June 2024 Archives by thread
Starting: Sat Jun 1 16:38:20 UTC 2024
Ending: Sat Jun 29 08:43:31 UTC 2024
Messages: 364
- [GIT PULL] Landlock fix for v6.10-rc2
pr-tracker-bot at kernel.org
- [PATCH 0/6] kernel: Avoid memcpy of task comm
Yafang Shao
- [PATCH] smack: tcp: ipv4, fix incorrect labeling and unauthorized writes
Konstantin Andreev
- [PATCH v19 15/20] fsverity: expose verified fsverity built-in signatures to LSMs
Paul Moore
- [PATCH v3] ima: Avoid blocking in RCU read-side critical section
Mimi Zohar
- [PATCH v2] landlock: Add abstract unix socket connect restrictions
Mickaël Salaün
- [RFC PATCH v3 3/5] KVM: x86: Add notifications for Heki policy configuration and violation
Mickaël Salaün
- [RFC PATCH] lsm: fixup the inode xattr capability handling
Paul Moore
- [PATCH 1/2] yama: document function parameter
Paul Moore
- [PATCH v1 1/1] treewide: Align match_string() with sysfs_match_string()
Hans de Goede
- [PATCH v2] KEYS: trusted: add missing MODULE_DESCRIPTION()
Jarkko Sakkinen
- [PATCH v7 3/5] crypto: tpm2_key: Introduce a TPM2 key type
Jarkko Sakkinen
- [RFC PATCH v2 0/8] Clavis LSM
Jarkko Sakkinen
- [RFC PATCH v2 1/8] certs: Introduce ability to link to a system key
Jarkko Sakkinen
- [RFC PATCH v2 00/12] Socket type control for Landlock
Günther Noack
- [PATCH v5 1/2] proc: pass file instead of inode to proc_mem_open
Adrian Ratiu
- [RFC PATCH v2 01/12] landlock: Support socket access-control
Günther Noack
- [RFC PATCH v2 02/12] landlock: Add hook on socket creation
Günther Noack
- [PATCH v3] landlock: Add abstract unix socket connect restriction
Tahera Fahimi
- [PATCH v12 0/5] Reduce overhead of LSMs with static calls
Kees Cook
- (subset) [PATCH 1/2] yama: document function parameter
Kees Cook
- [PATCH bpf-next v3 01/11] bpf, lsm: Annotate lsm hook return value range
Paul Moore
- [PATCH v3 0/2] KEYS: add missing MODULE_DESCRIPTION() macros
Jeff Johnson
- [PATCH v3 1/2] KEYS: trusted: add missing MODULE_DESCRIPTION()
Jeff Johnson
- [PATCH v3 2/2] KEYS: encrypted: add missing MODULE_DESCRIPTION()
Jeff Johnson
- IMA Reports No TPM Device
Thangavel, Karthik
- [PATCH 2/2] cipso: make cipso_v4_skbuff_delattr() fully remove the CIPSO options
Ondrej Mosnacek
- [PATCH v2 0/2] cipso: make cipso_v4_skbuff_delattr() fully remove the CIPSO options
Ondrej Mosnacek
- [PATCH] perf trace: Fix syscall untraceable bug
Howard Chu
- [PATCH v2 0/4] Introduce user namespace capabilities
Jonathan Calmels
- [PATCH v2 1/4] capabilities: Add user namespace capabilities
Jonathan Calmels
- [PATCH v2 2/4] capabilities: Add securebit to restrict userns caps
Jonathan Calmels
- [PATCH v2 3/4] capabilities: Add sysctl to mask off userns caps
Jonathan Calmels
- [PATCH v2 4/4] bpf,lsm: Allow editing capabilities in BPF-LSM hooks
Jonathan Calmels
- [PATCH v2 4/4] bpf, lsm: Allow editing capabilities in BPF-LSM hooks
Paul Moore
- [PATCH v2 4/4] bpf,lsm: Allow editing capabilities in BPF-LSM hooks
Jonathan Calmels
- [PATCH v2 4/4] bpf,lsm: Allow editing capabilities in BPF-LSM hooks
John Johansen
- [PATCH v2 4/4] bpf, lsm: Allow editing capabilities in BPF-LSM hooks
Paul Moore
- [PATCH v2 4/4] bpf,lsm: Allow editing capabilities in BPF-LSM hooks
Jonathan Calmels
- [PATCH v2 4/4] bpf, lsm: Allow editing capabilities in BPF-LSM hooks
Paul Moore
- [PATCH v2 4/4] bpf,lsm: Allow editing capabilities in BPF-LSM hooks
Jonathan Calmels
- [PATCH v2 4/4] bpf, lsm: Allow editing capabilities in BPF-LSM hooks
Paul Moore
- [PATCH v2 4/4] bpf,lsm: Allow editing capabilities in BPF-LSM hooks
John Johansen
- [PATCH v2 4/4] bpf,lsm: Allow editing capabilities in BPF-LSM hooks
Jonathan Calmels
- [PATCH v2 4/4] bpf, lsm: Allow editing capabilities in BPF-LSM hooks
Paul Moore
- [PATCH v2 4/4] bpf,lsm: Allow editing capabilities in BPF-LSM hooks
Serge E. Hallyn
- [PATCH v2 4/4] bpf, lsm: Allow editing capabilities in BPF-LSM hooks
Dr. Greg
- [PATCH v2 4/4] bpf, lsm: Allow editing capabilities in BPF-LSM hooks
Paul Moore
- [PATCH v2 0/4] Introduce user namespace capabilities
Josef Bacik
- [PATCH v1] perf trace: BTF-based enum pretty printing
Howard Chu
- [PATCH v3 1/3] LSM: add security_execve_abort() hook
Paul Moore
- [PATCH 01/10] capability: introduce new capable flag CAP_OPT_NOAUDIT_ONDENY
Paul Moore
- [PATCH 02/10] capability: add any wrappers to test for multiple caps with exactly one audit message
Paul Moore
- [PATCH v12 5/5] bpf: Only enable BPF LSM hooks when an LSM program is attached
Paul Moore
- [RFC PATCH v2 8/8] clavis: Introduce new LSM called clavis
Randy Dunlap
- [PATCH v2] perf trace: BTF-based enum pretty printing
Howard Chu
- [PATCH v3] perf trace: BTF-based enum pretty printing
Howard Chu
- [PATCH v2 00/10] Improve the copy of task comm
Yafang Shao
- [PATCH v4] perf trace: BTF-based enum pretty printing
Howard Chu
- [PATCH v6 1/2] proc: pass file instead of inode to proc_mem_open
Adrian Ratiu
- security: ima_policy.c:427:17: error: too many arguments to function 'ima_filter_rule_init'
Paul Moore
- [PATCH] linux++: delete some forward declarations
Alexey Dobriyan
- [PATCH v1] perf trace: Augment enum syscall arguments with BTF
Howard Chu
- Maintainers Summit 2024 Call for Topics
Theodore Ts'o
- [PATCH] smack: unix sockets: fix accept()ed socket label
Konstantin Andreev
- [LSM/Landlock] Adding ability to sandbox TTYs
COHEN-SCALI Remi (AMPERE)
- [PATCH v2] smack: unix sockets: fix accept()ed socket label
Konstantin Andreev
- [GIT PULL] lsm/lsm-pr-20240617
Paul Moore
- [PATCH] bpf: add security_file_post_open() LSM hook to sleepable_lsm_hooks
Matt Bobrowski
- [PATCH v4 00/14] security: digest_cache LSM
Paul Moore
- [PATCH 0/2] Forbid illegitimate binding via listen(2)
Mickaël Salaün
- [PATCH 1/2] landlock: Add hook on socket_listen()
Günther Noack
- [PATCH v4] landlock: Add abstract unix socket connect restriction
Tahera Fahimi
- [PATCH] apparmor: try to avoid refing the label in apparmor_file_open
Mateusz Guzik
- Yet another vision of Linux security | Endpoint Security Framework
Timur Chernykh
- [PATCH] apparmor: test: add MODULE_DESCRIPTION()
Jeff Johnson
- [PATCH v2] apparmor: try to avoid refing the label in apparmor_file_open
Mateusz Guzik
- [PATCH RFC] LSM, net: Add SO_PEERCONTEXT for peer LSM data
Paul Moore
- [PATCH v5] landlock: Add abstract unix socket connect restriction
Tahera Fahimi
- [PATCH v3 00/11] Improve the copy of task comm
Yafang Shao
- [PATCH v39 01/42] integrity: disassociate ima_filter_rule from security_audit_rule
Paul Moore
- [PATCH v39 02/42] SM: Infrastructure management of the sock security
Paul Moore
- [PATCH v2 14/15] mm/mmap: Use vms accounted pages in mmap_region()
Kees Cook
- [syzbot] [lsm?] general protection fault in hook_inode_free_security
Mickaël Salaün
- [PATCH v12 3/5] security: Replace indirect LSM hook calls with static calls
Jonathan Corbet
- [PATCH v6] landlock: Add abstract unix socket connect restriction
Tahera Fahimi
- [PATCH v1] landlock: Abstract unix socket restriction tests
Tahera Fahimi
- [PATCH v4 00/11] Improve the copy of task comm
Yafang Shao
- [PATCH v13 0/5] Reduce overhead of LSMs with static calls
KP Singh
Last message date:
Sat Jun 29 08:43:31 UTC 2024
Archived on: Sat Jun 29 08:44:07 UTC 2024
This archive was generated by
Pipermail 0.09 (Mailman edition).