messages from 2021-06-10 15:06:09 to 2021-06-30 20:22:27 UTC [more...]
[GIT PULL] SafeSetID changes for v5.14
2021-06-30 20:22 UTC
[RFC PATCH 0/1] xattr: Allow user.* xattr on symlink/special files if caller has CAP_SYS_RESOURCE
2021-06-30 19:59 UTC (25+ messages)
[PATCH v8 0/2] Add support for ECDSA-signed kernel modules
2021-06-30 19:17 UTC (4+ messages)
` [PATCH v8 1/2] certs: Trigger creation of RSA module signing key if it's not an RSA key
` [PATCH v8 2/2] certs: Add support for using elliptic curve keys for signing modules
[PATCH 0/3] ima: Provide more info about buffer measurement
2021-06-30 15:09 UTC (6+ messages)
` [PATCH 1/3] ima: Introduce ima_get_current_hash_algo()
` [PATCH 2/3] ima: Return int in the functions to measure a buffer
` [PATCH 3/3] ima: Add digest parameter to "
[PATCH] perf: Require CAP_KILL if sigtrap is requested
2021-06-30 12:42 UTC (3+ messages)
[GIT PULL] Smack patches for v5.14
2021-06-29 23:40 UTC
[RFC PATCH v2 0/3] Allow access to confidential computing secret area
2021-06-29 22:48 UTC (12+ messages)
` [RFC PATCH v2 1/3] efi/libstub: Copy "
` [RFC PATCH v2 2/3] efi: Reserve "
` [RFC PATCH v2 3/3] virt: Add sev_secret module to expose confidential computing secrets
[PATCH] IMA: remove -Wmissing-prototypes warning
2021-06-29 22:40 UTC (3+ messages)
[GIT PULL] SELinux patches for v5.14
2021-06-29 21:36 UTC
[PATCH v7 0/2] Add support for ECDSA-signed kernel modules
2021-06-29 20:56 UTC (4+ messages)
` [PATCH v7 1/2] certs: Trigger creation of RSA module signing key if it's not an RSA key
` [PATCH v7 2/2] certs: Add support for using elliptic curve keys for signing modules
[PATCH] certs: Redirect openssl error message to null device
2021-06-29 20:26 UTC (4+ messages)
[PATCH] smack: mark 'smack_enabled' global variable as __initdata
2021-06-29 13:41 UTC
ima - wait for tpm load
2021-06-28 22:04 UTC (5+ messages)
[RFC][PATCH 00/12] Huawei Digest Lists
2021-06-28 9:51 UTC (25+ messages)
` [RFC][PATCH 01/12] ima: Add digest, algo, measured parameters to ima_measure_critical_data()
` [RFC][PATCH 02/12] digest_lists: Overview
` [RFC][PATCH 03/12] digest_lists: Basic definitions
` [RFC][PATCH 04/12] digest_lists: Objects
` [RFC][PATCH 05/12] digest_lists: Methods
` [RFC][PATCH 06/12] digest_lists: Parser
` [RFC][PATCH 07/12] digest_lists: Interfaces - digest_list_add, digest_list_del
` [RFC][PATCH 08/12] digest_lists: Interfaces - digest_lists_loaded
` [RFC][PATCH 09/12] digest_lists: Interfaces - digest_label
` [RFC][PATCH 10/12] digest_lists: Interfaces - digest_query
` [RFC][PATCH 11/12] digest_lists: Interfaces - digests_count
` [RFC][PATCH 12/12] digest_lists: Tests
[PATCH 0/3] DCP as trusted keys backend
2021-06-25 13:12 UTC (7+ messages)
` [PATCH 1/3] crypto: mxs-dcp: Add support for hardware provided keys
` [PATCH 2/3] KEYS: trusted: Introduce support for NXP DCP-based trusted keys
` [PATCH 3/3] doc: trusted-encrypted: add DCP as new trust source
[RFC PATCH] userfaultfd: open userfaultfds with O_RDONLY
2021-06-24 15:25 UTC
[PATCH v2 00/29] docs: avoid using ReST :doc:`foo` tag
2021-06-23 12:26 UTC (5+ messages)
` [PATCH v2 24/29] docs: security: landlock.rst: avoid using ReST :doc:`foo` markup
` [PATCH v2 27/29] docs: userspace-api: "
[PATCH v2 2/6] KEYS: trusted: Allow import from existing key material for development
2021-06-22 12:45 UTC
[PATCH v2 0/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
2021-06-22 12:37 UTC (6+ messages)
` [PATCH v2 1/6] KEYS: trusted: allow use of TEE as backend without TCG_TPM support
` [PATCH v2 3/6] KEYS: trusted: allow users to use kernel RNG for key material
` [PATCH v2 4/6] KEYS: trusted: allow trust sources "
` [PATCH v2 5/6] crypto: caam - add in-kernel interface for blob generator
` [PATCH v2 6/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
[ANNOUNCE][CFP] Linux Security Summit 2021
2021-06-22 2:46 UTC (3+ messages)
[PATCH v2] evm: Check xattr size discrepancy between kernel and user
2021-06-21 13:25 UTC (2+ messages)
[PATCH] evm: Check xattr size misalignment between kernel and user
2021-06-21 12:22 UTC (2+ messages)
[PATCH v3] lockdown,selinux: fix wrong subject in some SELinux lockdown checks
2021-06-21 8:35 UTC (5+ messages)
Size mismatch between vfs_getxattr_alloc() and vfs_getxattr()
2021-06-18 17:22 UTC (11+ messages)
` [PATCH] fs: Return raw xattr for security.* if there is size disagreement with LSMs
[PATCH v6 0/4] Add support for ECDSA-signed kernel modules
2021-06-18 9:04 UTC (11+ messages)
` [PATCH v6 4/4] certs: Adjustment due to 'Check whether openssl tool is available'
[PATCH v27 00/25] LSM: Module stacking for AppArmor
2021-06-16 15:05 UTC (28+ messages)
` [PATCH v27 01/25] LSM: Infrastructure management of the sock security
` [PATCH v27 02/25] LSM: Add the lsmblob data structure
` [PATCH v27 03/25] LSM: provide lsm name and id slot mappings
` [PATCH v27 04/25] IMA: avoid label collisions with stacked LSMs
` [PATCH v27 05/25] LSM: Use lsmblob in security_audit_rule_match
` [PATCH v27 06/25] LSM: Use lsmblob in security_kernel_act_as
` [PATCH v27 07/25] LSM: Use lsmblob in security_secctx_to_secid
` [PATCH v27 08/25] LSM: Use lsmblob in security_secid_to_secctx
` [PATCH v27 09/25] LSM: Use lsmblob in security_ipc_getsecid
` [PATCH v27 10/25] LSM: Use lsmblob in security_task_getsecid
` [PATCH v27 11/25] LSM: Use lsmblob in security_inode_getsecid
` [PATCH v27 12/25] LSM: Use lsmblob in security_cred_getsecid
` [PATCH v27 13/25] IMA: Change internal interfaces to use lsmblobs
` [PATCH v27 14/25] LSM: Specify which LSM to display
` [PATCH v27 15/25] LSM: Ensure the correct LSM context releaser
` [PATCH v27 16/25] LSM: Use lsmcontext in security_secid_to_secctx
` [PATCH v27 17/25] LSM: Use lsmcontext in security_inode_getsecctx
` [PATCH v27 18/25] LSM: security_secid_to_secctx in netlink netfilter
` [PATCH v27 19/25] NET: Store LSM netlabel data in a lsmblob
` [PATCH v27 20/25] LSM: Verify LSM display sanity in binder
` [PATCH v27 21/25] audit: add support for non-syscall auxiliary records
` [PATCH v27 22/25] Audit: Add record for multiple process LSM attributes
` [PATCH v27 23/25] Audit: Add record for multiple object "
` [PATCH v27 24/25] LSM: Add /proc attr entry for full LSM context
` [PATCH v27 25/25] AppArmor: Remove the exclusive flag
[PATCH] tpm2_load_command leaks memory
2021-06-16 14:49 UTC (3+ messages)
[PATCH] proc: Track /proc/$pid/attr/ opener mm_struct
2021-06-16 5:56 UTC (10+ messages)
[PATCH v2 09/10] apparmor: test: Remove some casts which are no-longer required
2021-06-15 21:26 UTC (3+ messages)
[PATCH -next v3] netlabel: Fix memory leak in netlbl_mgmt_add_common
2021-06-15 20:29 UTC (3+ messages)
[PATCH] security: add LSM hook at the memfd_create point
2021-06-13 17:25 UTC (2+ messages)
[PATCH -next v2] netlabel: Fix memory leak in netlbl_mgmt_add_common
2021-06-11 17:36 UTC (2+ messages)
[PATCH] audit: remove unnecessary 'ret' initialization
2021-06-11 17:23 UTC (2+ messages)
[PATCH v8 0/8] Fork brute force attack mitigation
2021-06-11 15:41 UTC (5+ messages)
[PATCH -next] netlabel: Fix memory leak in netlbl_mgmt_add_common
2021-06-11 4:05 UTC (3+ messages)
[PATCH] LSM: SafeSetID: Mark safesetid_initialized as __initdata
2021-06-10 22:33 UTC (3+ messages)
[PATCH v1] efi: Don't use knowledge about efi_guid_t internals
2021-06-10 15:05 UTC (4+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).