messages from 2019-06-11 06:28:29 to 2019-06-18 15:42:06 UTC [more...]
[RFC PATCH v1 0/3] security/x86/sgx: SGX specific LSM hooks
2019-06-18 15:40 UTC (33+ messages)
` [RFC PATCH v1 2/3] LSM/x86/sgx: Implement SGX specific hooks in SELinux
[PATCH] ima: dynamically allocate shash_desc
2019-06-18 12:44 UTC (5+ messages)
[PATCH] structleak: disable BYREF_ALL in combination with KASAN_STACK
2019-06-18 9:47 UTC
[PATCH v7 0/3] add init_on_alloc/init_on_free boot options
2019-06-18 5:26 UTC (7+ messages)
` [PATCH v7 1/2] mm: security: introduce init_on_alloc=1 and init_on_free=1 "
` [PATCH v7 2/2] mm: init: report memory auto-initialization features at boot time
[PATCH] Smack: Restore the smackfsdef mount option and add missing prefixes
2019-06-18 1:59 UTC (7+ messages)
[RFC PATCH v4 0/1] Add dm verity root hash pkcs7 sig validation
2019-06-17 20:39 UTC (4+ messages)
` [RFC PATCH v4 1/1] "
[PATCH V8 0/3] Add support for measuring the boot command line during kexec_file_load
2019-06-17 18:37 UTC (4+ messages)
` [PATCH V9 1/3] IMA:Define a new hook to measure the kexec boot command line arguments
` [PATCH V9 2/3] IMA:Define a new template field buf
` [PATCH V9 3/3] KEXEC:Call ima_kexec_cmdline to measure the boot command line args
[PATCH V8 0/3] Add support for measuring the boot command line during kexec_file_load
2019-06-17 18:35 UTC (4+ messages)
` [PATCH 1/3] IMA:Define a new hook to measure the kexec boot command line arguments
` [PATCH 2/3] IMA:Define a new template field buf
` [PATCH 3/3] KEXEC:Call ima_kexec_cmdline to measure the boot command line args
[PATCH] integrity: Fix __integrity_init_keyring() section mismatch
2019-06-17 18:11 UTC (3+ messages)
[RFC PATCH v2 0/5] security: x86/sgx: SGX vs. LSM
2019-06-17 16:38 UTC (19+ messages)
` [RFC PATCH v2 2/5] x86/sgx: Require userspace to define enclave pages' protection bits
` [RFC PATCH v2 3/5] x86/sgx: Enforce noexec filesystem restriction for enclaves
` [RFC PATCH v2 5/5] security/selinux: Add enclave_load() implementation
[PATCH 1/7] General notification queue with user mmap()'able ring buffer
2019-06-17 16:24 UTC (11+ messages)
` [RFC][PATCH 0/7] Mount, FS, Block and Keyrings notifications
[PATCH v4 00/14] ima: introduce IMA Digest Lists extension
2019-06-17 6:56 UTC (16+ messages)
` [PATCH v4 01/14] ima: read hash algorithm from security.ima even if appraisal is not enabled
` [PATCH v4 02/14] ima: generalize ima_read_policy()
` [PATCH v4 03/14] ima: generalize ima_write_policy() and raise uploaded data size limit
` [PATCH v4 04/14] ima: generalize policy file operations
` [PATCH v4 05/14] ima: use ima_show_htable_value to show violations and hash table data
` [PATCH v4 06/14] ima: add parser of compact digest list
` [PATCH v4 07/14] ima: restrict upload of converted digest lists
` [PATCH v4 08/14] ima: prevent usage of digest lists that are not measured/appraised
` [PATCH v4 09/14] ima: introduce new securityfs files
` [PATCH v4 10/14] ima: load parser digests and execute the parser at boot time
` [PATCH v4 11/14] ima: add support for measurement with digest lists
` [PATCH v4 12/14] ima: add support for appraisal "
` [PATCH v4 13/14] ima: introduce new policies initrd and appraise_initrd
` [PATCH v4 14/14] ima: add Documentation/security/IMA-digest-lists.txt
KASAN: use-after-free Read in tomoyo_realpath_from_path
2019-06-16 6:49 UTC (4+ messages)
` [PATCH] tomoyo: Don't check open/getattr permission on sockets
[RFC PATCH 0/1] security: add SECURE_KEEP_FSUID to preserve fsuid/fsgid across execve
2019-06-15 3:53 UTC (6+ messages)
` [RFC PATCH 1/1] "
[PATCH v4 16/28] docs: netlabel: convert docs to ReST and rename to *.rst
2019-06-14 20:30 UTC (3+ messages)
` [PATCH v4 05/28] docs: cgroup-v1: "
[PATCH V8 0/3] Add support for measuring the boot command line during kexec_file_load
2019-06-14 17:52 UTC (19+ messages)
` [PATCH V8 1/3] Define a new IMA hook to measure the boot command line arguments
` [PATCH V8 2/3] Define a new ima template field buf
` [PATCH V8 3/3] Call ima_kexec_cmdline to measure the cmdline args
[RFC 0/7] Introduce TEE based Trusted Keys support
2019-06-14 15:36 UTC (25+ messages)
` [RFC 1/7] tee: optee: allow kernel pages to register as shm
` [RFC 2/7] tee: enable support to register kernel memory
` [RFC 3/7] tee: add private login method for kernel clients
` [RFC 4/7] KEYS: trusted: Introduce TEE based Trusted Keys
` [RFC 5/7] KEYS: encrypted: Allow TEE based trusted master keys
` [RFC 6/7] doc: keys: Document usage of TEE based Trusted Keys
` [RFC 7/7] MAINTAINERS: Add entry for "
[RFC PATCH 0/9] security: x86/sgx: SGX vs. LSM
2019-06-14 15:18 UTC (12+ messages)
` [RFC PATCH 2/9] x86/sgx: Do not naturally align MAP_FIXED address
[PATCH 02/13] uapi: General notification ring definitions [ver #4]
2019-06-13 18:46 UTC (26+ messages)
` [RFC][PATCH 00/13] Mount, FS, Block and Keyrings notifications "
` What do LSMs *actually* need for checks on notifications?
[RFC PATCH v4 0/1] Add dm verity root hash pkcs7 sig validation
2019-06-13 0:43 UTC (2+ messages)
` [RFC PATCH v4 1/1] "
[GIT PULL] SELinux fixes for v5.2 (#2)
2019-06-13 3:15 UTC (2+ messages)
[PATCH v3 0/2] ima/evm fixes for v5.2
2019-06-13 8:51 UTC (11+ messages)
[PATCH -next] ima: Make arch_policy_entry static
2019-06-13 15:38 UTC (2+ messages)
[PATCH v2 1/2] LSM: switch to blocking policy update notifiers
2019-06-12 20:55 UTC (6+ messages)
` [PATCH v2 1/2] ima: use the lsm policy update notifier
[PATCH v3 18/33] docs: netlabel: convert docs to ReST and rename to *.rst
2019-06-12 14:48 UTC (3+ messages)
` [PATCH v3 05/33] docs: cgroup-v1: "
[PATCH 09/10] usb: Add USB subsystem notifications [ver #3]
2019-06-12 6:58 UTC (4+ messages)
[PATCH -next] security: Make capability_hooks static
2019-06-11 21:44 UTC (2+ messages)
[PATCH v7 0/3] add new ima hook ima_kexec_cmdline to measure kexec boot cmdline args
2019-06-11 18:48 UTC (3+ messages)
[PATCH v11 00/13] Appended signatures support for IMA appraisal
2019-06-11 6:28 UTC (14+ messages)
` [PATCH v11 01/13] MODSIGN: Export module signature definitions
` [PATCH v11 02/13] PKCS#7: Refactor verify_pkcs7_signature()
` [PATCH v11 03/13] PKCS#7: Introduce pkcs7_get_digest()
` [PATCH v11 04/13] integrity: Introduce struct evm_xattr
` [PATCH v11 05/13] integrity: Select CONFIG_KEYS instead of depending on it
` [PATCH v11 06/13] ima: Use designated initializers for struct ima_event_data
` [PATCH v11 07/13] ima: Add modsig appraise_type option for module-style appended signatures
` [PATCH v11 08/13] ima: Factor xattr_verify() out of ima_appraise_measurement()
` [PATCH v11 09/13] ima: Implement support for module-style appended signatures
` [PATCH v11 10/13] ima: Collect modsig
` [PATCH v11 11/13] ima: Define ima-modsig template
` [PATCH v11 12/13] ima: Store the measurement again when appraising a modsig
` [PATCH v11 13/13] ima: Allow template= option for appraise rules as well
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).