messages from 2017-11-09 15:31:10 to 2017-11-21 09:49:23 UTC [more...]
[RFC][PATCH][v0.2] selinuxns: extend namespace support to security.selinux xattrs
2017-11-21 9:49 UTC
IMA appraisal master plan?
2017-11-21 9:33 UTC (9+ messages)
[PATCH] KEYS: add missing permission check for request_key() destination
2017-11-20 22:58 UTC
[PATCH] KEYS: remove unnecessary get/put of explicit dest_keyring
2017-11-20 22:57 UTC
[RFC PATCH 5/5] selinux: Add SCTP support
2017-11-20 21:55 UTC (7+ messages)
[PATCH] security: replace FSF address with web source in license notices
2017-11-20 20:25 UTC (3+ messages)
[PATCH v2 00/15] ima: digest list feature
2017-11-20 16:52 UTC (25+ messages)
` [PATCH v2 06/15] ima: add parser of digest lists metadata
` [PATCH v2 12/15] ima: do not update security.ima if appraisal status is not INTEGRITY_PASS
[PATCH] apparmor: initialized returned struct aa_perms
2017-11-20 16:05 UTC (5+ messages)
Documentation patch for namespaced file capabilities
2017-11-20 16:03 UTC (2+ messages)
[GIT PULL] security subsystem: IMA bugfix
2017-11-19 21:42 UTC
[GIT PULL] integrity: fixes
2017-11-19 3:26 UTC
Spende von 4.800.000,00 EUR
2017-11-18 19:45 UTC
[PATCH] net/netlabel: Add list_next_rcu() in rcu_dereference()
2017-11-18 13:27 UTC (3+ messages)
[PATCH v2] tpm: Move Linux RNG connection to hwrng
2017-11-17 13:57 UTC (11+ messages)
[PATCH 0/4] treewide: Fix line continuation formats
2017-11-16 19:35 UTC (5+ messages)
` [PATCH 4/4] ima: Fix line continuation format
[PATCH v4 0/4] additional TPM performance improvements
2017-11-16 14:34 UTC (5+ messages)
` [PATCH v4 2/4] tpm: ignore burstcount to improve tpm_tis send() performance
[PATCH 18/27] bpf: Restrict kernel image access functions when the kernel is locked down
2017-11-16 0:05 UTC (46+ messages)
` [PATCH 00/27] security, efi: Add kernel lockdown
` Firmware signing -- "
[USER SPACE][RFC][PATCH 5/5] digest-list-tools: package
2017-11-15 13:41 UTC
[USER SPACE][RFC][PATCH 0/5] ima: digest-list-tools package
2017-11-15 13:39 UTC (5+ messages)
` [USER SPACE][RFC][PATCH 1/5] digest-list-tools: headers
` [USER SPACE][RFC][PATCH 2/5] digest-list-tools: library
` [USER SPACE][RFC][PATCH 3/5] digest-list-tools: tools
` [USER SPACE][RFC][PATCH 4/5] digest-list-tools: documentation
[GIT PULL] Security subsystem: integrity updates for v4.15
2017-11-15 12:37 UTC (2+ messages)
Hello Dear
2017-11-15 11:33 UTC
[RFC v0.1][PATCH] selinuxns: extend namespace support to security.selinux xattrs
2017-11-15 7:48 UTC (8+ messages)
[PATCH V3 1/2] security: Add a cred_getsecid hook
2017-11-14 19:42 UTC (5+ messages)
[paul@keyserver.paulfurley.com: PGP key expires in 3 days: 0x7179B76704ABA18B (it can be extended)]
2017-11-14 15:09 UTC (2+ messages)
[PATCH v3] tpm: use struct tpm_chip for tpm_chip_find_get()
2017-11-14 14:32 UTC (4+ messages)
[PATCH] tpm: Update MAINTAINERS for Jason Gunthorpe
2017-11-14 14:27 UTC (8+ messages)
[PATCH] KEYS: remove CONFIG_KEYS_COMPAT
2017-11-13 22:56 UTC (5+ messages)
[RFC PATCH 4/5] netlabel: Add SCTP support
2017-11-13 22:26 UTC (4+ messages)
[GIT PULL] SELinux patches for v4.15
2017-11-13 21:58 UTC
(no subject)
2017-11-13 14:55 UTC
Hello Dear
2017-11-13 12:08 UTC
[GIT PULL] Security subsystem general updates for 4.15
2017-11-12 21:57 UTC
[RFC PATCH v1] fw_lockdown: new micro LSM module to prevent loading unsigned firmware
2017-11-11 23:04 UTC (4+ messages)
[PATCH 0/9] LSM: Stacking for major security modules - Based on 4.14-rc2
2017-11-11 20:18 UTC (3+ messages)
[PATCH 0/2] security/keys/trusted: Fine-tuning for two function implementations
2017-11-11 9:37 UTC (5+ messages)
` [PATCH 1/2] KEYS: trusted: Use common error handling code in trusted_update()
` "
` [PATCH 2/2] KEYS: trusted: Use common error handling code in tpm_unseal()
[RFC PATCH] fw_lockdown: new micro LSM module to prevent loading unsigned firmware
2017-11-10 20:30 UTC (5+ messages)
[PATCH 00/30] security, efi: Add kernel lockdown
2017-11-10 11:06 UTC (37+ messages)
` [PATCH 01/30] Add the ability to lock down access to the running kernel image
` [PATCH 02/30] Add a SysRq option to lift kernel lockdown
` [PATCH 03/30] ima: require secure_boot rules in lockdown mode
` [PATCH 04/30] Enforce module signatures if the kernel is locked down
` [PATCH 05/30] Restrict /dev/{mem, kmem, port} when "
` [PATCH 06/30] kexec: Disable at runtime if "
` [PATCH 07/30] Copy secure_boot flag in boot params across kexec reboot
` [PATCH 08/30] kexec_file: Restrict at runtime if the kernel is locked down
` [PATCH 09/30] hibernate: Disable when "
` [PATCH 10/30] uswsusp: "
` [PATCH 11/30] PCI: Lock down BAR access "
` [PATCH 12/30] x86: Lock down IO port "
` [PATCH 13/30] x86/msr: Restrict MSR "
` [PATCH 14/30] asus-wmi: Restrict debugfs interface "
` [PATCH 15/30] ACPI: Limit access to custom_method "
` [PATCH 16/30] acpi: Ignore acpi_rsdp kernel param when the kernel has been "
` [PATCH 17/30] acpi: Disable ACPI table override if the kernel is "
` [PATCH 18/30] acpi: Disable APEI error injection "
` [PATCH 19/30] scsi: Lock down the eata driver
` [PATCH 20/30] Prohibit PCMCIA CIS storage when the kernel is locked down
` [PATCH 21/30] Lock down TIOCSSERIAL
` [PATCH 22/30] Lock down module params that specify hardware parameters (eg. ioport)
` [PATCH 23/30] x86/mmiotrace: Lock down the testmmiotrace module
` [PATCH 24/30] debugfs: Disallow use of debugfs files when the kernel is locked down
` [PATCH 25/30] Lock down /proc/kcore
` [PATCH 26/30] Lock down ftrace
` [PATCH 27/30] Lock down kprobes
` [PATCH 28/30] bpf: Restrict kernel image access functions when the kernel is locked down
` [PATCH 29/30] efi: Add an EFI_SECURE_BOOT flag to indicate secure boot mode
` [PATCH 30/30] efi: Lock down the kernel if booted in "
[PATCH RFC v3 0/7] proc: modernize proc to support multiple private instances
2017-11-10 10:45 UTC (19+ messages)
` [PATCH RFC v3 1/7] proc: add proc_fs_info struct to store proc information
` [PATCH RFC v3 2/7] proc: move /proc/{self|thread-self} dentries to proc_fs_info
` [PATCH RFC v3 3/7] proc: add helpers to set and get proc hidepid and gid mount options
` [PATCH RFC v3 4/7] proc: support mounting private procfs instances inside same pid namespace
` [PATCH RFC v3 5/7] proc: move hidepid definitions to proc files
` [PATCH RFC v3 6/7] proc: support new 'pids=all|ptraceable' mount option
` [PATCH RFC v3 7/7] proc: flush dcache entries from all procfs instances
[RFC][PATCH] Lock down kprobes
2017-11-10 1:01 UTC (5+ messages)
[RFC][PATCH] Lock down ftrace
2017-11-09 21:54 UTC (3+ messages)
[RFC PATCH] ima: require secure_boot rules in lockdown mode
2017-11-09 19:17 UTC (14+ messages)
[RFC][PATCH] Lock down kprobes
2017-11-09 16:52 UTC (2+ messages)
[RFC][PATCH] Lock down kprobes
2017-11-09 16:43 UTC (4+ messages)
[PATCH 00/27] security, efi: Add kernel lockdown
2017-11-02 22:01 UTC
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).