linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2017-06-08 19:23:31 to 2017-06-17 14:18:09 UTC [more...]

[RFC][PATCH 00/27] VFS: Introduce filesystem context [ver #5]
 2017-06-17 14:18 UTC  (46+ messages)
` [PATCH 01/27] Provide a function to create a NUL-terminated string from unterminated data "
` [PATCH 02/27] VFS: Clean up whitespace in fs/namespace.c and fs/super.c "
` [PATCH 03/27] VFS: Make get_mnt_ns() return the namespace "
` [PATCH 04/27] VFS: Make get_filesystem() return the affected filesystem "
` [PATCH 05/27] VFS: Provide empty name qstr "
` [PATCH 06/27] Provide supplementary error message facility "
` [PATCH 08/27] VFS: Introduce the structs and doc for a filesystem context "
  ` Updated docs
` [PATCH 09/27] VFS: Add LSM hooks for filesystem context [ver #5]
` [PATCH 10/27] VFS: Implement a filesystem superblock creation/configuration "
` [PATCH 11/27] VFS: Remove unused code after filesystem context changes "
` [PATCH 12/27] VFS: Implement fsopen() to prepare for a mount "
` [PATCH 13/27] VFS: Implement fsmount() to effect a pre-configured "
` [PATCH 14/27] VFS: Add a sample program for fsopen/fsmount "
` [PATCH 15/27] procfs: Move proc_fill_super() to fs/proc/root.c "
` [PATCH 16/27] proc: Add fs_context support to procfs "
` [PATCH 17/27] NFS: Move mount parameterisation bits into their own file "
` [PATCH 18/27] NFS: Constify mount argument match tables "
` [PATCH 19/27] NFS: Rename struct nfs_parsed_mount_data to struct nfs_fs_context "
` [PATCH 20/27] NFS: Split nfs_parse_mount_options() "
` [PATCH 21/27] NFS: Deindent nfs_fs_context_parse_option() "
` [PATCH 22/27] NFS: Add a small buffer in nfs_fs_context to avoid string dup "
` [PATCH 23/27] NFS: Do some tidying of the parsing code "
` [PATCH 24/27] NFS: Add fs_context support. "
` [PATCH 25/27] ipc: Convert mqueue fs to fs_context "
` [PATCH 26/27] cpuset: Use "
` [PATCH 27/27] kernfs, sysfs, cgroup: Support "
` [PATCH 27/27] ... and the intel_rdt driver
  ` [PATCH 07/27] VFS: Differentiate mount flags (MS_*) from internal superblock flags [ver #5]

Is there a generic LSM/kernel ABI analogous to getcon_raw() and aa_getcon()?
 2017-06-16 19:28 UTC  (9+ messages)

[PATCH RFC] Smack: More sanity in the use of Netlabel
 2017-06-16 11:05 UTC  (9+ messages)
      ` [SMACK-discuss] "

[PATCH 0/4] define new fs integrity_read method
 2017-06-16  6:18 UTC  (15+ messages)
` [PATCH 1/4] ima: use fs method to read integrity data
` [PATCH 2/4] tmpfs: define integrity_read file operation method
` [PATCH 3/4] ima: use existing read file operation method to calculate file hash
` [PATCH 4/4] ima: use read_iter (generic_file_read_iter) "
` [PATCH] sample xfstests IMA-appraisal test module
` [PATCH] sample xfstests IMA-appraisal test module (resending)

[PATCH v2 0/1] Add Trusted Path Execution as a stackable LSM
 2017-06-16  2:25 UTC  (16+ messages)
` [PATCH v2 1/1] "
            ` [kernel-hardening] "
  ` [RFC PATCH] print_tpe_error() can be static

[RFC v2 0/9] S.A.R.A. a new stacked LSM
 2017-06-15 17:19 UTC  (12+ messages)
` [RFC v2 1/9] S.A.R.A. Documentation
` [RFC v2 2/9] S.A.R.A. framework creation
` [RFC v2 3/9] Creation of "check_vmflags" LSM hook
` [RFC v2 4/9] S.A.R.A. cred blob management
` [RFC v2 5/9] S.A.R.A. WX Protection
` [RFC v2 6/9] Creation of "pagefault_handler_x86" LSM hook
` [RFC v2 7/9] Trampoline emulation
  ` [kernel-hardening] "
` [RFC v2 8/9] Allowing for stacking procattr support in S.A.R.A
` [RFC v2 9/9] S.A.R.A. WX Protection procattr interface

[PATCH v2 0/6] Appended signatures support for IMA appraisal
 2017-06-15 16:00 UTC  (12+ messages)
` [PATCH v2 1/6] integrity: Small code improvements
` [PATCH v2 2/6] ima: Simplify policy_func_show
` [PATCH v2 3/6] ima: Log the same audit cause whenever a file has no signature
` [PATCH v2 6/6] ima: Support module-style appended signatures for appraisal

[RFC 0/3] WhiteEgret LSM module
 2017-06-15  7:56 UTC  (5+ messages)

[PATCH v1] shebang: restrict python interactive prompt/interpreter
 2017-06-14 20:37 UTC  (19+ messages)
                        ` [kernel-hardening] "

[PATCH v2] tpm: Enable CLKRUN protocol for Braswell systems
 2017-06-14 19:39 UTC  (17+ messages)
` [PATCH v3] "
` [PATCH v4] "

[PATCH] apparmor: fix error code in aafs_create()
 2017-06-14 14:44 UTC  (2+ messages)

[PATCH] security: smack: smack.h - style fix
 2017-06-13 18:10 UTC  (2+ messages)

[PATCH 0/7] IMA: new parser for ima_restore_measurement_list()
 2017-06-13 12:37 UTC  (10+ messages)
` [PATCH 5/7] ima: add securityfs interface to save a measurements list with kexec header
  ` [Linux-ima-devel] "

[GIT PULL] selinux: fix double free bug
 2017-06-13  8:05 UTC 

[PATCH 00/11] S.A.R.A. a new stacked LSM
 2017-06-13  7:55 UTC  (29+ messages)
` [PATCH 01/11] S.A.R.A. Documentation
  ` [kernel-hardening] "
` [PATCH 02/11] S.A.R.A. framework creation
` [PATCH 03/11] Creation of "usb_device_auth" LSM hook
` [PATCH 04/11] S.A.R.A. USB Filtering
` [PATCH 05/11] Creation of "check_vmflags" LSM hook
` [PATCH 06/11] S.A.R.A. cred blob management
` [PATCH 07/11] S.A.R.A. WX Protection
` [PATCH 08/11] Creation of "pagefault_handler_x86" LSM hook
` [PATCH 09/11] Trampoline emulation
` [PATCH 10/11] Allowing for stacking procattr support in S.A.R.A
` [PATCH 11/11] S.A.R.A. WX Protection procattr interface

[PATCH] KEYS: remove CONFIG_KEYS_COMPAT
 2017-06-13  6:09 UTC 

[GIT PULL] AppArmor for 4.13
 2017-06-13  0:46 UTC  (2+ messages)

[GIT PULL] SELinux fixes for v4.12 (#1)
 2017-06-12 15:40 UTC 

I Would love to discuse something with you
 2017-06-12 14:51 UTC 

[PATCH] security: selinux: use kmem_cache for ebitmap
 2017-06-12  2:16 UTC  (3+ messages)

[PATCH v2 00/11] introduce crypto wait for async op
 2017-06-10  9:01 UTC  (5+ messages)
` [PATCH v2 01/11] crypto: "

[PATCH 0/5] security, efi: Set lockdown if in secure boot mode
 2017-06-09 19:22 UTC  (7+ messages)

[PATCH v6 0/4] ro protection for dynamic data
 2017-06-09 18:56 UTC  (3+ messages)
` [PATCH 2/4] Protectable Memory Allocator

[PATCH 0/6] LSM: Security module blob management
 2017-06-09  3:54 UTC  (9+ messages)
` [PATCH 1/6] procfs-add-smack-subdir-to-attrs
` [PATCH 2/6] LSM-manage-credential-security-blobs
` [PATCH 3/6] LSM: Manage file security blobs
` [PATCH 4/6] LSM: manage task "
` [PATCH 5/6] LSM: Infrastructure management of the remaining blobs
` [PATCH 6/6] LSM: general but not extreme module stacking
` [kernel-hardening] [PATCH 0/6] LSM: Security module blob management

[GIT PULL] Keys subsystem update
 2017-06-09  3:51 UTC 


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).