messages from 2019-07-07 15:49:49 to 2019-07-15 20:02:40 UTC [more...]
[PATCH V35 00/29] Kernel lockdown functionality
2019-07-15 19:59 UTC (28+ messages)
` [PATCH V35 01/29] security: Support early LSMs
` [PATCH V35 03/29] security: Add a static lockdown policy LSM
` [PATCH V35 05/29] Restrict /dev/{mem,kmem,port} when the kernel is locked down
` [PATCH V35 06/29] kexec_load: Disable at runtime if "
` [PATCH V35 07/29] Copy secure_boot flag in boot params across kexec reboot
` [PATCH V35 08/29] kexec_file: split KEXEC_VERIFY_SIG into KEXEC_SIG and KEXEC_SIG_FORCE
` [PATCH V35 09/29] kexec_file: Restrict at runtime if the kernel is locked down
` [PATCH V35 10/29] hibernate: Disable when "
` [PATCH V35 11/29] PCI: Lock down BAR access "
` [PATCH V35 12/29] x86: Lock down IO port "
` [PATCH V35 13/29] x86/msr: Restrict MSR "
` [PATCH V35 14/29] ACPI: Limit access to custom_method "
` [PATCH V35 15/29] acpi: Ignore acpi_rsdp kernel param when the kernel has been "
` [PATCH V35 16/29] acpi: Disable ACPI table override if the kernel is "
` [PATCH V35 17/29] Prohibit PCMCIA CIS storage when "
` [PATCH V35 18/29] Lock down TIOCSSERIAL
` [PATCH V35 19/29] Lock down module params that specify hardware parameters (eg. ioport)
` [PATCH V35 20/29] x86/mmiotrace: Lock down the testmmiotrace module
` [PATCH V35 21/29] Lock down /proc/kcore
` [PATCH V35 22/29] Lock down tracing and perf kprobes when in confidentiality mode
` [PATCH V35 23/29] bpf: Restrict bpf when kernel lockdown is "
` [PATCH V35 24/29] Lock down perf when "
` [PATCH V35 25/29] kexec: Allow kexec_file() with appropriate IMA policy when locked down
` [PATCH V35 26/29] debugfs: Restrict debugfs when the kernel is "
` [PATCH V35 27/29] tracefs: Restrict tracefs "
` [PATCH V35 28/29] efi: Restrict efivar_ssdt_load "
` [PATCH V35 29/29] lockdown: Print current->comm in restriction messages
Preferred subj= with multiple LSMs
2019-07-15 19:04 UTC (3+ messages)
[RFC PATCH] security,capability: pass object information to security_capable
2019-07-15 18:42 UTC (12+ messages)
` [RFC PATCH] security, capability: "
[PATCH v4 0/3] initramfs: add support for xattrs in the initial ram disk
2019-07-15 16:54 UTC (8+ messages)
[PATCH] LSM: Update MAINTAINERS file for SafeSetID LSM
2019-07-15 16:52 UTC (5+ messages)
[PATCH] KEYS: trusted: allow module init if TPM is inactive or deactivated
2019-07-15 16:44 UTC (7+ messages)
possible deadlock in process_measurement
2019-07-15 16:34 UTC (6+ messages)
[GIT PULL] SafeSetID LSM changes for 5.3
2019-07-15 16:04 UTC
[PATCH AUTOSEL 5.1 102/219] integrity: Fix __integrity_init_keyring() section mismatch
2019-07-15 14:01 UTC
[PATCH AUTOSEL 5.2 116/249] integrity: Fix __integrity_init_keyring() section mismatch
2019-07-15 13:44 UTC
[PATCH v21 17/28] x86/sgx: Add provisioning
2019-07-13 17:07 UTC
[PATCH v5 00/12] S.A.R.A. a new stacked LSM
2019-07-13 0:14 UTC (17+ messages)
` [PATCH v5 01/12] S.A.R.A.: add documentation
` [PATCH v5 03/12] S.A.R.A.: cred blob management
` [PATCH v5 04/12] S.A.R.A.: generic DFA for string matching
` [PATCH v5 06/12] S.A.R.A.: WX protection
` [PATCH v5 11/12] S.A.R.A.: /proc/*/mem write limitation
[PATCH 0/6] Mount and superblock notifications [ver #5]
2019-07-12 20:11 UTC (3+ messages)
` [PATCH 1/6] security: Add hooks to rule on setting a superblock or mount watch "
[RFC PATCH v6 0/1] Add dm verity root hash pkcs7 sig validation
2019-07-12 17:33 UTC (2+ messages)
Some LSM and SGX remarks before parting of for two weeks
2019-07-12 5:14 UTC (3+ messages)
[RFC/RFT] KEYS: trusted: Add generic trusted keys framework
2019-07-12 5:13 UTC (3+ messages)
[RFC PATCH] fanotify, inotify, dnotify, security: add security hook for fs notifications
2019-07-12 3:29 UTC (12+ messages)
` [Non-DoD Source] "
[PATCH 11/12] Documentation/x86: repointer docs to Documentation/arch/
2019-07-12 2:20 UTC
[RFC PATCH v4 00/12] security: x86/sgx: SGX vs. LSM
2019-07-12 0:08 UTC (85+ messages)
` [RFC PATCH v4 01/12] x86/sgx: Use mmu_notifier.release() instead of per-vma refcounting
` [RFC PATCH v4 04/12] x86/sgx: Require userspace to define enclave pages' protection bits
` [RFC PATCH v4 05/12] x86/sgx: Enforce noexec filesystem restriction for enclaves
` [RFC PATCH v4 07/12] LSM: x86/sgx: Introduce ->enclave_map() hook for Intel SGX
` [RFC PATCH v4 10/12] security/selinux: Add enclave_load() implementation
` [RFC PATCH v4 12/12] LSM: x86/sgx: Show line of sight to LSM support SGX2's EAUG
` [RFC PATCH v2 0/3] security/x86/sgx: SGX specific LSM hooks
` [RFC PATCH v3 0/4] "
` [RFC PATCH v3 1/4] x86/sgx: Add "
` [RFC PATCH v3 2/4] x86/64: Call LSM hooks from SGX subsystem/module
` [RFC PATCH v3 3/4] X86/sgx: Introduce EMA as a new LSM module
` [RFC PATCH v3 4/4] x86/sgx: Implement SGX specific hooks in SELinux
[RFC PATCH v2 1/3] x86/sgx: Add SGX specific LSM hooks
2019-07-11 10:22 UTC (15+ messages)
[PATCH V34 00/29] Lockdown as an LSM
2019-07-11 4:11 UTC (6+ messages)
` [PATCH V34 10/29] hibernate: Disable when the kernel is locked down
[GIT PULL] Keys: Set 4 - Key ACLs for 5.3
2019-07-11 3:07 UTC (7+ messages)
[PATCH 0/2] keys: ACLs
2019-07-10 1:35 UTC (6+ messages)
` [PATCH 1/2] KEYS: Replace uid/gid/perm permissions checking with an ACL
` [PATCH 2/2] KEYS: Provide KEYCTL_GRANT_PERMISSION
[PATCH v5 00/23] LSM: Module stacking for AppArmor
2019-07-09 21:34 UTC (7+ messages)
` [PATCH v5 15/23] LSM: Specify which LSM to display
[GIT PULL] LSM: capabilities updates for v5.3
2019-07-09 19:55 UTC (2+ messages)
Reminder: 2 open syzbot bugs in "security/integrity" subsystem
2019-07-09 19:15 UTC
[PATCH v1 01/22] docs: Documentation/*.txt: rename all ReST files to *.rst
2019-07-09 17:02 UTC
RFC: BUG: overlayfs getxattr recursion leaves a poison sid
2019-07-09 16:41 UTC (2+ messages)
[PATCH 00/10] VFS: Provide new mount UAPI
2019-07-09 10:51 UTC (10+ messages)
` [PATCH 02/10] vfs: syscall: Add move_mount(2) to move mounts around
[RFC 0/7] Introduce TEE based Trusted Keys support
2019-07-09 9:36 UTC (9+ messages)
` [RFC 3/7] tee: add private login method for kernel clients
[GIT PULL] integrity subsystem updates for v5.3
2019-07-09 3:50 UTC (2+ messages)
keyrings pull requests for the next merge window
2019-07-09 3:25 UTC
[GIT PULL] Keys: Set 3 - Keyrings namespacing for 5.3
2019-07-09 3:15 UTC (2+ messages)
[GIT PULL] tpmdd updates for Linux v5.3
2019-07-09 3:15 UTC (2+ messages)
[GIT PULL] Keys: Set 2 - request_key() improvements for 5.3
2019-07-09 3:15 UTC (2+ messages)
[GIT PULL] Keys: Set 1 - Miscellany for 5.3
2019-07-09 3:15 UTC (2+ messages)
[GIT PULL] SELinux patches for v5.3
2019-07-09 3:15 UTC (2+ messages)
[PATCH 0/9] Keyrings, Block and USB notifications [ver #5]
2019-07-08 19:13 UTC (5+ messages)
` [PATCH 2/9] security: Add hooks to rule on setting a watch "
` [PATCH 3/9] security: Add a hook for the point of notification insertion "
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).