linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2020-10-27 20:11:21 to 2020-11-05 01:06:58 UTC [more...]

[PATCH v22 00/23] LSM: Module stacking for AppArmor
 2020-11-05  0:49 UTC  (16+ messages)
  ` [PATCH v22 01/23] LSM: Infrastructure management of the sock security
  ` [PATCH v22 02/23] LSM: Create and manage the lsmblob data structure
  ` [PATCH v22 03/23] LSM: Use lsmblob in security_audit_rule_match
  ` [PATCH v22 04/23] LSM: Use lsmblob in security_kernel_act_as
  ` [PATCH v22 05/23] LSM: Use lsmblob in security_secctx_to_secid
  ` [PATCH v22 06/23] LSM: Use lsmblob in security_secid_to_secctx
  ` [PATCH v22 07/23] LSM: Use lsmblob in security_ipc_getsecid
  ` [PATCH v22 08/23] LSM: Use lsmblob in security_task_getsecid
  ` [PATCH v22 09/23] LSM: Use lsmblob in security_inode_getsecid
  ` [PATCH v22 10/23] LSM: Use lsmblob in security_cred_getsecid
  ` [PATCH v22 11/23] IMA: Change internal interfaces to use lsmblobs
  ` [PATCH v22 12/23] LSM: Specify which LSM to display
  ` [PATCH v22 13/23] LSM: Ensure the correct LSM context releaser
  ` [PATCH v22 14/23] LSM: Use lsmcontext in security_secid_to_secctx
  ` [PATCH v22 15/23] LSM: Use lsmcontext in security_inode_getsecctx

[PATCH v5 0/7] IMA: Infrastructure for measurement of critical kernel data
 2020-11-05  0:31 UTC  (9+ messages)
` [PATCH v5 1/7] IMA: generalize keyring specific measurement constructs
` [PATCH v5 2/7] IMA: update process_buffer_measurement to measure buffer hash
` [PATCH v5 3/7] IMA: add hook to measure critical data
` [PATCH v5 4/7] IMA: add policy "
` [PATCH v5 5/7] IMA: validate supported kernel data sources before measurement
` [PATCH v5 6/7] IMA: add critical_data to the built-in policy rules
` [PATCH v5 7/7] selinux: measure state and hash of the policy using IMA

[PATCH v22 00/23] LSM: Module stacking for AppArmor
 2020-11-04 23:41 UTC  (15+ messages)
  ` [PATCH v22 01/23] LSM: Infrastructure management of the sock security
  ` [PATCH v22 02/23] LSM: Create and manage the lsmblob data structure
  ` [PATCH v22 03/23] LSM: Use lsmblob in security_audit_rule_match
  ` [PATCH v22 04/23] LSM: Use lsmblob in security_kernel_act_as
  ` [PATCH v22 05/23] LSM: Use lsmblob in security_secctx_to_secid
  ` [PATCH v22 06/23] LSM: Use lsmblob in security_secid_to_secctx
  ` [PATCH v22 07/23] LSM: Use lsmblob in security_ipc_getsecid
  ` [PATCH v22 08/23] LSM: Use lsmblob in security_task_getsecid
  ` [PATCH v22 09/23] LSM: Use lsmblob in security_inode_getsecid
  ` [PATCH v22 10/23] LSM: Use lsmblob in security_cred_getsecid
  ` [PATCH v22 11/23] IMA: Change internal interfaces to use lsmblobs
  ` [PATCH v22 12/23] LSM: Specify which LSM to display
  ` [PATCH v22 13/23] LSM: Ensure the correct LSM context releaser
  ` [PATCH v22 14/23] LSM: Use lsmcontext in security_secid_to_secctx

[PATCH v10 0/3] SELinux support for anonymous inodes and UFFD
 2020-11-04 20:36 UTC  (7+ messages)
` [PATCH v10 1/3] Add a new LSM-supporting anonymous inode interface
` [PATCH v10 3/3] Use secure anon inodes for userfaultfd

[RFC PATCH 0/3] Add LSM/SELinux support for GPRS Tunneling Protocol (GTP)
 2020-09-24  8:51 UTC  (2+ messages)
` [RFC PATCH 2/3] gtp: Add LSM hooks to "

selinux: how to query if selinux is enabled
 2020-11-04 17:02 UTC  (14+ messages)

[PATCH v40 11/24] x86/sgx: Add SGX misc driver interface
 2020-11-04 14:54 UTC  (2+ messages)
` [PATCH v40 15/24] x86/sgx: Add SGX_IOC_ENCLAVE_PROVISION

[PATCH v4 1/3,RESEND] KEYS: trusted: Fix incorrect handling of tpm_get_random()
 2020-11-04 10:32 UTC  (8+ messages)
` [PATCH v4 2/3,RESEND] KEYS: trusted: Fix migratable=1 failing
` [PATCH v4 3/3,RESEND] KEYS: trusted: Reserve TPM for seal and unseal operations
` [PATCH v4 1/3,RESEND 2] KEYS: trusted: Fix incorrect handling of tpm_get_random()
` [PATCH v4 2/3,RESEND 2] KEYS: trusted: Fix migratable=1 failing
` [PATCH v4 3/3,RESEND 2] KEYS: trusted: Reserve TPM for seal and unseal operations

[PATCH v10 0/3] SELinux support for anonymous inodes and UFFD
 2020-11-03 22:00 UTC  (4+ messages)
` [PATCH v10 1/3] Add a new LSM-supporting anonymous inode interface
` [PATCH v10 2/3] Teach SELinux about anonymous inodes
` [PATCH v10 3/3] Use secure anon inodes for userfaultfd

[PATCH v23 00/12] Landlock LSM
 2020-11-03 18:21 UTC  (13+ messages)
` [PATCH v23 01/12] landlock: Add object management
` [PATCH v23 02/12] landlock: Add ruleset and domain management
` [PATCH v23 03/12] landlock: Set up the security framework and manage credentials
` [PATCH v23 04/12] landlock: Add ptrace restrictions
` [PATCH v23 05/12] LSM: Infrastructure management of the superblock
` [PATCH v23 06/12] fs,security: Add sb_delete hook
` [PATCH v23 07/12] landlock: Support filesystem access-control
` [PATCH v23 08/12] landlock: Add syscall implementations
` [PATCH v23 09/12] arch: Wire up Landlock syscalls
` [PATCH v23 10/12] selftests/landlock: Add user space tests
` [PATCH v23 11/12] samples/landlock: Add a sandbox manager example
` [PATCH v23 12/12] landlock: Add user and kernel documentation

[PATCH v22 00/12] Landlock LSM
 2020-11-03 16:03 UTC  (34+ messages)
` [PATCH v22 01/12] landlock: Add object management
` [PATCH v22 02/12] landlock: Add ruleset and domain management
` [PATCH v22 03/12] landlock: Set up the security framework and manage credentials
` [PATCH v22 04/12] landlock: Add ptrace restrictions
` [PATCH v22 05/12] LSM: Infrastructure management of the superblock
` [PATCH v22 06/12] fs,security: Add sb_delete hook
` [PATCH v22 07/12] landlock: Support filesystem access-control
` [PATCH v22 08/12] landlock: Add syscall implementations
` [PATCH v22 09/12] arch: Wire up Landlock syscalls
` [PATCH v22 10/12] selftests/landlock: Add user space tests
` [PATCH v22 12/12] landlock: Add user and kernel documentation

[PATCH v8 0/4] Introduce TEE based Trusted Keys support
 2020-11-03 16:01 UTC  (5+ messages)
` [PATCH v8 1/4] KEYS: trusted: Add generic trusted keys framework
` [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
` [PATCH v8 3/4] doc: trusted-encrypted: updates with TEE as a new trust source
` [PATCH v8 4/4] MAINTAINERS: Add myself as Trusted Keys co-maintainer

[PATCH 00/34] fs: idmapped mounts
 2020-11-03 14:10 UTC  (66+ messages)
` [PATCH 01/34] namespace: take lock_mount_hash() directly when changing flags
` [PATCH 02/34] namespace: only take read lock in do_reconfigure_mnt()
` [PATCH 03/34] fs: add mount_setattr()
` [PATCH 04/34] tests: add mount_setattr() selftests
` [PATCH 05/34] fs: introduce MOUNT_ATTR_IDMAP
` [PATCH 06/34] fs: add id translation helpers
` [PATCH 07/34] capability: handle idmapped mounts
` [PATCH 08/34] namei: add idmapped mount aware permission helpers
` [PATCH 09/34] inode: add idmapped mount aware init and "
` [PATCH 10/34] attr: handle idmapped mounts
` [PATCH 11/34] acl: "
` [PATCH 12/34] xattr: "
` [PATCH 13/34] selftests: add idmapped mounts xattr selftest
` [PATCH 14/34] commoncap: handle idmapped mounts
` [PATCH 15/34] stat: add mapped_generic_fillattr()
` [PATCH 16/34] namei: handle idmapped mounts in may_*() helpers
` [PATCH 17/34] namei: introduce struct renamedata
` [PATCH 18/34] namei: prepare for idmapped mounts
` [PATCH 19/34] namei: add lookup helpers with idmapped mounts aware permission checking
` [PATCH 20/34] open: handle idmapped mounts in do_truncate()
` [PATCH 21/34] open: handle idmapped mounts
` [PATCH 22/34] af_unix: "
` [PATCH 23/34] utimes: "
` [PATCH 24/34] would_dump: "
` [PATCH 25/34] exec: "
` [PATCH 26/34] fs: add helpers for idmap mounts
` [PATCH 27/34] apparmor: handle idmapped mounts
` [PATCH 28/34] audit: "
` [PATCH 29/34] ima: "
` [PATCH 30/34] ext4: support "
` [PATCH 31/34] expfs: handle "
` [PATCH 32/34] overlayfs: handle idmapped lower directories
` [PATCH 33/34] overlayfs: handle idmapped merged mounts
` [PATCH 34/34] fat: handle idmapped mounts

Buggy commit tracked to: "Re: [PATCH 2/9] iov_iter: move rw_copy_check_uvector() into lib/iov_iter.c"
 2020-11-02 18:23 UTC  (14+ messages)

[PATCH v3 0/2] security: add fault injection to LSM hooks
 2020-11-02 14:03 UTC  (4+ messages)
` [PATCH v3 1/2] security: add fault injection capability
` [PATCH v3 2/2] docs: add fail_lsm_hooks info to fault-injection.rst

[PATCH v3 0/3] add ima_arch support for ARM64
 2020-11-02 12:13 UTC  (10+ messages)
` [PATCH v3 1/3] efi: generalize efi_get_secureboot
` [PATCH v3 2/3] ima: replace arch-specific get_sb_mode() with a common helper ima_get_efi_secureboot()
` [PATCH v3 3/3] arm64/ima: add ima_arch support

[PATCH] xfrm: redact SA secret with lockdown confidentiality
 2020-10-31 10:49 UTC  (2+ messages)

general protection fault in security_inode_getattr
 2020-10-30 19:56 UTC  (7+ messages)

[RESEND PATCH v18 0/4] overlayfs override_creds=off & nested get xattr fix
 2020-10-30 16:00 UTC  (4+ messages)
` [RESEND PATCH v18 2/4] overlayfs: handle XATTR_NOSECURITY flag for get xattr method

[PATCH v21 00/23] LSM: Module stacking for AppArmor
 2020-10-29 11:26 UTC  (2+ messages)

[PATCH] tomoyo: fix clang pointer arithmetic warning
 2020-10-28 14:18 UTC  (4+ messages)

[RFC PATCH v2 0/2] security: add fault injection to LSM hooks
 2020-10-28  9:41 UTC  (5+ messages)
` [RFC PATCH v2 2/2] docs: add fail_lsm_hooks info to fault-injection.rst

[RFC PATCH] lsm,selinux: pass the family information along with xfrm flow
 2020-10-28  5:27 UTC  (5+ messages)

[PATCH ghak120 V5] audit: trigger accompanying records when no rules present
 2020-10-28  1:26 UTC  (5+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).