messages from 2021-05-17 13:42:15 to 2021-06-02 15:38:19 UTC [more...]
[RFC PATCH 0/9] Add LSM access controls and auditing to io_uring
2021-06-02 15:37 UTC (56+ messages)
` [RFC PATCH 1/9] audit: prepare audit_context for use in calling contexts beyond syscalls
` [RFC PATCH 2/9] audit,io_uring,io-wq: add some basic audit support to io_uring
` [RFC PATCH 3/9] audit: dev/test patch to force io_uring auditing
` [RFC PATCH 4/9] audit: add filtering for io_uring records
` [PATCH 1/2] audit: add filtering for io_uring records, addendum
` [PATCH 2/2] audit: block PERM fields being used with io_uring filtering
` [RFC PATCH 5/9] fs: add anon_inode_getfile_secure() similar to anon_inode_getfd_secure()
` [RFC PATCH 6/9] io_uring: convert io_uring to the secure anon inode interface
` [RFC PATCH 7/9] lsm,io_uring: add LSM hooks to io_uring
` [RFC PATCH 8/9] selinux: add support for the io_uring access controls
` [RFC PATCH 9/9] Smack: Brutalist io_uring support with debug
[PATCH v2] lockdown,selinux: avoid bogus SELinux lockdown permission checks
2021-06-02 15:13 UTC (25+ messages)
[PATCH v5 0/2] Add support for ECDSA-signed kernel modules
2021-06-02 14:35 UTC (3+ messages)
` [PATCH v5 1/2] certs: Trigger creation of RSA module signing key if it's not an RSA key
` [PATCH v5 2/2] certs: Add support for using elliptic curve keys for signing modules
[PATCH] apparmor: Remove the repeated declaration
2021-06-01 22:48 UTC (2+ messages)
[RFC PATCH bpf-next seccomp 00/12] eBPF seccomp filters
2021-06-01 19:55 UTC (15+ messages)
[PATCH v5 0/2] Add support for ECDSA-signed kernel modules
2021-06-01 17:58 UTC (4+ messages)
` [PATCH v5 1/2] certs: Trigger creation of RSA module signing key if it's not an RSA key
` [PATCH v5 2/2] certs: Add support for using elliptic curve keys for signing modules
[PATCH v2 0/7] ima: Add template fields to verify EVM portable signatures
2021-06-01 16:10 UTC (12+ messages)
` [PATCH v2 1/7] ima: Add ima_show_template_uint() template library function
` [PATCH v2 2/7] ima: Define new template fields iuid and igid
` [PATCH v2 3/7] ima: Define new template field imode
` [PATCH v2 4/7] evm: Verify portable signatures against all protected xattrs
` [PATCH v2 5/7] ima: Define new template fields xattrnames, xattrlengths and xattrvalues
` [RESEND][PATCH "
` [PATCH v2 6/7] ima: Define new template evm-sig
` [PATCH v2 7/7] evm: Don't return an error in evm_write_xattrs() if audit is not enabled
[RFC PATCH 0/3] Add additional MOK vars
2021-06-01 15:24 UTC (15+ messages)
` [RFC PATCH 1/3] keys: Add ability to trust the platform keyring
` [RFC PATCH 2/3] keys: Trust platform keyring if MokTrustPlatform found
` [RFC PATCH 3/3] ima: Enable IMA SB Policy if MokIMAPolicy found
[PATCH v4 0/2] Add support for ECDSA-signed kernel modules
2021-05-31 16:12 UTC (5+ messages)
` [PATCH v4 1/2] certs: Trigger creation of RSA module signing key if it's not an RSA key
` [PATCH v4 2/2] certs: Add support for using elliptic curve keys for signing modules
[PATCH] security: remove unneeded subdir-$(CONFIG_...)
2021-05-28 18:01 UTC
[PATCH] crypto: arm64/gcm - remove Wunused-const-variable ghash_cpu_feature
2021-05-28 13:51 UTC (3+ messages)
[PATCH v26 00/25] LSM: Module stacking for AppArmor
2021-05-26 9:53 UTC (28+ messages)
` [PATCH v26 02/25] LSM: Add the lsmblob data structure
` [PATCH v26 03/25] LSM: provide lsm name and id slot mappings
` [PATCH v26 07/25] LSM: Use lsmblob in security_secctx_to_secid
` [PATCH v26 08/25] LSM: Use lsmblob in security_secid_to_secctx
` [PATCH v26 14/25] LSM: Specify which LSM to display
` [PATCH v26 15/25] LSM: Ensure the correct LSM context releaser
` [PATCH v26 18/25] LSM: security_secid_to_secctx in netlink netfilter
` [PATCH v26 21/25] audit: add support for non-syscall auxiliary records
` [PATCH v26 22/25] Audit: Add new record for multiple process LSM attributes
[PATCH] proc: Check /proc/$pid/attr/ writes against file opener
2021-05-25 21:24 UTC (3+ messages)
[ANNOUNCE][CFP] Linux Security Summit 2021
2021-05-25 16:24 UTC (2+ messages)
[PATCH 0/7] ima: Add template fields to verify EVM portable signatures
2021-05-24 18:31 UTC (13+ messages)
` [PATCH 1/7] ima: Add ima_show_template_uint() template library function
` [PATCH 2/7] ima: Introduce template fields iuid and igid
` [PATCH 3/7] ima: Introduce template fields mntuidmap and mntgidmap
` [PATCH 4/7] ima: Introduce template field imode
` [PATCH 5/7] evm: Verify portable signatures against all protected xattrs
` [PATCH 6/7] ima: Introduce template field evmxattrs
` [PATCH 7/7] evm: Don't return an error in evm_write_xattrs() if audit is not enabled
[RFC PATCH 0/3] Allow access to confidential computing secret area
2021-05-24 17:12 UTC (13+ messages)
[PATCH v7 0/7] Fork brute force attack mitigation
2021-05-23 15:47 UTC (12+ messages)
` [PATCH v7 1/7] security: Add LSM hook at the point where a task gets a fatal signal
` [PATCH v7 2/7] security/brute: Define a LSM and add sysctl attributes
` [PATCH v7 3/7] security/brute: Detect a brute force attack
` [PATCH v7 4/7] security/brute: Mitigate "
` [PATCH v7 5/7] selftests/brute: Add tests for the Brute LSM
` [PATCH v7 6/7] Documentation: Add documentation "
` [PATCH v7 7/7] MAINTAINERS: Add a new entry "
[PATCH v7 00/12] evm: Improve usability of portable signatures
2021-05-21 17:31 UTC (4+ messages)
[PATCH v7 05/12] evm: Introduce evm_hmac_disabled() to safely ignore verification errors
2021-05-20 8:51 UTC (3+ messages)
` [RESEND][PATCH "
[PATCH] vfio: Lock down no-IOMMU mode when kernel is locked down
2021-05-20 8:38 UTC (3+ messages)
[PATCH RESEND v5] proc: Allow pid_revalidate() during LOOKUP_RCU
2021-05-19 20:31 UTC (2+ messages)
[PATCH v2 0/2] vfs/security/NFS/btrfs: clean up and fix LSM option handling
2021-05-19 17:07 UTC (4+ messages)
` [PATCH v2 1/2] vfs,LSM: introduce the FS_HANDLES_LSM_OPTS flag
` [PATCH v2 2/2] selinux: fix SECURITY_LSM_NATIVE_LABELS flag handling on double mount
[PATCH] Revert "Smack: Handle io_uring kernel thread privileges"
2021-05-18 17:40 UTC (2+ messages)
[PATCH 0/2] vfs/security/NFS/btrfs: clean up and fix LSM option handling
2021-05-17 13:46 UTC (4+ messages)
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).