messages from 2021-09-23 15:49:38 to 2021-10-11 23:11:07 UTC [more...]
[PATCH v4 0/3] binder: use cred instead of task for security context
2021-10-11 23:10 UTC (12+ messages)
` [PATCH v4 1/3] binder: use cred instead of task for selinux checks
` [PATCH v4 2/3] binder: use cred instead of task for getsecid
` [PATCH v4 3/3] binder: use euid from cred instead of using task
[PATCH] LSM: general protection fault in legacy_parse_param
2021-10-11 22:40 UTC
[PATCH v14 0/3] Add trusted_for(2) (was O_MAYEXEC)
2021-10-11 21:07 UTC (12+ messages)
` [PATCH v14 1/3] fs: Add trusted_for(2) syscall implementation and related sysctl
` [PATCH v14 2/3] arch: Wire up trusted_for(2)
` [PATCH v14 3/3] selftest/interpreter: Add tests for trusted_for(2) policies
[PATCH apparmor] apparmor: remove unneeded one-line hook wrappers
2021-10-11 14:38 UTC
[PATCH] security/landlock: use square brackets around "landlock-ruleset"
2021-10-11 14:38 UTC (2+ messages)
[PATCH smack] smack: remove duplicated hook function
2021-10-11 14:33 UTC
[PATCH v3] KEYS: trusted: Fix trusted key backends when building as module
2021-10-11 10:19 UTC (10+ messages)
[PATCH v4 0/5] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
2021-10-11 10:02 UTC (6+ messages)
` [PATCH v4 1/5] KEYS: trusted: allow use of TEE as backend without TCG_TPM support
` [PATCH v4 2/5] KEYS: trusted: allow users to use kernel RNG for key material
` [PATCH v4 3/5] KEYS: trusted: allow trust sources "
` [PATCH v4 4/5] crypto: caam - add in-kernel interface for blob generator
` [PATCH v4 5/5] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
[PATCH 0/2] tpm: use SM3 instead of SM3_256
2021-10-11 7:02 UTC (5+ messages)
` [PATCH 1/2] crypto: "
` [PATCH 2/2] tpm: "
[PATCH] ima: fix deadlock when traversing "ima_default_rules"
2021-10-09 10:38 UTC (4+ messages)
[PATCH -next] integrity: return early if audit_log_start return NULL
2021-10-09 6:30 UTC
[PATCH v13 0/3] Add trusted_for(2) (was O_MAYEXEC)
2021-10-08 22:44 UTC (10+ messages)
` [PATCH v13 1/3] fs: Add trusted_for(2) syscall implementation and related sysctl
` [PATCH v13 2/3] arch: Wire up trusted_for(2)
` [PATCH v13 3/3] selftest/interpreter: Add tests for trusted_for(2) policies
[PATCH v2 0/4] Allow access to confidential computing secret area in SEV guests
2021-10-08 5:51 UTC (10+ messages)
` [PATCH v2 1/4] x86: Export clean_cache_range()
` [PATCH v2 2/4] efi/libstub: Copy confidential computing secret area
` [PATCH v2 3/4] efi: Reserve "
` [PATCH v2 4/4] virt: Add sev_secret module to expose confidential computing secrets
[PATCH v12 0/3] Add trusted_for(2) (was O_MAYEXEC)
2021-10-07 19:00 UTC (7+ messages)
[PATCH v3 0/3] binder: use cred instead of task for security context
2021-10-06 20:38 UTC (6+ messages)
` [PATCH v3 1/3] binder: use cred instead of task for selinux checks
` [PATCH v3 2/3] binder: use cred instead of task for getsecid
` [PATCH v3 3/3] binder: use euid from cred instead of using task
[PATCH v2] binder: use cred instead of task for selinux checks
2021-10-06 19:49 UTC (21+ messages)
[PATCH] security: Return xattr name from security_dentry_init_security()
2021-10-04 17:36 UTC (11+ messages)
[PATCH v3] integrity: support including firmware ".platform" keys at build time
2021-10-04 14:52 UTC
[PATCH][next] apparmor: Use struct_size() helper in kzalloc()
2021-10-01 23:49 UTC (3+ messages)
[PATCH] binder: use cred instead of task for selinux checks
2021-10-01 17:14 UTC (4+ messages)
[RFC][PATCH 0/7] ima: Measure and appraise files with DIGLIM
2021-09-30 11:55 UTC (8+ messages)
` [RFC][PATCH 1/7] integrity: Change type of IMA rule-related flags to u64
` [RFC][PATCH 2/7] ima: Introduce new policy keyword use_diglim
` [RFC][PATCH 3/7] ima: Introduce diglim and appraise_diglim policies
` [RFC][PATCH 4/7] ima: Query file digest and retrieve info from its digest lists
` [RFC][PATCH 5/7] ima: Query metadata "
` [RFC][PATCH 6/7] ima: Skip measurement of files found in DIGLIM hash table
` [RFC][PATCH 7/7] ima: Add support for appraisal with digest lists
[PATCH] lsm: security_task_getsecid_subj() -> security_current_getsecid_subj()
2021-09-29 19:19 UTC (2+ messages)
Regression in unix stream sockets with the Smack LSM
2021-09-29 18:36 UTC (7+ messages)
` "
` [External] "
[PATCH 0/2] fuse: Send file/inode security context during creation
2021-09-28 14:25 UTC (21+ messages)
` [PATCH 1/2] fuse: Add a flag FUSE_SECURITY_CTX
` [PATCH 2/2] fuse: Send security context of inode on file creation
[PATCH 04/11] ath11: Wstringop-overread warning
2021-09-28 9:04 UTC (2+ messages)
[PATCH] [RESEND] apparmor: avoid -Wempty-body warning
2021-09-27 20:32 UTC (3+ messages)
[PATCH] mm: Remove HARDENED_USERCOPY_FALLBACK
2021-09-26 20:49 UTC (2+ messages)
[PATCH v29 00/28] LSM: Module stacking for AppArmor
2021-09-24 17:54 UTC (29+ messages)
` [PATCH v29 01/28] LSM: Infrastructure management of the sock security
` [PATCH v29 02/28] LSM: Add the lsmblob data structure
` [PATCH v29 03/28] LSM: provide lsm name and id slot mappings
` [PATCH v29 04/28] IMA: avoid label collisions with stacked LSMs
` [PATCH v29 05/28] LSM: Use lsmblob in security_audit_rule_match
` [PATCH v29 06/28] LSM: Use lsmblob in security_kernel_act_as
` [PATCH v29 07/28] LSM: Use lsmblob in security_secctx_to_secid
` [PATCH v29 08/28] LSM: Use lsmblob in security_secid_to_secctx
` [PATCH v29 09/28] LSM: Use lsmblob in security_ipc_getsecid
` [PATCH v29 10/28] LSM: Use lsmblob in security_task_getsecid
` [PATCH v29 11/28] LSM: Use lsmblob in security_inode_getsecid
` [PATCH v29 12/28] LSM: Use lsmblob in security_cred_getsecid
` [PATCH v29 13/28] IMA: Change internal interfaces to use lsmblobs
` [PATCH v29 14/28] LSM: Specify which LSM to display
` [PATCH v29 15/28] LSM: Ensure the correct LSM context releaser
` [PATCH v29 16/28] LSM: Use lsmcontext in security_secid_to_secctx
` [PATCH v29 17/28] LSM: Use lsmcontext in security_inode_getsecctx
` [PATCH v29 18/28] LSM: security_secid_to_secctx in netlink netfilter
` [PATCH v29 19/28] NET: Store LSM netlabel data in a lsmblob
` [PATCH v29 20/28] LSM: Verify LSM display sanity in binder
` [PATCH v29 21/28] LSM: Extend security_secid_to_secctx to include module selection
` [PATCH v29 22/28] Audit: Keep multiple LSM data in audit_names
` [PATCH v29 23/28] Audit: Create audit_stamp structure
` [PATCH v29 24/28] Audit: Add framework for auxiliary records
` [PATCH v29 25/28] Audit: Add record for multiple task security contexts
` [PATCH v29 26/28] Audit: Add record for multiple object "
` [PATCH v29 27/28] LSM: Add /proc attr entry for full LSM context
` [PATCH v29 28/28] AppArmor: Remove the exclusive flag
[GIT PULL] SELinux/Smack fixes for v5.15 (#2)
2021-09-23 21:42 UTC (2+ messages)
[PATCH v4] lockdown,selinux: fix wrong subject in some SELinux lockdown checks
2021-09-23 19:07 UTC (4+ messages)
[PATCH] selinux,smack: fix subjective/objective credential use mixups
2021-09-23 19:04 UTC (4+ messages)
[GIT PULL] SELinux fixes for v5.15 (#1)
2021-09-23 17:29 UTC (10+ messages)
[PATCH v2] smack: Guard smack_ipv6_lock definition within a SMACK_IPV6_PORT_LABELING block
2021-09-23 17:05 UTC
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).