linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2018-11-20 13:08:38 to 2018-12-04 12:34:45 UTC [more...]

[RFC v1 PATCH 00/17] prmem: protected memory
 2018-12-04 12:34 UTC  (24+ messages)
` [PATCH 10/17] prmem: documentation

[RFC v2 00/13] Multi-Key Total Memory Encryption API (MKTME)
 2018-12-04  9:50 UTC  (24+ messages)
` [RFC v2 01/13] x86/mktme: Document the MKTME APIs
` [RFC v2 02/13] mm: Generalize the mprotect implementation to support extensions
` [RFC v2 03/13] syscall/x86: Wire up a new system call for memory encryption keys
` [RFC v2 04/13] x86/mm: Add helper functions for MKTME "
` [RFC v2 05/13] x86/mm: Set KeyIDs in encrypted VMAs
` [RFC v2 06/13] mm: Add the encrypt_mprotect() system call
` [RFC v2 07/13] x86/mm: Add helpers for reference counting encrypted VMAs
` [RFC v2 08/13] mm: Use reference counting for "
` [RFC v2 09/13] mm: Restrict memory encryption to anonymous VMA's
` [RFC v2 10/13] keys/mktme: Add the MKTME Key Service type for memory encryption
` [RFC v2 11/13] keys/mktme: Program memory encryption keys on a system wide basis
` [RFC v2 12/13] keys/mktme: Save MKTME data if kernel cmdline parameter allows
` [RFC v2 13/13] keys/mktme: Support CPU Hotplug for MKTME keys

[PATCH v6 0/7] tpm: retrieve digest size of unknown algorithms from TPM
 2018-12-04  8:21 UTC  (8+ messages)
` [PATCH v6 1/7] tpm: dynamically allocate the allocated_banks array
` [PATCH v6 2/7] tpm: add _head suffix to tcg_efi_specid_event and tcg_pcr_event2
` [PATCH v6 3/7] tpm: rename and export tpm2_digest and tpm2_algorithms
` [PATCH v6 4/7] tpm: modify tpm_pcr_read() definition to pass a TPM hash algorithm
` [PATCH v6 5/7] tpm: retrieve digest size of unknown algorithms with PCR read
` [PATCH v6 6/7] tpm: ensure that the output of PCR read contains the correct digest size
` [PATCH v6 7/7] tpm: pass an array of tpm_bank_list structures to tpm_pcr_extend()

LSM hook for module loading and unloading
 2018-12-04  1:51 UTC  (4+ messages)

[PATCH v5 0/7] tpm: retrieve digest size of unknown algorithms from TPM
 2018-12-03 17:31 UTC  (21+ messages)
` [PATCH v5 2/7] tpm: remove definition of TPM2_ACTIVE_PCR_BANKS
` [PATCH v5 6/7] tpm: ensure that the output of PCR read contains the correct digest size

Security modules and sending signals within the same process
 2018-11-30 23:38 UTC  (5+ messages)
  ` [apparmor] "

[PATCH v6 00/10] x86/alternative: text_poke() fixes
 2018-11-30  2:32 UTC  (16+ messages)
` [PATCH v6 01/10] Fix "x86/alternatives: Lockdep-enforce text_mutex in text_poke*()"
` [PATCH v6 02/10] x86/jump_label: Use text_poke_early() during early init
` [PATCH v6 03/10] x86/mm: temporary mm struct
` [PATCH v6 04/10] fork: provide a function for copying init_mm
` [PATCH v6 05/10] x86/alternative: initializing temporary mm for patching
` [PATCH v6 06/10] x86/alternative: use temporary mm for text poking
` [PATCH v6 07/10] x86/kgdb: avoid redundant comparison of patched code
` [PATCH v6 08/10] x86: avoid W^X being broken during modules loading
` [PATCH v6 09/10] x86/jump-label: remove support for custom poker
` [PATCH v6 10/10] x86/alternative: remove the return value of text_poke_*()

linux-next: manual merge of the selinux tree with the vfs tree
 2018-11-30  1:36 UTC  (3+ messages)

[GIT PULL] SELinux fixes for v4.20 (#2)
 2018-11-29 23:10 UTC  (2+ messages)

[PATCH v8 00/14] Appended signatures support for IMA appraisal
 2018-11-29 20:59 UTC  (3+ messages)
` [PATCH v8 04/14] integrity: Introduce struct evm_xattr

general protection fault in keyctl_pkey_params_get
 2018-11-28 23:20 UTC  (3+ messages)
` [PATCH] KEYS: fix parsing invalid pkey info string

kernel BUG at security/keys/keyring.c:LINE!
 2018-11-28 23:19 UTC  (3+ messages)
` [PATCH v2] KEYS: always initialize keyring_index_key::desc_len

[PATCH] selinux: always allow mounting submounts
 2018-11-28 17:38 UTC  (3+ messages)

[PATCH 0/7] add platform/firmware keys support for kernel verification by IMA
 2018-11-28 16:45 UTC  (11+ messages)
` [PATCH 1/7] integrity: Define a trusted platform keyring
` [PATCH 2/7] integrity: Load certs to the "
` [PATCH 3/7] efi: Add EFI signature data types
` [PATCH 4/7] efi: Add an EFI signature blob parser
` [PATCH 5/7] efi: Import certificates from UEFI Secure Boot
` [PATCH 6/7] efi: Allow the "db" UEFI variable to be suppressed
` [PATCH 7/7] ima: Support platform keyring for kernel appraisal

[PATCH v9 00/17] Removed nested TPM operations
 2018-11-27 23:41 UTC  (11+ messages)
` [PATCH v9 04/17] tpm: print tpm2_commit_space() error inside tpm2_commit_space()
` [PATCH v9 05/17] tpm: declare struct tpm_header

[PATCH v6] tpm: add support for partial reads
 2018-11-27 23:36 UTC  (3+ messages)

[PATCH] selftests: add TPM 2.0 tests
 2018-11-27 23:15 UTC  (7+ messages)

[RFC PATCH] smack: fix access permissions for keyring
 2018-11-27 20:18 UTC  (2+ messages)

[PATCH v5 00/38] LSM: Module stacking for SARA and Landlock
 2018-11-27 19:27 UTC  (42+ messages)
` [PATCH v5 01/38] LSM: Introduce LSM_FLAG_LEGACY_MAJOR
` [PATCH v5 02/38] LSM: Provide separate ordered initialization
` [PATCH v5 03/38] LSM: Plumb visibility into optional "enabled" state
` [PATCH v5 04/38] LSM: Lift LSM selection out of individual LSMs
` [PATCH v5 05/38] LSM: Build ordered list of LSMs to initialize
` [PATCH v5 06/38] LSM: Introduce CONFIG_LSM
` [PATCH v5 07/38] LSM: Introduce "lsm=" for boottime LSM selection
` [PATCH v5 08/38] LSM: Tie enabling logic to presence in ordered list
` [PATCH v5 09/38] LSM: Prepare for reorganizing "security=" logic
` [PATCH v5 10/38] LSM: Refactor "security=" in terms of enable/disable
` [PATCH v5 11/38] LSM: Separate idea of "major" LSM from "exclusive" LSM
` [PATCH v5 12/38] apparmor: Remove SECURITY_APPARMOR_BOOTPARAM_VALUE
` [PATCH v5 13/38] selinux: Remove SECURITY_SELINUX_BOOTPARAM_VALUE
` [PATCH v5 14/38] LSM: Add all exclusive LSMs to ordered initialization
` [PATCH v5 15/38] LSM: Split LSM preparation from initialization
` [PATCH v5 16/38] LoadPin: Initialize as ordered LSM
` [PATCH v5 17/38] Yama: "
` [PATCH v5 18/38] LSM: Introduce enum lsm_order
` [PATCH v5 19/38] capability: Initialize as LSM_ORDER_FIRST
` [PATCH v5 20/38] procfs: add smack subdir to attrs
` [PATCH v5 21/38] Smack: Abstract use of cred security blob
` [PATCH v5 22/38] SELinux: "
` [PATCH v5 23/38] SELinux: Remove cred security blob poisoning
` [PATCH v5 24/38] SELinux: Remove unused selinux_is_enabled
` [PATCH v5 25/38] AppArmor: Abstract use of cred security blob
` [PATCH v5 26/38] TOMOYO: "
` [PATCH v5 27/38] Infrastructure management of the "
` [PATCH v5 28/38] SELinux: Abstract use of file "
` [PATCH v5 29/38] Smack: "
` [PATCH v5 30/38] LSM: Infrastructure management of the file security
` [PATCH v5 31/38] SELinux: Abstract use of inode security blob
` [PATCH v5 32/38] Smack: "
` [PATCH v5 33/38] LSM: Infrastructure management of the inode security
` [PATCH v5 34/38] LSM: Infrastructure management of the task security
` [PATCH v5 35/38] SELinux: Abstract use of ipc security blobs
` [PATCH v5 36/38] Smack: "
` [PATCH v5 37/38] LSM: Infrastructure management of the ipc security blob
` [PATCH v5 38/38] TOMOYO: Update LSM flags to no longer be exclusive

[RFC][PATCH] fs: set xattrs in initramfs from regular files
 2018-11-26 18:14 UTC  (11+ messages)

[PATCH] LSM: add SafeSetID module that gates setid calls
 2018-11-21 16:54 UTC  (2+ messages)

[GIT PULL] Kernel lockdown for secure boot
 2018-11-21 12:05 UTC  (3+ messages)
` [PATCH next-lockdown 0/1] debugfs EPERM fix for 'Kernel lockdown for secure boot' patch series
  ` [PATCH next-lockdown 1/1] debugfs: avoid EPERM when no open file operation defined

Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
 2018-11-21  9:14 UTC  (31+ messages)
                          ` EXTERNAL: "

[PATCH v5] tpm: add support for partial reads
 2018-11-21  6:45 UTC  (8+ messages)

[PATCH security-next v5 00/30] LSM: Explict ordering
 2018-11-20 23:36 UTC  (15+ messages)

[PATCH v5 00/10] x86/alternative: text_poke() fixes
 2018-11-20 18:52 UTC  (8+ messages)
` [PATCH v5 02/10] x86/jump_label: Use text_poke_early() during early init


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).