linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2018-09-07 21:09:10 to 2018-09-17 23:28:24 UTC [more...]

[PATCH 00/18] LSM: Prepare for explict LSM ordering
 2018-09-17 23:28 UTC  (40+ messages)
` [PATCH 01/18] vmlinux.lds.h: Avoid copy/paste of security_init section
` [PATCH 02/18] LSM: Rename .security_initcall section to .lsm_info
` [PATCH 03/18] LSM: Remove initcall tracing
` [PATCH 04/18] LSM: Convert from initcall to struct lsm_info
` [PATCH 05/18] vmlinux.lds.h: Move LSM_TABLE into INIT_DATA
` [PATCH 06/18] LSM: Convert security_initcall() into DEFINE_LSM()
` [PATCH 07/18] LSM: Add minor LSM initialization loop
` [PATCH 08/18] integrity: Initialize as LSM_TYPE_MINOR
` [PATCH 09/18] LSM: Record LSM name in struct lsm_info
` [PATCH 10/18] LSM: Plumb visibility into optional "enabled" state
` [PATCH 11/18] LSM: Lift LSM selection out of individual LSMs
` [PATCH 12/18] LSM: Introduce ordering details in struct lsm_info
` [PATCH 13/18] LoadPin: Initialize as LSM_TYPE_MINOR
` [PATCH 14/18] Yama: "
` [PATCH 15/18] capability: "
` [PATCH 16/18] LSM: Allow arbitrary LSM ordering
` [PATCH 17/18] LSM: Provide init debugging
` [PATCH 18/18] LSM: Don't ignore initialization failures

[RFC 00/12] Multi-Key Total Memory Encryption API (MKTME)
 2018-09-17 22:34 UTC  (53+ messages)
` [RFC 02/12] mm: Generalize the mprotect implementation to support extensions
` [RFC 03/12] syscall/x86: Wire up a new system call for memory encryption keys
` [RFC 04/12] x86/mm: Add helper functions to manage "
` [RFC 05/12] x86/mm: Add a helper function to set keyid bits in encrypted VMA's
` [RFC 07/12] x86/mm: Add helper functions to track "
` [RFC 08/12] mm: Track VMA's in use for each memory encryption keyid
` [RFC 09/12] mm: Restrict memory encryption to anonymous VMA's
` [RFC 10/12] x86/pconfig: Program memory encryption keys on a system-wide basis
` [RFC 11/12] keys/mktme: Add a new key service type for memory encryption keys
` [RFC 12/12] keys/mktme: Do not revoke in use "
  ` [RFC 01/12] docs/x86: Document the Multi-Key Total Memory Encryption API
  ` [RFC 06/12] mm: Add the encrypt_mprotect() system call

[PATCH v6 0/2] tpm: add support for nonblocking operation
 2018-09-17 21:27 UTC  (9+ messages)
` [PATCH v6 1/2] tpm: add ptr to the tpm_space struct to file_priv
` [PATCH v6 2/2] tpm: add support for nonblocking operation

[PATCH v2 3/3] tpm: retrieve digest size of unknown algorithms with PCR read
 2018-09-17 21:16 UTC  (2+ messages)

[PATCH v2, RESEND 0/3] tpm: retrieve digest size of unknown algorithms from TPM
 2018-09-17  9:38 UTC  (4+ messages)
` [PATCH v2, RESEND 1/3] tpm: rename and export tpm2_digest and tpm2_algorithms
` [PATCH v2, RESEND 2/3] tpm: modify tpm_pcr_read() definition to pass TPM hash algorithms
` [PATCH v2, RESEND 3/3] tpm: retrieve digest size of unknown algorithms with PCR read

[PATCH v2 00/10] LSM: Module stacking in support of S.A.R.A and Landlock
 2018-09-16 17:45 UTC  (56+ messages)
` [PATCH 01/10] procfs: add smack subdir to attrs
` [PATCH 02/10] Smack: Abstract use of cred security blob
` [PATCH 03/10] SELinux: "
` [PATCH 04/10] LSM: Infrastructure management of the "
` [PATCH 05/10] SELinux: Abstract use of file "
` [PATCH 06/10] LSM: Infrastructure management of the "
` [PATCH 07/10] SELinux: Abstract use of inode "
` [PATCH 08/10] Smack: "
` [PATCH 09/10] LSM: Infrastructure management of the inode security
` [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock

[PATCH v2 0/6] Add support for architecture specific IMA policies
 2018-09-14 13:50 UTC  (8+ messages)
` [PATCH v2 1/6] ima: define arch_ima_get_secureboot
` [PATCH v2 2/6] ima: prevent kexec_load syscall based on runtime secureboot flag
` [PATCH v2 3/6] ima: refactor ima_init_policy()
` [PATCH v2 4/6] ima: add support for arch specific policies
` [PATCH v2 5/6] ima: add support for external setting of ima_appraise
` [PATCH v2 6/6] x86/ima: define arch_get_ima_policy() for x86

[PATCH 0/3] keyutils: request_key and DNS resolver changes
 2018-09-13 14:08 UTC  (4+ messages)
` [PATCH 1/3] request-key: Provide a command line option to suppress execution
` [PATCH 2/3] request-key: Find best match rather than first match
` [PATCH 3/3] Remove the dependency on MIT Kerberos

[PATCH -next] Smack: remove set but not used variable 'root_inode'
 2018-09-13 13:18 UTC 

[PATCH 3/6] selinux: convert to kvmalloc
 2018-09-13  2:27 UTC  (4+ messages)

Compliment of the day to you Dear Friend
 2018-09-13  1:28 UTC 

[PATCH 1/3] selinux: make dentry_init_security() return security module name
 2018-09-12  1:14 UTC  (8+ messages)

Containers and checkpoint/restart micro-conference at LPC2018
 2018-09-11 15:36 UTC  (6+ messages)
      ` Overlayfs @ "

INFO: rcu detected stall in pppol2tp_sendmsg
 2018-09-11  6:06 UTC 

[PATCH resend] uapi/linux/keyctl.h: don't use C++ reserved keyword as a struct member name
 2018-09-10 22:09 UTC  (3+ messages)

[PATCH v5 0/2] tpm: add support for nonblocking operation
 2018-09-10 17:23 UTC  (4+ messages)

next-20180906 crashes during ubifs_mount (legacy fs_context)
 2018-09-08 15:58 UTC  (2+ messages)

[PATCH 00/22] KEYS: Support TPM-wrapped key and crypto ops
 2018-09-08 15:26 UTC  (4+ messages)

[PATCH] apparmor: Fix network performance issue in aa_label_sk_perm
 2018-09-07 23:53 UTC  (3+ messages)

[PATCH 4.9 41/63] Replace magic for trusting the secondary keyring with #define
 2018-09-07 21:10 UTC  (2+ messages)
` [PATCH 4.9 42/63] Fix kexec forbidding kernels signed with keys in the secondary keyring to boot

[PATCH 4.14 16/89] Replace magic for trusting the secondary keyring with #define
 2018-09-07 21:09 UTC  (2+ messages)
` [PATCH 4.14 17/89] Fix kexec forbidding kernels signed with keys in the secondary keyring to boot


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).