linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2021-09-24 18:12:44 to 2021-10-12 19:22:04 UTC [more...]

[PATCH v2 0/2] vfs/security/NFS/btrfs: clean up and fix LSM option handling
 2021-10-12 19:21 UTC  (4+ messages)
` [PATCH v2 1/2] vfs,LSM: introduce the FS_HANDLES_LSM_OPTS flag

[PATCH v2 0/2] fuse: Send file/inode security context during creation
 2021-10-12 19:09 UTC  (7+ messages)
` [PATCH v2 1/2] fuse: Add a flag FUSE_SECURITY_CTX
` [PATCH v2 2/2] fuse: Send security context of inode on file creation

[PATCH] security/landlock: use square brackets around "landlock-ruleset"
 2021-10-12 18:11 UTC  (4+ messages)

[PATCH v5 0/3] binder: use cred instead of task for security context
 2021-10-12 17:49 UTC  (5+ messages)
` [PATCH v5 1/3] binder: use euid from cred instead of using task
` [PATCH v5 2/3] binder: use cred instead of task for selinux checks
` [PATCH v5 3/3] binder: use cred instead of task for getsecid

[PATCH v4 0/3] binder: use cred instead of task for security context
 2021-10-12 16:52 UTC  (17+ messages)
` [PATCH v4 1/3] binder: use cred instead of task for selinux checks
` [PATCH v4 2/3] binder: use cred instead of task for getsecid
` [PATCH v4 3/3] binder: use euid from cred instead of using task

[PATCH smack] smack: remove duplicated hook function
 2021-10-12 15:26 UTC  (4+ messages)

[PATCH 0/2] tpm: use SM3 instead of SM3_256
 2021-10-12 15:21 UTC  (6+ messages)
` [PATCH 1/2] crypto: "
` [PATCH 2/2] tpm: "

[PATCH] LSM: general protection fault in legacy_parse_param
 2021-10-12 14:27 UTC  (3+ messages)

[PATCH -next] integrity: return early if audit_log_start return NULL
 2021-10-12 14:15 UTC  (2+ messages)

[PATCH v2] security: Return xattr name from security_dentry_init_security()
 2021-10-12 13:23 UTC 

[PATCH v14 0/3] Add trusted_for(2) (was O_MAYEXEC)
 2021-10-11 21:07 UTC  (12+ messages)
` [PATCH v14 1/3] fs: Add trusted_for(2) syscall implementation and related sysctl
` [PATCH v14 2/3] arch: Wire up trusted_for(2)
` [PATCH v14 3/3] selftest/interpreter: Add tests for trusted_for(2) policies

[PATCH apparmor] apparmor: remove unneeded one-line hook wrappers
 2021-10-11 14:38 UTC 

[PATCH v3] KEYS: trusted: Fix trusted key backends when building as module
 2021-10-11 10:19 UTC  (10+ messages)

[PATCH v4 0/5] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
 2021-10-11 10:02 UTC  (6+ messages)
` [PATCH v4 1/5] KEYS: trusted: allow use of TEE as backend without TCG_TPM support
` [PATCH v4 2/5] KEYS: trusted: allow users to use kernel RNG for key material
` [PATCH v4 3/5] KEYS: trusted: allow trust sources "
` [PATCH v4 4/5] crypto: caam - add in-kernel interface for blob generator
` [PATCH v4 5/5] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys

[PATCH] ima: fix deadlock when traversing "ima_default_rules"
 2021-10-09 10:38 UTC  (4+ messages)

[PATCH v13 0/3] Add trusted_for(2) (was O_MAYEXEC)
 2021-10-08 22:44 UTC  (10+ messages)
` [PATCH v13 1/3] fs: Add trusted_for(2) syscall implementation and related sysctl
` [PATCH v13 2/3] arch: Wire up trusted_for(2)
` [PATCH v13 3/3] selftest/interpreter: Add tests for trusted_for(2) policies

[PATCH v2 0/4] Allow access to confidential computing secret area in SEV guests
 2021-10-08  5:51 UTC  (10+ messages)
` [PATCH v2 1/4] x86: Export clean_cache_range()
` [PATCH v2 2/4] efi/libstub: Copy confidential computing secret area
` [PATCH v2 3/4] efi: Reserve "
` [PATCH v2 4/4] virt: Add sev_secret module to expose confidential computing secrets

[PATCH v12 0/3] Add trusted_for(2) (was O_MAYEXEC)
 2021-10-07 19:00 UTC  (7+ messages)

[PATCH v3 0/3] binder: use cred instead of task for security context
 2021-10-06 20:38 UTC  (6+ messages)
` [PATCH v3 1/3] binder: use cred instead of task for selinux checks
` [PATCH v3 2/3] binder: use cred instead of task for getsecid
` [PATCH v3 3/3] binder: use euid from cred instead of using task

[PATCH v2] binder: use cred instead of task for selinux checks
 2021-10-06 19:49 UTC  (21+ messages)

[PATCH] security: Return xattr name from security_dentry_init_security()
 2021-10-04 17:36 UTC  (11+ messages)

[PATCH v3] integrity: support including firmware ".platform" keys at build time
 2021-10-04 14:52 UTC 

[PATCH][next] apparmor: Use struct_size() helper in kzalloc()
 2021-10-01 23:49 UTC  (3+ messages)

[PATCH] binder: use cred instead of task for selinux checks
 2021-10-01 17:14 UTC  (4+ messages)

[RFC][PATCH 0/7] ima: Measure and appraise files with DIGLIM
 2021-09-30 11:55 UTC  (8+ messages)
` [RFC][PATCH 1/7] integrity: Change type of IMA rule-related flags to u64
` [RFC][PATCH 2/7] ima: Introduce new policy keyword use_diglim
` [RFC][PATCH 3/7] ima: Introduce diglim and appraise_diglim policies
` [RFC][PATCH 4/7] ima: Query file digest and retrieve info from its digest lists
` [RFC][PATCH 5/7] ima: Query metadata "
` [RFC][PATCH 6/7] ima: Skip measurement of files found in DIGLIM hash table
` [RFC][PATCH 7/7] ima: Add support for appraisal with digest lists

[PATCH] lsm: security_task_getsecid_subj() -> security_current_getsecid_subj()
 2021-09-29 19:19 UTC  (2+ messages)

Regression in unix stream sockets with the Smack LSM
 2021-09-29 18:36 UTC  (7+ messages)
      `  "
            ` [External] "

[PATCH 0/2] fuse: Send file/inode security context during creation
 2021-09-28 14:25 UTC  (21+ messages)
` [PATCH 1/2] fuse: Add a flag FUSE_SECURITY_CTX
` [PATCH 2/2] fuse: Send security context of inode on file creation

[PATCH 04/11] ath11: Wstringop-overread warning
 2021-09-28  9:04 UTC  (2+ messages)

[PATCH] [RESEND] apparmor: avoid -Wempty-body warning
 2021-09-27 20:32 UTC  (3+ messages)

[PATCH] mm: Remove HARDENED_USERCOPY_FALLBACK
 2021-09-26 20:49 UTC  (2+ messages)

[PATCH v29 00/28] LSM: Module stacking for AppArmor
 2021-09-24 17:54 UTC  (14+ messages)
` [PATCH v29 16/28] LSM: Use lsmcontext in security_secid_to_secctx
` [PATCH v29 17/28] LSM: Use lsmcontext in security_inode_getsecctx
` [PATCH v29 18/28] LSM: security_secid_to_secctx in netlink netfilter
` [PATCH v29 19/28] NET: Store LSM netlabel data in a lsmblob
` [PATCH v29 20/28] LSM: Verify LSM display sanity in binder
` [PATCH v29 21/28] LSM: Extend security_secid_to_secctx to include module selection
` [PATCH v29 22/28] Audit: Keep multiple LSM data in audit_names
` [PATCH v29 23/28] Audit: Create audit_stamp structure
` [PATCH v29 24/28] Audit: Add framework for auxiliary records
` [PATCH v29 25/28] Audit: Add record for multiple task security contexts
` [PATCH v29 26/28] Audit: Add record for multiple object "
` [PATCH v29 27/28] LSM: Add /proc attr entry for full LSM context
` [PATCH v29 28/28] AppArmor: Remove the exclusive flag


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).