public inbox for linux-security-module@vger.kernel.org
 help / color / mirror / Atom feed
 messages from 2025-05-21 16:26:15 to 2025-06-03 06:59:37 UTC [more...]

[PATCH v2 bpf-next 0/4] bpf path iterator
 2025-06-03  6:59 UTC  (2+ messages)
` [PATCH v2 bpf-next 1/4] namei: Introduce new helper function path_walk_parent()

[PATCH bpf-next 0/4] bpf path iterator
 2025-06-03  0:10 UTC  (40+ messages)
` [PATCH bpf-next 1/4] namei: Introduce new helper function path_parent()
` [PATCH bpf-next 2/4] landlock: Use path_parent()
` [PATCH bpf-next 3/4] bpf: Introduce path iterator
` [PATCH bpf-next 4/4] selftests/bpf: Add tests for bpf "

[PATCH 0/3] BPF signature verification
 2025-06-02 22:40 UTC  (24+ messages)
` [PATCH 1/3] bpf: Add bpf_check_signature
` [PATCH 2/3] bpf: Support light-skeleton signatures in autogenerated code
` [PATCH 3/3] bpftool: Allow signing of light-skeleton programs

landlock: Use hashtable for merged domains
 2025-06-02 19:50 UTC  (18+ messages)
` [RFC PATCH 01/10] landlock: Add some debug output
` [RFC PATCH 02/10] landlock/hash: define (dynamic, non-resizable) hash table helpers
` [RFC PATCH 03/10] landlock/hash: Use linear search for small tables
` [RFC PATCH 04/10] landlock/ruleset: Rename and extract create_rule
` [RFC PATCH 05/10] Add hlist_node member to struct landlock_rule
` [RFC PATCH 06/10] landlock/domain: Define landlock_domain
` [RFC PATCH 07/10] landlock: Add the new domain to landlock_cred_security
` [RFC PATCH 08/10] landlock: Construct the inode hashtable in the new landlock_domain
` [RFC PATCH 09/10] landlock/fs: Use the new hashtable-based domain to find inode rules
` [RFC PATCH 10/10] landlock: Debug print inode hashtable in landlock_merge_ruleset2

[PATCH RFC 0/1] module: Optionally use .platform keyring for signatures verification
 2025-06-02 18:34 UTC  (3+ messages)
` [PATCH RFC 1/1] module: Make use of platform keyring for module signature verify

[PATCH] landlock/ruleset: Minor comments improvements
 2025-06-02 13:41 UTC  (2+ messages)
` [PATCH] Another one

[RFC 0/2] landlock: Multithreaded policy enforcement
 2025-06-02  6:45 UTC  (15+ messages)
` [RFC 1/2] landlock: Multithreading support for landlock_restrict_self()

[PATCH 1/3] security: add Lilium - Linux Integrity Lock-In User Module
 2025-06-01 18:18 UTC  (3+ messages)

[PATCH] fs/ceph: set superblock s_magic for IMA fsmagic matching: up to 60x speedup
 2025-06-01 16:03 UTC  (3+ messages)

PATCH 2/3] security: add Lilium - Linux Integrity Lock-In User Module - Documentation
 2025-06-01  3:30 UTC  (2+ messages)

[PATCH 3/3] security: add Lilium - Linux Integrity Lock-In User Module - MAINTAINER
 2025-06-01  1:09 UTC 

[PATCH 1/3] security: add Lilium - Linux Integrity Lock-In User Module
 2025-05-31 22:37 UTC  (2+ messages)

[PATCH 0/3] security: add Lilium - Linux Integrity Lock-In User Module
 2025-05-31 17:56 UTC 

listxattr() should return ENOTSUP for sysfs / tmpfs entries, not 0
 2025-05-31 15:25 UTC  (3+ messages)
          ` bug#77597: "

[PATCH 0/2] apparmor unaligned memory fixes
 2025-05-31 15:08 UTC  (3+ messages)
` [PATCH 1/2] apparmor: Fix 8-byte alignment for initial dfa blob streams
` [PATCH 2/2] apparmor: Fix unaligned memory accesses in KUnit test

[PATCH 3/3] Revert "hardening: Disable GCC randstruct for COMPILE_TEST"
 2025-05-30 22:31 UTC  (6+ messages)

[RFC PATCH 0/29] Rework the LSM initialization
 2025-05-30 22:03 UTC  (7+ messages)
` [RFC PATCH 08/29] lsm: get rid of the lsm_names list and do some cleanup
` [RFC PATCH 25/29] ima,evm: move initcalls to the LSM framework
` [RFC PATCH 26/29] selinux: "

[RFC PATCH 0/9] Introducing the Loadpol LSM
 2025-05-30 14:59 UTC  (15+ messages)
` [RFC PATCH 1/9] LSM: Introduce a new hook: security_kernel_module_load
` [RFC PATCH 3/9] Loadpol LSM: filter kernel module request according to the policy
` [RFC PATCH 9/9] Loadpol LSM: add a minimal documentation

[GIT PULL] IPE update for 6.16
 2025-05-29 16:40 UTC  (2+ messages)

[GIT PULL] selinux/selinux-pr-20250527
 2025-05-28 15:41 UTC  (2+ messages)

[GIT PULL] lsm/lsm-pr-20250527
 2025-05-28 15:41 UTC  (2+ messages)

[GIT PULL] Smack patches for 6.16
 2025-05-28 15:41 UTC  (2+ messages)

[PATCH v1] selftests/landlock: Fix readlink check
 2025-05-28 14:48 UTC  (2+ messages)

[PATCH] KEYS: Invert FINAL_PUT bit
 2025-05-28 12:18 UTC 

[PATCH v1 net] calipso: Don't call calipso functions for AF_INET sk
 2025-05-28  7:10 UTC  (3+ messages)

[PATCH v2] security,fs,nfs,net: update security_inode_listsecurity() interface
 2025-05-27 21:03 UTC  (4+ messages)

[PATCH] ima: prevent concurrent list operations in ima_lsm_update_rules
 2025-05-27 19:02 UTC  (2+ messages)

[RFC PATCH v1 0/5] Landlock tracepoints
 2025-05-27 14:53 UTC  (16+ messages)
` [RFC PATCH v1 1/5] landlock: Rename landlock_id to landlock_rule_ref
` [RFC PATCH v1 2/5] landlock: Merge landlock_find_rule() into landlock_unmask_layers()
` [RFC PATCH v1 3/5] tracing: Add __print_untrusted_str()
` [RFC PATCH v1 4/5] landlock: Add landlock_add_rule_fs tracepoint
` [RFC PATCH v1 5/5] landlock: Add landlock_check_rule tracepoint

[PATCH v2 00/14] stackleak: Support Clang stack depth tracking
 2025-05-27  3:30 UTC  (24+ messages)
` [PATCH v2 01/14] stackleak: Rename STACKLEAK to KSTACK_ERASE
` [PATCH v2 02/14] stackleak: Rename stackleak_track_stack to __sanitizer_cov_stack_depth
` [PATCH v2 03/14] stackleak: Split KSTACK_ERASE_CFLAGS from GCC_PLUGINS_CFLAGS
` [PATCH v2 04/14] x86: Handle KCOV __init vs inline mismatches
` [PATCH v2 05/14] arm: "
` [PATCH v2 06/14] arm64: "
` [PATCH v2 07/14] s390: "
` [PATCH v2 08/14] powerpc: "
` [PATCH v2 09/14] mips: "
` [PATCH v2 10/14] loongarch: "
` [PATCH v2 11/14] init.h: Disable sanitizer coverage for __init and __head
` [PATCH v2 12/14] kstack_erase: Support Clang stack depth tracking
` [PATCH v2 13/14] configs/hardening: Enable CONFIG_KSTACK_ERASE
` [PATCH v2 14/14] configs/hardening: Enable CONFIG_INIT_ON_FREE_DEFAULT_ON

[PATCH 0/3] selftests/landlock: UX improvements
 2025-05-25 14:23 UTC  (6+ messages)
` [PATCH 1/3] selftests/landlock: Clean up tmp directory even when mount fails
` [PATCH 2/3] selftests/landlock: Print a warning about directory permissions
` [PATCH 3/3] selftests/landlock: Clean up TMP_DIR and retry if dir already exists

[PATCH 1/2] apparmor: shift ouid when mediating hard links in userns
 2025-05-24 23:16 UTC  (4+ messages)

[RFC] LSM deprecation / removal policies
 2025-05-23 20:43 UTC  (2+ messages)

[PATCH v8 0/9] coredump: add coredump socket
 2025-05-23  0:59 UTC  (4+ messages)
` [PATCH v8 4/9] "

[PATCH v5 3/7] selinux: implement inode_file_[g|s]etattr hooks
 2025-05-22 22:26 UTC  (2+ messages)

[PATCH v5 2/7] lsm: introduce new hooks for setting/getting inode fsxattr
 2025-05-22 22:26 UTC  (2+ messages)

[PATCH v3 0/4] Introducing Hornet LSM
 2025-05-21 22:26 UTC  (17+ messages)

[syzbot] [integrity?] [lsm?] INFO: task hung in process_measurement (3)
 2025-05-21 17:47 UTC 


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox