messages from 2019-04-05 14:00:18 to 2019-04-09 23:35:17 UTC [more...]
[PATCH v3 bpf-next 00/21] bpf: Sysctl hook
2019-04-09 23:34 UTC (8+ messages)
[PATCH 1/1] Smack: Create smack_rule cache to optimize memory usage
2019-04-09 23:30 UTC (2+ messages)
[PATCH 1/1] Smack :- In this patch, global rule list has been removed. Now all smack rules will be read using "smack_known_list". This list contains all the smack labels and internally each smack label structure maintains the list of smack rules corresponding to that smack label. So there is no need to maintain extra list
2019-04-09 23:29 UTC (2+ messages)
[ANNOUNCE][CFP] Linux Security Summit North America 2019
2019-04-09 22:34 UTC
[PATCH 00/59] LSM: Module stacking for AppArmor
2019-04-09 21:39 UTC (60+ messages)
` [PATCH 01/59] LSM: Infrastructure management of the superblock
` [PATCH 02/59] LSM: Infrastructure management of the sock security
` [PATCH 03/59] LSM: Infrastructure management of the key security blob
` [PATCH 04/59] LSM: Create an lsm_export data structure
` [PATCH 05/59] LSM: Use lsm_export in the inode_getsecid hooks
` [PATCH 06/59] LSM: Use lsm_export in the cred_getsecid hooks
` [PATCH 07/59] LSM: Use lsm_export in the ipc_getsecid and task_getsecid hooks
` [PATCH 08/59] LSM: Use lsm_export in the kernel_ask_as hooks
` [PATCH 09/59] LSM: Use lsm_export in the getpeersec_dgram hooks
` [PATCH 10/59] LSM: Use lsm_export in the audit_rule_match hooks
` [PATCH 11/59] LSM: Fix logical operation in lsm_export checks
` [PATCH 12/59] LSM: Use lsm_export in the secid_to_secctx hooks
` [PATCH 13/59] LSM: Use lsm_export in the secctx_to_secid hooks
` [PATCH 14/59] LSM: Use lsm_export in security_audit_rule_match
` [PATCH 15/59] LSM: Use lsm_export in security_kernel_act_as
` [PATCH 16/59] LSM: Use lsm_export in security_socket_getpeersec_dgram
` [PATCH 17/59] LSM: Use lsm_export in security_secctx_to_secid
` [PATCH 18/59] LSM: Use lsm_export in security_secid_to_secctx
` [PATCH 19/59] LSM: Use lsm_export in security_ipc_getsecid
` [PATCH 20/59] LSM: Use lsm_export in security_task_getsecid
` [PATCH 21/59] LSM: Use lsm_export in security_inode_getsecid
` [PATCH 22/59] LSM: Use lsm_export in security_cred_getsecid
` [PATCH 23/59] Audit: Change audit_sig_sid to audit_sig_lsm
` [PATCH 24/59] Audit: Convert target_sid to an lsm_export structure
` [PATCH 25/59] Audit: Convert osid "
` [PATCH 26/59] IMA: Clean out lsm_export scaffolding
` [PATCH 27/59] NET: Store LSM access information in the socket blob for UDS
` [PATCH 28/59] NET: Remove scaffolding on secmarks
` [PATCH 29/59] NET: Remove scaffolding on new secmarks
` [PATCH 30/59] NET: Remove netfilter scaffolding for lsm_export
` [PATCH 31/59] Netlabel: Replace secids with lsm_export
` [PATCH 32/59] LSM: Remove lsm_export scaffolding functions
` [PATCH 33/59] IMA: FIXUP prototype using lsm_export
` [PATCH 34/59] Smack: Restore the release_secctx hook
` [PATCH 35/59] AppArmor: Remove unnecessary hook stub
` [PATCH 36/59] LSM: Limit calls to certain module hooks
` [PATCH 37/59] LSM: Create a data structure for a security context
` [PATCH 38/59] LSM: Use lsm_context in secid_to_secctx hooks
` [PATCH 39/59] LSM: Use lsm_context in secctx_to_secid hooks
` [PATCH 40/59] LSM: Use lsm_context in inode_getsecctx hooks
` [PATCH 41/59] LSM: Use lsm_context in inode_notifysecctx hooks
` [PATCH 42/59] LSM: Use lsm_context in dentry_init_security hooks
` [PATCH 43/59] LSM: Use lsm_context in security_dentry_init_security
` [PATCH 44/59] LSM: Use lsm_context in security_inode_notifysecctx
` [PATCH 45/59] LSM: Use lsm_context in security_inode_getsecctx
` [PATCH 46/59] LSM: Use lsm_context in security_secctx_to_secid
` [PATCH 47/59] LSM: Use lsm_context in release_secctx hooks
` [PATCH 48/59] LSM: Use lsm_context in security_release_secctx
` [PATCH 49/59] LSM: Use lsm_context in security_secid_to_secctx
` [PATCH 50/59] fs: remove lsm_context scaffolding
` [PATCH 51/59] LSM: Add the release function to the lsm_context
` [PATCH 52/59] LSM: Use lsm_context in inode_setsecctx hooks
` [PATCH 53/59] LSM: Use lsm_context in security_inode_setsecctx
` [PATCH 54/59] kernfs: remove lsm_context scaffolding
` [PATCH 55/59] LSM: Remove unused macro
` [PATCH 56/59] LSM: Special handling for secctx lsm hooks
` [PATCH 57/59] SELinux: Use blob offset in current_sid
` [PATCH 58/59] LSM: Specify which LSM to display with /proc/self/attr/display
` [PATCH 59/59] AppArmor: Remove the exclusive flag
Sorry about duplicates on the stacking patches
2019-04-09 21:46 UTC
[PATCH] apparmor: Restore Y/N in /sys for apparmor's "enabled"
2019-04-09 21:17 UTC (11+ messages)
[PATCH 00/59] LSM: Module stacking for AppArmor
2019-04-09 19:59 UTC (41+ messages)
` [PATCH 01/59] LSM: Infrastructure management of the superblock
` [PATCH 02/59] LSM: Infrastructure management of the sock security
` [PATCH 03/59] LSM: Infrastructure management of the key security blob
` [PATCH 04/59] LSM: Create an lsm_export data structure
` [PATCH 05/59] LSM: Use lsm_export in the inode_getsecid hooks
` [PATCH 06/59] LSM: Use lsm_export in the cred_getsecid hooks
` [PATCH 07/59] LSM: Use lsm_export in the ipc_getsecid and task_getsecid hooks
` [PATCH 08/59] LSM: Use lsm_export in the kernel_ask_as hooks
` [PATCH 09/59] LSM: Use lsm_export in the getpeersec_dgram hooks
` [PATCH 10/59] LSM: Use lsm_export in the audit_rule_match hooks
` [PATCH 11/59] LSM: Fix logical operation in lsm_export checks
` [PATCH 12/59] LSM: Use lsm_export in the secid_to_secctx hooks
` [PATCH 13/59] LSM: Use lsm_export in the secctx_to_secid hooks
` [PATCH 14/59] LSM: Use lsm_export in security_audit_rule_match
` [PATCH 15/59] LSM: Use lsm_export in security_kernel_act_as
` [PATCH 16/59] LSM: Use lsm_export in security_socket_getpeersec_dgram
` [PATCH 17/59] LSM: Use lsm_export in security_secctx_to_secid
` [PATCH 18/59] LSM: Use lsm_export in security_secid_to_secctx
` [PATCH 19/59] LSM: Use lsm_export in security_ipc_getsecid
` [PATCH 20/59] LSM: Use lsm_export in security_task_getsecid
` [PATCH 21/59] LSM: Use lsm_export in security_inode_getsecid
` [PATCH 22/59] LSM: Use lsm_export in security_cred_getsecid
` [PATCH 23/59] Audit: Change audit_sig_sid to audit_sig_lsm
` [PATCH 24/59] Audit: Convert target_sid to an lsm_export structure
` [PATCH 25/59] Audit: Convert osid "
` [PATCH 26/59] IMA: Clean out lsm_export scaffolding
` [PATCH 27/59] NET: Store LSM access information in the socket blob for UDS
` [PATCH 28/59] NET: Remove scaffolding on secmarks
` [PATCH 29/59] NET: Remove scaffolding on new secmarks
` [PATCH 30/59] NET: Remove netfilter scaffolding for lsm_export
` [PATCH 31/59] Netlabel: Replace secids with lsm_export
` [PATCH 32/59] LSM: Remove lsm_export scaffolding functions
` [PATCH 33/59] IMA: FIXUP prototype using lsm_export
` [PATCH 34/59] Smack: Restore the release_secctx hook
` [PATCH 35/59] AppArmor: Remove unnecessary hook stub
` [PATCH 36/59] LSM: Limit calls to certain module hooks
` [PATCH 37/59] LSM: Create a data structure for a security context
` [PATCH 38/59] LSM: Use lsm_context in secid_to_secctx hooks
` [PATCH 39/59] LSM: Use lsm_context in secctx_to_secid hooks
` [PATCH 40/59] LSM: Use lsm_context in inode_getsecctx hooks
[PATCH 00/59] LSM: Module stacking for AppArmor
2019-04-09 19:18 UTC (48+ messages)
` [PATCH 01/59] LSM: Infrastructure management of the superblock
` [PATCH 02/59] LSM: Infrastructure management of the sock security
` [PATCH 03/59] LSM: Infrastructure management of the key security blob
` [PATCH 04/59] LSM: Create an lsm_export data structure
` [PATCH 05/59] LSM: Use lsm_export in the inode_getsecid hooks
` [PATCH 06/59] LSM: Use lsm_export in the cred_getsecid hooks
` [PATCH 07/59] LSM: Use lsm_export in the ipc_getsecid and task_getsecid hooks
` [PATCH 08/59] LSM: Use lsm_export in the kernel_ask_as hooks
` [PATCH 09/59] LSM: Use lsm_export in the getpeersec_dgram hooks
` [PATCH 10/59] LSM: Use lsm_export in the audit_rule_match hooks
` [PATCH 11/59] LSM: Fix logical operation in lsm_export checks
` [PATCH 12/59] LSM: Use lsm_export in the secid_to_secctx hooks
` [PATCH 13/59] LSM: Use lsm_export in the secctx_to_secid hooks
` [PATCH 14/59] LSM: Use lsm_export in security_audit_rule_match
` [PATCH 15/59] LSM: Use lsm_export in security_kernel_act_as
` [PATCH 16/59] LSM: Use lsm_export in security_socket_getpeersec_dgram
` [PATCH 17/59] LSM: Use lsm_export in security_secctx_to_secid
` [PATCH 18/59] LSM: Use lsm_export in security_secid_to_secctx
` [PATCH 19/59] LSM: Use lsm_export in security_ipc_getsecid
` [PATCH 20/59] LSM: Use lsm_export in security_task_getsecid
` [PATCH 21/59] LSM: Use lsm_export in security_inode_getsecid
` [PATCH 22/59] LSM: Use lsm_export in security_cred_getsecid
` [PATCH 23/59] Audit: Change audit_sig_sid to audit_sig_lsm
` [PATCH 24/59] Audit: Convert target_sid to an lsm_export structure
` [PATCH 25/59] Audit: Convert osid "
` [PATCH 26/59] IMA: Clean out lsm_export scaffolding
` [PATCH 27/59] NET: Store LSM access information in the socket blob for UDS
` [PATCH 28/59] NET: Remove scaffolding on secmarks
` [PATCH 29/59] NET: Remove scaffolding on new secmarks
` [PATCH 30/59] NET: Remove netfilter scaffolding for lsm_export
` [PATCH 31/59] Netlabel: Replace secids with lsm_export
` [PATCH 32/59] LSM: Remove lsm_export scaffolding functions
` [PATCH 33/59] IMA: FIXUP prototype using lsm_export
` [PATCH 34/59] Smack: Restore the release_secctx hook
` [PATCH 35/59] AppArmor: Remove unnecessary hook stub
` [PATCH 36/59] LSM: Limit calls to certain module hooks
` [PATCH 37/59] LSM: Create a data structure for a security context
` [PATCH 38/59] LSM: Use lsm_context in secid_to_secctx hooks
` [PATCH 39/59] LSM: Use lsm_context in secctx_to_secid hooks
` [PATCH 40/59] LSM: Use lsm_context in inode_getsecctx hooks
` [PATCH 41/59] LSM: Use lsm_context in inode_notifysecctx hooks
` [PATCH 42/59] LSM: Use lsm_context in dentry_init_security hooks
` [PATCH 43/59] LSM: Use lsm_context in security_dentry_init_security
` [PATCH 44/59] LSM: Use lsm_context in security_inode_notifysecctx
` [PATCH 45/59] LSM: Use lsm_context in security_inode_getsecctx
` [PATCH 46/59] LSM: Use lsm_context in security_secctx_to_secid
` [PATCH 47/59] LSM: Use lsm_context in release_secctx hooks
[PATCH v3 0/2] RFC: introduce CONFIG_INIT_ALL_MEMORY
2019-04-09 17:06 UTC (12+ messages)
` [PATCH v3 1/2] initmem: introduce CONFIG_INIT_ALL_MEMORY and CONFIG_INIT_ALL_STACK
` [PATCH v3 2/2] initmem: introduce CONFIG_INIT_ALL_HEAP
[PATCH v2 0/2] RFC: introduce CONFIG_INIT_ALL_MEMORY
2019-04-09 17:01 UTC (11+ messages)
` [PATCH v2 1/2] initmem: introduce CONFIG_INIT_ALL_MEMORY and CONFIG_INIT_ALL_STACK
` [PATCH v2 2/2] initmem: introduce CONFIG_INIT_ALL_HEAP
[PATCH v19 17/27] x86/sgx: Add provisioning
2019-04-09 13:37 UTC (12+ messages)
[GIT PULL] TPM fixes for v5.1
2019-04-09 3:15 UTC (2+ messages)
[GIT PULL] tpmdd fixes for Linux v5.1
2019-04-08 22:13 UTC (4+ messages)
[REGRESSION] AppArmor module parameter layout changed with c5459b829b716
2019-04-08 15:02 UTC (2+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).