messages from 2020-03-25 19:16:24 to 2020-04-02 15:39:00 UTC [more...]
[PATCH ghak96] audit: set cwd in audit context for file-related LSM audit records
2020-04-02 15:38 UTC (2+ messages)
[PATCH v10 0/9] proc: modernize proc to support multiple private instances
2020-04-02 15:31 UTC (24+ messages)
` [PATCH v10 1/9] proc: rename struct proc_fs_info to proc_fs_opts
` [PATCH v10 2/9] proc: allow to mount many instances of proc in one pid namespace
` [PATCH v10 3/9] proc: move hide_pid, pid_gid from pid_namespace to proc_fs_info
` [PATCH v10 4/9] proc: instantiate only pids that we can ptrace on 'hidepid=4' mount option
` [PATCH v10 5/9] proc: add option to mount only a pids subset
` [PATCH v10 6/9] docs: proc: add documentation for "hidepid=4" and "subset=pid" options and new mount behavior
` [PATCH v10 7/9] proc: move hidepid values to uapi as they are user interface to mount
` [PATCH v10 8/9] proc: use human-readable values for hidehid
` [PATCH v11 "
` [PATCH v10 9/9] proc: use named enums for better readability
[PATCH 00/17] pipe: Keyrings, mount and superblock notifications [ver #5]
2020-04-02 15:19 UTC (3+ messages)
` [PATCH 13/17] watch_queue: Implement mount topology and attribute change "
[PATCH 00/13] VFS: Filesystem information [ver #19]
2020-04-02 14:14 UTC (10+ messages)
[PATCH v8 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
2020-04-02 8:54 UTC (13+ messages)
` [PATCH v8 01/12] capabilities: introduce CAP_PERFMON to kernel and user space
` [PATCH v8 02/12] perf/core: open access to the core for CAP_PERFMON privileged process
` [PATCH v8 03/12] perf/core: open access to probes "
` [PATCH v8 04/12] perf tool: extend Perf tool with CAP_PERFMON capability support
` [PATCH v8 05/12] drm/i915/perf: open access for CAP_PERFMON privileged process
` [PATCH v8 06/12] trace/bpf_trace: "
` [PATCH v8 07/12] powerpc/perf: "
` [PATCH v8 08/12] parisc/perf: "
` [PATCH v8 09/12] drivers/perf: "
` [PATCH v8 10/12] drivers/oprofile: "
` [PATCH v8 11/12] doc/admin-guide: update perf-security.rst with CAP_PERFMON information
` [PATCH v8 12/12] doc/admin-guide: update kernel.rst "
[PATCH 0/3] SELinux support for anonymous inodes and UFFD
2020-04-01 21:39 UTC (26+ messages)
` [PATCH v2 "
` [PATCH v2 1/3] Add a new LSM-supporting anonymous inode interface
` [PATCH v2 2/3] Teach SELinux about anonymous inodes
` [PATCH v2 3/3] Wire UFFD up to SELinux
` [PATCH v3 0/3] SELinux support for anonymous inodes and UFFD
` [PATCH v3 1/3] Add a new LSM-supporting anonymous inode interface
` [PATCH v3 2/3] Teach SELinux about anonymous inodes
` [PATCH v3 3/3] Wire UFFD up to SELinux
` [PATCH v4 0/3] SELinux support for anonymous inodes and UFFD
` [PATCH v4 1/3] Add a new LSM-supporting anonymous inode interface
` [PATCH v4 2/3] Teach SELinux about anonymous inodes
` [PATCH v4 3/3] Wire UFFD up to SELinux
` [PATCH v5 0/3] SELinux support for anonymous inodes and UFFD
` [PATCH v5 1/3] Add a new LSM-supporting anonymous inode interface
` [PATCH v5 2/3] Teach SELinux about anonymous inodes
` [PATCH v5 3/3] Wire UFFD up to SELinux
[PATCH -next] smack: fix a missing-check bug in smack_sb_eat_lsm_opts()
2020-04-01 12:39 UTC (2+ messages)
[PATCH v3] tpm: Add support for event log pointer found in TPM2 ACPI table
2020-04-01 12:20 UTC (4+ messages)
[PATCH v3] acpi: Extend TPM2 ACPI table with missing log fields
2020-04-01 9:05 UTC (3+ messages)
[GIT PULL] Security subsystem updates for 5.7
2020-03-31 23:00 UTC (2+ messages)
[GIT PULL] SELinux patches for v5.7
2020-03-31 22:15 UTC (3+ messages)
[PATCH v2 0/3] tpm2: Make TPM2 logs accessible for non-UEFI firmware
2020-03-31 11:55 UTC (11+ messages)
` [PATCH v2 1/3] acpi: Extend TPM2 ACPI table with missing log fields
` [PATCH v2 2/3] tpm: Rearrange ACPI log code to easier extend for TPM2 case
` [PATCH v2 3/3] tpm: Add support for ACPI logs from TPM2 ACPI table
[PATCH v15 00/10] Landlock LSM
2020-03-30 18:29 UTC (14+ messages)
` [PATCH v15 01/10] landlock: Add object management
` [PATCH v15 02/10] landlock: Add ruleset and domain management
` [PATCH v15 03/10] landlock: Set up the security framework and manage credentials
` [PATCH v15 04/10] landlock: Add ptrace restrictions
` [PATCH v15 05/10] fs,landlock: Support filesystem access-control
` [PATCH v15 06/10] landlock: Add syscall implementation
` [PATCH v15 07/10] arch: Wire up landlock() syscall
` [PATCH v15 08/10] selftests/landlock: Add initial tests
` [PATCH v15 09/10] samples/landlock: Add a sandbox manager example
` [PATCH v15 10/10] landlock: Add user and kernel documentation
[RFC PATCH v14 00/10] Landlock LSM
2020-03-30 18:26 UTC (11+ messages)
kernel panic: smack: Failed to initialize cipso DOI
2020-03-30 15:13 UTC (2+ messages)
[GIT PULL] keys: Fix key->sem vs mmap_sem issue when reading key
2020-03-30 12:16 UTC
[PATCH bpf-next v9 0/8] MAC and Audit policy using eBPF (KRSI)
2020-03-29 23:46 UTC (10+ messages)
` [PATCH bpf-next v9 1/8] bpf: Introduce BPF_PROG_TYPE_LSM
` [PATCH bpf-next v9 2/8] security: Refactor declaration of LSM hooks
` [PATCH bpf-next v9 3/8] bpf: lsm: provide attachment points for BPF LSM programs
` [PATCH bpf-next v9 4/8] bpf: lsm: Implement attach, detach and execution
` [PATCH bpf-next v9 5/8] bpf: lsm: Initialize the BPF LSM hooks
` [PATCH bpf-next v9 6/8] tools/libbpf: Add support for BPF_PROG_TYPE_LSM
` [PATCH bpf-next v9 7/8] bpf: lsm: Add selftests "
` [PATCH bpf-next v9 8/8] bpf: lsm: Add Documentation
[PATCH] apparmor: fix potential label refcnt leak in aa_change_profile
2020-03-29 14:57 UTC
[PATCH bpf-next v8 0/8] MAC and Audit policy using eBPF (KRSI)
2020-03-29 0:15 UTC (16+ messages)
` [PATCH bpf-next v8 1/8] bpf: Introduce BPF_PROG_TYPE_LSM
` [PATCH bpf-next v8 2/8] security: Refactor declaration of LSM hooks
` [PATCH bpf-next v8 3/8] bpf: lsm: provide attachment points for BPF LSM programs
` [PATCH bpf-next v8 4/8] bpf: lsm: Implement attach, detach and execution
` [PATCH bpf-next v8 5/8] bpf: lsm: Initialize the BPF LSM hooks
` [PATCH bpf-next v8 6/8] tools/libbpf: Add support for BPF_PROG_TYPE_LSM
` [PATCH bpf-next v8 7/8] bpf: lsm: Add selftests "
` [PATCH bpf-next v8 8/8] bpf: lsm: Add Documentation
[PATCH bpf-next v7 0/8] MAC and Audit policy using eBPF (KRSI)
2020-03-27 19:17 UTC (33+ messages)
` [PATCH bpf-next v7 1/8] bpf: Introduce BPF_PROG_TYPE_LSM
` [PATCH bpf-next v7 2/8] security: Refactor declaration of LSM hooks
` [PATCH bpf-next v7 3/8] bpf: lsm: provide attachment points for BPF LSM programs
` [PATCH bpf-next v7 4/8] bpf: lsm: Implement attach, detach and execution
` [PATCH bpf-next v7 5/8] bpf: lsm: Initialize the BPF LSM hooks
` [PATCH bpf-next v7 6/8] tools/libbpf: Add support for BPF_PROG_TYPE_LSM
` [PATCH bpf-next v7 7/8] bpf: lsm: Add selftests "
` [PATCH bpf-next v7 8/8] bpf: lsm: Add Documentation
KASAN: slab-out-of-bounds Read in vsscanf
2020-03-27 16:16 UTC
KASAN: slab-out-of-bounds Read in vsscanf
2020-03-27 1:20 UTC
[PATCH v4 0/7] ima: support stronger algorithms for attestation
2020-03-27 0:07 UTC (3+ messages)
` [PATCH v4 2/7] ima: Evaluate error in init_ima()
[PATCH v7 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
2020-03-26 23:28 UTC (4+ messages)
` [Intel-gfx] "
[PATCH v8 0/2] KEYS: Read keys to internal buffer & then copy to userspace
2020-03-26 22:37 UTC (4+ messages)
[PATCH bpf-next v6 0/8] MAC and Audit policy using eBPF (KRSI)
2020-03-26 13:36 UTC (24+ messages)
` [PATCH bpf-next v6 1/8] bpf: Introduce BPF_PROG_TYPE_LSM
` [PATCH bpf-next v6 2/8] security: Refactor declaration of LSM hooks
` [PATCH bpf-next v6 3/8] bpf: lsm: provide attachment points for BPF LSM programs
` [PATCH bpf-next v6 4/8] bpf: lsm: Implement attach, detach and execution
` [PATCH bpf-next v6 5/8] bpf: lsm: Initialize the BPF LSM hooks
` [PATCH bpf-next v6 6/8] tools/libbpf: Add support for BPF_PROG_TYPE_LSM
` [PATCH bpf-next v6 7/8] bpf: lsm: Add selftests "
[PATCH RESEND v9 3/8] proc: move hide_pid, pid_gid from pid_namespace to proc_fs_info
2020-03-25 19:16 UTC (3+ messages)
` [PATCH v9 9/8] proc: use named enums for better readability
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).