messages from 2019-11-13 00:09:40 to 2019-12-01 01:40:27 UTC [more...]
[GIT PULL] SELinux patches for v5.5
2019-12-01 1:40 UTC (2+ messages)
[GIT PULL] pipe: Notification queue preparation
2019-11-30 23:05 UTC (2+ messages)
[PATCH] Kernel Lockdown: Add an option to allow raw MSR access even, in confidentiality mode
2019-11-30 19:09 UTC (3+ messages)
[PATCH] tpm_tis: Move setting of TPM_CHIP_FLAG_IRQ into tpm_tis_probe_irq_single
2019-11-29 23:26 UTC (11+ messages)
[PATCH v24 12/24] x86/sgx: Linux Enclave Driver
2019-11-29 23:13 UTC (2+ messages)
` [PATCH v24 15/24] x86/sgx: Add provisioning
[PATCH 0/2] Revert patches fixing probing of interrupts
2019-11-29 22:37 UTC (4+ messages)
` [PATCH 1/2] tpm: Revert "tpm_tis_core: Set TPM_CHIP_FLAG_IRQ before probing for interrupts"
` [PATCH 2/2] tpm: Revert "tpm_tis_core: Turn on the TPM before probing IRQ's"
[PATCH -next] x86/efi: remove unused variables
2019-11-29 12:05 UTC (2+ messages)
general protection fault in smack_socket_sendmsg (2)
2019-11-29 9:39 UTC (2+ messages)
[PATCH v23 12/24] x86/sgx: Linux Enclave Driver
2019-11-28 18:24 UTC (2+ messages)
tracefs splats in lockdown=confidentiality mode
2019-11-28 17:35 UTC (4+ messages)
general protection fault in __schedule (2)
2019-11-28 9:53 UTC (5+ messages)
[RFC PATCH v2] security,lockdown,selinux: implement SELinux lockdown
2019-11-27 17:22 UTC (2+ messages)
[GIT PULL] pipe: General notification queue
2019-11-26 23:18 UTC
[PATCH v11 02/25] LSM: Create and manage the lsmblob data structure
2019-11-23 5:21 UTC
[PATCH 1/2] selinux: revert "stop passing MAY_NOT_BLOCK to the AVC upon follow_link"
2019-11-22 17:22 UTC (2+ messages)
` [PATCH 2/2] selinux: fall back to ref-walk if audit is required
[RFC PATCH 2/2] selinux: fall back to ref-walk upon LSM_AUDIT_DATA_DENTRY too
2019-11-22 17:04 UTC (7+ messages)
[PATCH AUTOSEL 4.14 120/127] apparmor: delete the dentry in aafs_remove() to avoid a leak
2019-11-22 5:55 UTC
[PATCH AUTOSEL 4.19 205/219] apparmor: delete the dentry in aafs_remove() to avoid a leak
2019-11-22 5:48 UTC
[PATCH v11 00/25] LSM: Module stacking for AppArmor
2019-11-21 20:36 UTC (13+ messages)
` [PATCH v11 18/25] LSM: security_secid_to_secctx in netlink netfilter
` [PATCH v11 19/25] NET: Store LSM netlabel data in a lsmblob
` [PATCH v11 20/25] LSM: Verify LSM display sanity in binder
` [PATCH v11 21/25] Audit: Add subj_LSM fields when necessary
` [PATCH v11 22/25] Audit: Include object data for all security modules
` [PATCH v11 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
` [PATCH v11 24/25] LSM: Add /proc attr entry for full LSM context
` [PATCH v11 25/25] AppArmor: Remove the exclusive flag
[PATCH v11 00/25] LSM: Module stacking for AppArmor
2019-11-21 19:00 UTC (32+ messages)
` [PATCH v11 01/25] LSM: Infrastructure management of the sock security
` [PATCH v11 02/25] LSM: Create and manage the lsmblob data structure
` [PATCH v11 03/25] LSM: Use lsmblob in security_audit_rule_match
` [PATCH v11 04/25] LSM: Use lsmblob in security_kernel_act_as
` [PATCH v11 05/25] net: Prepare UDS for security module stacking
` [PATCH v11 06/25] LSM: Use lsmblob in security_secctx_to_secid
` [PATCH v11 07/25] LSM: Use lsmblob in security_secid_to_secctx
` [PATCH v11 08/25] LSM: Use lsmblob in security_ipc_getsecid
` [PATCH v11 09/25] LSM: Use lsmblob in security_task_getsecid
` [PATCH v11 10/25] LSM: Use lsmblob in security_inode_getsecid
` [PATCH v11 11/25] LSM: Use lsmblob in security_cred_getsecid
` [PATCH v11 12/25] IMA: Change internal interfaces to use lsmblobs
` [PATCH v11 13/25] LSM: Specify which LSM to display
` [PATCH v11 14/25] LSM: Ensure the correct LSM context releaser
` [PATCH v11 15/25] LSM: Use lsmcontext in security_secid_to_secctx
` [PATCH v11 16/25] LSM: Use lsmcontext in security_dentry_init_security
` [PATCH v11 17/25] LSM: Use lsmcontext in security_inode_getsecctx
KASAN: use-after-free Read in tomoyo_realpath_from_path
2019-11-21 13:59 UTC (18+ messages)
` [PATCH] tomoyo: Don't check open/getattr permission on sockets
` [PATCH v2] "
[PATCH v5 15/27] nfs: get rid of ->set_security()
2019-11-21 5:52 UTC
[PATCH v11 00/25] LSM: Module stacking for AppArmor
2019-11-21 5:50 UTC (22+ messages)
` [PATCH v11 01/25] LSM: Infrastructure management of the sock security
` [PATCH v11 02/25] LSM: Create and manage the lsmblob data structure
` [PATCH v11 03/25] LSM: Use lsmblob in security_audit_rule_match
` [PATCH v11 04/25] LSM: Use lsmblob in security_kernel_act_as
` [PATCH v11 05/25] net: Prepare UDS for security module stacking
` [PATCH v11 06/25] LSM: Use lsmblob in security_secctx_to_secid
` [PATCH v11 07/25] LSM: Use lsmblob in security_secid_to_secctx
` [PATCH v11 08/25] LSM: Use lsmblob in security_ipc_getsecid
` [PATCH v11 09/25] LSM: Use lsmblob in security_task_getsecid
` [PATCH v11 10/25] LSM: Use lsmblob in security_inode_getsecid
` [PATCH v11 11/25] LSM: Use lsmblob in security_cred_getsecid
` [PATCH v11 12/25] IMA: Change internal interfaces to use lsmblobs
` [PATCH v11 13/25] LSM: Specify which LSM to display
` [PATCH v11 14/25] LSM: Ensure the correct LSM context releaser
` [PATCH v11 15/25] LSM: Use lsmcontext in security_secid_to_secctx
` [PATCH v11 16/25] LSM: Use lsmcontext in security_dentry_init_security
` [PATCH v11 17/25] LSM: Use lsmcontext in security_inode_getsecctx
` [PATCH v11 18/25] LSM: security_secid_to_secctx in netlink netfilter
[PATCH v2] security: Fix Kconfig indentation
2019-11-21 3:20 UTC
[PATCH] x86/mtrr: Require CAP_SYS_ADMIN for all access
2019-11-20 20:24 UTC (3+ messages)
[PATCH] Smack: check length in smk_set_cipso()
2019-11-20 14:51 UTC
[PATCH] security: Fix Kconfig indentation
2019-11-20 13:37 UTC
[PATCH v2] efi: Only print errors about failing to get certs if EFI vars are found
2019-11-19 15:40 UTC (2+ messages)
[PATCH] efi: Only print errors about failing to get certs if EFI vars are found
2019-11-19 11:38 UTC (3+ messages)
[PATCH linux-kselftest/test v2] apparmor: add AppArmor KUnit tests for policy unpack
2019-11-19 0:34 UTC (4+ messages)
[pipe] d60337eff1: BUG:kernel_NULL_pointer_dereference,address
2019-11-18 7:53 UTC (3+ messages)
` [LKP] "
Investment opportunity
2019-11-17 14:58 UTC
[PATCH v7 0/5] KEYS: Measure keys when they are created or updated
2019-11-15 13:14 UTC (12+ messages)
` [PATCH v7 1/5] IMA: Add KEY_CHECK func to measure keys
` [PATCH v7 2/5] IMA: Define an IMA hook "
` [PATCH v7 3/5] KEYS: Call the "
` [PATCH v7 4/5] IMA: Add support to limit measuring keys
` [PATCH v7 5/5] IMA: Read keyrings= option from the IMA policy
Investment opportunity
2019-11-15 11:50 UTC
[PATCH v6 0/3] KEYS: Measure keys when they are created or updated
2019-11-13 22:04 UTC (14+ messages)
` [PATCH v6 1/3] IMA: Add KEY_CHECK func to measure keys
` [PATCH v6 2/3] IMA: Define an IMA hook "
` [PATCH v6 3/3] KEYS: Call the "
[PATCH] x86/mtrr: only administrator can read the configurations
2019-11-13 21:47 UTC (4+ messages)
[PATCH v11 00/25] LSM: Module stacking for AppArmor
2019-11-13 16:50 UTC (11+ messages)
` [PATCH v11 01/25] LSM: Infrastructure management of the sock security
` [PATCH v11 02/25] LSM: Create and manage the lsmblob data structure
` [PATCH v11 03/25] LSM: Use lsmblob in security_audit_rule_match
` [PATCH v11 04/25] LSM: Use lsmblob in security_kernel_act_as
` [PATCH v11 05/25] net: Prepare UDS for security module stacking
` [PATCH v11 06/25] LSM: Use lsmblob in security_secctx_to_secid
` [PATCH v11 07/25] LSM: Use lsmblob in security_secid_to_secctx
` [PATCH v11 08/25] LSM: Use lsmblob in security_ipc_getsecid
` [PATCH v11 09/25] LSM: Use lsmblob in security_task_getsecid
` [PATCH v11 10/25] LSM: Use lsmblob in security_inode_getsecid
Investment opportunity
2019-11-13 1:34 UTC
[PATCH v10 00/25] LSM: Module stacking for AppArmor
2019-11-13 0:09 UTC (23+ messages)
` [PATCH 04/25] LSM: Use lsmblob in security_kernel_act_as
` [PATCH 05/25] net: Prepare UDS for security module stacking
` [PATCH 06/25] LSM: Use lsmblob in security_secctx_to_secid
` [PATCH 07/25] LSM: Use lsmblob in security_secid_to_secctx
` [PATCH 08/25] LSM: Use lsmblob in security_ipc_getsecid
` [PATCH 09/25] LSM: Use lsmblob in security_task_getsecid
` [PATCH 10/25] LSM: Use lsmblob in security_inode_getsecid
` [PATCH 11/25] LSM: Use lsmblob in security_cred_getsecid
` [PATCH 12/25] IMA: Change internal interfaces to use lsmblobs
` [PATCH 13/25] LSM: Specify which LSM to display
` [PATCH 14/25] LSM: Ensure the correct LSM context releaser
` [PATCH 15/25] LSM: Use lsmcontext in security_secid_to_secctx
` [PATCH 16/25] LSM: Use lsmcontext in security_dentry_init_security
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).