messages from 2017-06-02 16:57:32 to 2017-06-12 16:56:55 UTC [more...]
[PATCH 00/11] S.A.R.A. a new stacked LSM
2017-06-12 16:56 UTC (7+ messages)
` [PATCH 01/11] S.A.R.A. Documentation
` [PATCH 02/11] S.A.R.A. framework creation
` [PATCH 03/11] Creation of "usb_device_auth" LSM hook
` [PATCH 04/11] S.A.R.A. USB Filtering
` [PATCH 05/11] Creation of "check_vmflags" LSM hook
` [PATCH 06/11] S.A.R.A. cred blob management
[GIT PULL] SELinux fixes for v4.12 (#1)
2017-06-12 15:40 UTC
I Would love to discuse something with you
2017-06-12 14:51 UTC
[PATCH v1] shebang: restrict python interactive prompt/interpreter
2017-06-12 14:27 UTC (16+ messages)
[PATCH] tpm: Enable CLKRUN protocol for Braswell systems
2017-06-12 7:50 UTC (19+ messages)
` [PATCH v2] "
` [PATCH v3] "
` [PATCH v4] "
[PATCH] security: selinux: use kmem_cache for ebitmap
2017-06-12 2:16 UTC (3+ messages)
[PATCH v2 0/1] Add Trusted Path Execution as a stackable LSM
2017-06-12 0:04 UTC (14+ messages)
` [PATCH v2 1/1] "
` [kernel-hardening] "
[GIT PULL] AppArmor for 4.13
2017-06-11 1:26 UTC
[PATCH v2 00/11] introduce crypto wait for async op
2017-06-10 9:01 UTC (5+ messages)
` [PATCH v2 01/11] crypto: "
[PATCH] security: smack: smack.h - style fix
2017-06-10 0:28 UTC
[PATCH v2 0/6] Appended signatures support for IMA appraisal
2017-06-09 21:19 UTC (9+ messages)
` [PATCH v2 1/6] integrity: Small code improvements
` [PATCH v2 2/6] ima: Simplify policy_func_show
` [PATCH v2 3/6] ima: Log the same audit cause whenever a file has no signature
` [PATCH v2 4/6] integrity: Introduce struct evm_hmac_xattr
` [PATCH v2 5/6] MODSIGN: Export module signature definitions
` [PATCH v2 6/6] ima: Support module-style appended signatures for appraisal
[PATCH 0/4] define new fs integrity_read method
2017-06-09 19:55 UTC (7+ messages)
` [PATCH 1/4] ima: use fs method to read integrity data
` [PATCH 2/4] tmpfs: define integrity_read file operation method
` [PATCH 3/4] ima: use existing read file operation method to calculate file hash
` [PATCH 4/4] ima: use read_iter (generic_file_read_iter) "
` [PATCH] sample xfstests IMA-appraisal test module
` [PATCH] sample xfstests IMA-appraisal test module (resending)
[PATCH 0/5] security, efi: Set lockdown if in secure boot mode
2017-06-09 19:22 UTC (7+ messages)
[PATCH v6 0/4] ro protection for dynamic data
2017-06-09 18:56 UTC (6+ messages)
` [PATCH 1/4] LSM: Convert security_hook_heads into explicit array of struct list_head
` [PATCH 2/4] Protectable Memory Allocator
` [PATCH 3/4] Protectable Memory Allocator - Debug interface
` [PATCH 4/4] Make LSM Writable Hooks a command line option
[PATCH 0/6] LSM: Security module blob management
2017-06-09 3:54 UTC (9+ messages)
` [PATCH 1/6] procfs-add-smack-subdir-to-attrs
` [PATCH 2/6] LSM-manage-credential-security-blobs
` [PATCH 3/6] LSM: Manage file security blobs
` [PATCH 4/6] LSM: manage task "
` [PATCH 5/6] LSM: Infrastructure management of the remaining blobs
` [PATCH 6/6] LSM: general but not extreme module stacking
` [kernel-hardening] [PATCH 0/6] LSM: Security module blob management
[GIT PULL] Keys subsystem update
2017-06-09 3:51 UTC
[PATCH RFC] Smack: More sanity in the use of Netlabel
2017-06-09 2:41 UTC
[PATCH 00/23] KEYS: Fixes
2017-06-08 14:49 UTC (26+ messages)
` [PATCH 01/23] security/keys: add CONFIG_KEYS_COMPAT to Kconfig
` [PATCH 02/23] security: use READ_ONCE instead of deprecated ACCESS_ONCE
` [PATCH 03/23] KEYS: fix refcount_inc() on zero
` [PATCH 04/23] X.509: Fix error code in x509_cert_parse()
` [PATCH 05/23] KEYS: Delete an error message for a failed memory allocation in get_derived_key()
` [PATCH 06/23] KEYS: put keyring if install_session_keyring_to_cred() fails
` [PATCH 07/23] KEYS: encrypted: avoid encrypting/decrypting stack buffers
` [PATCH 08/23] KEYS: encrypted: fix buffer overread in valid_master_desc()
` [PATCH 09/23] KEYS: encrypted: fix race causing incorrect HMAC calculations
` [PATCH 10/23] KEYS: encrypted: use constant-time HMAC comparison
` [PATCH 11/23] KEYS: fix dereferencing NULL payload with nonzero length
` [PATCH 12/23] KEYS: fix freeing uninitialized memory in key_update()
` [PATCH 13/23] KEYS: sanitize add_key() and keyctl() key payloads
` [PATCH 14/23] KEYS: user_defined: sanitize "
` [PATCH 15/23] KEYS: encrypted: sanitize all key material
` [PATCH 16/23] KEYS: trusted: "
` [PATCH 17/23] KEYS: sanitize key structs before freeing
` [PATCH 18/23] KEYS: DH: forbid using digest_null as the KDF hash
` [PATCH 19/23] KEYS: DH: don't feed uninitialized "otherinfo" into KDF
` [PATCH 20/23] KEYS: DH: ensure the KDF counter is properly aligned
` [PATCH 21/23] KEYS: DH: add __user annotations to keyctl_kdf_params
` [PATCH 22/23] crypto : asymmetric_keys : verify_pefile:zero memory content before freeing
` [PATCH 23/23] KEYS: Convert KEYCTL_DH_COMPUTE to use the crypto KPP API
[PATCH] security: selinux: use kmem_cache for ebitmap
2017-06-07 13:50 UTC (3+ messages)
[PATCH] net/ipv6: Fix CALIPSO causing GPF with datagram support
2017-06-06 19:19 UTC (5+ messages)
[RFC v5 PATCH 0/4] NOT FOR MERGE - ro protection for dynamic data
2017-06-06 18:24 UTC (5+ messages)
` [PATCH 1/4] LSM: Convert security_hook_heads into explicit array of struct list_head
` [PATCH 2/4] Protectable Memory Allocator
` [PATCH 3/4] Protectable Memory Allocator - Debug interface
` [PATCH 4/4] Make LSM Writable Hooks a command line option
[PATCH] procfs: add smack subdir to attrs
2017-06-06 14:45 UTC (5+ messages)
[PATCH 0/7] IMA: new parser for ima_restore_measurement_list()
2017-06-06 13:23 UTC (13+ messages)
` [PATCH 1/7] ima: introduce ima_parse_buf()
` [Linux-ima-devel] "
` [PATCH 5/7] ima: add securityfs interface to save a measurements list with kexec header
` [Linux-ima-devel] "
` [PATCH 6/7] ima: add securityfs interface to restore a measurements list
` [Linux-ima-devel] "
[RFC 0/3] WhiteEgret LSM module
2017-06-06 9:28 UTC (15+ messages)
No subject
2017-06-06 7:19 UTC
[PATCH v2] KEYS: Convert KEYCTL_DH_COMPUTE to use the crypto KPP API
2017-06-06 0:33 UTC (4+ messages)
[PATCH v1 1/1] Add Trusted Path Execution as a stackable LSM
2017-06-05 15:30 UTC (9+ messages)
` [kernel-hardening] "
` [kernel-hardening] "
[RFC 1/3] WhiteEgret: Add WhiteEgret core functions
2017-06-05 8:39 UTC (5+ messages)
security/keys: add CONFIG_KEYS_COMPAT to Kconfig
2017-06-05 3:34 UTC (4+ messages)
fix IMA deadlock
2017-06-05 1:57 UTC (6+ messages)
` [PATCH] security/ima: use fs method to read integrity data
[PATCH v6 0/3] Extend the vTPM proxy driver to pass locality
2017-06-04 20:09 UTC (9+ messages)
` [PATCH v6 2/3] tpm: vtpm_proxy: Implement request_locality function
[PATCH 00/12] Delete CURRENT_TIME, CURRENT_TIME_SEC and current_fs_time
2017-06-04 7:54 UTC (16+ messages)
` [PATCH 04/12] fs: ceph: CURRENT_TIME with ktime_get_real_ts()
[PATCH v7 0/2] security: tty: make TIOCSTI ioctl require CAP_SYS_ADMIN
2017-06-04 6:29 UTC (6+ messages)
` [PATCH v7 2/2] "
` [kernel-hardening] "
[kernel-hardening] Re: [PATCH v7 2/2] security: tty: make TIOCSTI ioctl require CAP_SYS_ADMIN
2017-06-04 3:37 UTC (24+ messages)
[RFC PATCH V2 0/4] capabilities: do not audit log BPRM_FCAPS on set*id
2017-06-02 19:30 UTC (4+ messages)
[PATCH v2] KEYS: sanitize add_key() and keyctl() key payloads
2017-06-02 17:25 UTC
[PATCH 1/5] KEYS: sanitize add_key() and keyctl() key payloads
2017-06-02 17:24 UTC (4+ messages)
` [PATCH 0/5] KEYS: sanitize "
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).