December 2018 Archives by thread
Starting: Sat Dec 1 15:49:12 UTC 2018
Ending: Mon Dec 31 04:18:38 UTC 2018
Messages: 379
- LSM hook for module loading and unloading
Tamir Carmeli
- [PATCH v5 2/7] tpm: remove definition of TPM2_ACTIVE_PCR_BANKS
Roberto Sassu
- [RFC v2 00/13] Multi-Key Total Memory Encryption API (MKTME)
Alison Schofield
- [RFC v2 01/13] x86/mktme: Document the MKTME APIs
Alison Schofield
- [RFC v2 02/13] mm: Generalize the mprotect implementation to support extensions
Alison Schofield
- [RFC v2 03/13] syscall/x86: Wire up a new system call for memory encryption keys
Alison Schofield
- [RFC v2 04/13] x86/mm: Add helper functions for MKTME memory encryption keys
Alison Schofield
- [RFC v2 05/13] x86/mm: Set KeyIDs in encrypted VMAs
Alison Schofield
- [RFC v2 07/13] x86/mm: Add helpers for reference counting encrypted VMAs
Alison Schofield
- [RFC v2 08/13] mm: Use reference counting for encrypted VMAs
Alison Schofield
- [RFC v2 09/13] mm: Restrict memory encryption to anonymous VMA's
Alison Schofield
- [RFC v2 10/13] keys/mktme: Add the MKTME Key Service type for memory encryption
Alison Schofield
- [RFC v2 11/13] keys/mktme: Program memory encryption keys on a system wide basis
Alison Schofield
- [RFC v2 12/13] keys/mktme: Save MKTME data if kernel cmdline parameter allows
Alison Schofield
- [RFC v2 13/13] keys/mktme: Support CPU Hotplug for MKTME keys
Alison Schofield
- [RFC v2 00/13] Multi-Key Total Memory Encryption API (MKTME)
Peter Zijlstra
- [RFC v2 00/13] Multi-Key Total Memory Encryption API (MKTME)
Andy Lutomirski
- [RFC v2 00/13] Multi-Key Total Memory Encryption API (MKTME)
Andy Lutomirski
- [RFC v2 00/13] Multi-Key Total Memory Encryption API (MKTME)
Sakkinen, Jarkko
- [RFC v2 00/13] Multi-Key Total Memory Encryption API (MKTME)
Huang, Kai
- [RFC v2 00/13] Multi-Key Total Memory Encryption API (MKTME)
Jarkko Sakkinen
- [RFC v2 00/13] Multi-Key Total Memory Encryption API (MKTME)
Kirill A. Shutemov
- [RFC v2 00/13] Multi-Key Total Memory Encryption API (MKTME)
Sakkinen, Jarkko
- [RFC v2 00/13] Multi-Key Total Memory Encryption API (MKTME)
Sakkinen, Jarkko
- [RFC v2 00/13] Multi-Key Total Memory Encryption API (MKTME)
Andy Lutomirski
- [RFC v2 00/13] Multi-Key Total Memory Encryption API (MKTME)
Huang, Kai
- [RFC v2 00/13] Multi-Key Total Memory Encryption API (MKTME)
Sakkinen, Jarkko
- [RFC v2 00/13] Multi-Key Total Memory Encryption API (MKTME)
Sakkinen, Jarkko
- [RFC v2 00/13] Multi-Key Total Memory Encryption API (MKTME)
Andy Lutomirski
- [RFC v2 00/13] Multi-Key Total Memory Encryption API (MKTME)
Sakkinen, Jarkko
- [RFC v2 00/13] Multi-Key Total Memory Encryption API (MKTME)
Huang, Kai
- [RFC v2 00/13] Multi-Key Total Memory Encryption API (MKTME)
Sakkinen, Jarkko
- [RFC v2 00/13] Multi-Key Total Memory Encryption API (MKTME)
Sakkinen, Jarkko
- [RFC v2 00/13] Multi-Key Total Memory Encryption API (MKTME)
Huang, Kai
- [RFC v2 00/13] Multi-Key Total Memory Encryption API (MKTME)
Eric Rannaud
- [RFC v2 00/13] Multi-Key Total Memory Encryption API (MKTME)
Dave Hansen
- [RFC v2 00/13] Multi-Key Total Memory Encryption API (MKTME)
Sakkinen, Jarkko
- [RFC v2 06/13] mm: Add the encrypt_mprotect() system call
Alison Schofield
- [PATCH v6 0/7] tpm: retrieve digest size of unknown algorithms from TPM
Roberto Sassu
- [PATCH 10/17] prmem: documentation
Igor Stoppa
- [PATCH v8 00/14] Appended signatures support for IMA appraisal
James Morris
- [PATCH v5 00/38] LSM: Module stacking for SARA and Landlock
Kees Cook
- [PATCH] selftests: add TPM 2.0 tests
Jarkko Sakkinen
- [PATCH v7 00/14] x86/alternative: text_poke() enhancements
Nadav Amit
- [PATCH v7 01/14] Fix "x86/alternatives: Lockdep-enforce text_mutex in text_poke*()"
Nadav Amit
- [PATCH v7 02/14] x86/jump_label: Use text_poke_early() during early init
Nadav Amit
- [PATCH v7 03/14] x86/mm: temporary mm struct
Nadav Amit
- [PATCH v7 04/14] fork: provide a function for copying init_mm
Nadav Amit
- [PATCH v7 05/14] x86/alternative: initializing temporary mm for patching
Nadav Amit
- [PATCH v7 06/14] x86/alternative: use temporary mm for text poking
Nadav Amit
- [PATCH v7 07/14] x86/kgdb: avoid redundant comparison of patched code
Nadav Amit
- [PATCH v7 08/14] x86/ftrace: Use text_poke_*() infrastructure
Nadav Amit
- [PATCH v7 09/14] x86/kprobes: Instruction pages initialization enhancements
Nadav Amit
- [PATCH v7 10/14] x86: avoid W^X being broken during modules loading
Nadav Amit
- [PATCH v7 11/14] x86/jump-label: remove support for custom poker
Nadav Amit
- [PATCH v7 12/14] x86/alternative: Remove the return value of text_poke_*()
Nadav Amit
- [PATCH v7 13/14] module: Do not set nx for module memory before freeing
Nadav Amit
- [PATCH v7 14/14] module: Prevent module removal racing with text_poke()
Nadav Amit
- linux-next: manual merge of the selinux tree with the vfs tree
Casey Schaufler
- [PATCH] LSM: add SafeSetID module that gates setid calls
Kees Cook
- [PATCH] tpm-dev: Require response to be read only if there actually is a response
Alexander Steffen
- [PATCH] KEYS: fix parsing invalid pkey info string
Eric Biggers
- [PATCH v2] KEYS: always initialize keyring_index_key::desc_len
Eric Biggers
- [PATCH 7/7] ima: Support platform keyring for kernel appraisal
Serge E. Hallyn
- Urgently need money? We can help you!
Mr. Muller Dieter
- [PATCH v2 0/7] add platform/firmware keys support for kernel verification by IMA
Nayna Jain
- [PATCH 0/5] security: remove needless usage of module header
Paul Gortmaker
- [PATCH 1/5] security: audit and remove any unnecessary uses of module.h
Paul Gortmaker
- Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
Ken Goldman
- [PATCH] ima: Use inode_is_open_for_write
Nikolay Borisov
- Security modules and sending signals within the same process
Florian Weimer
- [PATCH v5 00/38] LSM: Module stacking for SARA and Landlock
Casey Schaufler
- [PATCH v5 02/38] LSM: Provide separate ordered initialization
Casey Schaufler
- [PATCH v5 03/38] LSM: Plumb visibility into optional "enabled" state
Casey Schaufler
- [PATCH v5 04/38] LSM: Lift LSM selection out of individual LSMs
Casey Schaufler
- [PATCH v5 05/38] LSM: Build ordered list of LSMs to initialize
Casey Schaufler
- [PATCH v5 06/38] LSM: Introduce CONFIG_LSM
Casey Schaufler
- [PATCH v5 07/38] LSM: Introduce "lsm=" for boottime LSM selection
Casey Schaufler
- [PATCH v5 08/38] LSM: Tie enabling logic to presence in ordered list
Casey Schaufler
- [PATCH v5 09/38] LSM: Prepare for reorganizing "security=" logic
Casey Schaufler
- [PATCH v5 10/38] LSM: Refactor "security=" in terms of enable/disable
Casey Schaufler
- [PATCH v5 11/38] LSM: Separate idea of "major" LSM from "exclusive" LSM
Casey Schaufler
- [PATCH v5 12/38] apparmor: Remove SECURITY_APPARMOR_BOOTPARAM_VALUE
Casey Schaufler
- [PATCH v5 13/38] selinux: Remove SECURITY_SELINUX_BOOTPARAM_VALUE
Casey Schaufler
- [PATCH v5 14/38] LSM: Add all exclusive LSMs to ordered initialization
Casey Schaufler
- [PATCH v5 15/38] LSM: Split LSM preparation from initialization
Casey Schaufler
- [PATCH v5 16/38] LoadPin: Initialize as ordered LSM
Casey Schaufler
- [PATCH v5 17/38] Yama: Initialize as ordered LSM
Casey Schaufler
- [PATCH v5 18/38] LSM: Introduce enum lsm_order
Casey Schaufler
- [PATCH v5 19/38] capability: Initialize as LSM_ORDER_FIRST
Casey Schaufler
- [PATCH v5 20/38] procfs: add smack subdir to attrs
Casey Schaufler
- [PATCH v5 21/38] Smack: Abstract use of cred security blob
Casey Schaufler
- [PATCH v5 22/38] SELinux: Abstract use of cred security blob
Casey Schaufler
- [PATCH v5 23/38] SELinux: Remove cred security blob poisoning
Casey Schaufler
- [PATCH v5 24/38] SELinux: Remove unused selinux_is_enabled
Casey Schaufler
- [PATCH v5 25/38] AppArmor: Abstract use of cred security blob
Casey Schaufler
- [PATCH v5 26/38] TOMOYO: Abstract use of cred security blob
Casey Schaufler
- [PATCH v5 27/38] Infrastructure management of the cred security blob
Casey Schaufler
- [PATCH v5 28/38] SELinux: Abstract use of file security blob
Casey Schaufler
- [PATCH v5 29/38] Smack: Abstract use of file security blob
Casey Schaufler
- [PATCH v5 30/38] LSM: Infrastructure management of the file security
Casey Schaufler
- [PATCH v5 31/38] SELinux: Abstract use of inode security blob
Casey Schaufler
- [PATCH v5 32/38] Smack: Abstract use of inode security blob
Casey Schaufler
- [PATCH v5 33/38] LSM: Infrastructure management of the inode security
Casey Schaufler
- [PATCH v5 34/38] LSM: Infrastructure management of the task security
Casey Schaufler
- [PATCH v5 35/38] SELinux: Abstract use of ipc security blobs
Casey Schaufler
- [PATCH v5 36/38] Smack: Abstract use of ipc security blobs
Casey Schaufler
- [PATCH v5 37/38] LSM: Infrastructure management of the ipc security blob
Casey Schaufler
- [RFC PATCH v1 0/5] Add support for O_MAYEXEC
Mickaël Salaün
- [RFC PATCH v1 2/5] fs: Add a MAY_EXECMOUNT flag to infer the noexec mount propertie
Mickaël Salaün
- Lets Work Together
Mr Peter OWEN
- [PATCH] Smack: Improve documentation
José Bollo
- SELinux testsuite failure in overlayfs with v4.20-rc kernels
James Morris
- [PATCH] integrity: Remove references to module keyring
Thiago Jung Bauermann
- [PATCH v9 00/14] Appended signatures support for IMA appraisal
Thiago Jung Bauermann
- [PATCH v7 0/5] tpm: retrieve digest size of unknown algorithms from TPM
Roberto Sassu
- [PATCH v4 1/6] tpm: dynamically allocate active_banks array
Ken Goldman
- [PULL] Smack: Changes for 4.21
Casey Schaufler
- [PATCH] [PATCH] LSM: generalize flag passing to security_capable
Micah Morton
- [GIT PULL] linux-integrity patches for Linux 4.21
Mimi Zohar
- [PATCH -next] evm: CHECK-remove set but not used variable 'xattr'
YueHaibing
- [PATCH 3/7] selinux: convert to kvmalloc
Kent Overstreet
- [GIT PULL] tpmdd updates for Linux v4.21
Jarkko Sakkinen
- <<<Good Day To You Sir>>
Mr Owen Peter
- INFO: rcu detected stall in sys_sendfile64
syzbot
- Recent VFS/LSM patches cause Kernel panic - not syncing: Can't create rootfs
Dexuan Cui
- [PATCH] smack: Fix a memory leak in smack_add_opt()
Dan Carpenter
- [PATCH v18 19/25] x86/sgx: Add provisioning
Jarkko Sakkinen
- [PATCH][next] smack: fix two memory leaks in smack_add_opt
Colin King
- [PATCH v18 19/25] x86/sgx: Add provisioning
Jarkko Sakkinen
- [GIT PULL] SELinux patches v4.21
Paul Moore
- [GIT PULL] security: general updates for v4.21
James Morris
- [GIT PULL] security: general updates for v4.21
Linus Torvalds
- ALLIANCE LOAN OFFER/PROJECT FUNDING
FUND ALLIANCE INTERNATIONAL
- [GIT PULL] security: integrity updates for v4.21
James Morris
- [GIT PULL] security: seccomp changes for v4.21
James Morris
- [GIT PULL] security: Smack changes for v4.21
James Morris
- [GIT PULL] security: TPM changes for v4.21
James Morris
Last message date:
Mon Dec 31 04:18:38 UTC 2018
Archived on: Mon Dec 31 04:18:42 UTC 2018
This archive was generated by
Pipermail 0.09 (Mailman edition).