messages from 2018-09-07 21:09:10 to 2018-09-17 23:28:24 UTC [more...]
[PATCH 00/18] LSM: Prepare for explict LSM ordering
2018-09-17 23:28 UTC (40+ messages)
` [PATCH 01/18] vmlinux.lds.h: Avoid copy/paste of security_init section
` [PATCH 02/18] LSM: Rename .security_initcall section to .lsm_info
` [PATCH 03/18] LSM: Remove initcall tracing
` [PATCH 04/18] LSM: Convert from initcall to struct lsm_info
` [PATCH 05/18] vmlinux.lds.h: Move LSM_TABLE into INIT_DATA
` [PATCH 06/18] LSM: Convert security_initcall() into DEFINE_LSM()
` [PATCH 07/18] LSM: Add minor LSM initialization loop
` [PATCH 08/18] integrity: Initialize as LSM_TYPE_MINOR
` [PATCH 09/18] LSM: Record LSM name in struct lsm_info
` [PATCH 10/18] LSM: Plumb visibility into optional "enabled" state
` [PATCH 11/18] LSM: Lift LSM selection out of individual LSMs
` [PATCH 12/18] LSM: Introduce ordering details in struct lsm_info
` [PATCH 13/18] LoadPin: Initialize as LSM_TYPE_MINOR
` [PATCH 14/18] Yama: "
` [PATCH 15/18] capability: "
` [PATCH 16/18] LSM: Allow arbitrary LSM ordering
` [PATCH 17/18] LSM: Provide init debugging
` [PATCH 18/18] LSM: Don't ignore initialization failures
[RFC 00/12] Multi-Key Total Memory Encryption API (MKTME)
2018-09-17 22:34 UTC (53+ messages)
` [RFC 02/12] mm: Generalize the mprotect implementation to support extensions
` [RFC 03/12] syscall/x86: Wire up a new system call for memory encryption keys
` [RFC 04/12] x86/mm: Add helper functions to manage "
` [RFC 05/12] x86/mm: Add a helper function to set keyid bits in encrypted VMA's
` [RFC 07/12] x86/mm: Add helper functions to track "
` [RFC 08/12] mm: Track VMA's in use for each memory encryption keyid
` [RFC 09/12] mm: Restrict memory encryption to anonymous VMA's
` [RFC 10/12] x86/pconfig: Program memory encryption keys on a system-wide basis
` [RFC 11/12] keys/mktme: Add a new key service type for memory encryption keys
` [RFC 12/12] keys/mktme: Do not revoke in use "
` [RFC 01/12] docs/x86: Document the Multi-Key Total Memory Encryption API
` [RFC 06/12] mm: Add the encrypt_mprotect() system call
[PATCH v6 0/2] tpm: add support for nonblocking operation
2018-09-17 21:27 UTC (9+ messages)
` [PATCH v6 1/2] tpm: add ptr to the tpm_space struct to file_priv
` [PATCH v6 2/2] tpm: add support for nonblocking operation
[PATCH v2 3/3] tpm: retrieve digest size of unknown algorithms with PCR read
2018-09-17 21:16 UTC (2+ messages)
[PATCH v2, RESEND 0/3] tpm: retrieve digest size of unknown algorithms from TPM
2018-09-17 9:38 UTC (4+ messages)
` [PATCH v2, RESEND 1/3] tpm: rename and export tpm2_digest and tpm2_algorithms
` [PATCH v2, RESEND 2/3] tpm: modify tpm_pcr_read() definition to pass TPM hash algorithms
` [PATCH v2, RESEND 3/3] tpm: retrieve digest size of unknown algorithms with PCR read
[PATCH v2 00/10] LSM: Module stacking in support of S.A.R.A and Landlock
2018-09-16 17:45 UTC (56+ messages)
` [PATCH 01/10] procfs: add smack subdir to attrs
` [PATCH 02/10] Smack: Abstract use of cred security blob
` [PATCH 03/10] SELinux: "
` [PATCH 04/10] LSM: Infrastructure management of the "
` [PATCH 05/10] SELinux: Abstract use of file "
` [PATCH 06/10] LSM: Infrastructure management of the "
` [PATCH 07/10] SELinux: Abstract use of inode "
` [PATCH 08/10] Smack: "
` [PATCH 09/10] LSM: Infrastructure management of the inode security
` [PATCH 10/10] LSM: Blob sharing support for S.A.R.A and LandLock
[PATCH v2 0/6] Add support for architecture specific IMA policies
2018-09-14 13:50 UTC (8+ messages)
` [PATCH v2 1/6] ima: define arch_ima_get_secureboot
` [PATCH v2 2/6] ima: prevent kexec_load syscall based on runtime secureboot flag
` [PATCH v2 3/6] ima: refactor ima_init_policy()
` [PATCH v2 4/6] ima: add support for arch specific policies
` [PATCH v2 5/6] ima: add support for external setting of ima_appraise
` [PATCH v2 6/6] x86/ima: define arch_get_ima_policy() for x86
[PATCH 0/3] keyutils: request_key and DNS resolver changes
2018-09-13 14:08 UTC (4+ messages)
` [PATCH 1/3] request-key: Provide a command line option to suppress execution
` [PATCH 2/3] request-key: Find best match rather than first match
` [PATCH 3/3] Remove the dependency on MIT Kerberos
[PATCH -next] Smack: remove set but not used variable 'root_inode'
2018-09-13 13:18 UTC
[PATCH 3/6] selinux: convert to kvmalloc
2018-09-13 2:27 UTC (4+ messages)
Compliment of the day to you Dear Friend
2018-09-13 1:28 UTC
[PATCH 1/3] selinux: make dentry_init_security() return security module name
2018-09-12 1:14 UTC (8+ messages)
Containers and checkpoint/restart micro-conference at LPC2018
2018-09-11 15:36 UTC (6+ messages)
` Overlayfs @ "
INFO: rcu detected stall in pppol2tp_sendmsg
2018-09-11 6:06 UTC
[PATCH resend] uapi/linux/keyctl.h: don't use C++ reserved keyword as a struct member name
2018-09-10 22:09 UTC (3+ messages)
[PATCH v5 0/2] tpm: add support for nonblocking operation
2018-09-10 17:23 UTC (4+ messages)
next-20180906 crashes during ubifs_mount (legacy fs_context)
2018-09-08 15:58 UTC (2+ messages)
[PATCH 00/22] KEYS: Support TPM-wrapped key and crypto ops
2018-09-08 15:26 UTC (4+ messages)
[PATCH] apparmor: Fix network performance issue in aa_label_sk_perm
2018-09-07 23:53 UTC (3+ messages)
[PATCH 4.9 41/63] Replace magic for trusting the secondary keyring with #define
2018-09-07 21:10 UTC (2+ messages)
` [PATCH 4.9 42/63] Fix kexec forbidding kernels signed with keys in the secondary keyring to boot
[PATCH 4.14 16/89] Replace magic for trusting the secondary keyring with #define
2018-09-07 21:09 UTC (2+ messages)
` [PATCH 4.14 17/89] Fix kexec forbidding kernels signed with keys in the secondary keyring to boot
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).