messages from 2021-09-15 16:49:44 to 2021-10-07 06:20:08 UTC [more...]
[PATCH v2 0/4] Allow access to confidential computing secret area in SEV guests
2021-10-07 6:18 UTC (5+ messages)
` [PATCH v2 1/4] x86: Export clean_cache_range()
` [PATCH v2 2/4] efi/libstub: Copy confidential computing secret area
` [PATCH v2 3/4] efi: Reserve "
` [PATCH v2 4/4] virt: Add sev_secret module to expose confidential computing secrets
[PATCH v4 0/3] binder: use cred instead of task for security context
2021-10-07 0:46 UTC (4+ messages)
` [PATCH v4 1/3] binder: use cred instead of task for selinux checks
` [PATCH v4 2/3] binder: use cred instead of task for getsecid
` [PATCH v4 3/3] binder: use euid from cred instead of using task
[PATCH v12 0/3] Add trusted_for(2) (was O_MAYEXEC)
2021-10-06 22:03 UTC (4+ messages)
[PATCH v3 0/3] binder: use cred instead of task for security context
2021-10-06 20:38 UTC (6+ messages)
` [PATCH v3 1/3] binder: use cred instead of task for selinux checks
` [PATCH v3 2/3] binder: use cred instead of task for getsecid
` [PATCH v3 3/3] binder: use euid from cred instead of using task
[PATCH v2] binder: use cred instead of task for selinux checks
2021-10-06 19:49 UTC (21+ messages)
[PATCH] security: Return xattr name from security_dentry_init_security()
2021-10-04 17:36 UTC (11+ messages)
[PATCH v3] integrity: support including firmware ".platform" keys at build time
2021-10-04 14:52 UTC
[PATCH v3] KEYS: trusted: Fix trusted key backends when building as module
2021-10-02 21:47 UTC (9+ messages)
[PATCH][next] apparmor: Use struct_size() helper in kzalloc()
2021-10-01 23:49 UTC (3+ messages)
[PATCH] binder: use cred instead of task for selinux checks
2021-10-01 17:14 UTC (4+ messages)
[PATCH] ima: fix deadlock when traversing "ima_default_rules"
2021-09-30 19:46 UTC (3+ messages)
[RFC][PATCH 0/7] ima: Measure and appraise files with DIGLIM
2021-09-30 11:55 UTC (8+ messages)
` [RFC][PATCH 1/7] integrity: Change type of IMA rule-related flags to u64
` [RFC][PATCH 2/7] ima: Introduce new policy keyword use_diglim
` [RFC][PATCH 3/7] ima: Introduce diglim and appraise_diglim policies
` [RFC][PATCH 4/7] ima: Query file digest and retrieve info from its digest lists
` [RFC][PATCH 5/7] ima: Query metadata "
` [RFC][PATCH 6/7] ima: Skip measurement of files found in DIGLIM hash table
` [RFC][PATCH 7/7] ima: Add support for appraisal with digest lists
[PATCH] lsm: security_task_getsecid_subj() -> security_current_getsecid_subj()
2021-09-29 19:19 UTC (2+ messages)
Regression in unix stream sockets with the Smack LSM
2021-09-29 18:36 UTC (8+ messages)
` "
` [External] "
[PATCH 0/2] fuse: Send file/inode security context during creation
2021-09-28 14:25 UTC (21+ messages)
` [PATCH 1/2] fuse: Add a flag FUSE_SECURITY_CTX
` [PATCH 2/2] fuse: Send security context of inode on file creation
[PATCH 04/11] ath11: Wstringop-overread warning
2021-09-28 9:04 UTC (2+ messages)
[PATCH] [RESEND] apparmor: avoid -Wempty-body warning
2021-09-27 20:32 UTC (3+ messages)
[PATCH] mm: Remove HARDENED_USERCOPY_FALLBACK
2021-09-26 20:49 UTC (4+ messages)
[PATCH v29 00/28] LSM: Module stacking for AppArmor
2021-09-24 17:54 UTC (29+ messages)
` [PATCH v29 01/28] LSM: Infrastructure management of the sock security
` [PATCH v29 02/28] LSM: Add the lsmblob data structure
` [PATCH v29 03/28] LSM: provide lsm name and id slot mappings
` [PATCH v29 04/28] IMA: avoid label collisions with stacked LSMs
` [PATCH v29 05/28] LSM: Use lsmblob in security_audit_rule_match
` [PATCH v29 06/28] LSM: Use lsmblob in security_kernel_act_as
` [PATCH v29 07/28] LSM: Use lsmblob in security_secctx_to_secid
` [PATCH v29 08/28] LSM: Use lsmblob in security_secid_to_secctx
` [PATCH v29 09/28] LSM: Use lsmblob in security_ipc_getsecid
` [PATCH v29 10/28] LSM: Use lsmblob in security_task_getsecid
` [PATCH v29 11/28] LSM: Use lsmblob in security_inode_getsecid
` [PATCH v29 12/28] LSM: Use lsmblob in security_cred_getsecid
` [PATCH v29 13/28] IMA: Change internal interfaces to use lsmblobs
` [PATCH v29 14/28] LSM: Specify which LSM to display
` [PATCH v29 15/28] LSM: Ensure the correct LSM context releaser
` [PATCH v29 16/28] LSM: Use lsmcontext in security_secid_to_secctx
` [PATCH v29 17/28] LSM: Use lsmcontext in security_inode_getsecctx
` [PATCH v29 18/28] LSM: security_secid_to_secctx in netlink netfilter
` [PATCH v29 19/28] NET: Store LSM netlabel data in a lsmblob
` [PATCH v29 20/28] LSM: Verify LSM display sanity in binder
` [PATCH v29 21/28] LSM: Extend security_secid_to_secctx to include module selection
` [PATCH v29 22/28] Audit: Keep multiple LSM data in audit_names
` [PATCH v29 23/28] Audit: Create audit_stamp structure
` [PATCH v29 24/28] Audit: Add framework for auxiliary records
` [PATCH v29 25/28] Audit: Add record for multiple task security contexts
` [PATCH v29 26/28] Audit: Add record for multiple object "
` [PATCH v29 27/28] LSM: Add /proc attr entry for full LSM context
` [PATCH v29 28/28] AppArmor: Remove the exclusive flag
[GIT PULL] SELinux/Smack fixes for v5.15 (#2)
2021-09-23 21:42 UTC (2+ messages)
[PATCH v4] lockdown,selinux: fix wrong subject in some SELinux lockdown checks
2021-09-23 19:07 UTC (5+ messages)
[PATCH] selinux,smack: fix subjective/objective credential use mixups
2021-09-23 19:04 UTC (4+ messages)
[GIT PULL] SELinux fixes for v5.15 (#1)
2021-09-23 17:29 UTC (10+ messages)
[PATCH v2] smack: Guard smack_ipv6_lock definition within a SMACK_IPV6_PORT_LABELING block
2021-09-23 17:05 UTC
apparmor: WARNING: suspicious RCU usage
2021-09-21 21:23 UTC (2+ messages)
[PATCH v6 00/13] Enroll kernel keys thru MOK
2021-09-21 21:03 UTC (17+ messages)
` [PATCH v6 03/13] KEYS: CA link restriction
` [PATCH v6 12/13] integrity: Trust MOK keys if MokListTrustedRT found
[PATCH] Revert "Enable '-Werror' by default for all kernel builds"
2021-09-20 16:26 UTC (10+ messages)
[PATCH 1/1] Smack:- Use overlay inode label in smack_inode_copy_up()
2021-09-20 14:55 UTC (3+ messages)
[PATCH] lsm_audit: avoid overloading the "key" audit field
2021-09-20 2:49 UTC (3+ messages)
[PATCH v4 0/8] Add LSM access controls and auditing to io_uring
2021-09-20 2:44 UTC (14+ messages)
` [PATCH v4 2/8] audit,io_uring,io-wq: add some basic audit support "
` [PATCH v4 3/8] audit: add filtering for io_uring records
` [PATCH v4 4/8] fs: add anon_inode_getfile_secure() similar to anon_inode_getfd_secure()
` [PATCH v4 5/8] io_uring: convert io_uring to the secure anon inode interface
` [PATCH v4 6/8] lsm,io_uring: add LSM hooks to io_uring
` [PATCH v4 7/8] selinux: add support for the io_uring access controls
` [PATCH v4 8/8] Smack: Brutalist io_uring support
[PATCH] NET: IPV4: fix error "do not initialise globals to 0"
2021-09-19 11:50 UTC (2+ messages)
[PATCH v2] integrity: support including firmware ".platform" keys at build time
2021-09-18 19:37 UTC (3+ messages)
[selinuxproject-selinux:stable-5.15 1/1] include/linux/rcupdate.h:395:2: warning: passing argument 1 of 'security_locked_down' discards 'const' qualifier from pointer target type
2021-09-16 14:07 UTC
[PATCH] smack: Guard smack_ipv6_lock definition within a SMACK_IPV6_PORT_LABELING block
2021-09-15 22:12 UTC (2+ messages)
[PATCH v3 0/1] Relax restrictions on user.* xattr
2021-09-15 16:33 UTC (11+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).