linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2017-10-20 19:19:15 to 2017-10-30 17:05:38 UTC [more...]

[RFC PATCH] ima: require secure_boot rules in lockdown mode
 2017-10-30 17:05 UTC  (4+ messages)

[PATCH V3 1/2] security: Add a cred_getsecid hook
 2017-10-30 17:03 UTC  (9+ messages)
` [PATCH V3 2/2] IMA: Support using new creds in appraisal policy

[PATCH 12/27] x86/msr: Restrict MSR access when the kernel is locked down
 2017-10-30 17:00 UTC  (50+ messages)
` [PATCH 00/27] security, efi: Add kernel lockdown
  ` [PATCH 01/27] Add the ability to lock down access to the running kernel image
  ` [PATCH 03/27] Enforce module signatures if the kernel is locked down
  ` [PATCH 04/27] Restrict /dev/mem and /dev/kmem when "
  ` [PATCH 05/27] kexec: Disable at runtime if "
  ` [PATCH 07/27] kexec_file: Disable at runtime if securelevel has been set
  ` [PATCH 09/27] uswsusp: Disable when the kernel is locked down
  ` [PATCH 18/27] bpf: Restrict kernel image access functions "
  ` [PATCH 25/27] Lock down /proc/kcore
  ` [PATCH 26/27] efi: Add an EFI_SECURE_BOOT flag to indicate secure boot mode

[RFC v0.1][PATCH] selinuxns: extend namespace support to security.selinux xattrs
 2017-10-30 15:55 UTC  (2+ messages)

[RFC PATCH] xfrm: fix regression introduced by xdst pcpu cache
 2017-10-30 14:58 UTC 

[PATCH v2] fscrypt: fix dereference of NULL user_key_payload
 2017-10-29 16:32 UTC  (3+ messages)

[PATCH 0/9] LSM: Stacking for major security modules - Based on 4.14-rc2
 2017-10-27 21:45 UTC  (10+ messages)
` [PATCH 1/9] procfs: add smack subdir to attrs
` [PATCH 2/9] LSM: Manage credential security blobs
` [PATCH 3/9] LSM: Manage file "
` [PATCH 4/9] LSM: Manage task "
` [PATCH 5/9] LSM: Manage remaining "
` [PATCH 6/9] LSM: General stacking
` [PATCH 7/9] LSM: Shared secids
` [PATCH 8/9] LSM: Multiple security mount options
` [PATCH 9/9] LSM: Full security module stacking

[RFC PATCH] xfrm: fix regression introduced by xdst pcpu cache
 2017-10-27 15:28 UTC 

Proposal: rename tpm1_eventlog.c and tpm2_eventlog.c
 2017-10-27  9:13 UTC  (5+ messages)

[PATCH] KEYS: trusted: fix writing past end of buffer in trusted_read()
 2017-10-27  7:55 UTC  (3+ messages)

[PATCH] MAINTAINERS: remove David Safford as maintainer for encrypted+trusted keys
 2017-10-27  7:47 UTC  (2+ messages)

[PATCH v5 00/18] Appended signatures support for IMA appraisal
 2017-10-26 23:13 UTC  (11+ messages)
` [PATCH v5 12/18] MODSIGN: Export module signature definitions
` [PATCH v5 13/18] PKCS#7: Introduce pkcs7_get_message_sig and verify_pkcs7_message_sig
` [PATCH v5 18/18] ima: Write modsig to the measurement list

[GIT PULL] Kernel lockdown for secure boot
 2017-10-26 19:20 UTC  (3+ messages)

Fixing CVE-2017-15361
 2017-10-26 19:07 UTC  (19+ messages)

[PATCH v3] tpm: use struct tpm_chip for tpm_chip_find_get()
 2017-10-26 16:50 UTC  (6+ messages)

[PATCH] tpm: remove chip_num parameter from in-kernel API
 2017-10-26 16:23 UTC  (26+ messages)
` [tpmdd-devel] "

[PATCH v2] tpm: use struct tpm_chip for tpm_chip_find_get()
 2017-10-26 10:54 UTC  (8+ messages)

[PATCH] Audit: remove unused audit_log_secctx function
 2017-10-25 21:19 UTC  (3+ messages)

[PATCH] tpm: Move Linux RNG connection to hwrng
 2017-10-25 20:04 UTC  (10+ messages)

[PATCH v3 0/2] ima: change how MODULE_SIG_FORCE is checked on modules checking policy
 2017-10-25 17:18 UTC  (5+ messages)
` [PATCH v3 1/2] module: export module signature enforcement status
` [PATCH v3 2/2] ima: check signature enforcement against cmdline param instead of CONFIG

[RFC PATCH 3/5] sctp: Add LSM hooks
 2017-10-24 20:27 UTC  (6+ messages)

[RFC PATCH 5/5] selinux: Add SCTP support
 2017-10-24 15:50 UTC  (3+ messages)

[PATCH v4 0/4] additional TPM performance improvements
 2017-10-24 13:45 UTC  (10+ messages)
` [PATCH v4 1/4] tpm: move wait_for_tpm_stat() to respective driver files
` [PATCH v4 2/4] tpm: ignore burstcount to improve tpm_tis send() performance

[PATCH v2 0/2] ima: change how MODULE_SIG_FORCE is checked on modules checking policy
 2017-10-24 10:41 UTC  (4+ messages)
` [PATCH v2 1/2] module: export module signature enforcement status
` [PATCH v2 2/2] ima: check signature enforcement against cmdline param instead of CONFIG

[RFC][PATCH 1/2] ima: preserve the integrity of appraised files
 2017-10-24 10:07 UTC  (4+ messages)

[PATCH net-next v7 0/5] bpf: security: New file mode and LSM hooks for eBPF object permission control
 2017-10-23 23:28 UTC  (5+ messages)
` [PATCH net-next v7 4/5] selinux: bpf: Add selinux check for eBPF syscall operations
` [PATCH net-next v7 5/5] selinux: bpf: Add addtional check for bpf object file receive

[PATCH 1/2] security: Add a cred_getsecid hook
 2017-10-23 23:20 UTC  (2+ messages)

Can we delete audit_log_secctx()?
 2017-10-23 23:14 UTC  (3+ messages)

[RFC PATCH 1/2] security, capabilities: Add CAP_SYS_MOUNT
 2017-10-23 12:57 UTC  (6+ messages)
` [RFC PATCH 2/2] fs: add the possibility to use CAP_SYS_MOUNT to (u)mount a fs
` [kernel-hardening] [RFC PATCH 1/2] security, capabilities: Add CAP_SYS_MOUNT

[PATCH 0/2] ima: change how MODULE_SIG_FORCE is checked on modules checking policy
 2017-10-23 12:57 UTC  (5+ messages)
` [PATCH 1/2] module: export module signature enforcement status
` [PATCH 2/2] ima: check signature enforcement against cmdline param instead of CONFIG

[PATCH] tpm: remove a misleading error message from tpm_get_timeouts()
 2017-10-23 11:31 UTC 

[RFC PATCH 1/2] security, capabilities: create CAP_TRUSTED
 2017-10-21 19:09 UTC  (6+ messages)
` [RFC PATCH 2/2] fs: Grant CAP_TRUSTED rw access to trusted xattrs
` [kernel-hardening] [RFC PATCH 1/2] security, capabilities: create CAP_TRUSTED

[PATCH 0/8] CaitSith LSM module
 2017-10-21 17:17 UTC  (5+ messages)

[PATCH] [v2] tomoyo: fix timestamping for y2038
 2017-10-21  2:22 UTC  (2+ messages)

[PATCH 18/27] bpf: Restrict kernel image access functions when the kernel is locked down
 2017-10-20 16:43 UTC  (3+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).