December 2019 Archives by subject
Starting: Sun Dec 1 01:40:19 UTC 2019
Ending: Tue Dec 31 19:45:07 UTC 2019
Messages: 533
- [GIT PULL] apparmor updates for 5.5
John Johansen
- [GIT PULL] apparmor updates for 5.5
Linus Torvalds
- [GIT PULL] apparmor updates for 5.5
pr-tracker-bot at kernel.org
- [GIT PULL] pipe: General notification queue
Linus Torvalds
- [GIT PULL] pipe: Notification queue preparation
David Sterba
- [GIT PULL] pipe: Notification queue preparation
David Howells
- [GIT PULL] pipe: Notification queue preparation
Linus Torvalds
- [GIT PULL] pipe: Notification queue preparation
David Sterba
- [GIT PULL] pipe: Notification queue preparation
Linus Torvalds
- [GIT PULL] pipe: Notification queue preparation
David Howells
- [GIT PULL] pipe: Notification queue preparation
Linus Torvalds
- [GIT PULL] pipe: Notification queue preparation
David Sterba
- [GIT PULL] SELinux patches for v5.5
pr-tracker-bot at kernel.org
- [GIT PULL] SELinux patches for v5.5
Mimi Zohar
- [GIT PULL] SELinux patches for v5.5
Paul Moore
- [GIT PULL] SELinux patches for v5.5
Mimi Zohar
- [GIT PULL] SELinux patches for v5.5
Paul Moore
- [GIT PULL] SELinux patches for v5.5
Roberto Sassu
- [GIT PULL] tomoyo fixes for 5.5
Tetsuo Handa
- [GIT PULL] tomoyo fixes for 5.5
Linus Torvalds
- [GIT PULL] tomoyo fixes for 5.5
Tetsuo Handa
- [GIT PULL] tomoyo fixes for 5.5
pr-tracker-bot at kernel.org
- [Intel-gfx] [PATCH v3 4/7] drm/i915/perf: open access for CAP_SYS_PERFMON privileged process
Lionel Landwerlin
- [Intel-gfx] [PATCH v3 4/7] drm/i915/perf: open access for CAP_SYS_PERFMON privileged process
Alexey Budankov
- [PATCH -next] x86/efi: remove unused variables
Nayna
- [PATCH 0/2 v2] efi: cosmetic patches for the error messages when
Lee, Chun-Yi
- [PATCH 0/2] efi: cosmetic patches for the error messages when loading certificates
Lee, Chun-Yi
- [PATCH 0/2] Revert patches fixing probing of interrupts
Stefan Berger
- [PATCH 0/2] Revert patches fixing probing of interrupts
Jerry Snitselaar
- [PATCH 0/2] Revert patches fixing probing of interrupts
Jarkko Sakkinen
- [PATCH 0/2] Revert patches fixing probing of interrupts
Jerry Snitselaar
- [PATCH 0/2] Revert patches fixing probing of interrupts
Jarkko Sakkinen
- [PATCH 1/2 v2] efi: add a function to convert the status code to a string
Ard Biesheuvel
- [PATCH 1/2 v2] efi: add a function to convert the status code to a string
Joey Lee
- [PATCH 1/2 v2] efi: add a function to convert the status code to a string
Lee, Chun-Yi
- [PATCH 1/2] efi: add a function for transferring status to string
Lee, Chun-Yi
- [PATCH 1/2] efi: add a function for transferring status to string
Ard Biesheuvel
- [PATCH 1/2] efi: add a function for transferring status to string
Joey Lee
- [PATCH 1/2] selinux: revert "stop passing MAY_NOT_BLOCK to the AVC upon follow_link"
Paul Moore
- [PATCH 2/2] efi: show error messages only when loading certificates is failed
Ard Biesheuvel
- [PATCH 2/2] efi: show error messages only when loading certificates is failed
Joey Lee
- [PATCH 2/2] efi: show error messages only when loading certificates is failed
Ard Biesheuvel
- [PATCH 2/2] efi: show error messages only when loading certificates is failed
Joey Lee
- [PATCH 2/2] efi: show error messages only when loading certificates is failed
Lee, Chun-Yi
- [PATCH 2/2] efi: show error messages only when loading certificates is failed
Lee, Chun-Yi
- [PATCH 2/2] selinux: fall back to ref-walk if audit is required
Paul Moore
- [PATCH 2/4] afs: Fix SELinux setting security label on /afs
David Howells
- [PATCH 2/8] afs: Fix SELinux setting security label on /afs
David Howells
- [PATCH 24/25] LSM: Add /proc attr entry for full LSM context
Casey Schaufler
- [PATCH AUTOSEL 4.14 46/58] apparmor: fix unsigned len comparison with less than zero
Sasha Levin
- [PATCH AUTOSEL 4.19 11/34] afs: Fix SELinux setting security label on /afs
Sasha Levin
- [PATCH AUTOSEL 4.19 64/79] apparmor: fix unsigned len comparison with less than zero
Sasha Levin
- [PATCH AUTOSEL 5.4 108/134] apparmor: fix unsigned len comparison with less than zero
Sasha Levin
- [PATCH AUTOSEL 5.4 20/52] afs: Fix SELinux setting security label on /afs
Sasha Levin
- [PATCH bpf-next v1 00/13] MAC and Audit policy using eBPF (KRSI)
KP Singh
- [PATCH bpf-next v1 00/13] MAC and Audit policy using eBPF (KRSI)
Casey Schaufler
- [PATCH bpf-next v1 00/13] MAC and Audit policy using eBPF (KRSI)
KP Singh
- [PATCH bpf-next v1 00/13] MAC and Audit policy using eBPF (KRSI)
Mickaël Salaün
- [PATCH bpf-next v1 00/13] MAC and Audit policy using eBPF (KRSI)
Alexei Starovoitov
- [PATCH bpf-next v1 00/13] MAC and Audit policy using eBPF (KRSI)
Andrii Nakryiko
- [PATCH bpf-next v1 00/13] MAC and Audit policy using eBPF (KRSI)
KP Singh
- [PATCH bpf-next v1 00/13] MAC and Audit policy using eBPF (KRSI)
KP Singh
- [PATCH bpf-next v1 00/13] MAC and Audit policy using eBPF (KRSI)
Andrii Nakryiko
- [PATCH bpf-next v1 00/13] MAC and Audit policy using eBPF (KRSI)
Andrii Nakryiko
- [PATCH bpf-next v1 00/13] MAC and Audit policy using eBPF (KRSI)
Kees Cook
- [PATCH bpf-next v1 00/13] MAC and Audit policy using eBPF (KRSI)
Kees Cook
- [PATCH bpf-next v1 00/13] MAC and Audit policy using eBPF (KRSI)
Mickaël Salaün
- [PATCH bpf-next v1 01/13] bpf: Refactor BPF_EVENT context macros to its own header.
Andrii Nakryiko
- [PATCH bpf-next v1 01/13] bpf: Refactor BPF_EVENT context macros to its own header.
KP Singh
- [PATCH bpf-next v1 01/13] bpf: Refactor BPF_EVENT context macros to its own header.
KP Singh
- [PATCH bpf-next v1 02/13] bpf: lsm: Add a skeleton and config options
KP Singh
- [PATCH bpf-next v1 03/13] bpf: lsm: Introduce types for eBPF based LSM
KP Singh
- [PATCH bpf-next v1 04/13] bpf: lsm: Allow btf_id based attachment for LSM hooks
KP Singh
- [PATCH bpf-next v1 04/13] bpf: lsm: Allow btf_id based attachment for LSM hooks
Andrii Nakryiko
- [PATCH bpf-next v1 04/13] bpf: lsm: Allow btf_id based attachment for LSM hooks
KP Singh
- [PATCH bpf-next v1 05/13] tools/libbpf: Add support in libbpf for BPF_PROG_TYPE_LSM
KP Singh
- [PATCH bpf-next v1 05/13] tools/libbpf: Add support in libbpf for BPF_PROG_TYPE_LSM
Andrii Nakryiko
- [PATCH bpf-next v1 05/13] tools/libbpf: Add support in libbpf for BPF_PROG_TYPE_LSM
Andrii Nakryiko
- [PATCH bpf-next v1 06/13] bpf: lsm: Init Hooks and create files in securityfs
Andrii Nakryiko
- [PATCH bpf-next v1 06/13] bpf: lsm: Init Hooks and create files in securityfs
KP Singh
- [PATCH bpf-next v1 06/13] bpf: lsm: Init Hooks and create files in securityfs
Andrii Nakryiko
- [PATCH bpf-next v1 06/13] bpf: lsm: Init Hooks and create files in securityfs
Kees Cook
- [PATCH bpf-next v1 06/13] bpf: lsm: Init Hooks and create files in securityfs
KP Singh
- [PATCH bpf-next v1 07/13] bpf: lsm: Implement attach, detach and execution.
KP Singh
- [PATCH bpf-next v1 07/13] bpf: lsm: Implement attach, detach and execution.
Andrii Nakryiko
- [PATCH bpf-next v1 08/13] bpf: lsm: Show attached program names in hook read handler.
KP Singh
- [PATCH bpf-next v1 09/13] bpf: lsm: Add a helper function bpf_lsm_event_output
KP Singh
- [PATCH bpf-next v1 09/13] bpf: lsm: Add a helper function bpf_lsm_event_output
Andrii Nakryiko
- [PATCH bpf-next v1 09/13] bpf: lsm: Add a helper function bpf_lsm_event_output
KP Singh
- [PATCH bpf-next v1 09/13] bpf: lsm: Add a helper function bpf_lsm_event_output
Andrii Nakryiko
- [PATCH bpf-next v1 10/13] bpf: lsm: Handle attachment of the same program
KP Singh
- [PATCH bpf-next v1 10/13] bpf: lsm: Handle attachment of the same program
Andrii Nakryiko
- [PATCH bpf-next v1 11/13] tools/libbpf: Add bpf_program__attach_lsm
Andrii Nakryiko
- [PATCH bpf-next v1 11/13] tools/libbpf: Add bpf_program__attach_lsm
KP Singh
- [PATCH bpf-next v1 12/13] bpf: lsm: Add selftests for BPF_PROG_TYPE_LSM
KP Singh
- [PATCH bpf-next v1 12/13] bpf: lsm: Add selftests for BPF_PROG_TYPE_LSM
Andrii Nakryiko
- [PATCH bpf-next v1 13/13] bpf: lsm: Add Documentation
KP Singh
- [PATCH linux-kselftest/test v2] apparmor: add AppArmor KUnit tests for policy unpack
Kees Cook
- [PATCH v1 - RFC] ima: export the measurement list when needed
Mimi Zohar
- [PATCH v1 - RFC] ima: export the measurement list when needed
Janne Karhunen
- [PATCH v1 - RFC] ima: export the measurement list when needed
Janne Karhunen
- [PATCH v1 - RFC] ima: export the measurement list when needed
david.safford at gmail.com
- [PATCH v1 0/3] Introduce CAP_SYS_PERFMON capability for secure Perf users groups
Casey Schaufler
- [PATCH v1 0/3] Introduce CAP_SYS_PERFMON capability for secure Perf users groups
Alexey Budankov
- [PATCH v1 0/3] Introduce CAP_SYS_PERFMON capability for secure Perf users groups
Casey Schaufler
- [PATCH v1 0/3] Introduce CAP_SYS_PERFMON capability for secure Perf users groups
Andi Kleen
- [PATCH v1 0/3] Introduce CAP_SYS_PERFMON capability for secure Perf users groups
Alexey Budankov
- [PATCH v1 0/3] Introduce CAP_SYS_PERFMON capability for secure Perf users groups
Alexey Budankov
- [PATCH v1 0/3] Introduce CAP_SYS_PERFMON capability for secure Perf users groups
Peter Zijlstra
- [PATCH v1 0/3] Introduce CAP_SYS_PERFMON capability for secure Perf users groups
Alexey Budankov
- [PATCH v1 0/3] Introduce CAP_SYS_PERFMON capability for secure Perf users groups
Casey Schaufler
- [PATCH v1 0/3] Introduce CAP_SYS_PERFMON capability for secure Perf users groups
Stephane Eranian
- [PATCH v1 0/3] Introduce CAP_SYS_PERFMON capability for secure Perf users groups
Andi Kleen
- [PATCH v1 0/3] Introduce CAP_SYS_PERFMON capability for secure Perf users groups
Casey Schaufler
- [PATCH v1 0/3] Introduce CAP_SYS_PERFMON capability for secure Perf users groups
Stephen Smalley
- [PATCH v1 0/3] Introduce CAP_SYS_PERFMON capability for secure Perf users groups
Alexey Budankov
- [PATCH v1 0/3] Introduce CAP_SYS_PERFMON capability for secure Perf users groups
Alexey Budankov
- [PATCH v1 0/3] Introduce CAP_SYS_PERFMON capability for secure Perf users groups
Alexey Budankov
- [PATCH v1 1/3] capabilities: introduce CAP_SYS_PERFMON to kernel and user space
Alexey Budankov
- [PATCH v1 2/3] perf/core: apply CAP_SYS_PERFMON to CPUs and kernel monitoring
Alexey Budankov
- [PATCH v1 3/3] perf tool: extend Perf tool with CAP_SYS_PERFMON support
Alexey Budankov
- [PATCH v12 00/25] LSM: Module stacking for AppArmor
Casey Schaufler
- [PATCH v12 00/25] LSM: Module stacking for AppArmor
Casey Schaufler
- [PATCH v12 00/25] LSM: Module stacking for AppArmor
Casey Schaufler
- [PATCH v12 00/25] LSM: Module stacking for AppArmor
Casey Schaufler
- [PATCH v12 00/25] LSM: Module stacking for AppArmor
Casey Schaufler
- [PATCH v12 01/25] LSM: Infrastructure management of the sock security
Stephen Smalley
- [PATCH v12 01/25] LSM: Infrastructure management of the sock security
Casey Schaufler
- [PATCH v12 01/25] LSM: Infrastructure management of the sock security
Casey Schaufler
- [PATCH v12 01/25] LSM: Infrastructure management of the sock security
Casey Schaufler
- [PATCH v12 01/25] LSM: Infrastructure management of the sock security
Casey Schaufler
- [PATCH v12 02/25] LSM: Create and manage the lsmblob data structure.
Stephen Smalley
- [PATCH v12 02/25] LSM: Create and manage the lsmblob data structure.
Mimi Zohar
- [PATCH v12 02/25] LSM: Create and manage the lsmblob data structure.
Casey Schaufler
- [PATCH v12 02/25] LSM: Create and manage the lsmblob data structure.
Casey Schaufler
- [PATCH v12 02/25] LSM: Create and manage the lsmblob data structure.
Casey Schaufler
- [PATCH v12 02/25] LSM: Create and manage the lsmblob data structure.
Casey Schaufler
- [PATCH v12 02/25] LSM: Create and manage the lsmblob data structure.
Casey Schaufler
- [PATCH v12 03/25] LSM: Use lsmblob in security_audit_rule_match
Casey Schaufler
- [PATCH v12 03/25] LSM: Use lsmblob in security_audit_rule_match
Casey Schaufler
- [PATCH v12 03/25] LSM: Use lsmblob in security_audit_rule_match
Casey Schaufler
- [PATCH v12 03/25] LSM: Use lsmblob in security_audit_rule_match
Stephen Smalley
- [PATCH v12 03/25] LSM: Use lsmblob in security_audit_rule_match
Casey Schaufler
- [PATCH v12 03/25] LSM: Use lsmblob in security_audit_rule_match
Kees Cook
- [PATCH v12 03/25] LSM: Use lsmblob in security_audit_rule_match
Casey Schaufler
- [PATCH v12 03/25] LSM: Use lsmblob in security_audit_rule_match
Stephen Smalley
- [PATCH v12 03/25] LSM: Use lsmblob in security_audit_rule_match
Casey Schaufler
- [PATCH v12 03/25] LSM: Use lsmblob in security_audit_rule_match
Mimi Zohar
- [PATCH v12 03/25] LSM: Use lsmblob in security_audit_rule_match
Casey Schaufler
- [PATCH v12 04/25] LSM: Use lsmblob in security_kernel_act_as
Casey Schaufler
- [PATCH v12 04/25] LSM: Use lsmblob in security_kernel_act_as
Casey Schaufler
- [PATCH v12 04/25] LSM: Use lsmblob in security_kernel_act_as
Casey Schaufler
- [PATCH v12 04/25] LSM: Use lsmblob in security_kernel_act_as
Stephen Smalley
- [PATCH v12 04/25] LSM: Use lsmblob in security_kernel_act_as
Casey Schaufler
- [PATCH v12 05/25] net: Prepare UDS for security module stacking
Casey Schaufler
- [PATCH v12 05/25] net: Prepare UDS for security module stacking
Casey Schaufler
- [PATCH v12 05/25] net: Prepare UDS for security module stacking
Casey Schaufler
- [PATCH v12 05/25] net: Prepare UDS for security module stacking
Stephen Smalley
- [PATCH v12 05/25] net: Prepare UDS for security module stacking
Casey Schaufler
- [PATCH v12 06/25] LSM: Use lsmblob in security_secctx_to_secid
Casey Schaufler
- [PATCH v12 06/25] LSM: Use lsmblob in security_secctx_to_secid
Casey Schaufler
- [PATCH v12 06/25] LSM: Use lsmblob in security_secctx_to_secid
Casey Schaufler
- [PATCH v12 06/25] LSM: Use lsmblob in security_secctx_to_secid
Stephen Smalley
- [PATCH v12 06/25] LSM: Use lsmblob in security_secctx_to_secid
Casey Schaufler
- [PATCH v12 07/25] LSM: Use lsmblob in security_secid_to_secctx
Casey Schaufler
- [PATCH v12 07/25] LSM: Use lsmblob in security_secid_to_secctx
Casey Schaufler
- [PATCH v12 07/25] LSM: Use lsmblob in security_secid_to_secctx
Casey Schaufler
- [PATCH v12 07/25] LSM: Use lsmblob in security_secid_to_secctx
Stephen Smalley
- [PATCH v12 07/25] LSM: Use lsmblob in security_secid_to_secctx
Casey Schaufler
- [PATCH v12 08/25] LSM: Use lsmblob in security_ipc_getsecid
Casey Schaufler
- [PATCH v12 08/25] LSM: Use lsmblob in security_ipc_getsecid
Casey Schaufler
- [PATCH v12 08/25] LSM: Use lsmblob in security_ipc_getsecid
Casey Schaufler
- [PATCH v12 08/25] LSM: Use lsmblob in security_ipc_getsecid
Stephen Smalley
- [PATCH v12 08/25] LSM: Use lsmblob in security_ipc_getsecid
Casey Schaufler
- [PATCH v12 09/25] LSM: Use lsmblob in security_task_getsecid
Casey Schaufler
- [PATCH v12 09/25] LSM: Use lsmblob in security_task_getsecid
Casey Schaufler
- [PATCH v12 09/25] LSM: Use lsmblob in security_task_getsecid
Casey Schaufler
- [PATCH v12 09/25] LSM: Use lsmblob in security_task_getsecid
Stephen Smalley
- [PATCH v12 09/25] LSM: Use lsmblob in security_task_getsecid
Casey Schaufler
- [PATCH v12 09/25] LSM: Use lsmblob in security_task_getsecid
Casey Schaufler
- [PATCH v12 10/25] LSM: Use lsmblob in security_inode_getsecid
Casey Schaufler
- [PATCH v12 10/25] LSM: Use lsmblob in security_inode_getsecid
Casey Schaufler
- [PATCH v12 10/25] LSM: Use lsmblob in security_inode_getsecid
Casey Schaufler
- [PATCH v12 10/25] LSM: Use lsmblob in security_inode_getsecid
Stephen Smalley
- [PATCH v12 10/25] LSM: Use lsmblob in security_inode_getsecid
Casey Schaufler
- [PATCH v12 11/25] LSM: Use lsmblob in security_cred_getsecid
Casey Schaufler
- [PATCH v12 11/25] LSM: Use lsmblob in security_cred_getsecid
Casey Schaufler
- [PATCH v12 11/25] LSM: Use lsmblob in security_cred_getsecid
Casey Schaufler
- [PATCH v12 11/25] LSM: Use lsmblob in security_cred_getsecid
Stephen Smalley
- [PATCH v12 11/25] LSM: Use lsmblob in security_cred_getsecid
Casey Schaufler
- [PATCH v12 12/25] IMA: Change internal interfaces to use lsmblobs
Casey Schaufler
- [PATCH v12 12/25] IMA: Change internal interfaces to use lsmblobs
Casey Schaufler
- [PATCH v12 12/25] IMA: Change internal interfaces to use lsmblobs
Casey Schaufler
- [PATCH v12 12/25] IMA: Change internal interfaces to use lsmblobs
Stephen Smalley
- [PATCH v12 12/25] IMA: Change internal interfaces to use lsmblobs
Casey Schaufler
- [PATCH v12 13/25] LSM: Specify which LSM to display
Casey Schaufler
- [PATCH v12 13/25] LSM: Specify which LSM to display
Casey Schaufler
- [PATCH v12 13/25] LSM: Specify which LSM to display
Casey Schaufler
- [PATCH v12 13/25] LSM: Specify which LSM to display
Stephen Smalley
- [PATCH v12 13/25] LSM: Specify which LSM to display
Casey Schaufler
- [PATCH v12 13/25] LSM: Specify which LSM to display
Casey Schaufler
- [PATCH v12 14/25] LSM: Ensure the correct LSM context releaser
Casey Schaufler
- [PATCH v12 14/25] LSM: Ensure the correct LSM context releaser
Casey Schaufler
- [PATCH v12 14/25] LSM: Ensure the correct LSM context releaser
Casey Schaufler
- [PATCH v12 14/25] LSM: Ensure the correct LSM context releaser
Stephen Smalley
- [PATCH v12 14/25] LSM: Ensure the correct LSM context releaser
Casey Schaufler
- [PATCH v12 15/25] LSM: Use lsmcontext in security_secid_to_secctx
Casey Schaufler
- [PATCH v12 15/25] LSM: Use lsmcontext in security_secid_to_secctx
Casey Schaufler
- [PATCH v12 15/25] LSM: Use lsmcontext in security_secid_to_secctx
Casey Schaufler
- [PATCH v12 15/25] LSM: Use lsmcontext in security_secid_to_secctx
Stephen Smalley
- [PATCH v12 15/25] LSM: Use lsmcontext in security_secid_to_secctx
Stephen Smalley
- [PATCH v12 15/25] LSM: Use lsmcontext in security_secid_to_secctx
Casey Schaufler
- [PATCH v12 16/25] LSM: Use lsmcontext in security_dentry_init_security
Stephen Smalley
- [PATCH v12 16/25] LSM: Use lsmcontext in security_dentry_init_security
Casey Schaufler
- [PATCH v12 16/25] LSM: Use lsmcontext in security_dentry_init_security
Casey Schaufler
- [PATCH v12 16/25] LSM: Use lsmcontext in security_dentry_init_security
Casey Schaufler
- [PATCH v12 17/25] LSM: Use lsmcontext in security_inode_getsecctx
Casey Schaufler
- [PATCH v12 17/25] LSM: Use lsmcontext in security_inode_getsecctx
Casey Schaufler
- [PATCH v12 17/25] LSM: Use lsmcontext in security_inode_getsecctx
Stephen Smalley
- [PATCH v12 17/25] LSM: Use lsmcontext in security_inode_getsecctx
Casey Schaufler
- [PATCH v12 18/25] LSM: security_secid_to_secctx in netlink netfilter
Stephen Smalley
- [PATCH v12 18/25] LSM: security_secid_to_secctx in netlink netfilter
Casey Schaufler
- [PATCH v12 18/25] LSM: security_secid_to_secctx in netlink netfilter
Casey Schaufler
- [PATCH v12 18/25] LSM: security_secid_to_secctx in netlink netfilter
Casey Schaufler
- [PATCH v12 19/25] NET: Store LSM netlabel data in a lsmblob
Casey Schaufler
- [PATCH v12 19/25] NET: Store LSM netlabel data in a lsmblob
Casey Schaufler
- [PATCH v12 19/25] NET: Store LSM netlabel data in a lsmblob
Stephen Smalley
- [PATCH v12 19/25] NET: Store LSM netlabel data in a lsmblob
Casey Schaufler
- [PATCH v12 20/25] LSM: Verify LSM display sanity in binder
Casey Schaufler
- [PATCH v12 20/25] LSM: Verify LSM display sanity in binder
Casey Schaufler
- [PATCH v12 20/25] LSM: Verify LSM display sanity in binder
Stephen Smalley
- [PATCH v12 20/25] LSM: Verify LSM display sanity in binder
Casey Schaufler
- [PATCH v12 21/25] Audit: Add subj_LSM fields when necessary
Casey Schaufler
- [PATCH v12 21/25] Audit: Add subj_LSM fields when necessary
Stephen Smalley
- [PATCH v12 21/25] Audit: Add subj_LSM fields when necessary
Casey Schaufler
- [PATCH v12 22/25] Audit: Include object data for all security modules
Stephen Smalley
- [PATCH v12 22/25] Audit: Include object data for all security modules
Casey Schaufler
- [PATCH v12 22/25] Audit: Include object data for all security modules
Casey Schaufler
- [PATCH v12 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
Casey Schaufler
- [PATCH v12 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
Stephen Smalley
- [PATCH v12 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
Stephen Smalley
- [PATCH v12 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
Stephen Smalley
- [PATCH v12 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
Simon McVittie
- [PATCH v12 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
Stephen Smalley
- [PATCH v12 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
Stephen Smalley
- [PATCH v12 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
Simon McVittie
- [PATCH v12 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
Stephen Smalley
- [PATCH v12 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
John Johansen
- [PATCH v12 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
John Johansen
- [PATCH v12 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
Casey Schaufler
- [PATCH v12 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
John Johansen
- [PATCH v12 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
Casey Schaufler
- [PATCH v12 24/25] LSM: Add /proc attr entry for full LSM context
Casey Schaufler
- [PATCH v12 24/25] LSM: Add /proc attr entry for full LSM context
Casey Schaufler
- [PATCH v12 25/25] AppArmor: Remove the exclusive flag
Casey Schaufler
- [PATCH v12 25/25] AppArmor: Remove the exclusive flag
Casey Schaufler
- [PATCH v13 00/25] LSM: Module stacking for AppArmor
Casey Schaufler
- [PATCH v13 01/25] LSM: Infrastructure management of the sock security
Casey Schaufler
- [PATCH v13 02/25] LSM: Create and manage the lsmblob data structure.
Mickaël Salaün
- [PATCH v13 02/25] LSM: Create and manage the lsmblob data structure.
Casey Schaufler
- [PATCH v13 03/25] LSM: Use lsmblob in security_audit_rule_match
Casey Schaufler
- [PATCH v13 03/25] LSM: Use lsmblob in security_audit_rule_match
Mimi Zohar
- [PATCH v13 04/25] LSM: Use lsmblob in security_kernel_act_as
Casey Schaufler
- [PATCH v13 05/25] net: Prepare UDS for security module stacking
Casey Schaufler
- [PATCH v13 06/25] Use lsmblob in security_secctx_to_secid
Casey Schaufler
- [PATCH v13 07/25] LSM: Use lsmblob in security_secid_to_secctx
Casey Schaufler
- [PATCH v13 08/25] LSM: Use lsmblob in security_ipc_getsecid
Casey Schaufler
- [PATCH v13 09/25] LSM: Use lsmblob in security_task_getsecid
Casey Schaufler
- [PATCH v13 10/25] LSM: Use lsmblob in security_inode_getsecid
Casey Schaufler
- [PATCH v13 11/25] LSM: Use lsmblob in security_cred_getsecid
Casey Schaufler
- [PATCH v13 12/25] IMA: Change internal interfaces to use lsmblobs
Casey Schaufler
- [PATCH v13 13/25] LSM: Specify which LSM to display
Casey Schaufler
- [PATCH v13 14/25] LSM: Ensure the correct LSM context releaser
Casey Schaufler
- [PATCH v13 15/25] LSM: Use lsmcontext in security_secid_to_secctx
Casey Schaufler
- [PATCH v13 16/25] LSM: Use lsmcontext in security_dentry_init_security
Casey Schaufler
- [PATCH v13 17/25] LSM: Use lsmcontext in security_inode_getsecctx
Casey Schaufler
- [PATCH v13 18/25] LSM: security_secid_to_secctx in netlink netfilter
Casey Schaufler
- [PATCH v13 19/25] NET: Store LSM netlabel data in a lsmblob
Casey Schaufler
- [PATCH v13 20/25] LSM: Verify LSM display sanity in binder
Casey Schaufler
- [PATCH v13 21/25] Audit: Add subj_LSM fields when necessary
Casey Schaufler
- [PATCH v13 22/25] Audit: Include object data for all security modules
Casey Schaufler
- [PATCH v13 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
Casey Schaufler
- [PATCH v13 25/25] AppArmor: Remove the exclusive flag
Casey Schaufler
- [PATCH v2 0/7] Introduce CAP_SYS_PERFMON to secure system performance monitoring and observability
Alexey Budankov
- [PATCH v2 1/7] capabilities: introduce CAP_SYS_PERFMON to kernel and user space
Stephen Smalley
- [PATCH v2 1/7] capabilities: introduce CAP_SYS_PERFMON to kernel and user space
Alexey Budankov
- [PATCH v2 2/7] perf/core: open access for CAP_SYS_PERFMON privileged process
Lubashev, Igor
- [PATCH v2 2/7] perf/core: open access for CAP_SYS_PERFMON privileged process
Alexey Budankov
- [PATCH v2 2/7] perf/core: open access for CAP_SYS_PERFMON privileged process
Alexey Budankov
- [PATCH v2 2/7] perf/core: open access for CAP_SYS_PERFMON privileged process
Alexey Budankov
- [PATCH v2 3/7] perf tool: extend Perf tool with CAP_SYS_PERFMON capability support
Alexey Budankov
- [PATCH v2 4/7] drm/i915/perf: open access for CAP_SYS_PERFMON privileged process
Alexey Budankov
- [PATCH v2 5/7] trace/bpf_trace: open access for CAP_SYS_PERFMON privileged process
Alexey Budankov
- [PATCH v2 6/7] powerpc/perf: open access for CAP_SYS_PERFMON privileged process
Alexey Budankov
- [PATCH v2 7/7] parisc/perf: open access for CAP_SYS_PERFMON privileged process
Alexey Budankov
- [PATCH v23 12/24] x86/sgx: Linux Enclave Driver
Jarkko Sakkinen
- [PATCH v23 12/24] x86/sgx: Linux Enclave Driver
Greg KH
- [PATCH v23 12/24] x86/sgx: Linux Enclave Driver
Jarkko Sakkinen
- [PATCH v23 12/24] x86/sgx: Linux Enclave Driver
Jarkko Sakkinen
- [PATCH v24 12/24] x86/sgx: Linux Enclave Driver
Haitao Huang
- [PATCH v24 12/24] x86/sgx: Linux Enclave Driver
Sean Christopherson
- [PATCH v24 12/24] x86/sgx: Linux Enclave Driver
Jarkko Sakkinen
- [PATCH v24 12/24] x86/sgx: Linux Enclave Driver
Jarkko Sakkinen
- [PATCH v2] efi: Only print errors about failing to get certs if EFI vars are found
Javier Martinez Canillas
- [PATCH v2] tomoyo: Don't check open/getattr permission on sockets.
Tetsuo Handa
- [PATCH v2] tomoyo: Don't check open/getattr permission on sockets.
James Morris
- [PATCH v2] tomoyo: Don't check open/getattr permission on sockets.
Tetsuo Handa
- [PATCH v2] tomoyo: Don't check open/getattr permission on sockets.
Tetsuo Handa
- [PATCH v3 0/7] Introduce CAP_SYS_PERFMON to secure system performance monitoring and observability
Alexey Budankov
- [PATCH v3 1/7] capabilities: introduce CAP_SYS_PERFMON to kernel and user space
Stephen Smalley
- [PATCH v3 1/7] capabilities: introduce CAP_SYS_PERFMON to kernel and user space
Alexey Budankov
- [PATCH v3 2/7] perf/core: open access for CAP_SYS_PERFMON privileged process
Alexey Budankov
- [PATCH v3 3/7] perf tool: extend Perf tool with CAP_SYS_PERFMON capability support
Alexey Budankov
- [PATCH v3 4/7] drm/i915/perf: open access for CAP_SYS_PERFMON privileged process
Alexey Budankov
- [PATCH v3 5/7] trace/bpf_trace: open access for CAP_SYS_PERFMON privileged process
Alexey Budankov
- [PATCH v3 6/7] powerpc/perf: open access for CAP_SYS_PERFMON privileged process
Alexey Budankov
- [PATCH v3 7/7] parisc/perf: open access for CAP_SYS_PERFMON privileged process
Alexey Budankov
- [PATCH v4 0/7] Introduce CAP_SYS_PERFMON to secure system performance monitoring and observability
Alexey Budankov
- [PATCH v4 1/9] capabilities: introduce CAP_SYS_PERFMON to kernel and user space
Stephen Smalley
- [PATCH v4 1/9] capabilities: introduce CAP_SYS_PERFMON to kernel and user space
Alexey Budankov
- [PATCH v4 2/9] perf/core: open access for CAP_SYS_PERFMON privileged process
Alexey Budankov
- [PATCH v4 3/9] perf tool: extend Perf tool with CAP_SYS_PERFMON capability support
Alexey Budankov
- [PATCH v4 4/9] drm/i915/perf: open access for CAP_SYS_PERFMON privileged process
Alexey Budankov
- [PATCH v4 4/9] drm/i915/perf: open access for CAP_SYS_PERFMON privileged process
Lionel Landwerlin
- [PATCH v4 5/9] trace/bpf_trace: open access for CAP_SYS_PERFMON privileged process
Alexey Budankov
- [PATCH v4 6/9] powerpc/perf: open access for CAP_SYS_PERFMON privileged process
Alexey Budankov
- [PATCH v4 7/9] parisc/perf: open access for CAP_SYS_PERFMON privileged process
Alexey Budankov
- [PATCH v4 8/9] drivers/perf: open access for CAP_SYS_PERFMON privileged process
Alexey Budankov
- [PATCH v4 9/9] drivers/oprofile: open access for CAP_SYS_PERFMON privileged process
Alexey Budankov
- [PATCH v6 00/10] proc: modernize proc to support multiple private instances
Alexey Gladkov
- [PATCH v6 00/27] nfs: Mount API conversion
Scott Mayhew
- [PATCH v6 00/27] nfs: Mount API conversion
Schumaker, Anna
- [PATCH v6 00/27] nfs: Mount API conversion
Scott Mayhew
- [PATCH v6 00/27] nfs: Mount API conversion
Scott Mayhew
- [PATCH v6 01/10] proc: Rename struct proc_fs_info to proc_fs_opts
Alexey Gladkov
- [PATCH v6 01/27] saner calling conventions for nfs_fs_mount_common()
Scott Mayhew
- [PATCH v6 02/10] proc: add proc_fs_info struct to store proc information
Alexey Gladkov
- [PATCH v6 02/27] nfs: stash server into struct nfs_mount_info
Scott Mayhew
- [PATCH v6 03/10] proc: move /proc/{self|thread-self} dentries to proc_fs_info
Alexey Gladkov
- [PATCH v6 03/27] nfs: lift setting mount_info from nfs4_remote{, _referral}_mount
Scott Mayhew
- [PATCH v6 04/10] proc: move hide_pid, pid_gid from pid_namespace to proc_fs_info
Alexey Gladkov
- [PATCH v6 04/27] nfs: fold nfs4_remote_fs_type and nfs4_remote_referral_fs_type
Scott Mayhew
- [PATCH v6 05/10] proc: add helpers to set and get proc hidepid and gid mount options
kbuild test robot
- [PATCH v6 05/10] proc: add helpers to set and get proc hidepid and gid mount options
Alexey Gladkov
- [PATCH v6 05/27] nfs: don't bother setting/restoring export_path around do_nfs_root_mount()
Scott Mayhew
- [PATCH v6 06/10] proc: support mounting procfs instances inside same pid namespace
Alexey Gladkov
- [PATCH v6 06/27] nfs4: fold nfs_do_root_mount/nfs_follow_remote_path
Scott Mayhew
- [PATCH v6 07/10] proc: flush task dcache entries from all procfs instances
Alexey Gladkov
- [PATCH v6 07/10] proc: flush task dcache entries from all procfs instances
J Freyensee
- [PATCH v6 07/27] nfs: lift setting mount_info from nfs_xdev_mount()
Scott Mayhew
- [PATCH v6 08/10] proc: instantiate only pids that we can ptrace on 'hidepid=3' mount option
Alexey Gladkov
- [PATCH v6 08/27] nfs: stash nfs_subversion reference into nfs_mount_info
Scott Mayhew
- [PATCH v6 09/10] proc: add option to mount only a pids subset
Alexey Gladkov
- [PATCH v6 09/10] proc: add option to mount only a pids subset
kbuild test robot
- [PATCH v6 09/27] nfs: don't bother passing nfs_subversion to ->try_mount() and nfs_fs_mount_common()
Scott Mayhew
- [PATCH v6 10/10] docs: proc: add documentation for "hidepid=3" and "pidonly" options and new mount behavior
Alexey Gladkov
- [PATCH v6 10/27] nfs: merge xdev and remote file_system_type
Scott Mayhew
- [PATCH v6 11/27] nfs: unexport nfs_fs_mount_common()
Scott Mayhew
- [PATCH v6 12/27] nfs: don't pass nfs_subversion to ->create_server()
Scott Mayhew
- [PATCH v6 13/27] nfs: get rid of mount_info ->fill_super()
Scott Mayhew
- [PATCH v6 14/27] nfs_clone_sb_security(): simplify the check for server bogosity
Scott Mayhew
- [PATCH v6 15/27] nfs: get rid of ->set_security()
Scott Mayhew
- [PATCH v6 16/27] NFS: Move mount parameterisation bits into their own file
Scott Mayhew
- [PATCH v6 17/27] NFS: Constify mount argument match tables
Scott Mayhew
- [PATCH v6 18/27] NFS: Rename struct nfs_parsed_mount_data to struct nfs_fs_context
Scott Mayhew
- [PATCH v6 19/27] NFS: Split nfs_parse_mount_options()
Scott Mayhew
- [PATCH v6 20/27] NFS: Deindent nfs_fs_context_parse_option()
Scott Mayhew
- [PATCH v6 21/27] NFS: Add a small buffer in nfs_fs_context to avoid string dup
Scott Mayhew
- [PATCH v6 22/27] NFS: Do some tidying of the parsing code
Scott Mayhew
- [PATCH v6 23/27] NFS: rename nfs_fs_context pointer arg in a few functions
Scott Mayhew
- [PATCH v6 24/27] NFS: Convert mount option parsing to use functionality from fs_parser.h
Scott Mayhew
- [PATCH v6 25/27] NFS: Add fs_context support.
Scott Mayhew
- [PATCH v6 26/27] NFS: Additional refactoring for fs_context conversion
Scott Mayhew
- [PATCH v6 27/27] NFS: Attach supplementary error information to fs_context.
Scott Mayhew
- [PATCH] apparmor: fix bind mounts aborting with -ENOMEM
Patrick Steinhardt
- [PATCH] apparmor: fix bind mounts aborting with -ENOMEM
John Johansen
- [PATCH] ima: add the ability to query ima for the hash of a given file.
Mimi Zohar
- [PATCH] ima: add the ability to query ima for the hash of a given file.
Florent Revest
- [PATCH] ima: add the ability to query ima for the hash of a given file.
Lakshmi Ramasubramanian
- [PATCH] integrity: Expose data structures required for include/linux/integrity.h
Florent Revest
- [PATCH] integrity: Expose data structures required for include/linux/integrity.h
Casey Schaufler
- [PATCH] integrity: Expose data structures required for include/linux/integrity.h
Mimi Zohar
- [PATCH] integrity: Expose data structures required for include/linux/integrity.h
Florent Revest
- [PATCH] integrity: Expose data structures required for include/linux/integrity.h
Mimi Zohar
- [PATCH] integrity: Expose data structures required for include/linux/integrity.h
Mimi Zohar
- [PATCH] integrity: Expose data structures required for include/linux/integrity.h
Florent Revest
- [PATCH] integrity: Expose data structures required for include/linux/integrity.h
Mimi Zohar
- [PATCH] Kernel Lockdown: Add an option to allow raw MSR access even, in confidentiality mode.
Matt Parnell
- [PATCH] Kernel Lockdown: Add an option to allow raw MSR access even, in confidentiality mode.
Matt Parnell
- [PATCH] Kernel Lockdown: Add an option to allow raw MSR access even, in confidentiality mode.
Matthew Garrett
- [PATCH] Kernel Lockdown: Add an option to allow raw MSR access even, in confidentiality mode.
Matt Parnell
- [PATCH] Kernel Lockdown: Add an option to allow raw MSR access even, in confidentiality mode.
Jordan Glover
- [PATCH] Kernel Lockdown: Add an option to allow raw MSR access even, in confidentiality mode.
Matt Parnell
- [PATCH] Kernel Lockdown: Add an option to allow raw MSR access even, in confidentiality mode.
Matthew Garrett
- [PATCH] Kernel Lockdown: Add an option to allow raw MSR access even, in confidentiality mode.
Matt Parnell
- [PATCH] Kernel Lockdown: Add an option to allow raw MSR access even, in confidentiality mode.
Matt Parnell
- [PATCH] Kernel Lockdown: Add an option to allow raw MSR access even, in confidentiality mode.
Matthew Garrett
- [PATCH] Kernel Lockdown: Add an option to allow raw MSR access even, in confidentiality mode.
Matt Parnell
- [PATCH] Kernel Lockdown: Add an option to allow raw MSR access even, in confidentiality mode.
Matt Parnell
- [PATCH] Kernel Lockdown: Add an option to allow raw MSR access even, in confidentiality mode.
Matt Parnell
- [PATCH] LSM: allow an LSM to disable all hooks at once
Ondrej Mosnacek
- [PATCH] LSM: allow an LSM to disable all hooks at once
Ondrej Mosnacek
- [PATCH] LSM: allow an LSM to disable all hooks at once
Stephen Smalley
- [PATCH] LSM: allow an LSM to disable all hooks at once
Kees Cook
- [PATCH] LSM: allow an LSM to disable all hooks at once
Casey Schaufler
- [PATCH] LSM: allow an LSM to disable all hooks at once
Stephen Smalley
- [PATCH] LSM: allow an LSM to disable all hooks at once
Tetsuo Handa
- [PATCH] LSM: allow an LSM to disable all hooks at once
Ondrej Mosnacek
- [PATCH] LSM: allow an LSM to disable all hooks at once
Ondrej Mosnacek
- [PATCH] LSM: allow an LSM to disable all hooks at once
Ondrej Mosnacek
- [PATCH] LSM: allow an LSM to disable all hooks at once
Stephen Smalley
- [PATCH] LSM: allow an LSM to disable all hooks at once
Ondrej Mosnacek
- [PATCH] LSM: allow an LSM to disable all hooks at once
Casey Schaufler
- [PATCH] LSM: allow an LSM to disable all hooks at once
Stephen Smalley
- [PATCH] LSM: allow an LSM to disable all hooks at once
Paul Moore
- [PATCH] LSM: allow an LSM to disable all hooks at once
Stephen Smalley
- [PATCH] LSM: allow an LSM to disable all hooks at once
Paul Moore
- [PATCH] LSM: allow an LSM to disable all hooks at once
Stephen Smalley
- [PATCH] LSM: allow an LSM to disable all hooks at once
Paul Moore
- [PATCH] LSM: allow an LSM to disable all hooks at once
Casey Schaufler
- [PATCH] LSM: allow an LSM to disable all hooks at once
Stephen Smalley
- [PATCH] LSM: allow an LSM to disable all hooks at once
Paul Moore
- [PATCH] LSM: allow an LSM to disable all hooks at once
Ondrej Mosnacek
- [PATCH] LSM: allow an LSM to disable all hooks at once
Ondrej Mosnacek
- [PATCH] LSM: allow an LSM to disable all hooks at once
James Morris
- [PATCH] LSM: allow an LSM to disable all hooks at once
Paul Moore
- [PATCH] LSM: allow an LSM to disable all hooks at once
Tetsuo Handa
- [PATCH] LSM: allow an LSM to disable all hooks at once
James Morris
- [PATCH] MAINTAINERS: fix style in SAFESETID SECURITY MODULE
Lukas Bulwahn
- [PATCH] security: apparmor: Fix a possible sleep-in-atomic-context bug in find_attach()
Al Viro
- [PATCH] security: apparmor: Fix a possible sleep-in-atomic-context bug in find_attach()
Jia-Ju Bai
- [PATCH] security: only build lsm_audit if CONFIG_SECURITY=y
Stephen Smalley
- [PATCH] security: only build lsm_audit if CONFIG_SECURITY=y
Paul Moore
- [PATCH] security: only build lsm_audit if CONFIG_SECURITY=y
James Morris
- [PATCH] selinux: reorder hooks to make runtime disable less broken
Stephen Smalley
- [PATCH] selinux: reorder hooks to make runtime disable less broken
Casey Schaufler
- [PATCH] selinux: reorder hooks to make runtime disable less broken
Ondrej Mosnacek
- [PATCH] selinux: reorder hooks to make runtime disable less broken
Casey Schaufler
- [RFC PATCH 04/10] pipe: Use head and tail pointers for the ring, not cursor and length [ver #2]
David Howells
- [RFC PATCH 04/10] pipe: Use head and tail pointers for the ring, not cursor and length [ver #2]
Johannes Hirte
- [RFC PATCH 04/10] pipe: Use head and tail pointers for the ring, not cursor and length [ver #2]
Linus Torvalds
- [RFC PATCH 04/10] pipe: Use head and tail pointers for the ring, not cursor and length [ver #2]
Johannes Hirte
- [RFC PATCH 04/10] pipe: Use head and tail pointers for the ring, not cursor and length [ver #2]
Linus Torvalds
- [RFC PATCH 04/10] pipe: Use head and tail pointers for the ring, not cursor and length [ver #2]
Linus Torvalds
- [RFC PATCH 04/10] pipe: Use head and tail pointers for the ring, not cursor and length [ver #2]
Johannes Hirte
- [RFC PATCH 04/10] pipe: Use head and tail pointers for the ring, not cursor and length [ver #2]
Linus Torvalds
- [RFC PATCH v2] security, lockdown, selinux: implement SELinux lockdown
Paul Moore
- [RFC PATCH] security: add an interface to lookup the lockdown reason
James Morris
- [RFC PATCH] security: add an interface to lookup the lockdown reason
Stephen Smalley
- [RFC PATCH] security: add an interface to lookup the lockdown reason
Paul Moore
- [RFC PATCH] security: add an interface to lookup the lockdown reason
Stephen Smalley
- [RFC PATCH] security: add an interface to lookup the lockdown reason
Paul Moore
- [RFC PATCH] security: add an interface to lookup the lockdown reason
Stephen Smalley
- [RFC PATCH] security: add an interface to lookup the lockdown reason
Paul Moore
- [RFC PATCH] security: add an interface to lookup the lockdown reason
Paul Moore
- [RFC PATCH] selinux: deprecate disabling SELinux and runtime
Paul Moore
- [RFC PATCH] selinux: deprecate disabling SELinux and runtime
Casey Schaufler
- [RFC PATCH] selinux: ensure we cleanup the internal AVC counters on error in avc_insert()
Paul Moore
- [RFC PATCH] selinux: ensure we cleanup the internal AVC counters on error in avc_insert()
Stephen Smalley
- [RFC PATCH] selinux: ensure we cleanup the internal AVC counters on error in avc_insert()
Paul Moore
- [RFC PATCH] selinux: ensure we cleanup the internal AVC counters on error in avc_insert()
Stephen Smalley
- [RFC PATCH] selinux: ensure we cleanup the internal AVC counters on error in avc_insert()
Paul Moore
- [RFC PATCH] selinux: ensure we cleanup the internal AVC counters on error in avc_insert()
Paul Moore
- [tip: x86/mtrr] x86/mtrr: Require CAP_SYS_ADMIN for all access
tip-bot2 for Kees Cook
- Anomalous output from getpcaps(1) for process with all capabilities
Andrew G. Morgan
- Anomalous output from getpcaps(1) for process with all capabilities
Michael Kerrisk (man-pages)
- Anomalous output from getpcaps(1) for process with all capabilities
Andrew G. Morgan
- Anomalous output from getpcaps(1) for process with all capabilities
Michael Kerrisk (man-pages)
- Anomalous output from getpcaps(1) for process with all capabilities
Michael Kerrisk (man-pages)
- Anomalous output from getpcaps(1) for process with all capabilities
Serge E. Hallyn
- Anomalous output from getpcaps(1) for process with all capabilities
Andrew G. Morgan
- Anomalous output from getpcaps(1) for process with all capabilities
Serge E. Hallyn
- Anomalous output from getpcaps(1) for process with all capabilities
Andrew G. Morgan
- Anomalous output from getpcaps(1) for process with all capabilities
Andrew G. Morgan
- Anomalous output from getpcaps(1) for process with all capabilities
Serge E. Hallyn
- Anomalous output from getpcaps(1) for process with all capabilities
Serge E. Hallyn
- Anomalous output from getpcaps(1) for process with all capabilities
Serge E. Hallyn
- Anomalous output from getpcaps(1) for process with all capabilities
Michael Kerrisk (man-pages)
- Congratulations
Bishop Johnr
- general protection fault in __schedule (2)
Sean Christopherson
- God has remembered your prayers I have already sent you Money Gram payment of $5000.00 today, MG 1029-8096
Rev.Dr Emmanuel Okoye CEO Ecobank-benin
- INFO: rcu detected stall in pipe_read
Dmitry Vyukov
- INFO: rcu detected stall in security_file_free
Dmitry Vyukov
- INFO: rcu detected stall in sys_kill
Dmitry Vyukov
- INFO: rcu detected stall in sys_kill
Dmitry Vyukov
- INFO: rcu detected stall in sys_kill
Casey Schaufler
- INFO: rcu detected stall in sys_kill
Daniel Axtens
- INFO: rcu detected stall in sys_kill
Daniel Axtens
- KASAN: slab-out-of-bounds Read in fbcon_get_font
Daniel Vetter
- KASAN: slab-out-of-bounds Read in fbcon_get_font
Dmitry Vyukov
- KASAN: slab-out-of-bounds Read in fbcon_get_font
Daniel Vetter
- KASAN: slab-out-of-bounds Read in fbcon_get_font
Andrey Ryabinin
- KASAN: slab-out-of-bounds Read in fbcon_get_font
syzbot
- KASAN: slab-out-of-bounds Read in fbcon_get_font
Tetsuo Handa
- KASAN: slab-out-of-bounds Read in fbcon_get_font
Paolo Bonzini
- KASAN: slab-out-of-bounds Read in fbcon_get_font
Dmitry Vyukov
- KASAN: slab-out-of-bounds Read in fbcon_get_font
Paolo Bonzini
- KASAN: slab-out-of-bounds Read in fbcon_get_font
Tetsuo Handa
- KASAN: slab-out-of-bounds Read in fbcon_get_font
Dmitry Vyukov
- KASAN: slab-out-of-bounds Read in fbcon_get_font
Tetsuo Handa
- KASAN: slab-out-of-bounds Read in fbcon_get_font
Paolo Bonzini
- KASAN: slab-out-of-bounds Read in fbcon_get_font
Dmitry Vyukov
- KASAN: slab-out-of-bounds Read in fbcon_get_font
Paolo Bonzini
- KASAN: slab-out-of-bounds Read in fbcon_get_font
Dmitry Vyukov
- KASAN: slab-out-of-bounds Read in fbcon_get_font
Dmitry Vyukov
- Looks like issue in handling active_nodes count in 4.19 kernel .
rsiddoji at codeaurora.org
- Looks like issue in handling active_nodes count in 4.19 kernel
Paul Moore
- Looks like issue in handling active_nodes count in 4.19 kernel
Ravi Kumar Siddojigari
- Looks like issue in handling active_nodes count in 4.19 kernel .
Stephen Smalley
- Looks like issue in handling active_nodes count in 4.19 kernel .
rsiddoji at codeaurora.org
- Looks like issue in handling active_nodes count in 4.19 kernel .
Stephen Smalley
- Looks like issue in handling active_nodes count in 4.19 kernel .
Stephen Smalley
- Looks like issue in handling active_nodes count in 4.19 kernel .
rsiddoji at codeaurora.org
- Looks like issue in handling active_nodes count in 4.19 kernel .
Stephen Smalley
- Looks like issue in handling active_nodes count in 4.19 kernel .
Ravi Kumar Siddojigari
- Looks like issue in handling active_nodes count in 4.19 kernel .
Stephen Smalley
- Looks like issue in handling active_nodes count in 4.19 kernel .
Stephen Smalley
- Looks like issue in handling active_nodes count in 4.19 kernel .
Ravi Kumar Siddojigari
- Looks like issue in handling active_nodes count in 4.19 kernel .
Stephen Smalley
- Looks like issue in handling active_nodes count in 4.19 kernel .
Paul Moore
- Looks like issue in handling active_nodes count in 4.19 kernel .
Ravi Kumar Siddojigari
- Looks like issue in handling active_nodes count in 4.19 kernel .
Stephen Smalley
- Looks like issue in handling active_nodes count in 4.19 kernel .
Paul Moore
- Mein letzter Wunsch.
CCULVERT FOUNDATION
- No subject
Beth Nat
- possible deadlock in process_measurement (2)
syzbot
- Report: suspicious RCU usage in security code
John Garry
- Suspicious RCU usage in tomoyo code
John Garry
- Suspicious RCU usage in tomoyo code
Tetsuo Handa
- Take home 750,000 Euros this end of year
La Primitiva
- tracefs splats in lockdown=confidentiality mode
Matthew Garrett
- tracefs splats in lockdown=confidentiality mode
Steven Rostedt
- Urgent delivery Notification of your ATM MASTER CARD Amount,$15.800’000’00,
MS. MARYANNA B. THOMASON
Last message date:
Tue Dec 31 19:45:07 UTC 2019
Archived on: Tue Dec 31 19:45:28 UTC 2019
This archive was generated by
Pipermail 0.09 (Mailman edition).