linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2019-07-13 00:15:22 to 2019-07-26 07:05:23 UTC [more...]

[PATCH 0/5] security: integrity: Makefile cleanups
 2019-07-26  7:04 UTC  (8+ messages)
` [PATCH 1/5] integrity: remove unneeded, broken attempt to add -fshort-wchar
` [PATCH 2/5] integrity: remove pointless subdir-$(CONFIG_...)
` [PATCH 3/5] integrity: use obj-y for non-modular objects
` [PATCH 4/5] IMA: "
` [PATCH 5/5] EVM: "

[PATCH] test_meminit: use GFP_ATOMIC in RCU critical section
 2019-07-25 12:17 UTC 

[PATCH V36 00/29] security: Add kernel lockdown functionality
 2019-07-25  2:23 UTC  (35+ messages)
` [PATCH V36 01/29] security: Support early LSMs
` [PATCH V36 02/29] security: Add a "locked down" LSM hook
` [PATCH V36 03/29] security: Add a static lockdown policy LSM
` [PATCH V36 04/29] Enforce module signatures if the kernel is locked down
` [PATCH V36 05/29] Restrict /dev/{mem,kmem,port} when "
` [PATCH V36 06/29] kexec_load: Disable at runtime if "
` [PATCH V36 07/29] Copy secure_boot flag in boot params across kexec reboot
` [PATCH V36 08/29] kexec_file: split KEXEC_VERIFY_SIG into KEXEC_SIG and KEXEC_SIG_FORCE
` [PATCH V36 09/29] kexec_file: Restrict at runtime if the kernel is locked down
` [PATCH V36 10/29] hibernate: Disable when "
` [PATCH V36 11/29] PCI: Lock down BAR access "
` [PATCH V36 12/29] x86: Lock down IO port "
` [PATCH V36 13/29] x86/msr: Restrict MSR "
` [PATCH V36 14/29] ACPI: Limit access to custom_method "
` [PATCH V36 15/29] acpi: Ignore acpi_rsdp kernel param when the kernel has been "
` [PATCH V36 16/29] acpi: Disable ACPI table override if the kernel is "
` [PATCH V36 17/29] Prohibit PCMCIA CIS storage when "
` [PATCH V36 18/29] Lock down TIOCSSERIAL
` [PATCH V36 19/29] Lock down module params that specify hardware parameters (eg. ioport)
` [PATCH V36 20/29] x86/mmiotrace: Lock down the testmmiotrace module
` [PATCH V36 21/29] Lock down /proc/kcore
` [PATCH V36 22/29] Lock down tracing and perf kprobes when in confidentiality mode
` [PATCH V36 23/29] bpf: Restrict bpf when kernel lockdown is "
` [PATCH V36 24/29] Lock down perf when "
` [PATCH V36 25/29] kexec: Allow kexec_file() with appropriate IMA policy when locked down
` [PATCH V36 26/29] debugfs: Restrict debugfs when the kernel is "
` [PATCH V36 27/29] tracefs: Restrict tracefs "
` [PATCH V36 28/29] efi: Restrict efivar_ssdt_load "
` [PATCH V36 29/29] lockdown: Print current->comm in restriction messages

[RFC PATCH] security,capability: pass object information to security_capable
 2019-07-24 20:12 UTC  (18+ messages)
  ` [RFC PATCH] security, capability: "

KASAN: use-after-free Read in keyring_compare_object
 2019-07-24 15:46 UTC 

[PATCH v4 0/3] initramfs: add support for xattrs in the initial ram disk
 2019-07-24 15:34 UTC  (9+ messages)

Reminder: 2 open syzbot bugs in "security/tomoyo" subsystem
 2019-07-24  5:00 UTC  (5+ messages)

Reminder: 1 open syzbot bug in "security/integrity" subsystem
 2019-07-24  2:49 UTC 

Reminder: 1 open syzbot bug in "security/smack" subsystem
 2019-07-24  2:47 UTC 

[PATCH 00/10] VFS: Provide new mount UAPI
 2019-07-23 23:30 UTC  (14+ messages)
` [PATCH 02/10] vfs: syscall: Add move_mount(2) to move mounts around

[PATCH v12 00/11] Appended signatures support for IMA appraisal
 2019-07-23 22:39 UTC  (8+ messages)
` [PATCH v12 01/11] MODSIGN: Export module signature definitions

Preferred subj= with multiple LSMs
 2019-07-23 21:46 UTC  (39+ messages)
                                        ` Dbus and multiple LSMs (was Preferred subj= with multiple LSMs)

[RFC PATCH v3] fanotify, inotify, dnotify, security: add security hook for fs notifications
 2019-07-23 19:27 UTC 

[RFC PATCH v2] fanotify, inotify, dnotify, security: add security hook for fs notifications
 2019-07-23 18:49 UTC  (5+ messages)
  ` [Non-DoD Source] "

[PATCH] security: smack: Fix possible null-pointer dereferences in smack_socket_sock_rcv_skb()
 2019-07-23 10:00 UTC 

[PATCH] selinux: check sidtab limit before adding a new entry
 2019-07-23  6:48 UTC  (3+ messages)

[PATCH] [RESEND v2] structleak: disable STRUCTLEAK_BYREF in combination with KASAN_STACK
 2019-07-22 17:23 UTC  (6+ messages)

[PATCH bpf-next v10 00/10] Landlock LSM: Toward unprivileged sandboxing
 2019-07-21 21:31 UTC  (11+ messages)
` [PATCH bpf-next v10 01/10] fs,security: Add a new file access type: MAY_CHROOT
` [PATCH bpf-next v10 02/10] bpf: Add expected_attach_triggers and a is_valid_triggers() verifier
` [PATCH bpf-next v10 03/10] bpf,landlock: Define an eBPF program type for Landlock hooks
` [PATCH bpf-next v10 04/10] seccomp,landlock: Enforce Landlock programs per process hierarchy
` [PATCH bpf-next v10 05/10] landlock: Handle filesystem access control
` [PATCH bpf-next v10 06/10] bpf,landlock: Add a new map type: inode
` [PATCH bpf-next v10 07/10] landlock: Add ptrace restrictions
` [PATCH bpf-next v10 08/10] bpf: Add a Landlock sandbox example
` [PATCH bpf-next v10 09/10] bpf,landlock: Add tests for Landlock
` [PATCH bpf-next v10 10/10] landlock: Add user and kernel documentation "

[PATCH v5 00/23] LSM: Module stacking for AppArmor
 2019-07-19 23:37 UTC  (8+ messages)
` [PATCH v5 15/23] LSM: Specify which LSM to display

[RFC/RFT v2 0/2] KEYS: trusted: Add generic trusted keys framework
 2019-07-18 11:24 UTC  (3+ messages)
` [RFC/RFT v2 1/2] KEYS: trusted: create trusted keys subsystem
` [RFC/RFT v2 2/2] KEYS: trusted: Add generic trusted keys framework

[RFC PATCH v7 0/1] Add dm verity root hash pkcs7 sig validation
 2019-07-18  1:04 UTC  (3+ messages)
` [RFC PATCH v7 1/1] "

[GIT PULL] SafeSetID LSM changes for 5.3
 2019-07-17 19:40 UTC  (5+ messages)

[RFC PATCH v6 0/1] Add dm verity root hash pkcs7 sig validation
 2019-07-17 13:08 UTC  (5+ messages)

KASAN: use-after-free Write in check_noncircular
 2019-07-17  8:58 UTC 

[PATCH V35 00/29] Kernel lockdown functionality
 2019-07-16 23:22 UTC  (38+ messages)
` [PATCH V35 01/29] security: Support early LSMs
` [PATCH V35 02/29] security: Add a "locked down" LSM hook
` [PATCH V35 03/29] security: Add a static lockdown policy LSM
` [PATCH V35 04/29] Enforce module signatures if the kernel is locked down
` [PATCH V35 05/29] Restrict /dev/{mem,kmem,port} when "
` [PATCH V35 06/29] kexec_load: Disable at runtime if "
` [PATCH V35 07/29] Copy secure_boot flag in boot params across kexec reboot
` [PATCH V35 08/29] kexec_file: split KEXEC_VERIFY_SIG into KEXEC_SIG and KEXEC_SIG_FORCE
` [PATCH V35 09/29] kexec_file: Restrict at runtime if the kernel is locked down
` [PATCH V35 10/29] hibernate: Disable when "
` [PATCH V35 11/29] PCI: Lock down BAR access "
` [PATCH V35 12/29] x86: Lock down IO port "
` [PATCH V35 13/29] x86/msr: Restrict MSR "
` [PATCH V35 14/29] ACPI: Limit access to custom_method "
` [PATCH V35 15/29] acpi: Ignore acpi_rsdp kernel param when the kernel has been "
` [PATCH V35 16/29] acpi: Disable ACPI table override if the kernel is "
` [PATCH V35 17/29] Prohibit PCMCIA CIS storage when "
` [PATCH V35 18/29] Lock down TIOCSSERIAL
` [PATCH V35 19/29] Lock down module params that specify hardware parameters (eg. ioport)
` [PATCH V35 20/29] x86/mmiotrace: Lock down the testmmiotrace module
` [PATCH V35 21/29] Lock down /proc/kcore
` [PATCH V35 22/29] Lock down tracing and perf kprobes when in confidentiality mode
` [PATCH V35 23/29] bpf: Restrict bpf when kernel lockdown is "
` [PATCH V35 24/29] Lock down perf when "
` [PATCH V35 25/29] kexec: Allow kexec_file() with appropriate IMA policy when locked down
` [PATCH V35 26/29] debugfs: Restrict debugfs when the kernel is "
` [PATCH V35 27/29] tracefs: Restrict tracefs "
` [PATCH V35 28/29] efi: Restrict efivar_ssdt_load "
` [PATCH V35 29/29] lockdown: Print current->comm in restriction messages

[RFC] acpi: Ignore acpi_rsdp kernel param when the kernel has been locked down
 2019-07-16 22:15 UTC 

[RFC PATCH v3 04/12] x86/sgx: Require userspace to define enclave pages' protection bits
 2019-07-15 22:29 UTC 

[RFC PATCH v2 1/3] x86/sgx: Add SGX specific LSM hooks
 2019-07-15 22:23 UTC  (12+ messages)

[PATCH] LSM: Update MAINTAINERS file for SafeSetID LSM
 2019-07-15 16:52 UTC  (5+ messages)

[PATCH] KEYS: trusted: allow module init if TPM is inactive or deactivated
 2019-07-15 16:44 UTC  (3+ messages)

possible deadlock in process_measurement
 2019-07-15 16:34 UTC  (4+ messages)

[PATCH AUTOSEL 5.1 102/219] integrity: Fix __integrity_init_keyring() section mismatch
 2019-07-15 14:01 UTC 

[PATCH AUTOSEL 5.2 116/249] integrity: Fix __integrity_init_keyring() section mismatch
 2019-07-15 13:44 UTC 

[PATCH v21 17/28] x86/sgx: Add provisioning
 2019-07-13 17:07 UTC 

[PATCH v5 00/12] S.A.R.A. a new stacked LSM
 2019-07-13  0:14 UTC  (3+ messages)
` [PATCH v5 01/12] S.A.R.A.: add documentation


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).