messages from 2022-01-11 11:38:16 to 2022-01-26 03:00:12 UTC [more...]
[PATCH v10 0/8] Enroll kernel keys thru MOK
2022-01-26 2:58 UTC (5+ messages)
` [PATCH v10 2/8] integrity: Introduce a Linux keyring called machine
` [PATCH v10 5/8] KEYS: Introduce link restriction for machine keys
` [PATCH v10 6/8] efi/mokvar: move up init order
` [PATCH v10 8/8] integrity: Only use machine keyring when uefi_check_trust_mok_keys is true
"kernel NULL pointer dereference" crash when attempting a write
2022-01-26 1:22 UTC (6+ messages)
[PATCH] LSM: general protection fault in legacy_parse_param
2022-01-25 23:36 UTC (6+ messages)
[PATCH v9 00/23] ima: Namespace IMA with audit support in IMA-ns
2022-01-25 22:46 UTC (24+ messages)
` [PATCH v9 01/23] ima: Remove ima_policy file before directory
` [PATCH v9 02/23] ima: Do not print policy rule with inactive LSM labels
` [PATCH v9 03/23] securityfs: rework dentry creation
` [PATCH v9 04/23] securityfs: Extend securityfs with namespacing support
` [PATCH v9 05/23] ima: Define ima_namespace struct and start moving variables into it
` [PATCH v9 06/23] ima: Move arch_policy_entry into ima_namespace
` [PATCH v9 07/23] ima: Move ima_htable "
` [PATCH v9 08/23] ima: Move measurement list related variables "
` [PATCH v9 09/23] ima: Move some IMA policy and filesystem "
` [PATCH v9 10/23] ima: Move IMA securityfs files into ima_namespace or onto stack
` [PATCH v9 11/23] ima: Move ima_lsm_policy_notifier into ima_namespace
` [PATCH v9 12/23] ima: Define mac_admin_ns_capable() as a wrapper for ns_capable()
` [PATCH v9 13/23] ima: Only accept AUDIT rules for non-init_ima_ns namespaces for now
` [PATCH v9 14/23] userns: Add pointer to ima_namespace to user_namespace
` [PATCH v9 15/23] ima: Implement hierarchical processing of file accesses
` [PATCH v9 16/23] ima: Implement ima_free_policy_rules() for freeing of an ima_namespace
` [PATCH v9 17/23] ima: Add functions for creating and "
` [PATCH v9 18/23] integrity/ima: Define ns_status for storing namespaced iint data
` [PATCH v9 19/23] ima: Namespace audit status flags
` [PATCH v9 20/23] ima: Setup securityfs for IMA namespace
` [PATCH v9 21/23] ima: Introduce securityfs file to activate an "
` [PATCH v9 22/23] ima: Show owning user namespace's uid and gid when displaying policy
` [PATCH v9 23/23] ima: Enable IMA namespaces
[PATCH v5 0/6] KEXEC_SIG with appended signature
2022-01-25 20:30 UTC (10+ messages)
` [PATCH v5 3/6] kexec_file: Don't opencode appended signature verification
` [PATCH v5 4/6] module: strip the signature marker in the verification function
` [PATCH v5 5/6] module: Use key_being_used_for for log messages in verify_appended_signature
` [PATCH v5 6/6] module: Move duplicate mod_check_sig users code to mod_parse_sig
[PATCH v4 0/6] KEXEC_SIG with appended signature
2022-01-25 19:50 UTC (3+ messages)
` [PATCH v4 1/6] s390/kexec_file: Don't opencode appended signature check
[RFC PATCH] mm: create security context for memfd_secret inodes
2022-01-25 14:33 UTC
[RFC PATCH 0/2] landlock network implementation cover letter
2022-01-25 14:17 UTC (4+ messages)
` [RFC PATCH 1/2] landlock: TCP network hooks implementation
` [RFC PATCH 2/2] landlock: selftests for bind and connect hooks
Prezentacja
2022-01-25 8:57 UTC
Wycena paneli fotowoltaicznych
2022-01-25 8:55 UTC
[PATCH][next] apparmor: Use struct_size() helper in kmalloc()
2022-01-25 1:56 UTC
Custom LSM: getting a null pointer dereference when trying to access a task security blob
2022-01-24 21:51 UTC (6+ messages)
[RFC PATCH v3 0/2] Add capabilities file to sysfs
2022-01-21 8:58 UTC (8+ messages)
` [RFC PATCH v3 1/2] capability: Add cap_string
` [RFC PATCH v3 2/2] security/inode.c: Add capabilities file
[PATCH 0/3] lib/string_helpers: Add a few string helpers
2022-01-21 1:37 UTC (29+ messages)
` [PATCH 1/3] lib/string_helpers: Consolidate yesno() implementation
` [Intel-gfx] "
` [PATCH 2/3] lib/string_helpers: Add helpers for enable[d]/disable[d]
` [PATCH 3/3] drm: Convert open yes/no strings to yesno()
` [Intel-gfx] [PATCH 0/3] lib/string_helpers: Add a few string helpers
[PATCH V2 00/10] selftests: Fix separate output directory builds
2022-01-20 18:20 UTC (15+ messages)
` [PATCH V2 01/10] selftests: set the BUILD variable to absolute path
` [PATCH V2 02/10] selftests: Add and export a kernel uapi headers path
` [PATCH V2 03/10] selftests: Correct the headers install path
` [PATCH V2 04/10] selftests: futex: Add the uapi headers include variable
` [PATCH V2 05/10] selftests: kvm: "
` [PATCH V2 06/10] selftests: landlock: "
` [PATCH V2 07/10] selftests: net: "
` [PATCH V2 08/10] selftests: mptcp: "
` [PATCH V2 09/10] selftests: vm: "
` [PATCH V2 10/10] selftests: vm: remove dependecy from internal kernel macros
[PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
2022-01-20 17:13 UTC (13+ messages)
[PATCH v8 00/19] ima: Namespace IMA with audit support in IMA-ns
2022-01-19 13:32 UTC (37+ messages)
` [PATCH v8 01/19] securityfs: Extend securityfs with namespacing support
` [PATCH v8 03/19] ima: Move policy related variables into ima_namespace
` [PATCH v8 05/19] ima: Move measurement list "
` [PATCH v8 07/19] ima: Move dentry into ima_namespace and others onto stack
` [PATCH v8 08/19] ima: Use mac_admin_ns_capable() to check corresponding capability
` [PATCH v8 10/19] ima: Implement hierarchical processing of file accesses
` [PATCH v8 13/19] ima: Add functions for creation and freeing of an ima_namespace
` [PATCH v8 18/19] ima: Show owning user namespace's uid and gid when displaying policy
` [PATCH v8 19/19] ima: Enable IMA namespaces
[PATCH 00/10] selftests: Fix separate output directory builds
2022-01-19 8:22 UTC (16+ messages)
` [PATCH 01/10] selftests: set the BUILD variable to absolute path
` [PATCH 02/10] selftests: Add and export a kernel uapi headers path
` [PATCH 03/10] selftests: Correct the headers install path
` [PATCH 04/10] selftests: futex: Add the uapi headers include variable
` [PATCH 05/10] selftests: kvm: "
` [PATCH 06/10] selftests: landlock: "
` [PATCH 07/10] selftests: net: "
` [PATCH 08/10] selftests: mptcp: "
` [PATCH 09/10] selftests: vm: "
` [PATCH 10/10] selftests: vm: remove dependecy from internal kernel macros
[PATCH] MAINTAINERS: add missing "security/integrity" directory
2022-01-19 7:35 UTC (2+ messages)
[PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
2022-01-18 18:26 UTC
[PATCH v9 0/8] Enroll kernel keys thru MOK
2022-01-18 16:32 UTC (17+ messages)
` [PATCH v9 2/8] integrity: Introduce a Linux keyring called machine
Why is there an alignment from cred->security?
2022-01-18 15:01 UTC (2+ messages)
[PATCH] integrity: check the return value of audit_log_start()
2022-01-17 22:58 UTC (3+ messages)
[RFC PATCH v1 0/2] Add capabilities file to sysfs
2022-01-17 14:14 UTC (6+ messages)
` [RFC PATCH v1 1/2] capability: Add cap_strings
[RFC PATCH v2 0/2] Add capabilities file to sysfs
2022-01-17 14:12 UTC (3+ messages)
` [RFC PATCH v2 1/2] capability: Add cap_strings
` [RFC PATCH v2 2/2] kernel/ksysfs.c: Add capabilities attribute
[PATCH] ima: Fix trivial typos in the comments
2022-01-15 2:10 UTC (7+ messages)
[PATCH v3] integrity: check the return value of audit_log_start()
2022-01-15 1:11 UTC
Flush the hold queue fall into an infinite loop
2022-01-14 22:35 UTC (3+ messages)
[PATCHv2] integrity: check the return value of audit_log_start()
2022-01-14 22:13 UTC (2+ messages)
[PATCH] security/apparmor: remove redundant ret variable
2022-01-14 22:12 UTC (2+ messages)
[GIT PULL] SELinux patches for v5.17
2022-01-11 21:24 UTC (2+ messages)
[PATCH v8 0/3] integrity: support including firmware ".platform" keys at build time
2022-01-11 18:36 UTC (4+ messages)
` [PATCH v8 1/3] certs: export load_certificate_list() to be used outside certs/
` [PATCH v8 2/3] integrity: make integrity_keyring_from_id() non-static
` [PATCH v8 3/3] integrity: support including firmware ".platform" keys at build time
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).