messages from 2017-04-03 00:50:24 to 2017-04-07 12:36:17 UTC [more...]
[PATCH 00/24] Kernel lockdown
2017-04-07 12:36 UTC (56+ messages)
` [PATCH 01/24] efi: Add EFI_SECURE_BOOT bit
` [PATCH 02/24] Add the ability to lock down access to the running kernel image
` [PATCH 03/24] efi: Lock down the kernel if booted in secure boot mode
` [PATCH 04/24] Enforce module signatures if the kernel is locked down
` [PATCH 05/24] Restrict /dev/mem and /dev/kmem when "
` [PATCH 06/24] Add a sysrq option to exit secure boot mode
` [PATCH 07/24] kexec: Disable at runtime if the kernel is locked down
` [PATCH 08/24] Copy secure_boot flag in boot params across kexec reboot
` [PATCH 09/24] kexec_file: Disable at runtime if securelevel has been set
` [PATCH 10/24] hibernate: Disable when the kernel is locked down
` [PATCH 11/24] uswsusp: "
` [PATCH 12/24] PCI: Lock down BAR access "
` [PATCH 13/24] x86: Lock down IO port "
` [PATCH 14/24] x86: Restrict MSR "
` [PATCH 15/24] asus-wmi: Restrict debugfs interface "
` [PATCH 16/24] ACPI: Limit access to custom_method "
` [PATCH 17/24] acpi: Ignore acpi_rsdp kernel param when the kernel has been "
` [PATCH 18/24] acpi: Disable ACPI table override if the kernel is "
` [PATCH 19/24] acpi: Disable APEI error injection "
` [PATCH 20/24] bpf: Restrict kernel image access functions when "
` [PATCH 21/24] scsi: Lock down the eata driver
` [PATCH 22/24] Prohibit PCMCIA CIS storage when the kernel is locked down
` [PATCH 23/24] Lock down TIOCSSERIAL
` [PATCH 24/24] Lock down module params that specify hardware parameters (eg. ioport)
[PATCH 00/38] Annotate hw config module params for future lockdown
2017-04-07 10:42 UTC (43+ messages)
` [PATCH 01/38] Annotate module params that specify hardware parameters (eg. ioport)
` [PATCH 02/38] Annotate hardware config module parameters in arch/x86/mm/
` [PATCH 03/38] Annotate hardware config module parameters in drivers/char/ipmi/
` [PATCH 04/38] Annotate hardware config module parameters in drivers/char/mwave/
` [PATCH 05/38] Annotate hardware config module parameters in drivers/char/
` [PATCH 06/38] Annotate hardware config module parameters in drivers/clocksource/
` [PATCH 07/38] Annotate hardware config module parameters in drivers/cpufreq/
` [PATCH 08/38] Annotate hardware config module parameters in drivers/gpio/
` [PATCH 09/38] Annotate hardware config module parameters in drivers/i2c/
` [PATCH 10/38] Annotate hardware config module parameters in drivers/iio/
` [PATCH 11/38] Annotate hardware config module parameters in drivers/input/
` [PATCH 12/38] Annotate hardware config module parameters in drivers/isdn/
` [PATCH 13/38] Annotate hardware config module parameters in drivers/media/
` [PATCH 14/38] Annotate hardware config module parameters in drivers/misc/
` [PATCH 15/38] Annotate hardware config module parameters in drivers/mmc/host/
` [PATCH 16/38] Annotate hardware config module parameters in drivers/net/appletalk/
` [PATCH 17/38] Annotate hardware config module parameters in drivers/net/arcnet/
` [PATCH 18/38] Annotate hardware config module parameters in drivers/net/can/
` [PATCH 19/38] Annotate hardware config module parameters in drivers/net/ethernet/
` [PATCH 20/38] Annotate hardware config module parameters in drivers/net/hamradio/
` [PATCH 21/38] Annotate hardware config module parameters in drivers/net/irda/
` [PATCH 22/38] Annotate hardware config module parameters in drivers/net/wan/
` [PATCH 23/38] Annotate hardware config module parameters in drivers/net/wireless/
` [PATCH 24/38] Annotate hardware config module parameters in drivers/parport/
` [PATCH 25/38] Annotate hardware config module parameters in drivers/pci/hotplug/
` [PATCH 26/38] Annotate hardware config module parameters in drivers/pcmcia/
` [PATCH 27/38] Annotate hardware config module parameters in drivers/scsi/
` [PATCH 28/38] Annotate hardware config module parameters in drivers/staging/media/
` [PATCH 29/38] Annotate hardware config module parameters in drivers/staging/speakup/
` [PATCH 30/38] Annotate hardware config module parameters in drivers/staging/vme/
` [PATCH 31/38] Annotate hardware config module parameters in drivers/tty/
` [PATCH 32/38] Annotate hardware config module parameters in drivers/video/
` [PATCH 33/38] Annotate hardware config module parameters in drivers/watchdog/
` [PATCH 34/38] Annotate hardware config module parameters in fs/pstore/
` [PATCH 35/38] Annotate hardware config module parameters in sound/drivers/
` [PATCH 36/38] Annotate hardware config module parameters in sound/isa/
` [PATCH 37/38] Annotate hardware config module parameters in sound/oss/
` [PATCH 38/38] Annotate hardware config module parameters in sound/pci/
[GIT PULL] AppArmor fixes for 4.12
2017-04-06 22:58 UTC (8+ messages)
` [PATCH 1/6] apparmor: fix boolreturn.cocci warnings
` [PATCH 2/6] security/apparmor/lsm.c: set debug messages
` [PATCH 3/6] apparmor: use SHASH_DESC_ON_STACK
` [PATCH 4/6] apparmor: fix invalid reference to index variable of iterator line 836
` [PATCH 5/6] apparmor: fix parameters so that the permission test is bypassed at boot
` [PATCH 6/6] apparmor: Make path_max parameter readonly
[PATCH RFC 00/11] LSM: Stacking for major security modules
2017-04-06 22:50 UTC (16+ messages)
` [PATCH RFC 01/11] procfs: add smack subdir to attrs
` [PATCH RFC 02/11] LSM: manage credential security blobs
` [PATCH RFC 03/11] LSM: Manage file "
` [PATCH RFC 04/11] LSM: general but not extreme module stacking
` [PATCH RFC 05/11] LSM: Infrastructure management of the remaining blobs
` [PATCH RFC 06/11] Smack: remove socket blob free
` [PATCH RFC 07/11] LSM: Mount option data for extreme stacking
` [PATCH RFC 09/11] netlabel agreement checking
` [PATCH RFC 10/11] Smack: sendmsg compile error fix
` [PATCH RFC 11/11] LSM: manage task security blobs
[PATCH 1/5] efi: Move the x86 secure boot switch to generic code
2017-04-06 22:45 UTC (7+ messages)
` [PATCH 2/5] efi: Add EFI_SECURE_BOOT bit
` [PATCH 3/5] Add the ability to lock down access to the running kernel image
` [PATCH 4/5] efi: Lock down the kernel if booted in secure boot mode
` [PATCH 5/5] Add a sysrq option to exit "
[PATCH 00/24] Kernel lockdown
2017-04-06 21:55 UTC (27+ messages)
` [PATCH 01/24] efi: Add EFI_SECURE_BOOT bit
` [PATCH 02/24] Add the ability to lock down access to the running kernel image
` [PATCH 03/24] efi: Lock down the kernel if booted in secure boot mode
` [PATCH 04/24] Enforce module signatures if the kernel is locked down
` [PATCH 05/24] Restrict /dev/mem and /dev/kmem when "
` [PATCH 06/24] Add a sysrq option to exit secure boot mode
` [PATCH 07/24] kexec: Disable at runtime if the kernel is locked down
` [PATCH 08/24] Copy secure_boot flag in boot params across kexec reboot
` [PATCH 09/24] kexec_file: Disable at runtime if securelevel has been set
` [PATCH 10/24] hibernate: Disable when the kernel is locked down
` [PATCH 11/24] uswsusp: "
` [PATCH 12/24] PCI: Lock down BAR access "
` [PATCH 13/24] x86: Lock down IO port "
` [PATCH 14/24] x86: Restrict MSR "
` [PATCH 15/24] asus-wmi: Restrict debugfs interface "
` [PATCH 16/24] ACPI: Limit access to custom_method "
` [PATCH 17/24] acpi: Ignore acpi_rsdp kernel param when the kernel has been "
` [PATCH 18/24] acpi: Disable ACPI table override if the kernel is "
` [PATCH 19/24] acpi: Disable APEI error injection "
[tpmdd-devel] [RFC PATCH] tpm: msleep() delays - replace with usleep_range() in i2c nuvoton driver
2017-04-06 15:27 UTC
[GIT PULL] tpmdd updates for 4.12
2017-04-06 0:31 UTC (2+ messages)
FW: [PATCH] Smack: Use GFP_KERNEL for smk_netlbl_mls()
2017-04-05 22:22 UTC (2+ messages)
[PATCH 00/24] Kernel lockdown
2017-04-05 17:08 UTC (9+ messages)
` [PATCH 01/24] efi: Add EFI_SECURE_BOOT bit
` [PATCH 02/24] Add the ability to lock down access to the running kernel image
` [PATCH 03/24] efi: Lock down the kernel if booted in secure boot mode
` [PATCH 04/24] Enforce module signatures if the kernel is locked down
` [PATCH 05/24] Restrict /dev/mem and /dev/kmem when "
` [PATCH 06/24] Add a sysrq option to exit secure boot mode
` [PATCH 07/24] kexec: Disable at runtime if the kernel is locked down
` [PATCH 08/24] Copy secure_boot flag in boot params across kexec reboot
[PATCH 27/39] Annotate hardware config module parameters in drivers/scsi/
2017-04-05 14:33 UTC
[PATCH] tpm_crb: remove a cruft constant
2017-04-05 11:10 UTC
[PATCH] selinux: Fix SBLABEL_MNT for NFS mounts
2017-04-04 23:26 UTC (7+ messages)
[PATCH] KEYS: Fix integrity calls to keyring_alloc
2017-04-04 21:49 UTC (5+ messages)
[PATCH 0/9] convert genericirq.tmpl and kernel-api.tmpl to DocBook
2017-04-04 12:34 UTC (3+ messages)
[PATCH 0/3] SELinux: Fine-tuning for two function implementations
2017-04-04 11:16 UTC (4+ messages)
` [PATCH 1/3] selinux: Return directly after a failed memory allocation in policydb_index()
` [PATCH 2/3] selinux: Return an error code only as a constant in sidtab_insert()
` [PATCH 3/3] selinux: Use an other error code for an input validation failure "
[PATCH v13 00/10] Make keyring link restrictions accessible from userspace
2017-04-04 7:30 UTC (7+ messages)
[PATCH] selinux: Fix an uninitialized variable bug
2017-04-04 0:03 UTC (6+ messages)
[PATCH] KEYS: fix dereferencing NULL payload with nonzero length
2017-04-03 21:30 UTC (5+ messages)
[PATCH v2] KEYS: fix keyctl_set_reqkey_keyring() to not leak thread keyrings
2017-04-03 21:16 UTC
[PATCH] KEYS: fix keyctl_set_reqkey_keyring() to not leak thread keyrings
2017-04-03 15:52 UTC (2+ messages)
[PATCH] KEYS: fix freeing uninitialized memory in key_update()
2017-04-03 15:48 UTC (2+ messages)
[PATCH 0/2] security, keys refcount conversions
2017-04-03 0:50 UTC (2+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).