messages from 2017-04-18 22:47:54 to 2017-04-26 22:13:30 UTC [more...]
[PATCH RFC v2 0/6] proc: support private proc instances per pidnamespace
2017-04-26 22:13 UTC (9+ messages)
` [PATCH RFC v2 1/6] proc: add proc_fs_info struct to store proc information
` [PATCH RFC v2 2/6] proc: move /proc/{self|thread-self} dentries to proc_fs_info
` [PATCH RFC v2 3/6] proc: add helpers to set and get proc hidepid and gid mount options
` [PATCH RFC v2 4/6] proc: support mounting private procfs instances inside same pid namespace
` [PATCH RFC v2 5/6] proc: instantiate only pids that we can ptrace on 'limit_pids=1' mount option
` [PATCH RFC v2 6/6] proc: flush task dcache entries from all procfs instances
[PATCH] selinux: fix double free in selinux_parse_opts_str()
2017-04-26 21:37 UTC (5+ messages)
[PATCH security-next 0/2]: switch selinux and smack to pernet ops
2017-04-26 20:47 UTC (7+ messages)
` [PATCH security-next 1/2] smack: use pernet operations for hook registration
` [PATCH security-next 2/2] selinux: "
[PATCH 0/6] Appended signatures support for IMA appraisal
2017-04-26 20:40 UTC (15+ messages)
` [PATCH 3/6] ima: Simplify policy_func_show
` [PATCH 5/6] MODSIGN: Export module signature definitions
` [PATCH 6/6] ima: Support appended signatures for appraisal
[RFC][PATCH] audit: add ambient capabilities to CAPSET and BPRM_FCAPS records
2017-04-26 20:04 UTC (2+ messages)
[PATCH 1/3] selinux: Implement LSM notification system
2017-04-26 18:31 UTC (11+ messages)
` [PATCH 2/3] selinux: add checksum to policydb
` [PATCH 3/3] selinux: expose policy SHA256 checksum via selinuxfs
[PATCH v5 0/2] security: tty: make TIOCSTI ioctl require CAP_SYS_ADMIN
2017-04-26 14:21 UTC (11+ messages)
` [PATCH v5 1/2] security: tty: Add owner user namespace to tty_struct
` [PATCH v5 2/2] security: tty: make TIOCSTI ioctl require CAP_SYS_ADMIN
[PATCH v3 0/2] modules:capabilities: automatic module loading restrictions
2017-04-26 9:06 UTC (32+ messages)
` [PATCH v3 1/2] modules:capabilities: automatic module loading restriction
` [kernel-hardening] "
` [PATCH v3 2/2] modules:capabilities: add a per-task modules autoload restriction
[PATCH v4 0/2] tiocsti-restrict : make TIOCSTI ioctl require CAP_SYS_ADMIN
2017-04-25 14:55 UTC (6+ messages)
` [PATCH v4 1/2] tiocsti-restrict : Add owner user namespace to tty_struct
` [PATCH v4 2/2] tiocsti-restrict : make TIOCSTI ioctl require CAP_SYS_ADMIN
[GIT PULL] tpmdd fixes for 4.12
2017-04-25 0:04 UTC (3+ messages)
EXTREMELY IMPORTANT
2017-04-24 18:52 UTC
[PATCH 0/5] KEYS: sanitize key payloads
2017-04-24 14:14 UTC (12+ messages)
` [PATCH 1/5] KEYS: sanitize add_key() and keyctl() "
` [PATCH 2/5] KEYS: user_defined: sanitize "
` [PATCH 3/5] KEYS: encrypted: sanitize all key material
` [PATCH 4/5] KEYS: trusted: "
` [PATCH 5/5] KEYS: sanitize key structs before freeing
[PATCH v3 0/2] tiocsti-restrict : make TIOCSTI ioctl require CAP_SYS_ADMIN
2017-04-24 3:47 UTC (7+ messages)
` [PATCH v3 1/2] tiocsti-restrict : Add owner user namespace to tty_struct
` [PATCH v3 2/2] tiocsti-restrict : make TIOCSTI ioctl require CAP_SYS_ADMIN
[PATCH v2 1/2] tiocsti-restrict : Add owner user namespace to tty_struct
2017-04-23 20:53 UTC (5+ messages)
` [PATCH v2 2/2] tiocsti-restrict : make TIOCSTI ioctl require CAP_SYS_ADMIN
[PATCH 0/3] Extend the vTPM proxy driver to pass locality to emulator
2017-04-23 12:18 UTC (8+ messages)
` [PATCH 2/3] tpm: vtpm_proxy: Implement request_locality
` [PATCH 3/3] tpm: vtpm_proxy: Add ioctl to request locality prepended to command
` [tpmdd-devel] "
[backport v4.9] tpm_tis: use default timeout value if chip reports it as zero
2017-04-23 12:14 UTC (7+ messages)
` [tpmdd-devel] "
[PATCH] selinux: hooks: security content must be properly cleared
2017-04-23 6:48 UTC (2+ messages)
[PATCH] Introduce v3 namespaced file capabilities
2017-04-23 1:14 UTC (7+ messages)
[PATCH] make TIOCSTI ioctl require CAP_SYS_ADMIN
2017-04-22 19:50 UTC (18+ messages)
` [kernel-hardening] "
[PATCH v4 0/4] Certificate insertion support for x86 bzImages
2017-04-21 19:47 UTC (8+ messages)
` [PATCH v4 1/4] KEYS: Insert incompressible bytes to reserve space in bzImage
` [PATCH v4 2/4] KEYS: Add ELF class-independent certificate insertion support
` [PATCH v4 3/4] KEYS: Support for inserting a certificate into x86 bzImage
` [PATCH v4 4/4] KEYS: Print insert-sys-cert information to stdout instead of stderr
No subject
2017-04-21 4:59 UTC
[PATCH] KEYS: fix dereferencing NULL payload with nonzero length
2017-04-21 4:43 UTC (4+ messages)
` [lkp-robot] [KEYS] bdf7c0f8bf: ltp.add_key02.fail
` [LTP] "
[PATCH 06/38] Annotate hardware config module parameters in drivers/clocksource/
2017-04-20 7:31 UTC (13+ messages)
` [PATCH 00/38] Annotate hw config module params for future lockdown
` [PATCH 09/38] Annotate hardware config module parameters in drivers/i2c/
` [PATCH 13/38] Annotate hardware config module parameters in drivers/media/
` [PATCH 28/38] Annotate hardware config module parameters in drivers/staging/media/
[GIT PULL] Bugfixes for the Keys subsystem
2017-04-20 5:33 UTC
[PATCH net-next v6 00/11] Landlock LSM: Toward unprivileged sandboxing
2017-04-20 1:54 UTC (37+ messages)
` [PATCH net-next v6 04/11] landlock: Add LSM hooks related to filesystem
` [kernel-hardening] "
` [PATCH net-next v6 05/11] seccomp: Split put_seccomp_filter() with put_seccomp()
` [PATCH net-next v6 06/11] seccomp, landlock: Handle Landlock events per process hierarchy
` [kernel-hardening] [PATCH net-next v6 06/11] seccomp,landlock: "
` "
` [PATCH net-next v6 08/11] bpf: Add a Landlock sandbox example
` [PATCH net-next v6 09/11] seccomp: Enhance test_harness with an assert step mechanism
` [PATCH net-next v6 10/11] bpf,landlock: Add tests for Landlock
SELinux "filtering" capabilities?
2017-04-19 17:55 UTC (3+ messages)
[PATCH] tpm: Fix reference count to main device
2017-04-19 15:30 UTC (2+ messages)
[GIT PULL] IMA patches for 4.12
2017-04-19 12:06 UTC (2+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).