linux-integrity.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2022-02-10 12:02:50 to 2022-02-25 12:43:37 UTC [more...]

[PATCH v5 0/5] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
 2022-02-25 12:43 UTC  (13+ messages)
` [PATCH v5 1/5] KEYS: trusted: allow use of TEE as backend without TCG_TPM support
` [PATCH v5 2/5] KEYS: trusted: allow users to use kernel RNG for key material
` [PATCH v5 3/5] KEYS: trusted: allow trust sources "
    ` [EXT] "
` [PATCH v5 4/5] crypto: caam - add in-kernel interface for blob generator
      ` [EXT] "
` [PATCH v5 5/5] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
  ` [EXT] "

[PATCH v2 0/6] bpf-lsm: Extend interoperability with IMA
 2022-02-25  8:41 UTC  (17+ messages)
` [PATCH v2 1/6] ima: Fix documentation-related warnings in ima_main.c
` [PATCH v2 2/6] ima: Always return a file measurement in ima_file_hash()
` [PATCH v2 3/6] bpf-lsm: Introduce new helper bpf_ima_file_hash()
` [PATCH v2 4/6] selftests/bpf: Add test for bpf_ima_file_hash()
` [PATCH v2 5/6] bpf-lsm: Make bpf_lsm_kernel_read_file() as sleepable
` [PATCH v2 6/6] selftests/bpf: Add test for bpf_lsm_kernel_read_file()

Wycena paneli fotowoltaicznych
 2022-02-25  7:45 UTC 

[PATCH 2/2] integrity: double check iint_cache was initialized
 2022-02-24 18:51 UTC  (5+ messages)

[PATCH v5 0/8] ima: support fs-verity digests and signatures
 2022-02-24 18:46 UTC  (23+ messages)
` [PATCH v5 1/8] ima: rename IMA_ACTION_FLAGS to IMA_NONACTION_FLAGS
` [PATCH v5 2/8] ima: define ima_max_digest_data struct without a flexible array variable
` [PATCH v5 3/8] fs-verity: define a function to return the integrity protected file digest
` [PATCH v5 4/8] ima: define a new template field 'd-type' and a new template 'ima-ngv2'
` [PATCH v5 5/8] ima: permit fsverity's file digests in the IMA measurement list
` [PATCH v5 6/8] ima: define signature version 3
` [PATCH v5 7/8] ima: support fs-verity file digest based version 3 signatures
` [PATCH v5 8/8] fsverity: update the documentation

[PATCH v10 00/27] ima: Namespace IMA with audit support in IMA-ns
 2022-02-24  2:49 UTC  (72+ messages)
` [PATCH v10 01/27] ima: Remove ima_policy file before directory
` [PATCH v10 03/27] ima: Return error code obtained from securityfs functions
` [PATCH v10 04/27] securityfs: rework dentry creation
` [PATCH v10 05/27] ima: Define ima_namespace struct and start moving variables into it
` [PATCH v10 06/27] ima: Move arch_policy_entry into ima_namespace
` [PATCH v10 07/27] ima: Move ima_htable "
` [PATCH v10 08/27] ima: Move measurement list related variables "
` [PATCH v10 09/27] ima: Move some IMA policy and filesystem "
` [PATCH v10 10/27] ima: Move IMA securityfs files into ima_namespace or onto stack
` [PATCH v10 11/27] ima: Move ima_lsm_policy_notifier into ima_namespace
` [PATCH v10 12/27] ima: Define mac_admin_ns_capable() as a wrapper for ns_capable()
` [PATCH v10 13/27] ima: Only accept AUDIT rules for non-init_ima_ns namespaces for now
` [PATCH v10 14/27] userns: Add pointer to ima_namespace to user_namespace
` [PATCH v10 15/27] ima: Implement hierarchical processing of file accesses
` [PATCH v10 16/27] ima: Implement ima_free_policy_rules() for freeing of an ima_namespace
` [PATCH v10 17/27] ima: Add functions for creating and "
` [PATCH v10 18/27] integrity/ima: Define ns_status for storing namespaced iint data
` [PATCH v10 22/27] securityfs: Extend securityfs with namespacing support
` [PATCH v10 23/27] ima: Setup securityfs for IMA namespace
` [PATCH v10 24/27] ima: Introduce securityfs file to activate an "
` [PATCH v10 25/27] ima: Show owning user namespace's uid and gid when displaying policy
` [PATCH v10 26/27] ima: Limit number of policy rules in non-init_ima_ns
` [PATCH v10 27/27] ima: Enable IMA namespaces

[PATCH v4] syscalls/keyctl09: test encrypted keys with provided decrypted data
 2022-02-23 20:07 UTC 

[PATCH] MAINTAINERS: add missing security/integrity/platform_certs
 2022-02-23 19:32 UTC 

[PATCH v5 00/12] x86: Trenchboot secure dynamic launch Linux kernel support
 2022-02-23 17:45 UTC  (14+ messages)
` [PATCH v5 01/12] x86/boot: Place kernel_info at a fixed offset
` [PATCH v5 02/12] Documentation/x86: Secure Launch kernel documentation
` [PATCH v5 03/12] x86: Secure Launch Kconfig
` [PATCH v5 04/12] x86: Secure Launch main header file
` [PATCH v5 05/12] x86: Add early SHA support for Secure Launch early measurements
` [PATCH v5 06/12] x86: Secure Launch kernel early boot stub
` [PATCH v5 07/12] x86: Secure Launch kernel late "
` [PATCH v5 08/12] x86: Secure Launch SMP bringup support
` [PATCH v5 09/12] kexec: Secure Launch kexec SEXIT support
` [PATCH v5 10/12] reboot: Secure Launch SEXIT support on reboot paths
` [PATCH v5 11/12] x86: Secure Launch late initcall platform module
` [PATCH v5 12/12] tpm: Allow locality 2 to be set when initializing the TPM for Secure Launch

Unintended file entry addition in commit 7ed88a03b15b ("certs: Check that builtin blacklist hashes are valid")?
 2022-02-23 15:49 UTC  (2+ messages)

[PATCH v3] syscalls/keyctl09: test encrypted keys with provided decrypted data
 2022-02-23 14:42 UTC  (2+ messages)
` [LTP] "

[PATCH] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
 2022-02-23 13:49 UTC  (21+ messages)
    ` [PATCH v2] "
      ` [PATCH v3] "

Napływ Klientów ze strony
 2022-02-23  8:40 UTC 

[PATCH] EVM: fix the evm= __setup handler return value
 2022-02-23  1:51 UTC  (2+ messages)
` [EXTERNAL] "

[PATCH v32 05/28] IMA: avoid label collisions with stacked LSMs
 2022-02-22 23:20 UTC 

[PATCH v4 0/5] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
 2022-02-22 11:24 UTC  (7+ messages)
` [PATCH v4 5/5] "
        ` [EXT] "

init_ima() adds 8 % to boot time
 2022-02-22  6:25 UTC  (6+ messages)

Solicitud de socio
 2022-02-21 21:27 UTC 

[PATCH v5] KEYS: encrypted: Instantiate key with user-provided decrypted data
 2022-02-21 20:19 UTC  (4+ messages)

[PATCH 0/2] Fix bugs in public_key_verify_signature()
 2022-02-21 20:17 UTC  (11+ messages)
` [PATCH 1/2] KEYS: asymmetric: enforce that sig algo matches key algo
` [PATCH 2/2] KEYS: asymmetric: properly validate hash_algo and encoding
` [PATCH] KEYS: asymmetric: enforce SM2 signature use pkey algo

[PATCH v8 0/3] integrity: support including firmware ".platform" keys at build time
 2022-02-21 13:33 UTC  (3+ messages)

[RFC PATCH] KEYS: Double max_size to make keyctl pkey_verify work
 2022-02-21  2:43 UTC  (7+ messages)

[PATCH] KEYS: trusted: Avoid calling null function trusted_key_exit
 2022-02-21  1:57 UTC  (4+ messages)

[PATCH v8 00/17] Enroll kernel keys thru MOK
 2022-02-20 23:23 UTC  (18+ messages)
` [PATCH v8 07/17] integrity: restrict INTEGRITY_KEYRING_MACHINE to restrict_link_by_ca
` [PATCH v8 10/17] KEYS: add a reference to machine keyring
` [PATCH v8 11/17] KEYS: Introduce link restriction for machine keys
` [PATCH v8 13/17] integrity: store reference to machine keyring
` [PATCH v8 14/17] KEYS: link machine trusted keys to secondary_trusted_keys
` [PATCH v8 15/17] efi/mokvar: move up init order
` [PATCH v8 16/17] integrity: Trust MOK keys if MokListTrustedRT found
` [PATCH v8 17/17] integrity: Only use machine keyring when uefi_check_trust_mok_keys is true

[PATCH] KEYS: trusted: fix crash when TPM/TEE are built as module
 2022-02-20 23:10 UTC  (4+ messages)

[PATCH v8 0/5] Enable root to update the blacklist keyring
 2022-02-19 11:42 UTC  (10+ messages)

[PATCH 0/5] spi: make remove callback a void function
 2022-02-18 12:37 UTC  (2+ messages)
  ` [PATCH 5/5] "

[PATCH v4 00/14] x86: Trenchboot secure dynamic launch Linux kernel support
 2022-02-15 15:50 UTC  (6+ messages)

[PATCH] ima: Calculate digest in ima_inode_hash() if not available
 2022-02-15 11:16 UTC  (9+ messages)

[PATCH 1/1] ci: Remove CentOS 8
 2022-02-15  7:49 UTC 

[PATCH v5 0/6] KEXEC_SIG with appended signature
 2022-02-14 17:09 UTC  (15+ messages)
` [PATCH v5 2/6] powerpc/kexec_file: Add KEXEC_SIG support

[PATCH v4 0/8] ima: support fs-verity digests and signatures
 2022-02-11  0:20 UTC  (3+ messages)
` [PATCH v4 7/8] ima: support fs-verity file digest based version 3 signatures


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).