linux-integrity.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2021-11-24 14:13:47 to 2021-12-02 20:04:07 UTC [more...]

[RFC 00/20] ima: Namespace IMA with audit support in IMA-ns
 2021-12-02 20:03 UTC  (54+ messages)
` [RFC 01/20] ima: Add IMA namespace support
` [RFC 02/20] ima: Define ns_status for storing namespaced iint data
` [RFC 03/20] ima: Namespace audit status flags
` [RFC 04/20] ima: Move delayed work queue and variables into ima_namespace
` [RFC 05/20] ima: Move IMA's keys queue related "
` [RFC 06/20] ima: Move policy "
` [RFC 07/20] ima: Move ima_htable "
` [RFC 08/20] ima: Move measurement list related variables "
` [RFC 09/20] ima: Only accept AUDIT rules for IMA non-init_ima_ns namespaces for now
` [RFC 10/20] ima: Implement hierarchical processing of file accesses
` [RFC 11/20] securityfs: Prefix global variables with securityfs_
` [RFC 12/20] securityfs: Pass static variables as parameters from top level functions
` [RFC 13/20] securityfs: Build securityfs_ns for namespacing support
` [RFC 14/20] ima: Move some IMA policy and filesystem related variables into ima_namespace
` [RFC 15/20] capabilities: Introduce CAP_INTEGRITY_ADMIN
` [RFC 16/20] ima: Use ns_capable() for namespace policy access
` [RFC 17/20] ima: Use integrity_admin_ns_capable() to check corresponding capability
` [RFC 18/20] userns: Introduce a refcount variable for calling early teardown function
` [RFC 19/20] ima/userns: Define early teardown function for IMA namespace
` [RFC 20/20] ima: Setup securityfs_ns "

[PATCH v4 00/14] x86: Trenchboot secure dynamic launch Linux kernel support
 2021-12-02 17:26 UTC  (5+ messages)
` [PATCH v4 04/14] Documentation/x86: Secure Launch kernel documentation

[PATCH 0/4] ima: support fs-verity signatures stored as
 2021-12-02 16:25 UTC  (21+ messages)
` [PATCH 1/4] fs-verity: define a function to return the integrity protected file digest
` [PATCH 2/4] ima: define a new signature type named IMA_VERITY_DIGSIG
` [PATCH 3/4] ima: limit including fs-verity's file digest in measurement list
` [PATCH 4/4] ima: support fs-verity file digest based signatures

[RFC PATCH v7 11/16] ipe: add support for dm-verity as a trust provider
 2021-12-02  9:29 UTC  (8+ messages)
      ` [RFC][PATCH] device mapper: Add builtin function dm_get_status()

[PATCH v17 0/3] Add trusted_for(2) (was O_MAYEXEC)
 2021-12-01 16:40 UTC  (6+ messages)

[PATCH v4 0/2] selftests: tpm2: Determine available PCR bank
 2021-12-01 14:52 UTC  (9+ messages)
` [PATCH v4 1/2] "
` [PATCH v4 2/2] selftests: tpm2: Reset the dictionary attack lock

[PATCH v8 00/17] Enroll kernel keys thru MOK
 2021-12-01 13:46 UTC  (18+ messages)
` [PATCH v8 03/17] integrity: Introduce a Linux keyring called machine
` [PATCH v8 04/17] integrity: Do not allow machine keyring updates following init
` [PATCH v8 05/17] X.509: Parse Basic Constraints for CA
` [PATCH v8 06/17] KEYS: CA link restriction
` [PATCH v8 08/17] integrity: add new keyring handler for mok keys
` [PATCH v8 09/17] KEYS: Rename get_builtin_and_secondary_restriction

[RFC v2 0/3] Namespace IMA log entries
 2021-12-01 13:20 UTC  (4+ messages)
` [RFC v2 1/3] userns: add ima_ns_info field containing a settable namespace label
` [RFC v2 2/3] ima: show the namespace label in the ima-ns template
` [RFC v2 3/3] ima: make the integrity inode cache per namespace

[PATCH v2 0/6] KEXEC_SIG with appended signature
 2021-12-01 11:48 UTC  (10+ messages)
` [PATCH v2 1/6] s390/kexec_file: Don't opencode appended signature check
` [PATCH v2 2/6] powerpc/kexec_file: Add KEXEC_SIG support
` [PATCH v2 3/6] kexec_file: Don't opencode appended signature verification
` [PATCH v2 4/6] module: strip the signature marker in the verification function
` [PATCH v2 5/6] module: Use key_being_used_for for log messages in verify_appended_signature
` [PATCH v2 6/6] module: Move duplicate mod_check_sig users code to mod_parse_sig

[PATCH v4] KEYS: trusted: Fix trusted key backends when building as module
 2021-12-01 10:47 UTC  (3+ messages)

[PATCH] char: tpm: cr50: Set TPM_FIRMWARE_POWER_MANAGED based on device property
 2021-12-01  6:35 UTC  (2+ messages)

[RFC 0/3] Namespace IMA
 2021-11-30 13:44 UTC  (46+ messages)
` [RFC 1/3] userns: add uuid field
` [RFC 2/3] ima: Namespace IMA
` [RFC 3/3] ima: make the integrity inode cache per namespace

[PATCH v3 0/3] selftests: tpm2: Probe for available PCR bank
 2021-11-29 23:37 UTC  (7+ messages)
` [PATCH v3 1/3] "
` [PATCH v3 2/3] selftests: tpm2: Reset the dictionary attack lock
` [PATCH v3 3/3] selftests: tpm2: Add support for SHA-384 and SHA-512

[PATCH] tpm: make const pointer desc a static const array
 2021-11-29 20:09 UTC  (2+ messages)

[PATCH] fix iint inode add race resulting in duplication of iint entries
 2021-11-29 13:34 UTC 

[PATCH v3 0/2] use SM3 instead of SM3_256
 2021-11-29 13:01 UTC  (3+ messages)

ima-evm-utils: version 1.4 released
 2021-11-29 11:55 UTC  (9+ messages)

[PATCH v2 0/3] selftests: tpm2: Probe for available PCR bank
 2021-11-27  0:18 UTC  (7+ messages)
` [PATCH v2 1/3] "
` [PATCH v2 2/3] selftests: tpm2: Reset the dictionary attack lock
` [PATCH v2 3/3] selftests: tpm2: Add support for SHA-384 and SHA-512

[PATCH] ima: Fix trivial typos in the comments
 2021-11-24 21:44 UTC 

[PATCH v5 0/2] integrity: support including firmware ".platform" keys at build time
 2021-11-24 20:47 UTC  (3+ messages)
` [PATCH v5 1/2] certs: export load_certificate_list() to be used outside certs/
` [PATCH v5 2/2] integrity: support including firmware ".platform" keys at build time

[PATCH] security:trusted_tpm2: Fix memory leak in tpm2_key_encode()
 2021-11-24 16:43 UTC 


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).