messages from 2022-05-19 08:58:19 to 2022-06-09 23:46:40 UTC [more...]
[PATCH linux-next] security: Fix side effects of default BPF LSM hooks
2022-06-09 23:46 UTC
[PATCH v36 00/33] LSM: Module stacking for AppArmor
2022-06-09 23:01 UTC (34+ messages)
` [PATCH v36 01/33] integrity: disassociate ima_filter_rule from security_audit_rule
` [PATCH v36 02/33] LSM: Infrastructure management of the sock security
` [PATCH v36 03/33] LSM: Add the lsmblob data structure
` [PATCH v36 04/33] LSM: provide lsm name and id slot mappings
` [PATCH v36 05/33] IMA: avoid label collisions with stacked LSMs
` [PATCH v36 06/33] LSM: Use lsmblob in security_audit_rule_match
` [PATCH v36 07/33] LSM: Use lsmblob in security_kernel_act_as
` [PATCH v36 08/33] LSM: Use lsmblob in security_secctx_to_secid
` [PATCH v36 09/33] LSM: Use lsmblob in security_secid_to_secctx
` [PATCH v36 10/33] LSM: Use lsmblob in security_ipc_getsecid
` [PATCH v36 11/33] LSM: Use lsmblob in security_current_getsecid
` [PATCH v36 12/33] LSM: Use lsmblob in security_inode_getsecid
` [PATCH v36 13/33] LSM: Use lsmblob in security_cred_getsecid
` [PATCH v36 14/33] LSM: Specify which LSM to display
` [PATCH v36 15/33] LSM: Ensure the correct LSM context releaser
` [PATCH v36 16/33] LSM: Use lsmcontext in security_secid_to_secctx
` [PATCH v36 17/33] LSM: Use lsmcontext in security_inode_getsecctx
` [PATCH v36 18/33] LSM: Use lsmcontext in security_dentry_init_security
` [PATCH v36 19/33] LSM: security_secid_to_secctx in netlink netfilter
` [PATCH v36 20/33] NET: Store LSM netlabel data in a lsmblob
` [PATCH v36 21/33] binder: Pass LSM identifier for confirmation
` [PATCH v36 22/33] LSM: Extend security_secid_to_secctx to include module selection
` [PATCH v36 23/33] Audit: Keep multiple LSM data in audit_names
` [PATCH v36 24/33] Audit: Create audit_stamp structure
` [PATCH v36 25/33] LSM: Add a function to report multiple LSMs
` [PATCH v36 26/33] Audit: Allow multiple records in an audit_buffer
` [PATCH v36 27/33] Audit: Add record for multiple task security contexts
` [PATCH v36 28/33] audit: multiple subject lsm values for netlabel
` [PATCH v36 29/33] Audit: Add record for multiple object contexts
` [PATCH v36 30/33] netlabel: Use a struct lsmblob in audit data
` [PATCH v36 31/33] LSM: Removed scaffolding function lsmcontext_init
` [PATCH v36 32/33] LSM: Add /proc attr entry for full LSM context
` [PATCH v36 33/33] AppArmor: Remove the exclusive flag
[PATCH v3] cred: Propagate security_prepare_creds() error code
2022-06-09 23:18 UTC (2+ messages)
[PATCH v8 2/4] kexec, KEYS: make the code in bzImage64_verify_sig generic
2022-06-09 23:15 UTC (10+ messages)
` [PATCH v8 3/4] arm64: kexec_file: use more system keyrings to verify kernel image signature
` [PATCH v8 4/4] kexec, KEYS, s390: Make use of built-in and secondary keyring for signature verification
[PATCH v12 00/26] ima: Namespace IMA with audit support in IMA-ns
2022-06-09 14:27 UTC (57+ messages)
` [PATCH v12 01/26] securityfs: rework dentry creation
` [PATCH v12 02/26] securityfs: Extend securityfs with namespacing support
` [PATCH v12 03/26] ima: Define ima_namespace struct and start moving variables into it
` [PATCH v12 04/26] ima: Move arch_policy_entry into ima_namespace
` [PATCH v12 05/26] ima: Move ima_htable "
` [PATCH v12 06/26] ima: Move measurement list related variables "
` [PATCH v12 07/26] ima: Move some IMA policy and filesystem "
` [PATCH v12 08/26] ima: Move IMA securityfs files into ima_namespace or onto stack
` [PATCH v12 09/26] ima: Move ima_lsm_policy_notifier into ima_namespace
` [PATCH v12 10/26] ima: Switch to lazy lsm policy updates for better performance
` [PATCH v12 11/26] ima: Define mac_admin_ns_capable() as a wrapper for ns_capable()
` [PATCH v12 12/26] ima: Only accept AUDIT rules for non-init_ima_ns namespaces for now
` [PATCH v12 13/26] userns: Add pointer to ima_namespace to user_namespace
` [PATCH v12 14/26] ima: Implement hierarchical processing of file accesses
` [PATCH v12 15/26] ima: Implement ima_free_policy_rules() for freeing of an ima_namespace
` [PATCH v12 16/26] ima: Add functions for creating and "
` [PATCH v12 21/26] ima: Setup securityfs for IMA namespace
` [PATCH v12 23/26] ima: Show owning user namespace's uid and gid when displaying policy
[PATCH -next] ima: Use if/else statement in init_ima()
2022-06-09 13:58 UTC
[PATCH v4 0/3] initramfs: add support for xattrs in the initial ram disk
2022-06-09 11:05 UTC (11+ messages)
[PATCH v2] KEYS: trusted: Fix memory leak in tpm2_key_encode()
2022-06-09 5:28 UTC (5+ messages)
[RFC PATCH v8 00/17] Integrity Policy Enforcement LSM (IPE)
2022-06-08 22:28 UTC (22+ messages)
` [RFC PATCH v8 01/17] security: add ipe lsm & initial context creation
` [RFC PATCH v8 02/17] ipe: add policy parser
` [RFC PATCH v8 03/17] ipe: add evaluation loop
` [RFC PATCH v8 04/17] ipe: add userspace interface
` [RFC PATCH v8 05/17] ipe: add LSM hooks on execution and kernel read
` [RFC PATCH v8 06/17] uapi|audit: add ipe audit message definitions
` [RFC PATCH v8 07/17] ipe: add auditing support
` [RFC PATCH v8 08/17] ipe: add permissive toggle
` [RFC PATCH v8 09/17] ipe: introduce 'boot_verified' as a trust provider
` [RFC PATCH v8 10/17] block|security: add LSM blob to block_device
` [RFC PATCH v8 11/17] dm-verity: consume root hash digest and signature data via LSM hook
` [RFC PATCH v8 12/17] ipe: add support for dm-verity as a trust provider
` [RFC PATCH v8 13/17] fsverity: consume builtin signature via LSM hook
` [RFC PATCH v8 14/17] ipe: enable support for fs-verity as a trust provider
` [RFC PATCH v8 15/17] scripts: add boot policy generation program
` [RFC PATCH v8 16/17] ipe: kunit tests
` [RFC PATCH v8 17/17] documentation: add ipe documentation
Researchers are finding
2022-06-08 20:14 UTC
[GIT PULL] tpmdd updates for v5.19-rc2-v2
2022-06-08 16:27 UTC (2+ messages)
[PATCH v2] KEYS: trusted: Fix memory leak in tpm2_key_encode()
2022-06-08 14:35 UTC
[GIT PULL] tpmdd updates for v5.19-rc2
2022-06-08 11:06 UTC (2+ messages)
Napływ Klientów ze strony
2022-06-08 8:15 UTC
[PATCH] security:trusted_tpm2: Fix memory leak in tpm2_key_encode()
2022-06-08 8:29 UTC (3+ messages)
[PATCH v2] KEYS: trusted: tpm2: Fix migratable logic
2022-06-08 5:47 UTC (3+ messages)
[RFC PATCH] mm: create security context for memfd_secret inodes
2022-06-07 20:10 UTC (6+ messages)
[RESEND PATCH] smack: Replace kzalloc + strncpy with kstrndup
2022-06-07 19:18 UTC (2+ messages)
Sending vendor specific commands to spi-nor flash
2022-06-07 13:50 UTC (2+ messages)
[PATCH] smack: Replace kzalloc + strncpy with kstrndup
2022-06-07 13:47 UTC
[PATCH] security:trusted_tpm2: Fix memory leak in tpm2_key_encode()
2022-06-07 10:09 UTC (3+ messages)
[PATCH -next] evm: Use IS_ENABLED to initialize .enabled
2022-06-07 6:06 UTC (2+ messages)
Linux 5.18-rc4
2022-06-06 21:00 UTC (6+ messages)
[PATCH] Carry forward IMA measurement log on kexec on x86_64
2022-06-06 4:06 UTC (9+ messages)
` [PATCH v2] "
` [PATCH v3] x86/kexec: Carry forward IMA measurement log on kexec
` [PATCH v4] "
[PATCH 1/1] security: avoid a leak in securityfs_remove()
2022-06-02 7:29 UTC
Koszty instalacji fotowoltaicznej
2022-06-01 7:45 UTC
[PATCH v2] cred: Propagate security_prepare_creds() error code
2022-05-28 1:37 UTC (4+ messages)
[PATCH 00/30] security, efi: Add kernel lockdown
2022-05-28 0:11 UTC (4+ messages)
` [PATCH 18/30] acpi: Disable APEI error injection if the kernel is locked down
[PATCH -next] Revert "evm: Fix memleak in init_desc"
2022-05-27 11:17 UTC
Hello Sir, I seek your urgent consideration
2022-05-24 9:25 UTC
[PATCH v5 00/15] Network support for Landlock
2022-05-25 9:41 UTC (40+ messages)
` [PATCH v5 05/15] landlock: landlock_add_rule syscall refactoring
` [PATCH v5 07/15] landlock: add support network rules
` [PATCH v5 08/15] landlock: TCP network hooks implementation
` [PATCH v5 09/15] seltests/landlock: add tests for bind() hooks
` [PATCH v5 11/15] seltests/landlock: connect() with AF_UNSPEC tests
` [PATCH v5 12/15] seltests/landlock: rules overlapping test
` [PATCH v5 15/15] samples/landlock: adds network demo
` [PATCH v5 00/15] Network support for Landlock - UDP discussion
[GIT PULL] SELinux patches for v5.19
2022-05-24 20:26 UTC (2+ messages)
[GIT PULL] Smack patches for v5.19
2022-05-24 20:26 UTC (2+ messages)
[GIT PULL] Landlock changes for v5.19
2022-05-24 20:26 UTC (2+ messages)
[GIT PULL] TPM DEVICE DRIVER updates for v5.19-rc1
2022-05-24 20:26 UTC (2+ messages)
Napływ Klientów ze strony
2022-05-24 8:00 UTC
[PATCH] cred: Propagate security_prepare_creds() error code
2022-05-24 4:44 UTC (3+ messages)
[PATCH v6 0/3] LoadPin: Enable loading from trusted dm-verity devices
2022-05-23 21:14 UTC (4+ messages)
` [PATCH v6 1/3] dm: Add verity helpers for LoadPin
` [PATCH v6 2/3] LoadPin: Enable loading from trusted dm-verity devices
` [PATCH v6 3/3] dm: verity-loadpin: Use CONFIG_SECURITY_LOADPIN_VERITY for conditional compilation
[RFC PATCH 1/2] capability: add capable_or to test for multiple caps with exactly one audit message
2022-05-22 17:33 UTC (5+ messages)
` [PATCH v2 2/8] capability: use new capable_or functionality
` [PATCH v2 8/8] net: "
[PATCH v1 0/5] Support kexec_file on 32-bit RISC-V
2022-05-20 22:42 UTC (7+ messages)
` [PATCH v1 1/5] drivers: of: kexec ima: Support 32-bit platforms
` [PATCH v1 2/5] ima: Fix a build issue on "
` [PATCH v1 3/5] RISC-V: kexec: Use Elf64 on 64-bit targets
` [PATCH v1 4/5] RISC-V: purgatory: Use XLEN-length loads to support rv32
` [PATCH v1 5/5] RISC-V: Allow kexec_file() on 32-bit platforms
[PATCH v10 0/7] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
2022-05-19 23:41 UTC (7+ messages)
[PATCH v5 0/3] LoadPin: Enable loading from trusted dm-verity devices
2022-05-19 18:28 UTC (4+ messages)
` [PATCH v5 1/3] dm: Add verity helpers for LoadPin
[RFC PATCH 0/8] signals: Support more than 64 signals
2022-05-19 12:27 UTC (8+ messages)
[PATCH] apparmor: fix reference count leak in aa_pivotroot()
2022-05-19 8:58 UTC (2+ messages)
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).