messages from 2018-09-05 22:16:46 to 2018-09-16 01:49:07 UTC [more...]
[PATCH 00/18] LSM: Prepare for explict LSM ordering
2018-09-16 1:49 UTC (23+ messages)
` [PATCH 01/18] vmlinux.lds.h: Avoid copy/paste of security_init section
` [PATCH 02/18] LSM: Rename .security_initcall section to .lsm_info
` [PATCH 03/18] LSM: Remove initcall tracing
` [PATCH 04/18] LSM: Convert from initcall to struct lsm_info
` [PATCH 05/18] vmlinux.lds.h: Move LSM_TABLE into INIT_DATA
` [PATCH 06/18] LSM: Convert security_initcall() into DEFINE_LSM()
` [PATCH 07/18] LSM: Add minor LSM initialization loop
` [PATCH 08/18] integrity: Initialize as LSM_TYPE_MINOR
` [PATCH 09/18] LSM: Record LSM name in struct lsm_info
` [PATCH 10/18] LSM: Plumb visibility into optional "enabled" state
` [PATCH 11/18] LSM: Lift LSM selection out of individual LSMs
` [PATCH 12/18] LSM: Introduce ordering details in struct lsm_info
` [PATCH 13/18] LoadPin: Initialize as LSM_TYPE_MINOR
` [PATCH 14/18] Yama: "
` [PATCH 15/18] capability: "
` [PATCH 16/18] LSM: Allow arbitrary LSM ordering
` [PATCH 17/18] LSM: Provide init debugging
` [PATCH 18/18] LSM: Don't ignore initialization failures
[RFC 00/12] Multi-Key Total Memory Encryption API (MKTME)
2018-09-15 0:06 UTC (51+ messages)
` [RFC 02/12] mm: Generalize the mprotect implementation to support extensions
` [RFC 03/12] syscall/x86: Wire up a new system call for memory encryption keys
` [RFC 04/12] x86/mm: Add helper functions to manage "
` [RFC 05/12] x86/mm: Add a helper function to set keyid bits in encrypted VMA's
` [RFC 07/12] x86/mm: Add helper functions to track "
` [RFC 08/12] mm: Track VMA's in use for each memory encryption keyid
` [RFC 09/12] mm: Restrict memory encryption to anonymous VMA's
` [RFC 10/12] x86/pconfig: Program memory encryption keys on a system-wide basis
` [RFC 11/12] keys/mktme: Add a new key service type for memory encryption keys
` [RFC 12/12] keys/mktme: Do not revoke in use "
` [RFC 01/12] docs/x86: Document the Multi-Key Total Memory Encryption API
` [RFC 06/12] mm: Add the encrypt_mprotect() system call
[PATCH v2 00/10] LSM: Module stacking in support of S.A.R.A and Landlock
2018-09-14 20:47 UTC (53+ messages)
` [PATCH 01/10] procfs: add smack subdir to attrs
` [PATCH 02/10] Smack: Abstract use of cred security blob
` [PATCH 03/10] SELinux: "
` [PATCH 04/10] LSM: Infrastructure management of the "
` [PATCH 05/10] SELinux: Abstract use of file "
` [PATCH 06/10] LSM: Infrastructure management of the "
` [PATCH 07/10] SELinux: Abstract use of inode "
` [PATCH 08/10] Smack: "
` [PATCH 09/10] LSM: Infrastructure management of the inode security
` [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
[PATCH v2 0/6] Add support for architecture specific IMA policies
2018-09-14 13:50 UTC (8+ messages)
` [PATCH v2 1/6] ima: define arch_ima_get_secureboot
` [PATCH v2 2/6] ima: prevent kexec_load syscall based on runtime secureboot flag
` [PATCH v2 3/6] ima: refactor ima_init_policy()
` [PATCH v2 4/6] ima: add support for arch specific policies
` [PATCH v2 5/6] ima: add support for external setting of ima_appraise
` [PATCH v2 6/6] x86/ima: define arch_get_ima_policy() for x86
[PATCH 0/3] keyutils: request_key and DNS resolver changes
2018-09-13 14:08 UTC (4+ messages)
` [PATCH 1/3] request-key: Provide a command line option to suppress execution
` [PATCH 2/3] request-key: Find best match rather than first match
` [PATCH 3/3] Remove the dependency on MIT Kerberos
[PATCH -next] Smack: remove set but not used variable 'root_inode'
2018-09-13 13:18 UTC
[PATCH 3/6] selinux: convert to kvmalloc
2018-09-13 2:27 UTC (4+ messages)
Compliment of the day to you Dear Friend
2018-09-13 1:28 UTC
[PATCH 1/3] selinux: make dentry_init_security() return security module name
2018-09-12 1:14 UTC (13+ messages)
` [PATCH 2/3] ceph: rename struct ceph_acls_info to ceph_acl_sec_ctx
` [PATCH 3/3] ceph: xattr security label support
Containers and checkpoint/restart micro-conference at LPC2018
2018-09-11 15:36 UTC (6+ messages)
` Overlayfs @ "
INFO: rcu detected stall in pppol2tp_sendmsg
2018-09-11 6:06 UTC
[PATCH resend] uapi/linux/keyctl.h: don't use C++ reserved keyword as a struct member name
2018-09-10 22:09 UTC (3+ messages)
[PATCH v6 0/2] tpm: add support for nonblocking operation
2018-09-10 18:46 UTC (5+ messages)
` [PATCH v6 1/2] tpm: add ptr to the tpm_space struct to file_priv
` [PATCH v6 2/2] tpm: add support for nonblocking operation
[PATCH v5 0/2] tpm: add support for nonblocking operation
2018-09-10 17:23 UTC (4+ messages)
next-20180906 crashes during ubifs_mount (legacy fs_context)
2018-09-08 15:58 UTC (2+ messages)
[PATCH 00/22] KEYS: Support TPM-wrapped key and crypto ops
2018-09-08 15:26 UTC (5+ messages)
[PATCH] apparmor: Fix network performance issue in aa_label_sk_perm
2018-09-07 23:53 UTC (3+ messages)
[PATCH 4.9 41/63] Replace magic for trusting the secondary keyring with #define
2018-09-07 21:10 UTC (2+ messages)
` [PATCH 4.9 42/63] Fix kexec forbidding kernels signed with keys in the secondary keyring to boot
[PATCH 4.14 16/89] Replace magic for trusting the secondary keyring with #define
2018-09-07 21:09 UTC (2+ messages)
` [PATCH 4.14 17/89] Fix kexec forbidding kernels signed with keys in the secondary keyring to boot
[PATCH 4.18 024/145] Replace magic for trusting the secondary keyring with #define
2018-09-07 21:08 UTC (2+ messages)
` [PATCH 4.18 025/145] Fix kexec forbidding kernels signed with keys in the secondary keyring to boot
Smack: wrong-looking capable() check in smk_ptrace_rule_check()
2018-09-07 9:47 UTC (2+ messages)
` Fwd: "
possible deadlock in start_this_handle
2018-09-07 9:38 UTC
[PATCH] seccomp: remove unnecessary unlikely()
2018-09-06 20:31 UTC (7+ messages)
possible deadlock in ext4_evict_inode
2018-09-06 19:41 UTC
WARNING in apparmor_secid_to_secctx
2018-09-06 19:35 UTC (18+ messages)
[GIT PULL] apparmor fix for v4.19-rc3
2018-09-06 16:20 UTC
[PATCH] selinux: refactor mls_context_to_sid() and make it stricter
2018-09-05 22:16 UTC (4+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).