linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2020-05-19 00:33:27 to 2020-05-29 11:29:30 UTC [more...]

[PATCH v18 00/12] Landlock LSM
 2020-05-29 11:29 UTC  (15+ messages)
` [PATCH v18 01/12] landlock: Add object management
` [PATCH v18 02/12] landlock: Add ruleset and domain management
` [PATCH v18 03/12] landlock: Set up the security framework and manage credentials
` [PATCH v18 04/12] landlock: Add ptrace restrictions
` [PATCH v18 05/12] LSM: Infrastructure management of the superblock
` [PATCH v18 06/12] fs,security: Add sb_delete hook
` [PATCH v18 07/12] landlock: Support filesystem access-control
` [PATCH v18 08/12] landlock: Add syscall implementation
` [PATCH v18 09/12] arch: Wire up landlock() syscall
` [PATCH v18 10/12] selftests/landlock: Add initial tests
` [PATCH v18 11/12] samples/landlock: Add a sandbox manager example
` [PATCH v18 12/12] landlock: Add user and kernel documentation

[RFC PATCH v3 00/12] Integrity Policy Enforcement LSM (IPE)
 2020-05-29  8:18 UTC  (8+ messages)

clean up kernel_{read,write} & friends v2
 2020-05-29  5:57 UTC  (33+ messages)
` [PATCH 01/14] cachefiles: switch to kernel_write
` [PATCH 02/14] autofs: "
` [PATCH 03/14] bpfilter: "
` [PATCH 04/14] fs: unexport __kernel_write
` [PATCH 05/14] fs: check FMODE_WRITE in __kernel_write
` [PATCH 06/14] fs: remove the call_{read,write}_iter functions
` [PATCH 07/14] fs: implement kernel_write using __kernel_write
` [PATCH 08/14] fs: remove __vfs_write
` [PATCH 09/14] fs: don't change the address limit for ->write_iter in __kernel_write
` [PATCH 10/14] fs: add a __kernel_read helper
` [PATCH 11/14] integrity/ima: switch to using __kernel_read
` [PATCH 12/14] fs: implement kernel_read "
` [PATCH 13/14] fs: remove __vfs_read
` [PATCH 14/14] fs: don't change the address limit for ->read_iter in __kernel_read

[PATCH 0/5] exec: Control flow simplifications
 2020-05-28 19:21 UTC  (64+ messages)
    ` [PATCH v2 0/8] "
      ` [PATCH v2 1/8] exec: Teach prepare_exec_creds how exec treats uids & gids
      ` [PATCH v2 2/8] exec: Factor security_bprm_creds_for_exec out of security_bprm_set_creds
      ` [PATCH v2 3/8] exec: Convert security_bprm_set_creds into security_bprm_repopulate_creds
      ` [PATCH v2 4/8] exec: Allow load_misc_binary to call prepare_binfmt unconditionally
      ` [PATCH v2 5/8] exec: Move the call of prepare_binprm into search_binary_handler
      ` [PATCH v2 6/8] exec/binfmt_script: Don't modify bprm->buf and then return -ENOEXEC
      ` [PATCH v2 7/8] exec: Generic execfd support
      ` [PATCH v2 8/8] exec: Remove recursion from search_binary_handler
      ` [PATCH 0/11] exec: cred calculation simplifications
        ` [PATCH 01/11] exec: Reduce bprm->per_clear to a single bit
        ` [PATCH 02/11] exec: Introduce active_per_clear the per file version of per_clear
        ` [PATCH 03/11] exec: Compute file based creds only once
        ` [PATCH 04/11] exec: Move uid/gid handling from creds_from_file into bprm_fill_uid
        ` [PATCH 05/11] exec: In bprm_fill_uid use CAP_SETGID to see if a gid change is safe
        ` [PATCH 06/11] exec: Don't set secureexec when the uid or gid changes are abandoned
        ` [PATCH 07/11] exec: Set saved, fs, and effective ids together in bprm_fill_uid
        ` [PATCH 08/11] exec: In bprm_fill_uid remove unnecessary no new privs check
        ` [PATCH 09/11] exec: In bprm_fill_uid only set per_clear when honoring suid or sgid
        ` [PATCH 10/11] exec: In bprm_fill_uid set secureexec at same time as per_clear
        ` [PATCH 11/11] exec: Remove the label after_setid from bprm_fill_uid

[PATCH v3 0/6] Enable as many KUnit tests as possible
 2020-05-28 19:13 UTC  (4+ messages)

[PATCH v3 1/6] kunit: Kconfig: enable a KUNIT_ALL_TESTS fragment
 2020-05-28 19:04 UTC  (2+ messages)

[PATCH AUTOSEL 5.6 04/47] evm: Fix RCU list related warnings
 2020-05-28 11:55 UTC 

[PATCH AUTOSEL 5.4 03/26] evm: Fix RCU list related warnings
 2020-05-28 11:56 UTC 

[PATCH AUTOSEL 4.19 03/17] evm: Fix RCU list related warnings
 2020-05-28 11:57 UTC 

[PATCH] capabilities: Introduce CAP_RESTORE
 2020-05-28  9:48 UTC  (22+ messages)

[PATCH bpf-next 0/4] Generalizing bpf_local_storage
 2020-05-27 22:06 UTC  (12+ messages)
` [PATCH bpf-next 1/4] bpf: Generalize bpf_sk_storage
` [PATCH bpf-next 2/4] bpf: Implement bpf_local_storage for inodes
` [PATCH bpf-next 3/4] bpf: Allow local storage to be used from LSM programs
` [PATCH bpf-next 4/4] bpf: Add selftests for local_storage

general protection fault in tomoyo_check_acl
 2020-05-26 12:58 UTC  (2+ messages)

[PATCH 0/3] fs: reduce export usage of kerne_read*() calls
 2020-05-24  2:52 UTC  (9+ messages)

[RFC][PATCH 0/2] Add support for using reserved memory for ima buffer pass
 2020-05-23  4:08 UTC  (6+ messages)

[PATCH v2 2/2] fs: avoid fdput() after failed fdget() in kernel_read_file_from_fd()
 2020-05-22 22:47 UTC  (5+ messages)

[PATCH v30 10/20] x86/sgx: Linux Enclave Driver
 2020-05-22 19:39 UTC  (5+ messages)

[PATCH] commoncap: Make cap_inode_killpriv ignore other LSM xattr
 2020-05-22 11:32 UTC 

[GIT PULL] apparmor bug fixes for v5.7-rc6
 2020-05-21 23:50 UTC  (2+ messages)

[PATCH] security: integrity: Replace zero-length array with flexible-array member
 2020-05-21 23:10 UTC 

[PATCH bpf] security: Fix hook iteration for secid_to_secctx
 2020-05-21  3:12 UTC  (5+ messages)

clean up kernel_{read,write} & friends v2
 2020-05-20 15:59 UTC  (2+ messages)

[PATCH 0/4] Relocate execve() sanity checks
 2020-05-19 22:58 UTC  (23+ messages)
` [PATCH 1/4] exec: Change uselib(2) IS_SREG() failure to EACCES

[PATCH v3 0/3] perf: make Perf tool aware of SELinux access control
 2020-05-19 18:10 UTC  (6+ messages)
` [PATCH v3 2/3] perf tool: "

[PATCH v17 00/23] LSM: Module stacking for AppArmor
 2020-05-19 15:48 UTC  (8+ messages)
` [PATCH v17 20/23] Audit: Add a new record for multiple subject LSM attributes

[PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
 2020-05-19 10:13 UTC  (12+ messages)
        ` How about just O_EXEC? (was Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).