messages from 2022-02-03 00:14:16 to 2022-02-18 20:08:44 UTC [more...]
[PATCH v10 00/27] ima: Namespace IMA with audit support in IMA-ns
2022-02-18 20:04 UTC (44+ messages)
` [PATCH v10 01/27] ima: Remove ima_policy file before directory
` [PATCH v10 03/27] ima: Return error code obtained from securityfs functions
` [PATCH v10 04/27] securityfs: rework dentry creation
` [PATCH v10 05/27] ima: Define ima_namespace struct and start moving variables into it
` [PATCH v10 06/27] ima: Move arch_policy_entry into ima_namespace
` [PATCH v10 07/27] ima: Move ima_htable "
` [PATCH v10 08/27] ima: Move measurement list related variables "
` [PATCH v10 09/27] ima: Move some IMA policy and filesystem "
` [PATCH v10 10/27] ima: Move IMA securityfs files into ima_namespace or onto stack
` [PATCH v10 11/27] ima: Move ima_lsm_policy_notifier into ima_namespace
` [PATCH v10 12/27] ima: Define mac_admin_ns_capable() as a wrapper for ns_capable()
` [PATCH v10 13/27] ima: Only accept AUDIT rules for non-init_ima_ns namespaces for now
` [PATCH v10 14/27] userns: Add pointer to ima_namespace to user_namespace
` [PATCH v10 15/27] ima: Implement hierarchical processing of file accesses
` [PATCH v10 16/27] ima: Implement ima_free_policy_rules() for freeing of an ima_namespace
` [PATCH v10 17/27] ima: Add functions for creating and "
Új hirdetési kapcsolatfelvétel
2022-02-18 18:25 UTC
[PATCH v2 0/6] bpf-lsm: Extend interoperability with IMA
2022-02-18 15:01 UTC (15+ messages)
` [PATCH v2 1/6] ima: Fix documentation-related warnings in ima_main.c
` [PATCH v2 2/6] ima: Always return a file measurement in ima_file_hash()
` [PATCH v2 3/6] bpf-lsm: Introduce new helper bpf_ima_file_hash()
` [PATCH v2 4/6] selftests/bpf: Add test for bpf_ima_file_hash()
` [PATCH v2 5/6] bpf-lsm: Make bpf_lsm_kernel_read_file() as sleepable
` [PATCH v2 6/6] selftests/bpf: Add test for bpf_lsm_kernel_read_file()
[PATCH] security: declare member holding string literal const
2022-02-17 22:50 UTC (3+ messages)
[RFC PATCH] mm: create security context for memfd_secret inodes
2022-02-17 22:32 UTC (4+ messages)
[PATCH v8 0/5] Enable root to update the blacklist keyring
2022-02-17 19:58 UTC (9+ messages)
[RFC PATCH 2/2] capability: use new capable_or functionality
2022-02-17 17:29 UTC (3+ messages)
` [RFC PATCH 1/2] capability: add capable_or to test for multiple caps with exactly one audit message
[PATCH] selinux: log anon inode class name
2022-02-17 14:34 UTC
[PATCH net v3 0/2] security: fixups for the security hooks in sctp
2022-02-17 13:41 UTC (13+ messages)
` [PATCH net v3 1/2] security: add sctp_assoc_established hook
` [PATCH net v3 2/2] security: implement sctp_assoc_established hook in selinux
issues about selinux namespace
2022-02-16 20:47 UTC (5+ messages)
` [RFC PATCH 0/1] SELinux-namespaces
` [RFC PATCH 1/1] selinuxns: Replace state pointer with namespace id
[PATCH 1/4] Fix arm64 kexec forbidding kernels signed with keys in the secondary keyring to boot
2022-02-16 12:09 UTC (11+ messages)
` [PATCH 2/4] kexec, KEYS, arm64: Make use of platform keyring for signature verification
` [PATCH 3/4] kexec, KEYS, s390: Make use of built-in and secondary "
` [PATCH 4/4] module, KEYS: Make use of platform "
[PATCH] KEYS: remove support for asym_tpm keys
2022-02-15 19:30 UTC (3+ messages)
[PATCH v5] KEYS: encrypted: Instantiate key with user-provided decrypted data
2022-02-15 14:19 UTC
[PATCH] ima: Calculate digest in ima_inode_hash() if not available
2022-02-15 11:16 UTC (9+ messages)
[PATCH v5 0/6] KEXEC_SIG with appended signature
2022-02-14 17:09 UTC (19+ messages)
` [PATCH v5 2/6] powerpc/kexec_file: Add KEXEC_SIG support
` [PATCH v5 3/6] kexec_file: Don't opencode appended signature verification
[PATCH v8 00/17] Enroll kernel keys thru MOK
2022-02-14 12:42 UTC (17+ messages)
` [PATCH v8 07/17] integrity: restrict INTEGRITY_KEYRING_MACHINE to restrict_link_by_ca
` [PATCH v8 10/17] KEYS: add a reference to machine keyring
` [PATCH v8 11/17] KEYS: Introduce link restriction for machine keys
` [PATCH v8 13/17] integrity: store reference to machine keyring
` [PATCH v8 14/17] KEYS: link machine trusted keys to secondary_trusted_keys
` [PATCH v8 15/17] efi/mokvar: move up init order
` [PATCH v8 16/17] integrity: Trust MOK keys if MokListTrustedRT found
` [PATCH v8 17/17] integrity: Only use machine keyring when uefi_check_trust_mok_keys is true
W sprawie samochodu
2022-02-14 8:50 UTC
[PATCH] apparmor: fix aa_label_asxprint return check
2022-02-14 3:40 UTC (2+ messages)
[PATCH] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
2022-02-14 0:33 UTC (24+ messages)
` [PATCH v2] "
` [PATCH v3] "
[RFC PATCH 0/2] landlock network implementation cover letter
2022-02-10 10:16 UTC (33+ messages)
` [RFC PATCH 1/2] landlock: TCP network hooks implementation
` [RFC PATCH 2/2] landlock: selftests for bind and connect hooks
[BUG] Unable to write the NVRAM on T2 Macs if CONFIG_INTEGRITY_PLATFORM_KEYRING and CONFIG_LOAD_UEFI_KEYS are enabled
2022-02-09 6:51 UTC
Problem with commit ccf11dbaa07b ("evm: Fix memleak in init_desc")
2022-02-09 1:42 UTC (3+ messages)
[PATCH v7 0/5] Allow guest access to EFI confidential computing secret area
2022-02-09 0:25 UTC (23+ messages)
` [PATCH v7 4/5] efi: Load efi_secret module if EFI secret area is populated
[PATCH v10 0/8] Enroll kernel keys thru MOK
2022-02-08 15:26 UTC (6+ messages)
` MAINTAINERS update suggestion (subject change)
[PATCH] KEYS: trusted: fix crash when TPM/TEE are built as module
2022-02-07 23:12 UTC (3+ messages)
[ANNOUNCE][CFP] Linux Security Summit North America 2022
2022-02-07 22:24 UTC
[PATCH] KEYS: trusted: Avoid calling null function trusted_key_exit
2022-02-07 17:40 UTC (3+ messages)
宇土センターホテル "6t8h6t97"
2022-02-06 10:25 UTC
TOMOYO can't be enabled with other major LSM
2022-02-06 7:57 UTC
Aufmerksamkeit:
2022-02-05 21:04 UTC
[PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
2022-02-04 6:27 UTC (5+ messages)
[GIT PULL] SELinux fixes for v5.17 (#1)
2022-02-04 1:16 UTC (2+ messages)
[PATCH 0/4 v5] fortify: Add Clang support
2022-02-04 0:28 UTC (9+ messages)
` [PATCH 4/4 "
[PATCH v32 00/28] LSM: Module stacking for AppArmor
2022-02-02 23:53 UTC (12+ messages)
` [PATCH v32 18/28] LSM: security_secid_to_secctx in netlink netfilter
` [PATCH v32 19/28] NET: Store LSM netlabel data in a lsmblob
` [PATCH v32 20/28] binder: Pass LSM identifier for confirmation
` [PATCH v32 21/28] LSM: Extend security_secid_to_secctx to include module selection
` [PATCH v32 22/28] Audit: Keep multiple LSM data in audit_names
` [PATCH v32 23/28] Audit: Create audit_stamp structure
` [PATCH v32 24/28] Audit: Add framework for auxiliary records
` [PATCH v32 25/28] Audit: Add record for multiple task security contexts
` [PATCH v32 26/28] Audit: Add record for multiple object "
` [PATCH v32 27/28] LSM: Add /proc attr entry for full LSM context
` [PATCH v32 28/28] AppArmor: Remove the exclusive flag
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).