public inbox for linux-security-module@vger.kernel.org
 help / color / mirror / Atom feed
 messages from 2026-03-10 11:55:44 to 2026-03-14 21:16:18 UTC [more...]

[PATCH v5 0/9] landlock: UNIX connect() control by pathname and scope
 2026-03-14 21:16 UTC  (10+ messages)
` [PATCH v5 2/9] landlock: Control pathname UNIX domain socket resolution by path
` [PATCH v5 8/9] landlock: Document FS access right for pathname UNIX sockets

[PATCH v1] selftests/landlock: Test tsync interruption and cancellation paths
 2026-03-14 21:10 UTC  (2+ messages)

[PATCH v2 0/2] vfs: follow-on fixes for i_ino widening
 2026-03-14 12:59 UTC  (6+ messages)
` [PATCH v2 1/2] nilfs2: fix 64-bit division operations in nilfs_bmap_find_target_in_group()
` [PATCH v2 2/2] EVM: add comment describing why ino field is still unsigned long

[PATCH 00/61] treewide: Use IS_ERR_OR_NULL over manual NULL check - refactor
 2026-03-13 19:22 UTC  (99+ messages)
` [PATCH 02/61] btrfs: Prefer IS_ERR_OR_NULL over manual NULL check
` [PATCH 03/61] ceph: "
  ` [Intel-wired-lan] "
` [PATCH 06/61] 9p: "
  ` [Intel-wired-lan] "
` [PATCH 08/61] fuse: "
  ` [Intel-wired-lan] "
` [PATCH 12/61] quota: "
  ` [Intel-wired-lan] "
` [PATCH 13/61] squashfs: "
  ` [Intel-wired-lan] "
` [PATCH 15/61] trace: "
` [PATCH 16/61] sched: "
  ` [Intel-wired-lan] "
` [PATCH 17/61] module: "
  ` [Intel-wired-lan] "
` [PATCH 18/61] sound: "
` [PATCH 19/61] kvm: "
` [PATCH 20/61] apparmor: "
` [PATCH 22/61] md: "
  ` [Intel-wired-lan] "
` [PATCH 24/61] net/9p: "
  ` [Intel-wired-lan] "
` [PATCH 25/61] net/bluetooth: "
  ` [Intel-wired-lan] "
` [PATCH 28/61] net/sched: "
  ` [Intel-wired-lan] "
` [PATCH 30/61] net/sunrpc: "
  ` [Intel-wired-lan] "
` [PATCH 32/61] net/wireless: "
` [PATCH 33/61] mm: "
` [PATCH 34/61] arch/arm: "
` [PATCH 36/61] arch/sh: "
` [PATCH 37/61] drm: "
` [PATCH 38/61] net: "
  ` [EXTERNAL] "
  ` [Intel-wired-lan] "
` [PATCH 39/61] irqchip: "
  ` [Intel-wired-lan] "
` [PATCH 40/61] phy: "
` [PATCH 41/61] pinctrl: "
` [PATCH 42/61] pmdomain: "
` [PATCH 44/61] target: "
` [PATCH 45/61] thermal: "
` [PATCH 46/61] vfio: "
  ` [Intel-wired-lan] "
` [PATCH 47/61] nfc: "
` [PATCH 48/61] mtd: "
` [PATCH 49/61] media: "
  ` [Intel-wired-lan] "
` [PATCH 50/61] iommu: "
  ` [Intel-wired-lan] "
` [PATCH 51/61] leds: "
  ` (subset) "
` [PATCH 52/61] gpib: "
` [PATCH 53/61] hyperv: "
` [PATCH 54/61] aoe: "
  ` [Intel-wired-lan] "
` [PATCH 55/61] interconnect: "
` [PATCH 56/61] clk: "
` [PATCH 57/61] reset: "
` [PATCH 58/61] arch/x86: "
` [PATCH 59/61] debugobjects: Drop likely() around !IS_ERR_OR_NULL()
` [PATCH 60/61] Input alps: Drop unlikely() around IS_ERR_OR_NULL()
` [PATCH 61/61] file: "

[PATCH v2 0/2] vfs: follow-on fixes for i_ino widening
 2026-03-13 18:44 UTC 

[PATCH] integrity: Eliminate weak definition of arch_get_secureboot()
 2026-03-13 15:35 UTC  (5+ messages)

[RFC PATCH v1 00/11] Landlock: Namespace and capability control
 2026-03-12 14:48 UTC  (13+ messages)
` [RFC PATCH v1 01/11] security: add LSM blob and hooks for namespaces
` [RFC PATCH v1 02/11] security: Add LSM_AUDIT_DATA_NS for namespace audit records
` [RFC PATCH v1 03/11] nsproxy: Add FOR_EACH_NS_TYPE() X-macro and CLONE_NS_ALL
` [RFC PATCH v1 04/11] landlock: Wrap per-layer access masks in struct layer_rights
` [RFC PATCH v1 05/11] landlock: Enforce namespace entry restrictions
` [RFC PATCH v1 06/11] landlock: Enforce capability restrictions
` [RFC PATCH v1 07/11] selftests/landlock: Drain stale audit records on init
` [RFC PATCH v1 08/11] selftests/landlock: Add namespace restriction tests
` [RFC PATCH v1 09/11] selftests/landlock: Add capability "
` [RFC PATCH v1 10/11] samples/landlock: Add capability and namespace restriction support
` [RFC PATCH v1 11/11] landlock: Add documentation for capability and namespace restrictions

[PATCH v5 1/9] lsm: Add LSM hook security_unix_find
 2026-03-12 11:57 UTC  (7+ messages)
` [PATCH v6] "

[PATCH RFC] security: add LSM blob and hooks for namespaces
 2026-03-12 10:10 UTC  (5+ messages)

[PATCH] integrity: Fix spelling mistake TRUSTED_KEYRING
 2026-03-12  9:35 UTC 

[PATCH v2 1/5] rust: bindings: include lsm_hooks.h to expose LSM types to bindgen
 2026-03-11 23:13 UTC  (9+ messages)
` [PATCH v2 2/5] rust: helpers: add C shims for LSM hook initialisation
` [PATCH v2 3/5] rust: kernel: add LSM abstraction layer
` [PATCH v2 4/5] security: add Rust LSM sample (CONFIG_SECURITY_RUST_LSM)
` [PATCH v2 5/5] Documentation: rust: add LSM abstraction guide; update MAINTAINERS

[PATCH v2 0/5] rust: lsm: introduce safe Rust abstractions for the LSM framework
 2026-03-11 23:08 UTC  (4+ messages)

[PATCH RFC bpf-next 0/4] audit: Expose audit subsystem to BPF LSM programs via BPF kfuncs
 2026-03-11 22:08 UTC  (6+ messages)
` [PATCH RFC bpf-next 1/4] audit: Implement bpf_audit_log_*() wrappers
` [PATCH RFC bpf-next 2/4] audit/security: Enable audit BPF kfuncs
` [PATCH RFC bpf-next 3/4] selftests/bpf: Add audit helpers for BPF tests
` [PATCH RFC bpf-next 4/4] selftests/bpf: Add lsm_audit_kfuncs tests

[PATCH v4 00/17] module: Introduce hash-based integrity checking
 2026-03-11 21:14 UTC  (22+ messages)
` [PATCH v4 02/17] powerpc/ima: Drop unnecessary check for CONFIG_MODULE_SIG
` [PATCH v4 03/17] ima: efi: Drop unnecessary check for CONFIG_MODULE_SIG/CONFIG_KEXEC_SIG
` [PATCH v4 04/17] module: Make mod_verify_sig() static
` [PATCH v4 06/17] kbuild: add stamp file for vmlinux BTF data
` [PATCH v4 09/17] module: Make module loading policy usable without MODULE_SIG
` [PATCH v4 10/17] module: Move integrity checks into dedicated function
` [PATCH v4 15/17] module: Introduce hash-based integrity checking

[PATCH v2 07/10] security: Hornet LSM
 2026-03-11 20:50 UTC  (2+ messages)
` [PATCH v2 7/10] "

[PATCH 0/3] Firmware LSM hook
 2026-03-11 19:16 UTC  (13+ messages)

[PATCH v3 1/3] ima: Remove ima_h_table structure
 2026-03-11 17:19 UTC  (3+ messages)
` [PATCH v3 2/3] ima: Replace static htable queue with dynamically allocated array
` [PATCH v3 3/3] ima: Add support for staging measurements for deletion

LSM namespacing API
 2026-03-11 16:37 UTC  (8+ messages)

[PATCH 01/61] Coccinelle: Prefer IS_ERR_OR_NULL over manual NULL check
 2026-03-11 15:12 UTC  (3+ messages)

Subject: x86/msr + lockdown: allow access to **documented** RAPL/TCC controls under Secure Boot
 2026-03-11 12:18 UTC  (3+ messages)

[PATCH v2 0/2] kthread, exit: clean up kernel thread exit paths
 2026-03-11 10:47 UTC  (7+ messages)
` [PATCH v2 1/2] kthread: remove kthread_exit()
` [PATCH v2 2/2] tree-wide: rename do_exit() to task_exit()

[PATCH v6] ima_fs: Correctly create securityfs files for unsupported hash algos
 2026-03-11  9:25 UTC  (2+ messages)

[PATCH v3 net-next 06/15] smack: Remove IPPROTO_UDPLITE support in security_sock_rcv_skb()
 2026-03-11  5:19 UTC 

[PATCH 1/5] rust: bindings: include lsm_hooks.h to expose LSM types to bindgen
 2026-03-11  4:56 UTC  (5+ messages)
` [PATCH 2/5] rust: helpers: add C shims for LSM hook initialisation
` [PATCH 3/5] rust: kernel: add LSM abstraction layer
` [PATCH 4/5] security: add Rust LSM sample (CONFIG_SECURITY_RUST_LSM)
` [PATCH 5/5] Documentation: rust: add LSM abstraction guide; update MAINTAINERS

[PATCH 0/5] rust: lsm: introduce safe Rust abstractions for the LSM framework
 2026-03-11  4:56 UTC 

[PATCH v2] landlock: Fix kernel-doc warning for pointer-to-array parameters
 2026-03-10 21:13 UTC  (2+ messages)

[PATCH 0/2] vfs: follow-on fixes for i_ino widening
 2026-03-10 17:28 UTC  (7+ messages)
` [PATCH 1/2] nilfs2: fix 64-bit division operations in nilfs_bmap_find_target_in_group()
` [PATCH 2/2] EVM: add comment describing why ino field is still unsigned long

[PATCH v1 1/4] landlock: Fix kernel-doc warning for pointer-to-array parameters
 2026-03-10 17:13 UTC  (3+ messages)

[v2,net-next,07/15] udp: Remove partial csum code in RX
 2026-03-10 16:17 UTC  (2+ messages)

[PATCH v1] landlock/tsync: fix null-ptr-deref in cancel_tsync_works()
 2026-03-10 13:00 UTC  (3+ messages)

[syzbot] [fuse?] general protection fault in task_work_cancel
 2026-03-10 12:59 UTC  (4+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox