messages from 2018-05-15 07:21:54 to 2018-05-30 21:09:00 UTC [more...]
[PATCH v4 0/8] kexec/firmware: support system wide policy requiring signatures
2018-05-30 21:09 UTC (15+ messages)
` [PATCH v4 1/8] security: define new LSM hook named security_kernel_load_data
` [PATCH v4 2/8] kexec: add call to LSM hook in original kexec_load syscall
` [PATCH v4 3/8] ima: based on policy require signed kexec kernel images
` [PATCH v4 4/8] firmware: add call to LSM hook before firmware sysfs fallback
` [PATCH v4 5/8] ima: based on policy require signed firmware (sysfs fallback)
` [PATCH v4 6/8] ima: add build time policy
` [RFC PATCH v4 7/8] ima: based on policy prevent loading firmware (pre-allocated buffer)
` [PATCH v4 8/8] module: replace the existing LSM hook in init_module
[PATCH V3 0/5] selinux:Significant reduce of preempt_disable holds
2018-05-30 20:34 UTC (7+ messages)
` [PATCH V3 1/5 selinux-next] selinux: Make allocation atomic in policydb objects functions
` [PATCH V3 2/5 selinux-next] selinux: Introduce selinux_ruleset struct
` [PATCH V3 3/5 selinux-next] selinux: sidtab_clone switch to use rwlock
` [PATCH V3 4/5 selinux-next] selinux: seqno separation
` [PATCH V3 5/5 selinux-next] selinux: Switch to rcu read locks for avc_compute
[GIT PULL] SELinux fixes for v4.17 (#2)
2018-05-30 16:28 UTC
[PATCH] selinux: KASAN: slab-out-of-bounds in xattr_getsecurity
2018-05-30 15:31 UTC (4+ messages)
[PATCH] tpm: fix race condition in tpm_common_write()
2018-05-30 11:01 UTC (5+ messages)
[PATCH] tpm: separate cmd_ready/go_idle from runtime_pm
2018-05-30 10:52 UTC (7+ messages)
[PATCH 1/2] security: Move LSM registration arguments to struct lsm_info
2018-05-30 0:49 UTC (4+ messages)
[PATCH v3 0/7] kexec/firmware: support system wide policy requiring signatures
2018-05-29 21:10 UTC (16+ messages)
` [PATCH v3 1/7] security: rename security_kernel_read_file() hook
` [PATCH v3 2/7] kexec: add call to LSM hook in original kexec_load syscall
` [PATCH v3 3/7] ima: based on policy require signed kexec kernel images
` [PATCH v3 4/7] firmware: add call to LSM hook before firmware sysfs fallback
` [PATCH v3 5/7] ima: based on policy require signed firmware (sysfs fallback)
` [PATCH v3 6/7] ima: add build time policy
` [RFC PATCH v3 7/7] ima: based on policy prevent loading firmware (pre-allocated buffer)
[PATCH] EVM: Fix null dereference on xattr when xattr fails to allocate
2018-05-29 13:11 UTC (5+ messages)
` [PATCH] EVM: prevent array underflow in evm_write_xattrs()
[PATCH 1/4] migrate swapper_pg_dir
2018-05-29 10:53 UTC (2+ messages)
[PATCH 0/4] migrate swapper_pg_dir
2018-05-29 10:03 UTC (2+ messages)
[PATCH] mark tramp_pg_dir read-only
2018-05-29 10:02 UTC (2+ messages)
[PATCH 4/4] migrate swapper_pg_dir
2018-05-29 4:38 UTC
[PATCH 3/4] migrate swapper_pg_dir
2018-05-29 4:38 UTC
[PATCH 2/4] migrate swapper_pg_dir
2018-05-29 4:37 UTC
[PATCH 1/6] Generic radix trees
2018-05-29 1:48 UTC (16+ messages)
` [PATCH 2/6] proc: commit to genradix
` [PATCH 3/6] md: convert "
` [PATCH 4/6] openvswitch: "
` [PATCH 5/6] selinux: "
` [PATCH 6/6] Drop flex_arrays
[PATCH] proc: prevent a task from writing on its own /proc/*/mem
2018-05-28 9:33 UTC (11+ messages)
[PATCH -next] integrity: fix the error return code in integrity_load_keys()
2018-05-28 5:17 UTC (2+ messages)
[PATCH][next] EVM: fix memory leak of temporary buffer 'temp'
2018-05-27 22:15 UTC
[PATCH v4 0/4] Migrate all TPM 2.0 commands to use struct tpm_buf
2018-05-27 9:14 UTC (16+ messages)
` [PATCH v4 1/4] tpm: migrate tpm2_shutdown() "
` [PATCH v4 2/4] tpm: migrate tpm2_probe() "
` [PATCH v4 3/4] tpm: migrate tpm2_get_tpm_pt() "
` [PATCH v4 4/4] tpm: migrate tpm2_get_random() "
RESEND [RFC] KEYS: add a new type "mktme" to kernel key services
2018-05-25 23:43 UTC
[RFC] KEYS: add a new type "mktme" to kernel key services
2018-05-25 23:31 UTC
[PATCH 25/33] ima: use match_string() helper
2018-05-23 14:42 UTC (6+ messages)
` [PATCH 26/33] apparmor: "
[GIT PULL] tpmdd updates for v4.18
2018-05-23 12:55 UTC (4+ messages)
[GIT PULL] linux-integrity for Linux 4.18
2018-05-23 12:38 UTC (2+ messages)
[PATCH 00/24] security: Add kernel lockdown
2018-05-23 8:46 UTC (5+ messages)
` [PATCH 07/24] hibernate: Disable when the kernel is locked down
[PATCH v7 00/14] Appended signatures support for IMA appraisal
2018-05-23 0:12 UTC (15+ messages)
` [PATCH v7 01/14] MODSIGN: Export module signature definitions
` [PATCH v7 02/14] PKCS#7: Refactor verify_pkcs7_signature() and add pkcs7_get_message_sig()
` [PATCH v7 03/14] PKCS#7: Introduce pkcs7_get_digest()
` [PATCH v7 04/14] integrity: Introduce struct evm_xattr
` [PATCH v7 05/14] integrity: Introduce integrity_keyring_from_id()
` [PATCH v7 06/14] integrity: Introduce asymmetric_sig_has_known_key()
` [PATCH v7 07/14] integrity: Select CONFIG_KEYS instead of depending on it
` [PATCH v7 08/14] ima: Introduce is_signed()
` [PATCH v7 09/14] ima: Export func_tokens
` [PATCH v7 10/14] ima: Add modsig appraise_type option for module-style appended signatures
` [PATCH v7 11/14] ima: Implement support "
` [PATCH v7 12/14] ima: Add new "d-sig" template field
` [PATCH v7 13/14] ima: Write modsig to the measurement list
` [PATCH v7 14/14] ima: Store the measurement again when appraising a modsig
[PATCH v2 11/11] docs: fix broken references with multiple hints
2018-05-22 17:31 UTC (4+ messages)
Wohltätigkeitsspende in Höhe von € 2.000.000,00
2018-05-20 8:34 UTC
[PATCH v5 3/7] proc: add helpers to set and get proc hidepid and gid mount options
2018-05-20 7:53 UTC (2+ messages)
[PATCH v2][RESEND] X.509: unpack RSA signatureValue field from BIT STRING
2018-05-19 12:23 UTC
[PATCH v2 0/9] kexec/firmware: support system wide policy requiring signatures
2018-05-18 17:55 UTC (17+ messages)
` [PATCH v2 1/9] ima: based on policy verify firmware signatures (pre-allocated buffer)
` [PATCH v2 2/9] ima: fix updating the ima_appraise flag
` [PATCH v2 3/9] security: define security_kernel_read_blob() wrapper
` [PATCH v2 4/9] kexec: add call to LSM hook in original kexec_load syscall
` [PATCH v2 5/9] ima: based on policy require signed kexec kernel images
` [PATCH v2 6/9] firmware: add call to LSM hook before firmware sysfs fallback
` [PATCH v2 7/9] ima: based on policy require signed firmware (sysfs fallback)
` [PATCH v2 8/9] ima: add build time policy
` [PATCH v2 9/9] ima: based on policy prevent loading firmware (pre-allocated buffer)
[PATCH v3] tpm: check selftest status before retrying full selftest
2018-05-18 7:04 UTC (2+ messages)
[PATCH 00/23] LSM: Full security module stacking
2018-05-18 0:28 UTC (8+ messages)
[PATCH ghak81 V3 0/3] audit: group task params
2018-05-17 23:04 UTC (8+ messages)
` [PATCH ghak81 V3 1/3] audit: use new audit_context access funciton for seccomp_actions_logged
` [PATCH ghak81 V3 2/3] audit: normalize loginuid read access
` [PATCH ghak81 V3 3/3] audit: collect audit task parameters
[PATCH 2/2] security: Convert lsm list file to a seq_file based on lsm_info_head
2018-05-17 7:01 UTC
[PATCH 0/2] Change LSM registration to work with persistent struct
2018-05-17 7:00 UTC
[RFC PATCH v4 0/5] ima: Namespacing IMA
2018-05-16 21:40 UTC (5+ messages)
` [RFC PATCH v4 3/5] ima: differentiate auditing policy rules from "audit" actions
[GIT PULL] SELinux fixes for v4.17 (#1)
2018-05-16 20:56 UTC
[PATCH v4 0/2] tpm: improving granularity in poll sleep times
2018-05-16 14:10 UTC (4+ messages)
` [PATCH v4 1/2] tpm: reduce poll sleep time in tpm_transmit()
` [PATCH v4 2/2] tpm: reduce polling time to usecs for even finer granularity
[PATCH v2 22/35] vfs: don't open real
2018-05-15 20:42 UTC (4+ messages)
[PATCH v5 1/7] proc: add proc_fs_info struct to store proc information
2018-05-15 16:19 UTC (4+ messages)
[PATCH v2] apparmor: secid: fix error return value in error handling path
2018-05-15 14:41 UTC (3+ messages)
[PATCH 3/6] firmware: differentiate between signed regulatory.db and other firmware
2018-05-15 12:43 UTC (13+ messages)
[ANNOUNCE] Linux Security Summit Europe 2018 - CFP
2018-05-15 8:30 UTC
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).