messages from 2018-02-18 00:15:12 to 2018-02-27 23:02:16 UTC [more...]
[PATCH bpf-next v8 00/11] Landlock LSM: Toward unprivileged sandboxing
2018-02-27 23:02 UTC (27+ messages)
` [PATCH bpf-next v8 01/11] fs, security: Add a security blob to nameidata
` [PATCH bpf-next v8 01/11] fs,security: "
` [PATCH bpf-next v8 02/11] fs, security: Add a new file access type: MAY_CHROOT
` [PATCH bpf-next v8 03/11] bpf: Add eBPF program subtype and is_valid_subtype() verifier
` [PATCH bpf-next v8 04/11] bpf, landlock: Define an eBPF program type for Landlock hooks
` [PATCH bpf-next v8 05/11] seccomp, landlock: Enforce Landlock programs per process hierarchy
` [PATCH bpf-next v8 05/11] seccomp,landlock: "
` [PATCH bpf-next v8 06/11] bpf,landlock: Add a new map type: inode
` [PATCH bpf-next v8 07/11] landlock: Handle filesystem access control
` [PATCH bpf-next v8 08/11] landlock: Add ptrace restrictions
` [PATCH bpf-next v8 09/11] bpf: Add a Landlock sandbox example
` [PATCH bpf-next v8 10/11] bpf,landlock: Add tests for Landlock
` [PATCH bpf-next v8 11/11] landlock: Add user and kernel documentation "
[PATCH] security: mark kmem caches as __ro_after_init
2018-02-27 22:50 UTC (3+ messages)
[PATCH v2 0/4] ima: unverifiable file signatures
2018-02-27 22:35 UTC (11+ messages)
` [PATCH v2 1/4] ima: fail file signature verification on non-init mounted filesystems
` [PATCH v2 2/4] ima: re-evaluate files on privileged "
` [PATCH v2 3/4] ima: fail signature verification based on policy
` [PATCH v2 4/4] fuse: define the filesystem as untrusted
[PATCH 1/2] security: evm: Move evm_hmac and evm_hash from evm_main.c to evm_crypto.c
2018-02-27 22:17 UTC (2+ messages)
` [PATCH 2/2] security: evm: Constify *integrity_status_msg[]
[GIT PULL] seccomp fix for v4.16-rc4
2018-02-27 18:46 UTC
[PATCH V8 2/4] sctp: Add ip option support
2018-02-27 12:24 UTC (4+ messages)
[PATCH v1 0/2] ima: untrusted filesystems
2018-02-27 2:12 UTC (18+ messages)
` [PATCH v1 1/2] ima: fail signature verification on "
` [PATCH v1 2/2] fuse: define the filesystem as untrusted
[GIT PULL] TPM: Bug fixes
2018-02-26 23:48 UTC
[GIT PULL] tpmdd fixes for 4.16
2018-02-26 23:33 UTC (4+ messages)
[RFC PATCH v17 0/7] mm: security: ro protection for dynamic data
2018-02-26 19:26 UTC (29+ messages)
` [PATCH 1/7] genalloc: track beginning of allocations
` [PATCH 2/7] genalloc: selftest
` [PATCH 3/7] struct page: add field for vm_struct
` [PATCH 4/7] Protectable Memory
` [PATCH 5/7] Pmalloc selftest
` [PATCH 6/7] lkdtm: crash on overwriting protected pmalloc var
` [PATCH 7/7] Documentation for Pmalloc
[PATCH 1/2 v5] tpm: cmd_ready command can be issued only after granting locality
2018-02-26 13:59 UTC (3+ messages)
[PATCH 1/2 v4] tpm: cmd_ready command can be issued only after granting locality
2018-02-26 11:55 UTC (7+ messages)
No subject
2018-02-25 0:39 UTC
[PATCH] selinux: fix typo in selinux_netlbl_sctp_sk_clone declaration
2018-02-24 10:29 UTC (3+ messages)
[PATCH V7 2/4] sctp: Add ip option support
2018-02-24 0:56 UTC (8+ messages)
[GIT PULL] Security subsystem fixes for v4.16-rc3
2018-02-23 19:10 UTC
[RFC][PATCH 0/6] KEYS: Fixes
2018-02-23 0:24 UTC (11+ messages)
` [PATCH 1/6] PKCS#7: fix certificate chain verification
` [PATCH 2/6] PKCS#7: fix certificate blacklisting
` [PATCH 3/6] PKCS#7: fix direct verification of SignerInfo signature
` [PATCH 4/6] X.509: fix BUG_ON() when hash algorithm is unsupported
` [PATCH 5/6] X.509: fix NULL dereference when restricting key with unsupported_sig
` [PATCH 6/6] KEYS: Use individual pages in big_key for crypto buffers
[PATCH 08a/30] kexec_file: split KEXEC_VERIFY_SIG into KEXEC_SIG and KEXEC_SIG_FORCE
2018-02-22 19:14 UTC (15+ messages)
` [PATCH 00/30] security, efi: Add kernel lockdown
` [PATCH 08/30] kexec_file: Restrict at runtime if the kernel is locked down
` [PATCH 04/30] Enforce module signatures "
[RFC PATCH v16 0/6] mm: security: ro protection for dynamic data
2018-02-22 18:28 UTC (26+ messages)
` [PATCH 1/6] genalloc: track beginning of allocations
` [PATCH 2/6] genalloc: selftest
` [PATCH 5/6] Pmalloc: self-test
[RFC][PATCH 0/6] KEYS: Fixes
2018-02-22 16:17 UTC
[RFC PATCH v15 0/6] mm: security: ro protection for dynamic data
2018-02-22 14:20 UTC (8+ messages)
` [PATCH 3/6] struct page: add field for vm_struct
Your Consent
2018-02-22 9:40 UTC
[RFC PATCH v11 0/6] mm: security: ro protection for dynamic data
2018-02-21 22:37 UTC (24+ messages)
` [PATCH 4/6] Protectable Memory
` [kernel-hardening] "
` arm64 physmap (was Re: [kernel-hardening] [PATCH 4/6] Protectable Memory)
Sync to v4.16-rc2
2018-02-21 17:02 UTC (2+ messages)
[PATCH selinux-next] selinux: Annotate lockdep for services locks
2018-02-21 9:31 UTC (4+ messages)
[PATCH v4] tpm: Trigger only missing TPM 2.0 self tests
2018-02-21 7:31 UTC (3+ messages)
information required
2018-02-21 6:56 UTC
[PATCH 0/2 v3] tpm: fix locality and power saving handling
2018-02-20 23:03 UTC (11+ messages)
` [PATCH 1/2 v3] tpm: cmd_ready command can be issued only after granting locality
` [PATCH 2/2 v3] tpm: separate cmd_ready/go_idle from runtime_pm
[PATCH v3 00/15] extend initramfs archive format to support xattrs
2018-02-20 19:01 UTC (11+ messages)
` [PATCH v3 01/15] Documentation: add newcx initramfs format description
` [PATCH v3 14/15] selinux: allow setxattr on rootfs so initramfs code can set them
` [PATCH v3 15/15] selinux: delay sid population for rootfs till init is complete
[RFC PATCH v3 0/3] Safe, dynamically loadable LSM hooks
2018-02-20 2:14 UTC (4+ messages)
` [RFC PATCH v3 1/3] security: Refactor LSM hooks into an array
` [RFC PATCH v3 2/3] security: Expose a mechanism to load lsm hooks dynamically at runtime
` [RFC PATCH v3 3/3] security: Add an example sample dynamic LSM
[RFC PATCH 1/4] ima: define a new policy condition based on the filesystem name
2018-02-19 15:44 UTC (10+ messages)
` [RFC PATCH 2/4] ima: fail signature verification on unprivileged & untrusted filesystems
[PATCH V6 2/4] sctp: Add ip option support
2018-02-19 1:21 UTC (8+ messages)
[PATCH 04/30] Enforce module signatures if the kernel is locked down
2017-11-09 17:31 UTC
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).