linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2017-04-03 00:50:24 to 2017-04-07 12:36:17 UTC [more...]

[PATCH 00/24] Kernel lockdown
 2017-04-07 12:36 UTC  (56+ messages)
` [PATCH 01/24] efi: Add EFI_SECURE_BOOT bit
` [PATCH 02/24] Add the ability to lock down access to the running kernel image
` [PATCH 03/24] efi: Lock down the kernel if booted in secure boot mode
` [PATCH 04/24] Enforce module signatures if the kernel is locked down
` [PATCH 05/24] Restrict /dev/mem and /dev/kmem when "
` [PATCH 06/24] Add a sysrq option to exit secure boot mode
` [PATCH 07/24] kexec: Disable at runtime if the kernel is locked down
` [PATCH 08/24] Copy secure_boot flag in boot params across kexec reboot
` [PATCH 09/24] kexec_file: Disable at runtime if securelevel has been set
` [PATCH 10/24] hibernate: Disable when the kernel is locked down
` [PATCH 11/24] uswsusp: "
` [PATCH 12/24] PCI: Lock down BAR access "
` [PATCH 13/24] x86: Lock down IO port "
` [PATCH 14/24] x86: Restrict MSR "
` [PATCH 15/24] asus-wmi: Restrict debugfs interface "
` [PATCH 16/24] ACPI: Limit access to custom_method "
` [PATCH 17/24] acpi: Ignore acpi_rsdp kernel param when the kernel has been "
` [PATCH 18/24] acpi: Disable ACPI table override if the kernel is "
` [PATCH 19/24] acpi: Disable APEI error injection "
` [PATCH 20/24] bpf: Restrict kernel image access functions when "
` [PATCH 21/24] scsi: Lock down the eata driver
` [PATCH 22/24] Prohibit PCMCIA CIS storage when the kernel is locked down
` [PATCH 23/24] Lock down TIOCSSERIAL
` [PATCH 24/24] Lock down module params that specify hardware parameters (eg. ioport)

[PATCH 00/38] Annotate hw config module params for future lockdown
 2017-04-07 10:42 UTC  (43+ messages)
` [PATCH 01/38] Annotate module params that specify hardware parameters (eg. ioport)
` [PATCH 02/38] Annotate hardware config module parameters in arch/x86/mm/
` [PATCH 03/38] Annotate hardware config module parameters in drivers/char/ipmi/
` [PATCH 04/38] Annotate hardware config module parameters in drivers/char/mwave/
` [PATCH 05/38] Annotate hardware config module parameters in drivers/char/
` [PATCH 06/38] Annotate hardware config module parameters in drivers/clocksource/
` [PATCH 07/38] Annotate hardware config module parameters in drivers/cpufreq/
` [PATCH 08/38] Annotate hardware config module parameters in drivers/gpio/
` [PATCH 09/38] Annotate hardware config module parameters in drivers/i2c/
` [PATCH 10/38] Annotate hardware config module parameters in drivers/iio/
` [PATCH 11/38] Annotate hardware config module parameters in drivers/input/
` [PATCH 12/38] Annotate hardware config module parameters in drivers/isdn/
` [PATCH 13/38] Annotate hardware config module parameters in drivers/media/
` [PATCH 14/38] Annotate hardware config module parameters in drivers/misc/
` [PATCH 15/38] Annotate hardware config module parameters in drivers/mmc/host/
` [PATCH 16/38] Annotate hardware config module parameters in drivers/net/appletalk/
` [PATCH 17/38] Annotate hardware config module parameters in drivers/net/arcnet/
` [PATCH 18/38] Annotate hardware config module parameters in drivers/net/can/
` [PATCH 19/38] Annotate hardware config module parameters in drivers/net/ethernet/
` [PATCH 20/38] Annotate hardware config module parameters in drivers/net/hamradio/
` [PATCH 21/38] Annotate hardware config module parameters in drivers/net/irda/
` [PATCH 22/38] Annotate hardware config module parameters in drivers/net/wan/
` [PATCH 23/38] Annotate hardware config module parameters in drivers/net/wireless/
` [PATCH 24/38] Annotate hardware config module parameters in drivers/parport/
` [PATCH 25/38] Annotate hardware config module parameters in drivers/pci/hotplug/
` [PATCH 26/38] Annotate hardware config module parameters in drivers/pcmcia/
` [PATCH 27/38] Annotate hardware config module parameters in drivers/scsi/
` [PATCH 28/38] Annotate hardware config module parameters in drivers/staging/media/
` [PATCH 29/38] Annotate hardware config module parameters in drivers/staging/speakup/
` [PATCH 30/38] Annotate hardware config module parameters in drivers/staging/vme/
` [PATCH 31/38] Annotate hardware config module parameters in drivers/tty/
` [PATCH 32/38] Annotate hardware config module parameters in drivers/video/
` [PATCH 33/38] Annotate hardware config module parameters in drivers/watchdog/
` [PATCH 34/38] Annotate hardware config module parameters in fs/pstore/
` [PATCH 35/38] Annotate hardware config module parameters in sound/drivers/
` [PATCH 36/38] Annotate hardware config module parameters in sound/isa/
` [PATCH 37/38] Annotate hardware config module parameters in sound/oss/
` [PATCH 38/38] Annotate hardware config module parameters in sound/pci/

[GIT PULL] AppArmor fixes for 4.12
 2017-04-06 22:58 UTC  (8+ messages)
` [PATCH 1/6] apparmor: fix boolreturn.cocci warnings
` [PATCH 2/6] security/apparmor/lsm.c: set debug messages
` [PATCH 3/6] apparmor: use SHASH_DESC_ON_STACK
` [PATCH 4/6] apparmor: fix invalid reference to index variable of iterator line 836
` [PATCH 5/6] apparmor: fix parameters so that the permission test is bypassed at boot
` [PATCH 6/6] apparmor: Make path_max parameter readonly

[PATCH RFC 00/11] LSM: Stacking for major security modules
 2017-04-06 22:50 UTC  (16+ messages)
` [PATCH RFC 01/11] procfs: add smack subdir to attrs
` [PATCH RFC 02/11] LSM: manage credential security blobs
` [PATCH RFC 03/11] LSM: Manage file "
` [PATCH RFC 04/11] LSM: general but not extreme module stacking
` [PATCH RFC 05/11] LSM: Infrastructure management of the remaining blobs
` [PATCH RFC 06/11] Smack: remove socket blob free
` [PATCH RFC 07/11] LSM: Mount option data for extreme stacking
` [PATCH RFC 09/11] netlabel agreement checking
` [PATCH RFC 10/11] Smack: sendmsg compile error fix
` [PATCH RFC 11/11] LSM: manage task security blobs

[PATCH 1/5] efi: Move the x86 secure boot switch to generic code
 2017-04-06 22:45 UTC  (7+ messages)
` [PATCH 2/5] efi: Add EFI_SECURE_BOOT bit
` [PATCH 3/5] Add the ability to lock down access to the running kernel image
` [PATCH 4/5] efi: Lock down the kernel if booted in secure boot mode
` [PATCH 5/5] Add a sysrq option to exit "

[PATCH 00/24] Kernel lockdown
 2017-04-06 21:55 UTC  (27+ messages)
` [PATCH 01/24] efi: Add EFI_SECURE_BOOT bit
` [PATCH 02/24] Add the ability to lock down access to the running kernel image
` [PATCH 03/24] efi: Lock down the kernel if booted in secure boot mode
` [PATCH 04/24] Enforce module signatures if the kernel is locked down
` [PATCH 05/24] Restrict /dev/mem and /dev/kmem when "
` [PATCH 06/24] Add a sysrq option to exit secure boot mode
` [PATCH 07/24] kexec: Disable at runtime if the kernel is locked down
` [PATCH 08/24] Copy secure_boot flag in boot params across kexec reboot
` [PATCH 09/24] kexec_file: Disable at runtime if securelevel has been set
` [PATCH 10/24] hibernate: Disable when the kernel is locked down
` [PATCH 11/24] uswsusp: "
` [PATCH 12/24] PCI: Lock down BAR access "
` [PATCH 13/24] x86: Lock down IO port "
` [PATCH 14/24] x86: Restrict MSR "
` [PATCH 15/24] asus-wmi: Restrict debugfs interface "
` [PATCH 16/24] ACPI: Limit access to custom_method "
` [PATCH 17/24] acpi: Ignore acpi_rsdp kernel param when the kernel has been "
` [PATCH 18/24] acpi: Disable ACPI table override if the kernel is "
` [PATCH 19/24] acpi: Disable APEI error injection "

[tpmdd-devel] [RFC PATCH] tpm: msleep() delays - replace with usleep_range() in i2c nuvoton driver
 2017-04-06 15:27 UTC 

[GIT PULL] tpmdd updates for 4.12
 2017-04-06  0:31 UTC  (2+ messages)

FW: [PATCH] Smack: Use GFP_KERNEL for smk_netlbl_mls()
 2017-04-05 22:22 UTC  (2+ messages)

[PATCH 00/24] Kernel lockdown
 2017-04-05 17:08 UTC  (9+ messages)
` [PATCH 01/24] efi: Add EFI_SECURE_BOOT bit
` [PATCH 02/24] Add the ability to lock down access to the running kernel image
` [PATCH 03/24] efi: Lock down the kernel if booted in secure boot mode
` [PATCH 04/24] Enforce module signatures if the kernel is locked down
` [PATCH 05/24] Restrict /dev/mem and /dev/kmem when "
` [PATCH 06/24] Add a sysrq option to exit secure boot mode
` [PATCH 07/24] kexec: Disable at runtime if the kernel is locked down
` [PATCH 08/24] Copy secure_boot flag in boot params across kexec reboot

[PATCH 27/39] Annotate hardware config module parameters in drivers/scsi/
 2017-04-05 14:33 UTC 

[PATCH] tpm_crb: remove a cruft constant
 2017-04-05 11:10 UTC 

[PATCH] selinux: Fix SBLABEL_MNT for NFS mounts
 2017-04-04 23:26 UTC  (7+ messages)

[PATCH] KEYS: Fix integrity calls to keyring_alloc
 2017-04-04 21:49 UTC  (5+ messages)

[PATCH 0/9] convert genericirq.tmpl and kernel-api.tmpl to DocBook
 2017-04-04 12:34 UTC  (3+ messages)

[PATCH 0/3] SELinux: Fine-tuning for two function implementations
 2017-04-04 11:16 UTC  (4+ messages)
  ` [PATCH 1/3] selinux: Return directly after a failed memory allocation in policydb_index()
  ` [PATCH 2/3] selinux: Return an error code only as a constant in sidtab_insert()
  ` [PATCH 3/3] selinux: Use an other error code for an input validation failure "

[PATCH v13 00/10] Make keyring link restrictions accessible from userspace
 2017-04-04  7:30 UTC  (7+ messages)

[PATCH] selinux: Fix an uninitialized variable bug
 2017-04-04  0:03 UTC  (6+ messages)

[PATCH] KEYS: fix dereferencing NULL payload with nonzero length
 2017-04-03 21:30 UTC  (5+ messages)

[PATCH v2] KEYS: fix keyctl_set_reqkey_keyring() to not leak thread keyrings
 2017-04-03 21:16 UTC 

[PATCH] KEYS: fix keyctl_set_reqkey_keyring() to not leak thread keyrings
 2017-04-03 15:52 UTC  (2+ messages)

[PATCH] KEYS: fix freeing uninitialized memory in key_update()
 2017-04-03 15:48 UTC  (2+ messages)

[PATCH 0/2] security, keys refcount conversions
 2017-04-03  0:50 UTC  (2+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).