linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2024-07-03 23:01:09 to 2024-07-11 11:33:13 UTC [more...]

[PATCH bpf-next v4 13/20] bpf, lsm: Add check for BPF LSM return value
 2024-07-11 11:38 UTC  (3+ messages)
` [PATCH bpf-next v4 14/20] bpf: Prevent tail call between progs attached to different hooks
` [PATCH bpf-next v4 15/20] bpf: Fix compare error in function retval_range_within

[PATCH bpf-next v4 00/20] Add return value range check for BPF LSM
 2024-07-11 11:19 UTC  (13+ messages)
` [PATCH bpf-next v4 01/20] lsm: Refactor return value of LSM hook vm_enough_memory
` [PATCH bpf-next v4 02/20] lsm: Refactor return value of LSM hook inode_need_killpriv
` [PATCH bpf-next v4 03/20] lsm: Refactor return value of LSM hook inode_getsecurity
` [PATCH bpf-next v4 04/20] lsm: Refactor return value of LSM hook inode_listsecurity
` [PATCH bpf-next v4 05/20] lsm: Refactor return value of LSM hook inode_copy_up_xattr
` [PATCH bpf-next v4 06/20] lsm: Refactor return value of LSM hook getselfattr
` [PATCH bpf-next v4 07/20] lsm: Refactor return value of LSM hook setprocattr
` [PATCH bpf-next v4 08/20] lsm: Refactor return value of LSM hook getprocattr
` [PATCH bpf-next v4 09/20] lsm: Refactor return value of LSM hook key_getsecurity
` [PATCH bpf-next v4 10/20] lsm: Refactor return value of LSM hook audit_rule_match
` [PATCH bpf-next v4 11/20] bpf, lsm: Add disabled BPF LSM hook list
` [PATCH bpf-next v4 12/20] bpf, lsm: Enable BPF LSM prog to read/write return value parameters

[RFC PATCH v19 0/5] Script execution control (was O_MAYEXEC)
 2024-07-11  8:57 UTC  (53+ messages)
` [RFC PATCH v19 1/5] exec: Add a new AT_CHECK flag to execveat(2)
          ` [PATCH] binfmt_elf: Fail execution of shared objects with ELIBEXEC (was: Re: [RFC PATCH v19 1/5] exec: Add a new AT_CHECK flag to execveat(2))
            ` [PATCH] binfmt_elf: Fail execution of shared objects with ELIBEXEC
` [RFC PATCH v19 2/5] security: Add new SHOULD_EXEC_CHECK and SHOULD_EXEC_RESTRICT securebits
` [RFC PATCH v19 3/5] selftests/exec: Add tests for AT_CHECK and related securebits
` [RFC PATCH v19 4/5] selftests/landlock: Add tests for execveat + AT_CHECK
` [RFC PATCH v19 5/5] samples/should-exec: Add set-should-exec

[syzbot] [lsm?] general protection fault in hook_inode_free_security
 2024-07-11  0:30 UTC  (19+ messages)

[PATCH v14 0/3] Reduce overhead of LSMs with static calls
 2024-07-10 23:15 UTC  (6+ messages)
` [PATCH v14 1/3] kernel: Add helper macros for loop unrolling
` [PATCH v14 2/3] security: Count the LSMs enabled at compile time
` [PATCH v14 3/3] security: Replace indirect LSM hook calls with static calls

[PATCH v2 0/6] LSM: Infrastructure blob allocation
 2024-07-10 23:10 UTC  (11+ messages)
  ` [PATCH v2 1/6] LSM: Infrastructure management of the sock security
  ` [PATCH v2 2/6] LSM: Infrastructure management of the key security blob
  ` [PATCH v2 3/6] LSM: Add helper for blob allocations
  ` [PATCH v2 4/6] LSM: Infrastructure management of the dev_tun blob
  ` [PATCH v2 5/6] LSM: Infrastructure management of the infiniband blob
  ` [PATCH v2 6/6] LSM: Infrastructure management of the perf_event security blob

[RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
 2024-07-10 21:24 UTC  (10+ messages)

[PATCH v4 16/21] mm/mmap: Use vms accounted pages in mmap_region()
 2024-07-10 19:22 UTC 

[PATCH v6] landlock: Add abstract unix socket connect restriction
 2024-07-10 17:20 UTC  (3+ messages)

[PATCH] landlock: Clarify documentation for struct landlock_ruleset_attr
 2024-07-10 14:15 UTC  (3+ messages)

IMA Reports No TPM Device
 2024-07-10 11:12 UTC  (4+ messages)

[PATCH 0/6] LSM: Infrastructure blob allocation
 2024-07-10  0:01 UTC  (28+ messages)
  ` [PATCH 1/6] LSM: Infrastructure management of the sock security
  ` [PATCH 2/6] LSM: Infrastructure management of the key security blob
  ` [PATCH 3/6] LSM: Add helper for blob allocations
  ` [PATCH 4/6] LSM: Infrastructure management of the dev_tun blob
  ` [PATCH 5/6] LSM: Infrastructure management of the infiniband blob
  ` [PATCH 6/6] LSM: Infrastructure management of the perf_event security blob

[PATCH v13 4/5] security: Update non standard hooks to use static calls
 2024-07-09 19:05 UTC  (6+ messages)

[PATCH v1 1/2] Landlock: Add signal control
 2024-07-09 15:18 UTC  (3+ messages)
` [PATCH v1 2/2] Landlock: Signal scoping tests

[PATCH] apparmor: domain: clean up duplicated parts of handle_onexec()
 2024-07-09  3:07 UTC 

[PATCH v1] landlock: Abstract unix socket restriction tests
 2024-07-08 19:45 UTC  (2+ messages)

[PATCH 0/2] Landlock: Add abstract unix socket connect reastriction
 2024-07-08 17:31 UTC  (2+ messages)

[PATCH v13 3/5] security: Replace indirect LSM hook calls with static calls
 2024-07-08 14:23 UTC  (19+ messages)

[PATCH] tpm: validate object type in tpm2_handle_mso()
 2024-07-07 10:14 UTC  (2+ messages)

[RFC PATCH] lsm: fixup the inode xattr capability handling
 2024-07-06  4:31 UTC  (3+ messages)

[PATCH] selinux,smack: remove the capability checks in the removexattr hooks
 2024-07-05 17:11 UTC  (6+ messages)

[PATCH v2 0/3] Address !chip->auth
 2024-07-05 15:04 UTC  (14+ messages)
` [PATCH v2 2/3] tpm: Address !chip->auth in tpm_buf_append_name()
` [PATCH v2 3/3] tpm: Address !chip->auth in tpm_buf_append_hmac_session*()

[PATCH v2] apparmor: try to avoid refing the label in apparmor_file_open
 2024-07-05  6:30 UTC  (2+ messages)

[PATCH v4 0/3] Address !chip->auth
 2024-07-04 18:53 UTC  (4+ messages)
` [PATCH v4 1/3] tpm: Address !chip->auth in tpm2_*_auth_session()
` [PATCH v4 2/3] tpm: Address !chip->auth in tpm_buf_append_name()
` [PATCH v4 3/3] tpm: Address !chip->auth in tpm_buf_append_hmac_session*()

[PATCH] dm verity: add support for signature verification with platform keyring
 2024-07-04 15:48 UTC  (2+ messages)
` [PATCH v2] "

[PATCH 0/3] Address !chip->auth
 2024-07-04 14:45 UTC  (4+ messages)

[syzbot] [lsm?] [keyrings?] KCSAN: data-race in __se_sys_keyctl / key_task_permission (3)
 2024-07-04 14:38 UTC  (2+ messages)

[PATCH v3 0/3] Address !chip->auth
 2024-07-04  8:57 UTC  (4+ messages)
` [PATCH v3 1/3] tpm: Address !chip->auth in tpm2_*_auth_session()
` [PATCH v3 2/3] tpm: Address !chip->auth in tpm_buf_append_name()
` [PATCH v3 3/3] tpm: Address !chip->auth in tpm_buf_append_hmac_session*()

[syzbot] [lsm?] KASAN: slab-use-after-free Read in smack_socket_sock_rcv_skb
 2024-07-04  7:49 UTC 


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).