June 2021 Archives by author
Starting: Tue Jun 1 08:23:38 UTC 2021
Ending: Wed Jun 30 22:48:56 UTC 2021
Messages: 337
- [PATCH -next] capability: fix doc warnings in capability.c
libaokun (A)
- [PATCH] proc: Track /proc/$pid/attr/ opener mm_struct
youling 257
- [PATCH] proc: Track /proc/$pid/attr/ opener mm_struct
youling 257
- URGENT ATTENTION
Andres Auchincloss
- [RFC PATCH 2/9] audit,io_uring,io-wq: add some basic audit support to io_uring
Jens Axboe
- [RFC PATCH 2/9] audit,io_uring,io-wq: add some basic audit support to io_uring
Pavel Begunkov
- [RFC PATCH 2/9] audit,io_uring,io-wq: add some basic audit support to io_uring
Pavel Begunkov
- [RFC PATCH 2/9] audit,io_uring,io-wq: add some basic audit support to io_uring
Pavel Begunkov
- [PATCH v5 0/2] Add support for ECDSA-signed kernel modules
Stefan Berger
- [PATCH v5 1/2] certs: Trigger creation of RSA module signing key if it's not an RSA key
Stefan Berger
- [PATCH v5 2/2] certs: Add support for using elliptic curve keys for signing modules
Stefan Berger
- [PATCH v5 0/2] Add support for ECDSA-signed kernel modules
Stefan Berger
- [PATCH v5 1/2] certs: Trigger creation of RSA module signing key if it's not an RSA key
Stefan Berger
- [PATCH v5 2/2] certs: Add support for using elliptic curve keys for signing modules
Stefan Berger
- [PATCH v5 0/2] Add support for ECDSA-signed kernel modules
Stefan Berger
- [PATCH v5 0/2] Add support for ECDSA-signed kernel modules
Stefan Berger
- [PATCH v5 0/2] Add support for ECDSA-signed kernel modules
Stefan Berger
- [PATCH v6 0/4] Add support for ECDSA-signed kernel modules
Stefan Berger
- [PATCH v6 1/4] certs: Trigger creation of RSA module signing key if it's not an RSA key
Stefan Berger
- [PATCH v6 2/4] certs: Check whether openssl tool is available
Stefan Berger
- [PATCH v6 3/4] certs: Add support for using elliptic curve keys for signing modules
Stefan Berger
- [PATCH v6 4/4] certs: Adjustment due to 'Check whether openssl tool is available'
Stefan Berger
- [PATCH v6 0/4] Add support for ECDSA-signed kernel modules
Stefan Berger
- [PATCH v6 0/4] Add support for ECDSA-signed kernel modules
Stefan Berger
- [PATCH v6 4/4] certs: Adjustment due to 'Check whether openssl tool is available'
Stefan Berger
- [PATCH v6 4/4] certs: Adjustment due to 'Check whether openssl tool is available'
Stefan Berger
- [PATCH] fs: Return raw xattr for security.* if there is size disagreement with LSMs
Stefan Berger
- [PATCH] certs: Redirect openssl error message to null device
Stefan Berger
- [PATCH] certs: Redirect openssl error message to null device
Stefan Berger
- [PATCH v7 0/2] Add support for ECDSA-signed kernel modules
Stefan Berger
- [PATCH v7 1/2] certs: Trigger creation of RSA module signing key if it's not an RSA key
Stefan Berger
- [PATCH v7 2/2] certs: Add support for using elliptic curve keys for signing modules
Stefan Berger
- [PATCH] certs: Redirect openssl error message to null device
Stefan Berger
- [PATCH v8 0/2] Add support for ECDSA-signed kernel modules
Stefan Berger
- [PATCH v8 1/2] certs: Trigger creation of RSA module signing key if it's not an RSA key
Stefan Berger
- [PATCH v8 2/2] certs: Add support for using elliptic curve keys for signing modules
Stefan Berger
- [PATCH v1] efi: Don't use knowledge about efi_guid_t internals
Ard Biesheuvel
- [PATCH v2] lockdown,selinux: avoid bogus SELinux lockdown permission checks
Daniel Borkmann
- [PATCH v2] lockdown,selinux: avoid bogus SELinux lockdown permission checks
Daniel Borkmann
- [PATCH v2] lockdown,selinux: avoid bogus SELinux lockdown permission checks
Daniel Borkmann
- [PATCH] tpm2_load_command leaks memory
James Bottomley
- [RFC PATCH 4/9] audit: add filtering for io_uring records
Richard Guy Briggs
- [RFC PATCH 2/9] audit,io_uring,io-wq: add some basic audit support to io_uring
Richard Guy Briggs
- [RFC PATCH 2/9] audit, io_uring, io-wq: add some basic audit support to io_uring
Richard Guy Briggs
- [PATCH 1/2] audit: add filtering for io_uring records, addendum
Richard Guy Briggs
- [PATCH 00/34] docs: avoid using ReST :doc:`foo` tag
Mauro Carvalho Chehab
- [PATCH 29/34] docs: security: landlock.rst: avoid using ReSt :doc:`foo` markup
Mauro Carvalho Chehab
- [PATCH 32/34] docs: userspace-api: landlock.rst: avoid using ReSt :doc:`foo` markup
Mauro Carvalho Chehab
- [PATCH 00/34] docs: avoid using ReST :doc:`foo` tag
Mauro Carvalho Chehab
- [PATCH 00/34] docs: avoid using ReST :doc:`foo` tag
Mauro Carvalho Chehab
- [PATCH 00/34] docs: avoid using ReST :doc:`foo` tag
Mauro Carvalho Chehab
- [PATCH 00/34] docs: avoid using ReST :doc:`foo` tag
Mauro Carvalho Chehab
- [PATCH v2 00/29] docs: avoid using ReST :doc:`foo` tag
Mauro Carvalho Chehab
- [PATCH v2 24/29] docs: security: landlock.rst: avoid using ReST :doc:`foo` markup
Mauro Carvalho Chehab
- [PATCH v2 27/29] docs: userspace-api: landlock.rst: avoid using ReST :doc:`foo` markup
Mauro Carvalho Chehab
- [PATCH -next] Smack: fix doc warning
ChenXiaoSong
- [PATCH -next] apparmor: fix doc warning
ChenXiaoSong
- [PATCH -next] tomoyo: fix doc warnings
ChenXiaoSong
- [PATCH -next] Yama: fix doc warnings
ChenXiaoSong
- [RFC PATCH bpf-next seccomp 00/12] eBPF seccomp filters
Kees Cook
- [PATCH][next] ima: Fix fall-through warning for Clang
Kees Cook
- [PATCH v8 0/8] Fork brute force attack mitigation
Kees Cook
- [PATCH v8 0/8] Fork brute force attack mitigation
Kees Cook
- [PATCH] proc: Track /proc/$pid/attr/ opener mm_struct
Kees Cook
- [PATCH] proc: Track /proc/$pid/attr/ opener mm_struct
Kees Cook
- [PATCH] proc: Track /proc/$pid/attr/ opener mm_struct
Kees Cook
- [PATCH] proc: Track /proc/$pid/attr/ opener mm_struct
Kees Cook
- [PATCH v2 00/29] docs: avoid using ReST :doc:`foo` tag
Jonathan Corbet
- [PATCH] perf: Require CAP_KILL if sigtrap is requested
Marco Elver
- [PATCH] perf: Require CAP_KILL if sigtrap is requested
Marco Elver
- [PATCH v2 0/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Ahmad Fatoum
- [PATCH v2 1/6] KEYS: trusted: allow use of TEE as backend without TCG_TPM support
Ahmad Fatoum
- [PATCH v2 3/6] KEYS: trusted: allow users to use kernel RNG for key material
Ahmad Fatoum
- [PATCH v2 4/6] KEYS: trusted: allow trust sources to use kernel RNG for key material
Ahmad Fatoum
- [PATCH v2 5/6] crypto: caam - add in-kernel interface for blob generator
Ahmad Fatoum
- [PATCH v2 6/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Ahmad Fatoum
- [PATCH v2 2/6] KEYS: trusted: Allow import from existing key material for development
Ahmad Fatoum
- [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
Dr. David Alan Gilbert
- [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
Dr. David Alan Gilbert
- [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
Dr. David Alan Gilbert
- [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
Dr. David Alan Gilbert
- [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
Dr. David Alan Gilbert
- [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
Dr. David Alan Gilbert
- [PATCH v3] lockdown, selinux: fix wrong subject in some SELinux lockdown checks
Thomas Gleixner
- [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
Vivek Goyal
- [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
Vivek Goyal
- [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
Vivek Goyal
- [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
Vivek Goyal
- [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
Vivek Goyal
- [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
Vivek Goyal
- [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
Vivek Goyal
- [PATCH -next] capability: fix doc warnings in capability.c
Serge E. Hallyn
- [PATCH v2 09/10] apparmor: test: Remove some casts which are no-longer required
Brendan Higgins
- [RFC PATCH bpf-next seccomp 00/12] eBPF seccomp filters
Jinghao Jia
- [RFC PATCH bpf-next seccomp 00/12] eBPF seccomp filters
Jinghao Jia
- [PATCH] apparmor: Remove the repeated declaration
John Johansen
- [PATCH -next] apparmor: fix doc warning
John Johansen
- [PATCH v2 09/10] apparmor: test: Remove some casts which are no-longer required
John Johansen
- ima - wait for tpm load
Jorge Ramirez-Ortiz, Foundries
- ima - wait for tpm load
Jorge Ramirez-Ortiz, Foundries
- [PATCH] proc: Track /proc/$pid/attr/ opener mm_struct
Greg KH
- [RFC][PATCH 03/12] digest_lists: Basic definitions
Greg KH
- [RFC][PATCH 04/12] digest_lists: Objects
Greg KH
- [RFC][PATCH 03/12] digest_lists: Basic definitions
Greg KH
- [RFC][PATCH 03/12] digest_lists: Basic definitions
Greg KH
- [RFC][PATCH 04/12] digest_lists: Objects
Greg KH
- [RFC][PATCH 03/12] digest_lists: Basic definitions
Greg KH
- [PATCH] LSM: SafeSetID: Mark safesetid_initialized as __initdata
Austin Kim
- [PATCH] LSM: SafeSetID: Mark safesetid_initialized as __initdata
Austin Kim
- [PATCH] audit: remove unnecessary 'ret' initialization
Austin Kim
- [PATCH] smack: mark 'smack_enabled' global variable as __initdata
Austin Kim
- [PATCH] IMA: remove -Wmissing-prototypes warning
Austin Kim
- [PATCH] IMA: remove -Wmissing-prototypes warning
Austin Kim
- [PATCH v3] lockdown,selinux: fix wrong subject in some SELinux lockdown checks
Steffen Klassert
- [PATCH v8 0/8] Fork brute force attack mitigation
Andi Kleen
- Greetings From Mrs. Sarah Koffi
Sarah Koffi
- [RFC PATCH v2 2/3] efi: Reserve confidential computing secret area
Tom Lendacky
- [PATCH -next] capability: fix doc warnings in capability.c
Baokun Li
- [PATCH -next v2] capability: fix doc warnings in capability.c
Baokun Li
- Proposal
Jotham Masuku
- [PATCH v2] lockdown,selinux: avoid bogus SELinux lockdown permission checks
Paul Moore
- [RFC PATCH 4/9] audit: add filtering for io_uring records
Paul Moore
- [PATCH v2] lockdown,selinux: avoid bogus SELinux lockdown permission checks
Paul Moore
- [RFC PATCH 4/9] audit: add filtering for io_uring records
Paul Moore
- [RFC PATCH 2/9] audit,io_uring,io-wq: add some basic audit support to io_uring
Paul Moore
- [RFC PATCH 2/9] audit, io_uring, io-wq: add some basic audit support to io_uring
Paul Moore
- [PATCH v2] lockdown,selinux: avoid bogus SELinux lockdown permission checks
Paul Moore
- [PATCH v2] lockdown,selinux: avoid bogus SELinux lockdown permission checks
Paul Moore
- [RFC PATCH 2/9] audit,io_uring,io-wq: add some basic audit support to io_uring
Paul Moore
- [PATCH v2] lockdown,selinux: avoid bogus SELinux lockdown permission checks
Paul Moore
- [PATCH v2] lockdown,selinux: avoid bogus SELinux lockdown permission checks
Paul Moore
- [PATCH v2] lockdown,selinux: avoid bogus SELinux lockdown permission checks
Paul Moore
- [PATCH net-next] netlabel: Fix spelling mistakes
Paul Moore
- [PATCH 1/2] audit: add filtering for io_uring records, addendum
Paul Moore
- [PATCH] net: ipv4: fix memory leak in netlbl_cipsov4_add_std
Paul Moore
- [PATCH] net: ipv4: fix memory leak in netlbl_cipsov4_add_std
Paul Moore
- [PATCH v2] lockdown,selinux: avoid bogus SELinux lockdown permission checks
Paul Moore
- [PATCH 1/2] audit: add filtering for io_uring records, addendum
Paul Moore
- [PATCH -next] netlabel: Fix memory leak in netlbl_mgmt_add_common
Paul Moore
- [PATCH] audit: remove unnecessary 'ret' initialization
Paul Moore
- [PATCH -next v2] netlabel: Fix memory leak in netlbl_mgmt_add_common
Paul Moore
- [PATCH -next v3] netlabel: Fix memory leak in netlbl_mgmt_add_common
Paul Moore
- [PATCH] fs: Return raw xattr for security.* if there is size disagreement with LSMs
Paul Moore
- [PATCH v3] lockdown,selinux: fix wrong subject in some SELinux lockdown checks
Paul Moore
- [PATCH] fs: Return raw xattr for security.* if there is size disagreement with LSMs
Paul Moore
- [GIT PULL] SELinux patches for v5.14
Paul Moore
- [ANNOUNCE][CFP] Linux Security Summit 2021
James Morris
- [PATCH] LSM: SafeSetID: Mark safesetid_initialized as __initdata
Micah Morton
- [GIT PULL] SafeSetID changes for v5.14
Micah Morton
- [PATCH v2] lockdown,selinux: avoid bogus SELinux lockdown permission checks
Ondrej Mosnacek
- [PATCH v2] lockdown,selinux: avoid bogus SELinux lockdown permission checks
Ondrej Mosnacek
- [PATCH v3] lockdown, selinux: fix wrong subject in some SELinux lockdown checks
Ondrej Mosnacek
- [RFC PATCH] userfaultfd: open userfaultfds with O_RDONLY
Ondrej Mosnacek
- [PATCH] perf: Require CAP_KILL if sigtrap is requested
Ondrej Mosnacek
- [PATCH] net: ipv4: fix memory leak in netlbl_cipsov4_add_std
Dongliang Mu
- [PATCH] net: ipv4: fix memory leak in netlbl_cipsov4_add_std
Dongliang Mu
- [PATCH -next] netlabel: Fix memory leak in netlbl_mgmt_add_common
Dongliang Mu
- [PATCH -next] netlabel: Fix memory leak in netlbl_mgmt_add_common
Dongliang Mu
- [PATCH -next] netlabel: Fix memory leak in netlbl_mgmt_add_common
Dongliang Mu
- [RFC PATCH 0/3] Allow access to confidential computing secret area
Dov Murik
- [RFC PATCH v2 0/3] Allow access to confidential computing secret area
Dov Murik
- [RFC PATCH v2 1/3] efi/libstub: Copy confidential computing secret area
Dov Murik
- [RFC PATCH v2 2/3] efi: Reserve confidential computing secret area
Dov Murik
- [RFC PATCH v2 3/3] virt: Add sev_secret module to expose confidential computing secrets
Dov Murik
- [RFC PATCH v2 2/3] efi: Reserve confidential computing secret area
Dov Murik
- [RFC PATCH v2 0/3] Allow access to confidential computing secret area
Dov Murik
- [RFC PATCH v2 3/3] virt: Add sev_secret module to expose confidential computing secrets
Dov Murik
- 6/23/2021 Product Inquiry
John Lewis & Partnersip
- [RFC PATCH v2 0/3] Allow access to confidential computing secret area
Borislav Petkov
- [RFC PATCH v2 3/3] virt: Add sev_secret module to expose confidential computing secrets
Borislav Petkov
- [RFC PATCH v2 0/3] Allow access to confidential computing secret area
Borislav Petkov
- [RFC PATCH v2 3/3] virt: Add sev_secret module to expose confidential computing secrets
Borislav Petkov
- [PATCH 00/34] docs: avoid using ReST :doc:`foo` tag
Nícolas F. R. A. Prado
- [PATCH 00/34] docs: avoid using ReST :doc:`foo` tag
Nícolas F. R. A. Prado
- [PATCH 00/34] docs: avoid using ReST :doc:`foo` tag
Nícolas F. R. A. Prado
- [PATCH] security: add LSM hook at the memfd_create point
Li Qiang
- [PATCH 3/3] ima: Add digest parameter to the functions to measure a buffer
Lakshmi Ramasubramanian
- [PATCH v5 1/2] certs: Trigger creation of RSA module signing key if it's not an RSA key
Jarkko Sakkinen
- [PATCH v5 0/2] Add support for ECDSA-signed kernel modules
Jarkko Sakkinen
- [PATCH v5 0/2] Add support for ECDSA-signed kernel modules
Jarkko Sakkinen
- [PATCH v5 0/2] Add support for ECDSA-signed kernel modules
Jarkko Sakkinen
- [PATCH v6 0/4] Add support for ECDSA-signed kernel modules
Jarkko Sakkinen
- [PATCH v6 0/4] Add support for ECDSA-signed kernel modules
Jarkko Sakkinen
- [PATCH v6 4/4] certs: Adjustment due to 'Check whether openssl tool is available'
Jarkko Sakkinen
- [PATCH v6 0/4] Add support for ECDSA-signed kernel modules
Jarkko Sakkinen
- [PATCH v6 4/4] certs: Adjustment due to 'Check whether openssl tool is available'
Jarkko Sakkinen
- [PATCH v6 4/4] certs: Adjustment due to 'Check whether openssl tool is available'
Jarkko Sakkinen
- [PATCH] certs: Redirect openssl error message to null device
Jarkko Sakkinen
- [PATCH v7 2/2] certs: Add support for using elliptic curve keys for signing modules
Jarkko Sakkinen
- [PATCH v2 27/29] docs: userspace-api: landlock.rst: avoid using ReST :doc:`foo` markup
Mickaël Salaün
- [PATCH v1 0/4] Landlock filesystem caching
Mickaël Salaün
- [PATCH v1 1/4] fs,security: Add resolve_path_at() hook
Mickaël Salaün
- [PATCH v1 2/4] landlock: Add filesystem rule caching
Mickaël Salaün
- [PATCH v1 3/4] selftests/landlock: Work in a temporary directory
Mickaël Salaün
- [PATCH v1 4/4] selftests/landlock: Check all possible intermediate directories
Mickaël Salaün
- [RESEND][PATCH v2 5/7] ima: Define new template fields xattrnames, xattrlengths and xattrvalues
Roberto Sassu
- [RESEND][PATCH v2 6/7] ima: Define new template evm-sig
Roberto Sassu
- [PATCH 1/5] doc: Fix warning in Documentation/security/IMA-templates.rst
Roberto Sassu
- [PATCH 2/5] ima: Set correct casting types
Roberto Sassu
- [PATCH 3/5] ima/evm: Fix type mismatch
Roberto Sassu
- [PATCH 4/5] ima: Include header defining ima_post_key_create_or_update()
Roberto Sassu
- [PATCH 5/5] ima: Pass NULL instead of 0 to ima_get_action() in ima_file_mprotect()
Roberto Sassu
- [PATCH v3 0/6] evm: Prepare for moving to the LSM infrastructure
Roberto Sassu
- Size mismatch between vfs_getxattr_alloc() and vfs_getxattr()
Roberto Sassu
- [PATCH] fs: Return raw xattr for security.* if there is size disagreement with LSMs
Roberto Sassu
- [PATCH] fs: Return raw xattr for security.* if there is size disagreement with LSMs
Roberto Sassu
- [PATCH] fs: Return raw xattr for security.* if there is size disagreement with LSMs
Roberto Sassu
- [PATCH] fs: Return raw xattr for security.* if there is size disagreement with LSMs
Roberto Sassu
- [PATCH] evm: Check xattr size misalignment between kernel and user
Roberto Sassu
- [PATCH v2] evm: Check xattr size discrepancy between kernel and user
Roberto Sassu
- [RFC][PATCH 00/12] Huawei Digest Lists
Roberto Sassu
- [RFC][PATCH 01/12] ima: Add digest, algo, measured parameters to ima_measure_critical_data()
Roberto Sassu
- [RFC][PATCH 02/12] digest_lists: Overview
Roberto Sassu
- [RFC][PATCH 03/12] digest_lists: Basic definitions
Roberto Sassu
- [RFC][PATCH 04/12] digest_lists: Objects
Roberto Sassu
- [RFC][PATCH 05/12] digest_lists: Methods
Roberto Sassu
- [RFC][PATCH 06/12] digest_lists: Parser
Roberto Sassu
- [RFC][PATCH 07/12] digest_lists: Interfaces - digest_list_add, digest_list_del
Roberto Sassu
- [RFC][PATCH 08/12] digest_lists: Interfaces - digest_lists_loaded
Roberto Sassu
- [RFC][PATCH 09/12] digest_lists: Interfaces - digest_label
Roberto Sassu
- [RFC][PATCH 10/12] digest_lists: Interfaces - digest_query
Roberto Sassu
- [RFC][PATCH 11/12] digest_lists: Interfaces - digests_count
Roberto Sassu
- [RFC][PATCH 12/12] digest_lists: Tests
Roberto Sassu
- [RFC][PATCH 04/12] digest_lists: Objects
Roberto Sassu
- [RFC][PATCH 03/12] digest_lists: Basic definitions
Roberto Sassu
- [RFC][PATCH 03/12] digest_lists: Basic definitions
Roberto Sassu
- [RFC][PATCH 03/12] digest_lists: Basic definitions
Roberto Sassu
- [PATCH 0/3] ima: Provide more info about buffer measurement
Roberto Sassu
- [PATCH 1/3] ima: Introduce ima_get_current_hash_algo()
Roberto Sassu
- [PATCH 2/3] ima: Return int in the functions to measure a buffer
Roberto Sassu
- [PATCH 3/3] ima: Add digest parameter to the functions to measure a buffer
Roberto Sassu
- [PATCH 3/3] ima: Add digest parameter to the functions to measure a buffer
Roberto Sassu
- [RFC PATCH 2/9] audit,io_uring,io-wq: add some basic audit support to io_uring
Casey Schaufler
- [PATCH v2] lockdown,selinux: avoid bogus SELinux lockdown permission checks
Casey Schaufler
- [PATCH -next] Smack: fix doc warning
Casey Schaufler
- [PATCH v27 00/25] LSM: Module stacking for AppArmor
Casey Schaufler
- [PATCH v27 01/25] LSM: Infrastructure management of the sock security
Casey Schaufler
- [PATCH v27 02/25] LSM: Add the lsmblob data structure.
Casey Schaufler
- [PATCH v27 03/25] LSM: provide lsm name and id slot mappings
Casey Schaufler
- [PATCH v27 04/25] IMA: avoid label collisions with stacked LSMs
Casey Schaufler
- [PATCH v27 05/25] LSM: Use lsmblob in security_audit_rule_match
Casey Schaufler
- [PATCH v27 06/25] LSM: Use lsmblob in security_kernel_act_as
Casey Schaufler
- [PATCH v27 07/25] LSM: Use lsmblob in security_secctx_to_secid
Casey Schaufler
- [PATCH v27 08/25] LSM: Use lsmblob in security_secid_to_secctx
Casey Schaufler
- [PATCH v27 09/25] LSM: Use lsmblob in security_ipc_getsecid
Casey Schaufler
- [PATCH v27 10/25] LSM: Use lsmblob in security_task_getsecid
Casey Schaufler
- [PATCH v27 11/25] LSM: Use lsmblob in security_inode_getsecid
Casey Schaufler
- [PATCH v27 12/25] LSM: Use lsmblob in security_cred_getsecid
Casey Schaufler
- [PATCH v27 13/25] IMA: Change internal interfaces to use lsmblobs
Casey Schaufler
- [PATCH v27 14/25] LSM: Specify which LSM to display
Casey Schaufler
- [PATCH v27 15/25] LSM: Ensure the correct LSM context releaser
Casey Schaufler
- [PATCH v27 16/25] LSM: Use lsmcontext in security_secid_to_secctx
Casey Schaufler
- [PATCH v27 17/25] LSM: Use lsmcontext in security_inode_getsecctx
Casey Schaufler
- [PATCH v27 18/25] LSM: security_secid_to_secctx in netlink netfilter
Casey Schaufler
- [PATCH v27 19/25] NET: Store LSM netlabel data in a lsmblob
Casey Schaufler
- [PATCH v27 20/25] LSM: Verify LSM display sanity in binder
Casey Schaufler
- [PATCH v27 21/25] audit: add support for non-syscall auxiliary records
Casey Schaufler
- [PATCH v27 22/25] Audit: Add record for multiple process LSM attributes
Casey Schaufler
- [PATCH v27 23/25] Audit: Add record for multiple object LSM attributes
Casey Schaufler
- [PATCH v27 24/25] LSM: Add /proc attr entry for full LSM context
Casey Schaufler
- [PATCH v27 25/25] AppArmor: Remove the exclusive flag
Casey Schaufler
- [PATCH] security: add LSM hook at the memfd_create point
Casey Schaufler
- [PATCH] proc: Track /proc/$pid/attr/ opener mm_struct
Casey Schaufler
- [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
Schaufler, Casey
- [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
Casey Schaufler
- [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
Casey Schaufler
- [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
Casey Schaufler
- [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
Casey Schaufler
- [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
Casey Schaufler
- [GIT PULL] Smack patches for v5.14
Casey Schaufler
- [PATCH] tpm2_load_command leaks memory
Dhiraj Shah
- [PATCH v1] efi: Don't use knowledge about efi_guid_t internals
Andy Shevchenko
- [PATCH -next] netlabel: Fix memory leak in netlbl_mgmt_add_common
Liu Shixin
- [PATCH -next] netlabel: Fix memory leak in netlbl_mgmt_add_common
Liu Shixin
- [PATCH -next v2] netlabel: Fix memory leak in netlbl_mgmt_add_common
Liu Shixin
- [PATCH -next v3] netlabel: Fix memory leak in netlbl_mgmt_add_common
Liu Shixin
- [PATCH][next] ima: Fix fall-through warning for Clang
Gustavo A. R. Silva
- [RFC PATCH 0/3] Add additional MOK vars
Eric Snowberg
- [PATCH v2] lockdown,selinux: avoid bogus SELinux lockdown permission checks
Alexei Starovoitov
- [PATCH] net: ipv4: fix memory leak in netlbl_cipsov4_add_std
Nanyong Sun
- : Please contact me it's very urgent.
Mariel Thiago
- [PATCH v2] lockdown,selinux: avoid bogus SELinux lockdown permission checks
Linus Torvalds
- [PATCH] proc: Track /proc/$pid/attr/ opener mm_struct
Linus Torvalds
- [PATCH] proc: Track /proc/$pid/attr/ opener mm_struct
Linus Torvalds
- [PATCH v8 1/2] certs: Trigger creation of RSA module signing key if it's not an RSA key
Linus Torvalds
- [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
Theodore Ts'o
- [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
Theodore Ts'o
- [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
Theodore Ts'o
- [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
Theodore Ts'o
- [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
Daniel Walsh
- [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
Daniel Walsh
- [RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
Daniel Walsh
- [PATCH 0/3] DCP as trusted keys backend
Richard Weinberger
- [PATCH 1/3] crypto: mxs-dcp: Add support for hardware provided keys
Richard Weinberger
- [PATCH 2/3] KEYS: trusted: Introduce support for NXP DCP-based trusted keys
Richard Weinberger
- [PATCH 3/3] doc: trusted-encrypted: add DCP as new trust source
Richard Weinberger
- [PATCH 1/3] crypto: mxs-dcp: Add support for hardware provided keys
Richard Weinberger
- [PATCH 1/3] crypto: mxs-dcp: Add support for hardware provided keys
Richard Weinberger
- [RFC][PATCH 03/12] digest_lists: Basic definitions
Matthew Wilcox
- [PATCH v3] lockdown,selinux: fix wrong subject in some SELinux lockdown checks
Dan Williams
- [PATCH v8 0/8] Fork brute force attack mitigation
John Wood
- [PATCH v8 1/8] security: Add LSM hook at the point where a task gets a fatal signal
John Wood
- [PATCH v8 2/8] security/brute: Define a LSM and add sysctl attributes
John Wood
- [PATCH v8 3/8] security/brute: Detect a brute force attack
John Wood
- [PATCH v8 4/8] security/brute: Mitigate a brute force attack
John Wood
- [PATCH v8 5/8] security/brute: Notify to userspace "task killed"
John Wood
- [PATCH v8 6/8] selftests/brute: Add tests for the Brute LSM
John Wood
- [PATCH v8 7/8] Documentation: Add documentation for the Brute LSM
John Wood
- [PATCH v8 8/8] MAINTAINERS: Add a new entry for the Brute LSM
John Wood
- [PATCH v8 0/8] Fork brute force attack mitigation
John Wood
- [PATCH 1/3] crypto: mxs-dcp: Add support for hardware provided keys
Herbert Xu
- [PATCH net-next] netlabel: Fix spelling mistakes
Zheng Yongjun
- [RESEND][PATCH v2 5/7] ima: Define new template fields xattrnames, xattrlengths and xattrvalues
Mimi Zohar
- [PATCH v2 6/7] ima: Define new template evm-sig
Mimi Zohar
- [RESEND][PATCH v2 6/7] ima: Define new template evm-sig
Mimi Zohar
- [PATCH 0/2] EVM: add some debugging info
Mimi Zohar
- [PATCH 1/2] ima: differentiate between EVM failures in the audit log
Mimi Zohar
- [PATCH 2/2] evm: output EVM digest calculation info
Mimi Zohar
- ima - wait for tpm load
Mimi Zohar
- ima - wait for tpm load
Mimi Zohar
- [PATCH] fs: Return raw xattr for security.* if there is size disagreement with LSMs
Mimi Zohar
- [PATCH] fs: Return raw xattr for security.* if there is size disagreement with LSMs
Mimi Zohar
- [PATCH] fs: Return raw xattr for security.* if there is size disagreement with LSMs
Mimi Zohar
- [PATCH] evm: Check xattr size misalignment between kernel and user
Mimi Zohar
- [PATCH v2] evm: Check xattr size discrepancy between kernel and user
Mimi Zohar
- [RFC][PATCH 01/12] ima: Add digest, algo, measured parameters to ima_measure_critical_data()
Mimi Zohar
- [PATCH] IMA: remove -Wmissing-prototypes warning
Mimi Zohar
- [PATCH net-next] netlabel: Fix spelling mistakes
patchwork-bot+netdevbpf at kernel.org
- [PATCH] net: ipv4: fix memory leak in netlbl_cipsov4_add_std
patchwork-bot+netdevbpf at kernel.org
- [PATCH -next v3] netlabel: Fix memory leak in netlbl_mgmt_add_common
patchwork-bot+netdevbpf at kernel.org
- [GIT PULL] SELinux patches for v5.14
pr-tracker-bot at kernel.org
- [GIT PULL] Smack patches for v5.14
pr-tracker-bot at kernel.org
- [GIT PULL] SafeSetID changes for v5.14
pr-tracker-bot at kernel.org
- [PATCH 2/2] evm: output EVM digest calculation info
nramas
- [PATCH] tpm2_load_command leaks memory
kernel test robot
- [PATCH v27 21/25] audit: add support for non-syscall auxiliary records
kernel test robot
- [PATCH v27 21/25] audit: add support for non-syscall auxiliary records
kernel test robot
Last message date:
Wed Jun 30 22:48:56 UTC 2021
Archived on: Wed Jun 30 22:52:20 UTC 2021
This archive was generated by
Pipermail 0.09 (Mailman edition).