linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2019-12-16 14:04:12 to 2019-12-24 05:48:28 UTC [more...]

[PATCH bpf-next v1 00/13] MAC and Audit policy using eBPF (KRSI)
 2019-12-24  5:48 UTC  (24+ messages)
` [PATCH bpf-next v1 01/13] bpf: Refactor BPF_EVENT context macros to its own header
` [PATCH bpf-next v1 02/13] bpf: lsm: Add a skeleton and config options
` [PATCH bpf-next v1 03/13] bpf: lsm: Introduce types for eBPF based LSM
` [PATCH bpf-next v1 04/13] bpf: lsm: Allow btf_id based attachment for LSM hooks
` [PATCH bpf-next v1 05/13] tools/libbpf: Add support in libbpf for BPF_PROG_TYPE_LSM
` [PATCH bpf-next v1 06/13] bpf: lsm: Init Hooks and create files in securityfs
` [PATCH bpf-next v1 07/13] bpf: lsm: Implement attach, detach and execution
` [PATCH bpf-next v1 08/13] bpf: lsm: Show attached program names in hook read handler
` [PATCH bpf-next v1 09/13] bpf: lsm: Add a helper function bpf_lsm_event_output
` [PATCH bpf-next v1 10/13] bpf: lsm: Handle attachment of the same program
` [PATCH bpf-next v1 11/13] tools/libbpf: Add bpf_program__attach_lsm
` [PATCH bpf-next v1 12/13] bpf: lsm: Add selftests for BPF_PROG_TYPE_LSM
` [PATCH bpf-next v1 13/13] bpf: lsm: Add Documentation

Anomalous output from getpcaps(1) for process with all capabilities
 2019-12-23 19:20 UTC  (12+ messages)

[PATCH] ima: add the ability to query ima for the hash of a given file
 2019-12-23 17:39 UTC  (3+ messages)

Report: suspicious RCU usage in security code
 2019-12-23 11:21 UTC 

[PATCH v23 12/24] x86/sgx: Linux Enclave Driver
 2019-12-23 11:01 UTC  (6+ messages)

Looks like issue in handling active_nodes count in 4.19 kernel 
 2019-12-21 16:02 UTC  (16+ messages)
                      `  "

[PATCH v1 - RFC] ima: export the measurement list when needed
 2019-12-21 11:03 UTC  (3+ messages)

[PATCH AUTOSEL 5.4 20/52] afs: Fix SELinux setting security label on /afs
 2019-12-20 14:29 UTC 

[PATCH AUTOSEL 4.19 11/34] afs: Fix SELinux setting security label on /afs
 2019-12-20 14:34 UTC 

[RFC PATCH] selinux: deprecate disabling SELinux and runtime
 2019-12-19 23:40 UTC  (2+ messages)

[PATCH v12 00/25] LSM: Module stacking for AppArmor
 2019-12-19 21:44 UTC  (69+ messages)
  ` [PATCH v12 01/25] LSM: Infrastructure management of the sock security
  ` [PATCH v12 02/25] LSM: Create and manage the lsmblob data structure
  ` [PATCH v12 03/25] LSM: Use lsmblob in security_audit_rule_match
  ` [PATCH v12 04/25] LSM: Use lsmblob in security_kernel_act_as
  ` [PATCH v12 05/25] net: Prepare UDS for security module stacking
  ` [PATCH v12 06/25] LSM: Use lsmblob in security_secctx_to_secid
  ` [PATCH v12 07/25] LSM: Use lsmblob in security_secid_to_secctx
  ` [PATCH v12 08/25] LSM: Use lsmblob in security_ipc_getsecid
  ` [PATCH v12 09/25] LSM: Use lsmblob in security_task_getsecid
  ` [PATCH v12 10/25] LSM: Use lsmblob in security_inode_getsecid
  ` [PATCH v12 11/25] LSM: Use lsmblob in security_cred_getsecid
  ` [PATCH v12 12/25] IMA: Change internal interfaces to use lsmblobs
  ` [PATCH v12 13/25] LSM: Specify which LSM to display
  ` [PATCH v12 14/25] LSM: Ensure the correct LSM context releaser
  ` [PATCH v12 15/25] LSM: Use lsmcontext in security_secid_to_secctx
  ` [PATCH v12 16/25] LSM: Use lsmcontext in security_dentry_init_security
  ` [PATCH v12 17/25] LSM: Use lsmcontext in security_inode_getsecctx
  ` [PATCH v12 18/25] LSM: security_secid_to_secctx in netlink netfilter
  ` [PATCH v12 19/25] NET: Store LSM netlabel data in a lsmblob
  ` [PATCH v12 20/25] LSM: Verify LSM display sanity in binder
  ` [PATCH v12 21/25] Audit: Add subj_LSM fields when necessary
  ` [PATCH v12 22/25] Audit: Include object data for all security modules
  ` [PATCH v12 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
  ` [PATCH v12 24/25] LSM: Add /proc attr entry for full LSM context
  ` [PATCH v12 25/25] AppArmor: Remove the exclusive flag

[PATCH v4 0/7] Introduce CAP_SYS_PERFMON to secure system performance monitoring and observability
 2019-12-19  9:10 UTC  (12+ messages)
` [PATCH v4 1/9] capabilities: introduce CAP_SYS_PERFMON to kernel and user space
` [PATCH v4 2/9] perf/core: open access for CAP_SYS_PERFMON privileged process
` [PATCH v4 3/9] perf tool: extend Perf tool with CAP_SYS_PERFMON capability support
` [PATCH v4 4/9] drm/i915/perf: open access for CAP_SYS_PERFMON privileged process
` [PATCH v4 5/9] trace/bpf_trace: "
` [PATCH v4 6/9] powerpc/perf: "
` [PATCH v4 7/9] parisc/perf: "
` [PATCH v4 8/9] drivers/perf: "
` [PATCH v4 9/9] drivers/oprofile: "

[PATCH] integrity: Expose data structures required for include/linux/integrity.h
 2019-12-18 18:43 UTC  (8+ messages)

[PATCH v3 0/7] Introduce CAP_SYS_PERFMON to secure system performance monitoring and observability
 2019-12-17 15:02 UTC  (11+ messages)
` [PATCH v3 1/7] capabilities: introduce CAP_SYS_PERFMON to kernel and user space
` [PATCH v3 2/7] perf/core: open access for CAP_SYS_PERFMON privileged process
` [PATCH v3 3/7] perf tool: extend Perf tool with CAP_SYS_PERFMON capability support
` [PATCH v3 4/7] drm/i915/perf: open access for CAP_SYS_PERFMON privileged process
  ` [Intel-gfx] "
` [PATCH v3 5/7] trace/bpf_trace: "
` [PATCH v3 6/7] powerpc/perf: "
` [PATCH v3 7/7] parisc/perf: "

INFO: rcu detected stall in sys_kill
 2019-12-17 13:38 UTC  (5+ messages)

[PATCH] security: apparmor: Fix a possible sleep-in-atomic-context bug in find_attach()
 2019-12-17 13:12 UTC 

[PATCH v12 00/25] LSM: Module stacking for AppArmor
 2019-12-16 22:33 UTC  (16+ messages)
  ` [PATCH v12 01/25] LSM: Infrastructure management of the sock security
  ` [PATCH v12 02/25] LSM: Create and manage the lsmblob data structure
  ` [PATCH v12 03/25] LSM: Use lsmblob in security_audit_rule_match
  ` [PATCH v12 04/25] LSM: Use lsmblob in security_kernel_act_as
  ` [PATCH v12 05/25] net: Prepare UDS for security module stacking
  ` [PATCH v12 06/25] LSM: Use lsmblob in security_secctx_to_secid
  ` [PATCH v12 07/25] LSM: Use lsmblob in security_secid_to_secctx
  ` [PATCH v12 08/25] LSM: Use lsmblob in security_ipc_getsecid
  ` [PATCH v12 09/25] LSM: Use lsmblob in security_task_getsecid
  ` [PATCH v12 10/25] LSM: Use lsmblob in security_inode_getsecid
  ` [PATCH v12 11/25] LSM: Use lsmblob in security_cred_getsecid
  ` [PATCH v12 12/25] IMA: Change internal interfaces to use lsmblobs
  ` [PATCH v12 13/25] LSM: Specify which LSM to display
  ` [PATCH v12 14/25] LSM: Ensure the correct LSM context releaser
  ` [PATCH v12 15/25] LSM: Use lsmcontext in security_secid_to_secctx

[PATCH v12 00/25] LSM: Module stacking for AppArmor
 2019-12-16 22:24 UTC  (21+ messages)
  ` [PATCH v12 01/25] LSM: Infrastructure management of the sock security
  ` [PATCH v12 02/25] LSM: Create and manage the lsmblob data structure
  ` [PATCH v12 03/25] LSM: Use lsmblob in security_audit_rule_match
  ` [PATCH v12 04/25] LSM: Use lsmblob in security_kernel_act_as
  ` [PATCH v12 05/25] net: Prepare UDS for security module stacking
  ` [PATCH v12 06/25] LSM: Use lsmblob in security_secctx_to_secid
  ` [PATCH v12 07/25] LSM: Use lsmblob in security_secid_to_secctx
  ` [PATCH v12 08/25] LSM: Use lsmblob in security_ipc_getsecid
  ` [PATCH v12 09/25] LSM: Use lsmblob in security_task_getsecid
  ` [PATCH v12 10/25] LSM: Use lsmblob in security_inode_getsecid
  ` [PATCH v12 11/25] LSM: Use lsmblob in security_cred_getsecid
  ` [PATCH v12 12/25] IMA: Change internal interfaces to use lsmblobs
  ` [PATCH v12 13/25] LSM: Specify which LSM to display
  ` [PATCH v12 14/25] LSM: Ensure the correct LSM context releaser
  ` [PATCH v12 15/25] LSM: Use lsmcontext in security_secid_to_secctx
  ` [PATCH v12 16/25] LSM: Use lsmcontext in security_dentry_init_security
  ` [PATCH v12 17/25] LSM: Use lsmcontext in security_inode_getsecctx
  ` [PATCH v12 18/25] LSM: security_secid_to_secctx in netlink netfilter
  ` [PATCH v12 19/25] NET: Store LSM netlabel data in a lsmblob
  ` [PATCH v12 20/25] LSM: Verify LSM display sanity in binder

[PATCH] LSM: allow an LSM to disable all hooks at once
 2019-12-16 18:55 UTC  (17+ messages)

[PATCH v2 0/7] Introduce CAP_SYS_PERFMON to secure system performance monitoring and observability
 2019-12-16 17:12 UTC  (7+ messages)
` [PATCH v2 1/7] capabilities: introduce CAP_SYS_PERFMON to kernel and user space
` [PATCH v2 2/7] perf/core: open access for CAP_SYS_PERFMON privileged process

Suspicious RCU usage in tomoyo code
 2019-12-16 14:15 UTC  (2+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).