Linux-Security-Module Archive on lore.kernel.org
 help / Atom feed
[PATCH -next] evm: CHECK-remove set but not used variable 'xattr'
 2018-12-15 10:06 UTC  (3+ messages) - mbox.gz / Atom
` [PATCH -next] evm: remove "

[GIT PULL] linux-integrity patches for Linux 4.21
 2018-12-14 13:52 UTC  - mbox.gz / Atom

[PATCH v6 0/7] tpm: retrieve digest size of unknown algorithms from TPM
 2018-12-14  7:58 UTC  (36+ messages) - mbox.gz / Atom
` [PATCH v6 1/7] tpm: dynamically allocate the allocated_banks array
` [PATCH v6 2/7] tpm: add _head suffix to tcg_efi_specid_event and tcg_pcr_event2
` [PATCH v6 4/7] tpm: modify tpm_pcr_read() definition to pass a TPM hash algorithm
` [PATCH v6 5/7] tpm: retrieve digest size of unknown algorithms with PCR read
` [PATCH v6 6/7] tpm: ensure that the output of PCR read contains the correct digest size
` [PATCH v6 7/7] tpm: pass an array of tpm_bank_list structures to tpm_pcr_extend()

[PULL] Smack: Changes for 4.21
 2018-12-14  3:32 UTC  (2+ messages) - mbox.gz / Atom

[PATCH] LSM: add SafeSetID module that gates setid calls
 2018-12-14  0:05 UTC  (5+ messages) - mbox.gz / Atom
` [PATCH] [PATCH] LSM: generalize flag passing to security_capable

[PATCH v4 0/6] tpm: retrieve digest size of unknown algorithms from TPM
 2018-12-13 20:21 UTC  (5+ messages) - mbox.gz / Atom
` [PATCH v4 1/6] tpm: dynamically allocate active_banks array

[RFC PATCH v1 0/5] Add support for O_MAYEXEC
 2018-12-13 17:44 UTC  (31+ messages) - mbox.gz / Atom
` [RFC PATCH v1 1/5] fs: Add support for an O_MAYEXEC flag on sys_open()
` [RFC PATCH v1 2/5] fs: Add a MAY_EXECMOUNT flag to infer the noexec mount propertie
` [RFC PATCH v1 3/5] Yama: Enforces noexec mounts or file executability through O_MAYEXEC
` [RFC PATCH v1 4/5] selftest/yama: Add tests for O_MAYEXEC enforcing
` [RFC PATCH v1 5/5] doc: Add documentation for Yama's open_mayexec_enforce

[PATCH v7 00/14] x86/alternative: text_poke() enhancements
 2018-12-13 17:25 UTC  (6+ messages) - mbox.gz / Atom
` [PATCH v7 13/14] module: Do not set nx for module memory before freeing

SELinux testsuite failure in overlayfs with v4.20-rc kernels
 2018-12-13 14:33 UTC  (5+ messages) - mbox.gz / Atom

[PATCH v7 0/5] tpm: retrieve digest size of unknown algorithms from TPM
 2018-12-13 10:29 UTC  (6+ messages) - mbox.gz / Atom
` [PATCH v7 1/5] tpm: dynamically allocate the allocated_banks array
` [PATCH v7 2/5] tpm: add _head suffix to tcg_efi_specid_event and tcg_pcr_event2
` [PATCH v7 3/5] tpm: rename and export tpm2_digest and tpm2_algorithms
` [PATCH v7 4/5] tpm: retrieve digest size of unknown algorithms with PCR read
` [PATCH v7 5/5] tpm: pass an array of tpm_extend_digest structures to tpm_pcr_extend()

[RFC v2 00/13] Multi-Key Total Memory Encryption API (MKTME)
 2018-12-13  5:52 UTC  (44+ messages) - mbox.gz / Atom
` [RFC v2 10/13] keys/mktme: Add the MKTME Key Service type for memory encryption
` [RFC v2 12/13] keys/mktme: Save MKTME data if kernel cmdline parameter allows

[PATCH v9 00/14] Appended signatures support for IMA appraisal
 2018-12-13  2:09 UTC  (15+ messages) - mbox.gz / Atom
` [PATCH v9 01/14] MODSIGN: Export module signature definitions
` [PATCH v9 02/14] PKCS#7: Refactor verify_pkcs7_signature() and add pkcs7_get_message_sig()
` [PATCH v9 03/14] PKCS#7: Introduce pkcs7_get_digest()
` [PATCH v9 04/14] integrity: Introduce struct evm_xattr
` [PATCH v9 05/14] integrity: Introduce integrity_keyring_from_id()
` [PATCH v9 06/14] integrity: Introduce asymmetric_sig_has_known_key()
` [PATCH v9 07/14] integrity: Select CONFIG_KEYS instead of depending on it
` [PATCH v9 08/14] ima: Introduce is_signed()
` [PATCH v9 09/14] ima: Export func_tokens
` [PATCH v9 10/14] ima: Add modsig appraise_type option for module-style appended signatures
` [PATCH v9 11/14] ima: Implement support "
` [PATCH v9 12/14] ima: Add new "d-sig" template field
` [PATCH v9 13/14] ima: Write modsig to the measurement list
` [PATCH v9 14/14] ima: Store the measurement again when appraising a modsig

[PATCH] integrity: Remove references to module keyring
 2018-12-13  1:39 UTC  - mbox.gz / Atom

[PATCH v2 0/7] add platform/firmware keys support for kernel verification by IMA
 2018-12-13  0:19 UTC  (23+ messages) - mbox.gz / Atom
` [PATCH v2 1/7] integrity: Define a trusted platform keyring
` [PATCH v2 2/7] integrity: Load certs to the "
` [PATCH v2 3/7] efi: Add EFI signature data types
` [PATCH v2 4/7] efi: Add an EFI signature blob parser
` [PATCH v2 5/7] efi: Import certificates from UEFI Secure Boot
  ` [PATCH v2a "
` [PATCH v2 6/7] efi: Allow the "db" UEFI variable to be suppressed
` [PATCH v2 7/7] ima: Support platform keyring for kernel appraisal

[PATCH 0/5] security: remove needless usage of module header
 2018-12-12 23:42 UTC  (7+ messages) - mbox.gz / Atom
` [PATCH 1/5] security: audit and remove any unnecessary uses of module.h
` [PATCH 2/5] keys: remove needless modular infrastructure from ecryptfs_format
` [PATCH 3/5] security: fs: make inode explicitly non-modular
` [PATCH 4/5] security: integrity: make evm_main "
` [PATCH 5/5] security: integrity: make ima_main "

[PATCH v5 00/38] LSM: Module stacking for SARA and Landlock
 2018-12-12 19:33 UTC  (6+ messages) - mbox.gz / Atom

[PATCH] tpm-dev: Require response to be read only if there actually is a response
 2018-12-12 17:53 UTC  (2+ messages) - mbox.gz / Atom

[PATCH] Smack: Improve documentation
 2018-12-12 17:52 UTC  (3+ messages) - mbox.gz / Atom

[PATCH v5 00/38] LSM: Module stacking for SARA and Landlock
 2018-12-12 16:05 UTC  (39+ messages) - mbox.gz / Atom
` [PATCH v5 01/38] LSM: Introduce LSM_FLAG_LEGACY_MAJOR
` [PATCH v5 02/38] LSM: Provide separate ordered initialization
` [PATCH v5 03/38] LSM: Plumb visibility into optional "enabled" state
` [PATCH v5 04/38] LSM: Lift LSM selection out of individual LSMs
` [PATCH v5 05/38] LSM: Build ordered list of LSMs to initialize
` [PATCH v5 06/38] LSM: Introduce CONFIG_LSM
` [PATCH v5 07/38] LSM: Introduce "lsm=" for boottime LSM selection
` [PATCH v5 08/38] LSM: Tie enabling logic to presence in ordered list
` [PATCH v5 09/38] LSM: Prepare for reorganizing "security=" logic
` [PATCH v5 10/38] LSM: Refactor "security=" in terms of enable/disable
` [PATCH v5 11/38] LSM: Separate idea of "major" LSM from "exclusive" LSM
` [PATCH v5 12/38] apparmor: Remove SECURITY_APPARMOR_BOOTPARAM_VALUE
` [PATCH v5 13/38] selinux: Remove SECURITY_SELINUX_BOOTPARAM_VALUE
` [PATCH v5 14/38] LSM: Add all exclusive LSMs to ordered initialization
` [PATCH v5 15/38] LSM: Split LSM preparation from initialization
` [PATCH v5 16/38] LoadPin: Initialize as ordered LSM
` [PATCH v5 17/38] Yama: "
` [PATCH v5 18/38] LSM: Introduce enum lsm_order
` [PATCH v5 19/38] capability: Initialize as LSM_ORDER_FIRST
` [PATCH v5 20/38] procfs: add smack subdir to attrs
` [PATCH v5 21/38] Smack: Abstract use of cred security blob
` [PATCH v5 22/38] SELinux: "
` [PATCH v5 23/38] SELinux: Remove cred security blob poisoning
` [PATCH v5 24/38] SELinux: Remove unused selinux_is_enabled
` [PATCH v5 25/38] AppArmor: Abstract use of cred security blob
` [PATCH v5 26/38] TOMOYO: "
` [PATCH v5 27/38] Infrastructure management of the "
` [PATCH v5 28/38] SELinux: Abstract use of file "
` [PATCH v5 29/38] Smack: "
` [PATCH v5 30/38] LSM: Infrastructure management of the file security
` [PATCH v5 31/38] SELinux: Abstract use of inode security blob
` [PATCH v5 32/38] Smack: "
` [PATCH v5 33/38] LSM: Infrastructure management of the inode security
` [PATCH v5 34/38] LSM: Infrastructure management of the task security
` [PATCH v5 35/38] SELinux: Abstract use of ipc security blobs
` [PATCH v5 36/38] Smack: "
` [PATCH v5 37/38] LSM: Infrastructure management of the ipc security blob
` [PATCH v5 38/38] TOMOYO: Update LSM flags to no longer be exclusive

Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
 2018-12-11 21:47 UTC  (4+ messages) - mbox.gz / Atom

[PATCH] ima: Use inode_is_open_for_write
 2018-12-11 13:23 UTC  (2+ messages) - mbox.gz / Atom

Security modules and sending signals within the same process
 2018-12-11 10:42 UTC  (3+ messages) - mbox.gz / Atom

[PATCH 0/7] add platform/firmware keys support for kernel verification by IMA
 2018-12-06 23:09 UTC  (3+ messages) - mbox.gz / Atom
` [PATCH 7/7] ima: Support platform keyring for kernel appraisal

page: 

Linux-Security-Module Archive on lore.kernel.org

Archives are clonable: git clone --mirror https://lore.kernel.org/linux-security-module/0 linux-security-module/git/0.git

	# If you have public-inbox 1.1+ installed, you may
	# initialize and index your mirror using the following commands:
	public-inbox-init -V2 linux-security-module linux-security-module/ https://lore.kernel.org/linux-security-module \
		linux-security-module@vger.kernel.org linux-security-module@archiver.kernel.org
	public-inbox-index linux-security-module


Newsgroup available over NNTP:
	nntp://nntp.lore.kernel.org/org.kernel.vger.linux-security-module


AGPL code for this site: git clone https://public-inbox.org/ public-inbox