Linux Security Modules development
 help / color / mirror / Atom feed
 messages from 2026-05-21 13:33:29 to 2026-05-22 21:21:08 UTC [more...]

[PATCH v2 0/2] gen_loader fixes
 2026-05-22 21:21 UTC  (6+ messages)
` [PATCH v2 1/2] libbpf: fix off-by-one in emit_signature_match jump offset
` [PATCH v2 2/2] bpf, libbpf: reject non-exclusive metadata maps in the signed loader

[PATCH v4 0/7] landlock: Add UDP access control support
 2026-05-22 21:18 UTC  (9+ messages)
` [PATCH v4 2/7] landlock: Add UDP connect() access control
` [PATCH v4 3/7] landlock: Add UDP send "
` [PATCH v4 7/7] landlock: Add documentation for UDP support

[PATCH bpf-next 00/13] Signed BPF + IPE Policies
 2026-05-22 20:46 UTC  (16+ messages)
` [PATCH bpf-next 01/13] bpf: expose signature verdict to LSMs via bpf_prog_aux
` [PATCH bpf-next 02/13] bpf: include prog BTF in the signed loader signature scope
` [PATCH bpf-next 03/13] bpf, libbpf: load prog BTF in the skel_internal loader
` [PATCH bpf-next 04/13] bpf: add bpf_loader_verify_metadata kfunc
` [PATCH bpf-next 05/13] bpf: compute prog->digest at BPF_PROG_LOAD entry
` [PATCH bpf-next 06/13] bpf: resolve loader-style kfunc CALLs against prog BTF
` [PATCH bpf-next 07/13] libbpf: generate prog BTF for loader programs
` [PATCH bpf-next 08/13] bpftool gen: embed loader prog BTF in the lskel header
` [PATCH bpf-next 09/13] lsm: add bpf_prog_load_post_integrity hook
` [PATCH bpf-next 10/13] bpf: invoke security_bpf_prog_load_post_integrity from the metadata kfunc
` [PATCH bpf-next 11/13] ipe: add BPF program signature properties
` [PATCH bpf-next 12/13] ipe: gate post-integrity BPF program loads
` [PATCH bpf-next 13/13] selftests/bpf: add IPE BPF policy integration tests

[PATCH 00/11] Convert moduleparams to seq_buf
 2026-05-22 17:05 UTC  (13+ messages)
` [PATCH 01/11] params: bound array element output to the caller's page buffer
` [PATCH 04/11] treewide: Convert struct kernel_param_ops initializers to DEFINE_KERNEL_PARAM_OPS
` [PATCH 09/11] treewide: Convert custom kernel_param_ops .get callbacks to seq_buf via cocci
` [PATCH 10/11] treewide: Manually convert custom kernel_param_ops .get callbacks
` [PATCH 11/11] moduleparam: Drop legacy kernel_param_ops .get_str field and dispatch logic

[RFC PATCH v4 00/19] Support socket access-control
 2026-05-22 15:42 UTC  (7+ messages)
` [RFC PATCH v4 01/19] landlock: "

[PATCH v3] keys/trusted_keys: move TPM-specific fields into trusted_tpm_options
 2026-05-22 12:41 UTC  (2+ messages)

[PATCH v4 0/7] lsm: Replace security_sb_mount with granular mount hooks
 2026-05-22  9:15 UTC  (3+ messages)
` [PATCH v4 1/7] lsm: Add granular mount hooks to replace security_sb_mount

[ANN] Linux Security Summit Europe 2026 CfP
 2026-05-22  5:56 UTC 

[net-next] netlabel: validate unlabeled mask attribute length
 2026-05-22  5:45 UTC 

[net-next] netlabel: fix IPv6 unlabeled address add error handling
 2026-05-22  3:50 UTC  (2+ messages)

[PATCH] tpm-buf: memory-safe allocations
 2026-05-22  1:35 UTC 

[linux-next:master] BUILD REGRESSION 550604d6c9b9efc8d068aff94dc301694a7afdee
 2026-05-22  0:33 UTC 

[bug report] keys: request_key_auth payload use-after-free in keyctl_instantiate_key_common()
 2026-05-21 23:52 UTC  (2+ messages)

[PATCH 0/6] landlock: Add scoped access bit for SysV message queues
 2026-05-21 16:06 UTC  (7+ messages)
` [PATCH 1/6] landlock: Add kern_ipc_perm credential blob structs
` [PATCH 2/6] landlock: Add LANDLOCK_SCOPE_SYSV_MSG_QUEUE
` [PATCH 3/6] landlock: Bump ABI for LANDLOCK_SCOPE_SYSV_MSG_QUEUE
` [PATCH 4/6] selftests/landlock: Test LANDLOCK_SCOPE_SYSV_MSG_QUEUE
` [PATCH 5/6] samples/landlock: Support LANDLOCK_SCOPE_SYSV_MSG_QUEUE in sandboxer
` [PATCH 6/6] landlock: Document LANDLOCK_SCOPE_SYSV_MESSAGE_QUEUE

[PATCH v5 00/13] ima: Introduce staging mechanism
 2026-05-21 16:06 UTC  (5+ messages)
` [PATCH v5 09/13] ima: Add support for staging measurements with prompt
` [PATCH v5 10/13] ima: Add support for flushing the hash table when staging measurements

[PATCH v2] apparmor: Fix inverted comparison in cache_hold_inc()
 2026-05-21 15:13 UTC 


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox