linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2018-06-28 13:30:49 to 2018-07-22 23:34:11 UTC [more...]

[PATCH 1/2] security/keys/secure_key: Adds the secure key support based on CAAM
 2018-07-22 23:34 UTC  (5+ messages)
` [PATCH 2/2] encrypted_keys: Adds support for secure key-type as master key

[PATCH] apparmor: remove redundant pointer 'info'
 2018-07-20 10:57 UTC  (3+ messages)

[PATCH 0/2] Fix AppArmor issues found through static analysis
 2018-07-19 23:28 UTC  (7+ messages)
` [PATCH 1/2] apparmor: Check buffer bounds when mapping permissions mask
` [PATCH 2/2] apparmor: Fully initialize aa_perms struct when answering userspace query

[PATCH v3 RFC] Smack: Inform peer that IPv6 traffic has been blocked
 2018-07-19 22:51 UTC  (2+ messages)

[PATCH v4 RFC] Smack: Check UDP-Lite and DCCP protocols during IPv6 handling
 2018-07-19 22:50 UTC  (2+ messages)

[PATCH v3 RFC] Smack: Fix handling of IPv4 traffic received by PF_INET6 sockets
 2018-07-19 22:49 UTC  (2+ messages)

[PATCH] security: export security_kernel_load_data to fix firmware_loader build
 2018-07-19 22:40 UTC  (3+ messages)

[PATCH] tpm: add support for partial reads
 2018-07-19 21:01 UTC  (10+ messages)

[PATCH] security: Add LSM fixup hooks to set*gid syscalls
 2018-07-19  5:44 UTC  (2+ messages)
      ` Fwd: "

[PATCH v3 RFC] Smack: Check UDP-Lite and DCCP protocols during IPv6 handling
 2018-07-18 10:52 UTC 

[PATCH v2 RFC] Smack: Inform peer that IPv6 traffic has been blocked
 2018-07-18 10:39 UTC 

[PATCH v2 RFC] mack: Check UDP-Lite and DCCP protocols during IPv6 handling
 2018-07-18 10:39 UTC 

[PATCH v2] cap_inode_getsecurity: use d_find_any_alias() instead of d_find_alias()
 2018-07-18 10:38 UTC 

[PATCH v1 RFC] Smack: Inform peer that IPv6 traffic has been blocked
 2018-07-18  9:49 UTC 

[PATCH v1 RFC] Smack: Check UDP-Lite and DCCP protocols during IPv6 handling
 2018-07-18  9:48 UTC 

[PATCH v2 RFC] Smack: Fix handling of IPv4 traffic received by PF_INET6 sockets
 2018-07-18  7:01 UTC 

[PATCH] security: check for kstrdup() failure in lsm_append()
 2018-07-18  4:28 UTC  (2+ messages)

[PATCH] security: export security_kernel_load_data function
 2018-07-18  4:28 UTC  (2+ messages)

[PATCH RFC] Smack: Fix handling of IPv4 traffic received by PF_INET6 sockets
 2018-07-17 15:01 UTC  (8+ messages)

[PATCH v3 0/1] shiftfs: uid/gid shifting filesystem
 2018-07-17 13:38 UTC  (2+ messages)

[PATCH v6 0/8] kexec/firmware: support system wide policy requiring signatures
 2018-07-16 19:59 UTC  (19+ messages)
` [PATCH v6 1/8] security: define new LSM hook named security_kernel_load_data
` [PATCH v6 2/8] kexec: add call to LSM hook in original kexec_load syscall
` [PATCH v6 3/8] ima: based on policy require signed kexec kernel images
` [PATCH v6 4/8] firmware: add call to LSM hook before firmware sysfs fallback
` [PATCH v6 5/8] ima: based on policy require signed firmware (sysfs fallback)
` [PATCH v6 6/8] ima: add build time policy
` [PATCH v6 7/8] module: replace the existing LSM hook in init_module
` [PATCH v6 8/8] ima: based on policy warn about loading firmware (pre-allocated buffer)

[PATCH v1 00/22] LSM: Full security module stacking
 2018-07-16 19:49 UTC  (26+ messages)
` [PATCH v1 01/22] procfs: add smack subdir to attrs
` [PATCH v1 02/22] Smack: Abstract use of cred security blob
` [PATCH v1 03/22] SELinux: "
` [PATCH v1 04/22] LSM: Infrastructure management of the "
` [PATCH v1 05/22] SELinux: Abstract use of file "
` [PATCH v1 06/22] LSM: Infrastructure management of the "
` [PATCH v1 07/22] LSM: Infrastructure management of the task "
` PATCH v1 08/22] SELinux: Abstract use of inode "
` [PATCH v1 09/22] Smack: "
` [PATCH v1 10/22] LSM: Infrastructure management of the inode security
` [PATCH v1 11/22] LSM: Infrastructure management of the superblock security blob
` [PATCH v1 12/22] LSM: Infrastructure management of the sock security
` [PATCH v1 13/22] LSM: Infrastructure management of the ipc security blob
` [PATCH v1 14/22] LSM: Infrastructure management of the key "
` [PATCH v1 15/22] LSM: Mark security blob allocation failures as unlikely
` [PATCH v1 16/22] LSM: Sharing of security blobs
` [PATCH v1 17/22] LSM: Allow mount options from multiple security modules
` [PATCH v1 18/22] LSM: Use multiple secids in security module interfaces
` [PATCH v1 19/22] LSM: Use multiple secids in LSM interfaces
` [PATCH v1 20/22] Move common usercopy into security_getpeersec_stream
` [PATCH v1 21/22] LSM: Multiple concurrent major security modules
` [PATCH v1 22/22] Netfilter: Add a selection for Smack

editing of your photos
 2018-07-16 13:32 UTC 

[PATCH] keys: trusted: remove redundant variable keyhndl
 2018-07-14 16:26 UTC 

[PATCH v5 0/8] kexec/firmware: support system wide policy requiring signatures
 2018-07-12 20:37 UTC  (25+ messages)
` [PATCH v5 1/8] security: define new LSM hook named security_kernel_load_data
` [PATCH v5 2/8] kexec: add call to LSM hook in original kexec_load syscall
` [PATCH v5 3/8] ima: based on policy require signed kexec kernel images
` [PATCH v5 4/8] firmware: add call to LSM hook before firmware sysfs fallback
` [PATCH v5 5/8] ima: based on policy require signed firmware (sysfs fallback)
` [PATCH v5 6/8] ima: add build time policy
` [PATCH v5 7/8] ima: based on policy warn about loading firmware (pre-allocated buffer)
` [PATCH v5 8/8] module: replace the existing LSM hook in init_module

info!!
 2018-07-11 17:10 UTC 

[PATCH -next] EVM: fix return value check in evm_write_xattrs()
 2018-07-11 15:15 UTC  (2+ messages)

[PATCH 06/32] vfs: Add LSM hooks for the new mount API [ver #9]
 2018-07-11 14:08 UTC  (10+ messages)
` [PATCH 07/32] selinux: Implement the new mount API LSM hooks "
` [PATCH 08/32] smack: Implement filesystem context security "
` [PATCH 09/32] apparmor: Implement security hooks for the new mount API "
` [PATCH 10/32] tomoyo: "

How are you doing today? Please read my email and reply me!!
 2018-07-10 17:54 UTC 

[bug report] AppArmor: policy routines for loading and unpacking policy
 2018-07-10 14:32 UTC  (2+ messages)

[PATCH RFC] Smack: Fix handling of IPv4 traffic received by PF_INET6 sockets
 2018-07-10  6:53 UTC  (2+ messages)

[PATCH RFC] Smack: Fix handling of IPv4 traffic received by PF_INET6 sockets
 2018-07-09 12:12 UTC 

JÓ HÍREK
 2018-07-09  1:49 UTC 

[PATCH] ima: Use tpm_default_chip() and call TPM functions with a tpm_chip
 2018-07-05 15:43 UTC  (5+ messages)

[RFC PATCH v3] ipv6: make ipv6_renew_options() interrupt/kernel safe
 2018-07-05 11:15 UTC  (2+ messages)

[PATCH 0/2] Convert trusted keys to find and use the default TPM chip
 2018-07-04 13:52 UTC  (10+ messages)
` [PATCH 1/2] tpm: Implement public tpm_put_chip() to release reference to chip
` [PATCH 2/2] KEYS: trusted: Find tpm_chip and use it until module shutdown

[RFC PATCH v2] ipv6: make ipv6_renew_options() interrupt/kernel safe
 2018-07-04 12:36 UTC  (3+ messages)

[PATCH] ima: Remove unused is_ima_appraise_enabled() function
 2018-07-03 13:13 UTC  (2+ messages)

[PATCH] cap_inode_getsecurity: use d_find_any_alias() instead of d_find_alias()
 2018-07-03  8:09 UTC  (7+ messages)

[PATCH] kbuild: move bin2c back to scripts/ from scripts/basic/
 2018-07-03  4:02 UTC  (2+ messages)

[PATCH] security: CONFIG_HARDENED_USERCOPY does not need to select BUG
 2018-07-02 20:46 UTC  (4+ messages)

[RFC PATCH] ipv6: make ipv6_renew_options() interrupt/kernel safe
 2018-07-02 11:03 UTC  (2+ messages)

[GIT PULL] SELinux fixes for v4.18 (#1)
 2018-06-29 21:47 UTC 

[PATCH] tpm: require to compile as part of the kernel
 2018-06-29 18:11 UTC  (6+ messages)

[PATCH v7 0/5] Have IMA find and use a tpm_chip until system shutdown
 2018-06-29 15:01 UTC  (8+ messages)
` [PATCH v7 2/5] tpm: Implement tpm_default_chip() to find a TPM chip
` [PATCH v7 3/5] tpm: Convert tpm_find_get_ops() to use tpm_default_chip()

[PATCH] tpm: replace TPM_TRANSMIT_RAW with TPM_TRANSMIT_NESTED
 2018-06-29 12:31 UTC 

[PATCH v8] tpm: separate cmd_ready/go_idle from runtime_pm
 2018-06-29 12:30 UTC  (3+ messages)

[PATCH V2] selinux: make dentry_init_security() return security xattr suffix
 2018-06-29  2:14 UTC 

[PATCH v7] tpm: separate cmd_ready/go_idle from runtime_pm
 2018-06-28 15:02 UTC  (8+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).