linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2022-01-26 08:38:26 to 2022-02-02 23:58:53 UTC [more...]

[PATCH v32 00/28] LSM: Module stacking for AppArmor
 2022-02-02 23:52 UTC  (5+ messages)
  ` [PATCH v32 01/28] integrity: disassociate ima_filter_rule from security_audit_rule
  ` [PATCH v32 02/28] LSM: Infrastructure management of the sock security
  ` [PATCH v32 03/28] LSM: Add the lsmblob data structure
  ` [PATCH v32 04/28] LSM: provide lsm name and id slot mappings

[PATCH v10 00/27] ima: Namespace IMA with audit support in IMA-ns
 2022-02-02 21:27 UTC  (34+ messages)
` [PATCH v10 01/27] ima: Remove ima_policy file before directory
` [PATCH v10 02/27] ima: Do not print policy rule with inactive LSM labels
` [PATCH v10 03/27] ima: Return error code obtained from securityfs functions
` [PATCH v10 04/27] securityfs: rework dentry creation
` [PATCH v10 05/27] ima: Define ima_namespace struct and start moving variables into it
` [PATCH v10 06/27] ima: Move arch_policy_entry into ima_namespace
` [PATCH v10 07/27] ima: Move ima_htable "
` [PATCH v10 08/27] ima: Move measurement list related variables "
` [PATCH v10 09/27] ima: Move some IMA policy and filesystem "
` [PATCH v10 10/27] ima: Move IMA securityfs files into ima_namespace or onto stack
` [PATCH v10 11/27] ima: Move ima_lsm_policy_notifier into ima_namespace
` [PATCH v10 12/27] ima: Define mac_admin_ns_capable() as a wrapper for ns_capable()
` [PATCH v10 13/27] ima: Only accept AUDIT rules for non-init_ima_ns namespaces for now
` [PATCH v10 14/27] userns: Add pointer to ima_namespace to user_namespace
` [PATCH v10 15/27] ima: Implement hierarchical processing of file accesses
` [PATCH v10 16/27] ima: Implement ima_free_policy_rules() for freeing of an ima_namespace
` [PATCH v10 17/27] ima: Add functions for creating and "
` [PATCH v10 18/27] integrity/ima: Define ns_status for storing namespaced iint data
` [PATCH v10 19/27] integrity: Add optional callback function to integrity_inode_free()
` [PATCH v10 20/27] ima: Namespace audit status flags
` [PATCH v10 21/27] ima: Remove unused iints from the integrity_iint_cache
` [PATCH v10 22/27] securityfs: Extend securityfs with namespacing support
` [PATCH v10 23/27] ima: Setup securityfs for IMA namespace
` [PATCH v10 24/27] ima: Introduce securityfs file to activate an "
` [PATCH v10 25/27] ima: Show owning user namespace's uid and gid when displaying policy
` [PATCH v10 26/27] ima: Limit number of policy rules in non-init_ima_ns
` [PATCH v10 27/27] ima: Enable IMA namespaces

[PATCH 0/4 v5] fortify: Add Clang support
 2022-02-02 21:27 UTC  (11+ messages)
` [PATCH 1/4] Compiler Attributes: Add Clang's __pass_object_size
` [PATCH 2/4] Compiler Attributes: Add __overloadable
` [PATCH 3/4] Compiler Attributes: Add __diagnose_as
` [PATCH 4/4 v5] fortify: Add Clang support

[PATCH v7 0/5] Allow guest access to EFI confidential computing secret area
 2022-02-02 15:09 UTC  (32+ messages)
` [PATCH v7 1/5] efi: Save location of EFI confidential computing area
` [PATCH v7 2/5] efi/libstub: Reserve confidential computing secret area
` [PATCH v7 3/5] virt: Add efi_secret module to expose confidential computing secrets
` [PATCH v7 4/5] efi: Load efi_secret module if EFI secret area is populated
` [PATCH v7 5/5] docs: security: Add coco/efi_secret documentation

Prezentacja
 2022-02-02  9:32 UTC 

[PATCH v2 00/11] lib/string_helpers: Add a few string helpers
 2022-02-01 21:25 UTC  (24+ messages)
` [PATCH v2 01/11] lib/string_helpers: Consolidate string helpers implementation
` [PATCH v2 02/11] drm/i915: Fix trailing semicolon
` [PATCH v2 03/11] drm/i915: Use str_yes_no()
  ` [Intel-gfx] "
` [PATCH v2 04/11] drm/i915: Use str_enable_disable()
  ` [Intel-gfx] "
` [PATCH v2 05/11] drm/i915: Use str_enabled_disabled()
  ` [Intel-gfx] "
` [PATCH v2 06/11] drm/i915: Use str_on_off()
  ` [Intel-gfx] "
` [PATCH v2 07/11] drm/amd/display: Use str_yes_no()
` [PATCH v2 08/11] drm/gem: Sort includes alphabetically
` [PATCH v2 09/11] drm: Convert open-coded yes/no strings to yesno()
    ` [Intel-gfx] "
` [PATCH v2 10/11] tomoyo: Use str_yes_no()
` [PATCH v2 11/11] cxgb4: "

Leftover info for sb_copy_data and sb_parse_opts_str in include/linux/lsm_hooks.h
 2022-02-01 20:44 UTC  (3+ messages)
  ` [PATCH] lsm: Remove stale info about sb_copy_data and sb_parse_opts_str

[RFC PATCH 0/2] landlock network implementation cover letter
 2022-02-01 18:31 UTC  (13+ messages)
` [RFC PATCH 1/2] landlock: TCP network hooks implementation
` [RFC PATCH 2/2] landlock: selftests for bind and connect hooks

[PATCH v9 00/23] ima: Namespace IMA with audit support in IMA-ns
 2022-01-31 23:43 UTC  (60+ messages)
` [PATCH v9 02/23] ima: Do not print policy rule with inactive LSM labels
` [PATCH v9 04/23] securityfs: Extend securityfs with namespacing support
` [PATCH v9 05/23] ima: Define ima_namespace struct and start moving variables into it
` [PATCH v9 06/23] ima: Move arch_policy_entry into ima_namespace
` [PATCH v9 07/23] ima: Move ima_htable "
` [PATCH v9 08/23] ima: Move measurement list related variables "
` [PATCH v9 09/23] ima: Move some IMA policy and filesystem "
` [PATCH v9 10/23] ima: Move IMA securityfs files into ima_namespace or onto stack
` [PATCH v9 11/23] ima: Move ima_lsm_policy_notifier into ima_namespace
` [PATCH v9 12/23] ima: Define mac_admin_ns_capable() as a wrapper for ns_capable()
` [PATCH v9 13/23] ima: Only accept AUDIT rules for non-init_ima_ns namespaces for now
` [PATCH v9 14/23] userns: Add pointer to ima_namespace to user_namespace
` [PATCH v9 15/23] ima: Implement hierarchical processing of file accesses
` [PATCH v9 16/23] ima: Implement ima_free_policy_rules() for freeing of an ima_namespace
` [PATCH v9 17/23] ima: Add functions for creating and "
` [PATCH v9 20/23] ima: Setup securityfs for IMA namespace
` [PATCH v9 21/23] ima: Introduce securityfs file to activate an "
` [PATCH v9 22/23] ima: Show owning user namespace's uid and gid when displaying policy
` [PATCH v9 23/23] ima: Enable IMA namespaces

[PATCH] ima: Allow template selection with ima_template[_fmt]= after ima_hash=
 2022-01-31 19:20 UTC  (2+ messages)

[PATCH v8 0/5] Enable root to update the blacklist keyring
 2022-01-31 11:33 UTC  (8+ messages)

[PATCH -next 3/3] apparmor: Fix some kernel-doc comments
 2022-01-30  0:03 UTC  (2+ messages)

[PATCH -next 1/3] apparmor: Fix match_mnt_path_str() and match_mnt() kernel-doc comment
 2022-01-30  0:00 UTC  (6+ messages)
` [PATCH -next 2/3] apparmor: Fix some kernel-doc comments
` [PATCH 3/3] "

[GIT PULL] security, lsm: dentry_init_security() Handle multi LSM registration
 2022-01-29 12:51 UTC  (2+ messages)

[PATCH] KEYS: remove support for asym_tpm keys
 2022-01-29  8:29 UTC  (2+ messages)

[PATCH] LSM: general protection fault in legacy_parse_param
 2022-01-28  8:59 UTC  (11+ messages)
        ` [PATCH v2] "

[PATCH v8 0/3] integrity: support including firmware ".platform" keys at build time
 2022-01-27 14:52 UTC  (3+ messages)
` [PATCH v8 1/3] certs: export load_certificate_list() to be used outside certs/

[PATCH] security, lsm: dentry_init_security() Handle multi LSM registration
 2022-01-27  9:15 UTC  (4+ messages)

[PATCH v2] KEYS: trusted: Avoid calling null function trusted_key_exit
 2022-01-27  5:42 UTC  (2+ messages)

[PATCH v4] integrity: check the return value of audit_log_start()
 2022-01-27  2:19 UTC  (2+ messages)

[RFC PATCH] mm: create security context for memfd_secret inodes
 2022-01-26 23:01 UTC  (2+ messages)

[PATCH v10 0/8] Enroll kernel keys thru MOK
 2022-01-26 22:06 UTC  (4+ messages)

[PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
 2022-01-26 20:56 UTC  (4+ messages)

[PATCH] KEYS: trusted: Avoid calling null function trusted_key_exit
 2022-01-26 20:21 UTC  (2+ messages)

Custom LSM: getting a null pointer dereference when trying to access a task security blob
 2022-01-26 17:36 UTC  (7+ messages)

[PATCH][next] apparmor: Use struct_size() helper in kmalloc()
 2022-01-26  9:30 UTC  (2+ messages)

[PATCH 0/3] lib/string_helpers: Add a few string helpers
 2022-01-26  9:05 UTC  (4+ messages)
` [PATCH 3/3] drm: Convert open yes/no strings to yesno()


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).