messages from 2021-10-18 13:37:06 to 2021-11-10 19:06:21 UTC [more...]
[PATCH v16 0/3] Add trusted_for(2) (was O_MAYEXEC)
2021-11-10 19:06 UTC (2+ messages)
` [PATCH v16 1/3] fs: Add trusted_for(2) syscall implementation and related sysctl
[PATCH v15 1/3] fs: Add trusted_for(2) syscall implementation and related sysctl
2021-11-10 8:52 UTC (4+ messages)
` [fs] a0918006f9: netperf.Throughput_tps -11.6% regression
[PATCH AUTOSEL 4.19 09/47] smackfs: Fix use-after-free in netlbl_catmap_walk()
2021-11-09 1:49 UTC (4+ messages)
` [PATCH AUTOSEL 4.19 10/47] NET: IPV4: fix error "do not initialise globals to 0"
` [PATCH AUTOSEL 4.19 37/47] smackfs: use __GFP_NOFAIL for smk_cipso_doi()
[PATCH AUTOSEL 4.4 06/30] smackfs: Fix use-after-free in netlbl_catmap_walk()
2021-11-09 1:09 UTC (3+ messages)
` [PATCH AUTOSEL 4.4 07/30] NET: IPV4: fix error "do not initialise globals to 0"
` [PATCH AUTOSEL 4.4 26/30] smackfs: use __GFP_NOFAIL for smk_cipso_doi()
[PATCH AUTOSEL 4.9 07/33] smackfs: Fix use-after-free in netlbl_catmap_walk()
2021-11-09 1:08 UTC (3+ messages)
` [PATCH AUTOSEL 4.9 08/33] NET: IPV4: fix error "do not initialise globals to 0"
` [PATCH AUTOSEL 4.9 28/33] smackfs: use __GFP_NOFAIL for smk_cipso_doi()
[PATCH AUTOSEL 4.14 07/39] smackfs: Fix use-after-free in netlbl_catmap_walk()
2021-11-09 1:06 UTC (3+ messages)
` [PATCH AUTOSEL 4.14 08/39] NET: IPV4: fix error "do not initialise globals to 0"
` [PATCH AUTOSEL 4.14 32/39] smackfs: use __GFP_NOFAIL for smk_cipso_doi()
[PATCH AUTOSEL 5.4 13/74] smackfs: Fix use-after-free in netlbl_catmap_walk()
2021-11-08 17:48 UTC (2+ messages)
` [PATCH AUTOSEL 5.4 14/74] NET: IPV4: fix error "do not initialise globals to 0"
[PATCH AUTOSEL 5.10 015/101] smackfs: Fix use-after-free in netlbl_catmap_walk()
2021-11-08 17:47 UTC (2+ messages)
` [PATCH AUTOSEL 5.10 017/101] NET: IPV4: fix error "do not initialise globals to 0"
[PATCH AUTOSEL 5.14 016/138] smackfs: Fix use-after-free in netlbl_catmap_walk()
2021-11-08 17:44 UTC (2+ messages)
` [PATCH AUTOSEL 5.14 019/138] NET: IPV4: fix error "do not initialise globals to 0"
[PATCH AUTOSEL 5.15 018/146] smackfs: Fix use-after-free in netlbl_catmap_walk()
2021-11-08 17:42 UTC (2+ messages)
` [PATCH AUTOSEL 5.15 021/146] NET: IPV4: fix error "do not initialise globals to 0"
[PATCH] landlock: Initialize kernel stack variables properly
2021-11-05 16:58 UTC (4+ messages)
[PATCH v3] integrity: support including firmware ".platform" keys at build time
2021-11-05 14:05 UTC (4+ messages)
[PATCH 0/2] Additional appended signature cleanup
2021-11-05 9:55 UTC (3+ messages)
` [PATCH 1/2] module: Use key_being_used_for for log messages in verify_appended_signature
` [PATCH 2/2] module: Move duplicate mod_check_sig users code to mod_parse_sig
[PATCH RFC] integrity: disassociate ima_filter_rule from security_audit_rule
2021-11-04 21:46 UTC (2+ messages)
[PATCHv2 net 0/4] security: fixups for the security hooks in sctp
2021-11-04 20:07 UTC (20+ messages)
` [PATCHv2 net 1/4] security: pass asoc to sctp_assoc_request and sctp_sk_clone
` [PATCHv2 net 2/4] security: call security_sctp_assoc_request in sctp_sf_do_5_1D_ce
` [PATCHv2 net 3/4] security: add sctp_assoc_established hook
` [PATCHv2 net 4/4] security: implement sctp_assoc_established hook in selinux
Disassociating ima_filter_rule* from security_audit_rule*
2021-11-04 18:57 UTC (2+ messages)
[RFC PATCH v7 00/16] Integrity Policy Enforcement (IPE)
2021-11-04 17:12 UTC (39+ messages)
` [RFC PATCH v7 04/16] ipe: add userspace interface
` [RFC PATCH v7 05/16] ipe: add LSM hooks on execution and kernel read
` [RFC PATCH v7 07/16] ipe: add auditing support
` [RFC PATCH v7 12/16] fsverity|security: add security hooks to fsverity digest and signature
` [RFC PATCH v7 14/16] scripts: add boot policy generation program
[PATCH] smack: clean up smack_enabled to be more readable
2021-11-03 22:24 UTC (3+ messages)
[PATCH v4 0/4] Add Landlock man pages
2021-11-03 14:17 UTC (3+ messages)
[PATCH] apparmor: remove duplicated 'Returns:' comments
2021-11-03 9:25 UTC
[PATCH v2 0/2] fuse: Send file/inode security context during creation
2021-11-02 19:09 UTC (7+ messages)
` [PATCH v2 2/2] fuse: Send security context of inode on file creation
[GIT PULL] SELinux patches for v5.16
2021-11-02 12:58 UTC (7+ messages)
[GIT PULL] Smack patches for v5.16
2021-11-02 0:51 UTC (2+ messages)
[GIT PULL] hardening updates for v5.16-rc1
2021-11-02 0:50 UTC (2+ messages)
[PATCH RESEND] KEYS: trusted: Fix trusted key backends when building as module
2021-11-01 18:52 UTC (2+ messages)
[PATCH v4 0/5] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
2021-11-01 8:00 UTC (3+ messages)
` [PATCH v4 4/5] crypto: caam - add in-kernel interface for blob generator
[PATCH] evm: mark evm_fixmode as __ro_after_init
2021-10-29 1:57 UTC (2+ messages)
[PATCH v3 0/2] use SM3 instead of SM3_256
2021-10-28 13:07 UTC (7+ messages)
` [PATCH v3 1/2] crypto: "
` [PATCH v3 2/2] tpm: "
[PATCH v3 00/13] integrity: Introduce DIGLIM
2021-10-28 9:08 UTC (2+ messages)
[PATCH] ima/evm: mark evm_fixmode as __ro_after_init
2021-10-28 1:48 UTC (3+ messages)
[PATCH net 0/4] security: fixups for the security hooks in sctp
2021-10-27 14:41 UTC (21+ messages)
` [PATCH net 1/4] security: pass asoc to sctp_assoc_request and sctp_sk_clone
` [PATCH net 2/4] security: call security_sctp_assoc_request in sctp_sf_do_5_1D_ce
` [PATCH net 3/4] security: add sctp_assoc_established hook
` [PATCH net 4/4] security: implement sctp_assoc_established hook in selinux
lsm-stacking: fix broken lsm audit
2021-10-25 15:01 UTC (4+ messages)
[PATCH] sctp: initialize endpoint LSM labels also on the client side
2021-10-25 7:55 UTC (5+ messages)
[PATCH v2 0/2] use SM3 instead of SM3_256
2021-10-25 3:04 UTC (5+ messages)
` [PATCH v2 1/2] crypto: "
` [PATCH v2 2/2] tpm: "
kernel panic: smack: Failed to initialize cipso DOI
2021-10-22 18:03 UTC (4+ messages)
` [PATCH] smackfs: use __GFP_NOFAIL for smk_cipso_doi()
[syzbot] KASAN: use-after-free Read in cipso_v4_doi_add
2021-10-22 18:02 UTC (3+ messages)
` [PATCH] smackfs: use netlbl_cfg_cipsov4_del() for deleting cipso_v4_doi
[PATCH 0/2] gcc-plugins: Explicitly document purpose and deprecation schedule
2021-10-21 10:28 UTC (13+ messages)
` [PATCH 1/2] "
` [PATCH 2/2] gcc-plugins: Remove cyc_complexity
[PATCH v4 0/3] Allow guest access to EFI confidential computing secret area
2021-10-20 13:59 UTC (13+ messages)
` [PATCH v4 1/3] efi/libstub: Copy "
` [PATCH v4 2/3] efi: Reserve "
` [PATCH v4 3/3] virt: Add efi_secret module to expose confidential computing secrets
[PATCH v2] security: Return xattr name from security_dentry_init_security()
2021-10-20 12:31 UTC (6+ messages)
[PATCH 0/2] tpm: use SM3 instead of SM3_256
2021-10-20 12:01 UTC (12+ messages)
` [PATCH 1/2] crypto: "
[PATCH v3 0/3] Allow guest access to EFI confidential computing secret area
2021-10-20 6:51 UTC (4+ messages)
` [PATCH v3 2/3] efi: Reserve "
[PATCH] Fixing returning a userspace address for return value
2021-10-19 19:53 UTC (2+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).