linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2020-02-17 23:03:56 to 2020-02-25 15:11:17 UTC [more...]

BUG: unable to handle kernel NULL pointer dereference in cipso_v4_sock_setattr
 2020-02-25 15:11 UTC  (6+ messages)

[PATCH v7 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
 2020-02-25  9:55 UTC  (24+ messages)
` [PATCH v7 01/12] capabilities: introduce CAP_PERFMON to kernel and user space
` [PATCH v7 02/12] perf/core: open access to the core for CAP_PERFMON privileged process
` [PATCH v7 03/12] perf/core: open access to probes "
` [PATCH v7 04/12] perf tool: extend Perf tool with CAP_PERFMON capability support
` [PATCH v7 05/12] drm/i915/perf: open access for CAP_PERFMON privileged process
` [PATCH v7 06/12] trace/bpf_trace: "
` [PATCH v7 07/12] powerpc/perf: "
` [PATCH v7 08/12] parisc/perf: "
` [PATCH v7 09/12] drivers/perf: "
` [PATCH v7 10/12] drivers/oprofile: "

[PATCH bpf-next v4 0/8] MAC and Audit policy using eBPF (KRSI)
 2020-02-25  6:45 UTC  (38+ messages)
` [PATCH bpf-next v4 1/8] bpf: Introduce BPF_PROG_TYPE_LSM
` [PATCH bpf-next v4 2/8] security: Refactor declaration of LSM hooks
` [PATCH bpf-next v4 3/8] bpf: lsm: provide attachment points for BPF LSM programs
` [PATCH bpf-next v4 4/8] bpf: lsm: Add support for enabling/disabling BPF hooks
` [PATCH bpf-next v4 5/8] bpf: lsm: Implement attach, detach and execution
` [PATCH bpf-next v4 6/8] tools/libbpf: Add support for BPF_PROG_TYPE_LSM
` [PATCH bpf-next v4 7/8] bpf: lsm: Add selftests "
` [PATCH bpf-next v4 8/8] bpf: lsm: Add Documentation

[PATCH v15 00/23] LSM: Module stacking for AppArmor
 2020-02-24 18:26 UTC  (10+ messages)
` [PATCH v15 02/23] LSM: Create and manage the lsmblob data structure
` [PATCH v15 03/23] LSM: Use lsmblob in security_audit_rule_match
` [PATCH v15 22/23] LSM: Add /proc attr entry for full LSM context
` [PATCH v15 23/23] AppArmor: Remove the exclusive flag

[RFC PATCH v14 00/10] Landlock LSM
 2020-02-24 16:02 UTC  (11+ messages)
` [RFC PATCH v14 01/10] landlock: Add object and rule management
` [RFC PATCH v14 02/10] landlock: Add ruleset and domain management
` [RFC PATCH v14 03/10] landlock: Set up the security framework and manage credentials
` [RFC PATCH v14 04/10] landlock: Add ptrace restrictions
` [RFC PATCH v14 05/10] fs,landlock: Support filesystem access-control
` [RFC PATCH v14 06/10] landlock: Add syscall implementation
` [RFC PATCH v14 07/10] arch: Wire up landlock() syscall
` [RFC PATCH v14 08/10] selftests/landlock: Add initial tests
` [RFC PATCH v14 09/10] samples/landlock: Add a sandbox manager example
` [RFC PATCH v14 10/10] landlock: Add user and kernel documentation

[PATCH v8 07/11] proc: flush task dcache entries from all procfs instances
 2020-02-24 16:29 UTC  (41+ messages)
                            ` [PATCH 0/7] proc: Dentry flushing without proc_mnt
                              ` [PATCH 1/7] proc: Rename in proc_inode rename sysctl_inodes sibling_inodes
                              ` [PATCH 2/7] proc: Generalize proc_sys_prune_dcache into proc_prune_siblings_dcache
                              ` [PATCH 3/7] proc: Mov rcu_read_(lock|unlock) in proc_prune_siblings_dcache
                              ` [PATCH 4/7] proc: Use d_invalidate "
                              ` [PATCH 5/7] proc: Clear the pieces of proc_inode that proc_evict_inode cares about
                              ` [PATCH 6/7] proc: Use a list of inodes to flush from proc
                              ` [PATCH 7/7] proc: Ensure we see the exit of each process tid exactly once
                              ` [PATCH v2 0/6] proc: Dentry flushing without proc_mnt
                                ` [PATCH v2 1/6] proc: Rename in proc_inode rename sysctl_inodes sibling_inodes
                                ` [PATCH v2 2/6] proc: Generalize proc_sys_prune_dcache into proc_prune_siblings_dcache
                                ` [PATCH v2 3/6] proc: In proc_prune_siblings_dcache cache an aquired super block
                                ` [PATCH v2 4/6] proc: Use d_invalidate in proc_prune_siblings_dcache
                                ` [PATCH v2 5/6] proc: Clear the pieces of proc_inode that proc_evict_inode cares about
                                ` [PATCH v2 6/6] proc: Use a list of inodes to flush from proc

[PATCH v27 10/22] x86/sgx: Linux Enclave Driver
 2020-02-23 17:25 UTC  (2+ messages)
` [PATCH v27 13/22] x86/sgx: Add provisioning

[PATCH net] ipv4: ensure rcu_read_lock() in cipso_v4_error()
 2020-02-23  5:47 UTC  (3+ messages)

[PATCH] device_cgroup: Fix RCU list debugging warning
 2020-02-22 17:19 UTC 

[PATCH v2 0/6] Harden userfaultfd
 2020-02-21 17:56 UTC  (2+ messages)

[PATCH -next] security: remove duplicated include from security.h
 2020-02-21 16:56 UTC  (2+ messages)

[PATCH] lockdown: Allow unprivileged users to see lockdown status
 2020-02-21 16:51 UTC  (2+ messages)

[PATCH v26 10/22] x86/sgx: Linux Enclave Driver
 2020-02-21 13:01 UTC  (13+ messages)

[RFC PATCH] security,anon_inodes,kvm: enable security support for anon inodes
 2020-02-20 18:50 UTC  (4+ messages)

[PATCH v3 00/25] user_namespace: introduce fsid mappings
 2020-02-20 14:26 UTC  (49+ messages)
` [PATCH v3 01/25] user_namespace: introduce fsid mappings infrastructure
` [PATCH v3 02/25] proc: add /proc/<pid>/fsuid_map
` [PATCH v3 03/25] proc: add /proc/<pid>/fsgid_map
` [PATCH v3 04/25] fsuidgid: add fsid mapping helpers
` [PATCH v3 05/25] user_namespace: refactor map_write()
` [PATCH v3 06/25] user_namespace: make map_write() support fsid mappings
` [PATCH v3 07/25] proc: task_state(): use from_kfs{g,u}id_munged
` [PATCH v3 08/25] cred: add kfs{g,u}id
` [PATCH v3 09/25] fs: add is_userns_visible() helper
` [PATCH v3 10/25] namei: may_{o_}create(): handle fsid mappings
` [PATCH v3 11/25] inode: inode_owner_or_capable(): "
` [PATCH v3 12/25] capability: privileged_wrt_inode_uidgid(): "
` [PATCH v3 13/25] stat: "
` [PATCH v3 14/25] open: "
` [PATCH v3 15/25] posix_acl: "
` [PATCH v3 16/25] attr: notify_change(): "
` [PATCH v3 17/25] commoncap: cap_bprm_set_creds(): "
` [PATCH v3 18/25] commoncap: cap_task_fix_setuid(): "
` [PATCH v3 19/25] commoncap: handle fsid mappings with vfs caps
` [PATCH v3 20/25] exec: bprm_fill_uid(): handle fsid mappings
` [PATCH v3 21/25] ptrace: adapt ptrace_may_access() to always uses unmapped fsids
` [PATCH v3 22/25] devpts: handle fsid mappings
` [PATCH v3 23/25] keys: "
` [PATCH v3 24/25] sys: handle fsid mappings in set*id() calls
` [PATCH v3 25/25] selftests: add simple fsid mapping selftests

[PATCH v5 01/10] capabilities: introduce CAP_PERFMON to kernel and user space
 2020-02-20 13:05 UTC  (3+ messages)

[PATCH 9/9] integrity: check properly whether EFI GetVariable() is available
 2020-02-20  3:19 UTC  (4+ messages)

[RFC PATCH] security: <linux/lsm_hooks.h>: fix all kernel-doc warnings
 2020-02-20  0:10 UTC  (4+ messages)

SELinux support in virtio-fs
 2020-02-19 17:50 UTC 

[PATCH] module support: during lockdown, log name of unsigned module
 2020-02-19  9:02 UTC 

[PATCH] netlabel_domainhash.c: Use built-in RCU list checking
 2020-02-18 22:50 UTC  (3+ messages)

[PATCH] net: netlabel: Use built-in RCU list checking
 2020-02-18 22:48 UTC  (3+ messages)

[PATCH v26 10/22] x86/sgx: Linux Enclave Driver
 2020-02-18 22:12 UTC  (3+ messages)

kernel BUG at lib/assoc_array.c:LINE!
 2020-02-18 21:12 UTC  (2+ messages)

[PATCH v2] ima: export the measurement list when needed
 2020-02-18 15:36 UTC  (13+ messages)

[PATCH v2] IMA hash algorithm supports sm3
 2020-02-18 14:24 UTC  (5+ messages)
` [PATCH v2 1/2] crypto: fix mismatched hash algorithm name sm3-256 to sm3

[PATCH v2 00/28] user_namespace: introduce fsid mappings
 2020-02-17 23:11 UTC  (8+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).