linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2019-11-11 19:41:23 to 2019-11-21 20:37:13 UTC [more...]

[PATCH v11 00/25] LSM: Module stacking for AppArmor
 2019-11-21 20:36 UTC  (13+ messages)
  ` [PATCH v11 18/25] LSM: security_secid_to_secctx in netlink netfilter
  ` [PATCH v11 19/25] NET: Store LSM netlabel data in a lsmblob
  ` [PATCH v11 20/25] LSM: Verify LSM display sanity in binder
  ` [PATCH v11 21/25] Audit: Add subj_LSM fields when necessary
  ` [PATCH v11 22/25] Audit: Include object data for all security modules
  ` [PATCH v11 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
  ` [PATCH v11 24/25] LSM: Add /proc attr entry for full LSM context
  ` [PATCH v11 25/25] AppArmor: Remove the exclusive flag

[PATCH v11 00/25] LSM: Module stacking for AppArmor
 2019-11-21 19:00 UTC  (32+ messages)
  ` [PATCH v11 01/25] LSM: Infrastructure management of the sock security
  ` [PATCH v11 02/25] LSM: Create and manage the lsmblob data structure
  ` [PATCH v11 03/25] LSM: Use lsmblob in security_audit_rule_match
  ` [PATCH v11 04/25] LSM: Use lsmblob in security_kernel_act_as
  ` [PATCH v11 05/25] net: Prepare UDS for security module stacking
  ` [PATCH v11 06/25] LSM: Use lsmblob in security_secctx_to_secid
  ` [PATCH v11 07/25] LSM: Use lsmblob in security_secid_to_secctx
  ` [PATCH v11 08/25] LSM: Use lsmblob in security_ipc_getsecid
  ` [PATCH v11 09/25] LSM: Use lsmblob in security_task_getsecid
  ` [PATCH v11 10/25] LSM: Use lsmblob in security_inode_getsecid
  ` [PATCH v11 11/25] LSM: Use lsmblob in security_cred_getsecid
  ` [PATCH v11 12/25] IMA: Change internal interfaces to use lsmblobs
  ` [PATCH v11 13/25] LSM: Specify which LSM to display
  ` [PATCH v11 14/25] LSM: Ensure the correct LSM context releaser
  ` [PATCH v11 15/25] LSM: Use lsmcontext in security_secid_to_secctx
  ` [PATCH v11 16/25] LSM: Use lsmcontext in security_dentry_init_security
  ` [PATCH v11 17/25] LSM: Use lsmcontext in security_inode_getsecctx

[PATCH] tpm_tis: Move setting of TPM_CHIP_FLAG_IRQ into tpm_tis_probe_irq_single
 2019-11-21 18:49 UTC  (7+ messages)

KASAN: use-after-free Read in tomoyo_realpath_from_path
 2019-11-21 13:59 UTC  (18+ messages)
  ` [PATCH] tomoyo: Don't check open/getattr permission on sockets
        ` [PATCH v2] "

[PATCH v5 15/27] nfs: get rid of ->set_security()
 2019-11-21  5:52 UTC 

[PATCH v11 00/25] LSM: Module stacking for AppArmor
 2019-11-21  5:50 UTC  (22+ messages)
  ` [PATCH v11 01/25] LSM: Infrastructure management of the sock security
  ` [PATCH v11 02/25] LSM: Create and manage the lsmblob data structure
  ` [PATCH v11 03/25] LSM: Use lsmblob in security_audit_rule_match
  ` [PATCH v11 04/25] LSM: Use lsmblob in security_kernel_act_as
  ` [PATCH v11 05/25] net: Prepare UDS for security module stacking
  ` [PATCH v11 06/25] LSM: Use lsmblob in security_secctx_to_secid
  ` [PATCH v11 07/25] LSM: Use lsmblob in security_secid_to_secctx
  ` [PATCH v11 08/25] LSM: Use lsmblob in security_ipc_getsecid
  ` [PATCH v11 09/25] LSM: Use lsmblob in security_task_getsecid
  ` [PATCH v11 10/25] LSM: Use lsmblob in security_inode_getsecid
  ` [PATCH v11 11/25] LSM: Use lsmblob in security_cred_getsecid
  ` [PATCH v11 12/25] IMA: Change internal interfaces to use lsmblobs
  ` [PATCH v11 13/25] LSM: Specify which LSM to display
  ` [PATCH v11 14/25] LSM: Ensure the correct LSM context releaser
  ` [PATCH v11 15/25] LSM: Use lsmcontext in security_secid_to_secctx
  ` [PATCH v11 16/25] LSM: Use lsmcontext in security_dentry_init_security
  ` [PATCH v11 17/25] LSM: Use lsmcontext in security_inode_getsecctx
  ` [PATCH v11 18/25] LSM: security_secid_to_secctx in netlink netfilter

[PATCH v2] security: Fix Kconfig indentation
 2019-11-21  3:20 UTC 

[PATCH] x86/mtrr: Require CAP_SYS_ADMIN for all access
 2019-11-20 20:24 UTC  (3+ messages)

[PATCH] Smack: check length in smk_set_cipso()
 2019-11-20 14:51 UTC 

[PATCH] security: Fix Kconfig indentation
 2019-11-20 13:37 UTC 

[PATCH v2] efi: Only print errors about failing to get certs if EFI vars are found
 2019-11-19 15:40 UTC  (2+ messages)

[PATCH] efi: Only print errors about failing to get certs if EFI vars are found
 2019-11-19 11:38 UTC  (3+ messages)

[PATCH linux-kselftest/test v2] apparmor: add AppArmor KUnit tests for policy unpack
 2019-11-19  0:34 UTC  (4+ messages)

[pipe] d60337eff1: BUG:kernel_NULL_pointer_dereference,address
 2019-11-18  7:53 UTC  (3+ messages)
  ` [LKP] "

Investment opportunity
 2019-11-17 14:58 UTC 

[PATCH v7 0/5] KEYS: Measure keys when they are created or updated
 2019-11-15 13:14 UTC  (12+ messages)
` [PATCH v7 1/5] IMA: Add KEY_CHECK func to measure keys
` [PATCH v7 2/5] IMA: Define an IMA hook "
` [PATCH v7 3/5] KEYS: Call the "
` [PATCH v7 4/5] IMA: Add support to limit measuring keys
` [PATCH v7 5/5] IMA: Read keyrings= option from the IMA policy

[PATCH -next] x86/efi: remove unused variables
 2019-11-15 13:08 UTC 

Investment opportunity
 2019-11-15 11:50 UTC 

[PATCH v6 0/3] KEYS: Measure keys when they are created or updated
 2019-11-13 22:04 UTC  (14+ messages)
` [PATCH v6 1/3] IMA: Add KEY_CHECK func to measure keys
` [PATCH v6 2/3] IMA: Define an IMA hook "
` [PATCH v6 3/3] KEYS: Call the "

[PATCH] x86/mtrr: only administrator can read the configurations
 2019-11-13 21:47 UTC  (4+ messages)

[PATCH v11 00/25] LSM: Module stacking for AppArmor
 2019-11-13 16:50 UTC  (11+ messages)
  ` [PATCH v11 01/25] LSM: Infrastructure management of the sock security
  ` [PATCH v11 02/25] LSM: Create and manage the lsmblob data structure
  ` [PATCH v11 03/25] LSM: Use lsmblob in security_audit_rule_match
  ` [PATCH v11 04/25] LSM: Use lsmblob in security_kernel_act_as
  ` [PATCH v11 05/25] net: Prepare UDS for security module stacking
  ` [PATCH v11 06/25] LSM: Use lsmblob in security_secctx_to_secid
  ` [PATCH v11 07/25] LSM: Use lsmblob in security_secid_to_secctx
  ` [PATCH v11 08/25] LSM: Use lsmblob in security_ipc_getsecid
  ` [PATCH v11 09/25] LSM: Use lsmblob in security_task_getsecid
  ` [PATCH v11 10/25] LSM: Use lsmblob in security_inode_getsecid

Investment opportunity
 2019-11-13  1:34 UTC 

[PATCH v10 00/25] LSM: Module stacking for AppArmor
 2019-11-13  0:09 UTC  (26+ messages)
  ` [PATCH 01/25] LSM: Infrastructure management of the sock security
  ` [PATCH 02/25] LSM: Create and manage the lsmblob data structure
  ` [PATCH 03/25] LSM: Use lsmblob in security_audit_rule_match
  ` [PATCH 04/25] LSM: Use lsmblob in security_kernel_act_as
  ` [PATCH 05/25] net: Prepare UDS for security module stacking
  ` [PATCH 06/25] LSM: Use lsmblob in security_secctx_to_secid
  ` [PATCH 07/25] LSM: Use lsmblob in security_secid_to_secctx
  ` [PATCH 08/25] LSM: Use lsmblob in security_ipc_getsecid
  ` [PATCH 09/25] LSM: Use lsmblob in security_task_getsecid
  ` [PATCH 10/25] LSM: Use lsmblob in security_inode_getsecid
  ` [PATCH 11/25] LSM: Use lsmblob in security_cred_getsecid
  ` [PATCH 12/25] IMA: Change internal interfaces to use lsmblobs
  ` [PATCH 13/25] LSM: Specify which LSM to display
  ` [PATCH 14/25] LSM: Ensure the correct LSM context releaser
  ` [PATCH 15/25] LSM: Use lsmcontext in security_secid_to_secctx
  ` [PATCH 16/25] LSM: Use lsmcontext in security_dentry_init_security

[PATCH v10 00/25] LSM: Module stacking for AppArmor
 2019-11-13  0:00 UTC  (23+ messages)
  ` [PATCH v10 01/25] LSM: Infrastructure management of the sock security
  ` [PATCH v10 02/25] LSM: Create and manage the lsmblob data structure
  ` [PATCH v10 03/25] LSM: Use lsmblob in security_audit_rule_match
  ` [PATCH v10 04/25] LSM: Use lsmblob in security_kernel_act_as
  ` [PATCH v10 05/25] net: Prepare UDS for security module stacking
  ` [PATCH v10 06/25] LSM: Use lsmblob in security_secctx_to_secid
  ` [PATCH v10 07/25] LSM: Use lsmblob in security_secid_to_secctx
  ` [PATCH v10 08/25] LSM: Use lsmblob in security_ipc_getsecid
  ` [PATCH v10 09/25] LSM: Use lsmblob in security_task_getsecid
  ` [PATCH v10 10/25] LSM: Use lsmblob in security_inode_getsecid
  ` [PATCH v10 11/25] LSM: Use lsmblob in security_cred_getsecid
  ` [PATCH v10 12/25] IMA: Change internal interfaces to use lsmblobs
  ` [PATCH v10 13/25] LSM: Specify which LSM to display
  ` [PATCH v10 14/25] LSM: Ensure the correct LSM context releaser
  ` [PATCH v10 15/25] LSM: Use lsmcontext in security_secid_to_secctx
  ` [PATCH v10 16/25] LSM: Use lsmcontext in security_dentry_init_security
  ` [PATCH v10 17/25] LSM: Use lsmcontext in security_inode_getsecctx
  ` [PATCH v10 18/25] LSM: security_secid_to_secctx in netlink netfilter
  ` [PATCH v10 19/25] NET: Store LSM netlabel data in a lsmblob
  ` [PATCH v10 20/25] LSM: Verify LSM display sanity in binder
  ` [PATCH v10 21/25] Audit: Add subj_LSM fields when necessary
  ` [PATCH v10 22/25] Audit: Include object data for all security modules

WARNING in aa_sock_msg_perm (2)
 2019-11-12 21:00 UTC  (2+ messages)

[PATCH v5 0/10] KEYS: Measure keys when they are created or updated
 2019-11-12 18:06 UTC  (15+ messages)
` [PATCH v5 01/10] IMA: Added KEYRING_CHECK func in IMA policy to measure keys
` [PATCH v5 02/10] IMA: Added keyrings= option in IMA policy to only measure keys added to the specified keyrings
` [PATCH v5 04/10] IMA: Updated IMA policy functions to return keyrings option read from the policy


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).