linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2024-06-20 17:14:05 to 2024-07-06 15:02:40 UTC [more...]

[RFC PATCH v19 0/5] Script execution control (was O_MAYEXEC)
 2024-07-06 14:56 UTC  (17+ messages)
` [RFC PATCH v19 1/5] exec: Add a new AT_CHECK flag to execveat(2)
` [RFC PATCH v19 2/5] security: Add new SHOULD_EXEC_CHECK and SHOULD_EXEC_RESTRICT securebits
` [RFC PATCH v19 3/5] selftests/exec: Add tests for AT_CHECK and related securebits
` [RFC PATCH v19 4/5] selftests/landlock: Add tests for execveat + AT_CHECK
` [RFC PATCH v19 5/5] samples/should-exec: Add set-should-exec

[PATCH v13 0/5] Reduce overhead of LSMs with static calls
 2024-07-06  4:46 UTC  (26+ messages)
` [PATCH v13 1/5] kernel: Add helper macros for loop unrolling
` [PATCH v13 2/5] security: Count the LSMs enabled at compile time
` [PATCH v13 3/5] security: Replace indirect LSM hook calls with static calls
` [PATCH v13 4/5] security: Update non standard hooks to use "
` [PATCH v13 5/5] bpf: Only enable BPF LSM hooks when an LSM program is attached

[RFC PATCH] lsm: fixup the inode xattr capability handling
 2024-07-06  4:31 UTC  (3+ messages)

[PATCH v1 1/2] Landlock: Add signal control
 2024-07-05 21:21 UTC  (2+ messages)
` [PATCH v1 2/2] Landlock: Signal scoping tests

[PATCH 0/2] Landlock: Add abstract unix socket connect reastriction
 2024-07-05 18:58 UTC 

[PATCH] selinux,smack: remove the capability checks in the removexattr hooks
 2024-07-05 17:11 UTC  (6+ messages)

[PATCH v2 0/3] Address !chip->auth
 2024-07-05 15:04 UTC  (15+ messages)
` [PATCH v2 1/3] tpm: Address !chip->auth in tpm2_*_auth_session()
` [PATCH v2 2/3] tpm: Address !chip->auth in tpm_buf_append_name()
` [PATCH v2 3/3] tpm: Address !chip->auth in tpm_buf_append_hmac_session*()

[PATCH v2] apparmor: try to avoid refing the label in apparmor_file_open
 2024-07-05  6:30 UTC  (6+ messages)

[PATCH v4 0/3] Address !chip->auth
 2024-07-04 18:53 UTC  (4+ messages)
` [PATCH v4 1/3] tpm: Address !chip->auth in tpm2_*_auth_session()
` [PATCH v4 2/3] tpm: Address !chip->auth in tpm_buf_append_name()
` [PATCH v4 3/3] tpm: Address !chip->auth in tpm_buf_append_hmac_session*()

[PATCH] dm verity: add support for signature verification with platform keyring
 2024-07-04 15:48 UTC  (2+ messages)
` [PATCH v2] "

[PATCH 0/3] Address !chip->auth
 2024-07-04 14:45 UTC  (7+ messages)
` [PATCH 1/3] tpm: Address !chip->auth in tpm2_*_auth_session()
` [PATCH 2/3] tpm: Address !chip->auth in tpm_buf_append_name()
` [PATCH 3/3] tpm: Address !chip->auth in tpm_buf_append_hmac_session*()

[syzbot] [lsm?] [keyrings?] KCSAN: data-race in __se_sys_keyctl / key_task_permission (3)
 2024-07-04 14:38 UTC  (2+ messages)

[PATCH v3 0/3] Address !chip->auth
 2024-07-04  8:57 UTC  (4+ messages)
` [PATCH v3 1/3] tpm: Address !chip->auth in tpm2_*_auth_session()
` [PATCH v3 2/3] tpm: Address !chip->auth in tpm_buf_append_name()
` [PATCH v3 3/3] tpm: Address !chip->auth in tpm_buf_append_hmac_session*()

[syzbot] [lsm?] KASAN: slab-use-after-free Read in smack_socket_sock_rcv_skb
 2024-07-04  7:49 UTC 

[PATCH] dm-verity: fix dm_is_verity_target() when dm-verity is builtin
 2024-07-03 20:26 UTC  (2+ messages)

[PATCH] tpm: Limit TCG_TPM2_HMAC to known good drivers
 2024-07-03 17:24 UTC  (3+ messages)

[PATCH 1/2] KEYS: trusted: fix DCP blob payload length assignment
 2024-07-03 12:53 UTC  (2+ messages)
` [PATCH 2/2] KEYS: trusted: dcp: fix leak of blob encryption key

[PATCH 0/2] Forbid illegitimate binding via listen(2)
 2024-07-02 12:43 UTC  (10+ messages)
` [PATCH 1/2] landlock: Add hook on socket_listen()

[RFC] integrity: wait for completion of i2c initialization using late_initcall_sync()
 2024-07-02  2:37 UTC  (4+ messages)

[PATCH v12 5/5] bpf: Only enable BPF LSM hooks when an LSM program is attached
 2024-07-01 23:40 UTC  (4+ messages)

[PATCH] tpm: Check non-nullity of chip->auth
 2024-07-01 19:21 UTC  (2+ messages)

[PATCH v3 0/2] KEYS: add missing MODULE_DESCRIPTION() macros
 2024-07-01 15:00 UTC  (5+ messages)
` [PATCH v3 1/2] KEYS: trusted: add missing MODULE_DESCRIPTION()

[PATCH v12 0/5] Reduce overhead of LSMs with static calls
 2024-06-29  8:28 UTC  (4+ messages)
` [PATCH v12 3/5] security: Replace indirect LSM hook calls "

[PATCH v2 0/4] Introduce user namespace capabilities
 2024-06-28 14:45 UTC  (4+ messages)
` [PATCH v2 2/4] capabilities: Add securebit to restrict userns caps

[PATCH v4 00/11] Improve the copy of task comm
 2024-06-28  9:05 UTC  (12+ messages)
` [PATCH v4 01/11] fs/exec: Drop task_lock() inside __get_task_comm()
  ` [PATCH v4 02/11] auditsc: Replace memcpy() with __get_task_comm()
  ` [PATCH v4 03/11] security: "
  ` [PATCH v4 04/11] bpftool: Ensure task comm is always NUL-terminated
  ` [PATCH v4 05/11] mm/util: Fix possible race condition in kstrdup()
  ` [PATCH v4 06/11] mm/util: Deduplicate code in {kstrdup,kstrndup,kmemdup_nul}
  ` [PATCH v4 07/11] mm/kmemleak: Replace strncpy() with __get_task_comm()
  ` [PATCH v4 08/11] tsacct: "
  ` [PATCH v4 09/11] tracing: "
  ` [PATCH v4 10/11] net: Replace strcpy() "
  ` [PATCH v4 11/11] drm: "

[PATCH v1] landlock: Abstract unix socket restriction tests
 2024-06-27 23:30 UTC 

[PATCH v6] landlock: Add abstract unix socket connect restriction
 2024-06-27 23:30 UTC 

[syzbot] [lsm?] general protection fault in hook_inode_free_security
 2024-06-27 19:29 UTC  (11+ messages)

[PATCH v2 14/15] mm/mmap: Use vms accounted pages in mmap_region()
 2024-06-26 18:45 UTC  (3+ messages)

Yet another vision of Linux security | Endpoint Security Framework
 2024-06-26  9:33 UTC  (7+ messages)

[PATCH] apparmor: test: add MODULE_DESCRIPTION()
 2024-06-25  8:26 UTC  (4+ messages)

[PATCH v39 00/42] LSM: General module stacking
 2024-06-24 23:16 UTC  (21+ messages)
` [PATCH v39 01/42] integrity: disassociate ima_filter_rule from security_audit_rule
` [PATCH v39 02/42] SM: Infrastructure management of the sock security

[RFC PATCH] LSM, net: Add SO_PEERCONTEXT for peer LSM data
 2024-06-23 19:58 UTC  (6+ messages)
` [PATCH RFC] "

[PATCH v3 00/11] Improve the copy of task comm
 2024-06-23  6:00 UTC  (20+ messages)
` [PATCH v3 01/11] fs/exec: Drop task_lock() inside __get_task_comm()
` [PATCH v3 02/11] auditsc: Replace memcpy() with __get_task_comm()
` [PATCH v3 03/11] security: "
` [PATCH v3 04/11] bpftool: Ensure task comm is always NUL-terminated
` [PATCH v3 05/11] mm/util: Fix possible race condition in kstrdup()
` [PATCH v3 06/11] mm/util: Deduplicate code in {kstrdup,kstrndup,kmemdup_nul}
` [PATCH v3 07/11] mm/kmemleak: Replace strncpy() with __get_task_comm()
` [PATCH v3 08/11] tsacct: "
` [PATCH v3 09/11] tracing: "
` [PATCH v3 10/11] net: Replace strcpy() "
` [PATCH v3 11/11] drm: "

[PATCH] bpf: add security_file_post_open() LSM hook to sleepable_lsm_hooks
 2024-06-21 18:00 UTC  (4+ messages)

[PATCH v5] landlock: Add abstract unix socket connect restriction
 2024-06-21 16:00 UTC  (2+ messages)

[PATCH v4 00/14] security: digest_cache LSM
 2024-06-21  7:10 UTC  (17+ messages)

[RFC PATCH v2 0/8] Clavis LSM
 2024-06-20 20:18 UTC  (3+ messages)

[PATCH v2] smack: unix sockets: fix accept()ed socket label
 2024-06-20 17:42 UTC  (2+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).