linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2020-11-19 23:26:44 to 2020-11-25 17:05:03 UTC [more...]

[PATCH 000/141] Fix fall-through warnings for Clang
 2020-11-25 17:04 UTC  (53+ messages)
` [PATCH 010/141] ima: "
` [PATCH 052/141] security: keys: "
                  ` [Intel-wired-lan] [PATCH 000/141] "

[PATCH bpf-next v3 0/3] Implement bpf_ima_inode_hash
 2020-11-25 12:27 UTC  (14+ messages)
` [PATCH bpf-next v3 1/3] ima: Implement ima_inode_hash
` [PATCH bpf-next v3 2/3] bpf: Add a BPF helper for getting the IMA hash of an inode
` [PATCH bpf-next v3 3/3] bpf: Add a selftest for bpf_ima_inode_hash

[PATCH] tomoyo: Avoid potential null pointer access
 2020-11-25 12:25 UTC  (2+ messages)

[PATCH v12 0/4] SELinux support for anonymous inodes and UFFD
 2020-11-25  1:52 UTC  (13+ messages)
` [PATCH v12 3/4] selinux: teach SELinux about anonymous inodes

[PATCH bpf-next 1/3] ima: Implement ima_inode_hash
 2020-11-24 15:01 UTC  (12+ messages)
` [PATCH bpf-next 2/3] bpf: Add a BPF helper for getting the IMA hash of an inode
` [PATCH bpf-next 3/3] bpf: Update LSM selftests for bpf_ima_inode_hash

[PATCH v2 00/39] fs: idmapped mounts
 2020-11-24 13:59 UTC  (21+ messages)
` [PATCH v2 07/39] mount: attach mappings to mounts
` [PATCH v2 14/39] commoncap: handle idmapped mounts
` [PATCH v2 31/39] audit: "
  ` [PATCH v2 39/39] tests: add vfs/idmapped mounts test suite

[PATCH v8 0/4] Introduce TEE based Trusted Keys support
 2020-11-24  3:46 UTC  (7+ messages)
` [PATCH v8 1/4] KEYS: trusted: Add generic trusted keys framework
` [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
` [PATCH v8 4/4] MAINTAINERS: Add myself as Trusted Keys co-maintainer

[PATCH v24 00/12] Landlock LSM
 2020-11-24  2:38 UTC  (19+ messages)
` [PATCH v24 01/12] landlock: Add object management
` [PATCH v24 02/12] landlock: Add ruleset and domain management
` [PATCH v24 07/12] landlock: Support filesystem access-control
` [PATCH v24 08/12] landlock: Add syscall implementations
` [PATCH v24 12/12] landlock: Add user and kernel documentation

[PATCH] lsm,selinux: pass flowi_common instead of flowi to the LSM hooks
 2020-11-23 23:47 UTC  (3+ messages)

[PATCH v6 0/8] IMA: support for measuring kernel integrity critical data
 2020-11-23 19:49 UTC  (21+ messages)
` [PATCH v6 1/8] IMA: generalize keyring specific measurement constructs
` [PATCH v6 2/8] IMA: add support to measure buffer data hash
` [PATCH v6 3/8] IMA: define a hook to measure kernel integrity critical data
` [PATCH v6 4/8] IMA: add policy rule to measure "
` [PATCH v6 5/8] IMA: extend policy to add data sources as a critical data measurement constraint
` [PATCH v6 6/8] IMA: add support to critical data hook to limit data sources for measurement
` [PATCH v6 7/8] IMA: add a built-in policy rule for critical data measurement
` [PATCH v6 8/8] selinux: measure state and hash of the policy using IMA

[PATCH bpf-next v2 1/3] ima: Implement ima_inode_hash
 2020-11-23 19:00 UTC  (13+ messages)
` [PATCH bpf-next v2 2/3] bpf: Add a BPF helper for getting the IMA hash of an inode
` [PATCH bpf-next v2 3/3] bpf: Update LSM selftests for bpf_ima_inode_hash

[PATCH] xfrm: redact SA secret with lockdown confidentiality
 2020-11-23  6:42 UTC  (3+ messages)
` [PATCH ipsec-next v5] "

[PATCH v22 00/23] LSM: Module stacking for AppArmor
 2020-11-21  7:36 UTC  (28+ messages)
  ` [PATCH v23 01/23] LSM: Infrastructure management of the sock security
  ` [PATCH v23 02/23] LSM: Create and manage the lsmblob data structure
  ` [PATCH v23 03/23] LSM: Use lsmblob in security_audit_rule_match
  ` [PATCH v23 04/23] LSM: Use lsmblob in security_kernel_act_as
  ` [PATCH v23 05/23] LSM: Use lsmblob in security_secctx_to_secid
  ` [PATCH v23 06/23] LSM: Use lsmblob in security_secid_to_secctx
  ` [PATCH v23 07/23] LSM: Use lsmblob in security_ipc_getsecid
  ` [PATCH v23 08/23] LSM: Use lsmblob in security_task_getsecid
  ` [PATCH v23 09/23] LSM: Use lsmblob in security_inode_getsecid
  ` [PATCH v23 10/23] LSM: Use lsmblob in security_cred_getsecid
  ` [PATCH v23 11/23] IMA: Change internal interfaces to use lsmblobs
  ` [PATCH v23 12/23] LSM: Specify which LSM to display
  ` [PATCH v23 13/23] LSM: Ensure the correct LSM context releaser
  ` [PATCH v23 14/23] LSM: Use lsmcontext in security_secid_to_secctx
  ` [PATCH v23 15/23] LSM: Use lsmcontext in security_inode_getsecctx
  ` [PATCH v23 16/23] LSM: security_secid_to_secctx in netlink netfilter
  ` [PATCH v23 17/23] NET: Store LSM netlabel data in a lsmblob
  ` [PATCH v23 18/23] LSM: Verify LSM display sanity in binder
  ` [PATCH v23 19/23] audit: add support for non-syscall auxiliary records
  ` [PATCH v23 20/23] Audit: Add new record for multiple process LSM attributes
  ` [PATCH v23 21/23] Audit: Add a new record for multiple object "
  ` [PATCH v23 22/23] LSM: Add /proc attr entry for full LSM context
  ` [PATCH v23 23/23] AppArmor: Remove the exclusive flag

[PATCH v1 0/9] Enable root to update the blacklist keyring
 2020-11-20 18:04 UTC  (10+ messages)
` [PATCH v1 1/9] certs: Fix blacklisted hexadecimal hash string check
` [PATCH v1 2/9] certs: Make blacklist_vet_description() more strict
` [PATCH v1 3/9] certs: Factor out the blacklist hash creation
` [PATCH v1 4/9] certs: Check that builtin blacklist hashes are valid
` [PATCH v1 5/9] PKCS#7: Fix missing include
` [PATCH v1 6/9] certs: Fix blacklist flag type confusion
` [PATCH v1 7/9] certs: Allow root user to append signed hashes to the blacklist keyring
` [PATCH v1 8/9] certs: Replace K{U,G}IDT_INIT() with GLOBAL_ROOT_{U,G}ID
` [PATCH v1 9/9] tools/certs: Add print-cert-tbs-hash.sh

[RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
 2020-11-20 12:52 UTC  (14+ messages)

[PATCH] fix namespaced fscaps when !CONFIG_SECURITY
 2020-11-20  5:03 UTC  (4+ messages)

[PATCH v1 0/9] Landlock fixes
 2020-11-20  1:37 UTC  (3+ messages)
` [PATCH v1 2/9] landlock: Cosmetic fixes for filesystem management


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).