linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2020-08-05 20:01:44 to 2020-08-14 02:04:03 UTC [more...]

[PATCH 0/3] Smack: Use the netlbl incoming cache
 2020-08-14  2:03 UTC  (8+ messages)
  ` [PATCH 1/3] Smack: Consolidate uses of secmark into a function
  ` [PATCH 2/3] Smack: Set socket labels only once
  ` [PATCH 3/3] Smack: Use the netlabel cache

[PATCH v20 00/12] Landlock LSM
 2020-08-13 20:29 UTC  (7+ messages)
` [PATCH v20 05/12] LSM: Infrastructure management of the superblock
` [PATCH v20 08/12] landlock: Add syscall implementations

[PATCH 0/2] SELinux: Measure state and hash of policy using IMA
 2020-08-13 18:13 UTC  (8+ messages)
` [PATCH 1/2] IMA: Handle early boot data measurement
` [PATCH 2/2] SELinux: Measure state and hash of policy using IMA

[PATCH v7 0/7] Add support for O_MAYEXEC
 2020-08-13 15:31 UTC  (32+ messages)
` [PATCH v7 1/7] exec: Change uselib(2) IS_SREG() failure to EACCES
` [PATCH v7 2/7] exec: Move S_ISREG() check earlier
` [PATCH v7 3/7] exec: Move path_noexec() "
` [PATCH v7 4/7] fs: Introduce O_MAYEXEC flag for openat2(2)
` [PATCH v7 5/7] fs,doc: Enable to enforce noexec mounts or file exec through O_MAYEXEC

Loadpin: Possibility of exceptions for certain firmwares?
 2020-08-13 15:14 UTC 

[RFC PATCH v5 00/11] Integrity Policy Enforcement LSM (IPE)
 2020-08-13 15:10 UTC  (41+ messages)
      ` [dm-devel] "

[GIT PULL] Mount notifications
 2020-08-13 10:36 UTC  (73+ messages)
` [GIT PULL] Filesystem Information
        ` file metadata via fs API (was: [GIT PULL] Filesystem Information)
                  ` file metadata via fs API

[PATCH v6 0/4] LSM: Measure security module data
 2020-08-12 20:37 UTC  (24+ messages)
` [PATCH v6 1/4] IMA: Add func to measure LSM state and policy

[PATCH 0/3] IMA: Infrastructure for measurement of critical kernel data
 2020-08-12 19:31 UTC  (4+ messages)
` [PATCH 1/3] IMA: generalize keyring specific measurement constructs
` [PATCH 2/3] IMA: add policy to support measuring critical data from kernel components
` [PATCH 3/3] IMA: define IMA hook to measure "

[PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
 2020-08-12 18:47 UTC  (16+ messages)

[GIT PULL] Security subsystem updates for v5.9
 2020-08-11 21:59 UTC  (2+ messages)

[PATCH v2 0/2] ima: Fix keyrings race condition and other key related bugs
 2020-08-11 19:26 UTC  (3+ messages)
` [PATCH v2 1/2] ima: Pre-parse the list of keyrings in a KEY_CHECK rule
` [PATCH v2 2/2] ima: Fail rule parsing when asymmetric key measurement isn't supportable

[PATCH 4.19/4.14/4.9/4.4] Smack: fix use-after-free in smk_write_relabel_self()
 2020-08-10 13:39 UTC  (2+ messages)

[PATCH v6 0/3] SELinux support for anonymous inodes and UFFD
 2020-08-07 23:02 UTC  (5+ messages)
` [PATCH v6 1/3] Add a new LSM-supporting anonymous inode interface
` [PATCH v6 2/3] Teach SELinux about anonymous inodes
` [PATCH v6 3/3] Wire UFFD up to SELinux

[PATCH] security: apparmor: delete repeated words in comments
 2020-08-07 21:27 UTC  (2+ messages)
` [apparmor] "

[PATCH] security: selinux: delete repeated words in comments
 2020-08-07 18:09 UTC  (2+ messages)

[PATCH] security: keys: delete repeated words in comments
 2020-08-07 16:51 UTC 

[PATCH] security: ima: delete a repeated word in comments
 2020-08-07 16:51 UTC 

[PATCH v4 00/17] Introduce partial kernel_read_file() support
 2020-08-07  0:23 UTC  (11+ messages)
` [PATCH v4 09/17] LSM: Introduce kernel_post_load_data() hook
` [PATCH v4 10/17] firmware_loader: Use security_post_load_data()
` [PATCH v4 11/17] module: Call security_kernel_post_load_data()
` [PATCH v4 12/17] LSM: Add "contents" flag to kernel_read_file hook

[GIT PULL] Smack patches for v5.9
 2020-08-06 18:09 UTC  (2+ messages)

[PATCH v36 11/24] x86/sgx: Add SGX enclave driver
 2020-08-06 17:00 UTC  (4+ messages)
` [PATCH v36 15/24] x86/sgx: Allow a limited use of ATTRIBUTE.PROVISIONKEY for attestation

[PATCH 0/2] ima: Fix keyrings race condition and other key related bugs
 2020-08-06 15:46 UTC  (4+ messages)
` [PATCH 1/2] ima: Pre-parse the list of keyrings in a KEY_CHECK rule

[PATCH 08/18] fsinfo: Allow mount topology and propagation info to be retrieved [ver #21]
 2020-08-06  5:43 UTC  (19+ messages)
` [PATCH 00/18] VFS: Filesystem information "
  ` [PATCH 06/18] fsinfo: Add a uniquifier ID to struct mount "
  ` [PATCH 10/18] fsinfo: Provide notification overrun handling support "

[PATCH 00/17] pipe: Keyrings, mount and superblock notifications [ver #5]
 2020-08-05 11:36 UTC  (10+ messages)
` [PATCH 13/17] watch_queue: Implement mount topology and attribute change "

[PATCH 06/18] fsinfo: Add a uniquifier ID to struct mount [ver #21]
 2020-08-05 14:46 UTC 


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).