linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2022-03-02 04:38:00 to 2022-03-11 03:20:15 UTC [more...]

[PATCH v3 0/9] bpf-lsm: Extend interoperability with IMA
 2022-03-11  3:20 UTC  (26+ messages)
` [PATCH v3 1/9] ima: Fix documentation-related warnings in ima_main.c
` [PATCH v3 2/9] ima: Always return a file measurement in ima_file_hash()
` [PATCH v3 3/9] bpf-lsm: Introduce new helper bpf_ima_file_hash()
` [PATCH v3 4/9] selftests/bpf: Move sample generation code to ima_test_common()
` [PATCH v3 5/9] selftests/bpf: Add test for bpf_ima_file_hash()
` [PATCH v3 6/9] selftests/bpf: Check if the digest is refreshed after a file write
` [PATCH v3 7/9] bpf-lsm: Make bpf_lsm_kernel_read_file() as sleepable
` [PATCH v3 8/9] selftests/bpf: Add test for bpf_lsm_kernel_read_file()
` [PATCH v3 9/9] selftests/bpf: Check that bpf_kernel_read_file() denies reading IMA policy

[PATCH 03/17] io_uring: add infra and support for IORING_OP_URING_CMD
 2022-03-11  2:43 UTC  (2+ messages)

[PATCH v33 00/29] LSM: Module stacking for AppArmor
 2022-03-10 23:46 UTC  (30+ messages)
  ` [PATCH v33 01/29] integrity: disassociate ima_filter_rule from security_audit_rule
  ` [PATCH v33 02/29] LSM: Infrastructure management of the sock security
  ` [PATCH v33 03/29] LSM: Add the lsmblob data structure
  ` [PATCH v33 04/29] LSM: provide lsm name and id slot mappings
  ` [PATCH v33 05/29] IMA: avoid label collisions with stacked LSMs
  ` [PATCH v33 06/29] LSM: Use lsmblob in security_audit_rule_match
  ` [PATCH v33 07/29] LSM: Use lsmblob in security_kernel_act_as
  ` [PATCH v33 08/29] LSM: Use lsmblob in security_secctx_to_secid
  ` [PATCH v33 09/29] LSM: Use lsmblob in security_secid_to_secctx
  ` [PATCH v33 10/29] LSM: Use lsmblob in security_ipc_getsecid
  ` [PATCH v33 11/29] LSM: Use lsmblob in security_current_getsecid
  ` [PATCH v33 12/29] LSM: Use lsmblob in security_inode_getsecid
  ` [PATCH v33 13/29] LSM: Use lsmblob in security_cred_getsecid
  ` [PATCH v33 14/29] LSM: Specify which LSM to display
  ` [PATCH v33 15/29] LSM: Ensure the correct LSM context releaser
  ` [PATCH v33 16/29] LSM: Use lsmcontext in security_secid_to_secctx
  ` [PATCH v33 17/29] LSM: Use lsmcontext in security_inode_getsecctx
  ` [PATCH v33 18/29] LSM: security_secid_to_secctx in netlink netfilter
  ` [PATCH v33 19/29] NET: Store LSM netlabel data in a lsmblob
  ` [PATCH v33 20/29] binder: Pass LSM identifier for confirmation
  ` [PATCH v33 21/29] LSM: Extend security_secid_to_secctx to include module selection
  ` [PATCH v33 22/29] Audit: Keep multiple LSM data in audit_names
  ` [PATCH v33 23/29] Audit: Create audit_stamp structure
  ` [PATCH v33 24/29] LSM: Add a function to report multiple LSMs
  ` [PATCH v33 25/29] Audit: Allow multiple records in an audit_buffer
  ` [PATCH v33 26/29] Audit: Add record for multiple task security contexts
  ` [PATCH v33 27/29] Audit: Add record for multiple object "
  ` [PATCH v33 28/29] LSM: Add /proc attr entry for full LSM context
  ` [PATCH v33 29/29] AppArmor: Remove the exclusive flag

[PATCH v19 0/4] overlayfs override_creds=off & nested get xattr fix
 2022-03-10 22:11 UTC  (8+ messages)

[PATCH v11 0/4] integrity: support including firmware ".platform" keys at build time
 2022-03-10 21:44 UTC  (5+ messages)
` [PATCH v11 1/4] certs: export load_certificate_list() to be used outside certs/
` [PATCH v11 2/4] integrity: make integrity_keyring_from_id() non-static
` [PATCH v11 3/4] certs: conditionally build extract-cert if platform keyring is enabled
` [PATCH v11 4/4] integrity: support including firmware ".platform" keys at build time

[PATCH v1] fs: Fix inconsistent f_mode
 2022-03-10  0:36 UTC  (5+ messages)

[PATCH v8 0/5] Enable root to update the blacklist keyring
 2022-03-09 23:11 UTC  (9+ messages)
` [PATCH v8 5/5] certs: Allow root user to append signed hashes to "

[PATCH 0/4] Add CA enforcement in the machine keyring
 2022-03-09 19:02 UTC  (26+ messages)
` [PATCH 2/4] X.509: Parse Basic Constraints for CA
` [PATCH 3/4] KEYS: CA link restriction
` [PATCH 4/4] integrity: CA enforcement in machine keyring

[LSF/MM/BPF TOPIC] DIGLIM eBPF
 2022-03-09 16:46 UTC 

[RFC PATCH v4 00/15] Landlock LSM
 2022-03-09 13:44 UTC  (16+ messages)
` [RFC PATCH v4 01/15] landlock: access mask renaming
` [RFC PATCH v4 02/15] landlock: filesystem access mask helpers
` [RFC PATCH v4 03/15] landlock: landlock_find/insert_rule refactoring
` [RFC PATCH v4 04/15] landlock: merge and inherit function refactoring
` [RFC PATCH v4 05/15] landlock: unmask_layers() "
` [RFC PATCH v4 06/15] landlock: landlock_add_rule syscall refactoring
` [RFC PATCH v4 07/15] landlock: user space API network support
` [RFC PATCH v4 08/15] landlock: add support network rules
` [RFC PATCH v4 09/15] landlock: TCP network hooks implementation
` [RFC PATCH v4 10/15] seltest/landlock: add tests for bind() hooks
` [RFC PATCH v4 11/15] seltest/landlock: add tests for connect() hooks
` [RFC PATCH v4 12/15] seltest/landlock: connect() with AF_UNSPEC tests
` [RFC PATCH v4 13/15] seltest/landlock: rules overlapping test
` [RFC PATCH v4 14/15] seltest/landlock: ruleset expanding test
` [RFC PATCH v4 15/15] seltest/landlock: invalid user input data test

Napływ Klientów ze strony
 2022-03-09  8:55 UTC 

[PATCH] selinux: log anon inode class name
 2022-03-08 17:12 UTC  (4+ messages)
` [PATCH v2] "

[PATCH v10 0/3] integrity: support including firmware ".platform" keys at build time
 2022-03-08  9:33 UTC  (8+ messages)
` [PATCH v10 1/3] certs: export load_certificate_list() to be used outside certs/
` [PATCH v10 2/3] integrity: make integrity_keyring_from_id() non-static
` [PATCH v10 3/3] integrity: support including firmware ".platform" keys at build time

[PATCH v5 0/5] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
 2022-03-07  4:48 UTC  (7+ messages)
` [PATCH v5 3/5] KEYS: trusted: allow trust sources to use kernel RNG for key material
    ` [EXT] "
` [PATCH v5 5/5] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
  ` [EXT] "

[PATCH v9 0/3] integrity: support including firmware ".platform" keys at build time
 2022-03-06  2:10 UTC  (9+ messages)
` [PATCH v9 1/3] certs: export load_certificate_list() to be used outside certs/
` [PATCH v9 2/3] integrity: make integrity_keyring_from_id() non-static
` [PATCH v9 3/3] integrity: support including firmware ".platform" keys at build time

[PATCH] KEYS: remove support for asym_tpm keys
 2022-03-05  5:41 UTC  (5+ messages)

[PATCH v32 00/28] LSM: Module stacking for AppArmor
 2022-03-04 19:14 UTC  (16+ messages)
` [PATCH v32 03/28] LSM: Add the lsmblob data structure
` [PATCH v32 24/28] Audit: Add framework for auxiliary records
` [PATCH v32 26/28] Audit: Add record for multiple object security contexts

[PATCH RESEND] xfs: don't generate selinux audit messages for capability testing
 2022-03-04  0:30 UTC  (7+ messages)

a few trivial bdevname() removals
 2022-03-03 17:29 UTC  (12+ messages)
` [PATCH 1/5] block: stop using bdevname in bdev_write_inode
` [PATCH 2/5] block: stop using bdevname in __blkdev_issue_discard
` [PATCH 3/5] block: stop using bdevname in drbd_report_io_error
` [PATCH 4/5] pktcdvd: stop using bdevname
` [PATCH 5/5] loadpin: "

[PATCH] KEYS: fix memory leak when reading certificate fails
 2022-03-03 12:56 UTC  (3+ messages)
` [PATCH v2] KEYS: fix memory leaks when reading certificate

[PATCH v11 00/27] ima: Namespace IMA with audit support in IMA-ns
 2022-03-02 23:11 UTC  (30+ messages)
` [PATCH v11 01/27] ima: Return error code obtained from securityfs functions
` [PATCH v11 02/27] securityfs: rework dentry creation
` [PATCH v11 03/27] securityfs: Extend securityfs with namespacing support
` [PATCH v11 04/27] ima: Define ima_namespace struct and start moving variables into it
` [PATCH v11 05/27] ima: Move arch_policy_entry into ima_namespace
` [PATCH v11 06/27] ima: Move ima_htable "
` [PATCH v11 07/27] ima: Move measurement list related variables "
` [PATCH v11 08/27] ima: Move some IMA policy and filesystem "
` [PATCH v11 09/27] ima: Move IMA securityfs files into ima_namespace or onto stack
` [PATCH v11 10/27] ima: Move ima_lsm_policy_notifier into ima_namespace
` [PATCH v11 11/27] ima: Switch to lazy lsm policy updates for better performance
` [PATCH v11 12/27] ima: Define mac_admin_ns_capable() as a wrapper for ns_capable()
` [PATCH v11 13/27] ima: Only accept AUDIT rules for non-init_ima_ns namespaces for now
` [PATCH v11 14/27] userns: Add pointer to ima_namespace to user_namespace
` [PATCH v11 15/27] ima: Implement hierarchical processing of file accesses
` [PATCH v11 16/27] ima: Implement ima_free_policy_rules() for freeing of an ima_namespace
` [PATCH v11 17/27] ima: Add functions for creating and "
` [PATCH v11 18/27] integrity/ima: Define ns_status for storing namespaced iint data
` [PATCH v11 19/27] integrity: Add optional callback function to integrity_inode_free()
` [PATCH v11 20/27] ima: Namespace audit status flags
` [PATCH v11 21/27] ima: Remove unused iints from the integrity_iint_cache
` [PATCH v11 22/27] ima: Setup securityfs for IMA namespace
` [PATCH v11 23/27] ima: Introduce securityfs file to activate an "
` [PATCH v11 24/27] ima: Show owning user namespace's uid and gid when displaying policy
` [PATCH v11 25/27] ima: Limit number of policy rules in non-init_ima_ns
` [PATCH v11 26/27] ima: Restrict informational audit messages to init_ima_ns
` [PATCH v11 27/27] ima: Enable IMA namespaces


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).