linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2018-10-02 21:38:12 to 2018-10-12 15:06:03 UTC [more...]

undefined behavior (-Wvarargs) in security/keys/trusted.c#TSS_authhmac()
 2018-10-12 15:05 UTC  (7+ messages)
    ` [PATCH] KEYS: trusted: fix -Wvarags warning

[PATCH security-next v5 00/30] LSM: Explict ordering
 2018-10-12 11:31 UTC  (44+ messages)
` [PATCH security-next v5 01/30] LSM: Correctly announce start of LSM initialization
` [PATCH security-next v5 02/30] vmlinux.lds.h: Avoid copy/paste of security_init section
` [PATCH security-next v5 03/30] LSM: Rename .security_initcall section to .lsm_info
` [PATCH security-next v5 04/30] LSM: Remove initcall tracing
` [PATCH security-next v5 05/30] LSM: Convert from initcall to struct lsm_info
` [PATCH security-next v5 06/30] vmlinux.lds.h: Move LSM_TABLE into INIT_DATA
` [PATCH security-next v5 07/30] LSM: Convert security_initcall() into DEFINE_LSM()
` [PATCH security-next v5 08/30] LSM: Record LSM name in struct lsm_info
` [PATCH security-next v5 09/30] LSM: Provide init debugging infrastructure
` [PATCH security-next v5 10/30] LSM: Don't ignore initialization failures
` [PATCH security-next v5 11/30] LSM: Introduce LSM_FLAG_LEGACY_MAJOR
` [PATCH security-next v5 12/30] LSM: Provide separate ordered initialization
` [PATCH security-next v5 13/30] LoadPin: Rename boot param "enabled" to "enforce"
` [PATCH security-next v5 14/30] LSM: Plumb visibility into optional "enabled" state
` [PATCH security-next v5 15/30] LSM: Lift LSM selection out of individual LSMs
` [PATCH security-next v5 16/30] LSM: Build ordered list of LSMs to initialize
` [PATCH security-next v5 17/30] LSM: Introduce CONFIG_LSM
` [PATCH security-next v5 18/30] LSM: Introduce "lsm=" for boottime LSM selection
` [PATCH security-next v5 19/30] LSM: Tie enabling logic to presence in ordered list
` [PATCH security-next v5 20/30] LSM: Prepare for reorganizing "security=" logic
` [PATCH security-next v5 21/30] LSM: Refactor "security=" in terms of enable/disable
` [PATCH security-next v5 22/30] LSM: Separate idea of "major" LSM from "exclusive" LSM
` [PATCH security-next v5 23/30] apparmor: Remove SECURITY_APPARMOR_BOOTPARAM_VALUE
` [PATCH security-next v5 24/30] selinux: Remove SECURITY_SELINUX_BOOTPARAM_VALUE
` [PATCH security-next v5 25/30] LSM: Add all exclusive LSMs to ordered initialization
` [PATCH security-next v5 26/30] LSM: Split LSM preparation from initialization
` [PATCH security-next v5 27/30] LoadPin: Initialize as ordered LSM
` [PATCH security-next v5 28/30] Yama: "
` [PATCH security-next v5 29/30] LSM: Introduce enum lsm_order
` [PATCH security-next v5 30/30] capability: Initialize as LSM_ORDER_FIRST

[PATCH v5 00/21] tpm: separate tpm 1.x and tpm 2.x commands
 2018-10-12  9:31 UTC  (23+ messages)
` [PATCH v5 03/21] tpm: factor out tpm 1.x duration calculation to tpm1-cmd.c
` [PATCH v5 05/21] tpm: factor out tpm_get_timeouts()
` [PATCH v5 06/21] tpm: move tpm1_pcr_extend to tpm1-cmd.c
` [PATCH v5 12/21] tpm: move pcr extend code to tpm2-cmd.c

[PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
 2018-10-12  1:02 UTC  (26+ messages)

[RFC] proposal for resolving the cred_guard_mutex deadlock
 2018-10-11 21:13 UTC 

[GIT PULL] linux-integrity patches for Linux 4.20
 2018-10-11 19:33 UTC 

[PATCH -next] KEYS: trusted: remove set but not used variable ''
 2018-10-11  7:06 UTC 

[bug report] apparmor: Parse secmark policy
 2018-10-10 16:04 UTC  (2+ messages)

enquiry 10-10-2018
 2018-10-10  6:59 UTC 

[PATCH 00/22] KEYS: Support TPM-wrapped key and crypto ops [ver #2]
 2018-10-09 19:26 UTC  (24+ messages)
` [PATCH 01/22] KEYS: Provide key type operations for asymmetric key "
` [PATCH 02/22] KEYS: Provide keyctls to drive the new key type ops for asymmetric keys "
` [PATCH 03/22] KEYS: Provide missing asymmetric key subops for new key type ops "
` [PATCH 04/22] KEYS: Make the X.509 and PKCS7 parsers supply the sig encoding type "
` [PATCH 05/22] KEYS: Provide software public key query function "
` [PATCH 06/22] KEYS: Allow the public_key struct to hold a private key "
` [PATCH 07/22] KEYS: Implement encrypt, decrypt and sign for software asymmetric "
` [PATCH 08/22] KEYS: Implement PKCS#8 RSA Private Key parser "
` [PATCH 09/22] crypto: rsa-pkcs1pad: Allow hash to be optional "
` [PATCH 10/22] KEYS: asym_tpm: add skeleton for asym_tpm "
` [PATCH 11/22] KEYS: asym_tpm: extract key size & public key "
` [PATCH 12/22] KEYS: Add parser for TPM-based keys "
` [PATCH 13/22] KEYS: asym_tpm: Implement pkey_query "
` [PATCH 14/22] KEYS: asym_tpm: Implement encryption operation "
` [PATCH 15/22] KEYS: trusted: Expose common functionality "
` [PATCH 16/22] KEYS: Move trusted.h to include/keys "
` [PATCH 17/22] KEYS: asym_tpm: Add loadkey2 and flushspecific "
` [PATCH 18/22] KEYS: asym_tpm: Implement tpm_unbind "
` [PATCH 19/22] KEYS: asym_tpm: Implement the decrypt operation "
` [PATCH 20/22] KEYS: asym_tpm: Implement signature verification "
` [PATCH 21/22] KEYS: asym_tpm: Implement tpm_sign "
` [PATCH 22/22] KEYS: asym_tpm: Add support for the sign operation "

[PATCH] security: fix LSM description location
 2018-10-09 19:18 UTC  (3+ messages)

[PATCH v6 0/6] Add support for architecture specific IMA policies
 2018-10-09 17:30 UTC  (6+ messages)
` [PATCH v6 1/5] x86/ima: define arch_ima_get_secureboot
` [PATCH v6 2/5] ima: prevent kexec_load syscall based on runtime secureboot flag
` [PATCH v6 3/5] ima: refactor ima_init_policy()
` [PATCH v6 4/5] ima: add support for arch specific policies
` [PATCH v6 5/5] x86/ima: define arch_get_ima_policy() for x86

[PATCH 00/22] KEYS: Support TPM-wrapped key and crypto ops
 2018-10-09 15:21 UTC  (13+ messages)
` [PATCH 03/22] KEYS: Provide missing asymmetric key subops for new key type ops
` [PATCH 04/22] KEYS: Make the X.509 and PKCS7 parsers supply the sig encoding type
` [PATCH 05/22] KEYS: Provide software public key query function

[PATCH v1 00/22] LSM: Full security module stacking
 2018-10-09 14:09 UTC  (3+ messages)
` [PATCH v1 21/22] LSM: Multiple concurrent major security modules

[PATCH security-next v4 00/32] LSM: Explict LSM ordering
 2018-10-08 14:25 UTC  (48+ messages)
` [PATCH security-next v4 10/32] LSM: Don't ignore initialization failures
` [PATCH security-next v4 23/32] selinux: Remove boot parameter

[PATCH v5 0/6] Add support for architecture specific IMA policies
 2018-10-08 11:20 UTC  (7+ messages)
` [PATCH v5 1/5] x86/ima: define arch_ima_get_secureboot
` [PATCH v5 2/5] ima: prevent kexec_load syscall based on runtime secureboot flag
` [PATCH v5 3/5] ima: refactor ima_init_policy()
` [PATCH v5 4/5] ima: add support for arch specific policies
` [PATCH v5 5/5] x86/ima: define arch_get_ima_policy() for x86

[PATCH bpf-next 1/6] bpf: introduce BPF_PROG_TYPE_FILE_FILTER
 2018-10-08  9:06 UTC 

[RFC 00/12] Multi-Key Total Memory Encryption API (MKTME)
 2018-10-07 13:10 UTC 

[PATCH] apparmor: add #ifdef checks for secmark filtering
 2018-10-05 21:56 UTC  (2+ messages)

[GIT PULL] tpmdd updates for Linux 4.20
 2018-10-05 18:22 UTC  (2+ messages)

[PATCH v4 0/6] Add support for architecture specific IMA policies
 2018-10-05 17:44 UTC  (4+ messages)
` [PATCH v4 5/6] ima: add support for external setting of ima_appraise

kernel BUG at security/keys/keyring.c:LINE!
 2018-10-05 11:16 UTC 

[PATCH 00/34] VFS: Introduce filesystem context [ver #12]
 2018-10-04 18:37 UTC  (2+ messages)

[PATCH v5 0/5] LSM: Support ptrace sidechannel access checks
 2018-10-04 11:36 UTC  (7+ messages)
` [PATCH v5 2/5] Smack: Prepare for PTRACE_MODE_SCHED

[PATCH v4 00/19] LSM: Module stacking for SARA and Landlock
 2018-10-04  4:49 UTC  (5+ messages)
` [PATCH v4 14/19] LSM: Infrastructure management of the inode security

[PATCH 15/16] apparmor: Replace spin_is_locked() with lockdep
 2018-10-03  5:56 UTC  (2+ messages)

general protection fault in rb_erase
 2018-10-02 23:40 UTC  (2+ messages)

Leaking Path in XFS's ioctl interface(missing LSM check)
 2018-10-02 22:42 UTC  (9+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).