linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2019-12-24 05:48:28 to 2020-01-09 18:12:54 UTC [more...]

[PATCH bpf-next v1 00/13] MAC and Audit policy using eBPF (KRSI)
 2020-01-09 18:11 UTC  (53+ messages)
` [PATCH bpf-next v1 02/13] bpf: lsm: Add a skeleton and config options
` [PATCH bpf-next v1 04/13] bpf: lsm: Allow btf_id based attachment for LSM hooks
` [PATCH bpf-next v1 05/13] tools/libbpf: Add support in libbpf for BPF_PROG_TYPE_LSM
` [PATCH bpf-next v1 06/13] bpf: lsm: Init Hooks and create files in securityfs
` [PATCH bpf-next v1 07/13] bpf: lsm: Implement attach, detach and execution
` [PATCH bpf-next v1 08/13] bpf: lsm: Show attached program names in hook read handler
` [PATCH bpf-next v1 09/13] bpf: lsm: Add a helper function bpf_lsm_event_output
` [PATCH bpf-next v1 10/13] bpf: lsm: Handle attachment of the same program
` [PATCH bpf-next v1 11/13] tools/libbpf: Add bpf_program__attach_lsm
` [PATCH bpf-next v1 12/13] bpf: lsm: Add selftests for BPF_PROG_TYPE_LSM

[PATCH v13 00/25] LSM: Module stacking for AppArmor
 2020-01-09 16:33 UTC  (46+ messages)
  ` [PATCH v13 01/25] LSM: Infrastructure management of the sock security
  ` [PATCH v13 02/25] LSM: Create and manage the lsmblob data structure
  ` [PATCH v13 03/25] LSM: Use lsmblob in security_audit_rule_match
  ` [PATCH v13 04/25] LSM: Use lsmblob in security_kernel_act_as
  ` [PATCH v13 05/25] net: Prepare UDS for security module stacking
  ` [PATCH v13 06/25] Use lsmblob in security_secctx_to_secid
  ` [PATCH v13 07/25] LSM: Use lsmblob in security_secid_to_secctx
  ` [PATCH v13 08/25] LSM: Use lsmblob in security_ipc_getsecid
  ` [PATCH v13 09/25] LSM: Use lsmblob in security_task_getsecid
  ` [PATCH v13 10/25] LSM: Use lsmblob in security_inode_getsecid
  ` [PATCH v13 11/25] LSM: Use lsmblob in security_cred_getsecid
  ` [PATCH v13 12/25] IMA: Change internal interfaces to use lsmblobs
  ` [PATCH v13 13/25] LSM: Specify which LSM to display
  ` [PATCH v13 14/25] LSM: Ensure the correct LSM context releaser
  ` [PATCH v13 15/25] LSM: Use lsmcontext in security_secid_to_secctx
  ` [PATCH v13 16/25] LSM: Use lsmcontext in security_dentry_init_security
  ` [PATCH v13 17/25] LSM: Use lsmcontext in security_inode_getsecctx
  ` [PATCH v13 18/25] LSM: security_secid_to_secctx in netlink netfilter
  ` [PATCH v13 19/25] NET: Store LSM netlabel data in a lsmblob
  ` [PATCH v13 20/25] LSM: Verify LSM display sanity in binder
  ` [PATCH v13 21/25] Audit: Add subj_LSM fields when necessary
  ` [PATCH v13 22/25] Audit: Include object data for all security modules
  ` [PATCH v13 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
  ` [PATCH 24/25] LSM: Add /proc attr entry for full LSM context
  ` [PATCH v13 25/25] AppArmor: Remove the exclusive flag
  ` [PATCH v13 26/25] Audit: Multiple LSM support in audit rules

[PATCH] ima: ima/lsm policy rule loading logic bug fixes
 2020-01-09 14:54 UTC  (2+ messages)

[PATCH v4 0/7] Introduce CAP_SYS_PERFMON to secure system performance monitoring and observability
 2020-01-09 11:36 UTC  (4+ messages)
` [PATCH v4 2/9] perf/core: open access for CAP_SYS_PERFMON privileged process

[PATCH bpf-next] bpf: Make trampolines W^X
 2020-01-09  6:48 UTC  (10+ messages)

[PATCH] LSM: Delete hooks in reverse order for avoiding race
 2020-01-09  3:22 UTC  (3+ messages)
  ` [External] "

[PATCH 0/2] LSM: Drop security_delete_hooks()
 2020-01-08 18:47 UTC  (16+ messages)
` [PATCH 1/2] selinux: treat atomic flags more carefully
` [PATCH 2/2] security,selinux: get rid of security_delete_hooks()
  ` [PATCH 2/2] security, selinux: "

[PATCH v2] ima: add the ability to query the hash of a given file
 2020-01-08 16:05 UTC  (2+ messages)

[PATCH v2] ima: export the measurement list when needed
 2020-01-08 11:17 UTC 

[PATCH v6 00/10] proc: modernize proc to support multiple private instances
 2020-01-08 10:37 UTC  (17+ messages)
` [PATCH v6 01/10] proc: Rename struct proc_fs_info to proc_fs_opts
` [PATCH v6 02/10] proc: add proc_fs_info struct to store proc information
` [PATCH v6 03/10] proc: move /proc/{self|thread-self} dentries to proc_fs_info
` [PATCH v6 04/10] proc: move hide_pid, pid_gid from pid_namespace "
` [PATCH v6 05/10] proc: add helpers to set and get proc hidepid and gid mount options
` [PATCH v6 06/10] proc: support mounting procfs instances inside same pid namespace
` [PATCH v6 07/10] proc: flush task dcache entries from all procfs instances
` [PATCH v6 08/10] proc: instantiate only pids that we can ptrace on 'hidepid=3' mount option
` [PATCH v6 09/10] proc: add option to mount only a pids subset
` [PATCH v6 10/10] docs: proc: add documentation for "hidepid=3" and "pidonly" options and new mount behavior

INFO: rcu detected stall in sys_kill
 2020-01-08  6:20 UTC  (6+ messages)

[PATCH 4.19 011/115] afs: Fix SELinux setting security label on /afs
 2020-01-07 20:53 UTC 

[PATCH 5.4 020/191] afs: Fix SELinux setting security label on /afs
 2020-01-07 20:52 UTC 

[PATCH bpf-next] bpf: Make trampolines W^X
 2020-01-07 18:55 UTC  (3+ messages)

[PATCH v2] selinux: deprecate disabling SELinux and runtime
 2020-01-07 15:28 UTC  (3+ messages)

INFO: rcu detected stall in sys_sendfile64
 2020-01-07 13:11 UTC  (6+ messages)

[RFC PATCH] selinux: deprecate disabling SELinux and runtime
 2020-01-07  3:29 UTC  (7+ messages)

[PATCH] ima: add the ability to query ima for the hash of a given file
 2020-01-06 16:15 UTC  (5+ messages)

[PATCH] efi: Allow some cert-related UEFI variables to not be present
 2020-01-05 17:34 UTC 

[GIT PULL] apparmor bug fixes for v5.5-rc5
 2020-01-05  3:35 UTC  (2+ messages)

[PATCH v2] ima: Add a space after printing LSM rules for readability
 2020-01-05  1:18 UTC 

[PATCH] ima: Add a space after printing a LSM rule for readability
 2020-01-05  1:12 UTC  (3+ messages)

[PATCH] security: apparmor: Fix a possible sleep-in-atomic-context bug in find_attach()
 2020-01-02 19:19 UTC  (3+ messages)

[PATCH v1 - RFC] ima: export the measurement list when needed
 2020-01-01  6:49 UTC  (4+ messages)

[GIT PULL] tomoyo fixes for 5.5
 2019-12-31 19:45 UTC  (4+ messages)

[PATCH v12 00/25] LSM: Module stacking for AppArmor
 2019-12-31 17:36 UTC  (29+ messages)
  ` [PATCH v12 01/25] LSM: Infrastructure management of the sock security
  ` [PATCH v12 02/25] LSM: Create and manage the lsmblob data structure
  ` [PATCH v12 03/25] LSM: Use lsmblob in security_audit_rule_match
  ` [PATCH v12 04/25] LSM: Use lsmblob in security_kernel_act_as
  ` [PATCH v12 05/25] net: Prepare UDS for security module stacking
  ` [PATCH v12 06/25] LSM: Use lsmblob in security_secctx_to_secid
  ` [PATCH v12 07/25] LSM: Use lsmblob in security_secid_to_secctx
  ` [PATCH v12 08/25] LSM: Use lsmblob in security_ipc_getsecid
  ` [PATCH v12 09/25] LSM: Use lsmblob in security_task_getsecid
  ` [PATCH v12 10/25] LSM: Use lsmblob in security_inode_getsecid
  ` [PATCH v12 11/25] LSM: Use lsmblob in security_cred_getsecid
  ` [PATCH v12 12/25] IMA: Change internal interfaces to use lsmblobs
  ` [PATCH v12 13/25] LSM: Specify which LSM to display
  ` [PATCH v12 14/25] LSM: Ensure the correct LSM context releaser
  ` [PATCH v12 15/25] LSM: Use lsmcontext in security_secid_to_secctx
  ` [PATCH v12 16/25] LSM: Use lsmcontext in security_dentry_init_security
  ` [PATCH v12 17/25] LSM: Use lsmcontext in security_inode_getsecctx
  ` [PATCH v12 18/25] LSM: security_secid_to_secctx in netlink netfilter
  ` [PATCH v12 19/25] NET: Store LSM netlabel data in a lsmblob
  ` [PATCH v12 20/25] LSM: Verify LSM display sanity in binder
  ` [PATCH v12 21/25] Audit: Add subj_LSM fields when necessary
  ` [PATCH v12 22/25] Audit: Include object data for all security modules
  ` [PATCH v12 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
  ` [PATCH v12 24/25] LSM: Add /proc attr entry for full LSM context
  ` [PATCH v12 25/25] AppArmor: Remove the exclusive flag

Take home 750,000 Euros this end of year
 2019-12-25  4:33 UTC 


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).