linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2020-01-20 11:00:28 to 2020-02-03 18:53:46 UTC [more...]

[PATCH v14 00/23] LSM: Module stacking for AppArmor
 2020-02-03 18:54 UTC  (42+ messages)
  ` [PATCH v14 01/23] LSM: Infrastructure management of the sock security
  ` [PATCH v14 02/23] LSM: Create and manage the lsmblob data structure
  ` [PATCH v14 03/23] LSM: Use lsmblob in security_audit_rule_match
  ` [PATCH v14 04/23] LSM: Use lsmblob in security_kernel_act_as
  ` [PATCH v14 05/23] net: Prepare UDS for security module stacking
  ` [PATCH v14 06/23] Use lsmblob in security_secctx_to_secid
  ` [PATCH v14 07/23] LSM: Use lsmblob in security_secid_to_secctx
  ` [PATCH v14 08/23] LSM: Use lsmblob in security_ipc_getsecid
  ` [PATCH v14 09/23] LSM: Use lsmblob in security_task_getsecid
  ` [PATCH v14 10/23] LSM: Use lsmblob in security_inode_getsecid
  ` [PATCH v14 11/23] LSM: Use lsmblob in security_cred_getsecid
  ` [PATCH v14 12/23] IMA: Change internal interfaces to use lsmblobs
  ` [PATCH v14 13/23] LSM: Specify which LSM to display
  ` [PATCH v14 14/23] LSM: Ensure the correct LSM context releaser
  ` [PATCH v14 15/23] LSM: Use lsmcontext in security_secid_to_secctx
  ` [PATCH v14 16/23] LSM: Use lsmcontext in security_inode_getsecctx
  ` [PATCH v14 17/23] LSM: security_secid_to_secctx in netlink netfilter
  ` [PATCH v14 18/23] NET: Store LSM netlabel data in a lsmblob
  ` [PATCH v14 19/23] LSM: Verify LSM display sanity in binder
  ` [PATCH v14 20/23] Audit: Add subj_LSM fields when necessary
  ` [PATCH v14 21/23] Audit: Include object data for all security modules
  ` [PATCH v14 22/23] LSM: Add /proc attr entry for full LSM context
  ` [PATCH v14 23/23] AppArmor: Remove the exclusive flag
        ` KASAN slab-out-of-bounds in tun_chr_open/sock_init_data (Was: Re: [PATCH v14 00/23] LSM: Module stacking for AppArmor)

[PATCH] security/integrity: Include __func__ in messages for easier debug
 2020-02-03 15:15 UTC  (4+ messages)

SELinux: How to split permissions for keys?
 2020-02-03 14:48 UTC  (7+ messages)

[PATCH 0/8] ima: support stronger algorithms for attestation
 2020-02-01 17:10 UTC  (26+ messages)
` [PATCH 1/8] tpm: initialize crypto_id of allocated_banks to HASH_ALGO__LAST
` [PATCH 2/8] ima: evaluate error in init_ima()
` [PATCH 3/8] ima: store template digest directly in ima_template_entry
` [PATCH 4/8] ima: switch to dynamically allocated buffer for template digests
` [PATCH 5/8] ima: allocate and initialize tfm for each PCR bank
` [PATCH 6/8] ima: calculate and extend PCR with digests in ima_template_entry
` [PATCH 7/8] ima: use ima_hash_algo for collision detection in the measurement list
` [PATCH 8/8] ima: switch to ima_hash_algo for boot aggregate

[PATCH 1/1] proc_keys_next should increase position index
 2020-02-01  7:54 UTC  (8+ messages)
    ` [PATCH v2] keys: "

Perf Data on LSM in v5.3
 2020-01-31 19:50 UTC  (10+ messages)

linux-next: Tree for Jan 29 (security/smack/)
 2020-01-31 17:35 UTC  (3+ messages)

mmotm 2020-01-28-20-05 uploaded (security/security.c)
 2020-01-29 22:32 UTC  (4+ messages)

[PATCH] security, keys: Optimize barrier usage for Rmw atomic bitops
 2020-01-29 18:06 UTC 

[GIT PULL] TOMOYO patches for v5.6
 2020-01-29  3:00 UTC  (3+ messages)

[GIT PULL] Security subsystem changes for v5.6
 2020-01-29  3:00 UTC  (2+ messages)

[PATCH v6 00/10] Introduce CAP_PERFMON to secure system performance monitoring and observability
 2020-01-28 21:18 UTC  (18+ messages)
` [PATCH v6 01/10] capabilities: introduce CAP_PERFMON to kernel and user space
` [PATCH v6 02/10] perf/core: open access to the core for CAP_PERFMON privileged process
` [PATCH v6 03/10] perf/core: open access to probes "
` [PATCH v6 04/10] perf tool: extend Perf tool with CAP_PERFMON capability support
` [PATCH v6 05/10] drm/i915/perf: open access for CAP_PERFMON privileged process
` [PATCH v6 06/10] trace/bpf_trace: "
` [PATCH v6 07/10] powerpc/perf: "
` [PATCH v6 08/10] parisc/perf: "
` [PATCH v6 09/10] drivers/perf: "
` [PATCH v6 10/10] drivers/oprofile: "

[PATCH v7 00/11] proc: modernize proc to support multiple private instances
 2020-01-28 14:58 UTC  (16+ messages)
` [PATCH v7 01/11] proc: Rename struct proc_fs_info to proc_fs_opts
` [PATCH v7 02/11] proc: add proc_fs_info struct to store proc information
` [PATCH v7 03/11] proc: move /proc/{self|thread-self} dentries to proc_fs_info
` [PATCH v7 04/11] proc: move hide_pid, pid_gid from pid_namespace "
` [PATCH v7 05/11] proc: add helpers to set and get proc hidepid and gid mount options
` [PATCH v7 06/11] proc: support mounting procfs instances inside same pid namespace
` [PATCH v7 07/11] proc: flush task dcache entries from all procfs instances
` [PATCH v7 08/11] proc: instantiate only pids that we can ptrace on 'hidepid=4' mount option
` [PATCH v7 09/11] proc: add option to mount only a pids subset
` [PATCH v7 10/11] docs: proc: add documentation for "hidepid=4" and "subset=pidfs" options and new mount behavior
` [PATCH v7 11/11] proc: Move hidepid values to uapi as they are user interface to mount

[GIT PULL] SELinux patches for v5.6
 2020-01-27 23:55 UTC  (2+ messages)

Denying access from sb_umount issue
 2020-01-27 21:10 UTC  (3+ messages)

[PATCH v2] ima: export the measurement list when needed
 2020-01-27  9:03 UTC  (8+ messages)

[PATCH v4 0/7] Introduce CAP_SYS_PERFMON to secure system performance monitoring and observability
 2020-01-27  8:52 UTC  (3+ messages)
` [PATCH v4 7/9] parisc/perf: open access for CAP_SYS_PERFMON privileged process

[RFC PATCH 00/14] pipe: Keyrings, Block and USB notifications [ver #3]
 2020-01-26 15:47 UTC  (3+ messages)
` [RFC PATCH 07/14] Add sample notification program "

[PATCH bpf-next v3 00/10] MAC and Audit policy using eBPF (KRSI)
 2020-01-24 21:55 UTC  (22+ messages)
` [PATCH bpf-next v3 01/10] bpf: btf: Add btf_type_by_name_kind
` [PATCH bpf-next v3 02/10] bpf: lsm: Add a skeleton and config options
` [PATCH bpf-next v3 03/10] bpf: lsm: Introduce types for eBPF based LSM
` [PATCH bpf-next v3 04/10] bpf: lsm: Add mutable hooks list for the BPF LSM
` [PATCH bpf-next v3 05/10] bpf: lsm: BTF API for LSM hooks
` [PATCH bpf-next v3 06/10] bpf: lsm: Implement attach, detach and execution
` [PATCH bpf-next v3 07/10] bpf: lsm: Make the allocated callback RO+X
` [PATCH bpf-next v3 08/10] tools/libbpf: Add support for BPF_PROG_TYPE_LSM
` [PATCH bpf-next v3 09/10] bpf: lsm: Add selftests "
` [PATCH bpf-next v3 10/10] bpf: lsm: Add Documentation

[PATCH 0/1] keys: seq_file .next functions should increase position index
 2020-01-24  6:25 UTC 

[PATCH] security: remove EARLY_LSM_COUNT which never used
 2020-01-23 23:44 UTC  (3+ messages)

[PATCH v2 1/2] security/keys/secure_key: Adds the secure key support based on CAAM
 2020-01-23 12:55 UTC  (3+ messages)

[PATCH v24 12/24] x86/sgx: Linux Enclave Driver
 2020-01-23 12:31 UTC  (3+ messages)

[PATCH v5 0/10] Introduce CAP_PERFMON to secure system performance monitoring and observability
 2020-01-22 14:25 UTC  (19+ messages)
` [PATCH v5 01/10] capabilities: introduce CAP_PERFMON to kernel and user space
` [PATCH v5 02/10] perf/core: open access to the core for CAP_PERFMON privileged process
` [PATCH v5 03/10] perf/core: open access to anon probes "
` [PATCH v5 04/10] perf tool: extend Perf tool with CAP_PERFMON capability support
` [PATCH v5 05/10] drm/i915/perf: open access for CAP_PERFMON privileged process
` [PATCH v5 06/10] trace/bpf_trace: "
` [PATCH v5 07/10] powerpc/perf: "
` [PATCH v5 08/10] parisc/perf: "
` [PATCH v5 09/10] drivers/perf: "
` [PATCH v5 10/10] drivers/oprofile: "

[PATCH bpf-next v2 00/10] MAC and Audit policy using eBPF (KRSI)
 2020-01-20 11:12 UTC  (6+ messages)
` [PATCH bpf-next v2 05/10] bpf: lsm: BTF API for LSM hooks

[PATCH bpf-next v2 01/10] bpf: btf: Make some of the API visible outside BTF
 2020-01-20 11:00 UTC  (3+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).