messages from 2020-01-15 17:13:30 to 2020-01-28 14:58:53 UTC [more...]
[PATCH v7 00/11] proc: modernize proc to support multiple private instances
2020-01-28 14:58 UTC (16+ messages)
` [PATCH v7 01/11] proc: Rename struct proc_fs_info to proc_fs_opts
` [PATCH v7 02/11] proc: add proc_fs_info struct to store proc information
` [PATCH v7 03/11] proc: move /proc/{self|thread-self} dentries to proc_fs_info
` [PATCH v7 04/11] proc: move hide_pid, pid_gid from pid_namespace "
` [PATCH v7 05/11] proc: add helpers to set and get proc hidepid and gid mount options
` [PATCH v7 06/11] proc: support mounting procfs instances inside same pid namespace
` [PATCH v7 07/11] proc: flush task dcache entries from all procfs instances
` [PATCH v7 08/11] proc: instantiate only pids that we can ptrace on 'hidepid=4' mount option
` [PATCH v7 09/11] proc: add option to mount only a pids subset
` [PATCH v7 10/11] docs: proc: add documentation for "hidepid=4" and "subset=pidfs" options and new mount behavior
` [PATCH v7 11/11] proc: Move hidepid values to uapi as they are user interface to mount
[PATCH v6 00/10] Introduce CAP_PERFMON to secure system performance monitoring and observability
2020-01-28 6:14 UTC (11+ messages)
` [PATCH v6 01/10] capabilities: introduce CAP_PERFMON to kernel and user space
` [PATCH v6 02/10] perf/core: open access to the core for CAP_PERFMON privileged process
` [PATCH v6 03/10] perf/core: open access to probes "
` [PATCH v6 04/10] perf tool: extend Perf tool with CAP_PERFMON capability support
` [PATCH v6 05/10] drm/i915/perf: open access for CAP_PERFMON privileged process
` [PATCH v6 06/10] trace/bpf_trace: "
` [PATCH v6 07/10] powerpc/perf: "
` [PATCH v6 08/10] parisc/perf: "
` [PATCH v6 09/10] drivers/perf: "
` [PATCH v6 10/10] drivers/oprofile: "
[GIT PULL] TOMOYO patches for v5.6
2020-01-28 4:17 UTC
[GIT PULL] SELinux patches for v5.6
2020-01-27 23:55 UTC (2+ messages)
[PATCH v14 00/23] LSM: Module stacking for AppArmor
2020-01-27 22:49 UTC (40+ messages)
` [PATCH v14 01/23] LSM: Infrastructure management of the sock security
` [PATCH v14 02/23] LSM: Create and manage the lsmblob data structure
` [PATCH v14 03/23] LSM: Use lsmblob in security_audit_rule_match
` [PATCH v14 04/23] LSM: Use lsmblob in security_kernel_act_as
` [PATCH v14 05/23] net: Prepare UDS for security module stacking
` [PATCH v14 06/23] Use lsmblob in security_secctx_to_secid
` [PATCH v14 07/23] LSM: Use lsmblob in security_secid_to_secctx
` [PATCH v14 08/23] LSM: Use lsmblob in security_ipc_getsecid
` [PATCH v14 09/23] LSM: Use lsmblob in security_task_getsecid
` [PATCH v14 10/23] LSM: Use lsmblob in security_inode_getsecid
` [PATCH v14 11/23] LSM: Use lsmblob in security_cred_getsecid
` [PATCH v14 12/23] IMA: Change internal interfaces to use lsmblobs
` [PATCH v14 13/23] LSM: Specify which LSM to display
` [PATCH v14 14/23] LSM: Ensure the correct LSM context releaser
` [PATCH v14 15/23] LSM: Use lsmcontext in security_secid_to_secctx
` [PATCH v14 16/23] LSM: Use lsmcontext in security_inode_getsecctx
` [PATCH v14 17/23] LSM: security_secid_to_secctx in netlink netfilter
` [PATCH v14 18/23] NET: Store LSM netlabel data in a lsmblob
` [PATCH v14 19/23] LSM: Verify LSM display sanity in binder
` [PATCH v14 20/23] Audit: Add subj_LSM fields when necessary
` [PATCH v14 21/23] Audit: Include object data for all security modules
` [PATCH v14 22/23] LSM: Add /proc attr entry for full LSM context
` [PATCH v14 23/23] AppArmor: Remove the exclusive flag
` KASAN slab-out-of-bounds in tun_chr_open/sock_init_data (Was: Re: [PATCH v14 00/23] LSM: Module stacking for AppArmor)
Denying access from sb_umount issue
2020-01-27 21:10 UTC (3+ messages)
[PATCH 1/1] proc_keys_next should increase position index
2020-01-27 19:27 UTC (3+ messages)
[PATCH 0/8] ima: support stronger algorithms for attestation
2020-01-27 17:29 UTC (10+ messages)
` [PATCH 1/8] tpm: initialize crypto_id of allocated_banks to HASH_ALGO__LAST
` [PATCH 2/8] ima: evaluate error in init_ima()
` [PATCH 3/8] ima: store template digest directly in ima_template_entry
` [PATCH 4/8] ima: switch to dynamically allocated buffer for template digests
` [PATCH 5/8] ima: allocate and initialize tfm for each PCR bank
` [PATCH 6/8] ima: calculate and extend PCR with digests in ima_template_entry
` [PATCH 7/8] ima: use ima_hash_algo for collision detection in the measurement list
` [PATCH 8/8] ima: switch to ima_hash_algo for boot aggregate
[PATCH v2] ima: export the measurement list when needed
2020-01-27 9:03 UTC (8+ messages)
[PATCH v4 0/7] Introduce CAP_SYS_PERFMON to secure system performance monitoring and observability
2020-01-27 8:52 UTC (3+ messages)
` [PATCH v4 7/9] parisc/perf: open access for CAP_SYS_PERFMON privileged process
[RFC PATCH 00/14] pipe: Keyrings, Block and USB notifications [ver #3]
2020-01-26 15:47 UTC (5+ messages)
` [RFC PATCH 07/14] Add sample notification program "
[PATCH bpf-next v3 00/10] MAC and Audit policy using eBPF (KRSI)
2020-01-24 21:55 UTC (22+ messages)
` [PATCH bpf-next v3 01/10] bpf: btf: Add btf_type_by_name_kind
` [PATCH bpf-next v3 02/10] bpf: lsm: Add a skeleton and config options
` [PATCH bpf-next v3 03/10] bpf: lsm: Introduce types for eBPF based LSM
` [PATCH bpf-next v3 04/10] bpf: lsm: Add mutable hooks list for the BPF LSM
` [PATCH bpf-next v3 05/10] bpf: lsm: BTF API for LSM hooks
` [PATCH bpf-next v3 06/10] bpf: lsm: Implement attach, detach and execution
` [PATCH bpf-next v3 07/10] bpf: lsm: Make the allocated callback RO+X
` [PATCH bpf-next v3 08/10] tools/libbpf: Add support for BPF_PROG_TYPE_LSM
` [PATCH bpf-next v3 09/10] bpf: lsm: Add selftests "
` [PATCH bpf-next v3 10/10] bpf: lsm: Add Documentation
Perf Data on LSM in v5.3
2020-01-24 14:57 UTC (9+ messages)
[PATCH 0/1] keys: seq_file .next functions should increase position index
2020-01-24 6:25 UTC
[PATCH] security: remove EARLY_LSM_COUNT which never used
2020-01-23 23:44 UTC (3+ messages)
SELinux: How to split permissions for keys?
2020-01-23 20:35 UTC (3+ messages)
[PATCH v2 1/2] security/keys/secure_key: Adds the secure key support based on CAAM
2020-01-23 12:55 UTC (3+ messages)
[PATCH v24 12/24] x86/sgx: Linux Enclave Driver
2020-01-23 12:31 UTC (3+ messages)
[PATCH v5 0/10] Introduce CAP_PERFMON to secure system performance monitoring and observability
2020-01-22 14:25 UTC (19+ messages)
` [PATCH v5 01/10] capabilities: introduce CAP_PERFMON to kernel and user space
` [PATCH v5 02/10] perf/core: open access to the core for CAP_PERFMON privileged process
` [PATCH v5 03/10] perf/core: open access to anon probes "
` [PATCH v5 04/10] perf tool: extend Perf tool with CAP_PERFMON capability support
` [PATCH v5 05/10] drm/i915/perf: open access for CAP_PERFMON privileged process
` [PATCH v5 06/10] trace/bpf_trace: "
` [PATCH v5 07/10] powerpc/perf: "
` [PATCH v5 08/10] parisc/perf: "
` [PATCH v5 09/10] drivers/perf: "
` [PATCH v5 10/10] drivers/oprofile: "
[PATCH bpf-next v2 00/10] MAC and Audit policy using eBPF (KRSI)
2020-01-20 11:12 UTC (31+ messages)
` [PATCH bpf-next v2 01/10] bpf: btf: Make some of the API visible outside BTF
` [PATCH bpf-next v2 02/10] bpf: lsm: Add a skeleton and config options
` [PATCH bpf-next v2 04/10] bpf: lsm: Add mutable hooks list for the BPF LSM
` [PATCH bpf-next v2 05/10] bpf: lsm: BTF API for LSM hooks
` [PATCH bpf-next v2 06/10] bpf: lsm: Implement attach, detach and execution
` [PATCH bpf-next v2 07/10] bpf: lsm: Make the allocated callback RO+X
` [PATCH bpf-next v2 08/10] tools/libbpf: Add support for BPF_PROG_TYPE_LSM
` [PATCH bpf-next v2 09/10] bpf: lsm: Add selftests "
` [PATCH bpf-next v2 10/10] bpf: lsm: Add Documentation
[RFC PATCH 0/2] Create CAAM HW key in linux keyring and use in dmcrypt
2020-01-18 17:55 UTC (7+ messages)
` [RFC PATCH 2/2] dm-crypt: Use any key type which is registered
[linux-next:master 7161/9861] security/apparmor/policy_unpack_test.c:51:15: sparse: sparse: symbol 'build_aa_ext_struct' was not declared. Should it be static?
2020-01-18 10:52 UTC (2+ messages)
` [RFC PATCH linux-next] apparmor: build_aa_ext_struct() can be static
inconsistent lock state in ima_process_queued_keys
2020-01-18 5:22 UTC (3+ messages)
[PATCH v2] selinux: remove redundant selinux_nlmsg_perm
2020-01-16 19:37 UTC (2+ messages)
[PATCH AUTOSEL 4.19 007/671] apparmor: Fix network performance issue in aa_label_sk_perm
2020-01-16 16:44 UTC (2+ messages)
` [PATCH AUTOSEL 4.19 009/671] apparmor: don't try to replace stale label in ptrace access check
[PATCH AUTOSEL 4.19 183/671] keys: Timestamp new keys
2020-01-16 16:51 UTC
[PATCH RESEND] MAINTAINERS: fix style in SAFESETID SECURITY MODULE
2020-01-16 18:58 UTC
[PATCH AUTOSEL 4.14 100/371] keys: Timestamp new keys
2020-01-16 17:19 UTC
[PATCH AUTOSEL 4.9 072/251] keys: Timestamp new keys
2020-01-16 17:33 UTC
[PATCH AUTOSEL 4.14 004/371] apparmor: don't try to replace stale label in ptrace access check
2020-01-16 17:11 UTC
[PATCH bpf-next v1 00/13] MAC and Audit policy using eBPF (KRSI)
2020-01-15 22:23 UTC (11+ messages)
[PATCH v2] ima: add the ability to query the hash of a given file
2020-01-15 19:09 UTC (5+ messages)
[PATCH v4] ima: ima/lsm policy rule loading logic bug fixes
2020-01-15 18:36 UTC (2+ messages)
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).