linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2023-02-28 01:15:03 to 2023-03-07 11:35:00 UTC [more...]

[PATCH v6 00/11] LSM: Three basic syscalls
 2023-03-07 11:33 UTC  (8+ messages)
` [PATCH v6 04/11] LSM: syscalls for current process attributes
` [PATCH v6 05/11] LSM: Create lsm_module_list system call
` [PATCH v6 06/11] LSM: wireup Linux Security Module syscalls

[PATCH 00/28] security: Move IMA and EVM to the LSM infrastructure
 2023-03-07  8:58 UTC  (58+ messages)
` [PATCH 01/28] ima: Align ima_inode_post_setattr() definition with "
` [PATCH 02/28] ima: Align ima_post_path_mknod() "
` [PATCH 03/28] ima: Align ima_post_create_tmpfile() "
` [PATCH 04/28] ima: Align ima_file_mprotect() "
` [PATCH 05/28] ima: Align ima_inode_setxattr() "
` [PATCH 06/28] ima: Align ima_inode_removexattr() "
` [PATCH 07/28] ima: Align ima_post_read_file() "
` [PATCH 08/28] evm: Align evm_inode_post_setattr() "
` [PATCH 09/28] evm: Align evm_inode_setxattr() "
` [PATCH 10/28] evm: Align evm_inode_post_setxattr() "
` [PATCH 11/28] evm: Complete description of evm_inode_setattr()
` [PATCH 12/28] fs: Fix description of vfs_tmpfile()
` [PATCH 13/28] security: Align inode_setattr hook definition with EVM
` [PATCH 14/28] security: Introduce inode_post_setattr hook
` [PATCH 15/28] security: Introduce inode_post_removexattr hook
` [PATCH 16/28] security: Introduce file_post_open hook
` [PATCH 17/28] security: Introduce file_pre_free_security hook
` [PATCH 18/28] security: Introduce path_post_mknod hook
` [PATCH 19/28] security: Introduce inode_post_create_tmpfile hook
` [PATCH 20/28] security: Introduce inode_post_set_acl hook
` [PATCH 21/28] security: Introduce inode_post_remove_acl hook
` [PATCH 22/28] security: Introduce key_post_create_or_update hook
` [PATCH 23/28] security: Introduce LSM_ORDER_LAST
` [PATCH 24/28] ima: Move to LSM infrastructure
` [PATCH 25/28] ima: Move IMA-Appraisal "
` [PATCH 26/28] evm: Move "
` [PATCH 27/28] integrity: Move integrity functions to the "
` [PATCH 28/28] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache

[PATCH 00/22] Move LSM hook comments into security/security.c
 2023-03-07  8:08 UTC  (3+ messages)

[PATCH 0/1] process attribute support for Landlock
 2023-03-06 22:40 UTC  (7+ messages)
` [PATCH 1/1] lsm: adds process attribute getter "

[PATCH v9 00/12] Network support for Landlock
 2023-03-06 18:13 UTC  (23+ messages)
` [PATCH v9 06/12] landlock: Refactor _unmask_layers() and _init_layer_masks()
` [PATCH v9 08/12] landlock: Add network rules and TCP hooks support
` [PATCH v9 10/12] selftests/landlock: Add 10 new test suites dedicated to network
` [PATCH v9 12/12] landlock: Document Landlock's network support

[PATCH] evm: Complete description of evm_inode_setattr()
 2023-03-06 10:40 UTC 

[PATCH v3 1/2] capability: add cap_isidentical
 2023-03-06  5:43 UTC  (66+ messages)
` [PATCH v3 2/2] vfs: avoid duplicating creds in faccessat if possible

[PATCH] device_cgroup: Fix typo in devcgroup_css_alloc description
 2023-03-04  7:29 UTC 

[PATCH v38 00/39] LSM: Module stacking for AppArmor
 2023-03-03 17:14 UTC  (6+ messages)
` [PATCH v38 01/39] LSM: Identify modules by more than name
` [PATCH v38 02/39] LSM: Add an LSM identifier for external use

[PATCH 00/14] Implement Trusted Security Event Modeling
 2023-03-03  4:15 UTC  (5+ messages)
` [PATCH 02/14] Add TSEM specific documentation

[PATCH -next] AppArmor: Fix some kernel-doc comments
 2023-03-03  1:28 UTC 

[PATCH 00/11] sysctl: deprecate register_sysctl_paths()
 2023-03-02 23:13 UTC  (20+ messages)
` [PATCH 01/11] proc_sysctl: update docs for __register_sysctl_table()
` [PATCH 02/11] proc_sysctl: move helper which creates required subdirectories
` [PATCH 03/11] sysctl: clarify register_sysctl_init() base directory order
` [PATCH 04/11] apparmor: simplify sysctls with register_sysctl_init()
` [PATCH 05/11] loadpin: simplify sysctls use with register_sysctl()
` [PATCH 06/11] yama: simplfy sysctls "
` [PATCH 07/11] seccomp: simplify sysctls with register_sysctl_init()
` [PATCH 08/11] kernel: pid_namespace: simplify sysctls with register_sysctl()
` [PATCH 09/11] fs-verity: "
` [PATCH 10/11] csky: simplify alignment sysctl registration
` [PATCH 11/11] proc_sysctl: deprecate register_sysctl_paths()

[RFC PATCH v9 00/16] Integrity Policy Enforcement LSM (IPE)
 2023-03-02 19:08 UTC  (23+ messages)
` [RFC PATCH v9 01/16] security: add ipe lsm
` [RFC PATCH v9 02/16] ipe: add policy parser
` [RFC PATCH v9 03/16] ipe: add evaluation loop and introduce 'boot_verified' as a trust provider
` [RFC PATCH v9 05/16] ipe: add userspace interface
` [RFC PATCH v9 06/16] ipe: add LSM hooks on execution and kernel read
` [RFC PATCH v9 07/16] uapi|audit|ipe: add ipe auditing support
` [RFC PATCH v9 08/16] ipe: add permissive toggle
` [RFC PATCH v9 09/16] block|security: add LSM blob to block_device
` [RFC PATCH v9 11/16] ipe: add support for dm-verity as a trust provider

[PATCH v5 0/6] Add CA enforcement keyring restrictions
 2023-03-02 16:46 UTC  (7+ messages)
` [PATCH v5 1/6] KEYS: Create static version of public_key_verify_signature
` [PATCH v5 2/6] KEYS: Add missing function documentation
` [PATCH v5 3/6] KEYS: X.509: Parse Basic Constraints for CA
` [PATCH v5 4/6] KEYS: X.509: Parse Key Usage
` [PATCH v5 5/6] KEYS: CA link restriction
` [PATCH v5 6/6] integrity: machine keyring CA configuration

[PATCH] tomoyo: replace tomoyo_round2() with kmalloc_size_roundup()
 2023-03-01 14:53 UTC  (2+ messages)

[PATCH 4.19 v3 0/6] Backport handling -ESTALE policy update failure to 4.19
 2023-03-01  1:26 UTC  (10+ messages)
` [PATCH 4.19 v3 1/6] IB/core: Don't register each MAD agent for LSM notifier
` [PATCH 4.19 v3 2/6] LSM: switch to blocking policy update notifiers
` [PATCH 4.19 v3 3/6] ima: use the lsm policy update notifier
` [PATCH 4.19 v3 4/6] ima: ima/lsm policy rule loading logic bug fixes
` [PATCH 4.19 v3 5/6] ima: Evaluate error in init_ima()
` [PATCH 4.19 v3 6/6] ima: Handle -ESTALE returned by ima_filter_rule_match()

[PATCH v3 1/2] capability: add cap_isidentical
 2023-02-28 20:04 UTC 


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).