linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2018-08-17 22:16:22 to 2018-09-06 19:41:37 UTC [more...]

possible deadlock in ext4_evict_inode
 2018-09-06 19:41 UTC 

WARNING in apparmor_secid_to_secctx
 2018-09-06 19:35 UTC  (29+ messages)

Smack: wrong-looking capable() check in smk_ptrace_rule_check()
 2018-09-06 18:22 UTC 

[GIT PULL] apparmor fix for v4.19-rc3
 2018-09-06 16:20 UTC 

[PATCH 1/3] selinux: make dentry_init_security() return security module name
 2018-09-06 16:05 UTC  (8+ messages)
` [PATCH 2/3] ceph: rename struct ceph_acls_info to ceph_acl_sec_ctx
` [PATCH 3/3] ceph: xattr security label support

[PATCH] seccomp: remove unnecessary unlikely()
 2018-09-06  0:13 UTC  (6+ messages)

[PATCH 00/22] KEYS: Support TPM-wrapped key and crypto ops
 2018-09-06  0:07 UTC  (24+ messages)
` [PATCH 01/22] KEYS: Provide key type operations for asymmetric key ops
` [PATCH 02/22] KEYS: Provide keyctls to drive the new key type ops for asymmetric keys
` [PATCH 03/22] KEYS: Provide missing asymmetric key subops for new key type ops
` [PATCH 04/22] KEYS: Make the X.509 and PKCS7 parsers supply the sig encoding type
` [PATCH 05/22] KEYS: Provide software public key query function
` [PATCH 06/22] KEYS: Allow the public_key struct to hold a private key
` [PATCH 07/22] KEYS: Implement encrypt, decrypt and sign for software asymmetric key
` [PATCH 08/22] KEYS: Implement PKCS#8 RSA Private Key parser
` [PATCH 09/22] crypto: rsa-pkcs1pad: Allow hash to be optional
` [PATCH 10/22] KEYS: asym_tpm: add skeleton for asym_tpm
` [PATCH 11/22] KEYS: asym_tpm: extract key size & public key
` [PATCH 12/22] KEYS: Add parser for TPM-based keys
` [PATCH 13/22] KEYS: asym_tpm: Implement pkey_query
` [PATCH 14/22] KEYS: asym_tpm: Implement encryption operation
` [PATCH 15/22] KEYS: trusted: Expose common functionality
` [PATCH 16/22] KEYS: Move trusted.h to include/keys
` [PATCH 17/22] KEYS: asym_tpm: Add loadkey2 and flushspecific
` [PATCH 18/22] KEYS: asym_tpm: Implement tpm_unbind
` [PATCH 19/22] KEYS: asym_tpm: Implement the decrypt operation
` [PATCH 20/22] KEYS: asym_tpm: Implement signature verification
` [PATCH 21/22] KEYS: asym_tpm: Implement tpm_sign
` [PATCH 22/22] KEYS: asym_tpm: Add support for the sign operation

[PATCH] selinux: refactor mls_context_to_sid() and make it stricter
 2018-09-05 22:16 UTC  (4+ messages)

[PATCH 0/8] CaitSith LSM module
 2018-09-05 16:22 UTC  (7+ messages)

[PATCH] tpm: fix response size validation in tpm_get_random()
 2018-09-05 13:16 UTC  (3+ messages)

[PATCH] tpm: Make SECURITYFS a weak dependency
 2018-09-05 11:28 UTC  (2+ messages)

[PATCH] security: tomoyo: Fix obsolete function
 2018-09-04 18:57 UTC  (3+ messages)

next-general merged to v4.19-rc2
 2018-09-04 18:49 UTC  (2+ messages)

[PATCH] SELinux: allow other LSMs to use custom mount args
 2018-08-31 17:11 UTC  (6+ messages)

[RFC] KEYS: inject an MKTME specific safety check in the keyctl revoke path
 2018-08-31 16:55 UTC  (7+ messages)

[PATCH v5 0/2] tpm: add support for nonblocking operation
 2018-08-31  9:02 UTC  (5+ messages)
` [PATCH v5 2/2] "

[RFC] KEYS: add a new type "mktme" to kernel key services
 2018-08-31  8:53 UTC  (3+ messages)

[PATCH resend] uapi/linux/keyctl.h: don't use C++ reserved keyword as a struct member name
 2018-08-29 22:56 UTC  (3+ messages)

[PATCH v1] security/capabilities: remove check for -EINVAL
 2018-08-29 16:09 UTC  (4+ messages)

Your reply
 2018-08-28 14:25 UTC 

YOUR PRODUCT
 2018-08-27 17:13 UTC 

tpm: Provide a TPM access library
 2018-08-27  8:25 UTC  (42+ messages)
` [PATCH 01/23] TPM: Add new TPMs to the tail of the list to prevent inadvertent change of dev
` [PATCH 02/23] TPM: Provide a facility for a userspace TPM emulator
` [PATCH 03/23] TPM: Provide a platform driver for the user emulator driver
` [PATCH 04/23] TPM: Expose struct tpm_chip and related find_get and put functions
` [PATCH 05/23] TPM: Use struct tpm_chip rather than chip number as interface parameter
` [PATCH 06/23] TPM: Move ordinal values from interface file to header with other ordinals
` [PATCH 07/23] TPM: Consolidate tpm_send(), transmit_cmd() and tpm_transmit()
` [PATCH 08/23] TPMLIB: Break TPM bits out of security/keys/trusted.c
` [PATCH 09/23] TPMLIB: Do some source cleanups
` [PATCH 10/23] TPMLIB: Better format calls to TSS_*hmac*()
` [PATCH 11/23] TPMLIB: Put banner comments on public TPM library functions
` [PATCH 12/23] TPMLIB: Create tpm_{even, odd}_nonce structs to represent nonces
` [PATCH 13/23] TPMLIB: Rename store8() and storebytes()
` [PATCH 14/23] TPMLIB: Make store_s() take a void* data argument, not unsigned char*
` [PATCH 15/23] TPMLIB: Use __be32 rather than int32_t and use cpu_to_beX() and co
` [PATCH 16/23] TPMLIB: Put more comments into the HMAC generation functions
` [PATCH 17/23] TPMLIB: Provide a wrapper to load bytes out of the reply
` [PATCH 18/23] TPMLIB: Encapsulate XOR-based encryption with authkey derivative
` [PATCH 19/23] TPMLIB: Add some debugging code
` [PATCH 20/23] TPMLIB: Implement call to TPM_CreateWrapKey
` [PATCH 21/23] TPMLIB: Implement call to TPM_LoadKey2
` [PATCH 22/23] TPMLIB: Provide call for TPM_FlushSpecific
` [PATCH 23/23] TPM: Add an asymmetric key subtype for handling TPM-based keys

TRADING ACCOUNT
 2018-08-25 11:25 UTC 

[PATCH v4 0/5] LSM: Add and use a hook for side-channel safety checks
 2018-08-24 23:17 UTC  (7+ messages)
` [PATCH v4 1/5] LSM: Introduce a hook for side-channel danger
` [PATCH v4 2/5] X86: Support LSM determination of side-channel
` [PATCH v4 3/5] LSM: Security module checking for side-channel dangers
` [PATCH v4 4/5] Smack: Support determination of side-channel
` [PATCH v4 5/5] SELinux: Support SELinux "

[PATCH] tpm: factor out TPM 1.x duration calculation to tpm1-cmd.c
 2018-08-24 10:35 UTC 

[GIT PULL] apparmor updates for v4.19
 2018-08-24  2:34 UTC 

[PATCH] apparmor: remove unused label
 2018-08-23 21:30 UTC  (6+ messages)

[PATCH] apparmor: remove dead code
 2018-08-23 18:35 UTC  (4+ messages)

[PATCH RFC v3 0/5] LSM: Add and use a hook for side-channel safety checks
 2018-08-22 17:48 UTC  (12+ messages)
` [PATCH v3 1/5] LSM: Introduce a hook for side-channel danger
` [PATCH v3 2/5] X86: Support LSM determination of side-channel
` [PATCH v3 3/5] LSM: Security module checking for side-channel dangers
` [PATCH v3 4/5] Smack: Support determination of side-channel
` [PATCH v3 5/5] SELinux: Support SELinux "

[PATCH v1 00/22] LSM: Full security module stacking
 2018-08-22  9:59 UTC  (6+ messages)

We design apps
 2018-08-22  9:09 UTC 

[PATCH] apparmor: fix an error code in __aa_create_ns()
 2018-08-21 23:39 UTC  (2+ messages)

[PATCH RFC v2 0/5] LSM: Add and use a hook for side-channel safety checks
 2018-08-21 17:45 UTC  (16+ messages)
` [PATCH RFC v2 2/5] X86: Support LSM determination of side-channel vulnerability
` [PATCH RFC v2 3/5] LSM: Security module checking for side-channel dangers
` [PATCH RFC v2 4/5] Smack: Support determination of side-channel vulnerability
` [PATCH RFC v2 5/5] SELinux: Support SELinux "

[PATCH] security/capabilities: remove check for -EINVAL
 2018-08-19 18:44 UTC 

Hi, pretty
 2018-08-19 10:13 UTC 

[PATCH 00/33] VFS: Introduce filesystem context [ver #11]
 2018-08-17 23:11 UTC  (4+ messages)
` Should we split the network filesystem setup into two phases?


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).