linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2017-11-09 15:31:10 to 2017-11-21 09:49:23 UTC [more...]

[RFC][PATCH][v0.2] selinuxns: extend namespace support to security.selinux xattrs
 2017-11-21  9:49 UTC 

IMA appraisal master plan?
 2017-11-21  9:33 UTC  (9+ messages)

[PATCH] KEYS: add missing permission check for request_key() destination
 2017-11-20 22:58 UTC 

[PATCH] KEYS: remove unnecessary get/put of explicit dest_keyring
 2017-11-20 22:57 UTC 

[RFC PATCH 5/5] selinux: Add SCTP support
 2017-11-20 21:55 UTC  (7+ messages)

[PATCH] security: replace FSF address with web source in license notices
 2017-11-20 20:25 UTC  (3+ messages)

[PATCH v2 00/15] ima: digest list feature
 2017-11-20 16:52 UTC  (25+ messages)
` [PATCH v2 06/15] ima: add parser of digest lists metadata
` [PATCH v2 12/15] ima: do not update security.ima if appraisal status is not INTEGRITY_PASS

[PATCH] apparmor: initialized returned struct aa_perms
 2017-11-20 16:05 UTC  (5+ messages)

Documentation patch for namespaced file capabilities
 2017-11-20 16:03 UTC  (2+ messages)

[GIT PULL] security subsystem: IMA bugfix
 2017-11-19 21:42 UTC 

[GIT PULL] integrity: fixes
 2017-11-19  3:26 UTC 

Spende von 4.800.000,00 EUR
 2017-11-18 19:45 UTC 

[PATCH] net/netlabel: Add list_next_rcu() in rcu_dereference()
 2017-11-18 13:27 UTC  (3+ messages)

[PATCH v2] tpm: Move Linux RNG connection to hwrng
 2017-11-17 13:57 UTC  (11+ messages)

[PATCH 0/4] treewide: Fix line continuation formats
 2017-11-16 19:35 UTC  (5+ messages)
` [PATCH 4/4] ima: Fix line continuation format

[PATCH v4 0/4] additional TPM performance improvements
 2017-11-16 14:34 UTC  (5+ messages)
` [PATCH v4 2/4] tpm: ignore burstcount to improve tpm_tis send() performance

[PATCH 18/27] bpf: Restrict kernel image access functions when the kernel is locked down
 2017-11-16  0:05 UTC  (46+ messages)
  ` [PATCH 00/27] security, efi: Add kernel lockdown
    ` Firmware signing -- "

[USER SPACE][RFC][PATCH 5/5] digest-list-tools: package
 2017-11-15 13:41 UTC 

[USER SPACE][RFC][PATCH 0/5] ima: digest-list-tools package
 2017-11-15 13:39 UTC  (5+ messages)
` [USER SPACE][RFC][PATCH 1/5] digest-list-tools: headers
` [USER SPACE][RFC][PATCH 2/5] digest-list-tools: library
` [USER SPACE][RFC][PATCH 3/5] digest-list-tools: tools
` [USER SPACE][RFC][PATCH 4/5] digest-list-tools: documentation

[GIT PULL] Security subsystem: integrity updates for v4.15
 2017-11-15 12:37 UTC  (2+ messages)

Hello Dear
 2017-11-15 11:33 UTC 

[RFC v0.1][PATCH] selinuxns: extend namespace support to security.selinux xattrs
 2017-11-15  7:48 UTC  (8+ messages)

[PATCH V3 1/2] security: Add a cred_getsecid hook
 2017-11-14 19:42 UTC  (5+ messages)

[paul@keyserver.paulfurley.com: PGP key expires in 3 days: 0x7179B76704ABA18B (it can be extended)]
 2017-11-14 15:09 UTC  (2+ messages)

[PATCH v3] tpm: use struct tpm_chip for tpm_chip_find_get()
 2017-11-14 14:32 UTC  (4+ messages)

[PATCH] tpm: Update MAINTAINERS for Jason Gunthorpe
 2017-11-14 14:27 UTC  (8+ messages)

[PATCH] KEYS: remove CONFIG_KEYS_COMPAT
 2017-11-13 22:56 UTC  (5+ messages)

[RFC PATCH 4/5] netlabel: Add SCTP support
 2017-11-13 22:26 UTC  (4+ messages)

[GIT PULL] SELinux patches for v4.15
 2017-11-13 21:58 UTC 

(no subject)
 2017-11-13 14:55 UTC 

Hello Dear
 2017-11-13 12:08 UTC 

[GIT PULL] Security subsystem general updates for 4.15
 2017-11-12 21:57 UTC 

[RFC PATCH v1] fw_lockdown: new micro LSM module to prevent loading unsigned firmware
 2017-11-11 23:04 UTC  (4+ messages)

[PATCH 0/9] LSM: Stacking for major security modules - Based on 4.14-rc2
 2017-11-11 20:18 UTC  (3+ messages)

[PATCH 0/2] security/keys/trusted: Fine-tuning for two function implementations
 2017-11-11  9:37 UTC  (5+ messages)
` [PATCH 1/2] KEYS: trusted: Use common error handling code in trusted_update()
    `  "
` [PATCH 2/2] KEYS: trusted: Use common error handling code in tpm_unseal()

[RFC PATCH] fw_lockdown: new micro LSM module to prevent loading unsigned firmware
 2017-11-10 20:30 UTC  (5+ messages)

[PATCH 00/30] security, efi: Add kernel lockdown
 2017-11-10 11:06 UTC  (37+ messages)
` [PATCH 01/30] Add the ability to lock down access to the running kernel image
` [PATCH 02/30] Add a SysRq option to lift kernel lockdown
` [PATCH 03/30] ima: require secure_boot rules in lockdown mode
` [PATCH 04/30] Enforce module signatures if the kernel is locked down
` [PATCH 05/30] Restrict /dev/{mem, kmem, port} when "
` [PATCH 06/30] kexec: Disable at runtime if "
` [PATCH 07/30] Copy secure_boot flag in boot params across kexec reboot
` [PATCH 08/30] kexec_file: Restrict at runtime if the kernel is locked down
` [PATCH 09/30] hibernate: Disable when "
` [PATCH 10/30] uswsusp: "
` [PATCH 11/30] PCI: Lock down BAR access "
` [PATCH 12/30] x86: Lock down IO port "
` [PATCH 13/30] x86/msr: Restrict MSR "
` [PATCH 14/30] asus-wmi: Restrict debugfs interface "
` [PATCH 15/30] ACPI: Limit access to custom_method "
` [PATCH 16/30] acpi: Ignore acpi_rsdp kernel param when the kernel has been "
` [PATCH 17/30] acpi: Disable ACPI table override if the kernel is "
` [PATCH 18/30] acpi: Disable APEI error injection "
` [PATCH 19/30] scsi: Lock down the eata driver
` [PATCH 20/30] Prohibit PCMCIA CIS storage when the kernel is locked down
` [PATCH 21/30] Lock down TIOCSSERIAL
` [PATCH 22/30] Lock down module params that specify hardware parameters (eg. ioport)
` [PATCH 23/30] x86/mmiotrace: Lock down the testmmiotrace module
` [PATCH 24/30] debugfs: Disallow use of debugfs files when the kernel is locked down
` [PATCH 25/30] Lock down /proc/kcore
` [PATCH 26/30] Lock down ftrace
` [PATCH 27/30] Lock down kprobes
` [PATCH 28/30] bpf: Restrict kernel image access functions when the kernel is locked down
` [PATCH 29/30] efi: Add an EFI_SECURE_BOOT flag to indicate secure boot mode
` [PATCH 30/30] efi: Lock down the kernel if booted in "

[PATCH RFC v3 0/7] proc: modernize proc to support multiple private instances
 2017-11-10 10:45 UTC  (19+ messages)
` [PATCH RFC v3 1/7] proc: add proc_fs_info struct to store proc information
` [PATCH RFC v3 2/7] proc: move /proc/{self|thread-self} dentries to proc_fs_info
` [PATCH RFC v3 3/7] proc: add helpers to set and get proc hidepid and gid mount options
` [PATCH RFC v3 4/7] proc: support mounting private procfs instances inside same pid namespace
` [PATCH RFC v3 5/7] proc: move hidepid definitions to proc files
` [PATCH RFC v3 6/7] proc: support new 'pids=all|ptraceable' mount option
` [PATCH RFC v3 7/7] proc: flush dcache entries from all procfs instances

[RFC][PATCH] Lock down kprobes
 2017-11-10  1:01 UTC  (5+ messages)

[RFC][PATCH] Lock down ftrace
 2017-11-09 21:54 UTC  (3+ messages)

[RFC PATCH] ima: require secure_boot rules in lockdown mode
 2017-11-09 19:17 UTC  (14+ messages)

[RFC][PATCH] Lock down kprobes
 2017-11-09 16:52 UTC  (2+ messages)

[RFC][PATCH] Lock down kprobes
 2017-11-09 16:43 UTC  (4+ messages)

[PATCH 00/27] security, efi: Add kernel lockdown
 2017-11-02 22:01 UTC 


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).