messages from 2022-04-12 13:27:13 to 2022-04-26 13:50:57 UTC [more...]
[PATCH] Carry forward IMA measurement log on kexec on x86_64
2022-04-26 13:49 UTC (4+ messages)
[RFC PATCH v4 00/15] Landlock LSM
2022-04-26 10:17 UTC (30+ messages)
` [RFC PATCH v4 03/15] landlock: landlock_find/insert_rule refactoring
` [RFC PATCH v4 03/15] landlock: landlock_find/insert_rule refactoring (TCP port 0)
` [RFC PATCH v4 06/15] landlock: landlock_add_rule syscall refactoring
` [RFC PATCH v4 07/15] landlock: user space API network support
` [RFC PATCH v4 09/15] landlock: TCP network hooks implementation
` [RFC PATCH v4 10/15] seltest/landlock: add tests for bind() hooks
How to list keys used for kexec
2022-04-26 8:52 UTC (3+ messages)
[PATCH v35 00/29] LSM: Module stacking for AppArmor
2022-04-26 3:37 UTC (49+ messages)
` [PATCH v35 01/29] integrity: disassociate ima_filter_rule from security_audit_rule
` [PATCH v35 02/29] LSM: Infrastructure management of the sock security
` [PATCH v35 03/29] LSM: Add the lsmblob data structure
` [PATCH v35 04/29] LSM: provide lsm name and id slot mappings
` [PATCH v35 05/29] IMA: avoid label collisions with stacked LSMs
` [PATCH v35 06/29] LSM: Use lsmblob in security_audit_rule_match
` [PATCH v35 07/29] LSM: Use lsmblob in security_kernel_act_as
` [PATCH v35 08/29] LSM: Use lsmblob in security_secctx_to_secid
` [PATCH v35 09/29] LSM: Use lsmblob in security_secid_to_secctx
` [PATCH v35 10/29] LSM: Use lsmblob in security_ipc_getsecid
` [PATCH v35 11/29] LSM: Use lsmblob in security_current_getsecid
` [PATCH v35 12/29] LSM: Use lsmblob in security_inode_getsecid
` [PATCH v35 13/29] LSM: Use lsmblob in security_cred_getsecid
` [PATCH v35 14/29] LSM: Specify which LSM to display
` [PATCH v35 15/29] LSM: Ensure the correct LSM context releaser
` [PATCH v35 16/29] LSM: Use lsmcontext in security_secid_to_secctx
` [PATCH v35 17/29] LSM: Use lsmcontext in security_inode_getsecctx
` [PATCH v35 18/29] LSM: security_secid_to_secctx in netlink netfilter
` [PATCH v35 19/29] NET: Store LSM netlabel data in a lsmblob
` [PATCH v35 20/29] binder: Pass LSM identifier for confirmation
` [PATCH v35 21/29] LSM: Extend security_secid_to_secctx to include module selection
` [PATCH v35 22/29] Audit: Keep multiple LSM data in audit_names
` [PATCH v35 23/29] Audit: Create audit_stamp structure
` [PATCH v35 24/29] LSM: Add a function to report multiple LSMs
` [PATCH v35 25/29] Audit: Allow multiple records in an audit_buffer
` [PATCH v35 26/29] Audit: Add record for multiple task security contexts
` [PATCH v35 27/29] Audit: Add record for multiple object contexts
` [PATCH v35 28/29] LSM: Add /proc attr entry for full LSM context
` [PATCH v35 29/29] AppArmor: Remove the exclusive flag
[PATCH] integrity: Allow ima_appraise bootparam to be set when SB is enabled
2022-04-25 22:21 UTC
[PATCH 1/2] clk-bcm2835: use subsys_initcall for the clock driver when IMA is enabled
2022-04-23 15:42 UTC
[PATCH v3 RESEND] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
2022-04-22 17:39 UTC (18+ messages)
` [PATCH v4] "
` [PATCH v4 RESEND] "
` [PATCH v5] "
` [PATCH v6] "
` [PATCH v7] "
` [PATCH v7 RESEND] "
[PATCH v7 3/5] certs: Make blacklist_vet_description() more strict
2022-04-22 8:54 UTC (8+ messages)
` [PATCH v7 0/5] Enable root to update the blacklist keyring
Napływ Klientów ze strony
2022-04-21 7:43 UTC
[PATCH v12 00/26] ima: Namespace IMA with audit support in IMA-ns
2022-04-20 14:06 UTC (27+ messages)
` [PATCH v12 01/26] securityfs: rework dentry creation
` [PATCH v12 02/26] securityfs: Extend securityfs with namespacing support
` [PATCH v12 03/26] ima: Define ima_namespace struct and start moving variables into it
` [PATCH v12 04/26] ima: Move arch_policy_entry into ima_namespace
` [PATCH v12 05/26] ima: Move ima_htable "
` [PATCH v12 06/26] ima: Move measurement list related variables "
` [PATCH v12 07/26] ima: Move some IMA policy and filesystem "
` [PATCH v12 08/26] ima: Move IMA securityfs files into ima_namespace or onto stack
` [PATCH v12 09/26] ima: Move ima_lsm_policy_notifier into ima_namespace
` [PATCH v12 10/26] ima: Switch to lazy lsm policy updates for better performance
` [PATCH v12 11/26] ima: Define mac_admin_ns_capable() as a wrapper for ns_capable()
` [PATCH v12 12/26] ima: Only accept AUDIT rules for non-init_ima_ns namespaces for now
` [PATCH v12 13/26] userns: Add pointer to ima_namespace to user_namespace
` [PATCH v12 14/26] ima: Implement hierarchical processing of file accesses
` [PATCH v12 15/26] ima: Implement ima_free_policy_rules() for freeing of an ima_namespace
` [PATCH v12 16/26] ima: Add functions for creating and "
` [PATCH v12 17/26] integrity/ima: Define ns_status for storing namespaced iint data
` [PATCH v12 18/26] integrity: Add optional callback function to integrity_inode_free()
` [PATCH v12 19/26] ima: Namespace audit status flags
` [PATCH v12 20/26] ima: Remove unused iints from the integrity_iint_cache
` [PATCH v12 21/26] ima: Setup securityfs for IMA namespace
` [PATCH v12 22/26] ima: Introduce securityfs file to activate an "
` [PATCH v12 23/26] ima: Show owning user namespace's uid and gid when displaying policy
` [PATCH v12 24/26] ima: Limit number of policy rules in non-init_ima_ns
` [PATCH v12 25/26] ima: Restrict informational audit messages to init_ima_ns
` [PATCH v12 26/26] ima: Enable IMA namespaces
[PATCH v1] RISC-V: defconfigs: Add syzkaller's config as a defconfig
2022-04-19 17:49 UTC
[PATCH 0/3] LoadPin: Enable loading from trusted dm-verity devices
2022-04-19 4:32 UTC (8+ messages)
` [PATCH 1/3] dm: Add verity helpers for LoadPin
` [PATCH 2/3] LoadPin: Enable loading from trusted dm-verity devices
` [PATCH 3/3] dm: verity-loadpin: Use CONFIG_SECURITY_LOADPIN_VERITY for conditional compilation
[RFC PATCH 0/1] SELinux-namespaces
2022-04-18 9:45 UTC (9+ messages)
` [RFC PATCH 0/7] SELinux-namespace
` [RFC PATCH 1/7] LSM: Infrastructure management of the superblock
` [RFC PATCH 2/7] selinux: support per-namespace superblock security structures
` [RFC PATCH 3/7] SELINUXNS: Fix initilization of the superblock security under spinlock
` [RFC PATCH 4/7] SELINUXNS: Namespacing for xattrs
` [RFC PATCH 5/7] SELINUXNS: Migrate all open files and all vma to new namespace
` [RFC PATCH 6/7] SELINUXNS: Fixing superblock security structure memory leakage
` [RFC PATCH 7/7] SELINUXNS: Fixing concurrency issues
[PATCH v6 2/4] kexec, KEYS: make the code in bzImage64_verify_sig generic
2022-04-18 5:46 UTC (8+ messages)
` [PATCH v6 3/4] arm64: kexec_file: use more system keyrings to verify kernel image signature
` [PATCH v6 4/4] kexec, KEYS, s390: Make use of built-in and secondary keyring for signature verification
[PATCH v7 0/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
2022-04-17 18:47 UTC (10+ messages)
` [PATCH v7 1/6] KEYS: trusted: allow use of TEE as backend without TCG_TPM support
` [PATCH v7 2/6] KEYS: trusted: allow use of kernel RNG for key material
` [PATCH v7 3/6] crypto: caam - add in-kernel interface for blob generator
` [PATCH v7 4/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
` [PATCH v7 5/6] doc: trusted-encrypted: describe new CAAM trust source
` [PATCH v7 6/6] MAINTAINERS: add myself as CAAM trusted key maintainer
[PATCH v34 00/29] LSM: Module stacking for AppArmor
2022-04-15 21:44 UTC (31+ messages)
` [PATCH v34 01/29] integrity: disassociate ima_filter_rule from security_audit_rule
` [PATCH v34 02/29] LSM: Infrastructure management of the sock security
` [PATCH v34 03/29] LSM: Add the lsmblob data structure
` [PATCH v34 04/29] LSM: provide lsm name and id slot mappings
` [PATCH v34 05/29] IMA: avoid label collisions with stacked LSMs
` [PATCH v34 06/29] LSM: Use lsmblob in security_audit_rule_match
` [PATCH v34 07/29] LSM: Use lsmblob in security_kernel_act_as
` [PATCH v34 08/29] LSM: Use lsmblob in security_secctx_to_secid
` [PATCH v34 09/29] LSM: Use lsmblob in security_secid_to_secctx
` [PATCH v34 10/29] LSM: Use lsmblob in security_ipc_getsecid
` [PATCH v34 11/29] LSM: Use lsmblob in security_current_getsecid
` [PATCH v34 12/29] LSM: Use lsmblob in security_inode_getsecid
` [PATCH v34 13/29] LSM: Use lsmblob in security_cred_getsecid
` [PATCH v34 14/29] LSM: Specify which LSM to display
` [PATCH v34 15/29] LSM: Ensure the correct LSM context releaser
` [PATCH v34 16/29] LSM: Use lsmcontext in security_secid_to_secctx
` [PATCH v34 17/29] LSM: Use lsmcontext in security_inode_getsecctx
` [PATCH v34 18/29] LSM: security_secid_to_secctx in netlink netfilter
` [PATCH v34 19/29] NET: Store LSM netlabel data in a lsmblob
` [PATCH v34 20/29] binder: Pass LSM identifier for confirmation
` [PATCH v34 21/29] LSM: Extend security_secid_to_secctx to include module selection
` [PATCH v34 22/29] Audit: Keep multiple LSM data in audit_names
` [PATCH v34 23/29] Audit: Create audit_stamp structure
` [PATCH v34 24/29] LSM: Add a function to report multiple LSMs
` [PATCH v34 25/29] Audit: Allow multiple records in an audit_buffer
` [PATCH v34 26/29] Audit: Add record for multiple task security contexts
` [PATCH v34 27/29] Audit: Add record for multiple object contexts
` [PATCH v34 28/29] LSM: Add /proc attr entry for full LSM context
` [PATCH v34 29/29] AppArmor: Remove the exclusive flag
[PATCH v6 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
2022-04-15 20:07 UTC (9+ messages)
` [PATCH v6 3/4] crypto: caam - add in-kernel interface for blob generator
` [EXT] "
` [PATCH v6 4/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
` [EXT] "
[PATCH 0/7] Add CA enforcement keyring restrictions
2022-04-15 16:14 UTC (13+ messages)
` [PATCH 4/7] KEYS: Introduce a builtin root of trust key flag
[PATCH v2] keys: remove __user annotation from function prototype
2022-04-14 12:05 UTC (2+ messages)
[PATCH] ima: simplify if-if to if-else
2022-04-14 7:11 UTC
[PATCH v10 0/4] Allow guest access to EFI confidential computing secret area
2022-04-13 16:48 UTC (6+ messages)
` [PATCH v10 1/4] efi: Save location of EFI confidential computing area
` [PATCH v10 2/4] virt: Add efi_secret module to expose confidential computing secrets
` [PATCH v10 3/4] efi: Register efi_secret platform device if EFI secret area is declared
` [PATCH v10 4/4] docs: security: Add secrets/coco documentation
Wycena paneli fotowoltaicznych
2022-04-13 7:40 UTC
[PATCH] security: don't treat structure as an array of struct hlist_head
2022-04-12 17:26 UTC (2+ messages)
[PATCH v8 0/4] Allow guest access to EFI confidential computing secret area
2022-04-12 13:18 UTC (8+ messages)
` [PATCH v8 3/4] efi: Load efi_secret module if EFI secret area is populated
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).