linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2021-04-27 20:54:40 to 2021-05-14 10:04:50 UTC [more...]

[PATCH v2 00/13] Unify asm/unaligned.h around struct helper
 2021-05-14 10:00 UTC  (2+ messages)
` [PATCH v2 09/13] apparmor: use get_unaligned() only for multi-byte words

[RFC] [PATCH bpf-next 0/1] Implement getting cgroup path bpf helper
 2021-05-14  4:20 UTC  (6+ messages)
` [RFC] [PATCH bpf-next 1/1] bpf: Add a BPF helper for getting the cgroup path of current task

[PATCH v26 00/25] LSM: Module stacking for AppArmor
 2021-05-13 20:08 UTC  (26+ messages)
  ` [PATCH v26 01/25] LSM: Infrastructure management of the sock security
  ` [PATCH v26 02/25] LSM: Add the lsmblob data structure
  ` [PATCH v26 03/25] LSM: provide lsm name and id slot mappings
  ` [PATCH v26 04/25] IMA: avoid label collisions with stacked LSMs
  ` [PATCH v26 05/25] LSM: Use lsmblob in security_audit_rule_match
  ` [PATCH v26 06/25] LSM: Use lsmblob in security_kernel_act_as
  ` [PATCH v26 07/25] LSM: Use lsmblob in security_secctx_to_secid
  ` [PATCH v26 08/25] LSM: Use lsmblob in security_secid_to_secctx
  ` [PATCH v26 09/25] LSM: Use lsmblob in security_ipc_getsecid
  ` [PATCH v26 10/25] LSM: Use lsmblob in security_task_getsecid
  ` [PATCH v26 11/25] LSM: Use lsmblob in security_inode_getsecid
  ` [PATCH v26 12/25] LSM: Use lsmblob in security_cred_getsecid
  ` [PATCH v26 13/25] IMA: Change internal interfaces to use lsmblobs
  ` [PATCH v26 14/25] LSM: Specify which LSM to display
  ` [PATCH v26 15/25] LSM: Ensure the correct LSM context releaser
  ` [PATCH v26 16/25] LSM: Use lsmcontext in security_secid_to_secctx
  ` [PATCH v26 17/25] LSM: Use lsmcontext in security_inode_getsecctx
  ` [PATCH v26 18/25] LSM: security_secid_to_secctx in netlink netfilter
  ` [PATCH v26 19/25] NET: Store LSM netlabel data in a lsmblob
  ` [PATCH v26 20/25] LSM: Verify LSM display sanity in binder
  ` [PATCH v26 21/25] audit: add support for non-syscall auxiliary records
  ` [PATCH v26 22/25] Audit: Add new record for multiple process LSM attributes
  ` [PATCH v26 23/25] Audit: Add a new record for multiple object "
  ` [PATCH v26 24/25] LSM: Add /proc attr entry for full LSM context
  ` [PATCH v26 25/25] AppArmor: Remove the exclusive flag

[PATCH v2 09/10] apparmor: test: Remove some casts which are no-longer required
 2021-05-13 19:32 UTC 

[RFC PATCH bpf-next seccomp 00/12] eBPF seccomp filters
 2021-05-13 17:15 UTC  (25+ messages)
` [RFC PATCH bpf-next seccomp 01/12] seccomp: Move no_new_privs check to after prepare_filter
` [RFC PATCH bpf-next seccomp 02/12] bpf, seccomp: Add eBPF filter capabilities
` [RFC PATCH bpf-next seccomp 03/12] seccomp, ptrace: Add a mechanism to retrieve attached eBPF seccomp filters
` [RFC PATCH bpf-next seccomp 04/12] libbpf: recognize section "seccomp"
` [RFC PATCH bpf-next seccomp 05/12] samples/bpf: Add eBPF seccomp sample programs
` [RFC PATCH bpf-next seccomp 06/12] lsm: New hook seccomp_extended
` [RFC PATCH bpf-next seccomp 07/12] bpf/verifier: allow restricting direct map access
` [RFC PATCH bpf-next seccomp 08/12] seccomp-ebpf: restrict filter to almost cBPF if LSM request such
` [RFC PATCH bpf-next seccomp 09/12] yama: (concept) restrict seccomp-eBPF with ptrace_scope
` [RFC PATCH bpf-next seccomp 10/12] seccomp-ebpf: Add ability to read user memory
` [RFC PATCH bpf-next seccomp 11/12] bpf/verifier: support NULL-able ptr to BTF ID as helper argument
` [RFC PATCH bpf-next seccomp 12/12] seccomp-ebpf: support task storage from BPF-LSM, defaulting to group leader

[RFC PATCH 0/3] Allow access to confidential computing secret area
 2021-05-13  6:26 UTC  (2+ messages)
` [RFC PATCH 3/3] virt: Add sev_secret module to expose confidential computing secrets

[PATCH] lockdown,selinux: fix bogus SELinux lockdown permission checks
 2021-05-12 17:12 UTC  (6+ messages)

Fwd: A missing check bug in __sys_accept4_file()
 2021-05-12 16:23 UTC  (2+ messages)
`  "

[PATCH v6 00/11] evm: Improve usability of portable signatures
 2021-05-12 10:55 UTC  (25+ messages)
` [PATCH v6 01/11] evm: Execute evm_inode_init_security() only when an HMAC key is loaded
` [PATCH v6 02/11] evm: Load EVM key in ima_load_x509() to avoid appraisal
` [PATCH v6 03/11] evm: Refuse EVM_ALLOW_METADATA_WRITES only if an HMAC key is loaded
` [PATCH v6 04/11] evm: Introduce evm_status_revalidate()
` [PATCH v6 05/11] evm: Introduce evm_hmac_disabled() to safely ignore verification errors
  ` [RESEND][PATCH "
` [PATCH v6 06/11] evm: Allow xattr/attr operations for portable signatures
` [PATCH v6 07/11] evm: Pass user namespace to set/remove xattr hooks
` [PATCH v6 08/11] evm: Allow setxattr() and setattr() for unmodified metadata
` [PATCH v6 09/11] ima: Allow imasig requirement to be satisfied by EVM portable signatures
` [PATCH v6 10/11] ima: Introduce template field evmsig and write to field sig as fallback
` [PATCH v6 11/11] ima: Don't remove security.ima if file must not be appraised

[PATCH v2 0/1] trusted-keys: match tpm_get_ops on all return paths
 2021-05-11 23:58 UTC  (7+ messages)
` [PATCH v2 1/1] "

[PATCH] security/smack: fix misspellings using codespell tool
 2021-05-11 16:09 UTC  (2+ messages)

[syzbot] WARNING in smk_set_cipso (2)
 2021-05-11 16:07 UTC  (3+ messages)

[PATCH] Makefile: Introduce CONFIG_ZERO_CALL_USED_REGS
 2021-05-11 13:59 UTC  (6+ messages)

[PATCH] Keys: Remove redundant initialization of cred
 2021-05-11 10:50 UTC  (3+ messages)

[PATCH] vfio: Lock down no-IOMMU mode when kernel is locked down
 2021-05-11  2:58 UTC  (6+ messages)

[PATCH 2/2] selinux:Delete selinux_xfrm_policy_lookup() useless argument
 2021-05-11  1:40 UTC  (2+ messages)

[PATCH] serial: core: fix suspicious security_locked_down() call
 2021-05-10 19:36 UTC  (4+ messages)

Personal
 2021-05-10 14:06 UTC 

[syzbot] possible deadlock in process_measurement (3)
 2021-05-10 12:19 UTC 

[RFC 0/12] Unify asm/unaligned.h around struct helper
 2021-05-10  8:17 UTC  (4+ messages)
` [RFC 09/12] apparmor: use get_unaligned() only for multi-byte words

[syzbot] WARNING: suspicious RCU usage in tomoyo_encode2
 2021-05-08  5:09 UTC  (2+ messages)

[GIT PULL][Security] Add new Landlock LSM
 2021-05-07 16:15 UTC  (3+ messages)
` New mailing list for Landlock LSM user space discussions

[PATCH 0/7 v2] tracing: Fix tracefs lockdown and various clean ups
 2021-05-07 13:26 UTC  (5+ messages)
` [PATCH 7/7 v2] tracing: Do not create tracefs files if tracefs lockdown is in effect

[PATCH v2] debugfs: fix security_locked_down() call for SELinux
 2021-05-07 12:53 UTC 

[PATCH] debugfs: fix security_locked_down() call for SELinux
 2021-05-07 12:41 UTC  (5+ messages)

[GIT PULL] SafeSetID changes for v5.13
 2021-05-05 20:49 UTC  (2+ messages)

[PATCH 4/4] integrity: Load mokx variables into the blacklist keyring
 2021-05-05 10:00 UTC  (9+ messages)
` [PATCH 0/4] keys: Add EFI_CERT_X509_GUID support for dbx/mokx entries

[syzbot] KCSAN: data-race in assoc_array_apply_edit / search_nested_keyrings
 2021-05-04 17:01 UTC  (3+ messages)

[PATCH v5 00/12] evm: Improve usability of portable signatures
 2021-05-04 14:49 UTC  (24+ messages)
` [PATCH v5 03/12] evm: Refuse EVM_ALLOW_METADATA_WRITES only if an HMAC key is loaded
` [PATCH v5 06/12] evm: Ignore INTEGRITY_NOLABEL/INTEGRITY_NOXATTRS if conditions are safe
` [PATCH v5 07/12] evm: Allow xattr/attr operations for portable signatures
` [PATCH v5 09/12] evm: Allow setxattr() and setattr() for unmodified metadata

[PATCH v7 0/5] Enable root to update the blacklist keyring
 2021-05-04 10:31 UTC  (3+ messages)

[PATCH] KEYS: trusted: fix memory leak
 2021-05-03 14:56 UTC  (4+ messages)

[PATCH] KEYS: trusted: Fix memory leak on object td
 2021-05-03 14:55 UTC  (4+ messages)

[PATCH v4 00/11] evm: Improve usability of portable signatures
 2021-05-03 13:21 UTC  (13+ messages)
` [PATCH v4 04/11] ima: Move ima_reset_appraise_flags() call to post hooks

[PATCH 0/1] trusted-keys: match tpm_get_ops on all return paths
 2021-04-29 19:08 UTC  (5+ messages)
` [PATCH 1/1] "

[PATCH v2] samples/landlock: fix path_list memory leak
 2021-04-29  9:22 UTC  (2+ messages)

[PATCH] samples/landlock: fix path_list memory leak
 2021-04-28 18:04 UTC  (5+ messages)

[PATCH AUTOSEL 5.10 2/4] capabilities: require CAP_SETFCAP to map uid 0
 2021-04-28 11:11 UTC 

[PATCH AUTOSEL 5.11 2/4] capabilities: require CAP_SETFCAP to map uid 0
 2021-04-28 11:11 UTC 

[GIT PULL][Security Subsystem] Fixes for v5.13
 2021-04-28  2:43 UTC  (2+ messages)

[PATCH v4 0/2] Add support for ECDSA-signed kernel modules
 2021-04-27 23:47 UTC  (2+ messages)

[PATCH v3 0/2] Add support for ECDSA-signed kernel modules
 2021-04-27 23:46 UTC  (5+ messages)
` [PATCH v3 1/2] certs: Trigger creation of RSA module signing key if it's not an RSA key
` [PATCH v3 2/2] certs: Add support for using elliptic curve keys for signing modules

[GIT PULL] SELinux patches for v5.13
 2021-04-27 20:54 UTC  (2+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).