linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2020-02-11 04:03:13 to 2020-02-16 16:55:58 UTC [more...]

[PATCH v2 00/28] user_namespace: introduce fsid mappings
 2020-02-16 16:55 UTC  (35+ messages)
` [PATCH v2 01/28] user_namespace: introduce fsid mappings infrastructure
` [PATCH v2 02/28] proc: add /proc/<pid>/fsuid_map
` [PATCH v2 03/28] proc: add /proc/<pid>/fsgid_map
` [PATCH v2 04/28] fsuidgid: add fsid mapping helpers
` [PATCH v2 05/28] proc: task_state(): use from_kfs{g,u}id_munged
` [PATCH v2 06/28] cred: add kfs{g,u}id
` [PATCH v2 07/28] sys: __sys_setfsuid(): handle fsid mappings
` [PATCH v2 08/28] sys: __sys_setfsgid(): "
` [PATCH v2 09/28] sys:__sys_setuid(): "
` [PATCH v2 10/28] sys:__sys_setgid(): "
` [PATCH v2 11/28] sys:__sys_setreuid(): "
` [PATCH v2 12/28] sys:__sys_setregid(): "
` [PATCH v2 13/28] sys:__sys_setresuid(): "
` [PATCH v2 14/28] sys:__sys_setresgid(): "
` [PATCH v2 15/28] fs: add is_userns_visible() helper
` [PATCH v2 16/28] namei: may_{o_}create(): handle fsid mappings
` [PATCH v2 17/28] inode: inode_owner_or_capable(): "
` [PATCH v2 18/28] capability: privileged_wrt_inode_uidgid(): "
` [PATCH v2 19/28] stat: "
` [PATCH v2 20/28] open: "
` [PATCH v2 21/28] posix_acl: "
` [PATCH v2 22/28] attr: notify_change(): "
` [PATCH v2 23/28] commoncap: cap_bprm_set_creds(): "
` [PATCH v2 24/28] commoncap: cap_task_fix_setuid(): "
` [PATCH v2 25/28] commoncap: handle fsid mappings with vfs caps
` [PATCH v2 26/28] exec: bprm_fill_uid(): handle fsid mappings
` [PATCH v2 27/28] ptrace: adapt ptrace_may_access() to always uses unmapped fsids
` [PATCH v2 28/28] devpts: handle fsid mappings

[PATCH] MAINTAINERS: use tabs for SAFESETID
 2020-02-16  7:17 UTC 

[RFC PATCH] security: <linux/lsm_hooks.h>: fix all kernel-doc warnings
 2020-02-16  7:08 UTC 

[PATCH v26 10/22] x86/sgx: Linux Enclave Driver
 2020-02-15 18:05 UTC  (14+ messages)
` [PATCH v26 13/22] x86/sgx: Add provisioning

[PATCH v15 00/23] LSM: Module stacking for AppArmor
 2020-02-14 23:42 UTC  (24+ messages)
  ` [PATCH v15 01/23] LSM: Infrastructure management of the sock security
  ` [PATCH v15 02/23] LSM: Create and manage the lsmblob data structure
  ` [PATCH v15 03/23] LSM: Use lsmblob in security_audit_rule_match
  ` [PATCH v15 04/23] LSM: Use lsmblob in security_kernel_act_as
  ` [PATCH v15 05/23] net: Prepare UDS for security module stacking
  ` [PATCH v15 06/23] Use lsmblob in security_secctx_to_secid
  ` [PATCH v15 07/23] LSM: Use lsmblob in security_secid_to_secctx
  ` [PATCH v15 08/23] LSM: Use lsmblob in security_ipc_getsecid
  ` [PATCH v15 09/23] LSM: Use lsmblob in security_task_getsecid
  ` [PATCH v15 10/23] LSM: Use lsmblob in security_inode_getsecid
  ` [PATCH v15 11/23] LSM: Use lsmblob in security_cred_getsecid
  ` [PATCH v15 12/23] IMA: Change internal interfaces to use lsmblobs
  ` [PATCH v15 13/23] LSM: Specify which LSM to display
  ` [PATCH v15 14/23] LSM: Ensure the correct LSM context releaser
  ` [PATCH v15 15/23] LSM: Use lsmcontext in security_secid_to_secctx
  ` [PATCH v15 16/23] LSM: Use lsmcontext in security_inode_getsecctx
  ` [PATCH v15 17/23] LSM: security_secid_to_secctx in netlink netfilter
  ` [PATCH v15 18/23] NET: Store LSM netlabel data in a lsmblob
  ` [PATCH v15 19/23] LSM: Verify LSM display sanity in binder
  ` [PATCH v15 20/23] Audit: Add subj_LSM fields when necessary
  ` [PATCH v15 21/23] Audit: Include object data for all security modules
  ` [PATCH v15 22/23] LSM: Add /proc attr entry for full LSM context
  ` [PATCH v15 23/23] AppArmor: Remove the exclusive flag

[PATCH v2 0/6] Harden userfaultfd
 2020-02-14 20:24 UTC  (18+ messages)
` [PATCH 0/3] SELinux support for anonymous inodes and UFFD
  ` [PATCH 1/3] Add a new LSM-supporting anonymous inode interface
  ` [PATCH 2/3] Teach SELinux about anonymous inodes
  ` [PATCH 3/3] Wire UFFD up to SELinux

[PATCH AUTOSEL 5.5 201/542] IMA: Check IMA policy flag
 2020-02-14 15:43 UTC 

[PATCH v8 00/11] proc: modernize proc to support multiple private instances
 2020-02-14 14:15 UTC  (40+ messages)
` [PATCH v8 03/11] proc: move /proc/{self|thread-self} dentries to proc_fs_info
` [PATCH v8 05/11] proc: add helpers to set and get proc hidepid and gid mount options
` [PATCH v8 07/11] proc: flush task dcache entries from all procfs instances
` [PATCH v8 08/11] proc: instantiate only pids that we can ptrace on 'hidepid=4' mount option
` [PATCH v8 10/11] docs: proc: add documentation for "hidepid=4" and "subset=pidfs" options and new mount behavior

[PATCH v2] ima: export the measurement list when needed
 2020-02-13 20:11 UTC  (12+ messages)

[RFC PATCH] security,anon_inodes,kvm: enable security support for anon inodes
 2020-02-13 19:47 UTC  (2+ messages)

[RFC PATCH 0/2] ima: uncompressed module appraisal support
 2020-02-13 15:32 UTC  (19+ messages)

[PATCH v5 0/10] Introduce CAP_PERFMON to secure system performance monitoring and observability
 2020-02-13  9:05 UTC  (17+ messages)
` [PATCH v5 01/10] capabilities: introduce CAP_PERFMON to kernel and user space

[PATCH bpf-next v3 00/10] MAC and Audit policy using eBPF (KRSI)
 2020-02-12 18:59 UTC  (26+ messages)
` [PATCH bpf-next v3 02/10] bpf: lsm: Add a skeleton and config options
` [PATCH bpf-next v3 03/10] bpf: lsm: Introduce types for eBPF based LSM
` [PATCH bpf-next v3 04/10] bpf: lsm: Add mutable hooks list for the BPF LSM
        ` BPF LSM and fexit [was: [PATCH bpf-next v3 04/10] bpf: lsm: Add mutable hooks list for the BPF LSM]

[PATCH 00/24] user_namespace: introduce fsid mappings
 2020-02-12 18:53 UTC  (29+ messages)
` [PATCH 01/24] user_namespace: introduce fsid mappings infrastructure
` [PATCH 02/24] proc: add /proc/<pid>/fsuid_map
` [PATCH 03/24] proc: add /proc/<pid>/fsgid_map
` [PATCH 04/24] fsuidgid: add fsid mapping helpers
` [PATCH 05/24] proc: task_state(): use from_kfs{g,u}id_munged
` [PATCH 06/24] fs: add is_userns_visible() helper
` [PATCH 07/24] namei: may_{o_}create(): handle fsid mappings
` [PATCH 08/24] inode: inode_owner_or_capable(): "
` [PATCH 09/24] capability: privileged_wrt_inode_uidgid(): "
` [PATCH 10/24] stat: "
` [PATCH 11/24] open: chown_common(): "
` [PATCH 12/24] posix_acl: "
` [PATCH 13/24] attr: notify_change(): "
` [PATCH 14/24] commoncap: cap_task_fix_setuid(): "
` [PATCH 15/24] commoncap:cap_bprm_set_creds(): "
` [PATCH 16/24] sys: __sys_setfsuid(): "
` [PATCH 17/24] sys: __sys_setfsgid(): "
` [PATCH 18/24] sys:__sys_setuid(): "
` [PATCH 19/24] sys:__sys_setgid(): "
` [PATCH 20/24] sys:__sys_setreuid(): "
` [PATCH 21/24] sys:__sys_setregid(): "
` [PATCH 22/24] sys:__sys_setresuid(): "
` [PATCH 23/24] sys:__sys_setresgid(): "
` [PATCH 24/24] devpts: "

[PATCH] IMA hash algorithm supports sm3
 2020-02-11 23:23 UTC  (5+ messages)
` [PATCH 1/2] crypto: rename sm3-256 to sm3 in hash_algo_name

[PATCH] apparmor: Replace zero-length array with flexible-array member
 2020-02-11 21:04 UTC 

[PATCH v14 00/23] LSM: Module stacking for AppArmor
 2020-02-11 19:11 UTC  (17+ messages)
` [PATCH v14 22/23] LSM: Add /proc attr entry for full LSM context

[PATCH v3 0/8] ima: support stronger algorithms for attestation
 2020-02-11 10:09 UTC  (4+ messages)
` [PATCH v3 2/8] ima: Switch to ima_hash_algo for boot aggregate

[PATCH] IMA hash algorithm supports sm3-256
 2020-02-11  7:56 UTC  (6+ messages)
` [PATCH 1/2] crypto: sm3 - add a new alias name sm3-256


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).