linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2021-09-23 15:49:38 to 2021-10-11 23:11:07 UTC [more...]

[PATCH v4 0/3] binder: use cred instead of task for security context
 2021-10-11 23:10 UTC  (12+ messages)
` [PATCH v4 1/3] binder: use cred instead of task for selinux checks
` [PATCH v4 2/3] binder: use cred instead of task for getsecid
` [PATCH v4 3/3] binder: use euid from cred instead of using task

[PATCH] LSM: general protection fault in legacy_parse_param
 2021-10-11 22:40 UTC 

[PATCH v14 0/3] Add trusted_for(2) (was O_MAYEXEC)
 2021-10-11 21:07 UTC  (12+ messages)
` [PATCH v14 1/3] fs: Add trusted_for(2) syscall implementation and related sysctl
` [PATCH v14 2/3] arch: Wire up trusted_for(2)
` [PATCH v14 3/3] selftest/interpreter: Add tests for trusted_for(2) policies

[PATCH apparmor] apparmor: remove unneeded one-line hook wrappers
 2021-10-11 14:38 UTC 

[PATCH] security/landlock: use square brackets around "landlock-ruleset"
 2021-10-11 14:38 UTC  (2+ messages)

[PATCH smack] smack: remove duplicated hook function
 2021-10-11 14:33 UTC 

[PATCH v3] KEYS: trusted: Fix trusted key backends when building as module
 2021-10-11 10:19 UTC  (10+ messages)

[PATCH v4 0/5] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
 2021-10-11 10:02 UTC  (6+ messages)
` [PATCH v4 1/5] KEYS: trusted: allow use of TEE as backend without TCG_TPM support
` [PATCH v4 2/5] KEYS: trusted: allow users to use kernel RNG for key material
` [PATCH v4 3/5] KEYS: trusted: allow trust sources "
` [PATCH v4 4/5] crypto: caam - add in-kernel interface for blob generator
` [PATCH v4 5/5] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys

[PATCH 0/2] tpm: use SM3 instead of SM3_256
 2021-10-11  7:02 UTC  (5+ messages)
` [PATCH 1/2] crypto: "
` [PATCH 2/2] tpm: "

[PATCH] ima: fix deadlock when traversing "ima_default_rules"
 2021-10-09 10:38 UTC  (4+ messages)

[PATCH -next] integrity: return early if audit_log_start return NULL
 2021-10-09  6:30 UTC 

[PATCH v13 0/3] Add trusted_for(2) (was O_MAYEXEC)
 2021-10-08 22:44 UTC  (10+ messages)
` [PATCH v13 1/3] fs: Add trusted_for(2) syscall implementation and related sysctl
` [PATCH v13 2/3] arch: Wire up trusted_for(2)
` [PATCH v13 3/3] selftest/interpreter: Add tests for trusted_for(2) policies

[PATCH v2 0/4] Allow access to confidential computing secret area in SEV guests
 2021-10-08  5:51 UTC  (10+ messages)
` [PATCH v2 1/4] x86: Export clean_cache_range()
` [PATCH v2 2/4] efi/libstub: Copy confidential computing secret area
` [PATCH v2 3/4] efi: Reserve "
` [PATCH v2 4/4] virt: Add sev_secret module to expose confidential computing secrets

[PATCH v12 0/3] Add trusted_for(2) (was O_MAYEXEC)
 2021-10-07 19:00 UTC  (7+ messages)

[PATCH v3 0/3] binder: use cred instead of task for security context
 2021-10-06 20:38 UTC  (6+ messages)
` [PATCH v3 1/3] binder: use cred instead of task for selinux checks
` [PATCH v3 2/3] binder: use cred instead of task for getsecid
` [PATCH v3 3/3] binder: use euid from cred instead of using task

[PATCH v2] binder: use cred instead of task for selinux checks
 2021-10-06 19:49 UTC  (21+ messages)

[PATCH] security: Return xattr name from security_dentry_init_security()
 2021-10-04 17:36 UTC  (11+ messages)

[PATCH v3] integrity: support including firmware ".platform" keys at build time
 2021-10-04 14:52 UTC 

[PATCH][next] apparmor: Use struct_size() helper in kzalloc()
 2021-10-01 23:49 UTC  (3+ messages)

[PATCH] binder: use cred instead of task for selinux checks
 2021-10-01 17:14 UTC  (4+ messages)

[RFC][PATCH 0/7] ima: Measure and appraise files with DIGLIM
 2021-09-30 11:55 UTC  (8+ messages)
` [RFC][PATCH 1/7] integrity: Change type of IMA rule-related flags to u64
` [RFC][PATCH 2/7] ima: Introduce new policy keyword use_diglim
` [RFC][PATCH 3/7] ima: Introduce diglim and appraise_diglim policies
` [RFC][PATCH 4/7] ima: Query file digest and retrieve info from its digest lists
` [RFC][PATCH 5/7] ima: Query metadata "
` [RFC][PATCH 6/7] ima: Skip measurement of files found in DIGLIM hash table
` [RFC][PATCH 7/7] ima: Add support for appraisal with digest lists

[PATCH] lsm: security_task_getsecid_subj() -> security_current_getsecid_subj()
 2021-09-29 19:19 UTC  (2+ messages)

Regression in unix stream sockets with the Smack LSM
 2021-09-29 18:36 UTC  (7+ messages)
      `  "
            ` [External] "

[PATCH 0/2] fuse: Send file/inode security context during creation
 2021-09-28 14:25 UTC  (21+ messages)
` [PATCH 1/2] fuse: Add a flag FUSE_SECURITY_CTX
` [PATCH 2/2] fuse: Send security context of inode on file creation

[PATCH 04/11] ath11: Wstringop-overread warning
 2021-09-28  9:04 UTC  (2+ messages)

[PATCH] [RESEND] apparmor: avoid -Wempty-body warning
 2021-09-27 20:32 UTC  (3+ messages)

[PATCH] mm: Remove HARDENED_USERCOPY_FALLBACK
 2021-09-26 20:49 UTC  (2+ messages)

[PATCH v29 00/28] LSM: Module stacking for AppArmor
 2021-09-24 17:54 UTC  (29+ messages)
  ` [PATCH v29 01/28] LSM: Infrastructure management of the sock security
  ` [PATCH v29 02/28] LSM: Add the lsmblob data structure
  ` [PATCH v29 03/28] LSM: provide lsm name and id slot mappings
  ` [PATCH v29 04/28] IMA: avoid label collisions with stacked LSMs
  ` [PATCH v29 05/28] LSM: Use lsmblob in security_audit_rule_match
  ` [PATCH v29 06/28] LSM: Use lsmblob in security_kernel_act_as
  ` [PATCH v29 07/28] LSM: Use lsmblob in security_secctx_to_secid
  ` [PATCH v29 08/28] LSM: Use lsmblob in security_secid_to_secctx
  ` [PATCH v29 09/28] LSM: Use lsmblob in security_ipc_getsecid
  ` [PATCH v29 10/28] LSM: Use lsmblob in security_task_getsecid
  ` [PATCH v29 11/28] LSM: Use lsmblob in security_inode_getsecid
  ` [PATCH v29 12/28] LSM: Use lsmblob in security_cred_getsecid
  ` [PATCH v29 13/28] IMA: Change internal interfaces to use lsmblobs
  ` [PATCH v29 14/28] LSM: Specify which LSM to display
  ` [PATCH v29 15/28] LSM: Ensure the correct LSM context releaser
  ` [PATCH v29 16/28] LSM: Use lsmcontext in security_secid_to_secctx
  ` [PATCH v29 17/28] LSM: Use lsmcontext in security_inode_getsecctx
  ` [PATCH v29 18/28] LSM: security_secid_to_secctx in netlink netfilter
  ` [PATCH v29 19/28] NET: Store LSM netlabel data in a lsmblob
  ` [PATCH v29 20/28] LSM: Verify LSM display sanity in binder
  ` [PATCH v29 21/28] LSM: Extend security_secid_to_secctx to include module selection
  ` [PATCH v29 22/28] Audit: Keep multiple LSM data in audit_names
  ` [PATCH v29 23/28] Audit: Create audit_stamp structure
  ` [PATCH v29 24/28] Audit: Add framework for auxiliary records
  ` [PATCH v29 25/28] Audit: Add record for multiple task security contexts
  ` [PATCH v29 26/28] Audit: Add record for multiple object "
  ` [PATCH v29 27/28] LSM: Add /proc attr entry for full LSM context
  ` [PATCH v29 28/28] AppArmor: Remove the exclusive flag

[GIT PULL] SELinux/Smack fixes for v5.15 (#2)
 2021-09-23 21:42 UTC  (2+ messages)

[PATCH v4] lockdown,selinux: fix wrong subject in some SELinux lockdown checks
 2021-09-23 19:07 UTC  (4+ messages)

[PATCH] selinux,smack: fix subjective/objective credential use mixups
 2021-09-23 19:04 UTC  (4+ messages)

[GIT PULL] SELinux fixes for v5.15 (#1)
 2021-09-23 17:29 UTC  (10+ messages)

[PATCH v2] smack: Guard smack_ipv6_lock definition within a SMACK_IPV6_PORT_LABELING block
 2021-09-23 17:05 UTC 


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).