November 2019 Archives by subject
      
      Starting: Fri Nov  1 09:34:18 UTC 2019
         Ending: Sat Nov 30 23:05:02 UTC 2019
         Messages: 382
     
- [GIT PULL] pipe: General notification queue
 
David Howells
 - [GIT PULL] pipe: Notification queue preparation
 
David Howells
 - [GIT PULL] pipe: Notification queue preparation
 
pr-tracker-bot at kernel.org
 - [GIT PULL] SELinux patches for v5.5
 
Paul Moore
 - [LKP] Re: [pipe] d60337eff1:	BUG:kernel_NULL_pointer_dereference,address
 
kernel test robot
 - [PATCH -next] x86/efi: remove unused variables
 
YueHaibing
 - [PATCH -next] x86/efi: remove unused variables
 
Michael Ellerman
 - [PATCH 0/2] Revert patches fixing probing of interrupts
 
Stefan Berger
 - [PATCH 0/2] Revert patches fixing probing of interrupts
 
Jarkko Sakkinen
 - [PATCH 01/25] LSM: Infrastructure management of the sock security
 
Casey Schaufler
 - [PATCH 02/25] LSM: Create and manage the lsmblob data structure.
 
Casey Schaufler
 - [PATCH 03/25] LSM: Use lsmblob in security_audit_rule_match
 
Casey Schaufler
 - [PATCH 04/25] LSM: Use lsmblob in security_kernel_act_as
 
Casey Schaufler
 - [PATCH 05/25] net: Prepare UDS for security module stacking
 
Casey Schaufler
 - [PATCH 06/25] LSM: Use lsmblob in security_secctx_to_secid
 
Casey Schaufler
 - [PATCH 07/25] LSM: Use lsmblob in security_secid_to_secctx
 
Casey Schaufler
 - [PATCH 08/25] LSM: Use lsmblob in security_ipc_getsecid
 
Casey Schaufler
 - [PATCH 09/25] LSM: Use lsmblob in security_task_getsecid
 
Casey Schaufler
 - [PATCH 1/2] selinux: revert "stop passing MAY_NOT_BLOCK to the AVC	upon follow_link"
 
Stephen Smalley
 - [PATCH 1/2] tpm: Revert "tpm_tis_core: Set TPM_CHIP_FLAG_IRQ before	probing for interrupts"
 
Stefan Berger
 - [PATCH 10/25] LSM: Use lsmblob in security_inode_getsecid
 
Casey Schaufler
 - [PATCH 11/25] LSM: Use lsmblob in security_cred_getsecid
 
Casey Schaufler
 - [PATCH 12/25] IMA: Change internal interfaces to use lsmblobs
 
Casey Schaufler
 - [PATCH 13/25] LSM: Specify which LSM to display
 
Casey Schaufler
 - [PATCH 14/25] LSM: Ensure the correct LSM context releaser
 
Casey Schaufler
 - [PATCH 15/25] LSM: Use lsmcontext in security_secid_to_secctx
 
Casey Schaufler
 - [PATCH 16/25] LSM: Use lsmcontext in security_dentry_init_security
 
Casey Schaufler
 - [PATCH 18/30] acpi: Disable APEI error injection if the kernel is	locked down
 
Joey Lee
 - [PATCH 2/2] selinux: fall back to ref-walk if audit is required
 
Stephen Smalley
 - [PATCH 2/2] tpm: Revert "tpm_tis_core: Turn on the TPM before probing	IRQ's"
 
Stefan Berger
 - [PATCH AUTOSEL 4.14 120/127] apparmor: delete the dentry in	aafs_remove() to avoid a leak
 
Sasha Levin
 - [PATCH AUTOSEL 4.19 205/219] apparmor: delete the dentry in	aafs_remove() to avoid a leak
 
Sasha Levin
 - [PATCH bpf-next v13 0/7] Landlock LSM
 
Mickaël Salaün
 - [PATCH bpf-next v13 1/7] bpf,	landlock: Define an eBPF program type for Landlock hooks
 
Mickaël Salaün
 - [PATCH bpf-next v13 2/7] landlock: Add the management of domains
 
Mickaël Salaün
 - [PATCH bpf-next v13 3/7] landlock,	seccomp: Apply Landlock programs to process hierarchy
 
Mickaël Salaün
 - [PATCH bpf-next v13 4/7] landlock: Add ptrace LSM hooks
 
Mickaël Salaün
 - [PATCH bpf-next v13 4/7] landlock: Add ptrace LSM hooks
 
Alexei Starovoitov
 - [PATCH bpf-next v13 4/7] landlock: Add ptrace LSM hooks
 
Casey Schaufler
 - [PATCH bpf-next v13 4/7] landlock: Add ptrace LSM hooks
 
Mickaël Salaün
 - [PATCH bpf-next v13 4/7] landlock: Add ptrace LSM hooks
 
Alexei Starovoitov
 - [PATCH bpf-next v13 4/7] landlock: Add ptrace LSM hooks
 
Alexei Starovoitov
 - [PATCH bpf-next v13 4/7] landlock: Add ptrace LSM hooks
 
Casey Schaufler
 - [PATCH bpf-next v13 4/7] landlock: Add ptrace LSM hooks
 
Alexei Starovoitov
 - [PATCH bpf-next v13 4/7] landlock: Add ptrace LSM hooks
 
Mickaël Salaün
 - [PATCH bpf-next v13 4/7] landlock: Add ptrace LSM hooks
 
Casey Schaufler
 - [PATCH bpf-next v13 4/7] landlock: Add ptrace LSM hooks
 
KP Singh
 - [PATCH bpf-next v13 4/7] landlock: Add ptrace LSM hooks
 
KP Singh
 - [PATCH bpf-next v13 4/7] landlock: Add ptrace LSM hooks
 
Mickaël Salaün
 - [PATCH bpf-next v13 4/7] landlock: Add ptrace LSM hooks
 
Mickaël Salaün
 - [PATCH bpf-next v13 4/7] landlock: Add ptrace LSM hooks
 
KP Singh
 - [PATCH bpf-next v13 4/7] landlock: Add ptrace LSM hooks
 
Mickaël Salaün
 - [PATCH bpf-next v13 4/7] landlock: Add ptrace LSM hooks
 
Daniel Borkmann
 - [PATCH bpf-next v13 4/7] landlock: Add ptrace LSM hooks
 
KP Singh
 - [PATCH bpf-next v13 4/7] landlock: Add ptrace LSM hooks
 
Mickaël Salaün
 - [PATCH bpf-next v13 5/7] bpf,	landlock: Add task_landlock_ptrace_ancestor() helper
 
Mickaël Salaün
 - [PATCH bpf-next v13 6/7] bpf,	landlock: Add tests for the Landlock ptrace program type
 
Mickaël Salaün
 - [PATCH bpf-next v13 7/7] landlock: Add user and kernel documentation	for Landlock
 
Mickaël Salaün
 - [PATCH linux-kselftest/test v1] apparmor: add AppArmor KUnit	tests for policy unpack
 
Alan Maguire
 - [PATCH linux-kselftest/test v1] apparmor: add AppArmor KUnit	tests for policy unpack
 
Mike Salvatore
 - [PATCH linux-kselftest/test v1] apparmor: add AppArmor KUnit	tests for policy unpack
 
Brendan Higgins
 - [PATCH linux-kselftest/test v1] apparmor: add AppArmor KUnit	tests for policy unpack
 
Brendan Higgins
 - [PATCH linux-kselftest/test v1] apparmor: add AppArmor KUnit	tests for policy unpack
 
Brendan Higgins
 - [PATCH linux-kselftest/test v1] apparmor: add AppArmor KUnit	tests for policy unpack
 
Brendan Higgins
 - [PATCH linux-kselftest/test v2] apparmor: add AppArmor KUnit	tests for policy unpack
 
John Johansen
 - [PATCH linux-kselftest/test v2] apparmor: add AppArmor KUnit	tests for policy unpack
 
Kees Cook
 - [PATCH linux-kselftest/test v2] apparmor: add AppArmor KUnit	tests for policy unpack
 
Brendan Higgins
 - [PATCH linux-kselftest/test v2] apparmor: add AppArmor KUnit	tests for policy unpack
 
Brendan Higgins
 - [PATCH linux-kselftest/test v2] apparmor: add AppArmor KUnit tests	for policy unpack
 
Brendan Higgins
 - [PATCH v10 00/25] LSM: Module stacking for AppArmor
 
James Morris
 - [PATCH v10 00/25] LSM: Module stacking for AppArmor
 
Casey Schaufler
 - [PATCH v10 00/25] LSM: Module stacking for AppArmor
 
Casey Schaufler
 - [PATCH v10 00/25] LSM: Module stacking for AppArmor
 
Casey Schaufler
 - [PATCH v10 01/25] LSM: Infrastructure management of the sock security
 
Casey Schaufler
 - [PATCH v10 02/25] LSM: Create and manage the lsmblob data structure.
 
Casey Schaufler
 - [PATCH v10 03/25] LSM: Use lsmblob in security_audit_rule_match
 
Casey Schaufler
 - [PATCH v10 04/25] LSM: Use lsmblob in security_kernel_act_as
 
Casey Schaufler
 - [PATCH v10 05/25] net: Prepare UDS for security module stacking
 
Casey Schaufler
 - [PATCH v10 06/25] LSM: Use lsmblob in security_secctx_to_secid
 
Casey Schaufler
 - [PATCH v10 07/25] LSM: Use lsmblob in security_secid_to_secctx
 
Casey Schaufler
 - [PATCH v10 08/25] LSM: Use lsmblob in security_ipc_getsecid
 
Casey Schaufler
 - [PATCH v10 09/25] LSM: Use lsmblob in security_task_getsecid
 
Casey Schaufler
 - [PATCH v10 10/25] LSM: Use lsmblob in security_inode_getsecid
 
Casey Schaufler
 - [PATCH v10 11/25] LSM: Use lsmblob in security_cred_getsecid
 
Casey Schaufler
 - [PATCH v10 12/25] IMA: Change internal interfaces to use lsmblobs
 
Casey Schaufler
 - [PATCH v10 13/25] LSM: Specify which LSM to display
 
Casey Schaufler
 - [PATCH v10 14/25] LSM: Ensure the correct LSM context releaser
 
Casey Schaufler
 - [PATCH v10 15/25] LSM: Use lsmcontext in security_secid_to_secctx
 
Casey Schaufler
 - [PATCH v10 16/25] LSM: Use lsmcontext in security_dentry_init_security
 
Casey Schaufler
 - [PATCH v10 17/25] LSM: Use lsmcontext in security_inode_getsecctx
 
Casey Schaufler
 - [PATCH v10 18/25] LSM: security_secid_to_secctx in netlink netfilter
 
Casey Schaufler
 - [PATCH v10 19/25] NET: Store LSM netlabel data in a lsmblob
 
Casey Schaufler
 - [PATCH v10 20/25] LSM: Verify LSM display sanity in binder
 
Casey Schaufler
 - [PATCH v10 21/25] Audit: Add subj_LSM fields when necessary
 
Casey Schaufler
 - [PATCH v10 22/25] Audit: Include object data for all security modules
 
Casey Schaufler
 - [PATCH v11 00/25] LSM: Module stacking for AppArmor
 
Casey Schaufler
 - [PATCH v11 00/25] LSM: Module stacking for AppArmor
 
Casey Schaufler
 - [PATCH v11 00/25] LSM: Module stacking for AppArmor
 
Casey Schaufler
 - [PATCH v11 00/25] LSM: Module stacking for AppArmor
 
Casey Schaufler
 - [PATCH v11 01/25] LSM: Infrastructure management of the sock	security
 
John Johansen
 - [PATCH v11 01/25] LSM: Infrastructure management of the sock security
 
Casey Schaufler
 - [PATCH v11 01/25] LSM: Infrastructure management of the sock security
 
Casey Schaufler
 - [PATCH v11 01/25] LSM: Infrastructure management of the sock security
 
Casey Schaufler
 - [PATCH v11 02/25] LSM: Create and manage the lsmblob data	structure.
 
James Morris
 - [PATCH v11 02/25] LSM: Create and manage the lsmblob data	structure.
 
John Johansen
 - [PATCH v11 02/25] LSM: Create and manage the lsmblob data	structure.
 
Tetsuo Handa
 - [PATCH v11 02/25] LSM: Create and manage the lsmblob data structure.
 
Casey Schaufler
 - [PATCH v11 02/25] LSM: Create and manage the lsmblob data structure.
 
Casey Schaufler
 - [PATCH v11 02/25] LSM: Create and manage the lsmblob data structure.
 
Casey Schaufler
 - [PATCH v11 03/25] LSM: Use lsmblob in security_audit_rule_match
 
Casey Schaufler
 - [PATCH v11 03/25] LSM: Use lsmblob in security_audit_rule_match
 
Casey Schaufler
 - [PATCH v11 03/25] LSM: Use lsmblob in security_audit_rule_match
 
Casey Schaufler
 - [PATCH v11 03/25] LSM: Use lsmblob in security_audit_rule_match
 
James Morris
 - [PATCH v11 03/25] LSM: Use lsmblob in security_audit_rule_match
 
John Johansen
 - [PATCH v11 04/25] LSM: Use lsmblob in security_kernel_act_as
 
Casey Schaufler
 - [PATCH v11 04/25] LSM: Use lsmblob in security_kernel_act_as
 
Casey Schaufler
 - [PATCH v11 04/25] LSM: Use lsmblob in security_kernel_act_as
 
Casey Schaufler
 - [PATCH v11 04/25] LSM: Use lsmblob in security_kernel_act_as
 
John Johansen
 - [PATCH v11 05/25] net: Prepare UDS for security module stacking
 
Casey Schaufler
 - [PATCH v11 05/25] net: Prepare UDS for security module stacking
 
Casey Schaufler
 - [PATCH v11 05/25] net: Prepare UDS for security module stacking
 
Casey Schaufler
 - [PATCH v11 05/25] net: Prepare UDS for security module stacking
 
John Johansen
 - [PATCH v11 06/25] LSM: Use lsmblob in security_secctx_to_secid
 
Casey Schaufler
 - [PATCH v11 06/25] LSM: Use lsmblob in security_secctx_to_secid
 
Casey Schaufler
 - [PATCH v11 06/25] LSM: Use lsmblob in security_secctx_to_secid
 
Casey Schaufler
 - [PATCH v11 06/25] LSM: Use lsmblob in security_secctx_to_secid
 
John Johansen
 - [PATCH v11 07/25] LSM: Use lsmblob in security_secid_to_secctx
 
Casey Schaufler
 - [PATCH v11 07/25] LSM: Use lsmblob in security_secid_to_secctx
 
Casey Schaufler
 - [PATCH v11 07/25] LSM: Use lsmblob in security_secid_to_secctx
 
Casey Schaufler
 - [PATCH v11 07/25] LSM: Use lsmblob in security_secid_to_secctx
 
John Johansen
 - [PATCH v11 08/25] LSM: Use lsmblob in security_ipc_getsecid
 
Casey Schaufler
 - [PATCH v11 08/25] LSM: Use lsmblob in security_ipc_getsecid
 
Casey Schaufler
 - [PATCH v11 08/25] LSM: Use lsmblob in security_ipc_getsecid
 
Casey Schaufler
 - [PATCH v11 08/25] LSM: Use lsmblob in security_ipc_getsecid
 
John Johansen
 - [PATCH v11 09/25] LSM: Use lsmblob in security_task_getsecid
 
Casey Schaufler
 - [PATCH v11 09/25] LSM: Use lsmblob in security_task_getsecid
 
Casey Schaufler
 - [PATCH v11 09/25] LSM: Use lsmblob in security_task_getsecid
 
Casey Schaufler
 - [PATCH v11 09/25] LSM: Use lsmblob in security_task_getsecid
 
John Johansen
 - [PATCH v11 10/25] LSM: Use lsmblob in security_inode_getsecid
 
Casey Schaufler
 - [PATCH v11 10/25] LSM: Use lsmblob in security_inode_getsecid
 
Casey Schaufler
 - [PATCH v11 10/25] LSM: Use lsmblob in security_inode_getsecid
 
Casey Schaufler
 - [PATCH v11 10/25] LSM: Use lsmblob in security_inode_getsecid
 
John Johansen
 - [PATCH v11 11/25] LSM: Use lsmblob in security_cred_getsecid
 
Casey Schaufler
 - [PATCH v11 11/25] LSM: Use lsmblob in security_cred_getsecid
 
Casey Schaufler
 - [PATCH v11 11/25] LSM: Use lsmblob in security_cred_getsecid
 
John Johansen
 - [PATCH v11 12/25] IMA: Change internal interfaces to use lsmblobs
 
Casey Schaufler
 - [PATCH v11 12/25] IMA: Change internal interfaces to use lsmblobs
 
Casey Schaufler
 - [PATCH v11 12/25] IMA: Change internal interfaces to use lsmblobs
 
John Johansen
 - [PATCH v11 13/25] LSM: Specify which LSM to display
 
Casey Schaufler
 - [PATCH v11 13/25] LSM: Specify which LSM to display
 
Casey Schaufler
 - [PATCH v11 14/25] LSM: Ensure the correct LSM context releaser
 
Casey Schaufler
 - [PATCH v11 14/25] LSM: Ensure the correct LSM context releaser
 
Casey Schaufler
 - [PATCH v11 14/25] LSM: Ensure the correct LSM context releaser
 
John Johansen
 - [PATCH v11 15/25] LSM: Use lsmcontext in security_secid_to_secctx
 
Casey Schaufler
 - [PATCH v11 15/25] LSM: Use lsmcontext in security_secid_to_secctx
 
Casey Schaufler
 - [PATCH v11 16/25] LSM: Use lsmcontext in	security_dentry_init_security
 
John Johansen
 - [PATCH v11 16/25] LSM: Use lsmcontext in security_dentry_init_security
 
Casey Schaufler
 - [PATCH v11 16/25] LSM: Use lsmcontext in security_dentry_init_security
 
Casey Schaufler
 - [PATCH v11 17/25] LSM: Use lsmcontext in security_inode_getsecctx
 
Casey Schaufler
 - [PATCH v11 17/25] LSM: Use lsmcontext in security_inode_getsecctx
 
Casey Schaufler
 - [PATCH v11 17/25] LSM: Use lsmcontext in security_inode_getsecctx
 
James Morris
 - [PATCH v11 18/25] LSM: security_secid_to_secctx in netlink	netfilter
 
John Johansen
 - [PATCH v11 18/25] LSM: security_secid_to_secctx in netlink	netfilter
 
James Morris
 - [PATCH v11 18/25] LSM: security_secid_to_secctx in netlink netfilter
 
Casey Schaufler
 - [PATCH v11 18/25] LSM: security_secid_to_secctx in netlink netfilter
 
Casey Schaufler
 - [PATCH v11 19/25] NET: Store LSM netlabel data in a lsmblob
 
Casey Schaufler
 - [PATCH v11 19/25] NET: Store LSM netlabel data in a lsmblob
 
John Johansen
 - [PATCH v11 20/25] LSM: Verify LSM display sanity in binder
 
Casey Schaufler
 - [PATCH v11 21/25] Audit: Add subj_LSM fields when necessary
 
Casey Schaufler
 - [PATCH v11 22/25] Audit: Include object data for all security modules
 
Casey Schaufler
 - [PATCH v11 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
 
Casey Schaufler
 - [PATCH v11 24/25] LSM: Add /proc attr entry for full LSM context
 
Casey Schaufler
 - [PATCH v11 25/25] AppArmor: Remove the exclusive flag
 
Casey Schaufler
 - [PATCH v11 25/25] AppArmor: Remove the exclusive flag
 
John Johansen
 - [PATCH v14 1/5] Add flags option to get xattr method paired to	__vfs_getxattr
 
Mark Salyzyn
 - [PATCH v14 4/5] overlayfs: internal getxattr operations without	sepolicy checking
 
Mark Salyzyn
 - [PATCH v15 2/4] overlayfs: handle XATTR_NOSECURITY flag for get xattr	method
 
Mark Salyzyn
 - [PATCH v15 3/4] overlayfs: internal getxattr operations without	sepolicy checking
 
Mark Salyzyn
 - [PATCH v23 12/24] x86/sgx: Linux Enclave Driver
 
Stephen Smalley
 - [PATCH v23 12/24] x86/sgx: Linux Enclave Driver
 
Stephen Smalley
 - [PATCH v23 12/24] x86/sgx: Linux Enclave Driver
 
Sean Christopherson
 - [PATCH v23 12/24] x86/sgx: Linux Enclave Driver
 
Stephen Smalley
 - [PATCH v23 12/24] x86/sgx: Linux Enclave Driver
 
Jarkko Sakkinen
 - [PATCH v23 12/24] x86/sgx: Linux Enclave Driver
 
Jarkko Sakkinen
 - [PATCH v23 12/24] x86/sgx: Linux Enclave Driver
 
Jarkko Sakkinen
 - [PATCH v23 12/24] x86/sgx: Linux Enclave Driver
 
Greg KH
 - [PATCH v24 12/24] x86/sgx: Linux Enclave Driver
 
Jarkko Sakkinen
 - [PATCH v24 15/24] x86/sgx: Add provisioning
 
Jarkko Sakkinen
 - [PATCH v2] efi: Only print errors about failing to get certs if	EFI vars are found
 
Hans de Goede
 - [PATCH v2] efi: Only print errors about failing to get certs if EFI	vars are found
 
Javier Martinez Canillas
 - [PATCH v2] security: Fix Kconfig indentation
 
Krzysztof Kozlowski
 - [PATCH v2] tomoyo: Don't check open/getattr permission on sockets.
 
Tetsuo Handa
 - [PATCH v2] tomoyo: Don't check open/getattr permission on sockets.
 
James Morris
 - [PATCH v2] tomoyo: Don't check open/getattr permission on sockets.
 
Tetsuo Handa
 - [PATCH v2] tomoyo: Don't check open/getattr permission on sockets.
 
Tetsuo Handa
 - [Patch v3 6/7] doc: keys: Document usage of TEE based Trusted Keys
 
Sumit Garg
 - [Patch v3 6/7] doc: keys: Document usage of TEE based Trusted Keys
 
Jarkko Sakkinen
 - [Patch v3 6/7] doc: keys: Document usage of TEE based Trusted Keys
 
Sumit Garg
 - [Patch v3 6/7] doc: keys: Document usage of TEE based Trusted Keys
 
Jarkko Sakkinen
 - [PATCH v4 0/10] KEYS: Measure keys when they are created or updated
 
Lakshmi Ramasubramanian
 - [PATCH v4 01/10] IMA: Defined an IMA hook to measure keys on	key create or update
 
Mimi Zohar
 - [PATCH v4 01/10] IMA: Defined an IMA hook to measure keys on	key create or update
 
Mimi Zohar
 - [PATCH v4 01/10] IMA: Defined an IMA hook to measure keys on	key create or update
 
Mimi Zohar
 - [PATCH v4 01/10] IMA: Defined an IMA hook to measure keys on key	create or update
 
Lakshmi Ramasubramanian
 - [PATCH v4 01/10] IMA: Defined an IMA hook to measure keys on key	create or update
 
Lakshmi Ramasubramanian
 - [PATCH v4 01/10] IMA: Defined an IMA hook to measure keys on key	create or update
 
Lakshmi Ramasubramanian
 - [PATCH v4 01/10] IMA: Defined an IMA hook to measure keys on key	create or update
 
Lakshmi Ramasubramanian
 - [PATCH v4 02/10] IMA: Added KEYRING_CHECK func in IMA policy to	measure keys
 
Lakshmi Ramasubramanian
 - [PATCH v4 03/10] IMA: Added keyrings= option in IMA policy to only	measure keys added to the specified keyrings.
 
Lakshmi Ramasubramanian
 - [PATCH v4 04/10] IMA: Read keyrings= option from the IMA policy into	ima_rule_entry
 
Lakshmi Ramasubramanian
 - [PATCH v4 05/10] IMA: Updated IMA policy functions to return keyrings	option read from the policy
 
Lakshmi Ramasubramanian
 - [PATCH v4 06/10] IMA: Measure key if the IMA policy allows	measurement for the keyring to which the key is linked to
 
Lakshmi Ramasubramanian
 - [PATCH v4 07/10] IMA: Added a boolean flag to track IMA	initialization status
 
Lakshmi Ramasubramanian
 - [PATCH v4 08/10] IMA: Defined functions to queue and dequeue	keys for measurement
 
Mimi Zohar
 - [PATCH v4 08/10] IMA: Defined functions to queue and dequeue keys	for measurement
 
Lakshmi Ramasubramanian
 - [PATCH v4 08/10] IMA: Defined functions to queue and dequeue keys	for measurement
 
Lakshmi Ramasubramanian
 - [PATCH v4 08/10] IMA: Defined functions to queue and dequeue keys for	measurement
 
Lakshmi Ramasubramanian
 - [PATCH v4 09/10] IMA: Call queue and dequeue functions to measure keys
 
Lakshmi Ramasubramanian
 - [PATCH v4 10/10] KEYS: Call the IMA hook to measure key when a new	key is created or an existing key is updated
 
Lakshmi Ramasubramanian
 - [PATCH v5 0/10] KEYS: Measure keys when they are created or	updated
 
Lakshmi Ramasubramanian
 - [PATCH v5 0/10] KEYS: Measure keys when they are created or	updated
 
Mimi Zohar
 - [PATCH v5 0/10] KEYS: Measure keys when they are created or	updated
 
Lakshmi Ramasubramanian
 - [PATCH v5 0/10] KEYS: Measure keys when they are created or updated
 
Lakshmi Ramasubramanian
 - [PATCH v5 01/10] IMA: Added KEYRING_CHECK func in IMA policy to	measure keys
 
Lakshmi Ramasubramanian
 - [PATCH v5 01/10] IMA: Added KEYRING_CHECK func in IMA policy to	measure keys
 
Mimi Zohar
 - [PATCH v5 01/10] IMA: Added KEYRING_CHECK func in IMA policy to	measure keys
 
Lakshmi Ramasubramanian
 - [PATCH v5 02/10] IMA: Added keyrings= option in IMA policy to	only measure keys added to the specified keyrings.
 
Mimi Zohar
 - [PATCH v5 02/10] IMA: Added keyrings= option in IMA policy to	only measure keys added to the specified keyrings.
 
Lakshmi Ramasubramanian
 - [PATCH v5 02/10] IMA: Added keyrings= option in IMA policy to	only measure keys added to the specified keyrings.
 
Mimi Zohar
 - [PATCH v5 02/10] IMA: Added keyrings= option in IMA policy to only	measure keys added to the specified keyrings.
 
Lakshmi Ramasubramanian
 - [PATCH v5 03/10] IMA: Read keyrings= option from the IMA policy into	ima_rule_entry
 
Lakshmi Ramasubramanian
 - [PATCH v5 04/10] IMA: Updated IMA policy functions to return	keyrings option read from the policy
 
Mimi Zohar
 - [PATCH v5 04/10] IMA: Updated IMA policy functions to return	keyrings option read from the policy
 
Lakshmi Ramasubramanian
 - [PATCH v5 04/10] IMA: Updated IMA policy functions to return	keyrings option read from the policy
 
Mimi Zohar
 - [PATCH v5 04/10] IMA: Updated IMA policy functions to return keyrings	option read from the policy
 
Lakshmi Ramasubramanian
 - [PATCH v5 05/10] IMA: Measure key if the IMA policy allows	measurement for the keyring to which the key is linked to
 
Lakshmi Ramasubramanian
 - [PATCH v5 06/10] IMA: Defined an IMA hook to measure keys on key	create or update
 
Lakshmi Ramasubramanian
 - [PATCH v5 07/10] KEYS: Call the IMA hook to measure key when a new	key is created or an existing key is updated
 
Lakshmi Ramasubramanian
 - [PATCH v5 08/10] IMA: Added a flag to determine whether IMA hook can	process the key now or has to queue for processing later
 
Lakshmi Ramasubramanian
 - [PATCH v5 09/10] IMA: Defined functions to queue and dequeue keys for	measurement
 
Lakshmi Ramasubramanian
 - [PATCH v5 10/10] IMA: Call queue and dequeue functions to measure	keys.
 
Lakshmi Ramasubramanian
 - [PATCH v5 15/27] nfs: get rid of ->set_security()
 
James Morris
 - [PATCH v6 0/3] KEYS: Measure keys when they are created or updated
 
Lakshmi Ramasubramanian
 - [PATCH v6 0/3] KEYS: Measure keys when they are created or updated
 
Mimi Zohar
 - [PATCH v6 0/3] KEYS: Measure keys when they are created or updated
 
Lakshmi Ramasubramanian
 - [PATCH v6 1/3] IMA: Add KEY_CHECK func to measure keys
 
Lakshmi Ramasubramanian
 - [PATCH v6 1/3] IMA: Add KEY_CHECK func to measure keys
 
Mimi Zohar
 - [PATCH v6 1/3] IMA: Add KEY_CHECK func to measure keys
 
Lakshmi Ramasubramanian
 - [PATCH v6 1/3] IMA: Add KEY_CHECK func to measure keys
 
Mimi Zohar
 - [PATCH v6 2/3] IMA: Define an IMA hook to measure keys
 
Lakshmi Ramasubramanian
 - [PATCH v6 2/3] IMA: Define an IMA hook to measure keys
 
Mimi Zohar
 - [PATCH v6 2/3] IMA: Define an IMA hook to measure keys
 
Lakshmi Ramasubramanian
 - [PATCH v6 2/3] IMA: Define an IMA hook to measure keys
 
Mimi Zohar
 - [PATCH v6 2/3] IMA: Define an IMA hook to measure keys
 
Lakshmi Ramasubramanian
 - [PATCH v6 3/3] KEYS: Call the IMA hook to measure keys
 
Lakshmi Ramasubramanian
 - [PATCH v6 3/3] KEYS: Call the IMA hook to measure keys
 
Mimi Zohar
 - [PATCH v7 0/5] KEYS: Measure keys when they are created or updated
 
Lakshmi Ramasubramanian
 - [PATCH v7 1/5] IMA: Add KEY_CHECK func to measure keys
 
Lakshmi Ramasubramanian
 - [PATCH v7 2/5] IMA: Define an IMA hook to measure keys
 
Lakshmi Ramasubramanian
 - [PATCH v7 2/5] IMA: Define an IMA hook to measure keys
 
Lakshmi Ramasubramanian
 - [PATCH v7 3/5] KEYS: Call the IMA hook to measure keys
 
Lakshmi Ramasubramanian
 - [PATCH v7 3/5] KEYS: Call the IMA hook to measure keys
 
Mimi Zohar
 - [PATCH v7 3/5] KEYS: Call the IMA hook to measure keys
 
Lakshmi Ramasubramanian
 - [PATCH v7 3/5] KEYS: Call the IMA hook to measure keys
 
Mimi Zohar
 - [PATCH v7 4/5] IMA: Add support to limit measuring keys
 
Lakshmi Ramasubramanian
 - [PATCH v7 4/5] IMA: Add support to limit measuring keys
 
Mimi Zohar
 - [PATCH v7 4/5] IMA: Add support to limit measuring keys
 
Lakshmi Ramasubramanian
 - [PATCH v7 5/5] IMA: Read keyrings= option from the IMA policy
 
Lakshmi Ramasubramanian
 - [PATCH] efi: Only print errors about failing to get certs if EFI	vars are found
 
Hans de Goede
 - [PATCH] efi: Only print errors about failing to get certs if EFI	vars are found
 
Javier Martinez Canillas
 - [PATCH] efi: Only print errors about failing to get certs if EFI vars	are found
 
Javier Martinez Canillas
 - [PATCH] Kernel Lockdown: Add an option to allow raw MSR access	even, in confidentiality mode.
 
Kees Cook
 - [PATCH] Kernel Lockdown: Add an option to allow raw MSR access	even, in confidentiality mode.
 
Matt Parnell
 - [PATCH] security/keyring: avoid pagefaults in	keyring_read_iterator
 
Chris von Recklinghausen
 - [PATCH] security: Fix Kconfig indentation
 
Krzysztof Kozlowski
 - [PATCH] Smack: check length in smk_set_cipso()
 
Denis Efremov
 - [PATCH] tpm_tis: Move setting of TPM_CHIP_FLAG_IRQ into	tpm_tis_probe_irq_single
 
Stefan Berger
 - [PATCH] tpm_tis: Move setting of TPM_CHIP_FLAG_IRQ into	tpm_tis_probe_irq_single
 
Jarkko Sakkinen
 - [PATCH] tpm_tis: Move setting of TPM_CHIP_FLAG_IRQ into	tpm_tis_probe_irq_single
 
Jarkko Sakkinen
 - [PATCH] tpm_tis: Move setting of TPM_CHIP_FLAG_IRQ into	tpm_tis_probe_irq_single
 
Stefan Berger
 - [PATCH] tpm_tis: Move setting of TPM_CHIP_FLAG_IRQ into	tpm_tis_probe_irq_single
 
Jerry Snitselaar
 - [PATCH] tpm_tis: Move setting of TPM_CHIP_FLAG_IRQ into	tpm_tis_probe_irq_single
 
Jarkko Sakkinen
 - [PATCH] tpm_tis: Move setting of TPM_CHIP_FLAG_IRQ into	tpm_tis_probe_irq_single
 
Jerry Snitselaar
 - [PATCH] tpm_tis: Move setting of TPM_CHIP_FLAG_IRQ into	tpm_tis_probe_irq_single
 
Jarkko Sakkinen
 - [PATCH] tpm_tis: Move setting of TPM_CHIP_FLAG_IRQ into	tpm_tis_probe_irq_single
 
Dan Williams
 - [PATCH] tpm_tis: Move setting of TPM_CHIP_FLAG_IRQ into	tpm_tis_probe_irq_single
 
Jerry Snitselaar
 - [PATCH] tpm_tis: Move setting of TPM_CHIP_FLAG_IRQ into	tpm_tis_probe_irq_single
 
Jarkko Sakkinen
 - [PATCH] x86/mtrr: only administrator can read the configurations.
 
Kees Cook
 - [PATCH] x86/mtrr: only administrator can read the configurations.
 
Borislav Petkov
 - [PATCH] x86/mtrr: only administrator can read the configurations.
 
Kees Cook
 - [PATCH] x86/mtrr: only administrator can read the configurations.
 
Thomas Gleixner
 - [PATCH] x86/mtrr: Require CAP_SYS_ADMIN for all access
 
Kees Cook
 - [PATCH] x86/mtrr: Require CAP_SYS_ADMIN for all access
 
Borislav Petkov
 - [PATCH] x86/mtrr: Require CAP_SYS_ADMIN for all access
 
James Morris
 - [pipe] d60337eff1:	phoronix-test-suite.noise-level.0.activity_level 144.0% improvement
 
Linus Torvalds
 - [pipe] d60337eff1:	phoronix-test-suite.noise-level.0.activity_level 144.0% improvement
 
David Howells
 - [pipe] d60337eff1: BUG:kernel_NULL_pointer_dereference,address
 
David Howells
 - [pipe] d60337eff1: BUG:kernel_NULL_pointer_dereference,address
 
David Howells
 - [RFC PATCH 00/11] pipe: Notification queue preparation [ver #3]
 
David Howells
 - [RFC PATCH 00/11] pipe: Notification queue preparation [ver #3]
 
Linus Torvalds
 - [RFC PATCH 00/11] pipe: Notification queue preparation [ver #3]
 
David Howells
 - [RFC PATCH 00/11] pipe: Notification queue preparation [ver #3]
 
Linus Torvalds
 - [RFC PATCH 00/14] pipe: Keyrings, Block and USB notifications [ver #2]
 
David Howells
 - [RFC PATCH 01/11] pipe: Reduce #inclusion of pipe_fs_i.h [ver #3]
 
David Howells
 - [RFC PATCH 01/14] uapi: General notification queue definitions [ver	#2]
 
David Howells
 - [RFC PATCH 02/11] Remove the nr_exclusive argument from	__wake_up_sync_key() [ver #3]
 
David Howells
 - [RFC PATCH 02/14] security: Add hooks to rule on setting a watch	[ver #2]
 
David Howells
 - [RFC PATCH 03/11] Add wake_up_interruptible_sync_poll_locked() [ver	#3]
 
David Howells
 - [RFC PATCH 03/14] security: Add a hook for the point of	notification insertion [ver #2]
 
David Howells
 - [RFC PATCH 04/10] pipe: Use head and tail pointers for the ring,	not cursor and length [ver #2]
 
David Howells
 - [RFC PATCH 04/10] pipe: Use head and tail pointers for the ring, 	not cursor and length [ver #2]
 
Matthew Wilcox
 - [RFC PATCH 04/11] pipe: Use head and tail pointers for the ring,	not cursor and length [ver #3]
 
David Howells
 - [RFC PATCH 04/14] pipe: Add O_NOTIFICATION_PIPE [ver #2]
 
David Howells
 - [RFC PATCH 04/14] pipe: Add O_NOTIFICATION_PIPE [ver #2]
 
Andy Lutomirski
 - [RFC PATCH 04/14] pipe: Add O_NOTIFICATION_PIPE [ver #2]
 
David Howells
 - [RFC PATCH 04/14] pipe: Add O_NOTIFICATION_PIPE [ver #2]
 
Andy Lutomirski
 - [RFC PATCH 04/14] pipe: Add O_NOTIFICATION_PIPE [ver #2]
 
David Howells
 - [RFC PATCH 05/11] pipe: Allow pipes to have kernel-reserved slots	[ver #3]
 
David Howells
 - [RFC PATCH 05/14] pipe: Add general notification queue support	[ver #2]
 
David Howells
 - [RFC PATCH 05/14] pipe: Add general notification queue support [ver	#2]
 
David Howells
 - [RFC PATCH 06/11] pipe: Advance tail pointer inside of wait	spinlock in pipe_read() [ver #3]
 
David Howells
 - [RFC PATCH 06/14] keys: Add a notification facility [ver #2]
 
David Howells
 - [RFC PATCH 07/10] pipe: Conditionalise wakeup in pipe_read() [ver	#2]
 
Konstantin Khlebnikov
 - [RFC PATCH 07/11] pipe: Conditionalise wakeup in pipe_read() [ver #3]
 
David Howells
 - [RFC PATCH 07/14] Add sample notification program [ver #2]
 
David Howells
 - [RFC PATCH 08/11] pipe: Rearrange sequence in pipe_write() to	preallocate slot [ver #3]
 
David Howells
 - [RFC PATCH 08/14] pipe: Allow buffers to be marked	read-whole-or-error for notifications [ver #2]
 
David Howells
 - [RFC PATCH 08/14] pipe: Allow buffers to be marked	read-whole-or-error for notifications [ver #2]
 
Andy Lutomirski
 - [RFC PATCH 08/14] pipe: Allow buffers to be marked	read-whole-or-error for notifications [ver #2]
 
David Howells
 - [RFC PATCH 09/11] pipe: Remove redundant wakeup from pipe_write()	[ver #3]
 
David Howells
 - [RFC PATCH 09/14] pipe: Add notification lossage handling [ver #2]
 
David Howells
 - [RFC PATCH 10/11] pipe: Check for ring full inside of the spinlock	in pipe_write() [ver #3]
 
David Howells
 - [RFC PATCH 10/14] Add a general,	global device notification watch list [ver #2]
 
David Howells
 - [RFC PATCH 11/10] pipe: Add fsync() support [ver #2]
 
Linus Torvalds
 - [RFC PATCH 11/10] pipe: Add fsync() support [ver #2]
 
David Howells
 - [RFC PATCH 11/10] pipe: Add fsync() support [ver #2]
 
Andy Lutomirski
 - [RFC PATCH 11/10] pipe: Add fsync() support [ver #2]
 
Linus Torvalds
 - [RFC PATCH 11/10] pipe: Add fsync() support [ver #2]
 
Linus Torvalds
 - [RFC PATCH 11/10] pipe: Add fsync() support [ver #2]
 
Andy Lutomirski
 - [RFC PATCH 11/10] pipe: Add fsync() support [ver #2]
 
Linus Torvalds
 - [RFC PATCH 11/10] pipe: Add fsync() support [ver #2]
 
Linus Torvalds
 - [RFC PATCH 11/10] pipe: Add fsync() support [ver #2]
 
Andy Lutomirski
 - [RFC PATCH 11/10] pipe: Add fsync() support [ver #2]
 
Konstantin Khlebnikov
 - [RFC PATCH 11/11] pipe: Increase the writer-wakeup threshold to	reduce context-switch count [ver #3]
 
David Howells
 - [RFC PATCH 11/14] block: Add block layer notifications [ver #2]
 
David Howells
 - [RFC PATCH 12/14] usb: Add USB subsystem notifications [ver #2]
 
David Howells
 - [RFC PATCH 13/14] selinux: Implement the watch_key security hook	[ver #2]
 
David Howells
 - [RFC PATCH 14/14] smack: Implement the watch_key and	post_notification hooks [ver #2]
 
David Howells
 - [RFC PATCH 2/2] selinux: fall back to ref-walk upon	LSM_AUDIT_DATA_DENTRY too
 
Paul Moore
 - [RFC PATCH 2/2] selinux: fall back to ref-walk upon	LSM_AUDIT_DATA_DENTRY too
 
Paul Moore
 - [RFC PATCH 2/2] selinux: fall back to ref-walk upon	LSM_AUDIT_DATA_DENTRY too
 
Stephen Smalley
 - [RFC PATCH 2/2] selinux: fall back to ref-walk upon	LSM_AUDIT_DATA_DENTRY too
 
Stephen Smalley
 - [RFC PATCH 2/2] selinux: fall back to ref-walk upon	LSM_AUDIT_DATA_DENTRY too
 
Paul Moore
 - [RFC PATCH 2/2] selinux: fall back to ref-walk upon	LSM_AUDIT_DATA_DENTRY too
 
Stephen Smalley
 - [RFC PATCH 2/2] selinux: fall back to ref-walk upon	LSM_AUDIT_DATA_DENTRY too
 
Stephen Smalley
 - [RFC PATCH v2] security,lockdown,selinux: implement SELinux	lockdown
 
James Morris
 - [RFC PATCH v2] security,lockdown,selinux: implement SELinux lockdown
 
Stephen Smalley
 - Business Proposal - Please Reply
 
Yuval
 - Contact Money Gram international service-Benin to receive your	payment funds US$2.500,000 Million
 
Mary Coster, I.M.F director-Benin
 - Details on the UAPI of implementing notifications on pipes
 
David Howells
 - general protection fault in __schedule (2)
 
syzbot
 - general protection fault in __schedule (2)
 
Sean Christopherson
 - general protection fault in __schedule (2)
 
Dmitry Vyukov
 - general protection fault in __schedule (2)
 
Sean Christopherson
 - general protection fault in __schedule (2)
 
Dmitry Vyukov
 - general protection fault in smack_socket_sendmsg (2)
 
syzbot
 - general protection fault in smack_socket_sendmsg (2)
 
Tetsuo Handa
 - Investment opportunity
 
Peter Wong
 - Investment opportunity
 
Peter Wong
 - Investment opportunity
 
Peter Wong
 - Investment opportunity
 
Peter Wong
 - Investment opportunity
 
Peter Wong
 - kernel panic while using get_random_bytes
 
Temp Sha
 - kernel panic while using get_random_bytes
 
Ondrej Mosnacek
 - Seeking Investment Opportunities
 
Simon Oliver
 - tracefs splats in lockdown=confidentiality mode
 
dann frazier
 - tracefs splats in lockdown=confidentiality mode
 
Steven Rostedt
 - tracefs splats in lockdown=confidentiality mode
 
Jordan Glover
 - tracefs splats in lockdown=confidentiality mode
 
dann frazier
 - WARNING in aa_sock_msg_perm (2)
 
syzbot
 - WARNING in aa_sock_msg_perm (2)
 
Tetsuo Handa
 - Zdravstvujte! Vas interesujut bazy dannyh dlja prodazhi Vashih	tovarov i uslug?
 
prodawez at teleworm.us
    
 
    
      Last message date: 
       Sat Nov 30 23:05:02 UTC 2019
    Archived on: Sat Nov 30 23:05:18 UTC 2019
    
   
     
     
     This archive was generated by
     Pipermail 0.09 (Mailman edition).