linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2018-09-23 13:51:30 to 2018-09-28 22:30:31 UTC [more...]

[PATCH v5 00/21] tpm: separate tpm 1.x and tpm 2.x commands
 2018-09-28 22:30 UTC  (18+ messages)
` [PATCH v5 01/21] tpm2: add new tpm2 commands according to TCG 1.36
` [PATCH v5 02/21] tpm: sort objects in the Makefile
` [PATCH v5 03/21] tpm: factor out tpm 1.x duration calculation to tpm1-cmd.c
` [PATCH v5 04/21] tpm: add tpm_calc_ordinal_duration() wrapper
` [PATCH v5 05/21] tpm: factor out tpm_get_timeouts()
` [PATCH v5 06/21] tpm: move tpm1_pcr_extend to tpm1-cmd.c
` [PATCH v5 07/21] tpm: move tpm_getcap "
` [PATCH v5 08/21] tpm: factor out tpm1_get_random into tpm1-cmd.c
` [PATCH v5 09/21] tpm: move tpm 1.x selftest code from tpm-interface.c tpm1-cmd.c
` [PATCH v5 10/21] tpm: factor out tpm 1.x pm suspend flow into tpm1-cmd.c
` [PATCH v5 11/21] tpm: factor out tpm_startup function
` [PATCH v5 12/21] tpm: move pcr extend code to tpm2-cmd.c
` [PATCH v5 13/21] tpm: add tpm_auto_startup() into tpm-interface.c
` [PATCH v5 14/21] tpm: tpm-interface.c drop unused macros
` [PATCH v5 15/21] tpm: tpm-space.c remove unneeded semicolon
` [PATCH v5 16/21] tpm: tpm1: rewrite tpm1_get_random() using tpm_buf structure
` [PATCH v5 17/21] tpm1: implement tpm1_pcr_read_dev() "

[PATCH security-next v3 00/29] LSM: Explict LSM ordering
 2018-09-28 20:54 UTC  (37+ messages)
` [PATCH security-next v3 01/29] LSM: Correctly announce start of LSM initialization
` [PATCH security-next v3 02/29] vmlinux.lds.h: Avoid copy/paste of security_init section
` [PATCH security-next v3 03/29] LSM: Rename .security_initcall section to .lsm_info
` [PATCH security-next v3 04/29] LSM: Remove initcall tracing
` [PATCH security-next v3 05/29] LSM: Convert from initcall to struct lsm_info
` [PATCH security-next v3 06/29] vmlinux.lds.h: Move LSM_TABLE into INIT_DATA
` [PATCH security-next v3 07/29] LSM: Convert security_initcall() into DEFINE_LSM()
` [PATCH security-next v3 08/29] LSM: Record LSM name in struct lsm_info
` [PATCH security-next v3 09/29] LSM: Provide init debugging infrastructure
` [PATCH security-next v3 10/29] LSM: Don't ignore initialization failures
` [PATCH security-next v3 11/29] LSM: Introduce LSM_FLAG_LEGACY_MAJOR
` [PATCH security-next v3 12/29] LSM: Provide separate ordered initialization
` [PATCH security-next v3 13/29] LoadPin: Rename "enable" to "enforce"
` [PATCH security-next v3 14/29] LSM: Plumb visibility into optional "enabled" state
` [PATCH security-next v3 15/29] LSM: Lift LSM selection out of individual LSMs
` [PATCH security-next v3 16/29] LSM: Prepare for arbitrary LSM enabling
` [PATCH security-next v3 17/29] LSM: Introduce CONFIG_LSM_ENABLE
` [PATCH security-next v3 18/29] LSM: Introduce lsm.enable= and lsm.disable=
` [PATCH security-next v3 19/29] LSM: Prepare for reorganizing "security=" logic
` [PATCH security-next v3 20/29] LSM: Refactor "security=" in terms of enable/disable
` [PATCH security-next v3 21/29] LSM: Build ordered list of ordered LSMs for init
` [PATCH security-next v3 22/29] LSM: Introduce CONFIG_LSM_ORDER
` [PATCH security-next v3 23/29] LSM: Introduce "lsm.order=" for boottime ordering
` [PATCH security-next v3 24/29] LoadPin: Initialize as ordered LSM
` [PATCH security-next v3 25/29] Yama: "
` [PATCH security-next v3 26/29] LSM: Introduce enum lsm_order
` [PATCH security-next v3 27/29] capability: Initialize as LSM_ORDER_FIRST
` [PATCH security-next v3 28/29] LSM: Separate idea of "major" LSM from "exclusive" LSM
` [PATCH security-next v3 29/29] LSM: Add all exclusive LSMs to ordered initialization

[PATCH v5 0/5] LSM: Support ptrace sidechannel access checks
 2018-09-28 17:40 UTC  (24+ messages)
` [PATCH v5 1/5] AppArmor: Prepare for PTRACE_MODE_SCHED
` [PATCH v5 2/5] Smack: "
` [PATCH v5 3/5] SELinux: "
` [PATCH v5 4/5] Capability: Complete PTRACE_MODE_SCHED
` [PATCH v5 5/5] sidechannel: Linux Security Module for sidechannel

[PATCH 00/22] KEYS: Support TPM-wrapped key and crypto ops
 2018-09-28 17:20 UTC  (11+ messages)

[PATCH] keys: Fix the use of the C++ keyword "private" in uapi/linux/keyctl.h
 2018-09-28 16:53 UTC  (2+ messages)

general protection fault in __aa_lookupn_ns
 2018-09-28 15:02 UTC  (3+ messages)

KASAN: global-out-of-bounds Read in __aa_lookupn_ns
 2018-09-28 15:01 UTC  (4+ messages)

INVESTMENT!
 2018-09-28 14:58 UTC 

KMSAN: uninit-value in aa_fqlookupn_profile
 2018-09-28  9:34 UTC 

[PATCH v3 1/2] netfilter: nf_tables: add SECMARK support
 2018-09-28  9:01 UTC  (4+ messages)
` [PATCH v3 2/2] netfilter: nf_tables: add requirements for connsecmark support

[PATCH v4 0/6] Add support for architecture specific IMA policies
 2018-09-28  0:51 UTC  (14+ messages)
` [PATCH v4 1/6] x86/ima: define arch_ima_get_secureboot
` [PATCH v4 2/6] ima: prevent kexec_load syscall based on runtime secureboot flag
` [PATCH v4 3/6] ima: refactor ima_init_policy()
` [PATCH v4 4/6] ima: add support for arch specific policies
` [PATCH v4 5/6] ima: add support for external setting of ima_appraise
` [PATCH v4 6/6] x86/ima: define arch_get_ima_policy() for x86

Leaking Path in XFS's ioctl interface(missing LSM check)
 2018-09-27 23:12 UTC  (9+ messages)

[PATCH v4 00/19] LSM: Module stacking for SARA and Landlock
 2018-09-27 22:32 UTC  (18+ messages)
` [PATCH v4 04/19] SELinux: Remove cred security blob poisoning
` [PATCH v4 20/19] LSM: Correct file blob free empty blob check
` [PATCH 21/19] LSM: Cleanup and fixes from Tetsuo Handa

[PATCH] apparmor: Fix uninitialized value in aa_split_fqname
 2018-09-27 21:49 UTC 

[PATCH v4 0/5] LSM: Add and use a hook for side-channel safety checks
 2018-09-27 19:49 UTC  (3+ messages)
` [PATCH 6/5] capability: Repair sidechannel test in ptrace

[PATCH v2, RESEND 0/3] tpm: retrieve digest size of unknown algorithms from TPM
 2018-09-27 13:50 UTC  (10+ messages)
` [PATCH v2, RESEND 2/3] tpm: modify tpm_pcr_read() definition to pass TPM hash algorithms
` [PATCH v2, RESEND 3/3] tpm: retrieve digest size of unknown algorithms with PCR read

Leaking path for set_task_comm
 2018-09-26 22:39 UTC  (5+ messages)

EXTERNAL: [PATCH v2 2/3] tpm: modify tpm_pcr_read() definition to pass TPM hash algorithms
 2018-09-26 14:39 UTC 

Leaking path or inconsistency LSM checking observed in fs/net
 2018-09-26 13:09 UTC  (4+ messages)

Leaking path for search_binary_handler
 2018-09-26 12:59 UTC  (2+ messages)

general protection fault in integrity_inode_free
 2018-09-26  7:53 UTC 

KASAN: stack-out-of-bounds Read in __aa_lookupn_ns
 2018-09-26  7:52 UTC 

[PATCH v4 00/21] tpm: separate tpm 1.x and tpm 2.x commands
 2018-09-26  7:01 UTC  (28+ messages)
` [PATCH v4 01/21] tpm2: add new tpm2 commands according to TCG 1.36
` [PATCH v4 02/21] tpm: sort objects in the Makefile
` [PATCH v4 03/21] tpm: factor out tpm 1.x duration calculation to tpm1-cmd.c
` [PATCH v4 05/21] tpm: factor out tpm_get_timeouts()
` [PATCH v4 09/21] tpm: move tpm 1.x selftest code from tpm-interface.c tpm1-cmd.c
` [PATCH v4 10/21] tpm: factor out tpm 1.x pm suspend flow into tpm1-cmd.c
` [PATCH v4 11/21] tpm: factor out tpm_startup function
` [PATCH v4 14/21] tpm: tpm-interface.c drop unused macros
` [PATCH v4 18/21] tmp1: rename tpm1_pcr_read_dev to tpm1_pcr_read()
` [PATCH v4 20/21] tpm1: reimplement tpm1_continue_selftest() using tpm_buf
` [PATCH v4 21/21] tpm: use u32 instead of int for PCR index

leaking path in android binder: set_nice
 2018-09-26  2:58 UTC  (4+ messages)

Naming confusion and code comments for security_kernel_(post_)read_file
 2018-09-26  0:47 UTC 

general protection fault in rb_erase
 2018-09-25 23:44 UTC 

[PULL] Smack: Changes for 4.20
 2018-09-25 18:42 UTC  (2+ messages)

[GIT PULL] Keys: fix C++ reserved word issue
 2018-09-25 18:07 UTC  (5+ messages)

[PATCH v3 00/20] tpm: separate tpm 1.x and tpm 2.x commands
 2018-09-25 16:25 UTC  (4+ messages)
` [PATCH v3 06/20] tpm: move tpm1_pcr_extend to tpm1-cmd.c

[PATCH 0/2] KEYS: Revert and replace incorrect UAPI fix
 2018-09-24 16:52 UTC  (5+ messages)
` [PATCH 1/2] Revert "uapi/linux/keyctl.h: don't use C++ reserved keyword as a struct member name"
` [PATCH 2/2] keys: Fix the use of the C++ keyword "private" in uapi/linux/keyctl.h

[PATCH] Revert "uapi/linux/keyctl.h: don't use C++ reserved keyword as a struct member name"
 2018-09-24 12:08 UTC  (3+ messages)

[PATCH v3 3/6] ima: refactor ima_init_policy()
 2018-09-24 11:10 UTC  (2+ messages)

[PATCH v2 1/2] netfilter: nf_tables: add SECMARK support
 2018-09-24  3:03 UTC  (8+ messages)
` [PATCH 2/2] netfilter: nf_tables: add requirements for connsecmark support


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).