linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2021-10-11 23:11:07 to 2021-10-28 09:08:31 UTC [more...]

[PATCH v3 00/13] integrity: Introduce DIGLIM
 2021-10-28  9:08 UTC  (2+ messages)

[PATCH v3 0/2] use SM3 instead of SM3_256
 2021-10-28  6:44 UTC  (5+ messages)
` [PATCH v3 1/2] crypto: "
` [PATCH v3 2/2] tpm: "

[RFC PATCH v7 00/16] Integrity Policy Enforcement (IPE)
 2021-10-28  3:48 UTC  (41+ messages)
` [RFC PATCH v7 01/16] security: add ipe lsm & initial context creation
` [RFC PATCH v7 02/16] ipe: add policy parser
` [RFC PATCH v7 03/16] ipe: add evaluation loop
` [RFC PATCH v7 04/16] ipe: add userspace interface
` [RFC PATCH v7 05/16] ipe: add LSM hooks on execution and kernel read
` [RFC PATCH v7 06/16] uapi|audit: add trust audit message definitions
` [RFC PATCH v7 07/16] ipe: add auditing support
` [RFC PATCH v7 08/16] ipe: add permissive toggle
` [RFC PATCH v7 09/16] ipe: introduce 'boot_verified' as a trust provider
` [RFC PATCH v7 10/16] fs|dm-verity: add block_dev LSM blob and submit dm-verity data
` [RFC PATCH v7 11/16] ipe: add support for dm-verity as a trust provider
` [RFC PATCH v7 12/16] fsverity|security: add security hooks to fsverity digest and signature
` [RFC PATCH v7 13/16] ipe: enable support for fs-verity as a trust provider
` [RFC PATCH v7 14/16] scripts: add boot policy generation program
` [RFC PATCH v7 15/16] ipe: kunit tests
` [RFC PATCH v7 16/16] documentation: add ipe documentation

[PATCH] ima/evm: mark evm_fixmode as __ro_after_init
 2021-10-28  1:48 UTC  (3+ messages)

[PATCH net 0/4] security: fixups for the security hooks in sctp
 2021-10-27 14:41 UTC  (21+ messages)
` [PATCH net 1/4] security: pass asoc to sctp_assoc_request and sctp_sk_clone
` [PATCH net 2/4] security: call security_sctp_assoc_request in sctp_sf_do_5_1D_ce
` [PATCH net 3/4] security: add sctp_assoc_established hook
` [PATCH net 4/4] security: implement sctp_assoc_established hook in selinux

[PATCH v2 0/2] fuse: Send file/inode security context during creation
 2021-10-25 15:55 UTC  (9+ messages)
` [PATCH v2 1/2] fuse: Add a flag FUSE_SECURITY_CTX
` [PATCH v2 2/2] fuse: Send security context of inode on file creation

lsm-stacking: fix broken lsm audit
 2021-10-25 15:01 UTC  (4+ messages)

[PATCH] sctp: initialize endpoint LSM labels also on the client side
 2021-10-25  7:55 UTC  (5+ messages)

[PATCH v2 0/2] use SM3 instead of SM3_256
 2021-10-25  3:04 UTC  (5+ messages)
` [PATCH v2 1/2] crypto: "
` [PATCH v2 2/2] tpm: "

kernel panic: smack: Failed to initialize cipso DOI
 2021-10-22 18:03 UTC  (4+ messages)
  ` [PATCH] smackfs: use __GFP_NOFAIL for smk_cipso_doi()

[syzbot] KASAN: use-after-free Read in cipso_v4_doi_add
 2021-10-22 18:02 UTC  (3+ messages)
` [PATCH] smackfs: use netlbl_cfg_cipsov4_del() for deleting cipso_v4_doi

[PATCH v3] integrity: support including firmware ".platform" keys at build time
 2021-10-22 17:31 UTC  (3+ messages)

[PATCH 0/2] gcc-plugins: Explicitly document purpose and deprecation schedule
 2021-10-21 10:28 UTC  (13+ messages)
` [PATCH 1/2] "
` [PATCH 2/2] gcc-plugins: Remove cyc_complexity

[PATCH v4 0/3] Allow guest access to EFI confidential computing secret area
 2021-10-20 13:59 UTC  (13+ messages)
` [PATCH v4 1/3] efi/libstub: Copy "
` [PATCH v4 2/3] efi: Reserve "
` [PATCH v4 3/3] virt: Add efi_secret module to expose confidential computing secrets

[PATCH v2] security: Return xattr name from security_dentry_init_security()
 2021-10-20 12:31 UTC  (7+ messages)

[PATCH 0/2] tpm: use SM3 instead of SM3_256
 2021-10-20 12:01 UTC  (18+ messages)
` [PATCH 1/2] crypto: "
` [PATCH 2/2] tpm: "

[PATCH v3 0/3] Allow guest access to EFI confidential computing secret area
 2021-10-20  6:51 UTC  (6+ messages)
` [PATCH v3 1/3] efi/libstub: Copy "
` [PATCH v3 2/3] efi: Reserve "
` [PATCH v3 3/3] virt: Add efi_secret module to expose confidential computing secrets

[PATCH] Fixing returning a userspace address for return value
 2021-10-19 19:53 UTC  (2+ messages)

[PATCH] security/landlock: use square brackets around "landlock-ruleset"
 2021-10-15 11:47 UTC  (9+ messages)

[PATCH v5 0/3] binder: use cred instead of task for security context
 2021-10-14 21:40 UTC  (7+ messages)
` [PATCH v5 1/3] binder: use euid from cred instead of using task
` [PATCH v5 2/3] binder: use cred instead of task for selinux checks
` [PATCH v5 3/3] binder: use cred instead of task for getsecid

[PATCH] LSM: Avoid warnings about potentially unused hook variables
 2021-10-14 20:10 UTC  (4+ messages)

[PATCH v1 1/3] ima: define ima_trusted_for hook
 2021-10-14 13:01 UTC  (3+ messages)
` [PATCH v1 2/3] fs: extend the trusted_for syscall to call IMA
` [PATCH v1 3/3] security: define a trusted_for hook

[PATCH 1/2] ima: define ima_trusted_for hook
 2021-10-13 17:24 UTC  (6+ messages)
` [PATCH 2/2] fs: extend the trusted_for syscall to call IMA

[linux-next:master 1997/7806] include/linux/lsm_hook_defs.h:408:18: error: 'uring_sqpoll_default' defined but not used
 2021-10-13 17:23 UTC  (3+ messages)

[PATCH v15 0/3] Add trusted_for(2) (was O_MAYEXEC)
 2021-10-12 19:24 UTC  (4+ messages)
` [PATCH v15 1/3] fs: Add trusted_for(2) syscall implementation and related sysctl
` [PATCH v15 2/3] arch: Wire up trusted_for(2)
` [PATCH v15 3/3] selftest/interpreter: Add tests for trusted_for(2) policies

[PATCH v2 0/2] vfs/security/NFS/btrfs: clean up and fix LSM option handling
 2021-10-12 19:21 UTC  (4+ messages)
` [PATCH v2 1/2] vfs,LSM: introduce the FS_HANDLES_LSM_OPTS flag

[PATCH v4 0/3] binder: use cred instead of task for security context
 2021-10-12 16:52 UTC  (14+ messages)
` [PATCH v4 2/3] binder: use cred instead of task for getsecid
` [PATCH v4 3/3] binder: use euid from cred instead of using task

[PATCH smack] smack: remove duplicated hook function
 2021-10-12 15:26 UTC  (4+ messages)

[PATCH] LSM: general protection fault in legacy_parse_param
 2021-10-12 14:27 UTC  (3+ messages)

[PATCH -next] integrity: return early if audit_log_start return NULL
 2021-10-12 14:15 UTC  (2+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).