linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2023-02-17 16:20:40 to 2023-03-04 01:29:56 UTC [more...]

[PATCH v3 1/2] capability: add cap_isidentical
 2023-03-04  1:29 UTC  (44+ messages)
` [PATCH v3 2/2] vfs: avoid duplicating creds in faccessat if possible

[PATCH 00/28] security: Move IMA and EVM to the LSM infrastructure
 2023-03-03 18:26 UTC  (29+ messages)
` [PATCH 01/28] ima: Align ima_inode_post_setattr() definition with "
` [PATCH 02/28] ima: Align ima_post_path_mknod() "
` [PATCH 03/28] ima: Align ima_post_create_tmpfile() "
` [PATCH 04/28] ima: Align ima_file_mprotect() "
` [PATCH 05/28] ima: Align ima_inode_setxattr() "
` [PATCH 06/28] ima: Align ima_inode_removexattr() "
` [PATCH 07/28] ima: Align ima_post_read_file() "
` [PATCH 08/28] evm: Align evm_inode_post_setattr() "
` [PATCH 09/28] evm: Align evm_inode_setxattr() "
` [PATCH 10/28] evm: Align evm_inode_post_setxattr() "
` [PATCH 11/28] evm: Complete description of evm_inode_setattr()
` [PATCH 12/28] fs: Fix description of vfs_tmpfile()
` [PATCH 13/28] security: Align inode_setattr hook definition with EVM
` [PATCH 14/28] security: Introduce inode_post_setattr hook
` [PATCH 15/28] security: Introduce inode_post_removexattr hook
` [PATCH 16/28] security: Introduce file_post_open hook
` [PATCH 17/28] security: Introduce file_pre_free_security hook
` [PATCH 18/28] security: Introduce path_post_mknod hook
` [PATCH 19/28] security: Introduce inode_post_create_tmpfile hook
` [PATCH 20/28] security: Introduce inode_post_set_acl hook
` [PATCH 21/28] security: Introduce inode_post_remove_acl hook
` [PATCH 22/28] security: Introduce key_post_create_or_update hook
` [PATCH 23/28] security: Introduce LSM_ORDER_LAST
` [PATCH 24/28] ima: Move to LSM infrastructure
` [PATCH 25/28] ima: Move IMA-Appraisal "
` [PATCH 26/28] evm: Move "
` [PATCH 27/28] integrity: Move integrity functions to the "
` [PATCH 28/28] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache

[PATCH v6 00/11] LSM: Three basic syscalls
 2023-03-03 18:41 UTC  (19+ messages)
  ` [PATCH v6 01/11] LSM: Identify modules by more than name
  ` [PATCH v6 02/11] LSM: Maintain a table of LSM attribute data
  ` [PATCH v6 03/11] proc: Use lsmids instead of lsm names for attrs
  ` [PATCH v6 04/11] LSM: syscalls for current process attributes
  ` [PATCH v6 05/11] LSM: Create lsm_module_list system call
  ` [PATCH v6 06/11] LSM: wireup Linux Security Module syscalls
  ` [PATCH v6 07/11] LSM: Helpers for attribute names and filling an lsm_ctx
  ` [PATCH v6 08/11] Smack: implement setselfattr and getselfattr hooks
  ` [PATCH v6 09/11] AppArmor: Add selfattr hooks
  ` [PATCH v6 10/11] SELinux: "
  ` [PATCH v6 11/11] LSM: selftests for Linux Security Module syscalls

[PATCH v38 00/39] LSM: Module stacking for AppArmor
 2023-03-03 17:14 UTC  (6+ messages)
` [PATCH v38 01/39] LSM: Identify modules by more than name
` [PATCH v38 02/39] LSM: Add an LSM identifier for external use

[PATCH 0/1] process attribute support for Landlock
 2023-03-03 16:39 UTC  (5+ messages)
` [PATCH 1/1] lsm: adds process attribute getter "

[PATCH 00/14] Implement Trusted Security Event Modeling
 2023-03-03  4:15 UTC  (13+ messages)
` [PATCH 02/14] Add TSEM specific documentation
` [PATCH 08/14] Implement TSEM control plane
  ` [PATCH 09/14] Add namespace implementation

[PATCH -next] AppArmor: Fix some kernel-doc comments
 2023-03-03  1:28 UTC 

[PATCH 00/11] sysctl: deprecate register_sysctl_paths()
 2023-03-02 23:13 UTC  (20+ messages)
` [PATCH 01/11] proc_sysctl: update docs for __register_sysctl_table()
` [PATCH 02/11] proc_sysctl: move helper which creates required subdirectories
` [PATCH 03/11] sysctl: clarify register_sysctl_init() base directory order
` [PATCH 04/11] apparmor: simplify sysctls with register_sysctl_init()
` [PATCH 05/11] loadpin: simplify sysctls use with register_sysctl()
` [PATCH 06/11] yama: simplfy sysctls "
` [PATCH 07/11] seccomp: simplify sysctls with register_sysctl_init()
` [PATCH 08/11] kernel: pid_namespace: simplify sysctls with register_sysctl()
` [PATCH 09/11] fs-verity: "
` [PATCH 10/11] csky: simplify alignment sysctl registration
` [PATCH 11/11] proc_sysctl: deprecate register_sysctl_paths()

[RFC PATCH v9 00/16] Integrity Policy Enforcement LSM (IPE)
 2023-03-02 19:08 UTC  (23+ messages)
` [RFC PATCH v9 01/16] security: add ipe lsm
` [RFC PATCH v9 02/16] ipe: add policy parser
` [RFC PATCH v9 03/16] ipe: add evaluation loop and introduce 'boot_verified' as a trust provider
` [RFC PATCH v9 05/16] ipe: add userspace interface
` [RFC PATCH v9 06/16] ipe: add LSM hooks on execution and kernel read
` [RFC PATCH v9 07/16] uapi|audit|ipe: add ipe auditing support
` [RFC PATCH v9 08/16] ipe: add permissive toggle
` [RFC PATCH v9 09/16] block|security: add LSM blob to block_device
` [RFC PATCH v9 11/16] ipe: add support for dm-verity as a trust provider

[PATCH v5 0/6] Add CA enforcement keyring restrictions
 2023-03-02 16:46 UTC  (7+ messages)
` [PATCH v5 1/6] KEYS: Create static version of public_key_verify_signature
` [PATCH v5 2/6] KEYS: Add missing function documentation
` [PATCH v5 3/6] KEYS: X.509: Parse Basic Constraints for CA
` [PATCH v5 4/6] KEYS: X.509: Parse Key Usage
` [PATCH v5 5/6] KEYS: CA link restriction
` [PATCH v5 6/6] integrity: machine keyring CA configuration

[PATCH] tomoyo: replace tomoyo_round2() with kmalloc_size_roundup()
 2023-03-01 14:53 UTC  (2+ messages)

[PATCH 4.19 v3 0/6] Backport handling -ESTALE policy update failure to 4.19
 2023-03-01  1:26 UTC  (10+ messages)
` [PATCH 4.19 v3 1/6] IB/core: Don't register each MAD agent for LSM notifier
` [PATCH 4.19 v3 2/6] LSM: switch to blocking policy update notifiers
` [PATCH 4.19 v3 3/6] ima: use the lsm policy update notifier
` [PATCH 4.19 v3 4/6] ima: ima/lsm policy rule loading logic bug fixes
` [PATCH 4.19 v3 5/6] ima: Evaluate error in init_ima()
` [PATCH 4.19 v3 6/6] ima: Handle -ESTALE returned by ima_filter_rule_match()

[PATCH v3 1/2] capability: add cap_isidentical
 2023-02-28 20:04 UTC 

[syzbot] [keyrings?] [lsm?] WARNING in __mod_timer
 2023-02-27 20:33 UTC  (2+ messages)

[BUG] blacklist: Problem blacklisting hash (-13) during boot
 2023-02-27 14:36 UTC  (8+ messages)
    ` [External] "

[PATCH v4] landlock: Clarify documentation for the LANDLOCK_ACCESS_FS_REFER right
 2023-02-27 13:30 UTC  (5+ messages)

[PATCH v9 00/12] Network support for Landlock
 2023-02-23 22:17 UTC  (14+ messages)
` [PATCH v9 06/12] landlock: Refactor _unmask_layers() and _init_layer_masks()
` [PATCH v9 08/12] landlock: Add network rules and TCP hooks support
` [PATCH v9 10/12] selftests/landlock: Add 10 new test suites dedicated to network
` [PATCH v9 12/12] landlock: Document Landlock's network support

[PATCH 4.19 v2 0/5] Backport handling -ESTALE policy update failure to 4.19
 2023-02-23  1:31 UTC  (3+ messages)

[GIT PULL] Smack patches for v6.3
 2023-02-22 20:58 UTC  (2+ messages)

[GIT PULL] Landlock updates for v6.3
 2023-02-22 20:58 UTC  (2+ messages)

apparmor: global buffers spin lock may get contended
 2023-02-21 21:27 UTC  (8+ messages)
      ` [PATCH v3] "

[PATCH v3] landlock: Clarify documentation for the LANDLOCK_ACCESS_FS_REFER right
 2023-02-21 16:51 UTC  (3+ messages)

[PATCH v7 0/6] evm: Do HMAC of multiple per LSM xattrs for new inodes
 2023-02-21  7:51 UTC  (24+ messages)
` [PATCH v7 1/6] reiserfs: Switch to security_inode_init_security()
` [PATCH v7 2/6] ocfs2: "
` [PATCH v7 3/6] security: Remove security_old_inode_init_security()
` [PATCH v7 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
` [PATCH v7 5/6] evm: Align evm_inode_init_security() definition with LSM infrastructure
` [PATCH v7 6/6] evm: Support multiple LSMs providing an xattr

LSM pull request for Linux v6.3
 2023-02-20 22:33 UTC 

[PATCH 00/22] Move LSM hook comments into security/security.c
 2023-02-17 19:04 UTC  (3+ messages)

[PATCH v2] kernel/sys.c: fix and improve control flow in __sys_setres[ug]id()
 2023-02-17 16:21 UTC 

[PATCH] kernel/sys.c: fix and improve control flow in __sys_setres[ug]id()
 2023-02-17 16:18 UTC  (4+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).