April 2022 Archives by subject
Starting: Fri Apr 1 05:15:03 UTC 2022
Ending: Fri Apr 29 21:30:10 UTC 2022
Messages: 439
- [EXT] [PATCH v6 3/4] crypto: caam - add in-kernel interface for blob generator
Ahmad Fatoum
- [EXT] [PATCH v6 4/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Ahmad Fatoum
- [EXT] [PATCH v7 0/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Pankaj Gupta
- [EXT] [PATCH v7 0/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Ahmad Fatoum
- [GIT PULL] Add trusted_for(2) (was O_MAYEXEC)
Kees Cook
- [GIT PULL] Add trusted_for(2) (was O_MAYEXEC)
Linus Torvalds
- [GIT PULL] Add trusted_for(2) (was O_MAYEXEC)
Mickaël Salaün
- [GIT PULL] Add trusted_for(2) (was O_MAYEXEC)
Linus Torvalds
- [GIT PULL] Add trusted_for(2) (was O_MAYEXEC)
Linus Torvalds
- [GIT PULL] Add trusted_for(2) (was O_MAYEXEC)
Kees Cook
- [GIT PULL] Add trusted_for(2) (was O_MAYEXEC)
Linus Torvalds
- [GIT PULL] Add trusted_for(2) (was O_MAYEXEC)
Theodore Ts'o
- [GIT PULL] Add trusted_for(2) (was O_MAYEXEC)
Mickaël Salaün
- [GIT PULL] Add trusted_for(2) (was O_MAYEXEC)
Mickaël Salaün
- [GIT PULL] Add trusted_for(2) (was O_MAYEXEC)
Mickaël Salaün
- [GIT PULL] Add trusted_for(2) (was O_MAYEXEC)
Mickaël Salaün
- [GIT PULL] Add trusted_for(2) (was O_MAYEXEC)
Linus Torvalds
- [GIT PULL] Add trusted_for(2) (was O_MAYEXEC)
Theodore Ts'o
- [PATCH 0/3] LoadPin: Enable loading from trusted dm-verity devices
Matthias Kaehlcke
- [PATCH 0/3] LoadPin: Enable loading from trusted dm-verity devices
Kees Cook
- [PATCH 0/3] LoadPin: Enable loading from trusted dm-verity devices
Matthias Kaehlcke
- [PATCH 0/3] LoadPin: Enable loading from trusted dm-verity devices
Kees Cook
- [PATCH 0/7] Add CA enforcement keyring restrictions
Eric Snowberg
- [PATCH 0/7] Add CA enforcement keyring restrictions
Mimi Zohar
- [PATCH 0/7] Add CA enforcement keyring restrictions
Eric Snowberg
- [PATCH 0/7] Add CA enforcement keyring restrictions
Mimi Zohar
- [PATCH 00/18] bpf: Secure and authenticated preloading of eBPF programs
Alexei Starovoitov
- [PATCH 00/18] bpf: Secure and authenticated preloading of eBPF programs
KP Singh
- [PATCH 00/18] bpf: Secure and authenticated preloading of eBPF programs
Djalal Harouni
- [PATCH 00/18] bpf: Secure and authenticated preloading of eBPF programs
Roberto Sassu
- [PATCH 00/18] bpf: Secure and authenticated preloading of eBPF programs
Roberto Sassu
- [PATCH 00/18] bpf: Secure and authenticated preloading of eBPF programs
Alexei Starovoitov
- [PATCH 00/18] bpf: Secure and authenticated preloading of eBPF programs
KP Singh
- [PATCH 00/18] bpf: Secure and authenticated preloading of eBPF programs
Casey Schaufler
- [PATCH 00/18] bpf: Secure and authenticated preloading of eBPF programs
Roberto Sassu
- [PATCH 00/18] bpf: Secure and authenticated preloading of eBPF programs
Casey Schaufler
- [PATCH 00/18] bpf: Secure and authenticated preloading of eBPF programs
KP Singh
- [PATCH 05/18] bpf-preload: Generate static variables
Andrii Nakryiko
- [PATCH 1/2] clk-bcm2835: use subsys_initcall for the clock driver when IMA is enabled
Alberto Solavagione
- [PATCH 1/3] dm: Add verity helpers for LoadPin
Matthias Kaehlcke
- [PATCH 1/4] Fix arm64 kexec forbidding kernels signed with keys in the secondary keyring to boot
joeyli
- [PATCH 1/4] Fix arm64 kexec forbidding kernels signed with keys in the secondary keyring to boot
Baoquan He
- [PATCH 1/7] KEYS: Create static version of public_key_verify_signature
Eric Snowberg
- [PATCH 2/3] LoadPin: Enable loading from trusted dm-verity devices
Matthias Kaehlcke
- [PATCH 2/3] LoadPin: Enable loading from trusted dm-verity devices
kernel test robot
- [PATCH 2/4] kexec, KEYS, arm64: Make use of platform keyring for signature verification
joeyli
- [PATCH 2/7] KEYS: X.509: Parse Basic Constraints for CA
Eric Snowberg
- [PATCH 2/7] KEYS: X.509: Parse Basic Constraints for CA
Mimi Zohar
- [PATCH 2/7] KEYS: X.509: Parse Basic Constraints for CA
Eric Snowberg
- [PATCH 3/3] dm: verity-loadpin: Use CONFIG_SECURITY_LOADPIN_VERITY for conditional compilation
Matthias Kaehlcke
- [PATCH 3/4] kexec, KEYS, s390: Make use of built-in and secondary keyring for signature verification
joeyli
- [PATCH 3/5] keys: Remove redundant assignments
Jarkko Sakkinen
- [PATCH 3/7] KEYS: X.509: Parse Key Usage
Eric Snowberg
- [PATCH 3/7] KEYS: X.509: Parse Key Usage
Mimi Zohar
- [PATCH 4/7] KEYS: Introduce a builtin root of trust key flag
Eric Snowberg
- [PATCH 4/7] KEYS: Introduce a builtin root of trust key flag
Mimi Zohar
- [PATCH 4/7] KEYS: Introduce a builtin root of trust key flag
Eric Snowberg
- [PATCH 4/7] KEYS: Introduce a builtin root of trust key flag
Mimi Zohar
- [PATCH 4/7] KEYS: Introduce a builtin root of trust key flag
Eric Snowberg
- [PATCH 4/7] KEYS: Introduce a builtin root of trust key flag
Mimi Zohar
- [PATCH 4/7] KEYS: Introduce a builtin root of trust key flag
Eric Snowberg
- [PATCH 4/7] KEYS: Introduce a builtin root of trust key flag
Mimi Zohar
- [PATCH 4/7] KEYS: Introduce a builtin root of trust key flag
Eric Snowberg
- [PATCH 4/7] KEYS: Introduce a builtin root of trust key flag
Mimi Zohar
- [PATCH 4/7] KEYS: Introduce a builtin root of trust key flag
Eric Snowberg
- [PATCH 4/7] KEYS: Introduce a builtin root of trust key flag
Mimi Zohar
- [PATCH 5.15 137/913] landlock: Use square brackets around "landlock-ruleset"
Greg Kroah-Hartman
- [PATCH 5.15 235/913] KEYS: trusted: Avoid calling null function trusted_key_exit
Greg Kroah-Hartman
- [PATCH 5.16 0143/1017] landlock: Use square brackets around "landlock-ruleset"
Greg Kroah-Hartman
- [PATCH 5.16 0248/1017] KEYS: trusted: Avoid calling null function trusted_key_exit
Greg Kroah-Hartman
- [PATCH 5.17 0138/1126] landlock: Use square brackets around "landlock-ruleset"
Greg Kroah-Hartman
- [PATCH 5.17 0255/1126] KEYS: trusted: Avoid calling null function trusted_key_exit
Greg Kroah-Hartman
- [PATCH 5/7] KEYS: Introduce sig restriction that validates root of trust
Eric Snowberg
- [PATCH 5/7] KEYS: Introduce sig restriction that validates root of trust
kernel test robot
- [PATCH 6/7] KEYS: X.509: Flag Intermediate CA certs as built in
Eric Snowberg
- [PATCH 6/7] KEYS: X.509: Flag Intermediate CA certs as built in
kernel test robot
- [PATCH 7/7] integrity: Use root of trust signature restriction
Eric Snowberg
- [PATCH] apparmor: fix reference count leak in aa_pivotroot()
Xin Xiong
- [PATCH] Carry forward IMA measurement log on kexec on x86_64
Jonathan McDowell
- [PATCH] Carry forward IMA measurement log on kexec on x86_64
Mimi Zohar
- [PATCH] Carry forward IMA measurement log on kexec on x86_64
Jonathan McDowell
- [PATCH] Carry forward IMA measurement log on kexec on x86_64
Mimi Zohar
- [PATCH] Carry forward IMA measurement log on kexec on x86_64
Jonathan McDowell
- [PATCH] Carry forward IMA measurement log on kexec on x86_64
Mimi Zohar
- [PATCH] Carry forward IMA measurement log on kexec on x86_64
Jonathan McDowell
- [PATCH] Carry forward IMA measurement log on kexec on x86_64
Mimi Zohar
- [PATCH] ima: remove redundant initialization of pointer 'file'.
Mimi Zohar
- [PATCH] ima: remove template "ima" as the compiled default
Mimi Zohar
- [PATCH] ima: remove template "ima" as the compiled default
Guozihua (Scott)
- [PATCH] ima: simplify if-if to if-else
Yihao Han
- [PATCH] integrity: Allow ima_appraise bootparam to be set when SB is enabled
Eric Snowberg
- [PATCH] integrity: Allow ima_appraise bootparam to be set when SB is enabled
Mimi Zohar
- [PATCH] integrity: Allow ima_appraise bootparam to be set when SB is enabled
Eric Snowberg
- [PATCH] integrity: Allow ima_appraise bootparam to be set when SB is enabled
Mimi Zohar
- [PATCH] integrity: Allow ima_appraise bootparam to be set when SB is enabled
Nayna
- [PATCH] security: don't treat structure as an array of struct hlist_head
Bill Wendling
- [PATCH] security: don't treat structure as an array of struct hlist_head
Kees Cook
- [PATCH AUTOSEL 5.10 62/65] netlabel: fix out-of-bounds memory accesses
Sasha Levin
- [PATCH AUTOSEL 5.15 93/98] netlabel: fix out-of-bounds memory accesses
Sasha Levin
- [PATCH AUTOSEL 5.16 104/109] netlabel: fix out-of-bounds memory accesses
Sasha Levin
- [PATCH AUTOSEL 5.17 144/149] netlabel: fix out-of-bounds memory accesses
Sasha Levin
- [PATCH AUTOSEL 5.4 35/37] netlabel: fix out-of-bounds memory accesses
Sasha Levin
- [PATCH net] sctp: use the correct skb for security_sctp_assoc_request
Ondrej Mosnacek
- [PATCH net] sctp: use the correct skb for security_sctp_assoc_request
Xin Long
- [PATCH net] sctp: use the correct skb for security_sctp_assoc_request
Ondrej Mosnacek
- [PATCH net] sctp: use the correct skb for security_sctp_assoc_request
Xin Long
- [PATCH net] sctp: use the correct skb for security_sctp_assoc_request
Ondrej Mosnacek
- [PATCH net] sctp: use the correct skb for security_sctp_assoc_request
Xin Long
- [PATCH v10 0/4] Allow guest access to EFI confidential computing secret area
Dov Murik
- [PATCH v10 0/4] Allow guest access to EFI confidential computing secret area
Ard Biesheuvel
- [PATCH v10 1/4] efi: Save location of EFI confidential computing area
Dov Murik
- [PATCH v10 2/4] virt: Add efi_secret module to expose confidential computing secrets
Dov Murik
- [PATCH v10 3/4] efi: Register efi_secret platform device if EFI secret area is declared
Dov Murik
- [PATCH v10 4/4] docs: security: Add secrets/coco documentation
Dov Murik
- [PATCH v10 8/8] integrity: Only use machine keyring when uefi_check_trust_mok_keys is true
Michal Suchánek
- [PATCH v10 8/8] integrity: Only use machine keyring when uefi_check_trust_mok_keys is true
Eric Snowberg
- [PATCH v10 8/8] integrity: Only use machine keyring when uefi_check_trust_mok_keys is true
Michal Suchánek
- [PATCH v10 8/8] integrity: Only use machine keyring when uefi_check_trust_mok_keys is true
Eric Snowberg
- [PATCH v10 8/8] integrity: Only use machine keyring when uefi_check_trust_mok_keys is true
Michal Suchánek
- [PATCH v12 00/26] ima: Namespace IMA with audit support in IMA-ns
Stefan Berger
- [PATCH v12 01/26] securityfs: rework dentry creation
Stefan Berger
- [PATCH v12 02/26] securityfs: Extend securityfs with namespacing support
Stefan Berger
- [PATCH v12 03/26] ima: Define ima_namespace struct and start moving variables into it
Stefan Berger
- [PATCH v12 04/26] ima: Move arch_policy_entry into ima_namespace
Stefan Berger
- [PATCH v12 05/26] ima: Move ima_htable into ima_namespace
Stefan Berger
- [PATCH v12 06/26] ima: Move measurement list related variables into ima_namespace
Stefan Berger
- [PATCH v12 07/26] ima: Move some IMA policy and filesystem related variables into ima_namespace
Stefan Berger
- [PATCH v12 08/26] ima: Move IMA securityfs files into ima_namespace or onto stack
Stefan Berger
- [PATCH v12 09/26] ima: Move ima_lsm_policy_notifier into ima_namespace
Stefan Berger
- [PATCH v12 10/26] ima: Switch to lazy lsm policy updates for better performance
Stefan Berger
- [PATCH v12 11/26] ima: Define mac_admin_ns_capable() as a wrapper for ns_capable()
Stefan Berger
- [PATCH v12 12/26] ima: Only accept AUDIT rules for non-init_ima_ns namespaces for now
Stefan Berger
- [PATCH v12 13/26] userns: Add pointer to ima_namespace to user_namespace
Stefan Berger
- [PATCH v12 14/26] ima: Implement hierarchical processing of file accesses
Stefan Berger
- [PATCH v12 15/26] ima: Implement ima_free_policy_rules() for freeing of an ima_namespace
Stefan Berger
- [PATCH v12 16/26] ima: Add functions for creating and freeing of an ima_namespace
Stefan Berger
- [PATCH v12 17/26] integrity/ima: Define ns_status for storing namespaced iint data
Stefan Berger
- [PATCH v12 18/26] integrity: Add optional callback function to integrity_inode_free()
Stefan Berger
- [PATCH v12 19/26] ima: Namespace audit status flags
Stefan Berger
- [PATCH v12 20/26] ima: Remove unused iints from the integrity_iint_cache
Stefan Berger
- [PATCH v12 21/26] ima: Setup securityfs for IMA namespace
Stefan Berger
- [PATCH v12 22/26] ima: Introduce securityfs file to activate an IMA namespace
Stefan Berger
- [PATCH v12 23/26] ima: Show owning user namespace's uid and gid when displaying policy
Stefan Berger
- [PATCH v12 24/26] ima: Limit number of policy rules in non-init_ima_ns
Stefan Berger
- [PATCH v12 25/26] ima: Restrict informational audit messages to init_ima_ns
Stefan Berger
- [PATCH v12 26/26] ima: Enable IMA namespaces
Stefan Berger
- [PATCH v1] RISC-V: defconfigs: Add syzkaller's config as a defconfig
Palmer Dabbelt
- [PATCH v2 0/1] ima: fix boot command line issue
GUO Zihua
- [PATCH v2 0/3] LoadPin: Enable loading from trusted dm-verity devices
Matthias Kaehlcke
- [PATCH v2 0/3] LoadPin: Enable loading from trusted dm-verity devices
Paul Menzel
- [PATCH v2 06/12] LSM: Remove double path_rename hook calls for RENAME_EXCHANGE
Paul Moore
- [PATCH v2 07/12] landlock: Add support for file reparenting with LANDLOCK_ACCESS_FS_REFER
Paul Moore
- [PATCH v2 07/12] landlock: Add support for file reparenting with LANDLOCK_ACCESS_FS_REFER
Mickaël Salaün
- [PATCH v2 07/12] landlock: Add support for file reparenting with LANDLOCK_ACCESS_FS_REFER
Paul Moore
- [PATCH v2 1/1] ima: remove the IMA_TEMPLATE Kconfig option
GUO Zihua
- [PATCH v2 1/3] dm: Add verity helpers for LoadPin
Matthias Kaehlcke
- [PATCH v2 2/3] LoadPin: Enable loading from trusted dm-verity devices
Matthias Kaehlcke
- [PATCH v2 2/3] LoadPin: Enable loading from trusted dm-verity devices
kernel test robot
- [PATCH v2 2/3] LoadPin: Enable loading from trusted dm-verity devices
kernel test robot
- [PATCH v2 3/3] dm: verity-loadpin: Use CONFIG_SECURITY_LOADPIN_VERITY for conditional compilation
Matthias Kaehlcke
- [PATCH v2] Carry forward IMA measurement log on kexec on x86_64
Jonathan McDowell
- [PATCH v2] Carry forward IMA measurement log on kexec on x86_64
Mimi Zohar
- [PATCH v2] ima: remove the IMA_TEMPLATE Kconfig option
GUO Zihua
- [PATCH v2] ima: remove the IMA_TEMPLATE Kconfig option
GUO Zihua
- [PATCH v2] ima: remove the IMA_TEMPLATE Kconfig option
Mimi Zohar
- [PATCH v2] ima: remove the IMA_TEMPLATE Kconfig option
Guozihua (Scott)
- [PATCH v2] keys: remove __user annotation from function prototype
Randy Dunlap
- [PATCH v2] keys: remove __user annotation from function prototype
Jarkko Sakkinen
- [PATCH v2] selinux: log anon inode class name
Paul Moore
- [PATCH v2] selinux: log anon inode class name
Paul Moore
- [PATCH v3 0/1] ima: fix boot command line issue
GUO Zihua
- [PATCH v3 0/1] ima: fix boot command line issue
Mimi Zohar
- [PATCH v3 0/1] ima: fix boot command line issue
Guozihua (Scott)
- [PATCH v3 1/1] ima: remove the IMA_TEMPLATE Kconfig option
GUO Zihua
- [PATCH v3 1/1] ima: remove the IMA_TEMPLATE Kconfig option
Mimi Zohar
- [PATCH v34 00/29] LSM: Module stacking for AppArmor
Casey Schaufler
- [PATCH v34 00/29] LSM: Module stacking for AppArmor
Casey Schaufler
- [PATCH v34 00/29] LSM: Module stacking for AppArmor
Casey Schaufler
- [PATCH v34 01/29] integrity: disassociate ima_filter_rule from security_audit_rule
Casey Schaufler
- [PATCH v34 01/29] integrity: disassociate ima_filter_rule from security_audit_rule
Casey Schaufler
- [PATCH v34 02/29] LSM: Infrastructure management of the sock security
Casey Schaufler
- [PATCH v34 02/29] LSM: Infrastructure management of the sock security
Casey Schaufler
- [PATCH v34 03/29] LSM: Add the lsmblob data structure.
Casey Schaufler
- [PATCH v34 03/29] LSM: Add the lsmblob data structure.
Casey Schaufler
- [PATCH v34 04/29] LSM: provide lsm name and id slot mappings
Casey Schaufler
- [PATCH v34 04/29] LSM: provide lsm name and id slot mappings
Casey Schaufler
- [PATCH v34 05/29] IMA: avoid label collisions with stacked LSMs
Casey Schaufler
- [PATCH v34 05/29] IMA: avoid label collisions with stacked LSMs
Casey Schaufler
- [PATCH v34 06/29] LSM: Use lsmblob in security_audit_rule_match
Casey Schaufler
- [PATCH v34 06/29] LSM: Use lsmblob in security_audit_rule_match
Casey Schaufler
- [PATCH v34 07/29] LSM: Use lsmblob in security_kernel_act_as
Casey Schaufler
- [PATCH v34 07/29] LSM: Use lsmblob in security_kernel_act_as
Casey Schaufler
- [PATCH v34 08/29] LSM: Use lsmblob in security_secctx_to_secid
Casey Schaufler
- [PATCH v34 08/29] LSM: Use lsmblob in security_secctx_to_secid
Casey Schaufler
- [PATCH v34 09/29] LSM: Use lsmblob in security_secid_to_secctx
Casey Schaufler
- [PATCH v34 09/29] LSM: Use lsmblob in security_secid_to_secctx
Casey Schaufler
- [PATCH v34 10/29] LSM: Use lsmblob in security_ipc_getsecid
Casey Schaufler
- [PATCH v34 10/29] LSM: Use lsmblob in security_ipc_getsecid
Casey Schaufler
- [PATCH v34 11/29] LSM: Use lsmblob in security_current_getsecid
Casey Schaufler
- [PATCH v34 11/29] LSM: Use lsmblob in security_current_getsecid
kernel test robot
- [PATCH v34 11/29] LSM: Use lsmblob in security_current_getsecid
kernel test robot
- [PATCH v34 11/29] LSM: Use lsmblob in security_current_getsecid
Casey Schaufler
- [PATCH v34 12/29] LSM: Use lsmblob in security_inode_getsecid
Casey Schaufler
- [PATCH v34 12/29] LSM: Use lsmblob in security_inode_getsecid
Casey Schaufler
- [PATCH v34 13/29] LSM: Use lsmblob in security_cred_getsecid
Casey Schaufler
- [PATCH v34 13/29] LSM: Use lsmblob in security_cred_getsecid
kernel test robot
- [PATCH v34 13/29] LSM: Use lsmblob in security_cred_getsecid
Casey Schaufler
- [PATCH v34 14/29] LSM: Specify which LSM to display
Casey Schaufler
- [PATCH v34 14/29] LSM: Specify which LSM to display
Casey Schaufler
- [PATCH v34 15/29] LSM: Ensure the correct LSM context releaser
Casey Schaufler
- [PATCH v34 15/29] LSM: Ensure the correct LSM context releaser
Casey Schaufler
- [PATCH v34 16/29] LSM: Use lsmcontext in security_secid_to_secctx
Casey Schaufler
- [PATCH v34 16/29] LSM: Use lsmcontext in security_secid_to_secctx
Casey Schaufler
- [PATCH v34 17/29] LSM: Use lsmcontext in security_inode_getsecctx
Casey Schaufler
- [PATCH v34 17/29] LSM: Use lsmcontext in security_inode_getsecctx
Casey Schaufler
- [PATCH v34 18/29] LSM: security_secid_to_secctx in netlink netfilter
Casey Schaufler
- [PATCH v34 18/29] LSM: security_secid_to_secctx in netlink netfilter
Casey Schaufler
- [PATCH v34 19/29] NET: Store LSM netlabel data in a lsmblob
Casey Schaufler
- [PATCH v34 19/29] NET: Store LSM netlabel data in a lsmblob
Casey Schaufler
- [PATCH v34 20/29] binder: Pass LSM identifier for confirmation
Casey Schaufler
- [PATCH v34 20/29] binder: Pass LSM identifier for confirmation
Casey Schaufler
- [PATCH v34 21/29] LSM: Extend security_secid_to_secctx to include module selection
Casey Schaufler
- [PATCH v34 21/29] LSM: Extend security_secid_to_secctx to include module selection
Casey Schaufler
- [PATCH v34 22/29] Audit: Keep multiple LSM data in audit_names
Casey Schaufler
- [PATCH v34 22/29] Audit: Keep multiple LSM data in audit_names
Casey Schaufler
- [PATCH v34 23/29] Audit: Create audit_stamp structure
Casey Schaufler
- [PATCH v34 23/29] Audit: Create audit_stamp structure
Casey Schaufler
- [PATCH v34 24/29] LSM: Add a function to report multiple LSMs
Casey Schaufler
- [PATCH v34 24/29] LSM: Add a function to report multiple LSMs
Casey Schaufler
- [PATCH v34 25/29] Audit: Allow multiple records in an audit_buffer
Casey Schaufler
- [PATCH v34 25/29] Audit: Allow multiple records in an audit_buffer
Casey Schaufler
- [PATCH v34 26/29] Audit: Add record for multiple task security contexts
Casey Schaufler
- [PATCH v34 26/29] Audit: Add record for multiple task security contexts
Casey Schaufler
- [PATCH v34 27/29] Audit: Add record for multiple object contexts
Casey Schaufler
- [PATCH v34 27/29] Audit: Add record for multiple object contexts
Casey Schaufler
- [PATCH v34 28/29] LSM: Add /proc attr entry for full LSM context
Casey Schaufler
- [PATCH v34 28/29] LSM: Add /proc attr entry for full LSM context
Casey Schaufler
- [PATCH v34 29/29] AppArmor: Remove the exclusive flag
Casey Schaufler
- [PATCH v34 29/29] AppArmor: Remove the exclusive flag
Casey Schaufler
- [PATCH v35 00/29] LSM: Module stacking for AppArmor
Casey Schaufler
- [PATCH v35 01/29] integrity: disassociate ima_filter_rule from security_audit_rule
Casey Schaufler
- [PATCH v35 01/29] integrity: disassociate ima_filter_rule from security_audit_rule
John Johansen
- [PATCH v35 02/29] LSM: Infrastructure management of the sock security
Casey Schaufler
- [PATCH v35 03/29] LSM: Add the lsmblob data structure.
Casey Schaufler
- [PATCH v35 03/29] LSM: Add the lsmblob data structure.
John Johansen
- [PATCH v35 04/29] LSM: provide lsm name and id slot mappings
Casey Schaufler
- [PATCH v35 04/29] LSM: provide lsm name and id slot mappings
John Johansen
- [PATCH v35 05/29] IMA: avoid label collisions with stacked LSMs
Casey Schaufler
- [PATCH v35 05/29] IMA: avoid label collisions with stacked LSMs
John Johansen
- [PATCH v35 06/29] LSM: Use lsmblob in security_audit_rule_match
Casey Schaufler
- [PATCH v35 06/29] LSM: Use lsmblob in security_audit_rule_match
John Johansen
- [PATCH v35 07/29] LSM: Use lsmblob in security_kernel_act_as
Casey Schaufler
- [PATCH v35 08/29] LSM: Use lsmblob in security_secctx_to_secid
Casey Schaufler
- [PATCH v35 08/29] LSM: Use lsmblob in security_secctx_to_secid
John Johansen
- [PATCH v35 09/29] LSM: Use lsmblob in security_secid_to_secctx
Casey Schaufler
- [PATCH v35 10/29] LSM: Use lsmblob in security_ipc_getsecid
Casey Schaufler
- [PATCH v35 11/29] LSM: Use lsmblob in security_current_getsecid
Casey Schaufler
- [PATCH v35 12/29] LSM: Use lsmblob in security_inode_getsecid
Casey Schaufler
- [PATCH v35 13/29] LSM: Use lsmblob in security_cred_getsecid
Casey Schaufler
- [PATCH v35 13/29] LSM: Use lsmblob in security_cred_getsecid
kernel test robot
- [PATCH v35 13/29] LSM: Use lsmblob in security_cred_getsecid
kernel test robot
- [PATCH v35 13/29] LSM: Use lsmblob in security_cred_getsecid
kernel test robot
- [PATCH v35 14/29] LSM: Specify which LSM to display
Casey Schaufler
- [PATCH v35 15/29] LSM: Ensure the correct LSM context releaser
Casey Schaufler
- [PATCH v35 16/29] LSM: Use lsmcontext in security_secid_to_secctx
Casey Schaufler
- [PATCH v35 17/29] LSM: Use lsmcontext in security_inode_getsecctx
Casey Schaufler
- [PATCH v35 18/29] LSM: security_secid_to_secctx in netlink netfilter
Casey Schaufler
- [PATCH v35 19/29] NET: Store LSM netlabel data in a lsmblob
Casey Schaufler
- [PATCH v35 20/29] binder: Pass LSM identifier for confirmation
Casey Schaufler
- [PATCH v35 21/29] LSM: Extend security_secid_to_secctx to include module selection
Casey Schaufler
- [PATCH v35 21/29] LSM: Extend security_secid_to_secctx to include module selection
John Johansen
- [PATCH v35 22/29] Audit: Keep multiple LSM data in audit_names
Casey Schaufler
- [PATCH v35 22/29] Audit: Keep multiple LSM data in audit_names
John Johansen
- [PATCH v35 22/29] Audit: Keep multiple LSM data in audit_names
Paul Moore
- [PATCH v35 23/29] Audit: Create audit_stamp structure
Casey Schaufler
- [PATCH v35 23/29] Audit: Create audit_stamp structure
John Johansen
- [PATCH v35 23/29] Audit: Create audit_stamp structure
Paul Moore
- [PATCH v35 23/29] Audit: Create audit_stamp structure
John Johansen
- [PATCH v35 23/29] Audit: Create audit_stamp structure
Paul Moore
- [PATCH v35 23/29] Audit: Create audit_stamp structure
Casey Schaufler
- [PATCH v35 23/29] Audit: Create audit_stamp structure
Paul Moore
- [PATCH v35 23/29] Audit: Create audit_stamp structure
Casey Schaufler
- [PATCH v35 24/29] LSM: Add a function to report multiple LSMs
Casey Schaufler
- [PATCH v35 24/29] LSM: Add a function to report multiple LSMs
Paul Moore
- [PATCH v35 24/29] LSM: Add a function to report multiple LSMs
John Johansen
- [PATCH v35 25/29] Audit: Allow multiple records in an audit_buffer
Casey Schaufler
- [PATCH v35 25/29] Audit: Allow multiple records in an audit_buffer
Paul Moore
- [PATCH v35 25/29] Audit: Allow multiple records in an audit_buffer
John Johansen
- [PATCH v35 25/29] Audit: Allow multiple records in an audit_buffer
Paul Moore
- [PATCH v35 25/29] Audit: Allow multiple records in an audit_buffer
John Johansen
- [PATCH v35 26/29] Audit: Add record for multiple task security contexts
Casey Schaufler
- [PATCH v35 26/29] Audit: Add record for multiple task security contexts
Paul Moore
- [PATCH v35 26/29] Audit: Add record for multiple task security contexts
John Johansen
- [PATCH v35 26/29] Audit: Add record for multiple task security contexts
Paul Moore
- [PATCH v35 26/29] Audit: Add record for multiple task security contexts
John Johansen
- [PATCH v35 27/29] Audit: Add record for multiple object contexts
Casey Schaufler
- [PATCH v35 27/29] Audit: Add record for multiple object contexts
Paul Moore
- [PATCH v35 27/29] Audit: Add record for multiple object contexts
John Johansen
- [PATCH v35 27/29] Audit: Add record for multiple object contexts
Paul Moore
- [PATCH v35 27/29] Audit: Add record for multiple object contexts
John Johansen
- [PATCH v35 28/29] LSM: Add /proc attr entry for full LSM context
Casey Schaufler
- [PATCH v35 28/29] LSM: Add /proc attr entry for full LSM context
John Johansen
- [PATCH v35 29/29] AppArmor: Remove the exclusive flag
Casey Schaufler
- [PATCH v3 RESEND] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
Aditya Garg
- [PATCH v3 RESEND] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
Mimi Zohar
- [PATCH v3 RESEND] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
Aditya Garg
- [PATCH v3 RESEND] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
Mimi Zohar
- [PATCH v3 RESEND] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
Aditya Garg
- [PATCH v3 RESEND] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
Aditya Garg
- [PATCH v4] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
Aditya Garg
- [PATCH v4 RESEND] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
Aditya Garg
- [PATCH v4 RESEND] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
Mimi Zohar
- [PATCH v4 RESEND] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
Aditya Garg
- [PATCH v5] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
Aditya Garg
- [PATCH v5] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
Mimi Zohar
- [PATCH v5] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
Aditya Garg
- [PATCH v6 2/4] kexec, KEYS: make the code in bzImage64_verify_sig generic
Coiby Xu
- [PATCH v6 2/4] kexec, KEYS: make the code in bzImage64_verify_sig generic
Baoquan He
- [PATCH v6 2/4] kexec, KEYS: make the code in bzImage64_verify_sig generic
Coiby Xu
- [PATCH v6 3/4] arm64: kexec_file: use more system keyrings to verify kernel image signature
Coiby Xu
- [PATCH v6 3/4] arm64: kexec_file: use more system keyrings to verify kernel image signature
Baoquan He
- [PATCH v6 3/4] arm64: kexec_file: use more system keyrings to verify kernel image signature
Coiby Xu
- [PATCH v6 4/4] kexec, KEYS, s390: Make use of built-in and secondary keyring for signature verification
Baoquan He
- [PATCH v6] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
Aditya Garg
- [PATCH v6] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
Mimi Zohar
- [PATCH v6] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
Aditya Garg
- [PATCH v7 0/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Ahmad Fatoum
- [PATCH v7 1/6] KEYS: trusted: allow use of TEE as backend without TCG_TPM support
Ahmad Fatoum
- [PATCH v7 2/6] KEYS: trusted: allow use of kernel RNG for key material
Ahmad Fatoum
- [PATCH v7 3/5] certs: Make blacklist_vet_description() more strict
David Howells
- [PATCH v7 3/5] certs: Make blacklist_vet_description() more strict
Jarkko Sakkinen
- [PATCH v7 3/5] certs: Make blacklist_vet_description() more strict
Mickaël Salaün
- [PATCH v7 3/5] certs: Make blacklist_vet_description() more strict
Jarkko Sakkinen
- [PATCH v7 3/5] certs: Make blacklist_vet_description() more strict
Mickaël Salaün
- [PATCH v7 3/5] certs: Make blacklist_vet_description() more strict
Jarkko Sakkinen
- [PATCH v7 3/6] crypto: caam - add in-kernel interface for blob generator
Ahmad Fatoum
- [PATCH v7 3/6] crypto: caam - add in-kernel interface for blob generator
Jarkko Sakkinen
- [PATCH v7 3/6] crypto: caam - add in-kernel interface for blob generator
Ahmad Fatoum
- [PATCH v7 4/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Ahmad Fatoum
- [PATCH v7 4/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Jarkko Sakkinen
- [PATCH v7 5/6] doc: trusted-encrypted: describe new CAAM trust source
Ahmad Fatoum
- [PATCH v7 6/6] MAINTAINERS: add myself as CAAM trusted key maintainer
Ahmad Fatoum
- [PATCH v7] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
Aditya Garg
- [PATCH v7 RESEND] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
Aditya Garg
- [PATCH v8 0/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Ahmad Fatoum
- [PATCH v8 1/6] KEYS: trusted: allow use of TEE as backend without TCG_TPM support
Ahmad Fatoum
- [PATCH v8 2/6] KEYS: trusted: allow use of kernel RNG for key material
Ahmad Fatoum
- [PATCH v8 3/4] efi: Load efi_secret module if EFI secret area is populated
Ard Biesheuvel
- [PATCH v8 3/4] efi: Load efi_secret module if EFI secret area is populated
Dov Murik
- [PATCH v8 3/6] crypto: caam - add in-kernel interface for blob generator
Ahmad Fatoum
- [PATCH v8 4/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Ahmad Fatoum
- [PATCH v8 5/6] doc: trusted-encrypted: describe new CAAM trust source
Ahmad Fatoum
- [PATCH v8 6/6] MAINTAINERS: add myself as CAAM trusted key maintainer
Ahmad Fatoum
- [PATCH v9 0/4] Allow guest access to EFI confidential computing secret area
Dov Murik
- [PATCH v9 0/4] Allow guest access to EFI confidential computing secret area
Ard Biesheuvel
- [PATCH v9 0/4] Allow guest access to EFI confidential computing secret area
Dov Murik
- [PATCH v9 2/4] virt: Add efi_secret module to expose confidential computing secrets
Gerd Hoffmann
- [PATCH v9 3/4] efi: Register efi_secret platform device if EFI secret area is declared
Dov Murik
- [PATCH v9 3/4] efi: Register efi_secret platform device if EFI secret area is declared
Gerd Hoffmann
- [POC][USER SPACE][PATCH] Introduce LSM to protect pinned objects
Roberto Sassu
- [POC][USER SPACE][PATCH] Introduce LSM to protect pinned objects
Casey Schaufler
- [POC][USER SPACE][PATCH] Introduce LSM to protect pinned objects
Roberto Sassu
- [RFC PATCH 0/7] SELinux-namespace
Alexander Kozhevnikov
- [RFC PATCH 1/7] LSM: Infrastructure management of the superblock
Alexander Kozhevnikov
- [RFC PATCH 2/7] selinux: support per-namespace superblock security structures
Alexander Kozhevnikov
- [RFC PATCH 3/7] SELINUXNS: Fix initilization of the superblock security under spinlock
Alexander Kozhevnikov
- [RFC PATCH 4/7] SELINUXNS: Namespacing for xattrs
Alexander Kozhevnikov
- [RFC PATCH 5/7] SELINUXNS: Migrate all open files and all vma to new namespace
Alexander Kozhevnikov
- [RFC PATCH 6/7] SELINUXNS: Fixing superblock security structure memory leakage
Alexander Kozhevnikov
- [RFC PATCH 7/7] SELINUXNS: Fixing concurrency issues
Alexander Kozhevnikov
- [RFC PATCH v4 01/15] landlock: access mask renaming
Mickaël Salaün
- [RFC PATCH v4 01/15] landlock: access mask renaming
Konstantin Meskhidze
- [RFC PATCH v4 03/15] landlock: landlock_find/insert_rule refactoring (TCP port 0)
Mickaël Salaün
- [RFC PATCH v4 03/15] landlock: landlock_find/insert_rule refactoring (TCP port 0)
Konstantin Meskhidze
- [RFC PATCH v4 06/15] landlock: landlock_add_rule syscall refactoring
Mickaël Salaün
- [RFC PATCH v4 06/15] landlock: landlock_add_rule syscall refactoring
Konstantin Meskhidze
- [RFC PATCH v4 07/15] landlock: user space API network support
Mickaël Salaün
- [RFC PATCH v4 07/15] landlock: user space API network support
Mickaël Salaün
- [RFC PATCH v4 07/15] landlock: user space API network support
Konstantin Meskhidze
- [RFC PATCH v4 07/15] landlock: user space API network support
Mickaël Salaün
- [RFC PATCH v4 07/15] landlock: user space API network support
Konstantin Meskhidze
- [RFC PATCH v4 07/15] landlock: user space API network support
Konstantin Meskhidze
- [RFC PATCH v4 08/15] landlock: add support network rules
Mickaël Salaün
- [RFC PATCH v4 08/15] landlock: add support network rules
Konstantin Meskhidze
- [RFC PATCH v4 08/15] landlock: add support network rules
Mickaël Salaün
- [RFC PATCH v4 08/15] landlock: add support network rules
Konstantin Meskhidze
- [RFC PATCH v4 09/15] landlock: TCP network hooks implementation
Mickaël Salaün
- [RFC PATCH v4 09/15] landlock: TCP network hooks implementation
Konstantin Meskhidze
- [RFC PATCH v4 10/15] seltest/landlock: add tests for bind() hooks
Mickaël Salaün
- [RFC PATCH v4 10/15] seltest/landlock: add tests for bind() hooks
Konstantin Meskhidze
- [RFC PATCH v4 10/15] seltest/landlock: add tests for bind() hooks
Mickaël Salaün
- [RFC PATCH v4 10/15] seltest/landlock: add tests for bind() hooks
Mickaël Salaün
- [RFC PATCH v4 10/15] seltest/landlock: add tests for bind() hooks
Konstantin Meskhidze
- [RFC PATCH v4 10/15] seltest/landlock: add tests for bind() hooks
Konstantin Meskhidze
- [RFC PATCH v4 10/15] seltest/landlock: add tests for bind() hooks
Mickaël Salaün
- [RFC PATCH v4 10/15] seltest/landlock: add tests for bind() hooks
Konstantin Meskhidze
- Android, Windows & Console source create right away! Faster Games & quicker WebBrowsing (c)RS VecSR X-OR https://lkml.org/lkml/2022/4/7/672
Duke Abbaddon
- Device Cache Align 'code align also speeds up prefetch' RS 128Bit Buffer to Cache Align = Pure, 32Bit,64Bit,128Bit Align Quads & Float Quads - HDD,SSD & Subject: Hardware Dual Encrypt & Decrypt : Hardware Accelerators
Duke Abbaddon
- Display Stream Compression Support - 3D Mux , 3D Mu-X by GPU & CPU though SiMD & AVX 32Bit IfNotOR to a Singular planar Frame Buffer
Duke Abbaddon
- Display Stream Compression Support - 3D Mux , 3D Mu-X by GPU & CPU though SiMD & AVX 32Bit IfNotOR to a Singular planar Frame Buffer
Duke Abbaddon
- Fast/dev/CON 3DText & Audio Almost any CPU & GPU ''SiMD & Float/int" Class VESA Console + With Console in VecSR you can 3DText & Audio + VecSR Firmware update 2022 For immediate implementation in all operating systems & ROM's
Duke Abbaddon
- Fast/dev/CON 3DText & Audio Almost any CPU & GPU ''SiMD & Float/int" Class VESA Console + With Console in VecSR you can 3DText & Audio + VecSR Firmware update 2022 For immediate implementation in all operating systems & ROM's
Duke Abbaddon
- Frame Buffer - Personally QFT is a much more pleasurable experience than VRR at 2xFPS+ Stable FPS & X-OR Partial Frame Retention saving on compression.
Duke Abbaddon
- GPRS Expansion & Development - Basic comparison of Modes for Authenticated-Encryption -IAPM, XCBC, OCB, CCM, EAX, CWC, GCM, PCFB, CS
Duke Abbaddon
- Hardware Dual Encrypt & Decrypt : Hardware Accelerators (indirect) - Plan & method RS
Duke Abbaddon
- Hello,
Seyba Daniel
- How to list keys used for kexec
Michal Suchánek
- How to list keys used for kexec
Guozihua (Scott)
- How to list keys used for kexec
Michal Suchánek
- How to list keys used for kexec
Guozihua (Scott)
- Koszty instalacji fotowoltaicznej
Arkadiusz Sokołowski
- LiberKHAOS - "So my 2k buffer is fine then." & We Wanted FINE ? #DEV-RAND #Chromium gcc-plugins: latent_entropy: use /dev/urandom
Duke Abbaddon
- Linux 5.18-rc4
Linus Torvalds
- Modulus Dual Encrypt & Decrypt package : Processor feature RS AES-CCM & AES-GCM & Other Cypher Modulus
Duke Abbaddon
- Modulus Dual Encrypt & Decrypt package : Processor feature RS AES-CCM & AES-GCM & Other Cypher Modulus
Duke Abbaddon
- Napływ Klientów ze strony
Mikołaj Rudzik
- Nesting a kernel under an unbreakable VM Is now possible with GunYeah! ARM8+ only
Duke Abbaddon
- No subject
We have an offer to invest in your country under a joint venture partnership please reply for more details
- OT-SVG Fonts & TT-SVG Obviously Rendered in Direct X 9+ & OpenGL 3+ Mode & Desktop Rendering modes
Duke Abbaddon
- Parallax Cryptographic Processing Unit: RS AES-CCM & AES-GCM & Other Cypher Modulus + CCM & GCM can be accelerated with a joint AES Crypto module : Modulus Dual Encrypt & Decrypt package : Processor feature
Duke Abbaddon
- Prezentacja
Marek Onufrowicz
- Random : (Dynamic Elliptic Curve / T) * Factor Of T : problems for Arm (32-bit), Motorola 68000 (M68k), Microblaze, SPARX32, Xtensa, and other niche architectures.
Duke Abbaddon
- Random : (Dynamic Elliptic Curve / T) * Factor Of T : problems for Arm (32-bit), Motorola 68000 (M68k), Microblaze, SPARX32, Xtensa, and other niche architectures.
Duke Abbaddon
- Secure-Enable PSP + SGX + Initiator Security Virtualise 2022
Duke Abbaddon
- Secure-Enable PSP + SGX + Initiator Security Virtualise 2022 : Self Tests & Thread control pages *Kernel Base L1:L2,L3:Cache MontiCarlos Processor Feature & Task Manger*
Duke Abbaddon
- submit it for inclusion in the standard along with Vector Compression VESA Standard Display protocol 3
Duke Abbaddon
- THANKS FOR YOUR RESPONSE AND GOD BLESS
Lawrence Tansanco
- Though the VESA & HDMI & DisplayPort standards Facilitates direct low bandwidth transport of and transformation of 3D & 2D graphics & fonts into directly Rendered Super High Fidelity SiMD & AVX Rendering Vector
Duke Abbaddon
- USB & Dongle & Bluetooth & 2.4g Devices 'Example' Logitech devices' need a /dev/random Seed Saved for their Cryptological security for both the device & the USB Dongle>
Duke Abbaddon
- VecSR - Vector Standard Render VESA Standards : Vector Graphics, Boxes, Ellipses, Curves & Fonts : Consolas & other brilliant fonts
Duke Abbaddon
- VecSR Compression (HDMI & DP) & X-OR DSC1.2C & Along with our brilliant security features in NTP Folder (Security bat & WebHSM) & Default JS https://bit.ly/VESA_BT sure to please all on their servers
Duke Abbaddon
- VecSR Compression (HDMI & DP) & X-OR DSC1.2C & Along with our brilliant security features in NTP Folder (Security bat & WebHSM) & Default JS VESA_BT sure to please all on their servers
Duke Abbaddon
- VecSR Firmware update 2022 For immediate implementation in all operating systems, monitors, TV's & equipment such as Mouses, Audio Systems & Webcams
Duke Abbaddon
- VecSR Firmware update 2022 For immediate implementation in all operating systems, monitors, TV's & equipment such as Mouses, Audio Systems & Webcams
Duke Abbaddon
- VecSR is really good for secondary loading of sprites & text; In these terms very good for pre loading on for example the X86, RISC, AMIGA & Famicon type devices, With appropriate loading into Sprite buffers or Emulated Secondaries (Special Animations) or Font Buffers. RS
Duke Abbaddon
- VecSR is really good for secondary loading of sprites & text; In these terms very good for pre loading on for example the X86, RISC, AMIGA & Famicon type devices, With appropriate loading into Sprite buffers or Emulated Secondaries (Special Animations) or Font Buffers. RS
Duke Abbaddon
- VecSR Wins another global Feat - The font-palette CSS property - font-palette and Custom @font-palette-values Palettes
Duke Abbaddon
- VecSR Wins another global Feat - The font-palette CSS property - font-palette and Custom @font-palette-values Palettes
Duke Abbaddon
- Wycena paneli fotowoltaicznych
Przemysław Wróblewski
Last message date:
Fri Apr 29 21:30:10 UTC 2022
Archived on: Fri Apr 29 21:14:31 UTC 2022
This archive was generated by
Pipermail 0.09 (Mailman edition).