linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2018-10-09 16:49:39 to 2018-10-21 07:12:50 UTC [more...]

KASAN: use-after-free Read in task_is_descendant
 2018-10-21  7:12 UTC  (2+ messages)

[PATCH] tpm: tpm_try_transmit() refactor error flow
 2018-10-20 22:49 UTC  (5+ messages)

[PATCH v7 00/21] tpm: separate tpm 1.x and tpm 2.x commands
 2018-10-20  1:19 UTC  (30+ messages)
` [PATCH v7 01/21] tpm: tpm_i2c_nuvoton: use correct command duration for TPM 2.x
` [PATCH v7 02/21] tpm2: add new tpm2 commands according to TCG 1.36
` [PATCH v7 03/21] tpm: sort objects in the Makefile
` [PATCH v7 04/21] tpm: factor out tpm 1.x duration calculation to tpm1-cmd.c
` [PATCH v7 05/21] tpm: add tpm_calc_ordinal_duration() wrapper
` [PATCH v7 06/21] tpm: factor out tpm_get_timeouts()
` [PATCH v7 07/21] tpm: move tpm1_pcr_extend to tpm1-cmd.c
` [PATCH v7 08/21] tpm: move tpm_getcap "
` [PATCH v7 09/21] tpm: factor out tpm1_get_random into tpm1-cmd.c
` [PATCH v7 10/21] tpm: move tpm 1.x selftest code from tpm-interface.c tpm1-cmd.c
` [PATCH v7 11/21] tpm: factor out tpm 1.x pm suspend flow into tpm1-cmd.c
` [PATCH v7 12/21] tpm: factor out tpm_startup function
` [PATCH v7 13/21] tpm: add tpm_auto_startup() into tpm-interface.c
` [PATCH v7 14/21] tpm: tpm-interface.c drop unused macros
` [PATCH v7 15/21] tpm: tpm-space.c remove unneeded semicolon
` [PATCH v7 16/21] tpm: tpm1: rewrite tpm1_get_random() using tpm_buf structure
` [PATCH v7 17/21] tpm1: implement tpm1_pcr_read_dev() "
` [PATCH v7 18/21] tpm1: rename tpm1_pcr_read_dev to tpm1_pcr_read()
` [PATCH v7 19/21] tpm1: reimplement SAVESTATE using tpm_buf
` [PATCH v7 20/21] tpm1: reimplement tpm1_continue_selftest() "
` [PATCH v7 21/21] tpm: use u32 instead of int for PCR index

[PATCH] tpm: fix kdoc for tpm2_flush_context_cmd()
 2018-10-19 23:25 UTC  (2+ messages)

[PATCH] tpm: tpm_i2c_nuvoton: use correct command duration for TPM 2.x
 2018-10-19 23:24 UTC  (4+ messages)

[PATCH -next] KEYS: trusted: remove set but not used variable ''
 2018-10-19 16:30 UTC  (3+ messages)
` [PATCH v2 -next] KEYS: trusted: remove set but not used variable 'keyhndl'

[RFC v4 0/2] WhiteEgret LSM module
 2018-10-19  5:07 UTC 

[RFC v4 2/2] WhiteEgret: Add an example of user application
 2018-10-19  5:11 UTC 

[RFC v4 1/2] WhiteEgret: Add WhiteEgret core functions
 2018-10-19  5:09 UTC 

[GIT PULL] loadpin updates for security-next
 2018-10-19  0:21 UTC  (2+ messages)

[RFC PATCH] smack: fix access permissions for keyring
 2018-10-17 23:25 UTC 

[PATCH] tpm: tpm_try_transmit() ignore value of go_to_idle()
 2018-10-17 23:08 UTC  (5+ messages)

[PATCH v6 00/21] tpm: separate tpm 1.x and tpm 2.x commands
 2018-10-17 15:28 UTC  (25+ messages)
` [PATCH v6 01/20] tpm2: add new tpm2 commands according to TCG 1.36
` [PATCH v6 02/20] tpm: sort objects in the Makefile
` [PATCH v6 03/20] tpm: factor out tpm 1.x duration calculation to tpm1-cmd.c
` [PATCH v6 04/20] tpm: add tpm_calc_ordinal_duration() wrapper
` [PATCH v6 05/20] tpm: factor out tpm_get_timeouts()
` [PATCH v6 06/20] tpm: move tpm1_pcr_extend to tpm1-cmd.c
` [PATCH v6 07/20] tpm: move tpm_getcap "
` [PATCH v6 08/20] tpm: factor out tpm1_get_random into tpm1-cmd.c
` [PATCH v6 09/20] tpm: move tpm 1.x selftest code from tpm-interface.c tpm1-cmd.c
` [PATCH v6 10/20] tpm: factor out tpm 1.x pm suspend flow into tpm1-cmd.c
` [PATCH v6 11/20] tpm: factor out tpm_startup function
` [PATCH v6 12/20] tpm: add tpm_auto_startup() into tpm-interface.c
` [PATCH v6 13/20] tpm: tpm-interface.c drop unused macros
` [PATCH v6 14/20] tpm: tpm-space.c remove unneeded semicolon
` [PATCH v6 15/20] tpm: tpm1: rewrite tpm1_get_random() using tpm_buf structure
` [PATCH v6 16/20] tpm1: implement tpm1_pcr_read_dev() "
` [PATCH v6 17/20] tmp1: rename tpm1_pcr_read_dev to tpm1_pcr_read()
` [PATCH v6 18/20] tpm1: reimplement SAVESTATE using tpm_buf
` [PATCH v6 19/20] tpm1: reimplement tpm1_continue_selftest() "
` [PATCH v6 20/20] tpm: use u32 instead of int for PCR index

[PATCH v5 00/21] tpm: separate tpm 1.x and tpm 2.x commands
 2018-10-17  6:02 UTC  (11+ messages)
` [PATCH v5 03/21] tpm: factor out tpm 1.x duration calculation to tpm1-cmd.c
` [PATCH v5 05/21] tpm: factor out tpm_get_timeouts()
` [PATCH v5 06/21] tpm: move tpm1_pcr_extend to tpm1-cmd.c
` [PATCH v5 20/21] tpm1: reimplement tpm1_continue_selftest() using tpm_buf

[GIT PULL] SELinux fixes for v4.19 (#1)
 2018-10-16 16:53 UTC  (2+ messages)

[PATCH v5 0/5] LSM: Support ptrace sidechannel access checks
 2018-10-16 11:44 UTC  (8+ messages)
` [PATCH v5 2/5] Smack: Prepare for PTRACE_MODE_SCHED

[PATCH v2 1/2] security/keys/secure_key: Adds the secure key support based on CAAM
 2018-10-16 10:16 UTC  (8+ messages)

undefined behavior (-Wvarargs) in security/keys/trusted.c#TSS_authhmac()
 2018-10-16  8:13 UTC  (26+ messages)
    ` [PATCH] KEYS: trusted: fix -Wvarags warning

[GIT PULL] linux-integrity patches for Linux 4.20
 2018-10-15 17:40 UTC  (2+ messages)

possible deadlock in process_measurement
 2018-10-15 17:05 UTC 

[PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
 2018-10-12 20:11 UTC  (29+ messages)

[PATCH v4 00/19] LSM: Module stacking for SARA and Landlock
 2018-10-12 20:07 UTC  (4+ messages)
` [PATCH 21/19] LSM: Cleanup and fixes from Tetsuo Handa

[PATCH security-next v5 00/30] LSM: Explict ordering
 2018-10-12 19:01 UTC  (47+ messages)
` [PATCH security-next v5 01/30] LSM: Correctly announce start of LSM initialization
` [PATCH security-next v5 02/30] vmlinux.lds.h: Avoid copy/paste of security_init section
` [PATCH security-next v5 03/30] LSM: Rename .security_initcall section to .lsm_info
` [PATCH security-next v5 04/30] LSM: Remove initcall tracing
` [PATCH security-next v5 05/30] LSM: Convert from initcall to struct lsm_info
` [PATCH security-next v5 06/30] vmlinux.lds.h: Move LSM_TABLE into INIT_DATA
` [PATCH security-next v5 07/30] LSM: Convert security_initcall() into DEFINE_LSM()
` [PATCH security-next v5 08/30] LSM: Record LSM name in struct lsm_info
` [PATCH security-next v5 09/30] LSM: Provide init debugging infrastructure
` [PATCH security-next v5 10/30] LSM: Don't ignore initialization failures
` [PATCH security-next v5 11/30] LSM: Introduce LSM_FLAG_LEGACY_MAJOR
` [PATCH security-next v5 12/30] LSM: Provide separate ordered initialization
` [PATCH security-next v5 13/30] LoadPin: Rename boot param "enabled" to "enforce"
` [PATCH security-next v5 14/30] LSM: Plumb visibility into optional "enabled" state
` [PATCH security-next v5 15/30] LSM: Lift LSM selection out of individual LSMs
` [PATCH security-next v5 16/30] LSM: Build ordered list of LSMs to initialize
` [PATCH security-next v5 17/30] LSM: Introduce CONFIG_LSM
` [PATCH security-next v5 18/30] LSM: Introduce "lsm=" for boottime LSM selection
` [PATCH security-next v5 19/30] LSM: Tie enabling logic to presence in ordered list
` [PATCH security-next v5 20/30] LSM: Prepare for reorganizing "security=" logic
` [PATCH security-next v5 21/30] LSM: Refactor "security=" in terms of enable/disable
` [PATCH security-next v5 22/30] LSM: Separate idea of "major" LSM from "exclusive" LSM
` [PATCH security-next v5 23/30] apparmor: Remove SECURITY_APPARMOR_BOOTPARAM_VALUE
` [PATCH security-next v5 24/30] selinux: Remove SECURITY_SELINUX_BOOTPARAM_VALUE
` [PATCH security-next v5 25/30] LSM: Add all exclusive LSMs to ordered initialization
` [PATCH security-next v5 26/30] LSM: Split LSM preparation from initialization
` [PATCH security-next v5 27/30] LoadPin: Initialize as ordered LSM
` [PATCH security-next v5 28/30] Yama: "
` [PATCH security-next v5 29/30] LSM: Introduce enum lsm_order
` [PATCH security-next v5 30/30] capability: Initialize as LSM_ORDER_FIRST

[RFC] proposal for resolving the cred_guard_mutex deadlock
 2018-10-11 21:13 UTC 

[bug report] apparmor: Parse secmark policy
 2018-10-10 16:04 UTC  (2+ messages)

enquiry 10-10-2018
 2018-10-10  6:59 UTC 

[PATCH 00/22] KEYS: Support TPM-wrapped key and crypto ops [ver #2]
 2018-10-09 19:26 UTC  (3+ messages)
` [PATCH 22/22] KEYS: asym_tpm: Add support for the sign operation "

[PATCH] security: fix LSM description location
 2018-10-09 19:18 UTC  (2+ messages)

[PATCH v6 0/6] Add support for architecture specific IMA policies
 2018-10-09 17:30 UTC  (6+ messages)
` [PATCH v6 1/5] x86/ima: define arch_ima_get_secureboot
` [PATCH v6 2/5] ima: prevent kexec_load syscall based on runtime secureboot flag
` [PATCH v6 3/5] ima: refactor ima_init_policy()
` [PATCH v6 4/5] ima: add support for arch specific policies
` [PATCH v6 5/5] x86/ima: define arch_get_ima_policy() for x86


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).