linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2022-01-15 19:13:24 to 2022-01-26 14:16:14 UTC [more...]

[RFC PATCH 0/2] landlock network implementation cover letter
 2022-01-26 14:15 UTC  (6+ messages)
` [RFC PATCH 1/2] landlock: TCP network hooks implementation
` [RFC PATCH 2/2] landlock: selftests for bind and connect hooks

[PATCH v9 00/23] ima: Namespace IMA with audit support in IMA-ns
 2022-01-26 14:03 UTC  (39+ messages)
` [PATCH v9 01/23] ima: Remove ima_policy file before directory
` [PATCH v9 02/23] ima: Do not print policy rule with inactive LSM labels
` [PATCH v9 03/23] securityfs: rework dentry creation
` [PATCH v9 04/23] securityfs: Extend securityfs with namespacing support
` [PATCH v9 05/23] ima: Define ima_namespace struct and start moving variables into it
` [PATCH v9 06/23] ima: Move arch_policy_entry into ima_namespace
` [PATCH v9 07/23] ima: Move ima_htable "
` [PATCH v9 08/23] ima: Move measurement list related variables "
` [PATCH v9 09/23] ima: Move some IMA policy and filesystem "
` [PATCH v9 10/23] ima: Move IMA securityfs files into ima_namespace or onto stack
` [PATCH v9 11/23] ima: Move ima_lsm_policy_notifier into ima_namespace
` [PATCH v9 12/23] ima: Define mac_admin_ns_capable() as a wrapper for ns_capable()
` [PATCH v9 13/23] ima: Only accept AUDIT rules for non-init_ima_ns namespaces for now
` [PATCH v9 14/23] userns: Add pointer to ima_namespace to user_namespace
` [PATCH v9 15/23] ima: Implement hierarchical processing of file accesses
` [PATCH v9 16/23] ima: Implement ima_free_policy_rules() for freeing of an ima_namespace
` [PATCH v9 17/23] ima: Add functions for creating and "
` [PATCH v9 18/23] integrity/ima: Define ns_status for storing namespaced iint data
` [PATCH v9 19/23] ima: Namespace audit status flags
` [PATCH v9 20/23] ima: Setup securityfs for IMA namespace
` [PATCH v9 21/23] ima: Introduce securityfs file to activate an "
` [PATCH v9 22/23] ima: Show owning user namespace's uid and gid when displaying policy
` [PATCH v9 23/23] ima: Enable IMA namespaces

[PATCH v10 0/8] Enroll kernel keys thru MOK
 2022-01-26 13:58 UTC  (11+ messages)
` [PATCH v10 1/8] integrity: Fix warning about missing prototypes
` [PATCH v10 2/8] integrity: Introduce a Linux keyring called machine
` [PATCH v10 3/8] integrity: add new keyring handler for mok keys
` [PATCH v10 4/8] KEYS: store reference to machine keyring
` [PATCH v10 5/8] KEYS: Introduce link restriction for machine keys
` [PATCH v10 6/8] efi/mokvar: move up init order
` [PATCH v10 7/8] integrity: Trust MOK keys if MokListTrustedRT found
` [PATCH v10 8/8] integrity: Only use machine keyring when uefi_check_trust_mok_keys is true

[PATCH v2 00/11] lib/string_helpers: Add a few string helpers
 2022-01-26 12:15 UTC  (16+ messages)
` [PATCH v2 01/11] lib/string_helpers: Consolidate string helpers implementation
` [PATCH v2 02/11] drm/i915: Fix trailing semicolon
` [PATCH v2 03/11] drm/i915: Use str_yes_no()
` [PATCH v2 04/11] drm/i915: Use str_enable_disable()
` [PATCH v2 05/11] drm/i915: Use str_enabled_disabled()
` [PATCH v2 06/11] drm/i915: Use str_on_off()
` [PATCH v2 07/11] drm/amd/display: Use str_yes_no()
` [PATCH v2 08/11] drm/gem: Sort includes alphabetically
` [PATCH v2 09/11] drm: Convert open-coded yes/no strings to yesno()
    ` [Intel-gfx] "
` [PATCH v2 10/11] tomoyo: Use str_yes_no()
` [PATCH v2 11/11] cxgb4: "

[PATCH][next] apparmor: Use struct_size() helper in kmalloc()
 2022-01-26  9:30 UTC  (2+ messages)

[PATCH 0/3] lib/string_helpers: Add a few string helpers
 2022-01-26  9:05 UTC  (30+ messages)
` [PATCH 1/3] lib/string_helpers: Consolidate yesno() implementation
      ` [Intel-gfx] "
` [PATCH 2/3] lib/string_helpers: Add helpers for enable[d]/disable[d]
` [PATCH 3/3] drm: Convert open yes/no strings to yesno()
      ` [Intel-gfx] [PATCH 0/3] lib/string_helpers: Add a few string helpers

[PATCH] LSM: general protection fault in legacy_parse_param
 2022-01-26  7:24 UTC  (7+ messages)

"kernel NULL pointer dereference" crash when attempting a write
 2022-01-26  6:03 UTC  (7+ messages)

[PATCH v5 0/6] KEXEC_SIG with appended signature
 2022-01-25 20:30 UTC  (10+ messages)
` [PATCH v5 3/6] kexec_file: Don't opencode appended signature verification
` [PATCH v5 4/6] module: strip the signature marker in the verification function
` [PATCH v5 5/6] module: Use key_being_used_for for log messages in verify_appended_signature
` [PATCH v5 6/6] module: Move duplicate mod_check_sig users code to mod_parse_sig

[PATCH v4 0/6] KEXEC_SIG with appended signature
 2022-01-25 19:50 UTC  (3+ messages)
` [PATCH v4 1/6] s390/kexec_file: Don't opencode appended signature check

[RFC PATCH] mm: create security context for memfd_secret inodes
 2022-01-25 14:33 UTC 

Prezentacja
 2022-01-25  8:57 UTC 

Wycena paneli fotowoltaicznych
 2022-01-25  8:55 UTC 

Custom LSM: getting a null pointer dereference when trying to access a task security blob
 2022-01-24 21:51 UTC  (6+ messages)

[RFC PATCH v3 0/2] Add capabilities file to sysfs
 2022-01-21  8:58 UTC  (8+ messages)
` [RFC PATCH v3 1/2] capability: Add cap_string
` [RFC PATCH v3 2/2] security/inode.c: Add capabilities file

[PATCH V2 00/10] selftests: Fix separate output directory builds
 2022-01-20 18:20 UTC  (15+ messages)
` [PATCH V2 01/10] selftests: set the BUILD variable to absolute path
` [PATCH V2 02/10] selftests: Add and export a kernel uapi headers path
` [PATCH V2 03/10] selftests: Correct the headers install path
` [PATCH V2 04/10] selftests: futex: Add the uapi headers include variable
` [PATCH V2 05/10] selftests: kvm: "
` [PATCH V2 06/10] selftests: landlock: "
` [PATCH V2 07/10] selftests: net: "
` [PATCH V2 08/10] selftests: mptcp: "
` [PATCH V2 09/10] selftests: vm: "
` [PATCH V2 10/10] selftests: vm: remove dependecy from internal kernel macros

[PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
 2022-01-20 17:13 UTC  (13+ messages)

[PATCH v8 00/19] ima: Namespace IMA with audit support in IMA-ns
 2022-01-19 13:32 UTC  (27+ messages)
` [PATCH v8 03/19] ima: Move policy related variables into ima_namespace
` [PATCH v8 05/19] ima: Move measurement list "
` [PATCH v8 07/19] ima: Move dentry into ima_namespace and others onto stack
` [PATCH v8 10/19] ima: Implement hierarchical processing of file accesses
` [PATCH v8 18/19] ima: Show owning user namespace's uid and gid when displaying policy
` [PATCH v8 19/19] ima: Enable IMA namespaces

[PATCH 00/10] selftests: Fix separate output directory builds
 2022-01-19  8:22 UTC  (16+ messages)
` [PATCH 01/10] selftests: set the BUILD variable to absolute path
` [PATCH 02/10] selftests: Add and export a kernel uapi headers path
` [PATCH 03/10] selftests: Correct the headers install path
` [PATCH 04/10] selftests: futex: Add the uapi headers include variable
` [PATCH 05/10] selftests: kvm: "
` [PATCH 06/10] selftests: landlock: "
` [PATCH 07/10] selftests: net: "
` [PATCH 08/10] selftests: mptcp: "
` [PATCH 09/10] selftests: vm: "
` [PATCH 10/10] selftests: vm: remove dependecy from internal kernel macros

[PATCH] MAINTAINERS: add missing "security/integrity" directory
 2022-01-19  7:35 UTC  (2+ messages)

[PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
 2022-01-18 18:26 UTC 

[PATCH v9 0/8] Enroll kernel keys thru MOK
 2022-01-18 16:32 UTC  (15+ messages)
` [PATCH v9 2/8] integrity: Introduce a Linux keyring called machine

Why is there an alignment from cred->security?
 2022-01-18 15:01 UTC  (2+ messages)

[PATCH] integrity: check the return value of audit_log_start()
 2022-01-17 22:58 UTC  (3+ messages)

[RFC PATCH v1 0/2] Add capabilities file to sysfs
 2022-01-17 14:14 UTC  (4+ messages)
` [RFC PATCH v1 1/2] capability: Add cap_strings

[RFC PATCH v2 0/2] Add capabilities file to sysfs
 2022-01-17 14:12 UTC  (3+ messages)
` [RFC PATCH v2 1/2] capability: Add cap_strings
` [RFC PATCH v2 2/2] kernel/ksysfs.c: Add capabilities attribute


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).