linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2025-04-26 05:57:19 to 2025-05-07 19:37:00 UTC [more...]

[PATCH 0/8] stackleak: Support Clang stack depth tracking
 2025-05-07 19:36 UTC  (12+ messages)
` [PATCH 1/8] nvme-pci: Make nvme_pci_npages_prp() __always_inline
` [PATCH 2/8] init.h: Disable sanitizer coverage for __init and __head
` [PATCH 3/8] stackleak: Rename CONFIG_GCC_PLUGIN_STACKLEAK to CONFIG_STACKLEAK
` [PATCH 4/8] stackleak: Rename stackleak_track_stack to __sanitizer_cov_stack_depth
` [PATCH 5/8] stackleak: Split STACKLEAK_CFLAGS from GCC_PLUGINS_CFLAGS
` [PATCH 6/8] stackleak: Support Clang stack depth tracking
` [PATCH 7/8] configs/hardening: Enable CONFIG_STACKLEAK
` [PATCH 8/8] configs/hardening: Enable CONFIG_INIT_ON_FREE_DEFAULT_ON

[PATCH v1] landlock: Use bitops macros in audit code
 2025-05-07 18:54 UTC 

[PATCH v4 09/11] pidfs, coredump: allow to verify coredump connection
 2025-05-07 18:34 UTC 

[PATCH v3 0/4] Introducing Hornet LSM
 2025-05-07 17:48 UTC  (15+ messages)
` [PATCH v3 1/4] security: "
` [PATCH v3 2/4] hornet: Introduce sign-ebpf
` [PATCH v3 3/4] hornet: Add a light skeleton data extractor script
` [PATCH v3 4/4] selftests/hornet: Add a selftest for the Hornet LSM

[PATCH v3 0/9] module: Introduce hash-based integrity checking
 2025-05-07 16:41 UTC  (20+ messages)
` [PATCH v3 1/9] powerpc/ima: Drop unnecessary check for CONFIG_MODULE_SIG
` [PATCH v3 2/9] ima: efi: Drop unnecessary check for CONFIG_MODULE_SIG/CONFIG_KEXEC_SIG
` [PATCH v3 3/9] kbuild: add stamp file for vmlinux BTF data
` [PATCH v3 4/9] kbuild: generate module BTF based on vmlinux.unstripped
` [PATCH v3 5/9] module: Make module loading policy usable without MODULE_SIG
` [PATCH v3 6/9] module: Move integrity checks into dedicated function
` [PATCH v3 7/9] module: Move lockdown check into generic module loader
` [PATCH v3 8/9] lockdown: Make the relationship to MODULE_SIG a dependency
` [PATCH v3 9/9] module: Introduce hash-based integrity checking

[RFC] LSM deprecation / removal policies
 2025-05-07 16:24 UTC  (11+ messages)

[PATCH 0/3] lsm: introduce lsm_manage_policy() syscall
 2025-05-07 15:37 UTC  (12+ messages)
` [PATCH 1/3] Wire up the lsm_manage_policy syscall
` [PATCH 2/3] lsm: introduce security_lsm_manage_policy hook
` [PATCH 3/3] AppArmor: add support for lsm_manage_policy

[PATCH RFC v3 08/10] net, pidfs, coredump: only allow coredumping tasks to connect to coredump socket
 2025-05-07 14:22 UTC  (2+ messages)

[PATCH v2] securityfs: fix missing of d_delete() in securityfs_remove()
 2025-05-07 11:12 UTC 

[PATCH] security/commoncap: don't assume "setid" if all ids are identical
 2025-05-07  6:33 UTC  (7+ messages)

[PATCH v1 bpf-next 0/5] af_unix: Allow BPF LSM to scrub SCM_RIGHTS at sendmsg()
 2025-05-06 18:19 UTC  (20+ messages)
` [PATCH v1 bpf-next 1/5] af_unix: Call security_unix_may_send() in sendmsg() for all socket types
` [PATCH v1 bpf-next 2/5] af_unix: Pass skb to security_unix_may_send()
` [PATCH v1 bpf-next 3/5] af_unix: Remove redundant scm->fp check in __scm_destroy()
` [PATCH v1 bpf-next 4/5] bpf: Add kfunc to scrub SCM_RIGHTS at security_unix_may_send()
` [PATCH v1 bpf-next 5/5] selftest: bpf: Add test for bpf_unix_scrub_fds()

[PATCH][next] apparmor: Fix incorrect profile->signal range check
 2025-05-06 17:07 UTC  (2+ messages)

[PATCH v1 bpf-next 4/5] bpf: Add kfunc to scrub SCM_RIGHTS at security_unix_may_send()
 2025-05-06  8:56 UTC  (3+ messages)

[PATCH v13 0/9] ima: kexec: measure events between kexec load and execute
 2025-05-06  5:49 UTC  (15+ messages)
` [PATCH v13 2/9] ima: define and call ima_alloc_kexec_file_buf()
` [PATCH v13 5/9] ima: kexec: define functions to copy IMA log at soft boot
` [PATCH v13 7/9] ima: verify if the segment size has changed
` [PATCH v13 8/9] ima: make the kexec extra memory configurable
` [PATCH v13 9/9] ima: measure kexec load and exec events as critical data

[PATCH AUTOSEL 5.4 59/79] smack: recognize ipv4 CIPSO w/o categories
 2025-05-05 23:21 UTC 

[PATCH AUTOSEL 5.10 088/114] smack: recognize ipv4 CIPSO w/o categories
 2025-05-05 23:17 UTC 

[PATCH AUTOSEL 5.15 116/153] smack: recognize ipv4 CIPSO w/o categories
 2025-05-05 23:12 UTC 

[PATCH AUTOSEL 6.1 161/212] smack: recognize ipv4 CIPSO w/o categories
 2025-05-05 23:05 UTC 

[PATCH AUTOSEL 6.6 205/294] smack: recognize ipv4 CIPSO w/o categories
 2025-05-05 22:55 UTC  (2+ messages)
` [PATCH AUTOSEL 6.6 206/294] smack: Revert "smackfs: Added check catlen"

[PATCH AUTOSEL 6.12 332/486] smack: recognize ipv4 CIPSO w/o categories
 2025-05-05 22:36 UTC  (2+ messages)
` [PATCH AUTOSEL 6.12 333/486] smack: Revert "smackfs: Added check catlen"

[PATCH AUTOSEL 6.14 420/642] smack: recognize ipv4 CIPSO w/o categories
 2025-05-05 22:10 UTC  (2+ messages)
` [PATCH AUTOSEL 6.14 422/642] smack: Revert "smackfs: Added check catlen"

[PATCH RFC v3 00/10] coredump: add coredump socket
 2025-05-05 15:39 UTC  (5+ messages)

[PATCH] KEYS: Reduce smp_mb() calls in key_put()
 2025-05-04 16:55 UTC  (10+ messages)
    ` [PATCH] KEYS: Invert FINAL_PUT bit
      ` [v2 PATCH] "

[PATCH v1] landlock: Remove KUnit test that triggers a warning
 2025-05-03  6:53 UTC 

[PATCH v2] apparmor: fix some kernel-doc issues in header files
 2025-05-03  4:49 UTC 

[PATCH] ima: Kdump kernel doesn't need IMA to do integrity measurement
 2025-05-02 20:03 UTC 

[PATCH RFC 0/4] stackleak: Support Clang stack depth tracking
 2025-05-02 19:01 UTC  (5+ messages)
` [PATCH RFC 1/4] stackleak: Rename CONFIG_GCC_PLUGIN_STACKLEAK to CONFIG_STACKLEAK
` [PATCH RFC 2/4] stackleak: Rename stackleak_track_stack to __sanitizer_cov_stack_depth
` [PATCH RFC 3/4] stackleak: Split STACKLEAK_CFLAGS from GCC_PLUGINS_CFLAGS
` [PATCH RFC 4/4] stackleak: Support Clang stack depth tracking

[PATCH] apparmor: fix some kernel-doc issues in header files
 2025-05-02 16:07 UTC  (2+ messages)

[PATCH] security/smack/smackfs: small kernel-doc fixes
 2025-05-02 15:50 UTC  (2+ messages)

[RFC PATCH v1 0/1] ipe: added script enforcement with BPRM check
 2025-04-30 23:29 UTC  (4+ messages)
` [RFC PATCH v1 1/1] ipe: add "

[PATCH v3 4/5] Audit: multiple subject lsm values for netlabel
 2025-04-30 20:48 UTC  (5+ messages)

[PATCH 0/3] randstruct: gcc-plugin: Remove bogus void member
 2025-04-30 18:56 UTC  (10+ messages)
` [PATCH 1/3] "
` [PATCH 2/3] lib/tests: Add randstruct KUnit test
` [PATCH 3/3] Revert "hardening: Disable GCC randstruct for COMPILE_TEST"

[PATCH] RDMA/uverbs: Consider capability of the process that opens the file
 2025-04-30 12:14 UTC  (17+ messages)

[PATCH AUTOSEL 6.6 17/21] ima: process_measurement() needlessly takes inode_lock() on MAY_READ
 2025-04-29 23:52 UTC 

[PATCH AUTOSEL 6.12 24/37] ima: process_measurement() needlessly takes inode_lock() on MAY_READ
 2025-04-29 23:51 UTC 

[PATCH AUTOSEL 6.14 25/39] ima: process_measurement() needlessly takes inode_lock() on MAY_READ
 2025-04-29 23:49 UTC 

[PATCH v2] security,fs,nfs,net: update security_inode_listsecurity() interface
 2025-04-29 23:34 UTC  (4+ messages)

how are new CAP_* added? CAP_{DISPLAY,DRM,GPU}?
 2025-04-29 16:48 UTC  (4+ messages)

[RFC PATCH v3 00/19] Support socket access-control
 2025-04-29 11:59 UTC  (4+ messages)

[PATCH] net:ipv4: Use shift left 2 to calculate the length of the IPv4 header
 2025-04-28 20:42 UTC  (2+ messages)

[RFC PATCH] security/apparmor: use kfree_sensitive() in unpack_secmark()
 2025-04-28 19:19 UTC  (2+ messages)

[PATCH] apparmor: use SHA-256 library API instead of crypto_shash API
 2025-04-28 19:04 UTC 

[PATCH] security,fs,nfs,net: update security_inode_listsecurity() interface
 2025-04-28 16:32 UTC  (5+ messages)

[PATCH v4 0/3] fs: introduce getfsxattrat and setfsxattrat syscalls
 2025-04-28  9:17 UTC  (9+ messages)
` [PATCH v4 3/3] "

[PATCH] fs/xattr.c: fix simple_xattr_list to always include security.* xattrs
 2025-04-28  8:53 UTC  (6+ messages)

[PATCH] securityfs: fix missing of d_delete() in securityfs_remove()
 2025-04-26 15:09 UTC  (4+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).