linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2019-06-04 16:35:34 to 2019-06-10 15:06:18 UTC [more...]

[RFC PATCH v2 0/5] security: x86/sgx: SGX vs. LSM
 2019-06-10 15:06 UTC  (13+ messages)
` [RFC PATCH v2 1/5] mm: Introduce vm_ops->may_mprotect()
` [RFC PATCH v2 2/5] x86/sgx: Require userspace to define enclave pages' protection bits
` [RFC PATCH v2 3/5] x86/sgx: Enforce noexec filesystem restriction for enclaves
` [RFC PATCH v2 4/5] LSM: x86/sgx: Introduce ->enclave_load() hook for Intel SGX
` [RFC PATCH v2 5/5] security/selinux: Add enclave_load() implementation
` [RFC PATCH v1 0/3] security/x86/sgx: SGX specific LSM hooks
  ` [RFC PATCH v1 1/3] LSM/x86/sgx: Add "
  ` [RFC PATCH v1 2/3] LSM/x86/sgx: Implement SGX specific hooks in SELinux
  ` [RFC PATCH v1 3/3] LSM/x86/sgx: Call new LSM hooks from SGX subsystem

[PATCH 00/58] LSM: Module stacking for AppArmor
 2019-06-10 10:20 UTC  (17+ messages)
` [PATCH 35/58] LSM: Limit calls to certain module hooks

[PATCH 1/2] LSM: switch to blocking policy update notifiers
 2019-06-09 17:06 UTC  (13+ messages)
` [PATCH 2/2] ima: use the lsm policy update notifier

KASAN: use-after-free Read in tomoyo_realpath_from_path
 2019-06-09  6:41 UTC  (5+ messages)
  ` [PATCH] tomoyo: Don't check open/getattr permission on sockets

[RFC][PATCH 00/13] Mount, FS, Block and Keyrings notifications [ver #4]
 2019-06-09  4:35 UTC  (18+ messages)
` [PATCH 01/13] security: Override creds in __fput() with last fputter's creds "
` [PATCH 02/13] uapi: General notification ring definitions "
` [PATCH 03/13] security: Add hooks to rule on setting a watch "
` [PATCH 04/13] security: Add a hook for the point of notification insertion "
` [PATCH 05/13] General notification queue with user mmap()'able ring buffer "
` [PATCH 06/13] keys: Add a notification facility "
` [PATCH 07/13] vfs: Add a mount-notification "
` [PATCH 08/13] vfs: Add superblock notifications "
` [PATCH 09/13] fsinfo: Export superblock notification counter "
` [PATCH 10/13] Add a general, global device notification watch list "
` [PATCH 11/13] block: Add block layer notifications "
` [PATCH 12/13] usb: Add USB subsystem "
` [PATCH 13/13] Add sample notification program "

[PATCH v3 18/33] docs: netlabel: convert docs to ReST and rename to *.rst
 2019-06-09  2:27 UTC 

[RFC PATCH v3 0/1] Add dm verity root hash pkcs7 sig validation
 2019-06-08  9:11 UTC  (4+ messages)
` [RFC PATCH v3 1/1] "

[PATCH 0/1 v2] Add dm verity root hash pkcs7 sig validation
 2019-06-07 19:36 UTC  (3+ messages)
` [PATCH 1/1 "

[PATCH] x86/ima: fix the Kconfig dependency for IMA_ARCH_POLICY
 2019-06-07 19:12 UTC 

[GIT PULL] apparmor bug fixes for v5.3-rc4
 2019-06-07 16:40 UTC  (2+ messages)

[PATCH v6 1/3] mm: security: introduce init_on_alloc=1 and init_on_free=1 boot options
 2019-06-07 15:42 UTC  (6+ messages)
` [PATCH v6 2/3] mm: init: report memory auto-initialization features at boot time
` [PATCH v6 3/3] lib: introduce test_meminit module

[PATCH v3 0/2] ima/evm fixes for v5.2
 2019-06-07 15:25 UTC  (11+ messages)
` [PATCH v3 1/2] evm: add option to set a random HMAC key at early boot
` [PATCH v3 2/2] ima: add enforce-evm and log-evm modes to strictly check EVM status

[RFC][PATCH 00/10] Mount, FS, Block and Keyrings notifications [ver #3]
 2019-06-07 14:37 UTC  (41+ messages)
` [PATCH 01/10] security: Override creds in __fput() with last fputter's creds "
` [PATCH 02/10] General notification queue with user mmap()'able ring buffer "
` [PATCH 03/10] keys: Add a notification facility "
` [PATCH 04/10] vfs: Add a mount-notification "
` [PATCH 05/10] vfs: Add superblock notifications "
` [PATCH 06/10] fsinfo: Export superblock notification counter "
` [PATCH 07/10] Add a general, global device notification watch list "
` [PATCH 08/10] block: Add block layer notifications "
` [PATCH 09/10] usb: Add USB subsystem "
` [PATCH 10/10] Add sample notification program "

[PATCH v7 0/3] add new ima hook ima_kexec_cmdline to measure kexec boot cmdline args
 2019-06-07  0:23 UTC  (4+ messages)
` [PATCH v7 1/3] Add a new ima hook ima_kexec_cmdline to measure "
` [PATCH v7 2/3] add a new ima template field buf
` [PATCH v7 3/3] call ima_kexec_cmdline to measure the cmdline args

[PATCH 00/58] LSM: Module stacking for AppArmor
 2019-06-06 22:53 UTC  (13+ messages)
` [PATCH 05/58] LSM: Use lsm_export in the inode_getsecid hooks
` [PATCH 22/58] Audit: Change audit_sig_sid to audit_sig_lsm

[RFC PATCH 0/9] security: x86/sgx: SGX vs. LSM
 2019-06-06 15:37 UTC  (42+ messages)
` [RFC PATCH 2/9] x86/sgx: Do not naturally align MAP_FIXED address
` [RFC PATCH 3/9] x86/sgx: Allow userspace to add multiple pages in single ioctl()
` [RFC PATCH 6/9] x86/sgx: Require userspace to provide allowed prots to ADD_PAGES
` [RFC PATCH 7/9] x86/sgx: Enforce noexec filesystem restriction for enclaves
` [RFC PATCH 8/9] LSM: x86/sgx: Introduce ->enclave_load() hook for Intel SGX

[RFC][PATCH 0/8] Mount, FS, Block and Keyrings notifications [ver #2]
 2019-06-05 21:06 UTC  (31+ messages)
` [PATCH 1/8] security: Override creds in __fput() with last fputter's creds "
` [PATCH 3/8] keys: Add a notification facility "
` [PATCH 4/8] vfs: Add a mount-notification "
` [PATCH 5/8] vfs: Add superblock notifications "
` [PATCH 6/8] fsinfo: Export superblock notification counter "
` [PATCH 7/8] block: Add block layer notifications "
` [PATCH 8/8] Add sample notification program "
    ` Rational model for UID based controls

[RFC 0/1] Add dm verity root hash pkcs7 sig validation
 2019-06-05 16:42 UTC  (3+ messages)
` [RFC 1/1] "

[PATCH v5 2/3] mm: init: report memory auto-initialization features at boot time
 2019-06-05  2:58 UTC  (7+ messages)

possible deadlock in get_user_pages_unlocked (2)
 2019-06-05  1:16 UTC 

possible deadlock in __do_page_fault (2)
 2019-06-04 20:08 UTC  (2+ messages)

possible deadlock in __do_page_fault (2)
 2019-06-04 20:07 UTC 

security/loadpin: Allow to exclude specific file types
 2019-06-04 17:01 UTC  (6+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).