February 2019 Archives by date
Starting: Fri Feb 1 00:08:12 UTC 2019
Ending: Thu Feb 28 23:55:34 UTC 2019
Messages: 891
- [PATCH v2 03/20] x86/mm: temporary mm struct
Borislav Petkov
- [PATCH v2 03/20] x86/mm: temporary mm struct
Nadav Amit
- [PATCH ghak107 V1] audit: remove unused actx param from audit_rule_match
Paul Moore
- Getting weird TPM error after rebasing my tree to security/next-general
Jarkko Sakkinen
- [PATCH v9 0/6] tpm: retrieve digest size of unknown algorithms from TPM
Roberto Sassu
- [PATCH v9 1/6] tpm: dynamically allocate the allocated_banks array
Roberto Sassu
- [PATCH v9 2/6] tpm: rename and export tpm2_digest and tpm2_algorithms
Roberto Sassu
- [PATCH v9 3/6] tpm: retrieve digest size of unknown algorithms with PCR read
Roberto Sassu
- [PATCH v9 4/6] tpm: move tpm_chip definition to include/linux/tpm.h
Roberto Sassu
- [PATCH v9 5/6] KEYS: trusted: explicitly use tpm_chip structure from tpm_default_chip()
Roberto Sassu
- [PATCH v9 6/6] tpm: pass an array of tpm_extend_digest structures to tpm_pcr_extend()
Roberto Sassu
- WARNING in apparmor_secid_to_secctx
Dmitry Vyukov
- WARNING in apparmor_secid_to_secctx
Dmitry Vyukov
- WARNING in apparmor_secid_to_secctx
Tetsuo Handa
- WARNING in apparmor_secid_to_secctx
Dmitry Vyukov
- [PATCH] tpm/tpm_crb: Avoid unaligned reads in crb_recv():
Jarkko Sakkinen
- Getting weird TPM error after rebasing my tree to security/next-general
Jarkko Sakkinen
- [PATCH] LSM: Allow syzbot to ignore security= parameter.
Tetsuo Handa
- [PATCH ghak107 V1] audit: remove unused actx param from audit_rule_match
Richard Guy Briggs
- [PATCH v9 1/6] tpm: dynamically allocate the allocated_banks array
Jarkko Sakkinen
- [PATCH v9 2/6] tpm: rename and export tpm2_digest and tpm2_algorithms
Jarkko Sakkinen
- [PATCH v9 4/6] tpm: move tpm_chip definition to include/linux/tpm.h
Jarkko Sakkinen
- [PATCH v9 5/6] KEYS: trusted: explicitly use tpm_chip structure from tpm_default_chip()
Jarkko Sakkinen
- [PATCH v9 6/6] tpm: pass an array of tpm_extend_digest structures to tpm_pcr_extend()
Jarkko Sakkinen
- [PATCH v9 6/6] tpm: pass an array of tpm_extend_digest structures to tpm_pcr_extend()
Jarkko Sakkinen
- [PATCH v9 6/6] tpm: pass an array of tpm_extend_digest structures to tpm_pcr_extend()
Mimi Zohar
- [PATCH v9 6/6] tpm: pass an array of tpm_extend_digest structures to tpm_pcr_extend()
Jarkko Sakkinen
- [PATCH] tpm/st33zp24: Fix name collision with TPM_BUFSIZE
Jarkko Sakkinen
- [PATCH v9 6/6] tpm: pass an array of tpm_extend_digest structures to tpm_pcr_extend()
Jarkko Sakkinen
- [PATCH] tpm/tpm_crb: Avoid unaligned reads in crb_recv():
Linus Torvalds
- [PATCH] selftests: add TPM 2.0 tests
Jarkko Sakkinen
- Getting weird TPM error after rebasing my tree to security/next-general
Linus Torvalds
- [PATCH] tpm/tpm_crb: Avoid unaligned reads in crb_recv():
Jerry Snitselaar
- [PATCH v9 6/6] tpm: pass an array of tpm_extend_digest structures to tpm_pcr_extend()
Mimi Zohar
- [PATCH] tpm/tpm_crb: Avoid unaligned reads in crb_recv():
Winkler, Tomas
- Basic all-cap/all-lower case question on Environment variables
J Freyensee
- [PATCH] security: mark expected switch fall-throughs
James Morris
- Message
PBC Eastgate
- Basic all-cap/all-lower case question on Environment variables
Tetsuo Handa
- Do the work
Grace
- [PATCH 1/3] selftest/ima: cleanup the kexec selftest
Petr Vorel
- [PATCH 2/3] scripts/ima: define a set of common functions
Petr Vorel
- [PATCH 3/3] selftests/ima: kexec_file_load syscall test
Petr Vorel
- [PATCH] selftests: add TPM 2.0 tests
Petr Vorel
- [PATCH] tpm/st33zp24: Fix name collision with TPM_BUFSIZE
Mimi Zohar
- [PATCH] LSM: Allow syzbot to ignore security= parameter.
Dmitry Vyukov
- [PATCH v9 4/6] tpm: move tpm_chip definition to include/linux/tpm.h
kbuild test robot
- [PATCH v9 6/6] tpm: pass an array of tpm_extend_digest structures to tpm_pcr_extend()
Roberto Sassu
- [PATCH v3 5/5] kernfs: initialize security of newly created nodes
Ondrej Mosnacek
- [PATCH] tpm/tpm_crb: Avoid unaligned reads in crb_recv():
Jarkko Sakkinen
- [PATCH] tpm/tpm_crb: Avoid unaligned reads in crb_recv():
Jarkko Sakkinen
- Getting weird TPM error after rebasing my tree to security/next-general
Jarkko Sakkinen
- [PATCH] selftests: add TPM 2.0 tests
Jarkko Sakkinen
- [PATCH] tpm/st33zp24: Fix name collision with TPM_BUFSIZE
Jarkko Sakkinen
- [PATCH v9 6/6] tpm: pass an array of tpm_extend_digest structures to tpm_pcr_extend()
Jarkko Sakkinen
- [PATCH] tpm/tpm_crb: Avoid unaligned reads in crb_recv():
David Laight
- [PATCH v9 6/6] tpm: pass an array of tpm_extend_digest structures to tpm_pcr_extend()
Mimi Zohar
- [PATCH v3] selftests: add TPM 2.0 tests
Jarkko Sakkinen
- [PATCH v9 6/6] tpm: pass an array of tpm_extend_digest structures to tpm_pcr_extend()
Roberto Sassu
- [PATCH v2] tpm/st33zp24: Fix the name collisions in tpm_st33zp24_spi and tpm_i2c_infineon
Jarkko Sakkinen
- [PATCH 3/3] selftests/ima: kexec_file_load syscall test
Mimi Zohar
- [PATCH v2] tpm/st33zp24: Fix the name collisions in tpm_st33zp24_spi and tpm_i2c_infineon
Roberto Sassu
- [PATCH v2] tpm/tpm_crb: Avoid unaligned reads in crb_recv()
Jarkko Sakkinen
- [PATCH v2 03/20] x86/mm: temporary mm struct
Borislav Petkov
- [PATCH v2] tpm/tpm_crb: Avoid unaligned reads in crb_recv()
David Laight
- [PATCH] x86/ima: require signed kernel modules
Luis Chamberlain
- [PATCH] x86/ima: require signed kernel modules
Mimi Zohar
- [PATCH v2] tpm/tpm_crb: Avoid unaligned reads in crb_recv()
Winkler, Tomas
- [PATCH] x86/ima: require signed kernel modules
Luis Chamberlain
- [PATCH v2] tpm/tpm_crb: Avoid unaligned reads in crb_recv()
Jarkko Sakkinen
- [PATCH v2] tpm/tpm_crb: Avoid unaligned reads in crb_recv()
Jarkko Sakkinen
- [PATCH v9 6/6] tpm: pass an array of tpm_extend_digest structures to tpm_pcr_extend()
Jarkko Sakkinen
- [PATCH v3] selftests: add TPM 2.0 tests
Jarkko Sakkinen
- [PATCH v9 6/6] tpm: pass an array of tpm_extend_digest structures to tpm_pcr_extend()
Jarkko Sakkinen
- [PATCH v2] tpm/st33zp24: Fix the name collisions in tpm_st33zp24_spi and tpm_i2c_infineon
Jarkko Sakkinen
- [PATCH v2] tpm/st33zp24: Fix the name collisions in tpm_st33zp24_spi and tpm_i2c_infineon
Jarkko Sakkinen
- [PATCH v2] tpm/st33zp24: Fix the name collisions in tpm_st33zp24_spi and tpm_i2c_infineon
kbuild test robot
- [PATCH v2] tpm/st33zp24: Fix the name collisions in tpm_st33zp24_spi and tpm_i2c_infineon
Roberto Sassu
- [PATCH v2] tpm/st33zp24: Fix the name collisions in tpm_st33zp24_spi and tpm_i2c_infineon
kbuild test robot
- [PATCH v2] tpm/st33zp24: Fix the name collisions in tpm_st33zp24_spi and tpm_i2c_infineon
Jarkko Sakkinen
- [PATCH v2 04/20] fork: provide a function for copying init_mm
Borislav Petkov
- [PATCH v4 0/5] Allow initializing the kernfs node's secctx based on its parent
Ondrej Mosnacek
- [PATCH v4 1/5] selinux: try security xattr after genfs for kernfs filesystems
Ondrej Mosnacek
- [PATCH v4 2/5] kernfs: use simple_xattrs for security attributes
Ondrej Mosnacek
- [PATCH v4 3/5] LSM: add new hook for kernfs node initialization
Ondrej Mosnacek
- [PATCH v4 4/5] selinux: implement the kernfs_init_security hook
Ondrej Mosnacek
- [PATCH v4 5/5] kernfs: initialize security of newly created nodes
Ondrej Mosnacek
- [PATCH v2 04/20] fork: provide a function for copying init_mm
Nadav Amit
- [PATCH v3] tpm: Fix some name collisions with drivers/char/tpm.h
Jarkko Sakkinen
- [PATCH v2 05/20] x86/alternative: initializing temporary mm for patching
Borislav Petkov
- [PATCH v4 3/5] LSM: add new hook for kernfs node initialization
kbuild test robot
- [PATCH v2 06/20] x86/alternative: use temporary mm for text poking
Borislav Petkov
- [PATCH v9 6/6] tpm: pass an array of tpm_extend_digest structures to tpm_pcr_extend()
Roberto Sassu
- [PATCH v3] selftests: add TPM 2.0 tests
Jarkko Sakkinen
- [PATCH v3] selftests: add TPM 2.0 tests
Jarkko Sakkinen
- [PATCH v4 5/5] kernfs: initialize security of newly created nodes
kbuild test robot
- [PATCH v4 3/5] LSM: add new hook for kernfs node initialization
kbuild test robot
- [PATCH] tpm/tpm_crb: Avoid unaligned reads in crb_recv():
Jarkko Sakkinen
- [PATCH] tpm/tpm_crb: Avoid unaligned reads in crb_recv():
Jarkko Sakkinen
- [PATCH] tpm/tpm_crb: Avoid unaligned reads in crb_recv():
Jarkko Sakkinen
- [PATCH v3] tpm/tpm_crb: Avoid unaligned reads in crb_recv()
Jarkko Sakkinen
- [PATCH v5 0/5] Allow initializing the kernfs node's secctx based on its parent
Ondrej Mosnacek
- [PATCH v5 1/5] selinux: try security xattr after genfs for kernfs filesystems
Ondrej Mosnacek
- [PATCH v5 2/5] kernfs: use simple_xattrs for security attributes
Ondrej Mosnacek
- [PATCH v5 3/5] LSM: add new hook for kernfs node initialization
Ondrej Mosnacek
- [PATCH v5 4/5] selinux: implement the kernfs_init_security hook
Ondrej Mosnacek
- [PATCH v5 5/5] kernfs: initialize security of newly created nodes
Ondrej Mosnacek
- [PATCH v3] tpm/tpm_crb: Avoid unaligned reads in crb_recv()
Winkler, Tomas
- [PATCH v4 3/5] LSM: add new hook for kernfs node initialization
Ondrej Mosnacek
- [PATCH v2 06/20] x86/alternative: use temporary mm for text poking
Peter Zijlstra
- [PATCH] x86/ima: require signed kernel modules
Mimi Zohar
- [PATCH v2 06/20] x86/alternative: use temporary mm for text poking
Borislav Petkov
- [PATCH v2 06/20] x86/alternative: use temporary mm for text poking
Peter Zijlstra
- [PATCH v2 06/20] x86/alternative: use temporary mm for text poking
Peter Zijlstra
- [PATCH v5 1/5] selinux: try security xattr after genfs for kernfs filesystems
Stephen Smalley
- [PATCH v3] tpm/tpm_crb: Avoid unaligned reads in crb_recv()
Jarkko Sakkinen
- [PATCH v5 1/5] selinux: try security xattr after genfs for kernfs filesystems
Ondrej Mosnacek
- [PATCH v3] tpm/tpm_crb: Avoid unaligned reads in crb_recv()
Winkler, Tomas
- [PATCH] x86/ima: require signed kernel modules
Seth Forshee
- [PATCH] x86/ima: require signed kernel modules
Nayna
- [PATCH] x86/ima: require signed kernel modules
Mimi Zohar
- New LSM hooks
Casey Schaufler
- [PATCH v2 06/20] x86/alternative: use temporary mm for text poking
Nadav Amit
- New LSM hooks
Paul Moore
- New LSM hooks
Edwin Zimmerman
- [PATCH] x86/ima: require signed kernel modules
Seth Forshee
- [PATCH] x86/ima: require signed kernel modules
Mimi Zohar
- New LSM hooks
Casey Schaufler
- [PATCH v2] tpm/st33zp24: Fix the name collisions in tpm_st33zp24_spi and tpm_i2c_infineon
James Bottomley
- New LSM hooks
Paul Moore
- New LSM hooks
Casey Schaufler
- New LSM hooks
Edwin Zimmerman
- [PATCH v3] selftests: add TPM 2.0 tests
James Morris
- [PATCH 1/2] selftests: tpm2: Open tpm dev in unbuffered mode
Tadeusz Struk
- [PATCH 2/2] selftests: tpm2: Extend tests to cover partial reads
Tadeusz Struk
- [PATCH v3] tpm/tpm_crb: Avoid unaligned reads in crb_recv()
Jarkko Sakkinen
- [PATCH v3] selftests: add TPM 2.0 tests
Jarkko Sakkinen
- [PATCH v2] tpm/st33zp24: Fix the name collisions in tpm_st33zp24_spi and tpm_i2c_infineon
Jarkko Sakkinen
- [PATCH] x86/ima: require signed kernel modules
Luis Chamberlain
- [PATCH v4] tpm: remove @flags from tpm_transmit()
Jarkko Sakkinen
- [PATCH v11 00/16] Remove nested TPM operations
Jarkko Sakkinen
- [PATCH v11 01/16] tpm: use tpm_buf in tpm_transmit_cmd() as the IO parameter
Jarkko Sakkinen
- [PATCH v11 02/16] tpm: fix invalid return value in pubek_show()
Jarkko Sakkinen
- [PATCH v11 03/16] tpm: return 0 from pcrs_show() when tpm1_pcr_read() fails
Jarkko Sakkinen
- [PATCH v11 04/16] tpm: print tpm2_commit_space() error inside tpm2_commit_space()
Jarkko Sakkinen
- [PATCH v11 05/16] tpm: declare struct tpm_header
Jarkko Sakkinen
- [PATCH v11 06/16] tpm: access command header through struct in tpm_try_transmit()
Jarkko Sakkinen
- [PATCH v11 07/16] tpm: encapsulate tpm_dev_transmit()
Jarkko Sakkinen
- [PATCH v11 08/16] tpm: clean up tpm_try_transmit() error handling flow
Jarkko Sakkinen
- [PATCH v11 09/16] tpm: move tpm_validate_commmand() to tpm2-space.c
Jarkko Sakkinen
- [PATCH v11 10/16] tpm: move TPM space code out of tpm_transmit()
Jarkko Sakkinen
- [PATCH v11 11/16] tpm: remove @space from tpm_transmit()
Jarkko Sakkinen
- [PATCH v11 12/16] tpm: use tpm_try_get_ops() in tpm-sysfs.c.
Jarkko Sakkinen
- [PATCH v11 13/16] tpm: remove TPM_TRANSMIT_UNLOCKED flag
Jarkko Sakkinen
- [PATCH v11 14/16] tpm: introduce tpm_chip_start() and tpm_chip_stop()
Jarkko Sakkinen
- [PATCH v11 15/16] tpm: take TPM chip power gating out of tpm_transmit()
Jarkko Sakkinen
- [PATCH v11 16/16] tpm: remove @flags from tpm_transmit()
Jarkko Sakkinen
- [PATCH] x86/ima: require signed kernel modules
Mimi Zohar
- New LSM hooks
Paul Moore
- New LSM hooks
James Morris
- [PATCH] LSM: Allow syzbot to ignore security= parameter.
Tetsuo Handa
- [PATCH v10 0/6] tpm: retrieve digest size of unknown algorithms from TPM
Roberto Sassu
- [PATCH v10 1/6] tpm: dynamically allocate the allocated_banks array
Roberto Sassu
- [PATCH v10 2/6] tpm: rename and export tpm2_digest and tpm2_algorithms
Roberto Sassu
- [PATCH v10 3/6] tpm: retrieve digest size of unknown algorithms with PCR read
Roberto Sassu
- [PATCH v10 4/6] tpm: move tpm_chip definition to include/linux/tpm.h
Roberto Sassu
- [PATCH v10 5/6] KEYS: trusted: explicitly use tpm_chip structure from tpm_default_chip()
Roberto Sassu
- [PATCH v10 6/6] tpm: pass an array of tpm_extend_digest structures to tpm_pcr_extend()
Roberto Sassu
- [PATCH v11 00/16] Remove nested TPM operations
Jarkko Sakkinen
- [PATCH v4] tpm: remove @flags from tpm_transmit()
Jarkko Sakkinen
- [PATCH v3] tpm/tpm_crb: Avoid unaligned reads in crb_recv()
Jarkko Sakkinen
- [PATCH v3] tpm/tpm_crb: Avoid unaligned reads in crb_recv()
Winkler, Tomas
- [PATCH v10 0/6] tpm: retrieve digest size of unknown algorithms from TPM
Jarkko Sakkinen
- [PATCH v10 0/6] tpm: retrieve digest size of unknown algorithms from TPM
Roberto Sassu
- [PATCH v3] tpm/tpm_crb: Avoid unaligned reads in crb_recv()
Jarkko Sakkinen
- New LSM hooks
Stephen Smalley
- [PATCH v10 0/6] tpm: retrieve digest size of unknown algorithms from TPM
Jarkko Sakkinen
- [PATCH v10 0/6] tpm: retrieve digest size of unknown algorithms from TPM
Roberto Sassu
- [PATCH v10 0/6] tpm: retrieve digest size of unknown algorithms from TPM
Jarkko Sakkinen
- [PATCH v10 0/6] tpm: retrieve digest size of unknown algorithms from TPM
Roberto Sassu
- [PATCH 08/17] x86/ftrace: set trampoline pages as executable
Steven Rostedt
- [PATCH 16/17] Plug in new special vfree flag
Steven Rostedt
- [PATCH v10, RESEND 0/6] tpm: retrieve digest size of unknown algorithms from TPM
Roberto Sassu
- [PATCH v10, RESEND 1/6] tpm: dynamically allocate the allocated_banks array
Roberto Sassu
- [PATCH v10, RESEND 2/6] tpm: rename and export tpm2_digest and tpm2_algorithms
Roberto Sassu
- [PATCH v10, RESEND 3/6] tpm: retrieve digest size of unknown algorithms with PCR read
Roberto Sassu
- [PATCH v10, RESEND 4/6] tpm: move tpm_chip definition to include/linux/tpm.h
Roberto Sassu
- [PATCH v10, RESEND 5/6] KEYS: trusted: explicitly use tpm_chip structure from tpm_default_chip()
Roberto Sassu
- [PATCH v10, RESEND 6/6] tpm: pass an array of tpm_extend_digest structures to tpm_pcr_extend()
Roberto Sassu
- New LSM hooks
Casey Schaufler
- [PATCH] LSM: Allow syzbot to ignore security= parameter.
Casey Schaufler
- New LSM hooks
Stephen Smalley
- [PATCH v10 0/6] tpm: retrieve digest size of unknown algorithms from TPM
Jarkko Sakkinen
- New LSM hooks
Casey Schaufler
- [PATCH 08/17] x86/ftrace: set trampoline pages as executable
Nadav Amit
- [PATCH 08/17] x86/ftrace: set trampoline pages as executable
Steven Rostedt
- New LSM hooks
Casey Schaufler
- New LSM hooks
Stephen Smalley
- New LSM hooks
Stephen Smalley
- New LSM hooks
Casey Schaufler
- [PATCH] LSM: SafeSetID: add selftest
mortonm at chromium.org
- [PATCH] LSM: SafeSetID: add selftest
Edwin Zimmerman
- [PATCH] security: keys: add NULL checking for key->type->instantiate
David Howells
- [PATCH] LSM: Allow syzbot to ignore security= parameter.
Tetsuo Handa
- [PATCH v10 0/6] tpm: retrieve digest size of unknown algorithms from TPM
Roberto Sassu
- [PATCH 00/10] LSM documentation update
Denis Efremov
- [PATCH 01/10] security: fix documentation for the sb_copy_data hook
Denis Efremov
- [PATCH 02/10] security: fix documentation for the syslog hook
Denis Efremov
- [PATCH 03/10] security: fix documentation for the socket_post_create hook
Denis Efremov
- [PATCH 04/10] security: fix documentation for the task_setscheduler hook
Denis Efremov
- [PATCH 05/10] security: fix documentation for the socket_getpeersec_dgram hook
Denis Efremov
- [PATCH 06/10] security: fix documentation for the path_chmod hook
Denis Efremov
- [PATCH 07/10] security: fix documentation for the audit_* hooks
Denis Efremov
- [PATCH 08/10] security: fix documentation for the msg_queue_* hooks
Denis Efremov
- [PATCH 09/10] security: fix documentation for the sem_* hooks
Denis Efremov
- [PATCH 10/10] security: fix documentation for the shm_* hooks
Denis Efremov
- [PATCH 06/10] security: fix documentation for the path_chmod hook
Al Viro
- [PATCH 06/10] security: fix documentation for the path_chmod hook
Edwin Zimmerman
- [PATCH 06/10] security: fix documentation for the path_chmod hook
Stephen Smalley
- [PATCH 06/10] security: fix documentation for the path_chmod hook
Al Viro
- [PATCH 06/10] security: fix documentation for the path_chmod hook
Stephen Smalley
- [PATCH] LSM: Allow syzbot to ignore security= parameter.
Casey Schaufler
- [PATCH 16/17] Plug in new special vfree flag
Edgecombe, Rick P
- [PATCH 16/17] Plug in new special vfree flag
Steven Rostedt
- [PATCH 16/17] Plug in new special vfree flag
Edgecombe, Rick P
- [PATCH v11 00/16] Remove nested TPM operations
Alexander Steffen
- [PATCH v11 00/16] Remove nested TPM operations
Stefan Berger
- [PATCH v11 00/16] Remove nested TPM operations
Jarkko Sakkinen
- [PATCH] LSM: SafeSetID: add selftest
Micah Morton
- [PATCH v11 00/16] Remove nested TPM operations
Stefan Berger
- [PATCH v11 15/16] tpm: take TPM chip power gating out of tpm_transmit()
Stefan Berger
- [PATCH v2] KEYS: always initialize keyring_index_key::desc_len
Eric Biggers
- [PATCH RESEND] KEYS: remove CONFIG_KEYS_COMPAT
Eric Biggers
- [PATCH v11 08/16] tpm: clean up tpm_try_transmit() error handling flow
Stefan Berger
- [PATCH v11 15/16] tpm: take TPM chip power gating out of tpm_transmit()
Jerry Snitselaar
- [PATCH v11 00/16] Remove nested TPM operations
Jarkko Sakkinen
- [PATCH v11 00/16] Remove nested TPM operations
Stefan Berger
- [PATCH v11 00/16] Remove nested TPM operations
Stefan Berger
- [PATCH v10, RESEND 4/6] tpm: move tpm_chip definition to include/linux/tpm.h
Nathan Chancellor
- [PATCH v10, RESEND 4/6] tpm: move tpm_chip definition to include/linux/tpm.h
Roberto Sassu
- [PATCH] LSM: Allow syzbot to ignore security= parameter.
Tetsuo Handa
- [PATCH v11 00/16] Remove nested TPM operations
Jarkko Sakkinen
- [PATCH v11 00/16] Remove nested TPM operations
Jarkko Sakkinen
- [PATCH v11 00/16] Remove nested TPM operations
Stefan Berger
- [PATCH v11 00/16] Remove nested TPM operations
Stefan Berger
- [PATCH v11 00/16] Remove nested TPM operations
Jarkko Sakkinen
- [PATCH v11 00/16] Remove nested TPM operations
Stefan Berger
- [PATCH v11 00/16] Remove nested TPM operations
Jarkko Sakkinen
- [PATCH v11 00/16] Remove nested TPM operations
Jarkko Sakkinen
- [PATCH v11 00/16] Remove nested TPM operations
Alexander Steffen
- [PATCH v11 00/16] Remove nested TPM operations
Jarkko Sakkinen
- [PATCH v11 00/16] Remove nested TPM operations
Stefan Berger
- [PATCH 0/2] Unify send() callbacks
Jarkko Sakkinen
- [PATCH 1/2] tpm: Unify the send callback behaviour
Jarkko Sakkinen
- [PATCH 2/2] tpm/tpm_i2c_atmel: Return -E2BIG when the transfer is incomplete
Jarkko Sakkinen
- [PATCH v11 00/16] Remove nested TPM operations
Jarkko Sakkinen
- [PATCH v11 00/16] Remove nested TPM operations
Jarkko Sakkinen
- [PATCH 1/2] tpm: Unify the send callback behaviour
Stefan Berger
- [PATCH 1/2] tpm: Unify the send callback behaviour
Jarkko Sakkinen
- [PATCH 1/2] tpm: Unify the send callback behaviour
Stefan Berger
- [PATCH v2 0/2] tpm: Unify send() callbacks
Jarkko Sakkinen
- [PATCH v2 1/2] tpm: Unify the send callback behaviour
Jarkko Sakkinen
- [PATCH v2 2/2] tpm/tpm_i2c_atmel: Return -E2BIG when the transfer is incomplete
Jarkko Sakkinen
- [PATCH 1/2] tpm: Unify the send callback behaviour
Jarkko Sakkinen
- [PATCH v2 0/2] tpm: Unify send() callbacks
Stefan Berger
- [PATCH v10, RESEND 4/6] tpm: move tpm_chip definition to include/linux/tpm.h
Nathan Chancellor
- [PATCH 1/2] tpm: Unify the send callback behaviour
Stefan Berger
- [PATCH v2 0/2] tpm: Unify send() callbacks
Jarkko Sakkinen
- [PATCH] LSM: Allow syzbot to ignore security= parameter.
Casey Schaufler
- [PATCH 1/2] tpm: Unify the send callback behaviour
Jarkko Sakkinen
- [PATCH 1/2] tpm: Unify the send callback behaviour
Jarkko Sakkinen
- [PATCH v3 0/2] tpm: Unify send() callbacks
Jarkko Sakkinen
- [PATCH v3 1/2] tpm: Unify the send callback behaviour
Jarkko Sakkinen
- [PATCH v3 2/2] tpm/tpm_i2c_atmel: Return -E2BIG when the transfer is incomplete
Jarkko Sakkinen
- [PATCH v3 1/2] tpm: Unify the send callback behaviour
Stefan Berger
- [PATCH v10, RESEND 4/6] tpm: move tpm_chip definition to include/linux/tpm.h
Roberto Sassu
- [PATCH v3 2/2] tpm/tpm_i2c_atmel: Return -E2BIG when the transfer is incomplete
Stefan Berger
- [PATCH v3 1/2] tpm: Unify the send callback behaviour
Stefan Berger
- [PATCH v3 1/2] tpm: Unify the send callback behaviour
Jarkko Sakkinen
- [PATCH v11 00/16] Remove nested TPM operations
Alexander Steffen
- [PATCH v4 0/2] tpm: Unify send() callbacks
Jarkko Sakkinen
- [PATCH v4 1/2] tpm: Unify the send callback behaviour
Jarkko Sakkinen
- [PATCH v4 2/2] tpm/tpm_i2c_atmel: Return -E2BIG when the transfer is incomplete
Jarkko Sakkinen
- [PATCH v4 1/2] tpm: Unify the send callback behaviour
Stefan Berger
- [PATCH v4 1/2] tpm: Unify the send callback behaviour
Jarkko Sakkinen
- [PATCH v4 1/2] tpm: Unify the send callback behaviourä
Jarkko Sakkinen
- [PATCH] x86/ima: require signed kernel modules
Seth Forshee
- Re: [PATCH v4 1/2] tpm: Unify the send callback behaviourä
Stefan Berger
- [PATCH v4 1/2] tpm: Unify the send callback behaviourä
Jarkko Sakkinen
- Re: [PATCH v4 1/2] tpm: Unify the send callback behaviourä
Stefan Berger
- [PATCH v4 1/2] tpm: Unify the send callback behaviourä
Jarkko Sakkinen
- [PATCH v4 1/2] tpm: Unify the send callback behaviourä
Jarkko Sakkinen
- [PATCH v2] security: mark expected switch fall-throughs and add a missing break
Gustavo A. R. Silva
- [PATCH v2] security: mark expected switch fall-throughs and add a missing break
Mimi Zohar
- Re: [PATCH v4 1/2] tpm: Unify the send callback behaviourä
Stefan Berger
- [PATCH 0/5] Extend TPM PPI interface to support revision 1.3
Stefan Berger
- [PATCH] LSM: Allow syzbot to ignore security= parameter.
Kees Cook
- [PATCH] LSM: Allow syzbot to ignore security= parameter.
Kees Cook
- [PATCH v4 1/2] tpm: Unify the send callback behaviourä
Jarkko Sakkinen
- [PATCH 0/5] Extend TPM PPI interface to support revision 1.3
Jarkko Sakkinen
- [PATCH 0/5] Extend TPM PPI interface to support revision 1.3
Stefan Berger
- [PATCH] LSM: Allow syzbot to ignore security= parameter.
Tetsuo Handa
- [PATCH] LSM: Allow syzbot to ignore security= parameter.
Tetsuo Handa
- [PATCH v4 1/2] tpm: Unify the send callback behaviour
Jerry Snitselaar
- [PATCH v4 1/2] tpm: Unify the send callback behaviour
Jerry Snitselaar
- [PATCH v4 0/2] tpm: Unify send() callbacks
Jerry Snitselaar
- [PATCH] x86/ima: require signed kernel modules
Mimi Zohar
- [PATCH v2 05/20] x86/alternative: initializing temporary mm for patching
Nadav Amit
- [PATCH v2 05/20] x86/alternative: initializing temporary mm for patching
Andy Lutomirski
- [PATCH v5 0/5] Allow initializing the kernfs node's secctx based on its parent
Ondrej Mosnacek
- [PATCH v4 1/2] tpm: Unify the send callback behaviour
Jarkko Sakkinen
- [PATCH v4 0/2] tpm: Unify send() callbacks
Jarkko Sakkinen
- [PATCH v4 1/2] tpm: Unify the send callback behaviour
Alexander Steffen
- [PATCH] x86/ima: require signed kernel modules
Jessica Yu
- [PATCH] x86/ima: require signed kernel modules
Mimi Zohar
- [PATCH 2/2] selftests: tpm2: Extend tests to cover partial reads
Jarkko Sakkinen
- [PATCH] RFC: user-mode extensible trusted key support
janne.karhunen at gmail.com
- [PATCH 2/2] selftests: tpm2: Extend tests to cover partial reads
Tadeusz Struk
- [PATCH v2 05/20] x86/alternative: initializing temporary mm for patching
Nadav Amit
- [PATCH v2 09/20] x86/kprobes: instruction pages initialization enhancements
Borislav Petkov
- [PATCH v2 10/20] x86: avoid W^X being broken during modules loading
Borislav Petkov
- [PATCH v2] [PATCH] KEYS: trusted: fix -Wvarags warning
Nick Desaulniers
- [PATCH v2 11/20] x86/jump-label: remove support for custom poker
Borislav Petkov
- [PATCH v2 10/20] x86: avoid W^X being broken during modules loading
Nadav Amit
- [PATCH v2 10/20] x86: avoid W^X being broken during modules loading
Borislav Petkov
- [PATCH v2 05/20] x86/alternative: initializing temporary mm for patching
Andy Lutomirski
- [PATCH v2 13/20] Add set_alias_ function and x86 implementation
Borislav Petkov
- [PATCH v2 10/20] x86: avoid W^X being broken during modules loading
Nadav Amit
- [PATCH v2 10/20] x86: avoid W^X being broken during modules loading
Borislav Petkov
- [PATCH v2 05/20] x86/alternative: initializing temporary mm for patching
Nadav Amit
- [PATCH v2 10/20] x86: avoid W^X being broken during modules loading
Nadav Amit
- [PATCH v2 13/20] Add set_alias_ function and x86 implementation
Edgecombe, Rick P
- [PATCH 00/10] LSM documentation update
Kees Cook
- [PATCH v2 09/20] x86/kprobes: instruction pages initialization enhancements
Nadav Amit
- [PATCH v2 10/20] x86: avoid W^X being broken during modules loading
Borislav Petkov
- [PATCH v2 10/20] x86: avoid W^X being broken during modules loading
Nadav Amit
- Kernel memory corruption in CIPSO labeled TCP packets processing.
Paul Moore
- [PATCH] KEYS: allow reaching the keys quotas exactly
Eric Biggers
- Kernel memory corruption in CIPSO labeled TCP packets processing.
Nazarov Sergey
- [PATCH v2 05/20] x86/alternative: initializing temporary mm for patching
Andy Lutomirski
- [PATCH] LSM: Ignore "security=" when "lsm=" is specified
Kees Cook
- [PATCH v2 13/20] Add set_alias_ function and x86 implementation
Andy Lutomirski
- [PATCH] LSM: Ignore "security=" when "lsm=" is specified
Casey Schaufler
- [PATCH] LSM: Ignore "security=" when "lsm=" is specified
Kees Cook
- Kernel memory corruption in CIPSO labeled TCP packets processing.
Paul Moore
- [PATCH v5 0/5] Allow initializing the kernfs node's secctx based on its parent
Paul Moore
- [PATCH v2 13/20] Add set_alias_ function and x86 implementation
Edgecombe, Rick P
- [PATCH] LSM: Ignore "security=" when "lsm=" is specified
James Morris
- [PATCH] LSM: Ignore "security=" when "lsm=" is specified
Tetsuo Handa
- [PATCH] LSM: Ignore "security=" when "lsm=" is specified
Kees Cook
- [PATCH] LSM: Ignore "security=" when "lsm=" is specified
Tetsuo Handa
- [PATCH -next] LSM: fix return value check in safesetid_init_securityfs()
Wei Yongjun
- [PATCH] apparmor: fix build error undefined reference to zlib_*
Anders Roxell
- [PATCH 1/2] ima: fix build error redeclaration of enumerator
Anders Roxell
- [PATCH 2/2] efi: fix build error redeclaration of enumerator
Anders Roxell
- [PATCH 2/2] efi: fix build error redeclaration of enumerator
Ard Biesheuvel
- [PATCH 2/2] efi: fix build error redeclaration of enumerator
Andy Shevchenko
- [PATCH 1/2] ima: fix build error redeclaration of enumerator
Andy Shevchenko
- [PATCH 1/2] ima: fix build error redeclaration of enumerator
Andy Shevchenko
- [PATCH] apparmor: fix build error undefined reference to zlib_*
John Johansen
- [PATCH 1/2] ima: fix build error redeclaration of enumerator
Anders Roxell
- [PATCH v2 1/2] ima: fix build error redeclaration of enumerator
Anders Roxell
- [PATCH v2 2/2] efi: fix build error redeclaration of enumerator
Anders Roxell
- [PATCH] NETWORKING: avoid use IPCB in cipso_v4_error
Nazarov Sergey
- [PATCH -next] LSM: fix return value check in safesetid_init_securityfs()
Kees Cook
- [PATCH 0/3] gcc-plugins: Introduce stackinit plugin
Kees Cook
- [PATCH v2] LSM: Ignore "security=" when "lsm=" is specified
Kees Cook
- [PATCH v2 05/20] x86/alternative: initializing temporary mm for patching
Nadav Amit
- [PATCH] LSM: Ignore "security=" when "lsm=" is specified
Kees Cook
- [PATCH] LSM: SafeSetID: add selftest
James Morris
- [PATCH -next] LSM: fix return value check in safesetid_init_securityfs()
James Morris
- [PATCH 2/2] selftests: tpm2: Extend tests to cover partial reads
Jarkko Sakkinen
- [PATCH v2] [PATCH] KEYS: trusted: fix -Wvarags warning
Jarkko Sakkinen
- [PATCH v2 1/2] selftests/tpm2: Open tpm dev in unbuffered mode
Tadeusz Struk
- [PATCH v2 2/2] selftests/tpm2: Extend tests to cover partial reads
Tadeusz Struk
- [PATCH v4 1/2] tpm: Unify the send callback behaviour
Jarkko Sakkinen
- [PATCH v2 2/2] efi: fix build error redeclaration of enumerator
Anders Roxell
- [GIT PULL] tpmdd updates for Linux v5.1
Jarkko Sakkinen
- [PATCH v2] x86/ima: require signed kernel modules
Mimi Zohar
- [PATCH v2 2/2] selftests/tpm2: Extend tests to cover partial reads
Jarkko Sakkinen
- [PATCH v2] LSM: Ignore "security=" when "lsm=" is specified
Casey Schaufler
- [PATCH v2 2/2] selftests/tpm2: Extend tests to cover partial reads
Tadeusz Struk
- [PATCH v2 2/2] selftests/tpm2: Extend tests to cover partial reads
Jarkko Sakkinen
- [PATCH v2] selftests/tpm2: Open tpm dev in unbuffered mode
Tadeusz Struk
- [PATCH v3] selftests/tpm2: Extend tests to cover partial reads
Tadeusz Struk
- [PATCH v3] selftests/tpm2: Extend tests to cover partial reads
Jarkko Sakkinen
- [PATCH v3] selftests/tpm2: Extend tests to cover partial reads
Tadeusz Struk
- [PATCH v3] selftests/tpm2: Extend tests to cover partial reads
Jarkko Sakkinen
- [GIT PULL] tpmdd updates for Linux v5.1
James Morris
- [PATCH] NETWORKING: avoid use IPCB in cipso_v4_error
Paul Moore
- [PATCH v3 1/2] ima: fix build error redeclaration of enumerator
Anders Roxell
- [PATCH v3 2/2] efi: fix build error redeclaration of enumerator
Anders Roxell
- [PATCH v6 0/5] Allow initializing the kernfs node's secctx based on its parent
Ondrej Mosnacek
- [PATCH v6 1/5] selinux: try security xattr after genfs for kernfs filesystems
Ondrej Mosnacek
- [PATCH v6 2/5] kernfs: use simple_xattrs for security attributes
Ondrej Mosnacek
- [PATCH v6 3/5] LSM: add new hook for kernfs node initialization
Ondrej Mosnacek
- [PATCH v6 4/5] selinux: implement the kernfs_init_security hook
Ondrej Mosnacek
- [PATCH v6 5/5] kernfs: initialize security of newly created nodes
Ondrej Mosnacek
- [PATCH v2] [PATCH] KEYS: trusted: fix -Wvarags warning
Jarkko Sakkinen
- [GIT PULL] linux-integrity patches for Linux 5.1
Mimi Zohar
- [PATCH v6 5/5] kernfs: initialize security of newly created nodes
Tejun Heo
- [PATCH 1/4] KEYS: allow reaching the keys quotas exactly
David Howells
- [PATCH 0/4] keys: Miscellaneous fixes
David Howells
- [PATCH 1/4] KEYS: allow reaching the keys quotas exactly
David Howells
- [PATCH 2/4] assoc_array: Fix shortcut creation
David Howells
- [PATCH 3/4] keys: Fix dependency loop between construction record and auth key
David Howells
- [PATCH 4/4] keys: Timestamp new keys
David Howells
- [PATCH] NETWORKING: avoid use IPCB in cipso_v4_error
David Miller
- [RFC PATCH 0/9] keys: Namespacing
David Howells
- [RFC PATCH 1/9] keys: Invalidate used request_key authentication keys
David Howells
- [RFC PATCH 2/9] keys: Kill off request_key_async{,_with_auxdata}
David Howells
- [RFC PATCH 3/9] keys: Simplify key description management
David Howells
- [RFC PATCH 4/9] keys: Cache the hash value to avoid lots of recalculation
David Howells
- [RFC PATCH 5/9] keys: Include target namespace in match criteria
David Howells
- [RFC PATCH 6/9] keys: Garbage collect keys for which the domain has been removed
David Howells
- [RFC PATCH 7/9] keys: Network namespace domain tag
David Howells
- [RFC PATCH 8/9] keys: Pass the network namespace into request_key mechanism
David Howells
- [RFC PATCH 9/9] KEYS: Namespace keyring names
David Howells
- [PATCH v3 1/2] ima: fix build error redeclaration of enumerator
Mimi Zohar
- [PATCH v2] x86/ima: require signed kernel modules
Luis Chamberlain
- [PATCH] NETWORKING: avoid use IPCB in cipso_v4_error
Nazarov Sergey
- [PATCH] NETWORKING: avoid use IPCB in cipso_v4_error
Nazarov Sergey
- [PATCH v2] x86/ima: require signed kernel modules
Mimi Zohar
- [PATCH] NETWORKING: avoid use IPCB in cipso_v4_error
Stephen Smalley
- [GIT PULL] linux-integrity patches for Linux 5.1
James Morris
- [PATCH 0/4] keys: Miscellaneous fixes
James Morris
- [PATCH v6 1/5] selinux: try security xattr after genfs for kernfs filesystems
Stephen Smalley
- [PATCH v3 1/2] ima: fix build error redeclaration of enumerator
Mimi Zohar
- [PATCH v6 5/5] kernfs: initialize security of newly created nodes
Ondrej Mosnacek
- [PATCH v6 1/5] selinux: try security xattr after genfs for kernfs filesystems
Ondrej Mosnacek
- [PATCH v6 5/5] kernfs: initialize security of newly created nodes
Tejun Heo
- [RFC PATCH 00/27] Containers and using authenticated filesystems
David Howells
- [RFC PATCH 01/27] containers: Rename linux/container.h to linux/container_dev.h
David Howells
- [RFC PATCH 02/27] containers: Implement containers as kernel objects
David Howells
- [RFC PATCH 03/27] containers: Provide /proc/containers
David Howells
- [RFC PATCH 04/27] containers: Allow a process to be forked into a container
David Howells
- [RFC PATCH 05/27] containers: Open a socket inside a container
David Howells
- [RFC PATCH 06/27] containers, vfs: Allow syscall dirfd arguments to take a container fd
David Howells
- [RFC PATCH 07/27] containers: Make fsopen() able to create a superblock in a container
David Howells
- [RFC PATCH 08/27] containers, vfs: Honour CONTAINER_NEW_EMPTY_FS_NS
David Howells
- [RFC PATCH 09/27] vfs: Allow mounting to other namespaces
David Howells
- [RFC PATCH 10/27] containers: Provide fs_context op for container setting
David Howells
- [RFC PATCH 11/27] containers: Sample program for driving container objects
David Howells
- [RFC PATCH 12/27] containers: Allow a daemon to intercept request_key upcalls in a container
David Howells
- [RFC PATCH 13/27] keys: Provide a keyctl to query a request_key authentication key
David Howells
- [RFC PATCH 14/27] keys: Break bits out of key_unlink()
David Howells
- [RFC PATCH 15/27] keys: Make __key_link_begin() handle lockdep nesting
David Howells
- [RFC PATCH 16/27] keys: Grant Link permission to possessers of request_key auth keys
David Howells
- [RFC PATCH 17/27] keys: Add a keyctl to move a key between keyrings
David Howells
- [RFC PATCH 18/27] keys: Find the least-recently used unseen key in a keyring.
David Howells
- [RFC PATCH 19/27] containers: Sample: request_key upcall handling
David Howells
- [RFC PATCH 20/27] container, keys: Add a container keyring
David Howells
- [RFC PATCH 21/27] keys: Fix request_key() lack of Link perm check on found key
David Howells
- [RFC PATCH 23/27] KEYS: Provide KEYCTL_GRANT_PERMISSION
David Howells
- [RFC PATCH 22/27] KEYS: Replace uid/gid/perm permissions checking with an ACL
David Howells
- [RFC PATCH 24/27] keys: Allow a container to be specified as a subject in a key's ACL
David Howells
- [RFC PATCH 25/27] keys: Provide a way to ask for the container keyring
David Howells
- [RFC PATCH 26/27] keys: Allow containers to be included in key ACLs by name
David Howells
- [RFC PATCH 27/27] containers: Sample to grant access to a key in a container
David Howells
- [PATCH v3] x86/ima: require signed kernel modules
Mimi Zohar
- [PATCH 0/4] keys: Miscellaneous fixes
David Howells
- [PATCH v3] x86/ima: require signed kernel modules
Luis Chamberlain
- [RFC PATCH 22/27] KEYS: Replace uid/gid/perm permissions checking with an ACL
Stephen Smalley
- [RFC PATCH 22/27] KEYS: Replace uid/gid/perm permissions checking with an ACL
David Howells
- [RFC PATCH 04/27] containers: Allow a process to be forked into a container
Stephen Smalley
- [PATCH v3] x86/ima: require signed kernel modules
Mimi Zohar
- [PATCH] NETWORKING: avoid use IPCB in cipso_v4_error
Paul Moore
- [PATCH] NETWORKING: avoid use IPCB in cipso_v4_error
David Miller
- [PATCH] NETWORKING: avoid use IPCB in cipso_v4_error
Paul Moore
- [RFC PATCH 20/27] container, keys: Add a container keyring
Eric Biggers
- [GIT PULL] KEYS: fixes for v5.1
James Morris
- [PATCH 1/2] LSM: SafeSetID: gate setgid transitions
mortonm at chromium.org
- [PATCH 2/2] LSM: SafeSetID: gate setgid transitions
mortonm at chromium.org
- [PATCH v3 1/2] ima: fix build error redeclaration of enumerator
James Morris
- [RFC PATCH 00/27] Containers and using authenticated filesystems
James Morris
- [PATCH 1/2] LSM: SafeSetID: gate setgid transitions
Serge E. Hallyn
- [RFC PATCH 08/27] containers, vfs: Honour CONTAINER_NEW_EMPTY_FS_NS
Al Viro
- [RFC PATCH 09/27] vfs: Allow mounting to other namespaces
Al Viro
- [GIT PULL] KEYS: fixes for v5.1
Linus Torvalds
- [PATCH v2] LSM: Ignore "security=" when "lsm=" is specified
Tetsuo Handa
- [PATCH] tomoyo: Bump version.
Tetsuo Handa
- [PATCH 00/10] LSM documentation update
efremov
- [PATCH 06/10] security: fix documentation for the path_chmod hook
efremov
- [PATCH 2/2] LSM: SafeSetID: gate setgid transitions
Serge E. Hallyn
- [RFC PATCH 02/27] containers: Implement containers as kernel objects
Trond Myklebust
- [RFC PATCH 02/27] containers: Implement containers as kernel objects
James Bottomley
- [PATCH 00/10] LSM documentation update
Kees Cook
- [PATCH] doc: security: Add kern-doc for lsm_hooks.h
Kees Cook
- [PATCH v2] LSM: Ignore "security=" when "lsm=" is specified
Paul Moore
- [PATCH v2] LSM: Ignore "security=" when "lsm=" is specified
Kees Cook
- [PATCH v3] x86/ima: require signed kernel modules
Jessica Yu
- [PATCH v6 5/5] kernfs: initialize security of newly created nodes
Ondrej Mosnacek
- [PATCH] NETWORKING: avoid use IPCB in cipso_v4_error
Nazarov Sergey
- [PATCH v6 5/5] kernfs: initialize security of newly created nodes
Tejun Heo
- [PATCH v6 5/5] kernfs: initialize security of newly created nodes
Casey Schaufler
- [PATCH] NETWORKING: avoid use IPCB in cipso_v4_error
David Miller
- [PATCH v2] security: mark expected switch fall-throughs and add a missing break
Gustavo A. R. Silva
- [PATCH v2 14/20] mm: Make hibernate handle unmapped pages
Borislav Petkov
- overdue payment
First Commercial Bank London
- [PATCH v2 15/20] vmalloc: New flags for safe vfree on special perms
Borislav Petkov
- [PATCH v6 5/5] kernfs: initialize security of newly created nodes
Ondrej Mosnacek
- [PATCH v6 5/5] kernfs: initialize security of newly created nodes
Tejun Heo
- [PATCH 00/43] VFS: Introduce filesystem context
David Howells
- [PATCH 01/43] fix cgroup_do_mount() handling of failure exits
David Howells
- [PATCH 02/43] cgroup: saner refcounting for cgroup_root
David Howells
- [PATCH 03/43] kill kernfs_pin_sb()
David Howells
- [PATCH 04/43] separate copying and locking mount tree on cross-userns copies
David Howells
- [PATCH 05/43] saner handling of temporary namespaces
David Howells
- [PATCH 06/43] vfs: Introduce fs_context, switch vfs_kern_mount() to it.
David Howells
- [PATCH 07/43] new helpers: vfs_create_mount(), fc_mount()
David Howells
- [PATCH 08/43] teach vfs_get_tree() to handle subtype, switch do_new_mount() to it
David Howells
- [PATCH 09/43] new helper: do_new_mount_fc()
David Howells
- [PATCH 10/43] vfs_get_tree(): evict the call of security_sb_kern_mount()
David Howells
- [PATCH 11/43] convert do_remount_sb() to fs_context
David Howells
- [PATCH 12/43] fs_context flavour for submounts
David Howells
- [PATCH 13/43] introduce fs_context methods
David Howells
- [PATCH 14/43] vfs: Introduce logging functions
David Howells
- [PATCH 15/43] vfs: Add configuration parser helpers
David Howells
- [PATCH 16/43] vfs: Add LSM hooks for the new mount API
David Howells
- [PATCH 17/43] selinux: Implement the new mount API LSM hooks
David Howells
- [PATCH 18/43] smack: Implement filesystem context security hooks
David Howells
- [PATCH 19/43] vfs: Put security flags into the fs_context struct
David Howells
- [PATCH 20/43] vfs: Implement a filesystem superblock creation/configuration context
David Howells
- [PATCH 21/43] convenience helpers: vfs_get_super() and sget_fc()
David Howells
- [PATCH 22/43] introduce cloning of fs_context
David Howells
- [PATCH 23/43] procfs: Move proc_fill_super() to fs/proc/root.c
David Howells
- [PATCH 24/43] proc: Add fs_context support to procfs
David Howells
- [PATCH 25/43] ipc: Convert mqueue fs to fs_context
David Howells
- [PATCH 26/43] cgroup: start switching to fs_context
David Howells
- [PATCH 27/43] cgroup: fold cgroup1_mount() into cgroup1_get_tree()
David Howells
- [PATCH 28/43] cgroup: take options parsing into ->parse_monolithic()
David Howells
- [PATCH 29/43] cgroup1: switch to option-by-option parsing
David Howells
- [PATCH 30/43] cgroup2: switch to option-by-option parsing
David Howells
- [PATCH 31/43] cgroup: stash cgroup_root reference into cgroup_fs_context
David Howells
- [PATCH 32/43] cgroup_do_mount(): massage calling conventions
David Howells
- [PATCH 33/43] cgroup1_get_tree(): separate "get cgroup_root to use" into a separate helper
David Howells
- [PATCH 34/43] cgroup: store a reference to cgroup_ns into cgroup_fs_context
David Howells
- [PATCH 35/43] kernfs, sysfs, cgroup, intel_rdt: Support fs_context
David Howells
- [PATCH 36/43] cpuset: Use fs_context
David Howells
- [PATCH 37/43] hugetlbfs: Convert to fs_context
David Howells
- [PATCH 38/43] vfs: Remove kern_mount_data()
David Howells
- [PATCH 39/43] vfs: Provide documentation for new mount API
David Howells
- [PATCH 40/43] vfs: Implement logging through fs_context
David Howells
- [PATCH 41/43] vfs: Add some logging to the core users of the fs_context log
David Howells
- [PATCH 42/43] afs: Add fs_context support
David Howells
- [PATCH 43/43] afs: Use fs_context to pass parameters over automount
David Howells
- [RFC PATCH 00/27] Containers and using authenticated filesystems
Eric W. Biederman
- [RFC PATCH 04/27] containers: Allow a process to be forked into a container
Eric W. Biederman
- [RFC PATCH 05/27] containers: Open a socket inside a container
Eric W. Biederman
- [PATCH v6 5/5] kernfs: initialize security of newly created nodes
Casey Schaufler
- [RFC PATCH 06/27] containers, vfs: Allow syscall dirfd arguments to take a container fd
Eric W. Biederman
- [RFC PATCH 02/27] containers: Implement containers as kernel objects
Eric W. Biederman
- [PATCH 1/2] LSM: SafeSetID: gate setgid transitions
Micah Morton
- [PATCH 2/2] LSM: SafeSetID: gate setgid transitions
Micah Morton
- [PATCH 00/10] VFS: Provide new mount UAPI
David Howells
- [PATCH 01/10] vfs: syscall: Add open_tree(2) to reference or clone a mount
David Howells
- [PATCH 02/10] vfs: syscall: Add move_mount(2) to move mounts around
David Howells
- [PATCH 03/10] teach move_mount(2) to work with OPEN_TREE_CLONE
David Howells
- [PATCH 04/10] Make anon_inodes unconditional
David Howells
- [PATCH 05/10] vfs: syscall: Add fsopen() to prepare for superblock creation
David Howells
- [PATCH 06/10] vfs: Implement logging through fs_context
David Howells
- [PATCH 07/10] vfs: syscall: Add fsconfig() for configuring and managing a context
David Howells
- [PATCH 08/10] vfs: syscall: Add fsmount() to create a mount for a superblock
David Howells
- [PATCH 09/10] vfs: syscall: Add fspick() to select a superblock for reconfiguration
David Howells
- [PATCH 10/10] vfs: Add a sample program for the new mount API
David Howells
- [PATCH 1/2] LSM: SafeSetID: gate setgid transitions
Serge E. Hallyn
- [PATCH 2/2] LSM: SafeSetID: gate setgid transitions
Serge E. Hallyn
- [GIT PULL] KEYS: fixes for v5.1
James Morris
- [PATCH v2 15/20] vmalloc: New flags for safe vfree on special perms
Edgecombe, Rick P
- [PATCH v2 14/20] mm: Make hibernate handle unmapped pages
Edgecombe, Rick P
- [PATCH] tomoyo: Bump version.
James Morris
- [RFC PATCH 02/27] containers: Implement containers as kernel objects
David Howells
- [PATCH v2] KEYS: always initialize keyring_index_key::desc_len
Eric Biggers
- [RFC PATCH 02/27] containers: Implement containers as kernel objects
David Howells
- [RFC PATCH 02/27] containers: Implement containers as kernel objects
David Howells
- [RFC PATCH 04/27] containers: Allow a process to be forked into a container
David Howells
- [RFC PATCH 06/27] containers, vfs: Allow syscall dirfd arguments to take a container fd
David Howells
- [PATCH 2/2] LSM: SafeSetID: gate setgid transitions
Micah Morton
- [PATCH v2 2/2] LSM: SafeSetID: gate setgid transitions
mortonm at chromium.org
- [RFC PATCH 00/27] Containers and using authenticated filesystems
David Howells
- [RFC PATCH 02/27] containers: Implement containers as kernel objects
Tycho Andersen
- [RFC PATCH 02/27] containers: Implement containers as kernel objects
James Bottomley
- [PATCH v2 -next] tpm: Fix the type of the return value in calc_tpm2_event_size()
YueHaibing
- [RFC PATCH 02/27] containers: Implement containers as kernel objects
Ian Kent
- [RFC PATCH 02/27] containers: Implement containers as kernel objects
Ian Kent
- [RFC PATCH 02/27] containers: Implement containers as kernel objects
James Bottomley
- [PATCH] MAINTAINERS: add linux-security-module mailing list to TPM drivers
Jerry Snitselaar
- [RFC PATCH 02/27] containers: Implement containers as kernel objects
Ian Kent
- [PATCH v2 -next] tpm: Fix the type of the return value in calc_tpm2_event_size()
Jarkko Sakkinen
- [RFC PATCH 02/27] containers: Implement containers as kernel objects
Paul Moore
- [RFC PATCH 00/27] Containers and using authenticated filesystems
Paul Moore
- [PATCH] MAINTAINERS: add linux-security-module mailing list to TPM drivers
Jarkko Sakkinen
- [PATCH v3 -next] tpm: Fix the type of the return value in calc_tpm2_event_size()
Yue Haibing
- [PATCH v3 -next] tpm: Fix the type of the return value in calc_tpm2_event_size()
Jarkko Sakkinen
- [PATCH 02/10] vfs: syscall: Add move_mount(2) to move mounts around
Alan Jenkins
- [PATCH 02/10] vfs: syscall: Add move_mount(2) to move mounts around
Alan Jenkins
- [RFC PATCH 02/27] containers: Implement containers as kernel objects
Christian Brauner
- [PATCH] KEYS: user: Align the payload buffer
David Howells
- [PATCH] KEYS: user: Align the payload buffer
David Laight
- [PATCH] MAINTAINERS: add linux-security-module mailing list to TPM drivers
Jerry Snitselaar
- [PATCH] KEYS: user: Align the payload buffer
David Howells
- [RFC PATCH 00/27] Containers and using authenticated filesystems
Christian Brauner
- [RFC PATCH 02/27] containers: Implement containers as kernel objects
Trond Myklebust
- [PATCH] MAINTAINERS: add linux-security-module mailing list to TPM drivers
Jarkko Sakkinen
- [PATCH v2 -next] tpm: Fix the type of the return value in calc_tpm2_event_size()
Jason Gunthorpe
- [PATCH v2 14/20] mm: Make hibernate handle unmapped pages
Borislav Petkov
- [PATCH v2 15/20] vmalloc: New flags for safe vfree on special perms
Borislav Petkov
- [PATCH 02/10] vfs: syscall: Add move_mount(2) to move mounts around
Jann Horn
- [GIT PULL] KEYS: fixes for v5.1
pr-tracker-bot at kernel.org
- [RFC PATCH 00/27] Containers and using authenticated filesystems
Steve French
- [PATCH 04/43] separate copying and locking mount tree on cross-userns copies
Alan Jenkins
- [PATCH 03/10] teach move_mount(2) to work with OPEN_TREE_CLONE
Alan Jenkins
- [PATCH] MAINTAINERS: add linux-security-module mailing list to TPM drivers
James Morris
- [PATCH] KEYS: user: Align the payload buffer
James Morris
- [PATCH] KEYS: user: Align the payload buffer
David Howells
- [PATCH] MAINTAINERS: add linux-security-module mailing list to TPM drivers
Jerry Snitselaar
- [PATCH v6 5/5] kernfs: initialize security of newly created nodes
Ondrej Mosnacek
- [RFC PATCH 02/27] containers: Implement containers as kernel objects
Ian Kent
- [PATCH v2 -next] tpm: Fix the type of the return value in calc_tpm2_event_size()
Jarkko Sakkinen
- [PATCH v2] LSM: Ignore "security=" when "lsm=" is specified
Tetsuo Handa
- [PATCH v6 5/5] kernfs: initialize security of newly created nodes
Casey Schaufler
- [PATCH v3 00/20] Merge text_poke fixes and executable lockdowns
Rick Edgecombe
- [PATCH v3 01/20] x86/jump_label: Use text_poke_early() during early init
Rick Edgecombe
- [PATCH v3 02/20] x86/mm: Introduce temporary mm structs
Rick Edgecombe
- [PATCH v3 03/20] x86/mm: Save DRs when loading a temporary mm
Rick Edgecombe
- [PATCH v3 04/20] fork: Provide a function for copying init_mm
Rick Edgecombe
- [PATCH v3 05/20] x86/alternative: Initialize temporary mm for patching
Rick Edgecombe
- [PATCH v3 06/20] x86/alternative: Use temporary mm for text poking
Rick Edgecombe
- [PATCH v3 07/20] x86/kgdb: Avoid redundant comparison of patched code
Rick Edgecombe
- [PATCH v3 08/20] x86/ftrace: Set trampoline pages as executable
Rick Edgecombe
- [PATCH v3 09/20] x86/kprobes: Set instruction page as executable
Rick Edgecombe
- [PATCH v3 10/20] x86/module: Avoid breaking W^X while loading modules
Rick Edgecombe
- [PATCH v3 11/20] x86/jump-label: Remove support for custom poker
Rick Edgecombe
- [PATCH v3 12/20] x86/alternative: Remove the return value of text_poke_*()
Rick Edgecombe
- [PATCH v3 13/20] x86/mm/cpa: Add set_direct_map_ functions
Rick Edgecombe
- [PATCH v3 14/20] mm: Make hibernate handle unmapped pages
Rick Edgecombe
- [PATCH v3 15/20] vmalloc: Add flag for free of special permsissions
Rick Edgecombe
- [PATCH v3 16/20] modules: Use vmalloc special flag
Rick Edgecombe
- [PATCH v3 17/20] bpf: Use vmalloc special flag
Rick Edgecombe
- [PATCH v3 18/20] x86/ftrace: Use vmalloc special flag
Rick Edgecombe
- [PATCH v3 19/20] x86/kprobes: Use vmalloc special flag
Rick Edgecombe
- [PATCH v3 20/20] x86/alternative: Comment about module removal races
Rick Edgecombe
- [PATCH v3 03/20] x86/mm: Save DRs when loading a temporary mm
Sean Christopherson
- [PATCH v3 03/20] x86/mm: Save DRs when loading a temporary mm
Nadav Amit
- [PATCH v3 18/20] x86/ftrace: Use vmalloc special flag
Steven Rostedt
- [PATCH v3 18/20] x86/ftrace: Use vmalloc special flag
Edgecombe, Rick P
- [PATCH v2] LSM: Ignore "security=" when "lsm=" is specified
John Johansen
- [PATCH v6 5/5] kernfs: initialize security of newly created nodes
Ondrej Mosnacek
- [PATCH v7 0/7] Allow initializing the kernfs node's secctx based on its parent
Ondrej Mosnacek
- [PATCH v7 1/7] kernfs: clean up struct kernfs_iattrs
Ondrej Mosnacek
- [PATCH v7 2/7] kernfs: do not alloc iattrs in kernfs_xattr_get
Ondrej Mosnacek
- [PATCH v7 3/7] selinux: try security xattr after genfs for kernfs filesystems
Ondrej Mosnacek
- [PATCH v7 4/7] kernfs: use simple_xattrs for security attributes
Ondrej Mosnacek
- [PATCH v7 5/7] LSM: add new hook for kernfs node initialization
Ondrej Mosnacek
- [PATCH v7 6/7] selinux: implement the kernfs_init_security hook
Ondrej Mosnacek
- [PATCH v7 7/7] kernfs: initialize security of newly created nodes
Ondrej Mosnacek
- [PATCH] KEYS: always initialize keyring_index_key::desc_len
David Howells
- [PATCH v7 3/7] selinux: try security xattr after genfs for kernfs filesystems
Stephen Smalley
- [PATCH] doc: security: Add kern-doc for lsm_hooks.h
Jonathan Corbet
- [PATCH v3 00/20] Merge text_poke fixes and executable lockdowns
Borislav Petkov
- [PATCH] NETWORKING: avoid use IPCB in cipso_v4_error
Nazarov Sergey
- [PATCH v2] security: mark expected switch fall-throughs and add a missing break
Gustavo A. R. Silva
- [PATCH v2 0/2] NETWORKING: avoid use IPCB in cipso_v4_error
Nazarov Sergey
- [PATCH v2 1/2] NETWORKING: avoid use IPCB in cipso_v4_error
Nazarov Sergey
- [PATCH v2 2/2] NETWORKING: avoid use IPCB in cipso_v4_error
Nazarov Sergey
- [PATCH v2] security: mark expected switch fall-throughs and add a missing break
James Morris
- [PATCH v2] security: mark expected switch fall-throughs and add a missing break
James Morris
- [GIT PULL] More key subsystem fixes for 5.0
James Morris
- hello dear
Aysha Gadafi
- [PATCH v3 00/20] Merge text_poke fixes and executable lockdowns
Edgecombe, Rick P
- [PATCH V4 0/4] Add support for TCG2 event logs on EFI systems
Matthew Garrett
- [PATCH V4 1/4] tpm: Abstract crypto agile event size calculations
Matthew Garrett
- [PATCH V4 2/4] tpm: Reserve the TPM final events table
Matthew Garrett
- [PATCH V4 3/4] tpm: Append the final event log to the TPM event log
Matthew Garrett
- [PATCH V4 4/4] efi: Attempt to get the TCG2 event log in the boot stub
Matthew Garrett
- [PATCH v2] security: mark expected switch fall-throughs and add a missing break
Gustavo A. R. Silva
- [GIT PULL] More key subsystem fixes for 5.0
pr-tracker-bot at kernel.org
- [PATCH AUTOSEL 4.20 60/72] apparmor: Fix warning about unused function apparmor_ipv6_postroute
Sasha Levin
- [PATCH AUTOSEL 4.20 62/72] apparmor: Fix aa_label_build() error handling for failed merges
Sasha Levin
- [PATCH AUTOSEL 4.19 56/65] apparmor: Fix aa_label_build() error handling for failed merges
Sasha Levin
- [PATCH AUTOSEL 4.14 37/45] apparmor: Fix aa_label_build() error handling for failed merges
Sasha Levin
- [PATCH] NETWORKING: avoid use IPCB in cipso_v4_error
David Miller
- [PATCH v2 0/2] NETWORKING: avoid use IPCB in cipso_v4_error
David Miller
- [PATCH v2 1/2] NETWORKING: avoid use IPCB in cipso_v4_error
Nazarov Sergey
- [PATCH v2 2/2] NETWORKING: avoid use IPCB in cipso_v4_error
Nazarov Sergey
- [PATCH v2 2/2] NETWORKING: avoid use IPCB in cipso_v4_error
Paul Moore
- [PATCH v2 1/2] NETWORKING: avoid use IPCB in cipso_v4_error
Paul Moore
- [PATCH] LSM: Update function documentation for cap_capable
mortonm at chromium.org
- [PATCH v2 1/2] NETWORKING: avoid use IPCB in cipso_v4_error
David Miller
- [PATCH v2 2/2] NETWORKING: avoid use IPCB in cipso_v4_error
David Miller
- [PATCH v2 2/2] LSM: SafeSetID: gate setgid transitions
Serge E. Hallyn
- [PATCH] LSM: Update function documentation for cap_capable
James Morris
- [PATCH v2] LSM: Ignore "security=" when "lsm=" is specified
James Morris
- [PATCH v2 1/2] NETWORKING: avoid use IPCB in cipso_v4_error
Paul Moore
- [PATCH] netlabel: fix out-of-bounds memory accesses
Paul Moore
- [PATCH] security: keys: add NULL checking for key->type->instantiate
Geliang Tang
- [PATCH] security: keys: add NULL checking for key->type->instantiate
Geliang Tang
- [PATCH V4 0/4] Add support for TCG2 event logs on EFI systems
Jarkko Sakkinen
- [PATCH 04/43] separate copying and locking mount tree on cross-userns copies
David Howells
- [PATCH 04/43] separate copying and locking mount tree on cross-userns copies
Alan Jenkins
- [PATCH 03/10] teach move_mount(2) to work with OPEN_TREE_CLONE
Alan Jenkins
- [PATCH v3 2/2] LSM: SafeSetID: gate setgid transitions
mortonm at chromium.org
- [PATCH v2 2/2] LSM: SafeSetID: gate setgid transitions
Micah Morton
- [PATCH v2 00/11] LSM documentation update
Denis Efremov
- [PATCH v2 01/11] LSM: fix documentation for sb_copy_data hook
Denis Efremov
- [PATCH v2 02/11] LSM: fix documentation for the syslog hook
Denis Efremov
- [PATCH v2 03/11] LSM: fix documentation for the socket_post_create hook
Denis Efremov
- [PATCH v2 04/11] LSM: fix documentation for the task_setscheduler hook
Denis Efremov
- [PATCH v2 05/11] LSM: fix documentation for the socket_getpeersec_dgram hook
Denis Efremov
- [PATCH v2 06/11] LSM: fix documentation for the path_chmod hook
Denis Efremov
- [PATCH v2 07/11] LSM: fix documentation for the audit_* hooks
Denis Efremov
- [PATCH v2 08/11] LSM: fix documentation for the msg_queue_* hooks
Denis Efremov
- [PATCH v2 09/11] LSM: fix documentation for the sem_* hooks
Denis Efremov
- [PATCH v2 10/11] LSM: fix documentation for the shm_* hooks
Denis Efremov
- [PATCH v2 11/11] LSM: lsm_hooks.h: fix documentation format
Denis Efremov
- [PATCH v2 00/11] LSM documentation update
Casey Schaufler
- [PATCH v2 00/11] LSM documentation update
Kees Cook
- [PATCH] RFC: user-mode extensible trusted key support
Jarkko Sakkinen
- [PATCH V4 2/4] tpm: Reserve the TPM final events table
Jarkko Sakkinen
- [PATCH] tomoyo: Change pathname calculation for read-only filesystems.
Tetsuo Handa
- [PATCH v2 00/11] LSM documentation update
Denis Efremov
- [PATCH v2 00/11] LSM documentation update
Kees Cook
- kernel panic: MAC Initialization failed.
syzbot
- [PATCH V4 2/4] tpm: Reserve the TPM final events table
Matthew Garrett
- [PATCH v2 1/2] LSM: SafeSetID: gate setgid transitions
mortonm at chromium.org
- [PATCH] tomoyo: Change pathname calculation for read-only filesystems.
James Morris
- Add support for TCG2 log format on UEFI systems
Matthew Garrett
- [PATCH V5 1/4] tpm: Abstract crypto agile event size calculations
Matthew Garrett
- [PATCH V5 2/4] tpm: Reserve the TPM final events table
Matthew Garrett
- [PATCH V5 3/4] tpm: Append the final event log to the TPM event log
Matthew Garrett
- [PATCH V5 4/4] efi: Attempt to get the TCG2 event log in the boot stub
Matthew Garrett
- kernel panic: MAC Initialization failed.
Tetsuo Handa
- [PATCH v2 1/2] LSM: SafeSetID: gate setgid transitions
Serge E. Hallyn
- [PATCH] netlabel: fix out-of-bounds memory accesses
David Miller
- kernel panic: MAC Initialization failed. (2)
syzbot
- kernel panic: MAC Initialization failed.
Dmitry Vyukov
- kernel panic: MAC Initialization failed. (2)
Tetsuo Handa
- kernel panic: MAC Initialization failed. (2)
Dmitry Vyukov
- kernel panic: MAC Initialization failed.
Tetsuo Handa
- kernel panic: MAC Initialization failed.
Dmitry Vyukov
- kernel panic: MAC Initialization failed.
Tetsuo Handa
- kernel panic: MAC Initialization failed.
Tetsuo Handa
- [PATCH V4 2/4] tpm: Reserve the TPM final events table
Jarkko Sakkinen
- [PATCH 2/3] scripts/ima: define a set of common functions
Dave Young
- [PATCH] tomoyo: Add a kernel config option for fuzzing testing.
Tetsuo Handa
- kernel panic: MAC Initialization failed. (3)
syzbot
- [PATCH 2/3] scripts/ima: define a set of common functions
Mimi Zohar
- [PATCH v2 1/2] LSM: SafeSetID: gate setgid transitions
Casey Schaufler
- [PATCH v3 1/2] LSM: SafeSetID: gate setgid transitions
mortonm at chromium.org
- [PATCH v2 1/2] LSM: SafeSetID: gate setgid transitions
Micah Morton
- [PATCH v3 1/2] LSM: SafeSetID: gate setgid transitions
Casey Schaufler
- [PATCH v4 2/2] LSM: SafeSetID: gate setgid transitions
mortonm at chromium.org
- [PULL REQUEST] Lock down patches
Matthew Garrett
- [PATCH 00/97] LSM: Complete module stacking
Casey Schaufler
- [PATCH 01/97] LSM: Infrastructure management of the superblock
Casey Schaufler
- [PATCH 02/97] LSM: Infrastructure management of the sock security
Casey Schaufler
- [PATCH 03/97] LSM: Infrastructure management of the key security blob
Casey Schaufler
- [PATCH 04/97] SCAFFOLD: Move sock_graft out of sock.h
Casey Schaufler
- [PATCH 05/97] LSM: Create an lsm_export data structure.
Casey Schaufler
- [PATCH 06/97] LSM: Use lsm_export in the inode_getsecid hooks
Casey Schaufler
- [PATCH 07/97] SCAFFOLD: Move security.h out of route.h
Casey Schaufler
- [PATCH 08/97] LSM: Use lsm_export in the cred_getsecid hooks
Casey Schaufler
- [PATCH 09/97] LSM: Use lsm_export in the ipc_getsecid and task_getsecid hooks
Casey Schaufler
- [PATCH 10/97] LSM: Use lsm_export in the sk_getsecid hooks
Casey Schaufler
- [PATCH 11/97] LSM: Use lsm_export in the kernel_ask_as hooks
Casey Schaufler
- [PATCH 12/97] LSM: Use lsm_export in the getpeersec_dgram hooks
Casey Schaufler
- [PATCH 13/97] LSM: Use lsm_export in the audit_rule_match hooks
Casey Schaufler
- [PATCH 14/97] LSM: Fix logical operation in lsm_export checks
Casey Schaufler
- [PATCH 15/97] LSM: Use lsm_export in the secid_to_secctx hooks
Casey Schaufler
- [PATCH 16/97] LSM: Use lsm_export in the secctx_to_secid hooks
Casey Schaufler
- [PATCH 17/97] LSM: Use lsm_export in security_audit_rule_match
Casey Schaufler
- [PATCH 18/97] LSM: Use lsm_export in security_kernel_act_as
Casey Schaufler
- [PATCH 19/97] LSM: Use lsm_export in security_socket_getpeersec_dgram
Casey Schaufler
- [PATCH 20/97] LSM: Use lsm_export in security_secctx_to_secid
Casey Schaufler
- [PATCH 21/97] LSM: Use lsm_export in security_secid_to_secctx
Casey Schaufler
- [PATCH 22/97] LSM: Use lsm_export in security_ipc_getsecid
Casey Schaufler
- [PATCH 23/97] LSM: Use lsm_export in security_task_getsecid
Casey Schaufler
- [PATCH 24/97] LSM: FIXUP - security_secctx_to_secid
Casey Schaufler
- [PATCH 25/97] LSM: FIXUP - security_secid_to_secctx
Casey Schaufler
- [PATCH 26/97] LSM: Use lsm_export in security_inode_getsecid
Casey Schaufler
- [PATCH 27/97] LSM: Use lsm_export in security_cred_getsecid
Casey Schaufler
- [PATCH 28/97] LSM: REVERT Use lsm_export in the sk_getsecid hooks
Casey Schaufler
- [PATCH 29/97] Audit: Change audit_sig_sid to audit_sig_lsm
Casey Schaufler
- [PATCH 30/97] Audit: Convert target_sid to an lsm_export structure
Casey Schaufler
- [PATCH 31/97] Audit: Convert osid to an lsm_export structure
Casey Schaufler
- [PATCH 32/97] IMA: Clean out lsm_export scaffolding
Casey Schaufler
- [PATCH 33/97] NET: Store LSM access information in the socket blob for UDS
Casey Schaufler
- [PATCH 34/97] NET: Remove scaffolding on secmarks
Casey Schaufler
- [PATCH 35/97] NET: Remove scaffolding on new secmarks
Casey Schaufler
- [PATCH 36/97] NET: Remove netfilter scaffolding for lsm_export
Casey Schaufler
- [PATCH 37/97] Netlabel: Replace secids with lsm_export
Casey Schaufler
- [PATCH 38/97] LSM: Remove lsm_export scaffolding functions
Casey Schaufler
- [PATCH 39/97] IMA: FIXUP prototype using lsm_export
Casey Schaufler
- [PATCH 40/97] Smack: Restore the release_secctx hook
Casey Schaufler
- [PATCH 41/97] AppArmor: Remove unnecessary hook stub
Casey Schaufler
- [PATCH 42/97] LSM: Limit calls to certain module hooks
Casey Schaufler
- [PATCH 43/97] LSM: Create a data structure for a security context
Casey Schaufler
- [PATCH 44/97] LSM: Use lsm_context in secid_to_secctx hooks
Casey Schaufler
- [PATCH 45/97] LSM: Use lsm_context in secctx_to_secid hooks
Casey Schaufler
- [PATCH 46/97] LSM: Use lsm_context in inode_getsecctx hooks
Casey Schaufler
- [PATCH 47/97] LSM: Use lsm_context in inode_notifysecctx hooks
Casey Schaufler
- [PATCH 48/97] LSM: Use lsm_context in dentry_init_security hooks
Casey Schaufler
- [PATCH 49/97] LSM: Use lsm_context in security_dentry_init_security
Casey Schaufler
- [PATCH 50/97] LSM: Use lsm_context in security_inode_notifysecctx
Casey Schaufler
- [PATCH 51/97] LSM: Use lsm_context in security_inode_getsecctx
Casey Schaufler
- [PATCH 52/97] LSM: Use lsm_context in security_secctx_to_secid
Casey Schaufler
- [PATCH 53/97] LSM: Use lsm_context in release_secctx hooks
Casey Schaufler
- [PATCH 54/97] LSM: Use lsm_context in security_release_secctx
Casey Schaufler
- [PATCH 55/97] LSM: Use lsm_context in security_secid_to_secctx
Casey Schaufler
- [PATCH 56/97] fs: remove lsm_context scaffolding
Casey Schaufler
- [PATCH 57/97] LSM: Add the release function to the lsm_context
Casey Schaufler
- [PATCH 58/97] LSM: Use lsm_context in inode_setsecctx hooks
Casey Schaufler
- [PATCH 59/97] LSM: Use lsm_context in security_inode_setsecctx
Casey Schaufler
- [PATCH 60/97] kernfs: remove lsm_context scaffolding
Casey Schaufler
- [PATCH 61/97] LSM: Remove unused macro
Casey Schaufler
- [PATCH 62/97] LSM: Special handling for secctx lsm hooks
Casey Schaufler
- [PATCH 63/97] SELinux: Use blob offset in current_sid
Casey Schaufler
- [PATCH 64/97] LSM: Specify which LSM to display with /proc/self/attr/display
Casey Schaufler
- [PATCH 65/97] AppArmor: Remove the exclusive flag
Casey Schaufler
- [PATCH 66/97] LSM: Add secmark_relabel_packet to the set of one call hooks
Casey Schaufler
- [PATCH 67/97] LSM: Make getting the secmark right cleaner with lsm_export_one_secid
Casey Schaufler
- [PATCH 68/97] netfilter: Fix memory leak introduced with lsm_context
Casey Schaufler
- [PATCH 69/97] Smack: Consolidate secmark conversions
Casey Schaufler
- [PATCH 70/97] netfilter: Remove unnecessary NULL check in lsm_context
Casey Schaufler
- [PULL REQUEST] Lock down patches
Mimi Zohar
- [PATCH 00/97] LSM: Complete module stacking
Casey Schaufler
- [PATCH 71/97] LSM: Add secmark refcounting to call_one list
Casey Schaufler
- [PATCH 72/97] LSM: Add secmark refcounting to call_one list - part 2
Casey Schaufler
- [PATCH 73/97] LSM: refactor security_setprocattr
Casey Schaufler
- [PATCH 74/97] Smack: Detect if secmarks can be safely used
Casey Schaufler
- [PATCH 75/97] LSM: Support multiple LSMs using inode_init_security
Casey Schaufler
- [PATCH 76/97] LSM: Use full security context in security_inode_setsecctx
Casey Schaufler
- [PATCH 77/97] LSM: Correct handling of ENOSYS in inode_setxattr
Casey Schaufler
- [PATCH 78/97] LSM: Infrastructure security blobs for mount options
Casey Schaufler
- [PATCH 79/97] LSM: Fix for security_init_inode_security
Casey Schaufler
- [PATCH 80/97] Smack: Advertise the secid to netlabel
Casey Schaufler
- [PATCH 81/97] LSM: Change error detection for UDP peer security
Casey Schaufler
- [PATCH 82/97] Smack: Fix setting of the CIPSO MLS_CAT flags
Casey Schaufler
- [PATCH 83/97] Smack: Set netlabel flags properly on new label import
Casey Schaufler
- [PATCH 84/97] Netlabel: Add a secattr comparison API function
Casey Schaufler
- [PATCH 85/97] Smack: Let netlabel do the work on the ambient domain
Casey Schaufler
- [PATCH 86/97] Smack: Don't set the socket label on each send
Casey Schaufler
- [PATCH 87/97] Smack: Let netlabel do the work on connections
Casey Schaufler
- [PATCH 88/97] Netlabel: Return the labeling type on socket
Casey Schaufler
- [PATCH 89/97] Netlabel: Return the labeling type on socket
Casey Schaufler
- [PATCH 90/97] Netlabel: Return the labeling type on socket
Casey Schaufler
- [PATCH 91/97] Netlabel: Return the labeling type on socket
Casey Schaufler
- [PATCH 92/97] LSM: Remember the NLTYPE of netlabel sockets
Casey Schaufler
- [PATCH 93/97] Smack: Use the NLTYPE on output
Casey Schaufler
- [PATCH 94/97] LSM: Hook for netlabel reconciliation
Casey Schaufler
- [PATCH 95/97] LSM: Avoid network conflicts in SELinux and Smack
Casey Schaufler
- [PATCH 96/97] LSM: Apply Netlabel consitancy checks on send and connect
Casey Schaufler
- [PATCH 97/97] Smack: Remove the exclusive bit
Casey Schaufler
- [PATCH 01/27] Add the ability to lock down access to the running kernel image
Matthew Garrett
- [PATCH 02/27] Add a SysRq option to lift kernel lockdown
Matthew Garrett
- [PATCH v4 2/2] LSM: SafeSetID: gate setgid transitions
Casey Schaufler
- [PATCH 01/27] Add the ability to lock down access to the running kernel image
Matthew Garrett
- [PATCH 02/27] Add a SysRq option to lift kernel lockdown
Matthew Garrett
- [PATCH 01/27] Add the ability to lock down access to the running kernel image
Matthew Garrett
- [PATCH 02/27] Add a SysRq option to lift kernel lockdown
Matthew Garrett
- [PATCH 01/27] Add the ability to lock down access to the running kernel image
Matthew Garrett
- [PATCH 02/27] Add a SysRq option to lift kernel lockdown
Matthew Garrett
- [PATCH 03/27] Enforce module signatures if the kernel is locked down
Matthew Garrett
- [PATCH 04/27] Restrict /dev/{mem, kmem, port} when the kernel is locked down
Matthew Garrett
- [PATCH 05/27] kexec_load: Disable at runtime if the kernel is locked down
Matthew Garrett
- [PATCH 06/27] Copy secure_boot flag in boot params across kexec reboot
Matthew Garrett
- [PATCH 07/27] kexec_file: split KEXEC_VERIFY_SIG into KEXEC_SIG and KEXEC_SIG_FORCE
Matthew Garrett
- [PATCH 08/27] kexec_file: Restrict at runtime if the kernel is locked down
Matthew Garrett
- [PATCH 09/27] hibernate: Disable when the kernel is locked down
Matthew Garrett
- [PATCH 10/27] uswsusp: Disable when the kernel is locked down
Matthew Garrett
- [PATCH 11/27] PCI: Lock down BAR access when the kernel is locked down
Matthew Garrett
- [PATCH 12/27] x86: Lock down IO port access when the kernel is locked down
Matthew Garrett
- [PATCH 13/27] x86/msr: Restrict MSR access when the kernel is locked down
Matthew Garrett
- [PATCH 14/27] ACPI: Limit access to custom_method when the kernel is locked down
Matthew Garrett
- [PATCH 15/27] acpi: Ignore acpi_rsdp kernel param when the kernel has been locked down
Matthew Garrett
- [PATCH 16/27] acpi: Disable ACPI table override if the kernel is locked down
Matthew Garrett
- [PATCH 17/27] acpi: Disable APEI error injection if the kernel is locked down
Matthew Garrett
- [PATCH 18/27] Prohibit PCMCIA CIS storage when the kernel is locked down
Matthew Garrett
- [PATCH 19/27] Lock down TIOCSSERIAL
Matthew Garrett
- [PATCH 20/27] Lock down module params that specify hardware parameters (eg. ioport)
Matthew Garrett
- [PATCH 21/27] x86/mmiotrace: Lock down the testmmiotrace module
Matthew Garrett
- [PATCH 22/27] Lock down /proc/kcore
Matthew Garrett
- [PATCH 23/27] Lock down kprobes
Matthew Garrett
- [PATCH 24/27] bpf: Restrict kernel image access functions when the kernel is locked down
Matthew Garrett
- [PATCH 25/27] Lock down perf
Matthew Garrett
- [PATCH 26/27] debugfs: Restrict debugfs when the kernel is locked down
Matthew Garrett
- [PATCH 27/27] lockdown: Print current->comm in restriction messages
Matthew Garrett
- [PULL REQUEST] Lock down patches
Matthew Garrett
- [PULL REQUEST] Lock down patches
Randy Dunlap
- [PATCH] LSM: Update list of SECURITYFS users in Kconfig
Petr Vorel
- [PATCH v4 1/2] LSM: SafeSetID: gate setgid transitions
mortonm at chromium.org
Last message date:
Thu Feb 28 23:55:34 UTC 2019
Archived on: Wed Mar 6 19:45:33 UTC 2019
This archive was generated by
Pipermail 0.09 (Mailman edition).