messages from 2023-10-02 12:58:02 to 2023-10-22 06:45:32 UTC [more...]
[PATCH] integrity: fix indentation of config attributes
2023-10-22 6:47 UTC
[PATCH v2 0/7] ima: kexec: measure events between kexec load and execute
2023-10-20 21:53 UTC (22+ messages)
` [PATCH v2 1/7] ima: refactor ima_dump_measurement_list to move memory allocation to a separate function
` [PATCH v2 2/7] ima: move ima_dump_measurement_list call from kexec load to execute
` [PATCH v2 3/7] ima: kexec: map source pages containing IMA buffer to image post kexec load
` [PATCH v2 4/7] kexec: update kexec_file_load syscall to call ima_kexec_post_load
` [PATCH v2 5/7] ima: suspend measurements while the buffer is being copied during kexec reboot
` [PATCH v2 6/7] ima: make the memory for events between kexec load and exec configurable
` [PATCH v2 7/7] ima: record log size at kexec load and execute
[PATCH v15 00/11] LSM: Three basic syscalls
2023-10-20 16:36 UTC (10+ messages)
[PATCH] certs: Restrict blacklist updates to the secondary trusted keyring
2023-10-20 15:53 UTC (26+ messages)
` RFC: New LSM to control usage of x509 certificates
TPM resource manager returns -1 for TPM2_RC_CONTEXT_GAP
2023-10-20 13:09 UTC (6+ messages)
[RFC V2] IMA Log Snapshotting Design Proposal
2023-10-19 18:49 UTC
[PATCH] ima: Add __counted_by for struct modsig and use struct_size()
2023-10-18 18:16 UTC (3+ messages)
Zapytanie ofertowe
2023-10-18 8:45 UTC
[RFC PATCH] certs: Only allow certs signed by keys on the builtin keyring
2023-10-17 12:25 UTC
[PATCH v3 00/25] security: Move IMA and EVM to the LSM infrastructure
2023-10-13 19:45 UTC (59+ messages)
` [PATCH v3 01/25] ima: Align ima_inode_post_setattr() definition with "
` [PATCH v3 02/25] ima: Align ima_post_path_mknod() "
` [PATCH v3 04/25] ima: Align ima_file_mprotect() "
` [PATCH v3 05/25] ima: Align ima_inode_setxattr() "
` [PATCH v3 07/25] ima: Align ima_post_read_file() "
` [PATCH v3 08/25] evm: Align evm_inode_post_setattr() "
` [PATCH v3 09/25] evm: Align evm_inode_setxattr() "
` [PATCH v3 10/25] evm: Align evm_inode_post_setxattr() "
` [PATCH v3 11/25] security: Align inode_setattr hook definition with EVM
` [PATCH v3 12/25] security: Introduce inode_post_setattr hook
` [PATCH v3 13/25] security: Introduce inode_post_removexattr hook
` [PATCH v3 14/25] security: Introduce file_post_open hook
` [PATCH v3 15/25] security: Introduce file_pre_free_security hook
` [PATCH v3 16/25] security: Introduce path_post_mknod hook
` [PATCH v3 17/25] security: Introduce inode_post_create_tmpfile hook
` [PATCH v3 18/25] security: Introduce inode_post_set_acl hook
` [PATCH v3 20/25] security: Introduce key_post_create_or_update hook
` [PATCH v3 21/25] ima: Move to LSM infrastructure
` [PATCH v3 25/25] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
[PATCH] KEYS: trusted: Rollback init_trusted() consistently
2023-10-12 7:41 UTC (13+ messages)
[PATCH v2] KEYS: trusted: Remove redundant static calls usage
2023-10-11 5:54 UTC (12+ messages)
[PATCH v3 0/3] Reduce impact of overlayfs backing files fake path
2023-10-11 1:37 UTC (18+ messages)
` [PATCH v3 1/3] fs: get mnt_writers count for an open backing file's real path
` [PATCH v3 2/3] fs: create helper file_user_path() for user displayed mapped file path
` [PATCH v3 3/3] fs: store real path instead of fake path in backing file f_path
[PATCH] tpm: nuvoton: Use i2c_get_match_data()
2023-10-10 12:35 UTC (2+ messages)
[PATCH] fs: Pass AT_GETATTR_NOSEC flag to getattr interface function
2023-10-10 8:35 UTC (6+ messages)
[PATCH v2 0/3] Reduce impact of overlayfs backing files fake path
2023-10-09 18:53 UTC (11+ messages)
` [PATCH v2 1/3] fs: get mnt_writers count for an open backing file's real path
` [PATCH v2 2/3] fs: create helper file_user_path() for user displayed mapped file path
` [PATCH v2 3/3] fs: store real path instead of fake path in backing file f_path
W sprawie samochodu
2023-10-09 8:15 UTC
[GIT PULL] integrity: susbystem fixes for v6.6 (take 2)
2023-10-05 18:39 UTC (2+ messages)
[PATCH] KEYS: trusted: Remove redundant static calls usage
2023-10-05 16:45 UTC (2+ messages)
[syzbot] [integrity] [overlayfs] possible deadlock in mnt_want_write (2)
2023-10-05 13:35 UTC (8+ messages)
[RFC PATCH v11 00/19] Integrity Policy Enforcement LSM (IPE)
2023-10-05 2:49 UTC (24+ messages)
` [RFC PATCH v11 01/19] security: add ipe lsm
` [RFC PATCH v11 02/19] ipe: add policy parser
` [RFC PATCH v11 03/19] ipe: add evaluation loop
` [RFC PATCH v11 04/19] ipe: add LSM hooks on execution and kernel read
` [RFC PATCH v11 05/19] ipe: introduce 'boot_verified' as a trust provider
` [RFC PATCH v11 06/19] security: add new securityfs delete function
` [RFC PATCH v11 07/19] ipe: add userspace interface
` [RFC PATCH v11 08/19] uapi|audit|ipe: add ipe auditing support
` [RFC PATCH v11 09/19] ipe: add permissive toggle
` [RFC PATCH v11 10/19] block|security: add LSM blob to block_device
` [RFC PATCH v11 11/19] dm verity: set DM_TARGET_SINGLETON feature flag
` [RFC PATCH v11 12/19] dm: add finalize hook to target_type
` [RFC PATCH v11 13/19] dm verity: consume root hash digest and signature data via LSM hook
` [RFC PATCH v11 14/19] ipe: add support for dm-verity as a trust provider
` [RFC PATCH v11 15/19] fsverity: consume builtin signature via LSM hook
` [RFC PATCH v11 16/19] ipe: enable support for fs-verity as a trust provider
` [RFC PATCH v11 17/19] scripts: add boot policy generation program
` [RFC PATCH v11 18/19] ipe: kunit test for parser
` [RFC PATCH v11 19/19] documentation: add ipe documentation
[PATCH] ima: annotate iint mutex to avoid lockdep false positive warnings
2023-10-05 11:15 UTC
Prezentacja
2023-10-04 7:55 UTC
[PATCH v3 0/3] DCP as trusted keys backend
2023-10-02 22:50 UTC (5+ messages)
` [PATCH v3 1/3] crypto: mxs-dcp: Add support for hardware provided keys
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox