Linux-Security-Module Archive on lore.kernel.org
 help / color / Atom feed
[PATCH bpf-next 0/4] Generalizing bpf_local_storage
 2020-05-27 12:38 UTC  (9+ messages) - mbox.gz / Atom
` [PATCH bpf-next 1/4] bpf: Generalize bpf_sk_storage
` [PATCH bpf-next 2/4] bpf: Implement bpf_local_storage for inodes
` [PATCH bpf-next 3/4] bpf: Allow local storage to be used from LSM programs
` [PATCH bpf-next 4/4] bpf: Add selftests for local_storage

[PATCH v3 0/6] Enable as many KUnit tests as possible
 2020-05-27 11:49 UTC  (2+ messages) - mbox.gz / Atom

[PATCH v18 00/12] Landlock LSM
 2020-05-27  3:07 UTC  (14+ messages) - mbox.gz / Atom
` [PATCH v18 01/12] landlock: Add object management
` [PATCH v18 02/12] landlock: Add ruleset and domain management
` [PATCH v18 03/12] landlock: Set up the security framework and manage credentials
` [PATCH v18 04/12] landlock: Add ptrace restrictions
` [PATCH v18 05/12] LSM: Infrastructure management of the superblock
` [PATCH v18 06/12] fs,security: Add sb_delete hook
` [PATCH v18 07/12] landlock: Support filesystem access-control
` [PATCH v18 08/12] landlock: Add syscall implementation
` [PATCH v18 09/12] arch: Wire up landlock() syscall
` [PATCH v18 10/12] selftests/landlock: Add initial tests
` [PATCH v18 11/12] samples/landlock: Add a sandbox manager example
` [PATCH v18 12/12] landlock: Add user and kernel documentation

[RFC PATCH v3 00/12] Integrity Policy Enforcement LSM (IPE)
 2020-05-26 20:44 UTC  (7+ messages) - mbox.gz / Atom

[PATCH] capabilities: Introduce CAP_RESTORE
 2020-05-26 19:51 UTC  (14+ messages) - mbox.gz / Atom

general protection fault in tomoyo_check_acl
 2020-05-26 12:58 UTC  (2+ messages) - mbox.gz / Atom

[PATCH 0/3] fs: reduce export usage of kerne_read*() calls
 2020-05-24  2:52 UTC  (10+ messages) - mbox.gz / Atom

[RFC][PATCH 0/2] Add support for using reserved memory for ima buffer pass
 2020-05-23  4:08 UTC  (9+ messages) - mbox.gz / Atom
` [RFC][PATCH 1/2] Add a layer of abstraction to use the memory reserved by device tree "

[PATCH v2 2/2] fs: avoid fdput() after failed fdget() in kernel_read_file_from_fd()
 2020-05-22 22:47 UTC  (5+ messages) - mbox.gz / Atom

[PATCH v30 10/20] x86/sgx: Linux Enclave Driver
 2020-05-22 19:39 UTC  (6+ messages) - mbox.gz / Atom
` [PATCH v30 11/20] x86/sgx: Add provisioning

[PATCH 0/5] exec: Control flow simplifications
 2020-05-22 13:35 UTC  (46+ messages) - mbox.gz / Atom
    ` [PATCH v2 0/8] "
      ` [PATCH v2 1/8] exec: Teach prepare_exec_creds how exec treats uids & gids
      ` [PATCH v2 2/8] exec: Factor security_bprm_creds_for_exec out of security_bprm_set_creds
      ` [PATCH v2 3/8] exec: Convert security_bprm_set_creds into security_bprm_repopulate_creds
      ` [PATCH v2 4/8] exec: Allow load_misc_binary to call prepare_binfmt unconditionally
      ` [PATCH v2 5/8] exec: Move the call of prepare_binprm into search_binary_handler
      ` [PATCH v2 6/8] exec/binfmt_script: Don't modify bprm->buf and then return -ENOEXEC
      ` [PATCH v2 7/8] exec: Generic execfd support
      ` [PATCH v2 8/8] exec: Remove recursion from search_binary_handler

[PATCH] commoncap: Make cap_inode_killpriv ignore other LSM xattr
 2020-05-22 11:32 UTC  - mbox.gz / Atom

[GIT PULL] apparmor bug fixes for v5.7-rc6
 2020-05-21 23:50 UTC  (2+ messages) - mbox.gz / Atom

[PATCH] security: integrity: Replace zero-length array with flexible-array member
 2020-05-21 23:10 UTC  - mbox.gz / Atom

[PATCH bpf] security: Fix hook iteration for secid_to_secctx
 2020-05-21  3:12 UTC  (5+ messages) - mbox.gz / Atom

[PATCH 01/14] cachefiles: switch to kernel_write
 2020-05-20 15:59 UTC  (5+ messages) - mbox.gz / Atom
` clean up kernel_{read,write} & friends v2
    ` [PATCH 09/14] fs: don't change the address limit for ->write_iter in __kernel_write

[PATCH 0/4] Relocate execve() sanity checks
 2020-05-19 22:58 UTC  (26+ messages) - mbox.gz / Atom
` [PATCH 1/4] exec: Change uselib(2) IS_SREG() failure to EACCES
` [PATCH 2/4] exec: Relocate S_ISREG() check
` [PATCH 3/4] exec: Relocate path_noexec() check
` [PATCH 4/4] fs: Include FMODE_EXEC when converting flags to f_mode

[PATCH v3 0/3] perf: make Perf tool aware of SELinux access control
 2020-05-19 18:10 UTC  (11+ messages) - mbox.gz / Atom
` [PATCH v3 2/3] perf tool: "
` [PATCH v3 3/3] perf docs: introduce security.txt file to document related issues

[PATCH v17 00/23] LSM: Module stacking for AppArmor
 2020-05-19 15:48 UTC  (10+ messages) - mbox.gz / Atom
` [PATCH v17 05/23] net: Prepare UDS for security module stacking
` [PATCH v17 20/23] Audit: Add a new record for multiple subject LSM attributes

[PATCH v5 0/6] Add support for O_MAYEXEC
 2020-05-19 10:13 UTC  (26+ messages) - mbox.gz / Atom
` [PATCH v5 2/6] fs: Add a MAY_EXECMOUNT flag to infer the noexec mount property
` [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
                ` How about just O_EXEC? (was Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC)

[PATCH] security: fix the default value of secid_to_secctx hook
 2020-05-18 22:02 UTC  (2+ messages) - mbox.gz / Atom

linux-next boot error: general protection fault in tomoyo_get_local_path
 2020-05-18 18:07 UTC  (16+ messages) - mbox.gz / Atom
    ` [PATCH] proc: proc_pid_ns takes super_block as an argument
    ` [PATCH v2] "
    ` [PATCH v3] "
    ` [PATCH v4] "

WARNING: suspicious RCU usage with PROVE_RCU_LIST=y
 2020-05-18  9:39 UTC  (2+ messages) - mbox.gz / Atom

[PATCH] selinux: Fix use of KEY_NEED_* instead of KEY__* perms [v2]
 2020-05-15 22:27 UTC  (9+ messages) - mbox.gz / Atom
` [PATCH] keys: Make the KEY_NEED_* perms an enum rather than a mask
    ` [PATCH] keys: Move permissions checking decisions into the checking code

[PATCH -next] apparmor: Use true and false for bool variable
 2020-05-15 21:28 UTC  (2+ messages) - mbox.gz / Atom

[PATCH v7 bpf-next 0/3] Introduce CAP_BPF
 2020-05-15 15:55 UTC  (2+ messages) - mbox.gz / Atom

[PATCH v4 0/4] Introduce TEE based Trusted Keys support
 2020-05-15  0:00 UTC  (5+ messages) - mbox.gz / Atom
` [PATCH v4 1/4] KEYS: trusted: Add generic trusted keys framework

page: 

Linux-Security-Module Archive on lore.kernel.org

Archives are clonable:
	git clone --mirror https://lore.kernel.org/linux-security-module/0 linux-security-module/git/0.git

	# If you have public-inbox 1.1+ installed, you may
	# initialize and index your mirror using the following commands:
	public-inbox-init -V2 linux-security-module linux-security-module/ https://lore.kernel.org/linux-security-module \
		linux-security-module@vger.kernel.org
	public-inbox-index linux-security-module

Example config snippet for mirrors

Newsgroup available over NNTP:
	nntp://nntp.lore.kernel.org/org.kernel.vger.linux-security-module


AGPL code for this site: git clone https://public-inbox.org/public-inbox.git