public inbox for linux-security-module@vger.kernel.org
 help / color / mirror / Atom feed
 messages from 2025-05-17 08:40:37 to 2025-05-30 00:06:49 UTC [more...]

[PATCH 3/3] Revert "hardening: Disable GCC randstruct for COMPILE_TEST"
 2025-05-30  0:06 UTC  (2+ messages)

[RFC PATCH 0/9] Introducing the Loadpol LSM
 2025-05-29 23:49 UTC  (20+ messages)
` [RFC PATCH 1/9] LSM: Introduce a new hook: security_kernel_module_load
` [RFC PATCH 2/9] Introduce a new LSM: loadpol
` [RFC PATCH 3/9] Loadpol LSM: filter kernel module request according to the policy
` [RFC PATCH 4/9] Loadpol LSM: add a file in securityfs to read/modify "
` [RFC PATCH 5/9] Loadpol LSM: add a sysctl to lock "
` [RFC PATCH 6/9] Loadpol LSM: emit an audit log
` [RFC PATCH 7/9] module: expose the list of blacklisted modules
` [RFC PATCH 8/9] Loadpol LSM: include the blacklisted kernel modules in the policy
` [RFC PATCH 9/9] Loadpol LSM: add a minimal documentation

[PATCH bpf-next 0/4] bpf path iterator
 2025-05-29 23:10 UTC  (19+ messages)
` [PATCH bpf-next 1/4] namei: Introduce new helper function path_parent()
` [PATCH bpf-next 2/4] landlock: Use path_parent()
` [PATCH bpf-next 3/4] bpf: Introduce path iterator
` [PATCH bpf-next 4/4] selftests/bpf: Add tests for bpf "

[PATCH 0/3] BPF signature verification
 2025-05-29 19:36 UTC  (9+ messages)
` [PATCH 1/3] bpf: Add bpf_check_signature
` [PATCH 2/3] bpf: Support light-skeleton signatures in autogenerated code
` [PATCH 3/3] bpftool: Allow signing of light-skeleton programs

[PATCH] fs/ceph: set superblock s_magic for IMA fsmagic matching: up to 60x speedup
 2025-05-29 18:02 UTC  (2+ messages)

[GIT PULL] IPE update for 6.16
 2025-05-29 16:40 UTC  (2+ messages)

[GIT PULL] selinux/selinux-pr-20250527
 2025-05-28 15:41 UTC  (2+ messages)

[GIT PULL] lsm/lsm-pr-20250527
 2025-05-28 15:41 UTC  (2+ messages)

[GIT PULL] Smack patches for 6.16
 2025-05-28 15:41 UTC  (2+ messages)

[PATCH v1] selftests/landlock: Fix readlink check
 2025-05-28 14:48 UTC  (2+ messages)

[PATCH] KEYS: Invert FINAL_PUT bit
 2025-05-28 12:18 UTC 

[PATCH v1 net] calipso: Don't call calipso functions for AF_INET sk
 2025-05-28  7:10 UTC  (3+ messages)

[PATCH v2] security,fs,nfs,net: update security_inode_listsecurity() interface
 2025-05-27 21:03 UTC  (6+ messages)

[PATCH] landlock/ruleset: Minor comments improvements
 2025-05-27 20:54 UTC 

[PATCH] ima: prevent concurrent list operations in ima_lsm_update_rules
 2025-05-27 19:02 UTC  (2+ messages)

[RFC PATCH v1 0/5] Landlock tracepoints
 2025-05-27 14:53 UTC  (16+ messages)
` [RFC PATCH v1 1/5] landlock: Rename landlock_id to landlock_rule_ref
` [RFC PATCH v1 2/5] landlock: Merge landlock_find_rule() into landlock_unmask_layers()
` [RFC PATCH v1 3/5] tracing: Add __print_untrusted_str()
` [RFC PATCH v1 4/5] landlock: Add landlock_add_rule_fs tracepoint
` [RFC PATCH v1 5/5] landlock: Add landlock_check_rule tracepoint

[RFC 0/2] landlock: Multithreaded policy enforcement
 2025-05-27 14:26 UTC  (10+ messages)
` [RFC 1/2] landlock: Multithreading support for landlock_restrict_self()

landlock: Use hashtable for merged domains
 2025-05-27 11:00 UTC  (14+ messages)
` [RFC PATCH 01/10] landlock: Add some debug output
` [RFC PATCH 02/10] landlock/hash: define (dynamic, non-resizable) hash table helpers
` [RFC PATCH 03/10] landlock/hash: Use linear search for small tables
` [RFC PATCH 04/10] landlock/ruleset: Rename and extract create_rule
` [RFC PATCH 05/10] Add hlist_node member to struct landlock_rule
` [RFC PATCH 06/10] landlock/domain: Define landlock_domain
` [RFC PATCH 07/10] landlock: Add the new domain to landlock_cred_security
` [RFC PATCH 08/10] landlock: Construct the inode hashtable in the new landlock_domain
` [RFC PATCH 09/10] landlock/fs: Use the new hashtable-based domain to find inode rules
` [RFC PATCH 10/10] landlock: Debug print inode hashtable in landlock_merge_ruleset2

[PATCH v2 00/14] stackleak: Support Clang stack depth tracking
 2025-05-27  3:30 UTC  (24+ messages)
` [PATCH v2 01/14] stackleak: Rename STACKLEAK to KSTACK_ERASE
` [PATCH v2 02/14] stackleak: Rename stackleak_track_stack to __sanitizer_cov_stack_depth
` [PATCH v2 03/14] stackleak: Split KSTACK_ERASE_CFLAGS from GCC_PLUGINS_CFLAGS
` [PATCH v2 04/14] x86: Handle KCOV __init vs inline mismatches
` [PATCH v2 05/14] arm: "
` [PATCH v2 06/14] arm64: "
` [PATCH v2 07/14] s390: "
` [PATCH v2 08/14] powerpc: "
` [PATCH v2 09/14] mips: "
` [PATCH v2 10/14] loongarch: "
` [PATCH v2 11/14] init.h: Disable sanitizer coverage for __init and __head
` [PATCH v2 12/14] kstack_erase: Support Clang stack depth tracking
` [PATCH v2 13/14] configs/hardening: Enable CONFIG_KSTACK_ERASE
` [PATCH v2 14/14] configs/hardening: Enable CONFIG_INIT_ON_FREE_DEFAULT_ON

[PATCH 0/3] selftests/landlock: UX improvements
 2025-05-25 14:23 UTC  (6+ messages)
` [PATCH 1/3] selftests/landlock: Clean up tmp directory even when mount fails
` [PATCH 2/3] selftests/landlock: Print a warning about directory permissions
` [PATCH 3/3] selftests/landlock: Clean up TMP_DIR and retry if dir already exists

[PATCH 1/2] apparmor: shift ouid when mediating hard links in userns
 2025-05-24 23:16 UTC  (4+ messages)

[RFC] LSM deprecation / removal policies
 2025-05-23 20:43 UTC  (2+ messages)

[RFC PATCH 0/29] Rework the LSM initialization
 2025-05-23 15:12 UTC  (5+ messages)
` [RFC PATCH 08/29] lsm: get rid of the lsm_names list and do some cleanup
` [RFC PATCH 26/29] selinux: move initcalls to the LSM framework

listxattr() should return ENOTSUP for sysfs / tmpfs entries, not 0
 2025-05-23 11:38 UTC  (2+ messages)
          ` bug#77597: "

[PATCH v8 0/9] coredump: add coredump socket
 2025-05-23  0:59 UTC  (9+ messages)
` [PATCH v8 4/9] "

[PATCH v5 3/7] selinux: implement inode_file_[g|s]etattr hooks
 2025-05-22 22:26 UTC  (2+ messages)

[PATCH v5 2/7] lsm: introduce new hooks for setting/getting inode fsxattr
 2025-05-22 22:26 UTC  (2+ messages)

[PATCH v3 0/4] Introducing Hornet LSM
 2025-05-21 22:26 UTC  (19+ messages)

[syzbot] [integrity?] [lsm?] INFO: task hung in process_measurement (3)
 2025-05-21 17:47 UTC 

[PATCH] security/commoncap: don't assume "setid" if all ids are identical
 2025-05-21 15:36 UTC  (15+ messages)
` [PATCH] exec: Correct the permission check for unsafe exec
            ` [PATCH v2] "

[PATCH v5 0/7] fs: introduce file_getattr and file_setattr syscalls
 2025-05-21 10:44 UTC  (12+ messages)

[PATCH RESEND v17 1/3] lsm, selinux: Add setup_report permission to binder
 2025-05-21  4:13 UTC  (3+ messages)
` [PATCH "

linux-next: Tree for May 16 (security/landlock/ruleset.c)
 2025-05-20 16:47 UTC  (12+ messages)

[PATCH 0/3] randstruct: gcc-plugin: Remove bogus void member
 2025-05-20 16:14 UTC  (3+ messages)

Landlock news #5
 2025-05-19 18:17 UTC  (3+ messages)

[linux-next:master] [super] 1af3331764: stress-ng.unlink.unlink_calls_per_sec 23.3% regression
 2025-05-19  4:50 UTC 

[PATCH] apparmor: make __begin_current_label_crit_section() indicate whether put is needed
 2025-05-18  1:35 UTC  (2+ messages)

[PATCH v2] apparmor: fix some kernel-doc issues in header files
 2025-05-17  8:51 UTC  (2+ messages)

[PATCH][next] apparmor: Fix incorrect profile->signal range check
 2025-05-17  8:44 UTC  (3+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox