linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2022-02-01 20:39:02 to 2022-02-15 12:41:45 UTC [more...]

[PATCH v2 0/6] bpf-lsm: Extend interoperability with IMA
 2022-02-15 12:40 UTC  (2+ messages)
` [PATCH v2 1/6] ima: Fix documentation-related warnings in ima_main.c

[PATCH] ima: Calculate digest in ima_inode_hash() if not available
 2022-02-15 11:16 UTC  (9+ messages)

[PATCH net v3 0/2] security: fixups for the security hooks in sctp
 2022-02-15  9:41 UTC  (9+ messages)
` [PATCH net v3 1/2] security: add sctp_assoc_established hook
` [PATCH net v3 2/2] security: implement sctp_assoc_established hook in selinux

[PATCH v5 0/6] KEXEC_SIG with appended signature
 2022-02-14 17:09 UTC  (19+ messages)
` [PATCH v5 2/6] powerpc/kexec_file: Add KEXEC_SIG support
` [PATCH v5 3/6] kexec_file: Don't opencode appended signature verification

[PATCH v8 00/17] Enroll kernel keys thru MOK
 2022-02-14 12:42 UTC  (17+ messages)
` [PATCH v8 07/17] integrity: restrict INTEGRITY_KEYRING_MACHINE to restrict_link_by_ca
` [PATCH v8 10/17] KEYS: add a reference to machine keyring
` [PATCH v8 11/17] KEYS: Introduce link restriction for machine keys
` [PATCH v8 13/17] integrity: store reference to machine keyring
` [PATCH v8 14/17] KEYS: link machine trusted keys to secondary_trusted_keys
` [PATCH v8 15/17] efi/mokvar: move up init order
` [PATCH v8 16/17] integrity: Trust MOK keys if MokListTrustedRT found
` [PATCH v8 17/17] integrity: Only use machine keyring when uefi_check_trust_mok_keys is true

W sprawie samochodu
 2022-02-14  8:50 UTC 

[PATCH] apparmor: fix aa_label_asxprint return check
 2022-02-14  3:40 UTC  (2+ messages)

[PATCH] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
 2022-02-14  0:33 UTC  (24+ messages)
    ` [PATCH v2] "
      ` [PATCH v3] "

[PATCH v10 00/27] ima: Namespace IMA with audit support in IMA-ns
 2022-02-10 12:03 UTC  (21+ messages)
` [PATCH v10 01/27] ima: Remove ima_policy file before directory
` [PATCH v10 02/27] ima: Do not print policy rule with inactive LSM labels
` [PATCH v10 03/27] ima: Return error code obtained from securityfs functions
` [PATCH v10 04/27] securityfs: rework dentry creation
` [PATCH v10 09/27] ima: Move some IMA policy and filesystem related variables into ima_namespace
` [PATCH v10 12/27] ima: Define mac_admin_ns_capable() as a wrapper for ns_capable()
` [PATCH v10 14/27] userns: Add pointer to ima_namespace to user_namespace
` [PATCH v10 25/27] ima: Show owning user namespace's uid and gid when displaying policy

[RFC PATCH 0/2] landlock network implementation cover letter
 2022-02-10 10:16 UTC  (33+ messages)
` [RFC PATCH 1/2] landlock: TCP network hooks implementation
` [RFC PATCH 2/2] landlock: selftests for bind and connect hooks

[BUG] Unable to write the NVRAM on T2 Macs if CONFIG_INTEGRITY_PLATFORM_KEYRING and CONFIG_LOAD_UEFI_KEYS are enabled
 2022-02-09  6:51 UTC 

Problem with commit ccf11dbaa07b ("evm: Fix memleak in init_desc")
 2022-02-09  1:42 UTC  (3+ messages)

[PATCH v7 0/5] Allow guest access to EFI confidential computing secret area
 2022-02-09  0:25 UTC  (34+ messages)
` [PATCH v7 1/5] efi: Save location of EFI confidential computing area
` [PATCH v7 2/5] efi/libstub: Reserve confidential computing secret area
` [PATCH v7 3/5] virt: Add efi_secret module to expose confidential computing secrets
` [PATCH v7 4/5] efi: Load efi_secret module if EFI secret area is populated
` [PATCH v7 5/5] docs: security: Add coco/efi_secret documentation

[PATCH v10 0/8] Enroll kernel keys thru MOK
 2022-02-08 15:26 UTC  (6+ messages)
        ` MAINTAINERS update suggestion (subject change)

[PATCH] KEYS: remove support for asym_tpm keys
 2022-02-08  9:31 UTC  (2+ messages)

[PATCH] KEYS: trusted: fix crash when TPM/TEE are built as module
 2022-02-07 23:12 UTC  (3+ messages)

[ANNOUNCE][CFP] Linux Security Summit North America 2022
 2022-02-07 22:24 UTC 

[PATCH] KEYS: trusted: Avoid calling null function trusted_key_exit
 2022-02-07 17:40 UTC  (3+ messages)

宇土センターホテル "6t8h6t97"
 2022-02-06 10:25 UTC 

TOMOYO can't be enabled with other major LSM
 2022-02-06  7:57 UTC 

Aufmerksamkeit:
 2022-02-05 21:04 UTC 

[PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
 2022-02-04  6:27 UTC  (5+ messages)

[GIT PULL] SELinux fixes for v5.17 (#1)
 2022-02-04  1:16 UTC  (2+ messages)

[PATCH 0/4 v5] fortify: Add Clang support
 2022-02-04  0:28 UTC  (16+ messages)
` [PATCH 1/4] Compiler Attributes: Add Clang's __pass_object_size
` [PATCH 2/4] Compiler Attributes: Add __overloadable
` [PATCH 3/4] Compiler Attributes: Add __diagnose_as
` [PATCH 4/4 v5] fortify: Add Clang support

[PATCH v32 00/28] LSM: Module stacking for AppArmor
 2022-02-02 23:53 UTC  (29+ messages)
  ` [PATCH v32 01/28] integrity: disassociate ima_filter_rule from security_audit_rule
  ` [PATCH v32 02/28] LSM: Infrastructure management of the sock security
  ` [PATCH v32 03/28] LSM: Add the lsmblob data structure
  ` [PATCH v32 04/28] LSM: provide lsm name and id slot mappings
  ` [PATCH v32 05/28] IMA: avoid label collisions with stacked LSMs
  ` [PATCH v32 06/28] LSM: Use lsmblob in security_audit_rule_match
  ` [PATCH v32 07/28] LSM: Use lsmblob in security_kernel_act_as
  ` [PATCH v32 08/28] LSM: Use lsmblob in security_secctx_to_secid
  ` [PATCH v32 09/28] LSM: Use lsmblob in security_secid_to_secctx
  ` [PATCH v32 10/28] LSM: Use lsmblob in security_ipc_getsecid
  ` [PATCH v32 11/28] LSM: Use lsmblob in security_current_getsecid
  ` [PATCH v32 12/28] LSM: Use lsmblob in security_inode_getsecid
  ` [PATCH v32 13/28] LSM: Use lsmblob in security_cred_getsecid
  ` [PATCH v32 14/28] LSM: Specify which LSM to display
  ` [PATCH v32 15/28] LSM: Ensure the correct LSM context releaser
  ` [PATCH v32 16/28] LSM: Use lsmcontext in security_secid_to_secctx
  ` [PATCH v32 17/28] LSM: Use lsmcontext in security_inode_getsecctx
  ` [PATCH v32 18/28] LSM: security_secid_to_secctx in netlink netfilter
  ` [PATCH v32 19/28] NET: Store LSM netlabel data in a lsmblob
  ` [PATCH v32 20/28] binder: Pass LSM identifier for confirmation
  ` [PATCH v32 21/28] LSM: Extend security_secid_to_secctx to include module selection
  ` [PATCH v32 22/28] Audit: Keep multiple LSM data in audit_names
  ` [PATCH v32 23/28] Audit: Create audit_stamp structure
  ` [PATCH v32 24/28] Audit: Add framework for auxiliary records
  ` [PATCH v32 25/28] Audit: Add record for multiple task security contexts
  ` [PATCH v32 26/28] Audit: Add record for multiple object "
  ` [PATCH v32 27/28] LSM: Add /proc attr entry for full LSM context
  ` [PATCH v32 28/28] AppArmor: Remove the exclusive flag

Prezentacja
 2022-02-02  9:32 UTC 

[PATCH v2 00/11] lib/string_helpers: Add a few string helpers
 2022-02-01 21:25 UTC  (9+ messages)
` [PATCH v2 03/11] drm/i915: Use str_yes_no()
  ` [Intel-gfx] "
` [PATCH v2 04/11] drm/i915: Use str_enable_disable()
  ` [Intel-gfx] "
` [PATCH v2 05/11] drm/i915: Use str_enabled_disabled()
  ` [Intel-gfx] "
` [PATCH v2 06/11] drm/i915: Use str_on_off()
  ` [Intel-gfx] "

Leftover info for sb_copy_data and sb_parse_opts_str in include/linux/lsm_hooks.h
 2022-02-01 20:44 UTC  (3+ messages)
  ` [PATCH] lsm: Remove stale info about sb_copy_data and sb_parse_opts_str


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).