messages from 2020-10-30 13:02:37 to 2020-11-10 10:13:17 UTC [more...]
[security:landlock_lsm 8/12] security/landlock/syscall.c:216:13: warning: Uninitialized variable: ruleset
2020-11-10 10:12 UTC
[PATCH v23 00/12] Landlock LSM
2020-11-10 8:16 UTC (15+ messages)
` [PATCH v23 01/12] landlock: Add object management
` [PATCH v23 02/12] landlock: Add ruleset and domain management
` [PATCH v23 03/12] landlock: Set up the security framework and manage credentials
` [PATCH v23 04/12] landlock: Add ptrace restrictions
` [PATCH v23 05/12] LSM: Infrastructure management of the superblock
` [PATCH v23 06/12] fs,security: Add sb_delete hook
` [PATCH v23 07/12] landlock: Support filesystem access-control
` [PATCH v23 08/12] landlock: Add syscall implementations
` [PATCH v23 09/12] arch: Wire up Landlock syscalls
` [PATCH v23 10/12] selftests/landlock: Add user space tests
` [PATCH v23 11/12] samples/landlock: Add a sandbox manager example
` [PATCH v23 12/12] landlock: Add user and kernel documentation
[PATCH v22 00/23] LSM: Module stacking for AppArmor
2020-11-10 6:56 UTC (27+ messages)
` [PATCH v22 01/23] LSM: Infrastructure management of the sock security
` [PATCH v22 02/23] LSM: Create and manage the lsmblob data structure
` [PATCH v22 03/23] LSM: Use lsmblob in security_audit_rule_match
` [PATCH v22 04/23] LSM: Use lsmblob in security_kernel_act_as
` [PATCH v22 05/23] LSM: Use lsmblob in security_secctx_to_secid
` [PATCH v22 06/23] LSM: Use lsmblob in security_secid_to_secctx
` [PATCH v22 07/23] LSM: Use lsmblob in security_ipc_getsecid
` [PATCH v22 08/23] LSM: Use lsmblob in security_task_getsecid
` [PATCH v22 09/23] LSM: Use lsmblob in security_inode_getsecid
` [PATCH v22 10/23] LSM: Use lsmblob in security_cred_getsecid
` [PATCH v22 11/23] IMA: Change internal interfaces to use lsmblobs
` [PATCH v22 12/23] LSM: Specify which LSM to display
` [PATCH v22 13/23] LSM: Ensure the correct LSM context releaser
` [PATCH v22 14/23] LSM: Use lsmcontext in security_secid_to_secctx
` [PATCH v22 15/23] LSM: Use lsmcontext in security_inode_getsecctx
` [PATCH v22 16/23] LSM: security_secid_to_secctx in netlink netfilter
` [PATCH v22 17/23] NET: Store LSM netlabel data in a lsmblob
` [PATCH v22 18/23] LSM: Verify LSM display sanity in binder
` [PATCH v22 19/23] audit: add support for non-syscall auxiliary records
` [PATCH v22 20/23] Audit: Add new record for multiple process LSM attributes
` [PATCH v22 21/23] Audit: Add a new record for multiple object "
` [PATCH v22 22/23] LSM: Add /proc attr entry for full LSM context
` [PATCH v22 23/23] AppArmor: Remove the exclusive flag
[PATCH v3 0/2] security: add fault injection to LSM hooks
2020-11-10 4:43 UTC (6+ messages)
` [PATCH v3 1/2] security: add fault injection capability
[PATCH v12 0/4] SELinux support for anonymous inodes and UFFD
2020-11-10 3:12 UTC (8+ messages)
` [PATCH v12 1/4] security: add inode_init_security_anon() LSM hook
` [PATCH v12 2/4] fs: add LSM-supporting anon-inode interface
` [PATCH v12 3/4] selinux: teach SELinux about anonymous inodes
` [PATCH v12 4/4] userfaultfd: use secure anon inodes for userfaultfd
[PATCH 1/2] tomoyo: Convert get_user_pages*() to pin_user_pages*()
2020-11-10 3:08 UTC (15+ messages)
` [PATCH 2/2] tomoyo: Fixed typo in documentation
[PATCH v2 0/8] Fork brute force attack mitigation
2020-11-10 0:09 UTC (6+ messages)
` [PATCH v2 7/8] Documentation: Add documentation for the Brute LSM
[PATCH v22 00/23] LSM: Module stacking for AppArmor
2020-11-09 22:47 UTC (21+ messages)
` [PATCH v22 01/23] LSM: Infrastructure management of the sock security
` [PATCH v22 02/23] LSM: Create and manage the lsmblob data structure
` [PATCH v22 03/23] LSM: Use lsmblob in security_audit_rule_match
` [PATCH v22 04/23] LSM: Use lsmblob in security_kernel_act_as
` [PATCH v22 05/23] LSM: Use lsmblob in security_secctx_to_secid
` [PATCH v22 06/23] LSM: Use lsmblob in security_secid_to_secctx
` [PATCH v22 07/23] LSM: Use lsmblob in security_ipc_getsecid
` [PATCH v22 08/23] LSM: Use lsmblob in security_task_getsecid
` [PATCH v22 09/23] LSM: Use lsmblob in security_inode_getsecid
` [PATCH v22 10/23] LSM: Use lsmblob in security_cred_getsecid
` [PATCH v22 11/23] IMA: Change internal interfaces to use lsmblobs
` [PATCH v22 12/23] LSM: Specify which LSM to display
` [PATCH v22 13/23] LSM: Ensure the correct LSM context releaser
` [PATCH v22 14/23] LSM: Use lsmcontext in security_secid_to_secctx
[PATCH v5 0/7] IMA: Infrastructure for measurement of critical kernel data
2020-11-09 17:24 UTC (20+ messages)
` [PATCH v5 1/7] IMA: generalize keyring specific measurement constructs
` [PATCH v5 2/7] IMA: update process_buffer_measurement to measure buffer hash
` [PATCH v5 3/7] IMA: add hook to measure critical data
` [PATCH v5 4/7] IMA: add policy "
` [PATCH v5 5/7] IMA: validate supported kernel data sources before measurement
` [PATCH v5 6/7] IMA: add critical_data to the built-in policy rules
` [PATCH v5 7/7] selinux: measure state and hash of the policy using IMA
[RFC PATCH 0/1] selinux-testsuite: Add GTP tests
2020-09-24 8:53 UTC
[PATCH] netlabel: fix our progress tracking in netlbl_unlabel_staticlist()
2020-11-08 14:08 UTC
[PATCH] security/smack: remove unused varible 'rc'
2020-11-08 6:45 UTC
[PATCH 1/2] [lsm] introduce a new hook to query LSM for functionality
2020-11-07 1:33 UTC (11+ messages)
` [PATCH 2/2] NFSv4.2: condition READDIR's mask for security label based on LSM state
[PATCH v40 11/24] x86/sgx: Add SGX misc driver interface
2020-11-06 22:01 UTC (10+ messages)
` [PATCH v40 15/24] x86/sgx: Add SGX_IOC_ENCLAVE_PROVISION
[PATCH v8 0/4] Introduce TEE based Trusted Keys support
2020-11-06 14:52 UTC (8+ messages)
` [PATCH v8 1/4] KEYS: trusted: Add generic trusted keys framework
` [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
` [PATCH v8 3/4] doc: trusted-encrypted: updates with TEE as a new trust source
` [PATCH v8 4/4] MAINTAINERS: Add myself as Trusted Keys co-maintainer
[PATCH v11 0/4] SELinux support for anonymous inodes and UFFD
2020-11-05 22:24 UTC (7+ messages)
` [PATCH v11 1/4] security: add inode_init_security_anon() LSM hook
` [PATCH v11 2/4] fs: add LSM-supporting anon-inode interface
` [PATCH v11 3/4] selinux: teach SELinux about anonymous inodes
` [PATCH v11 4/4] userfaultfd: use secure anon inodes for userfaultfd
[PATCH] mm, hugetlb: Avoid double clearing for hugetlb pages
2020-11-05 19:37 UTC (2+ messages)
[PATCH v10 0/3] SELinux support for anonymous inodes and UFFD
2020-11-04 20:36 UTC (7+ messages)
` [PATCH v10 1/3] Add a new LSM-supporting anonymous inode interface
` [PATCH v10 3/3] Use secure anon inodes for userfaultfd
[RFC PATCH 0/3] Add LSM/SELinux support for GPRS Tunneling Protocol (GTP)
2020-09-24 8:51 UTC (2+ messages)
` [RFC PATCH 2/3] gtp: Add LSM hooks to "
selinux: how to query if selinux is enabled
2020-11-04 17:02 UTC (14+ messages)
[PATCH v4 1/3,RESEND 2] KEYS: trusted: Fix incorrect handling of tpm_get_random()
2020-11-04 10:32 UTC (5+ messages)
` [PATCH v4 2/3,RESEND 2] KEYS: trusted: Fix migratable=1 failing
` [PATCH v4 3/3,RESEND 2] KEYS: trusted: Reserve TPM for seal and unseal operations
[PATCH v10 0/3] SELinux support for anonymous inodes and UFFD
2020-11-03 22:00 UTC (4+ messages)
` [PATCH v10 1/3] Add a new LSM-supporting anonymous inode interface
` [PATCH v10 2/3] Teach SELinux about anonymous inodes
` [PATCH v10 3/3] Use secure anon inodes for userfaultfd
[PATCH v22 00/12] Landlock LSM
2020-11-03 16:03 UTC (4+ messages)
` [PATCH v22 07/12] landlock: Support filesystem access-control
[PATCH 00/34] fs: idmapped mounts
2020-11-03 14:10 UTC (26+ messages)
` [PATCH 01/34] namespace: take lock_mount_hash() directly when changing flags
` [PATCH 03/34] fs: add mount_setattr()
` [PATCH 05/34] fs: introduce MOUNT_ATTR_IDMAP
` [PATCH 06/34] fs: add id translation helpers
` [PATCH 07/34] capability: handle idmapped mounts
Buggy commit tracked to: "Re: [PATCH 2/9] iov_iter: move rw_copy_check_uvector() into lib/iov_iter.c"
2020-11-02 18:23 UTC (14+ messages)
[PATCH v3 0/3] add ima_arch support for ARM64
2020-11-02 12:13 UTC (8+ messages)
` [PATCH v3 1/3] efi: generalize efi_get_secureboot
` [PATCH v3 3/3] arm64/ima: add ima_arch support
[PATCH] xfrm: redact SA secret with lockdown confidentiality
2020-10-31 10:49 UTC (2+ messages)
general protection fault in security_inode_getattr
2020-10-30 19:56 UTC (7+ messages)
[RESEND PATCH v18 0/4] overlayfs override_creds=off & nested get xattr fix
2020-10-30 16:00 UTC (4+ messages)
` [RESEND PATCH v18 2/4] overlayfs: handle XATTR_NOSECURITY flag for get xattr method
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).