messages from 2022-03-28 11:23:04 to 2022-04-08 01:20:07 UTC [more...]
[PATCH v2 00/12] Landlock: file linking and renaming support
2022-04-08 1:19 UTC (14+ messages)
` [PATCH v2 01/12] landlock: Define access_mask_t to enforce a consistent access mask size
` [PATCH v2 02/12] landlock: Reduce the maximum number of layers to 16
` [PATCH v2 03/12] landlock: Create find_rule() from unmask_layers()
` [PATCH v2 04/12] landlock: Fix same-layer rule unions
` [PATCH v2 05/12] landlock: Move filesystem helpers and add a new one
` [PATCH v2 06/12] LSM: Remove double path_rename hook calls for RENAME_EXCHANGE
` [PATCH v2 07/12] landlock: Add support for file reparenting with LANDLOCK_ACCESS_FS_REFER
` [PATCH v2 08/12] selftest/landlock: Add 11 new test suites dedicated to file reparenting
` [PATCH v2 09/12] samples/landlock: Add support for "
` [PATCH v2 10/12] landlock: Document LANDLOCK_ACCESS_FS_REFER and ABI versioning
` [PATCH v2 11/12] landlock: Document good practices about filesystem policies
` [PATCH v2 12/12] landlock: Add design choices documentation for filesystem access rights
[PATCH v3 0/1] ima: fix boot command line issue
2022-04-08 1:12 UTC (5+ messages)
` [PATCH v3 1/1] ima: remove the IMA_TEMPLATE Kconfig option
[PATCH v34 00/29] LSM: Module stacking for AppArmor
2022-04-07 21:22 UTC (30+ messages)
` [PATCH v34 01/29] integrity: disassociate ima_filter_rule from security_audit_rule
` [PATCH v34 02/29] LSM: Infrastructure management of the sock security
` [PATCH v34 03/29] LSM: Add the lsmblob data structure
` [PATCH v34 04/29] LSM: provide lsm name and id slot mappings
` [PATCH v34 05/29] IMA: avoid label collisions with stacked LSMs
` [PATCH v34 06/29] LSM: Use lsmblob in security_audit_rule_match
` [PATCH v34 07/29] LSM: Use lsmblob in security_kernel_act_as
` [PATCH v34 08/29] LSM: Use lsmblob in security_secctx_to_secid
` [PATCH v34 09/29] LSM: Use lsmblob in security_secid_to_secctx
` [PATCH v34 10/29] LSM: Use lsmblob in security_ipc_getsecid
` [PATCH v34 11/29] LSM: Use lsmblob in security_current_getsecid
` [PATCH v34 12/29] LSM: Use lsmblob in security_inode_getsecid
` [PATCH v34 13/29] LSM: Use lsmblob in security_cred_getsecid
` [PATCH v34 14/29] LSM: Specify which LSM to display
` [PATCH v34 15/29] LSM: Ensure the correct LSM context releaser
` [PATCH v34 16/29] LSM: Use lsmcontext in security_secid_to_secctx
` [PATCH v34 17/29] LSM: Use lsmcontext in security_inode_getsecctx
` [PATCH v34 18/29] LSM: security_secid_to_secctx in netlink netfilter
` [PATCH v34 19/29] NET: Store LSM netlabel data in a lsmblob
` [PATCH v34 20/29] binder: Pass LSM identifier for confirmation
` [PATCH v34 21/29] LSM: Extend security_secid_to_secctx to include module selection
` [PATCH v34 22/29] Audit: Keep multiple LSM data in audit_names
` [PATCH v34 23/29] Audit: Create audit_stamp structure
` [PATCH v34 24/29] LSM: Add a function to report multiple LSMs
` [PATCH v34 25/29] Audit: Allow multiple records in an audit_buffer
` [PATCH v34 26/29] Audit: Add record for multiple task security contexts
` [PATCH v34 27/29] Audit: Add record for multiple object contexts
` [PATCH v34 28/29] LSM: Add /proc attr entry for full LSM context
` [PATCH v34 29/29] AppArmor: Remove the exclusive flag
[PATCH] security: don't treat structure as an array of struct hlist_head
2022-04-07 17:59 UTC
[PATCH v9 0/4] Allow guest access to EFI confidential computing secret area
2022-04-07 10:37 UTC (8+ messages)
` [PATCH v9 1/4] efi: Save location of EFI confidential computing area
` [PATCH v9 2/4] virt: Add efi_secret module to expose confidential computing secrets
` [PATCH v9 3/4] efi: Register efi_secret platform device if EFI secret area is declared
` [PATCH v9 4/4] docs: security: Add secrets/coco documentation
[PATCH v2] ima: remove the IMA_TEMPLATE Kconfig option
2022-04-07 2:18 UTC (3+ messages)
[PATCH 0/7] Add CA enforcement keyring restrictions
2022-04-07 1:04 UTC (12+ messages)
` [PATCH 1/7] KEYS: Create static version of public_key_verify_signature
` [PATCH 2/7] KEYS: X.509: Parse Basic Constraints for CA
` [PATCH 3/7] KEYS: X.509: Parse Key Usage
` [PATCH 4/7] KEYS: Introduce a builtin root of trust key flag
` [PATCH 5/7] KEYS: Introduce sig restriction that validates root of trust
` [PATCH 6/7] KEYS: X.509: Flag Intermediate CA certs as built in
` [PATCH 7/7] integrity: Use root of trust signature restriction
[PATCH 1/4] Fix arm64 kexec forbidding kernels signed with keys in the secondary keyring to boot
2022-04-06 15:46 UTC (14+ messages)
` [PATCH 2/4] kexec, KEYS, arm64: Make use of platform keyring for signature verification
` [PATCH 3/4] kexec, KEYS, s390: Make use of built-in and secondary "
` [PATCH 4/4] module, KEYS: Make use of platform "
[PATCH net] sctp: use the correct skb for security_sctp_assoc_request
2022-04-06 15:11 UTC (6+ messages)
[RFC PATCH v4 00/15] Landlock LSM
2022-04-06 14:17 UTC (11+ messages)
` [RFC PATCH v4 01/15] landlock: access mask renaming
` [RFC PATCH v4 10/15] seltest/landlock: add tests for bind() hooks
[PATCH] ima: remove template "ima" as the compiled default
2022-04-06 1:48 UTC (3+ messages)
[PATCH v2] keys: remove __user annotation from function prototype
2022-04-06 1:44 UTC
[PATCH 00/18] bpf: Secure and authenticated preloading of eBPF programs
2022-04-06 6:55 UTC (45+ messages)
` [PATCH 01/18] bpf: Export bpf_link_inc()
` [PATCH 02/18] bpf-preload: Move bpf_preload.h to include/linux
` [PATCH 03/18] bpf-preload: Generalize object pinning from the kernel
` [PATCH 04/18] bpf-preload: Export and call bpf_obj_do_pin_kernel()
` [PATCH 05/18] bpf-preload: Generate static variables
` [PATCH 06/18] bpf-preload: Generate free_objs_and_skel()
` [PATCH 07/18] bpf-preload: Generate preload()
` [PATCH 08/18] bpf-preload: Generate load_skel()
` [PATCH 09/18] bpf-preload: Generate code to pin non-internal maps
` [PATCH 10/18] bpf-preload: Generate bpf_preload_ops
` [PATCH 11/18] bpf-preload: Store multiple bpf_preload_ops structures in a linked list
` [PATCH 12/18] bpf-preload: Implement new registration method for preloading eBPF programs
` [PATCH 13/18] bpf-preload: Move pinned links and maps to a dedicated directory in bpffs
` [PATCH 14/18] bpf-preload: Switch to new preload registration method
` [PATCH 15/18] bpf-preload: Generate code of kernel module to preload
` [PATCH 16/18] bpf-preload: Do kernel mount to ensure that pinned objects don't disappear
` [PATCH 17/18] bpf-preload/selftests: Add test for automatic generation of preload methods
` [PATCH 18/18] bpf-preload/selftests: Preload a test eBPF program and check pinned objects
` [POC][USER SPACE][PATCH] Introduce LSM to protect "
[PATCH v2 0/1] ima: fix boot command line issue
2022-04-06 6:37 UTC (2+ messages)
` [PATCH v2 1/1] ima: remove the IMA_TEMPLATE Kconfig option
[PATCH v2] ima: remove the IMA_TEMPLATE Kconfig option
2022-04-06 3:32 UTC
[GIT PULL] Add trusted_for(2) (was O_MAYEXEC)
2022-04-05 22:21 UTC (16+ messages)
[PATCH] ima: remove redundant initialization of pointer 'file'
2022-04-05 12:43 UTC (2+ messages)
[PATCH 5.15 137/913] landlock: Use square brackets around "landlock-ruleset"
2022-04-05 7:21 UTC (2+ messages)
` [PATCH 5.15 235/913] KEYS: trusted: Avoid calling null function trusted_key_exit
[PATCH 5.16 0143/1017] landlock: Use square brackets around "landlock-ruleset"
2022-04-05 7:19 UTC (2+ messages)
` [PATCH 5.16 0248/1017] KEYS: trusted: Avoid calling null function trusted_key_exit
Prezentacja
2022-04-05 7:43 UTC
[PATCH 5.17 0138/1126] landlock: Use square brackets around "landlock-ruleset"
2022-04-05 7:16 UTC (2+ messages)
` [PATCH 5.17 0255/1126] KEYS: trusted: Avoid calling null function trusted_key_exit
[PATCH] selinux: log anon inode class name
2022-04-04 20:18 UTC (3+ messages)
` [PATCH v2] "
[PATCH 1/5] apparmor: Remove redundant assignments
2022-04-03 8:06 UTC (6+ messages)
` [PATCH 2/5] integrity: "
` [PATCH 3/5] keys: "
` [PATCH 5/5] smack: "
[PATCH AUTOSEL 5.10 62/65] netlabel: fix out-of-bounds memory accesses
2022-04-01 14:42 UTC
[PATCH AUTOSEL 5.4 35/37] netlabel: fix out-of-bounds memory accesses
2022-04-01 14:44 UTC
[PATCH AUTOSEL 5.16 104/109] netlabel: fix out-of-bounds memory accesses
2022-04-01 14:32 UTC
[PATCH AUTOSEL 5.15 93/98] netlabel: fix out-of-bounds memory accesses
2022-04-01 14:37 UTC
[PATCH AUTOSEL 5.17 144/149] netlabel: fix out-of-bounds memory accesses
2022-04-01 14:25 UTC
[PATCH v8 0/4] Allow guest access to EFI confidential computing secret area
2022-03-31 21:05 UTC (13+ messages)
` [PATCH v8 3/4] efi: Load efi_secret module if EFI secret area is populated
[PATCH v2] KEYS: fix memory leaks when reading certificate
2022-03-30 15:37 UTC (3+ messages)
` [PATCH] KEYS: fix memory leak when reading certificate fails
[PATCH v8 5/5] certs: Allow root user to append signed hashes to the blacklist keyring
2022-03-30 13:44 UTC (4+ messages)
` [PATCH v8 0/5] Enable root to update "
[PATCH AUTOSEL 4.14 3/8] Fix incorrect type in assignment of ipv6 port for audit
2022-03-28 11:24 UTC
[PATCH AUTOSEL 4.9 3/8] Fix incorrect type in assignment of ipv6 port for audit
2022-03-28 11:24 UTC
[PATCH AUTOSEL 4.19 03/12] Fix incorrect type in assignment of ipv6 port for audit
2022-03-28 11:24 UTC
[PATCH AUTOSEL 5.4 01/16] LSM: general protection fault in legacy_parse_param
2022-03-28 11:23 UTC (2+ messages)
` [PATCH AUTOSEL 5.4 07/16] Fix incorrect type in assignment of ipv6 port for audit
[PATCH AUTOSEL 5.15 01/29] LSM: general protection fault in legacy_parse_param
2022-03-28 11:21 UTC (2+ messages)
` [PATCH AUTOSEL 5.15 15/29] Fix incorrect type in assignment of ipv6 port for audit
[PATCH AUTOSEL 5.16 01/35] LSM: general protection fault in legacy_parse_param
2022-03-28 11:19 UTC (2+ messages)
` [PATCH AUTOSEL 5.16 19/35] Fix incorrect type in assignment of ipv6 port for audit
[PATCH AUTOSEL 5.10 01/21] LSM: general protection fault in legacy_parse_param
2022-03-28 11:22 UTC (2+ messages)
` [PATCH AUTOSEL 5.10 09/21] Fix incorrect type in assignment of ipv6 port for audit
[PATCH AUTOSEL 5.17 01/43] LSM: general protection fault in legacy_parse_param
2022-03-28 11:18 UTC (2+ messages)
` [PATCH AUTOSEL 5.17 24/43] Fix incorrect type in assignment of ipv6 port for audit
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).