messages from 2019-11-06 22:44:52 to 2019-11-14 14:38:47 UTC [more...]
[PATCH v7 0/5] KEYS: Measure keys when they are created or updated
2019-11-14 14:37 UTC (7+ messages)
` [PATCH v7 1/5] IMA: Add KEY_CHECK func to measure keys
` [PATCH v7 2/5] IMA: Define an IMA hook "
` [PATCH v7 3/5] KEYS: Call the "
` [PATCH v7 4/5] IMA: Add support to limit measuring keys
` [PATCH v7 5/5] IMA: Read keyrings= option from the IMA policy
[PATCH v6 0/3] KEYS: Measure keys when they are created or updated
2019-11-13 22:04 UTC (14+ messages)
` [PATCH v6 1/3] IMA: Add KEY_CHECK func to measure keys
` [PATCH v6 2/3] IMA: Define an IMA hook "
` [PATCH v6 3/3] KEYS: Call the "
[PATCH] x86/mtrr: only administrator can read the configurations
2019-11-13 21:47 UTC (4+ messages)
[PATCH v11 00/25] LSM: Module stacking for AppArmor
2019-11-13 18:25 UTC (9+ messages)
` [PATCH v11 18/25] LSM: security_secid_to_secctx in netlink netfilter
` [PATCH v11 19/25] NET: Store LSM netlabel data in a lsmblob
` [PATCH v11 20/25] LSM: Verify LSM display sanity in binder
` [PATCH v11 21/25] Audit: Add subj_LSM fields when necessary
` [PATCH v11 22/25] Audit: Include object data for all security modules
` [PATCH v11 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
` [PATCH v11 24/25] LSM: Add /proc attr entry for full LSM context
` [PATCH v11 25/25] AppArmor: Remove the exclusive flag
[PATCH v11 00/25] LSM: Module stacking for AppArmor
2019-11-13 18:19 UTC (18+ messages)
` [PATCH v11 01/25] LSM: Infrastructure management of the sock security
` [PATCH v11 02/25] LSM: Create and manage the lsmblob data structure
` [PATCH v11 03/25] LSM: Use lsmblob in security_audit_rule_match
` [PATCH v11 04/25] LSM: Use lsmblob in security_kernel_act_as
` [PATCH v11 05/25] net: Prepare UDS for security module stacking
` [PATCH v11 06/25] LSM: Use lsmblob in security_secctx_to_secid
` [PATCH v11 07/25] LSM: Use lsmblob in security_secid_to_secctx
` [PATCH v11 08/25] LSM: Use lsmblob in security_ipc_getsecid
` [PATCH v11 09/25] LSM: Use lsmblob in security_task_getsecid
` [PATCH v11 10/25] LSM: Use lsmblob in security_inode_getsecid
` [PATCH v11 11/25] LSM: Use lsmblob in security_cred_getsecid
` [PATCH v11 12/25] IMA: Change internal interfaces to use lsmblobs
` [PATCH v11 13/25] LSM: Specify which LSM to display
` [PATCH v11 14/25] LSM: Ensure the correct LSM context releaser
` [PATCH v11 15/25] LSM: Use lsmcontext in security_secid_to_secctx
` [PATCH v11 16/25] LSM: Use lsmcontext in security_dentry_init_security
` [PATCH v11 17/25] LSM: Use lsmcontext in security_inode_getsecctx
[PATCH v11 00/25] LSM: Module stacking for AppArmor
2019-11-13 17:57 UTC (19+ messages)
` [PATCH v11 01/25] LSM: Infrastructure management of the sock security
` [PATCH v11 02/25] LSM: Create and manage the lsmblob data structure
` [PATCH v11 03/25] LSM: Use lsmblob in security_audit_rule_match
` [PATCH v11 04/25] LSM: Use lsmblob in security_kernel_act_as
` [PATCH v11 05/25] net: Prepare UDS for security module stacking
` [PATCH v11 06/25] LSM: Use lsmblob in security_secctx_to_secid
` [PATCH v11 07/25] LSM: Use lsmblob in security_secid_to_secctx
` [PATCH v11 08/25] LSM: Use lsmblob in security_ipc_getsecid
` [PATCH v11 09/25] LSM: Use lsmblob in security_task_getsecid
` [PATCH v11 10/25] LSM: Use lsmblob in security_inode_getsecid
` [PATCH v11 11/25] LSM: Use lsmblob in security_cred_getsecid
` [PATCH v11 12/25] IMA: Change internal interfaces to use lsmblobs
` [PATCH v11 13/25] LSM: Specify which LSM to display
` [PATCH v11 14/25] LSM: Ensure the correct LSM context releaser
` [PATCH v11 15/25] LSM: Use lsmcontext in security_secid_to_secctx
` [PATCH v11 16/25] LSM: Use lsmcontext in security_dentry_init_security
` [PATCH v11 17/25] LSM: Use lsmcontext in security_inode_getsecctx
` [PATCH v11 18/25] LSM: security_secid_to_secctx in netlink netfilter
[PATCH v11 00/25] LSM: Module stacking for AppArmor
2019-11-13 16:50 UTC (11+ messages)
` [PATCH v11 01/25] LSM: Infrastructure management of the sock security
` [PATCH v11 02/25] LSM: Create and manage the lsmblob data structure
` [PATCH v11 03/25] LSM: Use lsmblob in security_audit_rule_match
` [PATCH v11 04/25] LSM: Use lsmblob in security_kernel_act_as
` [PATCH v11 05/25] net: Prepare UDS for security module stacking
` [PATCH v11 06/25] LSM: Use lsmblob in security_secctx_to_secid
` [PATCH v11 07/25] LSM: Use lsmblob in security_secid_to_secctx
` [PATCH v11 08/25] LSM: Use lsmblob in security_ipc_getsecid
` [PATCH v11 09/25] LSM: Use lsmblob in security_task_getsecid
` [PATCH v11 10/25] LSM: Use lsmblob in security_inode_getsecid
KASAN: use-after-free Read in tomoyo_realpath_from_path
2019-11-13 13:49 UTC (15+ messages)
` [PATCH] tomoyo: Don't check open/getattr permission on sockets
` [PATCH v2] "
Investment opportunity
2019-11-13 1:34 UTC
[PATCH v10 00/25] LSM: Module stacking for AppArmor
2019-11-13 0:09 UTC (26+ messages)
` [PATCH 01/25] LSM: Infrastructure management of the sock security
` [PATCH 02/25] LSM: Create and manage the lsmblob data structure
` [PATCH 03/25] LSM: Use lsmblob in security_audit_rule_match
` [PATCH 04/25] LSM: Use lsmblob in security_kernel_act_as
` [PATCH 05/25] net: Prepare UDS for security module stacking
` [PATCH 06/25] LSM: Use lsmblob in security_secctx_to_secid
` [PATCH 07/25] LSM: Use lsmblob in security_secid_to_secctx
` [PATCH 08/25] LSM: Use lsmblob in security_ipc_getsecid
` [PATCH 09/25] LSM: Use lsmblob in security_task_getsecid
` [PATCH 10/25] LSM: Use lsmblob in security_inode_getsecid
` [PATCH 11/25] LSM: Use lsmblob in security_cred_getsecid
` [PATCH 12/25] IMA: Change internal interfaces to use lsmblobs
` [PATCH 13/25] LSM: Specify which LSM to display
` [PATCH 14/25] LSM: Ensure the correct LSM context releaser
` [PATCH 15/25] LSM: Use lsmcontext in security_secid_to_secctx
` [PATCH 16/25] LSM: Use lsmcontext in security_dentry_init_security
[PATCH v10 00/25] LSM: Module stacking for AppArmor
2019-11-13 0:00 UTC (23+ messages)
` [PATCH v10 01/25] LSM: Infrastructure management of the sock security
` [PATCH v10 02/25] LSM: Create and manage the lsmblob data structure
` [PATCH v10 03/25] LSM: Use lsmblob in security_audit_rule_match
` [PATCH v10 04/25] LSM: Use lsmblob in security_kernel_act_as
` [PATCH v10 05/25] net: Prepare UDS for security module stacking
` [PATCH v10 06/25] LSM: Use lsmblob in security_secctx_to_secid
` [PATCH v10 07/25] LSM: Use lsmblob in security_secid_to_secctx
` [PATCH v10 08/25] LSM: Use lsmblob in security_ipc_getsecid
` [PATCH v10 09/25] LSM: Use lsmblob in security_task_getsecid
` [PATCH v10 10/25] LSM: Use lsmblob in security_inode_getsecid
` [PATCH v10 11/25] LSM: Use lsmblob in security_cred_getsecid
` [PATCH v10 12/25] IMA: Change internal interfaces to use lsmblobs
` [PATCH v10 13/25] LSM: Specify which LSM to display
` [PATCH v10 14/25] LSM: Ensure the correct LSM context releaser
` [PATCH v10 15/25] LSM: Use lsmcontext in security_secid_to_secctx
` [PATCH v10 16/25] LSM: Use lsmcontext in security_dentry_init_security
` [PATCH v10 17/25] LSM: Use lsmcontext in security_inode_getsecctx
` [PATCH v10 18/25] LSM: security_secid_to_secctx in netlink netfilter
` [PATCH v10 19/25] NET: Store LSM netlabel data in a lsmblob
` [PATCH v10 20/25] LSM: Verify LSM display sanity in binder
` [PATCH v10 21/25] Audit: Add subj_LSM fields when necessary
` [PATCH v10 22/25] Audit: Include object data for all security modules
WARNING in aa_sock_msg_perm (2)
2019-11-12 21:00 UTC (2+ messages)
[PATCH] tpm_tis: Move setting of TPM_CHIP_FLAG_IRQ into tpm_tis_probe_irq_single
2019-11-12 20:27 UTC
[PATCH v5 0/10] KEYS: Measure keys when they are created or updated
2019-11-12 18:06 UTC (22+ messages)
` [PATCH v5 01/10] IMA: Added KEYRING_CHECK func in IMA policy to measure keys
` [PATCH v5 02/10] IMA: Added keyrings= option in IMA policy to only measure keys added to the specified keyrings
` [PATCH v5 03/10] IMA: Read keyrings= option from the IMA policy into ima_rule_entry
` [PATCH v5 04/10] IMA: Updated IMA policy functions to return keyrings option read from the policy
` [PATCH v5 05/10] IMA: Measure key if the IMA policy allows measurement for the keyring to which the key is linked to
` [PATCH v5 06/10] IMA: Defined an IMA hook to measure keys on key create or update
` [PATCH v5 07/10] KEYS: Call the IMA hook to measure key when a new key is created or an existing key is updated
` [PATCH v5 08/10] IMA: Added a flag to determine whether IMA hook can process the key now or has to queue for processing later
` [PATCH v5 09/10] IMA: Defined functions to queue and dequeue keys for measurement
` [PATCH v5 10/10] IMA: Call queue and dequeue functions to measure keys
[PATCH bpf-next v13 0/7] Landlock LSM
2019-11-08 15:39 UTC (12+ messages)
` [PATCH bpf-next v13 4/7] landlock: Add ptrace LSM hooks
[PATCH v23 12/24] x86/sgx: Linux Enclave Driver
2019-11-08 8:20 UTC (13+ messages)
[RFC PATCH 00/14] pipe: Keyrings, Block and USB notifications [ver #2]
2019-11-08 6:42 UTC (22+ messages)
` [RFC PATCH 01/14] uapi: General notification queue definitions "
` [RFC PATCH 02/14] security: Add hooks to rule on setting a watch "
` [RFC PATCH 03/14] security: Add a hook for the point of notification insertion "
` [RFC PATCH 04/14] pipe: Add O_NOTIFICATION_PIPE "
` [RFC PATCH 05/14] pipe: Add general notification queue support "
` [RFC PATCH 06/14] keys: Add a notification facility "
` [RFC PATCH 07/14] Add sample notification program "
` [RFC PATCH 08/14] pipe: Allow buffers to be marked read-whole-or-error for notifications "
` [RFC PATCH 09/14] pipe: Add notification lossage handling "
` [RFC PATCH 10/14] Add a general, global device notification watch list "
` [RFC PATCH 11/14] block: Add block layer notifications "
` [RFC PATCH 12/14] usb: Add USB subsystem "
` [RFC PATCH 13/14] selinux: Implement the watch_key security hook "
` [RFC PATCH 14/14] smack: Implement the watch_key and post_notification hooks "
[PATCH linux-kselftest/test v2] apparmor: add AppArmor KUnit tests for policy unpack
2019-11-07 23:33 UTC (3+ messages)
[PATCH v4 0/10] KEYS: Measure keys when they are created or updated
2019-11-07 21:12 UTC (12+ messages)
` [PATCH v4 01/10] IMA: Defined an IMA hook to measure keys on key create or update
` [PATCH v4 08/10] IMA: Defined functions to queue and dequeue keys for measurement
[RFC PATCH 04/11] pipe: Use head and tail pointers for the ring, not cursor and length [ver #3]
2019-11-07 17:42 UTC (3+ messages)
` [pipe] d60337eff1: phoronix-test-suite.noise-level.0.activity_level 144.0% improvement
Investment opportunity
2019-11-07 15:08 UTC
[PATCH 00/30] security, efi: Add kernel lockdown
2019-11-07 8:21 UTC (3+ messages)
` [PATCH 18/30] acpi: Disable APEI error injection if the kernel is locked down
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).