messages from 2020-04-09 10:34:48 to 2020-04-22 21:10:07 UTC [more...]
Problem with 9ba09998baa9 ("selinux: Implement the watch_key security hook") in linux-next
2020-04-22 21:09 UTC (6+ messages)
[PATCH 1/5] ima: Set file->f_mode instead of file->f_flags in ima_calc_file_hash()
2020-04-22 20:56 UTC (8+ messages)
` [PATCH 2/5] evm: Check also if *tfm is an error pointer in init_desc()
` [PATCH 3/5] ima: Fix ima digest hash table key calculation
[PATCH] netlabel: Kconfig: Update reference for NetLabel Tools project
2020-04-22 19:21 UTC (3+ messages)
[PATCH v4 0/3] SELinux support for anonymous inodes and UFFD
2020-04-22 17:12 UTC (5+ messages)
` [PATCH v5 "
[RFC PATCH v3 00/12] Integrity Policy Enforcement LSM (IPE)
2020-04-22 16:55 UTC (15+ messages)
` [RFC PATCH v3 01/12] scripts: add ipe tooling to generate boot policy
` [RFC PATCH v3 02/12] security: add ipe lsm evaluation loop and audit system
` [RFC PATCH v3 03/12] security: add ipe lsm policy parser and policy loading
` [RFC PATCH v3 04/12] ipe: add property for trust of boot volume
` [RFC PATCH v3 05/12] fs: add security blob and hooks for block_device
` [RFC PATCH v3 06/12] dm-verity: move signature check after tree validation
` [RFC PATCH v3 07/12] dm-verity: add bdev_setsecurity hook for dm-verity signature
` [RFC PATCH v3 08/12] ipe: add property for signed dmverity volumes
` [RFC PATCH v3 09/12] dm-verity: add bdev_setsecurity hook for root-hash
` [RFC PATCH v3 10/12] ipe: add property for dmverity roothash
` [RFC PATCH v3 11/12] documentation: add ipe documentation
` [RFC PATCH v3 12/12] cleanup: uapi/linux/audit.h
[PATCH v2 0/7] libfs: group and simplify linux fs code
2020-04-22 16:50 UTC (9+ messages)
` [PATCH v2 1/7] apparmor: just use vfs_kern_mount to make .null
` [PATCH v2 2/7] libfs: wrap simple_pin_fs/simple_release_fs arguments in a struct
` [PATCH v2 3/7] libfs: introduce new_inode_current_time
` [PATCH v2 4/7] libfs: add alloc_anon_inode wrapper
` [PATCH v2 5/7] libfs: add file creation functions
` [PATCH v2 6/7] debugfs: switch to simplefs inode creation API
` [PATCH v2 7/7] tracefs: "
[PATCH v2 0/4] perf: make Perf tool aware of SELinux access control
2020-04-22 14:47 UTC (5+ messages)
` [PATCH v2 1/4] perf trace: substitute CAP_SYS_ADMIN with CAP_PERFMON in error message
` [PATCH v2 2/4] perf docs: substitute CAP_SYS_ADMIN with CAP_PERFMON where needed
` [PATCH v2 3/4] perf tool: make Perf tool aware of SELinux access control
` [PATCH v2 4/4] perf docs: introduce security.txt file to document related issues
[PATCH v8 10/12] drivers/oprofile: open access for CAP_PERFMON privileged process
2020-04-22 12:17 UTC (2+ messages)
` [tip: perf/core] drivers/oprofile: Open "
[PATCH v8 09/12] drivers/perf: open access for CAP_PERFMON privileged process
2020-04-22 12:17 UTC (2+ messages)
` [tip: perf/core] drivers/perf: Open "
[PATCH v8 12/12] doc/admin-guide: update kernel.rst with CAP_PERFMON information
2020-04-22 12:17 UTC (2+ messages)
` [tip: perf/core] "
[PATCH v8 04/12] perf tool: extend Perf tool with CAP_PERFMON capability support
2020-04-22 12:17 UTC (2+ messages)
` [tip: perf/core] perf tools: Support CAP_PERFMON capability
[PATCH v8 08/12] parisc/perf: open access for CAP_PERFMON privileged process
2020-04-22 12:17 UTC (2+ messages)
` [tip: perf/core] "
[PATCH v8 05/12] drm/i915/perf: open access for CAP_PERFMON privileged process
2020-04-22 12:17 UTC (2+ messages)
` [tip: perf/core] drm/i915/perf: Open "
[PATCH v8 03/12] perf/core: open access to probes for CAP_PERFMON privileged process
2020-04-22 12:17 UTC (2+ messages)
` [tip: perf/core] "
[PATCH v8 06/12] trace/bpf_trace: open access for CAP_PERFMON privileged process
2020-04-22 12:17 UTC (2+ messages)
` [tip: perf/core] trace/bpf_trace: Open "
[PATCH v8 02/12] perf/core: open access to the core for CAP_PERFMON privileged process
2020-04-22 12:17 UTC (2+ messages)
` [tip: perf/core] perf/core: Open "
[PATCH v8 11/12] doc/admin-guide: update perf-security.rst with CAP_PERFMON information
2020-04-22 12:17 UTC (2+ messages)
` [tip: perf/core] doc/admin-guide: Update "
[PATCH v8 01/12] capabilities: introduce CAP_PERFMON to kernel and user space
2020-04-22 12:17 UTC (2+ messages)
` [tip: perf/core] capabilities: Introduce "
[PATCH v8 07/12] powerpc/perf: open access for CAP_PERFMON privileged process
2020-04-22 12:17 UTC (2+ messages)
` [tip: perf/core] "
[PATCH v29 11/20] x86/sgx: Linux Enclave Driver
2020-04-21 21:53 UTC (2+ messages)
` [PATCH v29 12/20] x86/sgx: Add provisioning
[PATCH RFC] Documentation: LSM: Correct the basic LSM description
2020-04-21 16:17 UTC (3+ messages)
[PATCH] ima: Allow imasig requirement to be satisfied by EVM portable signatures
2020-04-21 9:24 UTC
[PATCH] ima: Fix return value of ima_write_policy()
2020-04-21 9:04 UTC
IMA: policy update LSM rules failed
2020-04-20 19:05 UTC
[PATCH 05/60] capabilities: Introduce CAP_PERFMON to kernel and user space
2020-04-20 11:52 UTC (12+ messages)
` [PATCH 06/60] perf/core: Open access to the core for CAP_PERFMON privileged process
` [PATCH 07/60] perf/core: open access to probes "
` [PATCH 08/60] perf tools: Support CAP_PERFMON capability
` [PATCH 09/60] drm/i915/perf: Open access for CAP_PERFMON privileged process
` [PATCH 10/60] trace/bpf_trace: "
` [PATCH 11/60] powerpc/perf: open "
` [PATCH 12/60] parisc/perf: "
` [PATCH 13/60] drivers/perf: Open "
` [PATCH 14/60] drivers/oprofile: "
` [PATCH 15/60] doc/admin-guide: Update perf-security.rst with CAP_PERFMON information
` [PATCH 16/60] doc/admin-guide: update kernel.rst "
[PATCH] apparmor: Fix aa_label refcnt leak in policy_update
2020-04-20 5:35 UTC
[PATCH RESEND v11 0/8] proc: modernize proc to support multiple private instances
2020-04-19 14:19 UTC (16+ messages)
` [PATCH RESEND v11 1/8] proc: rename struct proc_fs_info to proc_fs_opts
` [PATCH RESEND v11 2/8] proc: allow to mount many instances of proc in one pid namespace
` [PATCH RESEND v11 3/8] proc: move hide_pid, pid_gid from pid_namespace to proc_fs_info
` [PATCH RESEND v11 4/8] proc: instantiate only pids that we can ptrace on 'hidepid=4' mount option
` [PATCH RESEND v11 5/8] proc: add option to mount only a pids subset
` [PATCH RESEND v11 6/8] docs: proc: add documentation for "hidepid=4" and "subset=pid" options and new mount behavior
` [PATCH RESEND v11 7/8] proc: use human-readable values for hidepid
` [PATCH RESEND v11 8/8] proc: use named enums for better readability
[PATCH v12 0/7] proc: modernize proc to support multiple private instances
2020-04-19 14:10 UTC (8+ messages)
` [PATCH v12 1/7] proc: rename struct proc_fs_info to proc_fs_opts
` [PATCH v12 2/7] proc: allow to mount many instances of proc in one pid namespace
` [PATCH v12 3/7] proc: instantiate only pids that we can ptrace on 'hidepid=4' mount option
` [PATCH v12 4/7] proc: add option to mount only a pids subset
` [PATCH v12 5/7] docs: proc: add documentation for "hidepid=4" and "subset=pid" options and new mount behavior
` [PATCH v12 6/7] proc: use human-readable values for hidepid
` [PATCH v12 7/7] proc: use named enums for better readability
[PATCH ghak96] audit: set cwd in audit context for file-related LSM audit records
2020-04-17 22:21 UTC (5+ messages)
WARNING: locking bug in tomoyo_supervisor
2020-04-17 4:37 UTC (2+ messages)
[RFC] IMA: New IMA measurements for dm-crypt and selinux
2020-04-17 0:53 UTC (11+ messages)
[GIT PULL] SELinux fixes for v5.7 (#1)
2020-04-16 17:55 UTC (2+ messages)
[PATCH] keys: Fix proc_keys_next to increase position index
2020-04-16 16:54 UTC (2+ messages)
[PATCH v16 00/10] Landlock LSM
2020-04-16 10:39 UTC (11+ messages)
` [PATCH v16 01/10] landlock: Add object management
` [PATCH v16 02/10] landlock: Add ruleset and domain management
` [PATCH v16 03/10] landlock: Set up the security framework and manage credentials
` [PATCH v16 04/10] landlock: Add ptrace restrictions
` [PATCH v16 05/10] fs,landlock: Support filesystem access-control
` [PATCH v16 06/10] landlock: Add syscall implementation
` [PATCH v16 07/10] arch: Wire up landlock() syscall
` [PATCH v16 08/10] selftests/landlock: Add initial tests
` [PATCH v16 09/10] samples/landlock: Add a sandbox manager example
` [PATCH v16 10/10] landlock: Add user and kernel documentation
[PATCH v2] apparmor: fix potential label refcnt leak in aa_change_profile
2020-04-15 18:41 UTC (2+ messages)
[PATCH v2] ima: optimize ima_pcr_extend function by asynchronous
2020-04-15 7:52 UTC
[PATCH] ima: remove redundant code
2020-04-15 7:53 UTC
[PATCH 0/2] mm, treewide: Rename kzfree() to kfree_sensitive()
2020-04-15 5:01 UTC (18+ messages)
` [PATCH 1/2] "
` [PATCH 2/2] crypto: Remove unnecessary memzero_explicit()
` [PATCH v2 "
[PATCH] ima: optimize ima_pcr_extend function by asynchronous
2020-04-15 2:53 UTC (4+ messages)
[PATCH 0/2] support to read and tune appraise mode in runtime
2020-04-15 2:49 UTC (5+ messages)
[RFC PATCH v2 00/12] Integrity Policy Enforcement LSM (IPE)
2020-04-14 21:18 UTC (12+ messages)
` [RFC PATCH v2 02/12] security: add ipe lsm evaluation loop and audit system
` [RFC PATCH v2 03/12] security: add ipe lsm policy parser and policy loading
` [RFC PATCH v2 11/12] documentation: Add IPE Documentation
[PATCH] capabilities: add description for CAP_SETFCAP
2020-04-14 15:49 UTC
[PATCH 0/2] Simplify the implementation of some functions in IMA
2020-04-14 15:18 UTC (5+ messages)
` [PATCH 1/2] ima: simplify function ima_store_template
` [PATCH 2/2] ima: simplify function process_buffer_measurement
[PATCH] evm: Fix possible memory leak in evm_calc_hmac_or_hash()
2020-04-14 13:48 UTC (2+ messages)
[PATCH -next v2] IMA: fix memdup.cocci warnings
2020-04-14 10:35 UTC
[PATCH -next] IMA: Fix a memdup.cocci warning
2020-04-14 8:40 UTC
[PATCH -next] IMA: fix memdup.cocci warnings
2020-04-14 8:21 UTC
[PATCH -next] tomoyo: use true for bool variable
2020-04-14 8:19 UTC
[PATCH] device_cgroup: Cleanup cgroup eBPF device filter code
2020-04-13 18:43 UTC (2+ messages)
[PATCH 05/26] capabilities: Introduce CAP_PERFMON to kernel and user space
2020-04-13 16:51 UTC (12+ messages)
` [PATCH 06/26] perf/core: Open access to the core for CAP_PERFMON privileged process
` [PATCH 07/26] perf/core: open access to probes "
` [PATCH 08/26] perf tools: Support CAP_PERFMON capability
` [PATCH 09/26] drm/i915/perf: Open access for CAP_PERFMON privileged process
` [PATCH 10/26] trace/bpf_trace: "
` [PATCH 11/26] powerpc/perf: open "
` [PATCH 12/26] parisc/perf: "
` [PATCH 13/26] drivers/perf: Open "
` [PATCH 14/26] drivers/oprofile: "
` [PATCH 15/26] doc/admin-guide: Update perf-security.rst with CAP_PERFMON information
` [PATCH 16/26] doc/admin-guide: update kernel.rst "
[PATCH v2 0/2] support to read and tune appraise mode in runtime
2020-04-13 2:23 UTC (5+ messages)
` [PATCH v2 1/2] ima: support to read appraise mode
` [PATCH v2 2/2] ima: support to tune appraise mode in runtime
[selftests/landlock] d9d464ccf6: kernel-selftests.landlock.test_base.fail
2020-04-10 8:45 UTC (2+ messages)
[PATCH 1/1] smack: remove redundant structure variable from header
2020-04-09 21:00 UTC (2+ messages)
[PATCH v10 0/9] proc: modernize proc to support multiple private instances
2020-04-09 14:32 UTC (4+ messages)
` [PATCH v10 8/9] proc: use human-readable values for hidehid
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).