October 2020 Archives by thread
Starting: Thu Oct 1 17:02:29 UTC 2020
Ending: Sat Oct 31 17:43:29 UTC 2020
Messages: 553
- [PATCH v11 0/3] Add trusted_for(2) (was O_MAYEXEC)
Mickaël Salaün
- [PATCH v11 1/3] fs: Add trusted_for(2) syscall implementation and related sysctl
Mickaël Salaün
- [PATCH v11 2/3] arch: Wire up trusted_for(2)
Mickaël Salaün
- [PATCH v11 3/3] selftest/interpreter: Add tests for trusted_for(2) policies
Mickaël Salaün
- [PATCH v38 15/24] x86/sgx: Enable provisioning for remote attestation
Sean Christopherson
- [PATCH v38 11/24] x86/sgx: Add SGX enclave driver
Sean Christopherson
- [PATCH V2 1/3] efi: Support for MOK variable config table
Nathan Chancellor
- [PATCH v11 2/3] arch: Wire up trusted_for(2)
Mickaël Salaün
- [PATCH v5 00/16] Introduce partial kernel_read_file() support
Kees Cook
- [PATCH v5 01/16] fs/kernel_read_file: Remove FIRMWARE_PREALLOC_BUFFER enum
Kees Cook
- [PATCH v5 03/16] fs/kernel_read_file: Split into separate include file
Kees Cook
- [PATCH v5 04/16] fs/kernel_read_file: Split into separate source file
Kees Cook
- [PATCH v5 05/16] fs/kernel_read_file: Remove redundant size argument
Kees Cook
- [PATCH v5 06/16] fs/kernel_read_file: Switch buffer size arg to size_t
Kees Cook
- [PATCH v5 07/16] fs/kernel_read_file: Add file_size output argument
Kees Cook
- [PATCH v5 08/16] LSM: Introduce kernel_post_load_data() hook
Kees Cook
- [PATCH v5 09/16] firmware_loader: Use security_post_load_data()
Kees Cook
- [PATCH v5 10/16] module: Call security_kernel_post_load_data()
Kees Cook
- [PATCH v5 11/16] LSM: Add "contents" flag to kernel_read_file hook
Kees Cook
- [PATCH v5 12/16] IMA: Add support for file reads without contents
Kees Cook
- [PATCH v5 13/16] fs/kernel_file_read: Add "offset" arg for partial reads
Kees Cook
- [PATCH v5 14/16] firmware: Store opt_flags in fw_priv
Kees Cook
- [PATCH v5 15/16] firmware: Add request_partial_firmware_into_buf()
Kees Cook
- Low Rate Loan.
Mr. Hashim Bin
- [PATCH v39 11/24] x86/sgx: Add SGX enclave driver
Jarkko Sakkinen
- [PATCH v39 15/24] x86/sgx: Add SGX_IOC_ENCLAVE_PROVISION
Jarkko Sakkinen
- [RFC PATCH 3/6] security/fbfam: Use the api to manage statistics
John Wood
- [PATCH] apparmor: fix error check
trix at redhat.com
- [PATCH 1/3] KEYS: trusted: Fix incorrect handling of tpm_get_random()
Jarkko Sakkinen
- [PATCH 2/3] KEYS: trusted: Reserve TPM for seal and unseal operations
Jarkko Sakkinen
- [PATCH 3/3] KEYS: trusted: Fix migratable=1 failing
Jarkko Sakkinen
- [PATCH v2 1/3] KEYS: trusted: Fix incorrect handling of tpm_get_random()
Jarkko Sakkinen
- [PATCH v2 2/3] KEYS: trusted: Reserve TPM for seal and unseal operations
Jarkko Sakkinen
- [PATCH v2 3/3] KEYS: trusted: Fix migratable=1 failing
Jarkko Sakkinen
- [PATCH v7 0/4] Introduce TEE based Trusted Keys support
Sumit Garg
- Low Rate Loan./mmm,
Mr. Hashim Bin
- [PATCH] ima: Fix sizeof mismatches
Colin King
- Најмила кај господарот
Marilyn Robert
- [PATCH v9 0/3] SELinux support for anonymous inodes and UFFD
Lokesh Gidra
- selinux: how to query if selinux is enabled
Olga Kornievskaia
- [PATCH v21 00/12] Landlock LSM
Mickaël Salaün
- [PATCH v21 01/12] landlock: Add object management
Mickaël Salaün
- wir bieten 2% Kredite
Thomas Mark
- [PATCH v9 1/3] Add a new LSM-supporting anonymous inode interface
Eric Biggers
- [PATCH v9 3/3] Wire UFFD up to SELinux
Eric Biggers
- [PATCH v39 11/24] x86/sgx: Add SGX enclave driver
Greg KH
- GREETINGS
Ibrahim Bello
- [PATCH RFC PKS/Trusted keys 0/2] trusted keys: Add PKS protection to trusted keys
ira.weiny at intel.com
- [PATCH v10 0/3] SELinux support for anonymous inodes and UFFD
Lokesh Gidra
- [PATCH 0/5] net: use semicolons rather than commas to separate statements
Julia Lawall
- [PATCH 4/5] net/ipv6: use semicolons rather than commas to separate statements
Julia Lawall
- Does selinux rule needed for .ima keyring access - integrity: Request for unknown key 'id:87deb3bf' err -13
rishi gupta
- [PATCH 3/3] selinux: Add SELinux GTP support
Paul Moore
- [PATCH] ima: defer arch_ima_get_secureboot() call to IMA init time
Ard Biesheuvel
- [GIT PULL] Smack patches for v5.10
Casey Schaufler
- [PATCH v21 00/23] LSM: Module stacking for AppArmor
Casey Schaufler
- [PATCH v3 1/3] KEYS: trusted: Fix incorrect handling of tpm_get_random()
Jarkko Sakkinen
- [PATCH v3 2/3] KEYS: trusted: Fix migratable=1 failing
Jarkko Sakkinen
- [PATCH v3 3/3] KEYS: trusted: Reserve TPM for seal and unseal operations
Jarkko Sakkinen
- [GIT PULL] SELinux patches for v5.10
Paul Moore
- [PATCH v4 1/3] KEYS: trusted: Fix incorrect handling of tpm_get_random()
Jarkko Sakkinen
- [PATCH v4 2/3] KEYS: trusted: Fix migratable=1 failing
Jarkko Sakkinen
- [PATCH v4 3/3] KEYS: trusted: Reserve TPM for seal and unseal operations
Jarkko Sakkinen
- [PATCH v2] ima: defer arch_ima_get_secureboot() call to IMA init time
Ard Biesheuvel
- From Mrs. Roonie Holbrook !!
Mrs. Roonie Holbrook
- [PATCH][V2] ima: Fix sizeof mismatches
Colin King
- DARLEHEN
Obrist Nicolas
- PLEASE TAKE NOTE!
Mariacarmen Gutierrez
- [RFC PATCH 3/3] selinux: Add SELinux GTP support
Richard Haines
- [RFC PATCH 0/1] security: add fault injection to LSM hooks
Aleksandr Nogikh
- [PATCH v1] efi: Don't use knowledge about efi_guid_t internals
Andy Shevchenko
- [PATCH 2/3] gtp: Add LSM hooks to GPRS Tunneling Protocol (GTP)
Richard Haines
- Greeting! !!
Kim Leang
- [RFC PATCH 1/3] security: Add GPRS Tunneling Protocol (GTP) security hooks
Richard Haines
- [GIT PULL] SafeSetID changes for v5.10
Micah Morton
- [PATCH 1/3] security: Add GPRS Tunneling Protocol (GTP) security hooks
Richard Haines
- [RFC PATCH 1/1] selinux-testsuite: Add GTP tests
Richard Haines
- [PATCH 0/3] Add LSM/SELinux support for GPRS Tunneling Protocol (GTP)
Richard Haines
- Investment opportunity
Ying Chongan
- [PATCH] xfrm: redact SA secret with lockdown confidentiality
Antony Antony
- [RFC PATCH 0/3] Add LSM/SELinux support for GPRS Tunneling Protocol (GTP)
Richard Haines
- [RFC] treewide: cleanup unreachable breaks
trix at redhat.com
- [RFC PATCH 00/30] ima: Introduce IMA namespace
Krzysztof Struczynski
- [PATCH v15 0/4] overlayfs override_creds=off & nested get xattr fix
Mark Salyzyn
- [PATCH v1 0/2] doc/admin-guide: update perf-security.rst with CAP_PERFMON usage flows
Alexey Budankov
- [RESEND PATCH v11 0/3] Add trusted_for(2) (was O_MAYEXEC)
Mickaël Salaün
- [RESEND PATCH v11 1/3] fs: Add trusted_for(2) syscall implementation and related sysctl
Mickaël Salaün
- [RESEND PATCH v11 2/3] arch: Wire up trusted_for(2)
Mickaël Salaün
- [RESEND PATCH v11 3/3] selftest/interpreter: Add tests for trusted_for(2) policies
Mickaël Salaün
- [PATCH v1 0/2] doc/admin-guide: update perf-security.rst with CAP_PERFMON usage flows
Alexey Budankov
- [PATCH] security: remove unneeded break
trix at redhat.com
- [PATCH] mm, hugetlb: Avoid double clearing for hugetlb pages
Guilherme G. Piccoli
- [PATCH] mm, hugetlb: Avoid double clearing for hugetlb pages
Michal Hocko
- [PATCH] mm, hugetlb: Avoid double clearing for hugetlb pages
David Hildenbrand
- [PATCH] mm, hugetlb: Avoid double clearing for hugetlb pages
Mike Kravetz
- [PATCH] mm, hugetlb: Avoid double clearing for hugetlb pages
Guilherme G. Piccoli
- [PATCH] mm, hugetlb: Avoid double clearing for hugetlb pages
David Hildenbrand
- [PATCH] mm, hugetlb: Avoid double clearing for hugetlb pages
Guilherme Piccoli
- [PATCH] mm, hugetlb: Avoid double clearing for hugetlb pages
Michal Hocko
- [PATCH] mm, hugetlb: Avoid double clearing for hugetlb pages
David Hildenbrand
- [PATCH] mm, hugetlb: Avoid double clearing for hugetlb pages
Michal Hocko
- [PATCH] mm, hugetlb: Avoid double clearing for hugetlb pages
David Hildenbrand
- [PATCH] mm, hugetlb: Avoid double clearing for hugetlb pages
Michal Hocko
- [PATCH] mm, hugetlb: Avoid double clearing for hugetlb pages
Mike Kravetz
- [PATCH] mm, hugetlb: Avoid double clearing for hugetlb pages
David Hildenbrand
- [PATCH] mm, hugetlb: Avoid double clearing for hugetlb pages
Michal Hocko
- [PATCH] mm, hugetlb: Avoid double clearing for hugetlb pages
David Hildenbrand
- From Calyd Jens,
Calyd Jens
- Re
Mr. J. Ward
- [PATCH v17 0/4] overlayfs override_creds=off & nested get xattr fix
Mark Salyzyn
- [PATCH v18 0/4] overlayfs override_creds=off & nested get xattr fix
Mark Salyzyn
- [PATCH v18 0/4] overlayfs override_creds=off & nested get xattr fix
Mark Salyzyn
- [RESEND PATCH v18 0/4] overlayfs override_creds=off & nested get xattr fix
Mark Salyzyn
- [RESEND PATCH v18 1/4] Add flags option to get xattr method paired to __vfs_getxattr
Mark Salyzyn
- [RESEND PATCH v18 2/4] overlayfs: handle XATTR_NOSECURITY flag for get xattr method
Mark Salyzyn
- [RESEND PATCH v18 3/4] overlayfs: override_creds=off option bypass creator_cred
Mark Salyzyn
- [RESEND PATCH v18 4/4] overlayfs: inode_owner_or_capable called during execv
Mark Salyzyn
- Buggy commit tracked to: "Re: [PATCH 2/9] iov_iter: move rw_copy_check_uvector() into lib/iov_iter.c"
Greg KH
- [RESEND PATCH v18 4/4] overlayfs: inode_owner_or_capable called during execv
Mark Salyzyn
- Buggy commit tracked to: "Re: [PATCH 2/9] iov_iter: move rw_copy_check_uvector() into lib/iov_iter.c"
Greg KH
- Buggy commit tracked to: "Re: [PATCH 2/9] iov_iter: move rw_copy_check_uvector() into lib/iov_iter.c"
Nick Desaulniers
- [PATCH v4 1/6] IMA: generalize keyring specific measurement constructs
Mimi Zohar
- [PATCH v4 2/6] IMA: conditionally allow empty rule data
Mimi Zohar
- [PATCH v4 4/6] IMA: add policy to measure critical data from kernel components
Mimi Zohar
- [PATCH v4 5/6] IMA: add hook to measure critical data from kernel components
Mimi Zohar
- VERY CONFIDENTIAL.
Kuban Manfi
- Buggy commit tracked to: "Re: [PATCH 2/9] iov_iter: move rw_copy_check_uvector() into lib/iov_iter.c"
David Laight
- [PATCH] vsock: use ns_capable_noaudit() on socket create
Jeff Vander Stoep
- [PATCH v39 15/24] x86/sgx: Add SGX_IOC_ENCLAVE_PROVISION
Jarkko Sakkinen
- [PATCH v4 0/6] IMA: Infrastructure for measurement of critical kernel data
Mimi Zohar
- [PATCH v2 0/8] Fork brute force attack mitigation
John Wood
- [RFC PATCH v2 0/2] security: add fault injection to LSM hooks
Aleksandr Nogikh
- [RFC PATCH v2 1/2] security: add fault injection capability
Aleksandr Nogikh
- [RFC PATCH v2 2/2] docs: add fail_lsm_hooks info to fault-injection.rst
Aleksandr Nogikh
- [PATCH v33 11/21] x86/sgx: Linux Enclave Driver
Dave Hansen
- [PATCH] tomoyo: fix clang pointer arithmetic warning
Arnd Bergmann
- [REGRESSION] mm: process_vm_readv testcase no longer works after compat_prcoess_vm_readv removed
Kyle Huey
- [REGRESSION] mm: process_vm_readv testcase no longer works after compat_prcoess_vm_readv removed
Jens Axboe
- Inconsistent capability requirements for prctl_set_mm_exe_file()
Michael Kerrisk (man-pages)
- selinux_file_permission() on pipes/pseudo-files - performance issue
Ondrej Mosnacek
- [PATCH v2] perf_event_open.2: update the man page with CAP_PERFMON related information
Alexey Budankov
- [PATCH v22 00/12] Landlock LSM
Mickaël Salaün
- [PATCH ghak120 V5] audit: trigger accompanying records when no rules present
Paul Moore
- [RFC PATCH] lsm,selinux: pass the family information along with xfrm flow
Paul Moore
- [RFC PATCH] lsm,selinux: pass the family information along with xfrm flow
James Morris
- [PATCH] tomoyo: fix clang pointer arithmetic warning
Tetsuo Handa
- [PATCH 00/34] fs: idmapped mounts
Christian Brauner
- [PATCH 02/34] namespace: only take read lock in do_reconfigure_mnt()
Christian Brauner
- [PATCH 03/34] fs: add mount_setattr()
Christian Brauner
- [PATCH 04/34] tests: add mount_setattr() selftests
Christian Brauner
- [PATCH 05/34] fs: introduce MOUNT_ATTR_IDMAP
Christian Brauner
- [PATCH 07/34] capability: handle idmapped mounts
Christian Brauner
- [PATCH 08/34] namei: add idmapped mount aware permission helpers
Christian Brauner
- [PATCH 10/34] attr: handle idmapped mounts
Christian Brauner
- [PATCH 11/34] acl: handle idmapped mounts
Christian Brauner
- [PATCH 12/34] xattr: handle idmapped mounts
Christian Brauner
- [PATCH 13/34] selftests: add idmapped mounts xattr selftest
Christian Brauner
- [PATCH 14/34] commoncap: handle idmapped mounts
Christian Brauner
- [PATCH 15/34] stat: add mapped_generic_fillattr()
Christian Brauner
- [PATCH 16/34] namei: handle idmapped mounts in may_*() helpers
Christian Brauner
- [PATCH 17/34] namei: introduce struct renamedata
Christian Brauner
- [PATCH 18/34] namei: prepare for idmapped mounts
Christian Brauner
- [PATCH 19/34] namei: add lookup helpers with idmapped mounts aware permission checking
Christian Brauner
- [PATCH 20/34] open: handle idmapped mounts in do_truncate()
Christian Brauner
- [PATCH 21/34] open: handle idmapped mounts
Christian Brauner
- [PATCH 22/34] af_unix: handle idmapped mounts
Christian Brauner
- [PATCH 23/34] utimes: handle idmapped mounts
Christian Brauner
- [PATCH 24/34] would_dump: handle idmapped mounts
Christian Brauner
- [PATCH 25/34] exec: handle idmapped mounts
Christian Brauner
- [PATCH 26/34] fs: add helpers for idmap mounts
Christian Brauner
- [PATCH 27/34] apparmor: handle idmapped mounts
Christian Brauner
- [PATCH 28/34] audit: handle idmapped mounts
Christian Brauner
- [PATCH 29/34] ima: handle idmapped mounts
Christian Brauner
- [PATCH 30/34] ext4: support idmapped mounts
Christian Brauner
- [PATCH 31/34] expfs: handle idmapped mounts
Christian Brauner
- [PATCH 32/34] overlayfs: handle idmapped lower directories
Christian Brauner
- [PATCH 33/34] overlayfs: handle idmapped merged mounts
Christian Brauner
- [PATCH 34/34] fat: handle idmapped mounts
Christian Brauner
- [PATCH 00/34] fs: idmapped mounts
Serge E. Hallyn
- [PATCH 00/34] fs: idmapped mounts
Eric W. Biederman
- [PATCH 00/34] fs: idmapped mounts
Eric W. Biederman
- [PATCH v3 0/2] security: add fault injection to LSM hooks
Aleksandr Nogikh
- [PATCH v3 0/3] add ima_arch support for ARM64
Chester Lin
- Hello/Hallo
Mr. John Galvan
- [PATCH v4 1/3,RESEND] KEYS: trusted: Fix incorrect handling of tpm_get_random()
Jarkko Sakkinen
- [PATCH v4 2/3,RESEND] KEYS: trusted: Fix migratable=1 failing
Jarkko Sakkinen
- [PATCH v4 3/3, RESEND] KEYS: trusted: Reserve TPM for seal and unseal operations
Jarkko Sakkinen
- general protection fault in security_inode_getattr
Miklos Szeredi
- No subject
Liliane Abel
- November Equity Investment 20-20
JOHN PHIL
Last message date:
Sat Oct 31 17:43:29 UTC 2020
Archived on: Sat Oct 31 17:43:53 UTC 2020
This archive was generated by
Pipermail 0.09 (Mailman edition).