messages from 2019-07-05 14:40:38 to 2019-07-13 15:08:48 UTC [more...]
Preferred subj= with multiple LSMs
2019-07-13 15:08 UTC (2+ messages)
[RFC PATCH] security,capability: pass object information to security_capable
2019-07-13 4:35 UTC (10+ messages)
` [RFC PATCH] security, capability: "
[PATCH v5 00/12] S.A.R.A. a new stacked LSM
2019-07-13 0:14 UTC (33+ messages)
` [PATCH v5 01/12] S.A.R.A.: add documentation
` [PATCH v5 02/12] S.A.R.A.: create framework
` [PATCH v5 03/12] S.A.R.A.: cred blob management
` [PATCH v5 04/12] S.A.R.A.: generic DFA for string matching
` [PATCH v5 05/12] LSM: creation of "check_vmflags" LSM hook
` [PATCH v5 06/12] S.A.R.A.: WX protection
` [PATCH v5 07/12] LSM: creation of "pagefault_handler" LSM hook
` [PATCH v5 08/12] S.A.R.A.: trampoline emulation
` [PATCH v5 09/12] S.A.R.A.: WX protection procattr interface
` [PATCH v5 10/12] S.A.R.A.: XATTRs support
` [PATCH v5 11/12] S.A.R.A.: /proc/*/mem write limitation
` [PATCH v5 12/12] MAINTAINERS: take maintainership for S.A.R.A
[PATCH 0/6] Mount and superblock notifications [ver #5]
2019-07-12 20:11 UTC (3+ messages)
` [PATCH 1/6] security: Add hooks to rule on setting a superblock or mount watch "
[RFC PATCH v6 0/1] Add dm verity root hash pkcs7 sig validation
2019-07-12 17:33 UTC (2+ messages)
[PATCH] LSM: Update MAINTAINERS file for SafeSetID LSM
2019-07-12 17:15 UTC (4+ messages)
Some LSM and SGX remarks before parting of for two weeks
2019-07-12 5:14 UTC (3+ messages)
[RFC/RFT] KEYS: trusted: Add generic trusted keys framework
2019-07-12 5:13 UTC (3+ messages)
[RFC PATCH] fanotify, inotify, dnotify, security: add security hook for fs notifications
2019-07-12 3:29 UTC (12+ messages)
` [Non-DoD Source] "
[PATCH 11/12] Documentation/x86: repointer docs to Documentation/arch/
2019-07-12 2:20 UTC
[RFC PATCH v4 00/12] security: x86/sgx: SGX vs. LSM
2019-07-12 0:08 UTC (85+ messages)
` [RFC PATCH v4 01/12] x86/sgx: Use mmu_notifier.release() instead of per-vma refcounting
` [RFC PATCH v4 04/12] x86/sgx: Require userspace to define enclave pages' protection bits
` [RFC PATCH v4 05/12] x86/sgx: Enforce noexec filesystem restriction for enclaves
` [RFC PATCH v4 07/12] LSM: x86/sgx: Introduce ->enclave_map() hook for Intel SGX
` [RFC PATCH v4 10/12] security/selinux: Add enclave_load() implementation
` [RFC PATCH v4 12/12] LSM: x86/sgx: Show line of sight to LSM support SGX2's EAUG
` [RFC PATCH v2 0/3] security/x86/sgx: SGX specific LSM hooks
` [RFC PATCH v3 0/4] "
` [RFC PATCH v3 1/4] x86/sgx: Add "
` [RFC PATCH v3 2/4] x86/64: Call LSM hooks from SGX subsystem/module
` [RFC PATCH v3 3/4] X86/sgx: Introduce EMA as a new LSM module
` [RFC PATCH v3 4/4] x86/sgx: Implement SGX specific hooks in SELinux
possible deadlock in process_measurement
2019-07-11 21:12 UTC (5+ messages)
[PATCH] KEYS: trusted: allow module init if TPM is inactive or deactivated
2019-07-11 19:48 UTC (6+ messages)
[RFC PATCH v2 1/3] x86/sgx: Add SGX specific LSM hooks
2019-07-11 10:22 UTC (15+ messages)
[PATCH V34 00/29] Lockdown as an LSM
2019-07-11 4:11 UTC (6+ messages)
` [PATCH V34 10/29] hibernate: Disable when the kernel is locked down
[GIT PULL] Keys: Set 4 - Key ACLs for 5.3
2019-07-11 3:07 UTC (7+ messages)
[PATCH 0/2] keys: ACLs
2019-07-10 1:35 UTC (6+ messages)
` [PATCH 1/2] KEYS: Replace uid/gid/perm permissions checking with an ACL
` [PATCH 2/2] KEYS: Provide KEYCTL_GRANT_PERMISSION
[PATCH v5 00/23] LSM: Module stacking for AppArmor
2019-07-09 21:34 UTC (7+ messages)
` [PATCH v5 15/23] LSM: Specify which LSM to display
[GIT PULL] LSM: capabilities updates for v5.3
2019-07-09 19:55 UTC (2+ messages)
Reminder: 2 open syzbot bugs in "security/integrity" subsystem
2019-07-09 19:15 UTC
[PATCH v1 01/22] docs: Documentation/*.txt: rename all ReST files to *.rst
2019-07-09 17:02 UTC
RFC: BUG: overlayfs getxattr recursion leaves a poison sid
2019-07-09 16:41 UTC (2+ messages)
[PATCH 00/10] VFS: Provide new mount UAPI
2019-07-09 10:51 UTC (10+ messages)
` [PATCH 02/10] vfs: syscall: Add move_mount(2) to move mounts around
[RFC 0/7] Introduce TEE based Trusted Keys support
2019-07-09 9:36 UTC (9+ messages)
` [RFC 3/7] tee: add private login method for kernel clients
[GIT PULL] integrity subsystem updates for v5.3
2019-07-09 3:50 UTC (2+ messages)
keyrings pull requests for the next merge window
2019-07-09 3:25 UTC
[GIT PULL] Keys: Set 3 - Keyrings namespacing for 5.3
2019-07-09 3:15 UTC (2+ messages)
[GIT PULL] tpmdd updates for Linux v5.3
2019-07-09 3:15 UTC (2+ messages)
[GIT PULL] Keys: Set 2 - request_key() improvements for 5.3
2019-07-09 3:15 UTC (2+ messages)
[GIT PULL] Keys: Set 1 - Miscellany for 5.3
2019-07-09 3:15 UTC (2+ messages)
[GIT PULL] SELinux patches for v5.3
2019-07-09 3:15 UTC (2+ messages)
[PATCH 0/9] Keyrings, Block and USB notifications [ver #5]
2019-07-08 19:13 UTC (5+ messages)
` [PATCH 2/9] security: Add hooks to rule on setting a watch "
` [PATCH 3/9] security: Add a hook for the point of notification insertion "
[PATCH] security/commoncap: Use xattr security prefix len
2019-07-07 3:02 UTC (2+ messages)
KASAN: use-after-free Read in tomoyo_realpath_from_path
2019-07-07 2:50 UTC (9+ messages)
` [PATCH] tomoyo: Don't check open/getattr permission on sockets
` [PATCH v2] "
[PATCH] Revert "tpm: pass an array of tpm_extend_digest structures to tpm_pcr_extend()"
2019-07-05 15:20 UTC (7+ messages)
[PATCH 6/9] Add a general, global device notification watch list [ver #5]
2019-07-05 14:40 UTC (2+ messages)
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).