messages from 2020-03-24 16:25:17 to 2020-03-30 18:26:24 UTC [more...]
[RFC PATCH v14 00/10] Landlock LSM
2020-03-30 18:26 UTC (11+ messages)
[PATCH v2 0/3] tpm2: Make TPM2 logs accessible for non-UEFI firmware
2020-03-30 15:15 UTC (4+ messages)
` [PATCH v2 1/3] acpi: Extend TPM2 ACPI table with missing log fields
` [PATCH v2 2/3] tpm: Rearrange ACPI log code to easier extend for TPM2 case
` [PATCH v2 3/3] tpm: Add support for ACPI logs from TPM2 ACPI table
kernel panic: smack: Failed to initialize cipso DOI
2020-03-30 15:13 UTC (2+ messages)
[GIT PULL] keys: Fix key->sem vs mmap_sem issue when reading key
2020-03-30 12:16 UTC
[PATCH v10 0/9] proc: modernize proc to support multiple private instances
2020-03-30 11:12 UTC (22+ messages)
` [PATCH v10 1/9] proc: rename struct proc_fs_info to proc_fs_opts
` [PATCH v10 2/9] proc: allow to mount many instances of proc in one pid namespace
` [PATCH v10 3/9] proc: move hide_pid, pid_gid from pid_namespace to proc_fs_info
` [PATCH v10 4/9] proc: instantiate only pids that we can ptrace on 'hidepid=4' mount option
` [PATCH v10 5/9] proc: add option to mount only a pids subset
` [PATCH v10 6/9] docs: proc: add documentation for "hidepid=4" and "subset=pid" options and new mount behavior
` [PATCH v10 7/9] proc: move hidepid values to uapi as they are user interface to mount
` [PATCH v10 8/9] proc: use human-readable values for hidehid
` [PATCH v11 "
` [PATCH v10 9/9] proc: use named enums for better readability
[PATCH bpf-next v9 0/8] MAC and Audit policy using eBPF (KRSI)
2020-03-29 23:46 UTC (10+ messages)
` [PATCH bpf-next v9 1/8] bpf: Introduce BPF_PROG_TYPE_LSM
` [PATCH bpf-next v9 2/8] security: Refactor declaration of LSM hooks
` [PATCH bpf-next v9 3/8] bpf: lsm: provide attachment points for BPF LSM programs
` [PATCH bpf-next v9 4/8] bpf: lsm: Implement attach, detach and execution
` [PATCH bpf-next v9 5/8] bpf: lsm: Initialize the BPF LSM hooks
` [PATCH bpf-next v9 6/8] tools/libbpf: Add support for BPF_PROG_TYPE_LSM
` [PATCH bpf-next v9 7/8] bpf: lsm: Add selftests "
` [PATCH bpf-next v9 8/8] bpf: lsm: Add Documentation
[PATCH] apparmor: fix potential label refcnt leak in aa_change_profile
2020-03-29 14:57 UTC
[PATCH bpf-next v8 0/8] MAC and Audit policy using eBPF (KRSI)
2020-03-29 0:15 UTC (16+ messages)
` [PATCH bpf-next v8 1/8] bpf: Introduce BPF_PROG_TYPE_LSM
` [PATCH bpf-next v8 2/8] security: Refactor declaration of LSM hooks
` [PATCH bpf-next v8 3/8] bpf: lsm: provide attachment points for BPF LSM programs
` [PATCH bpf-next v8 4/8] bpf: lsm: Implement attach, detach and execution
` [PATCH bpf-next v8 5/8] bpf: lsm: Initialize the BPF LSM hooks
` [PATCH bpf-next v8 6/8] tools/libbpf: Add support for BPF_PROG_TYPE_LSM
` [PATCH bpf-next v8 7/8] bpf: lsm: Add selftests "
` [PATCH bpf-next v8 8/8] bpf: lsm: Add Documentation
[PATCH bpf-next v7 0/8] MAC and Audit policy using eBPF (KRSI)
2020-03-27 19:17 UTC (33+ messages)
` [PATCH bpf-next v7 1/8] bpf: Introduce BPF_PROG_TYPE_LSM
` [PATCH bpf-next v7 2/8] security: Refactor declaration of LSM hooks
` [PATCH bpf-next v7 3/8] bpf: lsm: provide attachment points for BPF LSM programs
` [PATCH bpf-next v7 4/8] bpf: lsm: Implement attach, detach and execution
` [PATCH bpf-next v7 5/8] bpf: lsm: Initialize the BPF LSM hooks
` [PATCH bpf-next v7 6/8] tools/libbpf: Add support for BPF_PROG_TYPE_LSM
` [PATCH bpf-next v7 7/8] bpf: lsm: Add selftests "
` [PATCH bpf-next v7 8/8] bpf: lsm: Add Documentation
KASAN: slab-out-of-bounds Read in vsscanf
2020-03-27 16:16 UTC
[PATCH v15 00/10] Landlock LSM
2020-03-27 14:59 UTC (13+ messages)
` [PATCH v15 01/10] landlock: Add object management
` [PATCH v15 02/10] landlock: Add ruleset and domain management
` [PATCH v15 03/10] landlock: Set up the security framework and manage credentials
` [PATCH v15 04/10] landlock: Add ptrace restrictions
` [PATCH v15 05/10] fs,landlock: Support filesystem access-control
` [PATCH v15 06/10] landlock: Add syscall implementation
` [PATCH v15 07/10] arch: Wire up landlock() syscall
` [PATCH v15 08/10] selftests/landlock: Add initial tests
` [PATCH v15 09/10] samples/landlock: Add a sandbox manager example
` [PATCH v15 10/10] landlock: Add user and kernel documentation
[PATCH 0/3] SELinux support for anonymous inodes and UFFD
2020-03-27 13:41 UTC (22+ messages)
` [PATCH v2 "
` [PATCH v2 1/3] Add a new LSM-supporting anonymous inode interface
` [PATCH v2 2/3] Teach SELinux about anonymous inodes
` [PATCH v2 3/3] Wire UFFD up to SELinux
` [PATCH v3 0/3] SELinux support for anonymous inodes and UFFD
` [PATCH v3 1/3] Add a new LSM-supporting anonymous inode interface
` [PATCH v3 2/3] Teach SELinux about anonymous inodes
` [PATCH v3 3/3] Wire UFFD up to SELinux
` [PATCH v4 0/3] SELinux support for anonymous inodes and UFFD
` [PATCH v4 1/3] Add a new LSM-supporting anonymous inode interface
` [PATCH v4 2/3] Teach SELinux about anonymous inodes
` [PATCH v4 3/3] Wire UFFD up to SELinux
KASAN: slab-out-of-bounds Read in vsscanf
2020-03-27 1:20 UTC
[PATCH v4 0/7] ima: support stronger algorithms for attestation
2020-03-27 0:07 UTC (9+ messages)
` [PATCH v4 1/7] ima: Switch to ima_hash_algo for boot aggregate
` [PATCH v4 2/7] ima: Evaluate error in init_ima()
` [PATCH v4 3/7] ima: Store template digest directly in ima_template_entry
` [PATCH v4 4/7] ima: Switch to dynamically allocated buffer for template digests
` [PATCH v4 5/7] ima: Allocate and initialize tfm for each PCR bank
` [PATCH v4 6/7] ima: Calculate and extend PCR with digests in ima_template_entry
` [PATCH v4 7/7] ima: Use ima_hash_algo for collision detection in the measurement list
[PATCH v7 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
2020-03-26 23:28 UTC (4+ messages)
` [Intel-gfx] "
[PATCH v8 0/2] KEYS: Read keys to internal buffer & then copy to userspace
2020-03-26 22:37 UTC (4+ messages)
[PATCH bpf-next v6 0/8] MAC and Audit policy using eBPF (KRSI)
2020-03-26 13:36 UTC (25+ messages)
` [PATCH bpf-next v6 1/8] bpf: Introduce BPF_PROG_TYPE_LSM
` [PATCH bpf-next v6 2/8] security: Refactor declaration of LSM hooks
` [PATCH bpf-next v6 3/8] bpf: lsm: provide attachment points for BPF LSM programs
` [PATCH bpf-next v6 4/8] bpf: lsm: Implement attach, detach and execution
` [PATCH bpf-next v6 5/8] bpf: lsm: Initialize the BPF LSM hooks
` [PATCH bpf-next v6 6/8] tools/libbpf: Add support for BPF_PROG_TYPE_LSM
` [PATCH bpf-next v6 7/8] bpf: lsm: Add selftests "
` [PATCH bpf-next v6 8/8] bpf: lsm: Add Documentation
[PATCH RESEND v9 0/8] proc: modernize proc to support multiple private instances
2020-03-25 19:16 UTC (14+ messages)
` [PATCH RESEND v9 1/8] proc: rename struct proc_fs_info to proc_fs_opts
` [PATCH RESEND v9 2/8] proc: allow to mount many instances of proc in one pid namespace
` [PATCH RESEND v9 3/8] proc: move hide_pid, pid_gid from pid_namespace to proc_fs_info
` [PATCH v9 9/8] proc: use named enums for better readability
` [PATCH RESEND v9 4/8] proc: instantiate only pids that we can ptrace on 'hidepid=4' mount option
` [PATCH RESEND v9 5/8] proc: add option to mount only a pids subset
` [PATCH RESEND v9 6/8] docs: proc: add documentation for "hidepid=4" and "subset=pidfs" options and new mount behavior
` [PATCH RESEND v9 7/8] proc: move hidepid values to uapi as they are user interface to mount
` [PATCH RESEND v9 8/8] proc: use human-readable values for hidehid
[PATCH 1/5] ima: Set file->f_mode instead of file->f_flags in ima_calc_file_hash()
2020-03-25 16:14 UTC (5+ messages)
` [PATCH 2/5] evm: Check also if *tfm is an error pointer in init_desc()
` [PATCH 3/5] ima: Fix ima digest hash table key calculation
` [PATCH 4/5] ima: Remove redundant policy rule set in add_rules()
` [PATCH 5/5] ima: Remove unused build_ima_appraise variable
[PATCH bpf-next v5 0/8] MAC and Audit policy using eBPF (KRSI)
2020-03-25 14:35 UTC (41+ messages)
` [PATCH bpf-next v5 3/7] bpf: lsm: provide attachment points for BPF LSM programs
` [PATCH bpf-next v5 4/7] bpf: lsm: Implement attach, detach and execution
` [PATCH bpf-next v5 5/7] bpf: lsm: Initialize the BPF LSM hooks
` [PATCH bpf-next v5 7/7] bpf: lsm: Add selftests for BPF_PROG_TYPE_LSM
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).