linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2020-02-18 23:51:09 to 2020-03-02 17:33:14 UTC [more...]

[PATCH v3 0/8] ima: support stronger algorithms for attestation
 2020-03-02 17:33 UTC  (9+ messages)
` [PATCH v3 2/8] ima: Switch to ima_hash_algo for boot aggregate

[PATCHv2] exec: Fix a deadlock in ptrace
 2020-03-02 17:01 UTC  (2+ messages)

[PATCH v3 00/25] user_namespace: introduce fsid mappings
 2020-03-02 14:34 UTC  (37+ messages)
` [PATCH v3 01/25] user_namespace: introduce fsid mappings infrastructure
` [PATCH v3 02/25] proc: add /proc/<pid>/fsuid_map
` [PATCH v3 03/25] proc: add /proc/<pid>/fsgid_map
` [PATCH v3 05/25] user_namespace: refactor map_write()
` [PATCH v3 06/25] user_namespace: make map_write() support fsid mappings
` [PATCH v3 07/25] proc: task_state(): use from_kfs{g,u}id_munged
` [PATCH v3 09/25] fs: add is_userns_visible() helper
` [PATCH v3 11/25] inode: inode_owner_or_capable(): handle fsid mappings
` [PATCH v3 15/25] posix_acl: "
` [PATCH v3 19/25] commoncap: handle fsid mappings with vfs caps
` [PATCH v3 24/25] sys: handle fsid mappings in set*id() calls

[RFC PATCH v14 00/10] Landlock LSM
 2020-03-02 10:03 UTC  (23+ messages)
` [RFC PATCH v14 01/10] landlock: Add object and rule management
` [RFC PATCH v14 02/10] landlock: Add ruleset and domain management
` [RFC PATCH v14 03/10] landlock: Set up the security framework and manage credentials
` [RFC PATCH v14 04/10] landlock: Add ptrace restrictions
` [RFC PATCH v14 05/10] fs,landlock: Support filesystem access-control
` [RFC PATCH v14 06/10] landlock: Add syscall implementation
` [RFC PATCH v14 07/10] arch: Wire up landlock() syscall
` [RFC PATCH v14 08/10] selftests/landlock: Add initial tests
` [RFC PATCH v14 09/10] samples/landlock: Add a sandbox manager example
` [RFC PATCH v14 10/10] landlock: Add user and kernel documentation

[PATCH v2 8/8] ima: Use ima_hash_algo for collision detection in the measurement list
 2020-03-02  9:46 UTC  (2+ messages)
  ` [ima] 9165b814d2: BUG:kernel_NULL_pointer_dereference,address

kernel BUG at lib/assoc_array.c:LINE!
 2020-03-02  9:27 UTC  (4+ messages)

[PATCH v7 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
 2020-03-02  0:19 UTC  (6+ messages)
` [PATCH v7 01/12] capabilities: introduce CAP_PERFMON to kernel and user space
  ` [Intel-gfx] [PATCH v7 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability

[PATCH v8 07/11] proc: flush task dcache entries from all procfs instances
 2020-02-29  2:59 UTC  (52+ messages)
                            ` [PATCH 0/7] proc: Dentry flushing without proc_mnt
                              ` [PATCH 1/7] proc: Rename in proc_inode rename sysctl_inodes sibling_inodes
                              ` [PATCH 2/7] proc: Generalize proc_sys_prune_dcache into proc_prune_siblings_dcache
                              ` [PATCH 3/7] proc: Mov rcu_read_(lock|unlock) in proc_prune_siblings_dcache
                              ` [PATCH 4/7] proc: Use d_invalidate "
                              ` [PATCH 5/7] proc: Clear the pieces of proc_inode that proc_evict_inode cares about
                              ` [PATCH 6/7] proc: Use a list of inodes to flush from proc
                              ` [PATCH 7/7] proc: Ensure we see the exit of each process tid exactly once
                              ` [PATCH v2 0/6] proc: Dentry flushing without proc_mnt
                                ` [PATCH v2 1/6] proc: Rename in proc_inode rename sysctl_inodes sibling_inodes
                                ` [PATCH v2 2/6] proc: Generalize proc_sys_prune_dcache into proc_prune_siblings_dcache
                                ` [PATCH v2 3/6] proc: In proc_prune_siblings_dcache cache an aquired super block
                                ` [PATCH v2 4/6] proc: Use d_invalidate in proc_prune_siblings_dcache
                                ` [PATCH v2 5/6] proc: Clear the pieces of proc_inode that proc_evict_inode cares about
                                ` [PATCH v2 6/6] proc: Use a list of inodes to flush from proc
                                ` [PATCH 0/3] proc: Actually honor the mount options
                                  ` [PATCH 1/3] uml: Don't consult current to find the proc_mnt in mconsole_proc
                                  ` [PATCH 2/3] uml: Create a private mount of proc for mconsole
                                  ` [PATCH 3/3] proc: Remove the now unnecessary internal mount of proc
                                  ` [PATCH 4/3] pid: Improve the comment about waiting in zap_pid_ns_processes

protecting overlayfs's lower consistently
 2020-02-28 18:31 UTC 

Please revert SELinux/keys patches from the keys linux-next branch
 2020-02-28 15:39 UTC  (3+ messages)

[RESEND PATCH v2] efi: Only print errors about failing to get certs if EFI vars are found
 2020-02-28  9:58 UTC  (9+ messages)

[PATCH bpf-next v4 0/8] MAC and Audit policy using eBPF (KRSI)
 2020-02-27 18:40 UTC  (45+ messages)
` [PATCH bpf-next v4 1/8] bpf: Introduce BPF_PROG_TYPE_LSM
` [PATCH bpf-next v4 2/8] security: Refactor declaration of LSM hooks
` [PATCH bpf-next v4 3/8] bpf: lsm: provide attachment points for BPF LSM programs
` [PATCH bpf-next v4 4/8] bpf: lsm: Add support for enabling/disabling BPF hooks
` [PATCH bpf-next v4 5/8] bpf: lsm: Implement attach, detach and execution
` [PATCH bpf-next v4 6/8] tools/libbpf: Add support for BPF_PROG_TYPE_LSM
` [PATCH bpf-next v4 7/8] bpf: lsm: Add selftests "
` [PATCH bpf-next v4 8/8] bpf: lsm: Add Documentation

[PATCH] security: integrity: Replace zero-length array with flexible-array member
 2020-02-27 12:58 UTC 

[PATCH] apparmor: Replace zero-length array with flexible-array member
 2020-02-27 12:53 UTC  (2+ messages)

suspicious RCU usage from smack code
 2020-02-26 20:06 UTC  (2+ messages)

[PATCH] module support: during lockdown, log name of unsigned module
 2020-02-26 17:58 UTC  (2+ messages)

BUG: unable to handle kernel NULL pointer dereference in cipso_v4_sock_setattr
 2020-02-25 15:12 UTC  (7+ messages)

[PATCH v15 00/23] LSM: Module stacking for AppArmor
 2020-02-24 18:26 UTC  (5+ messages)
` [PATCH v15 02/23] LSM: Create and manage the lsmblob data structure
` [PATCH v15 03/23] LSM: Use lsmblob in security_audit_rule_match

[PATCH v27 10/22] x86/sgx: Linux Enclave Driver
 2020-02-23 17:25 UTC  (2+ messages)
` [PATCH v27 13/22] x86/sgx: Add provisioning

[PATCH net] ipv4: ensure rcu_read_lock() in cipso_v4_error()
 2020-02-23  5:47 UTC  (3+ messages)

[PATCH] device_cgroup: Fix RCU list debugging warning
 2020-02-22 17:19 UTC 

[PATCH v2 0/6] Harden userfaultfd
 2020-02-21 17:56 UTC  (2+ messages)

[PATCH -next] security: remove duplicated include from security.h
 2020-02-21 16:56 UTC  (2+ messages)

[PATCH] lockdown: Allow unprivileged users to see lockdown status
 2020-02-21 16:51 UTC  (2+ messages)

[PATCH v26 10/22] x86/sgx: Linux Enclave Driver
 2020-02-21 13:01 UTC  (13+ messages)

[RFC PATCH] security,anon_inodes,kvm: enable security support for anon inodes
 2020-02-20 18:50 UTC  (4+ messages)

[PATCH v5 01/10] capabilities: introduce CAP_PERFMON to kernel and user space
 2020-02-20 13:05 UTC  (3+ messages)

[PATCH 9/9] integrity: check properly whether EFI GetVariable() is available
 2020-02-20  3:19 UTC  (4+ messages)

[RFC PATCH] security: <linux/lsm_hooks.h>: fix all kernel-doc warnings
 2020-02-20  0:10 UTC  (2+ messages)

SELinux support in virtio-fs
 2020-02-19 17:50 UTC 


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).