linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2018-08-01 22:53:17 to 2018-08-21 15:58:45 UTC [more...]

tpm: Provide a TPM access library
 2018-08-21 15:58 UTC  (18+ messages)
` [PATCH 01/23] TPM: Add new TPMs to the tail of the list to prevent inadvertent change of dev
` [PATCH 02/23] TPM: Provide a facility for a userspace TPM emulator
` [PATCH 03/23] TPM: Provide a platform driver for the user emulator driver
` [PATCH 04/23] TPM: Expose struct tpm_chip and related find_get and put functions
` [PATCH 05/23] TPM: Use struct tpm_chip rather than chip number as interface parameter
` [PATCH 06/23] TPM: Move ordinal values from interface file to header with other ordinals
` [PATCH 07/23] TPM: Consolidate tpm_send(), transmit_cmd() and tpm_transmit()
` [PATCH 08/23] TPMLIB: Break TPM bits out of security/keys/trusted.c
` [PATCH 09/23] TPMLIB: Do some source cleanups
` [PATCH 10/23] TPMLIB: Better format calls to TSS_*hmac*()
` [PATCH 11/23] TPMLIB: Put banner comments on public TPM library functions
` [PATCH 12/23] TPMLIB: Create tpm_{even, odd}_nonce structs to represent nonces
` [PATCH 13/23] TPMLIB: Rename store8() and storebytes()
` [PATCH 14/23] TPMLIB: Make store_s() take a void* data argument, not unsigned char*
` [PATCH 15/23] TPMLIB: Use __be32 rather than int32_t and use cpu_to_beX() and co
` [PATCH 16/23] TPMLIB: Put more comments into the HMAC generation functions
` [PATCH 17/23] TPMLIB: Provide a wrapper to load bytes out of the reply

[PATCH RFC v2 0/5] LSM: Add and use a hook for side-channel safety checks
 2018-08-21 10:20 UTC  (15+ messages)
` [PATCH RFC v2 1/5] LSM: Introduce a hook for side-channel danger
` [PATCH RFC v2 2/5] X86: Support LSM determination of side-channel vulnerability
` [PATCH RFC v2 3/5] LSM: Security module checking for side-channel dangers
` [PATCH RFC v2 4/5] Smack: Support determination of side-channel vulnerability
` [PATCH RFC v2 5/5] SELinux: Support SELinux "

[PATCH RFC v3 0/5] LSM: Add and use a hook for side-channel safety checks
 2018-08-21  0:04 UTC  (6+ messages)
` [PATCH v3 1/5] LSM: Introduce a hook for side-channel danger
` [PATCH v3 2/5] X86: Support LSM determination of side-channel
` [PATCH v3 3/5] LSM: Security module checking for side-channel dangers
` [PATCH v3 4/5] Smack: Support determination of side-channel
` [PATCH v3 5/5] SELinux: Support SELinux "

[PATCH] security/capabilities: remove check for -EINVAL
 2018-08-19 18:44 UTC 

Hi, pretty
 2018-08-19 10:13 UTC 

[PATCH 08/33] vfs: Add LSM hooks for the new mount API [ver #11]
 2018-08-17 23:11 UTC  (53+ messages)
` [PATCH 00/33] VFS: Introduce filesystem context "
  ` BUG: Mount ignores mount options
  ` Should we split the network filesystem setup into two phases?

[RFC] KEYS: inject an MKTME specific safety check in the keyctl revoke path
 2018-08-17  2:49 UTC  (2+ messages)

[PATCH v1 00/22] LSM: Full security module stacking
 2018-08-16 16:05 UTC  (10+ messages)
` [PATCH v1 20/22] Move common usercopy into security_getpeersec_stream

[PATCH 1/2] Replace magic for trusting the secondary keyring with #define
 2018-08-16 15:12 UTC  (5+ messages)
` [PATCH 2/2] Fix kexec forbidding kernels signed with keys in the secondary keyring to boot

[PATCH RFC 0/5] LSM: Add and use a hook for side-channel safety checks
 2018-08-16 14:22 UTC  (10+ messages)
` [PATCH RFC 1/5] LSM: Introduce a hook for side-channel danger
` [PATCH RFC 2/5] X86: Support LSM determination of side-channel vulnerability
` [PATCH RFC 3/5] LSM: Security module checking for side-channel dangers
` [PATCH RFC 4/5] Smack: Support determination of side-channel vulnerability
` [PATCH RFC 5/5] SELinux: Support SELinux "

[GIT PULL] security subsystem: Integrity updates for v4.19
 2018-08-15 22:48 UTC 

[GIT PULL] security subsystem: TPM updates for v4.19
 2018-08-15 22:37 UTC 

[GIT PULL] security subsystem: Smack updates for v4.19
 2018-08-15 22:34 UTC 

apparmor unaligned accesses on sparc64 in 4.18+git
 2018-08-15 18:39 UTC 

Fwd: PROBLEM: tpm_cpg can't request region with AMD/Dell fTPM
 2018-08-15 18:02 UTC  (4+ messages)

[GIT PULL] SELinux patches for v4.19
 2018-08-14 20:45 UTC 

[PATCH v5 0/2] tpm: add support for nonblocking operation
 2018-08-14 16:07 UTC  (5+ messages)
` [PATCH v5 1/2] tpm: add ptr to the tpm_space struct to file_priv
` [PATCH v5 2/2] tpm: add support for nonblocking operation

[PATCH] selinux: refactor mls_context_to_sid() and make it stricter
 2018-08-13 23:38 UTC  (5+ messages)

[GIT PULL] security subsystem: general update for v4.19
 2018-08-13 22:56 UTC  (2+ messages)

[PATCH 0/9] libcap: add user namespace fscaps support
 2018-08-13 16:11 UTC  (11+ messages)
` [PATCH 1/9] cap_file: use v3 xattr macros
` [PATCH 2/9] capability: update to new uapi header
` [PATCH 3/9] cap_file: use struct vfs_ns_cap_data if possible
` [PATCH 4/9] cap_file: add new rootid argument
` [PATCH 5/9] cap_file: initialize rootid in _fcaps_load()
` [PATCH 6/9] capability: add cap_get_nsowner()
` [PATCH 7/9] cap_file: save rootid in _fcaps_save()
` [PATCH 8/9] cap_file: handle run- vs buildtime vfs cap support
` [PATCH 9/9] capability: add cap_set_nsowner()

[PATCH v4 0/2] tpm: add support for nonblocking operation
 2018-08-12 10:39 UTC  (13+ messages)
` [PATCH v4 1/2] tpm: add ptr to the tpm_space struct to file_priv
` [PATCH v4 2/2] tpm: add support for nonblocking operation

REPLY AS SOON AS POSSIBLE
 2018-08-11 22:49 UTC 

[PATCH] selinuxfs: Fix the resource leak in the failed branch of sel_make_inode
 2018-08-08 15:39 UTC  (3+ messages)

Fwd: [PATCH v3] cap_inode_getsecurity: use d_find_any_alias() instead of d_find_alias()
 2018-08-08 15:14 UTC 

editing the images
 2018-08-08 11:25 UTC 

[PATCH v3 RESEND 0/2] tpm: add support for nonblocking operation
 2018-08-07 19:09 UTC  (9+ messages)
` [PATCH v3 RESEND 1/2] tpm: add ptr to the tpm_space struct to file_priv
` [PATCH v3 RESEND 2/2] tpm: add support for nonblocking operation

[PATCH] selinux: stricter parsing in mls_context_to_sid()
 2018-08-06 19:47 UTC  (4+ messages)

maybe resource leak in security/selinux/selinuxfs.c
 2018-08-05  9:37 UTC  (3+ messages)

[PATCH 0/4] Add support for architecture-specific IMA policies
 2018-08-03 19:47 UTC  (6+ messages)
` [PATCH 3/4] ima: add support for KEXEC_ORIG_KERNEL_CHECK

[PATCH v2 1/2] security/keys/secure_key: Adds the secure key support based on CAAM
 2018-08-03 18:28 UTC  (10+ messages)

[PATCH 1/4] ima: add support for arch specific policies
 2018-08-03 10:08 UTC  (3+ messages)

your photos need edit
 2018-08-02 11:31 UTC 

[PATCH] apparmor: fix an error code in __aa_create_ns()
 2018-08-02  8:38 UTC 

Spende von $ 4,800,000.00!
 2018-08-02  2:08 UTC 

[PATCH] Smack: Mark expected switch fall-through
 2018-08-01 22:55 UTC  (2+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).