May 2019 Archives by subject
Starting: Wed May 1 05:39:59 UTC 2019
Ending: Fri May 31 23:31:59 UTC 2019
Messages: 749
-
Roberto Sassu
-
Roberto Sassu
-
Mimi Zohar
-
prakhar srivastava
-
Mimi Zohar
- [ANNOUNCE][CFP] Linux Security Summit Europe 2019
Elena Reshetova
- [GIT PULL] integrity subsystem fixes for v5.2
Mimi Zohar
- [GIT PULL] integrity subsystem fixes for v5.2
pr-tracker-bot at kernel.org
- [GIT PULL] keys: Miscellany
David Howells
- [GIT PULL] keys: Miscellany
Eric Biggers
- [GIT PULL] keys: Miscellany
James Morris
- [GIT PULL] keys: Namespacing
James Morris
- [GIT PULL] keys: Namespacing
David Howells
- [GIT PULL] Security subsystem: general updates for v5.2
James Morris
- [GIT PULL] Security subsystem: general updates for v5.2
pr-tracker-bot at kernel.org
- [GIT PULL] Security subsystem: integrity updates for v5.2
James Morris
- [GIT PULL] Security subsystem: integrity updates for v5.2
pr-tracker-bot at kernel.org
- [GIT PULL] Security subsystem: Smack updates for v5.2
James Morris
- [GIT PULL] Security subsystem: Smack updates for v5.2
Linus Torvalds
- [GIT PULL] Security subsystem: Smack updates for v5.2
pr-tracker-bot at kernel.org
- [GIT PULL] Security subsystem: Smack updates for v5.2
Tetsuo Handa
- [GIT PULL] Security subsystem: Smack updates for v5.2
Linus Torvalds
- [GIT PULL] security subsystem: Tomoyo updates for v5.2
James Morris
- [GIT PULL] security subsystem: Tomoyo updates for v5.2
Linus Torvalds
- [GIT PULL] security subsystem: Tomoyo updates for v5.2
pr-tracker-bot at kernel.org
- [GIT PULL] security subsystem: Tomoyo updates for v5.2
Paul Moore
- [GIT PULL] security subsystem: Tomoyo updates for v5.2
Casey Schaufler
- [GIT PULL] security subsystem: Tomoyo updates for v5.2
Paul Moore
- [GIT PULL] security subsystem: Tomoyo updates for v5.2
Linus Torvalds
- [GIT PULL] security subsystem: Tomoyo updates for v5.2
James Morris
- [GIT PULL] security subsystem: Tomoyo updates for v5.2
James Morris
- [GIT PULL] security subsystem: Tomoyo updates for v5.2
James Morris
- [GIT PULL] security subsytem: TPM changes for v5.2
James Morris
- [GIT PULL] security subsytem: TPM changes for v5.2
Linus Torvalds
- [GIT PULL] security subsytem: TPM changes for v5.2
James Morris
- [GIT PULL] SELinux fixes for v5.2 (#1)
Paul Moore
- [GIT PULL] SELinux fixes for v5.2 (#1)
pr-tracker-bot at kernel.org
- [GIT PULL] SELinux patches for v5.2
Paul Moore
- [GIT PULL] SELinux patches for v5.2
pr-tracker-bot at kernel.org
- [PATCH 0/1 v2] Add dm verity root hash pkcs7 sig validation.
Jaskaran Khurana
- [PATCH 0/2] keys: ACLs
David Howells
- [PATCH 0/4] RFC: add init_on_alloc/init_on_free boot options
Alexander Potapenko
- [PATCH 0/5] integrity: improve ima measurement accuracy
Janne Karhunen
- [PATCH 0/6] keys: request_key() improvements(vspace)s
David Howells
- [PATCH 0/7] keys: Miscellany
David Howells
- [PATCH 0/9] keys: Namespacing [ver #3]
David Howells
- [PATCH 00/10] keys: Miscellany [ver #2]
David Howells
- [PATCH 00/10] keys: Miscellany [ver #2]
Eric Biggers
- [PATCH 00/10] keys: Miscellany [ver #2]
David Howells
- [PATCH 00/10] keys: Miscellany [ver #2]
David Howells
- [PATCH 00/16] treewide: fix match_string() helper when array size
Alexandru Ardelean
- [PATCH 00/22] Some documentation fixes
Mauro Carvalho Chehab
- [PATCH 00/58] LSM: Module stacking for AppArmor
Casey Schaufler
- [PATCH 00/58] LSM: Module stacking for AppArmor
Casey Schaufler
- [PATCH 01/10] keys: sparse: Fix key_fs[ug]id_changed() [ver #2]
David Howells
- [PATCH 01/10] LSM: SafeSetID: fix pr_warn() to include newline
Micah Morton
- [PATCH 01/10] LSM: SafeSetID: fix pr_warn() to include newline
James Morris
- [PATCH 01/10] LSM: SafeSetID: fix pr_warn() to include newline
Micah Morton
- [PATCH 01/16] lib: fix match_string() helper on -1 array size
Alexandru Ardelean
- [PATCH 01/16] lib: fix match_string() helper on -1 array size
Ardelean, Alexandru
- [PATCH 01/16] lib: fix match_string() helper when array size is positive
Alexandru Ardelean
- [PATCH 01/58] LSM: Infrastructure management of the superblock
Casey Schaufler
- [PATCH 01/58] LSM: Infrastructure management of the superblock
Casey Schaufler
- [PATCH 02/10] keys: sparse: Fix incorrect RCU accesses [ver #2]
David Howells
- [PATCH 02/10] LSM: SafeSetID: fix check for setresuid(new1, new2, new3)
Micah Morton
- [PATCH 02/16] treewide: rename match_string() -> __match_string()
Alexandru Ardelean
- [PATCH 02/58] LSM: Infrastructure management of the sock security
Casey Schaufler
- [PATCH 02/58] LSM: Infrastructure management of the sock security
Casey Schaufler
- [PATCH 03/10] keys: sparse: Fix kdoc mismatches [ver #2]
David Howells
- [PATCH 03/10] LSM: SafeSetID: refactor policy hash table
Micah Morton
- [PATCH 03/16] lib,treewide: add new match_string() helper/macro
Alexandru Ardelean
- [PATCH 03/16] lib,treewide: add new match_string() helper/macro
Andy Shevchenko
- [PATCH 03/16] lib,treewide: add new match_string() helper/macro
Greg KH
- [PATCH 03/16] lib,treewide: add new match_string() helper/macro
Ardelean, Alexandru
- [PATCH 03/16] lib,treewide: add new match_string() helper/macro
Ardelean, Alexandru
- [PATCH 03/16] lib,treewide: add new match_string() helper/macro
andriy.shevchenko at linux.intel.com
- [PATCH 03/16] lib,treewide: add new match_string() helper/macro
Ardelean, Alexandru
- [PATCH 03/58] LSM: Infrastructure management of the key security blob
Casey Schaufler
- [PATCH 03/58] LSM: Infrastructure management of the key security blob
Casey Schaufler
- [PATCH 04/10] keys: Change keyring_serialise_link_sem to a mutex [ver #2]
David Howells
- [PATCH 04/10] LSM: SafeSetID: refactor safesetid_security_capable()
Micah Morton
- [PATCH 04/16] powerpc/xmon: use new match_string() helper/macro
Alexandru Ardelean
- [PATCH 04/58] LSM: Create an lsm_export data structure.
Casey Schaufler
- [PATCH 04/58] LSM: Create an lsm_export data structure.
Casey Schaufler
- [PATCH 05/10] keys: Break bits out of key_unlink() [ver #2]
David Howells
- [PATCH 05/10] LSM: SafeSetID: refactor policy parsing
Micah Morton
- [PATCH 05/16] ALSA: oxygen: use new match_string() helper/macro
Alexandru Ardelean
- [PATCH 05/58] LSM: Use lsm_export in the inode_getsecid hooks
Casey Schaufler
- [PATCH 05/58] LSM: Use lsm_export in the inode_getsecid hooks
Casey Schaufler
- [PATCH 06/10] keys: Hoist locking out of __key_link_begin() [ver #2]
David Howells
- [PATCH 06/10] LSM: SafeSetID: fix userns handling in securityfs
Micah Morton
- [PATCH 06/16] x86/mtrr: use new match_string() helper + add gaps == minor fix
Alexandru Ardelean
- [PATCH 06/58] LSM: Use lsm_export in the cred_getsecid hooks
Casey Schaufler
- [PATCH 06/58] LSM: Use lsm_export in the cred_getsecid hooks
Casey Schaufler
- [PATCH 07/10] keys: Add a keyctl to move a key between keyrings [ver #2]
David Howells
- [PATCH 07/10] LSM: SafeSetID: rewrite userspace API to atomic updates
Micah Morton
- [PATCH 07/16] device connection: use new match_string() helper/macro
Alexandru Ardelean
- [PATCH 07/58] LSM: Use lsm_export in the ipc_getsecid and task_getsecid hooks
Casey Schaufler
- [PATCH 07/58] LSM: Use lsm_export in the ipc_getsecid and task_getsecid hooks
Casey Schaufler
- [PATCH 08/10] keys: Grant Link permission to possessers of request_key auth keys [ver #2]
David Howells
- [PATCH 08/16] cpufreq/intel_pstate: remove NULL entry + use match_string()
Alexandru Ardelean
- [PATCH 08/58] LSM: Use lsm_export in the kernel_ask_as hooks
Casey Schaufler
- [PATCH 08/58] LSM: Use lsm_export in the kernel_ask_as hooks
Casey Schaufler
- [PATCH 09/10] KEYS: reuse keyring_index_key::desc_len in lookup_user_key() [ver #2]
David Howells
- [PATCH 09/16] mmc: sdhci-xenon: use new match_string() helper/macro
Dan Carpenter
- [PATCH 09/16] mmc: sdhci-xenon: use new match_string() helper/macro
Alexandru Ardelean
- [PATCH 09/58] LSM: Use lsm_export in the getpeersec_dgram hooks
Casey Schaufler
- [PATCH 09/58] LSM: Use lsm_export in the getpeersec_dgram hooks
Casey Schaufler
- [PATCH 1/1 v2] Add dm verity root hash pkcs7 sig validation.
Jaskaran Khurana
- [PATCH 1/2 v2] efi: add a function to convert the status value to string
joeyli
- [PATCH 1/2 v2] efi: add a function to convert the status value to string
joeyli
- [PATCH 1/2 v2] efi: add a function to convert the status value to string
Lee, Chun-Yi
- [PATCH 1/2 v2] efi: add a function to convert the status value to string
Ard Biesheuvel
- [PATCH 1/2 v2] efi: add a function to convert the status value to string
Ard Biesheuvel
- [PATCH 1/2] apparmor: Use a memory pool instead per-CPU caches
John Johansen
- [PATCH 1/2] apparmor: Use a memory pool instead per-CPU caches
Sebastian Andrzej Siewior
- [PATCH 1/2] apparmor: Use a memory pool instead per-CPU caches
Tetsuo Handa
- [PATCH 1/2] apparmor: Use a memory pool instead per-CPU caches
Sebastian Andrzej Siewior
- [PATCH 1/2] apparmor: Use a memory pool instead per-CPU caches
Tetsuo Handa
- [PATCH 1/2] apparmor: Use a memory pool instead per-CPU caches
John Johansen
- [PATCH 1/2] KEYS: Replace uid/gid/perm permissions checking with an ACL
David Howells
- [PATCH 1/2] LSM: switch to blocking policy update notifiers
Janne Karhunen
- [PATCH 1/3][V2] lib: fix match_string() helper on -1 array size
Alexandru Ardelean
- [PATCH 1/4] evm: check hash algorithm passed to init_desc()
Roberto Sassu
- [PATCH 1/4] evm: check hash algorithm passed to init_desc()
Mimi Zohar
- [PATCH 1/4] mm: security: introduce init_on_alloc=1 and init_on_free=1 boot options
Alexander Potapenko
- [PATCH 1/4] mm: security: introduce init_on_alloc=1 and init_on_free=1 boot options
Kees Cook
- [PATCH 1/4] mm: security: introduce init_on_alloc=1 and init_on_free=1 boot options
Randy Dunlap
- [PATCH 1/4] mm: security: introduce init_on_alloc=1 and init_on_free=1 boot options
Alexander Potapenko
- [PATCH 1/5] integrity: keep the integrity state of open files up to date
Janne Karhunen
- [PATCH 1/6] keys: Fix request_key() lack of Link perm check on found key
David Howells
- [PATCH 1/7] General notification queue with user mmap()'able ring buffer
Greg KH
- [PATCH 1/7] General notification queue with user mmap()'able ring buffer
Greg KH
- [PATCH 1/7] General notification queue with user mmap()'able ring buffer
Greg KH
- [PATCH 1/7] General notification queue with user mmap()'able ring buffer
Greg KH
- [PATCH 1/7] General notification queue with user mmap()'able ring buffer
Andrea Parri
- [PATCH 1/7] General notification queue with user mmap()'able ring buffer
Peter Zijlstra
- [PATCH 1/7] General notification queue with user mmap()'able ring buffer
Peter Zijlstra
- [PATCH 1/7] General notification queue with user mmap()'able ring buffer
Peter Zijlstra
- [PATCH 1/7] General notification queue with user mmap()'able ring buffer
Peter Zijlstra
- [PATCH 1/7] General notification queue with user mmap()'able ring buffer
Peter Zijlstra
- [PATCH 1/7] General notification queue with user mmap()'able ring buffer
David Howells
- [PATCH 1/7] General notification queue with user mmap()'able ring buffer
David Howells
- [PATCH 1/7] General notification queue with user mmap()'able ring buffer
Jann Horn
- [PATCH 1/7] General notification queue with user mmap()'able ring buffer
David Howells
- [PATCH 1/7] General notification queue with user mmap()'able ring buffer
Jann Horn
- [PATCH 1/7] General notification queue with user mmap()'able ring buffer
David Howells
- [PATCH 1/7] General notification queue with user mmap()'able ring buffer
Jann Horn
- [PATCH 1/7] General notification queue with user mmap()'able ring buffer
David Howells
- [PATCH 1/7] General notification queue with user mmap()'able ring buffer
David Howells
- [PATCH 1/7] General notification queue with user mmap()'able ring buffer
David Howells
- [PATCH 1/7] General notification queue with user mmap()'able ring buffer
David Howells
- [PATCH 1/7] General notification queue with user mmap()'able ring buffer
David Howells
- [PATCH 1/7] General notification queue with user mmap()'able ring buffer
David Howells
- [PATCH 1/7] keys: sparse: Fix key_fs[ug]id_changed()
David Howells
- [PATCH 1/7] keys: sparse: Fix key_fs[ug]id_changed()
James Morris
- [PATCH 1/9] keys: Simplify key description management [ver #3]
David Howells
- [PATCH 10/10] docs: fix broken documentation links
Mauro Carvalho Chehab
- [PATCH 10/10] docs: fix broken documentation links
Federico Vaga
- [PATCH 10/10] docs: fix broken documentation links
Rafael J. Wysocki
- [PATCH 10/10] keys: Add capability-checking keyctl function [ver #2]
David Howells
- [PATCH 10/10] LSM: SafeSetID: fix use of literal -1 in capable hook
Micah Morton
- [PATCH 10/16] pinctrl: armada-37xx: use new match_string() helper/macro
Alexandru Ardelean
- [PATCH 10/58] LSM: Use lsm_export in the audit_rule_match hooks
Casey Schaufler
- [PATCH 10/58] LSM: Use lsm_export in the audit_rule_match hooks
Casey Schaufler
- [PATCH 11/16] mm/vmpressure.c: use new match_string() helper/macro
Alexandru Ardelean
- [PATCH 11/58] LSM: Use lsm_export in the secid_to_secctx hooks
Casey Schaufler
- [PATCH 11/58] LSM: Use lsm_export in the secid_to_secctx hooks
Casey Schaufler
- [PATCH 12/16] rdmacg: use new match_string() helper/macro
Alexandru Ardelean
- [PATCH 12/58] LSM: Use lsm_export in the secctx_to_secid hooks
Casey Schaufler
- [PATCH 12/58] LSM: Use lsm_export in the secctx_to_secid hooks
Casey Schaufler
- [PATCH 13/16] drm/edid: use new match_string() helper/macro
Alexandru Ardelean
- [PATCH 13/58] LSM: Use lsm_export in security_audit_rule_match
Casey Schaufler
- [PATCH 13/58] LSM: Use lsm_export in security_audit_rule_match
Casey Schaufler
- [PATCH 14/16] staging: gdm724x: use new match_string() helper/macro
Alexandru Ardelean
- [PATCH 14/58] LSM: Use lsm_export in security_kernel_act_as
Casey Schaufler
- [PATCH 14/58] LSM: Use lsm_export in security_kernel_act_as
Casey Schaufler
- [PATCH 15/16] video: fbdev: pxafb: use new match_string() helper/macro
Alexandru Ardelean
- [PATCH 15/58] LSM: Use lsm_export in security_socket_getpeersec_dgram
Casey Schaufler
- [PATCH 15/58] LSM: Use lsm_export in security_socket_getpeersec_dgram
Casey Schaufler
- [PATCH 16/16] sched: debug: use new match_string() helper/macro
Alexandru Ardelean
- [PATCH 16/58] LSM: Use lsm_export in security_secctx_to_secid
Casey Schaufler
- [PATCH 16/58] LSM: Use lsm_export in security_secctx_to_secid
Casey Schaufler
- [PATCH 17/58] LSM: Use lsm_export in security_secid_to_secctx
Casey Schaufler
- [PATCH 17/58] LSM: Use lsm_export in security_secid_to_secctx
Casey Schaufler
- [PATCH 18/58] LSM: Use lsm_export in security_ipc_getsecid
Casey Schaufler
- [PATCH 19/58] LSM: Use lsm_export in security_task_getsecid
Casey Schaufler
- [PATCH 2/2 v3] efi: print appropriate status message when loading certificates
joeyli
- [PATCH 2/2 v3] efi: print appropriate status message when loading certificates
joeyli
- [PATCH 2/2 v3] efi: print appropriate status message when loading certificates
joeyli
- [PATCH 2/2 v3] efi: print appropriate status message when loading certificates
Lee, Chun-Yi
- [PATCH 2/2 v3] efi: print appropriate status message when loading certificates
Ard Biesheuvel
- [PATCH 2/2 v3] efi: print appropriate status message when loading certificates
Ard Biesheuvel
- [PATCH 2/2 v3] efi: print appropriate status message when loading certificates
Ard Biesheuvel
- [PATCH 2/2] apparmor: Switch to GFP_KERNEL where possible
John Johansen
- [PATCH 2/2] ima: use the lsm policy update notifier
Janne Karhunen
- [PATCH 2/2] ima: use the lsm policy update notifier
Stephen Smalley
- [PATCH 2/2] KEYS: Provide KEYCTL_GRANT_PERMISSION
David Howells
- [PATCH 2/3] mm: init: report memory auto-initialization features at boot time
Alexander Potapenko
- [PATCH 2/3][V2] treewide: rename match_string() -> __match_string()
Alexandru Ardelean
- [PATCH 2/4] evm: reset status in evm_inode_post_setattr()
Roberto Sassu
- [PATCH 2/4] evm: reset status in evm_inode_post_setattr()
Mimi Zohar
- [PATCH 2/4] lib: introduce test_meminit module
Alexander Potapenko
- [PATCH 2/5] integrity: update the file measurement on truncate
Janne Karhunen
- [PATCH 2/6] keys: Invalidate used request_key authentication keys
David Howells
- [PATCH 2/7] keys: Add a notification facility
David Howells
- [PATCH 2/7] keys: sparse: Fix incorrect RCU accesses
David Howells
- [PATCH 2/7] keys: sparse: Fix incorrect RCU accesses
James Morris
- [PATCH 2/9] keys: Cache the hash value to avoid lots of recalculation [ver #3]
David Howells
- [PATCH 20/58] LSM: Use lsm_export in security_inode_getsecid
Casey Schaufler
- [PATCH 21/58] LSM: Use lsm_export in security_cred_getsecid
Casey Schaufler
- [PATCH 22/22] docs: fix broken documentation links
Michael S. Tsirkin
- [PATCH 22/58] Audit: Change audit_sig_sid to audit_sig_lsm
Casey Schaufler
- [PATCH 23/58] Audit: Convert target_sid to an lsm_export structure
Casey Schaufler
- [PATCH 24/58] Audit: Convert osid to an lsm_export structure
Casey Schaufler
- [PATCH 25/58] IMA: Clean out lsm_export scaffolding
Casey Schaufler
- [PATCH 26/58] NET: Change the UNIXCB from a secid to an lsm_export
Casey Schaufler
- [PATCH 27/58] NET: Remove scaffolding on secmarks
Casey Schaufler
- [PATCH 28/58] NET: Remove scaffolding on new secmarks
Casey Schaufler
- [PATCH 29/58] NET: Remove netfilter scaffolding for lsm_export
Casey Schaufler
- [PATCH 3/3] lib: introduce test_meminit module
Alexander Potapenko
- [PATCH 3/3][V2] lib: re-introduce new match_string() helper/macro
Alexandru Ardelean
- [PATCH 3/4] gfp: mm: introduce __GFP_NOINIT
Alexander Potapenko
- [PATCH 3/4] gfp: mm: introduce __GFP_NOINIT
Kees Cook
- [PATCH 3/4] gfp: mm: introduce __GFP_NOINIT
Alexander Potapenko
- [PATCH 3/4] gfp: mm: introduce __GFP_NOINIT
Souptick Joarder
- [PATCH 3/4] gfp: mm: introduce __GFP_NOINIT
Alexander Potapenko
- [PATCH 3/4] gfp: mm: introduce __GFP_NOINIT
Souptick Joarder
- [PATCH 3/4] ima: don't ignore INTEGRITY_UNKNOWN EVM status
Roberto Sassu
- [PATCH 3/4] ima: don't ignore INTEGRITY_UNKNOWN EVM status
Mimi Zohar
- [PATCH 3/4] ima: don't ignore INTEGRITY_UNKNOWN EVM status
Roberto Sassu
- [PATCH 3/4] ima: don't ignore INTEGRITY_UNKNOWN EVM status
Mimi Zohar
- [PATCH 3/5] integrity: update the file measurement on write
Janne Karhunen
- [PATCH 3/6] keys: Move the RCU locks outwards from the keyring search functions
David Howells
- [PATCH 3/7] keys: sparse: Fix kdoc mismatches
David Howells
- [PATCH 3/7] keys: sparse: Fix kdoc mismatches
James Morris
- [PATCH 3/7] vfs: Add a mount-notification facility
David Howells
- [PATCH 3/7] vfs: Add a mount-notification facility
Jann Horn
- [PATCH 3/7] vfs: Add a mount-notification facility
David Howells
- [PATCH 3/7] vfs: Add a mount-notification facility
David Howells
- [PATCH 3/7] vfs: Add a mount-notification facility
Jann Horn
- [PATCH 3/7] vfs: Add a mount-notification facility
David Howells
- [PATCH 3/7] vfs: Add a mount-notification facility
David Howells
- [PATCH 3/7] vfs: Add a mount-notification facility
David Howells
- [PATCH 3/7] vfs: Add a mount-notification facility
Jann Horn
- [PATCH 3/7] vfs: Add a mount-notification facility
Casey Schaufler
- [PATCH 3/7] vfs: Add a mount-notification facility
Andy Lutomirski
- [PATCH 3/7] vfs: Add a mount-notification facility
Casey Schaufler
- [PATCH 3/7] vfs: Add a mount-notification facility
Jann Horn
- [PATCH 3/7] vfs: Add a mount-notification facility
Casey Schaufler
- [PATCH 3/7] vfs: Add a mount-notification facility
Jann Horn
- [PATCH 3/7] vfs: Add a mount-notification facility
Casey Schaufler
- [PATCH 3/7] vfs: Add a mount-notification facility
Andy Lutomirski
- [PATCH 3/7] vfs: Add a mount-notification facility
Casey Schaufler
- [PATCH 3/9] keys: Add a 'recurse' flag for keyring searches [ver #3]
David Howells
- [PATCH 30/58] Netlabel: Replace secids with lsm_export
Casey Schaufler
- [PATCH 31/58] LSM: Remove lsm_export scaffolding functions
Casey Schaufler
- [PATCH 32/58] IMA: FIXUP prototype using lsm_export
Casey Schaufler
- [PATCH 33/58] Smack: Restore the release_secctx hook
Casey Schaufler
- [PATCH 34/58] AppArmor: Remove unnecessary hook stub
Casey Schaufler
- [PATCH 35/58] LSM: Limit calls to certain module hooks
Casey Schaufler
- [PATCH 36/58] LSM: Create a data structure for a security context
Casey Schaufler
- [PATCH 37/58] LSM: Use lsm_context in secid_to_secctx hooks
Casey Schaufler
- [PATCH 38/58] LSM: Use lsm_context in secctx_to_secid hooks
Casey Schaufler
- [PATCH 39/58] LSM: Use lsm_context in inode_getsecctx hooks
Casey Schaufler
- [PATCH 4/4] ima: only audit failed appraisal verifications
Roberto Sassu
- [PATCH 4/4] ima: only audit failed appraisal verifications
Mimi Zohar
- [PATCH 4/4] ima: only audit failed appraisal verifications
Roberto Sassu
- [PATCH 4/4] net: apply __GFP_NOINIT to AF_UNIX sk_buff allocations
Alexander Potapenko
- [PATCH 4/5] integrity: measure the file on sync
Janne Karhunen
- [PATCH 4/6] keys: Cache result of request_key*() temporarily in task_struct
David Howells
- [PATCH 4/7] keys: Break bits out of key_unlink()
David Howells
- [PATCH 4/7] keys: Break bits out of key_unlink()
James Morris
- [PATCH 4/7] vfs: Add superblock notifications
David Howells
- [PATCH 4/7] vfs: Add superblock notifications
Jann Horn
- [PATCH 4/7] vfs: Add superblock notifications
David Howells
- [PATCH 4/7] vfs: Add superblock notifications
Jann Horn
- [PATCH 4/9] keys: Namespace keyring names [ver #3]
David Howells
- [PATCH 40/58] LSM: Use lsm_context in inode_notifysecctx hooks
Casey Schaufler
- [PATCH 41/58] LSM: Use lsm_context in dentry_init_security hooks
Casey Schaufler
- [PATCH 42/58] LSM: Use lsm_context in security_dentry_init_security
Casey Schaufler
- [PATCH 43/58] LSM: Use lsm_context in security_inode_notifysecctx
Casey Schaufler
- [PATCH 44/58] LSM: Use lsm_context in security_inode_getsecctx
Casey Schaufler
- [PATCH 45/58] LSM: Use lsm_context in security_secctx_to_secid
Casey Schaufler
- [PATCH 46/58] LSM: Use lsm_context in release_secctx hooks
Casey Schaufler
- [PATCH 47/58] LSM: Use lsm_context in security_release_secctx
Casey Schaufler
- [PATCH 48/58] LSM: Use lsm_context in security_secid_to_secctx
Casey Schaufler
- [PATCH 49/58] fs: remove lsm_context scaffolding
Casey Schaufler
- [PATCH 5/4] mm: Introduce SLAB_NO_FREE_INIT and mark excluded caches
Alexander Potapenko
- [PATCH 5/4] mm: Introduce SLAB_NO_FREE_INIT and mark excluded caches
Kees Cook
- [PATCH 5/4] mm: Introduce SLAB_NO_FREE_INIT and mark excluded caches
Mathias Krause
- [PATCH 5/4] mm: Introduce SLAB_NO_FREE_INIT and mark excluded caches
Kees Cook
- [PATCH 5/4] mm: Introduce SLAB_NO_FREE_INIT and mark excluded caches
Kees Cook
- [PATCH 5/5] integrity: measure the file on msync
Janne Karhunen
- [PATCH 5/6] afs: Provide an RCU-capable key lookup
David Howells
- [PATCH 5/7] fsinfo: Export superblock notification counter
David Howells
- [PATCH 5/7] keys: Make __key_link_begin() handle lockdep nesting
David Howells
- [PATCH 5/7] keys: Make __key_link_begin() handle lockdep nesting
James Morris
- [PATCH 5/9] keys: Move the user and user-session keyrings to the user_namespace [ver #3]
David Howells
- [PATCH 50/58] LSM: Add the release function to the lsm_context
Casey Schaufler
- [PATCH 6/6] afs: Support RCU pathwalk
David Howells
- [PATCH 6/7] block: Add block layer notifications
David Howells
- [PATCH 6/7] block: Add block layer notifications
Jann Horn
- [PATCH 6/7] keys: Add a keyctl to move a key between keyrings
David Howells
- [PATCH 6/7] keys: Add a keyctl to move a key between keyrings
James Morris
- [PATCH 6/7] keys: Add a keyctl to move a key between keyrings
David Howells
- [PATCH 6/7] keys: Add a keyctl to move a key between keyrings
Eric Biggers
- [PATCH 6/7] keys: Add a keyctl to move a key between keyrings
David Howells
- [PATCH 6/9] keys: Include target namespace in match criteria [ver #3]
David Howells
- [PATCH 7/7] Add sample notification program
David Howells
- [PATCH 7/7] keys: Grant Link permission to possessers of request_key auth keys
David Howells
- [PATCH 7/7] keys: Grant Link permission to possessers of request_key auth keys
James Morris
- [PATCH 7/9] keys: Garbage collect keys for which the domain has been removed [ver #3]
David Howells
- [PATCH 8/9] keys: Network namespace domain tag [ver #3]
David Howells
- [PATCH 9/9] keys: Pass the network namespace into request_key mechanism [ver #3]
David Howells
- [PATCH AUTOSEL 4.14 07/16] securityfs: fix use-after-free on symlink traversal
Sasha Levin
- [PATCH AUTOSEL 4.14 08/16] apparmorfs: fix use-after-free on symlink traversal
Sasha Levin
- [PATCH AUTOSEL 4.14 41/95] ima: open a new file instance if no read permissions
Sasha Levin
- [PATCH AUTOSEL 4.19 10/25] securityfs: fix use-after-free on symlink traversal
Sasha Levin
- [PATCH AUTOSEL 4.19 11/25] apparmorfs: fix use-after-free on symlink traversal
Sasha Levin
- [PATCH AUTOSEL 5.0 14/34] securityfs: fix use-after-free on symlink traversal
Sasha Levin
- [PATCH AUTOSEL 5.0 15/34] apparmorfs: fix use-after-free on symlink traversal
Sasha Levin
- [PATCH next] security: smack: fix sap undeclared error in smack_socket_sendmsg
Kefeng Wang
- [PATCH next] security: smack: fix sap undeclared error in smack_socket_sendmsg
Casey Schaufler
- [PATCH next] security: smack: fix sap undeclared error in smack_socket_sendmsg
Kefeng Wang
- [PATCH v10 01/12] MODSIGN: Export module signature definitions
Mimi Zohar
- [PATCH v10 01/12] MODSIGN: Export module signature definitions
Thiago Jung Bauermann
- [PATCH v10 02/12] PKCS#7: Refactor verify_pkcs7_signature()
Mimi Zohar
- [PATCH v10 03/12] PKCS#7: Introduce pkcs7_get_digest()
Mimi Zohar
- [PATCH v10 06/12] ima: Use designated initializers for struct ima_event_data
Mimi Zohar
- [PATCH v10 08/12] ima: Factor xattr_verify() out of ima_appraise_measurement()
Mimi Zohar
- [PATCH v10 09/12] ima: Implement support for module-style appended signatures
Mimi Zohar
- [PATCH v10 09/12] ima: Implement support for module-style appended signatures
Mimi Zohar
- [PATCH v10 09/12] ima: Implement support for module-style appended signatures
Thiago Jung Bauermann
- [PATCH v10 09/12] ima: Implement support for module-style appended signatures
Thiago Jung Bauermann
- [PATCH v10 09/12] ima: Implement support for module-style appended signatures
Mimi Zohar
- [PATCH v10 11/12] ima: Define ima-modsig template
Mimi Zohar
- [PATCH v10 11/12] ima: Define ima-modsig template
Thiago Jung Bauermann
- [PATCH v10 12/12] ima: Store the measurement again when appraising a modsig
Mimi Zohar
- [PATCH v10 12/12] ima: Store the measurement again when appraising a modsig
Thiago Jung Bauermann
- [PATCH v2 0/3] ima/evm fixes for v5.2
Roberto Sassu
- [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
Rob Landley
- [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
Roberto Sassu
- [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
Mimi Zohar
- [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
Rob Landley
- [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
Mimi Zohar
- [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
Andy Lutomirski
- [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
Rob Landley
- [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
Rob Landley
- [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
Dominik Brodowski
- [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
hpa at zytor.com
- [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
Mimi Zohar
- [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
Dominik Brodowski
- [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
Rob Landley
- [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
Mimi Zohar
- [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
hpa at zytor.com
- [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
hpa at zytor.com
- [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
Roberto Sassu
- [PATCH v2 08/10] LSM: SafeSetID: add read handler
Micah Morton
- [PATCH v2 08/79] docs: cgroup-v1: convert docs to ReST and rename to *.rst
Tejun Heo
- [PATCH v2 09/10] LSM: SafeSetID: verify transitive constrainedness
Micah Morton
- [PATCH v2 1/3] evm: check hash algorithm passed to init_desc()
Roberto Sassu
- [PATCH v2 1/3] evm: check hash algorithm passed to init_desc()
Mimi Zohar
- [PATCH v2 1/3] fs: add ksys_lsetxattr() wrapper
Roberto Sassu
- [PATCH v2 1/3] fs: add ksys_lsetxattr() wrapper
Jann Horn
- [PATCH v2 1/4] mm: security: introduce init_on_alloc=1 and init_on_free=1 boot options
Alexander Potapenko
- [PATCH v2 1/4] mm: security: introduce init_on_alloc=1 and init_on_free=1 boot options
Kees Cook
- [PATCH v2 1/4] mm: security: introduce init_on_alloc=1 and init_on_free=1 boot options
Alexander Potapenko
- [PATCH v2 1/4] mm: security: introduce init_on_alloc=1 and init_on_free=1 boot options
Kees Cook
- [PATCH v2 1/4] mm: security: introduce init_on_alloc=1 and init_on_free=1 boot options
Kees Cook
- [PATCH v2 1/4] mm: security: introduce init_on_alloc=1 and init_on_free=1 boot options
Michal Hocko
- [PATCH v2 1/4] mm: security: introduce init_on_alloc=1 and init_on_free=1 boot options
Alexander Potapenko
- [PATCH v2 1/4] mm: security: introduce init_on_alloc=1 and init_on_free=1 boot options
Michal Hocko
- [PATCH v2 1/4] mm: security: introduce init_on_alloc=1 and init_on_free=1 boot options
Alexander Potapenko
- [PATCH v2 1/4] mm: security: introduce init_on_alloc=1 and init_on_free=1 boot options
Kees Cook
- [PATCH v2 1/4] mm: security: introduce init_on_alloc=1 and init_on_free=1 boot options
Michal Hocko
- [PATCH v2 2/3] ima: don't ignore INTEGRITY_UNKNOWN EVM status
Roberto Sassu
- [PATCH v2 2/3] ima: don't ignore INTEGRITY_UNKNOWN EVM status
Mimi Zohar
- [PATCH v2 2/3] initramfs: set extended attributes
Roberto Sassu
- [PATCH v2 2/4] lib: introduce test_meminit module
Alexander Potapenko
- [PATCH v2 2/4] lib: introduce test_meminit module
Kees Cook
- [PATCH v2 2/4] lib: introduce test_meminit module
Alexander Potapenko
- [PATCH v2 2/4] lib: introduce test_meminit module
Kees Cook
- [PATCH v2 3/3] ima: show rules with IMA_INMASK correctly
Roberto Sassu
- [PATCH v2 3/3] ima: show rules with IMA_INMASK correctly
Mimi Zohar
- [PATCH v2 3/3] initramfs: introduce do_readxattrs()
Roberto Sassu
- [PATCH v2 3/3] initramfs: introduce do_readxattrs()
Jann Horn
- [PATCH v2 3/3] initramfs: introduce do_readxattrs()
Roberto Sassu
- [PATCH v2 3/4] gfp: mm: introduce __GFP_NO_AUTOINIT
Alexander Potapenko
- [PATCH v2 3/4] gfp: mm: introduce __GFP_NO_AUTOINIT
Michal Hocko
- [PATCH v2 3/4] gfp: mm: introduce __GFP_NO_AUTOINIT
Alexander Potapenko
- [PATCH v2 3/4] gfp: mm: introduce __GFP_NO_AUTOINIT
Michal Hocko
- [PATCH v2 3/4] gfp: mm: introduce __GFP_NO_AUTOINIT
Alexander Potapenko
- [PATCH v2 3/4] gfp: mm: introduce __GFP_NO_AUTOINIT
Michal Hocko
- [PATCH v2 3/4] gfp: mm: introduce __GFP_NO_AUTOINIT
Kees Cook
- [PATCH v2 3/4] gfp: mm: introduce __GFP_NO_AUTOINIT
Michal Hocko
- [PATCH v2 3/4] gfp: mm: introduce __GFP_NO_AUTOINIT
Alexander Potapenko
- [PATCH v2 3/4] gfp: mm: introduce __GFP_NO_AUTOINIT
Michal Hocko
- [PATCH v2 4/4] net: apply __GFP_NO_AUTOINIT to AF_UNIX sk_buff allocations
Alexander Potapenko
- [PATCH v2 4/4] net: apply __GFP_NO_AUTOINIT to AF_UNIX sk_buff allocations
Kees Cook
- [PATCH v2 4/4] net: apply __GFP_NO_AUTOINIT to AF_UNIX sk_buff allocations
Kees Cook
- [PATCH v2 4/4] net: apply __GFP_NO_AUTOINIT to AF_UNIX sk_buff allocations
Alexander Potapenko
- [PATCH v2 4/4] net: apply __GFP_NO_AUTOINIT to AF_UNIX sk_buff allocations
Alexander Potapenko
- [PATCH v2 4/4] net: apply __GFP_NO_AUTOINIT to AF_UNIX sk_buff allocations
Kees Cook
- [PATCH v20 16/28] x86/sgx: Add provisioning
Jarkko Sakkinen
- [PATCH v2] Allow to exclude specific file types in LoadPin
Ke Wu
- [PATCH v2] Allow to exclude specific file types in LoadPin
James Morris
- [PATCH v2] Allow to exclude specific file types in LoadPin
Kees Cook
- [PATCH v2] Allow to exclude specific file types in LoadPin
James Morris
- [PATCH v2] Allow to exclude specific file types in LoadPin
Kees Cook
- [PATCH v2] Allow to exclude specific file types in LoadPin
Ke Wu
- [PATCH v2] apparmor: Use a memory pool instead per-CPU caches
Sebastian Andrzej Siewior
- [PATCH v3 0/2] initramfs: add support for xattrs in the initial ram disk
Roberto Sassu
- [PATCH v3 0/3] RFC: add init_on_alloc/init_on_free boot options
Alexander Potapenko
- [PATCH v3 1/2] initramfs: set extended attributes
Roberto Sassu
- [PATCH v3 1/3] mm: security: introduce init_on_alloc=1 and init_on_free=1 boot options
Alexander Potapenko
- [PATCH v3 1/3] mm: security: introduce init_on_alloc=1 and init_on_free=1 boot options
Alexander Potapenko
- [PATCH v3 2/2] initramfs: introduce do_readxattrs()
Roberto Sassu
- [PATCH v3 2/2] initramfs: introduce do_readxattrs()
hpa at zytor.com
- [PATCH v3 2/2] initramfs: introduce do_readxattrs()
Arvind Sankar
- [PATCH v3 2/2] initramfs: introduce do_readxattrs()
Arvind Sankar
- [PATCH v3 2/2] initramfs: introduce do_readxattrs()
Rob Landley
- [PATCH v3 2/2] initramfs: introduce do_readxattrs()
H. Peter Anvin
- [PATCH v3 2/2] initramfs: introduce do_readxattrs()
H. Peter Anvin
- [PATCH v3 2/2] initramfs: introduce do_readxattrs()
Arvind Sankar
- [PATCH v3 2/2] initramfs: introduce do_readxattrs()
kbuild test robot
- [PATCH v3 2/2] initramfs: introduce do_readxattrs()
kbuild test robot
- [PATCH v3 2/2] initramfs: introduce do_readxattrs()
Rob Landley
- [PATCH v3 2/2] initramfs: introduce do_readxattrs()
kbuild test robot
- [PATCH v3 2/2] initramfs: introduce do_readxattrs()
Roberto Sassu
- [PATCH v3 2/2] initramfs: introduce do_readxattrs()
Roberto Sassu
- [PATCH v3 2/2] initramfs: introduce do_readxattrs()
Roberto Sassu
- [PATCH v3 2/2] initramfs: introduce do_readxattrs()
hpa at zytor.com
- [PATCH v3 2/2] initramfs: introduce do_readxattrs()
hpa at zytor.com
- [PATCH v3 2/2] initramfs: introduce do_readxattrs()
Roberto Sassu
- [PATCH v3 2/2] initramfs: introduce do_readxattrs()
Rob Landley
- [PATCH v3 2/2] initramfs: introduce do_readxattrs()
Taras Kondratiuk
- [PATCH V32 01/27] Add the ability to lock down access to the running kernel image
James Morris
- [PATCH V32 01/27] Add the ability to lock down access to the running kernel image
Matthew Garrett
- [PATCH V32 01/27] Add the ability to lock down access to the running kernel image
James Morris
- [PATCH V32 01/27] Add the ability to lock down access to the running kernel image
Andy Lutomirski
- [PATCH v3] Allow to exclude specific file types in LoadPin
Ke Wu
- [PATCH v3] Allow to exclude specific file types in LoadPin
Kees Cook
- [PATCH v3] apparmor: Use a memory pool instead per-CPU caches
Sebastian Andrzej Siewior
- [PATCH v3] apparmor: Use a memory pool instead per-CPU caches
Tetsuo Handa
- [PATCH v4 0/3] initramfs: add support for xattrs in the initial ram disk
Roberto Sassu
- [PATCH v4 0/3] RFC: add init_on_alloc/init_on_free boot options
Alexander Potapenko
- [PATCH v4 1/3] initramfs: add file metadata
Roberto Sassu
- [PATCH v4 1/3] mm: security: introduce init_on_alloc=1 and init_on_free=1 boot options
Alexander Potapenko
- [PATCH v4 1/3] mm: security: introduce init_on_alloc=1 and init_on_free=1 boot options
Kees Cook
- [PATCH v4 2/3] initramfs: read metadata from special file METADATA!!!
Roberto Sassu
- [PATCH v4 2/3] mm: init: report memory auto-initialization features at boot time
Alexander Potapenko
- [PATCH v4 3/3] gen_init_cpio: add support for file metadata
Roberto Sassu
- [PATCH v4 3/3] lib: introduce test_meminit module
Alexander Potapenko
- [PATCH v4] apparmor: Use a memory pool instead per-CPU caches
Sebastian Andrzej Siewior
- [PATCH v4] apparmor: Use a memory pool instead per-CPU caches
John Johansen
- [PATCH v5 1/3] mm: security: introduce init_on_alloc=1 and init_on_free=1 boot options
Alexander Potapenko
- [PATCH v5 1/3] mm: security: introduce init_on_alloc=1 and init_on_free=1 boot options
Kees Cook
- [PATCH v5 2/3] mm: init: report memory auto-initialization features at boot time
Kees Cook
- [PATCH v5 2/3] mm: init: report memory auto-initialization features at boot time
Alexander Potapenko
- [PATCH V5 2/4] tpm: Reserve the TPM final events table
Bartosz Szczepanek
- [PATCH V5 2/4] tpm: Reserve the TPM final events table
Ard Biesheuvel
- [PATCH V5 2/4] tpm: Reserve the TPM final events table
Jarkko Sakkinen
- [PATCH V5 2/4] tpm: Reserve the TPM final events table
Matthew Garrett
- [PATCH V5 2/4] tpm: Reserve the TPM final events table
Matthew Garrett
- [PATCH V5 2/4] tpm: Reserve the TPM final events table
Matthew Garrett
- [PATCH V5 2/4] tpm: Reserve the TPM final events table
Ard Biesheuvel
- [PATCH V5 2/4] tpm: Reserve the TPM final events table
Jarkko Sakkinen
- [PATCH V5 2/4] tpm: Reserve the TPM final events table
Jarkko Sakkinen
- [PATCH V5 2/4] tpm: Reserve the TPM final events table
Ingo Molnar
- [PATCH V5 2/4] tpm: Reserve the TPM final events table
Jarkko Sakkinen
- [PATCH V5 2/4] tpm: Reserve the TPM final events table
Bartosz Szczepanek
- [PATCH v5 3/3] lib: introduce test_meminit module
Alexander Potapenko
- [PATCH v5 3/3] lib: introduce test_meminit module
Kees Cook
- [PATCH v6 0/3] add new ima hook ima_kexec_cmdline to measure kexec boot cmdline args
Prakhar Srivastava
- [PATCH V6 0/4] Add support for crypto agile TPM event logs
Matthew Garrett
- [PATCH V6 0/4] Add support for crypto agile TPM event logs
Bartosz Szczepanek
- [PATCH v6 1/3] Add a new ima hook ima_kexec_cmdline to measure cmdline args
Prakhar Srivastava
- [PATCH v6 1/3] Add a new ima hook ima_kexec_cmdline to measure cmdline args
Mimi Zohar
- [PATCH V6 1/4] tpm: Abstract crypto agile event size calculations
Matthew Garrett
- [PATCH v6 2/3] add a new ima template field buf
Prakhar Srivastava
- [PATCH v6 2/3] add a new ima template field buf
Roberto Sassu
- [PATCH v6 2/3] add a new ima template field buf
Mimi Zohar
- [PATCH V6 2/4] tpm: Reserve the TPM final events table
Matthew Garrett
- [PATCH v6 3/3] call ima_kexec_cmdline to measure the cmdline args
Prakhar Srivastava
- [PATCH V6 3/4] tpm: Append the final event log to the TPM event log
Matthew Garrett
- [PATCH V6 4/4] efi: Attempt to get the TCG2 event log in the boot stub
Ard Biesheuvel
- [PATCH V6 4/4] efi: Attempt to get the TCG2 event log in the boot stub
Matthew Garrett
- [PATCH V7 0/4] Add support for crypto agile logs
Matthew Garrett
- [PATCH V7 0/4] Add support for crypto agile logs
Jarkko Sakkinen
- [PATCH V7 0/4] Add support for crypto agile logs
Jarkko Sakkinen
- [PATCH V7 0/4] Add support for crypto agile logs
Jarkko Sakkinen
- [PATCH V7 0/4] Add support for crypto agile logs
Bartosz Szczepanek
- [PATCH V7 0/4] Add support for crypto agile logs
James Morris
- [PATCH V7 0/4] Add support for crypto agile logs
Jarkko Sakkinen
- [PATCH V7 0/4] Add support for crypto agile logs
James Morris
- [PATCH V7 0/4] Add support for crypto agile logs
Jarkko Sakkinen
- [PATCH V7 1/4] tpm: Abstract crypto agile event size calculations
Matthew Garrett
- [PATCH V7 2/4] tpm: Reserve the TPM final events table
Matthew Garrett
- [PATCH V7 2/4] tpm: Reserve the TPM final events table
Ard Biesheuvel
- [PATCH V7 3/4] tpm: Append the final event log to the TPM event log
Matthew Garrett
- [PATCH V7 4/4] efi: Attempt to get the TCG2 event log in the boot stub
Ard Biesheuvel
- [PATCH V7 4/4] efi: Attempt to get the TCG2 event log in the boot stub
Matthew Garrett
- [PATCH] Add support to carry ima buffer to in kexec_file_load for amr64
Prakhar Srivastava
- [PATCH] Allow to exclude specific file types in LoadPin
Ke Wu
- [PATCH] Allow to exclude specific file types in LoadPin
Kees Cook
- [PATCH] apparmor: enforce nullbyte at end of tag string
Jann Horn
- [PATCH] apparmor: enforce nullbyte at end of tag string
John Johansen
- [PATCH] apparmor: Force type-casting of current->real_cred
John Johansen
- [PATCH] ima: use struct_size() in kzalloc()
Gustavo A. R. Silva
- [PATCH] kexec_buffer measure
Mimi Zohar
- [PATCH] kexec_buffer measure
Casey Schaufler
- [PATCH] kexec_buffer measure
Casey Schaufler
- [PATCH] kexec_buffer measure
Tetsuo Handa
- [PATCH] kexec_buffer measure
Mimi Zohar
- [PATCH] LSM: Fix formatting errors in SafeSetID LSM docs
Micah Morton
- [PATCH] LSM: Fix formatting errors in SafeSetID LSM docs
James Morris
- [PATCH] LSM: Update MAINTAINERS file for SafeSetID LSM.
Micah Morton
- [PATCH] LSM: Update MAINTAINERS file for SafeSetID LSM.
James Morris
- [PATCH] smack: remove redundant assignment to variable m
Colin King
- [PATCH] Smack: Restore the smackfsdef mount option
Casey Schaufler
- [PATCH] Smack: Restore the smackfsdef mount option
Casey Schaufler
- [PATCH] Smack: Restore the smackfsdef mount option
David Howells
- [PATCH] Smack: Restore the smackfsdef mount option
Casey Schaufler
- [PATCH] Smack: Restore the smackfsdef mount option
David Howells
- [PATCH] Smack: Restore the smackfsdef mount option
Casey Schaufler
- [PATCH] Smack: Restore the smackfsdef mount option
David Howells
- [PATCH] Smack: Restore the smackfsdef mount option
Casey Schaufler
- [PATCH] Smack: Restore the smackfsdef mount option
Casey Schaufler
- [PATCH] Smack: Restore the smackfsdef mount option and add missing prefixes
Casey Schaufler
- [PATCH] Smack: Restore the smackfsdef mount option and add missing prefixes
David Howells
- [PATCH] Smack: Restore the smackfsdef mount option and add missing prefixes
David Howells
- [PATCH] Smack: Restore the smackfsdef mount option and add missing prefixes
David Howells
- [PATCH] tomoyo: Don't emit WARNING: string while fuzzing testing.
Tetsuo Handa
- [PATCH] tomoyo: Don't emit WARNING: string while fuzzing testing.
James Morris
- [PATCH] tomoyo: Don't emit WARNING: string while fuzzing testing.
Dmitry Vyukov
- [PATCH] tomoyo: Don't emit WARNING: string while fuzzing testing.
Tetsuo Handa
- [PATCH] tomoyo: Don't emit WARNING: string while fuzzing testing.
James Morris
- [PULL] Smack: Repair for 5.2 build issue.
Casey Schaufler
- [PULL] Smack: Repair for 5.2 build issue.
James Morris
- [PULL] Smack: Repair for 5.2 build issue.
Casey Schaufler
- [PULL] Smack: Repair for 5.2 build issue.
James Morris
- [PULL] Smack: Restore the smackfsdef mount option
Casey Schaufler
- [PULL] Smack: Restore the smackfsdef mount option
David Howells
- [PULL] Smack: Restore the smackfsdef mount option
Casey Schaufler
- [PULL] Smack: Restore the smackfsdef mount option
David Howells
- [PULL] Smack: Restore the smackfsdef mount option
Casey Schaufler
- [RFC 0/1] Add dm verity root hash pkcs7 sig validation.
Jaskaran Khurana
- [RFC 1/1] Add dm verity root hash pkcs7 sig validation.
Jaskaran Khurana
- [RFC 1/1] Add dm verity root hash pkcs7 sig validation.
Singh, Balbir
- [RFC 1/1] Add dm verity root hash pkcs7 sig validation.
Milan Broz
- [RFC 1/2] security: Support early LSMs
Matthew Garrett
- [RFC 2/2] Add the ability to lock down access to the running kernel image
James Morris
- [RFC 2/2] Add the ability to lock down access to the running kernel image
Matthew Garrett
- [RFC PATCH 0/9] security: x86/sgx: SGX vs. LSM
Sean Christopherson
- [RFC PATCH 1/9] x86/sgx: Remove unused local variable in sgx_encl_release()
Sean Christopherson
- [RFC PATCH 2/7] x86/sci: add core implementation for system call isolation
Robert O'Callahan
- [RFC PATCH 2/7] x86/sci: add core implementation for system call isolation
Ingo Molnar
- [RFC PATCH 2/7] x86/sci: add core implementation for system call isolation
Robert O'Callahan
- [RFC PATCH 2/9] x86/sgx: Do not naturally align MAP_FIXED address
Sean Christopherson
- [RFC PATCH 3/9] x86/sgx: Allow userspace to add multiple pages in single ioctl()
Sean Christopherson
- [RFC PATCH 4/9] mm: Introduce vm_ops->mprotect()
Sean Christopherson
- [RFC PATCH 5/7] x86/mm/fault: hook up SCI verification
Mike Rapoport
- [RFC PATCH 5/9] x86/sgx: Restrict mapping without an enclave page to PROT_NONE
Sean Christopherson
- [RFC PATCH 6/9] x86/sgx: Require userspace to provide allowed prots to ADD_PAGES
Sean Christopherson
- [RFC PATCH 7/9] x86/sgx: Enforce noexec filesystem restriction for enclaves
Sean Christopherson
- [RFC PATCH 8/9] LSM: x86/sgx: Introduce ->enclave_load() hook for Intel SGX
Sean Christopherson
- [RFC PATCH 9/9] security/selinux: Add enclave_load() implementation
Sean Christopherson
- [RFC PATCH v9 03/13] mm: Add support for eXclusive Page Frame Ownership (XPFO)
Waiman Long
- [RFC PATCH v9 03/13] mm: Add support for eXclusive Page Frame Ownership (XPFO)
Khalid Aziz
- [RFC] Turn lockdown into an LSM
Matthew Garrett
- [RFC] Turn lockdown into an LSM
James Morris
- [RFC] Turn lockdown into an LSM
Matthew Garrett
- [RFC] Turn lockdown into an LSM
Andy Lutomirski
- [RFC] Turn lockdown into an LSM
James Morris
- [RFC] Turn lockdown into an LSM
Stephen Smalley
- [RFC] Turn lockdown into an LSM
James Morris
- [RFC] Turn lockdown into an LSM
Casey Schaufler
- [RFC] Turn lockdown into an LSM
Stephen Smalley
- [RFC][PATCH 0/7] Mount, FS, Block and Keyrings notifications
David Howells
- [RFC][PATCH 0/7] Mount, FS, Block and Keyrings notifications
Greg KH
- [RFC][PATCH 0/7] Mount, FS, Block and Keyrings notifications
Amir Goldstein
- [RFC][PATCH 0/7] Mount, FS, Block and Keyrings notifications
David Howells
- [RFC][PATCH 0/7] Mount, FS, Block and Keyrings notifications
Amir Goldstein
- [RFC][PATCH 0/7] Mount, FS, Block and Keyrings notifications
David Howells
- [RFC][PATCH 0/7] Mount, FS, Block and Keyrings notifications
Jan Kara
- [RFC][PATCH 0/7] Mount, FS, Block and Keyrings notifications
Greg KH
- [RFC][PATCH 0/7] Mount, FS, Block and Keyrings notifications
Casey Schaufler
- [RFC][PATCH 0/7] Mount, FS, Block and Keyrings notifications
Amir Goldstein
- [RFC][PATCH 0/7] Mount, FS, Block and Keyrings notifications
Jan Kara
- [USER][PATCH] cpio: add option to add file metadata in copy-out mode
Roberto Sassu
- Carrying over the ima log during kexec_file_load
prakhar srivastava
- Fwd: [PATCH 2/2] ceph: add selinux support
Yan, Zheng
- Fwd: Re: kernel panic: MAC Initialization failed. (3)
Tetsuo Handa
- Help to get traffic
Alex Walker
- Inquiry 20/May/2019
Daniel Murray
- KASAN: invalid-free in tomoyo_realpath_from_path
syzbot
- KASAN: invalid-free in tomoyo_realpath_from_path
Tetsuo Handa
- KMSAN: uninit-value in tomoyo_check_inet_address
syzbot
- KMSAN: uninit-value in tomoyo_check_inet_address
Tetsuo Handa
- KMSAN: uninit-value in tomoyo_check_inet_address
Alexander Potapenko
- KMSAN: uninit-value in tomoyo_check_inet_address
Tetsuo Handa
- KMSAN: uninit-value in tomoyo_check_unix_address
syzbot
- Printing for your logo
Heather
- Purchase_rfq
aishatu at mahatta.net
- security/loadpin: Allow to exclude specific file types
Colin Ian King
- security/loadpin: Allow to exclude specific file types
Kees Cook
- security/loadpin: Allow to exclude specific file types
Colin Ian King
- security/loadpin: Allow to exclude specific file types
Ke Wu
- security/loadpin: Allow to exclude specific file types
Kees Cook
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Andy Lutomirski
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
James Morris
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Andy Lutomirski
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Sean Christopherson
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
James Morris
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Andy Lutomirski
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Haitao Huang
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Xing, Cedric
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Andy Lutomirski
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Jarkko Sakkinen
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
James Morris
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Andy Lutomirski
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Andy Lutomirski
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Xing, Cedric
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Sean Christopherson
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Xing, Cedric
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Sean Christopherson
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Andy Lutomirski
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Andy Lutomirski
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Xing, Cedric
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Andy Lutomirski
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Stephen Smalley
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Sean Christopherson
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Sean Christopherson
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Sean Christopherson
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Stephen Smalley
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Andy Lutomirski
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Stephen Smalley
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Andy Lutomirski
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Sean Christopherson
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Stephen Smalley
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Andy Lutomirski
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Sean Christopherson
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Sean Christopherson
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Linus Torvalds
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Stephen Smalley
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Stephen Smalley
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Sean Christopherson
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Linus Torvalds
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Sean Christopherson
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Andy Lutomirski
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Stephen Smalley
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Sean Christopherson
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Stephen Smalley
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Andy Lutomirski
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Stephen Smalley
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Sean Christopherson
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Dr. Greg
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Jarkko Sakkinen
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Jarkko Sakkinen
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Jarkko Sakkinen
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Jarkko Sakkinen
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Jarkko Sakkinen
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Jarkko Sakkinen
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Sean Christopherson
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Jarkko Sakkinen
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Jarkko Sakkinen
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Jarkko Sakkinen
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Stephen Smalley
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Sean Christopherson
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Andy Lutomirski
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Sean Christopherson
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Jarkko Sakkinen
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Jarkko Sakkinen
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Jarkko Sakkinen
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Sean Christopherson
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Andy Lutomirski
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Sean Christopherson
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Sean Christopherson
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Andy Lutomirski
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Xing, Cedric
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Stephen Smalley
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Stephen Smalley
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Andy Lutomirski
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Xing, Cedric
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Sean Christopherson
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Sean Christopherson
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Andy Lutomirski
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Andy Lutomirski
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Sean Christopherson
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Sean Christopherson
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Xing, Cedric
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Sean Christopherson
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Andy Lutomirski
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Andy Lutomirski
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Sean Christopherson
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Xing, Cedric
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Xing, Cedric
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Sean Christopherson
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Andy Lutomirski
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Sean Christopherson
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Andy Lutomirski
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Dr. Greg
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Xing, Cedric
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Andy Lutomirski
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Xing, Cedric
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Jarkko Sakkinen
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Jarkko Sakkinen
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Jarkko Sakkinen
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Sean Christopherson
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Andy Lutomirski
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Sean Christopherson
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Stephen Smalley
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Xing, Cedric
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Xing, Cedric
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Stephen Smalley
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Andy Lutomirski
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Stephen Smalley
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Andy Lutomirski
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Sean Christopherson
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Sean Christopherson
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Andy Lutomirski
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Sean Christopherson
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Andy Lutomirski
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Sean Christopherson
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Xing, Cedric
- SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
Sean Christopherson
- sleep in selinux_audit_rule_init
Janne Karhunen
- sleep in selinux_audit_rule_init
Stephen Smalley
- sleep in selinux_audit_rule_init
Stephen Smalley
- sleep in selinux_audit_rule_init
Janne Karhunen
- sleep in selinux_audit_rule_init
Mimi Zohar
- sleep in selinux_audit_rule_init
Stephen Smalley
- sleep in selinux_audit_rule_init
Mimi Zohar
- sleep in selinux_audit_rule_init
Casey Schaufler
- sleep in selinux_audit_rule_init
Stephen Smalley
- sleep in selinux_audit_rule_init
Janne Karhunen
- sleep in selinux_audit_rule_init
Stephen Smalley
- sleep in selinux_audit_rule_init
Paul Moore
- sleep in selinux_audit_rule_init
Janne Karhunen
- sleep in selinux_audit_rule_init
Stephen Smalley
- sleep in selinux_audit_rule_init
Janne Karhunen
- Stacking patches for 5.3
Casey Schaufler
- Stacking patches for 5.3
James Morris
- Stacking patches for 5.3
Paul Moore
- Stacking patches for 5.3
Casey Schaufler
- Stacking patches for 5.3
James Morris
- Tomoyo build warnings
James Morris
- Tomoyo build warnings
Tetsuo Handa
Last message date:
Fri May 31 23:31:59 UTC 2019
Archived on: Fri May 31 23:34:18 UTC 2019
This archive was generated by
Pipermail 0.09 (Mailman edition).