October 2019 Archives by subject
Starting: Tue Oct 1 01:22:28 UTC 2019
Ending: Thu Oct 31 21:47:45 UTC 2019
Messages: 396
- [GIT PULL] SafeSetID LSM changes for 5.4
Ingo Molnar
- [GIT PULL] SafeSetID LSM changes for 5.4
Paul E. McKenney
- [GIT PULL] SELinux fixes for v5.4 (#1)
Paul Moore
- [GIT PULL] SELinux fixes for v5.4 (#1)
pr-tracker-bot at kernel.org
- [Kgdb-bugreport] [PATCH] kernel: convert switch/case fallthrough comments to fallthrough;
Joe Perches
- [Kgdb-bugreport] [PATCH] kernel: convert switch/case fallthrough comments to fallthrough;
Daniel Thompson
- [Kgdb-bugreport] [PATCH] kernel: convert switch/case fallthrough comments to fallthrough;
Jens Axboe
- [PATCH -next] security: smack: add watch_queue.h header to fix build errors
David Howells
- [PATCH -next] security: smack: add watch_queue.h header to fix build errors
Randy Dunlap
- [PATCH 0/7 v2] tracing: Fix tracefs lockdown and various clean ups
Steven Rostedt
- [PATCH 1/7 v2] tracefs: Revert ccbd54ff54e8 ("tracefs: Restrict tracefs when the kernel is locked down")
Steven Rostedt
- [PATCH 1/7 v2] tracefs: Revert ccbd54ff54e8 ("tracefs: Restrict tracefs when the kernel is locked down")
Linus Torvalds
- [PATCH 1/7 v2] tracefs: Revert ccbd54ff54e8 ("tracefs: Restrict tracefs when the kernel is locked down")
Steven Rostedt
- [PATCH 1/7 v2] tracefs: Revert ccbd54ff54e8 ("tracefs: Restrict tracefs when the kernel is locked down")
Steven Rostedt
- [PATCH 2/7 v2] ftrace: Get a reference counter for the trace_array on filter files
Steven Rostedt
- [PATCH 3/7 v2] tracing: Get trace_array reference for available_tracers files
Steven Rostedt
- [PATCH 4.14 166/185] ovl: filter of trusted xattr results in audit
Greg Kroah-Hartman
- [PATCH 4.19 189/211] ovl: filter of trusted xattr results in audit
Greg Kroah-Hartman
- [PATCH 4.4 96/99] ovl: filter of trusted xattr results in audit
Greg Kroah-Hartman
- [PATCH 4.9 115/129] ovl: filter of trusted xattr results in audit
Greg Kroah-Hartman
- [PATCH 4/7 v2] tracing: Have trace events system open call tracing_open_generic_tr()
Steven Rostedt
- [PATCH 4/7 v2] tracing: Have trace events system open call tracing_open_generic_tr()
Steven Rostedt
- [PATCH 5.2 281/313] ovl: filter of trusted xattr results in audit
Greg Kroah-Hartman
- [PATCH 5.3 308/344] ovl: filter of trusted xattr results in audit
Greg Kroah-Hartman
- [PATCH 5/7 v2] tracing: Add tracing_check_open_get_tr()
Steven Rostedt
- [PATCH 6/7 v2] tracing: Add some more locked_down checks
Steven Rostedt
- [PATCH 7/7 v2] tracing: Do not create tracefs files if tracefs lockdown is in effect
Steven Rostedt
- [PATCH AUTOSEL 4.14 01/29] ima: always return negative code for error
Sasha Levin
- [PATCH AUTOSEL 4.19 01/43] ima: always return negative code for error
Sasha Levin
- [PATCH AUTOSEL 4.19 02/43] ima: fix freeing ongoing ahash_request
Sasha Levin
- [PATCH AUTOSEL 4.4 01/15] ima: always return negative code for error
Sasha Levin
- [PATCH AUTOSEL 4.9 01/19] ima: always return negative code for error
Sasha Levin
- [PATCH AUTOSEL 5.2 02/63] ima: always return negative code for error
Sasha Levin
- [PATCH AUTOSEL 5.2 03/63] ima: fix freeing ongoing ahash_request
Sasha Levin
- [PATCH AUTOSEL 5.3 02/71] ima: always return negative code for error
Sasha Levin
- [PATCH AUTOSEL 5.3 03/71] ima: fix freeing ongoing ahash_request
Sasha Levin
- [PATCH bpf-next v11 0/7] Landlock LSM
Mickaël Salaün
- [PATCH bpf-next v11 1/7] bpf, landlock: Define an eBPF program type for Landlock hooks
Mickaël Salaün
- [PATCH bpf-next v11 2/7] landlock: Add the management of domains
Mickaël Salaün
- [PATCH bpf-next v11 2/7] landlock: Add the management of domains
Serge E. Hallyn
- [PATCH bpf-next v11 2/7] landlock: Add the management of domains
Mickaël Salaün
- [PATCH bpf-next v11 3/7] landlock, seccomp: Load Landlock programs per process hierarchy
Mickaël Salaün
- [PATCH bpf-next v11 4/7] landlock: Add ptrace LSM hooks
Mickaël Salaün
- [PATCH bpf-next v11 5/7] bpf, landlock: Add task_landlock_ptrace_ancestor() helper
Mickaël Salaün
- [PATCH bpf-next v11 6/7] bpf, landlock: Add tests for the Landlock ptrace program type
Mickaël Salaün
- [PATCH bpf-next v11 7/7] landlock: Add user and kernel documentation for Landlock
Mickaël Salaün
- [PATCH bpf-next v12 0/7] Landlock LSM
Mickaël Salaün
- [PATCH bpf-next v12 1/7] bpf, landlock: Define an eBPF program type for Landlock hooks
Mickaël Salaün
- [PATCH bpf-next v12 2/7] landlock: Add the management of domains
Mickaël Salaün
- [PATCH bpf-next v12 3/7] landlock, seccomp: Load Landlock programs per process hierarchy
Mickaël Salaün
- [PATCH bpf-next v12 4/7] landlock: Add ptrace LSM hooks
Mickaël Salaün
- [PATCH bpf-next v12 5/7] bpf, landlock: Add task_landlock_ptrace_ancestor() helper
Mickaël Salaün
- [PATCH bpf-next v12 6/7] bpf, landlock: Add tests for the Landlock ptrace program type
Mickaël Salaün
- [PATCH bpf-next v12 7/7] landlock: Add user and kernel documentation for Landlock
Mickaël Salaün
- [PATCH bpf-next] bpf, capabilities: introduce CAP_BPF
Alexei Starovoitov
- [PATCH bpf-next] bpf, capabilities: introduce CAP_BPF
Steven Rostedt
- [PATCH bpf-next] bpf, capabilities: introduce CAP_BPF
Alexei Starovoitov
- [PATCH bpf-next] bpf, capabilities: introduce CAP_BPF
Steven Rostedt
- [PATCH bpf-next] bpf, capabilities: introduce CAP_BPF
Alexei Starovoitov
- [PATCH bpf-next] bpf, capabilities: introduce CAP_BPF
Steven Rostedt
- [PATCH bpf-next] bpf, capabilities: introduce CAP_BPF
Masami Hiramatsu
- [PATCH bpf-next] bpf, capabilities: introduce CAP_BPF
Alexei Starovoitov
- [PATCH linux-kselftest/test v1] apparmor: add AppArmor KUnit tests for policy unpack
Iurii Zaikin
- [PATCH linux-kselftest/test v1] apparmor: add AppArmor KUnit tests for policy unpack
Brendan Higgins
- [PATCH linux-kselftest/test v1] apparmor: add AppArmor KUnit tests for policy unpack
Luis Chamberlain
- [PATCH linux-kselftest/test v1] apparmor: add AppArmor KUnit tests for policy unpack
Theodore Y. Ts'o
- [PATCH linux-kselftest/test v1] apparmor: add AppArmor KUnit tests for policy unpack
Brendan Higgins
- [PATCH linux-kselftest/test v1] apparmor: add AppArmor KUnit tests for policy unpack
Alan Maguire
- [PATCH linux-kselftest/test v1] apparmor: add AppArmor KUnit tests for policy unpack
Luis Chamberlain
- [PATCH linux-kselftest/test v1] apparmor: add AppArmor KUnit tests for policy unpack
Brendan Higgins
- [PATCH linux-kselftest/test v1] apparmor: add AppArmor KUnit tests for policy unpack
Luis Chamberlain
- [PATCH linux-kselftest/test v1] apparmor: add AppArmor KUnit tests for policy unpack
Kees Cook
- [PATCH linux-kselftest/test v1] apparmor: add AppArmor KUnit tests for policy unpack
Kees Cook
- [PATCH linux-kselftest/test v1] apparmor: add AppArmor KUnit tests for policy unpack
Kees Cook
- [PATCH linux-kselftest/test v1] apparmor: add AppArmor KUnit tests for policy unpack
Iurii Zaikin
- [PATCH linux-kselftest/test v1] apparmor: add AppArmor KUnit tests for policy unpack
John Johansen
- [PATCH linux-kselftest/test v1] apparmor: add AppArmor KUnit tests for policy unpack
John Johansen
- [PATCH linux-kselftest/test v1] apparmor: add AppArmor KUnit tests for policy unpack
Brendan Higgins
- [PATCH linux-kselftest/test v1] apparmor: add AppArmor KUnit tests for policy unpack
Brendan Higgins
- [PATCH linux-kselftest/test v1] apparmor: add AppArmor KUnit tests for policy unpack
Brendan Higgins
- [PATCH linux-kselftest/test v1] apparmor: add AppArmor KUnit tests for policy unpack
Kees Cook
- [PATCH linux-kselftest/test v1] apparmor: add AppArmor KUnit tests for policy unpack
Brendan Higgins
- [PATCH net] sctp: add chunks to sk_backlog when the newsk sk_socket is not set
Ondrej Mosnacek
- [PATCH RFC] perf_event: Add support for LSM and SELinux checks
Joel Fernandes (Google)
- [PATCH RFC] perf_event: Add support for LSM and SELinux checks
Casey Schaufler
- [PATCH RFC] perf_event: Add support for LSM and SELinux checks
James Morris
- [PATCH RFC] perf_event: Add support for LSM and SELinux checks
James Morris
- [PATCH RFC] perf_event: Add support for LSM and SELinux checks
Casey Schaufler
- [PATCH RFC] perf_event: Add support for LSM and SELinux checks
Joel Fernandes
- [PATCH RFC] perf_event: Add support for LSM and SELinux checks
Joel Fernandes
- [PATCH RFC] perf_event: Add support for LSM and SELinux checks
Casey Schaufler
- [PATCH RFC] perf_event: Add support for LSM and SELinux checks
James Morris
- [PATCH RFC] perf_event: Add support for LSM and SELinux checks
Alexey Budankov
- [PATCH RFC] perf_event: Add support for LSM and SELinux checks
Peter Zijlstra
- [PATCH RFC] perf_event: Add support for LSM and SELinux checks
Joel Fernandes
- [PATCH RFC] perf_event: Add support for LSM and SELinux checks
Peter Zijlstra
- [PATCH RFC] perf_event: Add support for LSM and SELinux checks
Casey Schaufler
- [PATCH RFC] perf_event: Add support for LSM and SELinux checks
Joel Fernandes
- [PATCH RFC] perf_event: Add support for LSM and SELinux checks
James Morris
- [PATCH RFC] perf_event: Add support for LSM and SELinux checks
Peter Zijlstra
- [PATCH RFC] perf_event: Add support for LSM and SELinux checks
Joel Fernandes
- [PATCH tip/core/rcu 10/10] security/safesetid: Replace rcu_swap_protected() with rcu_replace()
paulmck at kernel.org
- [PATCH v0] KEYS: Security LSM Hook for key_create_or_update
Lakshmi Ramasubramanian
- [PATCH v0] KEYS: Security LSM Hook for key_create_or_update
Casey Schaufler
- [PATCH v0] KEYS: Security LSM Hook for key_create_or_update
Lakshmi Ramasubramanian
- [PATCH v1 0/6] KEYS: measure keys when they are created or updated
Lakshmi Ramasubramanian
- [PATCH v1 1/6] KEYS: Helper function to check if the given keyring is builtin_trusted_keys
Lakshmi Ramasubramanian
- [PATCH v1 2/6] KEYS: ima: Refactored process_buffer_measurement function so that it can measure any buffer (and not just KEXEC_CMDLINE one)
Lakshmi Ramasubramanian
- [PATCH v1 2/6] KEYS: ima: Refactored process_buffer_measurement function so that it can measure any buffer (and not just KEXEC_CMDLINE one)
Mimi Zohar
- [PATCH v1 3/6] KEYS: ima hook to measure builtin_trusted_keys
Lakshmi Ramasubramanian
- [PATCH v1 3/6] KEYS: ima hook to measure builtin_trusted_keys
Mimi Zohar
- [PATCH v1 3/6] KEYS: ima hook to measure builtin_trusted_keys
Lakshmi Ramasubramanian
- [PATCH v1 3/6] KEYS: ima hook to measure builtin_trusted_keys
Mimi Zohar
- [PATCH v1 4/6] KEYS: ima functions to queue and dequeue keys to measure
Lakshmi Ramasubramanian
- [PATCH v1 5/6] KEYS: measure queued keys
Lakshmi Ramasubramanian
- [PATCH v1 5/6] KEYS: measure queued keys
Mimi Zohar
- [PATCH v1 5/6] KEYS: measure queued keys
Lakshmi Ramasubramanian
- [PATCH v1 5/6] KEYS: measure queued keys
Mimi Zohar
- [PATCH v1 5/6] KEYS: measure queued keys
Mimi Zohar
- [PATCH v1 6/6] KEYS: measure keys when they are created or updated
Lakshmi Ramasubramanian
- [PATCH v1 6/6] KEYS: measure keys when they are created or updated
Mimi Zohar
- [PATCH v10 00/25] LSM: Module stacking for AppArmor
Casey Schaufler
- [PATCH v10 00/25] LSM: Module stacking for AppArmor
Stephen Smalley
- [PATCH v10 00/25] LSM: Module stacking for AppArmor
Casey Schaufler
- [PATCH v10 01/25] LSM: Infrastructure management of the sock security
Casey Schaufler
- [PATCH v10 02/25] LSM: Create and manage the lsmblob data structure.
Casey Schaufler
- [PATCH v10 03/25] LSM: Use lsmblob in security_audit_rule_match
Casey Schaufler
- [PATCH v10 04/25] LSM: Use lsmblob in security_kernel_act_as
Casey Schaufler
- [PATCH v10 05/25] net: Prepare UDS for security module stacking
Casey Schaufler
- [PATCH v10 06/25] LSM: Use lsmblob in security_secctx_to_secid
Casey Schaufler
- [PATCH v10 07/25] LSM: Use lsmblob in security_secid_to_secctx
Casey Schaufler
- [PATCH v10 08/25] LSM: Use lsmblob in security_ipc_getsecid
Casey Schaufler
- [PATCH v10 09/25] LSM: Use lsmblob in security_task_getsecid
Casey Schaufler
- [PATCH v10 10/25] LSM: Use lsmblob in security_inode_getsecid
Casey Schaufler
- [PATCH v10 11/25] LSM: Use lsmblob in security_cred_getsecid
Casey Schaufler
- [PATCH v10 12/25] IMA: Change internal interfaces to use lsmblobs
Casey Schaufler
- [PATCH v10 13/25] LSM: Specify which LSM to display
Casey Schaufler
- [PATCH v10 13/25] LSM: Specify which LSM to display
Stephen Smalley
- [PATCH v10 13/25] LSM: Specify which LSM to display
Simon McVittie
- [PATCH v10 13/25] LSM: Specify which LSM to display
Casey Schaufler
- [PATCH v10 14/25] LSM: Ensure the correct LSM context releaser
Casey Schaufler
- [PATCH v10 15/25] LSM: Use lsmcontext in security_secid_to_secctx
Casey Schaufler
- [PATCH v10 16/25] LSM: Use lsmcontext in security_dentry_init_security
Casey Schaufler
- [PATCH v10 17/25] LSM: Use lsmcontext in security_inode_getsecctx
Casey Schaufler
- [PATCH v10 18/25] LSM: security_secid_to_secctx in netlink netfilter
Casey Schaufler
- [PATCH v10 19/25] NET: Store LSM netlabel data in a lsmblob
Casey Schaufler
- [PATCH v10 20/25] LSM: Verify LSM display sanity in binder
Casey Schaufler
- [PATCH v10 21/25] Audit: Add subj_LSM fields when necessary
Casey Schaufler
- [PATCH v10 22/25] Audit: Include object data for all security modules
Casey Schaufler
- [PATCH v10 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
Casey Schaufler
- [PATCH v10 24/25] LSM: Add /proc attr entry for full LSM context
Casey Schaufler
- [PATCH v10 25/25] AppArmor: Remove the exclusive flag
Casey Schaufler
- [PATCH v14 1/5] Add flags option to get xattr method paired to __vfs_getxattr
Amir Goldstein
- [PATCH v14 3/5] overlayfs: handle XATTR_NOSECURITY flag for get xattr method
Mark Salyzyn
- [PATCH v14 4/5] overlayfs: internal getxattr operations without sepolicy checking
Mark Salyzyn
- [PATCH v14 4/5] overlayfs: internal getxattr operations without sepolicy checking
Amir Goldstein
- [PATCH v2 0/4] KEYS: measure keys when they are created or updated
Lakshmi Ramasubramanian
- [PATCH v2 1/4] KEYS: Defined an ima hook for measuring keys on key create or update
Mimi Zohar
- [PATCH v2 1/4] KEYS: Defined an ima hook for measuring keys on key create or update
Lakshmi Ramasubramanian
- [PATCH v2 1/4] KEYS: Defined an ima hook for measuring keys on key create or update
Lakshmi Ramasubramanian
- [PATCH v2 1/4] KEYS: Defined an ima hook for measuring keys on key create or update
Mimi Zohar
- [PATCH v2 1/4] KEYS: Defined an ima hook for measuring keys on key create or update
Lakshmi Ramasubramanian
- [PATCH v2 1/4] KEYS: Defined an ima hook for measuring keys on key create or update
Lakshmi Ramasubramanian
- [PATCH v2 2/4] KEYS: Queue key for measurement if ima is not initialized. Measure queued keys when ima is initialized
Lakshmi Ramasubramanian
- [PATCH v2 3/4] KEYS: Added BUILTIN_TRUSTED_KEYS enum to measure keys added to builtin_trusted_keys keyring
Mimi Zohar
- [PATCH v2 3/4] KEYS: Added BUILTIN_TRUSTED_KEYS enum to measure keys added to builtin_trusted_keys keyring
Lakshmi Ramasubramanian
- [PATCH v2 3/4] KEYS: Added BUILTIN_TRUSTED_KEYS enum to measure keys added to builtin_trusted_keys keyring
Lakshmi Ramasubramanian
- [PATCH v2 3/4] KEYS: Added BUILTIN_TRUSTED_KEYS enum to measure keys added to builtin_trusted_keys keyring
Mimi Zohar
- [PATCH v2 3/4] KEYS: Added BUILTIN_TRUSTED_KEYS enum to measure keys added to builtin_trusted_keys keyring
Lakshmi Ramasubramanian
- [PATCH v2 4/4] KEYS: Enabled ima policy to measure keys added to builtin_trusted_keys keyring
Lakshmi Ramasubramanian
- [PATCH v23 12/24] x86/sgx: Linux Enclave Driver
Jarkko Sakkinen
- [PATCH v23 12/24] x86/sgx: Linux Enclave Driver
Jarkko Sakkinen
- [PATCH v23 12/24] x86/sgx: Linux Enclave Driver
Sean Christopherson
- [PATCH v23 12/24] x86/sgx: Linux Enclave Driver
Stephen Smalley
- [PATCH v23 12/24] x86/sgx: Linux Enclave Driver
Jarkko Sakkinen
- [PATCH v23 12/24] x86/sgx: Linux Enclave Driver
Jarkko Sakkinen
- [PATCH v23 15/24] x86/sgx: Add provisioning
Jarkko Sakkinen
- [PATCH v2] apparmor: Fix use-after-free in aa_audit_rule_init
Navid Emamdoost
- [PATCH v2] apparmor: Fix use-after-free in aa_audit_rule_init
Tyler Hicks
- [PATCH v2] apparmor: Fix use-after-free in aa_audit_rule_init
Navid Emamdoost
- [PATCH v2] apparmor: Fix use-after-free in aa_audit_rule_init
kbuild test robot
- [PATCH v2] apparmor: Fix use-after-free in aa_audit_rule_init
kbuild test robot
- [PATCH v2] efi/efi_test: lock down /dev/efi_test and require CAP_SYS_ADMIN
Javier Martinez Canillas
- [PATCH v2] efi/efi_test: lock down /dev/efi_test and require CAP_SYS_ADMIN
Laszlo Ersek
- [PATCH v2] efi/efi_test: lock down /dev/efi_test and require CAP_SYS_ADMIN
Matthew Garrett
- [PATCH v2] efi/efi_test: lock down /dev/efi_test and require CAP_SYS_ADMIN
Ard Biesheuvel
- [PATCH v2] perf_event: Add support for LSM and SELinux checks
Joel Fernandes (Google)
- [PATCH v2] perf_event: Add support for LSM and SELinux checks
Peter Zijlstra
- [PATCH v2] perf_event: Add support for LSM and SELinux checks
Stephen Smalley
- [PATCH v2] perf_event: Add support for LSM and SELinux checks
Joel Fernandes
- [PATCH v2] perf_event: Add support for LSM and SELinux checks
Joel Fernandes
- [PATCH v2] perf_event: Add support for LSM and SELinux checks
Peter Zijlstra
- [PATCH v2] tomoyo: Don't check open/getattr permission on sockets.
Tetsuo Handa
- [PATCH v2] tomoyo: Don't check open/getattr permission on sockets.
Tetsuo Handa
- [Patch v3 0/7] Introduce TEE based Trusted Keys support
Sumit Garg
- [PATCH v3 0/9] KEYS: Measure keys when they are created or updated
Lakshmi Ramasubramanian
- [Patch v3 1/7] tee: optee: allow kernel pages to register as shm
Sumit Garg
- [PATCH v3 1/9] KEYS: Defined an IMA hook to measure keys on key create or update
Lakshmi Ramasubramanian
- [PATCH v3 1/9] KEYS: Defined an IMA hook to measure keys on key create or update
Sasha Levin
- [PATCH v3 1/9] KEYS: Defined an IMA hook to measure keys on key create or update
Mimi Zohar
- [PATCH v3 1/9] KEYS: Defined an IMA hook to measure keys on key create or update
Lakshmi Ramasubramanian
- [PATCH v3 1/9] KEYS: Defined an IMA hook to measure keys on key create or update
Sasha Levin
- [PATCH v3 1/9] KEYS: Defined an IMA hook to measure keys on key create or update
Lakshmi Ramasubramanian
- [PATCH v3 1/9] KEYS: Defined an IMA hook to measure keys on key create or update
Sasha Levin
- [PATCH v3 1/9] KEYS: Defined an IMA hook to measure keys on key create or update
Mimi Zohar
- [PATCH v3 1/9] KEYS: Defined an IMA hook to measure keys on key create or update
Lakshmi Ramasubramanian
- [Patch v3 2/7] tee: enable support to register kernel memory
Sumit Garg
- [PATCH v3 2/9] KEYS: Defined functions to queue and dequeue keys for measurement
Mimi Zohar
- [PATCH v3 2/9] KEYS: Defined functions to queue and dequeue keys for measurement
Lakshmi Ramasubramanian
- [PATCH v3 2/9] KEYS: Defined functions to queue and dequeue keys for measurement
Lakshmi Ramasubramanian
- [Patch v3 3/7] tee: add private login method for kernel clients
Sumit Garg
- [PATCH v3 3/9] KEYS: Added KEYRING_CHECK policy for key measurement
Mimi Zohar
- [PATCH v3 3/9] KEYS: Added KEYRING_CHECK policy for key measurement
Lakshmi Ramasubramanian
- [Patch v3 4/7] KEYS: trusted: Add generic trusted keys framework
Sumit Garg
- [PATCH v3 4/9] KEYS: Updated IMA policy functions for handling key measurement
Mimi Zohar
- [PATCH v3 4/9] KEYS: Updated IMA policy functions for handling key measurement
Lakshmi Ramasubramanian
- [Patch v3 5/7] KEYS: trusted: Introduce TEE based Trusted Keys
Sumit Garg
- [PATCH v3 5/9] KEYS: Updated ima_get_action() to return keyrings if specified in the policy
Lakshmi Ramasubramanian
- [Patch v3 6/7] doc: keys: Document usage of TEE based Trusted Keys
Sumit Garg
- [Patch v3 6/7] doc: keys: Document usage of TEE based Trusted Keys
Jarkko Sakkinen
- [PATCH v3 6/9] KEYS: Measure key if the IMA policy allows measurement for the given keyring
Lakshmi Ramasubramanian
- [Patch v3 7/7] MAINTAINERS: Add entry for TEE based Trusted Keys
Sumit Garg
- [PATCH v3 7/9] KEYS: Queue key for measurement if IMA is not yet initialized. Measure queued keys when IMA initialization is completed
Lakshmi Ramasubramanian
- [PATCH v3 8/9] KEYS: Added a boolean flag for IMA initialization status.
Lakshmi Ramasubramanian
- [PATCH v3 9/9] KEYS: Call the IMA hook to measure key when a new key is created or an existing key is updated
Lakshmi Ramasubramanian
- [PATCH v3] apparmor: Fix use-after-free in aa_audit_rule_init
Navid Emamdoost
- [PATCH v3] apparmor: Fix use-after-free in aa_audit_rule_init
Tyler Hicks
- [PATCH v4] apparmor: Use a memory pool instead per-CPU caches
Sebastian Andrzej Siewior
- [PATCH v4] apparmor: Use a memory pool instead per-CPU caches
John Johansen
- [PATCH v4] apparmor: Use a memory pool instead per-CPU caches
Sebastian Andrzej Siewior
- [PATCH v5 04/12] S.A.R.A.: generic DFA for string matching
Salvatore Mesoraca
- [PATCH v5 04/12] S.A.R.A.: generic DFA for string matching
Jann Horn
- [Patch v6 4/4] KEYS: trusted: Move TPM2 trusted keys code
Sumit Garg
- [Patch v6 4/4] KEYS: trusted: Move TPM2 trusted keys code
Jarkko Sakkinen
- [Patch v7 0/4] Create and consolidate trusted keys subsystem
Sumit Garg
- [Patch v7 0/4] Create and consolidate trusted keys subsystem
Jarkko Sakkinen
- [Patch v7 0/4] Create and consolidate trusted keys subsystem
Jerry Snitselaar
- [Patch v7 0/4] Create and consolidate trusted keys subsystem
Jarkko Sakkinen
- [Patch v7 0/4] Create and consolidate trusted keys subsystem
Jarkko Sakkinen
- [Patch v7 0/4] Create and consolidate trusted keys subsystem
Sumit Garg
- [Patch v7 0/4] Create and consolidate trusted keys subsystem
Sumit Garg
- [Patch v7 1/4] tpm: Move tpm_buf code to include/linux/
Sumit Garg
- [Patch v7 1/4] tpm: Move tpm_buf code to include/linux/
Jarkko Sakkinen
- [Patch v7 1/4] tpm: Move tpm_buf code to include/linux/
Jerry Snitselaar
- [Patch v7 2/4] KEYS: Use common tpm_buf for trusted and asymmetric keys
Jarkko Sakkinen
- [Patch v7 2/4] KEYS: Use common tpm_buf for trusted and asymmetric keys
Jerry Snitselaar
- [Patch v7 2/4] KEYS: Use common tpm_buf for trusted and asymmetric keys
Sumit Garg
- [Patch v7 3/4] KEYS: trusted: Create trusted keys subsystem
Sumit Garg
- [Patch v7 4/4] KEYS: trusted: Move TPM2 trusted keys code
Sumit Garg
- [Patch v7 4/4] KEYS: trusted: Move TPM2 trusted keys code
Jarkko Sakkinen
- [Patch v8 0/4] Create and consolidate trusted keys subsystem
Sumit Garg
- [Patch v8 0/4] Create and consolidate trusted keys subsystem
Jarkko Sakkinen
- [Patch v8 0/4] Create and consolidate trusted keys subsystem
Jarkko Sakkinen
- [Patch v8 1/4] tpm: Move tpm_buf code to include/linux/
Sumit Garg
- [Patch v8 2/4] KEYS: Use common tpm_buf for trusted and asymmetric keys
Sumit Garg
- [Patch v8 3/4] KEYS: trusted: Create trusted keys subsystem
Sumit Garg
- [Patch v8 4/4] KEYS: trusted: Move TPM2 trusted keys code
Sumit Garg
- [PATCH] apparmor: fix odd_ptr_err.cocci warnings (fwd)
Julia Lawall
- [PATCH] apparmor: fix odd_ptr_err.cocci warnings (fwd)
Navid Emamdoost
- [PATCH] apparmor: fix odd_ptr_err.cocci warnings (fwd)
Julia Lawall
- [PATCH] apparmor: fix odd_ptr_err.cocci warnings (fwd)
Tyler Hicks
- [PATCH] apparmor: Fix use-after-free in aa_audit_rule_init
Navid Emamdoost
- [PATCH] apparmor: Fix use-after-free in aa_audit_rule_init
Markus Elfring
- [PATCH] apparmor: Fix use-after-free in aa_audit_rule_init
John Johansen
- [PATCH] apparmor: Fix use-after-free in aa_audit_rule_init
Navid Emamdoost
- [PATCH] kernel: convert switch/case fallthrough comments to fallthrough;
Joe Perches
- [PATCH] KEYS: trusted: Remove set but not used variable 'keyhndl'
zhengbin
- [PATCH] KEYS: trusted: Remove set but not used variable 'keyhndl'
Jarkko Sakkinen
- [PATCH] KEYS: trusted: Remove set but not used variable 'keyhndl'
Jarkko Sakkinen
- [PATCH] ovl: filter of trusted xattr results in audit
Mark Salyzyn
- [PATCH] ovl: filter of trusted xattr results in audit
Greg Kroah-Hartman
- [PATCH] ovl: filter of trusted xattr results in audit
Greg Kroah-Hartman
- [PATCH] ovl: filter of trusted xattr results in audit
Greg Kroah-Hartman
- [PATCH] ovl: filter of trusted xattr results in audit
Mark Salyzyn
- [PATCH] ovl: filter of trusted xattr results in audit
Mark Salyzyn
- [PATCH] ovl: filter of trusted xattr results in audit
Greg Kroah-Hartman
- [PATCH] perf_event: Add support for LSM and SELinux checks
Joel Fernandes (Google)
- [PATCH] perf_event: Add support for LSM and SELinux checks
James Morris
- [PATCH] perf_event: Add support for LSM and SELinux checks
Peter Zijlstra
- [PATCH] perf_event: Add support for LSM and SELinux checks
Joel Fernandes
- [PATCH] security/keyring: avoid pagefaults in keyring_read_iterator
David Howells
- [PATCH] security/keyring: avoid pagefaults in keyring_read_iterator
Chris von Recklinghausen
- [PATCH] security/keyring: avoid pagefaults in keyring_read_iterator
Jarkko Sakkinen
- [PATCH] security/keyring: avoid pagefaults in keyring_read_iterator
Chris von Recklinghausen
- [PATCH] security/keyring: avoid pagefaults in keyring_read_iterator
Chris von Recklinghausen
- [PATCH] tracefs: Do not allocate and free proxy_ops for lockdown
Steven Rostedt
- [PATCH] tracefs: Do not allocate and free proxy_ops for lockdown
Linus Torvalds
- [PATCH] tracefs: Do not allocate and free proxy_ops for lockdown
Steven Rostedt
- [PATCH] tracefs: Do not allocate and free proxy_ops for lockdown
Linus Torvalds
- [PATCH] tracefs: Do not allocate and free proxy_ops for lockdown
Steven Rostedt
- [PATCH] tracefs: Do not allocate and free proxy_ops for lockdown
Linus Torvalds
- [PATCH] tracefs: Do not allocate and free proxy_ops for lockdown
Steven Rostedt
- [PATCH] tracefs: Do not allocate and free proxy_ops for lockdown
Linus Torvalds
- [PATCH] tracefs: Do not allocate and free proxy_ops for lockdown
Steven Rostedt
- [PATCH] tracefs: Do not allocate and free proxy_ops for lockdown
Steven Rostedt
- [PATCH] tracefs: Do not allocate and free proxy_ops for lockdown
Florian Weimer
- [PATCH] tracefs: Do not allocate and free proxy_ops for lockdown
Steven Rostedt
- [RFC PATCH 00/10] pipe: Notification queue preparation [ver #2]
David Howells
- [RFC PATCH 00/10] pipe: Notification queue preparation [ver #2]
Peter Zijlstra
- [RFC PATCH 00/21] pipe: Keyrings, Block and USB notifications
David Howells
- [RFC PATCH 00/21] pipe: Keyrings, Block and USB notifications
James Morris
- [RFC PATCH 00/21] pipe: Keyrings, Block and USB notifications
Linus Torvalds
- [RFC PATCH 01/10] pipe: Reduce #inclusion of pipe_fs_i.h [ver #2]
David Howells
- [RFC PATCH 01/21] pipe: Reduce #inclusion of pipe_fs_i.h
David Howells
- [RFC PATCH 02/10] Remove the nr_exclusive argument from __wake_up_sync_key() [ver #2]
David Howells
- [RFC PATCH 02/21] Add a prelocked wake-up
David Howells
- [RFC PATCH 02/21] Add a prelocked wake-up
Linus Torvalds
- [RFC PATCH 02/21] Add a prelocked wake-up
David Howells
- [RFC PATCH 02/21] Add a prelocked wake-up
David Howells
- [RFC PATCH 02/21] Add a prelocked wake-up
Linus Torvalds
- [RFC PATCH 02/21] Add a prelocked wake-up
Tim Chen
- [RFC PATCH 03/10] Add wake_up_interruptible_sync_poll_locked() [ver #2]
David Howells
- [RFC PATCH 03/21] pipe: Use head and tail pointers for the ring, not cursor and length
David Howells
- [RFC PATCH 03/21] pipe: Use head and tail pointers for the ring, not cursor and length
David Howells
- [RFC PATCH 03/21] pipe: Use head and tail pointers for the ring, not cursor and length
Rasmus Villemoes
- [RFC PATCH 04/10] pipe: Use head and tail pointers for the ring, not cursor and length [ver #2]
David Howells
- [RFC PATCH 04/10] pipe: Use head and tail pointers for the ring, not cursor and length [ver #2]
David Howells
- [RFC PATCH 04/10] pipe: Use head and tail pointers for the ring, not cursor and length [ver #2]
David Howells
- [RFC PATCH 04/10] pipe: Use head and tail pointers for the ring, not cursor and length [ver #2]
David Howells
- [RFC PATCH 04/10] pipe: Use head and tail pointers for the ring, not cursor and length [ver #2]
Linus Torvalds
- [RFC PATCH 04/10] pipe: Use head and tail pointers for the ring, not cursor and length [ver #2]
Ilya Dryomov
- [RFC PATCH 04/10] pipe: Use head and tail pointers for the ring, not cursor and length [ver #2]
Rasmus Villemoes
- [RFC PATCH 04/10] pipe: Use head and tail pointers for the ring, not cursor and length [ver #2]
Ilya Dryomov
- [RFC PATCH 04/10] pipe: Use head and tail pointers for the ring, not cursor and length [ver #2]
Rasmus Villemoes
- [RFC PATCH 04/10] pipe: Use head and tail pointers for the ring, not cursor and length [ver #2]
Ilya Dryomov
- [RFC PATCH 04/21] pipe: Advance tail pointer inside of wait spinlock in pipe_read()
David Howells
- [RFC PATCH 05/10] pipe: Allow pipes to have kernel-reserved slots [ver #2]
David Howells
- [RFC PATCH 05/21] pipe: Conditionalise wakeup in pipe_read()
David Howells
- [RFC PATCH 06/10] pipe: Advance tail pointer inside of wait spinlock in pipe_read() [ver #2]
David Howells
- [RFC PATCH 06/21] pipe: Rearrange sequence in pipe_write() to preallocate slot
David Howells
- [RFC PATCH 07/10] pipe: Conditionalise wakeup in pipe_read() [ver #2]
Konstantin Khlebnikov
- [RFC PATCH 07/10] pipe: Conditionalise wakeup in pipe_read() [ver #2]
David Howells
- [RFC PATCH 07/10] pipe: Conditionalise wakeup in pipe_read() [ver #2]
David Howells
- [RFC PATCH 07/10] pipe: Conditionalise wakeup in pipe_read() [ver #2]
David Howells
- [RFC PATCH 07/21] pipe: Remove redundant wakeup from pipe_write()
David Howells
- [RFC PATCH 08/10] pipe: Rearrange sequence in pipe_write() to preallocate slot [ver #2]
David Howells
- [RFC PATCH 08/21] pipe: Check for ring full inside of the spinlock in pipe_write()
Linus Torvalds
- [RFC PATCH 08/21] pipe: Check for ring full inside of the spinlock in pipe_write()
David Howells
- [RFC PATCH 09/10] pipe: Remove redundant wakeup from pipe_write() [ver #2]
David Howells
- [RFC PATCH 09/21] uapi: General notification queue definitions
David Howells
- [RFC PATCH 10/10] pipe: Check for ring full inside of the spinlock in pipe_write() [ver #2]
David Howells
- [RFC PATCH 10/21] security: Add hooks to rule on setting a watch
David Howells
- [RFC PATCH 11/10] pipe: Add fsync() support [ver #2]
David Howells
- [RFC PATCH 11/10] pipe: Add fsync() support [ver #2]
Linus Torvalds
- [RFC PATCH 11/10] pipe: Add fsync() support [ver #2]
David Howells
- [RFC PATCH 11/10] pipe: Add fsync() support [ver #2]
Christoph Hellwig
- [RFC PATCH 11/10] pipe: Add fsync() support [ver #2]
Konstantin Khlebnikov
- [RFC PATCH 11/10] pipe: Add fsync() support [ver #2]
David Howells
- [RFC PATCH 11/10] pipe: Add fsync() support [ver #2]
David Howells
- [RFC PATCH 11/21] security: Add a hook for the point of notification insertion
David Howells
- [RFC PATCH 12/21] pipe: Add general notification queue support
David Howells
- [RFC PATCH 13/21] keys: Add a notification facility
David Howells
- [RFC PATCH 14/21] Add sample notification program
David Howells
- [RFC PATCH 15/21] pipe: Allow buffers to be marked read-whole-or-error for notifications
David Howells
- [RFC PATCH 16/21] pipe: Add notification lossage handling
David Howells
- [RFC PATCH 17/21] Add a general, global device notification watch list
David Howells
- [RFC PATCH 18/21] block: Add block layer notifications
David Howells
- [RFC PATCH 19/21] usb: Add USB subsystem notifications
David Howells
- [RFC PATCH 20/21] selinux: Implement the watch_key security hook
David Howells
- [RFC PATCH 21/21] smack: Implement the watch_key and post_notification hooks
David Howells
- [tip: core/rcu] security/safesetid: Replace rcu_swap_protected() with rcu_replace_pointer()
tip-bot2 for Paul E. McKenney
- Apply For Financial investment at a lower rate 2%
Valentina Yurina
- Assist Request From You
Sgt. Kylie Elizabeth Watson
- CAAM hw key support status
Stefan Müller-Klieser
- CAAM hw key support status
Iuliana Prodan
- Dear Friend,
Mr.R.C
- HELLO PLEASE CAN I SPEAK WITH YOU?
Angel Helen
- HERE IS YOUR MONEY GRAM PAYMENT HAS BEEN SENT TO YOU HERE IS THE M.T.C.N:78393135
MONEY GRAM
- KCSAN: data-race in common_perm_cond / task_dump_owner
syzbot
- KCSAN: data-race in common_perm_cond / task_dump_owner
Dmitry Vyukov
- kernel panic while using get_random_bytes
Temp Sha
- load_uefi_certs: Couldn't get size: 0x800000000000000e
Paul Menzel
- MOTHERLESS CHILDREN IN YOUR CITY !!
Mr Ekrem Bayraktar
- No subject
Bellucci Capital Partners
- PERSONAL LETTER FROM MRS RASHIA AMIRA
Mr Barrister Hans Erich
- PERSONAL LETTER FROM MRS RASHIA AMIRA
Mr Barrister Hans Erich
- PERSONAL LETTER FROM MRS RASHIA AMIRA ??
Mr Barrister Hans Erich
- Please pick ("LSM: SafeSetID: Stop releasing uninitialized ruleset") to 5.3 stable
Sasha Levin
- Please pick ("LSM: SafeSetID: Stop releasing uninitialized ruleset") to 5.3 stable
Doug Anderson
- Purchase Order
Daniel Murray
- shmem: fix LSM options parsing (fwd)
James Morris
- trace_printk issue. Was: [PATCH bpf-next] bpf, capabilities: introduce CAP_BPF
Alexei Starovoitov
- trace_printk issue. Was: [PATCH bpf-next] bpf, capabilities: introduce CAP_BPF
Steven Rostedt
- trace_printk issue. Was: [PATCH bpf-next] bpf, capabilities: introduce CAP_BPF
Alexei Starovoitov
- WARNING: refcount bug in find_key_to_update
syzbot
- WARNING: refcount bug in find_key_to_update
syzbot
- WARNING: refcount bug in find_key_to_update
Linus Torvalds
- WARNING: refcount bug in find_key_to_update
Eric Biggers
- WARNING: refcount bug in find_key_to_update
Tetsuo Handa
- WARNING: refcount bug in find_key_to_update
David Howells
- WARNING: refcount bug in find_key_to_update
David Howells
- WARNING: refcount bug in find_key_to_update
David Howells
- WARNING: refcount bug in find_key_to_update
David Howells
- WARNING: refcount bug in find_key_to_update
Dmitry Vyukov
- WARNING: refcount bug in find_key_to_update
David Howells
- WARNING: refcount bug in find_key_to_update
David Howells
Last message date:
Thu Oct 31 21:47:45 UTC 2019
Archived on: Thu Oct 31 21:48:03 UTC 2019
This archive was generated by
Pipermail 0.09 (Mailman edition).