linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2019-06-02 16:52:43 to 2019-06-06 02:12:19 UTC [more...]

[RFC PATCH v2 0/5] security: x86/sgx: SGX vs. LSM
 2019-06-06  2:11 UTC  (6+ messages)
` [RFC PATCH v2 1/5] mm: Introduce vm_ops->may_mprotect()
` [RFC PATCH v2 2/5] x86/sgx: Require userspace to define enclave pages' protection bits
` [RFC PATCH v2 3/5] x86/sgx: Enforce noexec filesystem restriction for enclaves
` [RFC PATCH v2 4/5] LSM: x86/sgx: Introduce ->enclave_load() hook for Intel SGX
` [RFC PATCH v2 5/5] security/selinux: Add enclave_load() implementation

KASAN: use-after-free Read in tomoyo_realpath_from_path
 2019-06-06  2:08 UTC  (3+ messages)

[RFC PATCH 0/9] security: x86/sgx: SGX vs. LSM
 2019-06-06  2:04 UTC  (72+ messages)
` [RFC PATCH 1/9] x86/sgx: Remove unused local variable in sgx_encl_release()
` [RFC PATCH 2/9] x86/sgx: Do not naturally align MAP_FIXED address
` [RFC PATCH 3/9] x86/sgx: Allow userspace to add multiple pages in single ioctl()
` [RFC PATCH 4/9] mm: Introduce vm_ops->mprotect()
` [RFC PATCH 5/9] x86/sgx: Restrict mapping without an enclave page to PROT_NONE
` [RFC PATCH 6/9] x86/sgx: Require userspace to provide allowed prots to ADD_PAGES
` [RFC PATCH 7/9] x86/sgx: Enforce noexec filesystem restriction for enclaves
` [RFC PATCH 8/9] LSM: x86/sgx: Introduce ->enclave_load() hook for Intel SGX
` [RFC PATCH 9/9] security/selinux: Add enclave_load() implementation

[PATCH 00/58] LSM: Module stacking for AppArmor
 2019-06-05 22:28 UTC  (48+ messages)
` [PATCH 02/58] LSM: Infrastructure management of the sock security
` [PATCH 25/58] IMA: Clean out lsm_export scaffolding
` [PATCH 26/58] NET: Change the UNIXCB from a secid to an lsm_export
` [PATCH 28/58] NET: Remove scaffolding on new secmarks
` [PATCH 29/58] NET: Remove netfilter scaffolding for lsm_export
` [PATCH 30/58] Netlabel: Replace secids with lsm_export
` [PATCH 31/58] LSM: Remove lsm_export scaffolding functions
` [PATCH 32/58] IMA: FIXUP prototype using lsm_export
` [PATCH 33/58] Smack: Restore the release_secctx hook
` [PATCH 34/58] AppArmor: Remove unnecessary hook stub
` [PATCH 35/58] LSM: Limit calls to certain module hooks
` [PATCH 36/58] LSM: Create a data structure for a security context
` [PATCH 37/58] LSM: Use lsm_context in secid_to_secctx hooks
` [PATCH 38/58] LSM: Use lsm_context in secctx_to_secid hooks
` [PATCH 39/58] LSM: Use lsm_context in inode_getsecctx hooks
` [PATCH 40/58] LSM: Use lsm_context in inode_notifysecctx hooks
` [PATCH 41/58] LSM: Use lsm_context in dentry_init_security hooks
` [PATCH 42/58] LSM: Use lsm_context in security_dentry_init_security
` [PATCH 43/58] LSM: Use lsm_context in security_inode_notifysecctx
` [PATCH 44/58] LSM: Use lsm_context in security_inode_getsecctx
` [PATCH 45/58] LSM: Use lsm_context in security_secctx_to_secid
` [PATCH 46/58] LSM: Use lsm_context in release_secctx hooks
` [PATCH 47/58] LSM: Use lsm_context in security_release_secctx
` [PATCH 48/58] LSM: Use lsm_context in security_secid_to_secctx
` [PATCH 49/58] fs: remove lsm_context scaffolding
` [PATCH 50/58] LSM: Add the release function to the lsm_context
` [PATCH 51/58] LSM: Use lsm_context in inode_setsecctx hooks
` [PATCH 52/58] LSM: Use lsm_context in security_inode_setsecctx
` [PATCH 53/58] kernfs: remove lsm_context scaffolding
` [PATCH 54/58] LSM: Remove unused macro
` [PATCH 55/58] LSM: Special handling for secctx lsm hooks
` [PATCH 56/58] SELinux: Use blob offset in current_sid
` [PATCH 57/58] LSM: Specify which LSM to display
` [PATCH 58/58] AppArmor: Remove the exclusive flag

[RFC][PATCH 0/8] Mount, FS, Block and Keyrings notifications [ver #2]
 2019-06-05 21:06 UTC  (32+ messages)
` [PATCH 1/8] security: Override creds in __fput() with last fputter's creds "
` [PATCH 2/8] General notification queue with user mmap()'able ring buffer "
` [PATCH 3/8] keys: Add a notification facility "
` [PATCH 4/8] vfs: Add a mount-notification "
` [PATCH 5/8] vfs: Add superblock notifications "
` [PATCH 6/8] fsinfo: Export superblock notification counter "
` [PATCH 7/8] block: Add block layer notifications "
` [PATCH 8/8] Add sample notification program "
    ` Rational model for UID based controls

[PATCH 1/2] LSM: switch to blocking policy update notifiers
 2019-06-05 19:15 UTC  (7+ messages)
` [PATCH 2/2] ima: use the lsm policy update notifier

[RFC 0/1] Add dm verity root hash pkcs7 sig validation
 2019-06-05 16:42 UTC  (3+ messages)
` [RFC 1/1] "

[PATCH v5 2/3] mm: init: report memory auto-initialization features at boot time
 2019-06-05  2:58 UTC  (7+ messages)

possible deadlock in get_user_pages_unlocked (2)
 2019-06-05  1:16 UTC 

possible deadlock in __do_page_fault (2)
 2019-06-04 20:08 UTC  (3+ messages)

security/loadpin: Allow to exclude specific file types
 2019-06-04 17:01 UTC  (6+ messages)

[PATCH 3/7] vfs: Add a mount-notification facility
 2019-06-04 12:33 UTC  (11+ messages)
  ` [RFC][PATCH 0/7] Mount, FS, Block and Keyrings notifications

SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)
 2019-06-04 11:39 UTC  (26+ messages)

[PATCH v2 0/3] ima/evm fixes for v5.2
 2019-06-04  8:57 UTC  (11+ messages)
` [PATCH v2 2/3] ima: don't ignore INTEGRITY_UNKNOWN EVM status

[PATCH 00/58] LSM: Module stacking for AppArmor
 2019-06-04  0:29 UTC  (16+ messages)
` [PATCH 04/58] LSM: Create an lsm_export data structure
` [PATCH 05/58] LSM: Use lsm_export in the inode_getsecid hooks
` [PATCH 22/58] Audit: Change audit_sig_sid to audit_sig_lsm
` [PATCH 25/58] IMA: Clean out lsm_export scaffolding
` [PATCH 46/58] LSM: Use lsm_context in release_secctx hooks

[PATCH] Smack: Restore the smackfsdef mount option and add missing prefixes
 2019-06-03 23:07 UTC  (4+ messages)

Re:[RFC 1/1] Add dm verity root hash pkcs7 sig validation
 2019-06-03 20:08 UTC 

[PATCH] Allow to exclude specific file types in LoadPin
 2019-06-03 18:36 UTC  (2+ messages)
` [PATCH v4] "

[PATCH v4 0/3] initramfs: add support for xattrs in the initial ram disk
 2019-06-03 18:32 UTC  (3+ messages)

possible deadlock in process_measurement
 2019-06-03 16:35 UTC  (2+ messages)

[PATCH 1/2] LSM: switch to blocking policy update notifiers
 2019-06-03 15:57 UTC  (5+ messages)
` [PATCH 2/2] ima: use the lsm policy update notifier

[RFC][PATCH 0/7] Mount, FS, Block and Keyrings notifications
 2019-05-29 15:53 UTC 


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).