linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2018-09-18 09:34:52 to 2018-09-23 13:51:30 UTC [more...]

[PATCH v2 1/2] netfilter: nf_tables: add SECMARK support
 2018-09-23 13:51 UTC  (3+ messages)
` [PATCH 2/2] netfilter: nf_tables: add requirements for connsecmark support

[PATCH v4 00/19] LSM: Module stacking for SARA and Landlock
 2018-09-23  2:43 UTC  (37+ messages)
` [PATCH v4 01/19] procfs: add smack subdir to attrs
` [PATCH v4 02/19] Smack: Abstract use of cred security blob
` [PATCH v4 03/19] SELinux: "
` [PATCH v4 04/19] SELinux: Remove cred security blob poisoning
` [PATCH v4 05/19] SELinux: Remove unused selinux_is_enabled
` [PATCH v4 06/19] AppArmor: Abstract use of cred security blob
` [PATCH v4 07/19] TOMOYO: "
` [PATCH v4 08/19] Infrastructure management of the "
` [PATCH v4 09/19] SELinux: Abstract use of file "
` [PATCH v4 10/19] Smack: "
` [PATCH v4 11/19] LSM: Infrastructure management of the file security
` [PATCH v4 12/19] SELinux: Abstract use of inode security blob
` [PATCH v4 13/19] Smack: "
` [PATCH v4 14/19] LSM: Infrastructure management of the inode security
` [PATCH v4 15/19] LSM: Infrastructure management of the task security
` [PATCH v4 16/19] SELinux: Abstract use of ipc security blobs
` [PATCH v4 17/19] Smack: "
` [PATCH v4 18/19] LSM: Infrastructure management of the ipc security blob
` [PATCH v4 19/19] LSM: Blob sharing support for S.A.R.A and LandLock

[PATCH resend] uapi/linux/keyctl.h: don't use C++ reserved keyword as a struct member name
 2018-09-22  0:03 UTC  (4+ messages)

[PATCH v2, RESEND 0/3] tpm: retrieve digest size of unknown algorithms from TPM
 2018-09-21 21:57 UTC  (5+ messages)
` [PATCH v2, RESEND 2/3] tpm: modify tpm_pcr_read() definition to pass TPM hash algorithms

[PATCH 00/34] VFS: Introduce filesystem context [ver #12]
 2018-09-21 16:31 UTC  (6+ messages)
` [PATCH 08/34] vfs: Add LSM hooks for the new mount API "
` [PATCH 10/34] selinux: Implement the new mount API LSM hooks "
` [PATCH 11/34] smack: Implement filesystem context security "
` [PATCH 12/34] apparmor: Implement security hooks for the new mount API "
` [PATCH 13/34] tomoyo: "

[PATCH security-next v2 00/26] LSM: Explict LSM ordering
 2018-09-21 14:57 UTC  (45+ messages)
` [PATCH security-next v2 01/26] LSM: Correctly announce start of LSM initialization
` [PATCH security-next v2 02/26] vmlinux.lds.h: Avoid copy/paste of security_init section
` [PATCH security-next v2 03/26] LSM: Rename .security_initcall section to .lsm_info
` [PATCH security-next v2 04/26] LSM: Remove initcall tracing
` [PATCH security-next v2 05/26] LSM: Convert from initcall to struct lsm_info
` [PATCH security-next v2 06/26] vmlinux.lds.h: Move LSM_TABLE into INIT_DATA
` [PATCH security-next v2 07/26] LSM: Convert security_initcall() into DEFINE_LSM()
` [PATCH security-next v2 08/26] LSM: Record LSM name in struct lsm_info
` [PATCH security-next v2 09/26] LSM: Provide init debugging infrastructure
` [PATCH security-next v2 10/26] LSM: Don't ignore initialization failures
` [PATCH security-next v2 11/26] LSM: Introduce LSM_FLAG_LEGACY_MAJOR
` [PATCH security-next v2 12/26] LSM: Provide separate ordered initialization
` [PATCH security-next v2 13/26] LSM: Plumb visibility into optional "enabled" state
` [PATCH security-next v2 14/26] LSM: Lift LSM selection out of individual LSMs
` [PATCH security-next v2 15/26] LSM: Introduce lsm.enable= and lsm.disable=
` [PATCH security-next v2 16/26] LSM: Prepare for reorganizing "security=" logic
` [PATCH security-next v2 17/26] LSM: Refactor "security=" in terms of enable/disable
` [PATCH security-next v2 18/26] LSM: Build ordered list of ordered LSMs for init
` [PATCH security-next v2 19/26] LSM: Introduce CONFIG_LSM_ORDER
` [PATCH security-next v2 20/26] LSM: Introduce "lsm.order=" for boottime ordering
` [PATCH security-next v2 21/26] LoadPin: Initialize as ordered LSM
` [PATCH security-next v2 22/26] Yama: "
` [PATCH security-next v2 23/26] LSM: Introduce enum lsm_order
` [PATCH security-next v2 24/26] capability: Mark as LSM_ORDER_FIRST
` [PATCH security-next v2 25/26] LSM: Separate idea of "major" LSM from "exclusive" LSM
` [PATCH security-next v2 26/26] LSM: Add all exclusive LSMs to ordered initialization

[PATCH v4 00/21] tpm: separate tpm 1.x and tpm 2.x commands
 2018-09-21 13:58 UTC  (22+ messages)
` [PATCH v4 01/21] tpm2: add new tpm2 commands according to TCG 1.36
` [PATCH v4 02/21] tpm: sort objects in the Makefile
` [PATCH v4 03/21] tpm: factor out tpm 1.x duration calculation to tpm1-cmd.c
` [PATCH v4 04/21] tpm: add tpm_calc_ordinal_duration() wrapper
` [PATCH v4 05/21] tpm: factor out tpm_get_timeouts()
` [PATCH v4 06/21] tpm: move tpm1_pcr_extend to tpm1-cmd.c
` [PATCH v4 07/21] tpm: move tpm_getcap "
` [PATCH v4 08/21] tpm: factor out tpm1_get_random into tpm1-cmd.c
` [PATCH v4 09/21] tpm: move tpm 1.x selftest code from tpm-interface.c tpm1-cmd.c
` [PATCH v4 10/21] tpm: factor out tpm 1.x pm suspend flow into tpm1-cmd.c
` [PATCH v4 11/21] tpm: factor out tpm_startup function
` [PATCH v4 12/21] tpm: move pcr extend code to tpm2-cmd.c
` [PATCH v4 13/21] tpm: add tpm_auto_startup() into tpm-interface.c
` [PATCH v4 14/21] tpm: tpm-interface.c drop unused macros
` [PATCH v4 15/21] tpm: tpm-space.c remove unneeded semicolon
` [PATCH v4 16/21] tpm: tpm1: rewrite tpm1_get_random() using tpm_buf structure
` [PATCH v4 17/21] tpm1: implement tpm1_pcr_read_dev() "
` [PATCH v4 18/21] tmp1: rename tpm1_pcr_read_dev to tpm1_pcr_read()
` [PATCH v4 19/21] tpm1: reimplement SAVESTATE using tpm_buf
` [PATCH v4 20/21] tpm1: reimplement tpm1_continue_selftest() "
` [PATCH v4 21/21] tpm: use u32 instead of int for PCR index

[PATCH v3 0/6] Add support for architecture specific IMA policies
 2018-09-21  8:34 UTC  (8+ messages)
` [PATCH v3 1/6] x86/ima: define arch_ima_get_secureboot
` [PATCH v3 2/6] ima: prevent kexec_load syscall based on runtime secureboot flag
` [PATCH v3 3/6] ima: refactor ima_init_policy()
` [PATCH v3 4/6] ima: add support for arch specific policies
` [PATCH v3 5/6] ima: add support for external setting of ima_appraise
` [PATCH v3 6/6] x86/ima: define arch_get_ima_policy() for x86

[PATCH v3 00/16] LSM: Module stacking in support of SARA and Landlock
 2018-09-20 17:56 UTC  (24+ messages)
` [PATCH v3 01/16] procfs: add smack subdir to attrs
` [PATCH v3 02/16] Smack: Abstract use of cred security blob
` [PATCH v3 03/16] SELinux: "
` [PATCH v3 04/16] SELinux: Remove cred security blob poisoning
` [PATCH v3 05/16] SELinux: Remove unused selinux_is_enabled
` [PATCH v3 06/16] AppArmor: Abstract use of cred security blob
` [PATCH v3 07/16] TOMOYO: "
` [PATCH v3 08/16] LSM: Infrastructure management of the "
` [PATCH v3 09/16] SELinux: Abstract use of file "
` [PATCH v3 10/16] LSM: Infrastructure management of the "
` [PATCH v3 11/16] SELinux: Abstract use of inode "
` [PATCH v3 12/16] Smack: "
` [PATCH v3 13/16] LSM: Infrastructure management of the inode security
` [PATCH v3 14/16] LSM: Infrastructure management of the task security blob
` [PATCH v3 15/16] LSM: Infrastructure management of the ipc "
` [PATCH v3 16/16] LSM: Blob sharing support for S.A.R.A and LandLock

[PATCH 00/22] KEYS: Support TPM-wrapped key and crypto ops
 2018-09-20 17:07 UTC  (16+ messages)

[PATCH] netfilter: nf_tables: add SECMARK support
 2018-09-20 15:23 UTC  (8+ messages)

FYI: email change
 2018-09-19 15:55 UTC 

[PATCH v3 00/20] tpm: separate tpm 1.x and tpm 2.x commands
 2018-09-19 15:24 UTC  (43+ messages)
` [PATCH v3 01/20] tpm2: add new tpm2 commands according to TCG 1.36
` [PATCH v3 02/20] tpm: sort objects in the Makefile
` [PATCH v3 03/20] tpm: factor out tpm 1.x duration calculation to tpm1-cmd.c
` [PATCH v3 04/20] tpm: add tpm_calc_ordinal_duration wrapper
` [PATCH v3 05/20] tpm: factor out tpm_get_timeouts
` [PATCH v3 06/20] tpm: move tpm1_pcr_extend to tpm1-cmd.c
` [PATCH v3 07/20] tpm: move tpm_getcap "
` [PATCH v3 08/20] tpm: factor out tpm1_get_random into tpm1-cmd.c
` [PATCH v3 09/20] tpm: move tpm1 selftest code from tpm-interface tpm1-cmd.c
` [PATCH v3 10/20] tpm: factor out tpm1 pm suspend flow into tpm1-cmd.c
` [PATCH v3 11/20] tpm: factor out tpm_startup function
` [PATCH v3 12/20] tpm: move pcr extend code to tpm2-cmd.c
` [PATCH v3 13/20] tpm: add tpm_auto_startup into tpm-interface
` [PATCH v3 14/20] tpm: tpm-interface.c drop unused macros
` [PATCH v3 15/20] tpm: tpm-space.c remove unneeded semicolon
` [PATCH v3 16/20] tpm: tpm1: rewrite tpm1_get_random() using tpm_buf structure
` [PATCH v3 17/20] tpm1: implement tpm1_pcr_read_dev() "
` [PATCH v3 18/20] tpm: use u32 instead of int for pcr index
` [PATCH v3 19/20] tpm1: reimplement SAVESTATE using tpm_buf
` [PATCH v3 20/20] tpm1: reimplement tpm1_continue_selftest() "

Hello Friend
 2018-09-19  6:01 UTC 

[PATCH v2 3/3] tpm: retrieve digest size of unknown algorithms with PCR read
 2018-09-18 18:54 UTC  (4+ messages)

[PATCH v2 00/10] LSM: Module stacking in support of S.A.R.A and Landlock
 2018-09-18 15:23 UTC  (3+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).