messages from 2023-04-10 22:31:32 to 2023-04-21 17:43:50 UTC [more...]
[PATCH v9 00/11] LSM: Three basic syscalls
2023-04-21 17:42 UTC (3+ messages)
` [PATCH v9 01/11] LSM: Identify modules by more than name
` [PATCH v9 02/11] LSM: Maintain a table of LSM attribute data
[PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
2023-04-21 14:55 UTC (16+ messages)
[PATCH v10 00/13] Network support for Landlock
2023-04-21 10:07 UTC (30+ messages)
` [PATCH v10 02/13] landlock: Allow filesystem layout changes for domains without such rule type
` [PATCH v10 03/13] landlock: Remove unnecessary inlining
` [PATCH v10 05/13] landlock: Refactor merge/inherit_ruleset functions
` [PATCH v10 07/13] landlock: Refactor layer helpers
` [PATCH v10 09/13] landlock: Add network rules and TCP hooks support
` [PATCH v10 10/13] selftests/landlock: Share enforce_ruleset()
` [PATCH v10 11/13] selftests/landlock: Add 10 new test suites dedicated to network
` [PATCH v10 12/13] samples/landlock: Add network demo
` [PATCH v10 13/13] landlock: Document Landlock's network support
[PATCH bpf-next 0/8] New BPF map and BTF security LSM hooks
2023-04-21 0:00 UTC (51+ messages)
` [PATCH bpf-next 1/8] bpf: move unprivileged checks into map_create() and bpf_prog_load()
` [PATCH bpf-next 2/8] bpf: inline map creation logic in map_create() function
` [PATCH bpf-next 3/8] bpf: centralize permissions checks for all BPF map types
` [PATCH bpf-next 4/8] bpf, lsm: implement bpf_map_create_security LSM hook
` [PATCH bpf-next 5/8] selftests/bpf: validate new "
` [PATCH bpf-next 6/8] bpf: drop unnecessary bpf_capable() check in BPF_MAP_FREEZE command
` [PATCH bpf-next 7/8] bpf, lsm: implement bpf_btf_load_security LSM hook
` [PATCH bpf-next 8/8] selftests/bpf: enhance lsm_map_create test with BTF LSM control
[GIT PULL] LSM patches for v6.4
2023-04-20 23:53 UTC
[GIT PULL] SELinux patches for v6.4
2023-04-20 23:52 UTC
[PATCH V4 1/2] debugfs: provide a way for relay user bypass lockdown
2023-04-20 21:53 UTC (2+ messages)
` [PATCH V4 2/2] blktrace: allow access trace file in lockdown mode
[PATCH -next v2 0/6] landlock: add chmod and chown support
2023-04-20 17:40 UTC (3+ messages)
[PATCH LSM v2 0/2] security: SELinux/LSM label with MPTCP and accept
2023-04-20 17:17 UTC (3+ messages)
` [PATCH LSM v2 1/2] security, lsm: Introduce security_mptcp_add_subflow()
` [PATCH LSM v2 2/2] selinux: Implement mptcp_add_subflow hook
[PATCH LSM 0/2] security: SELinux/LSM label with MPTCP and accept
2023-04-20 16:55 UTC (7+ messages)
` [PATCH LSM 1/2] security, lsm: Introduce security_mptcp_add_subflow()
` [PATCH LSM 2/2] selinux: Implement mptcp_add_subflow hook
[PATCH V3] debugfs: allow access blktrace trace files in lockdown mode
2023-04-20 15:04 UTC (3+ messages)
[PATCH v10 0/4] evm: Do HMAC of multiple per LSM xattrs for new inodes
2023-04-20 14:10 UTC (27+ messages)
` [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
` [PATCH] Smack modifications for: "
` [PATCH v10 3/4] evm: Align evm_inode_init_security() definition with LSM infrastructure
` [PATCH v10 4/4] evm: Support multiple LSMs providing an xattr
Transmute flag is not inheritted on overlay fs
2023-04-19 23:24 UTC (4+ messages)
` [RFC PATCH] Set SMK_INODE_CHANGED inside smack_dentry_create_files_as
[PATCH v8 00/11] LSM: Three basic syscalls
2023-04-19 22:19 UTC (19+ messages)
` [PATCH v8 01/11] LSM: Identify modules by more than name
` [PATCH v8 02/11] LSM: Maintain a table of LSM attribute data
` [PATCH v8 03/11] proc: Use lsmids instead of lsm names for attrs
` [PATCH v8 04/11] LSM: syscalls for current process attributes
` [PATCH v8 05/11] LSM: Create lsm_list_modules system call
` [PATCH v8 06/11] LSM: wireup Linux Security Module syscalls
` [PATCH v8 07/11] LSM: Helpers for attribute names and filling an lsm_ctx
` [PATCH v8 08/11] Smack: implement setselfattr and getselfattr hooks
` [PATCH v8 09/11] AppArmor: Add selfattr hooks
` [PATCH v8 10/11] SELinux: "
` [PATCH v8 11/11] LSM: selftests for Linux Security Module syscalls
[PATCH] mm/mmap: Map MAP_STACK to VM_STACK
2023-04-19 14:38 UTC (2+ messages)
[PATCH v4 3/6] mm/gup: remove vmas parameter from get_user_pages_remote()
2023-04-19 12:05 UTC (2+ messages)
W sprawie samochodu
2023-04-19 8:50 UTC
[PATCH] IMA: use vfs_getattr_nosec to get the i_version
2023-04-18 9:08 UTC (2+ messages)
[PATCH V2] debugfs: allow access relay files in lockdown mode
2023-04-17 23:48 UTC (4+ messages)
[RFC PATCH v9 00/16] Integrity Policy Enforcement LSM (IPE)
2023-04-17 21:31 UTC (25+ messages)
` [RFC PATCH v9 02/16] ipe: add policy parser
` [RFC PATCH v9 03/16] ipe: add evaluation loop and introduce 'boot_verified' as a trust provider
` [RFC PATCH v9 05/16] ipe: add userspace interface
` [RFC PATCH v9 07/16] uapi|audit|ipe: add ipe auditing support
[PATCH 3/7] mm/gup: remove vmas parameter from get_user_pages_remote()
2023-04-17 15:14 UTC (8+ messages)
[PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
2023-04-17 14:07 UTC (13+ messages)
[PATCH v3 3/7] mm/gup: remove vmas parameter from get_user_pages_remote()
2023-04-17 11:01 UTC (3+ messages)
[PATCH 4.19 v3 0/6] Backport handling -ESTALE policy update failure to 4.19
2023-04-17 11:39 UTC (3+ messages)
` [PATCH 4.19 v3 6/6] ima: Handle -ESTALE returned by ima_filter_rule_match()
[ANNOUNCE] [CFP] Linux Security Summit Europe (LSS-EU)
2023-04-17 8:35 UTC
[PATCH v2 3/7] mm/gup: remove vmas parameter from get_user_pages_remote()
2023-04-15 9:52 UTC (2+ messages)
[PATCH] selftests/memfd: fix test_sysctl
2023-04-14 6:23 UTC (2+ messages)
[PATCH v7 00/11] LSM: Three basic syscalls
2023-04-13 11:55 UTC (9+ messages)
` [PATCH v7 04/11] LSM: syscalls for current process attributes
` [PATCH v7 05/11] LSM: Create lsm_list_modules system call
[PATCH] debugfs: allow access relay files in lockdown mode
2023-04-12 10:22 UTC (3+ messages)
Słowa kluczowe do wypozycjonowania
2023-04-12 7:40 UTC
Semantics of blktrace with lockdown (integrity) enabled kernel
2023-04-10 22:31 UTC (11+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).