Linux Security Modules development
 help / color / mirror / Atom feed
 messages from 2026-04-24 13:24:07 to 2026-05-07 02:33:05 UTC [more...]

[RFC PATCH v3 0/4] Fix IMA + TPM initialisation ordering issue
 2026-05-07  2:32 UTC  (32+ messages)
` [RFC PATCH v3 1/4] lsm: Allow LSMs to register for late_initcall_sync init
` [RFC PATCH v3 2/4] security: ima: call ima_init() again at late_initcall_sync for defered TPM
` [RFC PATCH v3 3/4] Revert "tpm: tpm_crb_ffa: try to probe tpm_crb_ffa when it's built-in"
` [RFC PATCH v3 4/4] Revert "firmware: arm_ffa: Change initcall level of ffa_init() to rootfs_initcall"
` [PATCH] ima: debugging late_initcall_sync measurements

[PATCH] Documentation: fix typo and formattting in security/credentials.rst
 2026-05-07  0:36 UTC  (2+ messages)

[PATCH] rust: cred: add safe abstractions for capable() and ns_capable()
 2026-05-06 20:49 UTC 

[PATCH] Documentation: fix typo and formattting in security/credentials.rst
 2026-05-06 17:31 UTC  (2+ messages)

[PATCH v4 0/7] landlock: Add UDP access control support
 2026-05-06 15:33 UTC  (9+ messages)
` [PATCH v4 1/7] landlock: Add UDP bind() access control
` [PATCH v4 2/7] landlock: Add UDP connect() "
` [PATCH v4 3/7] landlock: Add UDP send "
` [PATCH v4 4/7] selftests/landlock: Add UDP bind/connect tests
` [PATCH v4 5/7] selftests/landlock: Add tests for sendmsg()
` [PATCH v4 6/7] samples/landlock: Add sandboxer UDP access control
` [PATCH v4 7/7] landlock: Add documentation for UDP support

[RFC PATCH 0/3] initalise ff-a after finalising pKVM
 2026-05-06  9:58 UTC  (21+ messages)
` [RFC PATCH 1/3] arm64: KVM: defer kvm_init() to finalise_pkvm() when pKVM is enabled
` [RFC PATCH 2/3] firmware: arm_ffa: initialise ff-a after finalising pKVM initialisation
` [RFC PATCH 3/3] security: integrity: call load_uefi_certs() at late_initcall_sync

[PATCH v5 00/13] ima: Introduce staging mechanism
 2026-05-05 18:43 UTC  (16+ messages)
` [PATCH v5 01/13] ima: Remove ima_h_table structure
` [PATCH v5 02/13] ima: Replace static htable queue with dynamically allocated array
` [PATCH v5 03/13] ima: Introduce per binary measurements list type ima_num_entries counter
` [PATCH v5 04/13] ima: Introduce per binary measurements list type binary_runtime_size value
` [PATCH v5 05/13] ima: Introduce _ima_measurements_start() and _ima_measurements_next()
` [PATCH v5 06/13] ima: Mediate open/release method of the measurements list
` [PATCH v5 07/13] ima: Use snprintf() in create_securityfs_measurement_lists
` [PATCH v5 08/13] ima: Introduce ima_dump_measurement()
` [PATCH v5 09/13] ima: Add support for staging measurements with prompt
` [PATCH v5 10/13] ima: Add support for flushing the hash table when staging measurements
` [PATCH v5 11/13] ima: Support staging and deleting N measurements entries
` [PATCH v5 12/13] ima: Return error on deleting measurements already copied during kexec
` [PATCH v5 13/13] doc: security: Add documentation of the IMA staging mechanism

[PATCH 00/14] Bump minimum version of LLVM for building the kernel to 17.0.1
 2026-05-05 15:28 UTC  (7+ messages)
` [PATCH 02/14] security/Kconfig.hardening: Remove tautological condition from CC_HAS_ZERO_CALL_USED_REGS
` [PATCH 03/14] security/Kconfig.hardening: Remove tautological condition from FORTIFY_SOURCE
` [PATCH 04/14] security/Kconfig.hardening: Remove tautological condition from CC_HAS_RANDSTRUCT

[PATCH v2 1/2] bpf: add bpf_init_inode_xattr kfunc for atomic inode labeling
 2026-05-05 13:49 UTC  (10+ messages)

[PATCH] lockdown: remove useless decrement operation
 2026-05-05  9:51 UTC  (3+ messages)

[PATCH v5 00/14] module: Introduce hash-based integrity checking
 2026-05-05  9:05 UTC  (15+ messages)
` [PATCH v5 01/14] kbuild: generate module BTF based on vmlinux.unstripped
` [PATCH v5 02/14] lockdown: Make the relationship to MODULE_SIG a dependency
` [PATCH v5 03/14] kbuild: rename the strip_relocs command
` [PATCH v5 04/14] module: Drop pointless debugging message
` [PATCH v5 05/14] module: Make mod_verify_sig() static
` [PATCH v5 06/14] module: Switch load_info::len to size_t
` [PATCH v5 07/14] module: Make module authentication usable without MODULE_SIG
` [PATCH v5 08/14] module: Move authentication logic into dedicated new file
` [PATCH v5 09/14] module: Move signature type check out of mod_check_sig()
` [PATCH v5 10/14] module: Prepare for additional module authentication mechanisms
` [PATCH v5 11/14] module: update timestamp of modules.order after modules are built
` [PATCH v5 12/14] module: Introduce hash-based integrity checking
` [PATCH v5 13/14] kbuild: move handling of module stripping to Makefile.lib
` [PATCH v5 14/14] kbuild: make CONFIG_MODULE_HASHES compatible with module stripping

[v6 00/10] Reintroduce Hornet LSM
 2026-05-04 23:52 UTC  (12+ messages)
` [v6 01/10] crypto: pkcs7: add flag for validated trust on a signed info block
` [v6 02/10] crypto: pkcs7: add ability to extract signed attributes by OID
` [v6 03/10] crypto: pkcs7: add tests for pkcs7_get_authattr
` [v6 04/10] lsm: framework for BPF integrity verification
` [v6 05/10] lsm: security: Add additional enum values for bpf integrity checks
` [v6 06/10] security: Hornet LSM
` [v6 07/10] hornet: Introduce gen_sig
` [v6 08/10] hornet: Add a light skeleton data extractor scripts
` [v6 09/10] selftests/hornet: Add a selftest for the Hornet LSM
` [v6 10/10] ipe: Add BPF program load policy enforcement via Hornet integration

[PATCH v2 0/4] Firmware LSM hook
 2026-05-04 22:33 UTC  (19+ messages)

[PATCH 1/3] apparmor: Fix return in ns_mkdir_op
 2026-05-04 18:22 UTC  (2+ messages)

[PATCH RESEND] keys: use kmalloc_flex in user_preparse
 2026-05-04  9:31 UTC 

[GIT PULL] selinux/selinux-pr-20260501
 2026-05-01 20:22 UTC  (2+ messages)

[PATCH v2] security,fs,nfs,net: update security_inode_listsecurity() interface
 2026-05-01 16:00 UTC  (4+ messages)
` [PATCH ported/repost "

[PATCH bpf-next 1/2] bpf: add bpf_init_inode_xattr kfunc for atomic inode labeling
 2026-05-01 15:37 UTC  (14+ messages)

[PATCH v3 00/14] Remove redundant rcu_read_lock/unlock() in spin_lock
 2026-04-30 21:30 UTC  (2+ messages)
` (subset) "

[linus:master] [landlock] 874c8f8382: kernel-selftests.landlock.audit_test.audit.thread.fail
 2026-04-30  2:51 UTC 

[RFC PATCH v2 1/4] security: ima: call ima_init() again at late_initcall_sync for defered TPM
 2026-04-30  0:43 UTC  (24+ messages)

[PATCH v2 0/7] lsm: Replace security_sb_mount with granular mount hooks
 2026-04-30  0:03 UTC  (8+ messages)
` [PATCH v2 1/7] lsm: Add granular mount hooks to replace security_sb_mount
` [PATCH v2 2/7] apparmor: Remove redundant MS_MGC_MSK stripping in apparmor_sb_mount
` [PATCH v2 3/7] apparmor: Convert from sb_mount to granular mount hooks
` [PATCH v2 4/7] selinux: "
` [PATCH v2 5/7] landlock: "
` [PATCH v2 6/7] tomoyo: "
` [PATCH v2 7/7] lsm: Remove security_sb_mount and security_move_mount

[PATCH v5 00/10] Reintroduce Hornet LSM
 2026-04-29 18:35 UTC  (7+ messages)
` [PATCH v5 06/10] security: "
` [PATCH v5 10/10] ipe: Add BPF program load policy enforcement via Hornet integration

[linus:master] [proc] 599bbba5a3: kernel-selftests.mm.ksft_mkdirty.sh.mkdirty.fail
 2026-04-29  8:26 UTC 

[PATCH 0/1] yama: clean-up ptrace relations upon activating YAMA_SCOPE_NO_ATTACH
 2026-04-28 19:28 UTC  (2+ messages)
` [PATCH 1/1] "

[PATCH] selinux: don't reserve xattr slot when we won't fill it
 2026-04-27 23:32 UTC  (2+ messages)

[RFC PATCH v1 00/11] Landlock: Namespace and capability control
 2026-04-27 21:46 UTC  (7+ messages)
` [RFC PATCH v1 01/11] security: add LSM blob and hooks for namespaces

[syzbot] [integrity?] [lsm?] WARNING: bad unlock balance in __filemap_add_folio
 2026-04-27 13:36 UTC 

[RFC PATCH 3/3] LSM: Reserve use of secmarks
 2026-04-25 19:03 UTC  (3+ messages)
` [PATCH RFC "

[RFC PATCH 2/3] LSM: Enforce exclusive hooks
 2026-04-25  0:39 UTC  (3+ messages)
` [PATCH RFC "

[PATCH] ima: Fix sigv3 signature handling for EVM_IMA_XATTR_DIGSIG
 2026-04-24 21:24 UTC  (2+ messages)

[RFC PATCH 1/3] LSM: add a flags field to the LSM hook definitions
 2026-04-24 20:29 UTC  (4+ messages)
` [PATCH RFC "

[GIT PULL] AppArmor updates for 7.1
 2026-04-24 18:32 UTC  (2+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox