messages from 2018-03-28 23:40:01 to 2018-04-07 10:36:10 UTC [more...]
[PATCH] tpm: moves the delay_msec increment after sleep in tpm_transmit()
2018-04-07 10:36 UTC (4+ messages)
[PATCH v4 0/1] Safe LSM (un)loading, and immutable hooks
2018-04-07 9:26 UTC (11+ messages)
` [PATCH v4 1/1] security: Add mechanism to safely (un)load LSMs after boot time
[GIT PULL] SELinux patches for v4.17
2018-04-06 23:07 UTC (2+ messages)
[PATCH] uapi/linux/keyctl.h: don't use C++ reserved keyword as a struct member name
2018-04-06 18:58 UTC
[PATCH v4 0/4] Migrate all TPM 2.0 commands to use struct tpm_buf
2018-04-06 10:31 UTC (2+ messages)
[GIT PULL] Kernel lockdown for secure boot
2018-04-06 4:42 UTC (109+ messages)
Updates on ima digest list feature
2018-04-05 17:44 UTC
An actual suggestion (Re: [GIT PULL] Kernel lockdown for secure boot)
2018-04-05 16:11 UTC (12+ messages)
[RFC v3 0/2] WhiteEgret LSM module
2018-04-05 6:40 UTC (3+ messages)
[GIT PULL] Kernel lockdown for secure boot
2018-04-04 4:31 UTC (2+ messages)
[RFC PATCH v1] fw_lockdown: new micro LSM module to prevent loading unsigned firmware
2018-04-03 17:06 UTC (4+ messages)
[RFC PATCH v3 1/3] ima: extend clone() with IMA namespace support
2018-04-03 15:04 UTC (3+ messages)
[PATCH v2 0/5] selinux:Significant reduce of preempt_disable holds
2018-04-03 11:56 UTC (7+ messages)
` [PATCH v2 1/5] selinux:Remove direct references to policydb
[GIT PULL][SECURITY] general changes for v4.17
2018-04-02 11:20 UTC
[REVIEW][PATCH 00/11] ipc: Fixing the pid namespace support
2018-04-02 11:11 UTC (14+ messages)
` [REVIEW][PATCH 11/11] ipc/sem: Fix semctl(..., GETPID, ...) between pid namespaces
` [REVIEW][PATCH 12/11] ipc: Directly call the security hook in ipc_ops.associate
` [REVIEW][PATCH 13/11] ipc/smack: Tidy up from the change in type of the ipc security hooks
[PATCH bpf-next v8 00/11] Landlock LSM: Toward unprivileged sandboxing
2018-04-02 0:39 UTC (6+ messages)
[PATCH 0/4] security: Split out hook definitions into lsm_hook_types.h
2018-04-01 20:43 UTC (6+ messages)
` [PATCH 2/4] security: Refactor security hooks into structured hooks
` [PATCH 3/4] security: Make security_hook_heads use definitions in lsm_hook_types.h
` [PATCH 4/4] security: generated security hook initialization based on lsm_hook_types.h
[PATCH v3 0/1] Safe LSM (un)loading, and immutable hooks
2018-04-01 10:37 UTC (9+ messages)
` [PATCH v3 1/1] security: Add mechanism to safely (un)load LSMs after boot time
[PATCH] security: remove security_settime
2018-04-01 8:42 UTC
[PATCH] security: Split out hook definitions into lsm_hook_types.h
2018-04-01 5:15 UTC
[security:next-testing 16/17] include/linux/list.h:377:18: error: 'struct hlist_head' has no member named 'next'
2018-03-31 7:41 UTC
[PATCH][next] apparmor: fix memory leak on buffer on error exit path
2018-03-31 4:12 UTC (2+ messages)
[PATCH v3] security: convert security hooks to use hlist
2018-03-31 2:30 UTC (2+ messages)
[RFC v3 2/2] WhiteEgret: Add an example of user application
2018-03-30 8:30 UTC
[RFC v3 1/2] WhiteEgret: Add WhiteEgret core functions
2018-03-30 8:30 UTC
[RFC PATCH v21 0/6] mm: security: ro protection for dynamic data
2018-03-29 20:50 UTC (4+ messages)
[PATCH net-next 0/5] Introduce net_rwsem to protect net_namespace_list
2018-03-29 17:48 UTC (7+ messages)
` [PATCH net-next 1/5] net: "
` [PATCH net-next 2/5] net: Don't take rtnl_lock() in wireless_nlevent_flush()
` [PATCH net-next 3/5] security: Remove rtnl_lock() in selinux_xfrm_notify_policyload()
` [PATCH net-next 4/5] ovs: Remove rtnl_lock() from ovs_exit_net()
` [PATCH net-next 5/5] net: Remove rtnl_lock() in nf_ct_iterate_destroy()
[PATCH v2 0/2] Separate out mutable security hooks, and enable runtime (un)loading
2018-03-28 23:59 UTC (7+ messages)
` [PATCH v2 1/2] security: convert security hooks to use hlist
` [PATCH v2 2/2] security: Add mechanism to safely (un)load LSMs after boot time
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).