messages from 2024-11-27 12:10:12 to 2024-12-19 15:59:13 UTC [more...]
[RFC 0/2] ima: evm: Add kernel cmdline options to disable IMA/EVM
2024-12-19 15:40 UTC (16+ messages)
` [RFC 1/2] ima: Add kernel parameter to disable IMA
` [RFC 2/2] evm: Add kernel parameter to disable EVM
[PATCH 0/3] Enlightened vTPM support for SVSM on SEV-SNP
2024-12-19 15:40 UTC (23+ messages)
` [PATCH 1/3] tpm: add generic platform device
` [PATCH 2/3] x86/sev: add SVSM call macros for the vTPM protocol
` [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
[PATCH] tpm/eventlog: Limit memory allocations for event logs with excessive size
2024-12-19 15:38 UTC (5+ messages)
[PATCH v23 0/8] Script execution control (was O_MAYEXEC)
2024-12-19 7:44 UTC (12+ messages)
` [PATCH v23 1/8] exec: Add a new AT_EXECVE_CHECK flag to execveat(2)
` [PATCH v23 2/8] security: Add EXEC_RESTRICT_FILE and EXEC_DENY_INTERACTIVE securebits
` [PATCH v23 3/8] selftests/exec: Add 32 tests for AT_EXECVE_CHECK and exec securebits
` [PATCH v23 4/8] selftests/landlock: Add tests for execveat + AT_EXECVE_CHECK
` [PATCH v23 5/8] samples/check-exec: Add set-exec
` [PATCH v23 6/8] selftests: ktap_helpers: Fix uninitialized variable
` [PATCH v23 7/8] samples/check-exec: Add an enlighten "inc" interpreter and 28 tests
` [PATCH v23 8/8] ima: instantiate the bprm_creds_for_exec() hook
[PATCH] lsm: integrity: Allow enable/disable ima and evm with lsm= cmdline
2024-12-18 6:43 UTC
[PATCH v3] doc: correct the build steps for open_posix_testsuite
2024-12-16 12:45 UTC (3+ messages)
` [LTP] "
[syzbot] [integrity?] [lsm?] INFO: task hung in process_measurement (2)
2024-12-16 6:31 UTC (9+ messages)
TPM/EFI issue [Was: Linux 6.12]
2024-12-14 3:54 UTC (18+ messages)
[PATCH v9 00/19] x86: Trenchboot secure dynamic launch Linux kernel support
2024-12-14 2:56 UTC (19+ messages)
` [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
[PATCH v2 0/8] LTP tests: load predefined policy, enhancements
2024-12-13 22:20 UTC (9+ messages)
` [PATCH v2 1/8] IMA: Add TCB policy as an example for ima_measurements.sh
` [PATCH v2 2/8] ima_setup.sh: Allow to load predefined policy
` [PATCH v2 3/8] tst_test.sh: IMA: Allow to disable LSM warnings and use it for IMA
` [PATCH v2 4/8] ima_setup: Print warning when policy not readable
` [PATCH v2 5/8] ima_kexec.sh: Move checking policy if readable to ima_setup.sh
` [PATCH v2 6/8] IMA: Add example policy for ima_violations.sh
` [PATCH v2 7/8] ima_violations.sh: Check for a required policy
` [PATCH v2 8/8] [RFC] ima_kexec.sh: Relax result on unreadable policy to TCONF
I urge you to understand my viewpoint accurately
2024-12-13 4:25 UTC
[PATCH 0/3] LTP tests: load predefined policy
2024-12-12 15:11 UTC (12+ messages)
` [PATCH 1/3] ima: Add TCB policy as an example
` [PATCH 2/3] ima_setup.sh: Allow to load predefined policy
` [PATCH 3/3] ima_{kexec,keys,selinux}: Set minimal kernel version
[syzbot] [integrity?] [lsm?] KMSAN: uninit-value in ima_add_template_entry (2)
2024-12-12 11:21 UTC (4+ messages)
` [syzbot] [lsm?] [integrity?] "
[syzbot] Monthly integrity report (Dec 2024)
2024-12-11 8:54 UTC (2+ messages)
[PATCH v22 0/8] Script execution control (was O_MAYEXEC)
2024-12-11 6:12 UTC (15+ messages)
` [PATCH v22 1/8] exec: Add a new AT_EXECVE_CHECK flag to execveat(2)
` [PATCH v22 2/8] security: Add EXEC_RESTRICT_FILE and EXEC_DENY_INTERACTIVE securebits
` [PATCH v22 3/8] selftests/exec: Add 32 tests for AT_EXECVE_CHECK and exec securebits
` [PATCH v22 4/8] selftests/landlock: Add tests for execveat + AT_EXECVE_CHECK
` [PATCH v22 5/8] samples/check-exec: Add set-exec
` [PATCH v22 6/8] selftests: ktap_helpers: Fix uninitialized variable
` [PATCH v22 7/8] samples/check-exec: Add an enlighten "inc" interpreter and 28 tests
` [PATCH v22 8/8] ima: instantiate the bprm_creds_for_exec() hook
[PATCH] doc: correct the build steps for open_posix_testsuite
2024-12-11 1:17 UTC (7+ messages)
` [LTP] "
[PATCH v2] ima: instantiate the bprm_creds_for_exec() hook
2024-12-10 16:47 UTC (6+ messages)
[REGRESSION][BISECTED] tpm: Popping noise in USB headphones since 1b6d7f9eb150
2024-12-09 12:58 UTC (7+ messages)
[PATCH v3 1/5] LSM: Ensure the correct LSM context releaser
2024-12-06 20:57 UTC (3+ messages)
[PATCH v6 00/15] integrity: Introduce the Integrity Digest Cache
2024-12-06 15:26 UTC (23+ messages)
` [PATCH v6 07/15] digest_cache: Allow registration of digest list parsers
[PATCH v2] ima: instantiate the bprm_creds_for_exec() hook
2024-12-05 15:44 UTC (7+ messages)
QEMU launch failure with TPM passthrough
2024-12-05 10:19 UTC (3+ messages)
[PATCH v21 0/6] Script execution control (was O_MAYEXEC)
2024-12-05 3:33 UTC (18+ messages)
` [PATCH v21 1/6] exec: Add a new AT_EXECVE_CHECK flag to execveat(2)
` [PATCH v21 6/6] samples/check-exec: Add an enlighten "inc" interpreter and 28 tests
[PATCH] ima: instantiate the bprm_creds_for_exec() hook
2024-12-03 16:03 UTC (9+ messages)
[RFC PATCH] ima: instantiate the bprm_creds_for_exec() hook
2024-12-03 11:52 UTC (2+ messages)
[PATCH v2] doc: correct the build steps for open_posix_testsuite
2024-12-02 1:16 UTC (2+ messages)
regression: kernel log "flooded" with tpm tpm0: A TPM error (2306) occurred attempting to create NULL primary
2024-11-30 2:37 UTC (8+ messages)
[PATCH v2 0/7] ima: Remove unnecessary inode locks
2024-11-28 16:25 UTC (12+ messages)
` [PATCH v2 1/7] fs: ima: Remove S_IMA and IS_IMA()
` [PATCH v2 2/7] ima: Remove inode lock
` [PATCH v2 3/7] ima: Ensure lock is held when setting iint pointer in inode security blob
` [PATCH v2 4/7] ima: Mark concurrent accesses to the iint pointer in the "
` [PATCH v2 5/7] ima: Set security.ima on file close when ima_appraise=fix
` [PATCH v2 6/7] ima: Discard files opened with O_PATH
` [PATCH v2 7/7] ima: Reset IMA_NONACTION_RULE_FLAGS after post_setattr
ima: property parameter unused in ima_match_rules()
2024-11-27 17:17 UTC (4+ messages)
` [PATCH] IMA,LSM: Uncover hidden variable "
[PATCH 1/3] ima: Remove inode lock
2024-11-27 15:57 UTC (3+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).