messages from 2025-07-24 05:50:31 to 2025-08-12 18:37:26 UTC [more...]
[PATCH v5 00/23] x86: text_poke() fixes and executable lockdowns
2025-08-12 18:37 UTC (5+ messages)
` [PATCH v5 18/23] bpf: Use vmalloc special flag
[PATCH v2 00/13] Signed BPF programs
2025-08-11 22:48 UTC (24+ messages)
` [PATCH v2 02/13] bpf: Implement exclusive map creation
` [PATCH v2 04/13] libbpf: Support "
` [PATCH v2 08/13] bpf: Implement signature verification for BPF programs
` [PATCH v2 11/13] bpftool: Add support for signing "
` [PATCH v2 12/13] selftests/bpf: Enable signature verification for all lskel tests
` [PATCH v2 13/13] selftests/bpf: Add test for signed programs
[PATCH v5 4/5] Audit: Fix indentation in audit_log_exit
2025-08-11 22:21 UTC (4+ messages)
[PATCH v2] lsm,selinux: Add LSM blob support for BPF objects
2025-08-11 22:16 UTC (4+ messages)
[PATCH] lsm: use lsm_blob_alloc() in lsm_bdev_alloc()
2025-08-11 22:16 UTC (5+ messages)
[PATCH RFC V10 0/7] Add NUMA mempolicy support for KVM guest-memfd
2025-08-11 21:23 UTC (12+ messages)
` [PATCH RFC V10 1/7] mm/filemap: Add NUMA mempolicy support to filemap_alloc_folio()
` [PATCH RFC V10 2/7] mm/filemap: Extend __filemap_get_folio() to support NUMA memory policies
` [PATCH RFC V10 3/7] mm/mempolicy: Export memory policy symbols
` [PATCH RFC V10 4/7] KVM: guest_memfd: Use guest mem inodes instead of anonymous inodes
` [PATCH RFC V10 5/7] KVM: guest_memfd: Add slab-allocated inode cache
` [PATCH RFC V10 6/7] KVM: guest_memfd: Enforce NUMA mempolicy using shared policy
` [PATCH RFC V10 7/7] KVM: guest_memfd: selftests: Add tests for mmap and NUMA policy support
[RFC PATCH 2/2] memfd: call security_inode_init_security_anon
2025-08-11 13:08 UTC (5+ messages)
[PATCH V9 0/7] Add NUMA mempolicy support for KVM guest-memfd
2025-08-11 8:02 UTC (6+ messages)
` [PATCH V9 1/7] KVM: guest_memfd: Use guest mem inodes instead of anonymous inodes
[PATCH v3 00/13] stackleak: Support Clang stack depth tracking
2025-08-10 21:12 UTC (2+ messages)
[PATCH] x86/bpf: use bpf_capable() instead of capable(CAP_SYS_ADMIN)
2025-08-09 1:06 UTC (5+ messages)
[RFC PATCH 1/2] lsm: add type to security_inode_init_security_anon
2025-08-08 12:00 UTC (2+ messages)
[RFC PATCH 0/6] fs/9p: Reuse inode based on path (in addition to qid)
2025-08-08 10:52 UTC (7+ messages)
` [RFC PATCH 1/6] fs/9p: Add ability to identify inode by path for .L
[PATCH 2/3] LSM: allocate mnt_opts blobs instead of module specific data
2025-08-07 0:40 UTC (4+ messages)
[PATCH 1/3] LSM: Add mount opts blob size tracking
2025-08-06 22:06 UTC (2+ messages)
[PATCH v5 3/5] Audit: Add record for multiple task security contexts
2025-08-06 16:03 UTC (3+ messages)
[PATCH v2 0/3] Allow individual features to be locked down
2025-08-05 23:43 UTC (21+ messages)
` [PATCH v2 1/3] lockdown: Switch implementation to using bitmap
` [PATCH v2 2/3] lockdown/kunit: Introduce kunit tests
` [PATCH v2 3/3] lockdown: Use snprintf in lockdown_read
[GIT PULL] AppArmor updates for 6.17-rc1
2025-08-04 16:05 UTC (2+ messages)
[PATCH AUTOSEL 5.4 9/9] securityfs: don't pin dentries twice, once is enough
2025-08-03 21:23 UTC
[PATCH AUTOSEL 5.10 11/11] securityfs: don't pin dentries twice, once is enough
2025-08-03 21:22 UTC
[PATCH AUTOSEL 5.15 15/15] securityfs: don't pin dentries twice, once is enough
2025-08-03 21:22 UTC
[PATCH AUTOSEL 6.1 16/16] securityfs: don't pin dentries twice, once is enough
2025-08-03 21:21 UTC
[PATCH AUTOSEL 6.6 22/23] securityfs: don't pin dentries twice, once is enough
2025-08-03 21:20 UTC
[PATCH] lsm: simplify security_inode_copy_up_xattr()
2025-07-31 21:17 UTC (8+ messages)
[GIT PULL] capabilities update for v6.17-rc1
2025-07-31 19:07 UTC (2+ messages)
[GIT PULL] IPE update for 6.17
2025-07-31 17:55 UTC (2+ messages)
[PATCH] lsm: yama: Check for PTRACE_MODE_READ_FSCREDS access
2025-07-31 7:17 UTC (2+ messages)
-Wformat-invalid-specifier after 88fec3526e84 in -next
2025-07-30 10:20 UTC (2+ messages)
[syzbot] [apparmor?] linux-next test error: WARNING in apparmor_unix_stream_connect
2025-07-30 10:17 UTC (3+ messages)
[PATCH -next] apparmor: Remove the unused variable rules
2025-07-30 9:55 UTC (2+ messages)
[PATCH v4 0/4] stackleak: Support Clang stack depth tracking
2025-07-29 9:34 UTC (11+ messages)
` [PATCH v4 1/4] arm64: Handle KCOV __init vs inline mismatches
` [PATCH v4 2/4] x86: "
` [PATCH v4 4/4] kstack_erase: Support Clang stack depth tracking
[GIT PULL] selinux/selinux-pr-20250725
2025-07-29 2:24 UTC (2+ messages)
[GIT PULL] lsm/lsm-pr-20250725
2025-07-29 2:24 UTC (2+ messages)
[GIT PULL] Landlock update for v6.17-rc1
2025-07-29 2:24 UTC (2+ messages)
[RFC PATCH v2 0/34] Rework the LSM initialization
2025-07-28 23:56 UTC (69+ messages)
` [RFC PATCH v2 01/34] lsm: split the notifier code out into lsm_notifier.c
` [RFC PATCH v2 02/34] lsm: split the init code out into lsm_init.c
` [RFC PATCH v2 03/34] lsm: consolidate lsm_allowed() and prepare_lsm() into lsm_prepare()
` [RFC PATCH v2 04/34] lsm: introduce looping macros for the initialization code
` [RFC PATCH v2 05/34] lsm: integrate report_lsm_order() code into caller
` [RFC PATCH v2 06/34] lsm: integrate lsm_early_cred() and lsm_early_task() "
` [RFC PATCH v2 07/34] lsm: rename ordered_lsm_init() to lsm_init_ordered()
` [RFC PATCH v2 08/34] lsm: replace the name field with a pointer to the lsm_id struct
` [RFC PATCH v2 09/34] lsm: rename the lsm order variables for consistency
` [RFC PATCH v2 10/34] lsm: rework lsm_active_cnt and lsm_idlist[]
` [RFC PATCH v2 11/34] lsm: get rid of the lsm_names list and do some cleanup
` [RFC PATCH v2 12/34] lsm: rework the LSM enable/disable setter/getter functions
` [RFC PATCH v2 13/34] lsm: rename exists_ordered_lsm() to lsm_order_exists()
` [RFC PATCH v2 14/34] lsm: rename/rework append_ordered_lsm() into lsm_order_append()
` [RFC PATCH v2 15/34] lsm: rename/rework ordered_lsm_parse() to lsm_order_parse()
` [RFC PATCH v2 16/34] lsm: cleanup the LSM blob size code
` [RFC PATCH v2 17/34] lsm: cleanup initialize_lsm() and rename to lsm_init_single()
` [RFC PATCH v2 18/34] lsm: fold lsm_init_ordered() into security_init()
` [RFC PATCH v2 19/34] lsm: add/tweak function header comment blocks in lsm_init.c
` [RFC PATCH v2 20/34] lsm: cleanup the debug and console output "
` [RFC PATCH v2 21/34] lsm: output available LSMs when debugging
` [RFC PATCH v2 22/34] lsm: group lsm_order_parse() with the other lsm_order_*() functions
` [RFC PATCH v2 23/34] lsm: introduce an initcall mechanism into the LSM framework
` [RFC PATCH v2 26/34] smack: move initcalls to "
` [RFC PATCH v2 30/34] lockdown: "
` [RFC PATCH v2 31/34] ima,evm: "
` [RFC PATCH v2 33/34] lsm: consolidate all of the LSM framework initcalls
` [RFC PATCH v2 34/34] lsm: add a LSM_STARTED_ALL notification event
[PATCH v3 0/4] Landlock: Disconnected directory handling
2025-07-28 0:13 UTC (9+ messages)
` [PATCH v3 2/4] landlock: Fix handling of disconnected directories
[PATCH 00/19] smack: clean up xattr handling
2025-07-27 14:32 UTC (22+ messages)
` [PATCH 01/19] smack: fix bug: changing Smack xattrs requires cap_sys_admin
` [PATCH 02/19] smack: fix bug: changing Smack xattrs requires cap_mac_override
` [PATCH 03/19] smack: fix bug: setting label-containing xattrs silently ignores input garbage
` [PATCH 04/19] smack: stop polling other LSMs & VFS to getxattr() unsupported SMACK64IPIN/OUT
` [PATCH 05/19] smack: restrict getxattr() SMACK64TRANSMUTE to directories
` [PATCH 06/19] smack: fix bug: getxattr() returns invalid SMACK64EXEC/MMAP
` [PATCH 07/19] smack: deduplicate task label validation
` [PATCH 08/19] smack: smack_inode_setsecurity: prevent setting SMACK64EXEC/MMAP in other LSMs
` [PATCH 09/19] smack: smack_inode_setsecurity: prevent setting SMACK64IPIN/OUT "
` [PATCH 10/19] smack: fix bug: smack_inode_setsecurity() imports alien xattrs as labels
` [PATCH 11/19] smack: fix bug: smack_inode_setsecurity() false EINVAL for alien xattrs
` [PATCH 12/19] smack: restrict setxattr() SMACK64IPIN/IPOUT to sockets
` [PATCH 13/19] smack: restrict setxattr() SMACK64EXEC/MMAP to regular files
` [PATCH 14/19] smack: return EOPNOTSUPP for setxattr() unsupported SMACK64(TRANSMUTE)
` [PATCH 15/19] smack: smack_inode_setsecurity(): skip checks for SMACK64TRANSMUTE
` [PATCH 16/19] smack: smack_inode_notifysecctx(): reject invalid labels
` [PATCH 17/19] smack: smack_inode_post_setxattr(): find label instead of import
` [PATCH 18/19] smack: smack_inode_setsecurity(): "
` [PATCH 19/19] smack: deduplicate strcmp(name, XATTR_{,NAME_}SMACK*)
` Re[2]: [PATCH 00/19] smack: clean up xattr handling
[PATCH v5 bpf-next 0/5] bpf path iterator
2025-07-26 9:52 UTC (6+ messages)
[PATCH 0/2] Secure Boot lock down
2025-07-25 2:43 UTC (7+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).