messages from 2021-01-21 09:19:33 to 2021-01-29 19:19:24 UTC [more...]
[PATCH v2 1/1] process_madvise.2: Add process_madvise man page
2021-01-29 19:17 UTC (2+ messages)
general protection fault in tomoyo_socket_sendmsg_permission
2021-01-29 17:08 UTC (5+ messages)
[PATCH v2] selinux: measure state and policy capabilities
2021-01-29 16:49 UTC
[PATCH 1/1] process_madvise.2: Add process_madvise man page
2021-01-29 7:15 UTC (7+ messages)
[PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
2021-01-29 7:08 UTC (4+ messages)
[PATCH] smackfs: restrict bytes count in smackfs write functions
2021-01-29 2:10 UTC (8+ messages)
` [PATCH v2] "
[PATCH v5 0/4] Add EFI_CERT_X509_GUID support for dbx/mokx entries
2021-01-29 1:56 UTC (14+ messages)
` [PATCH v5 1/4] certs: Add EFI_CERT_X509_GUID support for dbx entries
` [PATCH v5 2/4] certs: Move load_system_certificate_list to a common function
` [PATCH v5 3/4] certs: Add ability to preload revocation certs
` [PATCH v5 4/4] integrity: Load mokx variables into the blacklist keyring
[PATCH 0/2] capability conversion fixes
2021-01-28 20:49 UTC (15+ messages)
` [PATCH 1/2] ecryptfs: fix uid translation for setxattr on security.capability
` [PATCH 2/2] security.capability: fix conversions on getxattr
[PATCH v4 00/10] Enable root to update the blacklist keyring
2021-01-28 18:00 UTC (14+ messages)
` [PATCH v4 01/10] tools/certs: Add print-cert-tbs-hash.sh
` [PATCH v4 02/10] certs: Check that builtin blacklist hashes are valid
` [PATCH v4 03/10] certs: Fix blacklisted hexadecimal hash string check
` [PATCH v4 04/10] certs: Fix blacklist flag type confusion
` [PATCH v4 05/10] certs: Replace K{U,G}IDT_INIT() with GLOBAL_ROOT_{U,G}ID
` [PATCH v4 06/10] certs: Make blacklist_vet_description() more strict
` [PATCH v4 07/10] certs/blacklist: fix kernel doc interface issue
` [PATCH v4 08/10] certs: Factor out the blacklist hash creation
` [PATCH v4 09/10] PKCS#7: Fix missing include
` [PATCH v4 10/10] certs: Allow root user to append signed hashes to the blacklist keyring
Migration to trusted keys: sealing user-provided key?
2021-01-28 17:31 UTC
[PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
2021-01-28 4:13 UTC (15+ messages)
[PATCH] selinux: measure state and policy capabilities
2021-01-28 3:33 UTC (4+ messages)
[PATCH v27 00/12] Landlock LSM
2021-01-27 19:57 UTC (16+ messages)
` [PATCH v27 01/12] landlock: Add object management
` [PATCH v27 02/12] landlock: Add ruleset and domain management
` [PATCH v27 03/12] landlock: Set up the security framework and manage credentials
` [PATCH v27 04/12] landlock: Add ptrace restrictions
` [PATCH v27 05/12] LSM: Infrastructure management of the superblock
` [PATCH v27 06/12] fs,security: Add sb_delete hook
` [PATCH v27 07/12] landlock: Support filesystem access-control
` [PATCH v27 08/12] landlock: Add syscall implementations
` [PATCH v27 09/12] arch: Wire up Landlock syscalls
` [PATCH v27 11/12] samples/landlock: Add a sandbox manager example
` [PATCH v27 12/12] landlock: Add user and kernel documentation
[PATCH v8 0/4] Introduce TEE based Trusted Keys support
2021-01-27 17:19 UTC (16+ messages)
` [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
[PATCH v24 00/25] LSM: Module stacking for AppArmor
2021-01-26 20:22 UTC (30+ messages)
` [PATCH v24 01/25] LSM: Infrastructure management of the sock security
` [PATCH v24 02/25] LSM: Add the lsmblob data structure
` [PATCH v24 03/25] LSM: provide lsm name and id slot mappings
` [PATCH v24 04/25] IMA: avoid label collisions with stacked LSMs
` [PATCH v24 05/25] LSM: Use lsmblob in security_audit_rule_match
` [PATCH v24 06/25] LSM: Use lsmblob in security_kernel_act_as
` [PATCH v24 07/25] LSM: Use lsmblob in security_secctx_to_secid
` [PATCH v24 08/25] LSM: Use lsmblob in security_secid_to_secctx
` [PATCH v24 09/25] LSM: Use lsmblob in security_ipc_getsecid
` [PATCH v24 10/25] LSM: Use lsmblob in security_task_getsecid
` [PATCH v24 11/25] LSM: Use lsmblob in security_inode_getsecid
` [PATCH v24 12/25] LSM: Use lsmblob in security_cred_getsecid
` [PATCH v24 13/25] IMA: Change internal interfaces to use lsmblobs
` [PATCH v24 14/25] LSM: Specify which LSM to display
` [PATCH v24 15/25] LSM: Ensure the correct LSM context releaser
` [PATCH v24 16/25] LSM: Use lsmcontext in security_secid_to_secctx
` [PATCH v24 17/25] LSM: Use lsmcontext in security_inode_getsecctx
` [PATCH v24 18/25] LSM: security_secid_to_secctx in netlink netfilter
` [PATCH v24 19/25] NET: Store LSM netlabel data in a lsmblob
` [PATCH v24 20/25] LSM: Verify LSM display sanity in binder
` [PATCH v24 21/25] audit: add support for non-syscall auxiliary records
` [PATCH v24 22/25] Audit: Add new record for multiple process LSM attributes
` [PATCH v24 23/25] Audit: Add a new record for multiple object "
` [PATCH v24 24/25] LSM: Add /proc attr entry for full LSM context
` [PATCH v24 25/25] AppArmor: Remove the exclusive flag
[PATCH v6 00/40] idmapped mounts
2021-01-27 5:50 UTC (70+ messages)
` [PATCH v6 01/40] mount: attach mappings to mounts
` [PATCH v6 02/40] fs: add id translation helpers
` [PATCH v6 03/40] fs: add file and path permissions helpers
` [PATCH v6 04/40] capability: handle idmapped mounts
` [PATCH v6 05/39] namei: make permission helpers idmapped mount aware
` [PATCH v6 06/40] inode: make init and "
` [PATCH v6 07/40] attr: handle idmapped mounts
` [PATCH v6 08/40] acl: "
` [PATCH v6 09/40] xattr: "
` [PATCH v6 10/40] commoncap: "
` [PATCH v6 11/40] stat: "
` [PATCH v6 12/40] namei: handle idmapped mounts in may_*() helpers
` [PATCH v6 13/40] namei: introduce struct renamedata
` [PATCH v6 14/40] namei: prepare for idmapped mounts
` [PATCH v6 15/40] open: handle idmapped mounts in do_truncate()
` [PATCH v6 16/40] open: handle idmapped mounts
` [PATCH v6 17/40] af_unix: "
` [PATCH v6 18/40] utimes: "
` [PATCH v6 19/40] fcntl: "
` [PATCH v6 20/40] init: "
` [PATCH v6 21/40] ioctl: "
` [PATCH v6 22/40] would_dump: "
` [PATCH v6 23/40] exec: "
` [PATCH v6 25/40] apparmor: "
` [PATCH v6 26/39] ima: "
` [PATCH v6 27/40] ecryptfs: do not mount on top of "
` [PATCH v6 28/40] overlayfs: "
` [PATCH v6 29/40] namespace: take lock_mount_hash() directly when changing flags
` [PATCH v6 30/40] mount: make {lock,unlock}_mount_hash() static
` [PATCH v6 31/40] namespace: only take read lock in do_reconfigure_mnt()
` [PATCH v6 32/40] fs: split out functions to hold writers
` [PATCH v6 33/40] fs: add attr_flags_to_mnt_flags helper
` [PATCH v6 34/40] fs: add mount_setattr()
` [PATCH v6 35/40] fs: introduce MOUNT_ATTR_IDMAP
` [PATCH v6 36/40] tests: add mount_setattr() selftests
` [PATCH v6 37/40] fat: handle idmapped mounts
` [PATCH v6 38/40] ext4: support "
` [PATCH v6 39/40] xfs: "
[PATCH] selinux: include a consumer of the new IMA critical data hook
2021-01-24 14:01 UTC (3+ messages)
[PATCH v5] proc: Allow pid_revalidate() during LOOKUP_RCU
2021-01-22 22:59 UTC
[PATCH] NFSv4.2: fix return value of _nfs4_get_security_label()
2021-01-22 19:23 UTC (2+ messages)
VSOCK & getpeercon()
2021-01-22 19:02 UTC (2+ messages)
[PATCH v3 00/10] Enable root to update the blacklist keyring
2021-01-21 15:21 UTC (7+ messages)
` [PATCH v3 08/10] certs: Check that builtin blacklist hashes are valid
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).