Mailing List:
linux-security-module@vger.kernel.org
Add newDisplay options
2
replies
[PATCH v2 0/2] integrity fixes
started 2014-10-24 07:07:04 UTC
2014-10-24 07:07:06 UTC
Dmitry Kasatkin
7
replies
[PATCH 0/2] integrity fixes
started 2014-10-23 13:47:16 UTC
2014-10-24 03:48:36 UTC
Mimi Zohar
14
replies
TPM MiniSummit @ LinuxCon Europe
started 2014-09-22 09:01:31 UTC
2014-10-23 21:45:28 UTC
Mike Pontillo
17
replies
[PATCH v16 0/4] LSM: Generalize existing module stacking
started 2014-08-08 19:23:23 UTC
2014-10-23 21:19:00 UTC
Casey Schaufler
7
replies
[PATCH v17 0/4] LSM: Generalize existing module stacking
started 2014-10-17 00:24:12 UTC
2014-10-20 22:57:07 UTC
Paul Moore
0
replies
[lsm] Kernel panic - not syncing: Could not register security module
started 2014-10-20 14:57:14 UTC
2014-10-20 14:57:14 UTC
Fengguang Wu
6
replies
[PATCH 0/3] MODSIGN: Use PKCS#7 cert to avoid SKIDs
started 2014-10-03 14:30:12 UTC
2014-10-20 11:12:01 UTC
Dmitry Kasatkin
5
replies
[PATCH v2] Security: smack: replace kzalloc with kmem_cache for inode_smack
started 2014-10-15 12:10:41 UTC
2014-10-17 17:37:21 UTC
Casey Schaufler
0
replies
[GIT PULL] SELinux fix for 3.18 (updated)
started 2014-10-16 09:56:21 UTC
2014-10-16 09:56:21 UTC
James Morris
4
replies
[GIT PULL] SELinux list corruption fix for 3.18
started 2014-10-14 15:05:17 UTC
2014-10-15 14:52:01 UTC
Paul Moore
1
reply
[PATCH 1/1] Security : smack : Use kmem_cache for allocation and freeing of inode_smack
started 2014-10-15 05:56:16 UTC
2014-10-15 05:43:38 UTC
Andrew Morton
11
replies
[PATCH v3 0/6] ima: provide signature based 'init' appraisal
started 2014-10-10 14:09:27 UTC
2014-10-14 22:23:29 UTC
Dmitry Kasatkin
9
replies
[GIT] Security subsystem upate for 3.18
started 2014-10-10 08:23:51 UTC
2014-10-14 11:01:52 UTC
James Morris
0
replies
[GIT PULL] LLVMLinux patches for v3.18
started 2014-10-14 08:59:04 UTC
2014-10-14 08:59:04 UTC
Behan Webster
0
replies
[GIT PULL] SELinux patches for 3.18 #2
started 2014-10-13 15:57:24 UTC
2014-10-13 15:57:24 UTC
Paul Moore
5
replies
[PATCH-v4 0/5] ima: add support for custom template formats
started 2014-10-13 12:08:37 UTC
2014-10-13 12:08:39 UTC
Roberto Sassu
4
replies
[PATCH v2 3/4] ima: ignore empty and with whitespaces policy lines
started 2014-10-03 11:40:20 UTC
2014-10-13 00:14:08 UTC
Mimi Zohar
8
replies
[PATCH v1 2/4] integrity: provide file reading API
started 2014-07-15 12:54:21 UTC
2014-10-10 14:15:32 UTC
Dmitry Kasatkin
11
replies
[PATCH] TaskTracker : Simplified thread information tracker.
started 2014-05-23 12:44:43 UTC
2014-10-10 12:49:23 UTC
Richard Guy Briggs
0
replies
Smack: Lock mode for the floor and hat labels
started 2014-10-09 23:18:55 UTC
2014-10-09 23:18:55 UTC
Casey Schaufler
0
replies
Functions prefixed with security_ in SELinux
started 2014-10-09 17:55:32 UTC
2014-10-09 17:55:32 UTC
Casey Schaufler
5
replies
[PATCH v2 02/17] security: make security_file_set_fowner, f_setown and __f_setown void return
started 2014-09-04 12:38:28 UTC
2014-10-07 18:02:25 UTC
Jeff Layton
0
replies
[PATCH] ima: Fix build failure on powerpc when TCG_IBMVTPM dependencies are not met
started 2014-10-07 10:55:00 UTC
2014-10-07 10:55:00 UTC
Michael Ellerman
1
reply
[GIT PULL] KEYS:
started 2014-10-06 17:25:56 UTC
2014-10-07 04:58:15 UTC
James Morris
18
replies
[PATCH 0/4] KEYS fixes
started 2014-10-03 09:09:53 UTC
2014-10-06 19:39:48 UTC
Mimi Zohar
0
replies
[PATCH v2 1/1] truncate: generate fanotify and inotify events
started 2014-10-06 18:13:27 UTC
2014-10-06 18:13:27 UTC
Heinrich Schuchardt
6
replies
[PATCH 1/7] KEYS: handle error code encoded in pointer
started 2014-10-06 17:18:47 UTC
2014-10-06 17:19:18 UTC
David Howells
1
reply
[PATCH 1/1] truncate: generate fanotify and inotify events
started 2014-10-03 21:33:16 UTC
2014-10-03 21:43:59 UTC
Kirill A. Shutemov
23
replies
[RFC][PATCH 00/13] MODSIGN: Use PKCS#7 for module signatures
started 2014-09-08 15:37:05 UTC
2014-10-03 12:25:32 UTC
Dmitry Kasatkin
0
replies
[PATCH v2 0/4] ima: few policy loading improvements
started 2014-10-03 11:40:17 UTC
2014-10-03 11:40:17 UTC
Dmitry Kasatkin
Click to Load More...
Loading...