linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2024-12-17 06:39:57 to 2024-12-23 14:21:08 UTC [more...]

[PATCH v4 -next 00/15] sysctl: move sysctls from vm_table into its own files
 2024-12-23 14:15 UTC  (28+ messages)
` [PATCH v4 -next 01/15] mm: vmstat: move sysctls to mm/vmstat.c
` [PATCH v4 -next 02/15] mm: filemap: move sysctl to mm/filemap.c
` [PATCH v4 -next 03/15] mm: swap: move sysctl to mm/swap.c
` [PATCH v4 -next 04/15] mm: vmscan: move vmscan sysctls to mm/vmscan.c
` [PATCH v4 -next 05/15] mm: util: move sysctls to mm/util.c
` [PATCH v4 -next 06/15] mm: mmap: move sysctl to mm/mmap.c
` [PATCH v4 -next 07/15] security: min_addr: move sysctl to security/min_addr.c
` [PATCH v4 -next 08/15] mm: nommu: move sysctl to mm/nommu.c
` [PATCH v4 -next 09/15] fs: fs-writeback: move sysctl to fs/fs-writeback.c
` [PATCH v4 -next 10/15] fs: drop_caches: move sysctl to fs/drop_caches.c
` [PATCH v4 -next 11/15] sunrpc: simplify rpcauth_cache_shrink_count()
` [PATCH v4 -next 12/15] fs: dcache: move the sysctl to fs/dcache.c
` [PATCH v4 -next 13/15] x86: vdso: move the sysctl to arch/x86/entry/vdso/vdso32-setup.c
` [PATCH v4 -next 14/15] sh: vdso: move the sysctl to arch/sh/kernel/vsyscall/vsyscall.c
` [PATCH v4 -next 15/15] sysctl: remove unneeded include

[RFC PATCH v3 00/13] Clavis LSM
 2024-12-23 13:21 UTC  (4+ messages)
` [RFC PATCH v3 01/13] certs: Remove CONFIG_INTEGRITY_PLATFORM_KEYRING check

[PATCH linux-next 0/2] Fix perf security check problem
 2024-12-23  7:06 UTC  (3+ messages)
` [PATCH linux-next 1/2] perf: Remove unnecessary parameter of security check
` [PATCH linux-next 2/2] perf: Return EACCESS when need perfmon capability

[syzbot] [lsm?] WARNING in handle_policy_update
 2024-12-23  5:32 UTC  (6+ messages)
` [PATCH v2] lsm: check size of writes

[syzbot] [tomoyo?] general protection fault in tomoyo_init_request_info
 2024-12-22 19:32 UTC 

[PATCH 00/11] reboot: support runtime configuration of emergency hw_protection action
 2024-12-22  9:58 UTC  (16+ messages)
` [PATCH 01/11] reboot: replace __hw_protection_shutdown bool action parameter with an enum
` [PATCH 02/11] reboot: reboot, not shutdown, on hw_protection_reboot timeout
` [PATCH 03/11] docs: thermal: sync hardware protection doc with code
` [PATCH 04/11] reboot: rename now misleading hw_protection symbols
` [PATCH 05/11] reboot: indicate whether it is a HARDWARE PROTECTION reboot or shutdown
` [PATCH 06/11] reboot: add support for configuring emergency hardware protection action
` [PATCH 07/11] regulator: allow user configuration of "
` [PATCH 08/11] platform/chrome: cros_ec_lpc: prepare for hw_protection_shutdown removal
` [PATCH 09/11] dt-bindings: thermal: give OS some leeway in absence of critical-action
` [PATCH 10/11] thermal: core: allow user configuration of hardware protection action
` [PATCH 11/11] reboot: retire hw_protection_reboot and hw_protection_shutdown helpers

[PATCH 0/2] perf: tests: Fix object code reading test for riscv
 2024-12-21  6:49 UTC  (9+ messages)
` [PATCH 1/2] kbuild: Check version of objdump
` [PATCH 2/2] tools: perf: tests: Fix code reading for riscv

[PATCH v2 lsm/dev] net: corrections for security_secid_to_secctx returns
 2024-12-20 22:02 UTC 

[RESEND PATCH] apparmor: Use str_yes_no() helper function
 2024-12-20 20:19 UTC  (2+ messages)

[PATCH v3 00/23] Landlock audit support
 2024-12-20 14:36 UTC  (6+ messages)
` [PATCH v3 08/23] landlock: Log ptrace denials
` [PATCH v3 20/23] samples/landlock: Do not log denials from the sandboxer by default

[PATCH v7 bpf-next 0/7] Enable writing xattr from BPF programs
 2024-12-19 22:14 UTC  (8+ messages)
` [PATCH v7 bpf-next 1/7] fs/xattr: bpf: Introduce security.bpf. xattr name prefix
` [PATCH v7 bpf-next 2/7] selftests/bpf: Extend test fs_kfuncs to cover security.bpf. xattr names
` [PATCH v7 bpf-next 3/7] bpf: lsm: Add two more sleepable hooks
` [PATCH v7 bpf-next 4/7] bpf: Extend btf_kfunc_id_set to handle kfunc polymorphism
` [PATCH v7 bpf-next 5/7] bpf: Use btf_kfunc_id_set.remap logic for bpf_dynptr_from_skb
` [PATCH v7 bpf-next 6/7] bpf: fs/xattr: Add BPF kfuncs to set and remove xattrs
` [PATCH v7 bpf-next 7/7] selftests/bpf: Test kfuncs that set and remove xattr from BPF programs

[PATCH v6 bpf-next 0/7] Enable writing xattr from BPF programs
 2024-12-19 22:14 UTC  (9+ messages)
` [PATCH v6 bpf-next 1/7] fs/xattr: bpf: Introduce security.bpf. xattr name prefix
` [PATCH v6 bpf-next 2/7] selftests/bpf: Extend test fs_kfuncs to cover security.bpf. xattr names
` [PATCH v6 bpf-next 3/7] bpf: lsm: Add two more sleepable hooks
` [PATCH v6 bpf-next 4/7] bpf: Extend btf_kfunc_id_set to handle kfunc polymorphism
` [PATCH v6 bpf-next 5/7] bpf: Use btf_kfunc_id_set.remap logic for bpf_dynptr_from_skb
` [PATCH v6 bpf-next 6/7] bpf: fs/xattr: Add BPF kfuncs to set and remove xattrs
` [PATCH v6 bpf-next 7/7] selftests/bpf: Test kfuncs that set and remove xattr from BPF programs

[PATCH] lsm,io_uring: add LSM hooks for io_uring_setup()
 2024-12-19 21:34 UTC  (3+ messages)

[PATCH 1/2] lsm: add LSM hooks for io_uring_setup()
 2024-12-19 21:16 UTC  (2+ messages)
` [PATCH 2/2] io_uring: use security_uring_allowed()

[syzbot] Monthly tomoyo report (Dec 2024)
 2024-12-19 18:40 UTC 

[PATCH v2] capability: Remove unused has_capability
 2024-12-19 18:28 UTC  (2+ messages)

[RFC 0/2] ima: evm: Add kernel cmdline options to disable IMA/EVM
 2024-12-19 18:18 UTC  (18+ messages)
` [RFC 1/2] ima: Add kernel parameter to disable IMA
` [RFC 2/2] evm: Add kernel parameter to disable EVM

[PATCH] capability: Remove unused has_capability
 2024-12-19 17:29 UTC  (7+ messages)

[PATCH v3 -next 00/15] sysctl: move sysctls from vm_table into its own files
 2024-12-19 11:15 UTC  (5+ messages)

[PATCH v3 -next 11/15] sunrpc: use vfs_pressure_ratio() helper
 2024-12-19 10:20 UTC  (5+ messages)

[PATCH v2 0/2] Add security index Chinese translation and add security lsm Chinese translation
 2024-12-19 10:13 UTC  (5+ messages)
` [PATCH v2 1/2] docs/zh_CN: Add security index "
` [PATCH v2 2/2] docs/zh_CN: Add security lsm "

[PATCH v23 0/8] Script execution control (was O_MAYEXEC)
 2024-12-19  7:44 UTC  (4+ messages)

[PATCH v5 bpf-next 0/5] Enable writing xattr from BPF programs
 2024-12-19  6:59 UTC  (11+ messages)
` [PATCH v5 bpf-next 1/5] fs/xattr: bpf: Introduce security.bpf. xattr name prefix
` [PATCH v5 bpf-next 2/5] selftests/bpf: Extend test fs_kfuncs to cover security.bpf. xattr names
` [PATCH v5 bpf-next 3/5] bpf: lsm: Add two more sleepable hooks
` [PATCH v5 bpf-next 4/5] bpf: fs/xattr: Add BPF kfuncs to set and remove xattrs
` [PATCH v5 bpf-next 5/5] selftests/bpf: Test kfuncs that set and remove xattr from BPF programs

[PATCH 0/2] Add security index Chinese translation and add security lsm Chinese translation
 2024-12-19  6:23 UTC  (6+ messages)
` [PATCH 1/2] docs/zh_CN: Add security index "
` [PATCH 2/2] docs/zh_CN: Add security lsm "
    ` 回复:Re: "

[RFC v2] lsm: fs: Use inode_free_callback to free i_security in RCU callback
 2024-12-19  3:03 UTC  (3+ messages)

[PATCH v2 0/5] Remove get_task_comm() and print task comm directly
 2024-12-19  2:34 UTC  (6+ messages)
` [PATCH v2 1/5] kernel: "
` [PATCH v2 2/5] arch: "
` [PATCH v2 3/5] net: "
` [PATCH v2 4/5] security: "
` [PATCH v2 5/5] drivers: "

[PATCH V2] selftests: lsm: Refactor `flags_overset_lsm_set_self_attr` test
 2024-12-18 23:14 UTC  (2+ messages)
` [PATCH v2] "

[PATCH lsm/dev] net: corrections for security_secid_to_secctx returns
 2024-12-18 22:58 UTC  (2+ messages)
` [PATCH] "

[GIT PULL] selinux/selinux-pr-20241217
 2024-12-18 22:20 UTC  (2+ messages)

[PATCH] lsm: add reserved flag in lsm_prop struct
 2024-12-18 21:24 UTC  (3+ messages)
  `  "

[PATCH v4 bpf-next 0/6] Enable writing xattr from BPF programs
 2024-12-18 11:41 UTC  (8+ messages)
` [PATCH v4 bpf-next 1/6] fs/xattr: bpf: Introduce security.bpf. xattr name prefix
` [PATCH v4 bpf-next 4/6] bpf: fs/xattr: Add BPF kfuncs to set and remove xattrs

[PATCH v4 00/16] perf tools: Use generic syscall scripts for all archs
 2024-12-18  9:24 UTC  (17+ messages)
` [PATCH v4 01/16] perf tools: Create generic syscall table support
` [PATCH v4 02/16] perf tools: arc: Support generic syscall headers
` [PATCH v4 03/16] perf tools: csky: "
` [PATCH v4 04/16] perf tools: arm: Support "
` [PATCH v4 05/16] perf tools: sh: "
` [PATCH v4 06/16] perf tools: sparc: "
` [PATCH v4 07/16] perf tools: xtensa: Support syscall header
` [PATCH v4 08/16] perf tools: x86: Use generic syscall scripts
` [PATCH v4 09/16] perf tools: alpha: Support syscall header
` [PATCH v4 10/16] perf tools: parisc: "
` [PATCH v4 11/16] perf tools: arm64: Use syscall table
` [PATCH v4 12/16] perf tools: loongarch: "
` [PATCH v4 13/16] perf tools: mips: Use generic syscall scripts
` [PATCH v4 14/16] perf tools: powerpc: Use generic syscall table scripts
` [PATCH v4 15/16] perf tools: s390: "
` [PATCH v4 16/16] perf tools: Remove dependency on libaudit

[PATCH] lsm: integrity: Allow enable/disable ima and evm with lsm= cmdline
 2024-12-18  6:43 UTC 

[PATCH v3 00/16] perf tools: Use generic syscall scripts for all archs
 2024-12-18  1:11 UTC  (8+ messages)
` [PATCH v3 14/16] perf tools: powerpc: Use generic syscall table scripts
` [PATCH v3 15/16] perf tools: s390: "
` [PATCH v3 16/16] perf tools: Remove dependency on libaudit

[PATCH 0/6] Audit: Records for multiple security contexts
 2024-12-17 23:08 UTC  (7+ messages)
  ` [PATCH 1/6] Audit: Create audit_stamp structure
  ` [PATCH 2/6] Audit: Allow multiple records in an audit_buffer
  ` [PATCH 3/6] LSM: security_lsmblob_to_secctx module selection
  ` [PATCH 4/6] Audit: Add record for multiple task security contexts
  ` [PATCH 5/6] Audit: multiple subject lsm values for netlabel
  ` [PATCH 6/6] Audit: Add record for multiple object contexts

[RFC] lsm: fs: Use i_callback to free i_security in RCU callback
 2024-12-17 18:19 UTC  (7+ messages)

[PATCH] net: Convert proto_ops::getname to sockaddr_storage
 2024-12-17 14:38 UTC  (2+ messages)

[PATCH] tomoyo: use realpath if symlink's pathname refers to procfs
 2024-12-17 10:33 UTC 


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).