linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2021-06-10 15:06:09 to 2021-06-30 20:22:27 UTC [more...]

[GIT PULL] SafeSetID changes for v5.14
 2021-06-30 20:22 UTC 

[RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
 2021-06-30 19:59 UTC  (25+ messages)

[PATCH v8 0/2] Add support for ECDSA-signed kernel modules
 2021-06-30 19:17 UTC  (4+ messages)
` [PATCH v8 1/2] certs: Trigger creation of RSA module signing key if it's not an RSA key
` [PATCH v8 2/2] certs: Add support for using elliptic curve keys for signing modules

[PATCH 0/3] ima: Provide more info about buffer measurement
 2021-06-30 15:09 UTC  (6+ messages)
` [PATCH 1/3] ima: Introduce ima_get_current_hash_algo()
` [PATCH 2/3] ima: Return int in the functions to measure a buffer
` [PATCH 3/3] ima: Add digest parameter to "

[PATCH] perf: Require CAP_KILL if sigtrap is requested
 2021-06-30 12:42 UTC  (3+ messages)

[GIT PULL] Smack patches for v5.14
 2021-06-29 23:40 UTC 

[RFC PATCH v2 0/3] Allow access to confidential computing secret area
 2021-06-29 22:48 UTC  (12+ messages)
` [RFC PATCH v2 1/3] efi/libstub: Copy "
` [RFC PATCH v2 2/3] efi: Reserve "
` [RFC PATCH v2 3/3] virt: Add sev_secret module to expose confidential computing secrets

[PATCH] IMA: remove -Wmissing-prototypes warning
 2021-06-29 22:40 UTC  (3+ messages)

[GIT PULL] SELinux patches for v5.14
 2021-06-29 21:36 UTC 

[PATCH v7 0/2] Add support for ECDSA-signed kernel modules
 2021-06-29 20:56 UTC  (4+ messages)
` [PATCH v7 1/2] certs: Trigger creation of RSA module signing key if it's not an RSA key
` [PATCH v7 2/2] certs: Add support for using elliptic curve keys for signing modules

[PATCH] certs: Redirect openssl error message to null device
 2021-06-29 20:26 UTC  (4+ messages)

[PATCH] smack: mark 'smack_enabled' global variable as __initdata
 2021-06-29 13:41 UTC 

ima - wait for tpm load
 2021-06-28 22:04 UTC  (5+ messages)

[RFC][PATCH 00/12] Huawei Digest Lists
 2021-06-28  9:51 UTC  (25+ messages)
` [RFC][PATCH 01/12] ima: Add digest, algo, measured parameters to ima_measure_critical_data()
` [RFC][PATCH 02/12] digest_lists: Overview
` [RFC][PATCH 03/12] digest_lists: Basic definitions
` [RFC][PATCH 04/12] digest_lists: Objects
` [RFC][PATCH 05/12] digest_lists: Methods
` [RFC][PATCH 06/12] digest_lists: Parser
` [RFC][PATCH 07/12] digest_lists: Interfaces - digest_list_add, digest_list_del
` [RFC][PATCH 08/12] digest_lists: Interfaces - digest_lists_loaded
` [RFC][PATCH 09/12] digest_lists: Interfaces - digest_label
` [RFC][PATCH 10/12] digest_lists: Interfaces - digest_query
` [RFC][PATCH 11/12] digest_lists: Interfaces - digests_count
` [RFC][PATCH 12/12] digest_lists: Tests

[PATCH 0/3] DCP as trusted keys backend
 2021-06-25 13:12 UTC  (7+ messages)
` [PATCH 1/3] crypto: mxs-dcp: Add support for hardware provided keys
` [PATCH 2/3] KEYS: trusted: Introduce support for NXP DCP-based trusted keys
` [PATCH 3/3] doc: trusted-encrypted: add DCP as new trust source

[RFC PATCH] userfaultfd: open userfaultfds with O_RDONLY
 2021-06-24 15:25 UTC 

[PATCH v2 00/29] docs: avoid using ReST :doc:`foo` tag
 2021-06-23 12:26 UTC  (5+ messages)
` [PATCH v2 24/29] docs: security: landlock.rst: avoid using ReST :doc:`foo` markup
` [PATCH v2 27/29] docs: userspace-api: "

[PATCH v2 2/6] KEYS: trusted: Allow import from existing key material for development
 2021-06-22 12:45 UTC 

[PATCH v2 0/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
 2021-06-22 12:37 UTC  (6+ messages)
` [PATCH v2 1/6] KEYS: trusted: allow use of TEE as backend without TCG_TPM support
` [PATCH v2 3/6] KEYS: trusted: allow users to use kernel RNG for key material
` [PATCH v2 4/6] KEYS: trusted: allow trust sources "
` [PATCH v2 5/6] crypto: caam - add in-kernel interface for blob generator
` [PATCH v2 6/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys

[ANNOUNCE][CFP] Linux Security Summit 2021
 2021-06-22  2:46 UTC  (3+ messages)

[PATCH v2] evm: Check xattr size discrepancy between kernel and user
 2021-06-21 13:25 UTC  (2+ messages)

[PATCH] evm: Check xattr size misalignment between kernel and user
 2021-06-21 12:22 UTC  (2+ messages)

[PATCH v3] lockdown,selinux: fix wrong subject in some SELinux lockdown checks
 2021-06-21  8:35 UTC  (5+ messages)

Size mismatch between vfs_getxattr_alloc() and vfs_getxattr()
 2021-06-18 17:22 UTC  (11+ messages)
` [PATCH] fs: Return raw xattr for security.* if there is size disagreement with LSMs

[PATCH v6 0/4] Add support for ECDSA-signed kernel modules
 2021-06-18  9:04 UTC  (11+ messages)
` [PATCH v6 4/4] certs: Adjustment due to 'Check whether openssl tool is available'

[PATCH v27 00/25] LSM: Module stacking for AppArmor
 2021-06-16 15:05 UTC  (28+ messages)
  ` [PATCH v27 01/25] LSM: Infrastructure management of the sock security
  ` [PATCH v27 02/25] LSM: Add the lsmblob data structure
  ` [PATCH v27 03/25] LSM: provide lsm name and id slot mappings
  ` [PATCH v27 04/25] IMA: avoid label collisions with stacked LSMs
  ` [PATCH v27 05/25] LSM: Use lsmblob in security_audit_rule_match
  ` [PATCH v27 06/25] LSM: Use lsmblob in security_kernel_act_as
  ` [PATCH v27 07/25] LSM: Use lsmblob in security_secctx_to_secid
  ` [PATCH v27 08/25] LSM: Use lsmblob in security_secid_to_secctx
  ` [PATCH v27 09/25] LSM: Use lsmblob in security_ipc_getsecid
  ` [PATCH v27 10/25] LSM: Use lsmblob in security_task_getsecid
  ` [PATCH v27 11/25] LSM: Use lsmblob in security_inode_getsecid
  ` [PATCH v27 12/25] LSM: Use lsmblob in security_cred_getsecid
  ` [PATCH v27 13/25] IMA: Change internal interfaces to use lsmblobs
  ` [PATCH v27 14/25] LSM: Specify which LSM to display
  ` [PATCH v27 15/25] LSM: Ensure the correct LSM context releaser
  ` [PATCH v27 16/25] LSM: Use lsmcontext in security_secid_to_secctx
  ` [PATCH v27 17/25] LSM: Use lsmcontext in security_inode_getsecctx
  ` [PATCH v27 18/25] LSM: security_secid_to_secctx in netlink netfilter
  ` [PATCH v27 19/25] NET: Store LSM netlabel data in a lsmblob
  ` [PATCH v27 20/25] LSM: Verify LSM display sanity in binder
  ` [PATCH v27 21/25] audit: add support for non-syscall auxiliary records
  ` [PATCH v27 22/25] Audit: Add record for multiple process LSM attributes
  ` [PATCH v27 23/25] Audit: Add record for multiple object "
  ` [PATCH v27 24/25] LSM: Add /proc attr entry for full LSM context
  ` [PATCH v27 25/25] AppArmor: Remove the exclusive flag

[PATCH] tpm2_load_command leaks memory
 2021-06-16 14:49 UTC  (3+ messages)

[PATCH] proc: Track /proc/$pid/attr/ opener mm_struct
 2021-06-16  5:56 UTC  (10+ messages)

[PATCH v2 09/10] apparmor: test: Remove some casts which are no-longer required
 2021-06-15 21:26 UTC  (3+ messages)

[PATCH -next v3] netlabel: Fix memory leak in netlbl_mgmt_add_common
 2021-06-15 20:29 UTC  (3+ messages)

[PATCH] security: add LSM hook at the memfd_create point
 2021-06-13 17:25 UTC  (2+ messages)

[PATCH -next v2] netlabel: Fix memory leak in netlbl_mgmt_add_common
 2021-06-11 17:36 UTC  (2+ messages)

[PATCH] audit: remove unnecessary 'ret' initialization
 2021-06-11 17:23 UTC  (2+ messages)

[PATCH v8 0/8] Fork brute force attack mitigation
 2021-06-11 15:41 UTC  (5+ messages)

[PATCH -next] netlabel: Fix memory leak in netlbl_mgmt_add_common
 2021-06-11  4:05 UTC  (3+ messages)

[PATCH] LSM: SafeSetID: Mark safesetid_initialized as __initdata
 2021-06-10 22:33 UTC  (3+ messages)

[PATCH v1] efi: Don't use knowledge about efi_guid_t internals
 2021-06-10 15:05 UTC  (4+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).