linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2017-04-04 15:38:26 to 2017-04-08 02:16:54 UTC [more...]

[PATCH 00/12] Delete CURRENT_TIME, CURRENT_TIME_SEC and current_fs_time
 2017-04-08  2:16 UTC  (15+ messages)
` [PATCH 01/12] fs: f2fs: Use ktime_get_real_seconds for sit_info times
` [PATCH 02/12] trace: Make trace_hwlat timestamp y2038 safe
` [PATCH 03/12] fs: cifs: Replace CURRENT_TIME by other appropriate apis
` [PATCH 04/12] fs: ceph: CURRENT_TIME with ktime_get_real_ts()
` [PATCH 05/12] fs: ufs: Use ktime_get_real_ts64() for birthtime
` [PATCH 06/12] audit: Use timespec64 to represent audit timestamps
` [PATCH 07/12] fs: btrfs: Use ktime_get_real_ts for root ctime
` [PATCH 08/12] fs: ubifs: Replace CURRENT_TIME_SEC with current_time
` [PATCH 09/12] lustre: Replace CURRENT_TIME macro
` [PATCH 10/12] apparmorfs: Replace CURRENT_TIME with current_time()
` [PATCH 11/12] time: Delete CURRENT_TIME_SEC and CURRENT_TIME
` [PATCH 12/12] time: Delete current_fs_time() function

[RFC][PATCH] audit: add ambient capabilities to CAPSET and BPRM_FCAPS records
 2017-04-07 19:32 UTC  (2+ messages)

[PATCH 00/24] Kernel lockdown
 2017-04-07 16:32 UTC  (10+ messages)
` [PATCH 01/24] efi: Add EFI_SECURE_BOOT bit
` [PATCH 02/24] Add the ability to lock down access to the running kernel image
` [PATCH 03/24] efi: Lock down the kernel if booted in secure boot mode
` [PATCH 04/24] Enforce module signatures if the kernel is locked down
` [PATCH 05/24] Restrict /dev/mem and /dev/kmem when "
` [PATCH 06/24] Add a sysrq option to exit secure boot mode
` [PATCH 07/24] kexec: Disable at runtime if the kernel is locked down
` [PATCH 08/24] Copy secure_boot flag in boot params across kexec reboot

[PATCH 00/24] Kernel lockdown
 2017-04-07 16:29 UTC  (59+ messages)
` [PATCH 01/24] efi: Add EFI_SECURE_BOOT bit
` [PATCH 02/24] Add the ability to lock down access to the running kernel image
` [PATCH 03/24] efi: Lock down the kernel if booted in secure boot mode
` [PATCH 04/24] Enforce module signatures if the kernel is locked down
` [PATCH 05/24] Restrict /dev/mem and /dev/kmem when "
` [PATCH 06/24] Add a sysrq option to exit secure boot mode
` [PATCH 07/24] kexec: Disable at runtime if the kernel is locked down
` [PATCH 08/24] Copy secure_boot flag in boot params across kexec reboot
` [PATCH 09/24] kexec_file: Disable at runtime if securelevel has been set
` [PATCH 10/24] hibernate: Disable when the kernel is locked down
` [PATCH 11/24] uswsusp: "
` [PATCH 12/24] PCI: Lock down BAR access "
` [PATCH 13/24] x86: Lock down IO port "
` [PATCH 14/24] x86: Restrict MSR "
` [PATCH 15/24] asus-wmi: Restrict debugfs interface "
` [PATCH 16/24] ACPI: Limit access to custom_method "
` [PATCH 17/24] acpi: Ignore acpi_rsdp kernel param when the kernel has been "
` [PATCH 18/24] acpi: Disable ACPI table override if the kernel is "
` [PATCH 19/24] acpi: Disable APEI error injection "
` [PATCH 20/24] bpf: Restrict kernel image access functions when "
` [PATCH 21/24] scsi: Lock down the eata driver
` [PATCH 22/24] Prohibit PCMCIA CIS storage when the kernel is locked down
` [PATCH 23/24] Lock down TIOCSSERIAL
` [PATCH 24/24] Lock down module params that specify hardware parameters (eg. ioport)

[PATCH 00/38] Annotate hw config module params for future lockdown
 2017-04-07 12:52 UTC  (44+ messages)
` [PATCH 01/38] Annotate module params that specify hardware parameters (eg. ioport)
` [PATCH 02/38] Annotate hardware config module parameters in arch/x86/mm/
` [PATCH 03/38] Annotate hardware config module parameters in drivers/char/ipmi/
` [PATCH 04/38] Annotate hardware config module parameters in drivers/char/mwave/
` [PATCH 05/38] Annotate hardware config module parameters in drivers/char/
` [PATCH 06/38] Annotate hardware config module parameters in drivers/clocksource/
` [PATCH 07/38] Annotate hardware config module parameters in drivers/cpufreq/
` [PATCH 08/38] Annotate hardware config module parameters in drivers/gpio/
` [PATCH 09/38] Annotate hardware config module parameters in drivers/i2c/
` [PATCH 10/38] Annotate hardware config module parameters in drivers/iio/
` [PATCH 11/38] Annotate hardware config module parameters in drivers/input/
` [PATCH 12/38] Annotate hardware config module parameters in drivers/isdn/
` [PATCH 13/38] Annotate hardware config module parameters in drivers/media/
` [PATCH 14/38] Annotate hardware config module parameters in drivers/misc/
` [PATCH 15/38] Annotate hardware config module parameters in drivers/mmc/host/
` [PATCH 16/38] Annotate hardware config module parameters in drivers/net/appletalk/
` [PATCH 17/38] Annotate hardware config module parameters in drivers/net/arcnet/
` [PATCH 18/38] Annotate hardware config module parameters in drivers/net/can/
` [PATCH 19/38] Annotate hardware config module parameters in drivers/net/ethernet/
` [PATCH 20/38] Annotate hardware config module parameters in drivers/net/hamradio/
` [PATCH 21/38] Annotate hardware config module parameters in drivers/net/irda/
` [PATCH 22/38] Annotate hardware config module parameters in drivers/net/wan/
` [PATCH 23/38] Annotate hardware config module parameters in drivers/net/wireless/
` [PATCH 24/38] Annotate hardware config module parameters in drivers/parport/
` [PATCH 25/38] Annotate hardware config module parameters in drivers/pci/hotplug/
` [PATCH 26/38] Annotate hardware config module parameters in drivers/pcmcia/
` [PATCH 27/38] Annotate hardware config module parameters in drivers/scsi/
` [PATCH 28/38] Annotate hardware config module parameters in drivers/staging/media/
` [PATCH 29/38] Annotate hardware config module parameters in drivers/staging/speakup/
` [PATCH 30/38] Annotate hardware config module parameters in drivers/staging/vme/
` [PATCH 31/38] Annotate hardware config module parameters in drivers/tty/
` [PATCH 32/38] Annotate hardware config module parameters in drivers/video/
` [PATCH 33/38] Annotate hardware config module parameters in drivers/watchdog/
` [PATCH 34/38] Annotate hardware config module parameters in fs/pstore/
` [PATCH 35/38] Annotate hardware config module parameters in sound/drivers/
` [PATCH 36/38] Annotate hardware config module parameters in sound/isa/
` [PATCH 37/38] Annotate hardware config module parameters in sound/oss/
` [PATCH 38/38] Annotate hardware config module parameters in sound/pci/

[GIT PULL] AppArmor fixes for 4.12
 2017-04-06 22:58 UTC  (8+ messages)
` [PATCH 1/6] apparmor: fix boolreturn.cocci warnings
` [PATCH 2/6] security/apparmor/lsm.c: set debug messages
` [PATCH 3/6] apparmor: use SHASH_DESC_ON_STACK
` [PATCH 4/6] apparmor: fix invalid reference to index variable of iterator line 836
` [PATCH 5/6] apparmor: fix parameters so that the permission test is bypassed at boot
` [PATCH 6/6] apparmor: Make path_max parameter readonly

[PATCH RFC 00/11] LSM: Stacking for major security modules
 2017-04-06 22:50 UTC  (16+ messages)
` [PATCH RFC 01/11] procfs: add smack subdir to attrs
` [PATCH RFC 02/11] LSM: manage credential security blobs
` [PATCH RFC 03/11] LSM: Manage file "
` [PATCH RFC 04/11] LSM: general but not extreme module stacking
` [PATCH RFC 05/11] LSM: Infrastructure management of the remaining blobs
` [PATCH RFC 06/11] Smack: remove socket blob free
` [PATCH RFC 07/11] LSM: Mount option data for extreme stacking
` [PATCH RFC 09/11] netlabel agreement checking
` [PATCH RFC 10/11] Smack: sendmsg compile error fix
` [PATCH RFC 11/11] LSM: manage task security blobs

[PATCH 1/5] efi: Move the x86 secure boot switch to generic code
 2017-04-06 22:45 UTC  (7+ messages)
` [PATCH 2/5] efi: Add EFI_SECURE_BOOT bit
` [PATCH 3/5] Add the ability to lock down access to the running kernel image
` [PATCH 4/5] efi: Lock down the kernel if booted in secure boot mode
` [PATCH 5/5] Add a sysrq option to exit "

[PATCH 00/24] Kernel lockdown
 2017-04-06 21:55 UTC  (27+ messages)
` [PATCH 01/24] efi: Add EFI_SECURE_BOOT bit
` [PATCH 02/24] Add the ability to lock down access to the running kernel image
` [PATCH 03/24] efi: Lock down the kernel if booted in secure boot mode
` [PATCH 04/24] Enforce module signatures if the kernel is locked down
` [PATCH 05/24] Restrict /dev/mem and /dev/kmem when "
` [PATCH 06/24] Add a sysrq option to exit secure boot mode
` [PATCH 07/24] kexec: Disable at runtime if the kernel is locked down
` [PATCH 08/24] Copy secure_boot flag in boot params across kexec reboot
` [PATCH 09/24] kexec_file: Disable at runtime if securelevel has been set
` [PATCH 10/24] hibernate: Disable when the kernel is locked down
` [PATCH 11/24] uswsusp: "
` [PATCH 12/24] PCI: Lock down BAR access "
` [PATCH 13/24] x86: Lock down IO port "
` [PATCH 14/24] x86: Restrict MSR "
` [PATCH 15/24] asus-wmi: Restrict debugfs interface "
` [PATCH 16/24] ACPI: Limit access to custom_method "
` [PATCH 17/24] acpi: Ignore acpi_rsdp kernel param when the kernel has been "
` [PATCH 18/24] acpi: Disable ACPI table override if the kernel is "
` [PATCH 19/24] acpi: Disable APEI error injection "

[tpmdd-devel] [RFC PATCH] tpm: msleep() delays - replace with usleep_range() in i2c nuvoton driver
 2017-04-06 15:27 UTC 

[GIT PULL] tpmdd updates for 4.12
 2017-04-06  0:31 UTC  (2+ messages)

FW: [PATCH] Smack: Use GFP_KERNEL for smk_netlbl_mls()
 2017-04-05 22:22 UTC  (2+ messages)

[PATCH 27/39] Annotate hardware config module parameters in drivers/scsi/
 2017-04-05 14:33 UTC 

[PATCH] tpm_crb: remove a cruft constant
 2017-04-05 11:10 UTC 

[PATCH] selinux: Fix SBLABEL_MNT for NFS mounts
 2017-04-04 23:26 UTC  (7+ messages)

[PATCH] KEYS: Fix integrity calls to keyring_alloc
 2017-04-04 21:49 UTC  (5+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).