May 2022 Archives by thread
Starting: Sun May 1 06:21:54 UTC 2022
Ending: Tue May 31 19:26:21 UTC 2022
Messages: 505
- [PATCH v2 2/3] LoadPin: Enable loading from trusted dm-verity devices
Kees Cook
- [PATCH] security: declare member holding string literal const
Christian Göttsche
- [PATCH v2] selinux: log anon inode class name
Christian Göttsche
- [RFC PATCH] mm: create security context for memfd_secret inodes
Christian Göttsche
- [PATCH v2 2/8] capability: use new capable_or functionality
Christian Göttsche
- [PATCH v2] Carry forward IMA measurement log on kexec on x86_64
Jonathan McDowell
- [RFC PATCH] getting misc stats/attributes via xattr API
Miklos Szeredi
- 2nd Quater puchase request
ASDA Stores Limited
- [PATCH v8 3/6] crypto: caam - add in-kernel interface for blob generator
Michael Walle
- [PATCH] fsnotify: add generic perm check for unlink/rmdir
Guowei Du
- [PATCH 00/32] Introduce flexible array struct memcpy() helpers
Kees Cook
- [EXT] [PATCH v7 0/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Jarkko Sakkinen
- [PATCH v8 5/6] doc: trusted-encrypted: describe new CAAM trust source
Jarkko Sakkinen
- [PATCH v8 6/6] MAINTAINERS: add myself as CAAM trusted key maintainer
Jarkko Sakkinen
- [PATCH v3 0/3] LoadPin: Enable loading from trusted dm-verity devices
Matthias Kaehlcke
- [PATCH 00/10] Encrypted Hibernation
Evan Green
- [PATCH 03/10] security: keys: trusted: Parse out individual components of the key blob
Evan Green
- [PATCH 04/10] security: keys: trusted: Allow storage of PCR values in creation data
Evan Green
- [PATCH 05/10] security: keys: trusted: Verify creation data
Evan Green
- No subject
Info
- [PATCH v3 1/1] ima: remove the IMA_TEMPLATE Kconfig option
Guozihua (Scott)
- [PATCH 0/3] Append line feed to files in securityfs
Wang Weiyang
- [PATCH 1/3] securityfs: Append line feed to /sys/kernel/security/lsm
Wang Weiyang
- [PATCH v8 0/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
John Ernberg
- [PATCH v9 0/7] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Ahmad Fatoum
- [PATCH v9 1/7] KEYS: trusted: allow use of TEE as backend without TCG_TPM support
Ahmad Fatoum
- [PATCH v9 4/7] crypto: caam - add in-kernel interface for blob generator
Ahmad Fatoum
- [PATCH v9 7/7] MAINTAINERS: add KEYS-TRUSTED-CAAM
Ahmad Fatoum
- Napływ Klientów ze strony
Mikołaj Rudzik
- [PATCH v1 0/7] Landlock: Clean up coding style with clang-format
Mickaël Salaün
- [PATCH v2 00/10] Minor Landlock fixes and new tests
Mickaël Salaün
- [PATCH v3 00/12] Landlock: file linking and renaming support
Mickaël Salaün
- [PATCH v3 02/12] landlock: Reduce the maximum number of layers to 16
Mickaël Salaün
- Fwd: My name is Warren Buffett, an American businessman.
Warren Buffett
- [PATCH] big_keys: Use struct for internal payload
Kees Cook
- [PATCH v12 01/26] securityfs: rework dentry creation
Serge E. Hallyn
- [PATCH v2] big_keys: Use struct for internal payload
Kees Cook
- Have you had this? It is for your Benefit
Private Mail
- [PATCH v3] x86/kexec: Carry forward IMA measurement log on kexec
Jonathan McDowell
- [PATCH v7 2/4] kexec, KEYS: make the code in bzImage64_verify_sig generic
Coiby Xu
- [PATCH v7 3/4] arm64: kexec_file: use more system keyrings to verify kernel image signature
Coiby Xu
- [PATCH v7 4/4] kexec, KEYS, s390: Make use of built-in and secondary keyring for signature verification
Coiby Xu
- Awaiting your response
waterproject at pekanbaru.go.id
- [PATCH] loadpin: stop using bdevname
Christoph Hellwig
- [PATCH v8 2/4] kexec, KEYS: make the code in bzImage64_verify_sig generic
Coiby Xu
- [PATCH v8 3/4] arm64: kexec_file: use more system keyrings to verify kernel image signature
Coiby Xu
- [PATCH v8 4/4] kexec, KEYS, s390: Make use of built-in and secondary keyring for signature verification
Coiby Xu
- [PATCH -next] apparmor: Fix aa_str_perms() kernel-doc comment
Yang Li
- [PATCH v1] landlock: Explain how to support Landlock
Mickaël Salaün
- [PATCH v2] landlock: Explain how to support Landlock
Mickaël Salaün
- [PATCH v10 0/7] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Ahmad Fatoum
- [PATCH v7] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
Mimi Zohar
- [RFC PATCH v4 10/15] seltest/landlock: add tests for bind() hooks
Mickaël Salaün
- [PATCH v5 00/15] Network support for Landlock
Konstantin Meskhidze
- [PATCH] commoncap: check return value to avoid null pointer dereference
Yongzhi Liu
- [PATCH v4 0/3] LoadPin: Enable loading from trusted dm-verity devices
Matthias Kaehlcke
- [PATCH] security: keys: add __randomize_layout to keyring_search_context
GONG, Ruiqi
- [ANNOUNCE][CFP] Linux Security Summit Europe 2022
Reshetova, Elena
- [GIT PULL] SELinux fixes for v5.18 (#1)
Paul Moore
- Ree
J Wu
- engage
Tony Wen
- [PATCH v5 0/3] LoadPin: Enable loading from trusted dm-verity devices
Matthias Kaehlcke
- [PATCH] apparmor: fix reference count leak in aa_pivotroot()
John Johansen
- [RFC PATCH 0/8] signals: Support more than 64 signals
Pavel Machek
- [PATCH v1 0/5] Support kexec_file on 32-bit RISC-V
Palmer Dabbelt
- [PATCH] cred: Propagate security_prepare_creds() error code
Frederick Lawler
- [PATCH v12 02/26] securityfs: Extend securityfs with namespacing support
Serge E. Hallyn
- [PATCH v12 03/26] ima: Define ima_namespace struct and start moving variables into it
Serge E. Hallyn
- [PATCH v12 04/26] ima: Move arch_policy_entry into ima_namespace
Serge E. Hallyn
- [PATCH v12 05/26] ima: Move ima_htable into ima_namespace
Serge E. Hallyn
- [PATCH v12 06/26] ima: Move measurement list related variables into ima_namespace
Serge E. Hallyn
- [PATCH v12 07/26] ima: Move some IMA policy and filesystem related variables into ima_namespace
Serge E. Hallyn
- [PATCH v12 08/26] ima: Move IMA securityfs files into ima_namespace or onto stack
Serge E. Hallyn
- [PATCH v12 09/26] ima: Move ima_lsm_policy_notifier into ima_namespace
Serge E. Hallyn
- [PATCH v12 10/26] ima: Switch to lazy lsm policy updates for better performance
Serge E. Hallyn
- [PATCH v12 11/26] ima: Define mac_admin_ns_capable() as a wrapper for ns_capable()
Serge E. Hallyn
- [PATCH v12 12/26] ima: Only accept AUDIT rules for non-init_ima_ns namespaces for now
Serge E. Hallyn
- [PATCH v12 23/26] ima: Show owning user namespace's uid and gid when displaying policy
Serge E. Hallyn
- [PATCH v12 13/26] userns: Add pointer to ima_namespace to user_namespace
Serge E. Hallyn
- [PATCH v12 14/26] ima: Implement hierarchical processing of file accesses
Serge E. Hallyn
- [PATCH v12 15/26] ima: Implement ima_free_policy_rules() for freeing of an ima_namespace
Serge E. Hallyn
- Sending vendor specific commands to spi-nor flash
Michael Walle
- [GIT PULL] SELinux patches for v5.19
Paul Moore
- [GIT PULL] Landlock changes for v5.19
Mickaël Salaün
- [GIT PULL] TPM DEVICE DRIVER updates for v5.19-rc1
Jarkko Sakkinen
- [GIT PULL] Smack patches for v5.19
Casey Schaufler
- [PATCH v6 0/3] LoadPin: Enable loading from trusted dm-verity devices
Matthias Kaehlcke
- Hello Sir, I seek your urgent consideration.
amjad.ali at box.indicandustries.com
- [PATCH v2] cred: Propagate security_prepare_creds() error code
Frederick Lawler
- Bitte kontaktaufnahme Erforderlich !!! Please Contact Required !!!
Deterin Falcao
- Greetings From Ukraine.
Kostiantyn Chichkov
- [PATCH -next] Revert "evm: Fix memleak in init_desc"
Xiu Jianfeng
- [PATCH 18/30] acpi: Disable APEI error injection if the kernel is locked down
joeyli
- [PATCH v12 16/26] ima: Add functions for creating and freeing of an ima_namespace
Serge E. Hallyn
- [PATCH v12 21/26] ima: Setup securityfs for IMA namespace
Serge E. Hallyn
Last message date:
Tue May 31 19:26:21 UTC 2022
Archived on: Fri Oct 7 01:41:33 UTC 2022
This archive was generated by
Pipermail 0.09 (Mailman edition).