Ben Cotton wrote: > ** Maintain the following patch sets for the Linux kernel, and > possibly have them accepted in the upstream kernel: > *** > [//lore.kernel.org/linux-integrity/20210409114313.4073-1- roberto.sassu@xxxxxxxxxx/ > IMA execution policies] *** > [//lore.kernel.org/linux-integrity/20210914163401.864635-1- roberto.sassu@xxxxxxxxxx/ > DIGLIM basic features] *** > [//lore.kernel.org/linux-integrity/20210915163145.1046505-1- roberto.sassu@xxxxxxxxxx/ > DIGLIM advanced features] *** > [//lore.kernel.org/linux-integrity/20210930115533.878169-1- roberto.sassu@xxxxxxxxxx/ > DIGLIM integration with IMA] *** > [//lore.kernel.org/linux-integrity/20181112102423.30415-1- roberto.sassu@xxxxxxxxxx/ > PGP keys and signatures] Can we trust the security code submitted by a Huawei employee to not contain hidden government-developed backdoors? (Basically the same question as for the existing NSA SELinux code…) Kevin Kofler _______________________________________________ devel mailing list -- devel@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe send an email to devel-leave@xxxxxxxxxxxxxxxxxxxxxxx Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/devel@xxxxxxxxxxxxxxxxxxxxxxx Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure