Linux-Security-Module Archive on lore.kernel.org
 help / color / Atom feed
[PATCH 0/7 v2] tracing: Fix tracefs lockdown and various clean ups
 2019-10-13  0:39 UTC  (12+ messages) - mbox.gz / Atom
` [PATCH 1/7 v2] tracefs: Revert ccbd54ff54e8 ("tracefs: Restrict tracefs when the kernel is locked down")
` [PATCH 2/7 v2] ftrace: Get a reference counter for the trace_array on filter files
` [PATCH 3/7 v2] tracing: Get trace_array reference for available_tracers files
` [PATCH 4/7 v2] tracing: Have trace events system open call tracing_open_generic_tr()
` [PATCH 5/7 v2] tracing: Add tracing_check_open_get_tr()
` [PATCH 6/7 v2] tracing: Add some more locked_down checks
` [PATCH 7/7 v2] tracing: Do not create tracefs files if tracefs lockdown is in effect

[Patch v7 0/4] Create and consolidate trusted keys subsystem
 2019-10-11 22:34 UTC  (12+ messages) - mbox.gz / Atom
` [Patch v7 1/4] tpm: Move tpm_buf code to include/linux/
` [Patch v7 2/4] KEYS: Use common tpm_buf for trusted and asymmetric keys
` [Patch v7 3/4] KEYS: trusted: Create trusted keys subsystem
` [Patch v7 4/4] KEYS: trusted: Move TPM2 trusted keys code

[PATCH] tracefs: Do not allocate and free proxy_ops for lockdown
 2019-10-11 22:27 UTC  (13+ messages) - mbox.gz / Atom

[PATCH] perf_event: Add support for LSM and SELinux checks
 2019-10-11 16:35 UTC  (2+ messages) - mbox.gz / Atom

[PATCH RFC] perf_event: Add support for LSM and SELinux checks
 2019-10-11 15:47 UTC  (18+ messages) - mbox.gz / Atom

[PATCH -next] security: smack: add watch_queue.h header to fix build errors
 2019-10-11  7:54 UTC  (2+ messages) - mbox.gz / Atom

shmem: fix LSM options parsing (fwd)
 2019-10-10 23:00 UTC  - mbox.gz / Atom

[PATCH v2] efi/efi_test: lock down /dev/efi_test and require CAP_SYS_ADMIN
 2019-10-09 13:02 UTC  (4+ messages) - mbox.gz / Atom

[GIT PULL] SELinux fixes for v5.4 (#1)
 2019-10-08 18:00 UTC  (2+ messages) - mbox.gz / Atom

[PATCH net] sctp: add chunks to sk_backlog when the newsk sk_socket is not set
 2019-10-08 12:03 UTC  - mbox.gz / Atom

[PATCH] ovl: filter of trusted xattr results in audit
 2019-10-07 16:48 UTC  (7+ messages) - mbox.gz / Atom

[PATCH v5 00/12] S.A.R.A. a new stacked LSM
 2019-10-07 12:40 UTC  (6+ messages) - mbox.gz / Atom
` [PATCH v5 04/12] S.A.R.A.: generic DFA for string matching

[PATCH bpf-next] bpf, capabilities: introduce CAP_BPF
 2019-10-04 19:56 UTC  (21+ messages) - mbox.gz / Atom
                                ` trace_printk issue. Was: "

[Patch v6 0/4] Create and consolidate trusted keys subsystem
 2019-10-04 18:49 UTC  (11+ messages) - mbox.gz / Atom
` [Patch v6 1/4] tpm: Move tpm_buf code to include/linux/
` [Patch v6 2/4] KEYS: Use common tpm_buf for trusted and asymmetric keys
` [Patch v6 3/4] KEYS: trusted: Create trusted keys subsystem
` [Patch v6 4/4] KEYS: trusted: Move TPM2 trusted keys code

[PATCH 5.3 308/344] ovl: filter of trusted xattr results in audit
 2019-10-03 15:54 UTC  - mbox.gz / Atom

[PATCH 5.2 281/313] ovl: filter of trusted xattr results in audit
 2019-10-03 15:54 UTC  - mbox.gz / Atom

[PATCH 4.19 189/211] ovl: filter of trusted xattr results in audit
 2019-10-03 15:54 UTC  - mbox.gz / Atom

[PATCH 4.14 166/185] ovl: filter of trusted xattr results in audit
 2019-10-03 15:54 UTC  - mbox.gz / Atom

[PATCH 4.4 96/99] ovl: filter of trusted xattr results in audit
 2019-10-03 15:53 UTC  - mbox.gz / Atom

[PATCH 4.9 115/129] ovl: filter of trusted xattr results in audit
 2019-10-03 15:53 UTC  - mbox.gz / Atom

KASAN: use-after-free Read in tomoyo_realpath_from_path
 2019-10-03  9:59 UTC  (15+ messages) - mbox.gz / Atom
  ` [PATCH] tomoyo: Don't check open/getattr permission on sockets
        ` [PATCH v2] "

[PATCH 1/2] apparmor: Use a memory pool instead per-CPU caches
 2019-10-02 15:52 UTC  (13+ messages) - mbox.gz / Atom
        ` [PATCH v2] "
          ` [PATCH v3] "
              ` [PATCH v4] "

[PATCH AUTOSEL 4.4 01/15] ima: always return negative code for error
 2019-10-01 16:45 UTC  - mbox.gz / Atom

[PATCH AUTOSEL 4.9 01/19] ima: always return negative code for error
 2019-10-01 16:44 UTC  - mbox.gz / Atom

[PATCH AUTOSEL 4.14 01/29] ima: always return negative code for error
 2019-10-01 16:43 UTC  - mbox.gz / Atom

[PATCH AUTOSEL 4.19 01/43] ima: always return negative code for error
 2019-10-01 16:42 UTC  (2+ messages) - mbox.gz / Atom
` [PATCH AUTOSEL 4.19 02/43] ima: fix freeing ongoing ahash_request

[PATCH AUTOSEL 5.2 02/63] ima: always return negative code for error
 2019-10-01 16:40 UTC  (2+ messages) - mbox.gz / Atom
` [PATCH AUTOSEL 5.2 03/63] ima: fix freeing ongoing ahash_request

[PATCH AUTOSEL 5.3 02/71] ima: always return negative code for error
 2019-10-01 16:38 UTC  (2+ messages) - mbox.gz / Atom
` [PATCH AUTOSEL 5.3 03/71] ima: fix freeing ongoing ahash_request

[GIT PULL][SECURITY] Kernel lockdown patches for v5.4
 2019-09-30  0:03 UTC  (7+ messages) - mbox.gz / Atom

[PATCH AUTOSEL 4.4 5/9] security: smack: Fix possible null-pointer dereferences in smack_socket_sock_rcv_skb()
 2019-09-29 17:36 UTC  - mbox.gz / Atom

[PATCH AUTOSEL 4.9 08/13] security: smack: Fix possible null-pointer dereferences in smack_socket_sock_rcv_skb()
 2019-09-29 17:36 UTC  - mbox.gz / Atom

[PATCH AUTOSEL 4.14 16/23] security: smack: Fix possible null-pointer dereferences in smack_socket_sock_rcv_skb()
 2019-09-29 17:35 UTC  - mbox.gz / Atom

[PATCH AUTOSEL 4.19 21/33] security: smack: Fix possible null-pointer dereferences in smack_socket_sock_rcv_skb()
 2019-09-29 17:34 UTC  - mbox.gz / Atom

[PATCH AUTOSEL 5.2 28/42] security: smack: Fix possible null-pointer dereferences in smack_socket_sock_rcv_skb()
 2019-09-29 17:32 UTC  - mbox.gz / Atom

[PATCH AUTOSEL 5.3 31/49] security: smack: Fix possible null-pointer dereferences in smack_socket_sock_rcv_skb()
 2019-09-29 17:30 UTC  - mbox.gz / Atom

[GIT PULL] integrity subsystem updates for v5.4
 2019-09-28  3:00 UTC  (5+ messages) - mbox.gz / Atom

[PATCH] genetlink: prevent memory leak in netlbl_unlabel_defconf
 2019-09-27 16:14 UTC  (5+ messages) - mbox.gz / Atom
  `  "

[GIT PULL] SafeSetID LSM changes for 5.4
 2019-09-26 18:21 UTC  (10+ messages) - mbox.gz / Atom

[PATCH v6 00/12] add integrity and security to TPM2 transactions
 2019-09-25 12:34 UTC  (14+ messages) - mbox.gz / Atom
` [PATCH v6 01/12] tpm-buf: move from static inlines to real functions
` [PATCH v6 02/12] tpm-buf: add handling for TPM2B types
` [PATCH v6 05/12] tpm2-sessions: Add full HMAC and encrypt/decrypt session handling

Do you plan to rebase next-general any time soon?
 2019-09-24 18:35 UTC  (3+ messages) - mbox.gz / Atom

[GIT PULL] Smack patches for v5.4
 2019-09-24  1:25 UTC  (3+ messages) - mbox.gz / Atom

[PATCH] smack: include linux/watch_queue.h
 2019-09-24  1:24 UTC  (3+ messages) - mbox.gz / Atom

[PATCH] smack: fix an compile error in smack_post_notification
 2019-09-23 21:49 UTC  (3+ messages) - mbox.gz / Atom

[GIT PULL] Smack patches for v5.4 - retry
 2019-09-23 21:38 UTC  (3+ messages) - mbox.gz / Atom

[GIT PULL] SELinux patches for v5.4
 2019-09-23 19:05 UTC  (2+ messages) - mbox.gz / Atom

[PATCH v8 00/28] LSM: Module stacking for AppArmor
 2019-09-23 15:56 UTC  (13+ messages) - mbox.gz / Atom
` [PATCH v8 01/28] LSM: Infrastructure management of the superblock
` [PATCH v8 02/28] LSM: Infrastructure management of the sock security
` [PATCH v8 03/28] LSM: Infrastructure management of the key blob
` [PATCH v8 04/28] LSM: Create and manage the lsmblob data structure
` [PATCH v8 22/28] SELinux: Verify LSM display sanity in binder

Can KEY_DH_OPERATIONS become tristate? (was: Re: Kernel 5.3.0 stuck during boot on Amiga)
 2019-09-19 19:17 UTC  (5+ messages) - mbox.gz / Atom

KASAN: use-after-free Read in key_put
 2019-09-18  8:05 UTC  - mbox.gz / Atom

[RFC v1 00/14] Kernel Runtime Security Instrumentation
 2019-09-17 19:36 UTC  (6+ messages) - mbox.gz / Atom
` [RFC v1 12/14] krsi: Add an eBPF helper function to get the value of an env variable

[PATCH 1/3] ima: keep the integrity state of open files up to date
 2019-09-17  7:24 UTC  (7+ messages) - mbox.gz / Atom

[PATCH] LSM: SafeSetID: Stop releasing uninitialized ruleset
 2019-09-16 15:29 UTC  - mbox.gz / Atom

page: 

Linux-Security-Module Archive on lore.kernel.org

Archives are clonable:
	git clone --mirror https://lore.kernel.org/linux-security-module/0 linux-security-module/git/0.git

	# If you have public-inbox 1.1+ installed, you may
	# initialize and index your mirror using the following commands:
	public-inbox-init -V2 linux-security-module linux-security-module/ https://lore.kernel.org/linux-security-module \
		linux-security-module@vger.kernel.org linux-security-module@archiver.kernel.org
	public-inbox-index linux-security-module

Example config snippet for mirrors

Newsgroup available over NNTP:
	nntp://nntp.lore.kernel.org/org.kernel.vger.linux-security-module


AGPL code for this site: git clone https://public-inbox.org/ public-inbox