messages from 2025-06-07 00:51:50 to 2025-06-16 23:40:34 UTC [more...]
[PATCH 00/12] Signed BPF programs
2025-06-16 23:40 UTC (68+ messages)
` [PATCH 01/12] bpf: Implement an internal helper for SHA256 hashing
` [PATCH 02/12] bpf: Update the bpf_prog_calc_tag to use SHA256
` [PATCH 03/12] bpf: Implement exclusive map creation
` [PATCH 04/12] libbpf: Implement SHA256 internal helper
` [PATCH 05/12] libbpf: Support exclusive map creation
` [PATCH 07/12] bpf: Return hashes of maps in BPF_OBJ_GET_INFO_BY_FD
` [PATCH 08/12] bpf: Implement signature verification for BPF programs
` [PATCH 09/12] libbpf: Update light skeleton for signing
` [PATCH 10/12] libbpf: Embed and verify the metadata hash in the loader
` [PATCH 11/12] bpftool: Add support for signing BPF programs
` [PATCH 12/12] selftests/bpf: Enable signature verification for all lskel tests
ANN: LSM and SELinux trees to rebase to v6.16-rc2 next week
2025-06-16 22:50 UTC (3+ messages)
[PATCH v2 0/2] smack: fix two bugs in setting task label
2025-06-16 21:43 UTC (5+ messages)
[PATCH v4 0/4] Audit: Records for multiple security contexts
2025-06-16 20:54 UTC (7+ messages)
` [PATCH v4 2/4] LSM: security_lsmblob_to_secctx module selection
` [PATCH v4 3/4] Audit: Add record for multiple task security contexts
` [PATCH v4 4/4] Audit: Add record for multiple object contexts
[RFC] Keyrings: How to make them more useful
2025-06-16 20:30 UTC (6+ messages)
[PATCH] security/commoncap: don't assume "setid" if all ids are identical
2025-06-16 20:16 UTC (19+ messages)
` [PATCH] exec: Correct the permission check for unsafe exec
` [PATCH v2] "
[PATCH 0/5] smack: fix bugs: invalid unix socket label, invalid transmute attr
2025-06-16 18:36 UTC (14+ messages)
` [PATCH 1/5] smack: deduplicate "does access rule request transmutation"
` [PATCH 2/5] smack: fix bug: SMACK64TRANSMUTE set on non-directory
` Re[2]: "
` [PATCH 3/5] smack: deduplicate xattr setting in smack_inode_init_security()
` [PATCH 4/5] smack: always "instantiate" inode "
` [PATCH 5/5] smack: fix bug: invalid label of unix socket file
` Re[2]: "
` Re[4]: "
Module signing and post-quantum crypto public key algorithms
2025-06-16 17:27 UTC (14+ messages)
[PATCH v1 net] calipso: Fix null-ptr-deref in calipso_req_{set,del}attr()
2025-06-16 17:25 UTC
[PATCH] landlock: opened file never has a negative dentry
2025-06-16 15:36 UTC (7+ messages)
` [PATCH] apparmor: file never has NULL f_path.mnt
` [PATCH] selinuxfs_fill_super(): don't bother with selinuxfs_info_free() on failures
[PATCH 1/2] fs: Provide function that allocates a secure anonymous inode
2025-06-16 13:00 UTC (5+ messages)
[PATCH v3 bpf-next 0/5] bpf path iterator
2025-06-16 0:24 UTC (26+ messages)
` [PATCH v3 bpf-next 1/5] namei: Introduce new helper function path_walk_parent()
` Ref-less parent walk from Landlock (was: Re: [PATCH v3 bpf-next 1/5] namei: Introduce new helper function path_walk_parent())
` [PATCH v3 bpf-next 2/5] landlock: Use path_walk_parent()
[PATCH] selftests/landlock: Add tests for access through disconnected paths
2025-06-15 16:35 UTC (3+ messages)
[PATCH] landlock/id: Fix WARNING from kunit tests
2025-06-15 16:09 UTC
[PATCH v2 bpf-next 0/4] af_unix: Allow BPF LSM to filter SCM_RIGHTS at sendmsg()
2025-06-14 20:40 UTC (8+ messages)
` [PATCH v2 bpf-next 1/4] af_unix: Don't pass struct socket to security_unix_may_send()
` [PATCH v2 bpf-next 2/4] af_unix: Call security_unix_may_send() in sendmsg() for all socket types
` [PATCH v2 bpf-next 3/4] af_unix: Pass skb to security_unix_may_send()
` [PATCH v2 bpf-next 4/4] selftest: bpf: Add test for BPF LSM on unix_may_send()
[PATCH v4 bpf-next 0/5] bpf path iterator
2025-06-14 18:36 UTC (10+ messages)
` [PATCH v4 bpf-next 1/5] namei: Introduce new helper function path_walk_parent()
` [PATCH v4 bpf-next 2/5] landlock: Use path_walk_parent()
` [PATCH v4 bpf-next 3/5] bpf: Introduce path iterator
` [PATCH v4 bpf-next 4/5] selftests/bpf: Add tests for bpf "
` [PATCH v4 bpf-next 5/5] selftests/bpf: Path walk test
[RFC PATCH 0/29] Rework the LSM initialization
2025-06-13 20:34 UTC (7+ messages)
` [RFC PATCH 25/29] ima,evm: move initcalls to the LSM framework
[PATCH] ipe: use SHA-256 library API instead of crypto_shash API
2025-06-13 0:16 UTC (4+ messages)
[PATCH] apparmor: use SHA-256 library API instead of crypto_shash API
2025-06-12 19:11 UTC (4+ messages)
[PATCHES][CFR][CFT] securityfs cleanups and fixes
2025-06-12 17:43 UTC (12+ messages)
` [PATCH 01/10] securityfs: don't pin dentries twice, once is enough
` [PATCH 02/10] securityfs: pin filesystem only for objects directly in root
` [PATCH 03/10] fix locking in efi_secret_unlink()
` [PATCH 04/10] make securityfs_remove() remove the entire subtree
` [PATCH 05/10] efi_secret: clean securityfs use up
` [PATCH 06/10] ima_fs: don't bother with removal of files in directory we'll be removing
` [PATCH 07/10] ima_fs: get rid of lookup-by-dentry stuff
` [PATCH 08/10] evm_secfs: clear securityfs interactions
` [PATCH 09/10] ipe: don't bother with removal of files in directory we'll be removing
` [PATCH 10/10] tpm: "
[RFC 1/2] landlock: Multithreading support for landlock_restrict_self()
2025-06-12 11:51 UTC (11+ messages)
[PATCH] KEYS: Invert FINAL_PUT bit
2025-06-12 10:32 UTC (11+ messages)
[PATCH] Fix variable type to be 'bool' instead of incorrect 'int'
2025-06-11 0:11 UTC (2+ messages)
[PATCH] Trivial fix comment
2025-06-10 23:59 UTC (2+ messages)
[PATCH RFC 0/1] module: Optionally use .platform keyring for signatures verification
2025-06-09 8:58 UTC (15+ messages)
` [PATCH RFC 1/1] module: Make use of platform keyring for module signature verify
adding CAP_RESERVED_# bits
2025-06-07 2:11 UTC (2+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).