messages from 2019-02-22 00:07:34 to 2019-02-28 22:44:31 UTC [more...]
[PATCH 00/97] LSM: Complete module stacking
2019-02-28 22:43 UTC (18+ messages)
` [PATCH 71/97] LSM: Add secmark refcounting to call_one list
` [PATCH 72/97] LSM: Add secmark refcounting to call_one list - part 2
` [PATCH 73/97] LSM: refactor security_setprocattr
` [PATCH 74/97] Smack: Detect if secmarks can be safely used
` [PATCH 75/97] LSM: Support multiple LSMs using inode_init_security
` [PATCH 76/97] LSM: Use full security context in security_inode_setsecctx
` [PATCH 77/97] LSM: Correct handling of ENOSYS in inode_setxattr
` [PATCH 78/97] LSM: Infrastructure security blobs for mount options
` [PATCH 79/97] LSM: Fix for security_init_inode_security
` [PATCH 80/97] Smack: Advertise the secid to netlabel
` [PATCH 81/97] LSM: Change error detection for UDP peer security
` [PATCH 82/97] Smack: Fix setting of the CIPSO MLS_CAT flags
` [PATCH 83/97] Smack: Set netlabel flags properly on new label import
` [PATCH 85/97] Smack: Let netlabel do the work on the ambient domain
` [PATCH 86/97] Smack: Don't set the socket label on each send
` [PATCH 87/97] Smack: Let netlabel do the work on connections
` [PATCH 88/97] Netlabel: Return the labeling type on socket
[PULL REQUEST] Lock down patches
2019-02-28 22:20 UTC (2+ messages)
[PATCH 00/97] LSM: Complete module stacking
2019-02-28 22:19 UTC (71+ messages)
` [PATCH 01/97] LSM: Infrastructure management of the superblock
` [PATCH 02/97] LSM: Infrastructure management of the sock security
` [PATCH 03/97] LSM: Infrastructure management of the key security blob
` [PATCH 04/97] SCAFFOLD: Move sock_graft out of sock.h
` [PATCH 05/97] LSM: Create an lsm_export data structure
` [PATCH 06/97] LSM: Use lsm_export in the inode_getsecid hooks
` [PATCH 07/97] SCAFFOLD: Move security.h out of route.h
` [PATCH 08/97] LSM: Use lsm_export in the cred_getsecid hooks
` [PATCH 09/97] LSM: Use lsm_export in the ipc_getsecid and task_getsecid hooks
` [PATCH 10/97] LSM: Use lsm_export in the sk_getsecid hooks
` [PATCH 11/97] LSM: Use lsm_export in the kernel_ask_as hooks
` [PATCH 12/97] LSM: Use lsm_export in the getpeersec_dgram hooks
` [PATCH 13/97] LSM: Use lsm_export in the audit_rule_match hooks
` [PATCH 14/97] LSM: Fix logical operation in lsm_export checks
` [PATCH 15/97] LSM: Use lsm_export in the secid_to_secctx hooks
` [PATCH 16/97] LSM: Use lsm_export in the secctx_to_secid hooks
` [PATCH 17/97] LSM: Use lsm_export in security_audit_rule_match
` [PATCH 18/97] LSM: Use lsm_export in security_kernel_act_as
` [PATCH 19/97] LSM: Use lsm_export in security_socket_getpeersec_dgram
` [PATCH 20/97] LSM: Use lsm_export in security_secctx_to_secid
` [PATCH 21/97] LSM: Use lsm_export in security_secid_to_secctx
` [PATCH 22/97] LSM: Use lsm_export in security_ipc_getsecid
` [PATCH 23/97] LSM: Use lsm_export in security_task_getsecid
` [PATCH 24/97] LSM: FIXUP - security_secctx_to_secid
` [PATCH 25/97] LSM: FIXUP - security_secid_to_secctx
` [PATCH 26/97] LSM: Use lsm_export in security_inode_getsecid
` [PATCH 27/97] LSM: Use lsm_export in security_cred_getsecid
` [PATCH 28/97] LSM: REVERT Use lsm_export in the sk_getsecid hooks
` [PATCH 29/97] Audit: Change audit_sig_sid to audit_sig_lsm
` [PATCH 30/97] Audit: Convert target_sid to an lsm_export structure
` [PATCH 31/97] Audit: Convert osid "
` [PATCH 32/97] IMA: Clean out lsm_export scaffolding
` [PATCH 33/97] NET: Store LSM access information in the socket blob for UDS
` [PATCH 34/97] NET: Remove scaffolding on secmarks
` [PATCH 35/97] NET: Remove scaffolding on new secmarks
` [PATCH 36/97] NET: Remove netfilter scaffolding for lsm_export
` [PATCH 37/97] Netlabel: Replace secids with lsm_export
` [PATCH 38/97] LSM: Remove lsm_export scaffolding functions
` [PATCH 39/97] IMA: FIXUP prototype using lsm_export
` [PATCH 40/97] Smack: Restore the release_secctx hook
` [PATCH 41/97] AppArmor: Remove unnecessary hook stub
` [PATCH 42/97] LSM: Limit calls to certain module hooks
` [PATCH 43/97] LSM: Create a data structure for a security context
` [PATCH 44/97] LSM: Use lsm_context in secid_to_secctx hooks
` [PATCH 45/97] LSM: Use lsm_context in secctx_to_secid hooks
` [PATCH 46/97] LSM: Use lsm_context in inode_getsecctx hooks
` [PATCH 47/97] LSM: Use lsm_context in inode_notifysecctx hooks
` [PATCH 48/97] LSM: Use lsm_context in dentry_init_security hooks
` [PATCH 49/97] LSM: Use lsm_context in security_dentry_init_security
` [PATCH 50/97] LSM: Use lsm_context in security_inode_notifysecctx
` [PATCH 51/97] LSM: Use lsm_context in security_inode_getsecctx
` [PATCH 52/97] LSM: Use lsm_context in security_secctx_to_secid
` [PATCH 53/97] LSM: Use lsm_context in release_secctx hooks
` [PATCH 54/97] LSM: Use lsm_context in security_release_secctx
` [PATCH 55/97] LSM: Use lsm_context in security_secid_to_secctx
` [PATCH 56/97] fs: remove lsm_context scaffolding
` [PATCH 57/97] LSM: Add the release function to the lsm_context
` [PATCH 58/97] LSM: Use lsm_context in inode_setsecctx hooks
` [PATCH 59/97] LSM: Use lsm_context in security_inode_setsecctx
` [PATCH 60/97] kernfs: remove lsm_context scaffolding
` [PATCH 61/97] LSM: Remove unused macro
` [PATCH 62/97] LSM: Special handling for secctx lsm hooks
` [PATCH 63/97] SELinux: Use blob offset in current_sid
` [PATCH 64/97] LSM: Specify which LSM to display with /proc/self/attr/display
` [PATCH 65/97] AppArmor: Remove the exclusive flag
` [PATCH 66/97] LSM: Add secmark_relabel_packet to the set of one call hooks
` [PATCH 67/97] LSM: Make getting the secmark right cleaner with lsm_export_one_secid
` [PATCH 68/97] netfilter: Fix memory leak introduced with lsm_context
` [PATCH 69/97] Smack: Consolidate secmark conversions
` [PATCH 70/97] netfilter: Remove unnecessary NULL check in lsm_context
[PATCH 2/2] LSM: SafeSetID: gate setgid transitions
2019-02-28 20:20 UTC (12+ messages)
` [PATCH v2 "
` [PATCH v3 "
` [PATCH v2 1/2] "
` [PATCH v3 "
` [PATCH v4 2/2] "
[PATCH 0/3] selftest/ima: add kexec_file_load test
2019-02-28 15:05 UTC (4+ messages)
` [PATCH 2/3] scripts/ima: define a set of common functions
kernel panic: MAC Initialization failed. (3)
2019-02-28 14:12 UTC
[PATCH] tomoyo: Add a kernel config option for fuzzing testing
2019-02-28 14:06 UTC
[PATCH V4 0/4] Add support for TCG2 event logs on EFI systems
2019-02-28 12:38 UTC (9+ messages)
` [PATCH V4 1/4] tpm: Abstract crypto agile event size calculations
` [PATCH V4 2/4] tpm: Reserve the TPM final events table
` [PATCH V4 3/4] tpm: Append the final event log to the TPM event log
` [PATCH V4 4/4] efi: Attempt to get the TCG2 event log in the boot stub
kernel panic: MAC Initialization failed
2019-02-28 12:30 UTC (7+ messages)
kernel panic: MAC Initialization failed. (2)
2019-02-28 10:18 UTC (3+ messages)
[PATCH] netlabel: fix out-of-bounds memory accesses
2019-02-28 5:46 UTC (2+ messages)
Add support for TCG2 log format on UEFI systems
2019-02-27 20:26 UTC (5+ messages)
` [PATCH V5 1/4] tpm: Abstract crypto agile event size calculations
` [PATCH V5 2/4] tpm: Reserve the TPM final events table
` [PATCH V5 3/4] tpm: Append the final event log to the TPM event log
` [PATCH V5 4/4] efi: Attempt to get the TCG2 event log in the boot stub
[PATCH] tomoyo: Change pathname calculation for read-only filesystems
2019-02-27 20:25 UTC (2+ messages)
[PATCH v2 00/11] LSM documentation update
2019-02-27 16:27 UTC (16+ messages)
` [PATCH v2 01/11] LSM: fix documentation for sb_copy_data hook
` [PATCH v2 02/11] LSM: fix documentation for the syslog hook
` [PATCH v2 03/11] LSM: fix documentation for the socket_post_create hook
` [PATCH v2 04/11] LSM: fix documentation for the task_setscheduler hook
` [PATCH v2 05/11] LSM: fix documentation for the socket_getpeersec_dgram hook
` [PATCH v2 06/11] LSM: fix documentation for the path_chmod hook
` [PATCH v2 07/11] LSM: fix documentation for the audit_* hooks
` [PATCH v2 08/11] LSM: fix documentation for the msg_queue_* hooks
` [PATCH v2 09/11] LSM: fix documentation for the sem_* hooks
` [PATCH v2 10/11] LSM: fix documentation for the shm_* hooks
` [PATCH v2 11/11] LSM: lsm_hooks.h: fix documentation format
[PATCH] RFC: user-mode extensible trusted key support
2019-02-27 13:07 UTC (2+ messages)
[PATCH 00/10] VFS: Provide new mount UAPI
2019-02-26 17:45 UTC (3+ messages)
` [PATCH 03/10] teach move_mount(2) to work with OPEN_TREE_CLONE
[PATCH 04/43] separate copying and locking mount tree on cross-userns copies
2019-02-26 17:45 UTC (5+ messages)
` [PATCH 00/43] VFS: Introduce filesystem context
[PATCH] security: keys: add NULL checking for key->type->instantiate
2019-02-26 9:11 UTC (4+ messages)
[PATCH] NETWORKING: avoid use IPCB in cipso_v4_error
2019-02-25 23:30 UTC (17+ messages)
` [PATCH v2 0/2] "
` [PATCH v2 1/2] "
` [PATCH v2 2/2] "
[PATCH v2] LSM: Ignore "security=" when "lsm=" is specified
2019-02-25 23:23 UTC (6+ messages)
[PATCH] LSM: Update function documentation for cap_capable
2019-02-25 23:17 UTC (2+ messages)
[PATCH AUTOSEL 4.20 60/72] apparmor: Fix warning about unused function apparmor_ipv6_postroute
2019-02-23 21:04 UTC (2+ messages)
` [PATCH AUTOSEL 4.20 62/72] apparmor: Fix aa_label_build() error handling for failed merges
[PATCH AUTOSEL 4.19 56/65] apparmor: Fix aa_label_build() error handling for failed merges
2019-02-23 21:06 UTC
[PATCH AUTOSEL 4.14 37/45] apparmor: Fix aa_label_build() error handling for failed merges
2019-02-23 21:08 UTC
[GIT PULL] More key subsystem fixes for 5.0
2019-02-23 2:15 UTC (2+ messages)
[PATCH v2] security: mark expected switch fall-throughs and add a missing break
2019-02-22 22:42 UTC (7+ messages)
[PATCH v3 00/20] Merge text_poke fixes and executable lockdowns
2019-02-22 18:32 UTC (9+ messages)
` [PATCH v3 03/20] x86/mm: Save DRs when loading a temporary mm
` [PATCH v3 18/20] x86/ftrace: Use vmalloc special flag
[PATCH] doc: security: Add kern-doc for lsm_hooks.h
2019-02-22 15:55 UTC (2+ messages)
[PATCH v7 0/7] Allow initializing the kernfs node's secctx based on its parent
2019-02-22 15:40 UTC (9+ messages)
` [PATCH v7 1/7] kernfs: clean up struct kernfs_iattrs
` [PATCH v7 2/7] kernfs: do not alloc iattrs in kernfs_xattr_get
` [PATCH v7 3/7] selinux: try security xattr after genfs for kernfs filesystems
` [PATCH v7 4/7] kernfs: use simple_xattrs for security attributes
` [PATCH v7 5/7] LSM: add new hook for kernfs node initialization
` [PATCH v7 6/7] selinux: implement the kernfs_init_security hook
` [PATCH v7 7/7] kernfs: initialize security of newly created nodes
[PATCH] KEYS: always initialize keyring_index_key::desc_len
2019-02-22 15:36 UTC
[PATCH v6 0/5] Allow initializing the kernfs node's secctx based on its parent
2019-02-22 12:52 UTC (12+ messages)
` [PATCH v6 5/5] kernfs: initialize security of newly created nodes
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).