messages from 2017-03-30 15:22:56 to 2017-04-06 12:40:20 UTC [more...]
[PATCH 00/24] Kernel lockdown
2017-04-06 12:40 UTC (33+ messages)
` [PATCH 01/24] efi: Add EFI_SECURE_BOOT bit
` [PATCH 02/24] Add the ability to lock down access to the running kernel image
` [PATCH 03/24] efi: Lock down the kernel if booted in secure boot mode
` [PATCH 04/24] Enforce module signatures if the kernel is locked down
` [PATCH 05/24] Restrict /dev/mem and /dev/kmem when "
` [PATCH 06/24] Add a sysrq option to exit secure boot mode
` [PATCH 07/24] kexec: Disable at runtime if the kernel is locked down
` [PATCH 08/24] Copy secure_boot flag in boot params across kexec reboot
` [PATCH 09/24] kexec_file: Disable at runtime if securelevel has been set
` [PATCH 10/24] hibernate: Disable when the kernel is locked down
` [PATCH 11/24] uswsusp: "
` [PATCH 12/24] PCI: Lock down BAR access "
` [PATCH 13/24] x86: Lock down IO port "
` [PATCH 14/24] x86: Restrict MSR "
` [PATCH 15/24] asus-wmi: Restrict debugfs interface "
` [PATCH 16/24] ACPI: Limit access to custom_method "
` [PATCH 17/24] acpi: Ignore acpi_rsdp kernel param when the kernel has been "
` [PATCH 18/24] acpi: Disable ACPI table override if the kernel is "
` [PATCH 19/24] acpi: Disable APEI error injection "
` [PATCH 20/24] bpf: Restrict kernel image access functions when "
` [PATCH 21/24] scsi: Lock down the eata driver
` [PATCH 22/24] Prohibit PCMCIA CIS storage when the kernel is locked down
` [PATCH 23/24] Lock down TIOCSSERIAL
` [PATCH 24/24] Lock down module params that specify hardware parameters (eg. ioport)
[PATCH 00/24] Kernel lockdown
2017-04-06 10:43 UTC (26+ messages)
` [PATCH 01/24] efi: Add EFI_SECURE_BOOT bit
` [PATCH 02/24] Add the ability to lock down access to the running kernel image
` [PATCH 03/24] efi: Lock down the kernel if booted in secure boot mode
` [PATCH 04/24] Enforce module signatures if the kernel is locked down
` [PATCH 05/24] Restrict /dev/mem and /dev/kmem when "
` [PATCH 06/24] Add a sysrq option to exit secure boot mode
` [PATCH 07/24] kexec: Disable at runtime if the kernel is locked down
` [PATCH 08/24] Copy secure_boot flag in boot params across kexec reboot
` [PATCH 09/24] kexec_file: Disable at runtime if securelevel has been set
` [PATCH 10/24] hibernate: Disable when the kernel is locked down
` [PATCH 11/24] uswsusp: "
` [PATCH 12/24] PCI: Lock down BAR access "
` [PATCH 13/24] x86: Lock down IO port "
` [PATCH 14/24] x86: Restrict MSR "
` [PATCH 15/24] asus-wmi: Restrict debugfs interface "
` [PATCH 16/24] ACPI: Limit access to custom_method "
` [PATCH 17/24] acpi: Ignore acpi_rsdp kernel param when the kernel has been "
` [PATCH 18/24] acpi: Disable ACPI table override if the kernel is "
` [PATCH 19/24] acpi: Disable APEI error injection "
[GIT PULL] tpmdd updates for 4.12
2017-04-06 0:31 UTC (2+ messages)
FW: [PATCH] Smack: Use GFP_KERNEL for smk_netlbl_mls()
2017-04-05 22:22 UTC (2+ messages)
[PATCH RFC 00/11] LSM: Stacking for major security modules
2017-04-05 21:54 UTC (11+ messages)
` [PATCH RFC 01/11] procfs: add smack subdir to attrs
` [PATCH RFC 02/11] LSM: manage credential security blobs
` [PATCH RFC 03/11] LSM: Manage file "
` [PATCH RFC 04/11] LSM: general but not extreme module stacking
` [PATCH RFC 05/11] LSM: Infrastructure management of the remaining blobs
` [PATCH RFC 06/11] Smack: remove socket blob free
` [PATCH RFC 07/11] LSM: Mount option data for extreme stacking
` [PATCH RFC 09/11] netlabel agreement checking
` [PATCH RFC 10/11] Smack: sendmsg compile error fix
` [PATCH RFC 11/11] LSM: manage task security blobs
[PATCH 00/38] Annotate hw config module params for future lockdown
2017-04-05 17:35 UTC (41+ messages)
` [PATCH 01/38] Annotate module params that specify hardware parameters (eg. ioport)
` [PATCH 02/38] Annotate hardware config module parameters in arch/x86/mm/
` [PATCH 03/38] Annotate hardware config module parameters in drivers/char/ipmi/
` [PATCH 04/38] Annotate hardware config module parameters in drivers/char/mwave/
` [PATCH 05/38] Annotate hardware config module parameters in drivers/char/
` [PATCH 06/38] Annotate hardware config module parameters in drivers/clocksource/
` [PATCH 07/38] Annotate hardware config module parameters in drivers/cpufreq/
` [PATCH 08/38] Annotate hardware config module parameters in drivers/gpio/
` [PATCH 09/38] Annotate hardware config module parameters in drivers/i2c/
` [PATCH 10/38] Annotate hardware config module parameters in drivers/iio/
` [PATCH 11/38] Annotate hardware config module parameters in drivers/input/
` [PATCH 12/38] Annotate hardware config module parameters in drivers/isdn/
` [PATCH 13/38] Annotate hardware config module parameters in drivers/media/
` [PATCH 14/38] Annotate hardware config module parameters in drivers/misc/
` [PATCH 15/38] Annotate hardware config module parameters in drivers/mmc/host/
` [PATCH 16/38] Annotate hardware config module parameters in drivers/net/appletalk/
` [PATCH 17/38] Annotate hardware config module parameters in drivers/net/arcnet/
` [PATCH 18/38] Annotate hardware config module parameters in drivers/net/can/
` [PATCH 19/38] Annotate hardware config module parameters in drivers/net/ethernet/
` [PATCH 20/38] Annotate hardware config module parameters in drivers/net/hamradio/
` [PATCH 21/38] Annotate hardware config module parameters in drivers/net/irda/
` [PATCH 22/38] Annotate hardware config module parameters in drivers/net/wan/
` [PATCH 23/38] Annotate hardware config module parameters in drivers/net/wireless/
` [PATCH 24/38] Annotate hardware config module parameters in drivers/parport/
` [PATCH 25/38] Annotate hardware config module parameters in drivers/pci/hotplug/
` [PATCH 26/38] Annotate hardware config module parameters in drivers/pcmcia/
` [PATCH 27/38] Annotate hardware config module parameters in drivers/scsi/
` [PATCH 28/38] Annotate hardware config module parameters in drivers/staging/media/
` [PATCH 29/38] Annotate hardware config module parameters in drivers/staging/speakup/
` [PATCH 30/38] Annotate hardware config module parameters in drivers/staging/vme/
` [PATCH 31/38] Annotate hardware config module parameters in drivers/tty/
` [PATCH 32/38] Annotate hardware config module parameters in drivers/video/
` [PATCH 33/38] Annotate hardware config module parameters in drivers/watchdog/
` [PATCH 34/38] Annotate hardware config module parameters in fs/pstore/
` [PATCH 35/38] Annotate hardware config module parameters in sound/drivers/
` [PATCH 36/38] Annotate hardware config module parameters in sound/isa/
` [PATCH 37/38] Annotate hardware config module parameters in sound/oss/
` [PATCH 38/38] Annotate hardware config module parameters in sound/pci/
[PATCH 00/24] Kernel lockdown
2017-04-05 17:08 UTC (9+ messages)
` [PATCH 01/24] efi: Add EFI_SECURE_BOOT bit
` [PATCH 02/24] Add the ability to lock down access to the running kernel image
` [PATCH 03/24] efi: Lock down the kernel if booted in secure boot mode
` [PATCH 04/24] Enforce module signatures if the kernel is locked down
` [PATCH 05/24] Restrict /dev/mem and /dev/kmem when "
` [PATCH 06/24] Add a sysrq option to exit secure boot mode
` [PATCH 07/24] kexec: Disable at runtime if the kernel is locked down
` [PATCH 08/24] Copy secure_boot flag in boot params across kexec reboot
[PATCH 27/39] Annotate hardware config module parameters in drivers/scsi/
2017-04-05 14:33 UTC
[PATCH] tpm_crb: remove a cruft constant
2017-04-05 11:10 UTC
[PATCH] selinux: Fix SBLABEL_MNT for NFS mounts
2017-04-04 23:26 UTC (7+ messages)
[PATCH] KEYS: Fix integrity calls to keyring_alloc
2017-04-04 21:49 UTC (5+ messages)
[PATCH 0/9] convert genericirq.tmpl and kernel-api.tmpl to DocBook
2017-04-04 12:34 UTC (5+ messages)
` [PATCH 9/9] kernel-api.rst: fix a series of errors when parsing C files
[PATCH 0/3] SELinux: Fine-tuning for two function implementations
2017-04-04 11:16 UTC (4+ messages)
` [PATCH 1/3] selinux: Return directly after a failed memory allocation in policydb_index()
` [PATCH 2/3] selinux: Return an error code only as a constant in sidtab_insert()
` [PATCH 3/3] selinux: Use an other error code for an input validation failure "
[PATCH v13 00/10] Make keyring link restrictions accessible from userspace
2017-04-04 7:30 UTC (17+ messages)
` [PATCH v13 01/10] KEYS: Use a typedef for restrict_link function pointers
` [PATCH v13 02/10] KEYS: Split role of the keyring pointer for keyring restrict functions
` [PATCH v13 03/10] KEYS: Add a key restriction struct
` [PATCH v13 04/10] KEYS: Use structure to capture key restriction function and data
` [PATCH v13 05/10] KEYS: Add an optional lookup_restriction hook to key_type
` [PATCH v13 06/10] KEYS: Consistent ordering for __key_link_begin and restrict check
` [PATCH v13 07/10] KEYS: Add KEYCTL_RESTRICT_KEYRING
` [PATCH v13 08/10] KEYS: Add a lookup_restriction function for the asymmetric key type
` [PATCH v13 09/10] KEYS: Restrict asymmetric key linkage using a specific keychain
` [PATCH v13 10/10] KEYS: Keyring asymmetric key restrict method with chaining
[PATCH] selinux: Fix an uninitialized variable bug
2017-04-04 0:03 UTC (8+ messages)
` selinux: Fix an uninitialized variable bug in range_read()
[PATCH] KEYS: fix dereferencing NULL payload with nonzero length
2017-04-03 21:30 UTC (5+ messages)
[PATCH v2] KEYS: fix keyctl_set_reqkey_keyring() to not leak thread keyrings
2017-04-03 21:16 UTC
[PATCH] KEYS: fix keyctl_set_reqkey_keyring() to not leak thread keyrings
2017-04-03 15:52 UTC (2+ messages)
[PATCH] KEYS: fix freeing uninitialized memory in key_update()
2017-04-03 15:48 UTC (2+ messages)
[PATCH 0/2] security, keys refcount conversions
2017-04-03 0:50 UTC (4+ messages)
` [PATCH 1/2] security, keys: convert key.usage from atomic_t to refcount_t
` [PATCH 2/2] security, keys: convert key_user.usage "
49277 linux-security-module
2017-04-02 20:58 UTC
[PATCH] TOMOYO: Switch from per "struct cred" blob to per "struct task_struct" blob
2017-04-01 3:32 UTC (7+ messages)
[PATCH net-next v6 01/11] bpf: Add eBPF program subtype and is_valid_subtype() verifier (fwd)
2017-03-31 21:19 UTC (2+ messages)
[PATCH net-next v6 00/11] Landlock LSM: Toward unprivileged sandboxing
2017-03-31 21:15 UTC (4+ messages)
` [PATCH net-next v6 06/11] seccomp, landlock: Handle Landlock events per process hierarchy
` [kernel-hardening] [PATCH net-next v6 06/11] seccomp,landlock: "
[PATCH] selinux: Use task_alloc hook rather than task_create hook
2017-03-31 19:20 UTC (6+ messages)
[PATCH RFC 0/4] proc: support multiple separate proc instances per pidnamespace
2017-03-31 11:45 UTC (12+ messages)
` [PATCH RFC 1/4] proc: add proc_fs_info struct to store proc options
` [PATCH RFC 2/4] proc: add helpers to set/get hidepid and gid mount options
` [PATCH RFC 3/4] proc: support mounting new procfs instances inside same pid namespace
` [PATCH RFC 4/4] proc: support flushing dcache entries of a task on multiple procfs mounts
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).