messages from 2023-11-10 03:49:23 to 2023-11-20 19:43:28 UTC [more...]
[RFC PATCH 1/2] Modules: Introduce boot-time module signature flexibility
2023-11-20 19:43 UTC
[PATCH v1 0/2] Extend Landlock test to improve rule's coverage
2023-11-20 19:39 UTC (3+ messages)
` [PATCH v1 1/2] selftests/landlock: Add tests to check undefined rule's access rights
` [PATCH v1 2/2] selftests/landlock: Add tests to check unhandled "
[PATCH v5 00/23] security: Move IMA and EVM to the LSM infrastructure
2023-11-20 18:03 UTC (6+ messages)
` [PATCH v5 11/23] security: Introduce inode_post_removexattr hook
[PATCH v6 00/25] security: Move IMA and EVM to the LSM infrastructure
2023-11-20 17:33 UTC (26+ messages)
` [PATCH v6 01/25] ima: Align ima_inode_post_setattr() definition with "
` [PATCH v6 02/25] ima: Align ima_file_mprotect() "
` [PATCH v6 03/25] ima: Align ima_inode_setxattr() "
` [PATCH v6 04/25] ima: Align ima_inode_removexattr() "
` [PATCH v6 05/25] ima: Align ima_post_read_file() "
` [PATCH v6 06/25] evm: Align evm_inode_post_setattr() "
` [PATCH v6 07/25] evm: Align evm_inode_setxattr() "
` [PATCH v6 08/25] evm: Align evm_inode_post_setxattr() "
` [PATCH v6 09/25] security: Align inode_setattr hook definition with EVM
` [PATCH v6 10/25] security: Introduce inode_post_setattr hook
` [PATCH v6 11/25] security: Introduce inode_post_removexattr hook
` [PATCH v6 12/25] security: Introduce file_post_open hook
` [PATCH v6 13/25] security: Introduce file_release hook
` [PATCH v6 14/25] security: Introduce path_post_mknod hook
` [PATCH v6 15/25] security: Introduce inode_post_create_tmpfile hook
` [PATCH v6 16/25] security: Introduce inode_post_set_acl hook
` [PATCH v6 17/25] security: Introduce inode_post_remove_acl hook
` [PATCH v6 18/25] security: Introduce key_post_create_or_update hook
` [PATCH v6 19/25] ima: Move to LSM infrastructure
` [PATCH v6 20/25] ima: Move IMA-Appraisal "
` [PATCH v6 21/25] evm: Move "
` [PATCH v6 22/25] ima: Remove dependency on 'integrity' LSM
` [PATCH v6 23/25] evm: "
` [PATCH v6 24/25] integrity: Remove LSM
` [PATCH v6 25/25] security: Enforce ordering of 'ima' and 'evm' LSMs
[RFC PATCH v2 0/4] LSM: Officially support appending LSM hooks after boot
2023-11-20 13:30 UTC (5+ messages)
` [PATCH 1/4] LSM: Auto-undef LSM_HOOK macro
` [PATCH 2/4] LSM: Add a header file containing only arguments of LSM callback functions
` [PATCH 3/4] LSM: Break LSM_HOOK() macro into 6 macros
` [PATCH 4/4] LSM: Add a LSM module which handles dynamically appendable LSM hooks
[PATCH v5 22/23] integrity: Move integrity functions to the LSM infrastructure
2023-11-20 13:23 UTC (5+ messages)
[PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
2023-11-20 8:16 UTC (3+ messages)
[PATCH] exitz syscall
2023-11-19 14:54 UTC (11+ messages)
[PATCH -next 1/2] apparmor: Fix one kernel-doc comment
2023-11-19 9:09 UTC (4+ messages)
` [PATCH -next 2/2] apparmor: Fix some kernel-doc comments
[PATCH -next] apparmor: Fix some kernel-doc comments
2023-11-19 9:08 UTC (2+ messages)
[PATCH RFC] Add a lockdown_hibernate parameter
2023-11-18 19:20 UTC (2+ messages)
[RFC V2] IMA Log Snapshotting Design Proposal
2023-11-17 22:41 UTC (12+ messages)
[PATCH v5 0/7] Landlock: IOCTL support
2023-11-17 20:45 UTC (9+ messages)
` [PATCH v5 1/7] landlock: Optimize the number of calls to get_access_mask slightly
` [PATCH v5 2/7] landlock: Add IOCTL access right
` [PATCH v5 3/7] selftests/landlock: Test IOCTL support
` [PATCH v5 4/7] selftests/landlock: Test IOCTL with memfds
` [PATCH v5 5/7] selftests/landlock: Test ioctl(2) and ftruncate(2) with open(O_PATH)
` [PATCH v5 6/7] samples/landlock: Add support for LANDLOCK_ACCESS_FS_IOCTL
` [PATCH v5 7/7] landlock: Document IOCTL support
[PATCH v4 0/7] Landlock: IOCTL support
2023-11-17 20:44 UTC (13+ messages)
` [PATCH v4 1/7] landlock: Optimize the number of calls to get_access_mask slightly
` [PATCH v4 2/7] landlock: Add IOCTL access right
` [PATCH v4 6/7] samples/landlock: Add support for LANDLOCK_ACCESS_FS_IOCTL
[PATCH v4 0/5] DCP as trusted keys backend
2023-11-17 9:19 UTC (3+ messages)
` [PATCH v4 1/5] crypto: mxs-dcp: Add support for hardware-bound keys
[PATCH v5 10/23] security: Introduce inode_post_setattr hook
2023-11-16 18:46 UTC (4+ messages)
[PATCH v5 13/23] security: Introduce file_pre_free_security hook
2023-11-16 18:41 UTC (4+ messages)
[PATCH v3 0/5] Smack transmute fixes
2023-11-16 9:01 UTC (6+ messages)
` [PATCH v3 1/5] smack: Set SMACK64TRANSMUTE only for dirs in smack_inode_setxattr()
` [PATCH v3 2/5] smack: Handle SMACK64TRANSMUTE in smack_inode_setsecurity()
` [PATCH v3 3/5] smack: Always determine inode labels in smack_inode_init_security()
` [PATCH v3 4/5] smack: Initialize the in-memory inode "
` [PATCH v3 5/5] ramfs: Initialize security of in-memory inodes
[PATCH] MAINTAINERS: update the LSM entry
2023-11-16 4:36 UTC (3+ messages)
[PATCH v5 17/23] security: Introduce inode_post_remove_acl hook
2023-11-16 4:33 UTC (2+ messages)
[PATCH v5 15/23] security: Introduce inode_post_create_tmpfile hook
2023-11-16 4:33 UTC (2+ messages)
[PATCH v5 16/23] security: Introduce inode_post_set_acl hook
2023-11-16 4:33 UTC (2+ messages)
[RFC PATCH -mm 0/4] mm, security, bpf: Fine-grained control over memory policy adjustments with lsm bpf
2023-11-16 2:22 UTC (23+ messages)
` [RFC PATCH -mm 1/4] mm, security: Add lsm hook for mbind(2)
` [RFC PATCH -mm 2/4] mm, security: Add lsm hook for set_mempolicy(2)
` [RFC PATCH -mm 3/4] mm, security: Add lsm hook for set_mempolicy_home_node(2)
` [RFC PATCH -mm 4/4] selftests/bpf: Add selftests for mbind(2) with lsm prog
[PATCH v2 0/5] Smack transmute fixes
2023-11-15 22:24 UTC (4+ messages)
` [PATCH v2 5/5] ramfs: Initialize security of in-memory inodes
[PATCH v3 2/6] tpm: Store TPM buffer length
2023-11-15 21:24 UTC (11+ messages)
` [PATCH v3 3/6] tpm: Detach tpm_buf_reset() from tpm_buf_init()
` [PATCH v3 4/6] tpm: Support TPM2 sized buffers (TPM2B)
[PATCH] mailmap: add entries for Serge Hallyn's dead accounts
2023-11-13 22:57 UTC (3+ messages)
[RFC PATCH v2 00/19] Hypervisor-Enforced Kernel Integrity
2023-11-13 8:54 UTC (22+ messages)
` [RFC PATCH v2 01/19] virt: Introduce Hypervisor Enforced Kernel Integrity (Heki)
` [RFC PATCH v2 02/19] KVM: x86: Add new hypercall to lock control registers
` [RFC PATCH v2 03/19] KVM: x86: Add notifications for Heki policy configuration and violation
` [RFC PATCH v2 04/19] heki: Lock guest control registers at the end of guest kernel init
` [RFC PATCH v2 05/19] KVM: VMX: Add MBEC support
` [RFC PATCH v2 06/19] KVM: x86: Add kvm_x86_ops.fault_gva()
` [RFC PATCH v2 07/19] KVM: x86: Make memory attribute helpers more generic
` [RFC PATCH v2 08/19] KVM: x86: Extend kvm_vm_set_mem_attributes() with a mask
` [RFC PATCH v2 09/19] KVM: x86: Extend kvm_range_has_memory_attributes() with match_all
` [RFC PATCH v2 10/19] KVM: x86: Implement per-guest-page permissions
` [RFC PATCH v2 11/19] KVM: x86: Add new hypercall to set EPT permissions
` [RFC PATCH v2 12/19] x86: Implement the Memory Table feature to store arbitrary per-page data
` [RFC PATCH v2 13/19] heki: Implement a kernel page table walker
` [RFC PATCH v2 14/19] heki: x86: Initialize permissions counters for pages mapped into KVA
` [RFC PATCH v2 15/19] heki: x86: Initialize permissions counters for pages in vmap()/vunmap()
` [RFC PATCH v2 16/19] heki: x86: Update permissions counters when guest page permissions change
` [RFC PATCH v2 17/19] heki: x86: Update permissions counters during text patching
` [RFC PATCH v2 18/19] heki: x86: Protect guest kernel memory using the KVM hypervisor
` [RFC PATCH v2 19/19] virt: Add Heki KUnit tests
[PATCH] mailmap: update/replace my old email addresses
2023-11-13 4:10 UTC (3+ messages)
[PATCH] lsm: mark the lsm_id variables are marked as static
2023-11-13 4:09 UTC (4+ messages)
[PATCH] lsm: convert security_setselfattr() to use memdup_user()
2023-11-13 4:09 UTC (2+ messages)
[PATCH] lsm: align based on pointer length in lsm_fill_user_ctx()
2023-11-13 4:08 UTC (3+ messages)
[RFC PATCH 0/3] LSM syscall tweaks
2023-11-13 4:07 UTC (2+ messages)
[PATCH] security: Don't yet account for IMA in LSM_CONFIG_COUNT calculation
2023-11-13 4:06 UTC (6+ messages)
[PATCH] lsm: drop LSM_ID_IMA
2023-11-13 4:05 UTC (2+ messages)
[PATCH v15 00/11] LSM: Three basic syscalls
2023-11-13 4:03 UTC (2+ messages)
[PATCH v4 4/6] add statmount(2) syscall
2023-11-12 20:29 UTC (7+ messages)
[RFC PATCH 0/5] LSM: Officially support appending LSM hooks after boot
2023-11-11 10:12 UTC (6+ messages)
` [PATCH 1/5] LSM: Auto-undef LSM_HOOK macro
` [PATCH 2/5] LSM: Add a header file containing only arguments of LSM callback functions
` [PATCH 3/5] LSM: Split LSM_HOOK() into LSM_INT_HOOK() and LSM_VOID_HOOK()
` [PATCH 4/5] LSM: Add a LSM module which handles dynamically appendable LSM hooks
` [PATCH 5/5] LSM: A sample of dynamically appendable LSM module
[PATCH v8 0/5] Reduce overhead of LSMs with static calls
2023-11-11 0:07 UTC (7+ messages)
` [PATCH v8 1/5] kernel: Add helper macros for loop unrolling
` [PATCH v8 2/5] security: Count the LSMs enabled at compile time
` [PATCH v8 3/5] security: Replace indirect LSM hook calls with static calls
` [PATCH v8 4/5] bpf: Only enable BPF LSM hooks when an LSM program is attached
` [PATCH v8 5/5] security: Add CONFIG_SECURITY_HOOK_LIKELY
[PATCH v7 0/5] Reduce overhead of LSMs with static calls
2023-11-10 22:19 UTC (4+ messages)
` [PATCH v7 4/5] bpf: Only enable BPF LSM hooks when an LSM program is attached
[GIT PULL] lsm/lsm-pr-20231109
2023-11-10 19:29 UTC (2+ messages)
[PATCH] apparmor: switch SECURITY_APPARMOR_HASH from sha1 to sha256
2023-11-10 11:52 UTC (2+ messages)
[PATCH v10 bpf-next 00/17] BPF token and BPF FS-based delegation
2023-11-10 3:48 UTC (9+ messages)
` [PATCH v10 bpf-next 10/17] bpf,lsm: refactor bpf_map_alloc/bpf_map_free LSM hooks
` [PATCH v10 bpf-next 11/17] bpf,lsm: add BPF token "
` [PATCH v10 bpf-next 12/17] libbpf: add bpf_token_create() API
` [PATCH v10 bpf-next 13/17] libbpf: add BPF token support to bpf_map_create() API
` [PATCH v10 bpf-next 14/17] libbpf: add BPF token support to bpf_btf_load() API
` [PATCH v10 bpf-next 15/17] libbpf: add BPF token support to bpf_prog_load() API
` [PATCH v10 bpf-next 16/17] selftests/bpf: add BPF token-enabled tests
` [PATCH v10 bpf-next 17/17] bpf,selinux: allocate bpf_security_struct per BPF token
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).