August 2019 Archives by thread
Starting: Thu Aug 1 00:27:53 UTC 2019
Ending: Fri Aug 30 22:09:17 UTC 2019
Messages: 597
- [PATCH] fanotify, inotify, dnotify, security: add security hook for fs notifications
Paul Moore
- [PATCH] ima: Allow to import the blacklisted cert signed by secondary CA cert
Jia Zhang
- [RFC v2 0/6] Introduce TEE based Trusted Keys support
Janne Karhunen
- [RFC v2 0/6] Introduce TEE based Trusted Keys support
Janne Karhunen
- [PATCH] tomoyo: common: Fix potential Spectre v1 vulnerability
Tetsuo Handa
- [PATCH] tomoyo: Use error code from kern_path() rather than -ENOENT.
Tetsuo Handa
- [GIT PULL] SafeSetID MAINTAINERS file update for v5.3
Linus Torvalds
- [PATCH V37 04/29] Enforce module signatures if the kernel is locked down
Jessica Yu
- [RFC PATCH v2] security, capability: pass object information to security_capable
Aaron Goidel
- [PATCH V37 19/29] Lock down module params that specify hardware parameters (eg. ioport)
Jessica Yu
- [PATCH] KEYS: trusted: allow module init if TPM is inactive or deactivated
Jarkko Sakkinen
- [RFC PATCH v3 04/12] x86/sgx: Require userspace to define enclave pages' protection bits
Jarkko Sakkinen
- [PATCH bpf-next v10 10/10] landlock: Add user and kernel documentation for Landlock
Mickaël Salaün
- [RFC/RFT v2 1/2] KEYS: trusted: create trusted keys subsystem
Jarkko Sakkinen
- [PATCH bpf-next v10 06/10] bpf,landlock: Add a new map type: inode
Alexei Starovoitov
- Security labeling in NFS4 - who owns it?
Casey Schaufler
- [GIT PULL] SELinux fixes for v5.3 (#2)
Paul Moore
- [PATCH v2 bpf-next 1/4] bpf: unprivileged BPF access via /dev/bpf
Song Liu
- Thank-You - Demmler Machinery
sales at demmlermachinery.com
- [PATCH v2] KEYS: trusted: allow module init if TPM is inactive or deactivated
Roberto Sassu
- [PATCH] KEYS: trusted: allow module init if TPM is inactive or deactivated
Tyler Hicks
- [RFC v2 0/6] Introduce TEE based Trusted Keys support
Jarkko Sakkinen
- [RFC PATCH v1 1/5] fs: Add support for an O_MAYEXEC flag on sys_open()
Andy Lutomirski
- [PATCH] security/tomoyo: convert put_page() to put_user_page*()
john.hubbard at gmail.com
- [PATCH v12 01/11] MODSIGN: Export module signature definitions
Philipp Rudo
- [PATCH v3] KEYS: trusted: allow module init if TPM is inactive or deactivated
Roberto Sassu
- [WIP 0/4] bpf: A bit of progress toward unprivileged use
Andy Lutomirski
- [WIP 1/4] bpf: Respect persistent map and prog access modes
Andy Lutomirski
- [WIP 2/4] bpf: Don't require mknod() permission to pin an object
Andy Lutomirski
- [WIP 3/4] bpf: Add a way to mark functions as requiring privilege
Andy Lutomirski
- [WIP 4/4] bpf: Allow creating all program types without privilege
Andy Lutomirski
- [PATCH 02/10] vfs: syscall: Add move_mount(2) to move mounts around
Tetsuo Handa
- [RFC/RFT v3 0/3] KEYS: trusted: Add generic trusted keys framework
Sumit Garg
- [PATCH v3 37/41] security/tomoyo: convert put_page() to put_user_page*()
john.hubbard at gmail.com
- [PATCH 1/2] KEYS: Replace uid/gid/perm permissions checking with an ACL
Eric Biggers
- [PATCH v7 00/28] LSM: Module stacking for AppArmor
Casey Schaufler
- [PATCH v7 00/16] LSM: Full module stacking
Casey Schaufler
- [PATCH V38 00/29] security: Add support for locking down the kernel
Matthew Garrett
- [PATCH V38 01/29] security: Support early LSMs
Matthew Garrett
- [PATCH V38 02/29] security: Add a "locked down" LSM hook
Matthew Garrett
- [PATCH V38 03/29] security: Add a static lockdown policy LSM
Matthew Garrett
- [PATCH V38 04/29] Enforce module signatures if the kernel is locked down
Matthew Garrett
- [PATCH V38 05/29] Restrict /dev/{mem,kmem,port} when the kernel is locked down
Matthew Garrett
- [PATCH V38 06/29] kexec_load: Disable at runtime if the kernel is locked down
Matthew Garrett
- [PATCH V38 07/29] Copy secure_boot flag in boot params across kexec reboot
Matthew Garrett
- [PATCH V38 08/29] kexec_file: split KEXEC_VERIFY_SIG into KEXEC_SIG and KEXEC_SIG_FORCE
Matthew Garrett
- [PATCH V38 09/29] kexec_file: Restrict at runtime if the kernel is locked down
Matthew Garrett
- [PATCH V38 10/29] hibernate: Disable when the kernel is locked down
Matthew Garrett
- [PATCH V38 11/29] PCI: Lock down BAR access when the kernel is locked down
Matthew Garrett
- [PATCH V38 12/29] x86: Lock down IO port access when the kernel is locked down
Matthew Garrett
- [PATCH V38 13/29] x86/msr: Restrict MSR access when the kernel is locked down
Matthew Garrett
- [PATCH V38 14/29] ACPI: Limit access to custom_method when the kernel is locked down
Matthew Garrett
- [PATCH V38 15/29] acpi: Ignore acpi_rsdp kernel param when the kernel has been locked down
Matthew Garrett
- [PATCH V38 16/29] acpi: Disable ACPI table override if the kernel is locked down
Matthew Garrett
- [PATCH V38 17/29] Prohibit PCMCIA CIS storage when the kernel is locked down
Matthew Garrett
- [PATCH V38 18/29] Lock down TIOCSSERIAL
Matthew Garrett
- [PATCH V38 19/29] Lock down module params that specify hardware parameters (eg. ioport)
Matthew Garrett
- [PATCH V38 20/29] x86/mmiotrace: Lock down the testmmiotrace module
Matthew Garrett
- [PATCH V38 21/29] Lock down /proc/kcore
Matthew Garrett
- [PATCH V38 22/29] Lock down tracing and perf kprobes when in confidentiality mode
Matthew Garrett
- [PATCH V38 23/29] bpf: Restrict bpf when kernel lockdown is in confidentiality mode
Matthew Garrett
- [PATCH V38 24/29] Lock down perf when in confidentiality mode
Matthew Garrett
- [PATCH V38 25/29] kexec: Allow kexec_file() with appropriate IMA policy when locked down
Matthew Garrett
- [PATCH V38 26/29] debugfs: Restrict debugfs when the kernel is locked down
Matthew Garrett
- [PATCH V38 27/29] tracefs: Restrict tracefs when the kernel is locked down
Matthew Garrett
- [PATCH V38 28/29] efi: Restrict efivar_ssdt_load when the kernel is locked down
Matthew Garrett
- [PATCH V38 29/29] lockdown: Print current->comm in restriction messages
Matthew Garrett
- [PATCH] ima: Fix a use after free in ima_read_modsig()
Dan Carpenter
- [PATCH v13 2/5] Add flags option to get xattr method paired to __vfs_getxattr
Mark Salyzyn
- KASAN: use-after-free Read in tomoyo_socket_sendmsg_permission
syzbot
- [PATCH] fanotify, inotify, dnotify, security: add security hook for fs notifications
Paul Moore
- [PATCH] fanotify, inotify, dnotify, security: add security hook for fs notifications
Amir Goldstein
- [PATCH] fanotify, inotify, dnotify, security: add security hook for fs notifications
Paul Moore
- [Non-DoD Source] Re: [PATCH] fanotify, inotify, dnotify, security: add security hook for fs notifications
Aaron Goidel
- [Non-DoD Source] Re: [PATCH] fanotify, inotify, dnotify, security: add security hook for fs notifications
Amir Goldstein
- [PATCH] fanotify, inotify, dnotify, security: add security hook for fs notifications
Amir Goldstein
- [PATCH] fanotify, inotify, dnotify, security: add security hook for fs notifications
Paul Moore
- [PATCH] fanotify, inotify, dnotify, security: add security hook for fs notifications
Jan Kara
- [Non-DoD Source] Re: [PATCH] fanotify, inotify, dnotify, security: add security hook for fs notifications
Aaron Goidel
- [PATCH] fanotify, inotify, dnotify, security: add security hook for fs notifications
Paul Moore
- [Non-DoD Source] Re: [PATCH] fanotify, inotify, dnotify, security: add security hook for fs notifications
Aaron Goidel
- [Tee-dev] [RFC v2 2/6] tee: enable support to register kernel memory
Stuart Yoder
- [PATCH v2] tomoyo: Don't check open/getattr permission on sockets.
Tetsuo Handa
- [PATCH v2] fanotify, inotify, dnotify, security: add security hook for fs notifications
Aaron Goidel
- [security:next-lockdown 1/29] init/main.c:572:2: error: implicit declaration of function 'early_security_init'; did you mean 'security_init'?
kbuild test robot
- [PATCH] security: fix ptr_ret.cocci warnings
kbuild test robot
- [security:next-lockdown 3/29] security/lockdown/lockdown.c:157:1-3: WARNING: PTR_ERR_OR_ZERO can be used
kbuild test robot
- [security:next-lockdown 2/29] htmldocs: include/linux/lsm_hooks.h:1812: warning: Function parameter or member 'locked_down' not described in 'security_list_options'
kbuild test robot
- [security:next-lockdown 8/29] arch/s390/kernel/kexec_elf.c:134:3: error: 'const struct kexec_file_ops' has no member named 'verify_sig'
kbuild test robot
- [PATCH][next] ima: ima_modsig: Fix use-after-free bug in ima_read_modsig
Gustavo A. R. Silva
- WARNING in aa_sock_msg_perm
syzbot
- [PATCH v3] fanotify, inotify, dnotify, security: add security hook for fs notifications
Aaron Goidel
- [PATCH V37 27/29] tracefs: Restrict tracefs when the kernel is locked down
Marek Szyprowski
- [RFC/RFT v4 0/5] Add generic trusted keys framework/subsystem
Sumit Garg
- [PATCH] Add flags option to get xattr method paired to __vfs_getxattr
Mark Salyzyn
- [RFC PATCH v5 1/1] Add dm verity root hash pkcs7 sig validation.
Jaskaran Singh Khurana
- [PATCH 0/6] lockdown fixups
Matthew Garrett
- PLEASE CONFIRM PURCHASE ORDER
Mr NARESH KUMAR
- TODAY, Wed, Aug 14, 2019 I AM READY FOR COMING TO YOUR ADDRESS WITH THIS ATM CARD
MS. MARYANNA B. THOMASON
- [RFC PATCH] audit, security: allow LSMs to selectively enable audit collection
Aaron Goidel
- [RFC PATCH v3] security, capability: pass object information to security_capable
Aaron Goidel
- [GIT PULL] Keys: Set 4 - Key ACLs for 5.3
David Howells
- [WIP][RFC][PATCH 0/3] Introduce Infoflow LSM
Roberto Sassu
- [PATCH] keys: Fix description size
David Howells
- [PATCH V40 00/29] Add kernel lockdown functionality
Matthew Garrett
- [PATCH] tpm_tis: Fix interrupt probing
Stefan Berger
- [PATCH v5 0/4] Create and consolidate trusted keys subsystem
Sumit Garg
- [PATCH 1/2] rtnetlink: gate MAC address with an LSM hook
Jeff Vander Stoep
- [PATCH 2/2] selinux: use netlink_receive hook
Jeff Vander Stoep
- New skb extension for use by LSMs (skb "security blob")?
Paul Moore
- [PATCH] smack: use GFP_NOFS while holding inode_smack::smk_lock
Eric Biggers
- [PATCH v2] tomoyo: Don't check open/getattr permission on sockets.
Eric Biggers
- MY $25,000,000.00 INVESTMENT PROPOSAL WITH YOU AND IN YOUR COUNTRY.
Law firm(Eku and Associates)
- [PATCH v12 00/11] Appended signatures support for IMA appraisal
Jordan Hand
- [PATCH bpf-next] bpf, capabilities: introduce CAP_BPF
Andy Lutomirski
- [PATCH bpf-next] bpf, capabilities: introduce CAP_BPF
Steven Rostedt
- [PATCH bpf-next] bpf, capabilities: introduce CAP_BPF
Alexei Starovoitov
- [PATCH bpf-next] bpf, capabilities: introduce CAP_BPF
Andy Lutomirski
- [PATCH bpf-next] bpf, capabilities: introduce CAP_BPF
Andy Lutomirski
- [PATCH bpf-next] bpf, capabilities: introduce CAP_BPF
Alexei Starovoitov
- [PATCH bpf-next] bpf, capabilities: introduce CAP_BPF
Andy Lutomirski
- [PATCH bpf-next] bpf, capabilities: introduce CAP_BPF
Alexei Starovoitov
- [PATCH bpf-next] bpf, capabilities: introduce CAP_BPF
Andy Lutomirski
- [PATCH bpf-next] bpf, capabilities: introduce CAP_BPF
Alexei Starovoitov
- [PATCH bpf-next] bpf, capabilities: introduce CAP_BPF
Andy Lutomirski
- [PATCH bpf-next] bpf, capabilities: introduce CAP_BPF
Alexei Starovoitov
- [PATCH bpf-next] bpf, capabilities: introduce CAP_BPF
Andy Lutomirski
- [PATCH bpf-next] bpf, capabilities: introduce CAP_BPF
Andy Lutomirski
- [PATCH bpf-next] bpf, capabilities: introduce CAP_BPF
Alexei Starovoitov
- [PATCH bpf-next] bpf, capabilities: introduce CAP_BPF
Peter Zijlstra
- [PATCH] ima: use struct_size() in kzalloc()
Gustavo A. R. Silva
- [PATCH] ima: use struct_size() in kzalloc()
Mimi Zohar
- [PATCH] ima: ima_api: Use struct_size() in kzalloc()
Gustavo A. R. Silva
- [PATCH 00/11] Keyrings, Block and USB notifications [ver #6]
David Howells
- [PATCH] overlayfs: filter of trusted xattr results in audit.
Mark Salyzyn
- [PATCH v8 00/28] LSM: Module stacking for AppArmor
Casey Schaufler
- [PATCH v8 01/28] LSM: Infrastructure management of the superblock
Casey Schaufler
- [PATCH] tpm_tis_core: Set TPM_CHIP_FLAG_IRQ before probing for interrupts
Stefan Berger
- [PATCH 00/11] Keyrings, Block and USB notifications [ver #7]
David Howells
- [PATCH] keys: ensure that ->match_free() is called in request_key_and_link()
David Howells
- [PATCH 1/2] staging: comedi: Restrict COMEDI_DEVCONFIG when the kernel is locked down
Ian Abbott
- general protection fault in smack_socket_sendmsg
syzbot
Last message date:
Fri Aug 30 22:09:17 UTC 2019
Archived on: Fri Aug 30 22:19:30 UTC 2019
This archive was generated by
Pipermail 0.09 (Mailman edition).