linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2020-07-15 15:00:20 to 2020-07-20 20:22:08 UTC [more...]

[PATCH 00/15] [libcap] Manual pages: various fixes
 2020-07-20 20:21 UTC  (18+ messages)
` [PATCH 01/15] Manual pages: various pages: Use "\-" for real minus signs
` [PATCH 02/15] Manual pages: cap_init.3: Formatting fix
` [PATCH 03/15] Manual pages: capsh.1: Various minor wording and formatting fixes
` [PATCH 04/15] Manual pages: cap_copy_ext.3: Typo fix
` [PATCH 05/15] Manual pages; cap_get_file.3: Fix some clumsily worded text
` [PATCH 06/15] Manual pages: getcap.8: Add missing word
` [PATCH 07/15] Manual pages: getcap.8: Fix a clumsily worded sentence
` [PATCH 08/15] Manual pages: getpcaps.8: Format options as a hanging list
` [PATCH 09/15] Manual pages: getpcaps.8: Remove a stray .br macro
` [PATCH 10/15] Manual pages: getpcaps.8: SEE ALSO: fix section number for capsh
` [PATCH 11/15] Manual pages: setcap.8: Typo fix
` [PATCH 12/15] Manual pages: cap_get_file.3: NOTES: note the effect of the Ambient set
` [PATCH 13/15] Manual pages: cap_get_proc.3: Update description of capsetp()
` [PATCH 14/15] Manual pages: cap_get_proc.3, capsh.1: Use "UID" and "GID" consistently
` [PATCH 15/15] Manual pages: capsh.1: Change .TP indent to the default

ANN: libseccomp v2.5.0 released
 2020-07-20 19:49 UTC 

[PATCH v3 0/5] LSM: Measure security module state
 2020-07-20 18:59 UTC  (21+ messages)
` [PATCH v3 1/5] IMA: Add LSM_STATE func to measure LSM data
` [PATCH v3 2/5] IMA: Define an IMA hook "
` [PATCH v3 3/5] LSM: Add security_measure_data in lsm_info struct
` [PATCH v3 4/5] LSM: Define SELinux function to measure security state
  ` [RFC PATCH] LSM: security_read_selinux_policy() can be static
` [PATCH v3 5/5] LSM: Define workqueue for measuring security module state

[PATCH 2/2] LSM: SafeSetID: Add GID security policy handling
 2020-07-20 18:12 UTC 

[PATCH 1/2] LSM: Signal to SafeSetID when in set*gid syscall
 2020-07-20 18:11 UTC 

[PATCH v3 00/12] ima: Fix rule parsing bugs and extend KEXEC_CMDLINE rule support
 2020-07-20 17:02 UTC  (19+ messages)
` [PATCH v3 01/12] ima: Have the LSM free its audit rule
` [PATCH v3 06/12] ima: Fail rule parsing when the KEY_CHECK hook is combined with an invalid cond
` [PATCH v3 07/12] ima: Fail rule parsing when appraise_flag=blacklist is unsupportable
` [PATCH v3 08/12] ima: Shallow copy the args_p member of ima_rule_entry.lsm elements

[RFC PATCH v4 00/12] Integrity Policy Enforcement LSM (IPE)
 2020-07-20 16:44 UTC  (17+ messages)
` [RFC PATCH v4 01/12] scripts: add ipe tooling to generate boot policy
` [RFC PATCH v4 02/12] security: add ipe lsm evaluation loop and audit system
` [RFC PATCH v4 03/12] security: add ipe lsm policy parser and policy loading
` [RFC PATCH v4 04/12] ipe: add property for trust of boot volume
` [RFC PATCH v4 05/12] fs: add security blob and hooks for block_device
` [RFC PATCH v4 06/12] dm-verity: move signature check after tree validation
` [RFC PATCH v4 07/12] dm-verity: add bdev_setsecurity hook for dm-verity signature
` [RFC PATCH v4 08/12] ipe: add property for signed dmverity volumes
` [RFC PATCH v4 09/12] dm-verity: add bdev_setsecurity hook for root-hash
` [RFC PATCH v4 10/12] ipe: add property for dmverity roothash
` [RFC PATCH v4 11/12] documentation: add ipe documentation
` [RFC PATCH v4 12/12] cleanup: uapi/linux/audit.h

[PATCH v6 0/7] capabilities: Introduce CAP_CHECKPOINT_RESTORE
 2020-07-20 12:58 UTC  (14+ messages)
` [PATCH v6 1/7] "
` [PATCH v6 2/7] pid: use checkpoint_restore_ns_capable() for set_tid
` [PATCH v6 3/7] pid_namespace: use checkpoint_restore_ns_capable() for ns_last_pid
` [PATCH v6 4/7] proc: allow access in init userns for map_files with CAP_CHECKPOINT_RESTORE
` [PATCH v6 5/7] prctl: Allow local CAP_CHECKPOINT_RESTORE to change /proc/self/exe
` [PATCH v6 6/7] prctl: exe link permission error changed from -EINVAL to -EPERM
` [PATCH v6 7/7] selftests: add clone3() CAP_CHECKPOINT_RESTORE test

[PATCH bpf-next v4 1/4] bpf: Generalize bpf_sk_storage
 2020-07-20 11:18 UTC  (2+ messages)

[PATCH 00/13] Introduce partial kernel_read_file() support
 2020-07-20  8:34 UTC  (25+ messages)
` [PATCH 01/13] firmware_loader: EFI firmware loader must handle pre-allocated buffer
` [PATCH 02/13] fs/kernel_read_file: Remove FIRMWARE_PREALLOC_BUFFER enum
` [PATCH 03/13] fs/kernel_read_file: Remove FIRMWARE_EFI_EMBEDDED enum
` [PATCH 04/13] fs/kernel_read_file: Split into separate include file
` [PATCH 05/13] fs/kernel_read_file: Split into separate source file
` [PATCH 06/13] fs/kernel_read_file: Remove redundant size argument
` [PATCH 07/13] fs/kernel_read_file: Switch buffer size arg to size_t
` [PATCH 08/13] fs/kernel_read_file: Add file_size output argument
` [PATCH 09/13] LSM: Introduce kernel_post_load_data() hook
` [PATCH 10/13] firmware_loader: Use security_post_load_data()
` [PATCH 11/13] module: Call security_kernel_post_load_data()
` [PATCH 12/13] LSM: Add "contents" flag to kernel_read_file hook
` [PATCH 13/13] fs/kernel_file_read: Add "offset" arg for partial reads

[RFC PATCH 0/5] keys: Security changes, ACLs and Container keyring
 2020-07-19 18:10 UTC  (6+ messages)
` [RFC PATCH 1/5] keys: Move permissions checking decisions into the checking code
` [RFC PATCH 3/5] keys: Provide KEYCTL_GRANT_PERMISSION
` [RFC PATCH 4/5] keys: Split the search perms between KEY_NEED_USE and KEY_NEED_SEARCH
` [RFC PATCH 5/5] keys: Implement a 'container' keyring

[PATCH for v5.9] netfilter: xtables: Replace HTTP links with HTTPS ones
 2020-07-19 12:02 UTC 

[PATCH v5 0/6] capabilities: Introduce CAP_CHECKPOINT_RESTORE
 2020-07-18 17:47 UTC  (17+ messages)
` [PATCH v5 1/6] "
` [PATCH v5 2/6] pid: use checkpoint_restore_ns_capable() for set_tid
` [PATCH v5 3/6] pid_namespace: use checkpoint_restore_ns_capable() for ns_last_pid
` [PATCH v5 4/6] proc: allow access in init userns for map_files with CAP_CHECKPOINT_RESTORE
` [PATCH v5 5/6] prctl: Allow checkpoint/restore capable processes to change exe link
` [PATCH v5 6/6] selftests: add clone3() CAP_CHECKPOINT_RESTORE test

[PATCH] LSM: drop duplicated words in header file comments
 2020-07-18  2:59 UTC  (2+ messages)

[PATCH] capabilities: Replace HTTP links with HTTPS ones
 2020-07-18  2:54 UTC  (2+ messages)

Reporting a use-after-free read bug in userfaultfd_release()
 2020-07-17 11:45 UTC 

[PATCH 01/16] Manual pages: getcap.8, getpcaps.8, setcap.8: SEE ALSO: add capabilities(7)
 2020-07-17  6:00 UTC  (18+ messages)
` [PATCH 02/16] Manual pages: cap_get_file.3, getcap.8, setcap.8: SEE ALSO: add user_namespaces(7)
` [PATCH 03/16] Manual pages: setcap.8: Formatting fix: use bold for function name
` [PATCH 04/16] Manual pages: cap_from_text.3: typo fix
` [PATCH 05/16] Manual pages: cap_get_file.3, getcap.8, setcap.8: clarify "namespace"
` [PATCH 06/16] Manual pages: cap_get_file.3: Remove stray macros that have no effect
` [PATCH 07/16] Manual pages: cap_get_proc.3: s/UNCERTAIN/CAP_MODE_UNCERTAIN/
` [PATCH 08/16] Manual pages: cap_get_proc.3: formatting fix
` [PATCH 09/16] Manual pages: capsh.1: spelling fixes
` [PATCH 10/16] Manual pages: capsh.1: Remove stray .TP macro
` [PATCH 11/16] Manual pages: capsh.1: Correct/update the Cap field example for /proc/PID/status
` [PATCH 12/16] Manual pages: capsh.1: Update the capsh --decode example
` [PATCH 13/16] Manual pages: capsh.1: Describe the argument of --secbits in more detail
` [PATCH 14/16] pam_cap.c: Spelling fix in output string
` [PATCH 15/16] Various source files: spelling fixes on comments
` [PATCH 16/16] capsh.c: Spelling fixes in usage() message

[PATCH v2 0/5] LSM: Measure security module state
 2020-07-16 22:03 UTC  (10+ messages)
` [PATCH v2 1/5] IMA: Add LSM_STATE func to measure LSM data
` [PATCH v2 2/5] IMA: Define an IMA hook "
` [PATCH v3 3/5] LSM: Add security_measure_data in lsm_info struct
` [PATCH v2 4/5] LSM: Define SELinux function to measure security state
` [PATCH v2 5/5] LSM: Define workqueue for measuring security module state

[PATCH 0/4] Fix misused kernel_read_file() enums
 2020-07-16 21:16 UTC  (8+ messages)
` [PATCH 2/4] fs: Remove FIRMWARE_PREALLOC_BUFFER from "

[PATCH v6 0/7] Add support for O_MAYEXEC
 2020-07-16 19:13 UTC  (19+ messages)
` [PATCH v6 4/7] fs: Introduce O_MAYEXEC flag for openat2(2)
` [PATCH v6 5/7] fs,doc: Enable to enforce noexec mounts or file exec through O_MAYEXEC
` [PATCH v6 6/7] selftest/openat2: Add tests for O_MAYEXEC enforcing
` [PATCH v6 7/7] ima: add policy support for the new file open MAY_OPENEXEC flag

[V2 PATCH 0/3] Adding support for carrying IMA measurement logs
 2020-07-16 17:51 UTC  (5+ messages)
` [V2 PATCH 1/3] Refactoring powerpc code for carrying over IMA measurement logs, to move non architecture specific code to security/ima

[PATCH v9 2/2] tpm: Add support for event log pointer found in TPM2 ACPI table
 2020-07-16 17:26 UTC  (11+ messages)

[PATCH] ima: Rename internal audit rule functions
 2020-07-16 14:23 UTC  (4+ messages)

[PATCH v36 11/24] x86/sgx: Add SGX enclave driver
 2020-07-16 13:52 UTC  (2+ messages)
` [PATCH v36 15/24] x86/sgx: Allow a limited use of ATTRIBUTE.PROVISIONKEY for attestation

[PATCH] Smack: fix use-after-free in smk_write_relabel_self()
 2020-07-16  0:27 UTC  (2+ messages)

[PATCH bpf-next v4 0/4] Generalizing bpf_local_storage
 2020-07-15 22:59 UTC  (4+ messages)
` [PATCH bpf-next v4 2/4] bpf: Implement bpf_local_storage for inodes

[PATCH] keys: asymmetric: fix error return code in software_key_query()
 2020-07-15 22:28 UTC 

[RFC PATCH v3 00/12] Integrity Policy Enforcement LSM (IPE)
 2020-07-15 19:16 UTC  (3+ messages)
` [RFC PATCH v3 03/12] security: add ipe lsm policy parser and policy loading

[PATCH v1 0/5] LSM: Measure security module state
 2020-07-15 18:34 UTC  (8+ messages)
` [PATCH v1 1/5] IMA: Add LSM_STATE func to measure LSM data
` [PATCH v1 2/5] IMA: Define an IMA hook "
` [PATCH v1 3/5] LSM: Add security_state function pointer in lsm_info struct
` [PATCH v1 4/5] LSM: Define SELinux function to measure security state
` [PATCH v1 5/5] LSM: Define workqueue for measuring security module state

[PATCH 0/7] Implementing kernel_execve
 2020-07-15 18:23 UTC  (11+ messages)
` [PATCH 7/7] exec: Implement kernel_execve


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).