November 2019 Archives by thread
Starting: Fri Nov 1 09:34:18 UTC 2019
Ending: Sat Nov 30 23:05:02 UTC 2019
Messages: 382
- [Patch v3 6/7] doc: keys: Document usage of TEE based Trusted Keys
Sumit Garg
- [PATCH linux-kselftest/test v1] apparmor: add AppArmor KUnit tests for policy unpack
Alan Maguire
- [PATCH v23 12/24] x86/sgx: Linux Enclave Driver
Stephen Smalley
- [RFC PATCH 04/10] pipe: Use head and tail pointers for the ring, not cursor and length [ver #2]
David Howells
- Contact Money Gram international service-Benin to receive your payment funds US$2.500,000 Million
Mary Coster, I.M.F director-Benin
- [RFC PATCH 00/11] pipe: Notification queue preparation [ver #3]
David Howells
- tracefs splats in lockdown=confidentiality mode
dann frazier
- [RFC PATCH 11/10] pipe: Add fsync() support [ver #2]
Linus Torvalds
- [RFC PATCH 07/10] pipe: Conditionalise wakeup in pipe_read() [ver #2]
Konstantin Khlebnikov
- [RFC PATCH 04/10] pipe: Use head and tail pointers for the ring, not cursor and length [ver #2]
Matthew Wilcox
- kernel panic while using get_random_bytes
Temp Sha
- [PATCH bpf-next v13 0/7] Landlock LSM
Mickaël Salaün
- [PATCH bpf-next v13 1/7] bpf, landlock: Define an eBPF program type for Landlock hooks
Mickaël Salaün
- [PATCH bpf-next v13 2/7] landlock: Add the management of domains
Mickaël Salaün
- [PATCH bpf-next v13 3/7] landlock, seccomp: Apply Landlock programs to process hierarchy
Mickaël Salaün
- [PATCH bpf-next v13 4/7] landlock: Add ptrace LSM hooks
Mickaël Salaün
- [PATCH bpf-next v13 5/7] bpf, landlock: Add task_landlock_ptrace_ancestor() helper
Mickaël Salaün
- [PATCH bpf-next v13 6/7] bpf, landlock: Add tests for the Landlock ptrace program type
Mickaël Salaün
- [PATCH bpf-next v13 7/7] landlock: Add user and kernel documentation for Landlock
Mickaël Salaün
- Business Proposal - Please Reply
Yuval
- [PATCH v14 4/5] overlayfs: internal getxattr operations without sepolicy checking
Mark Salyzyn
- [PATCH v14 1/5] Add flags option to get xattr method paired to __vfs_getxattr
Mark Salyzyn
- [PATCH v15 2/4] overlayfs: handle XATTR_NOSECURITY flag for get xattr method
Mark Salyzyn
- [PATCH v15 3/4] overlayfs: internal getxattr operations without sepolicy checking
Mark Salyzyn
- Investment opportunity
Peter Wong
- kernel panic while using get_random_bytes
Ondrej Mosnacek
- [PATCH v23 12/24] x86/sgx: Linux Enclave Driver
Jarkko Sakkinen
- [PATCH linux-kselftest/test v1] apparmor: add AppArmor KUnit tests for policy unpack
Mike Salvatore
- [PATCH linux-kselftest/test v1] apparmor: add AppArmor KUnit tests for policy unpack
Brendan Higgins
- [PATCH linux-kselftest/test v2] apparmor: add AppArmor KUnit tests for policy unpack
Brendan Higgins
- [PATCH v10 00/25] LSM: Module stacking for AppArmor
James Morris
- [PATCH] security/keyring: avoid pagefaults in keyring_read_iterator
Chris von Recklinghausen
- [PATCH v4 0/10] KEYS: Measure keys when they are created or updated
Lakshmi Ramasubramanian
- [PATCH v4 04/10] IMA: Read keyrings= option from the IMA policy into ima_rule_entry
Lakshmi Ramasubramanian
- [PATCH v4 07/10] IMA: Added a boolean flag to track IMA initialization status
Lakshmi Ramasubramanian
- [PATCH v4 08/10] IMA: Defined functions to queue and dequeue keys for measurement
Lakshmi Ramasubramanian
- [PATCH v4 09/10] IMA: Call queue and dequeue functions to measure keys
Lakshmi Ramasubramanian
- [PATCH 18/30] acpi: Disable APEI error injection if the kernel is locked down
Joey Lee
- [RFC PATCH 00/14] pipe: Keyrings, Block and USB notifications [ver #2]
David Howells
- Investment opportunity
Peter Wong
- [pipe] d60337eff1: phoronix-test-suite.noise-level.0.activity_level 144.0% improvement
Linus Torvalds
- Zdravstvujte! Vas interesujut bazy dannyh dlja prodazhi Vashih tovarov i uslug?
prodawez at teleworm.us
- Seeking Investment Opportunities
Simon Oliver
- [PATCH] x86/mtrr: only administrator can read the configurations.
Kees Cook
- [PATCH v5 0/10] KEYS: Measure keys when they are created or updated
Lakshmi Ramasubramanian
- [PATCH v5 01/10] IMA: Added KEYRING_CHECK func in IMA policy to measure keys
Lakshmi Ramasubramanian
- [PATCH v5 02/10] IMA: Added keyrings= option in IMA policy to only measure keys added to the specified keyrings.
Lakshmi Ramasubramanian
- [PATCH v5 04/10] IMA: Updated IMA policy functions to return keyrings option read from the policy
Lakshmi Ramasubramanian
- [PATCH v5 05/10] IMA: Measure key if the IMA policy allows measurement for the keyring to which the key is linked to
Lakshmi Ramasubramanian
- [PATCH v5 06/10] IMA: Defined an IMA hook to measure keys on key create or update
Lakshmi Ramasubramanian
- [PATCH v5 07/10] KEYS: Call the IMA hook to measure key when a new key is created or an existing key is updated
Lakshmi Ramasubramanian
- [PATCH v5 08/10] IMA: Added a flag to determine whether IMA hook can process the key now or has to queue for processing later
Lakshmi Ramasubramanian
- [PATCH v5 09/10] IMA: Defined functions to queue and dequeue keys for measurement
Lakshmi Ramasubramanian
- [PATCH v5 10/10] IMA: Call queue and dequeue functions to measure keys.
Lakshmi Ramasubramanian
- WARNING in aa_sock_msg_perm (2)
syzbot
- [PATCH] tpm_tis: Move setting of TPM_CHIP_FLAG_IRQ into tpm_tis_probe_irq_single
Stefan Berger
- [PATCH v10 00/25] LSM: Module stacking for AppArmor
Casey Schaufler
- [PATCH v10 00/25] LSM: Module stacking for AppArmor
Casey Schaufler
- Investment opportunity
Peter Wong
- [PATCH v2] tomoyo: Don't check open/getattr permission on sockets.
Tetsuo Handa
- [PATCH v11 00/25] LSM: Module stacking for AppArmor
Casey Schaufler
- [PATCH v11 00/25] LSM: Module stacking for AppArmor
Casey Schaufler
- [PATCH v11 00/25] LSM: Module stacking for AppArmor
Casey Schaufler
- [PATCH v11 00/25] LSM: Module stacking for AppArmor
Casey Schaufler
- [PATCH v11 18/25] LSM: security_secid_to_secctx in netlink netfilter
Casey Schaufler
- [PATCH v6 0/3] KEYS: Measure keys when they are created or updated
Lakshmi Ramasubramanian
- [PATCH v7 0/5] KEYS: Measure keys when they are created or updated
Lakshmi Ramasubramanian
- [PATCH v7 5/5] IMA: Read keyrings= option from the IMA policy
Lakshmi Ramasubramanian
- Investment opportunity
Peter Wong
- [PATCH -next] x86/efi: remove unused variables
YueHaibing
- [pipe] d60337eff1: BUG:kernel_NULL_pointer_dereference,address
David Howells
- Investment opportunity
Peter Wong
- [PATCH] x86/mtrr: Require CAP_SYS_ADMIN for all access
Kees Cook
- [PATCH] efi: Only print errors about failing to get certs if EFI vars are found
Javier Martinez Canillas
- [PATCH v2] efi: Only print errors about failing to get certs if EFI vars are found
Javier Martinez Canillas
- [PATCH] security: Fix Kconfig indentation
Krzysztof Kozlowski
- [PATCH] Smack: check length in smk_set_cipso()
Denis Efremov
- [PATCH v2] security: Fix Kconfig indentation
Krzysztof Kozlowski
- [PATCH v5 15/27] nfs: get rid of ->set_security()
James Morris
- [RFC PATCH 2/2] selinux: fall back to ref-walk upon LSM_AUDIT_DATA_DENTRY too
Paul Moore
- [PATCH AUTOSEL 4.19 205/219] apparmor: delete the dentry in aafs_remove() to avoid a leak
Sasha Levin
- [PATCH AUTOSEL 4.14 120/127] apparmor: delete the dentry in aafs_remove() to avoid a leak
Sasha Levin
- general protection fault in __schedule (2)
syzbot
- [PATCH 1/2] selinux: revert "stop passing MAY_NOT_BLOCK to the AVC upon follow_link"
Stephen Smalley
- [PATCH v11 02/25] LSM: Create and manage the lsmblob data structure.
Tetsuo Handa
- [GIT PULL] pipe: Notification queue preparation
David Howells
- [PATCH 0/2] Revert patches fixing probing of interrupts
Stefan Berger
- [PATCH 1/2] tpm: Revert "tpm_tis_core: Set TPM_CHIP_FLAG_IRQ before probing for interrupts"
Stefan Berger
- [GIT PULL] SELinux patches for v5.5
Paul Moore
- [GIT PULL] pipe: General notification queue
David Howells
- [RFC PATCH v2] security,lockdown,selinux: implement SELinux lockdown
Stephen Smalley
- [PATCH v23 12/24] x86/sgx: Linux Enclave Driver
Greg KH
- general protection fault in smack_socket_sendmsg (2)
syzbot
- [PATCH v24 12/24] x86/sgx: Linux Enclave Driver
Jarkko Sakkinen
- [PATCH v24 15/24] x86/sgx: Add provisioning
Jarkko Sakkinen
- [PATCH] Kernel Lockdown: Add an option to allow raw MSR access even, in confidentiality mode.
Kees Cook
Last message date:
Sat Nov 30 23:05:02 UTC 2019
Archived on: Sat Nov 30 23:05:18 UTC 2019
This archive was generated by
Pipermail 0.09 (Mailman edition).