messages from 2024-06-20 17:14:05 to 2024-07-06 15:02:40 UTC [more...]
[RFC PATCH v19 0/5] Script execution control (was O_MAYEXEC)
2024-07-06 14:56 UTC (17+ messages)
` [RFC PATCH v19 1/5] exec: Add a new AT_CHECK flag to execveat(2)
` [RFC PATCH v19 2/5] security: Add new SHOULD_EXEC_CHECK and SHOULD_EXEC_RESTRICT securebits
` [RFC PATCH v19 3/5] selftests/exec: Add tests for AT_CHECK and related securebits
` [RFC PATCH v19 4/5] selftests/landlock: Add tests for execveat + AT_CHECK
` [RFC PATCH v19 5/5] samples/should-exec: Add set-should-exec
[PATCH v13 0/5] Reduce overhead of LSMs with static calls
2024-07-06 4:46 UTC (26+ messages)
` [PATCH v13 1/5] kernel: Add helper macros for loop unrolling
` [PATCH v13 2/5] security: Count the LSMs enabled at compile time
` [PATCH v13 3/5] security: Replace indirect LSM hook calls with static calls
` [PATCH v13 4/5] security: Update non standard hooks to use "
` [PATCH v13 5/5] bpf: Only enable BPF LSM hooks when an LSM program is attached
[RFC PATCH] lsm: fixup the inode xattr capability handling
2024-07-06 4:31 UTC (3+ messages)
[PATCH v1 1/2] Landlock: Add signal control
2024-07-05 21:21 UTC (2+ messages)
` [PATCH v1 2/2] Landlock: Signal scoping tests
[PATCH 0/2] Landlock: Add abstract unix socket connect reastriction
2024-07-05 18:58 UTC
[PATCH] selinux,smack: remove the capability checks in the removexattr hooks
2024-07-05 17:11 UTC (6+ messages)
[PATCH v2 0/3] Address !chip->auth
2024-07-05 15:04 UTC (15+ messages)
` [PATCH v2 1/3] tpm: Address !chip->auth in tpm2_*_auth_session()
` [PATCH v2 2/3] tpm: Address !chip->auth in tpm_buf_append_name()
` [PATCH v2 3/3] tpm: Address !chip->auth in tpm_buf_append_hmac_session*()
[PATCH v2] apparmor: try to avoid refing the label in apparmor_file_open
2024-07-05 6:30 UTC (6+ messages)
[PATCH v4 0/3] Address !chip->auth
2024-07-04 18:53 UTC (4+ messages)
` [PATCH v4 1/3] tpm: Address !chip->auth in tpm2_*_auth_session()
` [PATCH v4 2/3] tpm: Address !chip->auth in tpm_buf_append_name()
` [PATCH v4 3/3] tpm: Address !chip->auth in tpm_buf_append_hmac_session*()
[PATCH] dm verity: add support for signature verification with platform keyring
2024-07-04 15:48 UTC (2+ messages)
` [PATCH v2] "
[PATCH 0/3] Address !chip->auth
2024-07-04 14:45 UTC (7+ messages)
` [PATCH 1/3] tpm: Address !chip->auth in tpm2_*_auth_session()
` [PATCH 2/3] tpm: Address !chip->auth in tpm_buf_append_name()
` [PATCH 3/3] tpm: Address !chip->auth in tpm_buf_append_hmac_session*()
[syzbot] [lsm?] [keyrings?] KCSAN: data-race in __se_sys_keyctl / key_task_permission (3)
2024-07-04 14:38 UTC (2+ messages)
[PATCH v3 0/3] Address !chip->auth
2024-07-04 8:57 UTC (4+ messages)
` [PATCH v3 1/3] tpm: Address !chip->auth in tpm2_*_auth_session()
` [PATCH v3 2/3] tpm: Address !chip->auth in tpm_buf_append_name()
` [PATCH v3 3/3] tpm: Address !chip->auth in tpm_buf_append_hmac_session*()
[syzbot] [lsm?] KASAN: slab-use-after-free Read in smack_socket_sock_rcv_skb
2024-07-04 7:49 UTC
[PATCH] dm-verity: fix dm_is_verity_target() when dm-verity is builtin
2024-07-03 20:26 UTC (2+ messages)
[PATCH] tpm: Limit TCG_TPM2_HMAC to known good drivers
2024-07-03 17:24 UTC (3+ messages)
[PATCH 1/2] KEYS: trusted: fix DCP blob payload length assignment
2024-07-03 12:53 UTC (2+ messages)
` [PATCH 2/2] KEYS: trusted: dcp: fix leak of blob encryption key
[PATCH 0/2] Forbid illegitimate binding via listen(2)
2024-07-02 12:43 UTC (10+ messages)
` [PATCH 1/2] landlock: Add hook on socket_listen()
[RFC] integrity: wait for completion of i2c initialization using late_initcall_sync()
2024-07-02 2:37 UTC (4+ messages)
[PATCH v12 5/5] bpf: Only enable BPF LSM hooks when an LSM program is attached
2024-07-01 23:40 UTC (4+ messages)
[PATCH] tpm: Check non-nullity of chip->auth
2024-07-01 19:21 UTC (2+ messages)
[PATCH v3 0/2] KEYS: add missing MODULE_DESCRIPTION() macros
2024-07-01 15:00 UTC (5+ messages)
` [PATCH v3 1/2] KEYS: trusted: add missing MODULE_DESCRIPTION()
[PATCH v12 0/5] Reduce overhead of LSMs with static calls
2024-06-29 8:28 UTC (4+ messages)
` [PATCH v12 3/5] security: Replace indirect LSM hook calls "
[PATCH v2 0/4] Introduce user namespace capabilities
2024-06-28 14:45 UTC (4+ messages)
` [PATCH v2 2/4] capabilities: Add securebit to restrict userns caps
[PATCH v4 00/11] Improve the copy of task comm
2024-06-28 9:05 UTC (12+ messages)
` [PATCH v4 01/11] fs/exec: Drop task_lock() inside __get_task_comm()
` [PATCH v4 02/11] auditsc: Replace memcpy() with __get_task_comm()
` [PATCH v4 03/11] security: "
` [PATCH v4 04/11] bpftool: Ensure task comm is always NUL-terminated
` [PATCH v4 05/11] mm/util: Fix possible race condition in kstrdup()
` [PATCH v4 06/11] mm/util: Deduplicate code in {kstrdup,kstrndup,kmemdup_nul}
` [PATCH v4 07/11] mm/kmemleak: Replace strncpy() with __get_task_comm()
` [PATCH v4 08/11] tsacct: "
` [PATCH v4 09/11] tracing: "
` [PATCH v4 10/11] net: Replace strcpy() "
` [PATCH v4 11/11] drm: "
[PATCH v1] landlock: Abstract unix socket restriction tests
2024-06-27 23:30 UTC
[PATCH v6] landlock: Add abstract unix socket connect restriction
2024-06-27 23:30 UTC
[syzbot] [lsm?] general protection fault in hook_inode_free_security
2024-06-27 19:29 UTC (11+ messages)
[PATCH v2 14/15] mm/mmap: Use vms accounted pages in mmap_region()
2024-06-26 18:45 UTC (3+ messages)
Yet another vision of Linux security | Endpoint Security Framework
2024-06-26 9:33 UTC (7+ messages)
[PATCH] apparmor: test: add MODULE_DESCRIPTION()
2024-06-25 8:26 UTC (4+ messages)
[PATCH v39 00/42] LSM: General module stacking
2024-06-24 23:16 UTC (21+ messages)
` [PATCH v39 01/42] integrity: disassociate ima_filter_rule from security_audit_rule
` [PATCH v39 02/42] SM: Infrastructure management of the sock security
[RFC PATCH] LSM, net: Add SO_PEERCONTEXT for peer LSM data
2024-06-23 19:58 UTC (6+ messages)
` [PATCH RFC] "
[PATCH v3 00/11] Improve the copy of task comm
2024-06-23 6:00 UTC (20+ messages)
` [PATCH v3 01/11] fs/exec: Drop task_lock() inside __get_task_comm()
` [PATCH v3 02/11] auditsc: Replace memcpy() with __get_task_comm()
` [PATCH v3 03/11] security: "
` [PATCH v3 04/11] bpftool: Ensure task comm is always NUL-terminated
` [PATCH v3 05/11] mm/util: Fix possible race condition in kstrdup()
` [PATCH v3 06/11] mm/util: Deduplicate code in {kstrdup,kstrndup,kmemdup_nul}
` [PATCH v3 07/11] mm/kmemleak: Replace strncpy() with __get_task_comm()
` [PATCH v3 08/11] tsacct: "
` [PATCH v3 09/11] tracing: "
` [PATCH v3 10/11] net: Replace strcpy() "
` [PATCH v3 11/11] drm: "
[PATCH] bpf: add security_file_post_open() LSM hook to sleepable_lsm_hooks
2024-06-21 18:00 UTC (4+ messages)
[PATCH v5] landlock: Add abstract unix socket connect restriction
2024-06-21 16:00 UTC (2+ messages)
[PATCH v4 00/14] security: digest_cache LSM
2024-06-21 7:10 UTC (17+ messages)
[RFC PATCH v2 0/8] Clavis LSM
2024-06-20 20:18 UTC (3+ messages)
[PATCH v2] smack: unix sockets: fix accept()ed socket label
2024-06-20 17:42 UTC (2+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).