linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2017-04-18 22:47:54 to 2017-04-26 22:13:30 UTC [more...]

[PATCH RFC v2 0/6] proc: support private proc instances per pidnamespace
 2017-04-26 22:13 UTC  (9+ messages)
` [PATCH RFC v2 1/6] proc: add proc_fs_info struct to store proc information
` [PATCH RFC v2 2/6] proc: move /proc/{self|thread-self} dentries to proc_fs_info
` [PATCH RFC v2 3/6] proc: add helpers to set and get proc hidepid and gid mount options
` [PATCH RFC v2 4/6] proc: support mounting private procfs instances inside same pid namespace
` [PATCH RFC v2 5/6] proc: instantiate only pids that we can ptrace on 'limit_pids=1' mount option
` [PATCH RFC v2 6/6] proc: flush task dcache entries from all procfs instances

[PATCH] selinux: fix double free in selinux_parse_opts_str()
 2017-04-26 21:37 UTC  (5+ messages)

[PATCH security-next 0/2]: switch selinux and smack to pernet ops
 2017-04-26 20:47 UTC  (7+ messages)
` [PATCH security-next 1/2] smack: use pernet operations for hook registration
` [PATCH security-next 2/2] selinux: "

[PATCH 0/6] Appended signatures support for IMA appraisal
 2017-04-26 20:40 UTC  (15+ messages)
` [PATCH 3/6] ima: Simplify policy_func_show
` [PATCH 5/6] MODSIGN: Export module signature definitions
` [PATCH 6/6] ima: Support appended signatures for appraisal

[RFC][PATCH] audit: add ambient capabilities to CAPSET and BPRM_FCAPS records
 2017-04-26 20:04 UTC  (2+ messages)

[PATCH 1/3] selinux: Implement LSM notification system
 2017-04-26 18:31 UTC  (11+ messages)
` [PATCH 2/3] selinux: add checksum to policydb
` [PATCH 3/3] selinux: expose policy SHA256 checksum via selinuxfs

[PATCH v5 0/2] security: tty: make TIOCSTI ioctl require CAP_SYS_ADMIN
 2017-04-26 14:21 UTC  (11+ messages)
` [PATCH v5 1/2] security: tty: Add owner user namespace to tty_struct
` [PATCH v5 2/2] security: tty: make TIOCSTI ioctl require CAP_SYS_ADMIN

[PATCH v3 0/2] modules:capabilities: automatic module loading restrictions
 2017-04-26  9:06 UTC  (32+ messages)
` [PATCH v3 1/2] modules:capabilities: automatic module loading restriction
    ` [kernel-hardening] "
` [PATCH v3 2/2] modules:capabilities: add a per-task modules autoload restriction

[PATCH v4 0/2] tiocsti-restrict : make TIOCSTI ioctl require CAP_SYS_ADMIN
 2017-04-25 14:55 UTC  (6+ messages)
` [PATCH v4 1/2] tiocsti-restrict : Add owner user namespace to tty_struct
` [PATCH v4 2/2] tiocsti-restrict : make TIOCSTI ioctl require CAP_SYS_ADMIN

[GIT PULL] tpmdd fixes for 4.12
 2017-04-25  0:04 UTC  (3+ messages)

EXTREMELY IMPORTANT
 2017-04-24 18:52 UTC 

[PATCH 0/5] KEYS: sanitize key payloads
 2017-04-24 14:14 UTC  (12+ messages)
` [PATCH 1/5] KEYS: sanitize add_key() and keyctl() "
` [PATCH 2/5] KEYS: user_defined: sanitize "
` [PATCH 3/5] KEYS: encrypted: sanitize all key material
` [PATCH 4/5] KEYS: trusted: "
` [PATCH 5/5] KEYS: sanitize key structs before freeing

[PATCH v3 0/2] tiocsti-restrict : make TIOCSTI ioctl require CAP_SYS_ADMIN
 2017-04-24  3:47 UTC  (7+ messages)
` [PATCH v3 1/2] tiocsti-restrict : Add owner user namespace to tty_struct
` [PATCH v3 2/2] tiocsti-restrict : make TIOCSTI ioctl require CAP_SYS_ADMIN

[PATCH v2 1/2] tiocsti-restrict : Add owner user namespace to tty_struct
 2017-04-23 20:53 UTC  (5+ messages)
` [PATCH v2 2/2] tiocsti-restrict : make TIOCSTI ioctl require CAP_SYS_ADMIN

[PATCH 0/3] Extend the vTPM proxy driver to pass locality to emulator
 2017-04-23 12:18 UTC  (8+ messages)
` [PATCH 2/3] tpm: vtpm_proxy: Implement request_locality
` [PATCH 3/3] tpm: vtpm_proxy: Add ioctl to request locality prepended to command
    ` [tpmdd-devel] "

[backport v4.9] tpm_tis: use default timeout value if chip reports it as zero
 2017-04-23 12:14 UTC  (7+ messages)
  ` [tpmdd-devel] "

[PATCH] selinux: hooks: security content must be properly cleared
 2017-04-23  6:48 UTC  (2+ messages)

[PATCH] Introduce v3 namespaced file capabilities
 2017-04-23  1:14 UTC  (7+ messages)

[PATCH] make TIOCSTI ioctl require CAP_SYS_ADMIN
 2017-04-22 19:50 UTC  (18+ messages)
          ` [kernel-hardening] "

[PATCH v4 0/4] Certificate insertion support for x86 bzImages
 2017-04-21 19:47 UTC  (8+ messages)
` [PATCH v4 1/4] KEYS: Insert incompressible bytes to reserve space in bzImage
` [PATCH v4 2/4] KEYS: Add ELF class-independent certificate insertion support
` [PATCH v4 3/4] KEYS: Support for inserting a certificate into x86 bzImage
` [PATCH v4 4/4] KEYS: Print insert-sys-cert information to stdout instead of stderr

No subject
 2017-04-21  4:59 UTC 

[PATCH] KEYS: fix dereferencing NULL payload with nonzero length
 2017-04-21  4:43 UTC  (4+ messages)
  ` [lkp-robot] [KEYS] bdf7c0f8bf: ltp.add_key02.fail
    ` [LTP] "

[PATCH 06/38] Annotate hardware config module parameters in drivers/clocksource/
 2017-04-20  7:31 UTC  (13+ messages)
` [PATCH 00/38] Annotate hw config module params for future lockdown
  ` [PATCH 09/38] Annotate hardware config module parameters in drivers/i2c/
  ` [PATCH 13/38] Annotate hardware config module parameters in drivers/media/
  ` [PATCH 28/38] Annotate hardware config module parameters in drivers/staging/media/

[GIT PULL] Bugfixes for the Keys subsystem
 2017-04-20  5:33 UTC 

[PATCH net-next v6 00/11] Landlock LSM: Toward unprivileged sandboxing
 2017-04-20  1:54 UTC  (37+ messages)
` [PATCH net-next v6 04/11] landlock: Add LSM hooks related to filesystem
            ` [kernel-hardening] "
` [PATCH net-next v6 05/11] seccomp: Split put_seccomp_filter() with put_seccomp()
` [PATCH net-next v6 06/11] seccomp, landlock: Handle Landlock events per process hierarchy
  ` [kernel-hardening] [PATCH net-next v6 06/11] seccomp,landlock: "
  `  "
` [PATCH net-next v6 08/11] bpf: Add a Landlock sandbox example
` [PATCH net-next v6 09/11] seccomp: Enhance test_harness with an assert step mechanism
` [PATCH net-next v6 10/11] bpf,landlock: Add tests for Landlock

SELinux "filtering" capabilities?
 2017-04-19 17:55 UTC  (3+ messages)

[PATCH] tpm: Fix reference count to main device
 2017-04-19 15:30 UTC  (2+ messages)

[GIT PULL] IMA patches for 4.12
 2017-04-19 12:06 UTC  (2+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).