Linux-Security-Module Archive on lore.kernel.org
 help / Atom feed
[PATCH 00/10] VFS: Provide new mount UAPI
 2019-02-20 12:32 UTC  (12+ messages) - mbox.gz / Atom
` [PATCH 01/10] vfs: syscall: Add open_tree(2) to reference or clone a mount
` [PATCH 02/10] vfs: syscall: Add move_mount(2) to move mounts around
` [PATCH 03/10] teach move_mount(2) to work with OPEN_TREE_CLONE
` [PATCH 04/10] Make anon_inodes unconditional
` [PATCH 05/10] vfs: syscall: Add fsopen() to prepare for superblock creation
` [PATCH 06/10] vfs: Implement logging through fs_context
` [PATCH 07/10] vfs: syscall: Add fsconfig() for configuring and managing a context
` [PATCH 08/10] vfs: syscall: Add fsmount() to create a mount for a superblock
` [PATCH 09/10] vfs: syscall: Add fspick() to select a superblock for reconfiguration
` [PATCH 10/10] vfs: Add a sample program for the new mount API

[PATCH v3 -next] tpm: Fix the type of the return value in calc_tpm2_event_size()
 2019-02-20  8:52 UTC  (2+ messages) - mbox.gz / Atom

[PATCH] MAINTAINERS: add linux-security-module mailing list to TPM drivers
 2019-02-20  7:04 UTC  (2+ messages) - mbox.gz / Atom

[RFC PATCH 00/27] Containers and using authenticated filesystems
 2019-02-20  7:00 UTC  (56+ messages) - mbox.gz / Atom
` [RFC PATCH 01/27] containers: Rename linux/container.h to linux/container_dev.h
` [RFC PATCH 02/27] containers: Implement containers as kernel objects
` [RFC PATCH 03/27] containers: Provide /proc/containers
` [RFC PATCH 04/27] containers: Allow a process to be forked into a container
` [RFC PATCH 05/27] containers: Open a socket inside "
` [RFC PATCH 06/27] containers, vfs: Allow syscall dirfd arguments to take a container fd
` [RFC PATCH 07/27] containers: Make fsopen() able to create a superblock in a container
` [RFC PATCH 08/27] containers, vfs: Honour CONTAINER_NEW_EMPTY_FS_NS
` [RFC PATCH 09/27] vfs: Allow mounting to other namespaces
` [RFC PATCH 10/27] containers: Provide fs_context op for container setting
` [RFC PATCH 11/27] containers: Sample program for driving container objects
` [RFC PATCH 12/27] containers: Allow a daemon to intercept request_key upcalls in a container
` [RFC PATCH 13/27] keys: Provide a keyctl to query a request_key authentication key
` [RFC PATCH 14/27] keys: Break bits out of key_unlink()
` [RFC PATCH 15/27] keys: Make __key_link_begin() handle lockdep nesting
` [RFC PATCH 16/27] keys: Grant Link permission to possessers of request_key auth keys
` [RFC PATCH 17/27] keys: Add a keyctl to move a key between keyrings
` [RFC PATCH 18/27] keys: Find the least-recently used unseen key in a keyring
` [RFC PATCH 19/27] containers: Sample: request_key upcall handling
` [RFC PATCH 20/27] container, keys: Add a container keyring
` [RFC PATCH 21/27] keys: Fix request_key() lack of Link perm check on found key
` [RFC PATCH 22/27] KEYS: Replace uid/gid/perm permissions checking with an ACL
` [RFC PATCH 23/27] KEYS: Provide KEYCTL_GRANT_PERMISSION
` [RFC PATCH 24/27] keys: Allow a container to be specified as a subject in a key's ACL
` [RFC PATCH 25/27] keys: Provide a way to ask for the container keyring
` [RFC PATCH 26/27] keys: Allow containers to be included in key ACLs by name
` [RFC PATCH 27/27] containers: Sample to grant access to a key in a container

[PATCH v2 -next] tpm: Fix the type of the return value in calc_tpm2_event_size()
 2019-02-20  6:31 UTC  (2+ messages) - mbox.gz / Atom

[PATCH 2/2] LSM: SafeSetID: gate setgid transitions
 2019-02-19 23:40 UTC  (6+ messages) - mbox.gz / Atom
      ` [PATCH v2 "

kernel BUG at security/keys/keyring.c:LINE!
 2019-02-19 23:04 UTC  (6+ messages) - mbox.gz / Atom
` [PATCH v2] KEYS: always initialize keyring_index_key::desc_len

[PATCH] tomoyo: Bump version
 2019-02-19 22:18 UTC  (2+ messages) - mbox.gz / Atom

[PATCH v2 00/20] Merge text_poke fixes and executable lockdowns
 2019-02-19 21:28 UTC  (7+ messages) - mbox.gz / Atom
` [PATCH v2 14/20] mm: Make hibernate handle unmapped pages
` [PATCH v2 15/20] vmalloc: New flags for safe vfree on special perms

[GIT PULL] KEYS: fixes for v5.1
 2019-02-19 19:06 UTC  (3+ messages) - mbox.gz / Atom

[PATCH 1/2] LSM: SafeSetID: gate setgid transitions
 2019-02-19 18:20 UTC  (4+ messages) - mbox.gz / Atom

[PATCH v6 0/5] Allow initializing the kernfs node's secctx based on its parent
 2019-02-19 16:43 UTC  (17+ messages) - mbox.gz / Atom
` [PATCH v6 1/5] selinux: try security xattr after genfs for kernfs filesystems
` [PATCH v6 2/5] kernfs: use simple_xattrs for security attributes
` [PATCH v6 3/5] LSM: add new hook for kernfs node initialization
` [PATCH v6 4/5] selinux: implement the kernfs_init_security hook
` [PATCH v6 5/5] kernfs: initialize security of newly created nodes

[PATCH 00/43] VFS: Introduce filesystem context
 2019-02-19 16:34 UTC  (44+ messages) - mbox.gz / Atom
` [PATCH 01/43] fix cgroup_do_mount() handling of failure exits
` [PATCH 02/43] cgroup: saner refcounting for cgroup_root
` [PATCH 03/43] kill kernfs_pin_sb()
` [PATCH 04/43] separate copying and locking mount tree on cross-userns copies
` [PATCH 05/43] saner handling of temporary namespaces
` [PATCH 06/43] vfs: Introduce fs_context, switch vfs_kern_mount() to it
` [PATCH 07/43] new helpers: vfs_create_mount(), fc_mount()
` [PATCH 08/43] teach vfs_get_tree() to handle subtype, switch do_new_mount() to it
` [PATCH 09/43] new helper: do_new_mount_fc()
` [PATCH 10/43] vfs_get_tree(): evict the call of security_sb_kern_mount()
` [PATCH 11/43] convert do_remount_sb() to fs_context
` [PATCH 12/43] fs_context flavour for submounts
` [PATCH 13/43] introduce fs_context methods
` [PATCH 14/43] vfs: Introduce logging functions
` [PATCH 15/43] vfs: Add configuration parser helpers
` [PATCH 16/43] vfs: Add LSM hooks for the new mount API
` [PATCH 17/43] selinux: Implement the new mount API LSM hooks
` [PATCH 18/43] smack: Implement filesystem context security hooks
` [PATCH 19/43] vfs: Put security flags into the fs_context struct
` [PATCH 20/43] vfs: Implement a filesystem superblock creation/configuration context
` [PATCH 21/43] convenience helpers: vfs_get_super() and sget_fc()
` [PATCH 22/43] introduce cloning of fs_context
` [PATCH 23/43] procfs: Move proc_fill_super() to fs/proc/root.c
` [PATCH 24/43] proc: Add fs_context support to procfs
` [PATCH 25/43] ipc: Convert mqueue fs to fs_context
` [PATCH 26/43] cgroup: start switching "
` [PATCH 27/43] cgroup: fold cgroup1_mount() into cgroup1_get_tree()
` [PATCH 28/43] cgroup: take options parsing into ->parse_monolithic()
` [PATCH 29/43] cgroup1: switch to option-by-option parsing
` [PATCH 30/43] cgroup2: "
` [PATCH 31/43] cgroup: stash cgroup_root reference into cgroup_fs_context
` [PATCH 32/43] cgroup_do_mount(): massage calling conventions
` [PATCH 33/43] cgroup1_get_tree(): separate "get cgroup_root to use" into a separate helper
` [PATCH 34/43] cgroup: store a reference to cgroup_ns into cgroup_fs_context
` [PATCH 35/43] kernfs, sysfs, cgroup, intel_rdt: Support fs_context
` [PATCH 36/43] cpuset: Use fs_context
` [PATCH 37/43] hugetlbfs: Convert to fs_context
` [PATCH 38/43] vfs: Remove kern_mount_data()
` [PATCH 39/43] vfs: Provide documentation for new mount API
` [PATCH 40/43] vfs: Implement logging through fs_context
` [PATCH 41/43] vfs: Add some logging to the core users of the fs_context log
` [PATCH 42/43] afs: Add fs_context support
` [PATCH 43/43] afs: Use fs_context to pass parameters over automount

[PATCH v2] security: mark expected switch fall-throughs and add a missing break
 2019-02-19  2:53 UTC  (3+ messages) - mbox.gz / Atom

Kernel memory corruption in CIPSO labeled TCP packets processing
 2019-02-19  1:25 UTC  (33+ messages) - mbox.gz / Atom
                                          ` [PATCH] NETWORKING: avoid use IPCB in cipso_v4_error

[PATCH v3] x86/ima: require signed kernel modules
 2019-02-18  9:43 UTC  (4+ messages) - mbox.gz / Atom

[PATCH v2] LSM: Ignore "security=" when "lsm=" is specified
 2019-02-18  3:57 UTC  (5+ messages) - mbox.gz / Atom

[PATCH] doc: security: Add kern-doc for lsm_hooks.h
 2019-02-17 22:19 UTC  - mbox.gz / Atom

[PATCH 00/10] LSM documentation update
 2019-02-17 22:15 UTC  (9+ messages) - mbox.gz / Atom
` [PATCH 06/10] security: fix documentation for the path_chmod hook

[PATCH v3 1/2] ima: fix build error redeclaration of enumerator
 2019-02-15 22:32 UTC  (4+ messages) - mbox.gz / Atom

[PATCH 0/4] keys: Miscellaneous fixes
 2019-02-15 16:54 UTC  (7+ messages) - mbox.gz / Atom
` [PATCH 1/4] KEYS: allow reaching the keys quotas exactly
` [PATCH 2/4] assoc_array: Fix shortcut creation
` [PATCH 3/4] keys: Fix dependency loop between construction record and auth key
` [PATCH 4/4] keys: Timestamp new keys

[GIT PULL] linux-integrity patches for Linux 5.1
 2019-02-14 19:00 UTC  (2+ messages) - mbox.gz / Atom

[PATCH v2] x86/ima: require signed kernel modules
 2019-02-14 18:47 UTC  (3+ messages) - mbox.gz / Atom

[RFC PATCH 0/9] keys: Namespacing
 2019-02-14 16:58 UTC  (10+ messages) - mbox.gz / Atom
` [RFC PATCH 1/9] keys: Invalidate used request_key authentication keys
` [RFC PATCH 2/9] keys: Kill off request_key_async{,_with_auxdata}
` [RFC PATCH 3/9] keys: Simplify key description management
` [RFC PATCH 4/9] keys: Cache the hash value to avoid lots of recalculation
` [RFC PATCH 5/9] keys: Include target namespace in match criteria
` [RFC PATCH 6/9] keys: Garbage collect keys for which the domain has been removed
` [RFC PATCH 7/9] keys: Network namespace domain tag
` [RFC PATCH 8/9] keys: Pass the network namespace into request_key mechanism
` [RFC PATCH 9/9] KEYS: Namespace keyring names

[PATCH 1/4] KEYS: allow reaching the keys quotas exactly
 2019-02-14 16:19 UTC  - mbox.gz / Atom

[PATCH] KEYS: trusted: fix -Wvarags warning
 2019-02-14 10:52 UTC  (7+ messages) - mbox.gz / Atom
` [PATCH v2] "

page: 

Linux-Security-Module Archive on lore.kernel.org

Archives are clonable:
	git clone --mirror https://lore.kernel.org/linux-security-module/0 linux-security-module/git/0.git

	# If you have public-inbox 1.1+ installed, you may
	# initialize and index your mirror using the following commands:
	public-inbox-init -V2 linux-security-module linux-security-module/ https://lore.kernel.org/linux-security-module \
		linux-security-module@vger.kernel.org linux-security-module@archiver.kernel.org
	public-inbox-index linux-security-module


Newsgroup available over NNTP:
	nntp://nntp.lore.kernel.org/org.kernel.vger.linux-security-module


AGPL code for this site: git clone https://public-inbox.org/ public-inbox