linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2025-09-30 20:11:31 to 2025-10-17 20:29:29 UTC [more...]

[PATCH v5 0/34] Rework the LSM initialization
 2025-10-17 20:24 UTC  (23+ messages)
` [PATCH v5 01/34] lsm: split the notifier code out into lsm_notifier.c
` [PATCH v5 02/34] lsm: split the init code out into lsm_init.c
` [PATCH v5 03/34] lsm: consolidate lsm_allowed() and prepare_lsm() into lsm_prepare()
` [PATCH v5 04/34] lsm: introduce looping macros for the initialization code
` [PATCH v5 05/34] lsm: integrate report_lsm_order() code into caller
` [PATCH v5 06/34] lsm: integrate lsm_early_cred() and lsm_early_task() "
` [PATCH v5 07/34] lsm: rename ordered_lsm_init() to lsm_init_ordered()
` [PATCH v5 08/34] lsm: replace the name field with a pointer to the lsm_id struct
` [PATCH v5 09/34] lsm: rename the lsm order variables for consistency
` [PATCH v5 10/34] lsm: rework lsm_active_cnt and lsm_idlist[]
` [PATCH v5 11/34] lsm: get rid of the lsm_names list and do some cleanup
` [PATCH v5 12/34] lsm: rework the LSM enable/disable setter/getter functions
` [PATCH v5 13/34] lsm: rename exists_ordered_lsm() to lsm_order_exists()
` [PATCH v5 14/34] lsm: rename/rework append_ordered_lsm() into lsm_order_append()
` [PATCH v5 15/34] lsm: rename/rework ordered_lsm_parse() to lsm_order_parse()
` [PATCH v5 16/34] lsm: cleanup the LSM blob size code
` [PATCH v5 17/34] lsm: cleanup initialize_lsm() and rename to lsm_init_single()
` [PATCH v5 18/34] lsm: fold lsm_init_ordered() into security_init()
` [PATCH v5 19/34] lsm: add/tweak function header comment blocks in lsm_init.c
` [PATCH v5 20/34] lsm: cleanup the debug and console output "
` [PATCH v5 21/34] lsm: output available LSMs when debugging
` [PATCH v5 22/34] lsm: group lsm_order_parse() with the other lsm_order_*() functions

[PATCH bpf-next v2 0/3] BPF signature hash chains
 2025-10-17 18:39 UTC  (26+ messages)

[PATCH] ima: Fall back to default kernel module signature verification
 2025-10-17 17:49 UTC  (9+ messages)

[PATCH v2 0/2] Landlock multithreaded enforcement
 2025-10-17 15:05 UTC  (5+ messages)
` [PATCH v2 1/2] landlock: Multithreading support for landlock_restrict_self()
` [PATCH v2 2/2] landlock: selftests for LANDLOCK_RESTRICT_SELF_TSYNC

[PATCH] apparmor: Replace deprecated strcpy in d_namespace_path
 2025-10-16 17:49 UTC 

[PATCH] apparmor: Replace deprecated strcpy with memcpy in gen_symlink_name
 2025-10-16 15:41 UTC 

[PATCH kvm-next V11 0/7] Add NUMA mempolicy support for KVM guest-memfd
 2025-10-16 14:17 UTC  (9+ messages)
` [PATCH kvm-next V11 6/7] KVM: guest_memfd: Enforce NUMA mempolicy using shared policy
      ` [f2fs-dev] "

[PATCH v2] nbd: override creds to kernel when calling sock_{send,recv}msg()
 2025-10-16 11:02 UTC  (5+ messages)

[PATCH v2 0/2] selftests: Centralize kselftest headers to avoid relative includes
 2025-10-16 10:44 UTC  (2+ messages)
` [PATCH v3] selftests: complete kselftest include centralization

[PATCH] KEYS: encrypted: Simplify determining 'format_len'
 2025-10-15 23:21 UTC 

[PATCH v2 0/6] Implement LANDLOCK_ADD_RULE_QUIET
 2025-10-15 19:09 UTC  (12+ messages)
` [PATCH v2 1/6] landlock: Add a place for flags to layer rules
` [PATCH v2 2/6] landlock: Add API support and docs for the quiet flags
` [PATCH v2 3/6] landlock/audit: Check for quiet flag in landlock_log_denial
` [PATCH v2 4/6] landlock/audit: Fix wrong type usage
` [PATCH v2 5/6] samples/landlock: Add quiet flag support to sandboxer
` [PATCH v2 6/6] Implement quiet for optional accesses

[RFC PATCH 01/15] Audit: Create audit_stamp structure
 2025-10-15 15:01 UTC  (4+ messages)
` [PATCH RFC 1/15] "

[PATCH v3] keys: Replace deprecated strncpy in ecryptfs_fill_auth_tok
 2025-10-15 11:06 UTC  (3+ messages)

[PATCH] keys: Remove redundant less-than-zero checks
 2025-10-15 11:02 UTC  (3+ messages)

[RFC PATCH 13/15] LSM: restrict security_cred_getsecid() to a single LSM
 2025-10-14 23:13 UTC  (2+ messages)
` [PATCH RFC "

[RFC PATCH 12/15] LSM: Allow reservation of netlabel
 2025-10-14 23:12 UTC  (2+ messages)
` [PATCH RFC "

[RFC PATCH 11/15] LSM: Infrastructure management of the mnt_opts security blob
 2025-10-14 23:12 UTC  (2+ messages)
` [PATCH RFC "

[RFC PATCH 10/15] LSM: allocate mnt_opts blobs instead of module specific data
 2025-10-14 23:12 UTC  (2+ messages)
` [PATCH RFC "

[RFC PATCH 09/15] LSM: Add mount opts blob size tracking
 2025-10-14 23:12 UTC  (2+ messages)
` [PATCH RFC 9/15] "

[RFC PATCH 07/15] Audit: Call only the first of the audit rule hooks
 2025-10-14 23:12 UTC  (2+ messages)
` [PATCH RFC 7/15] "

[RFC PATCH 06/15] LSM: Exclusive secmark usage
 2025-10-14 23:12 UTC  (2+ messages)
` [PATCH RFC 6/15] "

[RFC PATCH 05/15] LSM: Single calls in secid hooks
 2025-10-14 23:12 UTC  (2+ messages)
` [PATCH RFC 5/15] "

[RFC PATCH 04/15] Audit: Add record for multiple object contexts
 2025-10-14 23:12 UTC  (2+ messages)
` [PATCH RFC 4/15] "

[RFC PATCH 03/15] Audit: Add record for multiple task security contexts
 2025-10-14 23:12 UTC  (2+ messages)
` [PATCH RFC 3/15] "

[RFC PATCH 02/15] LSM: security_lsmblob_to_secctx module selection
 2025-10-14 23:12 UTC  (2+ messages)
` [PATCH RFC 2/15] "

[PATCH 0/2] LSM: Identify module using network facilities
 2025-10-13 22:21 UTC  (12+ messages)
  ` [PATCH 1/2] LSM: Exclusive secmark usage
  ` [PATCH 2/2] LSM: Allow reservation of netlabel

[PATCH v3] memfd,selinux: call security_inode_init_security_anon
 2025-10-13 22:19 UTC  (6+ messages)

[PATCH v2 0/2] LSM: Multiple LSM mount options
 2025-10-13 20:55 UTC  (4+ messages)
` [PATCH v2 2/2] LSM: Infrastructure management of the mnt_opts security blob

[PATCH 6.17 004/563] pid: use ns_capable_noaudit() when determining net sysctl permissions
 2025-10-13 14:37 UTC 

[PATCH v2 0/7] fs/9p: Reuse inode based on path (in addition to qid)
 2025-10-13  9:24 UTC  (5+ messages)

[PATCH v2] keys: Replace deprecated strncpy in ecryptfs_fill_auth_tok
 2025-10-13  7:22 UTC  (4+ messages)

[PATCH] apparmor: Replace sprintf/strcpy with scnprintf/strscpy in aa_policy_init
 2025-10-12 15:07 UTC  (2+ messages)

[PATCH v6 0/5] lsm: introduce lsm_config_self_policy() and lsm_config_system_policy() syscalls
 2025-10-11 12:07 UTC  (13+ messages)
` [PATCH v6 1/5] Wire up lsm_config_self_policy and lsm_config_system_policy syscalls
` [PATCH v6 2/5] lsm: introduce security_lsm_config_*_policy hooks
` [PATCH v6 3/5] AppArmor: add support for lsm_config_self_policy and lsm_config_system_policy
` [PATCH v6 4/5] SELinux: add support for lsm_config_system_policy
` [PATCH v6 5/5] Smack: add support for lsm_config_self_policy and lsm_config_system_policy

[PATCH v4 0/34] Rework the LSM initialization
 2025-10-10 19:21 UTC  (8+ messages)
` [PATCH v4 31/34] ima,evm: move initcalls to the LSM framework

[PATCH] keys: Replace deprecated strncpy in ecryptfs_fill_auth_tok
 2025-10-10 15:12 UTC  (3+ messages)

[PATCH v5 0/3] lsm: introduce lsm_config_self_policy() and lsm_config_system_policy() syscalls
 2025-10-10 14:59 UTC  (8+ messages)
` [PATCH v5 2/3] lsm: introduce security_lsm_config_*_policy hooks

[PATCH] KEYS: encrypted: Use designated initializers for match_table_t structs
 2025-10-10  4:01 UTC  (6+ messages)

[PATCH] ipe: Drop a duplicated CONFIG_ prefix in the ifdeffery
 2025-10-10  3:29 UTC  (2+ messages)

[PATCH] nbd: override creds to kernel when calling sock_{send,recv}msg()
 2025-10-10  1:56 UTC  (4+ messages)

[syzbot] [fs?] BUG: sleeping function called from invalid context in hook_sb_delete
 2025-10-09 20:56 UTC 

The Matrix
 2025-10-09 16:42 UTC 

[PATCH] security: smack: fix indentation in smack_access.c
 2025-10-09 11:20 UTC 

[PATCH] ima: Attach CREDS_CHECK IMA hook to bprm_creds_from_file LSM hook
 2025-10-08 11:35 UTC 

[syzbot] [keyrings?] [lsm?] possible deadlock in keyring_clear (3)
 2025-10-07 17:08 UTC 

[PATCH bpf-next v7 1/5] bpf: Implement signature verification for BPF programs
 2025-10-07 16:42 UTC  (2+ messages)

[PATCH] selinux: implement LSM_ATTR_UNSHARE
 2025-10-03 19:13 UTC 

[PATCH v2] lsm,uapi: introduce LSM_ATTR_UNSHARE
 2025-10-03 19:10 UTC 

[PATCH] include/uapi/linux/lsm.h,Documentation/userspace-api/lsm.rst: introduce LSM_ATTR_UNSHARE
 2025-10-03 17:15 UTC  (2+ messages)

[PATCH v3 00/10] tpm: Decouple Trenchboot dependencies
 2025-10-01 12:52 UTC  (7+ messages)
` [PATCH v3 01/10] tpm: Cap the number of PCR banks

[PATCH v5 0/9] Prepare TPM driver for Trenchboot
 2025-09-30 23:19 UTC  (10+ messages)
` [PATCH v5 1/9] tpm: Cap the number of PCR banks
` [PATCH v5 2/9] tpm: Use -EPERM as fallback error code in tpm_ret_to_err
` [PATCH v5 3/9] KEYS: trusted: Use tpm_ret_to_err() in trusted_tpm2
` [PATCH v5 4/9] tpm2-sessions: Remove 'attributes' from tpm_buf_append_auth
` [PATCH v5 5/9] tpm2-sessions: Unmask tpm_buf_append_hmac_session()
` [PATCH v5 6/9] KEYS: trusted: Open code tpm2_buf_append()
` [PATCH v5 7/9] tpm-buf: check for corruption in tpm_buf_append_handle()
` [PATCH v5 8/9] tpm-buf: Remove chip parameter from tpm_buf_append_handle
` [PATCH v5 9/9] tpm-buf: Enable managed and stack allocations

[PATCH v4 0/9] tpm: Decouple Trenchboot dependencies
 2025-09-30 22:31 UTC  (11+ messages)
` [PATCH v4 1/9] tpm: Cap the number of PCR banks
` [PATCH v4 2/9] tpm: Use -EPERM as fallback error code in tpm_ret_to_err
` [PATCH v4 3/9] KEYS: trusted: Use tpm_ret_to_err() in trusted_tpm2
` [PATCH v4 4/9] tpm2-sessions: Remove 'attributes' from tpm_buf_append_auth
` [PATCH v4 5/9] tpm2-sessions: Unmask tpm_buf_append_hmac_session()
` [PATCH v4 6/9] KEYS: trusted: Open code tpm2_buf_append()
` [PATCH v4 7/9] tpm-buf: check for corruption in tpm_buf_append_handle()
` [PATCH v4 8/9] tpm-buf: Remove chip parameter from tpm_buf_append_handle
` [PATCH v4 9/9] tpm-buf: Enable managed and stack allocations


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).