linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2021-05-29 18:48:47 to 2021-06-15 20:40:25 UTC [more...]

[PATCH v2 09/10] apparmor: test: Remove some casts which are no-longer required
 2021-06-15 20:40 UTC  (2+ messages)

[PATCH -next v3] netlabel: Fix memory leak in netlbl_mgmt_add_common
 2021-06-15 20:29 UTC  (3+ messages)

[PATCH] proc: Track /proc/$pid/attr/ opener mm_struct
 2021-06-15 18:19 UTC  (7+ messages)

[PATCH v6 0/4] Add support for ECDSA-signed kernel modules
 2021-06-15 13:29 UTC  (14+ messages)
` [PATCH v6 1/4] certs: Trigger creation of RSA module signing key if it's not an RSA key
` [PATCH v6 2/4] certs: Check whether openssl tool is available
` [PATCH v6 3/4] certs: Add support for using elliptic curve keys for signing modules
` [PATCH v6 4/4] certs: Adjustment due to 'Check whether openssl tool is available'

[PATCH 0/3] DCP as trusted keys backend
 2021-06-14 20:16 UTC  (4+ messages)
` [PATCH 1/3] crypto: mxs-dcp: Add support for hardware provided keys
` [PATCH 2/3] KEYS: trusted: Introduce support for NXP DCP-based trusted keys
` [PATCH 3/3] doc: trusted-encrypted: add DCP as new trust source

[PATCH] security: add LSM hook at the memfd_create point
 2021-06-13 17:25 UTC  (2+ messages)

[PATCH -next v2] netlabel: Fix memory leak in netlbl_mgmt_add_common
 2021-06-11 17:36 UTC  (2+ messages)

[PATCH] audit: remove unnecessary 'ret' initialization
 2021-06-11 17:23 UTC  (2+ messages)

[PATCH v8 0/8] Fork brute force attack mitigation
 2021-06-11 15:41 UTC  (13+ messages)
` [PATCH v8 1/8] security: Add LSM hook at the point where a task gets a fatal signal
` [PATCH v8 2/8] security/brute: Define a LSM and add sysctl attributes
` [PATCH v8 3/8] security/brute: Detect a brute force attack
` [PATCH v8 4/8] security/brute: Mitigate "
` [PATCH v8 5/8] security/brute: Notify to userspace "task killed"
` [PATCH v8 6/8] selftests/brute: Add tests for the Brute LSM
` [PATCH v8 7/8] Documentation: Add documentation "
` [PATCH v8 8/8] MAINTAINERS: Add a new entry "

Size mismatch between vfs_getxattr_alloc() and vfs_getxattr()
 2021-06-11  9:44 UTC 

[PATCH -next] netlabel: Fix memory leak in netlbl_mgmt_add_common
 2021-06-11  4:05 UTC  (6+ messages)

[PATCH v27 00/25] LSM: Module stacking for AppArmor
 2021-06-11  0:04 UTC  (26+ messages)
  ` [PATCH v27 01/25] LSM: Infrastructure management of the sock security
  ` [PATCH v27 02/25] LSM: Add the lsmblob data structure
  ` [PATCH v27 03/25] LSM: provide lsm name and id slot mappings
  ` [PATCH v27 04/25] IMA: avoid label collisions with stacked LSMs
  ` [PATCH v27 05/25] LSM: Use lsmblob in security_audit_rule_match
  ` [PATCH v27 06/25] LSM: Use lsmblob in security_kernel_act_as
  ` [PATCH v27 07/25] LSM: Use lsmblob in security_secctx_to_secid
  ` [PATCH v27 08/25] LSM: Use lsmblob in security_secid_to_secctx
  ` [PATCH v27 09/25] LSM: Use lsmblob in security_ipc_getsecid
  ` [PATCH v27 10/25] LSM: Use lsmblob in security_task_getsecid
  ` [PATCH v27 11/25] LSM: Use lsmblob in security_inode_getsecid
  ` [PATCH v27 12/25] LSM: Use lsmblob in security_cred_getsecid
  ` [PATCH v27 13/25] IMA: Change internal interfaces to use lsmblobs
  ` [PATCH v27 14/25] LSM: Specify which LSM to display
  ` [PATCH v27 15/25] LSM: Ensure the correct LSM context releaser
  ` [PATCH v27 16/25] LSM: Use lsmcontext in security_secid_to_secctx
  ` [PATCH v27 17/25] LSM: Use lsmcontext in security_inode_getsecctx
  ` [PATCH v27 18/25] LSM: security_secid_to_secctx in netlink netfilter
  ` [PATCH v27 19/25] NET: Store LSM netlabel data in a lsmblob
  ` [PATCH v27 20/25] LSM: Verify LSM display sanity in binder
  ` [PATCH v27 21/25] audit: add support for non-syscall auxiliary records
  ` [PATCH v27 22/25] Audit: Add record for multiple process LSM attributes
  ` [PATCH v27 23/25] Audit: Add record for multiple object "
  ` [PATCH v27 24/25] LSM: Add /proc attr entry for full LSM context
  ` [PATCH v27 25/25] AppArmor: Remove the exclusive flag

[PATCH] LSM: SafeSetID: Mark safesetid_initialized as __initdata
 2021-06-10 22:33 UTC  (3+ messages)

ima - wait for tpm load
 2021-06-10 20:31 UTC  (4+ messages)

[PATCH v1] efi: Don't use knowledge about efi_guid_t internals
 2021-06-10 15:05 UTC  (4+ messages)

[PATCH v5 0/2] Add support for ECDSA-signed kernel modules
 2021-06-10 11:50 UTC  (9+ messages)
` [PATCH v5 1/2] certs: Trigger creation of RSA module signing key if it's not an RSA key
` [PATCH v5 2/2] certs: Add support for using elliptic curve keys for signing modules

[PATCH] tpm2_load_command leaks memory
 2021-06-10  9:49 UTC 

[PATCH -next] Yama: fix doc warnings
 2021-06-10  7:49 UTC 

[PATCH -next] tomoyo: fix doc warnings
 2021-06-10  7:49 UTC 

Proposal
 2021-06-09 12:10 UTC 

[RFC PATCH bpf-next seccomp 00/12] eBPF seccomp filters
 2021-06-09  6:32 UTC  (9+ messages)

[RFC PATCH 0/9] Add LSM access controls and auditing to io_uring
 2021-06-09  2:45 UTC  (40+ messages)
` [RFC PATCH 2/9] audit,io_uring,io-wq: add some basic audit support "
  ` [RFC PATCH 2/9] audit, io_uring, io-wq: "
` [RFC PATCH 4/9] audit: add filtering for io_uring records
      ` [PATCH 1/2] audit: add filtering for io_uring records, addendum
      ` [PATCH 2/2] audit: block PERM fields being used with io_uring filtering

[PATCH v2] lockdown,selinux: avoid bogus SELinux lockdown permission checks
 2021-06-09  2:40 UTC  (23+ messages)

[RFC PATCH 0/3] Allow access to confidential computing secret area
 2021-06-08 19:48 UTC  (10+ messages)

[PATCH] net: ipv4: fix memory leak in netlbl_cipsov4_add_std
 2021-06-08 18:40 UTC  (6+ messages)

[PATCH -next] Smack: fix doc warning
 2021-06-08 17:38 UTC  (2+ messages)

[PATCH][next] ima: Fix fall-through warning for Clang
 2021-06-08 17:02 UTC  (2+ messages)

[PATCH 0/2] EVM: add some debugging info
 2021-06-08 16:06 UTC  (4+ messages)
` [PATCH 1/2] ima: differentiate between EVM failures in the audit log
` [PATCH 2/2] evm: output EVM digest calculation info

[PATCH v3 0/6] evm: Prepare for moving to the LSM infrastructure
 2021-06-08 13:02 UTC  (2+ messages)

[PATCH 1/5] doc: Fix warning in Documentation/security/IMA-templates.rst
 2021-06-08 12:31 UTC  (5+ messages)
` [PATCH 2/5] ima: Set correct casting types
` [PATCH 3/5] ima/evm: Fix type mismatch
` [PATCH 4/5] ima: Include header defining ima_post_key_create_or_update()
` [PATCH 5/5] ima: Pass NULL instead of 0 to ima_get_action() in ima_file_mprotect()

[PATCH 00/34] docs: avoid using ReST :doc:`foo` tag
 2021-06-08  7:28 UTC  (10+ messages)
` [PATCH 29/34] docs: security: landlock.rst: avoid using ReSt :doc:`foo` markup
` [PATCH 32/34] docs: userspace-api: "

[PATCH -next] apparmor: fix doc warning
 2021-06-08  6:26 UTC  (2+ messages)

[PATCH -next v2] capability: fix doc warnings in capability.c
 2021-06-08  1:37 UTC 

[PATCH -next] capability: fix doc warnings in capability.c
 2021-06-08  1:14 UTC  (3+ messages)

[PATCH net-next] netlabel: Fix spelling mistakes
 2021-06-07 21:20 UTC  (3+ messages)

[PATCH v2 0/7] ima: Add template fields to verify EVM portable signatures
 2021-06-03 14:30 UTC  (6+ messages)
` [PATCH v2 6/7] ima: Define new template evm-sig
    ` [RESEND][PATCH "

[PATCH] apparmor: Remove the repeated declaration
 2021-06-01 22:48 UTC  (2+ messages)

[PATCH v5 0/2] Add support for ECDSA-signed kernel modules
 2021-06-01 17:58 UTC  (4+ messages)
` [PATCH v5 1/2] certs: Trigger creation of RSA module signing key if it's not an RSA key
` [PATCH v5 2/2] certs: Add support for using elliptic curve keys for signing modules

[PATCH v2 5/7] ima: Define new template fields xattrnames, xattrlengths and xattrvalues
 2021-06-01 16:10 UTC  (3+ messages)
` [RESEND][PATCH "

[RFC PATCH 0/3] Add additional MOK vars
 2021-06-01 15:24 UTC  (9+ messages)

[PATCH v4 0/2] Add support for ECDSA-signed kernel modules
 2021-05-31 16:12 UTC  (5+ messages)
` [PATCH v4 1/2] certs: Trigger creation of RSA module signing key if it's not an RSA key
` [PATCH v4 2/2] certs: Add support for using elliptic curve keys for signing modules


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).