messages from 2017-04-20 01:57:52 to 2017-05-02 16:33:46 UTC [more...]
[PATCH RFC v2 0/6] proc: support private proc instances per pidnamespace
2017-05-02 16:33 UTC (12+ messages)
` [PATCH RFC v2 1/6] proc: add proc_fs_info struct to store proc information
` [PATCH RFC v2 2/6] proc: move /proc/{self|thread-self} dentries to proc_fs_info
` [PATCH RFC v2 3/6] proc: add helpers to set and get proc hidepid and gid mount options
` [PATCH RFC v2 4/6] proc: support mounting private procfs instances inside same pid namespace
` [PATCH RFC v2 5/6] proc: instantiate only pids that we can ptrace on 'limit_pids=1' mount option
` [PATCH RFC v2 6/6] proc: flush task dcache entries from all procfs instances
[GIT PULL] Hardware module parameter annotation for secure boot
2017-05-02 15:33 UTC
[PATCH 0/3] tpm_pcr_extend() code split
2017-05-02 12:31 UTC (4+ messages)
` [PATCH 1/3] tpm: use CPU native value for TPM_TAG_RQU_COMMAND
` [PATCH 2/3] tpm: move ordinals definition to include/linux/tpm_command.h
` [PATCH 3/3] tpm: move TPM 1.2 code of tpm_pcr_extend() to tpm1_pcr_extend()
[PATCH 1/5] efi: Move the x86 secure boot switch to generic code
2017-05-02 9:28 UTC (2+ messages)
converting Documentation/security/* to .rst
2017-05-01 16:31 UTC (3+ messages)
[GIT PULL] Security subsystem updates for v4.12
2017-05-01 9:41 UTC
[PATCH v1] LSM: Enable multiple calls to security_add_hooks() for the same LSM
2017-04-30 23:28 UTC (5+ messages)
31050 linux-security-module
2017-04-30 11:42 UTC
[PATCH v2 resend] Introduce v3 namespaced file capabilities
2017-04-29 20:44 UTC
[PATCH v2] Introduce v3 namespaced file capabilities
2017-04-29 18:22 UTC (2+ messages)
[PATCH v2 0/3] Extend the vTPM proxy driver to pass locality to emulator
2017-04-29 11:58 UTC (6+ messages)
` [PATCH v2 1/3] tpm: vtpm_proxy: Add ioctl to get supported flags
` [PATCH v2 2/3] tpm: vtpm_proxy: Implement request_locality
` [PATCH v2 3/3] tpm: vtpm_proxy: Add ioctl to request locality prepended to command
[PATCH 0/5] KEYS: sanitize key payloads
2017-04-28 17:57 UTC (15+ messages)
` [PATCH 1/5] KEYS: sanitize add_key() and keyctl() "
` [PATCH 2/5] KEYS: user_defined: sanitize "
` [PATCH 3/5] KEYS: encrypted: sanitize all key material
` [PATCH 4/5] KEYS: trusted: "
` [PATCH 5/5] KEYS: sanitize key structs before freeing
[PATCH 1/3] selinux: Implement LSM notification system
2017-04-28 16:38 UTC (20+ messages)
` [PATCH 2/3] selinux: add checksum to policydb
` [PATCH 3/3] selinux: expose policy SHA256 checksum via selinuxfs
[PATCH v4 0/4] Certificate insertion support for x86 bzImages
2017-04-28 15:47 UTC (12+ messages)
` [PATCH v4 1/4] KEYS: Insert incompressible bytes to reserve space in bzImage
` [PATCH v4 2/4] KEYS: Add ELF class-independent certificate insertion support
` [PATCH v4 3/4] KEYS: Support for inserting a certificate into x86 bzImage
` [PATCH v4 4/4] KEYS: Print insert-sys-cert information to stdout instead of stderr
[PATCH 0/6] Appended signatures support for IMA appraisal
2017-04-27 22:17 UTC (18+ messages)
` [PATCH 3/6] ima: Simplify policy_func_show
` [PATCH 5/6] MODSIGN: Export module signature definitions
` [PATCH 6/6] ima: Support appended signatures for appraisal
[PATCH] Introduce v3 namespaced file capabilities
2017-04-27 17:00 UTC (10+ messages)
[PATCH v3 0/2] modules:capabilities: automatic module loading restrictions
2017-04-27 13:16 UTC (32+ messages)
` [PATCH v3 1/2] modules:capabilities: automatic module loading restriction
` [kernel-hardening] "
` [PATCH v3 2/2] modules:capabilities: add a per-task modules autoload restriction
[PATCH v5 0/2] security: tty: make TIOCSTI ioctl require CAP_SYS_ADMIN
2017-04-27 12:34 UTC (12+ messages)
` [PATCH v5 1/2] security: tty: Add owner user namespace to tty_struct
` [PATCH v5 2/2] security: tty: make TIOCSTI ioctl require CAP_SYS_ADMIN
[RFC][PATCH] audit: add ambient capabilities to CAPSET and BPRM_FCAPS records
2017-04-27 2:52 UTC (4+ messages)
[PATCH] selinux: fix double free in selinux_parse_opts_str()
2017-04-26 21:37 UTC (5+ messages)
[PATCH security-next 0/2]: switch selinux and smack to pernet ops
2017-04-26 20:47 UTC (7+ messages)
` [PATCH security-next 1/2] smack: use pernet operations for hook registration
` [PATCH security-next 2/2] selinux: "
[PATCH v4 0/2] tiocsti-restrict : make TIOCSTI ioctl require CAP_SYS_ADMIN
2017-04-25 14:55 UTC (6+ messages)
` [PATCH v4 1/2] tiocsti-restrict : Add owner user namespace to tty_struct
` [PATCH v4 2/2] tiocsti-restrict : make TIOCSTI ioctl require CAP_SYS_ADMIN
[GIT PULL] tpmdd fixes for 4.12
2017-04-25 0:04 UTC (3+ messages)
EXTREMELY IMPORTANT
2017-04-24 18:52 UTC
[PATCH v3 0/2] tiocsti-restrict : make TIOCSTI ioctl require CAP_SYS_ADMIN
2017-04-24 3:47 UTC (7+ messages)
` [PATCH v3 1/2] tiocsti-restrict : Add owner user namespace to tty_struct
` [PATCH v3 2/2] tiocsti-restrict : make TIOCSTI ioctl require CAP_SYS_ADMIN
[PATCH v2 1/2] tiocsti-restrict : Add owner user namespace to tty_struct
2017-04-23 20:53 UTC (5+ messages)
` [PATCH v2 2/2] tiocsti-restrict : make TIOCSTI ioctl require CAP_SYS_ADMIN
[PATCH 0/3] Extend the vTPM proxy driver to pass locality to emulator
2017-04-23 12:18 UTC (4+ messages)
` [PATCH 3/3] tpm: vtpm_proxy: Add ioctl to request locality prepended to command
` [tpmdd-devel] "
[backport v4.9] tpm_tis: use default timeout value if chip reports it as zero
2017-04-23 12:14 UTC (5+ messages)
` [tpmdd-devel] "
[PATCH] selinux: hooks: security content must be properly cleared
2017-04-23 6:48 UTC (2+ messages)
[PATCH] make TIOCSTI ioctl require CAP_SYS_ADMIN
2017-04-22 19:50 UTC (14+ messages)
` [kernel-hardening] "
No subject
2017-04-21 4:59 UTC
[PATCH] KEYS: fix dereferencing NULL payload with nonzero length
2017-04-21 4:43 UTC (4+ messages)
` [lkp-robot] [KEYS] bdf7c0f8bf: ltp.add_key02.fail
` [LTP] "
[PATCH 00/38] Annotate hw config module params for future lockdown
2017-04-20 7:31 UTC (3+ messages)
` [PATCH 09/38] Annotate hardware config module parameters in drivers/i2c/
[GIT PULL] Bugfixes for the Keys subsystem
2017-04-20 5:33 UTC
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).