messages from 2018-08-01 22:53:17 to 2018-08-21 15:58:45 UTC [more...]
tpm: Provide a TPM access library
2018-08-21 15:58 UTC (18+ messages)
` [PATCH 01/23] TPM: Add new TPMs to the tail of the list to prevent inadvertent change of dev
` [PATCH 02/23] TPM: Provide a facility for a userspace TPM emulator
` [PATCH 03/23] TPM: Provide a platform driver for the user emulator driver
` [PATCH 04/23] TPM: Expose struct tpm_chip and related find_get and put functions
` [PATCH 05/23] TPM: Use struct tpm_chip rather than chip number as interface parameter
` [PATCH 06/23] TPM: Move ordinal values from interface file to header with other ordinals
` [PATCH 07/23] TPM: Consolidate tpm_send(), transmit_cmd() and tpm_transmit()
` [PATCH 08/23] TPMLIB: Break TPM bits out of security/keys/trusted.c
` [PATCH 09/23] TPMLIB: Do some source cleanups
` [PATCH 10/23] TPMLIB: Better format calls to TSS_*hmac*()
` [PATCH 11/23] TPMLIB: Put banner comments on public TPM library functions
` [PATCH 12/23] TPMLIB: Create tpm_{even, odd}_nonce structs to represent nonces
` [PATCH 13/23] TPMLIB: Rename store8() and storebytes()
` [PATCH 14/23] TPMLIB: Make store_s() take a void* data argument, not unsigned char*
` [PATCH 15/23] TPMLIB: Use __be32 rather than int32_t and use cpu_to_beX() and co
` [PATCH 16/23] TPMLIB: Put more comments into the HMAC generation functions
` [PATCH 17/23] TPMLIB: Provide a wrapper to load bytes out of the reply
[PATCH RFC v2 0/5] LSM: Add and use a hook for side-channel safety checks
2018-08-21 10:20 UTC (15+ messages)
` [PATCH RFC v2 1/5] LSM: Introduce a hook for side-channel danger
` [PATCH RFC v2 2/5] X86: Support LSM determination of side-channel vulnerability
` [PATCH RFC v2 3/5] LSM: Security module checking for side-channel dangers
` [PATCH RFC v2 4/5] Smack: Support determination of side-channel vulnerability
` [PATCH RFC v2 5/5] SELinux: Support SELinux "
[PATCH RFC v3 0/5] LSM: Add and use a hook for side-channel safety checks
2018-08-21 0:04 UTC (6+ messages)
` [PATCH v3 1/5] LSM: Introduce a hook for side-channel danger
` [PATCH v3 2/5] X86: Support LSM determination of side-channel
` [PATCH v3 3/5] LSM: Security module checking for side-channel dangers
` [PATCH v3 4/5] Smack: Support determination of side-channel
` [PATCH v3 5/5] SELinux: Support SELinux "
[PATCH] security/capabilities: remove check for -EINVAL
2018-08-19 18:44 UTC
Hi, pretty
2018-08-19 10:13 UTC
[PATCH 08/33] vfs: Add LSM hooks for the new mount API [ver #11]
2018-08-17 23:11 UTC (53+ messages)
` [PATCH 00/33] VFS: Introduce filesystem context "
` BUG: Mount ignores mount options
` Should we split the network filesystem setup into two phases?
[RFC] KEYS: inject an MKTME specific safety check in the keyctl revoke path
2018-08-17 2:49 UTC (2+ messages)
[PATCH v1 00/22] LSM: Full security module stacking
2018-08-16 16:05 UTC (10+ messages)
` [PATCH v1 20/22] Move common usercopy into security_getpeersec_stream
[PATCH 1/2] Replace magic for trusting the secondary keyring with #define
2018-08-16 15:12 UTC (5+ messages)
` [PATCH 2/2] Fix kexec forbidding kernels signed with keys in the secondary keyring to boot
[PATCH RFC 0/5] LSM: Add and use a hook for side-channel safety checks
2018-08-16 14:22 UTC (10+ messages)
` [PATCH RFC 1/5] LSM: Introduce a hook for side-channel danger
` [PATCH RFC 2/5] X86: Support LSM determination of side-channel vulnerability
` [PATCH RFC 3/5] LSM: Security module checking for side-channel dangers
` [PATCH RFC 4/5] Smack: Support determination of side-channel vulnerability
` [PATCH RFC 5/5] SELinux: Support SELinux "
[GIT PULL] security subsystem: Integrity updates for v4.19
2018-08-15 22:48 UTC
[GIT PULL] security subsystem: TPM updates for v4.19
2018-08-15 22:37 UTC
[GIT PULL] security subsystem: Smack updates for v4.19
2018-08-15 22:34 UTC
apparmor unaligned accesses on sparc64 in 4.18+git
2018-08-15 18:39 UTC
Fwd: PROBLEM: tpm_cpg can't request region with AMD/Dell fTPM
2018-08-15 18:02 UTC (4+ messages)
[GIT PULL] SELinux patches for v4.19
2018-08-14 20:45 UTC
[PATCH v5 0/2] tpm: add support for nonblocking operation
2018-08-14 16:07 UTC (5+ messages)
` [PATCH v5 1/2] tpm: add ptr to the tpm_space struct to file_priv
` [PATCH v5 2/2] tpm: add support for nonblocking operation
[PATCH] selinux: refactor mls_context_to_sid() and make it stricter
2018-08-13 23:38 UTC (5+ messages)
[GIT PULL] security subsystem: general update for v4.19
2018-08-13 22:56 UTC (2+ messages)
[PATCH 0/9] libcap: add user namespace fscaps support
2018-08-13 16:11 UTC (11+ messages)
` [PATCH 1/9] cap_file: use v3 xattr macros
` [PATCH 2/9] capability: update to new uapi header
` [PATCH 3/9] cap_file: use struct vfs_ns_cap_data if possible
` [PATCH 4/9] cap_file: add new rootid argument
` [PATCH 5/9] cap_file: initialize rootid in _fcaps_load()
` [PATCH 6/9] capability: add cap_get_nsowner()
` [PATCH 7/9] cap_file: save rootid in _fcaps_save()
` [PATCH 8/9] cap_file: handle run- vs buildtime vfs cap support
` [PATCH 9/9] capability: add cap_set_nsowner()
[PATCH v4 0/2] tpm: add support for nonblocking operation
2018-08-12 10:39 UTC (13+ messages)
` [PATCH v4 1/2] tpm: add ptr to the tpm_space struct to file_priv
` [PATCH v4 2/2] tpm: add support for nonblocking operation
REPLY AS SOON AS POSSIBLE
2018-08-11 22:49 UTC
[PATCH] selinuxfs: Fix the resource leak in the failed branch of sel_make_inode
2018-08-08 15:39 UTC (3+ messages)
Fwd: [PATCH v3] cap_inode_getsecurity: use d_find_any_alias() instead of d_find_alias()
2018-08-08 15:14 UTC
editing the images
2018-08-08 11:25 UTC
[PATCH v3 RESEND 0/2] tpm: add support for nonblocking operation
2018-08-07 19:09 UTC (9+ messages)
` [PATCH v3 RESEND 1/2] tpm: add ptr to the tpm_space struct to file_priv
` [PATCH v3 RESEND 2/2] tpm: add support for nonblocking operation
[PATCH] selinux: stricter parsing in mls_context_to_sid()
2018-08-06 19:47 UTC (4+ messages)
maybe resource leak in security/selinux/selinuxfs.c
2018-08-05 9:37 UTC (3+ messages)
[PATCH 0/4] Add support for architecture-specific IMA policies
2018-08-03 19:47 UTC (6+ messages)
` [PATCH 3/4] ima: add support for KEXEC_ORIG_KERNEL_CHECK
[PATCH v2 1/2] security/keys/secure_key: Adds the secure key support based on CAAM
2018-08-03 18:28 UTC (10+ messages)
[PATCH 1/4] ima: add support for arch specific policies
2018-08-03 10:08 UTC (3+ messages)
your photos need edit
2018-08-02 11:31 UTC
[PATCH] apparmor: fix an error code in __aa_create_ns()
2018-08-02 8:38 UTC
Spende von $ 4,800,000.00!
2018-08-02 2:08 UTC
[PATCH] Smack: Mark expected switch fall-through
2018-08-01 22:55 UTC (2+ messages)
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).