linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2021-09-14 03:33:23 to 2021-09-28 09:04:43 UTC [more...]

[PATCH 04/11] ath11: Wstringop-overread warning
 2021-09-28  9:04 UTC  (2+ messages)

[PATCH 0/2] fuse: Send file/inode security context during creation
 2021-09-27 21:45 UTC  (19+ messages)
` [PATCH 1/2] fuse: Add a flag FUSE_SECURITY_CTX
` [PATCH 2/2] fuse: Send security context of inode on file creation

[PATCH v3] KEYS: trusted: Fix trusted key backends when building as module
 2021-09-27 21:31 UTC  (8+ messages)

[PATCH] [RESEND] apparmor: avoid -Wempty-body warning
 2021-09-27 20:32 UTC  (3+ messages)

[PATCH] mm: Remove HARDENED_USERCOPY_FALLBACK
 2021-09-26 20:49 UTC  (4+ messages)

[PATCH v29 00/28] LSM: Module stacking for AppArmor
 2021-09-24 17:54 UTC  (29+ messages)
  ` [PATCH v29 01/28] LSM: Infrastructure management of the sock security
  ` [PATCH v29 02/28] LSM: Add the lsmblob data structure
  ` [PATCH v29 03/28] LSM: provide lsm name and id slot mappings
  ` [PATCH v29 04/28] IMA: avoid label collisions with stacked LSMs
  ` [PATCH v29 05/28] LSM: Use lsmblob in security_audit_rule_match
  ` [PATCH v29 06/28] LSM: Use lsmblob in security_kernel_act_as
  ` [PATCH v29 07/28] LSM: Use lsmblob in security_secctx_to_secid
  ` [PATCH v29 08/28] LSM: Use lsmblob in security_secid_to_secctx
  ` [PATCH v29 09/28] LSM: Use lsmblob in security_ipc_getsecid
  ` [PATCH v29 10/28] LSM: Use lsmblob in security_task_getsecid
  ` [PATCH v29 11/28] LSM: Use lsmblob in security_inode_getsecid
  ` [PATCH v29 12/28] LSM: Use lsmblob in security_cred_getsecid
  ` [PATCH v29 13/28] IMA: Change internal interfaces to use lsmblobs
  ` [PATCH v29 14/28] LSM: Specify which LSM to display
  ` [PATCH v29 15/28] LSM: Ensure the correct LSM context releaser
  ` [PATCH v29 16/28] LSM: Use lsmcontext in security_secid_to_secctx
  ` [PATCH v29 17/28] LSM: Use lsmcontext in security_inode_getsecctx
  ` [PATCH v29 18/28] LSM: security_secid_to_secctx in netlink netfilter
  ` [PATCH v29 19/28] NET: Store LSM netlabel data in a lsmblob
  ` [PATCH v29 20/28] LSM: Verify LSM display sanity in binder
  ` [PATCH v29 21/28] LSM: Extend security_secid_to_secctx to include module selection
  ` [PATCH v29 22/28] Audit: Keep multiple LSM data in audit_names
  ` [PATCH v29 23/28] Audit: Create audit_stamp structure
  ` [PATCH v29 24/28] Audit: Add framework for auxiliary records
  ` [PATCH v29 25/28] Audit: Add record for multiple task security contexts
  ` [PATCH v29 26/28] Audit: Add record for multiple object "
  ` [PATCH v29 27/28] LSM: Add /proc attr entry for full LSM context
  ` [PATCH v29 28/28] AppArmor: Remove the exclusive flag

[GIT PULL] SELinux/Smack fixes for v5.15 (#2)
 2021-09-23 21:42 UTC  (2+ messages)

[PATCH v4] lockdown,selinux: fix wrong subject in some SELinux lockdown checks
 2021-09-23 19:07 UTC  (5+ messages)

[PATCH] selinux,smack: fix subjective/objective credential use mixups
 2021-09-23 19:04 UTC  (4+ messages)

[GIT PULL] SELinux fixes for v5.15 (#1)
 2021-09-23 17:29 UTC  (10+ messages)

[PATCH v2] smack: Guard smack_ipv6_lock definition within a SMACK_IPV6_PORT_LABELING block
 2021-09-23 17:05 UTC 

apparmor: WARNING: suspicious RCU usage
 2021-09-21 21:23 UTC  (2+ messages)

[PATCH v6 00/13] Enroll kernel keys thru MOK
 2021-09-21 21:03 UTC  (28+ messages)
` [PATCH v6 01/13] integrity: Introduce a Linux keyring called machine
` [PATCH v6 02/13] integrity: Do not allow machine keyring updates following init
` [PATCH v6 03/13] KEYS: CA link restriction
` [PATCH v6 04/13] integrity: restrict INTEGRITY_KEYRING_MACHINE to restrict_link_by_ca
` [PATCH v6 05/13] integrity: add new keyring handler for mok keys
` [PATCH v6 06/13] KEYS: Rename get_builtin_and_secondary_restriction
` [PATCH v6 07/13] KEYS: add a reference to machine keyring
` [PATCH v6 08/13] KEYS: Introduce link restriction for machine keys
` [PATCH v6 09/13] KEYS: integrity: change link restriction to trust the machine keyring
` [PATCH v6 10/13] KEYS: link secondary_trusted_keys to machine trusted keys
` [PATCH v6 11/13] integrity: store reference to machine keyring
` [PATCH v6 12/13] integrity: Trust MOK keys if MokListTrustedRT found
` [PATCH v6 13/13] integrity: Only use machine keyring when uefi_check_trust_mok_keys is true

Regression in unix stream sockets with the Smack LSM
 2021-09-20 23:44 UTC  (7+ messages)
      `  "

[PATCH] Revert "Enable '-Werror' by default for all kernel builds"
 2021-09-20 16:26 UTC  (10+ messages)

[PATCH 1/1] Smack:- Use overlay inode label in smack_inode_copy_up()
 2021-09-20 14:55 UTC  (3+ messages)

[PATCH] lsm_audit: avoid overloading the "key" audit field
 2021-09-20  2:49 UTC  (4+ messages)

[PATCH v4 0/8] Add LSM access controls and auditing to io_uring
 2021-09-20  2:44 UTC  (15+ messages)
` [PATCH v4 1/8] audit: prepare audit_context for use in calling contexts beyond syscalls
` [PATCH v4 2/8] audit,io_uring,io-wq: add some basic audit support to io_uring
` [PATCH v4 3/8] audit: add filtering for io_uring records
` [PATCH v4 4/8] fs: add anon_inode_getfile_secure() similar to anon_inode_getfd_secure()
` [PATCH v4 5/8] io_uring: convert io_uring to the secure anon inode interface
` [PATCH v4 6/8] lsm,io_uring: add LSM hooks to io_uring
` [PATCH v4 7/8] selinux: add support for the io_uring access controls
` [PATCH v4 8/8] Smack: Brutalist io_uring support

[PATCH] NET: IPV4: fix error "do not initialise globals to 0"
 2021-09-19 11:50 UTC  (2+ messages)

[PATCH v2] integrity: support including firmware ".platform" keys at build time
 2021-09-18 19:37 UTC  (3+ messages)

[PATCH] ima: fix deadlock when traversing "ima_default_rules"
 2021-09-18  3:11 UTC  (2+ messages)

[selinuxproject-selinux:stable-5.15 1/1] include/linux/rcupdate.h:395:2: warning: passing argument 1 of 'security_locked_down' discards 'const' qualifier from pointer target type
 2021-09-16 14:07 UTC 

[PATCH] smack: Guard smack_ipv6_lock definition within a SMACK_IPV6_PORT_LABELING block
 2021-09-15 22:12 UTC  (2+ messages)

[PATCH v3 0/1] Relax restrictions on user.* xattr
 2021-09-15 16:33 UTC  (15+ messages)

[RFC][PATCH 0/9] integrity: Introduce DIGLIM advanced features
 2021-09-15 16:31 UTC  (10+ messages)
` [RFC][PATCH 1/9] ima: Introduce new hook DIGEST_LIST_CHECK
` [RFC][PATCH 2/9] diglim: Loader
` [RFC][PATCH 3/9] diglim: LSM
` [RFC][PATCH 4/9] diglim: Tests - LSM
` [RFC][PATCH 5/9] diglim: Compact digest list generator
` [RFC][PATCH 6/9] diglim: RPM "
` [RFC][PATCH 7/9] diglim: Digest list uploader
` [RFC][PATCH 8/9] diglim: RPM parser
` [RFC][PATCH 9/9] diglim: Admin guide

[RFC PATCH v2 0/9] Add LSM access controls and auditing to io_uring
 2021-09-15 14:12 UTC  (13+ messages)

[PATCH v2] hardening: Avoid harmless Clang option under CONFIG_INIT_STACK_ALL_ZERO
 2021-09-15  7:50 UTC  (2+ messages)

[PATCH v3 00/13] integrity: Introduce DIGLIM
 2021-09-15  6:54 UTC  (16+ messages)
` [PATCH v3 01/13] diglim: Overview
` [PATCH v3 02/13] diglim: Basic definitions
` [PATCH v3 03/13] diglim: Objects
` [PATCH v3 04/13] diglim: Methods
` [PATCH v3 05/13] diglim: Parser
` [PATCH v3 06/13] diglim: IMA info
` [PATCH v3 07/13] diglim: Interfaces - digest_list_add, digest_list_del
` [PATCH v3 08/13] diglim: Interfaces - digest_lists_loaded
` [PATCH v3 09/13] diglim: Interfaces - digest_list_label
` [PATCH v3 10/13] diglim: Interfaces - digest_query
` [PATCH v3 11/13] diglim: Interfaces - digests_count
` [PATCH v3 12/13] diglim: Remote Attestation
` [PATCH v3 13/13] diglim: Tests

[PATCH] hardening: Default to INIT_STACK_ALL_ZERO if CC_HAS_AUTO_VAR_INIT_ZERO
 2021-09-14 19:36 UTC  (8+ messages)

[syzbot] riscv/fixes boot error: BUG: unable to handle kernel NULL pointer dereference in corrupted
 2021-09-14 10:39 UTC 

[PATCH -next] apparmor: Remove unused inline function label_is_visible()
 2021-09-14  9:53 UTC 

[PATCH v3 0/8] Add LSM access controls and auditing to io_uring
 2021-09-14  3:33 UTC  (6+ messages)
` [PATCH v3 4/8] fs: add anon_inode_getfile_secure() similar to anon_inode_getfd_secure()
` [PATCH v3 5/8] io_uring: convert io_uring to the secure anon inode interface
` [PATCH v3 6/8] lsm,io_uring: add LSM hooks to io_uring
` [PATCH v3 7/8] selinux: add support for the io_uring access controls
` [PATCH v3 8/8] Smack: Brutalist io_uring support with debug


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).