Linux-Security-Module Archive on lore.kernel.org
 help / color / Atom feed
[RFC v1 00/14] Kernel Runtime Security Instrumentation
 2019-09-10 11:55 UTC  (6+ messages) - mbox.gz / Atom
` [RFC v1 01/14] krsi: Add a skeleton and config options for the KRSI LSM
` [RFC v1 02/14] krsi: Introduce types for KRSI eBPF
` [RFC v1 04/14] krsi: Add support in libbpf for BPF_PROG_TYPE_KRSI
` [RFC v1 06/14] krsi: Implement eBPF operations, attachment and execution
` [RFC v1 13/14] krsi: Provide an example to read and log environment variables

[PATCH V40 00/29] Add kernel lockdown functionality
 2019-09-10 10:06 UTC  (8+ messages) - mbox.gz / Atom
` [PATCH V40 03/29] security: Add a static lockdown policy LSM
` [PATCH V40 04/29] lockdown: Enforce module signatures if the kernel is locked down

[PATCH 0/2] Minor lockdown fixups
 2019-09-10 10:03 UTC  (3+ messages) - mbox.gz / Atom
` [PATCH 1/2] security: constify some arrays in lockdown LSM
` [PATCH 2/2] kexec: Fix file verification on S390

[PATCH 1/3] ima: keep the integrity state of open files up to date
 2019-09-10  7:04 UTC  (10+ messages) - mbox.gz / Atom
` [PATCH 2/3] ima: update the file measurement on truncate
` [PATCH 3/3] ima: update the file measurement on writes

[PATCH] smack: include linux/watch_queue.h
 2019-09-10  4:02 UTC  (3+ messages) - mbox.gz / Atom

[PATCH v4 bpf-next 1/4] capability: introduce CAP_BPF and CAP_TRACING
 2019-09-09 22:52 UTC  - mbox.gz / Atom

[PATCH] lsm: remove current_security()
 2019-09-09 15:58 UTC  (4+ messages) - mbox.gz / Atom

[PATCH v2 0/5] Add support for O_MAYEXEC
 2019-09-09 15:49 UTC  (45+ messages) - mbox.gz / Atom
` [PATCH v2 1/5] fs: Add support for an O_MAYEXEC flag on sys_open()
` [PATCH v2 2/5] fs: Add a MAY_EXECMOUNT flag to infer the noexec mount propertie
` [PATCH v2 3/5] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
` [PATCH v2 4/5] selftest/exec: Add tests for O_MAYEXEC enforcing
` [PATCH v2 5/5] doc: Add documentation for the fs.open_mayexec_enforce sysctl

[PATCH AUTOSEL 4.4 2/2] keys: Fix missing null pointer check in request_key_auth_describe()
 2019-09-09 15:42 UTC  - mbox.gz / Atom

[PATCH AUTOSEL 4.9 5/6] keys: Fix missing null pointer check in request_key_auth_describe()
 2019-09-09 15:42 UTC  - mbox.gz / Atom

[PATCH AUTOSEL 4.14 6/8] keys: Fix missing null pointer check in request_key_auth_describe()
 2019-09-09 15:41 UTC  - mbox.gz / Atom

[PATCH AUTOSEL 4.19 6/8] keys: Fix missing null pointer check in request_key_auth_describe()
 2019-09-09 15:41 UTC  - mbox.gz / Atom

[PATCH AUTOSEL 5.2 10/12] keys: Fix missing null pointer check in request_key_auth_describe()
 2019-09-09 15:40 UTC  - mbox.gz / Atom

[PATCH v6 00/12] add integrity and security to TPM2 transactions
 2019-09-09 12:26 UTC  (13+ messages) - mbox.gz / Atom
` [PATCH v6 01/12] tpm-buf: move from static inlines to real functions
` [PATCH v6 02/12] tpm-buf: add handling for TPM2B types
` [PATCH v6 03/12] tpm-buf: add cursor based functions for response parsing
` [PATCH v6 04/12] tpm2-space: export the context save and load commands
` [PATCH v6 05/12] tpm2-sessions: Add full HMAC and encrypt/decrypt session handling
` [PATCH v6 06/12] tpm-buf: add tpm_buf_parameters()
` [PATCH v6 07/12] tpm2: add hmac checks to tpm2_pcr_extend()
` [PATCH v6 08/12] tpm2: add session encryption protection to tpm2_get_random()
` [PATCH v6 09/12] trusted keys: Add session encryption protection to the seal/unseal path
` [PATCH v6 10/12] tpm: add the null key name as a tpm2 sysfs variable
` [PATCH v6 11/12] Documentation: add tpm-security.rst
` [PATCH v6 12/12] tpm2-sessions: NOT FOR COMMITTING add sessions testing

[PATCH 0/5] security: integrity: Makefile cleanups
 2019-09-09 11:44 UTC  (5+ messages) - mbox.gz / Atom
` [PATCH 1/5] integrity: remove unneeded, broken attempt to add -fshort-wchar
` [PATCH 2/5] integrity: remove pointless subdir-$(CONFIG_...)

[PATCH bpf-next v10 00/10] Landlock LSM: Toward unprivileged sandboxing
 2019-09-08 22:19 UTC  (6+ messages) - mbox.gz / Atom
` [PATCH bpf-next v10 06/10] bpf,landlock: Add a new map type: inode

[PATCH v3] KEYS: trusted: correctly initialize digests and fix locking issue
 2019-09-08 17:45 UTC  - mbox.gz / Atom

[PATCH] tpm_tis_core: Set TPM_CHIP_FLAG_IRQ before probing for interrupts
 2019-09-07 21:21 UTC  (3+ messages) - mbox.gz / Atom

[PATCH v2] KEYS: trusted: correctly initialize digests and fix locking issue
 2019-09-07 19:03 UTC  (3+ messages) - mbox.gz / Atom

[PATCH 00/11] Keyrings, Block and USB notifications [ver #8]
 2019-09-06 21:19 UTC  (36+ messages) - mbox.gz / Atom
` [PATCH 01/11] uapi: General notification ring definitions "
` [PATCH 02/11] security: Add hooks to rule on setting a watch "
` [PATCH 03/11] security: Add a hook for the point of notification insertion "
` [PATCH 04/11] General notification queue with user mmap()'able ring buffer "
` [PATCH 05/11] keys: Add a notification facility "
` [PATCH 06/11] Add a general, global device notification watch list "
` [PATCH 07/11] block: Add block layer notifications "
` [PATCH 08/11] usb: Add USB subsystem "
` [PATCH 09/11] Add sample notification program "
` [PATCH 10/11] selinux: Implement the watch_key security hook "
` [PATCH 11/11] smack: Implement the watch_key and post_notification hooks "
` Why add the general notification queue and its sources

[PATCH v8 00/28] LSM: Module stacking for AppArmor
 2019-09-06 13:46 UTC  (3+ messages) - mbox.gz / Atom

[PATCH] selinux: fix residual uses of current_security() for the SELinux blob
 2019-09-05 20:55 UTC  (8+ messages) - mbox.gz / Atom

general protection fault in smack_socket_sendmsg
 2019-09-04 21:07 UTC  (3+ messages) - mbox.gz / Atom

[PATCH] KEYS: trusted: correctly initialize digests and fix locking issue
 2019-09-04 17:23 UTC  - mbox.gz / Atom

Should PCI "new_id" support be disabled when kernel is locked down?
 2019-09-04 16:47 UTC  (2+ messages) - mbox.gz / Atom

[PATCH 00/11] Keyrings, Block and USB notifications [ver #7]
 2019-09-04 15:17 UTC  (29+ messages) - mbox.gz / Atom
  ` [PATCH 06/11] Add a general, global device notification watch list "
  ` [PATCH 08/11] usb: Add USB subsystem notifications "
  ` [PATCH 11/11] smack: Implement the watch_key and post_notification hooks [untested] "
  ` [PATCH 04/11] General notification queue with user mmap()'able ring buffer "

[PATCH] Smack: Move request_buffer from stack to smack_audit_data
 2019-09-03 20:56 UTC  (2+ messages) - mbox.gz / Atom

[PATCH AUTOSEL 4.19 123/167] apparmor: reset pos on failure to unpack for various functions
 2019-09-03 16:24 UTC  - mbox.gz / Atom

[PATCH v22 13/24] x86/sgx: Add provisioning
 2019-09-03 14:26 UTC  - mbox.gz / Atom

KASAN: use-after-free Read in tomoyo_realpath_from_path
 2019-09-03  6:52 UTC  (10+ messages) - mbox.gz / Atom
  ` [PATCH] tomoyo: Don't check open/getattr permission on sockets
        ` [PATCH v2] "

[PATCH] keys: Fix missing null pointer check in request_key_auth_describe()
 2019-09-02 12:37 UTC  - mbox.gz / Atom

[PATCH 1/2] staging: comedi: Restrict COMEDI_DEVCONFIG when the kernel is locked down
 2019-09-02  9:26 UTC  (4+ messages) - mbox.gz / Atom

[RFC/RFT v4 0/5] Add generic trusted keys framework/subsystem
 2019-09-02  5:07 UTC  (6+ messages) - mbox.gz / Atom
` [RFC/RFT v4 5/5] KEYS: trusted: Add generic trusted keys framework

[PATCH] netlabel: remove redundant assignment to pointer iter
 2019-09-01 18:45 UTC  (6+ messages) - mbox.gz / Atom

[PATCH 1/2] rtnetlink: gate MAC address with an LSM hook
 2019-08-30 21:46 UTC  (6+ messages) - mbox.gz / Atom

[RFC PATCH] audit, security: allow LSMs to selectively enable audit collection
 2019-08-30 21:36 UTC  (4+ messages) - mbox.gz / Atom

general protection fault in smack_socket_sendmsg
 2019-08-30 19:40 UTC  - mbox.gz / Atom

page:   latest

Linux-Security-Module Archive on lore.kernel.org

Archives are clonable:
	git clone --mirror https://lore.kernel.org/linux-security-module/0 linux-security-module/git/0.git

	# If you have public-inbox 1.1+ installed, you may
	# initialize and index your mirror using the following commands:
	public-inbox-init -V2 linux-security-module linux-security-module/ https://lore.kernel.org/linux-security-module \
		linux-security-module@vger.kernel.org
	public-inbox-index linux-security-module

Example config snippet for mirrors

Newsgroup available over NNTP:
	nntp://nntp.lore.kernel.org/org.kernel.vger.linux-security-module


AGPL code for this site: git clone https://public-inbox.org/public-inbox.git