messages from 2017-10-20 19:19:15 to 2017-10-30 17:05:38 UTC [more...]
[RFC PATCH] ima: require secure_boot rules in lockdown mode
2017-10-30 17:05 UTC (4+ messages)
[PATCH V3 1/2] security: Add a cred_getsecid hook
2017-10-30 17:03 UTC (9+ messages)
` [PATCH V3 2/2] IMA: Support using new creds in appraisal policy
[PATCH 12/27] x86/msr: Restrict MSR access when the kernel is locked down
2017-10-30 17:00 UTC (50+ messages)
` [PATCH 00/27] security, efi: Add kernel lockdown
` [PATCH 01/27] Add the ability to lock down access to the running kernel image
` [PATCH 03/27] Enforce module signatures if the kernel is locked down
` [PATCH 04/27] Restrict /dev/mem and /dev/kmem when "
` [PATCH 05/27] kexec: Disable at runtime if "
` [PATCH 07/27] kexec_file: Disable at runtime if securelevel has been set
` [PATCH 09/27] uswsusp: Disable when the kernel is locked down
` [PATCH 18/27] bpf: Restrict kernel image access functions "
` [PATCH 25/27] Lock down /proc/kcore
` [PATCH 26/27] efi: Add an EFI_SECURE_BOOT flag to indicate secure boot mode
[RFC v0.1][PATCH] selinuxns: extend namespace support to security.selinux xattrs
2017-10-30 15:55 UTC (2+ messages)
[RFC PATCH] xfrm: fix regression introduced by xdst pcpu cache
2017-10-30 14:58 UTC
[PATCH v2] fscrypt: fix dereference of NULL user_key_payload
2017-10-29 16:32 UTC (3+ messages)
[PATCH 0/9] LSM: Stacking for major security modules - Based on 4.14-rc2
2017-10-27 21:45 UTC (10+ messages)
` [PATCH 1/9] procfs: add smack subdir to attrs
` [PATCH 2/9] LSM: Manage credential security blobs
` [PATCH 3/9] LSM: Manage file "
` [PATCH 4/9] LSM: Manage task "
` [PATCH 5/9] LSM: Manage remaining "
` [PATCH 6/9] LSM: General stacking
` [PATCH 7/9] LSM: Shared secids
` [PATCH 8/9] LSM: Multiple security mount options
` [PATCH 9/9] LSM: Full security module stacking
[RFC PATCH] xfrm: fix regression introduced by xdst pcpu cache
2017-10-27 15:28 UTC
Proposal: rename tpm1_eventlog.c and tpm2_eventlog.c
2017-10-27 9:13 UTC (5+ messages)
[PATCH] KEYS: trusted: fix writing past end of buffer in trusted_read()
2017-10-27 7:55 UTC (3+ messages)
[PATCH] MAINTAINERS: remove David Safford as maintainer for encrypted+trusted keys
2017-10-27 7:47 UTC (2+ messages)
[PATCH v5 00/18] Appended signatures support for IMA appraisal
2017-10-26 23:13 UTC (11+ messages)
` [PATCH v5 12/18] MODSIGN: Export module signature definitions
` [PATCH v5 13/18] PKCS#7: Introduce pkcs7_get_message_sig and verify_pkcs7_message_sig
` [PATCH v5 18/18] ima: Write modsig to the measurement list
[GIT PULL] Kernel lockdown for secure boot
2017-10-26 19:20 UTC (3+ messages)
Fixing CVE-2017-15361
2017-10-26 19:07 UTC (19+ messages)
[PATCH v3] tpm: use struct tpm_chip for tpm_chip_find_get()
2017-10-26 16:50 UTC (6+ messages)
[PATCH] tpm: remove chip_num parameter from in-kernel API
2017-10-26 16:23 UTC (26+ messages)
` [tpmdd-devel] "
[PATCH v2] tpm: use struct tpm_chip for tpm_chip_find_get()
2017-10-26 10:54 UTC (8+ messages)
[PATCH] Audit: remove unused audit_log_secctx function
2017-10-25 21:19 UTC (3+ messages)
[PATCH] tpm: Move Linux RNG connection to hwrng
2017-10-25 20:04 UTC (10+ messages)
[PATCH v3 0/2] ima: change how MODULE_SIG_FORCE is checked on modules checking policy
2017-10-25 17:18 UTC (5+ messages)
` [PATCH v3 1/2] module: export module signature enforcement status
` [PATCH v3 2/2] ima: check signature enforcement against cmdline param instead of CONFIG
[RFC PATCH 3/5] sctp: Add LSM hooks
2017-10-24 20:27 UTC (6+ messages)
[RFC PATCH 5/5] selinux: Add SCTP support
2017-10-24 15:50 UTC (3+ messages)
[PATCH v4 0/4] additional TPM performance improvements
2017-10-24 13:45 UTC (10+ messages)
` [PATCH v4 1/4] tpm: move wait_for_tpm_stat() to respective driver files
` [PATCH v4 2/4] tpm: ignore burstcount to improve tpm_tis send() performance
[PATCH v2 0/2] ima: change how MODULE_SIG_FORCE is checked on modules checking policy
2017-10-24 10:41 UTC (4+ messages)
` [PATCH v2 1/2] module: export module signature enforcement status
` [PATCH v2 2/2] ima: check signature enforcement against cmdline param instead of CONFIG
[RFC][PATCH 1/2] ima: preserve the integrity of appraised files
2017-10-24 10:07 UTC (4+ messages)
[PATCH net-next v7 0/5] bpf: security: New file mode and LSM hooks for eBPF object permission control
2017-10-23 23:28 UTC (5+ messages)
` [PATCH net-next v7 4/5] selinux: bpf: Add selinux check for eBPF syscall operations
` [PATCH net-next v7 5/5] selinux: bpf: Add addtional check for bpf object file receive
[PATCH 1/2] security: Add a cred_getsecid hook
2017-10-23 23:20 UTC (2+ messages)
Can we delete audit_log_secctx()?
2017-10-23 23:14 UTC (3+ messages)
[RFC PATCH 1/2] security, capabilities: Add CAP_SYS_MOUNT
2017-10-23 12:57 UTC (6+ messages)
` [RFC PATCH 2/2] fs: add the possibility to use CAP_SYS_MOUNT to (u)mount a fs
` [kernel-hardening] [RFC PATCH 1/2] security, capabilities: Add CAP_SYS_MOUNT
[PATCH 0/2] ima: change how MODULE_SIG_FORCE is checked on modules checking policy
2017-10-23 12:57 UTC (5+ messages)
` [PATCH 1/2] module: export module signature enforcement status
` [PATCH 2/2] ima: check signature enforcement against cmdline param instead of CONFIG
[PATCH] tpm: remove a misleading error message from tpm_get_timeouts()
2017-10-23 11:31 UTC
[RFC PATCH 1/2] security, capabilities: create CAP_TRUSTED
2017-10-21 19:09 UTC (6+ messages)
` [RFC PATCH 2/2] fs: Grant CAP_TRUSTED rw access to trusted xattrs
` [kernel-hardening] [RFC PATCH 1/2] security, capabilities: create CAP_TRUSTED
[PATCH 0/8] CaitSith LSM module
2017-10-21 17:17 UTC (5+ messages)
[PATCH] [v2] tomoyo: fix timestamping for y2038
2017-10-21 2:22 UTC (2+ messages)
[PATCH 18/27] bpf: Restrict kernel image access functions when the kernel is locked down
2017-10-20 16:43 UTC (3+ messages)
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).