linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2021-01-21 09:19:33 to 2021-01-29 19:19:24 UTC [more...]

[PATCH v2 1/1] process_madvise.2: Add process_madvise man page
 2021-01-29 19:17 UTC  (2+ messages)

general protection fault in tomoyo_socket_sendmsg_permission
 2021-01-29 17:08 UTC  (5+ messages)

[PATCH v2] selinux: measure state and policy capabilities
 2021-01-29 16:49 UTC 

[PATCH 1/1] process_madvise.2: Add process_madvise man page
 2021-01-29  7:15 UTC  (7+ messages)

[PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
 2021-01-29  7:08 UTC  (4+ messages)

[PATCH] smackfs: restrict bytes count in smackfs write functions
 2021-01-29  2:10 UTC  (8+ messages)
    ` [PATCH v2] "

[PATCH v5 0/4] Add EFI_CERT_X509_GUID support for dbx/mokx entries
 2021-01-29  1:56 UTC  (14+ messages)
` [PATCH v5 1/4] certs: Add EFI_CERT_X509_GUID support for dbx entries
` [PATCH v5 2/4] certs: Move load_system_certificate_list to a common function
` [PATCH v5 3/4] certs: Add ability to preload revocation certs
` [PATCH v5 4/4] integrity: Load mokx variables into the blacklist keyring

[PATCH 0/2] capability conversion fixes
 2021-01-28 20:49 UTC  (15+ messages)
` [PATCH 1/2] ecryptfs: fix uid translation for setxattr on security.capability
` [PATCH 2/2] security.capability: fix conversions on getxattr

[PATCH v4 00/10] Enable root to update the blacklist keyring
 2021-01-28 18:00 UTC  (14+ messages)
` [PATCH v4 01/10] tools/certs: Add print-cert-tbs-hash.sh
` [PATCH v4 02/10] certs: Check that builtin blacklist hashes are valid
` [PATCH v4 03/10] certs: Fix blacklisted hexadecimal hash string check
` [PATCH v4 04/10] certs: Fix blacklist flag type confusion
` [PATCH v4 05/10] certs: Replace K{U,G}IDT_INIT() with GLOBAL_ROOT_{U,G}ID
` [PATCH v4 06/10] certs: Make blacklist_vet_description() more strict
` [PATCH v4 07/10] certs/blacklist: fix kernel doc interface issue
` [PATCH v4 08/10] certs: Factor out the blacklist hash creation
` [PATCH v4 09/10] PKCS#7: Fix missing include
` [PATCH v4 10/10] certs: Allow root user to append signed hashes to the blacklist keyring

Migration to trusted keys: sealing user-provided key?
 2021-01-28 17:31 UTC 

[PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
 2021-01-28  4:13 UTC  (15+ messages)

[PATCH] selinux: measure state and policy capabilities
 2021-01-28  3:33 UTC  (4+ messages)

[PATCH v27 00/12] Landlock LSM
 2021-01-27 19:57 UTC  (16+ messages)
` [PATCH v27 01/12] landlock: Add object management
` [PATCH v27 02/12] landlock: Add ruleset and domain management
` [PATCH v27 03/12] landlock: Set up the security framework and manage credentials
` [PATCH v27 04/12] landlock: Add ptrace restrictions
` [PATCH v27 05/12] LSM: Infrastructure management of the superblock
` [PATCH v27 06/12] fs,security: Add sb_delete hook
` [PATCH v27 07/12] landlock: Support filesystem access-control
` [PATCH v27 08/12] landlock: Add syscall implementations
` [PATCH v27 09/12] arch: Wire up Landlock syscalls
` [PATCH v27 11/12] samples/landlock: Add a sandbox manager example
` [PATCH v27 12/12] landlock: Add user and kernel documentation

[PATCH v8 0/4] Introduce TEE based Trusted Keys support
 2021-01-27 17:19 UTC  (16+ messages)
` [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys

[PATCH v24 00/25] LSM: Module stacking for AppArmor
 2021-01-26 20:22 UTC  (30+ messages)
  ` [PATCH v24 01/25] LSM: Infrastructure management of the sock security
  ` [PATCH v24 02/25] LSM: Add the lsmblob data structure
  ` [PATCH v24 03/25] LSM: provide lsm name and id slot mappings
  ` [PATCH v24 04/25] IMA: avoid label collisions with stacked LSMs
  ` [PATCH v24 05/25] LSM: Use lsmblob in security_audit_rule_match
  ` [PATCH v24 06/25] LSM: Use lsmblob in security_kernel_act_as
  ` [PATCH v24 07/25] LSM: Use lsmblob in security_secctx_to_secid
  ` [PATCH v24 08/25] LSM: Use lsmblob in security_secid_to_secctx
  ` [PATCH v24 09/25] LSM: Use lsmblob in security_ipc_getsecid
  ` [PATCH v24 10/25] LSM: Use lsmblob in security_task_getsecid
  ` [PATCH v24 11/25] LSM: Use lsmblob in security_inode_getsecid
  ` [PATCH v24 12/25] LSM: Use lsmblob in security_cred_getsecid
  ` [PATCH v24 13/25] IMA: Change internal interfaces to use lsmblobs
  ` [PATCH v24 14/25] LSM: Specify which LSM to display
  ` [PATCH v24 15/25] LSM: Ensure the correct LSM context releaser
  ` [PATCH v24 16/25] LSM: Use lsmcontext in security_secid_to_secctx
  ` [PATCH v24 17/25] LSM: Use lsmcontext in security_inode_getsecctx
  ` [PATCH v24 18/25] LSM: security_secid_to_secctx in netlink netfilter
  ` [PATCH v24 19/25] NET: Store LSM netlabel data in a lsmblob
  ` [PATCH v24 20/25] LSM: Verify LSM display sanity in binder
  ` [PATCH v24 21/25] audit: add support for non-syscall auxiliary records
  ` [PATCH v24 22/25] Audit: Add new record for multiple process LSM attributes
  ` [PATCH v24 23/25] Audit: Add a new record for multiple object "
  ` [PATCH v24 24/25] LSM: Add /proc attr entry for full LSM context
  ` [PATCH v24 25/25] AppArmor: Remove the exclusive flag

[PATCH v6 00/40] idmapped mounts
 2021-01-27  5:50 UTC  (70+ messages)
` [PATCH v6 01/40] mount: attach mappings to mounts
` [PATCH v6 02/40] fs: add id translation helpers
` [PATCH v6 03/40] fs: add file and path permissions helpers
` [PATCH v6 04/40] capability: handle idmapped mounts
` [PATCH v6 05/39] namei: make permission helpers idmapped mount aware
` [PATCH v6 06/40] inode: make init and "
` [PATCH v6 07/40] attr: handle idmapped mounts
` [PATCH v6 08/40] acl: "
` [PATCH v6 09/40] xattr: "
` [PATCH v6 10/40] commoncap: "
` [PATCH v6 11/40] stat: "
` [PATCH v6 12/40] namei: handle idmapped mounts in may_*() helpers
` [PATCH v6 13/40] namei: introduce struct renamedata
` [PATCH v6 14/40] namei: prepare for idmapped mounts
` [PATCH v6 15/40] open: handle idmapped mounts in do_truncate()
` [PATCH v6 16/40] open: handle idmapped mounts
` [PATCH v6 17/40] af_unix: "
` [PATCH v6 18/40] utimes: "
` [PATCH v6 19/40] fcntl: "
` [PATCH v6 20/40] init: "
` [PATCH v6 21/40] ioctl: "
` [PATCH v6 22/40] would_dump: "
` [PATCH v6 23/40] exec: "
` [PATCH v6 25/40] apparmor: "
` [PATCH v6 26/39] ima: "
` [PATCH v6 27/40] ecryptfs: do not mount on top of "
` [PATCH v6 28/40] overlayfs: "
` [PATCH v6 29/40] namespace: take lock_mount_hash() directly when changing flags
` [PATCH v6 30/40] mount: make {lock,unlock}_mount_hash() static
` [PATCH v6 31/40] namespace: only take read lock in do_reconfigure_mnt()
` [PATCH v6 32/40] fs: split out functions to hold writers
` [PATCH v6 33/40] fs: add attr_flags_to_mnt_flags helper
` [PATCH v6 34/40] fs: add mount_setattr()
` [PATCH v6 35/40] fs: introduce MOUNT_ATTR_IDMAP
` [PATCH v6 36/40] tests: add mount_setattr() selftests
` [PATCH v6 37/40] fat: handle idmapped mounts
` [PATCH v6 38/40] ext4: support "
` [PATCH v6 39/40] xfs: "

[PATCH] selinux: include a consumer of the new IMA critical data hook
 2021-01-24 14:01 UTC  (3+ messages)

[PATCH v5] proc: Allow pid_revalidate() during LOOKUP_RCU
 2021-01-22 22:59 UTC 

[PATCH] NFSv4.2: fix return value of _nfs4_get_security_label()
 2021-01-22 19:23 UTC  (2+ messages)

VSOCK & getpeercon()
 2021-01-22 19:02 UTC  (2+ messages)

[PATCH v3 00/10] Enable root to update the blacklist keyring
 2021-01-21 15:21 UTC  (7+ messages)
` [PATCH v3 08/10] certs: Check that builtin blacklist hashes are valid


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).