linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2019-07-03 13:57:59 to 2019-07-10 17:28:32 UTC [more...]

[RFC PATCH] fanotify, inotify, dnotify, security: add security hook for fs notifications
 2019-07-10 17:25 UTC  (8+ messages)
  ` [Non-DoD Source] "

[RFC PATCH v4 00/12] security: x86/sgx: SGX vs. LSM
 2019-07-10 16:57 UTC  (68+ messages)
` [RFC PATCH v4 01/12] x86/sgx: Use mmu_notifier.release() instead of per-vma refcounting
` [RFC PATCH v4 04/12] x86/sgx: Require userspace to define enclave pages' protection bits
` [RFC PATCH v4 05/12] x86/sgx: Enforce noexec filesystem restriction for enclaves
` [RFC PATCH v4 07/12] LSM: x86/sgx: Introduce ->enclave_map() hook for Intel SGX
` [RFC PATCH v4 10/12] security/selinux: Add enclave_load() implementation
` [RFC PATCH v4 12/12] LSM: x86/sgx: Show line of sight to LSM support SGX2's EAUG
` [RFC PATCH v2 0/3] security/x86/sgx: SGX specific LSM hooks
  ` [RFC PATCH v3 0/4] "
  ` [RFC PATCH v3 1/4] x86/sgx: Add "
  ` [RFC PATCH v3 2/4] x86/64: Call LSM hooks from SGX subsystem/module
  ` [RFC PATCH v3 3/4] X86/sgx: Introduce EMA as a new LSM module
  ` [RFC PATCH v3 4/4] x86/sgx: Implement SGX specific hooks in SELinux

[PATCH V34 00/29] Lockdown as an LSM
 2019-07-10 15:26 UTC  (5+ messages)
` [PATCH V34 10/29] hibernate: Disable when the kernel is locked down

[PATCH 0/2] keys: ACLs
 2019-07-10  1:35 UTC  (6+ messages)
` [PATCH 1/2] KEYS: Replace uid/gid/perm permissions checking with an ACL
` [PATCH 2/2] KEYS: Provide KEYCTL_GRANT_PERMISSION

[PATCH v5 00/23] LSM: Module stacking for AppArmor
 2019-07-09 21:34 UTC  (31+ messages)
` [PATCH v5 01/23] LSM: Infrastructure management of the superblock
` [PATCH v5 02/23] LSM: Infrastructure management of the sock security
` [PATCH v5 03/23] LSM: Infrastructure management of the key blob
` [PATCH v5 04/23] LSM: Create and manage the lsmblob data structure
` [PATCH v5 05/23] LSM: Use lsmblob in security_audit_rule_match
` [PATCH v5 06/23] LSM: Use lsmblob in security_kernel_act_as
` [PATCH v5 07/23] net: Prepare UDS for secuirty module stacking
` [PATCH v5 08/23] LSM: Use lsmblob in security_secctx_to_secid
` [PATCH v5 09/23] LSM: Use lsmblob in security_secid_to_secctx
` [PATCH v5 10/23] LSM: Use lsmblob in security_ipc_getsecid
` [PATCH v5 11/23] LSM: Use lsmblob in security_task_getsecid
` [PATCH v5 12/23] LSM: Use lsmblob in security_inode_getsecid
` [PATCH v5 13/23] LSM: Use lsmblob in security_cred_getsecid
` [PATCH v5 14/23] IMA: Change internal interfaces to use lsmblobs
` [PATCH v5 15/23] LSM: Specify which LSM to display
` [PATCH v5 16/23] LSM: Ensure the correct LSM context releaser
` [PATCH v5 17/23] LSM: Use lsmcontext in security_secid_to_secctx
` [PATCH v5 18/23] LSM: Use lsmcontext in security_dentry_init_security
` [PATCH v5 19/23] LSM: Use lsmcontext in security_inode_getsecctx
` [PATCH v5 20/23] LSM: security_secid_to_secctx in netlink netfilter
` [PATCH v5 21/23] NET: Store LSM netlabel data in a lsmblob
` [PATCH v5 22/23] AppArmor: Remove the exclusive flag
` [PATCH v5 23/23] SELinux: Verify LSM display sanity in binder

[RFC PATCH v2 1/3] x86/sgx: Add SGX specific LSM hooks
 2019-07-09 21:16 UTC  (16+ messages)

[GIT PULL] LSM: capabilities updates for v5.3
 2019-07-09 19:55 UTC  (2+ messages)

Reminder: 2 open syzbot bugs in "security/integrity" subsystem
 2019-07-09 19:15 UTC 

[PATCH v1 01/22] docs: Documentation/*.txt: rename all ReST files to *.rst
 2019-07-09 17:02 UTC 

RFC: BUG: overlayfs getxattr recursion leaves a poison sid
 2019-07-09 16:41 UTC  (2+ messages)

[PATCH] KEYS: trusted: allow module init if TPM is inactive or deactivated
 2019-07-09 16:31 UTC  (5+ messages)

[PATCH 00/10] VFS: Provide new mount UAPI
 2019-07-09 10:51 UTC  (10+ messages)
` [PATCH 02/10] vfs: syscall: Add move_mount(2) to move mounts around

[RFC 0/7] Introduce TEE based Trusted Keys support
 2019-07-09  9:36 UTC  (9+ messages)
` [RFC 3/7] tee: add private login method for kernel clients

[PATCH v5 00/12] S.A.R.A. a new stacked LSM
 2019-07-09  4:51 UTC  (31+ messages)
` [PATCH v5 01/12] S.A.R.A.: add documentation
` [PATCH v5 02/12] S.A.R.A.: create framework
` [PATCH v5 03/12] S.A.R.A.: cred blob management
` [PATCH v5 04/12] S.A.R.A.: generic DFA for string matching
` [PATCH v5 05/12] LSM: creation of "check_vmflags" LSM hook
` [PATCH v5 06/12] S.A.R.A.: WX protection
` [PATCH v5 07/12] LSM: creation of "pagefault_handler" LSM hook
` [PATCH v5 08/12] S.A.R.A.: trampoline emulation
` [PATCH v5 09/12] S.A.R.A.: WX protection procattr interface
` [PATCH v5 10/12] S.A.R.A.: XATTRs support
` [PATCH v5 11/12] S.A.R.A.: /proc/*/mem write limitation
` [PATCH v5 12/12] MAINTAINERS: take maintainership for S.A.R.A

[GIT PULL] integrity subsystem updates for v5.3
 2019-07-09  3:50 UTC  (2+ messages)

keyrings pull requests for the next merge window
 2019-07-09  3:25 UTC 

[GIT PULL] Keys: Set 3 - Keyrings namespacing for 5.3
 2019-07-09  3:15 UTC  (2+ messages)

[GIT PULL] tpmdd updates for Linux v5.3
 2019-07-09  3:15 UTC  (2+ messages)

[GIT PULL] Keys: Set 4 - Key ACLs for 5.3
 2019-07-09  3:15 UTC  (2+ messages)

[GIT PULL] Keys: Set 2 - request_key() improvements for 5.3
 2019-07-09  3:15 UTC  (2+ messages)

[GIT PULL] Keys: Set 1 - Miscellany for 5.3
 2019-07-09  3:15 UTC  (2+ messages)

[GIT PULL] SELinux patches for v5.3
 2019-07-09  3:15 UTC  (2+ messages)

[PATCH 0/9] Keyrings, Block and USB notifications [ver #5]
 2019-07-08 19:13 UTC  (19+ messages)
` [PATCH 1/9] uapi: General notification ring definitions "
` [PATCH 2/9] security: Add hooks to rule on setting a watch "
` [PATCH 3/9] security: Add a hook for the point of notification insertion "
` [PATCH 4/9] General notification queue with user mmap()'able ring buffer "
` [PATCH 6/9] Add a general, global device notification watch list "
` [PATCH 8/9] usb: Add USB subsystem notifications "

[PATCH] security/commoncap: Use xattr security prefix len
 2019-07-07  3:02 UTC  (2+ messages)

KASAN: use-after-free Read in tomoyo_realpath_from_path
 2019-07-07  2:50 UTC  (9+ messages)
  ` [PATCH] tomoyo: Don't check open/getattr permission on sockets
        ` [PATCH v2] "

[PATCH] Revert "tpm: pass an array of tpm_extend_digest structures to tpm_pcr_extend()"
 2019-07-05 15:20 UTC  (9+ messages)

[RFC/RFT] KEYS: trusted: Add generic trusted keys framework
 2019-07-05 14:32 UTC 

[PATCH v12 00/11] Appended signatures support for IMA appraisal
 2019-07-05 13:00 UTC  (9+ messages)
` [PATCH v12 01/11] MODSIGN: Export module signature definitions

[PATCH v10 0/3] add init_on_alloc/init_on_free boot options
 2019-07-05 11:42 UTC  (6+ messages)
` [PATCH v10 1/2] mm: security: introduce init_on_alloc=1 and init_on_free=1 "

[PATCH] smack: fix some kernel-doc notations
 2019-07-05  2:35 UTC 

[PATCH v2] Revert "tpm: pass an array of tpm_extend_digest structures to tpm_pcr_extend()"
 2019-07-04 10:01 UTC 

[PATCH -next] integrity: Remove set but not used variable 'acl'
 2019-07-04  1:23 UTC  (3+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).