linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2019-02-22 00:07:34 to 2019-02-28 22:44:31 UTC [more...]

[PATCH 00/97] LSM: Complete module stacking
 2019-02-28 22:43 UTC  (18+ messages)
` [PATCH 71/97] LSM: Add secmark refcounting to call_one list
` [PATCH 72/97] LSM: Add secmark refcounting to call_one list - part 2
` [PATCH 73/97] LSM: refactor security_setprocattr
` [PATCH 74/97] Smack: Detect if secmarks can be safely used
` [PATCH 75/97] LSM: Support multiple LSMs using inode_init_security
` [PATCH 76/97] LSM: Use full security context in security_inode_setsecctx
` [PATCH 77/97] LSM: Correct handling of ENOSYS in inode_setxattr
` [PATCH 78/97] LSM: Infrastructure security blobs for mount options
` [PATCH 79/97] LSM: Fix for security_init_inode_security
` [PATCH 80/97] Smack: Advertise the secid to netlabel
` [PATCH 81/97] LSM: Change error detection for UDP peer security
` [PATCH 82/97] Smack: Fix setting of the CIPSO MLS_CAT flags
` [PATCH 83/97] Smack: Set netlabel flags properly on new label import
` [PATCH 85/97] Smack: Let netlabel do the work on the ambient domain
` [PATCH 86/97] Smack: Don't set the socket label on each send
` [PATCH 87/97] Smack: Let netlabel do the work on connections
` [PATCH 88/97] Netlabel: Return the labeling type on socket

[PULL REQUEST] Lock down patches
 2019-02-28 22:20 UTC  (2+ messages)

[PATCH 00/97] LSM: Complete module stacking
 2019-02-28 22:19 UTC  (71+ messages)
` [PATCH 01/97] LSM: Infrastructure management of the superblock
` [PATCH 02/97] LSM: Infrastructure management of the sock security
` [PATCH 03/97] LSM: Infrastructure management of the key security blob
` [PATCH 04/97] SCAFFOLD: Move sock_graft out of sock.h
` [PATCH 05/97] LSM: Create an lsm_export data structure
` [PATCH 06/97] LSM: Use lsm_export in the inode_getsecid hooks
` [PATCH 07/97] SCAFFOLD: Move security.h out of route.h
` [PATCH 08/97] LSM: Use lsm_export in the cred_getsecid hooks
` [PATCH 09/97] LSM: Use lsm_export in the ipc_getsecid and task_getsecid hooks
` [PATCH 10/97] LSM: Use lsm_export in the sk_getsecid hooks
` [PATCH 11/97] LSM: Use lsm_export in the kernel_ask_as hooks
` [PATCH 12/97] LSM: Use lsm_export in the getpeersec_dgram hooks
` [PATCH 13/97] LSM: Use lsm_export in the audit_rule_match hooks
` [PATCH 14/97] LSM: Fix logical operation in lsm_export checks
` [PATCH 15/97] LSM: Use lsm_export in the secid_to_secctx hooks
` [PATCH 16/97] LSM: Use lsm_export in the secctx_to_secid hooks
` [PATCH 17/97] LSM: Use lsm_export in security_audit_rule_match
` [PATCH 18/97] LSM: Use lsm_export in security_kernel_act_as
` [PATCH 19/97] LSM: Use lsm_export in security_socket_getpeersec_dgram
` [PATCH 20/97] LSM: Use lsm_export in security_secctx_to_secid
` [PATCH 21/97] LSM: Use lsm_export in security_secid_to_secctx
` [PATCH 22/97] LSM: Use lsm_export in security_ipc_getsecid
` [PATCH 23/97] LSM: Use lsm_export in security_task_getsecid
` [PATCH 24/97] LSM: FIXUP - security_secctx_to_secid
` [PATCH 25/97] LSM: FIXUP - security_secid_to_secctx
` [PATCH 26/97] LSM: Use lsm_export in security_inode_getsecid
` [PATCH 27/97] LSM: Use lsm_export in security_cred_getsecid
` [PATCH 28/97] LSM: REVERT Use lsm_export in the sk_getsecid hooks
` [PATCH 29/97] Audit: Change audit_sig_sid to audit_sig_lsm
` [PATCH 30/97] Audit: Convert target_sid to an lsm_export structure
` [PATCH 31/97] Audit: Convert osid "
` [PATCH 32/97] IMA: Clean out lsm_export scaffolding
` [PATCH 33/97] NET: Store LSM access information in the socket blob for UDS
` [PATCH 34/97] NET: Remove scaffolding on secmarks
` [PATCH 35/97] NET: Remove scaffolding on new secmarks
` [PATCH 36/97] NET: Remove netfilter scaffolding for lsm_export
` [PATCH 37/97] Netlabel: Replace secids with lsm_export
` [PATCH 38/97] LSM: Remove lsm_export scaffolding functions
` [PATCH 39/97] IMA: FIXUP prototype using lsm_export
` [PATCH 40/97] Smack: Restore the release_secctx hook
` [PATCH 41/97] AppArmor: Remove unnecessary hook stub
` [PATCH 42/97] LSM: Limit calls to certain module hooks
` [PATCH 43/97] LSM: Create a data structure for a security context
` [PATCH 44/97] LSM: Use lsm_context in secid_to_secctx hooks
` [PATCH 45/97] LSM: Use lsm_context in secctx_to_secid hooks
` [PATCH 46/97] LSM: Use lsm_context in inode_getsecctx hooks
` [PATCH 47/97] LSM: Use lsm_context in inode_notifysecctx hooks
` [PATCH 48/97] LSM: Use lsm_context in dentry_init_security hooks
` [PATCH 49/97] LSM: Use lsm_context in security_dentry_init_security
` [PATCH 50/97] LSM: Use lsm_context in security_inode_notifysecctx
` [PATCH 51/97] LSM: Use lsm_context in security_inode_getsecctx
` [PATCH 52/97] LSM: Use lsm_context in security_secctx_to_secid
` [PATCH 53/97] LSM: Use lsm_context in release_secctx hooks
` [PATCH 54/97] LSM: Use lsm_context in security_release_secctx
` [PATCH 55/97] LSM: Use lsm_context in security_secid_to_secctx
` [PATCH 56/97] fs: remove lsm_context scaffolding
` [PATCH 57/97] LSM: Add the release function to the lsm_context
` [PATCH 58/97] LSM: Use lsm_context in inode_setsecctx hooks
` [PATCH 59/97] LSM: Use lsm_context in security_inode_setsecctx
` [PATCH 60/97] kernfs: remove lsm_context scaffolding
` [PATCH 61/97] LSM: Remove unused macro
` [PATCH 62/97] LSM: Special handling for secctx lsm hooks
` [PATCH 63/97] SELinux: Use blob offset in current_sid
` [PATCH 64/97] LSM: Specify which LSM to display with /proc/self/attr/display
` [PATCH 65/97] AppArmor: Remove the exclusive flag
` [PATCH 66/97] LSM: Add secmark_relabel_packet to the set of one call hooks
` [PATCH 67/97] LSM: Make getting the secmark right cleaner with lsm_export_one_secid
` [PATCH 68/97] netfilter: Fix memory leak introduced with lsm_context
` [PATCH 69/97] Smack: Consolidate secmark conversions
` [PATCH 70/97] netfilter: Remove unnecessary NULL check in lsm_context

[PATCH 2/2] LSM: SafeSetID: gate setgid transitions
 2019-02-28 20:20 UTC  (12+ messages)
` [PATCH v2 "
    ` [PATCH v3 "
      ` [PATCH v2 1/2] "
          ` [PATCH v3 "
              ` [PATCH v4 2/2] "

[PATCH 0/3] selftest/ima: add kexec_file_load test
 2019-02-28 15:05 UTC  (4+ messages)
` [PATCH 2/3] scripts/ima: define a set of common functions

kernel panic: MAC Initialization failed. (3)
 2019-02-28 14:12 UTC 

[PATCH] tomoyo: Add a kernel config option for fuzzing testing
 2019-02-28 14:06 UTC 

[PATCH V4 0/4] Add support for TCG2 event logs on EFI systems
 2019-02-28 12:38 UTC  (9+ messages)
` [PATCH V4 1/4] tpm: Abstract crypto agile event size calculations
` [PATCH V4 2/4] tpm: Reserve the TPM final events table
` [PATCH V4 3/4] tpm: Append the final event log to the TPM event log
` [PATCH V4 4/4] efi: Attempt to get the TCG2 event log in the boot stub

kernel panic: MAC Initialization failed
 2019-02-28 12:30 UTC  (7+ messages)

kernel panic: MAC Initialization failed. (2)
 2019-02-28 10:18 UTC  (3+ messages)

[PATCH] netlabel: fix out-of-bounds memory accesses
 2019-02-28  5:46 UTC  (2+ messages)

Add support for TCG2 log format on UEFI systems
 2019-02-27 20:26 UTC  (5+ messages)
` [PATCH V5 1/4] tpm: Abstract crypto agile event size calculations
` [PATCH V5 2/4] tpm: Reserve the TPM final events table
` [PATCH V5 3/4] tpm: Append the final event log to the TPM event log
` [PATCH V5 4/4] efi: Attempt to get the TCG2 event log in the boot stub

[PATCH] tomoyo: Change pathname calculation for read-only filesystems
 2019-02-27 20:25 UTC  (2+ messages)

[PATCH v2 00/11] LSM documentation update
 2019-02-27 16:27 UTC  (16+ messages)
` [PATCH v2 01/11] LSM: fix documentation for sb_copy_data hook
` [PATCH v2 02/11] LSM: fix documentation for the syslog hook
` [PATCH v2 03/11] LSM: fix documentation for the socket_post_create hook
` [PATCH v2 04/11] LSM: fix documentation for the task_setscheduler hook
` [PATCH v2 05/11] LSM: fix documentation for the socket_getpeersec_dgram hook
` [PATCH v2 06/11] LSM: fix documentation for the path_chmod hook
` [PATCH v2 07/11] LSM: fix documentation for the audit_* hooks
` [PATCH v2 08/11] LSM: fix documentation for the msg_queue_* hooks
` [PATCH v2 09/11] LSM: fix documentation for the sem_* hooks
` [PATCH v2 10/11] LSM: fix documentation for the shm_* hooks
` [PATCH v2 11/11] LSM: lsm_hooks.h: fix documentation format

[PATCH] RFC: user-mode extensible trusted key support
 2019-02-27 13:07 UTC  (2+ messages)

[PATCH 00/10] VFS: Provide new mount UAPI
 2019-02-26 17:45 UTC  (3+ messages)
` [PATCH 03/10] teach move_mount(2) to work with OPEN_TREE_CLONE

[PATCH 04/43] separate copying and locking mount tree on cross-userns copies
 2019-02-26 17:45 UTC  (5+ messages)
` [PATCH 00/43] VFS: Introduce filesystem context

[PATCH] security: keys: add NULL checking for key->type->instantiate
 2019-02-26  9:11 UTC  (4+ messages)

[PATCH] NETWORKING: avoid use IPCB in cipso_v4_error
 2019-02-25 23:30 UTC  (17+ messages)
        ` [PATCH v2 0/2] "
            ` [PATCH v2 1/2] "
            ` [PATCH v2 2/2] "

[PATCH v2] LSM: Ignore "security=" when "lsm=" is specified
 2019-02-25 23:23 UTC  (6+ messages)

[PATCH] LSM: Update function documentation for cap_capable
 2019-02-25 23:17 UTC  (2+ messages)

[PATCH AUTOSEL 4.20 60/72] apparmor: Fix warning about unused function apparmor_ipv6_postroute
 2019-02-23 21:04 UTC  (2+ messages)
` [PATCH AUTOSEL 4.20 62/72] apparmor: Fix aa_label_build() error handling for failed merges

[PATCH AUTOSEL 4.19 56/65] apparmor: Fix aa_label_build() error handling for failed merges
 2019-02-23 21:06 UTC 

[PATCH AUTOSEL 4.14 37/45] apparmor: Fix aa_label_build() error handling for failed merges
 2019-02-23 21:08 UTC 

[GIT PULL] More key subsystem fixes for 5.0
 2019-02-23  2:15 UTC  (2+ messages)

[PATCH v2] security: mark expected switch fall-throughs and add a missing break
 2019-02-22 22:42 UTC  (7+ messages)

[PATCH v3 00/20] Merge text_poke fixes and executable lockdowns
 2019-02-22 18:32 UTC  (9+ messages)
` [PATCH v3 03/20] x86/mm: Save DRs when loading a temporary mm
` [PATCH v3 18/20] x86/ftrace: Use vmalloc special flag

[PATCH] doc: security: Add kern-doc for lsm_hooks.h
 2019-02-22 15:55 UTC  (2+ messages)

[PATCH v7 0/7] Allow initializing the kernfs node's secctx based on its parent
 2019-02-22 15:40 UTC  (9+ messages)
` [PATCH v7 1/7] kernfs: clean up struct kernfs_iattrs
` [PATCH v7 2/7] kernfs: do not alloc iattrs in kernfs_xattr_get
` [PATCH v7 3/7] selinux: try security xattr after genfs for kernfs filesystems
` [PATCH v7 4/7] kernfs: use simple_xattrs for security attributes
` [PATCH v7 5/7] LSM: add new hook for kernfs node initialization
` [PATCH v7 6/7] selinux: implement the kernfs_init_security hook
` [PATCH v7 7/7] kernfs: initialize security of newly created nodes

[PATCH] KEYS: always initialize keyring_index_key::desc_len
 2019-02-22 15:36 UTC 

[PATCH v6 0/5] Allow initializing the kernfs node's secctx based on its parent
 2019-02-22 12:52 UTC  (12+ messages)
` [PATCH v6 5/5] kernfs: initialize security of newly created nodes


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).