January 2020 Archives by subject
Starting: Wed Jan 1 06:49:27 UTC 2020
Ending: Fri Jan 31 22:10:13 UTC 2020
Messages: 430
- [External] Re: [PATCH] LSM: Delete hooks in reverse order for avoiding race
Huaisheng HS1 Ye
- [External] Re: [PATCH] selinux: remove redundant msg_msg_alloc_security
Huaisheng HS1 Ye
- [External] Re: [PATCH] selinux: remove redundant selinux_nlmsg_perm
Huaisheng HS1 Ye
- [GIT PULL] apparmor bug fixes for v5.5-rc5
John Johansen
- [GIT PULL] apparmor bug fixes for v5.5-rc5
pr-tracker-bot at kernel.org
- [GIT PULL] Security subsystem changes for v5.6
James Morris
- [GIT PULL] Security subsystem changes for v5.6
pr-tracker-bot at kernel.org
- [GIT PULL] SELinux patches for v5.6
Paul Moore
- [GIT PULL] SELinux patches for v5.6
pr-tracker-bot at kernel.org
- [GIT PULL] TOMOYO patches for v5.6
Tetsuo Handa
- [GIT PULL] TOMOYO patches for v5.6
Linus Torvalds
- [GIT PULL] TOMOYO patches for v5.6
pr-tracker-bot at kernel.org
- [linux-next:master 7161/9861] security/apparmor/policy_unpack_test.c:51:15: sparse: sparse: symbol 'build_aa_ext_struct' was not declared. Should it be static?
kbuild test robot
- [PATCH 0/1] keys: seq_file .next functions should increase position index
Vasily Averin
- [PATCH 0/2] LSM: Drop security_delete_hooks()
Ondrej Mosnacek
- [PATCH 0/8] ima: support stronger algorithms for attestation
Roberto Sassu
- [PATCH 0/8] ima: support stronger algorithms for attestation
Mimi Zohar
- [PATCH 1/1] proc_keys_next should increase position index
Vasily Averin
- [PATCH 1/1] proc_keys_next should increase position index
David Howells
- [PATCH 1/1] proc_keys_next should increase position index
Vasily Averin
- [PATCH 1/1] proc_keys_next should increase position index
Jarkko Sakkinen
- [PATCH 1/1] proc_keys_next should increase position index
Jarkko Sakkinen
- [PATCH 1/2] selinux: treat atomic flags more carefully
Ondrej Mosnacek
- [PATCH 1/2] selinux: treat atomic flags more carefully
Stephen Smalley
- [PATCH 1/2] selinux: treat atomic flags more carefully
Kees Cook
- [PATCH 1/2] selinux: treat atomic flags more carefully
James Morris
- [PATCH 1/2] selinux: treat atomic flags more carefully
Paul Moore
- [PATCH 1/2] selinux: treat atomic flags more carefully
Paul Moore
- [PATCH 1/8] tpm: initialize crypto_id of allocated_banks to HASH_ALGO__LAST
Roberto Sassu
- [PATCH 1/8] tpm: initialize crypto_id of allocated_banks to HASH_ALGO__LAST
Petr Vorel
- [PATCH 1/8] tpm: initialize crypto_id of allocated_banks to HASH_ALGO__LAST
Jarkko Sakkinen
- [PATCH 1/8] tpm: initialize crypto_id of allocated_banks to HASH_ALGO__LAST
Roberto Sassu
- [PATCH 1/8] tpm: initialize crypto_id of allocated_banks to HASH_ALGO__LAST
Mimi Zohar
- [PATCH 2/2] security, selinux: get rid of security_delete_hooks()
Stephen Smalley
- [PATCH 2/2] security, selinux: get rid of security_delete_hooks()
Paul Moore
- [PATCH 2/2] security, selinux: get rid of security_delete_hooks()
Ondrej Mosnacek
- [PATCH 2/2] security, selinux: get rid of security_delete_hooks()
Paul Moore
- [PATCH 2/2] security, selinux: get rid of security_delete_hooks()
Stephen Smalley
- [PATCH 2/2] security,selinux: get rid of security_delete_hooks()
Ondrej Mosnacek
- [PATCH 2/2] security,selinux: get rid of security_delete_hooks()
Casey Schaufler
- [PATCH 2/2] security,selinux: get rid of security_delete_hooks()
Kees Cook
- [PATCH 2/2] security,selinux: get rid of security_delete_hooks()
James Morris
- [PATCH 2/2] security,selinux: get rid of security_delete_hooks()
Ondrej Mosnacek
- [PATCH 2/2] security,selinux: get rid of security_delete_hooks()
James Morris
- [PATCH 2/8] ima: evaluate error in init_ima()
Roberto Sassu
- [PATCH 2/8] ima: evaluate error in init_ima()
Mimi Zohar
- [PATCH 24/25] LSM: Add /proc attr entry for full LSM context
Stephen Smalley
- [PATCH 3/8] ima: store template digest directly in ima_template_entry
Roberto Sassu
- [PATCH 4.19 011/115] afs: Fix SELinux setting security label on /afs
Greg Kroah-Hartman
- [PATCH 4/8] ima: switch to dynamically allocated buffer for template digests
Roberto Sassu
- [PATCH 5.4 020/191] afs: Fix SELinux setting security label on /afs
Greg Kroah-Hartman
- [PATCH 5/8] ima: allocate and initialize tfm for each PCR bank
Roberto Sassu
- [PATCH 5/8] ima: allocate and initialize tfm for each PCR bank
Mimi Zohar
- [PATCH 5/8] ima: allocate and initialize tfm for each PCR bank
Roberto Sassu
- [PATCH 5/8] ima: allocate and initialize tfm for each PCR bank
Mimi Zohar
- [PATCH 6/8] ima: calculate and extend PCR with digests in ima_template_entry
Roberto Sassu
- [PATCH 6/8] ima: calculate and extend PCR with digests in ima_template_entry
Roberto Sassu
- [PATCH 7/8] ima: use ima_hash_algo for collision detection in the measurement list
Mimi Zohar
- [PATCH 7/8] ima: use ima_hash_algo for collision detection in the measurement list
Mimi Zohar
- [PATCH 7/8] ima: use ima_hash_algo for collision detection in the measurement list
Mimi Zohar
- [PATCH 7/8] ima: use ima_hash_algo for collision detection in the measurement list
Roberto Sassu
- [PATCH 7/8] ima: use ima_hash_algo for collision detection in the measurement list
Roberto Sassu
- [PATCH 7/8] ima: use ima_hash_algo for collision detection in the measurement list
Roberto Sassu
- [PATCH 8/8] ima: switch to ima_hash_algo for boot aggregate
Roberto Sassu
- [PATCH 8/8] ima: switch to ima_hash_algo for boot aggregate
Roberto Sassu
- [PATCH AUTOSEL 4.14 004/371] apparmor: don't try to replace stale label in ptrace access check
Sasha Levin
- [PATCH AUTOSEL 4.14 100/371] keys: Timestamp new keys
Sasha Levin
- [PATCH AUTOSEL 4.19 007/671] apparmor: Fix network performance issue in aa_label_sk_perm
Sasha Levin
- [PATCH AUTOSEL 4.19 009/671] apparmor: don't try to replace stale label in ptrace access check
Sasha Levin
- [PATCH AUTOSEL 4.19 183/671] keys: Timestamp new keys
Sasha Levin
- [PATCH AUTOSEL 4.9 072/251] keys: Timestamp new keys
Sasha Levin
- [PATCH AUTOSEL 5.4 03/26] tomoyo: Suppress RCU warning at list_for_each_entry_rcu().
Sasha Levin
- [PATCH bpf-next v1 00/13] MAC and Audit policy using eBPF (KRSI)
Stephen Smalley
- [PATCH bpf-next v1 00/13] MAC and Audit policy using eBPF (KRSI)
James Morris
- [PATCH bpf-next v1 00/13] MAC and Audit policy using eBPF (KRSI)
James Morris
- [PATCH bpf-next v1 00/13] MAC and Audit policy using eBPF (KRSI)
Stephen Smalley
- [PATCH bpf-next v1 00/13] MAC and Audit policy using eBPF (KRSI)
James Morris
- [PATCH bpf-next v1 00/13] MAC and Audit policy using eBPF (KRSI)
Greg Kroah-Hartman
- [PATCH bpf-next v1 00/13] MAC and Audit policy using eBPF (KRSI)
Stephen Smalley
- [PATCH bpf-next v1 00/13] MAC and Audit policy using eBPF (KRSI)
James Morris
- [PATCH bpf-next v1 00/13] MAC and Audit policy using eBPF (KRSI)
KP Singh
- [PATCH bpf-next v1 00/13] MAC and Audit policy using eBPF (KRSI)
KP Singh
- [PATCH bpf-next v1 00/13] MAC and Audit policy using eBPF (KRSI)
Stephen Smalley
- [PATCH bpf-next v1 00/13] MAC and Audit policy using eBPF (KRSI)
KP Singh
- [PATCH bpf-next v1 00/13] MAC and Audit policy using eBPF (KRSI)
James Morris
- [PATCH bpf-next v1 00/13] MAC and Audit policy using eBPF (KRSI)
Alexei Starovoitov
- [PATCH bpf-next v1 00/13] MAC and Audit policy using eBPF (KRSI)
Stephen Smalley
- [PATCH bpf-next v1 00/13] MAC and Audit policy using eBPF (KRSI)
Stephen Smalley
- [PATCH bpf-next v1 00/13] MAC and Audit policy using eBPF (KRSI)
Alexei Starovoitov
- [PATCH bpf-next v1 00/13] MAC and Audit policy using eBPF (KRSI)
Stephen Smalley
- [PATCH bpf-next v1 00/13] MAC and Audit policy using eBPF (KRSI)
Greg Kroah-Hartman
- [PATCH bpf-next v1 00/13] MAC and Audit policy using eBPF (KRSI)
Alexei Starovoitov
- [PATCH bpf-next v1 02/13] bpf: lsm: Add a skeleton and config options
James Morris
- [PATCH bpf-next v1 05/13] tools/libbpf: Add support in libbpf for BPF_PROG_TYPE_LSM
KP Singh
- [PATCH bpf-next v1 06/13] bpf: lsm: Init Hooks and create files in securityfs
KP Singh
- [PATCH bpf-next v1 06/13] bpf: lsm: Init Hooks and create files in securityfs
James Morris
- [PATCH bpf-next v1 07/13] bpf: lsm: Implement attach, detach and execution.
James Morris
- [PATCH bpf-next v1 08/13] bpf: lsm: Show attached program names in hook read handler.
James Morris
- [PATCH bpf-next v1 10/13] bpf: lsm: Handle attachment of the same program
James Morris
- [PATCH bpf-next v1 11/13] tools/libbpf: Add bpf_program__attach_lsm
James Morris
- [PATCH bpf-next v1 12/13] bpf: lsm: Add selftests for BPF_PROG_TYPE_LSM
KP Singh
- [PATCH bpf-next v1 12/13] bpf: lsm: Add selftests for BPF_PROG_TYPE_LSM
James Morris
- [PATCH bpf-next v1 12/13] bpf: lsm: Add selftests for BPF_PROG_TYPE_LSM
Andrii Nakryiko
- [PATCH bpf-next v2 00/10] MAC and Audit policy using eBPF (KRSI)
KP Singh
- [PATCH bpf-next v2 00/10] MAC and Audit policy using eBPF (KRSI)
Andrii Nakryiko
- [PATCH bpf-next v2 00/10] MAC and Audit policy using eBPF (KRSI)
Brendan Jackman
- [PATCH bpf-next v2 00/10] MAC and Audit policy using eBPF (KRSI)
KP Singh
- [PATCH bpf-next v2 01/10] bpf: btf: Make some of the API visible outside BTF
KP Singh
- [PATCH bpf-next v2 01/10] bpf: btf: Make some of the API visible outside BTF
kbuild test robot
- [PATCH bpf-next v2 01/10] bpf: btf: Make some of the API visible outside BTF
KP Singh
- [PATCH bpf-next v2 02/10] bpf: lsm: Add a skeleton and config options
Casey Schaufler
- [PATCH bpf-next v2 02/10] bpf: lsm: Add a skeleton and config options
KP Singh
- [PATCH bpf-next v2 02/10] bpf: lsm: Add a skeleton and config options
KP Singh
- [PATCH bpf-next v2 03/10] bpf: lsm: Introduce types for eBPF based LSM
KP Singh
- [PATCH bpf-next v2 04/10] bpf: lsm: Add mutable hooks list for the BPF LSM
Stephen Smalley
- [PATCH bpf-next v2 04/10] bpf: lsm: Add mutable hooks list for the BPF LSM
Casey Schaufler
- [PATCH bpf-next v2 04/10] bpf: lsm: Add mutable hooks list for the BPF LSM
KP Singh
- [PATCH bpf-next v2 04/10] bpf: lsm: Add mutable hooks list for the BPF LSM
KP Singh
- [PATCH bpf-next v2 04/10] bpf: lsm: Add mutable hooks list for the BPF LSM
KP Singh
- [PATCH bpf-next v2 05/10] bpf: lsm: BTF API for LSM hooks
KP Singh
- [PATCH bpf-next v2 05/10] bpf: lsm: BTF API for LSM hooks
Andrii Nakryiko
- [PATCH bpf-next v2 05/10] bpf: lsm: BTF API for LSM hooks
KP Singh
- [PATCH bpf-next v2 06/10] bpf: lsm: Implement attach, detach and execution
KP Singh
- [PATCH bpf-next v2 06/10] bpf: lsm: Implement attach, detach and execution
Greg Kroah-Hartman
- [PATCH bpf-next v2 06/10] bpf: lsm: Implement attach, detach and execution
KP Singh
- [PATCH bpf-next v2 07/10] bpf: lsm: Make the allocated callback RO+X
KP Singh
- [PATCH bpf-next v2 08/10] tools/libbpf: Add support for BPF_PROG_TYPE_LSM
KP Singh
- [PATCH bpf-next v2 08/10] tools/libbpf: Add support for BPF_PROG_TYPE_LSM
Andrii Nakryiko
- [PATCH bpf-next v2 08/10] tools/libbpf: Add support for BPF_PROG_TYPE_LSM
Andrii Nakryiko
- [PATCH bpf-next v2 08/10] tools/libbpf: Add support for BPF_PROG_TYPE_LSM
KP Singh
- [PATCH bpf-next v2 08/10] tools/libbpf: Add support for BPF_PROG_TYPE_LSM
KP Singh
- [PATCH bpf-next v2 08/10] tools/libbpf: Add support for BPF_PROG_TYPE_LSM
Andrii Nakryiko
- [PATCH bpf-next v2 08/10] tools/libbpf: Add support for BPF_PROG_TYPE_LSM
KP Singh
- [PATCH bpf-next v2 09/10] bpf: lsm: Add selftests for BPF_PROG_TYPE_LSM
KP Singh
- [PATCH bpf-next v2 10/10] bpf: lsm: Add Documentation
KP Singh
- [PATCH bpf-next v3 00/10] MAC and Audit policy using eBPF (KRSI)
KP Singh
- [PATCH bpf-next v3 01/10] bpf: btf: Add btf_type_by_name_kind
KP Singh
- [PATCH bpf-next v3 01/10] bpf: btf: Add btf_type_by_name_kind
Andrii Nakryiko
- [PATCH bpf-next v3 01/10] bpf: btf: Add btf_type_by_name_kind
KP Singh
- [PATCH bpf-next v3 02/10] bpf: lsm: Add a skeleton and config options
KP Singh
- [PATCH bpf-next v3 03/10] bpf: lsm: Introduce types for eBPF based LSM
KP Singh
- [PATCH bpf-next v3 04/10] bpf: lsm: Add mutable hooks list for the BPF LSM
Casey Schaufler
- [PATCH bpf-next v3 04/10] bpf: lsm: Add mutable hooks list for the BPF LSM
KP Singh
- [PATCH bpf-next v3 04/10] bpf: lsm: Add mutable hooks list for the BPF LSM
Casey Schaufler
- [PATCH bpf-next v3 04/10] bpf: lsm: Add mutable hooks list for the BPF LSM
KP Singh
- [PATCH bpf-next v3 04/10] bpf: lsm: Add mutable hooks list for the BPF LSM
Casey Schaufler
- [PATCH bpf-next v3 04/10] bpf: lsm: Add mutable hooks list for the BPF LSM
KP Singh
- [PATCH bpf-next v3 04/10] bpf: lsm: Add mutable hooks list for the BPF LSM
James Morris
- [PATCH bpf-next v3 04/10] bpf: lsm: Add mutable hooks list for the BPF LSM
KP Singh
- [PATCH bpf-next v3 05/10] bpf: lsm: BTF API for LSM hooks
KP Singh
- [PATCH bpf-next v3 06/10] bpf: lsm: Implement attach, detach and execution
KP Singh
- [PATCH bpf-next v3 07/10] bpf: lsm: Make the allocated callback RO+X
KP Singh
- [PATCH bpf-next v3 08/10] tools/libbpf: Add support for BPF_PROG_TYPE_LSM
KP Singh
- [PATCH bpf-next v3 08/10] tools/libbpf: Add support for BPF_PROG_TYPE_LSM
Andrii Nakryiko
- [PATCH bpf-next v3 08/10] tools/libbpf: Add support for BPF_PROG_TYPE_LSM
KP Singh
- [PATCH bpf-next v3 09/10] bpf: lsm: Add selftests for BPF_PROG_TYPE_LSM
KP Singh
- [PATCH bpf-next v3 10/10] bpf: lsm: Add Documentation
KP Singh
- [PATCH bpf-next] bpf: Make trampolines W^X
KP Singh
- [PATCH bpf-next] bpf: Make trampolines W^X
Andy Lutomirski
- [PATCH bpf-next] bpf: Make trampolines W^X
Justin Capella
- [PATCH bpf-next] bpf: Make trampolines W^X
Peter Zijlstra
- [PATCH bpf-next] bpf: Make trampolines W^X
Alexei Starovoitov
- [PATCH bpf-next] bpf: Make trampolines W^X
Edgecombe, Rick P
- [PATCH bpf-next] bpf: Make trampolines W^X
Andy Lutomirski
- [PATCH bpf-next] bpf: Make trampolines W^X
Peter Zijlstra
- [PATCH bpf-next] bpf: Make trampolines W^X
Alexei Starovoitov
- [PATCH bpf-next] bpf: Make trampolines W^X
Edgecombe, Rick P
- [PATCH bpf-next] bpf: Make trampolines W^X
Andy Lutomirski
- [PATCH bpf-next] bpf: Make trampolines W^X
Edgecombe, Rick P
- [PATCH bpf-next] bpf: Make trampolines W^X
Andy Lutomirski
- [PATCH bpf-next] bpf: Make trampolines W^X
Edgecombe, Rick P
- [PATCH bpf-next] bpf: Make trampolines W^X
Andy Lutomirski
- [PATCH kunit] kunit: building kunit as a module breaks allmodconfig
Shuah Khan
- [PATCH kunit] kunit: building kunit as a module breaks allmodconfig
Brendan Higgins
- [PATCH kunit] kunit: building kunit as a module breaks allmodconfig
Alan Maguire
- [PATCH RESEND] MAINTAINERS: fix style in SAFESETID SECURITY MODULE
Lukas Bulwahn
- [PATCH v1 - RFC] ima: export the measurement list when needed
Janne Karhunen
- [PATCH v13 03/25] LSM: Use lsmblob in security_audit_rule_match
Casey Schaufler
- [PATCH v13 06/25] Use lsmblob in security_secctx_to_secid
Stephen Smalley
- [PATCH v13 09/25] LSM: Use lsmblob in security_task_getsecid
Stephen Smalley
- [PATCH v13 13/25] LSM: Specify which LSM to display
Stephen Smalley
- [PATCH v13 14/25] LSM: Ensure the correct LSM context releaser
Stephen Smalley
- [PATCH v13 15/25] LSM: Use lsmcontext in security_secid_to_secctx
Stephen Smalley
- [PATCH v13 16/25] LSM: Use lsmcontext in security_dentry_init_security
Stephen Smalley
- [PATCH v13 19/25] NET: Store LSM netlabel data in a lsmblob
Stephen Smalley
- [PATCH v13 19/25] NET: Store LSM netlabel data in a lsmblob
Casey Schaufler
- [PATCH v13 19/25] NET: Store LSM netlabel data in a lsmblob
Stephen Smalley
- [PATCH v13 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
Stephen Smalley
- [PATCH v13 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
Simon McVittie
- [PATCH v13 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
Casey Schaufler
- [PATCH v13 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
Stephen Smalley
- [PATCH v13 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
Stephen Smalley
- [PATCH v13 26/25] Audit: Multiple LSM support in audit rules
Casey Schaufler
- [PATCH v13 26/25] Audit: Multiple LSM support in audit rules
Mimi Zohar
- [PATCH v13 26/25] Audit: Multiple LSM support in audit rules
Casey Schaufler
- [PATCH v13 26/25] Audit: Multiple LSM support in audit rules
Mimi Zohar
- [PATCH v14 00/23] LSM: Module stacking for AppArmor
Casey Schaufler
- [PATCH v14 00/23] LSM: Module stacking for AppArmor
Stephen Smalley
- [PATCH v14 00/23] LSM: Module stacking for AppArmor
Stephen Smalley
- [PATCH v14 00/23] LSM: Module stacking for AppArmor
Casey Schaufler
- [PATCH v14 00/23] LSM: Module stacking for AppArmor
Stephen Smalley
- [PATCH v14 00/23] LSM: Module stacking for AppArmor
Casey Schaufler
- [PATCH v14 01/23] LSM: Infrastructure management of the sock security
Casey Schaufler
- [PATCH v14 02/23] LSM: Create and manage the lsmblob data structure.
Stephen Smalley
- [PATCH v14 02/23] LSM: Create and manage the lsmblob data structure.
Casey Schaufler
- [PATCH v14 03/23] LSM: Use lsmblob in security_audit_rule_match
Casey Schaufler
- [PATCH v14 04/23] LSM: Use lsmblob in security_kernel_act_as
Casey Schaufler
- [PATCH v14 05/23] net: Prepare UDS for security module stacking
Casey Schaufler
- [PATCH v14 06/23] Use lsmblob in security_secctx_to_secid
Casey Schaufler
- [PATCH v14 06/23] Use lsmblob in security_secctx_to_secid
Stephen Smalley
- [PATCH v14 07/23] LSM: Use lsmblob in security_secid_to_secctx
Casey Schaufler
- [PATCH v14 08/23] LSM: Use lsmblob in security_ipc_getsecid
Casey Schaufler
- [PATCH v14 09/23] LSM: Use lsmblob in security_task_getsecid
Casey Schaufler
- [PATCH v14 10/23] LSM: Use lsmblob in security_inode_getsecid
Casey Schaufler
- [PATCH v14 11/23] LSM: Use lsmblob in security_cred_getsecid
Casey Schaufler
- [PATCH v14 12/23] IMA: Change internal interfaces to use lsmblobs
Casey Schaufler
- [PATCH v14 13/23] LSM: Specify which LSM to display
Casey Schaufler
- [PATCH v14 14/23] LSM: Ensure the correct LSM context releaser
Casey Schaufler
- [PATCH v14 15/23] LSM: Use lsmcontext in security_secid_to_secctx
Casey Schaufler
- [PATCH v14 16/23] LSM: Use lsmcontext in security_inode_getsecctx
Casey Schaufler
- [PATCH v14 17/23] LSM: security_secid_to_secctx in netlink netfilter
Casey Schaufler
- [PATCH v14 18/23] NET: Store LSM netlabel data in a lsmblob
Casey Schaufler
- [PATCH v14 18/23] NET: Store LSM netlabel data in a lsmblob
Stephen Smalley
- [PATCH v14 19/23] LSM: Verify LSM display sanity in binder
Casey Schaufler
- [PATCH v14 20/23] Audit: Add subj_LSM fields when necessary
Casey Schaufler
- [PATCH v14 21/23] Audit: Include object data for all security modules
Casey Schaufler
- [PATCH v14 22/23] LSM: Add /proc attr entry for full LSM context
Casey Schaufler
- [PATCH v14 22/23] LSM: Add /proc attr entry for full LSM context
Stephen Smalley
- [PATCH v14 22/23] LSM: Add /proc attr entry for full LSM context
Stephen Smalley
- [PATCH v14 22/23] LSM: Add /proc attr entry for full LSM context
Casey Schaufler
- [PATCH v14 22/23] LSM: Add /proc attr entry for full LSM context
Stephen Smalley
- [PATCH v14 22/23] LSM: Add /proc attr entry for full LSM context
Simon McVittie
- [PATCH v14 22/23] LSM: Add /proc attr entry for full LSM context
Casey Schaufler
- [PATCH v14 22/23] LSM: Add /proc attr entry for full LSM context
Casey Schaufler
- [PATCH v14 23/23] AppArmor: Remove the exclusive flag
Casey Schaufler
- [PATCH v2 1/2] security/keys/secure_key: Adds the secure key support based on CAAM.
Maik Otto
- [PATCH v2 1/2] security/keys/secure_key: Adds the secure key support based on CAAM.
Jarkko Sakkinen
- [PATCH v24 12/24] x86/sgx: Linux Enclave Driver
Haitao Huang
- [PATCH v24 12/24] x86/sgx: Linux Enclave Driver
Jarkko Sakkinen
- [PATCH v2] ima: Add a space after printing LSM rules for readability
Clay Chang
- [PATCH v2] ima: add the ability to query the hash of a given file.
Florent Revest
- [PATCH v2] ima: add the ability to query the hash of a given file.
Mimi Zohar
- [PATCH v2] ima: add the ability to query the hash of a given file.
Florent Revest
- [PATCH v2] ima: add the ability to query the hash of a given file.
KP Singh
- [PATCH v2] ima: add the ability to query the hash of a given file.
Mimi Zohar
- [PATCH v2] ima: add the ability to query the hash of a given file.
Florent Revest
- [PATCH v2] ima: add the ability to query the hash of a given file.
Mimi Zohar
- [PATCH v2] ima: export the measurement list when needed
Janne Karhunen
- [PATCH v2] ima: export the measurement list when needed
Janne Karhunen
- [PATCH v2] ima: export the measurement list when needed
Mimi Zohar
- [PATCH v2] ima: export the measurement list when needed
Janne Karhunen
- [PATCH v2] ima: export the measurement list when needed
david.safford at gmail.com
- [PATCH v2] ima: export the measurement list when needed
Mimi Zohar
- [PATCH v2] ima: export the measurement list when needed
Janne Karhunen
- [PATCH v2] ima: export the measurement list when needed
Janne Karhunen
- [PATCH v2] ima: ima/lsm policy rule loading logic bug fixes
Janne Karhunen
- [PATCH v2] keys: proc_keys_next should increase position index
Vasily Averin
- [PATCH v2] keys: proc_keys_next should increase position index
David Howells
- [PATCH v2] selinux: deprecate disabling SELinux and runtime
Paul Moore
- [PATCH v2] selinux: deprecate disabling SELinux and runtime
Stephen Smalley
- [PATCH v2] selinux: deprecate disabling SELinux and runtime
Paul Moore
- [PATCH v2] selinux: remove redundant selinux_nlmsg_perm
Huaisheng Ye
- [PATCH v2] selinux: remove redundant selinux_nlmsg_perm
Paul Moore
- [PATCH v3] ima: add the ability to query the cached hash of a given file
KP Singh
- [PATCH v3] ima: add the ability to query the cached hash of a given file
Florent Revest
- [PATCH v4 2/9] perf/core: open access for CAP_SYS_PERFMON privileged process
Peter Zijlstra
- [PATCH v4 2/9] perf/core: open access for CAP_SYS_PERFMON privileged process
Alexey Budankov
- [PATCH v4 7/9] parisc/perf: open access for CAP_SYS_PERFMON privileged process
Helge Deller
- [PATCH v4] ima: ima/lsm policy rule loading logic bug fixes
Janne Karhunen
- [PATCH v4] ima: ima/lsm policy rule loading logic bug fixes
Mimi Zohar
- [PATCH v5 0/10] Introduce CAP_PERFMON to secure system performance monitoring and observability
Alexey Budankov
- [PATCH v5 01/10] capabilities: introduce CAP_PERFMON to kernel and user space
Stephen Smalley
- [PATCH v5 01/10] capabilities: introduce CAP_PERFMON to kernel and user space
Alexey Budankov
- [PATCH v5 01/10] capabilities: introduce CAP_PERFMON to kernel and user space
Alexei Starovoitov
- [PATCH v5 01/10] capabilities: introduce CAP_PERFMON to kernel and user space
Alexey Budankov
- [PATCH v5 01/10] capabilities: introduce CAP_PERFMON to kernel and user space
Alexey Budankov
- [PATCH v5 01/10] capabilities: introduce CAP_PERFMON to kernel and user space
Stephen Smalley
- [PATCH v5 01/10] capabilities: introduce CAP_PERFMON to kernel and user space
Alexey Budankov
- [PATCH v5 01/10] capabilities: introduce CAP_PERFMON to kernel and user space
Alexey Budankov
- [PATCH v5 02/10] perf/core: open access to the core for CAP_PERFMON privileged process
Alexey Budankov
- [PATCH v5 03/10] perf/core: open access to anon probes for CAP_PERFMON privileged process
Alexey Budankov
- [PATCH v5 04/10] perf tool: extend Perf tool with CAP_PERFMON capability support
Alexey Budankov
- [PATCH v5 05/10] drm/i915/perf: open access for CAP_PERFMON privileged process
Alexey Budankov
- [PATCH v5 06/10] trace/bpf_trace: open access for CAP_PERFMON privileged process
Alexey Budankov
- [PATCH v5 07/10] powerpc/perf: open access for CAP_PERFMON privileged process
Anju T Sudhakar
- [PATCH v5 07/10] powerpc/perf: open access for CAP_PERFMON privileged process
Alexey Budankov
- [PATCH v5 08/10] parisc/perf: open access for CAP_PERFMON privileged process
Alexey Budankov
- [PATCH v5 09/10] drivers/perf: open access for CAP_PERFMON privileged process
Alexey Budankov
- [PATCH v5 10/10] drivers/oprofile: open access for CAP_PERFMON privileged process
Alexey Budankov
- [PATCH v6 00/10] Introduce CAP_PERFMON to secure system performance monitoring and observability
Alexey Budankov
- [PATCH v6 00/10] proc: modernize proc to support multiple private instances
Alexey Dobriyan
- [PATCH v6 00/10] proc: modernize proc to support multiple private instances
Alexey Gladkov
- [PATCH v6 01/10] capabilities: introduce CAP_PERFMON to kernel and user space
James Morris
- [PATCH v6 01/10] capabilities: introduce CAP_PERFMON to kernel and user space
Alexey Budankov
- [PATCH v6 02/10] perf/core: open access to the core for CAP_PERFMON privileged process
Alexey Budankov
- [PATCH v6 03/10] perf/core: open access to probes for CAP_PERFMON privileged process
Alexey Budankov
- [PATCH v6 03/10] perf/core: open access to probes for CAP_PERFMON privileged process
James Morris
- [PATCH v6 04/10] perf tool: extend Perf tool with CAP_PERFMON capability support
Alexey Budankov
- [PATCH v6 05/10] drm/i915/perf: open access for CAP_PERFMON privileged process
Alexey Budankov
- [PATCH v6 06/10] trace/bpf_trace: open access for CAP_PERFMON privileged process
Alexey Budankov
- [PATCH v6 06/10] trace/bpf_trace: open access for CAP_PERFMON privileged process
James Morris
- [PATCH v6 07/10] powerpc/perf: open access for CAP_PERFMON privileged process
James Morris
- [PATCH v6 07/10] powerpc/perf: open access for CAP_PERFMON privileged process
Alexey Budankov
- [PATCH v6 07/10] proc: flush task dcache entries from all procfs instances
Alexey Gladkov
- [PATCH v6 08/10] parisc/perf: open access for CAP_PERFMON privileged process
James Morris
- [PATCH v6 08/10] parisc/perf: open access for CAP_PERFMON privileged process
Alexey Budankov
- [PATCH v6 09/10] drivers/perf: open access for CAP_PERFMON privileged process
James Morris
- [PATCH v6 09/10] drivers/perf: open access for CAP_PERFMON privileged process
Alexey Budankov
- [PATCH v6 10/10] drivers/oprofile: open access for CAP_PERFMON privileged process
Alexey Budankov
- [PATCH v6 10/10] drivers/oprofile: open access for CAP_PERFMON privileged process
James Morris
- [PATCH v7 00/11] proc: modernize proc to support multiple private instances
Alexey Gladkov
- [PATCH v7 01/11] proc: Rename struct proc_fs_info to proc_fs_opts
Alexey Gladkov
- [PATCH v7 02/11] proc: add proc_fs_info struct to store proc information
Alexey Gladkov
- [PATCH v7 02/11] proc: add proc_fs_info struct to store proc information
Oleg Nesterov
- [PATCH v7 02/11] proc: add proc_fs_info struct to store proc information
Oleg Nesterov
- [PATCH v7 03/11] proc: move /proc/{self|thread-self} dentries to proc_fs_info
Alexey Gladkov
- [PATCH v7 04/11] proc: move hide_pid, pid_gid from pid_namespace to proc_fs_info
Alexey Gladkov
- [PATCH v7 05/11] proc: add helpers to set and get proc hidepid and gid mount options
Alexey Gladkov
- [PATCH v7 06/11] proc: support mounting procfs instances inside same pid namespace
Alexey Gladkov
- [PATCH v7 07/11] proc: flush task dcache entries from all procfs instances
Alexey Gladkov
- [PATCH v7 07/11] proc: flush task dcache entries from all procfs instances
Linus Torvalds
- [PATCH v7 07/11] proc: flush task dcache entries from all procfs instances
Alexey Gladkov
- [PATCH v7 08/11] proc: instantiate only pids that we can ptrace on 'hidepid=4' mount option
Alexey Gladkov
- [PATCH v7 09/11] proc: add option to mount only a pids subset
Alexey Gladkov
- [PATCH v7 10/11] docs: proc: add documentation for "hidepid=4" and "subset=pidfs" options and new mount behavior
Alexey Gladkov
- [PATCH v7 11/11] proc: Move hidepid values to uapi as they are user interface to mount
Alexey Gladkov
- [PATCH] efi: Allow some cert-related UEFI variables to not be present
ignat.loskutov at gmail.com
- [PATCH] ima: Add a space after printing a LSM rule for readability
clayc at hpe.com
- [PATCH] ima: Add a space after printing a LSM rule for readability
Mimi Zohar
- [PATCH] ima: Add a space after printing a LSM rule for readability
Clay Chang
- [PATCH] ima: add the ability to query ima for the hash of a given file.
Florent Revest
- [PATCH] ima: add the ability to query ima for the hash of a given file.
Florent Revest
- [PATCH] ima: ima/lsm policy rule loading logic bug fixes
Janne Karhunen
- [PATCH] ima: ima/lsm policy rule loading logic bug fixes
Mimi Zohar
- [PATCH] keys: Fix request_key() cache
David Howells
- [PATCH] LSM: Delete hooks in reverse order for avoiding race
Ondrej Mosnacek
- [PATCH] LSM: Delete hooks in reverse order for avoiding race
James Morris
- [PATCH] security, keys: Optimize barrier usage for Rmw atomic bitops
Davidlohr Bueso
- [PATCH] security/integrity: Include __func__ in messages for easier debug
Joe Perches
- [PATCH] security/integrity: Include __func__ in messages for easier debug
Shuah Khan
- [PATCH] security: apparmor: Fix a possible sleep-in-atomic-context bug in find_attach()
John Johansen
- [PATCH] security: remove EARLY_LSM_COUNT which never used
Alex Shi
- [PATCH] security: remove EARLY_LSM_COUNT which never used
Serge E. Hallyn
- [PATCH] security: remove EARLY_LSM_COUNT which never used
James Morris
- [PATCH] selinux: remove redundant msg_msg_alloc_security
Huaisheng Ye
- [PATCH] selinux: remove redundant msg_msg_alloc_security
Stephen Smalley
- [PATCH] selinux: remove redundant msg_msg_alloc_security
Paul Moore
- [PATCH] selinux: remove redundant msg_msg_alloc_security
Casey Schaufler
- [PATCH] selinux: remove redundant msg_msg_alloc_security
Huaisheng HS1 Ye
- [PATCH] selinux: remove redundant msg_msg_alloc_security
Paul Moore
- [PATCH] selinux: remove redundant selinux_nlmsg_perm
Huaisheng Ye
- [PATCH] selinux: remove redundant selinux_nlmsg_perm
Stephen Smalley
- [RFC PATCH 0/2] Create CAAM HW key in linux keyring and use in dmcrypt
James Bottomley
- [RFC PATCH 00/14] pipe: Keyrings, Block and USB notifications [ver #3]
David Howells
- [RFC PATCH 00/14] pipe: Keyrings, Block and USB notifications [ver #3]
Linus Torvalds
- [RFC PATCH 00/14] pipe: Keyrings, Block and USB notifications [ver #3]
David Howells
- [RFC PATCH 01/14] uapi: General notification queue definitions [ver #3]
David Howells
- [RFC PATCH 02/14] security: Add hooks to rule on setting a watch [ver #3]
David Howells
- [RFC PATCH 03/14] security: Add a hook for the point of notification insertion [ver #3]
David Howells
- [RFC PATCH 04/14] pipe: Add O_NOTIFICATION_PIPE [ver #3]
David Howells
- [RFC PATCH 05/14] pipe: Add general notification queue support [ver #3]
David Howells
- [RFC PATCH 06/14] keys: Add a notification facility [ver #3]
David Howells
- [RFC PATCH 07/14] Add sample notification program [ver #3]
David Howells
- [RFC PATCH 07/14] Add sample notification program [ver #3]
Guenter Roeck
- [RFC PATCH 08/14] pipe: Allow buffers to be marked read-whole-or-error for notifications [ver #3]
David Howells
- [RFC PATCH 09/14] pipe: Add notification lossage handling [ver #3]
David Howells
- [RFC PATCH 10/14] Add a general, global device notification watch list [ver #3]
David Howells
- [RFC PATCH 11/14] block: Add block layer notifications [ver #3]
David Howells
- [RFC PATCH 12/14] usb: Add USB subsystem notifications [ver #3]
David Howells
- [RFC PATCH 13/14] selinux: Implement the watch_key security hook [ver #3]
David Howells
- [RFC PATCH 14/14] smack: Implement the watch_key and post_notification hooks [ver #3]
David Howells
- [RFC PATCH 2/2] dm-crypt: Use any key type which is registered
Maik Otto
- [RFC PATCH 2/2] dm-crypt: Use any key type which is registered
James Bottomley
- [RFC PATCH linux-next] apparmor: build_aa_ext_struct() can be static
kbuild test robot
- [RFC PATCH] selinux: deprecate disabling SELinux and runtime
Ondrej Mosnacek
- [RFC PATCH] selinux: deprecate disabling SELinux and runtime
Paul Moore
- [RFC PATCH] selinux: deprecate disabling SELinux and runtime
Ondrej Mosnacek
- [RFC PATCH] selinux: deprecate disabling SELinux and runtime
Paul Moore
- [RFC PATCH] selinux: deprecate disabling SELinux and runtime
Stephen Smalley
- [RFC PATCH] selinux: deprecate disabling SELinux and runtime
Paul Moore
- [RFC PATCH] selinux: implement move_mount hook
Stephen Smalley
- [RFC PATCH] selinux: implement move_mount hook
Stephen Smalley
- [RFC PATCH] selinux: implement move_mount hook
Casey Schaufler
- contact Dhl office New York to receive your Prepaid ATM Master Card worth $15.8Million US DOLLARS now.
Dr. William Johnson
- Contact Diplomatic Agent, Mr. Mcclaine John to receive your ATM CARD valued the sum of $12.8Million United States Dollars
Prof, William Roberts
- Denying access from sb_umount issue
Alexander Ivanov
- Denying access from sb_umount issue
James Morris
- Denying access from sb_umount issue
Alexander Ivanov
- Fwd: Christy from America.
Christy Ruth Walton
- Happy New Year For Our Mutual Benefits
Brian Gilvary
- HELLO
Favor Desmond
- I promise you must be happy today, God has uplifted you and your family ok
Rev.Dr Emmanuel Okoye CEO Ecobank-benin
- I wait for your swift response,
Rick Schaech
- inconsistent lock state in ima_process_queued_keys
syzbot
- inconsistent lock state in ima_process_queued_keys
Dmitry Vyukov
- inconsistent lock state in ima_process_queued_keys
Mimi Zohar
- inconsistent lock state in ima_process_queued_keys
Dmitry Vyukov
- inconsistent lock state in ima_process_queued_keys
Lakshmi Ramasubramanian
- inconsistent lock state in ima_process_queued_keys
Lakshmi Ramasubramanian
- inconsistent lock state in ima_process_queued_keys
syzbot
- inconsistent lock state in ima_process_queued_keys
Lakshmi Ramasubramanian
- INFO: rcu detected stall in sys_kill
Dmitry Vyukov
- INFO: rcu detected stall in sys_sendfile64
Tetsuo Handa
- INFO: rcu detected stall in sys_sendfile64
Dmitry Vyukov
- INFO: rcu detected stall in sys_sendfile64
Peter Zijlstra
- KASAN slab-out-of-bounds in tun_chr_open/sock_init_data (Was: Re: [PATCH v14 00/23] LSM: Module stacking for AppArmor)
Stephen Smalley
- KASAN slab-out-of-bounds in tun_chr_open/sock_init_data (Was: Re: [PATCH v14 00/23] LSM: Module stacking for AppArmor)
Casey Schaufler
- linux-next: Tree for Jan 29 (security/smack/)
Randy Dunlap
- linux-next: Tree for Jan 29 (security/smack/)
Casey Schaufler
- linux-next: Tree for Jan 29 (security/smack/)
David Howells
- mmotm 2020-01-28-20-05 uploaded (security/security.c)
Randy Dunlap
- mmotm 2020-01-28-20-05 uploaded (security/security.c)
Paul Moore
- mmotm 2020-01-28-20-05 uploaded (security/security.c)
Randy Dunlap
- Perf Data on LSM in v5.3
Casey Schaufler
- Perf Data on LSM in v5.3
Casey Schaufler
- Perf Data on LSM in v5.3
John Johansen
- Perf Data on LSM in v5.3
Stephen Smalley
- Perf Data on LSM in v5.3
Stephen Smalley
- Perf Data on LSM in v5.3
Stephen Smalley
- Perf Data on LSM in v5.3
Stephen Smalley
- Perf Data on LSM in v5.3
Stephen Smalley
- Perf Data on LSM in v5.3
Stephen Smalley
- Perf Data on LSM in v5.3
Stephen Smalley
- Perf Data on LSM in v5.3
John Johansen
- Perf Data on LSM in v5.3
Stephen Smalley
- Perf Data on LSM in v5.3
Casey Schaufler
- Perf Data on LSM in v5.3
Stephen Smalley
- SELinux: How to split permissions for keys?
David Howells
- SELinux: How to split permissions for keys?
Stephen Smalley
- SELinux: How to split permissions for keys?
Stephen Smalley
Last message date:
Fri Jan 31 22:10:13 UTC 2020
Archived on: Fri Jan 31 22:10:25 UTC 2020
This archive was generated by
Pipermail 0.09 (Mailman edition).