September 2018 Archives by subject
Starting: Sat Sep 1 09:18:23 UTC 2018
Ending: Sun Sep 30 23:25:26 UTC 2018
Messages: 725
- [GIT PULL] apparmor fix for v4.19-rc3
John Johansen
- [GIT PULL] Keys: fix C++ reserved word issue
James Morris
- [GIT PULL] Keys: fix C++ reserved word issue
Greg KH
- [GIT PULL] Keys: fix C++ reserved word issue
David Howells
- [GIT PULL] Keys: fix C++ reserved word issue
Greg KH
- [GIT PULL] Keys: fix C++ reserved word issue
James Morris
- [PATCH -next] Smack: remove set but not used variable 'root_inode'
YueHaibing
- [PATCH 0/2] KEYS: Revert and replace incorrect UAPI fix
David Howells
- [PATCH 0/3] keyutils: request_key and DNS resolver changes
David Howells
- [PATCH 0/3] namei: implement various scoping AT_* flags
Jann Horn
- [PATCH 0/8] CaitSith LSM module
Tetsuo Handa
- [PATCH 0/8] CaitSith LSM module
John Johansen
- [PATCH 00/18] LSM: Prepare for explict LSM ordering
Kees Cook
- [PATCH 00/22] KEYS: Support TPM-wrapped key and crypto ops
David Howells
- [PATCH 00/22] KEYS: Support TPM-wrapped key and crypto ops
James Morris
- [PATCH 00/22] KEYS: Support TPM-wrapped key and crypto ops
Marcel Holtmann
- [PATCH 00/22] KEYS: Support TPM-wrapped key and crypto ops
James Morris
- [PATCH 00/22] KEYS: Support TPM-wrapped key and crypto ops
David Howells
- [PATCH 00/22] KEYS: Support TPM-wrapped key and crypto ops
Denis Kenzior
- [PATCH 00/22] KEYS: Support TPM-wrapped key and crypto ops
Denis Kenzior
- [PATCH 00/22] KEYS: Support TPM-wrapped key and crypto ops
Denis Kenzior
- [PATCH 00/22] KEYS: Support TPM-wrapped key and crypto ops
Denis Kenzior
- [PATCH 00/22] KEYS: Support TPM-wrapped key and crypto ops
James Bottomley
- [PATCH 00/22] KEYS: Support TPM-wrapped key and crypto ops
David Howells
- [PATCH 00/22] KEYS: Support TPM-wrapped key and crypto ops
David Howells
- [PATCH 00/22] KEYS: Support TPM-wrapped key and crypto ops
David Howells
- [PATCH 00/22] KEYS: Support TPM-wrapped key and crypto ops
David Howells
- [PATCH 00/22] KEYS: Support TPM-wrapped key and crypto ops
Denis Kenzior
- [PATCH 00/22] KEYS: Support TPM-wrapped key and crypto ops
David Howells
- [PATCH 00/22] KEYS: Support TPM-wrapped key and crypto ops
Marcel Holtmann
- [PATCH 00/22] KEYS: Support TPM-wrapped key and crypto ops
Denis Kenzior
- [PATCH 00/22] KEYS: Support TPM-wrapped key and crypto ops
Marcel Holtmann
- [PATCH 00/34] VFS: Introduce filesystem context [ver #12]
David Howells
- [PATCH 01/10] procfs: add smack subdir to attrs
Casey Schaufler
- [PATCH 01/10] procfs: add smack subdir to attrs
Ahmed S. Darwish
- [PATCH 01/10] procfs: add smack subdir to attrs
Casey Schaufler
- [PATCH 01/10] procfs: add smack subdir to attrs
Kees Cook
- [PATCH 01/18] vmlinux.lds.h: Avoid copy/paste of security_init section
Kees Cook
- [PATCH 01/22] KEYS: Provide key type operations for asymmetric key ops
David Howells
- [PATCH 02/10] Smack: Abstract use of cred security blob
Casey Schaufler
- [PATCH 02/10] Smack: Abstract use of cred security blob
Kees Cook
- [PATCH 02/18] LSM: Rename .security_initcall section to .lsm_info
Kees Cook
- [PATCH 02/22] KEYS: Provide keyctls to drive the new key type ops for asymmetric keys
David Howells
- [PATCH 03/10] SELinux: Abstract use of cred security blob
Casey Schaufler
- [PATCH 03/10] SELinux: Abstract use of cred security blob
Kees Cook
- [PATCH 03/18] LSM: Remove initcall tracing
Kees Cook
- [PATCH 03/22] KEYS: Provide missing asymmetric key subops for new key type ops
David Howells
- [PATCH 04/10] LSM: Infrastructure management of the cred security blob
Kees Cook
- [PATCH 04/10] LSM: Infrastructure management of the cred security blob
Casey Schaufler
- [PATCH 04/10] LSM: Infrastructure management of the cred security blob
Kees Cook
- [PATCH 04/10] LSM: Infrastructure management of the cred security blob
Casey Schaufler
- [PATCH 04/18] LSM: Convert from initcall to struct lsm_info
Kees Cook
- [PATCH 04/22] KEYS: Make the X.509 and PKCS7 parsers supply the sig encoding type
David Howells
- [PATCH 05/10] SELinux: Abstract use of file security blob
Casey Schaufler
- [PATCH 05/10] SELinux: Abstract use of file security blob
Kees Cook
- [PATCH 05/18] vmlinux.lds.h: Move LSM_TABLE into INIT_DATA
Kees Cook
- [PATCH 05/22] KEYS: Provide software public key query function
David Howells
- [PATCH 06/10] LSM: Infrastructure management of the file security blob
Kees Cook
- [PATCH 06/10] LSM: Infrastructure management of the file security blob
Casey Schaufler
- [PATCH 06/18] LSM: Convert security_initcall() into DEFINE_LSM()
Kees Cook
- [PATCH 06/22] KEYS: Allow the public_key struct to hold a private key
David Howells
- [PATCH 07/10] SELinux: Abstract use of inode security blob
Casey Schaufler
- [PATCH 07/10] SELinux: Abstract use of inode security blob
Kees Cook
- [PATCH 07/18] LSM: Add minor LSM initialization loop
Kees Cook
- [PATCH 07/18] LSM: Add minor LSM initialization loop
Jann Horn
- [PATCH 07/18] LSM: Add minor LSM initialization loop
Kees Cook
- [PATCH 07/22] KEYS: Implement encrypt, decrypt and sign for software asymmetric key
David Howells
- [PATCH 08/10] Smack: Abstract use of inode security blob
Casey Schaufler
- [PATCH 08/10] Smack: Abstract use of inode security blob
Kees Cook
- [PATCH 08/18] integrity: Initialize as LSM_TYPE_MINOR
Kees Cook
- [PATCH 08/22] KEYS: Implement PKCS#8 RSA Private Key parser
David Howells
- [PATCH 08/34] vfs: Add LSM hooks for the new mount API [ver #12]
David Howells
- [PATCH 09/10] LSM: Infrastructure management of the inode security
Casey Schaufler
- [PATCH 09/10] LSM: Infrastructure management of the inode security
Kees Cook
- [PATCH 09/18] LSM: Record LSM name in struct lsm_info
Kees Cook
- [PATCH 09/22] crypto: rsa-pkcs1pad: Allow hash to be optional
David Howells
- [PATCH 1/2] Revert "uapi/linux/keyctl.h: don't use C++ reserved keyword as a struct member name"
David Howells
- [PATCH 1/3] request-key: Provide a command line option to suppress execution
David Howells
- [PATCH 1/3] selinux: make dentry_init_security() return security module name
Jeff Layton
- [PATCH 1/3] selinux: make dentry_init_security() return security module name
Casey Schaufler
- [PATCH 1/3] selinux: make dentry_init_security() return security module name
Yan, Zheng
- [PATCH 1/3] selinux: make dentry_init_security() return security module name
Casey Schaufler
- [PATCH 1/3] selinux: make dentry_init_security() return security module name
Yan, Zheng
- [PATCH 1/3] selinux: make dentry_init_security() return security module name
Casey Schaufler
- [PATCH 1/3] selinux: make dentry_init_security() return security module name
Yan, Zheng
- [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
Casey Schaufler
- [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
Kees Cook
- [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
Paul Moore
- [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
Kees Cook
- [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
Paul Moore
- [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
Jordan Glover
- [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
Kees Cook
- [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
Paul Moore
- [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
Paul Moore
- [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
Kees Cook
- [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
Jordan Glover
- [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
Casey Schaufler
- [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
Kees Cook
- [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
John Johansen
- [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
Casey Schaufler
- [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
Kees Cook
- [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
Kees Cook
- [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
Kees Cook
- [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
Casey Schaufler
- [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
Kees Cook
- [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
Casey Schaufler
- [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
Kees Cook
- [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
Paul Moore
- [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
Casey Schaufler
- [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
James Morris
- [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
John Johansen
- [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
Kees Cook
- [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
Casey Schaufler
- [PATCH 10/18] LSM: Plumb visibility into optional "enabled" state
Kees Cook
- [PATCH 10/22] KEYS: asym_tpm: add skeleton for asym_tpm
David Howells
- [PATCH 10/34] selinux: Implement the new mount API LSM hooks [ver #12]
David Howells
- [PATCH 11/18] LSM: Lift LSM selection out of individual LSMs
Kees Cook
- [PATCH 11/18] LSM: Lift LSM selection out of individual LSMs
Jann Horn
- [PATCH 11/18] LSM: Lift LSM selection out of individual LSMs
Kees Cook
- [PATCH 11/22] KEYS: asym_tpm: extract key size & public key
David Howells
- [PATCH 11/34] smack: Implement filesystem context security hooks [ver #12]
David Howells
- [PATCH 12/18] LSM: Introduce ordering details in struct lsm_info
Kees Cook
- [PATCH 12/22] KEYS: Add parser for TPM-based keys
David Howells
- [PATCH 12/34] apparmor: Implement security hooks for the new mount API [ver #12]
David Howells
- [PATCH 13/18] LoadPin: Initialize as LSM_TYPE_MINOR
Kees Cook
- [PATCH 13/22] KEYS: asym_tpm: Implement pkey_query
David Howells
- [PATCH 13/34] tomoyo: Implement security hooks for the new mount API [ver #12]
David Howells
- [PATCH 14/18] Yama: Initialize as LSM_TYPE_MINOR
Kees Cook
- [PATCH 14/22] KEYS: asym_tpm: Implement encryption operation
David Howells
- [PATCH 15/18] capability: Initialize as LSM_TYPE_MINOR
Kees Cook
- [PATCH 15/22] KEYS: trusted: Expose common functionality
David Howells
- [PATCH 16/18] LSM: Allow arbitrary LSM ordering
Kees Cook
- [PATCH 16/18] LSM: Allow arbitrary LSM ordering
Casey Schaufler
- [PATCH 16/18] LSM: Allow arbitrary LSM ordering
Kees Cook
- [PATCH 16/18] LSM: Allow arbitrary LSM ordering
Tetsuo Handa
- [PATCH 16/18] LSM: Allow arbitrary LSM ordering
Casey Schaufler
- [PATCH 16/18] LSM: Allow arbitrary LSM ordering
Kees Cook
- [PATCH 16/18] LSM: Allow arbitrary LSM ordering
Casey Schaufler
- [PATCH 16/18] LSM: Allow arbitrary LSM ordering
Kees Cook
- [PATCH 16/18] LSM: Allow arbitrary LSM ordering
Casey Schaufler
- [PATCH 16/18] LSM: Allow arbitrary LSM ordering
John Johansen
- [PATCH 16/18] LSM: Allow arbitrary LSM ordering
John Johansen
- [PATCH 16/18] LSM: Allow arbitrary LSM ordering
Casey Schaufler
- [PATCH 16/18] LSM: Allow arbitrary LSM ordering
John Johansen
- [PATCH 16/18] LSM: Allow arbitrary LSM ordering
Kees Cook
- [PATCH 16/18] LSM: Allow arbitrary LSM ordering
John Johansen
- [PATCH 16/18] LSM: Allow arbitrary LSM ordering
Casey Schaufler
- [PATCH 16/18] LSM: Allow arbitrary LSM ordering
John Johansen
- [PATCH 16/18] LSM: Allow arbitrary LSM ordering
Kees Cook
- [PATCH 16/18] LSM: Allow arbitrary LSM ordering
Casey Schaufler
- [PATCH 16/18] LSM: Allow arbitrary LSM ordering
Casey Schaufler
- [PATCH 16/18] LSM: Allow arbitrary LSM ordering
Kees Cook
- [PATCH 16/18] LSM: Allow arbitrary LSM ordering
Casey Schaufler
- [PATCH 16/18] LSM: Allow arbitrary LSM ordering
Casey Schaufler
- [PATCH 16/18] LSM: Allow arbitrary LSM ordering
Kees Cook
- [PATCH 16/18] LSM: Allow arbitrary LSM ordering
Casey Schaufler
- [PATCH 16/18] LSM: Allow arbitrary LSM ordering
Kees Cook
- [PATCH 16/18] LSM: Allow arbitrary LSM ordering
John Johansen
- [PATCH 16/22] KEYS: Move trusted.h to include/keys
David Howells
- [PATCH 17/18] LSM: Provide init debugging
Kees Cook
- [PATCH 17/22] KEYS: asym_tpm: Add loadkey2 and flushspecific
David Howells
- [PATCH 18/18] LSM: Don't ignore initialization failures
Kees Cook
- [PATCH 18/22] KEYS: asym_tpm: Implement tpm_unbind
David Howells
- [PATCH 19/22] KEYS: asym_tpm: Implement the decrypt operation
David Howells
- [PATCH 2/2] keys: Fix the use of the C++ keyword "private" in uapi/linux/keyctl.h
David Howells
- [PATCH 2/2] keys: Fix the use of the C++ keyword "private" in uapi/linux/keyctl.h
Lubomir Rintel
- [PATCH 2/2] keys: Fix the use of the C++ keyword "private" in uapi/linux/keyctl.h
Mat Martineau
- [PATCH 2/2] netfilter: nf_tables: add requirements for connsecmark support
Florian Westphal
- [PATCH 2/2] netfilter: nf_tables: add requirements for connsecmark support
kbuild test robot
- [PATCH 2/2] netfilter: nf_tables: add requirements for connsecmark support
kbuild test robot
- [PATCH 2/2] netfilter: nf_tables: add requirements for connsecmark support
Christian Göttsche
- [PATCH 2/3] ceph: rename struct ceph_acls_info to ceph_acl_sec_ctx
Jeff Layton
- [PATCH 2/3] request-key: Find best match rather than first match
David Howells
- [PATCH 20/22] KEYS: asym_tpm: Implement signature verification
David Howells
- [PATCH 21/19] LSM: Cleanup and fixes from Tetsuo Handa
Casey Schaufler
- [PATCH 21/22] KEYS: asym_tpm: Implement tpm_sign
David Howells
- [PATCH 22/22] KEYS: asym_tpm: Add support for the sign operation
David Howells
- [PATCH 3/3] ceph: xattr security label support
Jeff Layton
- [PATCH 3/3] ceph: xattr security label support
Jeff Layton
- [PATCH 3/3] Remove the dependency on MIT Kerberos
David Howells
- [PATCH 3/6] selinux: convert to kvmalloc
Kent Overstreet
- [PATCH 3/6] selinux: convert to kvmalloc
Tetsuo Handa
- [PATCH 3/6] selinux: convert to kvmalloc
Kent Overstreet
- [PATCH 3/6] selinux: convert to kvmalloc
Paul Moore
- [PATCH 4.14 16/89] Replace magic for trusting the secondary keyring with #define
Greg Kroah-Hartman
- [PATCH 4.14 17/89] Fix kexec forbidding kernels signed with keys in the secondary keyring to boot
Greg Kroah-Hartman
- [PATCH 4.18 024/145] Replace magic for trusting the secondary keyring with #define
Greg Kroah-Hartman
- [PATCH 4.18 025/145] Fix kexec forbidding kernels signed with keys in the secondary keyring to boot
Greg Kroah-Hartman
- [PATCH 4.9 41/63] Replace magic for trusting the secondary keyring with #define
Greg Kroah-Hartman
- [PATCH 4.9 42/63] Fix kexec forbidding kernels signed with keys in the secondary keyring to boot
Greg Kroah-Hartman
- [PATCH 6/5] capability: Repair sidechannel test in ptrace
Casey Schaufler
- [PATCH 6/5] capability: Repair sidechannel test in ptrace
Jann Horn
- [PATCH resend] uapi/linux/keyctl.h: don't use C++ reserved keyword as a struct member name
Eugene Syromiatnikov
- [PATCH resend] uapi/linux/keyctl.h: don't use C++ reserved keyword as a struct member name
Andrew Morton
- [PATCH resend] uapi/linux/keyctl.h: don't use C++ reserved keyword as a struct member name
David Howells
- [PATCH security-next v2 00/26] LSM: Explict LSM ordering
Kees Cook
- [PATCH security-next v2 00/26] LSM: Explict LSM ordering
Martin Steigerwald
- [PATCH security-next v2 00/26] LSM: Explict LSM ordering
Kees Cook
- [PATCH security-next v2 01/26] LSM: Correctly announce start of LSM initialization
Casey Schaufler
- [PATCH security-next v2 01/26] LSM: Correctly announce start of LSM initialization
Kees Cook
- [PATCH security-next v2 02/26] vmlinux.lds.h: Avoid copy/paste of security_init section
Kees Cook
- [PATCH security-next v2 03/26] LSM: Rename .security_initcall section to .lsm_info
Kees Cook
- [PATCH security-next v2 04/26] LSM: Remove initcall tracing
Kees Cook
- [PATCH security-next v2 05/26] LSM: Convert from initcall to struct lsm_info
Kees Cook
- [PATCH security-next v2 06/26] vmlinux.lds.h: Move LSM_TABLE into INIT_DATA
Kees Cook
- [PATCH security-next v2 07/26] LSM: Convert security_initcall() into DEFINE_LSM()
Kees Cook
- [PATCH security-next v2 08/26] LSM: Record LSM name in struct lsm_info
Kees Cook
- [PATCH security-next v2 09/26] LSM: Provide init debugging infrastructure
Kees Cook
- [PATCH security-next v2 10/26] LSM: Don't ignore initialization failures
Kees Cook
- [PATCH security-next v2 11/26] LSM: Introduce LSM_FLAG_LEGACY_MAJOR
Kees Cook
- [PATCH security-next v2 12/26] LSM: Provide separate ordered initialization
Kees Cook
- [PATCH security-next v2 13/26] LSM: Plumb visibility into optional "enabled" state
Kees Cook
- [PATCH security-next v2 14/26] LSM: Lift LSM selection out of individual LSMs
Kees Cook
- [PATCH security-next v2 15/26] LSM: Introduce lsm.enable= and lsm.disable=
Kees Cook
- [PATCH security-next v2 16/26] LSM: Prepare for reorganizing "security=" logic
Kees Cook
- [PATCH security-next v2 17/26] LSM: Refactor "security=" in terms of enable/disable
Kees Cook
- [PATCH security-next v2 18/26] LSM: Build ordered list of ordered LSMs for init
Kees Cook
- [PATCH security-next v2 18/26] LSM: Build ordered list of ordered LSMs for init
Casey Schaufler
- [PATCH security-next v2 18/26] LSM: Build ordered list of ordered LSMs for init
Kees Cook
- [PATCH security-next v2 19/26] LSM: Introduce CONFIG_LSM_ORDER
Kees Cook
- [PATCH security-next v2 19/26] LSM: Introduce CONFIG_LSM_ORDER
Casey Schaufler
- [PATCH security-next v2 19/26] LSM: Introduce CONFIG_LSM_ORDER
Casey Schaufler
- [PATCH security-next v2 20/26] LSM: Introduce "lsm.order=" for boottime ordering
Kees Cook
- [PATCH security-next v2 20/26] LSM: Introduce "lsm.order=" for boottime ordering
Casey Schaufler
- [PATCH security-next v2 20/26] LSM: Introduce "lsm.order=" for boottime ordering
Kees Cook
- [PATCH security-next v2 21/26] LoadPin: Initialize as ordered LSM
Kees Cook
- [PATCH security-next v2 22/26] Yama: Initialize as ordered LSM
Kees Cook
- [PATCH security-next v2 23/26] LSM: Introduce enum lsm_order
Kees Cook
- [PATCH security-next v2 24/26] capability: Mark as LSM_ORDER_FIRST
Kees Cook
- [PATCH security-next v2 25/26] LSM: Separate idea of "major" LSM from "exclusive" LSM
Kees Cook
- [PATCH security-next v2 26/26] LSM: Add all exclusive LSMs to ordered initialization
Casey Schaufler
- [PATCH security-next v2 26/26] LSM: Add all exclusive LSMs to ordered initialization
Kees Cook
- [PATCH security-next v2 26/26] LSM: Add all exclusive LSMs to ordered initialization
Casey Schaufler
- [PATCH security-next v2 26/26] LSM: Add all exclusive LSMs to ordered initialization
John Johansen
- [PATCH security-next v2 26/26] LSM: Add all exclusive LSMs to ordered initialization
Kees Cook
- [PATCH security-next v2 26/26] LSM: Add all exclusive LSMs to ordered initialization
John Johansen
- [PATCH security-next v2 26/26] LSM: Add all exclusive LSMs to ordered initialization
Kees Cook
- [PATCH security-next v2 26/26] LSM: Add all exclusive LSMs to ordered initialization
John Johansen
- [PATCH security-next v2 26/26] LSM: Add all exclusive LSMs to ordered initialization
Casey Schaufler
- [PATCH security-next v2 26/26] LSM: Add all exclusive LSMs to ordered initialization
Kees Cook
- [PATCH security-next v3 00/29] LSM: Explict LSM ordering
Kees Cook
- [PATCH security-next v3 00/29] LSM: Explict LSM ordering
Casey Schaufler
- [PATCH security-next v3 00/29] LSM: Explict LSM ordering
Kees Cook
- [PATCH security-next v3 00/29] LSM: Explict LSM ordering
Stephen Smalley
- [PATCH security-next v3 00/29] LSM: Explict LSM ordering
Stephen Smalley
- [PATCH security-next v3 00/29] LSM: Explict LSM ordering
Kees Cook
- [PATCH security-next v3 00/29] LSM: Explict LSM ordering
Tetsuo Handa
- [PATCH security-next v3 00/29] LSM: Explict LSM ordering
Kees Cook
- [PATCH security-next v3 00/29] LSM: Explict LSM ordering
John Johansen
- [PATCH security-next v3 00/29] LSM: Explict LSM ordering
Tetsuo Handa
- [PATCH security-next v3 00/29] LSM: Explict LSM ordering
Kees Cook
- [PATCH security-next v3 01/29] LSM: Correctly announce start of LSM initialization
Kees Cook
- [PATCH security-next v3 02/29] vmlinux.lds.h: Avoid copy/paste of security_init section
Kees Cook
- [PATCH security-next v3 03/29] LSM: Rename .security_initcall section to .lsm_info
Kees Cook
- [PATCH security-next v3 04/29] LSM: Remove initcall tracing
Kees Cook
- [PATCH security-next v3 04/29] LSM: Remove initcall tracing
Steven Rostedt
- [PATCH security-next v3 04/29] LSM: Remove initcall tracing
Kees Cook
- [PATCH security-next v3 04/29] LSM: Remove initcall tracing
Steven Rostedt
- [PATCH security-next v3 05/29] LSM: Convert from initcall to struct lsm_info
Kees Cook
- [PATCH security-next v3 06/29] vmlinux.lds.h: Move LSM_TABLE into INIT_DATA
Kees Cook
- [PATCH security-next v3 07/29] LSM: Convert security_initcall() into DEFINE_LSM()
Kees Cook
- [PATCH security-next v3 08/29] LSM: Record LSM name in struct lsm_info
Kees Cook
- [PATCH security-next v3 09/29] LSM: Provide init debugging infrastructure
Kees Cook
- [PATCH security-next v3 10/29] LSM: Don't ignore initialization failures
Kees Cook
- [PATCH security-next v3 11/29] LSM: Introduce LSM_FLAG_LEGACY_MAJOR
Kees Cook
- [PATCH security-next v3 12/29] LSM: Provide separate ordered initialization
Kees Cook
- [PATCH security-next v3 13/29] LoadPin: Rename "enable" to "enforce"
Kees Cook
- [PATCH security-next v3 14/29] LSM: Plumb visibility into optional "enabled" state
Kees Cook
- [PATCH security-next v3 15/29] LSM: Lift LSM selection out of individual LSMs
Kees Cook
- [PATCH security-next v3 16/29] LSM: Prepare for arbitrary LSM enabling
Kees Cook
- [PATCH security-next v3 17/29] LSM: Introduce CONFIG_LSM_ENABLE
Kees Cook
- [PATCH security-next v3 18/29] LSM: Introduce lsm.enable= and lsm.disable=
Kees Cook
- [PATCH security-next v3 19/29] LSM: Prepare for reorganizing "security=" logic
Kees Cook
- [PATCH security-next v3 20/29] LSM: Refactor "security=" in terms of enable/disable
Kees Cook
- [PATCH security-next v3 21/29] LSM: Build ordered list of ordered LSMs for init
Kees Cook
- [PATCH security-next v3 22/29] LSM: Introduce CONFIG_LSM_ORDER
Kees Cook
- [PATCH security-next v3 23/29] LSM: Introduce "lsm.order=" for boottime ordering
Kees Cook
- [PATCH security-next v3 24/29] LoadPin: Initialize as ordered LSM
Kees Cook
- [PATCH security-next v3 25/29] Yama: Initialize as ordered LSM
Kees Cook
- [PATCH security-next v3 26/29] LSM: Introduce enum lsm_order
Kees Cook
- [PATCH security-next v3 27/29] capability: Initialize as LSM_ORDER_FIRST
Kees Cook
- [PATCH security-next v3 28/29] LSM: Separate idea of "major" LSM from "exclusive" LSM
Kees Cook
- [PATCH security-next v3 29/29] LSM: Add all exclusive LSMs to ordered initialization
Kees Cook
- [PATCH v2 0/6] Add support for architecture specific IMA policies
Nayna Jain
- [PATCH v2 00/10] LSM: Module stacking in support of S.A.R.A and Landlock
Casey Schaufler
- [PATCH v2 00/10] LSM: Module stacking in support of S.A.R.A and Landlock
James Morris
- [PATCH v2 00/10] LSM: Module stacking in support of S.A.R.A and Landlock
James Morris
- [PATCH v2 00/10] LSM: Module stacking in support of S.A.R.A and Landlock
Salvatore Mesoraca
- [PATCH v2 00/10] LSM: Module stacking in support of S.A.R.A and Landlock
Casey Schaufler
- [PATCH v2 00/10] LSM: Module stacking in support of S.A.R.A and Landlock
Salvatore Mesoraca
- [PATCH v2 00/10] LSM: Module stacking in support of S.A.R.A and Landlock
Casey Schaufler
- [PATCH v2 1/2] netfilter: nf_tables: add SECMARK support
Christian Göttsche
- [PATCH v2 1/2] netfilter: nf_tables: add SECMARK support
Florian Westphal
- [PATCH v2 1/2] netfilter: nf_tables: add SECMARK support
Christian Göttsche
- [PATCH v2 1/2] netfilter: nf_tables: add SECMARK support
Florian Westphal
- [PATCH v2 1/6] ima: define arch_ima_get_secureboot
Nayna Jain
- [PATCH v2 2/6] ima: prevent kexec_load syscall based on runtime secureboot flag
Nayna Jain
- [PATCH v2 3/3] tpm: retrieve digest size of unknown algorithms with PCR read
Roberto Sassu
- [PATCH v2 3/3] tpm: retrieve digest size of unknown algorithms with PCR read
Jarkko Sakkinen
- [PATCH v2 3/3] tpm: retrieve digest size of unknown algorithms with PCR read
Roberto Sassu
- [PATCH v2 3/3] tpm: retrieve digest size of unknown algorithms with PCR read
Jarkko Sakkinen
- [PATCH v2 3/6] ima: refactor ima_init_policy()
Nayna Jain
- [PATCH v2 4/6] ima: add support for arch specific policies
Nayna Jain
- [PATCH v2 5/6] ima: add support for external setting of ima_appraise
Nayna Jain
- [PATCH v2 6/6] x86/ima: define arch_get_ima_policy() for x86
Nayna Jain
- [PATCH v2 6/6] x86/ima: define arch_get_ima_policy() for x86
kbuild test robot
- [PATCH v2, RESEND 0/3] tpm: retrieve digest size of unknown algorithms from TPM
Roberto Sassu
- [PATCH v2, RESEND 1/3] tpm: rename and export tpm2_digest and tpm2_algorithms
Roberto Sassu
- [PATCH v2, RESEND 2/3] tpm: modify tpm_pcr_read() definition to pass TPM hash algorithms
Roberto Sassu
- [PATCH v2, RESEND 3/3] tpm: retrieve digest size of unknown algorithms with PCR read
Roberto Sassu
- [PATCH v2, RESEND 0/3] tpm: retrieve digest size of unknown algorithms from TPM
Mimi Zohar
- [PATCH v2, RESEND 0/3] tpm: retrieve digest size of unknown algorithms from TPM
Mimi Zohar
- [PATCH v2, RESEND 0/3] tpm: retrieve digest size of unknown algorithms from TPM
Roberto Sassu
- [PATCH v2, RESEND 0/3] tpm: retrieve digest size of unknown algorithms from TPM
Mimi Zohar
- [PATCH v2, RESEND 0/3] tpm: retrieve digest size of unknown algorithms from TPM
Jarkko Sakkinen
- [PATCH v2, RESEND 2/3] tpm: modify tpm_pcr_read() definition to pass TPM hash algorithms
Roberto Sassu
- [PATCH v2, RESEND 2/3] tpm: modify tpm_pcr_read() definition to pass TPM hash algorithms
Mimi Zohar
- [PATCH v2, RESEND 2/3] tpm: modify tpm_pcr_read() definition to pass TPM hash algorithms
Jarkko Sakkinen
- [PATCH v2, RESEND 2/3] tpm: modify tpm_pcr_read() definition to pass TPM hash algorithms
Jarkko Sakkinen
- [PATCH v2, RESEND 3/3] tpm: retrieve digest size of unknown algorithms with PCR read
Jarkko Sakkinen
- [PATCH v3 0/6] Add support for architecture specific IMA policies
Nayna Jain
- [PATCH v3 00/16] LSM: Module stacking in support of SARA and Landlock
Casey Schaufler
- [PATCH v3 00/20] tpm: separate tpm 1.x and tpm 2.x commands
Tomas Winkler
- [PATCH v3 01/16] procfs: add smack subdir to attrs
Casey Schaufler
- [PATCH v3 01/20] tpm2: add new tpm2 commands according to TCG 1.36
Tomas Winkler
- [PATCH v3 01/20] tpm2: add new tpm2 commands according to TCG 1.36
Jarkko Sakkinen
- [PATCH v3 02/16] Smack: Abstract use of cred security blob
Casey Schaufler
- [PATCH v3 02/20] tpm: sort objects in the Makefile
Tomas Winkler
- [PATCH v3 02/20] tpm: sort objects in the Makefile
Jarkko Sakkinen
- [PATCH v3 02/20] tpm: sort objects in the Makefile
Jarkko Sakkinen
- [PATCH v3 03/16] SELinux: Abstract use of cred security blob
Casey Schaufler
- [PATCH v3 03/20] tpm: factor out tpm 1.x duration calculation to tpm1-cmd.c
Tomas Winkler
- [PATCH v3 03/20] tpm: factor out tpm 1.x duration calculation to tpm1-cmd.c
Jarkko Sakkinen
- [PATCH v3 03/20] tpm: factor out tpm 1.x duration calculation to tpm1-cmd.c
Jarkko Sakkinen
- [PATCH v3 04/16] SELinux: Remove cred security blob poisoning
Casey Schaufler
- [PATCH v3 04/20] tpm: add tpm_calc_ordinal_duration wrapper
Tomas Winkler
- [PATCH v3 04/20] tpm: add tpm_calc_ordinal_duration wrapper
Jarkko Sakkinen
- [PATCH v3 05/16] SELinux: Remove unused selinux_is_enabled
Casey Schaufler
- [PATCH v3 05/20] tpm: factor out tpm_get_timeouts
Tomas Winkler
- [PATCH v3 05/20] tpm: factor out tpm_get_timeouts
Jarkko Sakkinen
- [PATCH v3 06/16] AppArmor: Abstract use of cred security blob
Casey Schaufler
- [PATCH v3 06/20] tpm: move tpm1_pcr_extend to tpm1-cmd.c
Tomas Winkler
- [PATCH v3 06/20] tpm: move tpm1_pcr_extend to tpm1-cmd.c
Jarkko Sakkinen
- [PATCH v3 06/20] tpm: move tpm1_pcr_extend to tpm1-cmd.c
Nayna Jain
- [PATCH v3 07/16] TOMOYO: Abstract use of cred security blob
Casey Schaufler
- [PATCH v3 07/16] TOMOYO: Abstract use of cred security blob
Kees Cook
- [PATCH v3 07/20] tpm: move tpm_getcap to tpm1-cmd.c
Tomas Winkler
- [PATCH v3 07/20] tpm: move tpm_getcap to tpm1-cmd.c
Jarkko Sakkinen
- [PATCH v3 08/16] LSM: Infrastructure management of the cred security blob
Casey Schaufler
- [PATCH v3 08/20] tpm: factor out tpm1_get_random into tpm1-cmd.c
Tomas Winkler
- [PATCH v3 08/20] tpm: factor out tpm1_get_random into tpm1-cmd.c
Jarkko Sakkinen
- [PATCH v3 09/16] SELinux: Abstract use of file security blob
Casey Schaufler
- [PATCH v3 09/16] SELinux: Abstract use of file security blob
David Laight
- [PATCH v3 09/16] SELinux: Abstract use of file security blob
Casey Schaufler
- [PATCH v3 09/20] tpm: move tpm1 selftest code from tpm-interface tpm1-cmd.c
Tomas Winkler
- [PATCH v3 09/20] tpm: move tpm1 selftest code from tpm-interface tpm1-cmd.c
Jarkko Sakkinen
- [PATCH v3 1/2] netfilter: nf_tables: add SECMARK support
Christian Göttsche
- [PATCH v3 1/2] netfilter: nf_tables: add SECMARK support
Pablo Neira Ayuso
- [PATCH v3 1/6] x86/ima: define arch_ima_get_secureboot
Nayna Jain
- [PATCH v3 10/16] LSM: Infrastructure management of the file security blob
Kees Cook
- [PATCH v3 10/16] LSM: Infrastructure management of the file security blob
Casey Schaufler
- [PATCH v3 10/20] tpm: factor out tpm1 pm suspend flow into tpm1-cmd.c
Jarkko Sakkinen
- [PATCH v3 10/20] tpm: factor out tpm1 pm suspend flow into tpm1-cmd.c
Tomas Winkler
- [PATCH v3 11/16] SELinux: Abstract use of inode security blob
Casey Schaufler
- [PATCH v3 11/20] tpm: factor out tpm_startup function
Tomas Winkler
- [PATCH v3 11/20] tpm: factor out tpm_startup function
Jarkko Sakkinen
- [PATCH v3 12/16] Smack: Abstract use of inode security blob
Casey Schaufler
- [PATCH v3 12/20] tpm: move pcr extend code to tpm2-cmd.c
Tomas Winkler
- [PATCH v3 12/20] tpm: move pcr extend code to tpm2-cmd.c
Jarkko Sakkinen
- [PATCH v3 13/16] LSM: Infrastructure management of the inode security
Casey Schaufler
- [PATCH v3 13/20] tpm: add tpm_auto_startup into tpm-interface
Tomas Winkler
- [PATCH v3 13/20] tpm: add tpm_auto_startup into tpm-interface
Jarkko Sakkinen
- [PATCH v3 14/16] LSM: Infrastructure management of the task security blob
Kees Cook
- [PATCH v3 14/16] LSM: Infrastructure management of the task security blob
Casey Schaufler
- [PATCH v3 14/20] tpm: tpm-interface.c drop unused macros
Tomas Winkler
- [PATCH v3 14/20] tpm: tpm-interface.c drop unused macros
Jarkko Sakkinen
- [PATCH v3 15/16] LSM: Infrastructure management of the ipc security blob
Kees Cook
- [PATCH v3 15/16] LSM: Infrastructure management of the ipc security blob
Casey Schaufler
- [PATCH v3 15/20] tpm: tpm-space.c remove unneeded semicolon
Tomas Winkler
- [PATCH v3 15/20] tpm: tpm-space.c remove unneeded semicolon
Jarkko Sakkinen
- [PATCH v3 16/16] LSM: Blob sharing support for S.A.R.A and LandLock
Kees Cook
- [PATCH v3 16/16] LSM: Blob sharing support for S.A.R.A and LandLock
Casey Schaufler
- [PATCH v3 16/20] tpm: tpm1: rewrite tpm1_get_random() using tpm_buf structure
Jarkko Sakkinen
- [PATCH v3 16/20] tpm: tpm1: rewrite tpm1_get_random() using tpm_buf structure
Tomas Winkler
- [PATCH v3 17/20] tpm1: implement tpm1_pcr_read_dev() using tpm_buf structure
Jarkko Sakkinen
- [PATCH v3 17/20] tpm1: implement tpm1_pcr_read_dev() using tpm_buf structure
Tomas Winkler
- [PATCH v3 18/20] tpm: use u32 instead of int for pcr index
Tomas Winkler
- [PATCH v3 18/20] tpm: use u32 instead of int for pcr index
Jarkko Sakkinen
- [PATCH v3 19/20] tpm1: reimplement SAVESTATE using tpm_buf
Tomas Winkler
- [PATCH v3 19/20] tpm1: reimplement SAVESTATE using tpm_buf
Jarkko Sakkinen
- [PATCH v3 2/2] netfilter: nf_tables: add requirements for connsecmark support
Pablo Neira Ayuso
- [PATCH v3 2/2] netfilter: nf_tables: add requirements for connsecmark support
Christian Göttsche
- [PATCH v3 2/6] ima: prevent kexec_load syscall based on runtime secureboot flag
Nayna Jain
- [PATCH v3 20/20] tpm1: reimplement tpm1_continue_selftest() using tpm_buf
Jarkko Sakkinen
- [PATCH v3 20/20] tpm1: reimplement tpm1_continue_selftest() using tpm_buf
Tomas Winkler
- [PATCH v3 3/6] ima: refactor ima_init_policy()
Nayna Jain
- [PATCH v3 3/6] ima: refactor ima_init_policy()
Dan Carpenter
- [PATCH v3 3/6] ima: refactor ima_init_policy()
Nayna Jain
- [PATCH v3 4/6] ima: add support for arch specific policies
Nayna Jain
- [PATCH v3 5/6] ima: add support for external setting of ima_appraise
Nayna Jain
- [PATCH v3 6/6] x86/ima: define arch_get_ima_policy() for x86
Nayna Jain
- [PATCH v4 0/6] Add support for architecture specific IMA policies
Nayna Jain
- [PATCH v4 00/19] LSM: Module stacking for SARA and Landlock
Casey Schaufler
- [PATCH v4 00/19] LSM: Module stacking for SARA and Landlock
Kees Cook
- [PATCH v4 00/19] LSM: Module stacking for SARA and Landlock
Casey Schaufler
- [PATCH v4 00/19] LSM: Module stacking for SARA and Landlock
Kees Cook
- [PATCH v4 00/19] LSM: Module stacking for SARA and Landlock
Tetsuo Handa
- [PATCH v4 00/19] LSM: Module stacking for SARA and Landlock
Casey Schaufler
- [PATCH v4 00/19] LSM: Module stacking for SARA and Landlock
Tetsuo Handa
- [PATCH v4 00/19] LSM: Module stacking for SARA and Landlock
Stephen Smalley
- [PATCH v4 00/19] LSM: Module stacking for SARA and Landlock
Casey Schaufler
- [PATCH v4 00/19] LSM: Module stacking for SARA and Landlock
Casey Schaufler
- [PATCH v4 00/19] LSM: Module stacking for SARA and Landlock
Tetsuo Handa
- [PATCH v4 00/19] LSM: Module stacking for SARA and Landlock
Tetsuo Handa
- [PATCH v4 00/19] LSM: Module stacking for SARA and Landlock
Casey Schaufler
- [PATCH v4 00/21] tpm: separate tpm 1.x and tpm 2.x commands
Tomas Winkler
- [PATCH v4 01/19] procfs: add smack subdir to attrs
Casey Schaufler
- [PATCH v4 01/21] tpm2: add new tpm2 commands according to TCG 1.36
Tomas Winkler
- [PATCH v4 01/21] tpm2: add new tpm2 commands according to TCG 1.36
Jarkko Sakkinen
- [PATCH v4 01/21] tpm2: add new tpm2 commands according to TCG 1.36
Nayna Jain
- [PATCH v4 02/19] Smack: Abstract use of cred security blob
Casey Schaufler
- [PATCH v4 02/19] Smack: Abstract use of cred security blob
Kees Cook
- [PATCH v4 02/21] tpm: sort objects in the Makefile
Tomas Winkler
- [PATCH v4 02/21] tpm: sort objects in the Makefile
Jarkko Sakkinen
- [PATCH v4 03/19] SELinux: Abstract use of cred security blob
Casey Schaufler
- [PATCH v4 03/21] tpm: factor out tpm 1.x duration calculation to tpm1-cmd.c
Jarkko Sakkinen
- [PATCH v4 03/21] tpm: factor out tpm 1.x duration calculation to tpm1-cmd.c
Tomas Winkler
- [PATCH v4 03/21] tpm: factor out tpm 1.x duration calculation to tpm1-cmd.c
Nayna Jain
- [PATCH v4 04/19] SELinux: Remove cred security blob poisoning
Casey Schaufler
- [PATCH v4 04/19] SELinux: Remove cred security blob poisoning
Kees Cook
- [PATCH v4 04/19] SELinux: Remove cred security blob poisoning
James Morris
- [PATCH v4 04/19] SELinux: Remove cred security blob poisoning
Casey Schaufler
- [PATCH v4 04/21] tpm: add tpm_calc_ordinal_duration() wrapper
Tomas Winkler
- [PATCH v4 05/19] SELinux: Remove unused selinux_is_enabled
Casey Schaufler
- [PATCH v4 05/19] SELinux: Remove unused selinux_is_enabled
Kees Cook
- [PATCH v4 05/21] tpm: factor out tpm_get_timeouts()
Tomas Winkler
- [PATCH v4 05/21] tpm: factor out tpm_get_timeouts()
Jarkko Sakkinen
- [PATCH v4 06/19] AppArmor: Abstract use of cred security blob
Casey Schaufler
- [PATCH v4 06/19] AppArmor: Abstract use of cred security blob
Kees Cook
- [PATCH v4 06/21] tpm: move tpm1_pcr_extend to tpm1-cmd.c
Tomas Winkler
- [PATCH v4 07/19] TOMOYO: Abstract use of cred security blob
Casey Schaufler
- [PATCH v4 07/19] TOMOYO: Abstract use of cred security blob
Kees Cook
- [PATCH v4 07/21] tpm: move tpm_getcap to tpm1-cmd.c
Tomas Winkler
- [PATCH v4 08/19] Infrastructure management of the cred security blob
Kees Cook
- [PATCH v4 08/19] Infrastructure management of the cred security blob
Casey Schaufler
- [PATCH v4 08/21] tpm: factor out tpm1_get_random into tpm1-cmd.c
Tomas Winkler
- [PATCH v4 09/19] SELinux: Abstract use of file security blob
Casey Schaufler
- [PATCH v4 09/19] SELinux: Abstract use of file security blob
Casey Schaufler
- [PATCH v4 09/21] tpm: move tpm 1.x selftest code from tpm-interface.c tpm1-cmd.c
Jarkko Sakkinen
- [PATCH v4 09/21] tpm: move tpm 1.x selftest code from tpm-interface.c tpm1-cmd.c
Tomas Winkler
- [PATCH v4 1/6] x86/ima: define arch_ima_get_secureboot
Nayna Jain
- [PATCH v4 1/6] x86/ima: define arch_ima_get_secureboot
Mimi Zohar
- [PATCH v4 10/19] Smack: Abstract use of file security blob
Casey Schaufler
- [PATCH v4 10/19] Smack: Abstract use of file security blob
Kees Cook
- [PATCH v4 10/21] tpm: factor out tpm 1.x pm suspend flow into tpm1-cmd.c
Tomas Winkler
- [PATCH v4 10/21] tpm: factor out tpm 1.x pm suspend flow into tpm1-cmd.c
Jarkko Sakkinen
- [PATCH v4 11/19] LSM: Infrastructure management of the file security
Kees Cook
- [PATCH v4 11/19] LSM: Infrastructure management of the file security
Casey Schaufler
- [PATCH v4 11/21] tpm: factor out tpm_startup function
Tomas Winkler
- [PATCH v4 11/21] tpm: factor out tpm_startup function
Nayna Jain
- [PATCH v4 11/21] tpm: factor out tpm_startup function
Jarkko Sakkinen
- [PATCH v4 12/19] SELinux: Abstract use of inode security blob
Casey Schaufler
- [PATCH v4 12/21] tpm: move pcr extend code to tpm2-cmd.c
Tomas Winkler
- [PATCH v4 13/19] Smack: Abstract use of inode security blob
Casey Schaufler
- [PATCH v4 13/21] tpm: add tpm_auto_startup() into tpm-interface.c
Tomas Winkler
- [PATCH v4 14/19] LSM: Infrastructure management of the inode security
Kees Cook
- [PATCH v4 14/19] LSM: Infrastructure management of the inode security
Casey Schaufler
- [PATCH v4 14/21] tpm: tpm-interface.c drop unused macros
Tomas Winkler
- [PATCH v4 14/21] tpm: tpm-interface.c drop unused macros
Jarkko Sakkinen
- [PATCH v4 15/19] LSM: Infrastructure management of the task security
Kees Cook
- [PATCH v4 15/19] LSM: Infrastructure management of the task security
Casey Schaufler
- [PATCH v4 15/21] tpm: tpm-space.c remove unneeded semicolon
Tomas Winkler
- [PATCH v4 16/19] SELinux: Abstract use of ipc security blobs
Casey Schaufler
- [PATCH v4 16/19] SELinux: Abstract use of ipc security blobs
Kees Cook
- [PATCH v4 16/21] tpm: tpm1: rewrite tpm1_get_random() using tpm_buf structure
Tomas Winkler
- [PATCH v4 17/19] Smack: Abstract use of ipc security blobs
Casey Schaufler
- [PATCH v4 17/19] Smack: Abstract use of ipc security blobs
Kees Cook
- [PATCH v4 17/21] tpm1: implement tpm1_pcr_read_dev() using tpm_buf structure
Tomas Winkler
- [PATCH v4 18/19] LSM: Infrastructure management of the ipc security blob
Kees Cook
- [PATCH v4 18/19] LSM: Infrastructure management of the ipc security blob
Casey Schaufler
- [PATCH v4 18/21] tmp1: rename tpm1_pcr_read_dev to tpm1_pcr_read().
Jarkko Sakkinen
- [PATCH v4 18/21] tmp1: rename tpm1_pcr_read_dev to tpm1_pcr_read().
Tomas Winkler
- [PATCH v4 19/19] LSM: Blob sharing support for S.A.R.A and LandLock
Casey Schaufler
- [PATCH v4 19/21] tpm1: reimplement SAVESTATE using tpm_buf
Tomas Winkler
- [PATCH v4 2/6] ima: prevent kexec_load syscall based on runtime secureboot flag
Nayna Jain
- [PATCH v4 2/6] ima: prevent kexec_load syscall based on runtime secureboot flag
Mimi Zohar
- [PATCH v4 20/19] LSM: Correct file blob free empty blob check
Casey Schaufler
- [PATCH v4 20/21] tpm1: reimplement tpm1_continue_selftest() using tpm_buf
Jarkko Sakkinen
- [PATCH v4 20/21] tpm1: reimplement tpm1_continue_selftest() using tpm_buf
Jarkko Sakkinen
- [PATCH v4 20/21] tpm1: reimplement tpm1_continue_selftest() using tpm_buf
Tomas Winkler
- [PATCH v4 20/21] tpm1: reimplement tpm1_continue_selftest() using tpm_buf
Nayna Jain
- [PATCH v4 21/21] tpm: use u32 instead of int for PCR index
Tomas Winkler
- [PATCH v4 21/21] tpm: use u32 instead of int for PCR index
Jarkko Sakkinen
- [PATCH v4 3/6] ima: refactor ima_init_policy()
Nayna Jain
- [PATCH v4 3/6] ima: refactor ima_init_policy()
Mimi Zohar
- [PATCH v4 3/6] ima: refactor ima_init_policy()
Mimi Zohar
- [PATCH v4 4/6] ima: add support for arch specific policies
Nayna Jain
- [PATCH v4 4/6] ima: add support for arch specific policies
Mimi Zohar
- [PATCH v4 5/6] ima: add support for external setting of ima_appraise
Mimi Zohar
- [PATCH v4 5/6] ima: add support for external setting of ima_appraise
Nayna Jain
- [PATCH v4 6/6] x86/ima: define arch_get_ima_policy() for x86
Nayna Jain
- [PATCH v4 6/6] x86/ima: define arch_get_ima_policy() for x86
Mimi Zohar
- [PATCH v5 0/2] tpm: add support for nonblocking operation
Tadeusz Struk
- [PATCH v5 0/5] LSM: Support ptrace sidechannel access checks
Casey Schaufler
- [PATCH v5 00/21] tpm: separate tpm 1.x and tpm 2.x commands
Tomas Winkler
- [PATCH v5 01/21] tpm2: add new tpm2 commands according to TCG 1.36
Tomas Winkler
- [PATCH v5 02/21] tpm: sort objects in the Makefile
Tomas Winkler
- [PATCH v5 03/21] tpm: factor out tpm 1.x duration calculation to tpm1-cmd.c
Tomas Winkler
- [PATCH v5 04/21] tpm: add tpm_calc_ordinal_duration() wrapper
Tomas Winkler
- [PATCH v5 05/21] tpm: factor out tpm_get_timeouts()
Tomas Winkler
- [PATCH v5 06/21] tpm: move tpm1_pcr_extend to tpm1-cmd.c
Tomas Winkler
- [PATCH v5 07/21] tpm: move tpm_getcap to tpm1-cmd.c
Tomas Winkler
- [PATCH v5 08/21] tpm: factor out tpm1_get_random into tpm1-cmd.c
Tomas Winkler
- [PATCH v5 09/21] tpm: move tpm 1.x selftest code from tpm-interface.c tpm1-cmd.c
Tomas Winkler
- [PATCH v5 1/5] AppArmor: Prepare for PTRACE_MODE_SCHED
Casey Schaufler
- [PATCH v5 1/5] AppArmor: Prepare for PTRACE_MODE_SCHED
Jann Horn
- [PATCH v5 1/5] AppArmor: Prepare for PTRACE_MODE_SCHED
Jann Horn
- [PATCH v5 1/5] AppArmor: Prepare for PTRACE_MODE_SCHED
Schaufler, Casey
- [PATCH v5 10/21] tpm: factor out tpm 1.x pm suspend flow into tpm1-cmd.c
Tomas Winkler
- [PATCH v5 11/21] tpm: factor out tpm_startup function
Tomas Winkler
- [PATCH v5 12/21] tpm: move pcr extend code to tpm2-cmd.c
Tomas Winkler
- [PATCH v5 13/21] tpm: add tpm_auto_startup() into tpm-interface.c
Tomas Winkler
- [PATCH v5 14/21] tpm: tpm-interface.c drop unused macros
Tomas Winkler
- [PATCH v5 15/21] tpm: tpm-space.c remove unneeded semicolon
Tomas Winkler
- [PATCH v5 16/21] tpm: tpm1: rewrite tpm1_get_random() using tpm_buf structure
Tomas Winkler
- [PATCH v5 17/21] tpm1: implement tpm1_pcr_read_dev() using tpm_buf structure
Tomas Winkler
- [PATCH v5 18/21] tmp1: rename tpm1_pcr_read_dev to tpm1_pcr_read().
Tomas Winkler
- [PATCH v5 19/21] tpm1: reimplement SAVESTATE using tpm_buf
Tomas Winkler
- [PATCH v5 2/5] Smack: Prepare for PTRACE_MODE_SCHED
Casey Schaufler
- [PATCH v5 2/5] Smack: Prepare for PTRACE_MODE_SCHED
Jann Horn
- [PATCH v5 2/5] Smack: Prepare for PTRACE_MODE_SCHED
Schaufler, Casey
- [PATCH v5 2/5] Smack: Prepare for PTRACE_MODE_SCHED
Jann Horn
- [PATCH v5 20/21] tpm1: reimplement tpm1_continue_selftest() using tpm_buf
Tomas Winkler
- [PATCH v5 21/21] tpm: use u32 instead of int for PCR index
Tomas Winkler
- [PATCH v5 3/5] SELinux: Prepare for PTRACE_MODE_SCHED
Casey Schaufler
- [PATCH v5 3/5] SELinux: Prepare for PTRACE_MODE_SCHED
Stephen Smalley
- [PATCH v5 3/5] SELinux: Prepare for PTRACE_MODE_SCHED
Schaufler, Casey
- [PATCH v5 4/5] Capability: Complete PTRACE_MODE_SCHED
Casey Schaufler
- [PATCH v5 4/5] Capability: Complete PTRACE_MODE_SCHED
Jann Horn
- [PATCH v5 4/5] Capability: Complete PTRACE_MODE_SCHED
Schaufler, Casey
- [PATCH v5 5/5] sidechannel: Linux Security Module for sidechannel
Casey Schaufler
- [PATCH v5 5/5] sidechannel: Linux Security Module for sidechannel
James Morris
- [PATCH v5 5/5] sidechannel: Linux Security Module for sidechannel
Casey Schaufler
- [PATCH v5 5/5] sidechannel: Linux Security Module for sidechannel
James Morris
- [PATCH v5 5/5] sidechannel: Linux Security Module for sidechannel
Schaufler, Casey
- [PATCH v5 5/5] sidechannel: Linux Security Module for sidechannel
James Morris
- [PATCH v5 5/5] sidechannel: Linux Security Module for sidechannel
Jann Horn
- [PATCH v5 5/5] sidechannel: Linux Security Module for sidechannel
James Morris
- [PATCH v5 5/5] sidechannel: Linux Security Module for sidechannel
Schaufler, Casey
- [PATCH v6 0/2] tpm: add support for nonblocking operation
Tadeusz Struk
- [PATCH v6 0/2] tpm: add support for nonblocking operation
Jarkko Sakkinen
- [PATCH v6 0/2] tpm: add support for nonblocking operation
Tadeusz Struk
- [PATCH v6 0/2] tpm: add support for nonblocking operation
Jarkko Sakkinen
- [PATCH v6 0/2] tpm: add support for nonblocking operation
Jarkko Sakkinen
- [PATCH v6 1/2] tpm: add ptr to the tpm_space struct to file_priv
Tadeusz Struk
- [PATCH v6 1/2] tpm: add ptr to the tpm_space struct to file_priv
Jarkko Sakkinen
- [PATCH v6 2/2] tpm: add support for nonblocking operation
Tadeusz Struk
- [PATCH v6 2/2] tpm: add support for nonblocking operation
Jarkko Sakkinen
- [PATCH] [RFC v2] Drop all 00-INDEX files from Documentation/
Paul Moore
- [PATCH] apparmor: Fix network performance issue in aa_label_sk_perm
John Johansen
- [PATCH] apparmor: Fix network performance issue in aa_label_sk_perm
Tony Jones
- [PATCH] apparmor: Fix network performance issue in aa_label_sk_perm
Tony Jones
- [PATCH] apparmor: Fix uninitialized value in aa_split_fqname
Zubin Mithra
- [PATCH] keys: Fix the use of the C++ keyword "private" in uapi/linux/keyctl.h
David Howells
- [PATCH] keys: Fix the use of the C++ keyword "private" in uapi/linux/keyctl.h
James Morris
- [PATCH] netfilter: nf_tables: add SECMARK support
Christian Göttsche
- [PATCH] netfilter: nf_tables: add SECMARK support
Casey Schaufler
- [PATCH] netfilter: nf_tables: add SECMARK support
Christian Göttsche
- [PATCH] netfilter: nf_tables: add SECMARK support
Florian Westphal
- [PATCH] netfilter: nf_tables: add SECMARK support
Pablo Neira Ayuso
- [PATCH] netfilter: nf_tables: add SECMARK support
Christian Göttsche
- [PATCH] netfilter: nf_tables: add SECMARK support
Florian Westphal
- [PATCH] netfilter: nf_tables: add SECMARK support
Casey Schaufler
- [PATCH] Revert "uapi/linux/keyctl.h: don't use C++ reserved keyword as a struct member name"
David Howells
- [PATCH] Revert "uapi/linux/keyctl.h: don't use C++ reserved keyword as a struct member name"
Lubomir Rintel
- [PATCH] Revert "uapi/linux/keyctl.h: don't use C++ reserved keyword as a struct member name"
Lubomir Rintel
- [PATCH] seccomp: remove unnecessary unlikely()
Igor Stoppa
- [PATCH] seccomp: remove unnecessary unlikely()
Kees Cook
- [PATCH] seccomp: remove unnecessary unlikely()
Igor Stoppa
- [PATCH] seccomp: remove unnecessary unlikely()
Kees Cook
- [PATCH] seccomp: remove unnecessary unlikely()
James Morris
- [PATCH] seccomp: remove unnecessary unlikely()
Kees Cook
- [PATCH] seccomp: remove unnecessary unlikely()
James Morris
- [PATCH] security: tomoyo: Fix obsolete function
Ding Xiang
- [PATCH] security: tomoyo: Fix obsolete function
Tetsuo Handa
- [PATCH] security: tomoyo: Fix obsolete function
James Morris
- [PATCH] selinux: refactor mls_context_to_sid() and make it stricter
Paul Moore
- [PATCH] tpm: fix response size validation in tpm_get_random()
Jarkko Sakkinen
- [PATCH] tpm: fix response size validation in tpm_get_random()
Jarkko Sakkinen
- [PATCH] tpm: fix response size validation in tpm_get_random()
Stefan Berger
- [PATCH] tpm: Make SECURITYFS a weak dependency
Peter Huewe
- [PATCH] tpm: Make SECURITYFS a weak dependency
Jarkko Sakkinen
- [PULL] Smack: Changes for 4.20
Casey Schaufler
- [PULL] Smack: Changes for 4.20
James Morris
- [RFC 00/12] Multi-Key Total Memory Encryption API (MKTME)
Alison Schofield
- [RFC 00/12] Multi-Key Total Memory Encryption API (MKTME)
Huang, Kai
- [RFC 00/12] Multi-Key Total Memory Encryption API (MKTME)
Sakkinen, Jarkko
- [RFC 00/12] Multi-Key Total Memory Encryption API (MKTME)
Alison Schofield
- [RFC 00/12] Multi-Key Total Memory Encryption API (MKTME)
Huang, Kai
- [RFC 01/12] docs/x86: Document the Multi-Key Total Memory Encryption API
Randy Dunlap
- [RFC 01/12] docs/x86: Document the Multi-Key Total Memory Encryption API
Huang, Kai
- [RFC 01/12] docs/x86: Document the Multi-Key Total Memory Encryption API
Sakkinen, Jarkko
- [RFC 01/12] docs/x86: Document the Multi-Key Total Memory Encryption API
Alison Schofield
- [RFC 01/12] docs/x86: Document the Multi-Key Total Memory Encryption API
Huang, Kai
- [RFC 01/12] docs/x86: Document the Multi-Key Total Memory Encryption API
Alison Schofield
- [RFC 01/12] docs/x86: Document the Multi-Key Total Memory Encryption API
Huang, Kai
- [RFC 01/12] docs/x86: Document the Multi-Key Total Memory Encryption API
Alison Schofield
- [RFC 01/12] docs/x86: Document the Multi-Key Total Memory Encryption API
Huang, Kai
- [RFC 02/12] mm: Generalize the mprotect implementation to support extensions
Jarkko Sakkinen
- [RFC 02/12] mm: Generalize the mprotect implementation to support extensions
Alison Schofield
- [RFC 02/12] mm: Generalize the mprotect implementation to support extensions
Alison Schofield
- [RFC 03/12] syscall/x86: Wire up a new system call for memory encryption keys
Alison Schofield
- [RFC 04/12] x86/mm: Add helper functions to manage memory encryption keys
Huang, Kai
- [RFC 04/12] x86/mm: Add helper functions to manage memory encryption keys
Huang, Kai
- [RFC 04/12] x86/mm: Add helper functions to manage memory encryption keys
Alison Schofield
- [RFC 04/12] x86/mm: Add helper functions to manage memory encryption keys
David Howells
- [RFC 04/12] x86/mm: Add helper functions to manage memory encryption keys
Alison Schofield
- [RFC 05/12] x86/mm: Add a helper function to set keyid bits in encrypted VMA's
Alison Schofield
- [RFC 05/12] x86/mm: Add a helper function to set keyid bits in encrypted VMA's
Sakkinen, Jarkko
- [RFC 06/12] mm: Add the encrypt_mprotect() system call
Jarkko Sakkinen
- [RFC 06/12] mm: Add the encrypt_mprotect() system call
Alison Schofield
- [RFC 07/12] x86/mm: Add helper functions to track encrypted VMA's
Alison Schofield
- [RFC 07/12] x86/mm: Add helper functions to track encrypted VMA's
Huang, Kai
- [RFC 08/12] mm: Track VMA's in use for each memory encryption keyid
Jarkko Sakkinen
- [RFC 08/12] mm: Track VMA's in use for each memory encryption keyid
Alison Schofield
- [RFC 08/12] mm: Track VMA's in use for each memory encryption keyid
Alison Schofield
- [RFC 09/12] mm: Restrict memory encryption to anonymous VMA's
Alison Schofield
- [RFC 09/12] mm: Restrict memory encryption to anonymous VMA's
Sakkinen, Jarkko
- [RFC 09/12] mm: Restrict memory encryption to anonymous VMA's
Dave Hansen
- [RFC 09/12] mm: Restrict memory encryption to anonymous VMA's
Jarkko Sakkinen
- [RFC 09/12] mm: Restrict memory encryption to anonymous VMA's
Dave Hansen
- [RFC 10/12] x86/pconfig: Program memory encryption keys on a system-wide basis
Alison Schofield
- [RFC 10/12] x86/pconfig: Program memory encryption keys on a system-wide basis
Huang, Kai
- [RFC 10/12] x86/pconfig: Program memory encryption keys on a system-wide basis
Sakkinen, Jarkko
- [RFC 10/12] x86/pconfig: Program memory encryption keys on a system-wide basis
Alison Schofield
- [RFC 10/12] x86/pconfig: Program memory encryption keys on a system-wide basis
Jarkko Sakkinen
- [RFC 11/12] keys/mktme: Add a new key service type for memory encryption keys
Alison Schofield
- [RFC 11/12] keys/mktme: Add a new key service type for memory encryption keys
Huang, Kai
- [RFC 11/12] keys/mktme: Add a new key service type for memory encryption keys
Alison Schofield
- [RFC 11/12] keys/mktme: Add a new key service type for memory encryption keys
David Howells
- [RFC 11/12] keys/mktme: Add a new key service type for memory encryption keys
Alison Schofield
- [RFC 11/12] keys/mktme: Add a new key service type for memory encryption keys
David Howells
- [RFC 11/12] keys/mktme: Add a new key service type for memory encryption keys
Alison Schofield
- [RFC 11/12] keys/mktme: Add a new key service type for memory encryption keys
Huang, Kai
- [RFC 11/12] keys/mktme: Add a new key service type for memory encryption keys
Huang, Kai
- [RFC 12/12] keys/mktme: Do not revoke in use memory encryption keys
David Howells
- [RFC 12/12] keys/mktme: Do not revoke in use memory encryption keys
Alison Schofield
- Compliment of the day to you Dear Friend.
Mrs. Amina Kadi
- Containers and checkpoint/restart micro-conference at LPC2018
Amir Goldstein
- Containers and checkpoint/restart micro-conference at LPC2018
Steve French
- EXTERNAL: [PATCH v2 2/3] tpm: modify tpm_pcr_read() definition to pass TPM hash algorithms
Roberto Sassu
- Fwd: Smack: wrong-looking capable() check in smk_ptrace_rule_check()
Lukasz Pawelczyk
- FYI: email change
Paul Moore
- general protection fault in __aa_lookupn_ns
syzbot
- general protection fault in __aa_lookupn_ns
Dmitry Vyukov
- general protection fault in __aa_lookupn_ns
Dmitry Vyukov
- general protection fault in integrity_inode_free
Dmitry Vyukov
- general protection fault in rb_erase
syzbot
- Hello Friend
Danny Chan
- INFO: rcu detected stall in pppol2tp_sendmsg
syzbot
- INVESTMENT!
John Rees
- KASAN: global-out-of-bounds Read in __aa_lookupn_ns
Dmitry Vyukov
- KASAN: global-out-of-bounds Read in __aa_lookupn_ns
Dmitry Vyukov
- KASAN: global-out-of-bounds Read in __aa_lookupn_ns
John Johansen
- KASAN: global-out-of-bounds Read in __aa_lookupn_ns
Dmitry Vyukov
- KASAN: stack-out-of-bounds Read in __aa_lookupn_ns
syzbot
- KMSAN: uninit-value in aa_fqlookupn_profile
syzbot
- Leaking path for search_binary_handler
Tong Zhang
- Leaking path for search_binary_handler
Stephen Smalley
- Leaking path for set_task_comm
Tong Zhang
- Leaking path for set_task_comm
Cyrill Gorcunov
- Leaking path for set_task_comm
TongZhang
- Leaking path for set_task_comm
Theodore Y. Ts'o
- Leaking path for set_task_comm
Alan Cox
- leaking path in android binder: set_nice
Tong Zhang
- leaking path in android binder: set_nice
Greg KH
- leaking path in android binder: set_nice
Stephen Smalley
- leaking path in android binder: set_nice
Theodore Y. Ts'o
- Leaking Path in XFS's ioctl interface(missing LSM check)
TongZhang
- Leaking Path in XFS's ioctl interface(missing LSM check)
Dave Chinner
- Leaking Path in XFS's ioctl interface(missing LSM check)
Stephen Smalley
- Leaking Path in XFS's ioctl interface(missing LSM check)
Alan Cox
- Leaking Path in XFS's ioctl interface(missing LSM check)
Dave Chinner
- Leaking Path in XFS's ioctl interface(missing LSM check)
Dave Chinner
- Leaking Path in XFS's ioctl interface(missing LSM check)
James Morris
- Leaking Path in XFS's ioctl interface(missing LSM check)
Dave Chinner
- Leaking Path in XFS's ioctl interface(missing LSM check)
Tetsuo Handa
- Leaking Path in XFS's ioctl interface(missing LSM check)
Alan Cox
- Leaking path or inconsistency LSM checking observed in fs/net
Tong Zhang
- Leaking path or inconsistency LSM checking observed in fs/net
Stephen Smalley
- Leaking path or inconsistency LSM checking observed in fs/net
TongZhang
- Leaking path or inconsistency LSM checking observed in fs/net
Stephen Smalley
- Naming confusion and code comments for security_kernel_(post_)read_file
TongZhang
- next-20180906 crashes during ubifs_mount (legacy fs_context)
Martin Kaiser
- next-20180906 crashes during ubifs_mount (legacy fs_context)
Tetsuo Handa
- next-general merged to v4.19-rc2
James Morris
- next-general merged to v4.19-rc2
Casey Schaufler
- Overlayfs @ Containers and checkpoint/restart micro-conference at LPC2018
Vivek Goyal
- Overlayfs @ Containers and checkpoint/restart micro-conference at LPC2018
James Bottomley
- Overlayfs @ Containers and checkpoint/restart micro-conference at LPC2018
Vivek Goyal
- Overlayfs @ Containers and checkpoint/restart micro-conference at LPC2018
Amir Goldstein
- possible deadlock in ext4_evict_inode
Dmitry Vyukov
- possible deadlock in start_this_handle
Jan Kara
- Smack: wrong-looking capable() check in smk_ptrace_rule_check()
Jann Horn
- WARNING in apparmor_secid_to_secctx
John Johansen
- WARNING in apparmor_secid_to_secctx
Dmitry Vyukov
- WARNING in apparmor_secid_to_secctx
John Johansen
- WARNING in apparmor_secid_to_secctx
Dmitry Vyukov
- WARNING in apparmor_secid_to_secctx
syzbot
- WARNING in apparmor_secid_to_secctx
Dmitry Vyukov
- WARNING in apparmor_secid_to_secctx
syzbot
- WARNING in apparmor_secid_to_secctx
Stephen Smalley
- WARNING in apparmor_secid_to_secctx
Russell Coker
- WARNING in apparmor_secid_to_secctx
Dmitry Vyukov
- WARNING in apparmor_secid_to_secctx
Dmitry Vyukov
- WARNING in apparmor_secid_to_secctx
Stephen Smalley
- WARNING in apparmor_secid_to_secctx
Dmitry Vyukov
- WARNING in apparmor_secid_to_secctx
Stephen Smalley
- WARNING in apparmor_secid_to_secctx
Paul Moore
- WARNING in apparmor_secid_to_secctx
Dmitry Vyukov
- WARNING in apparmor_secid_to_secctx
Kees Cook
- WARNING in apparmor_secid_to_secctx
Casey Schaufler
- WARNING in apparmor_secid_to_secctx
Dmitry Vyukov
- WARNING in apparmor_secid_to_secctx
Dmitry Vyukov
- WARNING in apparmor_secid_to_secctx
Dmitry Vyukov
Last message date:
Sun Sep 30 23:25:26 UTC 2018
Archived on: Wed Mar 6 19:45:27 UTC 2019
This archive was generated by
Pipermail 0.09 (Mailman edition).