linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2021-09-15 16:49:44 to 2021-10-07 06:20:08 UTC [more...]

[PATCH v2 0/4] Allow access to confidential computing secret area in SEV guests
 2021-10-07  6:18 UTC  (5+ messages)
` [PATCH v2 1/4] x86: Export clean_cache_range()
` [PATCH v2 2/4] efi/libstub: Copy confidential computing secret area
` [PATCH v2 3/4] efi: Reserve "
` [PATCH v2 4/4] virt: Add sev_secret module to expose confidential computing secrets

[PATCH v4 0/3] binder: use cred instead of task for security context
 2021-10-07  0:46 UTC  (4+ messages)
` [PATCH v4 1/3] binder: use cred instead of task for selinux checks
` [PATCH v4 2/3] binder: use cred instead of task for getsecid
` [PATCH v4 3/3] binder: use euid from cred instead of using task

[PATCH v12 0/3] Add trusted_for(2) (was O_MAYEXEC)
 2021-10-06 22:03 UTC  (4+ messages)

[PATCH v3 0/3] binder: use cred instead of task for security context
 2021-10-06 20:38 UTC  (6+ messages)
` [PATCH v3 1/3] binder: use cred instead of task for selinux checks
` [PATCH v3 2/3] binder: use cred instead of task for getsecid
` [PATCH v3 3/3] binder: use euid from cred instead of using task

[PATCH v2] binder: use cred instead of task for selinux checks
 2021-10-06 19:49 UTC  (21+ messages)

[PATCH] security: Return xattr name from security_dentry_init_security()
 2021-10-04 17:36 UTC  (11+ messages)

[PATCH v3] integrity: support including firmware ".platform" keys at build time
 2021-10-04 14:52 UTC 

[PATCH v3] KEYS: trusted: Fix trusted key backends when building as module
 2021-10-02 21:47 UTC  (9+ messages)

[PATCH][next] apparmor: Use struct_size() helper in kzalloc()
 2021-10-01 23:49 UTC  (3+ messages)

[PATCH] binder: use cred instead of task for selinux checks
 2021-10-01 17:14 UTC  (4+ messages)

[PATCH] ima: fix deadlock when traversing "ima_default_rules"
 2021-09-30 19:46 UTC  (3+ messages)

[RFC][PATCH 0/7] ima: Measure and appraise files with DIGLIM
 2021-09-30 11:55 UTC  (8+ messages)
` [RFC][PATCH 1/7] integrity: Change type of IMA rule-related flags to u64
` [RFC][PATCH 2/7] ima: Introduce new policy keyword use_diglim
` [RFC][PATCH 3/7] ima: Introduce diglim and appraise_diglim policies
` [RFC][PATCH 4/7] ima: Query file digest and retrieve info from its digest lists
` [RFC][PATCH 5/7] ima: Query metadata "
` [RFC][PATCH 6/7] ima: Skip measurement of files found in DIGLIM hash table
` [RFC][PATCH 7/7] ima: Add support for appraisal with digest lists

[PATCH] lsm: security_task_getsecid_subj() -> security_current_getsecid_subj()
 2021-09-29 19:19 UTC  (2+ messages)

Regression in unix stream sockets with the Smack LSM
 2021-09-29 18:36 UTC  (8+ messages)
      `  "
            ` [External] "

[PATCH 0/2] fuse: Send file/inode security context during creation
 2021-09-28 14:25 UTC  (21+ messages)
` [PATCH 1/2] fuse: Add a flag FUSE_SECURITY_CTX
` [PATCH 2/2] fuse: Send security context of inode on file creation

[PATCH 04/11] ath11: Wstringop-overread warning
 2021-09-28  9:04 UTC  (2+ messages)

[PATCH] [RESEND] apparmor: avoid -Wempty-body warning
 2021-09-27 20:32 UTC  (3+ messages)

[PATCH] mm: Remove HARDENED_USERCOPY_FALLBACK
 2021-09-26 20:49 UTC  (4+ messages)

[PATCH v29 00/28] LSM: Module stacking for AppArmor
 2021-09-24 17:54 UTC  (29+ messages)
  ` [PATCH v29 01/28] LSM: Infrastructure management of the sock security
  ` [PATCH v29 02/28] LSM: Add the lsmblob data structure
  ` [PATCH v29 03/28] LSM: provide lsm name and id slot mappings
  ` [PATCH v29 04/28] IMA: avoid label collisions with stacked LSMs
  ` [PATCH v29 05/28] LSM: Use lsmblob in security_audit_rule_match
  ` [PATCH v29 06/28] LSM: Use lsmblob in security_kernel_act_as
  ` [PATCH v29 07/28] LSM: Use lsmblob in security_secctx_to_secid
  ` [PATCH v29 08/28] LSM: Use lsmblob in security_secid_to_secctx
  ` [PATCH v29 09/28] LSM: Use lsmblob in security_ipc_getsecid
  ` [PATCH v29 10/28] LSM: Use lsmblob in security_task_getsecid
  ` [PATCH v29 11/28] LSM: Use lsmblob in security_inode_getsecid
  ` [PATCH v29 12/28] LSM: Use lsmblob in security_cred_getsecid
  ` [PATCH v29 13/28] IMA: Change internal interfaces to use lsmblobs
  ` [PATCH v29 14/28] LSM: Specify which LSM to display
  ` [PATCH v29 15/28] LSM: Ensure the correct LSM context releaser
  ` [PATCH v29 16/28] LSM: Use lsmcontext in security_secid_to_secctx
  ` [PATCH v29 17/28] LSM: Use lsmcontext in security_inode_getsecctx
  ` [PATCH v29 18/28] LSM: security_secid_to_secctx in netlink netfilter
  ` [PATCH v29 19/28] NET: Store LSM netlabel data in a lsmblob
  ` [PATCH v29 20/28] LSM: Verify LSM display sanity in binder
  ` [PATCH v29 21/28] LSM: Extend security_secid_to_secctx to include module selection
  ` [PATCH v29 22/28] Audit: Keep multiple LSM data in audit_names
  ` [PATCH v29 23/28] Audit: Create audit_stamp structure
  ` [PATCH v29 24/28] Audit: Add framework for auxiliary records
  ` [PATCH v29 25/28] Audit: Add record for multiple task security contexts
  ` [PATCH v29 26/28] Audit: Add record for multiple object "
  ` [PATCH v29 27/28] LSM: Add /proc attr entry for full LSM context
  ` [PATCH v29 28/28] AppArmor: Remove the exclusive flag

[GIT PULL] SELinux/Smack fixes for v5.15 (#2)
 2021-09-23 21:42 UTC  (2+ messages)

[PATCH v4] lockdown,selinux: fix wrong subject in some SELinux lockdown checks
 2021-09-23 19:07 UTC  (5+ messages)

[PATCH] selinux,smack: fix subjective/objective credential use mixups
 2021-09-23 19:04 UTC  (4+ messages)

[GIT PULL] SELinux fixes for v5.15 (#1)
 2021-09-23 17:29 UTC  (10+ messages)

[PATCH v2] smack: Guard smack_ipv6_lock definition within a SMACK_IPV6_PORT_LABELING block
 2021-09-23 17:05 UTC 

apparmor: WARNING: suspicious RCU usage
 2021-09-21 21:23 UTC  (2+ messages)

[PATCH v6 00/13] Enroll kernel keys thru MOK
 2021-09-21 21:03 UTC  (17+ messages)
` [PATCH v6 03/13] KEYS: CA link restriction
` [PATCH v6 12/13] integrity: Trust MOK keys if MokListTrustedRT found

[PATCH] Revert "Enable '-Werror' by default for all kernel builds"
 2021-09-20 16:26 UTC  (10+ messages)

[PATCH 1/1] Smack:- Use overlay inode label in smack_inode_copy_up()
 2021-09-20 14:55 UTC  (3+ messages)

[PATCH] lsm_audit: avoid overloading the "key" audit field
 2021-09-20  2:49 UTC  (3+ messages)

[PATCH v4 0/8] Add LSM access controls and auditing to io_uring
 2021-09-20  2:44 UTC  (14+ messages)
` [PATCH v4 2/8] audit,io_uring,io-wq: add some basic audit support "
` [PATCH v4 3/8] audit: add filtering for io_uring records
` [PATCH v4 4/8] fs: add anon_inode_getfile_secure() similar to anon_inode_getfd_secure()
` [PATCH v4 5/8] io_uring: convert io_uring to the secure anon inode interface
` [PATCH v4 6/8] lsm,io_uring: add LSM hooks to io_uring
` [PATCH v4 7/8] selinux: add support for the io_uring access controls
` [PATCH v4 8/8] Smack: Brutalist io_uring support

[PATCH] NET: IPV4: fix error "do not initialise globals to 0"
 2021-09-19 11:50 UTC  (2+ messages)

[PATCH v2] integrity: support including firmware ".platform" keys at build time
 2021-09-18 19:37 UTC  (3+ messages)

[selinuxproject-selinux:stable-5.15 1/1] include/linux/rcupdate.h:395:2: warning: passing argument 1 of 'security_locked_down' discards 'const' qualifier from pointer target type
 2021-09-16 14:07 UTC 

[PATCH] smack: Guard smack_ipv6_lock definition within a SMACK_IPV6_PORT_LABELING block
 2021-09-15 22:12 UTC  (2+ messages)

[PATCH v3 0/1] Relax restrictions on user.* xattr
 2021-09-15 16:33 UTC  (11+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).