April 2020 Archives by thread
Starting: Wed Apr 1 05:07:46 UTC 2020
Ending: Thu Apr 30 23:50:13 UTC 2020
Messages: 555
- [PATCH v3] tpm: Add support for event log pointer found in TPM2 ACPI table
kbuild test robot
- [PATCH 00/13] VFS: Filesystem information [ver #19]
Ian Kent
- [PATCH -next] smack: fix a missing-check bug in smack_sb_eat_lsm_opts()
Chen Zhou
- [PATCH v3] acpi: Extend TPM2 ACPI table with missing log fields
Jarkko Sakkinen
- [PATCH v3] tpm: Add support for event log pointer found in TPM2 ACPI table
Jarkko Sakkinen
- [PATCH v5 0/3] SELinux support for anonymous inodes and UFFD
Daniel Colascione
- [PATCH v8 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
Alexey Budankov
- [PATCH ghak96] audit: set cwd in audit context for file-related LSM audit records
Vladis Dronov
- [PATCH 13/17] watch_queue: Implement mount topology and attribute change notifications [ver #5]
Miklos Szeredi
- [PATCH v10 2/9] proc: allow to mount many instances of proc in one pid namespace
Eric W. Biederman
- [PATCH v10 8/9] proc: use human-readable values for hidehid
Eric W. Biederman
- [PATCH v11 8/9] proc: use human-readable values for hidehid
Jann Horn
- [PATCH v10 7/9] proc: move hidepid values to uapi as they are user interface to mount
Eric W. Biederman
- [PATCH v10 0/9] proc: modernize proc to support multiple private instances
Eric W. Biederman
- [PATCH v4 0/2] tpm2: Make TPM2 logs accessible for non-UEFI firmware
Stefan Berger
- [PATCH v4 1/7] ima: Switch to ima_hash_algo for boot aggregate
Mimi Zohar
- [PATCH] integrity: make integrity_add_key() static
Jason Yan
- [PATCH] ima: make ima_mok_init() static
Jason Yan
- [PATCH] device_cgroup: Cleanup cgroup eBPF device filter code
Odin Ugedal
- [PATCH v11 0/8] proc: modernize proc to support multiple private instances
Alexey Gladkov
- [PATCH v11 1/8] proc: rename struct proc_fs_info to proc_fs_opts
Alexey Gladkov
- [PATCH v11 2/8] proc: allow to mount many instances of proc in one pid namespace
Alexey Gladkov
- [PATCH v11 3/8] proc: move hide_pid, pid_gid from pid_namespace to proc_fs_info
Alexey Gladkov
- [PATCH v11 4/8] proc: instantiate only pids that we can ptrace on 'hidepid=4' mount option
Alexey Gladkov
- [PATCH v11 5/8] proc: add option to mount only a pids subset
Alexey Gladkov
- [PATCH v11 6/8] docs: proc: add documentation for "hidepid=4" and "subset=pid" options and new mount behavior
Alexey Gladkov
- [PATCH v11 7/8] proc: use human-readable values for hidepid
Alexey Gladkov
- [PATCH v11 8/8] proc: use named enums for better readability
Alexey Gladkov
- [GIT PULL] keys: Fix key->sem vs mmap_sem issue when reading key
Linus Torvalds
- [GIT PULL] keys: Fix key->sem vs mmap_sem issue when reading key
pr-tracker-bot at kernel.org
- [PATCH] apparmor: fix potential label refcnt leak in aa_change_profile
John Johansen
- [PATCH v2] apparmor: fix potential label refcnt leak in aa_change_profile
Xiyu Yang
- [PATCH RESEND] device_cgroup: Fix RCU list debugging warning
Amol Grover
- WARNING: suspicious RCU usage with PROVE_RCU_LIST=y
Amol Grover
- [SMACK] Build-time warning from Linux 5.6.2: unused variable ‘sip’
Jordan Glover
- [PATCH 00/11] Integrity Policy Enforcement LSM (IPE)
deven.desai at linux.microsoft.com
- [PATCH 01/11] scripts: add ipe tooling to generate boot policy
deven.desai at linux.microsoft.com
- [RESEND PATCH 00/11] Integrity Policy Enforcement LSM (IPE)
deven.desai at linux.microsoft.com
- [RESEND PATCH 01/11] scripts: add ipe tooling to generate boot policy
deven.desai at linux.microsoft.com
- [RESEND PATCH 03/11] ipe: add property for trust of boot volume
deven.desai at linux.microsoft.com
- [RESEND PATCH 04/11] fs: add security blob and hooks for block_device
deven.desai at linux.microsoft.com
- [RESEND PATCH 07/11] ipe: add property for signed dmverity volumes
deven.desai at linux.microsoft.com
- [RESEND PATCH 09/11] ipe: add property for dmverity roothash
deven.desai at linux.microsoft.com
- [RESEND PATCH 10/11] documentation: Add IPE Documentation
deven.desai at linux.microsoft.com
- [RESEND PATCH 11/11] cleanup: uapi/linux/audit.h
deven.desai at linux.microsoft.com
- [PATCH v15 00/23] LSM: Module stacking for AppArmor
Casey Schaufler
- [PATCH v15 00/23] LSM: Module stacking for AppArmor
Casey Schaufler
- [PATCH v15 00/23] LSM: Module stacking for AppArmor
Casey Schaufler
- [PATCH v15 00/23] LSM: Module stacking for AppArmor
Casey Schaufler
- [PATCH v15 00/23] LSM: Module stacking for AppArmor
Casey Schaufler
- [PATCH v16 01/23] LSM: Infrastructure management of the sock security
Casey Schaufler
- [PATCH v16 02/23] LSM: Create and manage the lsmblob data structure.
Casey Schaufler
- [PATCH v16 03/23] LSM: Use lsmblob in security_audit_rule_match
Casey Schaufler
- [PATCH v16 04/23] LSM: Use lsmblob in security_kernel_act_as
Casey Schaufler
- [PATCH v16 05/23] net: Prepare UDS for security module stacking
Casey Schaufler
- [PATCH v16 06/23] Use lsmblob in security_secctx_to_secid
Casey Schaufler
- [PATCH v16 07/23] LSM: Use lsmblob in security_secid_to_secctx
Casey Schaufler
- [PATCH v16 08/23] LSM: Use lsmblob in security_ipc_getsecid
Casey Schaufler
- [PATCH v16 09/23] LSM: Use lsmblob in security_task_getsecid
Casey Schaufler
- [RFC PATCH v2 00/12] Integrity Policy Enforcement LSM (IPE)
deven.desai at linux.microsoft.com
- [RFC PATCH v2 02/12] security: add ipe lsm evaluation loop and audit system
deven.desai at linux.microsoft.com
- [RFC PATCH v2 03/12] security: add ipe lsm policy parser and policy loading
deven.desai at linux.microsoft.com
- [RFC PATCH v2 05/12] fs: add security blob and hooks for block_device
deven.desai at linux.microsoft.com
- [RFC PATCH v2 06/12] dm-verity: move signature check after tree validation
deven.desai at linux.microsoft.com
- [RFC PATCH v2 07/12] dm-verity: add bdev_setsecurity hook for dm-verity signature
deven.desai at linux.microsoft.com
- [RFC PATCH v2 08/12] ipe: add property for signed dmverity volumes
deven.desai at linux.microsoft.com
- [RFC PATCH v2 09/12] dm-verity: add bdev_setsecurity hook for root-hash
deven.desai at linux.microsoft.com
- [RFC PATCH v2 10/12] ipe: add property for dmverity roothash
deven.desai at linux.microsoft.com
- [RFC PATCH v2 11/12] documentation: Add IPE Documentation
deven.desai at linux.microsoft.com
- [RFC PATCH v2 12/12] cleanup: uapi/linux/audit.h
deven.desai at linux.microsoft.com
- [PATCH v16 00/23] LSM: Module stacking for AppArmor
Casey Schaufler
- [PATCH v16 01/23] LSM: Infrastructure management of the sock security
Casey Schaufler
- [PATCH v16 02/23] LSM: Create and manage the lsmblob data structure.
Casey Schaufler
- [PATCH v16 03/23] LSM: Use lsmblob in security_audit_rule_match
Casey Schaufler
- [PATCH v16 04/23] LSM: Use lsmblob in security_kernel_act_as
Casey Schaufler
- whether this is your correct email address or not
SANDRA DEWI
- [PATCH] ima: Simplify the implementation of ima_fs_init function
Tianjia Zhang
- [RFC] IMA: New IMA measurements for dm-crypt and selinux
Tushar Sugandhi
- [PATCH] smack: avoid unused 'sip' variable warning
Arnd Bergmann
- [PATCH 0/2] support to read and tune appraise mode in runtime
Tianjia Zhang
- [PATCH v2 0/2] support to read and tune appraise mode in runtime
Tianjia Zhang
- [PATCH v2 1/2] ima: support to read appraise mode
Tianjia Zhang
- [PATCH v2 2/2] ima: support to tune appraise mode in runtime
Tianjia Zhang
- [PATCH RESEND v11 0/8] proc: modernize proc to support multiple private instances
Alexey Gladkov
- [PATCH 1/1] smack: remove redundant structure variable from header.
Maninder Singh
- [selftests/landlock] d9d464ccf6: kernel-selftests.landlock.test_base.fail
Mickaël Salaün
- I have already sent you first payment US$5000.00 this morning through MONEY Gram service.it is available to pick up in address now.
Barrister Robert Richter UN-Attorney at Law Court-Benin
- [PATCH 05/26] capabilities: Introduce CAP_PERFMON to kernel and user space
Arnaldo Carvalho de Melo
- [PATCH 06/26] perf/core: Open access to the core for CAP_PERFMON privileged process
Arnaldo Carvalho de Melo
- [PATCH 07/26] perf/core: open access to probes for CAP_PERFMON privileged process
Arnaldo Carvalho de Melo
- [PATCH 08/26] perf tools: Support CAP_PERFMON capability
Arnaldo Carvalho de Melo
- [PATCH 09/26] drm/i915/perf: Open access for CAP_PERFMON privileged process
Arnaldo Carvalho de Melo
- [PATCH 10/26] trace/bpf_trace: Open access for CAP_PERFMON privileged process
Arnaldo Carvalho de Melo
- [PATCH 11/26] powerpc/perf: open access for CAP_PERFMON privileged process
Arnaldo Carvalho de Melo
- [PATCH 12/26] parisc/perf: open access for CAP_PERFMON privileged process
Arnaldo Carvalho de Melo
- [PATCH 13/26] drivers/perf: Open access for CAP_PERFMON privileged process
Arnaldo Carvalho de Melo
- [PATCH 14/26] drivers/oprofile: Open access for CAP_PERFMON privileged process
Arnaldo Carvalho de Melo
- [PATCH 15/26] doc/admin-guide: Update perf-security.rst with CAP_PERFMON information
Arnaldo Carvalho de Melo
- [PATCH 16/26] doc/admin-guide: update kernel.rst with CAP_PERFMON information
Arnaldo Carvalho de Melo
- [PATCH 0/2] mm, treewide: Rename kzfree() to kfree_sensitive()
Waiman Long
- [PATCH 2/2] crypto: Remove unnecessary memzero_explicit()
Waiman Long
- [PATCH 1/2] mm, treewide: Rename kzfree() to kfree_sensitive()
David Rientjes
- [PATCH] evm: Fix possible memory leak in evm_calc_hmac_or_hash()
Roberto Sassu
- [PATCH -next] tomoyo: use true for bool variable
Zou Wei
- [PATCH -next] IMA: fix memdup.cocci warnings
Zou Wei
- [PATCH -next] IMA: Fix a memdup.cocci warning
Markus Elfring
- [PATCH -next v2] IMA: fix memdup.cocci warnings
Zou Wei
- [PATCH 0/2] Simplify the implementation of some functions in IMA
Tianjia Zhang
- [PATCH 1/2] ima: simplify function ima_store_template
Tianjia Zhang
- [PATCH 2/2] ima: simplify function process_buffer_measurement
Tianjia Zhang
- [PATCH] ima: optimize ima_pcr_extend function by asynchronous
Tianjia Zhang
- [PATCH] capabilities: add description for CAP_SETFCAP
Stefan Hajnoczi
- [PATCH] keys: Fix proc_keys_next to increase position index
David Howells
- [PATCH v2] ima: optimize ima_pcr_extend function by asynchronous
Tianjia Zhang
- [PATCH] ima: remove redundant code
Tianjia Zhang
- Regards
Mr. H.A.Scholze
- [PATCH v2] apparmor: fix potential label refcnt leak in aa_change_profile
Markus Elfring
- [RFC PATCH v3 00/12] Integrity Policy Enforcement LSM (IPE)
deven.desai at linux.microsoft.com
- [RFC PATCH v3 03/12] security: add ipe lsm policy parser and policy loading
deven.desai at linux.microsoft.com
- [RFC PATCH v3 11/12] documentation: add ipe documentation
deven.desai at linux.microsoft.com
- [RFC PATCH v3 12/12] cleanup: uapi/linux/audit.h
deven.desai at linux.microsoft.com
- [PATCH v16 00/10] Landlock LSM
Mickaël Salaün
- [PATCH v16 02/10] landlock: Add ruleset and domain management
Mickaël Salaün
- [PATCH v16 03/10] landlock: Set up the security framework and manage credentials
Mickaël Salaün
- [PATCH v16 05/10] fs,landlock: Support filesystem access-control
Mickaël Salaün
- [PATCH v16 09/10] samples/landlock: Add a sandbox manager example
Mickaël Salaün
- [GIT PULL] SELinux fixes for v5.7 (#1)
Paul Moore
- Hey, how are u, can we talk?
Saleem Netanyahu
- WARNING: locking bug in tomoyo_supervisor
syzbot
- Problem with 9ba09998baa9 ("selinux: Implement the watch_key security hook") in linux-next
Paul Moore
- [PATCH v12 0/7] proc: modernize proc to support multiple private instances
Alexey Gladkov
- [PATCH v12 1/7] proc: rename struct proc_fs_info to proc_fs_opts
Alexey Gladkov
- [PATCH v12 2/7] proc: allow to mount many instances of proc in one pid namespace
Alexey Gladkov
- [PATCH v12 3/7] proc: instantiate only pids that we can ptrace on 'hidepid=4' mount option
Alexey Gladkov
- [PATCH v12 4/7] proc: add option to mount only a pids subset
Alexey Gladkov
- [PATCH v12 5/7] docs: proc: add documentation for "hidepid=4" and "subset=pid" options and new mount behavior
Alexey Gladkov
- [PATCH v12 6/7] proc: use human-readable values for hidepid
Alexey Gladkov
- [PATCH v12 7/7] proc: use named enums for better readability
Alexey Gladkov
- [PATCH] apparmor: Fix aa_label refcnt leak in policy_update
Xiyu Yang
- [PATCH 05/60] capabilities: Introduce CAP_PERFMON to kernel and user space
Arnaldo Carvalho de Melo
- [PATCH 06/60] perf/core: Open access to the core for CAP_PERFMON privileged process
Arnaldo Carvalho de Melo
- [PATCH 07/60] perf/core: open access to probes for CAP_PERFMON privileged process
Arnaldo Carvalho de Melo
- [PATCH 08/60] perf tools: Support CAP_PERFMON capability
Arnaldo Carvalho de Melo
- [PATCH 09/60] drm/i915/perf: Open access for CAP_PERFMON privileged process
Arnaldo Carvalho de Melo
- [PATCH 10/60] trace/bpf_trace: Open access for CAP_PERFMON privileged process
Arnaldo Carvalho de Melo
- [PATCH 11/60] powerpc/perf: open access for CAP_PERFMON privileged process
Arnaldo Carvalho de Melo
- [PATCH 12/60] parisc/perf: open access for CAP_PERFMON privileged process
Arnaldo Carvalho de Melo
- [PATCH 13/60] drivers/perf: Open access for CAP_PERFMON privileged process
Arnaldo Carvalho de Melo
- [PATCH 14/60] drivers/oprofile: Open access for CAP_PERFMON privileged process
Arnaldo Carvalho de Melo
- [PATCH 15/60] doc/admin-guide: Update perf-security.rst with CAP_PERFMON information
Arnaldo Carvalho de Melo
- [PATCH 16/60] doc/admin-guide: update kernel.rst with CAP_PERFMON information
Arnaldo Carvalho de Melo
- IMA: policy update LSM rules failed
Mimi Zohar
- [PATCH RFC] Documentation: LSM: Correct the basic LSM description
Casey Schaufler
- [PATCH] ima: Fix return value of ima_write_policy()
Roberto Sassu
- [PATCH] ima: Allow imasig requirement to be satisfied by EVM portable signatures
Roberto Sassu
- [PATCH v2 0/7] libfs: group and simplify linux fs code
Emanuele Giuseppe Esposito
- [PATCH v29 11/20] x86/sgx: Linux Enclave Driver
Jarkko Sakkinen
- [PATCH v29 12/20] x86/sgx: Add provisioning
Jarkko Sakkinen
- Lieber Freund (Assalamu Alaikum),?
AISHA GADDAFI
- [PATCH 1/5] ima: Set file->f_mode instead of file->f_flags in ima_calc_file_hash()
Mimi Zohar
- [PATCH 2/5] evm: Check also if *tfm is an error pointer in init_desc()
Mimi Zohar
- [PATCH v2 0/4] perf: make Perf tool aware of SELinux access control
Alexey Budankov
- [PATCH] netlabel: Kconfig: Update reference for NetLabel Tools project
Salvatore Bonaccorso
- [PATCH 3/5] ima: Fix ima digest hash table key calculation
Mimi Zohar
- [PATCH 5/5] ima: Remove unused build_ima_appraise variable
Mimi Zohar
- Contact Eco bank-Benin to receive your payment funds transfer amount of $12.800.000,00 Million USD,approved this morning by IMF.
Mrs. Angella Michelle
- [PATCH v13 0/8] proc: modernize proc to support multiple private instances
Alexey Gladkov
- [PATCH v13 1/8] proc: rename struct proc_fs_info to proc_fs_opts
Alexey Gladkov
- [PATCH v13 2/8] Use proc_pid_ns() to get pid_namespace from the proc superblock
Alexey Gladkov
- [PATCH v13 3/8] proc: allow to mount many instances of proc in one pid namespace
Alexey Gladkov
- [PATCH v13 4/8] proc: instantiate only pids that we can ptrace on 'hidepid=4' mount option
Alexey Gladkov
- [PATCH v13 5/8] proc: add option to mount only a pids subset
Alexey Gladkov
- [PATCH v13 6/8] docs: proc: add documentation for "hidepid=4" and "subset=pid" options and new mount behavior
Alexey Gladkov
- [PATCH v13 7/8] proc: use human-readable values for hidepid
Alexey Gladkov
- [PATCH v13 8/8] proc: use named enums for better readability
Alexey Gladkov
- [PATCH v3 0/3] perf: make Perf tool aware of SELinux access control
Alexey Budankov
- [PATCH] integrity: remove redundant assignment to variable ret
Colin King
- [PATCH 1/1] Smack:- Remove mutex lock "smk_lock" from inode_smack structure.
Vishal Goel
- [PATCH v2 1/6] ima: Set file->f_mode instead of file->f_flags in ima_calc_file_hash()
Roberto Sassu
- [PATCH v2 3/6] ima: Fix ima digest hash table key calculation
Roberto Sassu
- [PATCH v2 4/6] ima: Remove redundant policy rule set in add_rules()
Roberto Sassu
- [PATCH v2 5/6] ima: Set again build_ima_appraise variable
Roberto Sassu
- Why continued silence 2
Ruben CONVY
- [PATCH] nsproxy: attach to namespaces via pidfds
Jann Horn
- [PATCH -next] apparmor: Use true and false for bool variable
Zou Wei
- [PATCH v3 0/5] Add support for RESOLVE_MAYEXEC
Mickaël Salaün
- [PATCH v3 2/5] fs: Add a MAY_EXECMOUNT flag to infer the noexec mount property
Mickaël Salaün
- [PATCH] Documentation: LSM: Correct the basic LSM description
James Morris
- [RFC][PATCH 1/3] evm: Move hooks outside LSM infrastructure
Roberto Sassu
- [RFC][PATCH 2/3] evm: Extend API of post hooks to pass the result of pre hooks
Roberto Sassu
- [RFC][PATCH 3/3] evm: Return -EAGAIN to ignore verification failures
Roberto Sassu
- [PATCH bpf-next v9 0/8] MAC and Audit policy using eBPF (KRSI)
Mikko Ylinen
- [PATCH 0/2] ima: extending IMA policy to support interpreters
Mimi Zohar
- [PATCH v3 0/3] perf: make Perf tool aware of SELinux access control
Alexey Budankov
- [PATCH v3 0/5] Add support for RESOLVE_MAYEXEC
Christian Brauner
- [PATCH v3 0/5] Add support for RESOLVE_MAYEXEC
Lev R. Oshvang .
- My Dearest,
Miss. Colette Kipkalya
- [PATCH v4 0/5] Add support for O_MAYEXEC
Mickaël Salaün
- [PATCH v4 3/5] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
Mickaël Salaün
- [PATCH bpf] security: Fix the default value of fs_context_parse_param hook
KP Singh
- [PATCH] integrity: evm: Fix RCU list related warnings.
madhuparnabhowmik10 at gmail.com
- [GIT PULL] SELinux fixes for v5.7 (#2)
Paul Moore
Last message date:
Thu Apr 30 23:50:13 UTC 2020
Archived on: Thu Apr 30 23:50:20 UTC 2020
This archive was generated by
Pipermail 0.09 (Mailman edition).