linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2022-04-06 02:40:56 to 2022-04-18 02:14:44 UTC [more...]

[PATCH v6 2/4] kexec, KEYS: make the code in bzImage64_verify_sig generic
 2022-04-18  2:14 UTC  (6+ messages)
` [PATCH v6 3/4] arm64: kexec_file: use more system keyrings to verify kernel image signature
` [PATCH v6 4/4] kexec, KEYS, s390: Make use of built-in and secondary keyring for signature verification

[PATCH v7 0/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
 2022-04-17 18:47 UTC  (10+ messages)
` [PATCH v7 1/6] KEYS: trusted: allow use of TEE as backend without TCG_TPM support
` [PATCH v7 2/6] KEYS: trusted: allow use of kernel RNG for key material
` [PATCH v7 3/6] crypto: caam - add in-kernel interface for blob generator
` [PATCH v7 4/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
` [PATCH v7 5/6] doc: trusted-encrypted: describe new CAAM trust source
` [PATCH v7 6/6] MAINTAINERS: add myself as CAAM trusted key maintainer

[PATCH v34 00/29] LSM: Module stacking for AppArmor
 2022-04-15 21:44 UTC  (31+ messages)
  ` [PATCH v34 01/29] integrity: disassociate ima_filter_rule from security_audit_rule
  ` [PATCH v34 02/29] LSM: Infrastructure management of the sock security
  ` [PATCH v34 03/29] LSM: Add the lsmblob data structure
  ` [PATCH v34 04/29] LSM: provide lsm name and id slot mappings
  ` [PATCH v34 05/29] IMA: avoid label collisions with stacked LSMs
  ` [PATCH v34 06/29] LSM: Use lsmblob in security_audit_rule_match
  ` [PATCH v34 07/29] LSM: Use lsmblob in security_kernel_act_as
  ` [PATCH v34 08/29] LSM: Use lsmblob in security_secctx_to_secid
  ` [PATCH v34 09/29] LSM: Use lsmblob in security_secid_to_secctx
  ` [PATCH v34 10/29] LSM: Use lsmblob in security_ipc_getsecid
  ` [PATCH v34 11/29] LSM: Use lsmblob in security_current_getsecid
  ` [PATCH v34 12/29] LSM: Use lsmblob in security_inode_getsecid
  ` [PATCH v34 13/29] LSM: Use lsmblob in security_cred_getsecid
  ` [PATCH v34 14/29] LSM: Specify which LSM to display
  ` [PATCH v34 15/29] LSM: Ensure the correct LSM context releaser
  ` [PATCH v34 16/29] LSM: Use lsmcontext in security_secid_to_secctx
  ` [PATCH v34 17/29] LSM: Use lsmcontext in security_inode_getsecctx
  ` [PATCH v34 18/29] LSM: security_secid_to_secctx in netlink netfilter
  ` [PATCH v34 19/29] NET: Store LSM netlabel data in a lsmblob
  ` [PATCH v34 20/29] binder: Pass LSM identifier for confirmation
  ` [PATCH v34 21/29] LSM: Extend security_secid_to_secctx to include module selection
  ` [PATCH v34 22/29] Audit: Keep multiple LSM data in audit_names
  ` [PATCH v34 23/29] Audit: Create audit_stamp structure
  ` [PATCH v34 24/29] LSM: Add a function to report multiple LSMs
  ` [PATCH v34 25/29] Audit: Allow multiple records in an audit_buffer
  ` [PATCH v34 26/29] Audit: Add record for multiple task security contexts
  ` [PATCH v34 27/29] Audit: Add record for multiple object contexts
  ` [PATCH v34 28/29] LSM: Add /proc attr entry for full LSM context
  ` [PATCH v34 29/29] AppArmor: Remove the exclusive flag

[PATCH v6 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
 2022-04-15 20:07 UTC  (9+ messages)
` [PATCH v6 3/4] crypto: caam - add in-kernel interface for blob generator
  ` [EXT] "
` [PATCH v6 4/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
  ` [EXT] "

[PATCH v3 RESEND] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
 2022-04-15 17:02 UTC  (17+ messages)
` [PATCH v4] "
  ` [PATCH v4 RESEND] "
    ` [PATCH v5] "
      ` [PATCH v6] "
        ` [PATCH v7] "

[PATCH 0/7] Add CA enforcement keyring restrictions
 2022-04-15 16:14 UTC  (27+ messages)
` [PATCH 1/7] KEYS: Create static version of public_key_verify_signature
` [PATCH 2/7] KEYS: X.509: Parse Basic Constraints for CA
` [PATCH 3/7] KEYS: X.509: Parse Key Usage
` [PATCH 4/7] KEYS: Introduce a builtin root of trust key flag
` [PATCH 5/7] KEYS: Introduce sig restriction that validates root of trust
` [PATCH 6/7] KEYS: X.509: Flag Intermediate CA certs as built in
` [PATCH 7/7] integrity: Use root of trust signature restriction

How to list keys used for kexec
 2022-04-14 17:59 UTC 

[PATCH v2] keys: remove __user annotation from function prototype
 2022-04-14 12:05 UTC  (2+ messages)

[PATCH] ima: simplify if-if to if-else
 2022-04-14  7:11 UTC 

[PATCH v10 0/4] Allow guest access to EFI confidential computing secret area
 2022-04-13 16:48 UTC  (6+ messages)
` [PATCH v10 1/4] efi: Save location of EFI confidential computing area
` [PATCH v10 2/4] virt: Add efi_secret module to expose confidential computing secrets
` [PATCH v10 3/4] efi: Register efi_secret platform device if EFI secret area is declared
` [PATCH v10 4/4] docs: security: Add secrets/coco documentation

Wycena paneli fotowoltaicznych
 2022-04-13  7:40 UTC 

[PATCH] security: don't treat structure as an array of struct hlist_head
 2022-04-12 17:26 UTC  (2+ messages)

[RFC PATCH v4 00/15] Landlock LSM
 2022-04-12 16:10 UTC  (31+ messages)
` [RFC PATCH v4 03/15] landlock: landlock_find/insert_rule refactoring
              ` [RFC PATCH v4 03/15] landlock: landlock_find/insert_rule refactoring (TCP port 0)
` [RFC PATCH v4 06/15] landlock: landlock_add_rule syscall refactoring
` [RFC PATCH v4 07/15] landlock: user space API network support
` [RFC PATCH v4 08/15] landlock: add support network rules
` [RFC PATCH v4 09/15] landlock: TCP network hooks implementation
` [RFC PATCH v4 10/15] seltest/landlock: add tests for bind() hooks

[PATCH v8 0/4] Allow guest access to EFI confidential computing secret area
 2022-04-12 13:18 UTC  (8+ messages)
` [PATCH v8 3/4] efi: Load efi_secret module if EFI secret area is populated

[PATCH v9 0/4] Allow guest access to EFI confidential computing secret area
 2022-04-12 11:18 UTC  (8+ messages)
` [PATCH v9 2/4] virt: Add efi_secret module to expose confidential computing secrets
` [PATCH v9 3/4] efi: Register efi_secret platform device if EFI secret area is declared

[PATCH v10 0/8] Enroll kernel keys thru MOK
 2022-04-11 21:35 UTC  (7+ messages)
` [PATCH v10 8/8] integrity: Only use machine keyring when uefi_check_trust_mok_keys is true

[PATCH v2 00/12] Landlock: file linking and renaming support
 2022-04-08 17:13 UTC  (7+ messages)
` [PATCH v2 06/12] LSM: Remove double path_rename hook calls for RENAME_EXCHANGE
` [PATCH v2 07/12] landlock: Add support for file reparenting with LANDLOCK_ACCESS_FS_REFER

[PATCH 1/4] Fix arm64 kexec forbidding kernels signed with keys in the secondary keyring to boot
 2022-04-08  7:11 UTC  (7+ messages)
` [PATCH 2/4] kexec, KEYS, arm64: Make use of platform keyring for signature verification
` [PATCH 3/4] kexec, KEYS, s390: Make use of built-in and secondary "

[PATCH v34 00/29] LSM: Module stacking for AppArmor
 2022-04-08  5:46 UTC  (33+ messages)
  ` [PATCH v34 01/29] integrity: disassociate ima_filter_rule from security_audit_rule
  ` [PATCH v34 02/29] LSM: Infrastructure management of the sock security
  ` [PATCH v34 03/29] LSM: Add the lsmblob data structure
  ` [PATCH v34 04/29] LSM: provide lsm name and id slot mappings
  ` [PATCH v34 05/29] IMA: avoid label collisions with stacked LSMs
  ` [PATCH v34 06/29] LSM: Use lsmblob in security_audit_rule_match
  ` [PATCH v34 07/29] LSM: Use lsmblob in security_kernel_act_as
  ` [PATCH v34 08/29] LSM: Use lsmblob in security_secctx_to_secid
  ` [PATCH v34 09/29] LSM: Use lsmblob in security_secid_to_secctx
  ` [PATCH v34 10/29] LSM: Use lsmblob in security_ipc_getsecid
  ` [PATCH v34 11/29] LSM: Use lsmblob in security_current_getsecid
  ` [PATCH v34 12/29] LSM: Use lsmblob in security_inode_getsecid
  ` [PATCH v34 13/29] LSM: Use lsmblob in security_cred_getsecid
  ` [PATCH v34 14/29] LSM: Specify which LSM to display
  ` [PATCH v34 15/29] LSM: Ensure the correct LSM context releaser
  ` [PATCH v34 16/29] LSM: Use lsmcontext in security_secid_to_secctx
  ` [PATCH v34 17/29] LSM: Use lsmcontext in security_inode_getsecctx
  ` [PATCH v34 18/29] LSM: security_secid_to_secctx in netlink netfilter
  ` [PATCH v34 19/29] NET: Store LSM netlabel data in a lsmblob
  ` [PATCH v34 20/29] binder: Pass LSM identifier for confirmation
  ` [PATCH v34 21/29] LSM: Extend security_secid_to_secctx to include module selection
  ` [PATCH v34 22/29] Audit: Keep multiple LSM data in audit_names
  ` [PATCH v34 23/29] Audit: Create audit_stamp structure
  ` [PATCH v34 24/29] LSM: Add a function to report multiple LSMs
  ` [PATCH v34 25/29] Audit: Allow multiple records in an audit_buffer
  ` [PATCH v34 26/29] Audit: Add record for multiple task security contexts
  ` [PATCH v34 27/29] Audit: Add record for multiple object contexts
  ` [PATCH v34 28/29] LSM: Add /proc attr entry for full LSM context
  ` [PATCH v34 29/29] AppArmor: Remove the exclusive flag

[PATCH v3 0/1] ima: fix boot command line issue
 2022-04-08  1:12 UTC  (5+ messages)
` [PATCH v3 1/1] ima: remove the IMA_TEMPLATE Kconfig option

[PATCH v2] ima: remove the IMA_TEMPLATE Kconfig option
 2022-04-07  2:18 UTC  (3+ messages)

[PATCH net] sctp: use the correct skb for security_sctp_assoc_request
 2022-04-06 15:11 UTC  (6+ messages)

[PATCH] ima: remove template "ima" as the compiled default
 2022-04-06  1:48 UTC  (3+ messages)

[PATCH 00/18] bpf: Secure and authenticated preloading of eBPF programs
 2022-04-06  6:55 UTC  (4+ messages)
` [POC][USER SPACE][PATCH] Introduce LSM to protect pinned objects

[PATCH v2 0/1] ima: fix boot command line issue
 2022-04-06  6:37 UTC  (2+ messages)
` [PATCH v2 1/1] ima: remove the IMA_TEMPLATE Kconfig option

[PATCH v2] ima: remove the IMA_TEMPLATE Kconfig option
 2022-04-06  3:32 UTC 

[GIT PULL] Add trusted_for(2) (was O_MAYEXEC)
 2022-04-05 22:21 UTC  (12+ messages)

[PATCH 00/18] bpf: Secure and authenticated preloading of eBPF programs
 2022-04-05 16:37 UTC  (11+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).