linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2021-04-22 19:35:49 to 2021-05-13 19:36:25 UTC [more...]

[PATCH v2 09/10] apparmor: test: Remove some casts which are no-longer required
 2021-05-13 19:32 UTC 

[RFC PATCH bpf-next seccomp 00/12] eBPF seccomp filters
 2021-05-13 17:15 UTC  (25+ messages)
` [RFC PATCH bpf-next seccomp 01/12] seccomp: Move no_new_privs check to after prepare_filter
` [RFC PATCH bpf-next seccomp 02/12] bpf, seccomp: Add eBPF filter capabilities
` [RFC PATCH bpf-next seccomp 03/12] seccomp, ptrace: Add a mechanism to retrieve attached eBPF seccomp filters
` [RFC PATCH bpf-next seccomp 04/12] libbpf: recognize section "seccomp"
` [RFC PATCH bpf-next seccomp 05/12] samples/bpf: Add eBPF seccomp sample programs
` [RFC PATCH bpf-next seccomp 06/12] lsm: New hook seccomp_extended
` [RFC PATCH bpf-next seccomp 07/12] bpf/verifier: allow restricting direct map access
` [RFC PATCH bpf-next seccomp 08/12] seccomp-ebpf: restrict filter to almost cBPF if LSM request such
` [RFC PATCH bpf-next seccomp 09/12] yama: (concept) restrict seccomp-eBPF with ptrace_scope
` [RFC PATCH bpf-next seccomp 10/12] seccomp-ebpf: Add ability to read user memory
` [RFC PATCH bpf-next seccomp 11/12] bpf/verifier: support NULL-able ptr to BTF ID as helper argument
` [RFC PATCH bpf-next seccomp 12/12] seccomp-ebpf: support task storage from BPF-LSM, defaulting to group leader

[RFC] [PATCH bpf-next 0/1] Implement getting cgroup path bpf helper
 2021-05-13  8:57 UTC  (4+ messages)
` [RFC] [PATCH bpf-next 1/1] bpf: Add a BPF helper for getting the cgroup path of current task

[RFC PATCH 0/3] Allow access to confidential computing secret area
 2021-05-13  6:26 UTC  (2+ messages)
` [RFC PATCH 3/3] virt: Add sev_secret module to expose confidential computing secrets

[PATCH] lockdown,selinux: fix bogus SELinux lockdown permission checks
 2021-05-12 17:12 UTC  (6+ messages)

Fwd: A missing check bug in __sys_accept4_file()
 2021-05-12 16:23 UTC  (2+ messages)
`  "

[PATCH v6 00/11] evm: Improve usability of portable signatures
 2021-05-12 10:55 UTC  (25+ messages)
` [PATCH v6 01/11] evm: Execute evm_inode_init_security() only when an HMAC key is loaded
` [PATCH v6 02/11] evm: Load EVM key in ima_load_x509() to avoid appraisal
` [PATCH v6 03/11] evm: Refuse EVM_ALLOW_METADATA_WRITES only if an HMAC key is loaded
` [PATCH v6 04/11] evm: Introduce evm_status_revalidate()
` [PATCH v6 05/11] evm: Introduce evm_hmac_disabled() to safely ignore verification errors
  ` [RESEND][PATCH "
` [PATCH v6 06/11] evm: Allow xattr/attr operations for portable signatures
` [PATCH v6 07/11] evm: Pass user namespace to set/remove xattr hooks
` [PATCH v6 08/11] evm: Allow setxattr() and setattr() for unmodified metadata
` [PATCH v6 09/11] ima: Allow imasig requirement to be satisfied by EVM portable signatures
` [PATCH v6 10/11] ima: Introduce template field evmsig and write to field sig as fallback
` [PATCH v6 11/11] ima: Don't remove security.ima if file must not be appraised

[PATCH v2 0/1] trusted-keys: match tpm_get_ops on all return paths
 2021-05-11 23:58 UTC  (7+ messages)
` [PATCH v2 1/1] "

[PATCH] security/smack: fix misspellings using codespell tool
 2021-05-11 16:09 UTC  (2+ messages)

[syzbot] WARNING in smk_set_cipso (2)
 2021-05-11 16:07 UTC  (3+ messages)

[PATCH] Makefile: Introduce CONFIG_ZERO_CALL_USED_REGS
 2021-05-11 13:59 UTC  (6+ messages)

[PATCH] Keys: Remove redundant initialization of cred
 2021-05-11 10:50 UTC  (3+ messages)

[PATCH] vfio: Lock down no-IOMMU mode when kernel is locked down
 2021-05-11  2:58 UTC  (6+ messages)

[PATCH 2/2] selinux:Delete selinux_xfrm_policy_lookup() useless argument
 2021-05-11  1:40 UTC  (2+ messages)

[PATCH] serial: core: fix suspicious security_locked_down() call
 2021-05-10 19:36 UTC  (4+ messages)

Personal
 2021-05-10 14:06 UTC 

[syzbot] possible deadlock in process_measurement (3)
 2021-05-10 12:19 UTC 

[RFC 0/12] Unify asm/unaligned.h around struct helper
 2021-05-10  8:17 UTC  (4+ messages)
` [RFC 09/12] apparmor: use get_unaligned() only for multi-byte words

[syzbot] WARNING: suspicious RCU usage in tomoyo_encode2
 2021-05-08  5:09 UTC  (2+ messages)

[GIT PULL][Security] Add new Landlock LSM
 2021-05-07 16:15 UTC  (3+ messages)
` New mailing list for Landlock LSM user space discussions

[PATCH 0/7 v2] tracing: Fix tracefs lockdown and various clean ups
 2021-05-07 13:26 UTC  (5+ messages)
` [PATCH 7/7 v2] tracing: Do not create tracefs files if tracefs lockdown is in effect

[PATCH v2] debugfs: fix security_locked_down() call for SELinux
 2021-05-07 12:53 UTC 

[PATCH] debugfs: fix security_locked_down() call for SELinux
 2021-05-07 12:41 UTC  (5+ messages)

[GIT PULL] SafeSetID changes for v5.13
 2021-05-05 20:49 UTC  (2+ messages)

[PATCH 4/4] integrity: Load mokx variables into the blacklist keyring
 2021-05-05 10:00 UTC  (9+ messages)
` [PATCH 0/4] keys: Add EFI_CERT_X509_GUID support for dbx/mokx entries

[syzbot] KCSAN: data-race in assoc_array_apply_edit / search_nested_keyrings
 2021-05-04 17:01 UTC  (3+ messages)

[PATCH v5 00/12] evm: Improve usability of portable signatures
 2021-05-04 14:49 UTC  (27+ messages)
` [PATCH v5 03/12] evm: Refuse EVM_ALLOW_METADATA_WRITES only if an HMAC key is loaded
` [PATCH v5 04/12] ima: Move ima_reset_appraise_flags() call to post hooks
` [PATCH v5 06/12] evm: Ignore INTEGRITY_NOLABEL/INTEGRITY_NOXATTRS if conditions are safe
` [PATCH v5 07/12] evm: Allow xattr/attr operations for portable signatures
` [PATCH v5 09/12] evm: Allow setxattr() and setattr() for unmodified metadata

[PATCH v7 0/5] Enable root to update the blacklist keyring
 2021-05-04 10:31 UTC  (3+ messages)

[PATCH] KEYS: trusted: fix memory leak
 2021-05-03 14:56 UTC  (4+ messages)

[PATCH] KEYS: trusted: Fix memory leak on object td
 2021-05-03 14:55 UTC  (4+ messages)

[PATCH v4 00/11] evm: Improve usability of portable signatures
 2021-05-03 13:21 UTC  (15+ messages)
` [PATCH v4 04/11] ima: Move ima_reset_appraise_flags() call to post hooks

[PATCH 0/1] trusted-keys: match tpm_get_ops on all return paths
 2021-04-29 19:08 UTC  (5+ messages)
` [PATCH 1/1] "

[PATCH v2] samples/landlock: fix path_list memory leak
 2021-04-29  9:22 UTC  (2+ messages)

[PATCH] samples/landlock: fix path_list memory leak
 2021-04-28 18:04 UTC  (5+ messages)

[PATCH AUTOSEL 5.10 2/4] capabilities: require CAP_SETFCAP to map uid 0
 2021-04-28 11:11 UTC 

[PATCH AUTOSEL 5.11 2/4] capabilities: require CAP_SETFCAP to map uid 0
 2021-04-28 11:11 UTC 

[GIT PULL][Security Subsystem] Fixes for v5.13
 2021-04-28  2:43 UTC  (2+ messages)

[PATCH v4 0/2] Add support for ECDSA-signed kernel modules
 2021-04-27 23:47 UTC  (4+ messages)
` [PATCH v4 1/2] certs: Trigger creation of RSA module signing key if it's not an RSA key
` [PATCH v4 2/2] certs: Add support for using elliptic curve keys for signing modules

[PATCH v3 0/2] Add support for ECDSA-signed kernel modules
 2021-04-27 23:46 UTC  (5+ messages)
` [PATCH v3 1/2] certs: Trigger creation of RSA module signing key if it's not an RSA key
` [PATCH v3 2/2] certs: Add support for using elliptic curve keys for signing modules

[GIT PULL] SELinux patches for v5.13
 2021-04-27 20:54 UTC  (2+ messages)

[PATCH v3 0/6] evm: Prepare for moving to the LSM infrastructure
 2021-04-27 11:37 UTC  (7+ messages)
` [PATCH v3 1/6] reiserfs: Add missing calls to reiserfs_security_free()
` [PATCH v3 2/6] security: Rewrite security_old_inode_init_security()
` [PATCH v3 3/6] security: Pass xattrs allocated by LSMs to the inode_init_security hook
` [PATCH v3 4/6] security: Support multiple LSMs implementing "
` [PATCH v3 5/6] evm: Align evm_inode_init_security() definition with LSM infrastructure
` [PATCH v3 6/6] evm: Support multiple LSMs providing an xattr

[RFC PATCH 0/2] selinux,anon_inodes: Use a separate SELinux class for each type of anon inode
 2021-04-26 16:00 UTC  (7+ messages)
` [RFC PATCH 2/2] selinux: add capability to map anon inode types to separate classes

[PATCH v34 00/13] Landlock LSM
 2021-04-23 15:22 UTC  (3+ messages)

[PATCH] ima: ensure IMA_APPRAISE_MODSIG has necessary dependencies
 2021-04-23  2:57 UTC  (2+ messages)

[PATCH v2 0/6] evm: Prepare for moving to the LSM infrastructure
 2021-04-22 21:39 UTC  (7+ messages)
` [PATCH v2 3/6] security: Pass xattrs allocated by LSMs to the inode_init_security hook


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).