linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2020-04-06 18:59:12 to 2020-04-15 16:26:14 UTC [more...]

[RFC PATCH v3 00/12] Integrity Policy Enforcement LSM (IPE)
 2020-04-15 16:25 UTC  (2+ messages)
` [RFC PATCH v3 03/12] security: add ipe lsm policy parser and policy loading

[PATCH v2] apparmor: fix potential label refcnt leak in aa_change_profile
 2020-04-15 11:27 UTC 

[PATCH v2] ima: optimize ima_pcr_extend function by asynchronous
 2020-04-15  7:52 UTC 

[PATCH] ima: remove redundant code
 2020-04-15  7:53 UTC 

[PATCH 0/2] mm, treewide: Rename kzfree() to kfree_sensitive()
 2020-04-15  5:01 UTC  (18+ messages)
` [PATCH 1/2] "
` [PATCH 2/2] crypto: Remove unnecessary memzero_explicit()
` [PATCH v2 "

[PATCH] ima: optimize ima_pcr_extend function by asynchronous
 2020-04-15  2:53 UTC  (4+ messages)

[PATCH 0/2] support to read and tune appraise mode in runtime
 2020-04-15  2:49 UTC  (8+ messages)
` [PATCH 1/2] ima: support to read appraise mode
` [PATCH 2/2] ima: support to tune appraise mode in runtime

[RFC PATCH v2 00/12] Integrity Policy Enforcement LSM (IPE)
 2020-04-14 21:18 UTC  (21+ messages)
` [RFC PATCH v2 01/12] scripts: add ipe tooling to generate boot policy
` [RFC PATCH v2 02/12] security: add ipe lsm evaluation loop and audit system
` [RFC PATCH v2 03/12] security: add ipe lsm policy parser and policy loading
` [RFC PATCH v2 04/12] ipe: add property for trust of boot volume
` [RFC PATCH v2 05/12] fs: add security blob and hooks for block_device
` [RFC PATCH v2 06/12] dm-verity: move signature check after tree validation
` [RFC PATCH v2 07/12] dm-verity: add bdev_setsecurity hook for dm-verity signature
` [RFC PATCH v2 08/12] ipe: add property for signed dmverity volumes
` [RFC PATCH v2 09/12] dm-verity: add bdev_setsecurity hook for root-hash
` [RFC PATCH v2 10/12] ipe: add property for dmverity roothash
` [RFC PATCH v2 11/12] documentation: Add IPE Documentation
` [RFC PATCH v2 12/12] cleanup: uapi/linux/audit.h

[PATCH] keys: Fix proc_keys_next to increase position index
 2020-04-14 20:33 UTC 

[PATCH] capabilities: add description for CAP_SETFCAP
 2020-04-14 15:49 UTC 

[PATCH 0/2] Simplify the implementation of some functions in IMA
 2020-04-14 15:18 UTC  (5+ messages)
` [PATCH 1/2] ima: simplify function ima_store_template
` [PATCH 2/2] ima: simplify function process_buffer_measurement

[PATCH] evm: Fix possible memory leak in evm_calc_hmac_or_hash()
 2020-04-14 13:48 UTC  (2+ messages)

[PATCH -next v2] IMA: fix memdup.cocci warnings
 2020-04-14 10:35 UTC 

[RFC] IMA: New IMA measurements for dm-crypt and selinux
 2020-04-14 10:06 UTC  (7+ messages)

[PATCH -next] IMA: Fix a memdup.cocci warning
 2020-04-14  8:40 UTC 

[PATCH -next] IMA: fix memdup.cocci warnings
 2020-04-14  8:21 UTC 

[PATCH -next] tomoyo: use true for bool variable
 2020-04-14  8:19 UTC 

[PATCH] device_cgroup: Cleanup cgroup eBPF device filter code
 2020-04-13 18:43 UTC  (4+ messages)

[PATCH 05/26] capabilities: Introduce CAP_PERFMON to kernel and user space
 2020-04-13 16:51 UTC  (12+ messages)
` [PATCH 06/26] perf/core: Open access to the core for CAP_PERFMON privileged process
` [PATCH 07/26] perf/core: open access to probes "
` [PATCH 08/26] perf tools: Support CAP_PERFMON capability
` [PATCH 09/26] drm/i915/perf: Open access for CAP_PERFMON privileged process
` [PATCH 10/26] trace/bpf_trace: "
` [PATCH 11/26] powerpc/perf: open "
` [PATCH 12/26] parisc/perf: "
` [PATCH 13/26] drivers/perf: Open "
` [PATCH 14/26] drivers/oprofile: "
` [PATCH 15/26] doc/admin-guide: Update perf-security.rst with CAP_PERFMON information
` [PATCH 16/26] doc/admin-guide: update kernel.rst "

[PATCH v4 0/3] SELinux support for anonymous inodes and UFFD
 2020-04-13 13:29 UTC  (3+ messages)
` [PATCH v5 "

[PATCH v2 0/2] support to read and tune appraise mode in runtime
 2020-04-13  2:23 UTC  (5+ messages)
` [PATCH v2 1/2] ima: support to read appraise mode
` [PATCH v2 2/2] ima: support to tune appraise mode in runtime

[selftests/landlock] d9d464ccf6: kernel-selftests.landlock.test_base.fail
 2020-04-10  8:45 UTC  (2+ messages)

[PATCH ghak96] audit: set cwd in audit context for file-related LSM audit records
 2020-04-09 21:50 UTC  (4+ messages)

[PATCH 1/1] smack: remove redundant structure variable from header
 2020-04-09 21:00 UTC  (2+ messages)

[PATCH v10 0/9] proc: modernize proc to support multiple private instances
 2020-04-09 14:32 UTC  (4+ messages)
` [PATCH v10 8/9] proc: use human-readable values for hidehid

[PATCH RESEND v11 0/8] proc: modernize proc to support multiple private instances
 2020-04-09 14:13 UTC  (12+ messages)
` [PATCH RESEND v11 1/8] proc: rename struct proc_fs_info to proc_fs_opts
` [PATCH RESEND v11 2/8] proc: allow to mount many instances of proc in one pid namespace
` [PATCH RESEND v11 3/8] proc: move hide_pid, pid_gid from pid_namespace to proc_fs_info
` [PATCH RESEND v11 4/8] proc: instantiate only pids that we can ptrace on 'hidepid=4' mount option
` [PATCH RESEND v11 5/8] proc: add option to mount only a pids subset
` [PATCH RESEND v11 6/8] docs: proc: add documentation for "hidepid=4" and "subset=pid" options and new mount behavior
` [PATCH RESEND v11 7/8] proc: use human-readable values for hidepid
` [PATCH RESEND v11 8/8] proc: use named enums for better readability

[PATCH] smack: avoid unused 'sip' variable warning
 2020-04-08 20:03 UTC  (2+ messages)

[PATCH] ima: Simplify the implementation of ima_fs_init function
 2020-04-08  9:02 UTC 

[PATCH v16 00/23] LSM: Module stacking for AppArmor
 2020-04-07 18:47 UTC  (33+ messages)
  ` [PATCH v16 01/23] LSM: Infrastructure management of the sock security
  ` [PATCH v16 02/23] LSM: Create and manage the lsmblob data structure
  ` [PATCH v16 03/23] LSM: Use lsmblob in security_audit_rule_match
  ` [PATCH v16 04/23] LSM: Use lsmblob in security_kernel_act_as
  ` [PATCH v16 05/23] net: Prepare UDS for security module stacking
  ` [PATCH v16 06/23] Use lsmblob in security_secctx_to_secid
  ` [PATCH v16 07/23] LSM: Use lsmblob in security_secid_to_secctx
  ` [PATCH v16 08/23] LSM: Use lsmblob in security_ipc_getsecid
  ` [PATCH v16 09/23] LSM: Use lsmblob in security_task_getsecid
  ` [PATCH v16 10/23] LSM: Use lsmblob in security_inode_getsecid
  ` [PATCH v16 11/23] LSM: Use lsmblob in security_cred_getsecid
  ` [PATCH v16 12/23] IMA: Change internal interfaces to use lsmblobs
  ` [PATCH v16 13/23] LSM: Specify which LSM to display
  ` [PATCH v16 14/23] LSM: Ensure the correct LSM context releaser
  ` [PATCH v16 15/23] LSM: Use lsmcontext in security_secid_to_secctx
  ` [PATCH v16 16/23] LSM: Use lsmcontext in security_inode_getsecctx
  ` [PATCH v16 17/23] LSM: security_secid_to_secctx in netlink netfilter
  ` [PATCH v16 18/23] NET: Store LSM netlabel data in a lsmblob
  ` [PATCH v16 19/23] LSM: Verify LSM display sanity in binder
  ` [PATCH v16 20/23] Audit: Add a new record for multiple subject LSM attributes
  ` [PATCH v16 21/23] Audit: Add a new record for multiple object "
  ` [PATCH v16 22/23] LSM: Add /proc attr entry for full LSM context
  ` [PATCH v16 23/23] AppArmor: Remove the exclusive flag

[PATCH v8 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
 2020-04-07 17:32 UTC  (12+ messages)

[PATCH v15 00/23] LSM: Module stacking for AppArmor
 2020-04-06 21:00 UTC  (10+ messages)
  ` [PATCH v16 01/23] LSM: Infrastructure management of the sock security
  ` [PATCH v16 02/23] LSM: Create and manage the lsmblob data structure
  ` [PATCH v16 03/23] LSM: Use lsmblob in security_audit_rule_match
  ` [PATCH v16 04/23] LSM: Use lsmblob in security_kernel_act_as
  ` [PATCH v16 05/23] net: Prepare UDS for security module stacking
  ` [PATCH v16 06/23] Use lsmblob in security_secctx_to_secid
  ` [PATCH v16 07/23] LSM: Use lsmblob in security_secid_to_secctx
  ` [PATCH v16 08/23] LSM: Use lsmblob in security_ipc_getsecid
  ` [PATCH v16 09/23] LSM: Use lsmblob in security_task_getsecid

[PATCH v15 00/23] LSM: Module stacking for AppArmor
 2020-04-06 20:54 UTC  (9+ messages)
  ` [PATCH v16 01/23] LSM: Infrastructure management of the sock security
  ` [PATCH v16 02/23] LSM: Create and manage the lsmblob data structure
  ` [PATCH v16 03/23] LSM: Use lsmblob in security_audit_rule_match
  ` [PATCH v16 04/23] LSM: Use lsmblob in security_kernel_act_as
  ` [PATCH v16 05/23] net: Prepare UDS for security module stacking
  ` [PATCH v16 06/23] Use lsmblob in security_secctx_to_secid
  ` [PATCH v16 07/23] LSM: Use lsmblob in security_secid_to_secctx
  ` [PATCH v16 08/23] LSM: Use lsmblob in security_ipc_getsecid

[PATCH v15 00/23] LSM: Module stacking for AppArmor
 2020-04-06 20:50 UTC  (9+ messages)
  ` [PATCH v16 01/23] LSM: Infrastructure management of the sock security
  ` [PATCH v16 02/23] LSM: Create and manage the lsmblob data structure
  ` [PATCH v16 03/23] LSM: Use lsmblob in security_audit_rule_match
  ` [PATCH v16 04/23] LSM: Use lsmblob in security_kernel_act_as
  ` [PATCH v16 05/23] net: Prepare UDS for security module stacking
  ` [PATCH v16 06/23] Use lsmblob in security_secctx_to_secid
  ` [PATCH v16 07/23] LSM: Use lsmblob in security_secid_to_secctx
  ` [PATCH v16 08/23] LSM: Use lsmblob in security_ipc_getsecid

[PATCH v15 00/23] LSM: Module stacking for AppArmor
 2020-04-06 20:40 UTC  (9+ messages)
  ` [PATCH v16 01/23] LSM: Infrastructure management of the sock security
  ` [PATCH v16 02/23] LSM: Create and manage the lsmblob data structure
  ` [PATCH v16 03/23] LSM: Use lsmblob in security_audit_rule_match
  ` [PATCH v16 04/23] LSM: Use lsmblob in security_kernel_act_as
  ` [PATCH v16 05/23] net: Prepare UDS for security module stacking
  ` [PATCH v16 06/23] Use lsmblob in security_secctx_to_secid
  ` [PATCH v16 07/23] LSM: Use lsmblob in security_secid_to_secctx
  ` [PATCH v16 08/23] LSM: Use lsmblob in security_ipc_getsecid

[PATCH v15 00/23] LSM: Module stacking for AppArmor
 2020-04-06 20:32 UTC 

[RESEND PATCH 00/11] Integrity Policy Enforcement LSM (IPE)
 2020-04-06 20:09 UTC  (4+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).