCH v5 12/21] tpm: move pcr extend code to tpm2-cmd.c
 
Jarkko Sakkinen
- [PATCH v5 12/21] tpm: move pcr extend code to tpm2-cmd.c
 
Winkler, Tomas
- [PATCH v5 12/21] tpm: move pcr extend code to tpm2-cmd.c
 
Jarkko Sakkinen
- [PATCH v5 12/21] tpm: move pcr extend code to tpm2-cmd.c
 
Winkler, Tomas
- [PATCH v5 12/21] tpm: move pcr extend code to tpm2-cmd.c
 
Jarkko Sakkinen
- [PATCH v5 12/21] tpm: move pcr extend code to tpm2-cmd.c
 
Jarkko Sakkinen
- [PATCH v5 12/21] tpm: move pcr extend code to tpm2-cmd.c
 
Winkler, Tomas
- [PATCH v5 12/21] tpm: move pcr extend code to tpm2-cmd.c
 
Roberto Sassu
- [PATCH v5 12/21] tpm: move pcr extend code to tpm2-cmd.c
 
Winkler, Tomas
- [PATCH v5 12/21] tpm: move pcr extend code to tpm2-cmd.c
 
Roberto Sassu
- [PATCH v5 12/21] tpm: move pcr extend code to tpm2-cmd.c
 
Jarkko Sakkinen
- [PATCH v5 13/21] tpm: add tpm_auto_startup() into tpm-interface.c
 
Jarkko Sakkinen
- [PATCH v5 2/5] ima: prevent kexec_load syscall based on runtime	secureboot flag
 
Nayna Jain
- [PATCH v5 2/5] Smack: Prepare for PTRACE_MODE_SCHED
 
Jiri Kosina
- [PATCH v5 2/5] Smack: Prepare for PTRACE_MODE_SCHED
 
Jann Horn
- [PATCH v5 2/5] Smack: Prepare for PTRACE_MODE_SCHED
 
Jiri Kosina
- [PATCH v5 20/21] tpm1: reimplement tpm1_continue_selftest() using	tpm_buf
 
Nayna Jain
- [PATCH v5 21/21] tpm: use u32 instead of int for PCR index
 
Jarkko Sakkinen
- [PATCH v5 3/5] ima: refactor ima_init_policy()
 
Nayna Jain
- [PATCH v5 4/5] ima: add support for arch specific policies
 
Nayna Jain
- [PATCH v5 5/5] x86/ima: define arch_get_ima_policy() for x86
 
Nayna Jain
- [PATCH v6 0/6] Add support for architecture specific IMA policies 
 
Nayna Jain
- [PATCH v6 00/21] tpm: separate tpm 1.x and tpm 2.x commands
 
Tomas Winkler
- [PATCH v6 01/20] tpm2: add new tpm2 commands according to TCG 1.36
 
Tomas Winkler
- [PATCH v6 02/20] tpm: sort objects in the Makefile
 
Tomas Winkler
- [PATCH v6 03/20] tpm: factor out tpm 1.x duration calculation	to tpm1-cmd.c
 
Winkler, Tomas
- [PATCH v6 03/20] tpm: factor out tpm 1.x duration calculation	to tpm1-cmd.c
 
Winkler, Tomas
- [PATCH v6 03/20] tpm: factor out tpm 1.x duration calculation to	tpm1-cmd.c
 
Tomas Winkler
- [PATCH v6 03/20] tpm: factor out tpm 1.x duration calculation to	tpm1-cmd.c
 
Nayna Jain
- [PATCH v6 03/20] tpm: factor out tpm 1.x duration calculation to	tpm1-cmd.c
 
Nayna Jain
- [PATCH v6 04/20] tpm: add tpm_calc_ordinal_duration() wrapper
 
Tomas Winkler
- [PATCH v6 05/20] tpm: factor out tpm_get_timeouts()
 
Tomas Winkler
- [PATCH v6 06/20] tpm: move tpm1_pcr_extend to tpm1-cmd.c
 
Tomas Winkler
- [PATCH v6 07/20] tpm: move tpm_getcap to tpm1-cmd.c
 
Tomas Winkler
- [PATCH v6 08/20] tpm: factor out tpm1_get_random into tpm1-cmd.c
 
Tomas Winkler
- [PATCH v6 09/20] tpm: move tpm 1.x selftest code from tpm-interface.c	tpm1-cmd.c
 
Tomas Winkler
- [PATCH v6 1/5] x86/ima: define arch_ima_get_secureboot
 
Nayna Jain
- [PATCH v6 10/20] tpm: factor out tpm 1.x pm suspend flow into	tpm1-cmd.c
 
Tomas Winkler
- [PATCH v6 11/20] tpm: factor out tpm_startup function
 
Tomas Winkler
- [PATCH v6 12/20] tpm: add tpm_auto_startup() into tpm-interface.c
 
Tomas Winkler
- [PATCH v6 13/20] tpm: tpm-interface.c drop unused macros
 
Tomas Winkler
- [PATCH v6 14/20] tpm: tpm-space.c remove unneeded semicolon
 
Tomas Winkler
- [PATCH v6 15/20] tpm: tpm1: rewrite tpm1_get_random() using tpm_buf	structure
 
Tomas Winkler
- [PATCH v6 16/20] tpm1: implement tpm1_pcr_read_dev() using tpm_buf	structure
 
Tomas Winkler
- [PATCH v6 17/20] tmp1: rename tpm1_pcr_read_dev to tpm1_pcr_read()
 
Tomas Winkler
- [PATCH v6 18/20] tpm1: reimplement SAVESTATE using tpm_buf
 
Tomas Winkler
- [PATCH v6 19/20] tpm1: reimplement tpm1_continue_selftest() using	tpm_buf
 
Tomas Winkler
- [PATCH v6 2/5] ima: prevent kexec_load syscall based on runtime	secureboot flag
 
Nayna Jain
- [PATCH v6 20/20] tpm: use u32 instead of int for PCR index
 
Tomas Winkler
- [PATCH v6 3/5] ima: refactor ima_init_policy()
 
Nayna Jain
- [PATCH v6 4/5] ima: add support for arch specific policies
 
Nayna Jain
- [PATCH v6 5/5] x86/ima: define arch_get_ima_policy() for x86
 
Nayna Jain
- [PATCH v7 00/21] tpm: separate tpm 1.x and tpm 2.x commands
 
Tomas Winkler
- [PATCH v7 00/21] tpm: separate tpm 1.x and tpm 2.x commands
 
Jarkko Sakkinen
- [PATCH v7 00/21] tpm: separate tpm 1.x and tpm 2.x commands
 
Winkler, Tomas
- [PATCH v7 00/21] tpm: separate tpm 1.x and tpm 2.x commands
 
Jarkko Sakkinen
- [PATCH v7 00/21] tpm: separate tpm 1.x and tpm 2.x commands
 
Winkler, Tomas
- [PATCH v7 01/21] tpm: tpm_i2c_nuvoton: use correct command	duration for TPM 2.x
 
Jarkko Sakkinen
- [PATCH v7 01/21] tpm: tpm_i2c_nuvoton: use correct command duration	for TPM 2.x
 
Tomas Winkler
- [PATCH v7 02/21] tpm2: add new tpm2 commands according to TCG 1.36
 
Tomas Winkler
- [PATCH v7 02/21] tpm2: add new tpm2 commands according to TCG 1.36
 
Jarkko Sakkinen
- [PATCH v7 03/21] tpm: sort objects in the Makefile
 
Tomas Winkler
- [PATCH v7 04/21] tpm: factor out tpm 1.x duration calculation	to tpm1-cmd.c
 
Jarkko Sakkinen
- [PATCH v7 04/21] tpm: factor out tpm 1.x duration calculation to	tpm1-cmd.c
 
Tomas Winkler
- [PATCH v7 05/21] tpm: add tpm_calc_ordinal_duration() wrapper
 
Tomas Winkler
- [PATCH v7 06/21] tpm: factor out tpm_get_timeouts()
 
Tomas Winkler
- [PATCH v7 07/21] tpm: move tpm1_pcr_extend to tpm1-cmd.c
 
Tomas Winkler
- [PATCH v7 08/21] tpm: move tpm_getcap to tpm1-cmd.c
 
Tomas Winkler
- [PATCH v7 09/21] tpm: factor out tpm1_get_random into tpm1-cmd.c
 
Tomas Winkler
- [PATCH v7 09/21] tpm: factor out tpm1_get_random into tpm1-cmd.c
 
Jarkko Sakkinen
- [PATCH v7 09/21] tpm: factor out tpm1_get_random into tpm1-cmd.c
 
Jarkko Sakkinen
- [PATCH v7 10/21] tpm: move tpm 1.x selftest code from tpm-interface.c	tpm1-cmd.c
 
Tomas Winkler
- [PATCH v7 11/21] tpm: factor out tpm 1.x pm suspend flow into	tpm1-cmd.c
 
Tomas Winkler
- [PATCH v7 11/21] tpm: factor out tpm 1.x pm suspend flow into	tpm1-cmd.c
 
Jarkko Sakkinen
- [PATCH v7 11/21] tpm: factor out tpm 1.x pm suspend flow into	tpm1-cmd.c
 
Jarkko Sakkinen
- [PATCH v7 12/21] tpm: factor out tpm_startup function
 
Tomas Winkler
- [PATCH v7 12/21] tpm: factor out tpm_startup function
 
Jarkko Sakkinen
- [PATCH v7 13/21] tpm: add tpm_auto_startup() into tpm-interface.c
 
Tomas Winkler
- [PATCH v7 13/21] tpm: add tpm_auto_startup() into tpm-interface.c
 
Jarkko Sakkinen
- [PATCH v7 14/21] tpm: tpm-interface.c drop unused macros
 
Tomas Winkler
- [PATCH v7 15/21] tpm: tpm-space.c remove unneeded semicolon
 
Tomas Winkler
- [PATCH v7 16/21] tpm: tpm1: rewrite tpm1_get_random() using tpm_buf	structure
 
Tomas Winkler
- [PATCH v7 17/21] tpm1: implement tpm1_pcr_read_dev() using tpm_buf	structure
 
Tomas Winkler
- [PATCH v7 18/21] tpm1: rename tpm1_pcr_read_dev to tpm1_pcr_read()
 
Tomas Winkler
- [PATCH v7 18/21] tpm1: rename tpm1_pcr_read_dev to tpm1_pcr_read()
 
Jarkko Sakkinen
- [PATCH v7 19/21] tpm1: reimplement SAVESTATE using tpm_buf
 
Tomas Winkler
- [PATCH v7 20/21] tpm1: reimplement tpm1_continue_selftest() using	tpm_buf
 
Tomas Winkler
- [PATCH v7 21/21] tpm: use u32 instead of int for PCR index
 
Tomas Winkler
- [PATCH v7 21/21] tpm: use u32 instead of int for PCR index
 
Jarkko Sakkinen
- [PATCH v7 21/21] tpm: use u32 instead of int for PCR index
 
Jarkko Sakkinen
- [PATCH v7 21/21] tpm: use u32 instead of int for PCR index
 
Winkler, Tomas
- [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
 
Jann Horn
- [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
 
Christian Brauner
- [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
 
Jann Horn
- [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
 
Christian Brauner
- [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
 
Jann Horn
- [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
 
Christian Brauner
- [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
 
Jann Horn
- [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
 
Christian Brauner
- [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
 
Jann Horn
- [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
 
Christian Brauner
- [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
 
Jann Horn
- [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
 
Christian Brauner
- [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
 
Christian Brauner
- [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
 
Jann Horn
- [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
 
Christian Brauner
- [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
 
Paul Moore
- [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
 
Jann Horn
- [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
 
Christian Brauner
- [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
 
Tycho Andersen
- [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
 
Christian Brauner
- [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
 
Tycho Andersen
- [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
 
Christian Brauner
- [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
 
Paul Moore
- [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
 
Jann Horn
- [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
 
Paul Moore
- [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
 
Andy Lutomirski
- [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
 
Tycho Andersen
- [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
 
Jann Horn
- [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
 
Christian Brauner
- [PATCH] apparmor: add #ifdef checks for secmark filtering
 
Arnd Bergmann
- [PATCH] apparmor: add #ifdef checks for secmark filtering
 
John Johansen
- [PATCH] apparmor: clean an indentation issue, remove extraneous	space
 
John Johansen
- [PATCH] apparmor: clean an indentation issue, remove extraneous space
 
Colin King
- [PATCH] apparmor: Fix uninitialized value in aa_split_fqname
 
Kees Cook
- [PATCH] KEYS: trusted: fix -Wvarags warning
 
ndesaulniers at google.com
- [PATCH] KEYS: trusted: fix -Wvarags warning
 
Nathan Chancellor
- [PATCH] KEYS: trusted: fix -Wvarags warning
 
Denis Kenzior
- [PATCH] KEYS: trusted: fix -Wvarags warning
 
James Bottomley
- [PATCH] KEYS: trusted: fix -Wvarags warning
 
Denis Kenzior
- [PATCH] KEYS: trusted: fix -Wvarags warning
 
James Bottomley
- [PATCH] KEYS: trusted: fix -Wvarags warning
 
James Bottomley
- [PATCH] KEYS: trusted: fix -Wvarags warning
 
Denis Kenzior
- [PATCH] KEYS: trusted: fix -Wvarags warning
 
James Bottomley
- [PATCH] KEYS: trusted: fix -Wvarags warning
 
Denis Kenzior
- [PATCH] KEYS: trusted: fix -Wvarags warning
 
James Bottomley
- [PATCH] KEYS: trusted: fix -Wvarags warning
 
Nick Desaulniers
- [PATCH] KEYS: trusted: fix -Wvarags warning
 
Nick Desaulniers
- [PATCH] KEYS: trusted: fix -Wvarags warning
 
Nathan Chancellor
- [PATCH] KEYS: trusted: fix -Wvarags warning
 
Nick Desaulniers
- [PATCH] KEYS: trusted: fix -Wvarags warning
 
Nick Desaulniers
- [PATCH] KEYS: trusted: fix -Wvarags warning
 
Denis Kenzior
- [PATCH] KEYS: trusted: fix -Wvarags warning
 
Nick Desaulniers
- [PATCH] KEYS: trusted: fix -Wvarags warning
 
Denis Kenzior
- [PATCH] KEYS: trusted: fix -Wvarags warning
 
Nick Desaulniers
- [PATCH] KEYS: trusted: fix -Wvarags warning
 
David Laight
- [PATCH] KEYS: trusted: fix -Wvarags warning
 
Nick Desaulniers
- [PATCH] KEYS: trusted: fix -Wvarags warning
 
David Laight
- [PATCH] LSM: add SafeSetID module that gates setid calls
 
mortonm at chromium.org
- [PATCH] LSM: add SafeSetID module that gates setid calls
 
Serge E. Hallyn
- [PATCH] LSM: add SafeSetID module that gates setid calls
 
Kees Cook
- [PATCH] LSM: add SafeSetID module that gates setid calls
 
Casey Schaufler
- [PATCH] security: fix LSM description location
 
Randy Dunlap
- [PATCH] security: fix LSM description location
 
Kees Cook
- [PATCH] security: fix LSM description location
 
James Morris
- [PATCH] tpm: clean up tpm_try_transmit() error handling flow
 
Jarkko Sakkinen
- [PATCH] tpm: fix kdoc for tpm2_flush_context_cmd()
 
Tomas Winkler
- [PATCH] tpm: fix kdoc for tpm2_flush_context_cmd()
 
Jarkko Sakkinen
- [PATCH] tpm: tpm_i2c_nuvoton: use correct command duration for	TPM 2.x
 
Nayna Jain
- [PATCH] tpm: tpm_i2c_nuvoton: use correct command duration for	TPM 2.x
 
Winkler, Tomas
- [PATCH] tpm: tpm_i2c_nuvoton: use correct command duration for	TPM 2.x
 
Jarkko Sakkinen
- [PATCH] tpm: tpm_i2c_nuvoton: use correct command duration for TPM 2.x
 
Tomas Winkler
- [PATCH] tpm: tpm_ibmvtpm: fix kdoc warnings
 
Tomas Winkler
- [PATCH] tpm: tpm_ibmvtpm: fix kdoc warnings
 
Jarkko Sakkinen
- [PATCH] tpm: tpm_try_transmit() ignore value of go_to_idle()
 
Tomas Winkler
- [PATCH] tpm: tpm_try_transmit() ignore value of go_to_idle()
 
Jason Gunthorpe
- [PATCH] tpm: tpm_try_transmit() ignore value of go_to_idle()
 
Winkler, Tomas
- [PATCH] tpm: tpm_try_transmit() ignore value of go_to_idle()
 
Jarkko Sakkinen
- [PATCH] tpm: tpm_try_transmit() ignore value of go_to_idle()
 
Winkler, Tomas
- [PATCH] tpm: tpm_try_transmit() refactor error flow.
 
Tomas Winkler
- [PATCH] tpm: tpm_try_transmit() refactor error flow.
 
Jarkko Sakkinen
- [PATCH] tpm: tpm_try_transmit() refactor error flow.
 
Winkler, Tomas
- [PATCH] tpm: tpm_try_transmit() refactor error flow.
 
Jarkko Sakkinen
- [PATCH] tpm: tpm_try_transmit() refactor error flow.
 
Winkler, Tomas
- [PATCH] tpm: tpm_try_transmit() refactor error flow.
 
Jarkko Sakkinen
- [PATCH] tpm: tpm_try_transmit() refactor error flow.
 
Winkler, Tomas
- [PATCH] tpm: tpm_try_transmit() refactor error flow.
 
Jarkko Sakkinen
- [PATCH] tpm: tpm_try_transmit() refactor error flow.
 
Winkler, Tomas
- [PATCH] tpm: use tpm_buf in tpm_transmit_cmd() as the IO parameter
 
Jarkko Sakkinen
- [RFC 00/12] Multi-Key Total Memory Encryption API (MKTME)
 
Marta Rybczynska
- [RFC PATCH] smack: fix access permissions for keyring
 
Zoran Markovic
- [RFC v1 PATCH 00/17] prmem: protected memory
 
Igor Stoppa
- [RFC v1 PATCH 00/17] prmem: protected memory
 
Dave Chinner
- [RFC v1 PATCH 00/17] prmem: protected memory
 
Igor Stoppa
- [RFC v4 0/2] WhiteEgret LSM module
 
Shinya Takumi
- [RFC v4 0/2] WhiteEgret LSM module
 
Steve Kemp
- [RFC v4 0/2] WhiteEgret LSM module
 
Tetsuo Handa
- [RFC v4 1/2] WhiteEgret: Add WhiteEgret core functions.
 
Shinya Takumi
- [RFC v4 2/2] WhiteEgret: Add an example of user application.
 
Shinya Takumi
- [RFC] proposal for resolving the cred_guard_mutex deadlock
 
Jann Horn
- enquiry 10-10-2018
 
Daniel Murray
- For your attention
 
FRANK CHRISTOPHER
- general protection fault in rb_erase
 
Theodore Y. Ts'o
- I NEED YOUR HELP URGENTLY!!!
 
GEN  KELVIN
- INFO: task hung in process_measurement
 
syzbot
- KASAN: use-after-free Read in task_is_descendant
 
syzbot
- KASAN: use-after-free Read in task_is_descendant
 
Tetsuo Handa
- KASAN: use-after-free Read in task_is_descendant
 
Oleg Nesterov
- KASAN: use-after-free Read in task_is_descendant
 
Tetsuo Handa
- KASAN: use-after-free Read in task_is_descendant
 
Oleg Nesterov
- KASAN: use-after-free Read in task_is_descendant
 
Tetsuo Handa
- KASAN: use-after-free Read in task_is_descendant
 
Kees Cook
- KASAN: use-after-free Read in task_is_descendant
 
Oleg Nesterov
- KASAN: use-after-free Read in task_is_descendant
 
Kees Cook
- KASAN: use-after-free Read in task_is_descendant
 
Tetsuo Handa
- KASAN: use-after-free Read in task_is_descendant
 
Oleg Nesterov
- KASAN: use-after-free Read in task_is_descendant
 
Oleg Nesterov
- KASAN: use-after-free Read in task_is_descendant
 
Oleg Nesterov
- KASAN: use-after-free Read in task_is_descendant
 
Oleg Nesterov
- KASAN: use-after-free Read in task_is_descendant
 
Tetsuo Handa
- KASAN: use-after-free Read in task_is_descendant
 
Oleg Nesterov
- KASAN: use-after-free Read in task_is_descendant
 
Oleg Nesterov
- KASAN: use-after-free Read in task_is_descendant
 
Tetsuo Handa
- KASAN: use-after-free Read in task_is_descendant
 
Oleg Nesterov
- KASAN: use-after-free Read in task_is_descendant
 
Tetsuo Handa
- KASAN: use-after-free Read in task_is_descendant
 
Oleg Nesterov
- KASAN: use-after-free Read in task_is_descendant
 
Tetsuo Handa
- KASAN: use-after-free Read in task_is_descendant
 
Oleg Nesterov
- KASAN: use-after-free Read in task_is_descendant
 
Kees Cook
- KASAN: use-after-free Read in task_is_descendant
 
Oleg Nesterov
- kernel BUG at security/keys/keyring.c:LINE!
 
syzbot
- Leaking Path in XFS's ioctl interface(missing LSM check)
 
Dave Chinner
- Leaking Path in XFS's ioctl interface(missing LSM check)
 
Alan Cox
- Leaking Path in XFS's ioctl interface(missing LSM check)
 
Theodore Y. Ts'o
- Leaking Path in XFS's ioctl interface(missing LSM check)
 
Darrick J. Wong
- Leaking Path in XFS's ioctl interface(missing LSM check)
 
James Morris
- Leaking Path in XFS's ioctl interface(missing LSM check)
 
Dave Chinner
- Leaking Path in XFS's ioctl interface(missing LSM check)
 
Dave Chinner
- Leaking Path in XFS's ioctl interface(missing LSM check)
 
James Morris
- Leaking Path in XFS's ioctl interface(missing LSM check)
 
Dave Chinner
- LSM mailing list archive at Lore
 
James Morris
- my subject
 
test at comstar.ru
- P/Contact
 
Allen Yun
- Photos 40
 
Nancy
- possible deadlock in process_measurement
 
syzbot
- Read Business Letter
 
info at secure.net
- Read Business Letter
 
info at secure.net
- Read Business Letter
 
info at secure.net
- undefined behavior (-Wvarargs) in	security/keys/trusted.c#TSS_authhmac()
 
Nick Desaulniers
- undefined behavior (-Wvarargs) in	security/keys/trusted.c#TSS_authhmac()
 
Arnd Bergmann
- undefined behavior (-Wvarargs) in	security/keys/trusted.c#TSS_authhmac()
 
James Bottomley
- URGENT RESPONSE NEEDED
 
Sean Kim.
- yama: unsafe usage of ptrace_relation->tracer
 
Oleg Nesterov
    
      Last message date: 
       Wed Oct 31 23:26:20 UTC 2018
    Archived on: Wed Oct 31 23:26:44 UTC 2018
    
   
     
     
     This archive was generated by
     Pipermail 0.09 (Mailman edition).