linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2018-09-28 22:30:31 to 2018-10-05 17:44:07 UTC [more...]

[PATCH v5 0/6] Add support for architecture specific IMA policies
 2018-10-05 17:40 UTC  (6+ messages)
` [PATCH v5 1/5] x86/ima: define arch_ima_get_secureboot
` [PATCH v5 2/5] ima: prevent kexec_load syscall based on runtime secureboot flag
` [PATCH v5 3/5] ima: refactor ima_init_policy()
` [PATCH v5 4/5] ima: add support for arch specific policies
` [PATCH v5 5/5] x86/ima: define arch_get_ima_policy() for x86

[PATCH security-next v4 00/32] LSM: Explict LSM ordering
 2018-10-05 16:35 UTC  (91+ messages)
` [PATCH security-next v4 01/32] LSM: Correctly announce start of LSM initialization
` [PATCH security-next v4 02/32] vmlinux.lds.h: Avoid copy/paste of security_init section
` [PATCH security-next v4 03/32] LSM: Rename .security_initcall section to .lsm_info
` [PATCH security-next v4 04/32] LSM: Remove initcall tracing
` [PATCH security-next v4 05/32] LSM: Convert from initcall to struct lsm_info
` [PATCH security-next v4 06/32] vmlinux.lds.h: Move LSM_TABLE into INIT_DATA
` [PATCH security-next v4 07/32] LSM: Convert security_initcall() into DEFINE_LSM()
` [PATCH security-next v4 08/32] LSM: Record LSM name in struct lsm_info
` [PATCH security-next v4 09/32] LSM: Provide init debugging infrastructure
` [PATCH security-next v4 10/32] LSM: Don't ignore initialization failures
` [PATCH security-next v4 11/32] LSM: Introduce LSM_FLAG_LEGACY_MAJOR
` [PATCH security-next v4 12/32] LSM: Provide separate ordered initialization
` [PATCH security-next v4 13/32] LoadPin: Rename "enable" to "enforce"
` [PATCH security-next v4 14/32] LSM: Plumb visibility into optional "enabled" state
` [PATCH security-next v4 15/32] LSM: Lift LSM selection out of individual LSMs
` [PATCH security-next v4 16/32] LSM: Prepare for arbitrary LSM enabling
` [PATCH security-next v4 17/32] LSM: Introduce CONFIG_LSM_ENABLE
` [PATCH security-next v4 18/32] LSM: Introduce lsm.enable= and lsm.disable=
` [PATCH security-next v4 19/32] LSM: Prepare for reorganizing "security=" logic
` [PATCH security-next v4 20/32] LSM: Refactor "security=" in terms of enable/disable
` [PATCH security-next v4 21/32] LSM: Finalize centralized LSM enabling logic
` [PATCH security-next v4 22/32] apparmor: Remove boot parameter
` [PATCH security-next v4 23/32] selinux: "
` [PATCH security-next v4 24/32] LSM: Build ordered list of ordered LSMs for init
` [PATCH security-next v4 25/32] LSM: Introduce CONFIG_LSM_ORDER
` [PATCH security-next v4 26/32] LSM: Introduce "lsm.order=" for boottime ordering
` [PATCH security-next v4 27/32] LoadPin: Initialize as ordered LSM
` [PATCH security-next v4 28/32] Yama: "
` [PATCH security-next v4 29/32] LSM: Introduce enum lsm_order
` [PATCH security-next v4 30/32] capability: Initialize as LSM_ORDER_FIRST
` [PATCH security-next v4 31/32] LSM: Separate idea of "major" LSM from "exclusive" LSM
` [PATCH security-next v4 32/32] LSM: Add all exclusive LSMs to ordered initialization

[PATCH 00/22] KEYS: Support TPM-wrapped key and crypto ops
 2018-10-05 16:28 UTC  (11+ messages)
` [PATCH 03/22] KEYS: Provide missing asymmetric key subops for new key type ops
` [PATCH 04/22] KEYS: Make the X.509 and PKCS7 parsers supply the sig encoding type
` [PATCH 05/22] KEYS: Provide software public key query function

[PATCH] apparmor: add #ifdef checks for secmark filtering
 2018-10-05 16:11 UTC 

[PATCH v5 00/21] tpm: separate tpm 1.x and tpm 2.x commands
 2018-10-05 11:31 UTC  (35+ messages)
` [PATCH v5 01/21] tpm2: add new tpm2 commands according to TCG 1.36
` [PATCH v5 06/21] tpm: move tpm1_pcr_extend to tpm1-cmd.c
` [PATCH v5 08/21] tpm: factor out tpm1_get_random into tpm1-cmd.c
` [PATCH v5 10/21] tpm: factor out tpm 1.x pm suspend flow "
` [PATCH v5 11/21] tpm: factor out tpm_startup function
` [PATCH v5 12/21] tpm: move pcr extend code to tpm2-cmd.c
` [PATCH v5 13/21] tpm: add tpm_auto_startup() into tpm-interface.c
` [PATCH v5 17/21] tpm1: implement tpm1_pcr_read_dev() using tpm_buf structure
` [PATCH v5 18/21] tmp1: rename tpm1_pcr_read_dev to tpm1_pcr_read()
` [PATCH v5 19/21] tpm1: reimplement SAVESTATE using tpm_buf
` [PATCH v5 20/21] tpm1: reimplement tpm1_continue_selftest() "
` [PATCH v5 21/21] tpm: use u32 instead of int for PCR index

kernel BUG at security/keys/keyring.c:LINE!
 2018-10-05 11:16 UTC 

[GIT PULL] tpmdd updates for Linux 4.20
 2018-10-05 10:52 UTC 

[PATCH 00/34] VFS: Introduce filesystem context [ver #12]
 2018-10-04 18:37 UTC  (2+ messages)

[PATCH v5 0/5] LSM: Support ptrace sidechannel access checks
 2018-10-04 11:36 UTC  (7+ messages)
` [PATCH v5 2/5] Smack: Prepare for PTRACE_MODE_SCHED

[PATCH v4 00/19] LSM: Module stacking for SARA and Landlock
 2018-10-04  4:49 UTC  (9+ messages)
` [PATCH v4 14/19] LSM: Infrastructure management of the inode security
` [PATCH v4 20/19] LSM: Correct file blob free empty blob check
` [PATCH 21/19] LSM: Cleanup and fixes from Tetsuo Handa

[PATCH 15/16] apparmor: Replace spin_is_locked() with lockdep
 2018-10-03  5:56 UTC  (2+ messages)

general protection fault in rb_erase
 2018-10-02 23:40 UTC  (2+ messages)

Leaking Path in XFS's ioctl interface(missing LSM check)
 2018-10-02 22:42 UTC  (11+ messages)

LSM mailing list archive at Lore
 2018-10-02 19:32 UTC 

[PATCH security-next v3 00/29] LSM: Explict LSM ordering
 2018-10-01 23:57 UTC  (69+ messages)
` [PATCH security-next v3 01/29] LSM: Correctly announce start of LSM initialization
` [PATCH security-next v3 02/29] vmlinux.lds.h: Avoid copy/paste of security_init section
` [PATCH security-next v3 03/29] LSM: Rename .security_initcall section to .lsm_info
` [PATCH security-next v3 04/29] LSM: Remove initcall tracing
` [PATCH security-next v3 05/29] LSM: Convert from initcall to struct lsm_info
` [PATCH security-next v3 06/29] vmlinux.lds.h: Move LSM_TABLE into INIT_DATA
` [PATCH security-next v3 07/29] LSM: Convert security_initcall() into DEFINE_LSM()
` [PATCH security-next v3 08/29] LSM: Record LSM name in struct lsm_info
` [PATCH security-next v3 09/29] LSM: Provide init debugging infrastructure
` [PATCH security-next v3 10/29] LSM: Don't ignore initialization failures
` [PATCH security-next v3 11/29] LSM: Introduce LSM_FLAG_LEGACY_MAJOR
` [PATCH security-next v3 12/29] LSM: Provide separate ordered initialization
` [PATCH security-next v3 13/29] LoadPin: Rename "enable" to "enforce"
` [PATCH security-next v3 14/29] LSM: Plumb visibility into optional "enabled" state
` [PATCH security-next v3 15/29] LSM: Lift LSM selection out of individual LSMs
` [PATCH security-next v3 16/29] LSM: Prepare for arbitrary LSM enabling
` [PATCH security-next v3 17/29] LSM: Introduce CONFIG_LSM_ENABLE
` [PATCH security-next v3 18/29] LSM: Introduce lsm.enable= and lsm.disable=
` [PATCH security-next v3 19/29] LSM: Prepare for reorganizing "security=" logic

[PATCH] apparmor: Fix uninitialized value in aa_split_fqname
 2018-10-01 20:25 UTC  (2+ messages)

[PATCH 0/3] namei: implement various scoping AT_* flags
 2018-10-01 20:14 UTC  (2+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).