linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2021-08-10 17:36:50 to 2021-08-26 01:34:50 UTC [more...]

[RFC PATCH v2 0/9] Add LSM access controls and auditing to io_uring
 2021-08-26  1:34 UTC  (18+ messages)
` [RFC PATCH v2 1/9] audit: prepare audit_context for use in calling contexts beyond syscalls
` [RFC PATCH v2 2/9] audit,io_uring,io-wq: add some basic audit support to io_uring
` [RFC PATCH v2 3/9] audit: dev/test patch to force io_uring auditing
` [RFC PATCH v2 4/9] audit: add filtering for io_uring records
` [RFC PATCH v2 5/9] fs: add anon_inode_getfile_secure() similar to anon_inode_getfd_secure()
` [RFC PATCH v2 6/9] io_uring: convert io_uring to the secure anon inode interface
` [RFC PATCH v2 7/9] lsm,io_uring: add LSM hooks to io_uring
` [RFC PATCH v2 8/9] selinux: add support for the io_uring access controls
` [RFC PATCH v2 9/9] Smack: Brutalist io_uring support with debug

[PATCH v4 00/12] Enroll kernel keys thru MOK
 2021-08-25 22:27 UTC  (25+ messages)
` [PATCH v4 01/12] integrity: Introduce a Linux keyring for the Machine Owner Key (MOK)
` [PATCH v4 02/12] integrity: Do not allow mok keyring updates following init
` [PATCH v4 03/12] KEYS: CA link restriction
` [PATCH v4 04/12] integrity: restrict INTEGRITY_KEYRING_MOK to restrict_link_by_ca
` [PATCH v4 05/12] integrity: add new keyring handler for mok keys
` [PATCH v4 06/12] KEYS: add a reference to mok keyring
` [PATCH v4 07/12] KEYS: Introduce link restriction to include builtin, secondary and mok keys
` [PATCH v4 08/12] KEYS: integrity: change link restriction to trust the mok keyring
` [PATCH v4 09/12] KEYS: link secondary_trusted_keys to mok trusted keys
` [PATCH v4 10/12] integrity: store reference to mok keyring
` [PATCH v4 11/12] integrity: Trust MOK keys if MokListTrustedRT found
` [PATCH v4 12/12] integrity: Only use mok keyring when uefi_check_trust_mok_keys is true

There is an interesting conversation going on about virtiofsd and SELinux
 2021-08-25 22:12 UTC  (3+ messages)

[RFC PATCH 0/9] Add LSM access controls and auditing to io_uring
 2021-08-25 19:41 UTC  (6+ messages)
` [RFC PATCH 2/9] audit,io_uring,io-wq: add some basic audit support "
  ` [RFC PATCH 2/9] audit, io_uring, io-wq: "

[syzbot] KASAN: use-after-free Read in netlbl_catmap_walk
 2021-08-25 18:41 UTC  (3+ messages)

[PATCH] ima: fix infinite loop within "ima_match_policy" function
 2021-08-25 12:03 UTC  (25+ messages)
` [PATCH] ima: fix deadlock "
        ` [PATCH] ima: fix deadlock within RCU list of ima_rules

[PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
 2021-08-25  9:34 UTC  (20+ messages)
` [PATCH 3/4] crypto: caam - add in-kernel interface for blob generator

[PATCH v28 00/25] LSM: Module stacking for AppArmor
 2021-08-24 16:14 UTC  (19+ messages)
` [PATCH v28 22/25] Audit: Add record for multiple process LSM attributes

[PATCH] security: remove unneeded subdir-$(CONFIG_...)
 2021-08-24  9:27 UTC  (3+ messages)

Writes to /proc/self/mem and file_mprotect() LSM hook
 2021-08-24  9:25 UTC 

[PATCH 0/3] Allow access to confidential computing secret area in SEV guests
 2021-08-23 19:21 UTC  (7+ messages)
` [PATCH 3/3] virt: Add sev_secret module to expose confidential computing secrets

[PATCH bpf-next RFC v1 0/5] Implement file local storage
 2021-08-21 18:48 UTC  (6+ messages)
` [PATCH bpf-next RFC v1 1/5] bpf: "
` [PATCH bpf-next RFC v1 2/5] tools: sync bpf.h header
` [PATCH bpf-next RFC v1 3/5] libbpf: Add bpf_probe_map_type support for file local storage
` [PATCH bpf-next RFC v1 4/5] tools: bpf: update bpftool for file_storage map
` [PATCH bpf-next RFC v1 5/5] tools: testing: Add selftest for file local storage map

[PATCH v5 0/1] NAX (No Anonymous Execution) LSM
 2021-08-21  9:47 UTC  (2+ messages)
` [PATCH v5 1/1] NAX LSM: Add initial support

[PATCH v4 0/1] NAX (No Anonymous Execution) LSM
 2021-08-21  5:22 UTC  (3+ messages)
` [PATCH v4 1/1] NAX LSM: Add initial support

[PATCH v3 0/1] NAX (No Anonymous Execution) LSM
 2021-08-20 13:35 UTC  (4+ messages)
` [PATCH v3 1/1] NAX LSM: Add initial support

[syzbot] UBSAN: array-index-out-of-bounds in ima_inode_setxattr
 2021-08-19 15:30 UTC 

[PATCH v4 0/4] Add Landlock man pages
 2021-08-18 15:59 UTC  (5+ messages)
` [PATCH v4 1/4] landlock.7: Add a new page to introduce Landlock
` [PATCH v4 2/4] landlock_create_ruleset.2: Document new syscall
` [PATCH v4 3/4] landlock_add_rule.2: "
` [PATCH v4 4/4] landlock_restrict_self.2: "

[PATCH v2] fscrypt: support trusted keys
 2021-08-18  4:53 UTC  (22+ messages)

[PATCH 1/1] ima: check control characters in policy file path
 2021-08-17 17:45 UTC  (2+ messages)

[PATCH v2 1/1] NAX LSM: Add initial support support
 2021-08-17  8:47 UTC 

[PATCH 1/1] NAX LSM: Add initial support support
 2021-08-16  7:39 UTC  (14+ messages)

apparmor: global buffers spin lock may get contended
 2021-08-15  9:47 UTC  (2+ messages)

[PATCH 0/1] ima: check control characters in policy path
 2021-08-14 12:47 UTC  (2+ messages)

[PATCH v3 00/14] Enroll kernel keys thru MOK
 2021-08-13 18:26 UTC  (26+ messages)
` [PATCH v3 01/14] integrity: Introduce a Linux keyring for the Machine Owner Key (MOK)
` [PATCH v3 02/14] KEYS: CA link restriction
` [PATCH v3 03/14] integrity: Trust MOK keys if MokListTrustedRT found
` [PATCH v3 04/14] integrity: add add_to_mok_keyring
` [PATCH v3 05/14] integrity: restrict INTEGRITY_KEYRING_MOK to restrict_link_by_ca
` [PATCH v3 06/14] integrity: accessor function to get trust_moklist
` [PATCH v3 07/14] integrity: add new keyring handler for mok keys
` [PATCH v3 08/14] KEYS: add a reference to mok keyring
` [PATCH v3 09/14] KEYS: Introduce link restriction to include builtin, secondary and mok keys
` [PATCH v3 10/14] KEYS: change link restriction for secondary to also trust mok
` [PATCH v3 11/14] KEYS: link secondary_trusted_keys to mok trusted keys
` [PATCH v3 12/14] integrity: Do not allow mok keyring updates following init
` [PATCH v3 13/14] integrity: store reference to mok keyring
` [PATCH v3 14/14] integrity: change ima link restriction to include mok keys

[PATCH v4 0/2] ibmvtpm: Avoid error message when process gets signal while waiting
 2021-08-12 19:48 UTC  (7+ messages)
` [PATCH v4 2/2] tpm: ibmvtpm: Rename tpm_process_cmd to tpm_status and define flag

Documenting the requirement of CAP_SETFCAP to map UID 0
 2021-08-11 10:10 UTC  (3+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).