linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2022-05-19 08:58:19 to 2022-06-09 23:46:40 UTC [more...]

[PATCH linux-next] security: Fix side effects of default BPF LSM hooks
 2022-06-09 23:46 UTC 

[PATCH v36 00/33] LSM: Module stacking for AppArmor
 2022-06-09 23:01 UTC  (34+ messages)
  ` [PATCH v36 01/33] integrity: disassociate ima_filter_rule from security_audit_rule
  ` [PATCH v36 02/33] LSM: Infrastructure management of the sock security
  ` [PATCH v36 03/33] LSM: Add the lsmblob data structure
  ` [PATCH v36 04/33] LSM: provide lsm name and id slot mappings
  ` [PATCH v36 05/33] IMA: avoid label collisions with stacked LSMs
  ` [PATCH v36 06/33] LSM: Use lsmblob in security_audit_rule_match
  ` [PATCH v36 07/33] LSM: Use lsmblob in security_kernel_act_as
  ` [PATCH v36 08/33] LSM: Use lsmblob in security_secctx_to_secid
  ` [PATCH v36 09/33] LSM: Use lsmblob in security_secid_to_secctx
  ` [PATCH v36 10/33] LSM: Use lsmblob in security_ipc_getsecid
  ` [PATCH v36 11/33] LSM: Use lsmblob in security_current_getsecid
  ` [PATCH v36 12/33] LSM: Use lsmblob in security_inode_getsecid
  ` [PATCH v36 13/33] LSM: Use lsmblob in security_cred_getsecid
  ` [PATCH v36 14/33] LSM: Specify which LSM to display
  ` [PATCH v36 15/33] LSM: Ensure the correct LSM context releaser
  ` [PATCH v36 16/33] LSM: Use lsmcontext in security_secid_to_secctx
  ` [PATCH v36 17/33] LSM: Use lsmcontext in security_inode_getsecctx
  ` [PATCH v36 18/33] LSM: Use lsmcontext in security_dentry_init_security
  ` [PATCH v36 19/33] LSM: security_secid_to_secctx in netlink netfilter
  ` [PATCH v36 20/33] NET: Store LSM netlabel data in a lsmblob
  ` [PATCH v36 21/33] binder: Pass LSM identifier for confirmation
  ` [PATCH v36 22/33] LSM: Extend security_secid_to_secctx to include module selection
  ` [PATCH v36 23/33] Audit: Keep multiple LSM data in audit_names
  ` [PATCH v36 24/33] Audit: Create audit_stamp structure
  ` [PATCH v36 25/33] LSM: Add a function to report multiple LSMs
  ` [PATCH v36 26/33] Audit: Allow multiple records in an audit_buffer
  ` [PATCH v36 27/33] Audit: Add record for multiple task security contexts
  ` [PATCH v36 28/33] audit: multiple subject lsm values for netlabel
  ` [PATCH v36 29/33] Audit: Add record for multiple object contexts
  ` [PATCH v36 30/33] netlabel: Use a struct lsmblob in audit data
  ` [PATCH v36 31/33] LSM: Removed scaffolding function lsmcontext_init
  ` [PATCH v36 32/33] LSM: Add /proc attr entry for full LSM context
  ` [PATCH v36 33/33] AppArmor: Remove the exclusive flag

[PATCH v3] cred: Propagate security_prepare_creds() error code
 2022-06-09 23:18 UTC  (2+ messages)

[PATCH v8 2/4] kexec, KEYS: make the code in bzImage64_verify_sig generic
 2022-06-09 23:15 UTC  (10+ messages)
` [PATCH v8 3/4] arm64: kexec_file: use more system keyrings to verify kernel image signature
` [PATCH v8 4/4] kexec, KEYS, s390: Make use of built-in and secondary keyring for signature verification

[PATCH v12 00/26] ima: Namespace IMA with audit support in IMA-ns
 2022-06-09 14:27 UTC  (57+ messages)
` [PATCH v12 01/26] securityfs: rework dentry creation
` [PATCH v12 02/26] securityfs: Extend securityfs with namespacing support
` [PATCH v12 03/26] ima: Define ima_namespace struct and start moving variables into it
` [PATCH v12 04/26] ima: Move arch_policy_entry into ima_namespace
` [PATCH v12 05/26] ima: Move ima_htable "
` [PATCH v12 06/26] ima: Move measurement list related variables "
` [PATCH v12 07/26] ima: Move some IMA policy and filesystem "
` [PATCH v12 08/26] ima: Move IMA securityfs files into ima_namespace or onto stack
` [PATCH v12 09/26] ima: Move ima_lsm_policy_notifier into ima_namespace
` [PATCH v12 10/26] ima: Switch to lazy lsm policy updates for better performance
` [PATCH v12 11/26] ima: Define mac_admin_ns_capable() as a wrapper for ns_capable()
` [PATCH v12 12/26] ima: Only accept AUDIT rules for non-init_ima_ns namespaces for now
` [PATCH v12 13/26] userns: Add pointer to ima_namespace to user_namespace
` [PATCH v12 14/26] ima: Implement hierarchical processing of file accesses
` [PATCH v12 15/26] ima: Implement ima_free_policy_rules() for freeing of an ima_namespace
` [PATCH v12 16/26] ima: Add functions for creating and "
` [PATCH v12 21/26] ima: Setup securityfs for IMA namespace
` [PATCH v12 23/26] ima: Show owning user namespace's uid and gid when displaying policy

[PATCH -next] ima: Use if/else statement in init_ima()
 2022-06-09 13:58 UTC 

[PATCH v4 0/3] initramfs: add support for xattrs in the initial ram disk
 2022-06-09 11:05 UTC  (11+ messages)

[PATCH v2] KEYS: trusted: Fix memory leak in tpm2_key_encode()
 2022-06-09  5:28 UTC  (5+ messages)

[RFC PATCH v8 00/17] Integrity Policy Enforcement LSM (IPE)
 2022-06-08 22:28 UTC  (22+ messages)
` [RFC PATCH v8 01/17] security: add ipe lsm & initial context creation
` [RFC PATCH v8 02/17] ipe: add policy parser
` [RFC PATCH v8 03/17] ipe: add evaluation loop
` [RFC PATCH v8 04/17] ipe: add userspace interface
` [RFC PATCH v8 05/17] ipe: add LSM hooks on execution and kernel read
` [RFC PATCH v8 06/17] uapi|audit: add ipe audit message definitions
` [RFC PATCH v8 07/17] ipe: add auditing support
` [RFC PATCH v8 08/17] ipe: add permissive toggle
` [RFC PATCH v8 09/17] ipe: introduce 'boot_verified' as a trust provider
` [RFC PATCH v8 10/17] block|security: add LSM blob to block_device
` [RFC PATCH v8 11/17] dm-verity: consume root hash digest and signature data via LSM hook
` [RFC PATCH v8 12/17] ipe: add support for dm-verity as a trust provider
` [RFC PATCH v8 13/17] fsverity: consume builtin signature via LSM hook
` [RFC PATCH v8 14/17] ipe: enable support for fs-verity as a trust provider
` [RFC PATCH v8 15/17] scripts: add boot policy generation program
` [RFC PATCH v8 16/17] ipe: kunit tests
` [RFC PATCH v8 17/17] documentation: add ipe documentation

Researchers are finding
 2022-06-08 20:14 UTC 

[GIT PULL] tpmdd updates for v5.19-rc2-v2
 2022-06-08 16:27 UTC  (2+ messages)

[PATCH v2] KEYS: trusted: Fix memory leak in tpm2_key_encode()
 2022-06-08 14:35 UTC 

[GIT PULL] tpmdd updates for v5.19-rc2
 2022-06-08 11:06 UTC  (2+ messages)

Napływ Klientów ze strony
 2022-06-08  8:15 UTC 

[PATCH] security:trusted_tpm2: Fix memory leak in tpm2_key_encode()
 2022-06-08  8:29 UTC  (3+ messages)

[PATCH v2] KEYS: trusted: tpm2: Fix migratable logic
 2022-06-08  5:47 UTC  (3+ messages)

[RFC PATCH] mm: create security context for memfd_secret inodes
 2022-06-07 20:10 UTC  (6+ messages)

[RESEND PATCH] smack: Replace kzalloc + strncpy with kstrndup
 2022-06-07 19:18 UTC  (2+ messages)

Sending vendor specific commands to spi-nor flash
 2022-06-07 13:50 UTC  (2+ messages)

[PATCH] smack: Replace kzalloc + strncpy with kstrndup
 2022-06-07 13:47 UTC 

[PATCH] security:trusted_tpm2: Fix memory leak in tpm2_key_encode()
 2022-06-07 10:09 UTC  (3+ messages)

[PATCH -next] evm: Use IS_ENABLED to initialize .enabled
 2022-06-07  6:06 UTC  (2+ messages)

Linux 5.18-rc4
 2022-06-06 21:00 UTC  (6+ messages)

[PATCH] Carry forward IMA measurement log on kexec on x86_64
 2022-06-06  4:06 UTC  (9+ messages)
` [PATCH v2] "
  ` [PATCH v3] x86/kexec: Carry forward IMA measurement log on kexec
    ` [PATCH v4] "

[PATCH 1/1] security: avoid a leak in securityfs_remove()
 2022-06-02  7:29 UTC 

Koszty instalacji fotowoltaicznej
 2022-06-01  7:45 UTC 

[PATCH v2] cred: Propagate security_prepare_creds() error code
 2022-05-28  1:37 UTC  (4+ messages)

[PATCH 00/30] security, efi: Add kernel lockdown
 2022-05-28  0:11 UTC  (4+ messages)
` [PATCH 18/30] acpi: Disable APEI error injection if the kernel is locked down

[PATCH -next] Revert "evm: Fix memleak in init_desc"
 2022-05-27 11:17 UTC 

Hello Sir, I seek your urgent consideration
 2022-05-24  9:25 UTC 

[PATCH v5 00/15] Network support for Landlock
 2022-05-25  9:41 UTC  (40+ messages)
` [PATCH v5 05/15] landlock: landlock_add_rule syscall refactoring
` [PATCH v5 07/15] landlock: add support network rules
` [PATCH v5 08/15] landlock: TCP network hooks implementation
` [PATCH v5 09/15] seltests/landlock: add tests for bind() hooks
` [PATCH v5 11/15] seltests/landlock: connect() with AF_UNSPEC tests
` [PATCH v5 12/15] seltests/landlock: rules overlapping test
` [PATCH v5 15/15] samples/landlock: adds network demo
` [PATCH v5 00/15] Network support for Landlock - UDP discussion

[GIT PULL] SELinux patches for v5.19
 2022-05-24 20:26 UTC  (2+ messages)

[GIT PULL] Smack patches for v5.19
 2022-05-24 20:26 UTC  (2+ messages)

[GIT PULL] Landlock changes for v5.19
 2022-05-24 20:26 UTC  (2+ messages)

[GIT PULL] TPM DEVICE DRIVER updates for v5.19-rc1
 2022-05-24 20:26 UTC  (2+ messages)

Napływ Klientów ze strony
 2022-05-24  8:00 UTC 

[PATCH] cred: Propagate security_prepare_creds() error code
 2022-05-24  4:44 UTC  (3+ messages)

[PATCH v6 0/3] LoadPin: Enable loading from trusted dm-verity devices
 2022-05-23 21:14 UTC  (4+ messages)
` [PATCH v6 1/3] dm: Add verity helpers for LoadPin
` [PATCH v6 2/3] LoadPin: Enable loading from trusted dm-verity devices
` [PATCH v6 3/3] dm: verity-loadpin: Use CONFIG_SECURITY_LOADPIN_VERITY for conditional compilation

[RFC PATCH 1/2] capability: add capable_or to test for multiple caps with exactly one audit message
 2022-05-22 17:33 UTC  (5+ messages)
` [PATCH v2 2/8] capability: use new capable_or functionality
  ` [PATCH v2 8/8] net: "

[PATCH v1 0/5] Support kexec_file on 32-bit RISC-V
 2022-05-20 22:42 UTC  (7+ messages)
` [PATCH v1 1/5] drivers: of: kexec ima: Support 32-bit platforms
` [PATCH v1 2/5] ima: Fix a build issue on "
` [PATCH v1 3/5] RISC-V: kexec: Use Elf64 on 64-bit targets
` [PATCH v1 4/5] RISC-V: purgatory: Use XLEN-length loads to support rv32
` [PATCH v1 5/5] RISC-V: Allow kexec_file() on 32-bit platforms

[PATCH v10 0/7] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
 2022-05-19 23:41 UTC  (7+ messages)

[PATCH v5 0/3] LoadPin: Enable loading from trusted dm-verity devices
 2022-05-19 18:28 UTC  (4+ messages)
` [PATCH v5 1/3] dm: Add verity helpers for LoadPin

[RFC PATCH 0/8] signals: Support more than 64 signals
 2022-05-19 12:27 UTC  (8+ messages)

[PATCH] apparmor: fix reference count leak in aa_pivotroot()
 2022-05-19  8:58 UTC  (2+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).