linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2020-03-17 16:47:35 to 2020-03-25 19:42:46 UTC [more...]

[PATCH bpf-next v6 0/8] MAC and Audit policy using eBPF (KRSI)
 2020-03-25 19:42 UTC  (13+ messages)
` [PATCH bpf-next v6 1/8] bpf: Introduce BPF_PROG_TYPE_LSM
` [PATCH bpf-next v6 2/8] security: Refactor declaration of LSM hooks
` [PATCH bpf-next v6 3/8] bpf: lsm: provide attachment points for BPF LSM programs
` [PATCH bpf-next v6 4/8] bpf: lsm: Implement attach, detach and execution
` [PATCH bpf-next v6 5/8] bpf: lsm: Initialize the BPF LSM hooks
` [PATCH bpf-next v6 6/8] tools/libbpf: Add support for BPF_PROG_TYPE_LSM
` [PATCH bpf-next v6 7/8] bpf: lsm: Add selftests "
` [PATCH bpf-next v6 8/8] bpf: lsm: Add Documentation

[PATCH RESEND v9 0/8] proc: modernize proc to support multiple private instances
 2020-03-25 19:16 UTC  (14+ messages)
` [PATCH RESEND v9 1/8] proc: rename struct proc_fs_info to proc_fs_opts
` [PATCH RESEND v9 2/8] proc: allow to mount many instances of proc in one pid namespace
` [PATCH RESEND v9 3/8] proc: move hide_pid, pid_gid from pid_namespace to proc_fs_info
    ` [PATCH v9 9/8] proc: use named enums for better readability
` [PATCH RESEND v9 4/8] proc: instantiate only pids that we can ptrace on 'hidepid=4' mount option
` [PATCH RESEND v9 5/8] proc: add option to mount only a pids subset
` [PATCH RESEND v9 6/8] docs: proc: add documentation for "hidepid=4" and "subset=pidfs" options and new mount behavior
` [PATCH RESEND v9 7/8] proc: move hidepid values to uapi as they are user interface to mount
` [PATCH RESEND v9 8/8] proc: use human-readable values for hidehid

[PATCH 1/5] ima: Set file->f_mode instead of file->f_flags in ima_calc_file_hash()
 2020-03-25 16:14 UTC  (5+ messages)
` [PATCH 2/5] evm: Check also if *tfm is an error pointer in init_desc()
` [PATCH 3/5] ima: Fix ima digest hash table key calculation
` [PATCH 4/5] ima: Remove redundant policy rule set in add_rules()
  ` [PATCH 5/5] ima: Remove unused build_ima_appraise variable

[PATCH bpf-next v5 0/8] MAC and Audit policy using eBPF (KRSI)
 2020-03-25 14:35 UTC  (59+ messages)
` [PATCH bpf-next v5 1/7] bpf: Introduce BPF_PROG_TYPE_LSM
` [PATCH bpf-next v5 2/7] security: Refactor declaration of LSM hooks
` [PATCH bpf-next v5 3/7] bpf: lsm: provide attachment points for BPF LSM programs
` [PATCH bpf-next v5 4/7] bpf: lsm: Implement attach, detach and execution
` [PATCH bpf-next v5 5/7] bpf: lsm: Initialize the BPF LSM hooks
` [PATCH bpf-next v5 6/7] tools/libbpf: Add support for BPF_PROG_TYPE_LSM
` [PATCH bpf-next v5 7/7] bpf: lsm: Add selftests "

[PATCH v4 0/7] ima: support stronger algorithms for attestation
 2020-03-25 10:54 UTC  (8+ messages)
` [PATCH v4 1/7] ima: Switch to ima_hash_algo for boot aggregate
` [PATCH v4 2/7] ima: Evaluate error in init_ima()
` [PATCH v4 3/7] ima: Store template digest directly in ima_template_entry
` [PATCH v4 4/7] ima: Switch to dynamically allocated buffer for template digests
` [PATCH v4 5/7] ima: Allocate and initialize tfm for each PCR bank
` [PATCH v4 6/7] ima: Calculate and extend PCR with digests in ima_template_entry
` [PATCH v4 7/7] ima: Use ima_hash_algo for collision detection in the measurement list

[PATCH v8 0/2] KEYS: Read keys to internal buffer & then copy to userspace
 2020-03-22  1:11 UTC  (3+ messages)
` [PATCH v8 1/2] KEYS: Don't write out to userspace while holding key semaphore
` [PATCH v8 2/2] KEYS: Avoid false positive ENOMEM error on key read

[PATCH v7 0/2] KEYS: Read keys to internal buffer & then copy to userspace
 2020-03-22  0:46 UTC  (5+ messages)
` [PATCH v7 1/2] KEYS: Don't write out to userspace while holding key semaphore
` [PATCH v7 2/2] KEYS: Avoid false positive ENOMEM error on key read

[PATCH v6 0/2] KEYS: Read keys to internal buffer & then copy to userspace
 2020-03-21  1:51 UTC  (6+ messages)
` [PATCH v6 1/2] KEYS: Don't write out to userspace while holding key semaphore
` [PATCH v6 2/2] KEYS: Avoid false positive ENOMEM error on key read

[PATCH v5 0/2] KEYS: Read keys to internal buffer & then copy to userspace
 2020-03-21  0:58 UTC  (13+ messages)
` [PATCH v5 1/2] KEYS: Don't write out to userspace while holding key semaphore
` [PATCH v5 2/2] KEYS: Avoid false positive ENOMEM error on key read

[PATCH] security, keys: Optimize barrier usage for Rmw atomic bitops
 2020-03-20 17:09 UTC  (2+ messages)

[PATCH v1] perf tool: make Perf tool aware of SELinux access control
 2020-03-20 13:48 UTC  (6+ messages)

[RFC PATCH v14 00/10] Landlock LSM
 2020-03-19 21:17 UTC  (13+ messages)
` [RFC PATCH v14 06/10] landlock: Add syscall implementation

[PATCH v28 11/22] x86/sgx: Linux Enclave Driver
 2020-03-19 18:22 UTC  (5+ messages)

[PATCH 00/13] VFS: Filesystem information [ver #19]
 2020-03-19 12:36 UTC  (17+ messages)
` [PATCH 01/13] fsinfo: Add fsinfo() syscall to query filesystem "
` [PATCH 02/13] fsinfo: Provide a bitmap of supported features "
` [PATCH 03/13] fsinfo: Allow retrieval of superblock devname, options and stats "
` [PATCH 04/13] fsinfo: Allow fsinfo() to look up a mount object by ID "
` [PATCH 05/13] fsinfo: Add a uniquifier ID to struct mount "
` [PATCH 06/13] fsinfo: Allow mount information to be queried "
` [PATCH 07/13] fsinfo: Allow mount topology and propagation info to be retrieved "
` [PATCH 08/13] fsinfo: Provide notification overrun handling support "
` [PATCH 09/13] fsinfo: sample: Mount listing program "
` [PATCH 10/13] fsinfo: Add API documentation "
` [PATCH 11/13] fsinfo: Add support for AFS "
` [PATCH 12/13] fsinfo: Example support for Ext4 "
` [PATCH 13/13] fsinfo: Example support for NFS "

[PATCH v3 7/8] ima: Calculate and extend PCR with digests in ima_template_entry
 2020-03-19  9:45 UTC  (6+ messages)

[PATCH 01/14] VFS: Add additional RESOLVE_* flags [ver #18]
 2020-03-16 14:20 UTC  (9+ messages)

[PATCH 00/17] pipe: Keyrings, mount and superblock notifications [ver #5]
 2020-03-18 19:07 UTC  (23+ messages)
` [PATCH 01/17] uapi: General notification queue definitions "
` [PATCH 02/17] security: Add hooks to rule on setting a watch "
` [PATCH 03/17] security: Add a hook for the point of notification insertion "
` [PATCH 04/17] pipe: Add O_NOTIFICATION_PIPE "
` [PATCH 05/17] pipe: Add general notification queue support "
` [PATCH 06/17] watch_queue: Add a key/keyring notification facility "
` [PATCH 07/17] Add sample notification program "
` [PATCH 08/17] pipe: Allow buffers to be marked read-whole-or-error for notifications "
` [PATCH 09/17] pipe: Add notification lossage handling "
` [PATCH 10/17] selinux: Implement the watch_key security hook "
` [PATCH 11/17] smack: Implement the watch_key and post_notification hooks "
` [PATCH 12/17] watch_queue: Add security hooks to rule on setting mount and sb watches "
` [PATCH 13/17] watch_queue: Implement mount topology and attribute change notifications "
` [PATCH 14/17] watch_queue: sample: Display mount tree "
` [PATCH 15/17] watch_queue: Introduce a non-repeating system-unique superblock ID "
` [PATCH 16/17] watch_queue: Add superblock notifications "
` [PATCH 17/17] watch_queue: sample: Display "

Looking for help testing patch attestation
 2020-03-18 16:36 UTC 

[PATCH v4 0/4] KEYS: Read keys to internal buffer & then copy to userspace
 2020-03-18 15:14 UTC  (10+ messages)
` [PATCH v4 1/4] KEYS: Don't write out to userspace while holding key semaphore
` [PATCH v4 2/4] KEYS: Remove __user annotation from rxrpc_read()
` [PATCH v4 3/4] KEYS: Remove __user annotation from dns_resolver_read()
` [PATCH v4 4/4] KEYS: Avoid false positive ENOMEM error on key read

[PATCH v3 1/3] KEYS: Don't write out to userspace while holding key semaphore
 2020-03-17 18:36 UTC  (11+ messages)
` [PATCH v3 0/3] KEYS: Read keys to internal buffer & then copy to userspace
  ` [PATCH v3 2/3] KEYS: Avoid false positive ENOMEM error on key read

[PATCH v3 1/3] KEYS: Don't write out to userspace while holding key semaphore
 2020-03-15 21:27 UTC 


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).