messages from 2017-04-04 15:38:26 to 2017-04-08 02:16:54 UTC [more...]
[PATCH 00/12] Delete CURRENT_TIME, CURRENT_TIME_SEC and current_fs_time
2017-04-08 2:16 UTC (15+ messages)
` [PATCH 01/12] fs: f2fs: Use ktime_get_real_seconds for sit_info times
` [PATCH 02/12] trace: Make trace_hwlat timestamp y2038 safe
` [PATCH 03/12] fs: cifs: Replace CURRENT_TIME by other appropriate apis
` [PATCH 04/12] fs: ceph: CURRENT_TIME with ktime_get_real_ts()
` [PATCH 05/12] fs: ufs: Use ktime_get_real_ts64() for birthtime
` [PATCH 06/12] audit: Use timespec64 to represent audit timestamps
` [PATCH 07/12] fs: btrfs: Use ktime_get_real_ts for root ctime
` [PATCH 08/12] fs: ubifs: Replace CURRENT_TIME_SEC with current_time
` [PATCH 09/12] lustre: Replace CURRENT_TIME macro
` [PATCH 10/12] apparmorfs: Replace CURRENT_TIME with current_time()
` [PATCH 11/12] time: Delete CURRENT_TIME_SEC and CURRENT_TIME
` [PATCH 12/12] time: Delete current_fs_time() function
[RFC][PATCH] audit: add ambient capabilities to CAPSET and BPRM_FCAPS records
2017-04-07 19:32 UTC (2+ messages)
[PATCH 00/24] Kernel lockdown
2017-04-07 16:32 UTC (10+ messages)
` [PATCH 01/24] efi: Add EFI_SECURE_BOOT bit
` [PATCH 02/24] Add the ability to lock down access to the running kernel image
` [PATCH 03/24] efi: Lock down the kernel if booted in secure boot mode
` [PATCH 04/24] Enforce module signatures if the kernel is locked down
` [PATCH 05/24] Restrict /dev/mem and /dev/kmem when "
` [PATCH 06/24] Add a sysrq option to exit secure boot mode
` [PATCH 07/24] kexec: Disable at runtime if the kernel is locked down
` [PATCH 08/24] Copy secure_boot flag in boot params across kexec reboot
[PATCH 00/24] Kernel lockdown
2017-04-07 16:29 UTC (59+ messages)
` [PATCH 01/24] efi: Add EFI_SECURE_BOOT bit
` [PATCH 02/24] Add the ability to lock down access to the running kernel image
` [PATCH 03/24] efi: Lock down the kernel if booted in secure boot mode
` [PATCH 04/24] Enforce module signatures if the kernel is locked down
` [PATCH 05/24] Restrict /dev/mem and /dev/kmem when "
` [PATCH 06/24] Add a sysrq option to exit secure boot mode
` [PATCH 07/24] kexec: Disable at runtime if the kernel is locked down
` [PATCH 08/24] Copy secure_boot flag in boot params across kexec reboot
` [PATCH 09/24] kexec_file: Disable at runtime if securelevel has been set
` [PATCH 10/24] hibernate: Disable when the kernel is locked down
` [PATCH 11/24] uswsusp: "
` [PATCH 12/24] PCI: Lock down BAR access "
` [PATCH 13/24] x86: Lock down IO port "
` [PATCH 14/24] x86: Restrict MSR "
` [PATCH 15/24] asus-wmi: Restrict debugfs interface "
` [PATCH 16/24] ACPI: Limit access to custom_method "
` [PATCH 17/24] acpi: Ignore acpi_rsdp kernel param when the kernel has been "
` [PATCH 18/24] acpi: Disable ACPI table override if the kernel is "
` [PATCH 19/24] acpi: Disable APEI error injection "
` [PATCH 20/24] bpf: Restrict kernel image access functions when "
` [PATCH 21/24] scsi: Lock down the eata driver
` [PATCH 22/24] Prohibit PCMCIA CIS storage when the kernel is locked down
` [PATCH 23/24] Lock down TIOCSSERIAL
` [PATCH 24/24] Lock down module params that specify hardware parameters (eg. ioport)
[PATCH 00/38] Annotate hw config module params for future lockdown
2017-04-07 12:52 UTC (44+ messages)
` [PATCH 01/38] Annotate module params that specify hardware parameters (eg. ioport)
` [PATCH 02/38] Annotate hardware config module parameters in arch/x86/mm/
` [PATCH 03/38] Annotate hardware config module parameters in drivers/char/ipmi/
` [PATCH 04/38] Annotate hardware config module parameters in drivers/char/mwave/
` [PATCH 05/38] Annotate hardware config module parameters in drivers/char/
` [PATCH 06/38] Annotate hardware config module parameters in drivers/clocksource/
` [PATCH 07/38] Annotate hardware config module parameters in drivers/cpufreq/
` [PATCH 08/38] Annotate hardware config module parameters in drivers/gpio/
` [PATCH 09/38] Annotate hardware config module parameters in drivers/i2c/
` [PATCH 10/38] Annotate hardware config module parameters in drivers/iio/
` [PATCH 11/38] Annotate hardware config module parameters in drivers/input/
` [PATCH 12/38] Annotate hardware config module parameters in drivers/isdn/
` [PATCH 13/38] Annotate hardware config module parameters in drivers/media/
` [PATCH 14/38] Annotate hardware config module parameters in drivers/misc/
` [PATCH 15/38] Annotate hardware config module parameters in drivers/mmc/host/
` [PATCH 16/38] Annotate hardware config module parameters in drivers/net/appletalk/
` [PATCH 17/38] Annotate hardware config module parameters in drivers/net/arcnet/
` [PATCH 18/38] Annotate hardware config module parameters in drivers/net/can/
` [PATCH 19/38] Annotate hardware config module parameters in drivers/net/ethernet/
` [PATCH 20/38] Annotate hardware config module parameters in drivers/net/hamradio/
` [PATCH 21/38] Annotate hardware config module parameters in drivers/net/irda/
` [PATCH 22/38] Annotate hardware config module parameters in drivers/net/wan/
` [PATCH 23/38] Annotate hardware config module parameters in drivers/net/wireless/
` [PATCH 24/38] Annotate hardware config module parameters in drivers/parport/
` [PATCH 25/38] Annotate hardware config module parameters in drivers/pci/hotplug/
` [PATCH 26/38] Annotate hardware config module parameters in drivers/pcmcia/
` [PATCH 27/38] Annotate hardware config module parameters in drivers/scsi/
` [PATCH 28/38] Annotate hardware config module parameters in drivers/staging/media/
` [PATCH 29/38] Annotate hardware config module parameters in drivers/staging/speakup/
` [PATCH 30/38] Annotate hardware config module parameters in drivers/staging/vme/
` [PATCH 31/38] Annotate hardware config module parameters in drivers/tty/
` [PATCH 32/38] Annotate hardware config module parameters in drivers/video/
` [PATCH 33/38] Annotate hardware config module parameters in drivers/watchdog/
` [PATCH 34/38] Annotate hardware config module parameters in fs/pstore/
` [PATCH 35/38] Annotate hardware config module parameters in sound/drivers/
` [PATCH 36/38] Annotate hardware config module parameters in sound/isa/
` [PATCH 37/38] Annotate hardware config module parameters in sound/oss/
` [PATCH 38/38] Annotate hardware config module parameters in sound/pci/
[GIT PULL] AppArmor fixes for 4.12
2017-04-06 22:58 UTC (8+ messages)
` [PATCH 1/6] apparmor: fix boolreturn.cocci warnings
` [PATCH 2/6] security/apparmor/lsm.c: set debug messages
` [PATCH 3/6] apparmor: use SHASH_DESC_ON_STACK
` [PATCH 4/6] apparmor: fix invalid reference to index variable of iterator line 836
` [PATCH 5/6] apparmor: fix parameters so that the permission test is bypassed at boot
` [PATCH 6/6] apparmor: Make path_max parameter readonly
[PATCH RFC 00/11] LSM: Stacking for major security modules
2017-04-06 22:50 UTC (16+ messages)
` [PATCH RFC 01/11] procfs: add smack subdir to attrs
` [PATCH RFC 02/11] LSM: manage credential security blobs
` [PATCH RFC 03/11] LSM: Manage file "
` [PATCH RFC 04/11] LSM: general but not extreme module stacking
` [PATCH RFC 05/11] LSM: Infrastructure management of the remaining blobs
` [PATCH RFC 06/11] Smack: remove socket blob free
` [PATCH RFC 07/11] LSM: Mount option data for extreme stacking
` [PATCH RFC 09/11] netlabel agreement checking
` [PATCH RFC 10/11] Smack: sendmsg compile error fix
` [PATCH RFC 11/11] LSM: manage task security blobs
[PATCH 1/5] efi: Move the x86 secure boot switch to generic code
2017-04-06 22:45 UTC (7+ messages)
` [PATCH 2/5] efi: Add EFI_SECURE_BOOT bit
` [PATCH 3/5] Add the ability to lock down access to the running kernel image
` [PATCH 4/5] efi: Lock down the kernel if booted in secure boot mode
` [PATCH 5/5] Add a sysrq option to exit "
[PATCH 00/24] Kernel lockdown
2017-04-06 21:55 UTC (27+ messages)
` [PATCH 01/24] efi: Add EFI_SECURE_BOOT bit
` [PATCH 02/24] Add the ability to lock down access to the running kernel image
` [PATCH 03/24] efi: Lock down the kernel if booted in secure boot mode
` [PATCH 04/24] Enforce module signatures if the kernel is locked down
` [PATCH 05/24] Restrict /dev/mem and /dev/kmem when "
` [PATCH 06/24] Add a sysrq option to exit secure boot mode
` [PATCH 07/24] kexec: Disable at runtime if the kernel is locked down
` [PATCH 08/24] Copy secure_boot flag in boot params across kexec reboot
` [PATCH 09/24] kexec_file: Disable at runtime if securelevel has been set
` [PATCH 10/24] hibernate: Disable when the kernel is locked down
` [PATCH 11/24] uswsusp: "
` [PATCH 12/24] PCI: Lock down BAR access "
` [PATCH 13/24] x86: Lock down IO port "
` [PATCH 14/24] x86: Restrict MSR "
` [PATCH 15/24] asus-wmi: Restrict debugfs interface "
` [PATCH 16/24] ACPI: Limit access to custom_method "
` [PATCH 17/24] acpi: Ignore acpi_rsdp kernel param when the kernel has been "
` [PATCH 18/24] acpi: Disable ACPI table override if the kernel is "
` [PATCH 19/24] acpi: Disable APEI error injection "
[tpmdd-devel] [RFC PATCH] tpm: msleep() delays - replace with usleep_range() in i2c nuvoton driver
2017-04-06 15:27 UTC
[GIT PULL] tpmdd updates for 4.12
2017-04-06 0:31 UTC (2+ messages)
FW: [PATCH] Smack: Use GFP_KERNEL for smk_netlbl_mls()
2017-04-05 22:22 UTC (2+ messages)
[PATCH 27/39] Annotate hardware config module parameters in drivers/scsi/
2017-04-05 14:33 UTC
[PATCH] tpm_crb: remove a cruft constant
2017-04-05 11:10 UTC
[PATCH] selinux: Fix SBLABEL_MNT for NFS mounts
2017-04-04 23:26 UTC (7+ messages)
[PATCH] KEYS: Fix integrity calls to keyring_alloc
2017-04-04 21:49 UTC (5+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).