linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2019-10-31 15:57:40 to 2019-11-13 00:01:39 UTC [more...]

[PATCH v10 00/25] LSM: Module stacking for AppArmor
 2019-11-13  0:00 UTC  (23+ messages)
  ` [PATCH v10 01/25] LSM: Infrastructure management of the sock security
  ` [PATCH v10 02/25] LSM: Create and manage the lsmblob data structure
  ` [PATCH v10 03/25] LSM: Use lsmblob in security_audit_rule_match
  ` [PATCH v10 04/25] LSM: Use lsmblob in security_kernel_act_as
  ` [PATCH v10 05/25] net: Prepare UDS for security module stacking
  ` [PATCH v10 06/25] LSM: Use lsmblob in security_secctx_to_secid
  ` [PATCH v10 07/25] LSM: Use lsmblob in security_secid_to_secctx
  ` [PATCH v10 08/25] LSM: Use lsmblob in security_ipc_getsecid
  ` [PATCH v10 09/25] LSM: Use lsmblob in security_task_getsecid
  ` [PATCH v10 10/25] LSM: Use lsmblob in security_inode_getsecid
  ` [PATCH v10 11/25] LSM: Use lsmblob in security_cred_getsecid
  ` [PATCH v10 12/25] IMA: Change internal interfaces to use lsmblobs
  ` [PATCH v10 13/25] LSM: Specify which LSM to display
  ` [PATCH v10 14/25] LSM: Ensure the correct LSM context releaser
  ` [PATCH v10 15/25] LSM: Use lsmcontext in security_secid_to_secctx
  ` [PATCH v10 16/25] LSM: Use lsmcontext in security_dentry_init_security
  ` [PATCH v10 17/25] LSM: Use lsmcontext in security_inode_getsecctx
  ` [PATCH v10 18/25] LSM: security_secid_to_secctx in netlink netfilter
  ` [PATCH v10 19/25] NET: Store LSM netlabel data in a lsmblob
  ` [PATCH v10 20/25] LSM: Verify LSM display sanity in binder
  ` [PATCH v10 21/25] Audit: Add subj_LSM fields when necessary
  ` [PATCH v10 22/25] Audit: Include object data for all security modules

[PATCH] x86/mtrr: only administrator can read the configurations
 2019-11-12 22:35 UTC  (3+ messages)

WARNING in aa_sock_msg_perm (2)
 2019-11-12 21:00 UTC  (2+ messages)

[PATCH] tpm_tis: Move setting of TPM_CHIP_FLAG_IRQ into tpm_tis_probe_irq_single
 2019-11-12 20:27 UTC 

[PATCH v5 0/10] KEYS: Measure keys when they are created or updated
 2019-11-12 18:06 UTC  (22+ messages)
` [PATCH v5 01/10] IMA: Added KEYRING_CHECK func in IMA policy to measure keys
` [PATCH v5 02/10] IMA: Added keyrings= option in IMA policy to only measure keys added to the specified keyrings
` [PATCH v5 03/10] IMA: Read keyrings= option from the IMA policy into ima_rule_entry
` [PATCH v5 04/10] IMA: Updated IMA policy functions to return keyrings option read from the policy
` [PATCH v5 05/10] IMA: Measure key if the IMA policy allows measurement for the keyring to which the key is linked to
` [PATCH v5 06/10] IMA: Defined an IMA hook to measure keys on key create or update
` [PATCH v5 07/10] KEYS: Call the IMA hook to measure key when a new key is created or an existing key is updated
` [PATCH v5 08/10] IMA: Added a flag to determine whether IMA hook can process the key now or has to queue for processing later
` [PATCH v5 09/10] IMA: Defined functions to queue and dequeue keys for measurement
` [PATCH v5 10/10] IMA: Call queue and dequeue functions to measure keys

[PATCH bpf-next v13 0/7] Landlock LSM
 2019-11-08 15:39 UTC  (26+ messages)
` [PATCH bpf-next v13 1/7] bpf,landlock: Define an eBPF program type for Landlock hooks
` [PATCH bpf-next v13 2/7] landlock: Add the management of domains
` [PATCH bpf-next v13 3/7] landlock,seccomp: Apply Landlock programs to process hierarchy
` [PATCH bpf-next v13 4/7] landlock: Add ptrace LSM hooks
` [PATCH bpf-next v13 5/7] bpf,landlock: Add task_landlock_ptrace_ancestor() helper
` [PATCH bpf-next v13 6/7] bpf,landlock: Add tests for the Landlock ptrace program type
` [PATCH bpf-next v13 7/7] landlock: Add user and kernel documentation for Landlock

[PATCH v23 12/24] x86/sgx: Linux Enclave Driver
 2019-11-08  8:20 UTC  (13+ messages)

[RFC PATCH 00/14] pipe: Keyrings, Block and USB notifications [ver #2]
 2019-11-08  6:42 UTC  (22+ messages)
` [RFC PATCH 01/14] uapi: General notification queue definitions "
` [RFC PATCH 02/14] security: Add hooks to rule on setting a watch "
` [RFC PATCH 03/14] security: Add a hook for the point of notification insertion "
` [RFC PATCH 04/14] pipe: Add O_NOTIFICATION_PIPE "
` [RFC PATCH 05/14] pipe: Add general notification queue support "
` [RFC PATCH 06/14] keys: Add a notification facility "
` [RFC PATCH 07/14] Add sample notification program "
` [RFC PATCH 08/14] pipe: Allow buffers to be marked read-whole-or-error for notifications "
` [RFC PATCH 09/14] pipe: Add notification lossage handling "
` [RFC PATCH 10/14] Add a general, global device notification watch list "
` [RFC PATCH 11/14] block: Add block layer notifications "
` [RFC PATCH 12/14] usb: Add USB subsystem "
` [RFC PATCH 13/14] selinux: Implement the watch_key security hook "
` [RFC PATCH 14/14] smack: Implement the watch_key and post_notification hooks "

[PATCH linux-kselftest/test v2] apparmor: add AppArmor KUnit tests for policy unpack
 2019-11-07 23:33 UTC  (4+ messages)

[PATCH v4 0/10] KEYS: Measure keys when they are created or updated
 2019-11-07 21:12 UTC  (20+ messages)
` [PATCH v4 01/10] IMA: Defined an IMA hook to measure keys on key create or update
` [PATCH v4 02/10] IMA: Added KEYRING_CHECK func in IMA policy to measure keys
` [PATCH v4 03/10] IMA: Added keyrings= option in IMA policy to only measure keys added to the specified keyrings
` [PATCH v4 04/10] IMA: Read keyrings= option from the IMA policy into ima_rule_entry
` [PATCH v4 05/10] IMA: Updated IMA policy functions to return keyrings option read from the policy
` [PATCH v4 06/10] IMA: Measure key if the IMA policy allows measurement for the keyring to which the key is linked to
` [PATCH v4 07/10] IMA: Added a boolean flag to track IMA initialization status
` [PATCH v4 08/10] IMA: Defined functions to queue and dequeue keys for measurement
` [PATCH v4 09/10] IMA: Call queue and dequeue functions to measure keys
` [PATCH v4 10/10] KEYS: Call the IMA hook to measure key when a new key is created or an existing key is updated

[RFC PATCH 00/11] pipe: Notification queue preparation [ver #3]
 2019-11-07 17:42 UTC  (18+ messages)
` [RFC PATCH 01/11] pipe: Reduce #inclusion of pipe_fs_i.h "
` [RFC PATCH 02/11] Remove the nr_exclusive argument from __wake_up_sync_key() "
` [RFC PATCH 03/11] Add wake_up_interruptible_sync_poll_locked() "
` [RFC PATCH 04/11] pipe: Use head and tail pointers for the ring, not cursor and length "
    ` [pipe] d60337eff1: phoronix-test-suite.noise-level.0.activity_level 144.0% improvement
` [RFC PATCH 05/11] pipe: Allow pipes to have kernel-reserved slots [ver #3]
` [RFC PATCH 06/11] pipe: Advance tail pointer inside of wait spinlock in pipe_read() "
` [RFC PATCH 07/11] pipe: Conditionalise wakeup "
` [RFC PATCH 08/11] pipe: Rearrange sequence in pipe_write() to preallocate slot "
` [RFC PATCH 09/11] pipe: Remove redundant wakeup from pipe_write() "
` [RFC PATCH 10/11] pipe: Check for ring full inside of the spinlock in "
` [RFC PATCH 11/11] pipe: Increase the writer-wakeup threshold to reduce context-switch count "
` Details on the UAPI of implementing notifications on pipes

Investment opportunity
 2019-11-07 15:08 UTC 

[PATCH 00/30] security, efi: Add kernel lockdown
 2019-11-07  8:21 UTC  (3+ messages)
` [PATCH 18/30] acpi: Disable APEI error injection if the kernel is locked down

[PATCH v10 00/25] LSM: Module stacking for AppArmor
 2019-11-06 16:11 UTC  (5+ messages)

[PATCH] security/keyring: avoid pagefaults in keyring_read_iterator
 2019-11-06 15:25 UTC  (5+ messages)

[PATCH linux-kselftest/test v1] apparmor: add AppArmor KUnit tests for policy unpack
 2019-11-06  0:37 UTC  (18+ messages)

kernel panic while using get_random_bytes
 2019-11-05  9:12 UTC  (3+ messages)

Investment opportunity
 2019-11-05  3:17 UTC 

[PATCH v14 4/5] overlayfs: internal getxattr operations without sepolicy checking
 2019-11-04 21:51 UTC  (5+ messages)
    ` [PATCH v14 1/5] Add flags option to get xattr method paired to __vfs_getxattr

[PATCH v15 2/4] overlayfs: handle XATTR_NOSECURITY flag for get xattr method
 2019-11-04 21:52 UTC  (2+ messages)
` [PATCH v15 3/4] overlayfs: internal getxattr operations without sepolicy checking

[Patch v3 0/7] Introduce TEE based Trusted Keys support
 2019-11-04 20:55 UTC  (7+ messages)
` [Patch v3 6/7] doc: keys: Document usage of TEE based Trusted Keys

Business Proposal - Please Reply
 2019-11-04 18:17 UTC 

[RFC PATCH 07/10] pipe: Conditionalise wakeup in pipe_read() [ver #2]
 2019-11-03 12:02 UTC  (26+ messages)
` [RFC PATCH 00/10] pipe: Notification queue preparation "
  ` [RFC PATCH 04/10] pipe: Use head and tail pointers for the ring, not cursor and length "
  ` [RFC PATCH 11/10] pipe: Add fsync() support "

tracefs splats in lockdown=confidentiality mode
 2019-11-01 22:15 UTC  (2+ messages)

[PATCH bpf-next v12 0/7] Landlock LSM
 2019-10-31 16:44 UTC  (8+ messages)
` [PATCH bpf-next v12 1/7] bpf,landlock: Define an eBPF program type for Landlock hooks
` [PATCH bpf-next v12 2/7] landlock: Add the management of domains
` [PATCH bpf-next v12 3/7] landlock,seccomp: Load Landlock programs per process hierarchy
` [PATCH bpf-next v12 4/7] landlock: Add ptrace LSM hooks
` [PATCH bpf-next v12 5/7] bpf,landlock: Add task_landlock_ptrace_ancestor() helper
` [PATCH bpf-next v12 6/7] bpf,landlock: Add tests for the Landlock ptrace program type
` [PATCH bpf-next v12 7/7] landlock: Add user and kernel documentation for Landlock

[RFC PATCH 04/10] pipe: Use head and tail pointers for the ring, not cursor and length [ver #2]
 2019-10-27 14:03 UTC 


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).